Re: IPv6 prefix from T-Mobile USA used but not announced in BGP (2607:7700::/32)

2016-04-27 Thread Aaron Hopkins

On Wed, 27 Apr 2016, Baptiste Jonglez wrote:


While doing statistics on the participants of a public DHT, I was
surprised to see some IP addresses that are not present in the DFZ:


I believe those are used by T-mobile's 464XLAT (RFC 6877) implementation.

Recent Android on T-mobile is IPv6-only and has no ability to connect to
raw IPv4 addresses.  T-mobile's DNS servers are only asked by these devices
to translate hostnames to IPv6 addresses.  If they can't find an IPv6
address, they will look up the IPv4 address for a hostname, and pack it into
the bottom 32 bits of an IPv6 address that routes to a IPv6-to-IPv4 NAT
device.


2607:7700:0:25::4e00:605b


4e00:605b -> 78.0.96.91

-- Aaron


Re: IPv6 prefix from T-Mobile USA used but not announced in BGP (2607:7700::/32)

2016-04-27 Thread Aaron Hopkins

On Wed, 27 Apr 2016, Baptiste Jonglez wrote:


So, if this is basically DNS64/NAT64, these IP addresses should not be
seen as source or destination address outside of T-Mobile's network, and
are not attached to the interface of any device.


Based on http://dan.drown.org/android/clat/, it looks like it may be
possible for an IPv4-only application to connect to raw IPv4 addresses
through a IPv4-to-IPv6 NAT service on the Android device itself, which then
is transported over IPv6 to T-mobile's IPv6-to-IPv4 NAT device.

Skimming https://github.com/savoirfairelinux/opendht/blob/master/src/dht.cpp, my
guess is that new peers find your IPv4 address:port (on T-mobile's
IPv6-to-IPv4 NAT device) in the DHT and contact you, which somehow doesn't
get correctly translated back to IPv4 before it makes it to your
application, so you are seeing the untranslated IPv6 address.  Replying to
the new peer on the T-mobile-internal IPv6 address should still work as long
as you stay on T-mobile's network but are of limited use otherwise.

-- Aaron


Re: DNS caches that support partitioning ?

2012-08-20 Thread Aaron Hopkins

On Sat, 18 Aug 2012, Patrick W. Gilmore wrote:


IMHO, if Google losses a datacenter and all users are stuck waiting for a
long TTL to run out, that is Very Bad.  In fact, I would call even 2.5
minutes (average of 5 min TTL) Very Bad.  I'm impressed they are
comfortable with a 300 second TTL.


Google is very aggressive about reducing user-visible latency, of which they
cite DNS as a significant contributing factor.  They may be choosing to
strike a different balance of faster when everything is working correctly vs
faster to recover when something breaks.

-- Aaron



Akamai charges for IPv6 support?

2014-08-18 Thread Aaron Hopkins

Is it normal to bill for IPv6 service as a separate product?  I was
surprised to hear from from my Akamai rep they they do:


Hi Aaron, We can add the IPV6 service to the contract at an additional
cost of $XXX/month. Please let me know if you would like to go ahead with
the service and I can create the contract and send it for your review.


I've been working on adding IPv6 support to my current project on my own
time, and am now ready to enable it.  But as soon as there is a recurring
cost associated with IPv6 support, I need to be able to justify it.  And I'm
afraid that I can't currently explain a benefit of enabling IPv6 for our
users.  I'll likely end up not doing so while we're still an Akamai
customer.

It's Akamai's network, so it's their choice.  But big players adding
friction to enabling IPv6 certainly doesn't seem in everyone's best
interests in the long-term.

-- Aaron


RE: Akamai charges for IPv6 support?

2014-08-18 Thread Aaron Hopkins

On Mon, 18 Aug 2014, Mehmet Akcin wrote:


What did they say when you asked them(Akamai)?


I quoted their response in my mail; sorry if that wasn't clear.  They
offered to enable IPv6 service for a non-trivial monthly recurring fee,
which they offered to send me a revised contract to include.


I would imagine ipv6 to be included in price not an additional fee.


I was surprised to find that wasn't the case.

-- Aaron


Re: Akamai charges for IPv6 support?

2014-08-18 Thread Aaron Hopkins

On Mon, 18 Aug 2014, Noam Freedman wrote:


I'll make sure someone follows up on your ticket.  To help accelerate
overall IPv6 adoption, we stopped charging for new conversions to IPv6
over a year ago.  Probably just some misinformation in the sales force
from the old policy...


Oh, I hadn't expected that to be stale information.  That's good to hear.


Feel free to reach out directly to me if you end up needing more help.


Hopefully that won't be necessary, but thanks!

-- Aaron


Re: Dial Up Solutions

2015-10-18 Thread Aaron Hopkins

On Sun, 18 Oct 2015, Clayton Zekelman wrote:


I didn't think Asterisk had modem DSP and RAS code?!  Huh?


I was surprised to find IAXmodem (http://iaxmodem.sourceforge.net/), which
is "a software modem written in C that uses an IAX channel (commonly
provided by an Asterisk PBX system) instead of a traditional phone line and
uses a DSP library instead of DSP hardware chipsets."

It appears to be limited to 14.4k due to patent issues and handles faxes
only, but its existence suggests writing a software-only data modem should
be possible.

-- Aaron


At 09:31 PM 17/10/2015, Dovid Bender wrote:

You can use Asterisk. All you need a digium/sangom T1/E1 card and a box.


--Original Message--
From: Will Duquette
Sender: NANOG
To: nanog@nanog.org
ReplyTo: wi...@staff.gwi.net
Subject: Dial Up Solutions
Sent: Oct 16, 2015 15:28

Does anyone have any suggestions on equipment for our ISP that is still
supporting dial up customers?

At the moment we are running 3Com Total Control 1000's but are running out
of spare parts as we have failures.  Given that this gear is so old trying
to source spare parts is proving to be difficult.

We do have access to an Cisco AS5200 but are looking for maybe a SIP based
solution that could possibly run on our VM farm?  Has anyone heard of
anything like that or does it even exist?

What kind of gear are you running if you still are supporting dial up
customers?




Re: BGP Traffic Engineering question

2009-11-10 Thread Aaron Hopkins

On Tue, 10 Nov 2009, Drew Weaver wrote:


If you have several transit providers connected to your network and much
of your traffic is generally directed by the "BGP tiebreaker" (i.e. lowest
IP address) is there a way, without specifying on a per-prefix basis to
prefer the "tie breaker winner" slightly less often?


Assuming Cisco, set "bgp always-compare-med", "bgp deterministic-med", and
in your route-map in, "set origin igp" and "set metric X".  You can then
vary X as you see fit as an alternate tie-breaker.  As long as you never set
the metric the same on two different paths for the same prefix, it'll never
fall back to router-id.

Depending on the transit provider, you can often match bgp communities to
determine which are customer routes or the region where the announcement was
heard, which you can then use as a tie-breaker when setting the metric.
Barring that, as-path access-lists matching specific path fragments can do
the same thing, but seems to take more work to maintain as relationships
change over time.

-- Aaron



Re: isprime DOS in progress

2009-01-21 Thread Aaron Hopkins

On Wed, 21 Jan 2009, Phil Rosenthal wrote:
This attack has been ongoing on 66.230.128.15/66.230.160.1 for about 24 hours 
now, and we are receiving roughly 5Gbit of attack packets from roughly 
750,000 hosts.


I'm only receiving NS queries for "." from spoofed 66.230.128.15 and
66.230.160.1 via above.net (of my three transit providers) and none from
peering.  This usually indicates a single source, such as one rooted machine
on non-BCP38 net spewing most of a gigabit.

Given the attack is still in progress, I can't really say much more publicly, 
but suffice to say, we're working on the situation.


Have you had any luck tracking back the source of the spoofed packets?If
me talking to above.net sounds useful, let me know.

-- Aaron



Re: Youtube Geolocation

2011-04-22 Thread Aaron Hopkins

On Thu, 21 Apr 2011, Dan White wrote:


We're experiencing very poor quality with You Tube, and it appears we're
subject to a bad entry within a geolocation database somewhere.


I'm not sure about Youtube, but Google seems to do some some clever but
annoying things with correlating requests going through a recursive
nameserver with the location of those browsers.  If a bunch of browsers in
Atlanta use a recursive nameserver in Los Angeles, Google after a while
seems to start offering that nameserver Google server IPs close to Atlanta
to give back to its clients.

This internet draft might be part of a related work:

http://tools.ietf.org/html/draft-vandergaast-edns-client-subnet-00


When we attempt to view videos, the contact comes back to us from IPs like:


I ran into this problem while running a Tor exit node (which seems to
terribly screw with this mechanism) and played with it for a while.  I found
my nameserver being offered Google server IPs all over the globe; one week
it would be London, the next week Germany, then New York, etc.

My problem was first solved by changing my browser to use recursive
nameservers in a different /24 (changing the last octet didn't seem to help)
and later by changing Tor itself to use Google's own 8.8.8.8 nameservers,
which caused the problem to go away for other clients of my nameserver.

Try using nameservers on a different /24 and see if the problem goes away.

-- Aaron