Re: Third Party VoIP Over Xfinity

2024-09-11 Thread Tom Beecher
> > How can such a large company have something so simple as SIP > registration mangled up? > Very little incentive to fix it. The number of customers that are able to switch providers when something like this doesn't work is a fractional percentage of overall customer churn. The MBAs say it's ch

Re: Seeking IANA ccTLD contact

2024-09-06 Thread Tom Beecher
Not really an escalation point above the registrar level. https://www.icann.org/resources/pages/about-icann-faqs-2019-02-25-en Q: Does ICANN help with domain ownership or registration disputes? > > A: *No*, ICANN does not get involved in disputes regarding domain > ownership or registration. ICAN

Re: Apple Geolocation contact?

2024-09-06 Thread Tom Beecher
> > I've been fighting a similar issue. I'd like to throw in, a lot of mobile > devices are geolocation dependent for time, and may completely disregard > DHCP timezone and instead rely entirely on GeoLocation *even if it is > woefully inaccurate, or unobtainable*. > 1. RFC4833 *presumes* that the

Re: Wi-Fi Calling in a corporate environment

2024-08-02 Thread Tom Beecher
My understanding has been that generally, if the cellular network signal was above a certain threshold, phones won't even attempt to use wifi calling. Some carriers used to let you flip a switch to force the phone to prefer wifi over cellular, but some have removed that. ( Verizon for example. ) I

Re: Digicert revoking certain certs failing CNAME validation

2024-07-31 Thread Tom Beecher
On Tue, Jul 30, 2024 at 12:35 PM Innocent Obi >> wrote: >> >>> Luckily it seems my org has since mitigated this, but it would be >>> interesting to know the broader impacts/who is broadly impacted. >>> >>> On Tue, Jul 30, 2024 at 12:20 PM Tom Beecher wro

Re: Digicert revoking certain certs failing CNAME validation

2024-07-30 Thread Tom Beecher
If you're only getting this now, you're probably in trouble, because they're revoking affected certs in about 15 mins. On Tue, Jul 30, 2024 at 2:53 PM Innocent Obi wrote: > Just in-case this hasn't made its way around: > https://www.digicert.com/support/certificate-revocation-incident. > >

Re: lots of internet starting at ~3 a.m. cst

2024-07-23 Thread Tom Beecher
No, because there's no set schedule for these things. Some publishers / consoles get content/patches up in advance to allow user to pre-load. This can smooth out the bandwidth hits, but only if the users enable the pre-load feature. Many don't. Other publishers just enable the updates at once for

Re: 600,000 routers bricked

2024-06-03 Thread Tom Beecher
answers all of your > concerns. Further, they remark that this was an especially sophisticated > infection, that hid its tracks well. > > > > Lee > > > > *From:* NANOG *On > Behalf Of *Tom Beecher > *Sent:* Sunday, June 2, 2024 4:23 PM > *To:* Dave Taht > *Cc

Re: 600,000 routers bricked

2024-06-02 Thread Tom Beecher
That post from Mr. Perens about this is honestly really shitty. 1. Is he right that Lumen has to shoulder blame for not keeping CPE updated with exploit free software? Certainly. 2. Making a claim that all 600k of these routers were being used as botnet zombies without any supporting evidence is r

Re: Should FCC look at SS7 vulnerabilities or BGP vulnerabilities

2024-05-17 Thread Tom Beecher
to be solved. Not engaging with RPKI because it doesn't perfectly solve every BGP-adjacent issue is a poor argument. On Fri, May 17, 2024 at 7:24 PM Ca By wrote: > > > On Fri, May 17, 2024 at 4:20 PM Tom Beecher wrote: > >> RPKI is not a good solution for all network

Re: Should FCC look at SS7 vulnerabilities or BGP vulnerabilities

2024-05-17 Thread Tom Beecher
> > RPKI is not a good solution for all networks, especially those that are > non-transit in nature and take reasonable mitigation actions like IRR > prefix lists. > Some of the largest , most impactful route leaks have come from non-transit networks reliant on IRR managed prefix lists. On Fri, M

Re: Should FCC look at SS7 vulnerabilities or BGP vulnerabilities

2024-05-17 Thread Tom Beecher
> > Just because they were presented with the information doesn't mean they > understand. It's our job as operators to get involved and help them understand as best as can be done, so that the proposals are as well informed as possible. > Just because they understand doesn't mean they execute b

Re: Mailing list SPF Failure

2024-05-16 Thread Tom Beecher
Same, this address for me is also gmail. This is what Gmail shows me from earlier today, when the SPF record was not present : Message ID < bff409fd0177c9caf1461e2439691...@polarismail--com.w.emailarray.com> Created at: Thu, May 16, 2024 at 11:59 AM (Delivered after 77 seconds) From: "Scott Q."

Re: Mailing list SPF Failure

2024-05-16 Thread Tom Beecher
> > I'm surprised nobody noticed for close to 10 days. Probably because it wasn't 10 days. On Thu, May 16, 2024 at 10:26 PM Scott Q. wrote: > I'm surprised nobody noticed for close to 10 days. I was away from work > and upon coming back I saw the little discussion there was , in my Spam > fold

Re: On consistency and 192.0.0.0/24

2024-05-14 Thread Tom Beecher
> > That means that some IP addresses in the block 192.0.0.0/24 may be > routable. > > So, I would not make this a bogon. > This ignores note 2 on the IANA definitions page, next to 192.0.0.0/24 : > [2] > > Not useable unless by virtue of a more specific reservation. > > Which then lists the mor

Re: Help with removing DNS shinkhole FP from Charter/Spectrum

2024-04-23 Thread Tom Beecher
Validin, made an interesting observation on this. I am also a Spectrum residential customer, none of their equipment, run my own DNS server (pihole). My DHCP Assigned DNS servers are 2001:1998:f00:1::1 2001:1998:f00:2::1 bash-3.2$ dig -x 2001:1998:f00:1::1 +short dns-cac-lb-01.rr.com. bash-3.2$

Re: constant FEC errors juniper mpc10e 400g

2024-04-18 Thread Tom Beecher
now if this FEC stuff I see concurring is actually > contained in Ethernet Frames? If so, please send a link to show the > ethernet frame structure as it pertains to this 400g fec stuff. If so, I'd > really like to know the header format, etc. > > -Aaron > On 4/18/2024 1:17 PM, T

Re: constant FEC errors juniper mpc10e 400g

2024-04-18 Thread Tom Beecher
FEC is occurring at the PHY , below the PCS. Even if you're not sending any traffic, all the ethernet control frame juju is still going back and forth, which FEC may have to correct. I *think* (but not 100% sure) that for anything that by spec requires FEC, there is a default RS-FEC type that wil

Re: constant FEC errors juniper mpc10e 400g

2024-04-18 Thread Tom Beecher
> > We've seen the same between Juniper and Arista boxes in the same rack > running at 100G, despite cleaning fibres, swapping optics, moving ports, > moving line cards, e.t.c. TAC said it's a non-issue, and to be expected, > and shared the same KB's. > > Just for extra clarity off those KB, proba

Re: constant FEC errors juniper mpc10e 400g

2024-04-17 Thread Tom Beecher
Notes I found that I took from smart optical people : "PAM4 runs at much lower SNRs than NRZ, because you're trying to read 4 distinct voltage levels instead of 2.Even the cleanest system will have some of that, so the only way to make it usable is to have FEC in place." On Wed, Apr 17, 2024 at

Re: constant FEC errors juniper mpc10e 400g

2024-04-17 Thread Tom Beecher
Isn't FEC required by the 400G spec? On Wed, Apr 17, 2024 at 3:45 PM Aaron Gould wrote: > i did. Usually my NANOG and J-NSP email list gets me a quicker solution > than JTAC. > > -Aaron > On 4/17/2024 2:37 PM, Dominik Dobrowolski wrote: > > Open a JTAC case, > That looks like a work for them >

Re: Whitebox Routers Beyond the Datasheet

2024-04-14 Thread Tom Beecher
Agreed. I think as a practical matter, the large majority of operators probably only care about time from last update / EoRIB -> FIBs forwarding working. As long as that time delta is acceptable for their environment and circumstances, that's 'good enough'. Definitely some edge cases and circumsta

Re: Whitebox Routers Beyond the Datasheet

2024-04-12 Thread Tom Beecher
> > Also, BGP convergence isn't listed (nor do I rarely ever see it talked > about in such sheets). I feel like this shouldn't be listed on a data sheet for just the whitebox hardware. The software running on it would be the gating factor. On Fri, Apr 12, 2024 at 9:05 AM Mike Hammett wrote: >

Re: N91 Women mixer on Sunday?

2024-03-29 Thread Tom Beecher
I don't think anything is 'easily fixed' on this topic. I do however hope that everyone accepts at face value that the board, staff, and PC are *trying* to do the right things here. Doesn't mean that it *will* always be the right thing, or even that a majority of people can agree on what the right

Re: N91 Women mixer on Sunday?

2024-03-29 Thread Tom Beecher
> > My memory is a little fuzzy, but I think I recall one of the early WiT > lunches hosted at NANOG that was women-only, where some men were upset > for being "left out". Whether that was good or bad is less important > than understanding what the outcome of a women-only activity is for > women, e

Re: N91 Women mixer on Sunday?

2024-03-28 Thread Tom Beecher
There was a Women in Tech Mixer on Sunday in Charlotte as well. As I recall there was a pretty decent attendance. During my time on the PC, we always got a lot of feedback about Sunday when the topic came up. Some members were strongly opposed to anything on Sunday and didn't even like the Hackath

Re: Open source Netflow analysis for monitoring AS-to-AS traffic

2024-03-28 Thread Tom Beecher
Yeah, cost to implement dst_as_path lookups far outweighs the usefulness IMO. If you really want that it's much better to get it via BMP. ( Same with communities and localpref in the extended gateway definition of sflow. ) Fundamentally I've always disagreed with how sFlow aggregates flow data wi

Re: AWS Web Application Firewall blocks ISP ranges?

2024-03-21 Thread Tom Beecher
Lots of people are encountering this, yes. You can try opening a case yourself, and hope it gets to someone with a clue. If you don't have a support contract with them, your chances are almost 0. If you do, your chances are slightly higher, but not by much. most likely they will just tell you to '

Re: Best TAC Services from Equipment Vendors

2024-03-11 Thread Tom Beecher
> > It may be a pain in the butt to get Cisco equipment, but their TAC is > sublime. If something is critical enough, and you push hard enough, Cisco > will move heaven and earth to solve your issue. > This was an amazing laugh on a Monday morning. Thanks! On Thu, Mar 7, 2024 at 2:47 PM Joel Esl

Re: [External] Fiber aggregators and such

2024-03-04 Thread Tom Beecher
> > I think there is > a very careful attitude around making sure not just anyone can get > this information, especially after the Nashville bombing on Christmas > Day 2020. > Keeping fiber location info close to the vest is nothing new. I'm not now sure why/how you feel like this connects to the

Re: Any info on AT&T Wireless Outage?

2024-03-01 Thread Tom Beecher
> > Erik Prince was on the PBD podcast saying he has a 70% chance in his head > it was China. > Why do we care what his (almost certainly uninformed) opinion is? On Thu, Feb 29, 2024 at 2:56 PM Javier J wrote: > Where did you see this? Erik Prince was on the PBD podcast saying he has a > 70% ch

Re: Why are paper LOAs still used?

2024-02-26 Thread Tom Beecher
Perhaps the provider only had a single person maintaining the tooling they used to interact with the IRR records, that person left/was laid off, and it broke. Perhaps they don't have anyone else that can make it work again, and they don't want to hire someone else, so they fell back to paper. Perh

Re: AWS WAF list

2024-02-20 Thread Tom Beecher
> > and it's affecting our customers' access to various ===>> websites.<<=== > On Tue, Feb 20, 2024 at 6:15 PM Pui Ee Luun Edylie wrote: > There must be a reason why the web site chooses the WAF list to block out > the victim? If so why not the victim to contact the website to request them > to

Re: IPv6 uptake

2024-02-19 Thread Tom Beecher
> > I'm not going to participate in the security conversation, but we do > absolutely need something to fill the role of NAT in v6. If it's already > there or not, I don't know. Use case: Joe's Taco Shop. Joe doesn't want a > down Internet connection to prevent transactions from completing, so he >

Re: IPv6 uptake (was: The Reg does 240/4)

2024-02-17 Thread Tom Beecher
> > Any given layer of security can be breached with expense and effort. > Breaching every layer of security at the same time is more challenging > than breaching any particular one of them. The use of NAT adds a layer > of security to the system that is not otherwise there. > > > Think of it like

Re: The Reg does 240/4

2024-02-15 Thread Tom Beecher
$/IPv4 address peaked in 2021, and has been declining since. On Thu, Feb 15, 2024 at 16:05 Brian Knight via NANOG wrote: > On 2024-02-15 13:10, Lyndon Nerenberg (VE7TFX/VE6BBM) wrote: > > I've said it before, and I'll say it again: > > > > The only thing stopping global IPv6 deployment is > >

Re: The Reg does 240/4

2024-02-15 Thread Tom Beecher
e we can > encourage and help people move towards IPv6 we can't force adoption through > prevention of access to IPv4. > > Regards, > Christopher Hawker > -- > *From:* Owen DeLong > *Sent:* Thursday, February 15, 2024 4:23 AM > *To:* Chris

Re: NANOG 90 Attendance?

2024-02-15 Thread Tom Beecher
> Maybe this should have gone to the members mailing list, but I couldn’t > find one. > > > memb...@nanog.org On Thu, Feb 15, 2024 at 10:31 AM Howard, Lee via NANOG wrote: > I’m jumping on an earlier part of the thread. > > > > Based on what I heard at the Members Meeting and several follow up

Re: The Reg does 240/4

2024-02-14 Thread Tom Beecher
> > All we can do is educate people on the importance of IPv6 uptake, we can > not force people to adopt it. > At this stage of the game, networks and products that don't support V6 aren't likely to do so unless there is a forcing function to make them do it. Meaning money. On Wed, Feb 14, 2024

Re: NANOG 90 Attendance?

2024-02-14 Thread Tom Beecher
None of the conversation was about COVID protocols. Lowered in person attendance because of *individual concerns about health risks* was mentioned. The conversation then went sideways into public health policy and definitions, which absolutely doesn't belong on the list. On Wed, Feb 14, 2024 at 7

Re: NANOG 90 Attendance?

2024-02-13 Thread Tom Beecher
n the current state of COVID, if it's referred to as 'pandemic' or 'endemic' , etc. Nor does that sort of convo really belong anywhere near this list. On Tue, Feb 13, 2024 at 7:58 PM Glen A. Pearce wrote: > On 11/02/2024 7:56 a.m., Tom Beecher wrote: > > Yup. Pos

Re: The Reg does 240/4

2024-02-13 Thread Tom Beecher
e thing I can guarantee is that will > never happen, if nothing is done. > > Let's not think about ourselves for a moment, and think about the > potential positive impact that this could bring. > > Regards, > Christopher Hawker > -- > *Fro

Re: The Reg does 240/4

2024-02-13 Thread Tom Beecher
> > PS: I know this because it will take 98 years of process before the > RIRs can start allocating it. > Intense optimism detected! On Tue, Feb 13, 2024 at 4:27 PM John Levine wrote: > It appears that Lyndon Nerenberg (VE7TFX/VE6BBM) said: > >And what are they going to do when 240/4 runs out?

Re: The Reg does 240/4

2024-02-13 Thread Tom Beecher
> > Now, we know there's definitely going to be some pushback on this. This > won't be easy to accomplish and it will take some time. It won't ever be 'accomplished' by trying to debate this in the media. On Tue, Feb 13, 2024 at 5:05 AM Christopher Hawker wrote: > Hello all, > > [Note: I have

Re: NANOG 90 Attendance?

2024-02-11 Thread Tom Beecher
Yup. Post pandemic, the unfortunate hotel situation, and a non-zero number of companies still have tight travel budgets. It's been slowly creeping back though. On Sun, Feb 11, 2024 at 8:44 AM Ryan Hamel wrote: > Mike, > > The numbers have not bounced back to pre-pandemic levels, and it doesn't

Re: If I announce 192.0.2.0/24, do I need a discard route? (Looking for a reference…)

2024-02-02 Thread Tom Beecher
> > > This sounded perfect, and I could beat my friend around the head with > it… but reading further reveals: > "Route aggregation and information reduction techniques (see > Section 9.2.2.1) may optionally be applied. > > Any local policy that results in routes being added to an Adj-RIB-Out > wi

Re: route: 0.0.0.0/32 in LEVEL3 IRR

2024-02-01 Thread Tom Beecher
ards. On Thu, Feb 1, 2024 at 2:21 AM Frank Habicht wrote: > On 01/02/2024 01:45, Tom Beecher wrote: > > Seems a bit dramatic. Companies all over the world have been using other > > people's public IPs internally for decades. I worked at a place 20 odd > > years ago that

Re: route: 0.0.0.0/32 in LEVEL3 IRR

2024-01-31 Thread Tom Beecher
> > Even though it is very risky to steal resources from an organization > that can deploy a black helicopter or a nuclear warhead over you > Seems a bit dramatic. Companies all over the world have been using other people's public IPs internally for decades. I worked at a place 20 odd years ago th

Re: SOVC - BGp RPKI

2024-01-31 Thread Tom Beecher
> > I see it mentioned in this doc: > > https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/15-s/irg-15-s-book/irg-origin-as.pdf You see SOVC mentioned, yes. But you don't see the word 'stale'. Please don't just paste what ChatGPT says. It's not an authoritative source.

Re: If I announce 192.0.2.0/24, do I need a discard route? (Looking for a reference…)

2024-01-31 Thread Tom Beecher
> > It that always true? I'd started off thinking that, but a friend of mine > (yes, the same one that started this argument) convinced me that > some forms of BGP summarization/aggregation don't always generate a "local" > route… > > I'd also thought that I'd seen this when redistributing an IGP

Re: Networks ignoring prepends?

2024-01-23 Thread Tom Beecher
> > Unless overridden, BGP takes -distance- into account where distance = > AS path length. > An AS_PATH length of 10 could be a physical distance of 1 mile. An AS_PATH length of 1 could be a physical distance of 1000 miles. BGP TE communities exist to provide signalling in the event that the st

Re: Networks ignoring prepends?

2024-01-23 Thread Tom Beecher
> > Because big operators think it reasonable to localpref distance routes > ahead of nearby ones so long as the distant routes arrive from > customers. I'll remember that the next time folks complain about the > size of the routing table. This one you did to yourselves. > That has absolutely noth

Re: Networks ignoring prepends?

2024-01-23 Thread Tom Beecher
> > Apparently there is a conflict between what you want and what 47787 wants. > As you both seem to be paying customers, you should probably ask 3356 to > resolve that instead of us random internet folks. > Calling 3356 and saying "I know your global routing policy is to prefer a customer learned

Re: Networks ignoring prepends?

2024-01-23 Thread Tom Beecher
> > I feel your pain Bill, but from a slightly different angle. For years the > large CDNs have been disregarding prepends. When a source AS disregards > BGP best path selection rules, it sets off a chain reaction of silliness > not attributable to the transit AS's. At the terminus of that chain

Re: Networks ignoring prepends?

2024-01-22 Thread Tom Beecher
> > As I already explained, neither the primary nor any of the backup > providers directly peer with Centurylink, thus have no communities for > controlling announcements to Centurylink. No, but they do have an option to not announce to 47787. https://docs.freerangecloud.com/en/bgp/communities

Re: Networks ignoring prepends?

2024-01-22 Thread Tom Beecher
> > I’d bet that 47787 is a paying century link customer. As such, despite the > ugliness of the path, CL probably local prefs everything advertised by them > higher than any non-paying link. I’m willing to bet 1299 is peered and not > paying CL. > It's almost as if you've done this before. :) Co

Re: "Hypothetical" Datacenter Overheating

2024-01-21 Thread Tom Beecher
disagree. On Sun, Jan 21, 2024 at 1:22 AM Jay R. Ashworth wrote: > ----- Original Message - > > From: "Tom Beecher" > > To: "Lamar Owen" > > Cc: nanog@nanog.org > > Sent: Wednesday, January 17, 2024 8:06:07 PM > > Subject: Re: "

Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block

2024-01-20 Thread Tom Beecher
> > Because people keep responding. > Doesn't really make any difference. Mr. Chen filed his first draft in Dec 2016. He finds a reason to talk about it on every mailing list and forum he can find, but doesn't spend any time engaging in the standards processes, other than renewing his draft every

Re: "Hypothetical" Datacenter Overheating

2024-01-18 Thread Tom Beecher
tix> > The Brothers WISP <http://www.thebrotherswisp.com/> > <https://www.facebook.com/thebrotherswisp> > <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg> > -- > *From: *"Tom Beecher" > *To: *"Mike Hammett"

Re: "Hypothetical" Datacenter Overheating

2024-01-18 Thread Tom Beecher
> > and none in the other two facilities you operate in that same building had > any failures. Quoting directly from their outage ticket updates : CH2 does not have chillers, cooling arrangement is DX CRACs manufactured by > another company. CH3 has Smart chillers but are water cooled not air co

Re: Shared cache servers on an island's IXP

2024-01-18 Thread Tom Beecher
Many CDNs have hardware options for self hosted caches. I think there would likely be concerns about <20G of connectivity to those caches though. With an incorrect setup, you could end up maxing out those links just with cache fill traffic itself. On Thu, Jan 18, 2024 at 6:54 AM Jérôme Nicolle w

Re: "Hypothetical" Datacenter Overheating

2024-01-17 Thread Tom Beecher
> > If these chillers are connected to BACnet or similar network, then I > wouldn't rule out the possibility of an attack. > Don't insinuate something like this without evidence. Completely unreasonable and inappropriate. On Wed, Jan 17, 2024 at 8:31 AM Lamar Owen wrote: > >This sort of mass fa

Re: Any clue as to when bgp.he.net will be back?

2024-01-16 Thread Tom Beecher
It only applies if you are purchasing their monitoring services. Not just to use the site for info. On Tue, Jan 16, 2024 at 5:04 PM scott via NANOG wrote: > > > On 1/16/24 2:44 PM, Ian Chilton wrote: > > > Not a direct answer to your question, but if you're not aware of it, > > https://bgp.tools

Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block

2024-01-16 Thread Tom Beecher
> > If "EzIP" is about using 240/4 as CGNAT space, let's call it what it is, > not rename something that already exists and attempt to claim it as a new > idea. > Yes he is essentially re-creating NAT/CGNAT, but in a worse way. If you ignore all the multitude of technical issues, if you grabbed a

Re: How threading works (was Re: Root Cause Re: 202401102221.AYC Re: Streamline The CG-NAT Re: 202401100645.AYC Re: IPv4 address block)

2024-01-14 Thread Tom Beecher
> > Gmail is therefore in violation of the RFC5822. It's quite clear how it > should work per the RFC appendix. > Well, no. Asterisks added for emphasis. This specification is intended as a definition of what message >content format is to be passed between systems. Though some message >

Re: Vint Cerf Re: Backward Compatibility Re: IPv4 address block

2024-01-13 Thread Tom Beecher
gional Area Networks) as "kites floating in > the air over an geographic area anchored by an IPv4 address based cord". > Although visually clear, it was too wordy. By using one concise word, > *overlay*, Vint eloquently classified the EzIP network in terminology > sense. It

Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block

2024-01-12 Thread Tom Beecher
<http://www.midwest-ix.com/> > <https://www.facebook.com/mdwestix> > <https://www.linkedin.com/company/midwest-internet-exchange> > <https://twitter.com/mdwestix> > The Brothers WISP <http://www.thebrotherswisp.com/> > <https://www.facebook.com/thebrothe

Re: Backward Compatibility Re: 202401100645.AYC Re: IPv4 address block

2024-01-12 Thread Tom Beecher
I go into my cave to finish the todo list for the week, and I come out to see Mr. Chen : - Telling Randy Bush he should "read some history" on IPv6 - Implying that Vint Cerf ever said anything about EzIP Fairly impressive sequence of self ownage. On Fri, Jan 12, 2024 at 5:46 PM Randy Bush wrote:

Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block

2024-01-12 Thread Tom Beecher
tions> > <https://twitter.com/ICSIL> > Midwest Internet Exchange <http://www.midwest-ix.com/> > <https://www.facebook.com/mdwestix> > <https://www.linkedin.com/company/midwest-internet-exchange> > <https://twitter.com/mdwestix> > The Brothers WISP <http://w

Re: Stealthy Overlay Network Re: 202401100645.AYC Re: IPv4 address block

2024-01-12 Thread Tom Beecher
> > How far are we from that, in reality? I don't have any intention on using > the space, but I would like to put some definition to this boogey man. It's unknowable really. Lots of network software works just fine today with it. Some don't. To my knowledge some NOS vendors have outright refuse

Re: Burn Rate? Re: 202401100645.AYC Re: IPv4 address block

2024-01-12 Thread Tom Beecher
Bear in mind that APNIC > policy was changed 1/2 way through to drop 103/8 delegations from a /22 to > a /23. Based on this, 65,536 x /23 delegations can be made to new members > and as Peter said, if post-exhaustion policy is applied to 240/4 it'll go > an extremely long way

Re: 202401100645.AYC Re: IPv4 address block

2024-01-11 Thread Tom Beecher
s 'squatting'. Today, nobody's usage of 240/4 internally impacts anyone else. On Thu, Jan 11, 2024 at 12:37 PM Dave Taht wrote: > On Thu, Jan 11, 2024 at 12:26 PM Tom Beecher wrote: > > > > Christopher- > > > >> Reclassifying this space, would add

Re: 202401100645.AYC Re: IPv4 address block

2024-01-11 Thread Tom Beecher
strong case was presented to convert this space. > > https://www.ietf.org/archive/id/draft-schoen-intarea-unicast-240-00.html > > Regards, > Christopher Hawker > > On Thu, 11 Jan 2024 at 20:40, Dave Taht wrote: > >> On Wed, Jan 10, 2024 at 11:06 AM Tom Beecher wrote

Re: 202401102221.AYC Re: Streamline The CG-NAT Re: 202401100645.AYC Re: IPv4 address block

2024-01-11 Thread Tom Beecher
y > routable IPv4 address. Then, the demand for IPv4 address is drastically > reduced. > > 4)In brief, the 240/4 is to substitute that of 100.64/10. So that the > need for the publicly routable IPv4 addresses is significantly reduced. > > Regards, > > > Abe (2024

Re: 202401100645.AYC Re: IPv4 address block

2024-01-10 Thread Tom Beecher
024 at 10:45 AM Michael Butler wrote: > On 1/10/24 10:12, Tom Beecher wrote: > > Karim- > > > > Please be cautious about this advice, and understand the full context. > > > > 240/4 is still classified as RESERVED space. While you would certainly > > be able

Re: 202401100645.AYC Re: IPv4 address block

2024-01-10 Thread Tom Beecher
Karim- Please be cautious about this advice, and understand the full context. 240/4 is still classified as RESERVED space. While you would certainly be able to use it on internal networks if your equipment supports it, you cannot use it as publicly routable space. There have been many proposals o

Re: Arista “IP-SLA” / Active Probing

2023-12-22 Thread Tom Beecher
> > I did some research on this and it seems like perhaps the on-boot event > handler launching a python daemon to do this active probing out each isp > circuit and then making config changes in response to transit failures > might be the best option available to us. > Pretty much, yes. They don't

Re: Interesting Ali Express web server behavior...

2023-12-10 Thread Tom Beecher
> > But why would AliExpress be redirecting to DDN space? Is this legitimate? > Ali hoping to get away with squatting, or something else? I've seen a large number of cases that a company was using someone else's non-RFC1918 space for some reason, and that was accidentally exposed via application

Re: Any comprehensive listing of where Google's IPs originate from?

2023-12-05 Thread Tom Beecher
> > i would expect that google announces the /16 at least from 'everywhere', > yes. > I see the specific /18s Drew asked about initially. Didn't check for the covering /16. On Tue, Dec 5, 2023 at 1:29 PM Christopher Morrow wrote: > On Tue, Dec 5, 2023

Re: Any comprehensive listing of where Google's IPs originate from?

2023-12-05 Thread Tom Beecher
>From my observations, all us-east-5 IPs are announced via transit and peering at all of my locations Chicago and east. On Mon, Dec 4, 2023 at 9:11 AM Drew Weaver wrote: > Hello, > > > > We are trying to reduce latency to a region in Google Cloud which we are > in the same city of. Latency is cu

Re: What are these Google IPs hammering on my DNS server?

2023-12-03 Thread Tom Beecher
172.253.X.X are Google DNS : https://www.gstatic.com/ipranges/publicdns.json 172.71.X.X are Cloudflare : https://www.cloudflare.com/ips-v4/# On Sun, Dec 3, 2023 at 1:49 PM John Levine wrote: > At contacts.abuse.net, I have a little stunt DNS server that provides > domain contact info, e.g.: >

Re: sigs wanted for a response to the fcc's NOI for faster broadband speeds

2023-12-01 Thread Tom Beecher
Trying to put technical requirements like this into law and public policy is an extremely terrible idea. This letter should never be sent. The regulatory agencies today don't have the manpower or expertise to adequately enforce the more generic broadband deployment rules. What fantasy world exists

Re: Advantages and disadvantages of legacy assets

2023-11-22 Thread Tom Beecher
> > Are you sure? The way I read it, that policy applies to -customer- > announced routes, not broad Internet routes received from peers and > transit. > You are reading it correctly. On Wed, Nov 22, 2023 at 3:15 PM William Herrin wrote: > On Wed, Nov 22, 2023 at 11:22 AM o...@delong.com wrote

Re: BGP-iSec: Improved Security of Internet Routing Against Post-ROV Attacks

2023-11-20 Thread Tom Beecher
Amir- I have to take some issue with one comment you made in response to Job. BGP-iSec, at this point, is just an academic study studying some new ideas > and evaluating their impact in specific configurations, under specific > assumptions etc.; hopefully, this may provide some help to the commun

Re: Out of ideas - Comcast issue BGP peering with Tata

2023-11-17 Thread Tom Beecher
> > Comcast has to be the one contacting them > This is the correct answer. It's pretty straight forward ; Comcast needs to get with Tata, say "hey, I'm announcing prefix FOO to you, your LGs don't look like you're accepting it. Can we figure out why?" On Fri, Nov 17, 2023 at 10:43 AM jim deleski

Re: Your Input Needed: Can ROA Replace LOA? ? Short Survey (7 mins)

2023-11-17 Thread Tom Beecher
> > Therefore, Cogent currently does not have and is not member of ARIN. It > refuses to sign contract with ARIN and currently Cogent is not bound by > this RUD rules and regulations. > > There is one downfall to not being ARIN member, Cogent cannot currently > issue ROAs or RPKIs. They only update

Re: Generally accepted BGP acceptance criteria?

2023-11-16 Thread Tom Beecher
> > I imagine there is a some sort of coalescing industry standard out there, > but so far I can’t find it. > There is not, and won't be for a long time, if ever. There isn't a one size fits all solution. On Thu, Nov 16, 2023 at 9:31 PM Tom Samplonius wrote: > > In the world of IRR and RPKI,

Re: Your Input Needed: Can ROA Replace LOA? – Short Survey (7 mins)

2023-11-16 Thread Tom Beecher
y as many to state it's a "primary use case", especially relative to #1 and #2 on your list. On Thu, Nov 16, 2023 at 11:18 AM Christopher Morrow wrote: > On Thu, Nov 16, 2023 at 10:22 AM Tom Beecher wrote: > >> > >> In the service provider industry, its prima

Re: Your Input Needed: Can ROA Replace LOA? – Short Survey (7 mins)

2023-11-16 Thread Tom Beecher
> > In the service provider industry, its primary use is for advertising > address resources (IPv4/v6 and ASN) Not really. On Thu, Nov 16, 2023 at 9:19 AM Christopher Hawker wrote: > Hello everyone, > > Aftab Siddiqui is currently exploring the possibility of using Route > Object Authorisation

Re: Strange IPSEC traffic

2023-11-14 Thread Tom Beecher
> > Last week somebody on the internet started a campaign to scan and perhaps > to exploit some zero day ipsec vulnerabilities. > I've seen traffic like this for the better part of at least the last 7 years, fairly consistently. It's definitely not something new. On Mon, Nov 13, 2023 at 12:42 PM

Re: AS8003 mysteries

2023-11-09 Thread Tom Beecher
Didn't think there was much confusion about it at this point. The DOD has the assignments for the space, they can announce it whenever they want, even if it's from a shell ASN. On Wed, Nov 8, 2023 at 4:52 PM Dave Taht wrote: > Anyone have an update as to where this effort, announcing qute a bit

Re: Charter DNS servers returning malware filtered IP addresses

2023-10-29 Thread Tom Beecher
> > DNS isn’t the right place to attack this, IMHO. > ... > I’ve seen plenty of situations where the filters were just plain wrong and > if the end user didn’t actively choose that filtration, the target site may > be victimized without anyone knowing where to go to complain. Not much different

Re: Pulling of Network Maps

2023-10-26 Thread Tom Beecher
> > If it's too hard for me to figure out where you are, you just plain won't > get the sale. My experience with maps over the last decade tells me that even most vendors don't actually know where they are. :) On Thu, Oct 26, 2023 at 12:18 PM Mike Hammett wrote: > Has anyone else noticed a tre

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-24 Thread Tom Beecher
overing /22, > which wouldn’t help in this case anyway. > > So I’m not sure why you think that’s a solution. > > Owen > > > On Oct 22, 2023, at 10:45, Tom Beecher wrote: > > Look again, Tom. This is an attack vector using a LESS specific route. The >> /22 gets disca

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Tom Beecher
> Homepage: https://sites.google.com/site/amirherzberg/home > `Applied Introduction to Cryptography' textbook and lectures: > https://sites.google.com/site/amirherzberg/cybersecurity > > > > > On Sun, Oct 22, 2023 at 1:50 PM Tom Beecher wrote: > >> Look again, Tom.

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Tom Beecher
the covering prefix as well isn't a good thing to do. On Sun, Oct 22, 2023 at 1:39 PM Owen DeLong wrote: > Look again, Tom. This is an attack vector using a LESS specific route. The > /22 gets discarded, but a covering /0-/21 would not. > > Owen > > On Oct 22, 2023, at 10:06,

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Tom Beecher
, 2023 at 1:24 PM William Herrin wrote: > On Sun, Oct 22, 2023 at 10:06 AM Tom Beecher wrote: > >> And is it your belief that this addresses the described attack vector? > >> AFAICT, it does not. > > > > In the mixed RPKI / non-RPKI environment of today's

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Tom Beecher
's internet, no it doesn't. This does not mean that RPKI is deficient, or the AS 0 ROA doesn't work as intended, as was stated. On Sun, Oct 22, 2023 at 12:57 PM William Herrin wrote: > On Sun, Oct 22, 2023 at 9:38 AM Tom Beecher wrote: > >> He's saying that so

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Tom Beecher
> > Let me ground it a bit: > > He's saying that someone could come along and advertise 0.0.0.0/1 and > 128.0.0.0/1 and by doing so they'd hijack every unrouted address block > regardless of the block's ROA. > > RPKI is unable to address this attack vector. > https://www.rfc-editor.org/rfc/rfc6483

Re: Congestion/latency-aware routing for MPLS?

2023-10-18 Thread Tom Beecher
> > I believe Jason's proposal is exactly what OP is looking for. > I would agree. On Wed, Oct 18, 2023 at 11:28 AM Saku Ytti wrote: > On Wed, 18 Oct 2023 at 17:39, Tom Beecher wrote: > > > Auto-bandwidth won't help here if the bandwidth reduction is 'sile

  1   2   3   4   5   6   7   >