Did anyone else experience a Level 3 outage in the last couple of days? Seems like we've been affected with quite a few VPNV4 outages (one that lasted for upto 9 hrs) and didn't get resolved until they rebuilt their vpnv4 address family on their PE router(s)?
On Thu, Mar 26, 2015 at 8:00 AM, <nanog-requ...@nanog.org> wrote: > Send NANOG mailing list submissions to > nanog@nanog.org > > To subscribe or unsubscribe via the World Wide Web, visit > http://mailman.nanog.org/mailman/listinfo/nanog > or, via email, send a message with subject or body 'help' to > nanog-requ...@nanog.org > > You can reach the person managing the list at > nanog-ow...@nanog.org > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of NANOG digest..." > > > Today's Topics: > > 1. godaddy contact (Tim) > 2. Frontier: Blocking port 22 because of illegal files? > (Aaron C. de Bruyn) > 3. Re: Frontier: Blocking port 22 because of illegal files? > (Eygene Ryabinkin) > 4. Re: Frontier: Blocking port 22 because of illegal files? > (Jon Lewis) > 5. Re: Frontier: Blocking port 22 because of illegal files? > (Stephen Satchell) > 6. Re: Frontier: Blocking port 22 because of illegal files? > (Seth Mos) > 7. booster to gain distance above 60km (Rodrigo Augusto) > 8. Re: Frontier: Blocking port 22 because of illegal files? > (Jens Link) > 9. Prefix hijack by INDOSAT AS4795 / AS4761 (Randy) > 10. Re: Frontier: Blocking port 22 because of illegal files? > (Livingood, Jason) > 11. Re: Prefix hijack by INDOSAT AS4795 / AS4761 (Christopher Morrow) > 12. Re: Frontier: Blocking port 22 because of illegal files? > (Jeff Richmond) > 13. Re: Frontier: Blocking port 22 because of illegal files? > (Daniel Corbe) > 14. Re: Prefix hijack by INDOSAT AS4795 / AS4761 (Randy) > 15. RE: Prefix hijack by INDOSAT AS4795 / AS4761 (Peter Rocca) > 16. Re: Prefix hijack by INDOSAT AS4795 / AS4761 (Christopher Morrow) > 17. Re: Prefix hijack by INDOSAT AS4795 / AS4761 (Christopher Morrow) > 18. Re: Prefix hijack by INDOSAT AS4795 / AS4761 (Randy) > 19. Re: Prefix hijack by INDOSAT AS4795 / AS4761 (Pierre Emeriaud) > 20. Re: Prefix hijack by INDOSAT AS4795 / AS4761 (Paul S.) > 21. Re: Prefix hijack by INDOSAT AS4795 / AS4761 (Chuck Anderson) > 22. Re: Prefix hijack by INDOSAT AS4795 / AS4761 (Christian Teuschel) > 23. Re: Prefix hijack by INDOSAT AS4795 / AS4761 (Andree Toonk) > 24. RE: Prefix hijack by INDOSAT AS4795 / AS4761 (Peter Rocca) > 25. Charter Engineer (Shawn L) > 26. RE: More specifics from AS18978 [was: Prefix hijack by > INDOSAT AS4795 / AS4761] (Randy) > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Wed, 25 Mar 2015 16:41:50 -0600 > From: Tim <tim...@progressivemarketingnetwork.com> > To: nanog@nanog.org > Subject: godaddy contact > Message-ID: <551339ae.8010...@progressivemarketingnetwork.com> > Content-Type: text/plain; charset=utf-8 > > Anyone from godaddy on here or have contact details for them? We are > having a routing issue to them. > > > > ------------------------------ > > Message: 2 > Date: Wed, 25 Mar 2015 19:31:35 -0700 > From: "Aaron C. de Bruyn" <aa...@heyaaron.com> > To: NANOG mailing list <nanog@nanog.org> > Subject: Frontier: Blocking port 22 because of illegal files? > Message-ID: > <CAEE+rGqimJYAfgmzm9AJ72+gcmJxfZLM7n4Rf03vynxKN= > q...@mail.gmail.com> > Content-Type: text/plain; charset=UTF-8 > > I've had a handful of clients contact me over the last week with > trouble using SCP (usually WinSCP) to manage their website content on > my servers. Either they get timeout messages from WinSCP or a message > saying they should switch to SFTP. > > After getting a few helpful users on the phone to run some quick > tests, we found port 22 was blocked. > > When my customers contacted Frontier, they were told that port 22 was > blocked because it is used to transfer illegal files. > > I called them, and got the same ridiculous excuse. > > Just a friendly heads-up to anyone from Frontier who might be > listening, I have a few additional ports you may wish to block: > > 80 - Allows users to use Google to search for illegal files > 443 - Allows users to use Google to search for illegal files in a secure > manner > 69 - Allows users to trivially transfer illegal files > 3389 - Allows users to connect to unlicensed Windows machines > 179 - Allows users to exchange routes to illegal file shares > 53 - Allows people to look up illegal names > > -A > > > ------------------------------ > > Message: 3 > Date: Thu, 26 Mar 2015 07:21:45 +0300 > From: Eygene Ryabinkin <rea+na...@grid.kiae.ru> > To: "Aaron C. de Bruyn" <aa...@heyaaron.com> > Cc: NANOG mailing list <nanog@nanog.org> > Subject: Re: Frontier: Blocking port 22 because of illegal files? > Message-ID: <nwCOvNPJTWOEp6pB7jt97dzYZ/0@xD7c2HZfPDzIruDUr3Qm9QhN1kk> > Content-Type: text/plain; charset=us-ascii > > Wed, Mar 25, 2015 at 07:31:35PM -0700, Aaron C. de Bruyn wrote: > > Just a friendly heads-up to anyone from Frontier who might be > > listening, I have a few additional ports you may wish to block: > > > > 80 - Allows users to use Google to search for illegal files > > 443 - Allows users to use Google to search for illegal files in a secure > manner > > 69 - Allows users to trivially transfer illegal files > > 3389 - Allows users to connect to unlicensed Windows machines > > 179 - Allows users to exchange routes to illegal file shares > > 53 - Allows people to look up illegal names > > Can't help to add that there are > > - port 21 that allow users to give commands to examine > the existence and initiate transfers of illegal files; > > - ports 1025 - 65535 that allow users to create data streams > to actually transfer illegal files in an (oh my) passive mode. > > ;) > -- > Eygene Ryabinkin, National Research Centre "Kurchatov Institute" > > Always code as if the guy who ends up maintaining your code will be > a violent psychopath who knows where you live. > > > ------------------------------ > > Message: 4 > Date: Thu, 26 Mar 2015 00:56:21 -0400 (EDT) > From: Jon Lewis <jle...@lewis.org> > To: "Aaron C. de Bruyn" <aa...@heyaaron.com> > Cc: NANOG mailing list <nanog@nanog.org> > Subject: Re: Frontier: Blocking port 22 because of illegal files? > Message-ID: <pine.lnx.4.61.1503260052100.10...@soloth.lewis.org> > Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed > > On Wed, 25 Mar 2015, Aaron C. de Bruyn wrote: > > > I've had a handful of clients contact me over the last week with > > trouble using SCP (usually WinSCP) to manage their website content on > > my servers. Either they get timeout messages from WinSCP or a message > > saying they should switch to SFTP. > > > > After getting a few helpful users on the phone to run some quick > > tests, we found port 22 was blocked. > > > > When my customers contacted Frontier, they were told that port 22 was > > blocked because it is used to transfer illegal files. > > > > I called them, and got the same ridiculous excuse. > > > > Just a friendly heads-up to anyone from Frontier who might be > > listening, I have a few additional ports you may wish to block: > > I wonder if their support is just confused, and Frontier is really > blocking outbound tcp/22 to stop complaints generated by infected > customers with sshd scanners. After all, most of their customers probably > don't know what SSH is. > > ---------------------------------------------------------------------- > Jon Lewis, MCP :) | I route > | therefore you are > _________ http://www.lewis.org/~jlewis/pgp for PGP public key_________ > > > ------------------------------ > > Message: 5 > Date: Thu, 26 Mar 2015 04:24:38 -0700 > From: Stephen Satchell <l...@satchell.net> > To: nanog@nanog.org > Subject: Re: Frontier: Blocking port 22 because of illegal files? > Message-ID: <5513ec76.5060...@satchell.net> > Content-Type: text/plain; charset=UTF-8 > > On 03/25/2015 07:31 PM, Aaron C. de Bruyn wrote: > > After getting a few helpful users on the phone to run some quick > > tests, we found port 22 was blocked. > > It's been a while since I did this, but you can select an additional > port to accept SSH connections. A Google search indicates you can > specify multiple ports in OpenSSH. Picking the right port to use is an > exercise, though, that will depend on what other services you are > running on your server. > > People with sane ISPs can use the standard port. People on Frontier can > use the alternate port, which shouldn't be firewalled by the provider. > If Frontier is running a mostly-closed firewall configuration, then you > have to be damn careful about the port you select. > > > > > ------------------------------ > > Message: 6 > Date: Thu, 26 Mar 2015 12:56:31 +0100 > From: Seth Mos <seth....@dds.nl> > To: nanog@nanog.org > Subject: Re: Frontier: Blocking port 22 because of illegal files? > Message-ID: <5513f3ef.2080...@dds.nl> > Content-Type: text/plain; charset=utf-8 > > Stephen Satchell schreef op 26-3-2015 om 12:24: > > On 03/25/2015 07:31 PM, Aaron C. de Bruyn wrote: > >> After getting a few helpful users on the phone to run some quick > >> tests, we found port 22 was blocked. > > > > It's been a while since I did this, but you can select an additional > > port to accept SSH connections. A Google search indicates you can > > specify multiple ports in OpenSSH. Picking the right port to use is an > > exercise, though, that will depend on what other services you are > > running on your server. > > > > People with sane ISPs can use the standard port. People on Frontier can > > use the alternate port, which shouldn't be firewalled by the provider. > > If Frontier is running a mostly-closed firewall configuration, then you > > have to be damn careful about the port you select. > > Ahem, just to clarify, he is not talking about inbound on the Frontier > connection, but outbound *from* the Frontier network. > > Akin to the "Let's block outbound port 25 (smtp)". > > This is just a really really bad idea m'kay. > > Cheers > > > > > ------------------------------ > > Message: 7 > Date: Thu, 26 Mar 2015 09:07:39 -0300 > From: Rodrigo Augusto <rodr...@1telecom.com.br> > To: nanog <nanog@nanog.org> > Subject: booster to gain distance above 60km > Message-ID: <d1397cdb.35c0b%rodr...@1telecom.com.br> > Content-Type: text/plain; charset="ISO-8859-1" > > Hi folksŠ we have a point and have a 63km between point A to point BŠ. We > have a sigle fiber ( only one fiber) and use a fiberstore sfp+ 10GB dibi > 1270/1330 module to connect these sites. All attenuation are okŠI don¹t > have > any trouble on fiber Š. > I have received this signal on my sfp+: > > Receiver signal average optical power : 0.0026 mW / -25.85 dBm > > > Does anyone know if have some possible to amplifier this scenario to get > more 7db ? Is it possible to put any booster or any way to solve this? > I think to use a optical PreAmlifierŠbut I don¹t know if is possible > because > my scenario have just one fiberŠor, use a ROPA- remote optical pumping > amplifier) because I have 63kmŠ > Does anyone have some idea? > > Rodrigo Augusto > Gestor de T.I. Grupo Connectoway > http://www.connectoway.com.br <http://www.connectoway.com.br/> > http://www.1telecom.com.br <http://www.1telecom.com.br/> > * rodr...@connectoway.com.br <mailto:rodr...@connectoway.com.br> > ( (81) 3497-6060 > ( (81) 8184-3646 > ( INOC-DBA 52965*100 > > > > > ------------------------------ > > Message: 8 > Date: Thu, 26 Mar 2015 13:10:35 +0100 > From: Jens Link <li...@quux.de> > To: nanog@nanog.org > Subject: Re: Frontier: Blocking port 22 because of illegal files? > Message-ID: <87mw30hscj....@pc8.berlin.quux.de> > Content-Type: text/plain > > Stephen Satchell <l...@satchell.net> writes: > > > It's been a while since I did this, but you can select an additional > > port to accept SSH connections. > > That's easy: > > jens@screen:~$ grep Port /etc/ssh/sshd_config > Port 22 > Port 443 > > > Picking the right port to use is an exercise, though, that will depend > > on what other services you are running on your server. > > I always have at least one sshd listening on port 443. For all the > hotel, coffee house, customer networks blocking ssh. > > You can even multiplex and run ssh and ssl on the same port: > > http://www.rutschle.net/tech/sslh.shtml > > Jens > -- > > ---------------------------------------------------------------------------- > | Foelderichstr. 40 | 13595 Berlin, Germany | +49-151-18721264 > | > | http://blog.quux.de | jabber: jensl...@jabber.quux.de | > --------------- | > > ---------------------------------------------------------------------------- > > > ------------------------------ > > Message: 9 > Date: Thu, 26 Mar 2015 07:08:20 -0700 > From: Randy <a...@djlab.com> > To: nanog@nanog.org > Subject: Prefix hijack by INDOSAT AS4795 / AS4761 > Message-ID: <b8636bc52cdc7f7f595ff96c7b078...@mailbox.fastserv.com> > Content-Type: text/plain; charset=US-ASCII; format=flowed > > On Thursday March 26th 2015 at 12:18 UTC (and on-going) we are seeing > more specifics on one of our prefixes. Anyone else seeing similar or > is it just us? > > 198.98.180.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > 198.98.182.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > > -- > Randy > > > ------------------------------ > > Message: 10 > Date: Thu, 26 Mar 2015 14:09:52 +0000 > From: "Livingood, Jason" <jason_living...@cable.comcast.com> > To: "Aaron C. de Bruyn" <aa...@heyaaron.com>, NANOG mailing list > <nanog@nanog.org> > Subject: Re: Frontier: Blocking port 22 because of illegal files? > Message-ID: <d1398b6b.fde9e%jason_living...@cable.comcast.com> > Content-Type: text/plain; charset="Windows-1252" > > ISPs are generally expected to disclose any port blocking. A quick Google > search shows this is Frontier’s list: > http://www.frontierhelp.com/faq.cfm?qstid=277 > > On 3/25/15, 10:31 PM, "Aaron C. de Bruyn" <aa...@heyaaron.com<mailto: > aa...@heyaaron.com>> wrote: > > I've had a handful of clients contact me over the last week with > trouble using SCP (usually WinSCP) to manage their website content on > my servers. Either they get timeout messages from WinSCP or a message > saying they should switch to SFTP. > > After getting a few helpful users on the phone to run some quick > tests, we found port 22 was blocked. > > When my customers contacted Frontier, they were told that port 22 was > blocked because it is used to transfer illegal files. > > I called them, and got the same ridiculous excuse. > > Just a friendly heads-up to anyone from Frontier who might be > listening, I have a few additional ports you may wish to block: > > 80 - Allows users to use Google to search for illegal files > 443 - Allows users to use Google to search for illegal files in a secure > manner > 69 - Allows users to trivially transfer illegal files > 3389 - Allows users to connect to unlicensed Windows machines > 179 - Allows users to exchange routes to illegal file shares > 53 - Allows people to look up illegal names > > -A > > > > ------------------------------ > > Message: 11 > Date: Thu, 26 Mar 2015 10:27:21 -0400 > From: Christopher Morrow <morrowc.li...@gmail.com> > To: a...@djlab.com > Cc: nanog list <nanog@nanog.org> > Subject: Re: Prefix hijack by INDOSAT AS4795 / AS4761 > Message-ID: > <CAL9jLaY17-8nVwXDDs1dncU= > 252pbsefpdi1qagxq5zej-a...@mail.gmail.com> > Content-Type: text/plain; charset=UTF-8 > > On Thu, Mar 26, 2015 at 10:08 AM, Randy <a...@djlab.com> wrote: > > On Thursday March 26th 2015 at 12:18 UTC (and on-going) we are seeing > more > > specifics on one of our prefixes. Anyone else seeing similar or is it > just > > us? > > is your AS in the path below? (what is your AS so folk can check for > your prefixes/customer-prefixes and attempt to help?) > > > > > 198.98.180.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > > 198.98.182.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > > > > -- > > Randy > > > ------------------------------ > > Message: 12 > Date: Thu, 26 Mar 2015 07:28:57 -0700 > From: Jeff Richmond <jeff.richm...@gmail.com> > To: "Livingood, Jason" <jason_living...@cable.comcast.com> > Cc: "Aaron C. de Bruyn" <aa...@heyaaron.com>, NANOG mailing list > <nanog@nanog.org> > Subject: Re: Frontier: Blocking port 22 because of illegal files? > Message-ID: <006e35ad-00e6-4b61-890f-29e580ce9...@gmail.com> > Content-Type: text/plain; charset=windows-1252 > > All, I have reached out to Aaron privately for details, but we do not > block port 22 traffic unless it is in direct response to an attack or > related item. Please let me know directly if you have any specific > questions. > > Thanks, > -Jeff > > > On Mar 26, 2015, at 7:09 AM, Livingood, Jason < > jason_living...@cable.comcast.com> wrote: > > > > ISPs are generally expected to disclose any port blocking. A quick > Google search shows this is Frontier’s list: > > http://www.frontierhelp.com/faq.cfm?qstid=277 > > > > On 3/25/15, 10:31 PM, "Aaron C. de Bruyn" <aa...@heyaaron.com<mailto: > aa...@heyaaron.com>> wrote: > > > > I've had a handful of clients contact me over the last week with > > trouble using SCP (usually WinSCP) to manage their website content on > > my servers. Either they get timeout messages from WinSCP or a message > > saying they should switch to SFTP. > > > > After getting a few helpful users on the phone to run some quick > > tests, we found port 22 was blocked. > > > > When my customers contacted Frontier, they were told that port 22 was > > blocked because it is used to transfer illegal files. > > > > I called them, and got the same ridiculous excuse. > > > > Just a friendly heads-up to anyone from Frontier who might be > > listening, I have a few additional ports you may wish to block: > > > > 80 - Allows users to use Google to search for illegal files > > 443 - Allows users to use Google to search for illegal files in a secure > manner > > 69 - Allows users to trivially transfer illegal files > > 3389 - Allows users to connect to unlicensed Windows machines > > 179 - Allows users to exchange routes to illegal file shares > > 53 - Allows people to look up illegal names > > > > -A > > > > > > ------------------------------ > > Message: 13 > Date: Thu, 26 Mar 2015 10:32:31 -0400 > From: Daniel Corbe <co...@corbe.net> > To: "Livingood\, Jason" <jason_living...@cable.comcast.com> > Cc: "Aaron C. de Bruyn" <aa...@heyaaron.com>, NANOG mailing list > <nanog@nanog.org> > Subject: Re: Frontier: Blocking port 22 because of illegal files? > Message-ID: <874mp7hls0....@corbe.net> > Content-Type: text/plain; charset=utf-8 > > > Nothing helps promote a free and open Internet more than micromanaging > your users' download activity. > > Not really sure how someone comes to the conclusion that nobody really > *needs* ssh for anything. > > "Livingood, Jason" <jason_living...@cable.comcast.com> writes: > > > ISPs are generally expected to disclose any port blocking. A quick > Google search shows this is Frontier’s list: > > http://www.frontierhelp.com/faq.cfm?qstid=277 > > > > On 3/25/15, 10:31 PM, "Aaron C. de Bruyn" <aa...@heyaaron.com<mailto: > aa...@heyaaron.com>> wrote: > > > > I've had a handful of clients contact me over the last week with > > trouble using SCP (usually WinSCP) to manage their website content on > > my servers. Either they get timeout messages from WinSCP or a message > > saying they should switch to SFTP. > > > > After getting a few helpful users on the phone to run some quick > > tests, we found port 22 was blocked. > > > > When my customers contacted Frontier, they were told that port 22 was > > blocked because it is used to transfer illegal files. > > > > I called them, and got the same ridiculous excuse. > > > > Just a friendly heads-up to anyone from Frontier who might be > > listening, I have a few additional ports you may wish to block: > > > > 80 - Allows users to use Google to search for illegal files > > 443 - Allows users to use Google to search for illegal files in a secure > manner > > 69 - Allows users to trivially transfer illegal files > > 3389 - Allows users to connect to unlicensed Windows machines > > 179 - Allows users to exchange routes to illegal file shares > > 53 - Allows people to look up illegal names > > > > -A > > > ------------------------------ > > Message: 14 > Date: Thu, 26 Mar 2015 07:38:08 -0700 > From: Randy <a...@djlab.com> > To: Christopher Morrow <morrowc.li...@gmail.com> > Cc: christopher.mor...@gmail.com, nanog list <nanog@nanog.org> > Subject: Re: Prefix hijack by INDOSAT AS4795 / AS4761 > Message-ID: <d9f578bfd7e75bf125e26a2911c67...@mailbox.fastserv.com> > Content-Type: text/plain; charset=US-ASCII; format=flowed > > On 03/26/2015 7:27 am, Christopher Morrow wrote: > > is your AS in the path below? (what is your AS so folk can check for > > your prefixes/customer-prefixes and attempt to help?) > > Sorry, we're 29889. > > > > ------------------------------ > > Message: 15 > Date: Thu, 26 Mar 2015 14:43:20 +0000 > From: Peter Rocca <ro...@start.ca> > To: "nanog@nanog.org" <nanog@nanog.org> > Subject: RE: Prefix hijack by INDOSAT AS4795 / AS4761 > Message-ID: <44c3b7398b0c46b8a842c44da3f379be@APP02.start.local> > Content-Type: text/plain; charset="us-ascii" > > We just received a similar alert from bgpmon - part of 108.168.0.0/17 is > being advertised as /20's - although we're still listed as the origin. We > are 40788. > > 108.168.64.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > 108.168.80.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > 108.168.96.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > 108.168.112.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > -----Original Message----- > From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Randy > Sent: March-26-15 10:08 AM > To: nanog@nanog.org > Subject: Prefix hijack by INDOSAT AS4795 / AS4761 > > On Thursday March 26th 2015 at 12:18 UTC (and on-going) we are seeing > more specifics on one of our prefixes. Anyone else seeing similar or > is it just us? > > 198.98.180.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > 198.98.182.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > > -- > Randy > > > ------------------------------ > > Message: 16 > Date: Thu, 26 Mar 2015 10:44:28 -0400 > From: Christopher Morrow <morrowc.li...@gmail.com> > To: a...@djlab.com > Cc: nanog list <nanog@nanog.org> > Subject: Re: Prefix hijack by INDOSAT AS4795 / AS4761 > Message-ID: > <CAL9jLaYvGYc6s4uhAqfKG+qikWSa4U3Mp= > xo6uuvfaz_4gg...@mail.gmail.com> > Content-Type: text/plain; charset=UTF-8 > > On Thu, Mar 26, 2015 at 10:38 AM, Randy <a...@djlab.com> wrote: > > On 03/26/2015 7:27 am, Christopher Morrow wrote: > >> > >> is your AS in the path below? (what is your AS so folk can check for > >> your prefixes/customer-prefixes and attempt to help?) > > > > > > Sorry, we're 29889. > > > > ok, and it looks like the path you clipped is: > 198.98.180.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > > possibly LAIX is passing along your /24 you didn't mean them to pass on? > > > ------------------------------ > > Message: 17 > Date: Thu, 26 Mar 2015 10:45:09 -0400 > From: Christopher Morrow <morrowc.li...@gmail.com> > To: Peter Rocca <ro...@start.ca> > Cc: "nanog@nanog.org" <nanog@nanog.org> > Subject: Re: Prefix hijack by INDOSAT AS4795 / AS4761 > Message-ID: > < > cal9jlaalxcncc4uytkz7suduks4b+vjza56no6n_tdhrmhj...@mail.gmail.com> > Content-Type: text/plain; charset=UTF-8 > > On Thu, Mar 26, 2015 at 10:43 AM, Peter Rocca <ro...@start.ca> wrote: > > We just received a similar alert from bgpmon - part of 108.168.0.0/17 > is being advertised as /20's - although we're still listed as the origin. > We are 40788. > > > > 108.168.64.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > 108.168.80.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > 108.168.96.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > 108.168.112.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > > > common point looks like LAIX ? their routeserver go crazy perhaps? or > did they change in/out prefix management information? > > > -----Original Message----- > > From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Randy > > Sent: March-26-15 10:08 AM > > To: nanog@nanog.org > > Subject: Prefix hijack by INDOSAT AS4795 / AS4761 > > > > On Thursday March 26th 2015 at 12:18 UTC (and on-going) we are seeing > > more specifics on one of our prefixes. Anyone else seeing similar or > > is it just us? > > > > 198.98.180.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > > 198.98.182.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > > > > -- > > Randy > > > ------------------------------ > > Message: 18 > Date: Thu, 26 Mar 2015 07:46:31 -0700 > From: Randy <a...@djlab.com> > To: Christopher Morrow <morrowc.li...@gmail.com> > Cc: christopher.mor...@gmail.com, nanog list <nanog@nanog.org> > Subject: Re: Prefix hijack by INDOSAT AS4795 / AS4761 > Message-ID: <78c55aee9b1853c827c78adb8527f...@mailbox.fastserv.com> > Content-Type: text/plain; charset=US-ASCII; format=flowed > > All, > > Info gathered off-list indicates this may be a couple of issues in our > case - possible routing leak by 18978 (check your tables!) and more > specifics on our prefixes from 4795 that we couldn't see before the leak > hence the apparent hijack. > > -- > ~Randy > > > ------------------------------ > > Message: 19 > Date: Thu, 26 Mar 2015 15:46:51 +0100 > From: Pierre Emeriaud <petrus...@gmail.com> > To: a...@djlab.com > Cc: nanog@nanog.org > Subject: Re: Prefix hijack by INDOSAT AS4795 / AS4761 > Message-ID: > < > ca+psopyoeoaswgq1mzg+mls0zrmow35o7ytre_r5yssm8uc...@mail.gmail.com> > Content-Type: text/plain; charset=UTF-8 > > Hi, > > > 2015-03-26 15:08 GMT+01:00 Randy <a...@djlab.com>: > > On Thursday March 26th 2015 at 12:18 UTC (and on-going) we are seeing > more > > specifics on one of our prefixes. Anyone else seeing similar or is it > just > > us? > > > > 198.98.180.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > > 198.98.182.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > > We (as3215) are seeing almost the same path with 40633 18978 3257 > 3215, for some quite a lot of prefixes. > > Some alerts from bgpmon: > 193.251.32.0/20 271 6939 40633 18978 3257 3215 > 193.251.32.0/20 271 6939 40633 18978 3257 3215 > > We are not directly connected to 3257. Looks like 18978 deaggregated > to /20 and reannounced to 40633 (LAIX). > > > Rgds, > pierre > > > ------------------------------ > > Message: 20 > Date: Thu, 26 Mar 2015 23:48:12 +0900 > From: "Paul S." <cont...@winterei.se> > To: nanog@nanog.org > Subject: Re: Prefix hijack by INDOSAT AS4795 / AS4761 > Message-ID: <55141c2c.40...@winterei.se> > Content-Type: text/plain; charset=UTF-8; format=flowed > > Same here. These Indosat guys can't seem to catch a break =/ > > On 3/26/2015 午後 11:43, Peter Rocca wrote: > > We just received a similar alert from bgpmon - part of 108.168.0.0/17 > is being advertised as /20's - although we're still listed as the origin. > We are 40788. > > > > 108.168.64.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > 108.168.80.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > 108.168.96.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > 108.168.112.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > > > -----Original Message----- > > From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Randy > > Sent: March-26-15 10:08 AM > > To: nanog@nanog.org > > Subject: Prefix hijack by INDOSAT AS4795 / AS4761 > > > > On Thursday March 26th 2015 at 12:18 UTC (and on-going) we are seeing > > more specifics on one of our prefixes. Anyone else seeing similar or > > is it just us? > > > > 198.98.180.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > > 198.98.182.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > > > > > > ------------------------------ > > Message: 21 > Date: Thu, 26 Mar 2015 11:00:31 -0400 > From: Chuck Anderson <c...@wpi.edu> > To: nanog@nanog.org > Subject: Re: Prefix hijack by INDOSAT AS4795 / AS4761 > Message-ID: <20150326150030.go9...@angus.ind.wpi.edu> > Content-Type: text/plain; charset=us-ascii > > We are AS 10326 130.215.0.0/16 and I just received a BGPmon alert as > well: > > 130.215.160.0/20 4795 4795 4761 9304 40633 18978 4436 10326 > 130.215.176.0/20 4795 4795 4761 9304 40633 18978 4436 10326 > > On Thu, Mar 26, 2015 at 10:45:09AM -0400, Christopher Morrow wrote: > > On Thu, Mar 26, 2015 at 10:43 AM, Peter Rocca <ro...@start.ca> wrote: > > > We just received a similar alert from bgpmon - part of 108.168.0.0/17 > is being advertised as /20's - although we're still listed as the origin. > We are 40788. > > > > > > 108.168.64.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > > 108.168.80.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > > 108.168.96.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > > 108.168.112.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > > > > > > common point looks like LAIX ? their routeserver go crazy perhaps? or > > did they change in/out prefix management information? > > > > > -----Original Message----- > > > From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Randy > > > Sent: March-26-15 10:08 AM > > > To: nanog@nanog.org > > > Subject: Prefix hijack by INDOSAT AS4795 / AS4761 > > > > > > On Thursday March 26th 2015 at 12:18 UTC (and on-going) we are seeing > > > more specifics on one of our prefixes. Anyone else seeing similar or > > > is it just us? > > > > > > 198.98.180.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > > > 198.98.182.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > > > > > > -- > > > Randy > > > ------------------------------ > > Message: 22 > Date: Thu, 26 Mar 2015 16:02:00 +0100 > From: Christian Teuschel <christian.teusc...@ripe.net> > To: nanog@nanog.org > Subject: Re: Prefix hijack by INDOSAT AS4795 / AS4761 > Message-ID: <55141f68.9060...@ripe.net> > Content-Type: text/plain; charset="windows-1252" > > Hi Randy, > > Assuming that your prefix is 198.98.180.0/22 (AS29889 - FSNET-1 - Fast > Serv Networks, LLC) none of the mentioned more specifics are currently > seen from the RIPE NCC's RIS network, see the Looking Glass widget: > > https://stat.ripe.net/198.98.180.0/23#tabId=routing > https://stat.ripe.net/198.98.182.0/23#tabId=at-a-glance > > though there has been some BGP activity going on since 11:49:42, see the > BGPlay and BGP Update Activity widget. In both cases the originating ASN > was AS29889. > > Cheers, > Christian > > On 26/03/15 15:46, Randy wrote: > > All, > > > > Info gathered off-list indicates this may be a couple of issues in our > > case - possible routing leak by 18978 (check your tables!) and more > > specifics on our prefixes from 4795 that we couldn't see before the leak > > hence the apparent hijack. > > > -------------- next part -------------- > A non-text attachment was scrubbed... > Name: christian_teuschel.vcf > Type: text/x-vcard > Size: 342 bytes > Desc: not available > URL: < > http://mailman.nanog.org/pipermail/nanog/attachments/20150326/9de6eabc/attachment-0001.vcf > > > > ------------------------------ > > Message: 23 > Date: Thu, 26 Mar 2015 08:53:37 -0700 > From: Andree Toonk <andree+na...@toonk.nl> > To: Peter Rocca <ro...@start.ca> > Cc: "nanog@nanog.org" <nanog@nanog.org> > Subject: Re: Prefix hijack by INDOSAT AS4795 / AS4761 > Message-ID: <55142b81.9000...@toonk.nl> > Content-Type: text/plain; charset=ISO-8859-1 > > Hi List, > > this morning our BGPmon system picked up many new more specific > announcements by a variety of Origin ASns, the interesting part is that > the majority of them were classified as BGP Man In The middle attacks > (MITM). > > A typical alert would look like: > > ==================================================================== > Possible BGP MITM attack (Code: 21) > ==================================================================== > Your prefix: 23.20.0.0/15: > Prefix Description: acxiom-online.com --- Amazon EC2 IAD prefix > Update time: 2015-03-26 11:27 (UTC) > Detected by #peers: 24 > Detected prefix: 23.21.112.0/20 > Announced by: AS14618 (AMAZON-AES - Amazon.com, Inc.,US) > Upstream AS: AS3257 (TINET-BACKBONE Tinet SpA,DE) > ASpath: 4608 24130 7545 6939 40633 18978 3257 14618 > > All alerts have the following part of the AS Path is common: > 40633 1897 > > We're still looking into the details of this particular cases, but > based on past experience it's likely that it is not in fact 14618 AWS, > that originated this more specific (in this example), but most likely > 18978 (or 40633), which leaked it to AS40633 Los Angeles Internet > exchange, where others picked it up and propagated it to their customers. > > In the past we've seen similar issues caused by BGP traffic optimizers. > These devices introduce new more specifics (try to keep the ASpath in > tact) for Traffic engineering purposes, and then folks leak those. A > good write up of a previous example can be found here: > http://www.bgpmon.net/accidentally-stealing-the-internet/ > > A quick scan show that this affected over 5000 prefixes and about 145 > Autonomous systems. All of these appear to be more specific prefixes > (which is the scary part). > > Cheers, > Andree > > PS. It appears this is not related to INDOSAT, they just happen to be > one of the peers that picked this up. > > > .-- My secret spy satellite informs me that at 2015-03-26 7:43 AM Peter > Rocca wrote: > > We just received a similar alert from bgpmon - part of 108.168.0.0/17 > is being advertised as /20's - although we're still listed as the origin. > We are 40788. > > > > 108.168.64.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > 108.168.80.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > 108.168.96.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > 108.168.112.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > > > -----Original Message----- > > From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Randy > > Sent: March-26-15 10:08 AM > > To: nanog@nanog.org > > Subject: Prefix hijack by INDOSAT AS4795 / AS4761 > > > > On Thursday March 26th 2015 at 12:18 UTC (and on-going) we are seeing > > more specifics on one of our prefixes. Anyone else seeing similar or > > is it just us? > > > > 198.98.180.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > > 198.98.182.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > > > > > ------------------------------ > > Message: 24 > Date: Thu, 26 Mar 2015 16:00:13 +0000 > From: Peter Rocca <ro...@start.ca> > To: Andree Toonk <andree+na...@toonk.nl> > Cc: "nanog@nanog.org" <nanog@nanog.org> > Subject: RE: Prefix hijack by INDOSAT AS4795 / AS4761 > Message-ID: <df223256e7294e619cf09b8697de7f28@APP02.start.local> > Content-Type: text/plain; charset="us-ascii" > > +1 > > The summary below aligns with our analysis as well. > > We've reached out to AS18978 to determine the status of the leak but at > this time we're not seeing any operational impact. > > -----Original Message----- > From: Andree Toonk [mailto:andree+na...@toonk.nl] > Sent: March-26-15 11:54 AM > To: Peter Rocca > Cc: nanog@nanog.org > Subject: Re: Prefix hijack by INDOSAT AS4795 / AS4761 > > Hi List, > > this morning our BGPmon system picked up many new more specific > announcements by a variety of Origin ASns, the interesting part is that the > majority of them were classified as BGP Man In The middle attacks (MITM). > > A typical alert would look like: > > ==================================================================== > Possible BGP MITM attack (Code: 21) > ==================================================================== > Your prefix: 23.20.0.0/15: > Prefix Description: acxiom-online.com --- Amazon EC2 IAD prefix > Update time: 2015-03-26 11:27 (UTC) > Detected by #peers: 24 > Detected prefix: 23.21.112.0/20 > Announced by: AS14618 (AMAZON-AES - Amazon.com, Inc.,US) > Upstream AS: AS3257 (TINET-BACKBONE Tinet SpA,DE) > ASpath: 4608 24130 7545 6939 40633 18978 3257 14618 > > All alerts have the following part of the AS Path is common: > 40633 1897 > > We're still looking into the details of this particular cases, but based > on past experience it's likely that it is not in fact 14618 AWS, that > originated this more specific (in this example), but most likely > 18978 (or 40633), which leaked it to AS40633 Los Angeles Internet > exchange, where others picked it up and propagated it to their customers. > > In the past we've seen similar issues caused by BGP traffic optimizers. > These devices introduce new more specifics (try to keep the ASpath in > tact) for Traffic engineering purposes, and then folks leak those. A good > write up of a previous example can be found here: > http://www.bgpmon.net/accidentally-stealing-the-internet/ > > A quick scan show that this affected over 5000 prefixes and about 145 > Autonomous systems. All of these appear to be more specific prefixes (which > is the scary part). > > Cheers, > Andree > > PS. It appears this is not related to INDOSAT, they just happen to be one > of the peers that picked this up. > > > .-- My secret spy satellite informs me that at 2015-03-26 7:43 AM Peter > Rocca wrote: > > We just received a similar alert from bgpmon - part of 108.168.0.0/17 > is being advertised as /20's - although we're still listed as the origin. > We are 40788. > > > > 108.168.64.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > 108.168.80.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > 108.168.96.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > 108.168.112.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > > > > -----Original Message----- > > From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Randy > > Sent: March-26-15 10:08 AM > > To: nanog@nanog.org > > Subject: Prefix hijack by INDOSAT AS4795 / AS4761 > > > > On Thursday March 26th 2015 at 12:18 UTC (and on-going) we are seeing > > more specifics on one of our prefixes. Anyone else seeing similar or > > is it just us? > > > > 198.98.180.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > > 198.98.182.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > > > > > ------------------------------ > > Message: 25 > Date: Thu, 26 Mar 2015 12:09:10 -0400 > From: Shawn L <sha...@up.net> > To: nanog <nanog@nanog.org> > Subject: Charter Engineer > Message-ID: > <CACTmXQVgzXydseLNrAcCZtt+sXS1_LSrGqJca=+ > ep9gs2kc...@mail.gmail.com> > Content-Type: text/plain; charset=UTF-8 > > Could a Charter engineer with familiarity with Michigan contact me > off-list? We have a mutual client who's having issues communicating > between sites. > > Thanks > > > ------------------------------ > > Message: 26 > Date: Thu, 26 Mar 2015 09:14:25 -0700 > From: Randy <a...@djlab.com> > To: Peter Rocca <ro...@start.ca> > Cc: nanog@nanog.org > Subject: RE: More specifics from AS18978 [was: Prefix hijack by > INDOSAT AS4795 / AS4761] > Message-ID: <fd455d84899cd5dfe3a4ff9169add...@mailbox.fastserv.com> > Content-Type: text/plain; charset=US-ASCII; format=flowed > > On 03/26/2015 9:00 am, Peter Rocca wrote: > > +1 > > > > The summary below aligns with our analysis as well. > > > > We've reached out to AS18978 to determine the status of the leak but > > at this time we're not seeing any operational impact. > > +2, after the morning coffee sunk in and helpful off list replies I can > finally see it's probably not INDOSAT involved at all. > > FYI, the more specifics are still active: > > 2015-03-26 13:56:11 Update AS4795 ID 198.98.180.0/23 4795 4795 > 4761 > 9304 40633 18978 6939 29889 Active > 2015-03-26 13:56:11 Update AS4795 ID 198.98.182.0/23 4795 4795 > 4761 > 9304 40633 18978 6939 29889 Active > > -- > ~Randy > > > End of NANOG Digest, Vol 86, Issue 27 > ************************************* >