Re: LoA (Letter of Authorization) for Prefix Filter Modification?
Joe Greco wrote: > How do you verify the authenticity of anything? This is a common problem > in the Real World, and is hardly limited to LoA's. > > How do you prove that what was on Pages 1 to (N-1) of an N page contract > contained the words you think they said? I knew a guy, back in the early > days, who habitually changed the SLA's in his contracts so that he could > cancel a contract for virtually no reason at all ... the folly of mailing > around contracts as .doc files in e-mail. But even failing that, it's > pretty trivial to reprint a document, so where do you stop, do you use > special paper, special ink, watermarking of documents, initial each page, > all of the above, etc? what about using a digital signation of e.g. a pdf version of a scan? cheers, raoul -- DI (FH) Raoul Bhatia M.Sc. email. [EMAIL PROTECTED] Technischer Leiter IPAX - Aloy Bhatia Hava OEG web. http://www.ipax.at Barawitzkagasse 10/2/2/11 email.[EMAIL PROTECTED] 1190 Wien tel. +43 1 3670030 FN 277995t HG Wien fax.+43 1 3670030 15
Re: Procedure to Change Nameservers
> Free sites that perform similar DNS configuration checks that I know of > are: > > http://dnssy.com > http://www.intodns.com Just to add to the list: http://squish.net/dnscheck/
Re: Atrivo/Intercage: Now Only 1 Upstream
Looks like PIE got themselves a /22 in spamhaus - http://www.spamhaus.org/sbl/sbl.lasso?query=SBL67906 _quote__ 206.223.144.0/22 is listed on the Spamhaus Block List (SBL) 17-Sep-2008 09:57 GMT | SR04 Pacific Internet Exchange LLC. NT Technology ; nttec.com http://cidr-report.org/cgi-bin/as-report?as=AS32335 Hosted/routed Scott Richter AND Alan Ralsky - now decided to pick up Intercage/Atrivo. Perhaps someone does not read the news? http://news.google.com/news?q=intercage http://www.spamhaus.org/news.lasso?article=636 We hope that's the case and this is not a knowing routing decision. On Wed, Sep 17, 2008 at 6:31 AM, Matthew Moyle-Croft <[EMAIL PROTECTED]> wrote: > > On 16/09/2008, at 10:17 PM, *Hobbit* wrote: > >> So in cases like this where the community appears to agree that there's >> a consistently bad apple, what's preventing everyone from simply >> nullrouting the netblocks in question and imposing the death penalty? > > Dunno - but something did occur to me this morning on the drive into work:
Re: Atrivo/Intercage: Now Only 1 Upstream
On Tuesday 16 September 2008 23:36:20 *Hobbit* wrote: >you expect them to apply a null route? > > Well, I *have* been talking somewhat idealistically here and > there with this crop of questions, but frankly I thought in the > 2 or 3 years I was ignoring the list that the NETWORK OPERATORS > ostensibly in custody of the intertubes would have pulled things > together a little better and grown enough of a pair to firmly > state "this crap stops here and now" and make it happen. :-) Speaking as an observer only, and not as someone who, other than at my own edge, could make a significant impact on the result. Seems to me getting that IP space on a bogon list could be enough to make a serious dent.
Re: LoA (Letter of Authorization) for Prefix Filter Modification?
> Joe Greco wrote: > > How do you verify the authenticity of anything? This is a common problem > > in the Real World, and is hardly limited to LoA's. > > > > How do you prove that what was on Pages 1 to (N-1) of an N page contract > > contained the words you think they said? I knew a guy, back in the early > > days, who habitually changed the SLA's in his contracts so that he could > > cancel a contract for virtually no reason at all ... the folly of mailing > > around contracts as .doc files in e-mail. But even failing that, it's > > pretty trivial to reprint a document, so where do you stop, do you use > > special paper, special ink, watermarking of documents, initial each page, > > all of the above, etc? > > what about using a digital signation of e.g. a pdf version of a scan? Try putting that up next to an apparently legitimate but actually subtly modified paper contract with signatures, in a court of law, and feel free to inform us of which one the court finds more compelling. In an environment where there's an established history and standard procedures, they're typically going to prefer the familiar method. In our world, if we were to have some sort of crypto-based way to have a netblock owner sign something like that, yeah, that'd be great, and it would mean that the community would generally be able to manage the issue without having to resort to faxed-around LoA's, etc., but we don't have that infrastructure, or even a common/widespread LoA system. Sigh. I'm not arguing that some sort of technical/crypto infrastructure for authorizing the advertisement of space shouldn't be developed, and in fact I think it should. However, as an interim step, things like LoA's are much better than nothing at all, and worrying about the authenticity of an LoA is probably not worth the time and effort, given the way these things tend to work out. If there's cause for concern, those who are receiving the LoA's will ramp up the paranoia. ... JG -- Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net "We call it the 'one bite at the apple' rule. Give me one chance [and] then I won't contact you again." - Direct Marketing Ass'n position on e-mail spam(CNN) With 24 million small businesses in the US alone, that's way too many apples.
RE: Atrivo/Intercage: Now Only 1 Upstream
Putting things in the automated bogon feeds (e.g. Team Cymru) that are not strictly bogons (unallocated addresses) is likely to very quickly erode trust in those services, if that is what you are suggesting. - S -Original Message- From: Lamar Owen <[EMAIL PROTECTED]> Sent: Wednesday, September 17, 2008 09:26 To: nanog@nanog.org Subject: Re: Atrivo/Intercage: Now Only 1 Upstream On Tuesday 16 September 2008 23:36:20 *Hobbit* wrote: >you expect them to apply a null route? > > Well, I *have* been talking somewhat idealistically here and > there with this crop of questions, but frankly I thought in the > 2 or 3 years I was ignoring the list that the NETWORK OPERATORS > ostensibly in custody of the intertubes would have pulled things > together a little better and grown enough of a pair to firmly > state "this crap stops here and now" and make it happen. :-) Speaking as an observer only, and not as someone who, other than at my own edge, could make a significant impact on the result. Seems to me getting that IP space on a bogon list could be enough to make a serious dent.
RE: Atrivo/Intercage: Now Only 1 Upstream
On Wed, 17 Sep 2008, Skywing wrote: Putting things in the automated bogon feeds (e.g. Team Cymru) that are not strictly bogons (unallocated addresses) is likely to very quickly erode trust in those services, if that is what you are suggesting. We all want a "really really bad stuff" BGP feed for anyone who wants it, but the Internet is not ready for that. Gadi. - S -Original Message- From: Lamar Owen <[EMAIL PROTECTED]> Sent: Wednesday, September 17, 2008 09:26 To: nanog@nanog.org Subject: Re: Atrivo/Intercage: Now Only 1 Upstream On Tuesday 16 September 2008 23:36:20 *Hobbit* wrote: you expect them to apply a null route? Well, I *have* been talking somewhat idealistically here and there with this crop of questions, but frankly I thought in the 2 or 3 years I was ignoring the list that the NETWORK OPERATORS ostensibly in custody of the intertubes would have pulled things together a little better and grown enough of a pair to firmly state "this crap stops here and now" and make it happen. :-) Speaking as an observer only, and not as someone who, other than at my own edge, could make a significant impact on the result. Seems to me getting that IP space on a bogon list could be enough to make a serious dent.
Re: Atrivo/Intercage: Now Only 1 Upstream
On Wed, Sep 17, 2008 at 1:01 PM, Gadi Evron <[EMAIL PROTECTED]> wrote: > On Wed, 17 Sep 2008, Skywing wrote: >> >> Putting things in the automated bogon feeds (e.g. Team Cymru) that are not >> strictly bogons (unallocated addresses) is likely to very quickly erode >> trust in those services, if that is what you are suggesting. > > We all want a "really really bad stuff" BGP feed for anyone who wants it, > but the Internet is not ready for that. hrm, so actually there's a lot of supporting infrastructure that is necessary (or could be necessary) to implement something of that sort in any decent sized network. Provided you wanted to sinkhole the trafffic off somewhere to 'do the right thing' not just null0 the traffic, of course. There's the additional issue of allowing a third party to manage/traffic-engineer inside your network which might upset some operations folks. If you can build a list on your own in a reasonable fashion with supporting information and high confidence level that's one story, if this list comes from "someone else" whom you don't even have a billing-relationship with... it's hard to sell that when something bad happens. Certainly not everyone feels this way (see 'popularity' of the existing RBL/xbl lists) but in a larger network, or one that makes money ... How about providing some open-source intelligence in a centralized and machine-parsable fashion (perhaps with community input of intel even) which would allow better decsions to be made? -Chris
Re: Atrivo/Intercage: Now Only 1 Upstream
On Wed, Sep 17, 2008 at 1:07 PM, Christopher Morrow <[EMAIL PROTECTED]> wrote: > On Wed, Sep 17, 2008 at 1:01 PM, Gadi Evron <[EMAIL PROTECTED]> wrote: >> On Wed, 17 Sep 2008, Skywing wrote: >>> >>> Putting things in the automated bogon feeds (e.g. Team Cymru) that are not >>> strictly bogons (unallocated addresses) is likely to very quickly erode >>> trust in those services, if that is what you are suggesting. >> >> We all want a "really really bad stuff" BGP feed for anyone who wants it, >> but the Internet is not ready for that. > > hrm, so actually there's a lot of supporting infrastructure that is > necessary (or could be necessary) to implement something of that sort > in any decent sized network. Provided you wanted to sinkhole the > trafffic off somewhere to 'do the right thing' not just null0 the > traffic, of course. right on. > There's the additional issue of allowing a third party to > manage/traffic-engineer inside your network which might upset some > operations folks. If you can build a list on your own in a reasonable > fashion with supporting information and high confidence level that's > one story, if this list comes from "someone else" whom you don't even > have a billing-relationship with... it's hard to sell that when > something bad happens. and this is the exact reason i will not implement any of these auto-bgp feeds or drop lists in my network. now not only do i have internal operation folks fat fingers to worry about,but what if one of these third parties, as you pointed out, with no money changing hands or formal agreements,has fat fingers one day, and now adds a legitimate allocation to the feed/list? then what? > Certainly not everyone feels this way (see 'popularity' of the > existing RBL/xbl lists) but in a larger network, or one that makes > money ... > > How about providing some open-source intelligence in a centralized and > machine-parsable fashion (perhaps with community input of intel even) > which would allow better decsions to be made? > > -Chris > > Christian
Re: Atrivo/Intercage: Now Only 1 Upstream
Christopher Morrow wrote: How about providing some open-source intelligence in a centralized and machine-parsable fashion (perhaps with community input of intel even) which would allow better decsions to be made? Reputation based on src_addr is /so/ 2005. ASN has a few more legs perhaps... but... All the growth in Internet-connected compute clouds (EC2, AppNexus, GoGrid, etc.) makes any system based around IP reputation decidedly less useful. At the end of the day, nobody is going to drop packets for amazon's IP space. -David
Re: Atrivo/Intercage: Now Only 1 Upstream
On Sep 17, 2008, at 1:32 PM, David Ulevitch wrote: Christopher Morrow wrote: How about providing some open-source intelligence in a centralized and machine-parsable fashion (perhaps with community input of intel even) which would allow better decsions to be made? Reputation based on src_addr is /so/ 2005. ASN has a few more legs perhaps... but... All the growth in Internet-connected compute clouds (EC2, AppNexus, GoGrid, etc.) makes any system based around IP reputation decidedly less useful. At the end of the day, nobody is going to drop packets for amazon's IP space. I'm afraid reality disagrees with you - there already are networks doing it. Being big does not guarantee you ability to do Bad Things. -- TTFN, patrick
Re: Atrivo/Intercage: Now Only 1 Upstream
On Wednesday 17 September 2008 12:55:49 Skywing wrote: >> Lamar Owen Wrote: >> Seems to me getting that IP space on a bogon list could be enough to make a >> serious dent. > Putting things in the automated bogon feeds (e.g. Team Cymru) that are not > strictly bogons (unallocated addresses) is likely to very quickly erode > trust in those services, if that is what you are suggesting. Seems a similar topic has been here before... hrm... Yep, back around the first of August the subject came up of "Is it time to abandon bogon prefix filters?" in which thread you (among many others) were a participant. I don't have an archive link, sorry, since I used my personal archive of NANOG to find. Seems there are already trust, DoS, etc issues out there, in spades. But if someone wanted to do a 'badon' list and distribute in a similar fashion nothing is preventing folks for subscribing. The various antispam DNSBL's have multiple feeds of different kinds; some enterprising soul could do the same for routing. Will everyone do that? Of course not; some will choose to not, others will simply not care, and others will just ignore. Perhaps it could be called the wish-they-were-bogons list. Then a I-really-wish-they-were-bogons list for just the more severe block. The point made by Christopher Morrow is well taken: > There's the additional issue of allowing a third party to >manage/traffic-engineer inside your network which might upset some >operations folks. If you can build a list on your own in a reasonable >fashion with supporting information and high confidence level that's >one story, if this list comes from "someone else" whom you don't even >have a billing-relationship with... it's hard to sell that when >something bad happens. > >Certainly not everyone feels this way (see 'popularity' of the >existing RBL/xbl lists) but in a larger network, or one that makes >money ... Folks who use a DNSBL are already letting people in their network, in the e-mail sense at least (and some firewall interfaces to these lists). Those same people would likely not have a problem with a wish-they-were-bogons list. But, yeah, it's like chasing a weasel with an M134 with someone else aiming while you hold down the trigger. For infrastructure notes, see Team Cymru's description page at http://www.team-cymru.org/Services/Bogons/routeserver.html Seems easy enough to duplicate (of course, the devil is in the details, and nothing is as easy as it seems); and making the 'thing' 'do the right thing' is a matter of what routes are actually served by your route-servers. Perhaps a good use for that old Internet backbone router (or wannabe) that can no longer take a full BGP feed.
Re: Atrivo/Intercage: Now Only 1 Upstream
On Wed, 17 Sep 2008, Christopher Morrow wrote: On Wed, Sep 17, 2008 at 1:01 PM, Gadi Evron <[EMAIL PROTECTED]> wrote: On Wed, 17 Sep 2008, Skywing wrote: Putting things in the automated bogon feeds (e.g. Team Cymru) that are not strictly bogons (unallocated addresses) is likely to very quickly erode trust in those services, if that is what you are suggesting. We all want a "really really bad stuff" BGP feed for anyone who wants it, but the Internet is not ready for that. hrm, so actually there's a lot of supporting infrastructure that is necessary (or could be necessary) to implement something of that sort in any decent sized network. Provided you wanted to sinkhole the trafffic off somewhere to 'do the right thing' not just null0 the traffic, of course. There's the additional issue of allowing a third party to manage/traffic-engineer inside your network which might upset some operations folks. If you can build a list on your own in a reasonable fashion with supporting information and high confidence level that's one story, if this list comes from "someone else" whom you don't even have a billing-relationship with... it's hard to sell that when something bad happens. Certainly not everyone feels this way (see 'popularity' of the existing RBL/xbl lists) but in a larger network, or one that makes money ... How about providing some open-source intelligence in a centralized and machine-parsable fashion (perhaps with community input of intel even) which would allow better decsions to be made? Chris, that does not solve the one issue you did not mention: liability. Gadi. -Chris
Re: Atrivo/Intercage: Now Only 1 Upstream
On Wednesday 17 September 2008 13:34:22 Patrick W. Gilmore wrote: > On Sep 17, 2008, at 1:32 PM, David Ulevitch wrote: > > At the end of the day, nobody is going to drop packets for amazon's > > IP space. > I'm afraid reality disagrees with you - there already are networks > doing it. Indeed. Google's e-mail servers get on the various DNSBL's frequently. > Being big does not guarantee you ability to do Bad Things. Might even provide incentive for the grid computing providers to keep tabs on what their uses are doing. Imagine that! Accountability, using the only 'stick' available.
Re: Atrivo/Intercage: Now Only 1 Upstream
Lamar Owen wrote: > On Wednesday 17 September 2008 13:34:22 Patrick W. Gilmore wrote: >> On Sep 17, 2008, at 1:32 PM, David Ulevitch wrote: >>> At the end of the day, nobody is going to drop packets for amazon's >>> IP space. > >> I'm afraid reality disagrees with you - there already are networks >> doing it. > > Indeed. Google's e-mail servers get on the various DNSBL's frequently. I occasionally get in to an argument with a customer who is trying to get mail from someone after a spam run came out of a google mail server and landed it on a DNSBL. The argument presented to me always boils down to "Google could never do anything wrong" or "Google is too big to do anything wrong" and I should immediately stop recommending any DNSBL that would dare to block Google. ~Seth
Re: Atrivo/Intercage: Now Only 1 Upstream
On Wed, Sep 17, 2008 at 1:34 PM, Lamar Owen <[EMAIL PROTECTED]> wrote: > The point made by Christopher Morrow is well taken: >> There's the additional issue of allowing a third party to >>manage/traffic-engineer inside your network which might upset some >>operations folks. If you can build a list on your own in a reasonable >>fashion with supporting information and high confidence level that's >>one story, if this list comes from "someone else" whom you don't even >>have a billing-relationship with... it's hard to sell that when >>something bad happens. >> >>Certainly not everyone feels this way (see 'popularity' of the >>existing RBL/xbl lists) but in a larger network, or one that makes >>money ... > > Folks who use a DNSBL are already letting people in their network, in the > e-mail sense at least (and some firewall interfaces to these lists). Those > same people would likely not have a problem with a wish-they-were-bogons > list. dropping email or port scans to known-vulnerable ports is very different from dropping all traffic from an ip/asn ... There have been cases of large content folks (MS comes to mind) being infected with badness, dropping that for a time is going to hurt more than dropping email from it only. > For infrastructure notes, see Team Cymru's description page at > http://www.team-cymru.org/Services/Bogons/routeserver.html > > Seems easy enough to duplicate (of course, the devil is in the details, and Sorry not just the route-server is necessary, if you want to do something aside from 'drop traffic on the floor'. Take, for instance the DNS Pinning attacks. If you have a large consumer base (or other base dependent up on recursive resolvers) discarding traffic towards the pinned resolvers is going to increase your costs... Prior to accepting the routing change if you setup some infrastructure to sinkhole the traffic and provide proper services out of that sinkhole you'd at least avoid that issue. where in your network can you sink a few gbps of traffic? regionally? locally? centrally? never? always? planning that out is necessary. -chris
RE: Today's Point-2Point WAN Options
See my comments inline below. The one question I have coming out of this is: If I want an economical sound solution that offers me high bandwidth and the ability to ensure end-to-end QoS, what is my best choice? So for it seems like a wavelength service meets those needs, with the negatives being that I need to deal with possible long outage times and manage things like fiber path redundancy myself. MPLS vpn services came in a close 2nd, but the price points I am seeing are outrageous. >>Chris Kleban <[EMAIL PROTECTED]> wrote: >> Hello Nanog, >> >> I'm currently looking into what are the options for enabling >> inter-datacenter communication. >> >> Our current solution is to use ipsec/gre tunnels traversing over the >> Internet. The specific needs the new solution must meet are: >> >> - The ability to run end-to-end QOS. > >What are you trying to accomplish? > >Do you need to be able to pass DiffServ/DSCP tagging between sites? I'll be pushing different types of traffic (voice, video, http, nfs, etc) across the wan and want my different traffic classes queued appropriately from end to end. What I don't want is for there to be any layer 1,2,or3 hop that doesn't trust/pass/act on my dscp markings. >> - WaveLength Services (oc3-10gig): This service seems to be cheaper then >> traditional leased lines when comparing similar bandwidth. However, >> availability is limited to on-net buildings. This solution meets my needs. >Not a bad idea, but often overlooked when purchasing unprotected long-haul >waves is that you can be down for days or weeks on end, depending on the >severity of a given fiber cut. And protected waves cost significantly more >because the carrier is provisioning twice the capacity -- sometimes in a >configuration not as redundant as advertised. This is not for the faint of >heart, and best left to ISPs who are buying from multiple vendors/cable >systems and put in the effort to engineer suitable diversity. As an end-user, >a switched service might afford you more economical route protection. There seems to be some more work required in managing things like fiber path redundancy yourself versus letting a carrier do it for you. >> - Dedicated bandwidth >> - Support 1gbps transfer rates >> - Enable communication between 3 locations >Okay. >> The options I have looked into so far are: >> >> - Layer 2 Ethernet (Virtual Private Line): This service seems to be offered >> by a lot of ISPs using various networking >techniques. The price point is >> attractive however packets are forwarded only at best effort across the >> ISP's network which means >the quality of the service will directly reflect >> the ISP's network performance. >How is this a problem? Is that concern that you never want an interface which >is (physically, to routing protocols, ...) "up" but >latent and dropping >packets like whoa, from an application or monitoring/management prospective? Jitter/loss can affect ef type traffic (voice) severely and I am trying to avoid this. >You raise a valid point about oversubscription. At the same time, this is >often overhyped by marketing people, and dependent on how ghetto your >pseudowire provider is and whether or not they know how to capacity-plan. >> - Traditional Leased Line (dsX/ocX): This service seems to be more expensive >> then wavelength services however meets my needs. >Quite. And it limits your router options significantly while driving up capex >costs. Just say no! >> - MPLS based VPN solutions: Seems to be a good point to multipoint >> technology with QOS offerings. However, the price seems to be around the >> same as wavelength services for the amount of bandwidth we require. If the >> number of data centers we were looking to connect was larger then this >> option would be more attractive. This solution meets my needs. >(Assuming you're talking about l3vpn, as l2 can be grouped into your first >example...) >It would probably help if you'd explain the "QOS" feature set of the offerings >you're looking at. >This is a highly technically complex deployment; even at the largest telecoms, >you can count on one hand the number of staff expert in its implementation and >troubleshooting. It's also the most limiting in terms of specific routing >protocols and prefix counts supported, the type of traffic you can pass, etc. >The only benefit I can see to a l3vpn is in the enterprise with a lot of >branch offices, where it simplifies end-site configurations and hub/spoke >topology. Connecting your three datacenters, this is obviously not an issue. >These are often the most expensive solutions too, given that their target >customers have deep pockets. >> Based on my needs and what my options are I am leaning towards point to >> point wavelength services connecting my 3 locations in a loop like fashion. >> >> >> Are there any other options I should consider? >None come to mind. >> Are my descriptions of the tod
Re: Atrivo/Intercage: Now Only 1 Upstream
On Wed, Sep 17, 2008 at 1:40 PM, Gadi Evron <[EMAIL PROTECTED]> wrote: > On Wed, 17 Sep 2008, Christopher Morrow wrote: >> How about providing some open-source intelligence in a centralized and >> machine-parsable fashion (perhaps with community input of intel even) >> which would allow better decsions to be made? > > Chris, that does not solve the one issue you did not mention: liability. if you can provide sourcing info and src tagging you could potentially limit some of the liability... but yes that's still an issue, the same issue as using any other existing BL though. 'oops [EMAIL PROTECTED] added www.amazon.com to the bl by mistake!' with some scoring system to set the reputation and associated query logic to pull out things over/under/around a threshold at least the users have some flexibility... if it's open sourced (how to make the list/content) then you can do that for yourself and the liability is all yours :) -Chris
Re: Atrivo/Intercage: Now Only 1 Upstream
On Wed, Sep 17, 2008 at 1:32 PM, David Ulevitch <[EMAIL PROTECTED]> wrote: > Christopher Morrow wrote: > >> How about providing some open-source intelligence in a centralized and >> machine-parsable fashion (perhaps with community input of intel even) >> which would allow better decsions to be made? > > Reputation based on src_addr is /so/ 2005. ASN has a few more legs > perhaps... but... > > All the growth in Internet-connected compute clouds (EC2, AppNexus, GoGrid, > etc.) makes any system based around IP reputation decidedly less useful. > there is more than 'srcip' you can use to judge reputation on... if you have something 'not a router' you can even implement other options... Adding things like ttl's to the entries, sliding the reputation on that as well. It's not just 'src ip'. ASN is a really big hammer > At the end of the day, nobody is going to drop packets for amazon's IP > space. > nope, but amazon can/may-be-able-to do some protections on their side, or individuals could choose to block bits/pieces of amazon, and they have already. > -David > >
RE: Atrivo/Intercage: Now Only 1 Upstream
> I occasionally get in to an argument with a customer who is trying to > get mail from someone after a spam run came out of a google mail server > and landed it on a DNSBL. The argument presented to me always boils down > to "Google could never do anything wrong" or "Google is too big to do > anything wrong" and I should immediately stop recommending any DNSBL > that would dare to block Google. > > ~Seth A more rational version of this argument would be that blocking Google's mail servers will obviously have large amounts of collatarel damage. Any DNSBL that blocks Google's mail servers, other than perhaps in sufficiently serious situations to justify this level of collatarel damage, shouldn't be recommended. You should provide a way for customers to opt out of your blacklists. Many people are perfectly happy to run their own spam filtering software and retain the capability to skim (or analyze) their spam. If you provide a way for your customer to do this, point them to it. If not, that is a failing on your part. (Though of course it's always possible you have cost/benefit arguments that justify not providing that service.) Some people would really like email to be as reliable as possible, even if that means they have to wade through a lot of spam. At least this gives them ability to whitelist sources that are important to them personally. David Schwartz <[EMAIL PROTECTED]>
Re: Atrivo/Intercage: Now Only 1 Upstream
Patrick W. Gilmore wrote: On Sep 17, 2008, at 1:32 PM, David Ulevitch wrote: At the end of the day, nobody is going to drop packets for amazon's IP space. I'm afraid reality disagrees with you - there already are networks doing it. Being big does not guarantee you ability to do Bad Things. I didn't imply that it did. But the ability to block without causing significant collateral damage becomes more and more difficult as IPs become less tied to the organization using them. That said, you're right that people are doing it now. Consensus from friends running their apps on EC2 is that you can't expect to be able to send any email from EC2 and hope for a high deliverability rate.
Re: Atrivo/Intercage: Now Only 1 Upstream
David Schwartz wrote: >> I occasionally get in to an argument with a customer who is trying to >> get mail from someone after a spam run came out of a google mail server >> and landed it on a DNSBL. The argument presented to me always boils down >> to "Google could never do anything wrong" or "Google is too big to do >> anything wrong" and I should immediately stop recommending any DNSBL >> that would dare to block Google. >> >> ~Seth > > A more rational version of this argument would be that blocking Google's > mail servers will obviously have large amounts of collatarel damage. Any > DNSBL that blocks Google's mail servers, other than perhaps in sufficiently > serious situations to justify this level of collatarel damage, shouldn't be > recommended. > > You should provide a way for customers to opt out of your blacklists. Many > people are perfectly happy to run their own spam filtering software and > retain the capability to skim (or analyze) their spam. > > If you provide a way for your customer to do this, point them to it. If not, > that is a failing on your part. (Though of course it's always possible you > have cost/benefit arguments that justify not providing that service.) > > Some people would really like email to be as reliable as possible, even if > that means they have to wade through a lot of spam. At least this gives them > ability to whitelist sources that are important to them personally. > Oh, they can. They have full control of everything hardcore filtering to nothing at all and anything in between. They could prune out the DNSBL they didn't like, turn off DNSBL completely, whitelist the source CIDR range (which I gave them), whitelist the sender's address/domain, etc. There was 15 different ways they could have fixed it, but didn't want to. I can't really say why. All they would say is "it's Google." ~Seth
Re: Atrivo/Intercage: Now Only 1 Upstream
Some people would really like email to be as reliable as possible, even if that means they have to wade through a lot of spam. By what twisted logic can a system where desired email is found when " they have to wade through a lot of spam"? Have you ever inadvertently deleted a desired item in the middle of a delete-yes-delete-yes-delete-yes-delete-yes-delete-yes-delete-yes sequence that went on for "a lot of spam"? How many times? Did you recover all of the desired items? How do you know that? To me a reliable system is one that delivers what I want and only what I want every time. And having to pick the pepper out of the flysh*t is not my idea of "reliable".
Any group(s) discounts to NANOG in LA?
I'm so close to it, not attending is not really an option.. Peter -- ピーター
Atrivo Update
I've been in touch with all of the upstream transit providers currently routing Atrivo/Intercage netblocks. Without naming any names, they are all aware, and working on getting them pulled in accordiance with their AUPs. Hats off particularly to NTT and AboveNet for going the extra mile here. (Unfortuantely, I understand sales and contractual pushback can sometimes put a damper on these things.) Gas is still expensive, so Drive Slow, Paul Wall
Re: Atrivo/Intercage: Now Only 1 Upstream
On Wednesday 17 September 2008 16:53:35 Laurence F. Sheldon, Jr. wrote: > > Some people would really like email to be as reliable as possible, even > > if that means they have to wade through a lot of spam. > > By what twisted logic can a system where desired email is found when " > they have to wade through a lot of spam"? When our spam rate here is 90% (27,000 or more spam per week for 3,000 good messages) 'wading through spam' translates to 'finding real messages is like finding a needle in a pr0n haystack'. It's amazing how many false positives and annoyances I get with greylisting, though.
Re: Atrivo/Intercage: Now Only 1 Upstream
On Wed, 17 Sep 2008, David Ulevitch wrote: Reputation based on src_addr is /so/ 2005. ASN has a few more legs perhaps... but... All the growth in Internet-connected compute clouds (EC2, AppNexus, GoGrid, etc.) makes any system based around IP reputation decidedly less useful. At the end of the day, nobody is going to drop packets for amazon's IP space. While I can't speak for the others on your list, we have been putting a fair amount of thought into abuse detection and mitigation at GoGrid. We are well aware of the problems we would have if our address space were to end up with a bad reputation. If stuff does get through that shouldn't, please contact [EMAIL PROTECTED] and we'll take care of it. -Steve
Re: Any group(s) discounts to NANOG in LA?
2008/9/17 Peter Serwe <[EMAIL PROTECTED]> > I'm so close to it, not attending is not really an option.. Peter, Your message was a little cryptic, but I assume you are inquiring about the accomodations. If you go to www.nanog.org, and then click on the link entitled 'Hotel Information,' (just look for the bright red text) it leads you to: http://www.nanog.org/meetings/nanog44/hotel.php Where you can find all sorts of information. But book now, the rate expires tomorrow! Saul P.S. There are always options in life, don't give up hope.
Re: Any group(s) discounts to NANOG in LA?
Actually, I was inquiring about the registration fee. I live close enough and my gear is a few buildings down from the location. Peter On Wed, Sep 17, 2008 at 5:02 PM, Saul Moll <[EMAIL PROTECTED]> wrote: > 2008/9/17 Peter Serwe <[EMAIL PROTECTED]> >> I'm so close to it, not attending is not really an option.. > > Peter, > > Your message was a little cryptic, but I assume you are > inquiring about the accomodations. > > If you go to www.nanog.org, and then click on the link entitled > 'Hotel Information,' (just look for the bright red text) it leads you to: > > http://www.nanog.org/meetings/nanog44/hotel.php > > Where you can find all sorts of information. But book now, the > rate expires tomorrow! > > Saul > > P.S. There are always options in life, don't give up hope. > -- ピーター
[NANOG-announce] NANOG44 Updates
Hello Everyone:> As Philip Smith indicated... a few more update messages to the community will be coming, and here is one of them. First, Merit would like to draw your attention to the Hotel Reservation link http://nanog.org/meetings/nanog44/hotel.php An IMPORTANT NOTE to be aware of is, the Hotel room block rate EXPIRES on FRIDAY, Sept. 19! Merit has reserved rooms for the community, so please do reserve your room before the deadline. Just an easy click away. So now that you have reserved your room, you should check out the updated NANOG44 meeting agenda. http://nanog.org/meetings/nanog44/agenda.php Highlights include: Updated presentations and content information, along with meeting room assignments. Soon, Merit will also highlight which presentations will be broadcast and which will be encoded for future reference. For the first time while at NANOG, Merit will have a room assigned to view the Fall 2008 Internet2 Member Meeting netcast. There are evening events on Sunday, Monday and Tuesday!! And we have a very exciting joint session with ARIN on Wednesday morning. Lastly, the [EMAIL PROTECTED] email list will help you keep in touch with each other. It will also be the distribution method for sharing additional site and meeting specific information. Make sure if you are attending, you are subscribed!! Again, on behalf of Merit Network, the NANOG SC and PC, we encourage you to attend this exciting meeting. We are confident this is one meeting you will not want to miss !! Hope to see many of you in LA and as always, if you have any questions or concerns regarding the meeting venue or registration, please send a note to [EMAIL PROTECTED] Sincerely, Betty Burke Merit/NANOG Project Manager Merit Network Inc. Merit/NANOG Project Manager ___ NANOG-announce mailing list [EMAIL PROTECTED] http://mailman.nanog.org/mailman/listinfo/nanog-announce
RE: Atrivo/Intercage: Now Only 1 Upstream
Welcome the Internet version of "Too big to fail". I like the corollary: If it's too big to fail, it's too big, and needs to be broken up. Otherwise, we get an oligarchy, > -Original Message- > From: Seth Mattinen [mailto:[EMAIL PROTECTED] > Sent: Wednesday, September 17, 2008 11:27 AM > To: nanog@nanog.org > Subject: Re: Atrivo/Intercage: Now Only 1 Upstream > > Lamar Owen wrote: > > On Wednesday 17 September 2008 13:34:22 Patrick W. Gilmore wrote: > >> On Sep 17, 2008, at 1:32 PM, David Ulevitch wrote: > >>> At the end of the day, nobody is going to drop packets > for amazon's > >>> IP space. > > > >> I'm afraid reality disagrees with you - there already are networks > >> doing it. > > > > Indeed. Google's e-mail servers get on the various DNSBL's > frequently. > > > I occasionally get in to an argument with a customer who is > trying to get mail from someone after a spam run came out of > a google mail server and landed it on a DNSBL. The argument > presented to me always boils down to "Google could never do > anything wrong" or "Google is too big to do anything wrong" > and I should immediately stop recommending any DNSBL that > would dare to block Google. > > ~Seth > >
Mechanisms for a multi-homed host to pick the best router
(My apologies, in advance, for the fact that this question is very long winded.) I have a server which is multi-homed to N routers as shown below: +---+ R1---| | | | R2---| | ... | S | | | Rn---| | +---+ This server is a host; it is not a router in the sense that it will never forward any packets (but it might run routing protocols as discussed below). Also, for the sake of simplicity in this discussion, let's say this server only receives inbound TCP connections; it never initiates outbound TCP connections. Finally, this server has a loopback address L. All traffic destined to the server uses address L as the destination address. All N routers have a static route to L and inject that route into their routing protocol (possibly as part of an aggregate). Now, imagine the server receives an inbound connection from another host whose address is A. Thus, the TCP SYN packet which S receives has source address A and destination address L. When the server sends TCP traffic for that same connection back to host A, it needs to pick one of the N routers, in other words, it needs to pick an outbound interface from its N interfaces. Traditionally, this is done by doing a best-match lookup for address A in the forwarding table of the server. One could install a ECMP default route which points to all N routers. In this case, the downstream router would essentially be picked at random (for each connection, assuming 5-tuple hashing). The problem is that some routers are "better" than other routers in the sense that they are closer to the final destination address A. (For example, each router could be connected to a different ISP.) One way for the server to pick the "optimal" downstream router, is to run "stub BGP" between the server and each of the routers. By "stub BGP" I mean that the server uses the BGP session only to learn routes. It advertises its own loopback L, but it never advertises any other routes, and it never propagates and routes from one BGP session to another BGP session. The server would have N BGP sessions and learn the full default-free BGP route table over each of those sessions. In other words, the server would end up with approximately N x 250,000 routes in its RIB and 250,000 routes in its FIB. While this approach would certainly allow the server to pick the optimal downstream router in all cases, I would prefer not to run routing protocols on this server for a number of reasons: - I don't want to the spend memory and CPU on such large RIBs and FIBs. - I'm afraid that other routers will attempt to forward traffic through the server (due to accidental misconfigurations) once it starts participating in the routing protocols. - Since there might be many of these servers (many more than the number of routers) I might end up stretching the routers beyond their scaling limits (number of BGP sessions, link state database size, etc.) and destabilizing the network. - I know there are good open source implementation of routing protocols, but still, I'm nervous that any instability or bugs on the servers could end up screwing up the routers (e.g. persistent BGP flaps). - One possible variation is that the server is a client of some route-reflectors which are not in the forwarding path (i.e. next-hop-self is not enabled). In that case, I might end up needing to do BGP next-hop resolution for a very large number of BGP next-hops. This, in turn, implies that the server might need to also run OSPF in a very large flat area 0. For all these reasons, I don't want to run BGP on the server. Someone suggested an idea to me which seems almost to simple to work, but I cannot find any good reason why it would not work. The idea is "the server simply sends all outbound traffic for the TCP connection out over the same interface over which the most recent TCP traffic for that connection was received". So, for example, if the server receives the SYN from router R3, it would send the SYN ACK and all subsequent packets for the TCP connection over that same interface R3. If the inbound packets for that same TCP connection start arriving from a different router (e.g. because of link failure), say R4, then the server also switches the outbound packets to that same router R4. I am aware that routing is not always symmetrical. In other words, I am aware that the best route from A to Z might be A->B->C->Z while the best route from Z to A might be Z->D->A. However, since the IP routing tables form an inverted tree, it seems to me that in realistic scenarios the traffic should still arrive at A (maybe over a non-optimal path in rare cases) if Z sends the reverse traffic to C instead of D. It seems unlikely (impossible?) that this would cause a routing loop. I can think of the following problems with this approach: (Problem 1) It only works for inbound TCP connections and not for outbound TCP connections. For outbound TCP connections we would not know which router to send the fi
Re: Mechanisms for a multi-homed host to pick the best router
Cayle Spandon wrote: I have a server which is multi-homed to N routers as shown below: +---+ R1---| | | | R2---| | ... | S | | | Rn---| | +---+ This server is a host; it is not a router in the sense that it will never forward any packets (but it might run routing protocols as discussed below). This is going to be the stupid question of the day, but unless you have a route policy (in which case, what was the question again?) why would you not sent the reply out the same spigot you go the request on?
Re: Mechanisms for a multi-homed host to pick the best router
[EMAIL PROTECTED] ("Cayle Spandon") writes: > (My apologies, in advance, for the fact that this question is very long > winded.) np. > I have a server which is multi-homed to N routers as shown below: > > +---+ > R1---| | > | | > R2---| | > ... | S | > | | > Rn---| | > +---+ > > This server is a host; it is not a router in the sense that it will never > forward any packets (but it might run routing protocols as discussed below). > > Also, for the sake of simplicity in this discussion, let's say this server > only receives inbound TCP connections; it never initiates outbound TCP > connections. > > Finally, this server has a loopback address L. All traffic destined to the > server uses address L as the destination address. All N routers have a > static route to L and inject that route into their routing protocol > (possibly as part of an aggregate). > > Now, imagine the server receives an inbound connection from another host > whose address is A. Thus, the TCP SYN packet which S receives has source > address A and destination address L. ... > For all these reasons, I don't want to run BGP on the server. "too many moving parts." > Someone suggested an idea to me which seems almost to simple to work, but I > cannot find any good reason why it would not work. > > The idea is "the server simply sends all outbound traffic for the TCP > connection out over the same interface over which the most recent TCP > traffic for that connection was received". > > So, for example, if the server receives the SYN from router R3, it would > send the SYN ACK and all subsequent packets for the TCP connection over that > same interface R3. > ... right idea. works great. see the following: http://www.academ.com/nanog/feb1997/multihoming.html http://www.irbs.net/internet/nanog/9706/0232.html http://gatekeeper.dec.com/pub/misc/vixie/ifdefault/ > ... > I can think of the following problems with this approach: > > (Problem 1) It only works for inbound TCP connections and not for outbound > TCP connections. For outbound TCP connections we would not know which router > to send the first SYN packet to. you said above you only needed inbound. for outbound and udp: round robin. > ... > My question for the NANOG community are these: > > (Question 1) Can you think of any additional problems with this approach? > Specifically, I am interested in persistent failures in the absence of > topology changes. topology change frequency is in a different order of magnitude than the usual tcp session startup frequency, so unless you've got long running tcp sessions which won't restart on a connection reset, you've got no problem, and if you do have that kind of tcp session, you've already got problems. > (Question 2) Is there another mechanism for the server (a multi-homed host) > to pick a best router, short of running stub BGP? Are there any standards > for this? there are a bazillion patented and/or ubersecret ways to do this. noone has ever demonstrated anything that works better than an undercommitted network with undercommitted connections to other undercommitted first-hop networks. > (Question 3) If the answer to question 2 is "no", is there any interest > in standardizing a protocol for a multi-homed host to pick a best > next-hop router? One could think of this is a host-to-router routing > protocol. One might call the existing routing protocols router-to-router > protocols (because I think we are abusing them by running them on > hosts). This is somewhat analogous to the multicast routing world where > we use different protocols for router-to-router multicast (PIM) versus > host-to-router (IGMP). sadly, this has been tried, but it always runs into least-cost routing issues whereby not only the predicted connection quality but also contract details like whether this is over or under the per-period minima and how many quatloos per kilosegment it will cost all have to get exchanged at high speed with low latency and good accuracy. been there, did that, got no useful t-shirt even. -- Paul Vixie