Port 2323/tcp

2016-11-16 Thread Stephen Satchell
I've been seeing a lot of rejections in my logs for 2323/tcp.  According
to the Storm Center, this is what the Mirai botnet scanner uses to look
for other target devices.

Is it worthwhile to report sightings to the appropriate abuse addresses?
 (That assumes there *is* an abuse address associated with the IPv4
address that is the source.)  Would administrations receiving these
notices do anything with them?

Alternatively, is there anyone collecting this information from people
like me to expose the IP addresses of possible infections?

I am toying with the idea of setting up a honey-pot, but I'm so far
behind with $DAYJOB that such a project will have to wait a bit.

I want to be a good net citizen.  I also want to make sure I'm not
wasting my time.

Today's crop:

> 1.34.169.183
> 12.221.236.2
> 14.138.22.12
> 14.169.142.30
> 14.174.71.158
> 14.177.197.101
> 31.168.146.33
> 31.168.212.174
> 36.71.224.179
> 36.72.253.206
> 37.106.18.86
> 42.115.187.189
> 42.117.254.248
> 42.119.228.222
> 43.225.195.180
> 46.59.6.249
> 49.114.192.91
> 58.11.238.146
> 58.186.231.59
> 59.8.136.21
> 59.49.191.4
> 59.57.68.56
> 59.126.35.47
> 59.126.242.70
> 59.127.104.67
> 59.127.242.8
> 60.251.125.125
> 61.219.165.38
> 73.84.152.194
> 78.179.113.148
> 78.186.61.30
> 78.189.169.142
> 78.226.222.234
> 79.119.74.255
> 81.16.8.193
> 81.101.233.14
> 81.214.121.43
> 81.214.134.133
> 81.214.137.197
> 82.77.68.189
> 83.233.40.141
> 85.96.202.199
> 85.99.121.41
> 85.238.103.111
> 86.121.225.48
> 87.251.252.22
> 88.249.224.167
> 89.122.87.239
> 89.151.128.198
> 90.177.91.201
> 92.53.52.235
> 92.55.231.90
> 94.31.239.178
> 94.254.41.152
> 94.255.162.90
> 95.78.245.54
> 95.106.34.92
> 95.161.236.182
> 96.57.103.19
> 101.0.43.13
> 108.203.68.245
> 110.55.108.215
> 110.136.233.10
> 112.133.69.176
> 112.165.93.130
> 112.186.42.216
> 113.5.224.110
> 113.161.64.11
> 113.169.18.153
> 113.171.98.158
> 113.172.4.204
> 113.183.204.112
> 113.188.44.246
> 114.32.28.219
> 114.32.87.32
> 114.32.189.5
> 114.34.29.167
> 114.34.170.10
> 114.35.153.123
> 114.226.53.133
> 115.76.127.118
> 116.73.65.248
> 116.100.170.92
> 117.0.7.77
> 117.1.26.234
> 117.195.254.3
> 118.32.44.99
> 118.42.15.21
> 118.43.112.120
> 118.100.64.159
> 118.163.191.208
> 119.199.160.207
> 119.202.78.47
> 120.71.215.81
> 121.129.203.22
> 121.178.104.129
> 121.180.53.143
> 122.117.245.28
> 123.9.72.86
> 123.16.78.77
> 123.23.49.149
> 123.24.108.10
> 123.24.250.187
> 123.25.74.209
> 123.27.159.13
> 123.240.245.72
> 124.66.99.251
> 124.131.28.38
> 125.166.193.206
> 125.227.138.132
> 138.204.203.66
> 171.97.245.221
> 171.224.7.147
> 171.226.20.220
> 171.232.118.93
> 171.248.210.120
> 171.249.223.213
> 171.250.26.209
> 173.56.21.67
> 175.138.81.130
> 175.203.202.232
> 175.207.137.139
> 175.211.251.156
> 177.207.49.108
> 177.207.67.170
> 177.223.52.193
> 178.222.246.96
> 179.4.140.63
> 179.235.55.39
> 179.253.163.107
> 180.73.117.62
> 180.254.224.10
> 182.37.156.98
> 182.180.80.75
> 182.180.123.43
> 183.46.49.216
> 183.144.245.235
> 186.19.48.158
> 186.69.170.130
> 186.219.1.156
> 187.104.248.17
> 187.211.63.51
> 188.209.153.15
> 189.101.220.244
> 189.234.9.147
> 191.103.35.250
> 191.180.198.31
> 191.249.21.41
> 196.207.83.23
> 197.224.37.108
> 201.243.225.103
> 210.178.250.121
> 211.7.146.51
> 211.216.202.191
> 213.5.216.213
> 213.14.195.100
> 213.170.76.149
> 217.129.243.48
> 218.161.121.178
> 218.186.43.224
> 220.85.169.133
> 220.132.111.124
> 220.133.24.142
> 220.133.198.71
> 220.133.234.229
> 220.134.132.200
> 220.134.193.133
> 220.135.64.43
> 221.145.147.78
> 221.159.105.17
> 221.167.64.53
> 222.254.238.188
> 223.154.223.159



Re: Port 2323/tcp

2016-11-16 Thread Mel Beckman
It's pretty much part of the IBR now. And what can a provider do, really? It's 
not likely he will expend much effort blocking customers. Maybe we should all 
start filtering 2323?

-mel via cell

> On Nov 16, 2016, at 11:53 AM, Stephen Satchell  wrote:
> 
> I've been seeing a lot of rejections in my logs for 2323/tcp.  According
> to the Storm Center, this is what the Mirai botnet scanner uses to look
> for other target devices.
> 
> Is it worthwhile to report sightings to the appropriate abuse addresses?
> (That assumes there *is* an abuse address associated with the IPv4
> address that is the source.)  Would administrations receiving these
> notices do anything with them?
> 
> Alternatively, is there anyone collecting this information from people
> like me to expose the IP addresses of possible infections?
> 
> I am toying with the idea of setting up a honey-pot, but I'm so far
> behind with $DAYJOB that such a project will have to wait a bit.
> 
> I want to be a good net citizen.  I also want to make sure I'm not
> wasting my time.
> 
> Today's crop:
> 
>> 1.34.169.183
>> 12.221.236.2
>> 14.138.22.12
>> 14.169.142.30
>> 14.174.71.158
>> 14.177.197.101
>> 31.168.146.33
>> 31.168.212.174
>> 36.71.224.179
>> 36.72.253.206
>> 37.106.18.86
>> 42.115.187.189
>> 42.117.254.248
>> 42.119.228.222
>> 43.225.195.180
>> 46.59.6.249
>> 49.114.192.91
>> 58.11.238.146
>> 58.186.231.59
>> 59.8.136.21
>> 59.49.191.4
>> 59.57.68.56
>> 59.126.35.47
>> 59.126.242.70
>> 59.127.104.67
>> 59.127.242.8
>> 60.251.125.125
>> 61.219.165.38
>> 73.84.152.194
>> 78.179.113.148
>> 78.186.61.30
>> 78.189.169.142
>> 78.226.222.234
>> 79.119.74.255
>> 81.16.8.193
>> 81.101.233.14
>> 81.214.121.43
>> 81.214.134.133
>> 81.214.137.197
>> 82.77.68.189
>> 83.233.40.141
>> 85.96.202.199
>> 85.99.121.41
>> 85.238.103.111
>> 86.121.225.48
>> 87.251.252.22
>> 88.249.224.167
>> 89.122.87.239
>> 89.151.128.198
>> 90.177.91.201
>> 92.53.52.235
>> 92.55.231.90
>> 94.31.239.178
>> 94.254.41.152
>> 94.255.162.90
>> 95.78.245.54
>> 95.106.34.92
>> 95.161.236.182
>> 96.57.103.19
>> 101.0.43.13
>> 108.203.68.245
>> 110.55.108.215
>> 110.136.233.10
>> 112.133.69.176
>> 112.165.93.130
>> 112.186.42.216
>> 113.5.224.110
>> 113.161.64.11
>> 113.169.18.153
>> 113.171.98.158
>> 113.172.4.204
>> 113.183.204.112
>> 113.188.44.246
>> 114.32.28.219
>> 114.32.87.32
>> 114.32.189.5
>> 114.34.29.167
>> 114.34.170.10
>> 114.35.153.123
>> 114.226.53.133
>> 115.76.127.118
>> 116.73.65.248
>> 116.100.170.92
>> 117.0.7.77
>> 117.1.26.234
>> 117.195.254.3
>> 118.32.44.99
>> 118.42.15.21
>> 118.43.112.120
>> 118.100.64.159
>> 118.163.191.208
>> 119.199.160.207
>> 119.202.78.47
>> 120.71.215.81
>> 121.129.203.22
>> 121.178.104.129
>> 121.180.53.143
>> 122.117.245.28
>> 123.9.72.86
>> 123.16.78.77
>> 123.23.49.149
>> 123.24.108.10
>> 123.24.250.187
>> 123.25.74.209
>> 123.27.159.13
>> 123.240.245.72
>> 124.66.99.251
>> 124.131.28.38
>> 125.166.193.206
>> 125.227.138.132
>> 138.204.203.66
>> 171.97.245.221
>> 171.224.7.147
>> 171.226.20.220
>> 171.232.118.93
>> 171.248.210.120
>> 171.249.223.213
>> 171.250.26.209
>> 173.56.21.67
>> 175.138.81.130
>> 175.203.202.232
>> 175.207.137.139
>> 175.211.251.156
>> 177.207.49.108
>> 177.207.67.170
>> 177.223.52.193
>> 178.222.246.96
>> 179.4.140.63
>> 179.235.55.39
>> 179.253.163.107
>> 180.73.117.62
>> 180.254.224.10
>> 182.37.156.98
>> 182.180.80.75
>> 182.180.123.43
>> 183.46.49.216
>> 183.144.245.235
>> 186.19.48.158
>> 186.69.170.130
>> 186.219.1.156
>> 187.104.248.17
>> 187.211.63.51
>> 188.209.153.15
>> 189.101.220.244
>> 189.234.9.147
>> 191.103.35.250
>> 191.180.198.31
>> 191.249.21.41
>> 196.207.83.23
>> 197.224.37.108
>> 201.243.225.103
>> 210.178.250.121
>> 211.7.146.51
>> 211.216.202.191
>> 213.5.216.213
>> 213.14.195.100
>> 213.170.76.149
>> 217.129.243.48
>> 218.161.121.178
>> 218.186.43.224
>> 220.85.169.133
>> 220.132.111.124
>> 220.133.24.142
>> 220.133.198.71
>> 220.133.234.229
>> 220.134.132.200
>> 220.134.193.133
>> 220.135.64.43
>> 221.145.147.78
>> 221.159.105.17
>> 221.167.64.53
>> 222.254.238.188
>> 223.154.223.159
> 


Re: Port 2323/tcp

2016-11-16 Thread Mike Hammett
Probably best to go with A) what we could do in the best of situations and B) 
what the rest will do. 

Some of us are last mile networks and *DO* care. 




- 
Mike Hammett 
Intelligent Computing Solutions 
http://www.ics-il.com 

Midwest-IX 
http://www.midwest-ix.com 

- Original Message -

From: "Mel Beckman"  
To: l...@satchell.net 
Cc: nanog@nanog.org 
Sent: Wednesday, November 16, 2016 11:25:34 AM 
Subject: Re: Port 2323/tcp 

It's pretty much part of the IBR now. And what can a provider do, really? It's 
not likely he will expend much effort blocking customers. Maybe we should all 
start filtering 2323? 

-mel via cell 

> On Nov 16, 2016, at 11:53 AM, Stephen Satchell  wrote: 
> 
> I've been seeing a lot of rejections in my logs for 2323/tcp. According 
> to the Storm Center, this is what the Mirai botnet scanner uses to look 
> for other target devices. 
> 
> Is it worthwhile to report sightings to the appropriate abuse addresses? 
> (That assumes there *is* an abuse address associated with the IPv4 
> address that is the source.) Would administrations receiving these 
> notices do anything with them? 
> 
> Alternatively, is there anyone collecting this information from people 
> like me to expose the IP addresses of possible infections? 
> 
> I am toying with the idea of setting up a honey-pot, but I'm so far 
> behind with $DAYJOB that such a project will have to wait a bit. 
> 
> I want to be a good net citizen. I also want to make sure I'm not 
> wasting my time. 
> 
> Today's crop: 
> 
>> 1.34.169.183 
>> 12.221.236.2 
>> 14.138.22.12 
>> 14.169.142.30 
>> 14.174.71.158 
>> 14.177.197.101 
>> 31.168.146.33 
>> 31.168.212.174 
>> 36.71.224.179 
>> 36.72.253.206 
>> 37.106.18.86 
>> 42.115.187.189 
>> 42.117.254.248 
>> 42.119.228.222 
>> 43.225.195.180 
>> 46.59.6.249 
>> 49.114.192.91 
>> 58.11.238.146 
>> 58.186.231.59 
>> 59.8.136.21 
>> 59.49.191.4 
>> 59.57.68.56 
>> 59.126.35.47 
>> 59.126.242.70 
>> 59.127.104.67 
>> 59.127.242.8 
>> 60.251.125.125 
>> 61.219.165.38 
>> 73.84.152.194 
>> 78.179.113.148 
>> 78.186.61.30 
>> 78.189.169.142 
>> 78.226.222.234 
>> 79.119.74.255 
>> 81.16.8.193 
>> 81.101.233.14 
>> 81.214.121.43 
>> 81.214.134.133 
>> 81.214.137.197 
>> 82.77.68.189 
>> 83.233.40.141 
>> 85.96.202.199 
>> 85.99.121.41 
>> 85.238.103.111 
>> 86.121.225.48 
>> 87.251.252.22 
>> 88.249.224.167 
>> 89.122.87.239 
>> 89.151.128.198 
>> 90.177.91.201 
>> 92.53.52.235 
>> 92.55.231.90 
>> 94.31.239.178 
>> 94.254.41.152 
>> 94.255.162.90 
>> 95.78.245.54 
>> 95.106.34.92 
>> 95.161.236.182 
>> 96.57.103.19 
>> 101.0.43.13 
>> 108.203.68.245 
>> 110.55.108.215 
>> 110.136.233.10 
>> 112.133.69.176 
>> 112.165.93.130 
>> 112.186.42.216 
>> 113.5.224.110 
>> 113.161.64.11 
>> 113.169.18.153 
>> 113.171.98.158 
>> 113.172.4.204 
>> 113.183.204.112 
>> 113.188.44.246 
>> 114.32.28.219 
>> 114.32.87.32 
>> 114.32.189.5 
>> 114.34.29.167 
>> 114.34.170.10 
>> 114.35.153.123 
>> 114.226.53.133 
>> 115.76.127.118 
>> 116.73.65.248 
>> 116.100.170.92 
>> 117.0.7.77 
>> 117.1.26.234 
>> 117.195.254.3 
>> 118.32.44.99 
>> 118.42.15.21 
>> 118.43.112.120 
>> 118.100.64.159 
>> 118.163.191.208 
>> 119.199.160.207 
>> 119.202.78.47 
>> 120.71.215.81 
>> 121.129.203.22 
>> 121.178.104.129 
>> 121.180.53.143 
>> 122.117.245.28 
>> 123.9.72.86 
>> 123.16.78.77 
>> 123.23.49.149 
>> 123.24.108.10 
>> 123.24.250.187 
>> 123.25.74.209 
>> 123.27.159.13 
>> 123.240.245.72 
>> 124.66.99.251 
>> 124.131.28.38 
>> 125.166.193.206 
>> 125.227.138.132 
>> 138.204.203.66 
>> 171.97.245.221 
>> 171.224.7.147 
>> 171.226.20.220 
>> 171.232.118.93 
>> 171.248.210.120 
>> 171.249.223.213 
>> 171.250.26.209 
>> 173.56.21.67 
>> 175.138.81.130 
>> 175.203.202.232 
>> 175.207.137.139 
>> 175.211.251.156 
>> 177.207.49.108 
>> 177.207.67.170 
>> 177.223.52.193 
>> 178.222.246.96 
>> 179.4.140.63 
>> 179.235.55.39 
>> 179.253.163.107 
>> 180.73.117.62 
>> 180.254.224.10 
>> 182.37.156.98 
>> 182.180.80.75 
>> 182.180.123.43 
>> 183.46.49.216 
>> 183.144.245.235 
>> 186.19.48.158 
>> 186.69.170.130 
>> 186.219.1.156 
>> 187.104.248.17 
>> 187.211.63.51 
>> 188.209.153.15 
>> 189.101.220.244 
>> 189.234.9.147 
>> 191.103.35.250 
>> 191.180.198.31 
>> 191.249.21.41 
>> 196.207.83.23 
>> 197.224.37.108 
>> 201.243.225.103 
>> 210.178.250.121 
>> 211.7.146.51 
>> 211.216.202.191 
>> 213.5.216.213 
>> 213.14.195.100 
>> 213.170.76.149 
>> 217.129.243.48 
>> 218.161.121.178 
>> 218.186.43.224 
>> 220.85.169.133 
>> 220.132.111.124 
>> 220.133.24.142 
>> 220.133.198.71 
>> 220.133.234.229 
>> 220.134.132.200 
>> 220.134.193.133 
>> 220.135.64.43 
>> 221.145.147.78 
>> 221.159.105.17 
>> 221.167.64.53 
>> 222.254.238.188 
>> 223.154.223.159 
> 



pay.gov and IPv6

2016-11-16 Thread Carl Byington
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Following up on a two year old thread, one of my clients just hit this
problem. The failure is not that www.pay.gov is not reachable over ipv6
(2605:3100:fffd:100::15). They accept (TCP handshake) the port 443
connection, but the connection then hangs waiting for the TLS handshake.

openssl s_client -connect www.pay.gov:443

openssl s_client -servername www.pay.gov -connect 199.169.192.21:443

Browsers (at least firefox) see that as a very slow site, and it does
not trigger their happy eyeballs fast failover to ipv4.


-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.14 (GNU/Linux)

iEYEAREKAAYFAlgoo9AACgkQL6j7milTFsEIhwCfS2nVWDwjGk5LLaPpAntLC8la
RpMAniYdP2OmTcx4+lJmaIu538LK9pqJ
=SOdT
-END PGP SIGNATURE-




198.154.60.0/22 bogon/hijacked?

2016-11-16 Thread Jeremy Parsons


pay.gov and IPv6

2016-11-16 Thread Carl Byington
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Following up on a two year old thread, one of my clients just hit this
problem. The failure is not that www.pay.gov is not reachable over ipv6
(2605:3100:fffd:100::15). They accept (TCP handshake) the port 443
connection, but the connection then hangs waiting for the TLS handshake.

openssl s_client -connect www.pay.gov:443

openssl s_client -servername www.pay.gov -connect 199.169.192.21:443

Browsers (at least firefox) see that as a very slow site, and it does
not trigger their happy eyeballs fast failover to ipv4.


-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.14 (GNU/Linux)

iEYEAREKAAYFAlgrjDEACgkQL6j7milTFsG8OwCgh5yRxxZHskjL4HVhzxIEmenA
LQgAniRMcYf/DIcg+8ve55MxUgrUbmzC
=MS8j
-END PGP SIGNATURE-




Re: Port 2323/tcp

2016-11-16 Thread Otto Monnig
We’ve been monitoring/logging/blocking ports 23 and 2323 at our site for the 
past several weeks, after remediating a 60-75 Mbps attack on a 100 Mbps fiber 
feed.

On port 23, we have accumulated 377,319 different IP addresses hitting our 
systems.  For port 2323, 42,913 different IP addresses.

The addresses are widely distributed, making aggregation nearly impossible.

Below is a list of offending subnets, ranked by number of offenders (powers of 
2), sorry for the length.

14.0.0.0/8  16384
78.0.0.0/8  8192
113.0.0.0/8 8192
117.0.0.0/8 8192
122.0.0.0/8 8192
177.0.0.0/8 8192
179.0.0.0/8 8192
186.0.0.0/8 8192
187.0.0.0/8 8192
189.0.0.0/8 8192
190.0.0.0/8 8192
201.0.0.0/8 8192
1.0.0.0/8   4096
5.0.0.0/8   4096
27.0.0.0/8  4096
36.0.0.0/8  4096
37.0.0.0/8  4096
41.0.0.0/8  4096
42.0.0.0/8  4096
46.0.0.0/8  4096
49.0.0.0/8  4096
59.0.0.0/8  4096
79.0.0.0/8  4096
82.0.0.0/8  4096
88.0.0.0/8  4096
89.0.0.0/8  4096
95.0.0.0/8  4096
109.0.0.0/8 4096
110.0.0.0/8 4096
112.0.0.0/8 4096
114.0.0.0/8 4096
116.0.0.0/8 4096
118.0.0.0/8 4096
119.0.0.0/8 4096
121.0.0.0/8 4096
123.0.0.0/8 4096
124.0.0.0/8 4096
171.0.0.0/8 4096
175.0.0.0/8 4096
176.0.0.0/8 4096
178.0.0.0/8 4096
180.0.0.0/8 4096
181.0.0.0/8 4096
182.0.0.0/8 4096
183.0.0.0/8 4096
191.0.0.0/8 4096
200.0.0.0/8 4096
220.0.0.0/8 4096
31.0.0.0/8  2048
58.0.0.0/8  2048
60.0.0.0/8  2048
61.0.0.0/8  2048
77.0.0.0/8  2048
80.0.0.0/8  2048
81.0.0.0/8  2048
83.0.0.0/8  2048
85.0.0.0/8  2048
86.0.0.0/8  2048
87.0.0.0/8  2048
91.0.0.0/8  2048
92.0.0.0/8  2048
93.0.0.0/8  2048
94.0.0.0/8  2048
103.0.0.0/8 2048
111.0.0.0/8 2048
115.0.0.0/8 2048
120.0.0.0/8 2048
125.0.0.0/8 2048
151.0.0.0/8 2048
188.0.0.0/8 2048
213.0.0.0/8 2048
218.0.0.0/8 2048
222.0.0.0/8 2048
223.0.0.0/8 2048
3.0.0.0/8   1024
6.0.0.0/8   1024
7.0.0.0/8   1024
9.0.0.0/8   1024
11.0.0.0/8  1024
15.0.0.0/8  1024
16.0.0.0/8  1024
17.0.0.0/8  1024
19.0.0.0/8  1024
20.0.0.0/8  1024
21.0.0.0/8  1024
22.0.0.0/8  1024
24.0.0.0/8  1024
25.0.0.0/8  1024
26.0.0.0/8  1024
28.0.0.0/8  1024
29.0.0.0/8  1024
30.0.0.0/8  1024
33.0.0.0/8  1024
34.0.0.0/8  1024
39.0.0.0/8  1024
44.0.0.0/8  1024
48.0.0.0/8  1024
53.0.0.0/8  1024
55.0.0.0/8  1024
56.0.0.0/8  1024
57.0.0.0/8  1024
62.0.0.0/8  1024
84.0.0.0/8  1024
101.0.0.0/8 1024
102.0.0.0/8 1024
106.0.0.0/8 1024
185.0.0.0/8 1024
193.0.0.0/8 1024
194.0.0.0/8 1024
195.0.0.0/8 1024
197.0.0.0/8 1024
202.0.0.0/8 1024
203.0.0.0/8 1024
210.0.0.0/8 1024
211.0.0.0/8 1024
212.0.0.0/8 1024
214.0.0.0/8 1024
215.0.0.0/8 1024
217.0.0.0/8 1024
219.0.0.0/8 1024
221.0.0.0/8 1024
2.0.0.0/8   512
43.0.0.0/8  512
45.0.0.0/8  512
47.0.0.0/8  512
50.0.0.0/8  512
70.0.0.0/8  512
71.0.0.0/8  512
72.0.0.0/8  512
73.0.0.0/8  512
90.0.0.0/8  512
96.0.0.0/8  512
105.0.0.0/8 512
108.0.0.0/8 512
134.0.0.0/8 512
138.0.0.0/8 512
139.0.0.0/8 512
152.0.0.0/8 512
167.0.0.0/8 512
173.0.0.0/8 512
64.0.0.0/8  256
66.0.0.0/8  256
67.0.0.0/8  256
68.0.0.0/8  256
69.0.0.0/8  256
74.0.0.0/8  256
75.0.0.0/8  256
76.0.0.0/8  256
98.0.0.0/8  256
104.0.0.0/8 256
150.0.0.0/8 256
159.0.0.0/8 256
168.0.0.0/8 256
174.0.0.0/8 256
192.0.0.0/8 256
196.0.0.0/8 256
216.0.0.0/8 256
23.0.0.0/8  128
65.0.0.0/8  128
97.0.0.0/8  128
100.0.0.0/8 128
107.0.0.0/8 128
128.0.0.0/8 128
130.0.0.0/8 128
131.0.0.0/8 128
140.0.0.0/8 128
141.0.0.0/8 128
149.0.0.0/8 128
153.0.0.0/8 128
154.0.0.0/8 128
160.0.0.0/8 128
161.0.0.0/8 128
162.0.0.0/8 128
163.0.0.0/8 128
170.0.0.0/8 128
172.0.0.0/8 128
184.0.0.0/8 128
198.0.0.0/8 128
207.0.0.0/8 128
208.0.0.0/8 128
209.0.0.0/8 128
4.0.0.0/8   64
8.0.0.0/8   64
12.0.0.0/8  64
13.0.0.0/8  64
18.0.0.0/8  64
32.0.0.0/8  64
35.0.0.0/8  64
38.0.0.0/8  64
40.0.0.0/8  64
51.0.0.0/8  64
52.0.0.0/8  64
54.0.0.0/8  64
63.0.0.0/8  64
99.0.0.0/8  64
10122.0.0.0/8   64
11122.0.0.0/8   64
114122.0.0.0/8  64
126.0.0.0/8 64
129.0.0.0/8 64
132.0.0.0/8 64
133.0.0.0/8 64
135.0.0.0/8 64
136.0.0.0/8 64
137.0.0.0/8 64
142.0.0.0/8 64
143.0.0.0/8 64
144.0.0.0/8 64
145.0.0.0/8 64
146.0.0.0/8 64
147.0.0.0/8 64
148.0.0.0/8 64
155.0.0.0/8 64
156.0.0.0/8 64
157.0.0.0/8 64
158.0.0.0/8 64
164.0.0.0/8 64
165.0.0.0/8 64
166.0.0.0/8 64
169.0.0.0/8 64
199.0.0.0/8 64
204.0.0.0/8 

Re: 198.154.60.0/22 bogon/hijacked?

2016-11-16 Thread Alain Hebert
Hum,

Its a 6 weeks old entries in my routers.

Even "oddish" its 26272 coming of GTT & HE.

26272 is unassigned at ARIN.

--

My experience with GTT & HE find it curious that they let that happen.

-
Alain Hebertaheb...@pubnix.net   
PubNIX Inc.
50 boul. St-Charles
P.O. Box 26770 Beaconsfield, Quebec H9W 6G7
Tel: 514-990-5911  http://www.pubnix.netFax: 514-990-9443

On 11/13/16 19:49, Jeremy Parsons wrote:



Re: Port 2323/tcp

2016-11-16 Thread Chris Knipe
We have actively started to block 23/tcp to our customer's CPEs

Huge amounts of connection attempts / scans over our prefixes.  All IPv4,
zero on IPv6 (not yet at least).

On Wed, Nov 16, 2016 at 8:12 PM, Otto Monnig  wrote:

> We’ve been monitoring/logging/blocking ports 23 and 2323 at our site for
> the past several weeks, after remediating a 60-75 Mbps attack on a 100 Mbps
> fiber feed.
>
> On port 23, we have accumulated 377,319 different IP addresses hitting our
> systems.  For port 2323, 42,913 different IP addresses.
>
> The addresses are widely distributed, making aggregation nearly impossible.
>
> Below is a list of offending subnets, ranked by number of offenders
> (powers of 2), sorry for the length.
>
> 14.0.0.0/8  16384
> 78.0.0.0/8  8192
> 113.0.0.0/8 8192
> 117.0.0.0/8 8192
> 122.0.0.0/8 8192
> 177.0.0.0/8 8192
> 179.0.0.0/8 8192
> 186.0.0.0/8 8192
> 187.0.0.0/8 8192
> 189.0.0.0/8 8192
> 190.0.0.0/8 8192
> 201.0.0.0/8 8192
> 1.0.0.0/8   4096
> 5.0.0.0/8   4096
> 27.0.0.0/8  4096
> 36.0.0.0/8  4096
> 37.0.0.0/8  4096
> 41.0.0.0/8  4096
> 42.0.0.0/8  4096
> 46.0.0.0/8  4096
> 49.0.0.0/8  4096
> 59.0.0.0/8  4096
> 79.0.0.0/8  4096
> 82.0.0.0/8  4096
> 88.0.0.0/8  4096
> 89.0.0.0/8  4096
> 95.0.0.0/8  4096
> 109.0.0.0/8 4096
> 110.0.0.0/8 4096
> 112.0.0.0/8 4096
> 114.0.0.0/8 4096
> 116.0.0.0/8 4096
> 118.0.0.0/8 4096
> 119.0.0.0/8 4096
> 121.0.0.0/8 4096
> 123.0.0.0/8 4096
> 124.0.0.0/8 4096
> 171.0.0.0/8 4096
> 175.0.0.0/8 4096
> 176.0.0.0/8 4096
> 178.0.0.0/8 4096
> 180.0.0.0/8 4096
> 181.0.0.0/8 4096
> 182.0.0.0/8 4096
> 183.0.0.0/8 4096
> 191.0.0.0/8 4096
> 200.0.0.0/8 4096
> 220.0.0.0/8 4096
> 31.0.0.0/8  2048
> 58.0.0.0/8  2048
> 60.0.0.0/8  2048
> 61.0.0.0/8  2048
> 77.0.0.0/8  2048
> 80.0.0.0/8  2048
> 81.0.0.0/8  2048
> 83.0.0.0/8  2048
> 85.0.0.0/8  2048
> 86.0.0.0/8  2048
> 87.0.0.0/8  2048
> 91.0.0.0/8  2048
> 92.0.0.0/8  2048
> 93.0.0.0/8  2048
> 94.0.0.0/8  2048
> 103.0.0.0/8 2048
> 111.0.0.0/8 2048
> 115.0.0.0/8 2048
> 120.0.0.0/8 2048
> 125.0.0.0/8 2048
> 151.0.0.0/8 2048
> 188.0.0.0/8 2048
> 213.0.0.0/8 2048
> 218.0.0.0/8 2048
> 222.0.0.0/8 2048
> 223.0.0.0/8 2048
> 3.0.0.0/8   1024
> 6.0.0.0/8   1024
> 7.0.0.0/8   1024
> 9.0.0.0/8   1024
> 11.0.0.0/8  1024
> 15.0.0.0/8  1024
> 16.0.0.0/8  1024
> 17.0.0.0/8  1024
> 19.0.0.0/8  1024
> 20.0.0.0/8  1024
> 21.0.0.0/8  1024
> 22.0.0.0/8  1024
> 24.0.0.0/8  1024
> 25.0.0.0/8  1024
> 26.0.0.0/8  1024
> 28.0.0.0/8  1024
> 29.0.0.0/8  1024
> 30.0.0.0/8  1024
> 33.0.0.0/8  1024
> 34.0.0.0/8  1024
> 39.0.0.0/8  1024
> 44.0.0.0/8  1024
> 48.0.0.0/8  1024
> 53.0.0.0/8  1024
> 55.0.0.0/8  1024
> 56.0.0.0/8  1024
> 57.0.0.0/8  1024
> 62.0.0.0/8  1024
> 84.0.0.0/8  1024
> 101.0.0.0/8 1024
> 102.0.0.0/8 1024
> 106.0.0.0/8 1024
> 185.0.0.0/8 1024
> 193.0.0.0/8 1024
> 194.0.0.0/8 1024
> 195.0.0.0/8 1024
> 197.0.0.0/8 1024
> 202.0.0.0/8 1024
> 203.0.0.0/8 1024
> 210.0.0.0/8 1024
> 211.0.0.0/8 1024
> 212.0.0.0/8 1024
> 214.0.0.0/8 1024
> 215.0.0.0/8 1024
> 217.0.0.0/8 1024
> 219.0.0.0/8 1024
> 221.0.0.0/8 1024
> 2.0.0.0/8   512
> 43.0.0.0/8  512
> 45.0.0.0/8  512
> 47.0.0.0/8  512
> 50.0.0.0/8  512
> 70.0.0.0/8  512
> 71.0.0.0/8  512
> 72.0.0.0/8  512
> 73.0.0.0/8  512
> 90.0.0.0/8  512
> 96.0.0.0/8  512
> 105.0.0.0/8 512
> 108.0.0.0/8 512
> 134.0.0.0/8 512
> 138.0.0.0/8 512
> 139.0.0.0/8 512
> 152.0.0.0/8 512
> 167.0.0.0/8 512
> 173.0.0.0/8 512
> 64.0.0.0/8  256
> 66.0.0.0/8  256
> 67.0.0.0/8  256
> 68.0.0.0/8  256
> 69.0.0.0/8  256
> 74.0.0.0/8  256
> 75.0.0.0/8  256
> 76.0.0.0/8  256
> 98.0.0.0/8  256
> 104.0.0.0/8 256
> 150.0.0.0/8 256
> 159.0.0.0/8 256
> 168.0.0.0/8 256
> 174.0.0.0/8 256
> 192.0.0.0/8 256
> 196.0.0.0/8 256
> 216.0.0.0/8 256
> 23.0.0.0/8  128
> 65.0.0.0/8  128
> 97.0.0.0/8  128
> 100.0.0.0/8 128
> 107.0.0.0/8 128
> 128.0.0.0/8 128
> 130.0.0.0/8 128
> 131.0.0.0/8 128
> 140.0.0.0/8 128
> 141.0.0.0/8 128
> 149.0.0.0/8 128
> 153.0.0.0/8 128
> 154.0.0.0/8 128
> 160.0.0.0/8 128
> 161.0.0.0/8 128
> 162.0.0.0/8 128
> 163.0.0.0/8 128
> 170.0.0.0/8 128
> 172.0.0.0/8 128
> 184.0.0.0/8 128
> 198.0.0.0/8 128
> 207.0.0.0/8 128
> 208.0.0.0/8 128
> 209.0.0.0/8 128
> 4.0.0.0/8   64
> 8.0.0.0/8   64
> 12.0.0.0/8  64
> 13.0.0.0/8  64
> 18.0.0.0/8  64
> 32.0.0.0/8  64
> 35.0.0.0/8  64
> 38.0.0.0/8  64

Re: 198.154.60.0/22 bogon/hijacked?

2016-11-16 Thread Rene Wilhelm
Looks likeAS26272 and 198.154.60.0/22  have been deregistered about a 
week ago.


In ARIN delegation statistics from Nov 8, 
ftp://ftp.arin.net/pub/stats/arin/delegated-arin-extended-20161108 these 
are listed as assigned and allocated but in later files that changed to 
'reserved'.


RIPEstat shows 198.154.60.0/22 has been in the routing system with 
origin AS26272 since October 2012.


https://stat.ripe.net/widget/routing-history#w.resource=198.154.60.0/22

-- Rene

On 11/16/16 7:19 PM, Alain Hebert wrote:

 Hum,

 Its a 6 weeks old entries in my routers.

 Even "oddish" its 26272 coming of GTT & HE.

 26272 is unassigned at ARIN.

--

 My experience with GTT & HE find it curious that they let that happen.

-
Alain Hebertaheb...@pubnix.net
PubNIX Inc.
50 boul. St-Charles
P.O. Box 26770 Beaconsfield, Quebec H9W 6G7
Tel: 514-990-5911  http://www.pubnix.netFax: 514-990-9443

On 11/13/16 19:49, Jeremy Parsons wrote:






Re: pay.gov and IPv6

2016-11-16 Thread Mark Andrews

In message <1479249003.3937.6.ca...@ns.five-ten-sg.com>, Carl Byington writes
:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> Following up on a two year old thread, one of my clients just hit this
> problem. The failure is not that www.pay.gov is not reachable over ipv6
> (2605:3100:fffd:100::15). They accept (TCP handshake) the port 443
> connection, but the connection then hangs waiting for the TLS handshake.
> 
> openssl s_client -connect www.pay.gov:443
> 
> openssl s_client -servername www.pay.gov -connect 199.169.192.21:443
> 
> Browsers (at least firefox) see that as a very slow site, and it does
> not trigger their happy eyeballs fast failover to ipv4.

Happy eyeballs is about making the connection not whether TCP
connections work after the initial packet exchange.

I would send a physical letter to the relevent Inspector General
requesting that they ensure all web sites under their juristiction
that are supposed to be reachable from the public net get audited
regularly to ensure that IPv6 connections work from public IP space.

While you are sending the letter can you also ask why pay.gov's DNS
servers are broken.

Checking: 'pay.gov' as at 2016-11-16T20:21:28Z

pay.gov @199.169.194.28 (ns1.twai.gov.): edns=ok edns1=timeout edns@512=noopt 
ednsopt=ok edns1opt=timeout do=ok ednsflags=ok docookie=ok edns@512tcp=ok 
optlist=ok
pay.gov @2605:3100:fffc:100::7 (ns1.twai.gov.): edns=ok edns1=timeout 
edns@512=noopt ednsopt=ok edns1opt=timeout do=ok ednsflags=ok docookie=ok 
edns@512tcp=ok optlist=ok
pay.gov @199.169.192.28 (ns2.twai.gov.): edns=ok edns1=timeout edns@512=noopt 
ednsopt=ok edns1opt=timeout do=ok ednsflags=ok docookie=ok edns@512tcp=ok 
optlist=ok
pay.gov @2605:3100:fffd:100::7 (ns2.twai.gov.): edns=ok edns1=timeout 
edns@512=noopt ednsopt=ok edns1opt=timeout do=ok ednsflags=ok docookie=ok 
edns@512tcp=ok optlist=ok

Mark

> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2.0.14 (GNU/Linux)
> 
> iEYEAREKAAYFAlgrjDEACgkQL6j7milTFsG8OwCgh5yRxxZHskjL4HVhzxIEmenA
> LQgAniRMcYf/DIcg+8ve55MxUgrUbmzC
> =MS8j
> -END PGP SIGNATURE-
> 
> 
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org


Re: pay.gov and IPv6

2016-11-16 Thread Matthew Kaufman
I fixed it (and Netflix) by turning off IPv6 for all my users... but any
chance this is a path MTU issue causing the apparent hang?

Matthew Kaufman
On Wed, Nov 16, 2016 at 12:26 PM Mark Andrews  wrote:

>
> In message <1479249003.3937.6.ca...@ns.five-ten-sg.com>, Carl Byington
> writes
> :
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA512
> >
> > Following up on a two year old thread, one of my clients just hit this
> > problem. The failure is not that www.pay.gov is not reachable over ipv6
> > (2605:3100:fffd:100::15). They accept (TCP handshake) the port 443
> > connection, but the connection then hangs waiting for the TLS handshake.
> >
> > openssl s_client -connect www.pay.gov:443
> >
> > openssl s_client -servername www.pay.gov -connect 199.169.192.21:443
> >
> > Browsers (at least firefox) see that as a very slow site, and it does
> > not trigger their happy eyeballs fast failover to ipv4.
>
> Happy eyeballs is about making the connection not whether TCP
> connections work after the initial packet exchange.
>
> I would send a physical letter to the relevent Inspector General
> requesting that they ensure all web sites under their juristiction
> that are supposed to be reachable from the public net get audited
> regularly to ensure that IPv6 connections work from public IP space.
>
> While you are sending the letter can you also ask why pay.gov's DNS
> servers are broken.
>
> Checking: 'pay.gov' as at 2016-11-16T20:21:28Z
>
> pay.gov @199.169.194.28 (ns1.twai.gov.): edns=ok edns1=timeout edns@512=noopt
> ednsopt=ok edns1opt=timeout do=ok ednsflags=ok docookie=ok edns@512tcp=ok
> optlist=ok
> pay.gov @2605:3100:fffc:100::7 (ns1.twai.gov.): edns=ok edns1=timeout
> edns@512=noopt ednsopt=ok edns1opt=timeout do=ok ednsflags=ok docookie=ok
> edns@512tcp=ok optlist=ok
> pay.gov @199.169.192.28 (ns2.twai.gov.): edns=ok edns1=timeout edns@512=noopt
> ednsopt=ok edns1opt=timeout do=ok ednsflags=ok docookie=ok edns@512tcp=ok
> optlist=ok
> pay.gov @2605:3100:fffd:100::7 (ns2.twai.gov.): edns=ok edns1=timeout
> edns@512=noopt ednsopt=ok edns1opt=timeout do=ok ednsflags=ok docookie=ok
> edns@512tcp=ok optlist=ok
>
> Mark
>
> > -BEGIN PGP SIGNATURE-
> > Version: GnuPG v2.0.14 (GNU/Linux)
> >
> > iEYEAREKAAYFAlgrjDEACgkQL6j7milTFsG8OwCgh5yRxxZHskjL4HVhzxIEmenA
> > LQgAniRMcYf/DIcg+8ve55MxUgrUbmzC
> > =MS8j
> > -END PGP SIGNATURE-
> >
> >
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
>


Re: pay.gov and IPv6

2016-11-16 Thread Carl Byington
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On Wed, 2016-11-16 at 20:59 +, Matthew Kaufman wrote:
> I fixed it (and Netflix) by turning off IPv6 for all my users... but
> any chance this is a path MTU issue causing the apparent hang?

I fixed it by using the rpz feature of bind to disable the  record
for www.pay.gov. I lookup the real A record, and then put

www.pay.gov IN A %s

into the local rpz zone. That suppresses the  record, so local
clients are forced into IPv4 for that site. That allows them to use IPv6
for other sites.

path MTU - hm, I need to check that.


-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.14 (GNU/Linux)

iEYEAREKAAYFAlgsz0YACgkQL6j7milTFsEbpwCgiJwZm3R/0VowqNFu4afHwPRq
siwAmwdAj2YCLnlNQAs5Q5E5hcthaoiP
=yqXb
-END PGP SIGNATURE-




Re: pay.gov and IPv6

2016-11-16 Thread Jared Mauch

> On Nov 15, 2016, at 5:30 PM, Carl Byington  wrote:
> 
> openssl s_client -connect www.pay.gov:443



I’m not seeing the issue here, but they do have some possible issues the way 
they’re setting cookies (See details below).

What path are you seeing to them?  I’m also not having the issue from the 
IETF97 network here in Seoul which has IPv6 as well.

puck:~$ traceroute6 www.pay.gov.
traceroute to www.pay.gov. (2605:3100:fffd:100::15), 30 hops max, 80 byte 
packets
 1  ge-0-7-0-22.r05.chcgil09.us.bb.gin.ntt.net (2001:418:3f4::1)  0.751 ms  
0.871 ms  0.994 ms
 2  verio-gw.cgcil.ipv6.att.net (2001:1890:1fff:307:192:205:32:193)  2.008 ms  
1.991 ms  2.837 ms
 3  cgcil22crs.ipv6.att.net (2001:1890:ff::12:122:132:198)  27.333 ms  
27.167 ms  27.070 ms
 4  sl9mo22crs.ipv6.att.net (2001:1890:ff::12:122:2:178)  27.602 ms  27.646 
ms  27.628 ms
 5  sl9mo21crs.ipv6.att.net (2001:1890:ff::12:122:2:217)  30.055 ms  29.894 
ms  29.855 ms
 6  dlstx22crs.ipv6.att.net (2001:1890:ff::12:122:2:1)  28.888 ms  27.016 
ms  26.933 ms
 7  dlstx84crs.ipv6.att.net (2001:1890:ff::12:123:18:249)  28.126 ms  
26.757 ms  26.645 ms
 8  2001:1890:ff::12:122:124:141 (2001:1890:ff::12:122:124:141)  26.142 
ms  26.269 ms  26.179 ms
 9  2001:1890:c00:610b::1138:7d27 (2001:1890:c00:610b::1138:7d27)  27.273 ms  
27.255 ms  27.544 ms
10  2001:1890:1c08:cf01::2 (2001:1890:1c08:cf01::2)  27.673 ms !X  27.559 ms !X 
 27.465 ms !X

curl -v https://www.pay.gov/public/home
*   Trying 2605:3100:fffd:100::15...
* TCP_NODELAY set
* Connected to www.pay.gov (2605:3100:fffd:100::15) port 443 (#0)
* Initializing NSS with certpath: sql:/etc/pki/nssdb
*   CAfile: /etc/pki/tls/certs/ca-bundle.crt
  CApath: none
* ALPN/NPN, server did not agree to a protocol
* SSL connection using TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
* Server certificate:
*   subject: CN=www.pay.gov,O=United States Department of 
Treasury,L=Washington,ST=District of Columbia,C=US
*   start date: May 28 14:58:43 2015 GMT
*   expire date: May 29 06:16:02 2018 GMT
*   common name: www.pay.gov
*   issuer: CN=Entrust Certification Authority - L1K,OU="(c) 2012 Entrust, 
Inc. - for authorized use only",OU=See www.entrust.net/legal-terms,O="Entrust, 
Inc.",C=US
> GET /public/home HTTP/1.1
> Host: www.pay.gov
> User-Agent: curl/7.51.0
> Accept: */*
> 
< HTTP/1.1 200 OK
< Date: Wed, 16 Nov 2016 21:52:08 GMT
< Content-type: text/html; charset=ISO-8859-1
< Strict-transport-security: max-age=31536001; includeSubDomains
< Cache-Control: no-cache
< Cache-Control: no-store
< Pragma: no-cache
< Expires: Thu, 01 Jan 1970 00:00:00 GMT
< X-XSS-Protection: 1; mode=block
< Strict-Transport-Security: max-age=31536000
< Set-Cookie: 
JSESSIONID=949QYsVLKQqBB42HTy91pJnGfnfJthLfQTv02CvDnt7rNQnpSvb1!1259175335!-1040755441!1479333128223;
 path=/public; secure; HttpOnly
< Set-Cookie: 
JSESSIONID=949QYsVLKQqBB42HTy91pJnGfnfJthLfQTv02CvDnt7rNQnpSvb1!1259175335!-1040755441;
 path=/public; HttpOnly
< Set-Cookie: ClientId=14793331282345260; path=/public; HttpOnly; secure
< Set-Cookie: ClientId=1479333128244363; path=/public; HttpOnly; secure
< X-FRAME-OPTIONS: DENY
< Content-Language: en-US
< X-Powered-By: Servlet/2.5 JSP/2.1
< Transfer-encoding: chunked




Re: pay.gov and IPv6

2016-11-16 Thread Lee
On 11/16/16, Mark Andrews  wrote:
>
> In message <1479249003.3937.6.ca...@ns.five-ten-sg.com>, Carl Byington
> writes
> :
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA512
>>
>> Following up on a two year old thread, one of my clients just hit this
>> problem. The failure is not that www.pay.gov is not reachable over ipv6
>> (2605:3100:fffd:100::15). They accept (TCP handshake) the port 443
>> connection, but the connection then hangs waiting for the TLS handshake.
>>
>> openssl s_client -connect www.pay.gov:443
>>
>> openssl s_client -servername www.pay.gov -connect 199.169.192.21:443
>>
>> Browsers (at least firefox) see that as a very slow site, and it does
>> not trigger their happy eyeballs fast failover to ipv4.
>
> Happy eyeballs is about making the connection not whether TCP
> connections work after the initial packet exchange.
>
> I would send a physical letter to the relevent Inspector General
> requesting that they ensure all web sites under their juristiction
> that are supposed to be reachable from the public net get audited
> regularly to ensure that IPv6 connections work from public IP space.

That will absolutely work.

NIST is still monitoring ipv6 .gov sites
  https://usgv6-deploymon.antd.nist.gov/cgi-bin/generate-gov
so the IG isn't going to do anything there & pay.gov has a contact us page
  https://pay.gov/public/home/contact
that I'd bet works much better than a letter to the IG

Regards,
Lee


Re: pay.gov and IPv6

2016-11-16 Thread JORDI PALET MARTINEZ
It happens too often, unfortunately.

People deploying IPv6 at web sites and other services, don’t check if PMTUD is 
broken by filtering, ECMP, load balancers, etc.

This is the case here:

tbit from 2001:df0:4:4000::1:115 to 2605:3100:fffd:100::15
server-mss 1440, result: pmtud-fail
app: http, url: https://www.pay.gov/
[  0.009] TX SYN 64  seq = 0:0
[  0.165] RX SYN/ACK 64  seq = 0:1
[  0.166] TX 60  seq = 1:1
[  0.166] TX371  seq = 1:1(311)
[  0.325] RX   1500  seq = 1:312(1440)
[  0.325] RX   1500  seq = 1441:312(1440)  
[  0.325] TX PTB   1280  mtu = 1280
[  0.325] RX   1362  seq = 2881:312(1302)  
[  3.325] RX   1500  seq = 1:312(1440)
[  3.325] TX PTB   1280  mtu = 1280
[  9.326] RX   1500  seq = 1:312(1440)
[  9.326] TX PTB   1280  mtu = 1280
[ 21.325] RX   1500  seq = 1:312(1440)
[ 21.325] TX PTB   1280  mtu = 1280
[ 45.325] RX   1500  seq = 1:312(1440)



Regards,
Jordi


-Mensaje original-
De: NANOG  en nombre de Carl Byington 

Responder a: 
Fecha: miércoles, 16 de noviembre de 2016, 7:30
Para: 
Asunto: pay.gov and IPv6

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Following up on a two year old thread, one of my clients just hit this
problem. The failure is not that www.pay.gov is not reachable over ipv6
(2605:3100:fffd:100::15). They accept (TCP handshake) the port 443
connection, but the connection then hangs waiting for the TLS handshake.

openssl s_client -connect www.pay.gov:443

openssl s_client -servername www.pay.gov -connect 199.169.192.21:443

Browsers (at least firefox) see that as a very slow site, and it does
not trigger their happy eyeballs fast failover to ipv4.


-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.14 (GNU/Linux)

iEYEAREKAAYFAlgrjDEACgkQL6j7milTFsG8OwCgh5yRxxZHskjL4HVhzxIEmenA
LQgAniRMcYf/DIcg+8ve55MxUgrUbmzC
=MS8j
-END PGP SIGNATURE-







**
IPv4 is over
Are you ready for the new Internet ?
http://www.consulintel.es
The IPv6 Company

This electronic message contains information which may be privileged or 
confidential. The information is intended to be for the use of the 
individual(s) named above. If you are not the intended recipient be aware that 
any disclosure, copying, distribution or use of the contents of this 
information, including attached files, is prohibited.





Re: pay.gov and IPv6

2016-11-16 Thread Mark Andrews

In message 
, Lee writes:
> On 11/16/16, Mark Andrews  wrote:
> >
> > In message <1479249003.3937.6.ca...@ns.five-ten-sg.com>, Carl Byington
> > writes
> > :
> >> -BEGIN PGP SIGNED MESSAGE-
> >> Hash: SHA512
> >>
> >> Following up on a two year old thread, one of my clients just hit this
> >> problem. The failure is not that www.pay.gov is not reachable over ipv6
> >> (2605:3100:fffd:100::15). They accept (TCP handshake) the port 443
> >> connection, but the connection then hangs waiting for the TLS handshake.
> >>
> >> openssl s_client -connect www.pay.gov:443
> >>
> >> openssl s_client -servername www.pay.gov -connect 199.169.192.21:443
> >>
> >> Browsers (at least firefox) see that as a very slow site, and it does
> >> not trigger their happy eyeballs fast failover to ipv4.
> >
> > Happy eyeballs is about making the connection not whether TCP
> > connections work after the initial packet exchange.
> >
> > I would send a physical letter to the relevent Inspector General
> > requesting that they ensure all web sites under their juristiction
> > that are supposed to be reachable from the public net get audited
> > regularly to ensure that IPv6 connections work from public IP space.
> 
> That will absolutely work.
> 
> NIST is still monitoring ipv6 .gov sites
>   https://usgv6-deploymon.antd.nist.gov/cgi-bin/generate-gov

Which show green which means that the tests they are doing are not
sufficient.  They need to test from behind a 1280 mtu link.

The DNSSEC testing is also insufficient.  9-11commission.gov shows
green for example but if you use DNS COOKIES (which BIND 9.10.4 and
BIND 9.11.0 do) then servers barf and return BADVERS and validation
fails.  QWEST you have been informed of this already.

Why the hell should validating resolver have to work around the
crap you guys are using?  DO YOUR JOBS which is to use RFC COMPLIANT
servers.  You get PAID to do DNS because people think you are
compentent to do the job.  Evidence shows otherwise.

https://ednscomp.isc.org/compliance/gov-full-report.html show the broken
servers for .gov.  It isn't hard to check.

> so the IG isn't going to do anything there & pay.gov has a contact us page
>   https://pay.gov/public/home/contact
> that I'd bet works much better than a letter to the IG

You have to be able to get to https://pay.gov/public/home/contact to use
it.  Most people don't have the skill set to force the use of IPv4.

If it is production it should work.  It is the I-G's role to ensure this
happens.  Butts need to kicked.

Mark
 
> Regards,
> Lee
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org


Facebook Geo Routing Issues

2016-11-16 Thread John Cenile
Hello,

Does anybody have a contact I could use at Facebook to get a routing issue
resolved?

Some of our networks are being routed to Miami, rather than using the much
closer PoP of Sydney, and it's obviously causing significant performance
issues when browsing Facebook.


Re: Facebook Geo Routing Issues

2016-11-16 Thread Mike Hammett
I'm in Chicago and I saw mine going to Miami as well (per rDNS). Haven't looked 
into it at all. 

I did see a video where they said they occasionally purposely give people less 
than ideal facilities to test connectivity. Maybe that process buggered up? 




- 
Mike Hammett 
Intelligent Computing Solutions 
http://www.ics-il.com 

Midwest-IX 
http://www.midwest-ix.com 

- Original Message -

From: "John Cenile"  
To: nanog@nanog.org 
Sent: Wednesday, November 16, 2016 7:48:25 PM 
Subject: Facebook Geo Routing Issues 

Hello, 

Does anybody have a contact I could use at Facebook to get a routing issue 
resolved? 

Some of our networks are being routed to Miami, rather than using the much 
closer PoP of Sydney, and it's obviously causing significant performance 
issues when browsing Facebook. 



Re: pay.gov and IPv6

2016-11-16 Thread JORDI PALET MARTINEZ
I think it is not just a matter of testing behind a 1280 MTU, but about making 
sure that PMTUD is not broken, so it just works in any circumstances.

Regards,
Jordi


-Mensaje original-
De: NANOG  en nombre de Mark Andrews 
Responder a: 
Fecha: jueves, 17 de noviembre de 2016, 9:26
Para: Lee 
CC: 
Asunto: Re: pay.gov and IPv6


In message 

, Lee writes:
> On 11/16/16, Mark Andrews  wrote:
> >
> > In message <1479249003.3937.6.ca...@ns.five-ten-sg.com>, Carl Byington
> > writes
> > :
> >> -BEGIN PGP SIGNED MESSAGE-
> >> Hash: SHA512
> >>
> >> Following up on a two year old thread, one of my clients just hit this
> >> problem. The failure is not that www.pay.gov is not reachable over ipv6
> >> (2605:3100:fffd:100::15). They accept (TCP handshake) the port 443
> >> connection, but the connection then hangs waiting for the TLS 
handshake.
> >>
> >> openssl s_client -connect www.pay.gov:443
> >>
> >> openssl s_client -servername www.pay.gov -connect 199.169.192.21:443
> >>
> >> Browsers (at least firefox) see that as a very slow site, and it does
> >> not trigger their happy eyeballs fast failover to ipv4.
> >
> > Happy eyeballs is about making the connection not whether TCP
> > connections work after the initial packet exchange.
> >
> > I would send a physical letter to the relevent Inspector General
> > requesting that they ensure all web sites under their juristiction
> > that are supposed to be reachable from the public net get audited
> > regularly to ensure that IPv6 connections work from public IP space.
> 
> That will absolutely work.
> 
> NIST is still monitoring ipv6 .gov sites
>   https://usgv6-deploymon.antd.nist.gov/cgi-bin/generate-gov

Which show green which means that the tests they are doing are not
sufficient.  They need to test from behind a 1280 mtu link.

The DNSSEC testing is also insufficient.  9-11commission.gov shows
green for example but if you use DNS COOKIES (which BIND 9.10.4 and
BIND 9.11.0 do) then servers barf and return BADVERS and validation
fails.  QWEST you have been informed of this already.

Why the hell should validating resolver have to work around the
crap you guys are using?  DO YOUR JOBS which is to use RFC COMPLIANT
servers.  You get PAID to do DNS because people think you are
compentent to do the job.  Evidence shows otherwise.

https://ednscomp.isc.org/compliance/gov-full-report.html show the broken
servers for .gov.  It isn't hard to check.

> so the IG isn't going to do anything there & pay.gov has a contact us page
>   https://pay.gov/public/home/contact
> that I'd bet works much better than a letter to the IG

You have to be able to get to https://pay.gov/public/home/contact to use
it.  Most people don't have the skill set to force the use of IPv4.

If it is production it should work.  It is the I-G's role to ensure this
happens.  Butts need to kicked.

Mark
 
> Regards,
> Lee
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org





**
IPv4 is over
Are you ready for the new Internet ?
http://www.consulintel.es
The IPv6 Company

This electronic message contains information which may be privileged or 
confidential. The information is intended to be for the use of the 
individual(s) named above. If you are not the intended recipient be aware that 
any disclosure, copying, distribution or use of the contents of this 
information, including attached files, is prohibited.





Re: pay.gov and IPv6

2016-11-16 Thread Mark Andrews

In message , JORDI PALET M
ARTINEZ writes:
> I think it is not just a matter of testing behind a 1280 MTU, but about makin
> g sure that PMTUD is not broken, so it just works in any circumstances.
> 
> Regards,
> Jordi
 
If you don't do MSS fix up a 1280 link in the middle will find PMTUD issues
provided the testing host has a MTU > 1280.

Mark

> -Mensaje original-
> De: NANOG  en nombre de Mark Andrews 
> Responder a: 
> Fecha: jueves, 17 de noviembre de 2016, 9:26
> Para: Lee 
> CC: 
> Asunto: Re: pay.gov and IPv6
> 
> 
> In message  l.com>
> , Lee writes:
> > On 11/16/16, Mark Andrews  wrote:
> > >
> > > In message <1479249003.3937.6.ca...@ns.five-ten-sg.com>, Carl Byingto
> n
> > > writes
> > > :
> > >> -BEGIN PGP SIGNED MESSAGE-
> > >> Hash: SHA512
> > >>
> > >> Following up on a two year old thread, one of my clients just hit th
> is
> > >> problem. The failure is not that www.pay.gov is not reachable over i
> pv6
> > >> (2605:3100:fffd:100::15). They accept (TCP handshake) the port 443
> > >> connection, but the connection then hangs waiting for the TLS handsh
> ake.
> > >>
> > >> openssl s_client -connect www.pay.gov:443
> > >>
> > >> openssl s_client -servername www.pay.gov -connect 199.169.192.21:443
> > >>
> > >> Browsers (at least firefox) see that as a very slow site, and it doe
> s
> > >> not trigger their happy eyeballs fast failover to ipv4.
> > >
> > > Happy eyeballs is about making the connection not whether TCP
> > > connections work after the initial packet exchange.
> > >
> > > I would send a physical letter to the relevent Inspector General
> > > requesting that they ensure all web sites under their juristiction
> > > that are supposed to be reachable from the public net get audited
> > > regularly to ensure that IPv6 connections work from public IP space.
> > 
> > That will absolutely work.
> > 
> > NIST is still monitoring ipv6 .gov sites
> >   https://usgv6-deploymon.antd.nist.gov/cgi-bin/generate-gov
> 
> Which show green which means that the tests they are doing are not
> sufficient.  They need to test from behind a 1280 mtu link.
> 
> The DNSSEC testing is also insufficient.  9-11commission.gov shows
> green for example but if you use DNS COOKIES (which BIND 9.10.4 and
> BIND 9.11.0 do) then servers barf and return BADVERS and validation
> fails.  QWEST you have been informed of this already.
> 
> Why the hell should validating resolver have to work around the
> crap you guys are using?  DO YOUR JOBS which is to use RFC COMPLIANT
> servers.  You get PAID to do DNS because people think you are
> compentent to do the job.  Evidence shows otherwise.
> 
> https://ednscomp.isc.org/compliance/gov-full-report.html show the broken
> servers for .gov.  It isn't hard to check.
> 
> > so the IG isn't going to do anything there & pay.gov has a contact us p
> age
> >   https://pay.gov/public/home/contact
> > that I'd bet works much better than a letter to the IG
> 
> You have to be able to get to https://pay.gov/public/home/contact to use
> it.  Most people don't have the skill set to force the use of IPv4.
> 
> If it is production it should work.  It is the I-G's role to ensure this
> happens.  Butts need to kicked.
> 
> Mark
>  
> > Regards,
> > Lee
> -- 
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
> 
> 
> 
> 
> 
> **
> IPv4 is over
> Are you ready for the new Internet ?
> http://www.consulintel.es
> The IPv6 Company
> 
> This electronic message contains information which may be privileged or confi
> dential. The information is intended to be for the use of the individual(s) n
> amed above. If you are not the intended recipient be aware that any disclosur
> e, copying, distribution or use of the contents of this information, includin
> g attached files, is prohibited.
> 
> 
> 
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org


Re: NEVERMIND! (was: Seeking Google reverse DNS delegation contact)

2016-11-16 Thread Christopher Morrow
On Sun, Nov 13, 2016 at 3:57 PM, Christopher Morrow  wrote:

> So... actually someone did tell arin to aim these at ns1/2google.com...
> I'll go ask arin to 'fix the glitch'.
>
>
the glitch got fixed, shortly after this message, but not by my/our
doing... hrm.. I see passive dns data:
bailiwick 136.8.204.in-addr.arpa.
count 19
first seen 2016-10-28 16:17:02 -
last seen 2016-11-13 08:59:50 -
136.8.204.in-addr.arpa. NS ns1.google.com.
136.8.204.in-addr.arpa. NS ns2.google.com.

and after that: (overlapping that)
bailiwick 204.in-addr.arpa.
count 2335
first seen 2015-05-01 16:20:01 -
last seen 2016-11-16 21:54:01 -
136.8.204.in-addr.arpa. NS ns1.rossinc.net.
136.8.204.in-addr.arpa. NS ns2.rossinc.net.

so.. I suspect ross digital/rossinc.net noticed they made a 'mistake' and
that that 'mistake' was seen externally and .. fixed things on thier own.

With that said, it's possible (so they'll also fix this new problem):
dig ns1.rossinc.net
dig ns2.rossinc.net

both are 'nxdomain' from:
;; ANSWER SECTION:
rossinc.net. 3057 IN NS ns57.domaincontrol.com.
rossinc.net. 3057 IN NS ns58.domaincontrol.com.

which seems sad, and bad.. and .. like someone has made another 'mistake' :(

rossinc, you probably want to fix this as well.



> thanks!
> -chris
> (sometimes people do this, I have no idea why... perhaps they just like
> broken ptrs?)
>
> On Thu, Nov 10, 2016 at 10:05 PM, Ronald F. Guilmette <
> r...@tristatelogic.com> wrote:
>
>>
>>
>> My profuse apologies to everyone.  It seems that Google is not in fact
>> involved in any way with providing reverse DNS for the 204.8.136.0/21
>> IP address block.  I was deceived into believing it was by some
>> unusual trickey on the part of the spammer-controlled name servers
>> ns1.saversagreeable.com and ns2.saversagreeable.com.  You can see
>> the clever deception toward the very end of the dig +trace listing
>> I posted:
>>
>> http://pastebin.com/raw/VNwmgMHh
>>
>> It seems those clever rascal spammers tried to implicate Google's
>> name servers, but it is only their's which are giving out the
>> reverse DNS which suoorts their snowshoe spamming efforts in the
>> 204.8.136.0/21 block.
>>
>> Sorry for my mistake everyone.  I wasn't expecting quite this level
>> or kind of reverse DNS delegation trickery.
>>
>>
>> Regards,
>> rfg
>>
>
>


Re: pay.gov and IPv6

2016-11-16 Thread Matthew Kaufman
The good news is that I reported this particular site as a problem two and
three years ago, both, and it isn't any worse.

Matthew Kaufman
On Wed, Nov 16, 2016 at 6:29 PM Mark Andrews  wrote:

>
> In message , JORDI
> PALET M
> ARTINEZ writes:
> > I think it is not just a matter of testing behind a 1280 MTU, but about
> makin
> > g sure that PMTUD is not broken, so it just works in any circumstances.
> >
> > Regards,
> > Jordi
>
> If you don't do MSS fix up a 1280 link in the middle will find PMTUD issues
> provided the testing host has a MTU > 1280.
>
> Mark
>
> > -Mensaje original-
> > De: NANOG  en nombre de Mark Andrews <
> ma...@isc.org>
> > Responder a: 
> > Fecha: jueves, 17 de noviembre de 2016, 9:26
> > Para: Lee 
> > CC: 
> > Asunto: Re: pay.gov and IPv6
> >
> >
> > In message
>  > l.com>
> > , Lee writes:
> > > On 11/16/16, Mark Andrews  wrote:
> > > >
> > > > In message <1479249003.3937.6.ca...@ns.five-ten-sg.com>, Carl
> Byingto
> > n
> > > > writes
> > > > :
> > > >> -BEGIN PGP SIGNED MESSAGE-
> > > >> Hash: SHA512
> > > >>
> > > >> Following up on a two year old thread, one of my clients just
> hit th
> > is
> > > >> problem. The failure is not that www.pay.gov is not reachable
> over i
> > pv6
> > > >> (2605:3100:fffd:100::15). They accept (TCP handshake) the port
> 443
> > > >> connection, but the connection then hangs waiting for the TLS
> handsh
> > ake.
> > > >>
> > > >> openssl s_client -connect www.pay.gov:443
> > > >>
> > > >> openssl s_client -servername www.pay.gov -connect
> 199.169.192.21:443
> > > >>
> > > >> Browsers (at least firefox) see that as a very slow site, and
> it doe
> > s
> > > >> not trigger their happy eyeballs fast failover to ipv4.
> > > >
> > > > Happy eyeballs is about making the connection not whether TCP
> > > > connections work after the initial packet exchange.
> > > >
> > > > I would send a physical letter to the relevent Inspector General
> > > > requesting that they ensure all web sites under their
> juristiction
> > > > that are supposed to be reachable from the public net get audited
> > > > regularly to ensure that IPv6 connections work from public IP
> space.
> > >
> > > That will absolutely work.
> > >
> > > NIST is still monitoring ipv6 .gov sites
> > >   https://usgv6-deploymon.antd.nist.gov/cgi-bin/generate-gov
> >
> > Which show green which means that the tests they are doing are not
> > sufficient.  They need to test from behind a 1280 mtu link.
> >
> > The DNSSEC testing is also insufficient.  9-11commission.gov shows
> > green for example but if you use DNS COOKIES (which BIND 9.10.4 and
> > BIND 9.11.0 do) then servers barf and return BADVERS and validation
> > fails.  QWEST you have been informed of this already.
> >
> > Why the hell should validating resolver have to work around the
> > crap you guys are using?  DO YOUR JOBS which is to use RFC COMPLIANT
> > servers.  You get PAID to do DNS because people think you are
> > compentent to do the job.  Evidence shows otherwise.
> >
> > https://ednscomp.isc.org/compliance/gov-full-report.html show the
> broken
> > servers for .gov.  It isn't hard to check.
> >
> > > so the IG isn't going to do anything there & pay.gov has a
> contact us p
> > age
> > >   https://pay.gov/public/home/contact
> > > that I'd bet works much better than a letter to the IG
> >
> > You have to be able to get to https://pay.gov/public/home/contact
> to use
> > it.  Most people don't have the skill set to force the use of IPv4.
> >
> > If it is production it should work.  It is the I-G's role to ensure
> this
> > happens.  Butts need to kicked.
> >
> > Mark
> >
> > > Regards,
> > > Lee
> > --
> > Mark Andrews, ISC
> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
> > PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
> >
> >
> >
> >
> >
> > **
> > IPv4 is over
> > Are you ready for the new Internet ?
> > http://www.consulintel.es
> > The IPv6 Company
> >
> > This electronic message contains information which may be privileged or
> confi
> > dential. The information is intended to be for the use of the
> individual(s) n
> > amed above. If you are not the intended recipient be aware that any
> disclosur
> > e, copying, distribution or use of the contents of this information,
> includin
> > g attached files, is prohibited.
> >
> >
> >
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
>


Re: Network Diagnostic Tool

2016-11-16 Thread Jason Hellenthal
https://twitter.com/jhackenthal/status/799091998594650112

> On Nov 12, 2016, at 22:05, J. Hellenthal  wrote:
> 
> That is a very cool contribution you've made. Let me run it through some 
> tests and put it to work right away and see if I can provide some feedback 
> and maybe possible patches or incites 
> 
> But thank you!!
> 
> -- 
> Onward!, 
> Jason Hellenthal, 
> Systems & Network Admin, 
> Mobile: 0x9CA0BD58, 
> JJH48-ARIN
> 
> On Nov 12, 2016, at 13:28, Mehrdad Arshad Rad  wrote:
> 
> Hi,
> 
> I've started to develop an open source tool 4 months ago to help
> neteng/sysadmin/sysops please take look at the below link and let me know
> if you have any suggestions.
> 
> https://github.com/mehrdadrad/mylg
> 
> p.s you can download it for different operating systems at http://mylg.io
> 
> Thanks,
> Mehrdad


-- 
 Jason Hellenthal
 JJH48-ARIN