Re: junos config commit question

2022-02-16 Thread Andrew Fried

that's what the "commit confirm xxx" command is for. :)

Andrew

On 2/16/22 3:23 PM, Jay Hennigan wrote:

On 2/16/22 09:56, Owen DeLong via NANOG wrote:


You can also do:
config

commit
rollback 1
commit


Unless you're remote and  breaks your ability to 
reach the box. Then you're hosed after the first "commit".




--
Andrew Fried
andrew.fr...@gmail.com


Re: Dyn DDoS this AM?

2016-10-21 Thread Andrew Fried
The brutal reality in todays world is that anyone that relies on the
Internet is just asking for stuff like this.  No service is safe.

Andrew


Andrew Fried
andrew.fr...@gmail.com

On 10/21/16 5:58 PM, Randy Bush wrote:
> anyone who relies on a single dns provider is just asking for stuff such
> as this.
> 
> randy
> 


Re: Cogent - ATT issue?

2014-04-02 Thread Andrew Fried
My connectivity between Fios and Cogent in Washington DC has been mostly
down for the past hour.

Andrew


Andrew Fried
andrew.fr...@gmail.com

On 4/2/14, 3:03 PM, Eric wrote:
> Anyone know if there is a connectivity issue between Cogent and ATT in the 
> northeast?  We're seeing random timeouts to some systems we have in an ATT 
> data center but only from sources on Cogent's network.
> 
> Thanks... 
> 
> - Eric :)
> 



Re: spamassassin hole again?

2014-04-13 Thread Andrew Fried
Any chance you could provide a *clue* as to what you're seeing, eg
message subject, from, etc???

Andrew Fried
andrew.fr...@gmail.com

On 4/13/14, 1:00 AM, Babak Farrokhi wrote:
> We are not using spamasassin and only major RBLs in place and seeing the same 
> wave of spam. Seems like a new botnot has just appeared. 
> 
> -- Babak
> 



Re: Observations of an Internet Middleman (Level3) (was: RIP Network Neutrality

2014-05-10 Thread Andrew Fried
++1

Andrew Fried
andrew.fr...@gmail.com

On 5/10/14, 2:42 PM, Patrick W. Gilmore wrote:
> Nice discussion about history & motivations. Not completely correct, but it's 
> always fun to argue over history, and over motivations, since both are open 
> to intepretation.
> 
> Personally, I am interested in the future, and specifically in market-driven 
> solutions to our problems. Call me a capitalist if you like, but I believe in 
> a functioning market, we can get a very good approximation of "fair".
> 
> If Company A and Company B have a mutual customer, and that customer needs 
> both companies to perform a task, the market will find a way to make those 
> two companies work together. Either that, or the customer will replace A or 
> B, whichever the customer feels is underperforming, with Company C.
> 
> We have that situation today. Streaming Company wants to send End User of 
> Broadband Company some content. If Streaming Company sucks - not enough 
> titles, lousy customer service, high price, poor performance, etc., etc. - 
> End User is free to select Streaming Company 2. And contrary to popular 
> belief, there are plenty of "Streaming Company 2s" available. Besides NF, 
> there is Hulu, Amazon, iTunes, iPlayer, etc. They might have different 
> models, but they all allow you to access streaming content, so choice is 
> available.
> 
> And here is where we get into the problem. Should End User believe Broadband 
> Company sucks, they frequently cannot choose Broadband Company 2. I know I 
> cannot, my choices are Comcast @ 100 Mbps or Verizon at 1.1 (yes, 
> one-point-one) Mbps. So when Streaming Company sucks, but they suck because 
> Broadband company is doing something I do not like, I cannot "vote with my 
> wallet" and pick Broadband Company 2. I have no choice but to pick Streaming 
> Company 2, even if I think the problem is Broadband Company's fault. (To be 
> clear, I am not a NF subscriber - any more - and so this is not a NF/CC 
> thing, I'm just talking generalities.)
> 
> Put more succinctly, there is no functioning market. therefore there cannot 
> be a market-based solution.
> 
> Personally, I view that as about the most Un-American, Un-Capitalistic thing 
> there is.
> 
> Lots of people have suggested a simple, if very difficult, fix to this 
> problem. Make the underlying physical infrastructure a regulated monopoly, 
> i.e. a Utility. Then allow anyone to run services over that physical 
> infrastructure.
> 
> This is not  pipe dream. The UK does it today. People there pick ISPs based 
> on service, price, features, etc., not on "who paid off my local PUC".
> 
> And before anyone brings up the whole "the UK is more dense than the US", I 
> preemptively call BS. There is more choice, faster speeds, and lower prices 
> in the middle of no-where UK than downtown manhattan. Please just leave that 
> argument where it belongs, in the dung heap.
> 
> Why can we not do something similar in the US? because the companies who own 
> the lines have enough money to pay enough lobbyists to avoid even the 
> promises they do make. (If anyone on this list is un-aware of things like the 
> telcos promising ubiquitous high-speed BB years ago and never delivering, but 
> never giving back their tax breaks or monopoly positions, you should be 
> ashamed of yourselves.)
> 
> But hey, a guy can dream, right?
> 
> In the mean time, let's stop pretending that 'oh, L3 paid CC so they must be 
> best friends'. L3 paid because They Had No Choice, and maybe because they see 
> some long-term strategic benefit (e.g. they can charge others more later).
> 
> This is not a functioning market. This is a few players with Market Power 
> charging Rents, which any first year econ major will explain is a 
> _very_very_very_ bad place for the market to be.
> 


Re: Ars Technica on IPv4 exhaustion

2014-06-17 Thread Andrew Fried
IPv6 will never become the defacto standard until the vast majority of
users have access to IPv6 connectivity.

Everything I have at the colo is dual stacked, but I can't reach my own
systems via IPv6 because my business class Verizon Fios connection is
IPv4 *only*.  Yes, Comcast is in the process of rolling out IPv6, but my
Comcast circuit in Washington DC is IPv4 only.  And I'd suspect that
everyone with Time Warner, AT&T, Cox, etc are all in the same boat.

Whether the reason for the lack of IPv6 deployment is laziness or an
intentional omission on the part of large ISPs to protect their income
from leasing IPv4 addresses doesn't matter to the vast majority of the
end users;  they simply can't access IPv6 via IPv4 only networks,
without using some kludgy, complicated tunneling protocols.

Andy

--
Andrew Fried
andrew.fr...@gmail.com

On 6/17/14, 5:48 PM, Jared Mauch wrote:
> 
> On Jun 17, 2014, at 5:41 PM, Lee Howard  wrote:
> 
>>
>>
>> On 6/17/14 4:20 PM, "Jay Ashworth"  wrote:
>>
>>> Here's what the general public is hearing:
>>
>> But only while they still have IPv4 addresses:
>> ~$ dig  arstechnica.com +short
>> ~$ 
>>
>>
>>
>>>
>>>
>>> http://arstechnica.com/information-technology/2014/06/with-the-americas-ru
>>> nning-out-of-ipv4-its-official-the-internet-is-full/
>>
>>
>> Can't tech news sites *please* run dual stack while they're spouting
>> end-of-IPv4 stories?
> 
> 
> 
> I would love to see a few more properties do IPv6 by default, such as ARS, 
> Twitter and a few others.  After posting some links and being a log stalker 
> last night the first 3 hits from non-bots were from users on IPv6 enabled 
> networks.
> 
> It does ring a bit hollow that these sites haven't gotten there when others 
> (Google, Facebook) have already shown you can publish  records with no 
> adverse public impact.  Making IPv6 available by default for users would be 
> an excellent step.  People like AT&T who control the 'attwifi' ssid could do 
> NAT66 at their sites and provide similar service to the masses.  With chains 
> like Hilton, McDonalds, etc.. all having this available, it would push IPv6 
> very far almost immediately with no adverse impact compared to users IPv4 
> experience.
> 
> - Jared
> 


Re: Time Warner Cable YouTube throttling

2013-03-06 Thread Andrew Fried
I know only too well that Verizon's peering with Cogent in the DC/IAD
area is beyond saturated.  Looking at the traceroute you have below it
would appear to be the same problem:

>>  5  0.xe-10-0-0.BR2.IAD8.ALTER.NET (152.63.38.165)  15.007 ms 15.109 ms
>> 14.975 ms
>>  6  144.232.8.209 (144.232.8.209)  187.038 ms  115.363 ms  117.669 ms

A handoff between Verizon and Sprint shouldn't incude a 100ms delay.

Andy

Andrew Fried
andrew.fr...@gmail.com

On 3/6/13 9:25 PM, Min wrote:
> 3 traces all indicated the last hub are 80~100ms faster than the
> second last hub.  Interesting.
> 
> Min
> 
> On Wed, Mar 6, 2013 at 9:07 PM, Derek Ivey  wrote:
>> I just got home and tested with quite a few 1080p videos. No issues over my
>> Hurricane Electric IPv6 tunnel. I did notice frequent stops to buffer on my
>> FiOS IPv4 connection. I have a 50 Mbps down connection and don't even come
>> close to maxing it when watching Youtube videos.
>>
>> Here are a few traceroutes:
>>
>> [2.1-BETA0][root@pfsense]/root(1): traceroute
>> r19---sn-p5qlsm7d.c.youtube.com
>> traceroute to r19.sn-p5qlsm7d.c.youtube.com (208.117.251.184), 64 hops max,
>> 40 byte packets
>>  1  L100.HRBGPA-VFTTP-12.verizon-gni.net (98.117.0.1)  1.222 ms 1.348 ms
>> 0.834 ms
>>  2  G10-0-8-112.HRBGPA-LCR-01.verizon-gni.net (130.81.184.148) 2.839 ms
>> 2.589 ms  2.443 ms
>>  3  P12-0-0.HRBGPA-LCR-02.verizon-gni.net (130.81.27.185)  14.880 ms  14.614
>> ms  14.698 ms
>>  4  so-12-1-0-0.RES-BB-RTR1.verizon-gni.net (130.81.28.254) 14.647 ms
>> 14.696 ms  14.552 ms
>>  5  0.xe-3-1-1.BR1.IAD8.ALTER.NET (152.63.37.141)  15.027 ms 15.004 ms
>> 15.064 ms
>>  6  te9-2-0d0.cir1.ashburn-va.us.xo.net (206.111.0.201)  38.517 ms  36.033
>> ms  34.816 ms
>>  7  216.156.8.189.ptr.us.xo.net (216.156.8.189)  31.958 ms  30.994 ms
>> 29.194 ms
>>  8  209.48.42.86 (209.48.42.86)  124.931 ms  126.117 ms  124.303 ms
>>  9  208.117.251.184 (208.117.251.184)  26.483 ms  27.792 ms 27.974 ms
>>
>> [2.1-BETA0][root@pfsense]/root(2): traceroute
>> r15---sn-p5qlsm76.c.youtube.com
>> traceroute to r15.sn-p5qlsm76.c.youtube.com (208.117.251.148), 64 hops max,
>> 40 byte packets
>>  1  L100.HRBGPA-VFTTP-12.verizon-gni.net (98.117.0.1)  1.077 ms 0.863 ms
>> 0.968 ms
>>  2  G10-0-8-112.HRBGPA-LCR-01.verizon-gni.net (130.81.184.148) 2.429 ms
>> 2.265 ms  2.456 ms
>>  3  P12-0-0.HRBGPA-LCR-02.verizon-gni.net (130.81.27.185)  14.788 ms  14.666
>> ms  14.643 ms
>>  4  so-12-1-0-0.RES-BB-RTR1.verizon-gni.net (130.81.28.254) 14.591 ms
>> 14.479 ms  16.041 ms
>>  5  0.xe-10-0-0.BR2.IAD8.ALTER.NET (152.63.38.165)  15.007 ms 15.109 ms
>> 14.975 ms
>>  6  144.232.8.209 (144.232.8.209)  187.038 ms  115.363 ms  117.669 ms
>>  7  sl-st31-ash-0-4-0-0.sprintlink.net (144.232.28.6)  116.263 ms
>> sl-st31-ash-0-8-0-2.sprintlink.net (144.232.1.19)  116.491 ms
>> sl-st31-ash-0-4-0-0.sprintlink.net (144.232.28.6)  116.934 ms
>>  8  sl-googl10-584821-0.sprintlink.net (144.228.205.34)  122.521 ms  122.780
>> ms  121.535 ms
>>  9  208.117.251.148 (208.117.251.148)  33.669 ms  37.652 ms 38.478 ms
>>
>> [2.1-BETA0][root@pfsense]/root(6): traceroute
>> r10---sn-p5qlsm7l.c.youtube.com
>> traceroute to r10.sn-p5qlsm7l.c.youtube.com (208.117.251.47), 64 hops max,
>> 40 byte packets
>>  1  L100.HRBGPA-VFTTP-12.verizon-gni.net (98.117.0.1)  1.159 ms 0.831 ms
>> 0.806 ms
>>  2  G9-0-4-212.HRBGPA-LCR-02.verizon-gni.net (130.81.139.126) 2.396 ms
>> 2.435 ms  2.167 ms
>>  3  so-12-1-0-0.RES-BB-RTR1.verizon-gni.net (130.81.28.254) 14.497 ms
>> 14.767 ms  14.695 ms
>>  4  0.xe-11-0-0.BR2.IAD8.ALTER.NET (152.63.38.169)  15.001 ms 15.074 ms
>> 15.024 ms
>>  5  144.232.8.209 (144.232.8.209)  118.582 ms  116.717 ms  113.669 ms
>>  6  sl-st31-ash-0-4-0-3.sprintlink.net (144.232.3.169)  114.433 ms  117.698
>> ms
>> sl-st31-ash-0-4-0-0.sprintlink.net (144.232.28.6)  115.981 ms
>>  7  sl-googl10-584821-0.sprintlink.net (144.228.205.34)  123.912 ms  124.402
>> ms  125.384 ms
>>  8  208.117.251.47 (208.117.251.47)  30.591 ms  30.676 ms  29.528 ms
>>
>> Derek
>>
>> On 3/6/2013 8:31 PM, Grant Ridder wrote:
>>>
>>> Can any one provide traceroutes to youtube to see if there is any
>>> correlation between last mile providers?
>>>
>>> -Grant
>>>
>>> On Wed, Mar 6, 2013 at 6:37 PM, Derek Ivey >> <mailto:de...@derekivey.com>> wrote:
>>>
>>> I don't think it's just Time Warner. Definitely looks like XO. I have
>>> Veri

Re: Google Public DNS Problems?

2013-05-01 Thread Andrew Fried
Your IPs may have been rate limited...

Andy

Andrew Fried
andrew.fr...@gmail.com

On 5/1/13 12:38 PM, Blair Trosper wrote:
> That's all well and good, but I certainly wouldn't expect "nslookup
> gmail.com" or for "nslookup google.com" to return SERVFAIL
> 
> 
> On Wed, May 1, 2013 at 9:34 AM, Joe Abley  wrote:
> 
>>
>> On 2013-05-01, at 12:09, Blair Trosper  wrote:
>>
>>> Is anyone else seeing this?  From Santa Clara, CA, on Comcast
>>> Business...I'm getting SERVFAIL for any query I throw at 8.8.8.8 and
>>> 8.8.4.4...
>>>
>>> Level 3's own public resolvers are fine for me, as are OpenDNS's
>> resolvers.
>>
>> Google just turned on validation across the whole of 8.8.8.8 and 8.8.4.4.
>> The expected behaviour in the case where a response does not validate is to
>> return SERVFAIL to the client.
>>
>> You could check that the queries you are sending are not suffering from
>> poor signing hygiene (e.g. use the handy-dandy dnsviz.net visualisation).
>>
>> If this is a repeatable, consistent problem even for unsigned zones (or
>> for zones that you've verified are signed correctly) and especially if it's
>> widespread you might want to call google on the nanog courtesy phone and
>> have them look for collateral damage from their recent foray into 8.8.8.8
>> validation.
>>
>> Raw output from dig/drill and traceroutes to 8.8.8.8/8.8.4.4 are highly
>> recommended if you need to take this further.
>>
>>
>> Joe



Re: Hijacked Network Ranges

2012-01-31 Thread Andrew Fried
The interesting thing is that I'm not seeing any new "hosts" from those
subnets in passive dns.  It almost seems that their purpose for
hijacking the space was to direct traffic to themselves, possibly for
collecting login attempts.

Andrew Fried
andrew.fr...@gmail.com

On 1/31/12 1:00 PM, Kelvin Williams wrote:
> Greetings all.
> 
> We've been in a 12+ hour ordeal requesting that AS19181 (Cavecreek Internet
> Exchange) immediately filter out network blocks that are being advertised
> by ASAS33611 (SBJ Media, LLC) who provided to them a forged LOA.
> 
> The routes for networks: 208.110.48.0/20, 63.246.112.0/20, and
> 68.66.112.0/20 are registered in various IRRs all as having an origin AS
> 11325 (ours), and are directly allocated to us.
> 
> The malicious hijacking is being announced as /24s therefore making route
> selection pick them.
> 
> Our customers and services have been impaired.  Does anyone have any
> contacts for anyone at Cavecreek that would actually take a look at ARINs
> WHOIS, and IRRs so the networks can be restored and our services back in
> operation?
> 
> Additionally, does anyone have any suggestion for mitigating in the
> interim?  Since we can't announce as /25s and IRRs are apparently a pipe
> dream.
> 



Re: Operation Ghost Click

2012-04-26 Thread Andrew Fried
I suggest you reach out to Shadowserver or Team Cymru if you're a
netblock owner.  They can provide daily reports of infected IPs.

Andy

Andrew Fried
andrew.fr...@gmail.com

On 4/26/12 5:50 PM, Leigh Porter wrote:
> 
> On 26 Apr 2012, at 22:47, "Andrew Latham" 
> mailto:lath...@gmail.com>> wrote:
> 
> On Thu, Apr 26, 2012 at 5:38 PM, Jeroen van Aart 
> mailto:jer...@mompl.net>> wrote:
> 
> Yes its a major problem for the users unknowingly infected.  To them
> it will look like their Internet connection is down.  Expect ISPs to
> field lots of support s
> 
> Is there a list of these temporary servers so I can see what customers are 
> using them (indicating infection) and head off a support call with some 
> contact?
> 
> --
> Leigh
> 
> 
> __
> This email has been scanned by the Symantec Email Security.cloud service.
> For more information please visit http://www.symanteccloud.com
> __



Domain changer statistics by ASN

2012-07-05 Thread Andrew Fried
As many of you probably know, the replacement nameservers operated on
behalf of the FBI for the Domain Changer Working Group (DCWG) are
scheduled to go down Sunday morning (GMT).

Yesterday, July 4th, was a holiday in the US, and as such the US based
activity hitting the DCWG nameservers was uncharacteristically low.  The
numbers seen in the rest of the world were normal.

I'm attaching a report that shows the number of unique ip addresses that
were seen hitting the DCWG nameservers from the 4th based on ASN.  If
you control one of the ASNs seen in the list please remind your folks
that these numbers need to come down by Sunday.

if you find this of use, I can regenerate new reports later this
afternoon with data from the 5th.

Andy

-- 
Andrew Fried
andrew.fr...@gmail.com




dcwg-asns-20120704.txt.bz2
Description: BZip2 compressed data


Re: Domain changer statistics by ASN

2012-07-05 Thread Andrew Fried
We have data going back to November 8, 2011.  Generating a report of
over 2,000 ASNs, by day, would be too large an attachment for NANOG.

I'll produce a follow up report in less than 3 hours with data from July
5th.  Would that help?

Andy

Andrew Fried
andrew.fr...@gmail.com


On 7/5/12 5:42 PM, Eric Wieling wrote:
> A report for a day other than the 4th of July would be very helpful.
> 
> -Original Message-
> From: Andrew Fried [mailto:andrew.fr...@gmail.com] 
> Sent: Thursday, July 05, 2012 5:26 PM
> To: nanog@nanog.org
> Subject: Domain changer statistics by ASN
> 
> As many of you probably know, the replacement nameservers operated on behalf 
> of the FBI for the Domain Changer Working Group (DCWG) are scheduled to go 
> down Sunday morning (GMT).
> 
> Yesterday, July 4th, was a holiday in the US, and as such the US based 
> activity hitting the DCWG nameservers was uncharacteristically low.  The 
> numbers seen in the rest of the world were normal.
> 
> I'm attaching a report that shows the number of unique ip addresses that were 
> seen hitting the DCWG nameservers from the 4th based on ASN.  If you control 
> one of the ASNs seen in the list please remind your folks that these numbers 
> need to come down by Sunday.
> 
> if you find this of use, I can regenerate new reports later this afternoon 
> with data from the 5th.
> 
> Andy
> 
> --
> Andrew Fried
> andrew.fr...@gmail.com
> 
> 




Re: DNS Changer items

2012-07-06 Thread Andrew Fried
The dns-ok.us site is getting crushed from all the sudden media
interest.  We're trying to tweak it to handle the 50,000 or so
simultaneous connections.

Andy

Andrew Fried
andrew.fr...@gmail.com


On 7/6/12 12:34 PM, Eric J Esslinger wrote:
> A) The DNS changer working group site http://www.dns-ok.us seems to be down 
> for the clean people anyway. (Down for everyone agrees with me).
> B) Fox, CNN, and MSNBC have apparantly all run stories in the last couple of 
> hours that essentially ended with 'Call your ISP if you have any questions' 
> (gee thanks). And I'm told the ABC/CBS/NBC are running the same basic thing 
> tonight, with the same basic ending.
> 
> The more you know...
> 
> __
> Eric Esslinger
> Information Services Manager - Fayetteville Public Utilities
> http://www.fpu-tn.com/
> (931)433-1522 ext 165
> 
> This message may contain confidential and/or proprietary information and is 
> intended for the person/entity to whom it was originally addressed. Any use 
> by others is strictly prohibited.
> 




Re: DNS Changer items

2012-07-06 Thread Andrew Fried
The DNS redirection began on November 8, 2011.  The servers were
instrumented to capture a very small portion of the dns data (source ip
and port only) so that reports of infected users could be sent to the
ISPs via reporting organizations like Shadowserver.

Some ISPs did create walled gardens.  Some merely redirected affected
customers to their own internal DNS servers.  Some ISPs did aggressive
notifications to their users.  And some ISPs did nothing.

Sites were set up to allow users to check their systems (dns-ok.us,
etc).  The DCWG set up an information site to provide information on how
to detect the DNSchanger infection and how to fix it.  AV companies
provided tools to help clean up systems, and the tools were published on
the DCWG.org website.

The FBI went to great lengths to get press coverage to get the word out.

This operation has been ongoing for 7 months, 27 days and 14 hours.

How much more of a graceful ramp down could there have been?

Andy

Andrew Fried
andrew.fr...@gmail.com


On 7/6/12 1:52 PM, Cameron Byrne wrote:
> So insteading of turning the servers off, would it not have been helpful to
> have the servers return a "captive portal" type of reponse saying "hey,
> since you use this server, you are broken, go here to get fixed"
> 
> Seems that would have been a more graceful ramp down.
> 
> CB
> 




Re: DNS Changer items

2012-07-06 Thread Andrew Fried
Cameron,

That idea had been brought up.  Also discussed was short durations of
random blackouts of dns resolution to impress upon the infected users
that they needed to take action.  Unfortunately, taking either of those
actions would have exceeded the authorization of the court order.

We're coming up with a pretty detailed list of "lesson's learned" from
this operation and being able to implement ideas like yours will
hopefully be considered in advance "next time".

Andy

Andrew Fried
andrew.fr...@gmail.com


On 7/6/12 3:58 PM, Tomas L. Byrnes wrote:
> I think having the ISC DNS changer sinkhole servers return the DCWG
> check page IP for all queries would be a good final act.
> 
>> -----Original Message-
>> From: Andrew Fried [mailto:andrew.fr...@gmail.com]
>> Sent: Friday, July 06, 2012 11:16 AM
>> To: Cameron Byrne
>> Cc: nanog@nanog.org
>> Subject: Re: DNS Changer items
>>
>> The DNS redirection began on November 8, 2011.  The servers were
>> instrumented to capture a very small portion of the dns data (source
> ip and
>> port only) so that reports of infected users could be sent to the ISPs
> via
>> reporting organizations like Shadowserver.
>>
>> Some ISPs did create walled gardens.  Some merely redirected affected
>> customers to their own internal DNS servers.  Some ISPs did aggressive
>> notifications to their users.  And some ISPs did nothing.
>>
>> Sites were set up to allow users to check their systems (dns-ok.us,
> etc).  The
>> DCWG set up an information site to provide information on how to
> detect
>> the DNSchanger infection and how to fix it.  AV companies provided
> tools to
>> help clean up systems, and the tools were published on the DCWG.org
>> website.
>>
>> The FBI went to great lengths to get press coverage to get the word
> out.
>>
>> This operation has been ongoing for 7 months, 27 days and 14 hours.
>>
>> How much more of a graceful ramp down could there have been?
>>
>> Andy
>>
>> Andrew Fried
>> andrew.fr...@gmail.com
>>
>>
>> On 7/6/12 1:52 PM, Cameron Byrne wrote:
>>> So insteading of turning the servers off, would it not have been
>>> helpful to have the servers return a "captive portal" type of
> reponse
>>> saying "hey, since you use this server, you are broken, go here to
> get fixed"
>>>
>>> Seems that would have been a more graceful ramp down.
>>>
>>> CB
>>>
>>
> 




Re: DNS Changer items

2012-07-06 Thread Andrew Fried
The subnets will probably be held until the conclusion of the criminal
trials.  After that, the addresses may be held back from assignment for
a while (e.g. a year), but eventually they'll get reassigned.

Andrew Fried
andrew.fr...@gmail.com


On 7/6/12 4:45 PM, Roy wrote:
> On 7/6/2012 1:15 PM, Andrew Fried wrote:
>> Cameron,
>>
>> That idea had been brought up.  Also discussed was short durations of
>> random blackouts of dns resolution to impress upon the infected users
>> that they needed to take action.  Unfortunately, taking either of those
>> actions would have exceeded the authorization of the court order.
>>
>> We're coming up with a pretty detailed list of "lesson's learned" from
>> this operation and being able to implement ideas like yours will
>> hopefully be considered in advance "next time".
>>
>> Andy
>>
>> Andrew Fried
>> andrew.fr...@gmail.com
>>
>>
> 
> 
> Doesn't the court order expire as of Monday?  What happens to those IP
> ranges then?
> 
> 
> 




Re: [outages] www.dns-ok.us down

2012-07-06 Thread Andrew Fried
Some ISPs are performing internal redirection.  Some, in fact, have been
doing it since the takedown last November.

The redirection has to stop at some point.  And keep in mind, most of
the systems infected with DNSchanger have other malware running on their
boxes, so keeping those systems up indefinitely is actually not a good
thing.

Andy

Andrew Fried
andrew.fr...@gmail.com


On 7/6/12 5:40 PM, Jay Ashworth wrote:
> So... might large and medium ISPs not redirect DNS to those known addresses
> to a resolver in house, which would log the client IPs and let them
> know whom to address?
> 
> Cheers,
> -- jra





Re: load balancer product for dns content switching

2015-08-27 Thread Andrew Fried
While still in pre-production state, you might want to look at:

http://dnsdist.org/

Andrew

Andrew Fried
andrew.fr...@gmail.com

On 8/27/15 3:13 PM, Brooks Bridges wrote:
> Spent quite a bit of time researching products out there looking for one
> that will do content switching based on the domain being queried, and
> I'm coming up empty.  Can anyone point me in a decent direction?
> 
> For example:
> 
> all requests are sent to one (HA) VIP, and then:
> 
> host.bob.domain.com gets routed to dns server group 1
> host.bill.domain.com gets routed to dns server group 2
> and so on...
> 
> Thanks for any advice
> 


Re: remote serial console (IP to Serial)

2016-03-08 Thread Andrew Fried
The Lantronix Spiders work well and aren't a "do-it-yourself" option:

http://www.lantronix.com/products/lantronix-spider/

Andrew

Andrew Fried
andrew.fr...@gmail.com

On 3/8/16 10:30 AM, greg whynott wrote:
> Recently I have taking over the responsibility of managing about 18 remote
> routers and firewalls.   None of these have a console port for 'out of
> band' access accessible today.
> 
> Most sites has available IPs between the ISP and us (typically a /29) or a
> backup DSL connection available for use. I'd like to purchase a IP to
> Serial port device I can use for each location in the event I lock myself
> out.   The requirement would be an Ethernet port,  a serial port,  and SSH.
> 
> 
> Anyone have any recommendations on something like this?
> 
> thanks much,
> greg
> 


Re: This is a coordinated hacking. (Was Re: Need help in flushing DNS)

2013-06-20 Thread Andrew Fried
Not so easy and straightforward to do.  You'll find that a lot of the
big names out there frequently tweak DNS, which will result in a
non-stop stream of "alerts".

Andy

Andrew Fried
andrew.fr...@gmail.com

On 6/20/13 3:57 PM, Jared Mauch wrote:
> It seems there may be a need for some sort of 'dns-health' check out there 
> that can be done in semi-realtime.
> 
> I ran a report for someone earlier today on a domain doing an xref against 
> open resolver data searching for valid responses vs invalid ones.
> 
> Is this of value?  Does it need to be automated?
> 
> - Jared
> 
> On Jun 20, 2013, at 3:53 PM, jamie rishaw  wrote:
> 
>> This is most definitely a coordinated and planned attack.
>>
>> And by 'attack' I mean hijacking of domain names.
>>
>> I show as of this morning nearly fifty thousand domain names that appear
>> suspicious.
>>
>> I'm tempted to call uscentcom and/or related agencies (which agencies, who
>> the hell knows, as ICE seems to have some sort of authority over domains
>> (nearly two hundred fifty of them as I type this in COM alone and another
>> thirty-some in NET).
>>
>> Anyone credentialed (credentialed /n/., "I know you or know of you,")
>> wanting data, e-mail me off-list for some TLD goodness.
>>
>>
>>
>>
>>
>>
>> On Thu, Jun 20, 2013 at 12:29 PM, Phil Fagan  wrote:
>>
>>> Agree'd in these "smaller" scenario's I just wonder if in a larger scale
>>> scenario, whatever that might look like, if its necessary. Whereby many
>>> organizations who provide "services" are effected. Perhaps the result of a
>>> State led campaign topic for another day.
>>>
>>>
>>>
>>>
>>> On Thu, Jun 20, 2013 at 11:25 AM, Paul Ferguson >>> wrote:
>>>
>>>> I am betting that Netsol doesn't need any more "coordination" at the
>>>> moment -- their phones are probably ringing off-the-hook. There are
>>>> still ~400 domains still pointing to the ztomy NS:
>>>>
>>>>
>>>> ; <<>> DiG 9.7.3 <<>> @foohost parsonstech.com NS
>>>> ; (1 server found)
>>>> ;; global options: +cmd
>>>> ;; Got answer:
>>>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49064
>>>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0
>>>>
>>>> ;; QUESTION SECTION:
>>>> ;parsonstech.com.INNS
>>>>
>>>> ;; ANSWER SECTION:
>>>> parsonstech.com.172800INNSns2617.ztomy.com.
>>>> parsonstech.com.172800INNSns1617.ztomy.com.
>>>>
>>>> ;; Query time: 286 msec
>>>> ;; SERVER: 127.0.0.1#53(127.0.0.1)
>>>> ;; WHEN: Thu Jun 20 19:16:25 2013
>>>> ;; MSG SIZE  rcvd: 81
>>>>
>>>> - ferg
>>>>
>>>> On Thu, Jun 20, 2013 at 10:13 AM, Phil Fagan 
>>> wrote:
>>>>
>>>>> I should caveat.coordinate the "recovery" of.
>>>>>
>>>>>
>>>>> On Thu, Jun 20, 2013 at 11:10 AM, Brandon Butterworth
>>>>> wrote:
>>>>>
>>>>>>> Is there an organization that coordinates outages like this amongst
>>>> the
>>>>>>> industry?
>>>>>>
>>>>>> No, usually they are surprise outages though Anonymous have tried
>>>>>> coordinating a few
>>>>>>
>>>>>> brandon
>>>>>>
>>>>>
>>>>>
>>>>>
>>>>> --
>>>>> Phil Fagan
>>>>> Denver, CO
>>>>> 970-480-7618
>>>>
>>>>
>>>>
>>>> --
>>>> "Fergie", a.k.a. Paul Ferguson
>>>> fergdawgster(at)gmail.com
>>>>
>>>
>>>
>>>
>>> --
>>> Phil Fagan
>>> Denver, CO
>>> 970-480-7618
>>>
>>
>>
>>
>> -- 
>> Jamie Rishaw // .com.arpa@j <- reverse it. ish.
>> [Impressive C-level Title Here], arpa / arpa labs
> 
> 



Re: Cogent IPV6 connectivity to fireball.acr.fi

2013-11-03 Thread Andrew Fried
>From AS54054 in Ashburn, VA I can ping your address but traceroute's
aren't making it through.

Andrew

Andrew Fried
andrew.fr...@gmail.com

On 11/3/13, 1:30 PM, Clinton Work wrote:
> IPV6 connectivity to fireball.acr.fi is failing inside Cogent AS174.  I
> have already contacted the Cogent NOC, but I haven't heard anything back
> yet. I'm wondering if somebody else with Cogent IPV6 connectivity can
> run some tests.   IPV4 connectivity is working fine.  
> 



Re: List of CDNs?

2013-11-14 Thread Andrew Fried
Actually, a list of CDNs would be very handy.  I harvest botnets and
fast flux hosts out of passive dns, and some of the heuristics used to
identify them are similar to what CDNs look like.

Having a decent list of CDN effective top level domains alone would be
useful for redacting those hosts.

Andy


Andrew Fried
andrew.fr...@gmail.com

On 11/14/13, 5:11 PM, Patrick W. Gilmore wrote:
> List of CDNs would be difficult, but not impossible. Although they do 
> different things, so a simple list is unlikely to be as useful as it looks. 
> 
> A lost of CDN "DC nodes" is not possible. Why do you care about such a thing 
> anyway?
> 



Re: Verizon FIOS IPv6?

2014-01-07 Thread Andrew Fried
You fared better than I did.  I also am a Verizon Business customer,
and when I called and inquired about ipv6 I was told that they didn't
carry that channel. :)


Andrew Fried
andrew.fr...@gmail.com

On 1/7/14, 11:28 PM, Stephen Frost wrote:
> * Christopher Morrow (morrowc.li...@gmail.com) wrote:
>> On Tue, Jan 7, 2014 at 10:56 PM, Adam Rothschild
>>  wrote:
>>> I've heard of folk in and around the NYC metro getting set up
>>> for v6 by escalating through their commercial account teams, or
>>> the field
>> 
>> 'commercial account teams' == business customers?
> 
> As a FIOS business customer, I can say that I've had no progress on
> that front, though I've bugged them about it often enough...
> Perhaps I shall try again though.  I would truely love to hear from
> one of these folks in NYC who managed to get it...
> 
>>> implementation is shameful, and should be called out wherever 
>>> possible.
>> 
>> yes :( it's nice that the Networx contract didn't require any
>> ipv6 readiness...
> 
> There's a US government mandate for government public websites to 
> support IPv6 and quite a few of those do- in some cases through
> Networx. I don't recall agencies complaining about the inability to
> get IPv6 for public websites via Networx either.  Additionally,
> most of the services under the Networx contract are more
> traditional telecom services which don't particularly care what you
> run over them.
> 
> As for having Networx require IPv6 support for all services- some
> of us tried, and while a nice idea, I doubt it would have lasted
> terribly long post-award even if it had been included for the few
> IP-based services which were part of the original contract.  Sadly,
> having been involved in government contracting, it's amazing what
> happens when the vendor says "we want to provide $awesome, but we
> need you to waive this *one* little thing" and there isn't a
> mandate (afair...) for agencies to run IPv6 internally (tho they're
> supposed to be buying devices which *support* it).
> 
> I will say that the more the agencies complain to GSA the highest
> the chance of something being done about it.
> 
> Thanks,
> 
> Stephen
> 



Re: POP3 DoS attacks and mailanyone.net?

2009-09-01 Thread Andrew Fried
Hummm.  Looking through some of my data I found that the domain
NORTHROANOKE.COM resolves to 98.190.204.2 (the first attack vector).

That box is running Microsoft Business Server 2003.  NORTHROANOKE.COM
appears to be some kind of assisted living facility in Roanoke, Virginia
(based on whois).

Doesn't look gmail related from that perspective...


Andrew

Andrew Fried
andrew.fr...@gmail.com


Winn Johnston wrote:
> Issues with gmail.com 
> 
> here in DC
> 
> Winn Johnston
> 
> From: u...@3.am [...@3.am]
> Sent: Tuesday, September 01, 2009 3:28 PM
> To: nanog@nanog.org
> Subject: POP3 DoS attacks and mailanyone.net?
> 
> For the first time since I can remember, my POP3 server was effectively
> shut down by too many simultaneous connections today.  The first fix I
> tried was to raise the number of connections from the default 40 to 100,
> but the problem soon returned.
> 
> I finally ipfw'd off the offending IP (98.190.204.2 for anyone
> interested), then went to look for other possible offenders in the log.  I
> noticed several thousand connections today to a few dozen former users
> from 4 IPs from 208.70.128.0/21.  One of the users was actually
> legitimate.
> 
> These IPs belong to mailanyone.net.  The tech contact in their ARIN record
> is listed as:
> 
> OrgTechHandle: BHE57-ARIN
> OrgTechName:   Heitman, Bryan
> OrgTechPhone:  +1-816-587-4700
> OrgTechEmail:  hostmas...@mailanyone.net
> 
> However, that phone number goes to a UPS store that has no idea what I'm
> talking about.  I then dialed their suppseod NOC number:
> 
> Comment:FuseMail, LLC Network Operations Center contact
> Comment:877.888.3873 x3
> 
> I am on hold with that number right now with some very loud and annoying
> music.
> 
> Can anyone offer any insight as to these people and how/who to deal with
> there?
> 
> Would a provider be amiss to just block their entire /21?
> 
> TIA,
> 
> James Smallacombe PlantageNet, Inc. CEO and Janitor
> u...@3.am http://3.am
> =
> 
> 
> __
> This inbound email was scanned by MessageLabs
> _
> 
> __
> This email was scanned by MessageLabs
> _
> 



Re: godaddy spam / abuse suspensions?

2008-11-16 Thread Andrew Fried
Chances are if the domain has been sandboxed, it was because it was
involved in some kind of phishing scheme, not spam.  This is the
typicaly way of mitigating fast flux botnets.  So I don't agree with the
assessment that this is bad behavior on the part of GoDaddy - to the
contrary, they are acting quite responsibly.

AF


James Hess wrote:
> I don't think he wants the domain. The problem is Godaddy listing NS
> records for some domains (for any reason)  to only DNS servers that
> were all down or didn't exist.   The entry of only lame DNS servers is
> an inconclusive situation and doesn't let a message be permanently
> rejected as spam;  it's indistinguishable from a temporary failure of
> all that domain's DNS servers.
>
> It also causes (hopefully non-fatal) problems for hosts looking up the
> contacting host's ip,
> like wasteful repeated queries.
>
> This is not good behavior on the registrar's part;  Godaddy would
> almost be better seving
> the internet community by ignoring spam and doing nothing, or
> forwarding reports to ISPs rather than introducing lame DNS zones.
>
>
> Registrars aren't really in a place to be able to stop spam; the
> spammer can simply use any domain or have their reverse zone changed
> accordingly, if they have custom reverse.
>
> But for a registrar to do their best.. by pulling domains  where they
> have proof the owner has performed or authorized spam, they should
> pull the domain from the TLD zone entirely and let the response be
> NXDOMAIN.
>
> A  NXDOMAIN response  allows  the mail server to definitively reject the 
> message
> and move on.
>
>
> --
> -J
>
> On Sun, Nov 16, 2008 at 12:19 PM, Rohan Sheth <[EMAIL PROTECTED]> wrote:
>   
>> Name has been suspended for "supposed" abuse by the godaddy abuse team.
>>
>> I believe the only recourse is to email [EMAIL PROTECTED] (cc
>> [EMAIL PROTECTED]) asking what they want to release the domain to
>> you.  I believe the usual charge is like $75 or so.
>>
>> --Rohan
>>
>> 
>
>
>   

-- 
Andrew Fried
[EMAIL PROTECTED]




Re: isprime DOS in progress

2009-01-24 Thread Andrew Fried
p named[32762]: client 208.78.169.235#46265:
> view ext: query (cache) './NS/IN' denied
> Jan 24 08:52:45 imhotep last message repeated 2 times
> Jan 24 08:55:54 imhotep named[32762]: client 149.20.58.131#59151: view
> ext: query (cache) 'localhost/A/IN' denied
> Jan 24 09:36:38 imhotep named[32762]: client 208.37.177.62#46265: view
> ext: query (cache) './NS/IN' denied
> Jan 24 09:36:38 imhotep last message repeated 2 times
> Jan 24 09:43:53 imhotep named[32762]: client 204.11.51.61#43330: view
> ext: query (cache) './NS/IN' denied
> Jan 24 09:43:54 imhotep last message repeated 2 times
> Jan 24 09:53:56 imhotep named[32762]: client 63.217.28.226#53: view
> ext: query (cache) './NS/IN' denied
> Jan 24 10:05:28 imhotep named[32762]: client 208.78.169.234#42517:
> view ext: query (cache) './NS/IN' denied
> Jan 24 10:05:28 imhotep last message repeated 2 times
> Jan 24 10:26:09 imhotep named[32762]: client 206.71.158.30#18971: view
> ext: query (cache) './NS/IN' denied
> Jan 24 10:26:11 imhotep named[32762]: client 206.71.158.30#47622: view
> ext: query (cache) './NS/IN' denied
> Jan 24 10:26:13 imhotep named[32762]: client 206.71.158.30#16077: view
> ext: query (cache) './NS/IN' denied
>
>
>

-- 
Andrew Fried
andrew.fr...@gmail.com




Re: isprime DOS in progress

2009-01-25 Thread Andrew Fried
I just took a snapshot of my bind logs from the past two hours (on
01/25/209 at 14:40 EST).  Based on what I'm seeing, four DNS servers are
still under attack at varying levels.  206.71.158.30 is bearing the
brunt of the attacks.  And as you indicated, 76.9.16.171 is still being
targeted, although to a lesser degree than before.

+---+-+
| host  | count(host) |
+---+-+
| 10.168.69.6   |   3 |
| 206.71.158.30 |6513 |
| 63.217.28.226 | 182 |
| 66.230.160.1  | 266 |
| 76.9.16.171   |  92 |
+---+-+

-- 
Andrew Fried
andrew.fr...@gmail.com



David Andersen wrote:
> I'm not sure you're entirely out of the water yet:
>
> 17:13:45.680944 76.9.16.171.53868 > .53:  58451+ NS? . (17)
> 17:13:45.681251 .53 > 76.9.16.171.53868:  58451 Refused- 0/0/0
> (17)
>
> CIDR:   76.9.0.0/19
> NetName:ISPRIME-ARIN-3
>
> In addition to the one that Brian Keefer mentioned a few days ago
> (206.71.158.30).
>
> But on that subject, I figured I'd toss in a (sad) anecdote about
> security and upgrades.  I'd upgraded this nameserver to bind-9 some
> time ago, during a bit of a security panic.  And in the process, I
> screwed it up - I'd updated the machine itself, but had failed to
> propagate the changes to the master that sends updates to all of the
> servers.  The obvious thing happened:  after a while, this nameserver
> pulled its updates from the master, and downgraded to bind-8 again,
> which we didn't notice until I saw it spitting full cached NS
> responses to isprime hosts.  Human error strikes again.  Apologies for
> letting my host be an amplifier.
>
>   -Dave
>
>
> On Jan 23, 2009, at 1:11 PM, Phil Rosenthal wrote:
>
>> Just a friendly notice, the attack against 66.230.128.15/66.230.160.1
>> seems to have stopped for now.
>>
>> -Phil
>> On Jan 22, 2009, at 6:01 AM, Bjørn Mork wrote:
>>
>>> Graeme Fowler  writes:
>>>
>>>> I've been seeing a lot of noise from the latter two addresses after
>>>> switching on query logging (and finishing an application of Team
>>>> Cymru's
>>>> excellent template) so I decided to DROP traffic from the addresses
>>>> (with source port != 53) at the hosts in question.
>>>>
>>>> Well, blow me down if they didn't completely stop talking to me. Four
>>>> dropped packets each, and they've gone away.
>>>>
>>>> Something smells "not quite right" here - if the traffic is
>>>> spoofed, and
>>>> my "Refused" responses have been flying right back to the *real* IP
>>>> addresses, how are the spoofing hosts to know that I'm dropping the
>>>> traffic?
>>>
>>> Did you filter *only* 66.230.128.15/66.230.160.1, or are you dropping
>>> traffic from other sources too?  Looks like some of the other source
>>> addresses are controlled by the DOSers. Possibly used to detect
>>> filters?
>>>
>>> These clients may look similar to the DOS attack, but there are subtle
>>> differences:
>>>
>>> Jan 18 05:08:33 canardo named[32046]: client 211.72.249.201#29656:
>>> view external: query (cache) './NS/IN' denied
>>> Jan 18 05:08:33 canardo named[32046]: client 211.72.249.201#29656:
>>> view external: query (cache) './NS/IN' denied
>>> Jan 18 05:08:34 canardo named[32046]: client 211.72.249.201#29656:
>>> view external: query (cache) './NS/IN' denied
>>> Jan 18 05:47:00 canardo named[32046]: client 211.72.249.201#29662:
>>> view external: query (cache) './NS/IN' denied
>>> Jan 18 05:47:01 canardo named[32046]: client 211.72.249.201#29662:
>>> view external: query (cache) './NS/IN' denied
>>> Jan 18 05:47:01 canardo named[32046]: client 211.72.249.201#29662:
>>> view external: query (cache) './NS/IN' denied
>>> Jan 18 06:25:22 canardo named[32046]: client 211.72.249.201#29664:
>>> view external: query (cache) './NS/IN' denied
>>> Jan 18 06:25:22 canardo named[32046]: client 211.72.249.201#29664:
>>> view external: query (cache) './NS/IN' denied
>>> Jan 18 06:25:23 canardo named[32046]: client 211.72.249.201#29664:
>>> view external: query (cache) './NS/IN' denied
>>> Jan 18 07:03:41 canardo named[32046]: client 211.72.249.201#29667:
>>> view external: query (cache) './NS/IN' denied
>>> Jan 18 07:03:41 canardo named[32046]: client 211

DNS DDoS Host list

2009-01-26 Thread Andrew Fried
Based on the logs from the past 48 hours, here are the hosts that appear
to be under attack.  The count field reflects the individual number of
"'./NS/IN' denied" log entries that appeared in my logs.  Note that the
stats for 206.71.158.30 are under-reported due to the fact that I
blackholed that address last night, however packet captures reveal that
I'm no longer seeing spoofed packets targeting that address.

++-+
| host   | count(host) |
++-+
| 10.168.69.6|  18 |
| 202.104.106.49 |  84 |
| 206.71.158.30  |   34327 |
| 210.21.218.138 |  84 |
| 63.217.28.226  |2696 |
| 66.230.160.1   |3541 |
| 76.9.16.171|1355 |
++-----+

-- 
Andrew Fried
andrew.fr...@gmail.com




DNS DDoS - New Hosts

2009-01-27 Thread Andrew Fried
As of 10:10am (EST) new hosts are now being targeted in the DDoS. 
Interestingly enough two of the ip addresses are in China.  Attached is
a file containing the geoip/whois and peering information for the
targeted systems.

++-+
| host   | count(host) |
++-+
| 202.104.106.49 |  45 |
| 210.21.218.138 |  48 |
| 63.217.28.226  |1153 |
| 64.57.246.146  |1559 |
| 67.192.144.0   |   11765 |
| 76.9.16.171| 582 |
++-+

-- 
Andrew Fried
andrew.fr...@gmail.com





GeoIP Location Information for IP: 202.104.106.49
Located in: Boshi, 26 (CN)
Latitude: 34.7667
Longitude: 110.0500
Area Code: 
Postal Code: 

ARIN information for: 202.104.106.49
DNS PTR Record:
Registrar: apnic
ASN Number:AS4134
Country:   CN
Ip Starting Block: 202.104.0.0
IP Ending Block:   202.105.255.255
IP Block Size: 131072
Date Registered:   19980817
Block Status:  allocated

BGP Peering Information for ASN4134:

PEER_AS | IP   | BGP Prefix  | CC | Registry | Allocated  | 
AS Name
174 | 202.104.106.49   | 202.104.0.0/17  | CN | apnic| 1998-08-17 | 
COGENT Cogent/PSI
1239| 202.104.106.49   | 202.104.0.0/17  | CN | apnic| 1998-08-17 | 
SPRINTLINK - Sprint
1299| 202.104.106.49   | 202.104.0.0/17  | CN | apnic| 1998-08-17 | 
TELIANET TeliaNet Global Network
2516| 202.104.106.49   | 202.104.0.0/17  | CN | apnic| 1998-08-17 | 
KDDI KDDI CORPORATION
2828| 202.104.106.49   | 202.104.0.0/17  | CN | apnic| 1998-08-17 | 
XO-AS15 - XO Communications
2914| 202.104.106.49   | 202.104.0.0/17  | CN | apnic| 1998-08-17 | 
NTT-COMMUNICATIONS-2914 - NTT America, Inc.
3257| 202.104.106.49   | 202.104.0.0/17  | CN | apnic| 1998-08-17 | 
TISCALI-BACKBONE Tiscali Intl Network BV
3320| 202.104.106.49   | 202.104.0.0/17  | CN | apnic| 1998-08-17 | 
DTAG Deutsche Telekom AG
3491| 202.104.106.49   | 202.104.0.0/17  | CN | apnic| 1998-08-17 | 
BTN-ASN - Beyond The Network America, Inc.
3549| 202.104.106.49   | 202.104.0.0/17  | CN | apnic| 1998-08-17 | 
GBLX Global Crossing Ltd.
7132| 202.104.106.49   | 202.104.0.0/17  | CN | apnic| 1998-08-17 | 
SBIS-AS - AT&T Internet Services
7473| 202.104.106.49   | 202.104.0.0/17  | CN | apnic| 1998-08-17 | 
SINGTEL-AS-AP Singapore Telecommunications Ltd
11164   | 202.104.106.49   | 202.104.0.0/17  | CN | apnic| 1998-08-17 | 
TRANSITRAIL - National LambdaRail, LLC






GeoIP Location Information for IP: 210.21.218.138
Located in: Shenzhen, 30 (CN)
Latitude: 22.5333
Longitude: 114.1333
Area Code: 
Postal Code: 

ARIN information for: 210.21.218.138
DNS PTR Record:sym.gdsz.cncnet.net.
Registrar: apnic
ASN Number:AS17623
Country:   CN
Ip Starting Block: 210.21.128.0
IP Ending Block:   210.21.255.255
IP Block Size: 32768
Date Registered:   20001017
Block Status:  allocated

BGP Peering Information for ASN17623:

PEER_AS | IP   | BGP Prefix  | CC | Registry | Allocated  | 
AS Name
4837| 210.21.218.138   | 210.21.192.0/18 | CN | apnic| 2000-10-17 | 
CHINA169-BACKBONE CNCGROUP China169 Backbone




GeoIP Location Information for IP: 63.217.28.226
Located in: Herndon, VA (US)
Latitude: 38.9841
Longitude: -77.3827
Area Code: 703
Postal Code: 20170

ARIN information for: 63.217.28.226
DNS PTR Record:63-217-28-226.static.pccwglobal.net.
Registrar: arin
ASN Number:AS3491
Country:   US
Ip Starting Block: 63.216.0.0
IP Ending Block:   63.223.255.255
IP Block Size: 524288
Date Registered:   19991209
Block Status:  allocated

BGP Peering Information for ASN3491:

PEER_AS | IP   | BGP Prefix  | CC | Registry | Allocated  | 
AS Name
174 | 63.217.28.226| 63.216.0.0/13   | US | arin | 1999-12-09 | 
COGENT Cogent/PSI
701 | 63.217.28.226| 63.216.0.0/13   | US | arin | 1999-12-09 | 
UUNET - MCI Communications Services, Inc. d/b/a Verizon Business
1299| 63.217.28.226| 63.216.0.0/13   | US | arin | 1999-12-09 | 
TELIANET TeliaNet Global Network
2516| 63.217.28.226| 63.216.0.0/13   | US | arin | 1999-12-09 | 
KDDI KDDI CORPORATION
2828| 63.217.28.226| 63.216.0.0/13   | US | arin | 1999-12-09 | 
XO-AS15 - XO Communications
3549| 63.217.28.226| 63.216.0.0/13   | US | arin | 1999-12-09 | 
GBLX Global Crossing Ltd.
4565| 63.217.28.226| 63.216.0.0/13   | US | 

DNS DDoS

2009-01-28 Thread Andrew Fried
Targeted victims, beginning 28-Jan-2009, as seen from my DNS server. 
GeoIP data for top two sites also below:

++-++
| host   | count(host) | Percentage |
++-++
| 202.104.106.49 |  51 | 0.1109 |
| 210.21.218.138 |  51 | 0.1109 |
| 64.57.246.123  |3561 | 7.7421 |
| 64.57.246.146  |   29530 |64.2026 |
| 67.192.144.0   | 991 | 2.1546 |
| 70.86.80.98|   11276 |24.5157 |
| 76.9.16.171| 535 | 1.1632 |
++-++

GeoIP Location Information for IP: 64.57.246.146
Located in: Suwanee, GA (US)
Latitude: 34.0535
Longitude: -84.0659
Area Code: 770
Postal Code: 30024

ARIN information for: 64.57.246.146
DNS PTR Record:   
Registrar: arin
ASN Number:AS20141
Country:   US
Ip Starting Block: 64.57.240.0
IP Ending Block:   64.57.255.255
IP Block Size: 4096
Date Registered:   20051012
Block Status:  allocated

BGP Peering Information for ASN20141:

PEER_AS | IP   | BGP Prefix  | CC | Registry |
Allocated  | AS Name
6983| 64.57.246.146| 64.57.240.0/20  | US | arin |
2005-10-12 | ITCDELTA - ITC^Deltacom
14745   | 64.57.246.146| 64.57.240.0/20  | US | arin |
2005-10-12 | INTERNAP-BLOCK-4 - Internap Network Services Corporation




GeoIP Location Information for IP: 70.86.80.98
Located in: Houston, TX (US)
Latitude: 29.7523
Longitude: -95.3670
Area Code: 713
Postal Code: 77002

ARIN information for: 70.86.80.98
DNS PTR Record:62.50.5646.static.theplanet.com.
Registrar: arin
ASN Number:AS21844
Country:   US
Ip Starting Block: 70.84.0.0
IP Ending Block:   70.87.255.255
IP Block Size: 262144
Date Registered:   20040729
Block Status:  allocated

BGP Peering Information for ASN21844:

PEER_AS | IP   | BGP Prefix  | CC | Registry |
Allocated  | AS Name
2914| 70.86.80.98  | 70.84.0.0/14| US | arin |
2004-07-29 | NTT-COMMUNICATIONS-2914 - NTT America, Inc.
3356| 70.86.80.98  | 70.84.0.0/14| US | arin |
2004-07-29 | LEVEL3 Level 3 Communications
3549| 70.86.80.98  | 70.84.0.0/14| US | arin |
2004-07-29 | GBLX Global Crossing Ltd.
4565| 70.86.80.98  | 70.84.0.0/14| US | arin |
2004-07-29 | MEGAPATH2-US - MegaPath Networks Inc.
6461| 70.86.80.98  | 70.84.0.0/14| US | arin |
2004-07-29 | MFNX MFN - Metromedia Fiber Network

-- 
Andrew Fried
andrew.fr...@gmail.com




Re: community real-time BGP hijack notification service

2008-09-12 Thread Andrew Fried
Mail being what it is today, testing message delivery is an excellent
idea.  I'll implement that feature this weekend.

Andy

Skywing wrote:
> It might be useful to have an option to generate an example alert mail for 
> purposes of setting up necessary mail processing rules and that sort.  Just a 
> thought.
>
> - S
>
> -Original Message-
> From: Gadi Evron [mailto:[EMAIL PROTECTED]
> Sent: Friday, September 12, 2008 3:13 PM
> To: Kevin Oberman
> Cc: [EMAIL PROTECTED]
> Subject: Re: community real-time BGP hijack notification service
>
> On Fri, 12 Sep 2008, Kevin Oberman wrote:
>   
>> Looks interesting, but it only takes a fairly short list of ASNs for a
>> prefix. For our big CIDR blocks, we have WAY too many ASNs to enter them
>> all, so it's pretty useless for me. I need to be able to enter at very
>> least a dozen ASes and I suspect may folks have a LOT more then that.
>> 
>
> I am sure we can fix that, Thanks for the comment!
>
>   
>> For now, I'll enter some shorter pieces from the block, but I'm most
>> concerned with the pieces that are not currently assigned, so are
>> available for hijack. I have added the larger, unassigned blocks. I'll
>> start adding assigned bits and pieces as well as unassigned pieces, but
>> being able to put all valid origin ASes in the list for the full blocks
>> would be a lot nicer.
>> 
>
> Please let us know if you encounter any issues.
>
>
>   
>> --
>> R. Kevin Oberman, Network Engineer
>> Energy Sciences Network (ESnet)
>> Ernest O. Lawrence Berkeley National Laboratory (Berkeley Lab)
>> E-mail: [EMAIL PROTECTED]Phone: +1 510 486-8634
>> Key fingerprint:059B 2DDF 031C 9BA3 14A4  EADA 927D EBB3 987B 3751
>>
>> 
>
>
>