Re: GCSC critical infrastructure protection questions: your input needed.

2017-11-15 Thread Bill Woodcock


> On Nov 14, 2017, at 9:59 PM, William Herrin  wrote:
> 
> Aren't there already laws of war that forbid targeting civilians and civilian 
> infrastructure as well as laying out the combatants' duties to mitigate 
> collateral damage from strikes on government personnel and facilities? Is 
> there some reason these laws should not continue to apply when the attacks 
> are carried out with bits instead of bombs?

Because…  cyber!

I mean, it would be really _nice_ if they thought the way you do, but they 
don’t.  They figure the old rules don’t also apply in a new venue.

Also, the rules by which _war_ is conducted don’t apply when it’s not a _war_.  
And it’s essentially never a _war_ anymore.

Militaries are very clear that they won’t listen to anyone else about how they 
should conduct themselves when they’re at war.  This is an effort to create a 
norm governing their behavior when they’re not at war, and have less excuse or 
leeway or whatever.

-Bill






signature.asc
Description: Message signed with OpenPGP


RE: Issues with 4-octet BGP AS and Akamai?

2017-11-15 Thread Greg Gombas -X (grgombas)
Thank you all for your assistance thus far. I wanted to confirm with my 
customer that it was okay to share more details and they said it was okay. We 
did just send an email to Akamai net support and awaiting their reply.

The customer is NYULH (AS 394666). They currently use NYU (AS 12) for internet 
connectivity. They advertise the following prefixes to NYU:

216.165.124.0/24
216.165.125.0/24
216.165.126.0/24
216.165.127.0/24

NYU aggregates the above prefixes, strips NYULH's AS number, and replaces it 
with their own AS number (AS 12).
The aggregates are as follows:

216.165.124.0/23
216.165.126.0/23

Below is a sample /23 route seen from one of the looking glass servers with 
origin AS 12:

216.165.124.0/23  
[DIGITALOCEAN3 2017-11-11 from 162.243.188.2] * (100/-) [AS12i]
Type: BGP unicast univ
BGP.origin: IGP
BGP.as_path: 393406 3630 12
BGP.next_hop: 162.243.188.2
BGP.local_pref: 100
BGP.atomic_aggr: 
BGP.aggregator: 192.168.255.3 AS12
BGP.community: (14061,2000) (14061,2002) (14061,3000) (14061,3001) 
(65363,714) (65363,2906) (65363,13335) (65363,13414) (65363,14061) 
(65363,20940) (65363,32934) (65363,41690) (65363,46489) (65363,65340)
BGP.ext_community: (RPKI Origin Validation State: not-found)

With their routes originating from AS 12, all their internet connectivity works 
fine.

However when they failover to their secondary path which is F5 Silverline DDOS 
protection over Optimimum Lightpath, they are unable to connect to any Akamai 
hosted websites.
The difference between their primary path and secondary path is that the 
secondary path does not strip their origin AS 394666.

To answer Job's question, yes the originating router is AS4 capable. I checked 
the looking glass link you provided and see the correct origin AS 394666. See 
below:

216.165.124.0/24  
[DIGITALOCEAN5 14:14:44 from 5.101.111.2] * (100/-) [AS394666i]
Type: BGP unicast univ
BGP.origin: IGP
BGP.as_path: 202109 2914 55002 394666
BGP.next_hop: 5.101.111.2
BGP.local_pref: 100
BGP.community: (2914,410) (2914,1203) (2914,2201) (2914,3200) 
(14061,2100) (14061,2101) (14061,4000) (14061,4001)
BGP.ext_community: (RPKI Origin Validation State: not-found)

However we noticed some of Level 3's looking glass routers only see the 
AS_Trans 23456 as shown in the output below. I'm assuming that means some of 
Level3's routers are not AS4 capable, but does that mean they will drop the 
routes?

Report generated from: car1.jan1

Route results for 216.165.124.0/24 from Jackson, MS

BGP routing table entry for 216.165.124.0/24
Paths: (2 available, best #2)
  1299 55002 23456
  AS-path translation: { TELIANET DEFENSENET-1 AS23456 }
ear3.Dallas1 (metric 43807)
  Origin IGP, metric 10, localpref 86, valid, internal
  Community: North_America Lclprf_86 United_States Level3_Peer Dallas 
Level3:10497
  Originator: ear3.Dallas1
  1299 55002 23456
  AS-path translation: { TELIANET DEFENSENET-1 AS23456 }
ear3.Dallas1 (metric 43807)
  Origin IGP, metric 10, localpref 86, valid, internal, best
  Community: North_America Lclprf_86 United_States Level3_Peer Dallas 
Level3:10497
  Originator: ear3.Dallas1

Thanks,
Greg

Gregory Gombas
CCIE# 19649 - R&S
Network Consulting Engineer
Advanced Services
grgom...@cisco.com
Office: +1-212-714-4497
Mobile: +1-201-675-9457
Cisco Systems Limited
One Penn Plaza
6th & 9th Floors
New York, NY 10119
United States
Cisco.com





Think before you print.
This email may contain confidential and privileged material for the sole use of 
the intended recipient. Any review, use, distribution or disclosure by others 
is strictly prohibited. If you are not the intended recipient (or authorized to 
receive for the recipient), please contact the sender by reply email and delete 
all copies of this message.
For corporate legal information go to:
http://www.cisco.com/web/about/doing_business/legal/cri/index.html



-Original Message-
From: Job Snijders [mailto:j...@ntt.net] 
Sent: Tuesday, November 14, 2017 11:36 AM
To: Greg Gombas -X (grgombas) 
Cc: nanog@nanog.org
Subject: Re: Issues with 4-octet BGP AS and Akamai?

Hi,

What prefix and ASN is this about?

Are you sure you are advertising from an AS4 capable router?

Do you see the expected 4-byte ASN as origin in a aggregator looking glass like 
http://lg.ring.nlnog.net/prefix_detail/lg01/ipv4?q=www.nlnog.net ?

Kind regards,

Job


RE: Issues with 4-octet BGP AS and Akamai?

2017-11-15 Thread Greg Gombas -X (grgombas)
Hi Tyler,

Unfortunately we had a limited window to test so could not check the reverse 
path.

During our failover testing we stopped advertising out the primary path and 
only advertised out the secondary path. Routes are advertised out the secondary 
path through a DDOS prevention company called F5 Silverline which is reached 
via a GRE tunnel running over the Optimum Lightpath network.

So outgoing traffic would go from NYULH going out the Optimum Lightpath circuit 
and return traffic coming in on F5 Silverline’s network then tunneled over 
Optimum Lightpath back to NYULH.
So traffic was definitely routing asymmetrically.

However F5 Silverline assured us they have many customers using a similar setup 
but have no issues with Akamai.

I would think that many customers using similar DDOS prevention services such 
as F5 Silverline and Prolexic are routing asymmetrically as well, wouldn’t uRPF 
be affecting them all?

Thanks,
Greg
[http://www.cisco.com/web/europe/images/email/signature/logo05.jpg]

Gregory Gombas
CCIE# 19649 – R&S
Network Consulting Engineer
Advanced Services
grgom...@cisco.com
Office: +1-212-714-4497
Mobile: +1-201-675-9457

Cisco Systems Limited
One Penn Plaza
6th & 9th Floors
New York, NY 10119
United States
Cisco.com





[Think before you print.]Think before you print.

This email may contain confidential and privileged material for the sole use of 
the intended recipient. Any review, use, distribution or disclosure by others 
is strictly prohibited. If you are not the intended recipient (or authorized to 
receive for the recipient), please contact the sender by reply email and delete 
all copies of this message.
For corporate legal information go to:
http://www.cisco.com/web/about/doing_business/legal/cri/index.html



From: Tyler Conrad [mailto:ty...@tgconrad.com]
Sent: Tuesday, November 14, 2017 1:30 PM
To: james machado 
Cc: Greg Gombas -X (grgombas) ; nanog@nanog.org
Subject: Re: Issues with 4-octet BGP AS and Akamai?

Are you advertising out multiple circuits? Check the pathing both directions if 
you can. A lot of CDNs enforce uRPF strict.

On Tuesday, November 14, 2017, james machado 
mailto:hvgeekwt...@gmail.com>> wrote:
Greg,

I have a 4 byte ASN and have not had any issues with reach ability,
including the 2 websites you have linked.

James


RE: Re: Looking for help @ 60 Hudson

2017-11-15 Thread Jamie Bowden
>On Behalf Of Seth Mattinen
>
>On 11/13/17 12:49, Mike Hammett wrote:
>> Keep the humans out of the rack and you should be fine.
>> 
>> Where should I send the invoice?:-P  
>
>
>It's easy to keep a rack nice if you take the time. I've spent hours 
>removing and replacing cables in neatly dressed bundles because 
>equipment changes required a different length/type cable, but sometimes 
>that's what you gotta do to keep things neat and tidy.

Go that way really fast.  If something gets in your way, turn.

I want my two dollars.

-- 
Jamie Bowden


Re: Issues with 4-octet BGP AS and Akamai?

2017-11-15 Thread Job Snijders
Hi James,

On Wed, Nov 15, 2017 at 1:40 AM, james machado  wrote:
> I don't see a routing database object for your routes pointing too your
> AS394666 /24's, I only see one for AS12 for the /23 and /24's.  It is
> possible (and probable) you are being filtered due to that.

This is a really good observation, and a likely explanation!

@ OP - during IP space migrations from AS A to AS B you should ensure that route
objects exist for both ASNs.

You may also want to double check with your upstream providers what
their AS path
filters look like for your circuits.

Kind regards,

Job