Re: Backward Compatibility Re: 202401100645.AYC Re: IPv4 address block

2024-01-16 Thread Danny Messano via NANOG
f how some people will do anything to save $1 (a month) even if the tech is highly beneficial. Danny Messano On Jan 15, 2024 at 14:12 -0500, Jay Hennigan , wrote: > On 1/15/24 09:37, Abraham Y. Chen wrote: > > > 2)    Allow me to share with you an almost parallel event in the

The clean network in US

2020-10-09 Thread Danny Pinto via NANOG
really change Internet interconnection dynamics to 3Cs operators in US or adjustments in  EU or Asia also  ? How about sub sea capacity into the US. Probably there are many cables owned by consortium of Asian operators for many years ... ? Danny

Re: "Is BGP safe yet?" test

2020-04-22 Thread Danny McPherson
f prefixes received from peer-as to make ingress filtering more dynamic and move away prefix filters from the routers? Do you really want those things in soft-state and not with some giant operational buffer to absorb all the brokenness that's sure to arise? -danny

Re: "Is BGP safe yet?" test

2020-04-22 Thread Danny McPherson
etermining that to be done. Or a miscreant. [insert-least-favorite-rir] is now part of your attack surface. -danny

Re: CISA critical infrastructure letters

2020-03-25 Thread Danny McPherson
when necessary). Ideally, if applicable your folks have already established those relationships in the event that they need them. -danny On 2020-03-25 15:02, Matt Erculiani wrote: The letters are not to be confused with hall passes.;they don't even have an individual's name on it

Contact at ESPN?

2019-10-24 Thread Danny Meister
!  Danny Meister    Infrastructure Engineer    Atomic Data®  //  Safe. Simple. Smart.®  250 Marquette Avenue  Minneapolis, MN 55401  Main  //  612.466.2000  Direct  //  612.466.2071 

Re: CenturyLink/Level3 feedback

2019-06-05 Thread Danny Pinto via NANOG
corp culture Danny  On Tue, 04 Jun 2019 20:00:54 +0530 Mehmet Akcin wrote hi there,Just a general high-level question about Centurylink/Level3 post-merger, how is your overall experience with CenturyLink? if you could be sitting with the CEO of the company what is one thing you w

Re: BGP FlowSpec

2016-05-02 Thread Danny McPherson
7;s just a matter of where and what the management/control plane is. I agree with your intra-AS comment. -danny

Re: BGP FlowSpec

2016-05-02 Thread Danny McPherson
place for me to filter is at my ingress. Of course I'd rather have something akin to inter-domain pushback or FlowSpec, etc.. But you can't control how, or assume others will act on that. -danny

Re: BGP FlowSpec

2016-05-02 Thread Danny McPherson
ng traffic when necessary. Just like destination and source-based RTBH, FlowSpec is simply another evolution of automating forwarding path configuration, where NFV/SDN are the newest incarnation and can allows badness such as DDoS to be dropped implicitly rather than explicitly, even... -danny

Re: Routing Insecurity (Re: BGP in the Washington Post)

2015-06-03 Thread Danny McPherson
ly scare the heck out of them, the primitives of which surely extend to many of the luminaries quoted in those articles. YMMV, -danny

Re: ARIN / RIR Pragmatism (WAS: Re: RADB)

2014-10-25 Thread Danny McPherson
oints Sandy, I agree they need to be resolved. It's just that RPKI feels like a _really heavy solution to _that problem. That said, if that problem were solved nearly all of what I care about with regard to routing security (and inter-domain anti-spoofing) could be addressed. -danny

Re: ARIN / RIR Pragmatism (WAS: Re: RADB)

2014-10-25 Thread Danny McPherson
operations that exists and makes the Internet resilient. Thanks for that response, John. -danny

Re: ARIN / RIR Pragmatism (WAS: Re: RADB)

2014-10-25 Thread Danny McPherson
.. I actually think it'd have been a challenge to design something _more complicated than RPKI to address the problem space, but that's just me. -danny

Re: ARIN / RIR Pragmatism (WAS: Re: RADB)

2014-10-23 Thread Danny McPherson
is, and in-addr.arpa, and..) for a whole bunch of stuff just to keep the packets flowing then the height limit to do basic and useful things just became that much higher, and requires a lot more care and feeding then before RPKI (even absent all the architectural aspects of RPKI that are "interesting"). -danny

Re: ARIN / RIR Pragmatism (WAS: Re: RADB)

2014-10-23 Thread Danny McPherson
ARIN board did what they did with the RPA and I don't blame them -- it seemed well considered to me, but that's just me. Reminded of Taleb's "Fat Tony" quote [paraphrased]: If the pilot ain't on the plane, you probably don't want to get on it, -danny

ARIN / RIR Pragmatism (WAS: Re: RADB)

2014-10-23 Thread Danny McPherson
nd other externalities at play these days. Alas, -danny

Re: What do people use public suffix for?

2013-04-16 Thread Danny McPherson
dynamic structure in an outside medium is only going to cause problems down the road (e.g., especially with namespace diffusion from the likes of new gTLDs, etc..). While an unfortunate naming collision here (i.e., the "SOPA" RR), I think an approach such as [1] has some merit - but mu

Re: Cloudflare is down

2013-03-06 Thread danny
ctive complexity see [NormalAccidents], it's quite applicable to today's networks systems, methinks. -danny [NormalAccidents] Perrow, Charles, "Normal Accidents: Living with High-Risk Technologies", 1999.

Re: How are operators using IRR?

2013-01-17 Thread Danny McPherson
quot; here: <http://tools.ietf.org/html/draft-grow-irr-routing-policy-considerations-00> If folks have comments, additions, etc.. email authors or g...@ietf.org. -danny

Re: Real world sflow vs netflow?

2012-09-23 Thread Danny McPherson
c flows. This is _part of the point Roland was trying to make. -danny

Re: RPKI Pilot Participant Notice

2012-09-05 Thread Danny McPherson
t rely to much on the data for routing, and if they do and something gets hosed, ARIN's not at fault -- but I'll wait to read the actual agreement before speculating more. -danny

Re: rpki vs. secure dns?

2012-04-30 Thread Danny McPherson
add to the confusion in this area. None of these implementations support "RPKI" today. What they support is a new protocol for onboarding routing policy data (some call this a [VRP], essentially prefix,origin bindings) into soft state in a router. -danny [VRP] https://ripe64.ripe

Re: do not filter your customers

2012-02-24 Thread Danny McPherson
ed to read it. I don't, actually -- as I haven't presupposed that "BGPSEC" is the answer to all things routing security related, nor have I excluded it. I didn't realize it was unacceptable to acknowledge a problem exists without having solved already. I might have that backwards though. -danny

Re: do not filter your customers

2012-02-24 Thread Danny McPherson
omers and peers to use it, and even then this still happened - WTF was the point? This "leak" thing is a key vulnerability that simply can't be brushed aside - that's the crux of my frustration with the current effort. -danny

Re: do not filter your customers

2012-02-24 Thread Danny McPherson
r this incident a threat is beyond me, particularly when it happens by accident all the time. How we can justify putting all that BGPSEC and RPKI machinery in place and not address this "leak" issue somewhere in the mix is, err.., telling. Alas, I suspect we can all agree that exp

Re: do not filter your customers

2012-02-24 Thread Danny McPherson
ourced to do so, will eventually recognize what I'm calling "leaks" is part of the routing security problem. -danny

Re: do not filter your customers

2012-02-23 Thread Danny McPherson
r peers, and the peers went over > prefix limits and dropped bgp. Prefix limits are rather binary and indiscriminate, indeed. -danny

Re: [#135346] Unauthorized BGP Announcements (follow up to Hijacked Networks)

2012-01-31 Thread Danny McPherson
Internet number resource certification and origin validation sure would be nice here ;-) -danny On Jan 31, 2012, at 7:49 PM, Kelvin Williams wrote: > I hope none of you ever get hijacked by a spammer housed at Phoenix NAP. :) > > We're still not out of the woods, annou

Re: Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-20 Thread Danny McPherson
ould have traversed those ASes in the first place -- so we still need something somewhere to mitigate that threat. See this draft for more information: <http://tools.ietf.org/html/draft-foo-sidr-simple-leak-attack-bgpsec-no-help-01> -danny

Re: RIS raw data

2012-01-19 Thread Danny McPherson
han envisioned in mad max. I agree, it's important to analyze systemic cost/benefit and complexity analysis and new operational impacts various standards work is introducing. -danny

Re: F.ROOT-SERVERS.NET moved to Beijing?

2011-10-03 Thread Danny McPherson
;one extra query", and it's not simply about subsequent transaction attempts either - so conjecture aiming to marginalize the impact isn't particularly helpful. I.e., have that look, get back to us... :-) -danny

Re: F.ROOT-SERVERS.NET moved to Beijing?

2011-10-03 Thread Danny McPherson
place you can do this in the routing system, as I'm sure some will observe, but it seems an ideal location to me. -danny

Re: F.ROOT-SERVERS.NET moved to Beijing?

2011-10-03 Thread Danny McPherson
th that particular issue, rather than being captive to the [s]lowest common denominator of all involved parties, and dealing with additional non-determinsitic failures or exposure in the interim. Back to my earlier point, for *resilience* network layer integrity techniques and secure routing infrastructure are the only preventative controls here, and necessarily to augment DNSSEC's authentication and integrity functions at the application layer. Absent these, rapid detection enabling reactive controls that mitigate the issue are necessary. -danny

Re: F.ROOT-SERVERS.NET moved to Beijing?

2011-10-03 Thread Danny McPherson
ll that's going to fix this. In the interim, the ability to detect such incidents at some rate faster than the speed of mailing lists would be ideal. -danny

Re: Suspecious anycast prefixes

2011-05-05 Thread Danny McPherson
ansparency which can be employed to inform measurement and detection systems. IF / how an operator chooses to apply controls based on that information (e.g., drop a prefix originated from an unauthorized origin AS or leaked via a known bad path) that's certainly their prerogative. -danny

Re: Suspecious anycast prefixes

2011-05-05 Thread Danny McPherson
nts of the forwarding path you influence if you were an evildoer aiming to do such a thing. -danny

Re: Suspecious anycast prefixes

2011-05-05 Thread Danny McPherson
people can point at > and claim is a "best common practice" when it's neither best nor common. 'clueless people' wouldn't care which node they utilize, where it resides, or what other attributes might exist and be associated with it. Providing a discriminator in the control plane for the consumer of critical network services might well be of utility to some. -danny

Re: The state-level attack on the SSL CA security model

2011-03-24 Thread Danny O'Brien
case might have been a good idea I think contribute to the debate. Nonetheless, I'd strongly urge anyone not to assume that activists and journalists at physical risk in states like Iran assume that risk by using specific tools, or that major (if temporary) failures in the PKI structure d

Re: Regional AS model

2011-03-24 Thread Danny McPherson
ive to this discussion are provided in the title: "Unique Per-Node Origin ASNs for Globally Anycasted Services" -danny

39.0.0.0/8 on table already ?

2011-03-03 Thread Danny Pinto
Hi , I saw 39.0.0.0/8 from AS273 on global table till last week .Was it a genuine advertisement or some tests ongoing with 39.0.0.0/8 or any other previously reserved spaces . I am updating my bogons lists and want to know any experiments happening with previous reserved spaces. Thanks, Dan

Re: Internet blocked in Algeria?

2011-02-12 Thread Danny O'Brien
On Sun, Feb 13, 2011 at 5:01 AM, Joly MacFie wrote: > Any confirmation of internet blocking? > > http://bikyamasr.com/wordpress/?p=26849 > > As massive street demonstrations are met with widespread violence in > Algeria, the country is reporting that many Facebook accounts have been > deleted or

Re: Connectivity status for Egypt

2011-01-31 Thread Danny O'Brien
On Mon, Jan 31, 2011 at 2:14 PM, Marshall Eubanks wrote: > As an update, BGP for Noor.net has been withdrawn. Even the Egyptian stock > exchange - egyptse.com - now appears to be off the Internet. > > Yep, Noor is now down. Those on the ground with Noor DSL in Cairo contacted their front line sup

Re: Connectivity status for Egypt

2011-01-27 Thread Danny O'Brien
On Thu, Jan 27, 2011 at 6:07 PM, Roy wrote: > On 1/27/2011 3:47 PM, Danny O'Brien wrote: > >> Around 2236 UCT, we lost all Internet connectivity with our contacts in >> Egypt, and I'm hearing reports of (in declining order of confirmability): >> >>

Connectivity status for Egypt

2011-01-27 Thread Danny O'Brien
cense, there is some very early work to provide emergency connectivity. Info at: http://pastebin.com/fHHBqZ7Q ) Thank you, -- dobr...@cpj.org Danny O'Brien, Committee to Protect Journalists gpg key: http://www.spesh.com/danny/crypto/dannyobrien-key20091106.txt

Re: [arin-announce] ARIN Resource Certification Update

2011-01-24 Thread Danny McPherson
;t have an operational RPKI system, we do have an operational DNS one. It's most certainly NOT a bike shed discussion - at least with respect to how I'd configure my routers. I suspect I've sufficiently chummed the waters, I'll kick back and absorb all the reasons this is a whack idea :) -danny

Re: [arin-announce] ARIN Resource Certification Update

2011-01-24 Thread Danny McPherson
number resource certification - are you suggesting otherwise? > if the latter, then you have the problem that the dns trust model is not > congruent with the routing and address trust model. That could be easily fixed with trivial tweaks and transitive trust/ delegation graphs that are, I suspect. -danny

Re: [arin-announce] ARIN Resource Certification Update

2011-01-24 Thread Danny McPherson
thought experiment, how would you see this working? New prefix-based RRs? And perhaps even a new .arpa or in-addr.arpa subdomain, the draft Randy referenced even discussed the latter, IIRC. -danny

Re: [arin-announce] ARIN Resource Certification Update

2011-01-24 Thread Danny McPherson
#x27;t like the notion of deploying a brand new system with data that at the end of the day is going to look an awful lot like the existing in-addr.arpa delegation system that's deployed, and introduce new hierarchical shared dependencies that don't exist today. Keep it simple? -danny

Re: [arin-announce] ARIN Resource Certification Update

2011-01-24 Thread Danny McPherson
e) with RPKI at all. -danny

Re: [arin-announce] ARIN Resource Certification Update

2011-01-24 Thread Danny McPherson
ning to wonder why, with work like DANE and certificates in DNS in the IETF, we need an RPKI and new hierarchical shared dependency system at all and can't just place ROAs in in-addr.arpa zone files that are DNSSEC-enabled. --but very happy we have some progress for Internet number resource certification. -danny

Re: Using crypto auth for detecting corrupted IGP packets?

2010-09-30 Thread Danny McPherson
Coincidentally, it's also why logging LSPs that trigger such errors is important, whether you ignore them or propagate them. -danny

Re: Standard for BGP community lists

2010-07-20 Thread Danny McPherson
s IETF working groups, from IDR and GROW to OPSEC and L3VPN, for those interested in having a gander... -danny

Re: Rate Limiting on Cisco Router

2010-07-08 Thread Danny McPherson
cation with critical business applications first via LAN-side rate-shaping functions - or AUPs, or -danny

Re: U.S. Plans Cyber Shield for Utilities, Companies

2010-07-08 Thread Danny McPherson
t's more useful and commonly employed when intermediate facility failures happen - prioritized regrooming of critical services is sometimes even automated, and often results in, err.. less critical services being booted until full restoration has occurred. -danny

Re: BGP and convergence time

2010-05-12 Thread Danny McPherson
alives such that the probability of getting one through in times of instability rise. In particular, congestion incurred outside of BGP, as update messages themselves will serve as implicit keepalives, and with the amount of churn in BGP, empty updates (keepalives) are rare for most speakers with a global BGP view. -danny

Re: Securing the BGP or controlling it?

2010-05-11 Thread Danny McPherson
ta, we understand the vulnerability and the risk (probability of a threat being used). Put that in your risk management equation and consider what assets are most vulnerable to your organization - I'd venture it's something to do with network, and if routing ain't working, network ain't working... -danny

Re: Securing the BGP or controlling it?

2010-05-10 Thread Danny McPherson
t more symptoms of the same underlying problem, no? And the "i root" incident was plausibly a hybrid of error and intercept, so there's a nice hefty gray area there as well. I suspect no one missed that.. -danny

Re: Securing the BGP or controlling it?

2010-05-10 Thread Danny McPherson
, and then some global inputs. This basically helps people to make more informed decisions, methinks. -danny

Re: Securing the BGP or controlling it?

2010-05-10 Thread Danny McPherson
client software. At least irrtoolset compiles these > days, but its front-end is very primitive. rpsltool provides some really > nice templating functionality, but doesn't implement large sections of the > rpsl standards. Agreed, we need to do work here. -danny

Re: Securing the BGP or controlling it?

2010-05-10 Thread Danny McPherson
ery quickly" then we're operating on different timescales. > My gut instinct tells me that secure routing and the rpki venture well into > the realm of negative returns. I believe 'sucks less' falls into the realm of positive, so here we disagree. -danny

Re: BGP hijack from 23724 -> 4134 China?

2010-04-08 Thread Danny McPherson
filters for reasons outlined here and elsewhere many times before - and bogon addresses theoretically don't have live clients and servers folks might be legitimately be transacting with. -danny

Re: BGP hijack from 23724 -> 4134 China?

2010-04-08 Thread Danny McPherson
utting a bandaid on a headache - it's not going to do much good in reality, and likely cause more harm than good in properly secured networks - but it might make some folks feel a little better. -danny

Re: China prefix hijack

2010-04-08 Thread Danny McPherson
broken the current "routing by rumor" model continues to be. -danny

Re: BGP Update Report

2010-03-30 Thread Danny McPherson
ch in their operating environment - they can have considerable impact. -danny

Re: BGP Update Report

2010-03-28 Thread Danny McPherson
udied and understand why this occurs, the issue is that implementation optimizations seem to always win out today over systemic state effects (i.e., that "be conservative in what you send" thing doesn't seem to apply in practice, unfortunately). -danny

Re: [Fwd: [members-discuss] [ncc-announce] RIPE NCC Position On The ITU IPv6 Group]

2010-02-26 Thread Danny McPherson
more robust IP fabric would evolve to be more resilient and robust from national Internet registry allocation models or the Internet routing system rearchitecting that's sure to follow. Of course, if the ITU-T is serious about this, they should probably be asking for a good chunk of 32-bit ASNs as well, but that's a bit more difficult to do under the auspices of liberating IPv6. -danny

DURZ published in root - you ready?

2010-01-24 Thread Danny McPherson
e not signing anything - do note that 'systemic' is the operative word above, as this will impact you, whether you make any explicit changes in your environment or not. G'luck, -danny

Re: 2009 Worldwide Infrastructure Security Report available for download.

2010-01-21 Thread Danny McPherson
eally like to think people aren't > opting not to use flow-based tools in favor or receiving customer calls :( Yep, I think this is simply an artifact of a larger respondent pool size, with many smaller respondents being represented. -danny

Re: 2009 Worldwide Infrastructure Security Report available for download.

2010-01-21 Thread Danny McPherson
ur cocnern.. Thanks Pekka (and several others) for pointing this out. -danny

Re: news from Google

2009-12-06 Thread Danny McPherson
and everyone else) decide that _overriding application-level DNS settings (e.g., for Chrome) are perfectly reasonable -- not to mention the value they find in operation of DNS infrastructure from a data mining (e.g., NXDOMAIN data == marketing intelligence/$$) that many other folks have long ago realized... -danny

OT: 2009 Infrastructure Security Survey

2009-09-04 Thread Danny McPherson
ttp://www.arbornetworks.com/report> Thanks in advance for your participation! -danny

Re: Multi-homed clients and BGP timers

2009-05-25 Thread Danny McPherson
#x27;t the underlying TCP retry sooner than that? I suspect that given update messages serve as implicit keepalives, it's _extremely rare that an actual keepalive message is needed in global routing environments. -danny

Re: Multi-homed clients and BGP timers

2009-05-22 Thread Danny McPherson
effects with these as well.. - if I need to down core2, what is the quickest and easiest way to ensure that all gear connected to the cores will *quickly* switch to preferring core1? Use your IGP mechanisms akin to IS-IS overload bit or OSPF stub router (max metric) advertisement. -danny

Re: Pseudowire Problem

2009-05-22 Thread Danny McPherson
tf.org/html.charters/pwe3-charter.html> HTH, -danny

Re: Great outage of 1997 - Does anyone recall?

2009-02-22 Thread Danny McPherson
nline-kenya-latest-internet-routing-insecurity-casuality/ > -danny

Re: massive routes hijack at AS48400, up to 6000 AS affected?

2009-01-24 Thread Danny McPherson
rse look I've already had when I get some time. I suspect others will be looking as well. -danny

Re: Are we really this helpless? (Re: isprime DOS in progress)

2009-01-23 Thread Danny McPherson
guments about infrastructure support, resources, tools, etc.. I consider those argument no longer valid and operators who don't implement ingress BCP 38 style filtering remiss. -danny

Re: Are we really this helpless? (Re: isprime DOS in progress)

2009-01-23 Thread Danny McPherson
mitigation mechanism on all customer ingress interfaces (note: uRPF *loose* mode no-fixie these attacks) - as you should have had in the first place such that you didn't have to trace those spoof packets step-by-step back through your network. No more excuses, people.. -danny

Re: Managing CE eBGP details & common/accepted CE-facing BGP practices

2008-12-21 Thread Danny Thomas
s with rancid is that the code makes it hard to do other things, e.g. compare the active and standby configs in our 6500s I'd also like to add a feature that recognizes the significant blocks in a config and store in a database so you can do queries like "when was vlan777 modified" Danny

Re: What is the most standard subnet length on internet

2008-12-20 Thread Danny McPherson
nd Aggregation Strategy <http://tools.ietf.org/html/rfc1519> Network Renumbering Overview <http://tools.ietf.org/html/rfc2071> A Framework for Inter-Domain Route Aggregation <http://tools.ietf.org/html/rfc2519> HTH, -danny

Re: an over-the-top data center

2008-12-01 Thread Danny McPherson
oted, some have professed that adapting old ships into data centers would provide eco-friendly secure data center solutions. I wonder if "pirates" were listed anywhere in their business plan... -danny

Re: Prefix Hijack Tool Comaprision

2008-11-13 Thread Danny McPherson
ikely propagate much wider - and be detected much quicker. -danny

Re: The DDOS problem & security BOF: Am i mistaken?

2008-10-15 Thread Danny McPherson
erate if you'd like, but to address the question in the subject line directly - "Am I mistaken", I believe yes. Also, please don't confuse discussion of what happened at beer n gear with what happened at the BOF. -danny

Re: only WV FIBER now peering with Atrivo / Intercage

2008-09-07 Thread Danny McPherson
16.255.184.0/21 - 26769,19151 216.255.184.0/22 - 19151 216.255.188.0/22 - 19151 As for which of these prefixes seem to be associated with alleged nefarious activities, I'll leave that as an exercise for the operator. -danny

Re: Revealed: The Internet's well known BGP behavior

2008-08-28 Thread Danny McPherson
leap from RPKI directly into a secure inter-domain routing protocol. -danny

Re: Is it time to abandon bogon prefix filters?

2008-08-18 Thread Danny McPherson
istence of the source as part of the attack vector (e.g., DNS cache poisoning, BGP TCP RST attacks, DNS reflective amplification attacks, etc..), and as a result, loose mode gives folks a false sense of protection/action. -danny

Re: Public shaming list for ISPs announcing other ISPs IP space by mis take

2008-08-14 Thread Danny McPherson
is is obvious -- the entire PKI effort has been stalled (w.r.t. authority) because of this particular issue. Any thoughts on that? See Randy et al's presentation here: <http://www.nanog.org/mtg-0610/bush.html> In short, the latter, which is precisely DRC's point. -danny

Re: Public shaming list for ISPs announcing other ISPs IP space by mistake

2008-08-14 Thread Danny McPherson
paying attention to this. -danny

Re: Is it time to abandon bogon prefix filters?

2008-08-14 Thread Danny McPherson
ual BCP 38/uRPF numbers are likely lower, and you're more clueful if you complete the survey :-) -danny - Self-classified respondent network type (approaching 50 responses): Tier 1: 13.33% Tier 2: 28.89% Pure Content Network: 11.11% Hosting Provider: 8.89% Education or Academic Network: 13.33%

Re: Is it time to abandon bogon prefix filters?

2008-08-14 Thread Danny McPherson
rate-based DDoS attacks) -danny --- General Statistics total_days 631 total_attacks 1137265 avg_attacks_day 1802 avg_collectors_day 47 avg_attacks_collector_day 38 total_good_attacks 727410 63.96% --- Bogon Summary bogon block attacks % of attacks 0.0.0.0/7 65

Re: Public shaming list for ISPs announcing other ISPs IP space bymistake

2008-08-14 Thread Danny McPherson
A sneak-peek at some (NOT FINAL) relevant data points from the *ongoing* Infrastructure Security Survey related to this topic (see below for participation information, if so inclined). Draw your own conclusions, we'll make ours known in the final report. -danny --- Self classified respo

Re: Public shaming list for ISPs announcing other ISPs IP space bymistake

2008-08-14 Thread Danny McPherson
m from lesser networks. Tragedy of the commons... -danny

Re: Public shaming list for ISPs announcing other ISPs IP space by mistake

2008-08-14 Thread Danny McPherson
e route is learned via some other location and it's bypassed your perimiter security and infiltrated your BGP. I agree, how many of you folks that use IRRs have ever deleted an IRR object? Heck, some ISPs even add them based on existence of advertised routes. -danny

Re: Public shaming list for ISPs announcing other ISPs IP space by mistake

2008-08-14 Thread Danny McPherson
o be clear: IANA and RIRs allocate or assign address space today, they don't control any routing on the Internet (and their own internal ASNs and IPs don't count). -danny

[OT] 2008 Infrastructure Security Survey

2008-07-24 Thread Danny McPherson
y) identifiable information will be shared in any manner. The 2007 edition of the survey is available here: <http://www.tcb.net/wisp07.pdf> Or on the Arbor web site (reg required): <http://www.arbornetworks.com/report> Thanks in advance for your participation! -danny

APNIC dns glitch ?

2008-06-23 Thread Danny Thomas
significantly impact reverse dns lookups as I think the dns is spread across other RIR's seems there was a different type of issue in May http://www.bauani.org/thinkings/2008/05/issue-with-apnic-dns-nameservers.html Danny Thomas # dig @I.GTLD-SERVERS.net apnic.net +norec ; <<>&g

ISP Security BOF: NANOG 43

2008-05-31 Thread Danny McPherson
Folks, Here's the agenda for the ISP security BOF tomorrow afternoon. There's still some space left on the agenda so if there's something you'd like to discuss (or hear someone else discuss) drop Stefan and I an email. Thanks, see you in Brooklyn! -danny & Stefan --

Re: YouTube IP Hijacking

2008-02-26 Thread Danny McPherson
ilable and accurate routing system. IMO, the onus is on the operators to step up... -danny