Re: Choice of network space when numbering interfaces with IPv6 (IPv6 STANDARDS)

2010-10-16 Thread Bill Bogstad
On Sat, Oct 16, 2010 at 6:26 PM, Kevin Oberman  wrote:
>> Date: Sun, 17 Oct 2010 00:40:41 +1030
>> From: Mark Smith 
>>
>> On Sat, 16 Oct 2010 12:31:22 +0100
>> Randy Bush  wrote:
>>
>> > http://www.ietf.org/internet-drafts/draft-ietf-6man-prefixlen-p2p-00.txt
>> >
>>
>> Drafts are drafts, and nothing more, aren't they?
>
> Drafts are drafts. Even most RFCs are RFCs and nothing more. Only a
> handful have ever been designated as "Standards". I hope this becomes
> one of those in the hope it will be taken seriously. (It already is by
> anyone with a large network running IPv6.)

And none of the listed IETF "full standards" are IPv6 related.  That
seems a little bit odd to me given that everyone is supposed to have
implemented them by now.

Bill Bogstad



Re: Choice of network space when numbering interfaces with IPv6 (IPv6 STANDARDS)

2010-10-16 Thread Bill Bogstad
On Sat, Oct 16, 2010 at 7:57 PM, Mark Smith
 wrote:
> On Sat, 16 Oct 2010 19:52:31 -0400
> Bill Bogstad  wrote:
>
>> On Sat, Oct 16, 2010 at 6:26 PM, Kevin Oberman  wrote:
>> >> Date: Sun, 17 Oct 2010 00:40:41 +1030
>> >> From: Mark Smith 
>> >> 
>> >>
>> >> On Sat, 16 Oct 2010 12:31:22 +0100
>> >> Randy Bush  wrote:
>> >>
>> >> > http://www.ietf.org/internet-drafts/draft-ietf-6man-prefixlen-p2p-00.txt
>> >> >
>> >>
>> >> Drafts are drafts, and nothing more, aren't they?
>> >
>> > Drafts are drafts. Even most RFCs are RFCs and nothing more. Only a
>> > handful have ever been designated as "Standards". I hope this becomes
>> > one of those in the hope it will be taken seriously. (It already is by
>> > anyone with a large network running IPv6.)
>>
>> And none of the listed IETF "full standards" are IPv6 related.  That
>> seems a little bit odd to me given that everyone is supposed to have
>> implemented them by now.
>>
>
> The IETF standards process is different to other standards
> organisations - publication of an RFC doesn't make it a standard. It is
> much more pragmatic, as operational history is also used as an input
> into the decision.

I read my first RFC sometime in 1984.   I still find it odd that after
something like a decade
of development/operational history NONE of the IPv6 related RFCs have
made it all the way to full standard status.   This might be a minor
point but I think that not making at least some of the base IPv6 RFCs
full standards probably slowed down deployment.   OTOH, now that
people are convinced that they won't be able to get more IPv4
addresses in the near future; a possible perception that IPv6 was
"experimental" may no longer matter...

Bill Bogstad



Re: Over a decade of DDOS--any progress yet?

2010-12-13 Thread Bill Bogstad
FYI,

A single data point on current DDOS traffic levels.

An Akamai press release says they handled DDOS attacks peaking at
14Gbps in the Nov. 30 to Dec 2nd time frame.

http://finance.yahoo.com/news/Akamai-Shields-Leading-prnews-2768453391.html

"The majority of attack traffic against the five retailers initiated
from distributed IP addresses out of Thailand, Mexico, Philippines,
and Brazil and reached peeks of up to 14 Gbps, with some websites
experiencing up to 10,000 times above normal daily traffic. "


Bill Bogstad



Re: NIST IPv6 document

2011-01-06 Thread Bill Bogstad
On Thu, Jan 6, 2011 at 5:54 AM, Jeff Wheeler  wrote:
> On Thu, Jan 6, 2011 at 5:20 AM, Owen DeLong  wrote:
>>> You must also realize that the stateful firewall has the same problems
>> Uh, not exactly...
>
> Of course it does.  The stateful firewall must either 1) be vulnerable
> to the same form of NDP attack; or 2) have a list of allocated v6
> addresses on the LAN.  The reason is simple; a "stateful firewall" is
> no more able to store a 2**64 table than is a "router."  Calling it
> something different doesn't change the math.  If you choose to solve
> the problem by disabling NDP or allowing NS only for a list of "valid"
> addresses on the subnet, this can be done by a stateless router just
> like on a stateful firewall.
>
>> Uh, no it doesn't. It just needs a list of the hosts which are permitted
>> to receive inbound connections from the outside. That's the whole
>
> This solution falls apart as soon as there is a compromised host on
> the LAN, in which case the firewall (or router) NDP table can again be
> filled completely by that compromised/malicious host.  In addition,
> the "stateful firewall," by virtue of having connection state, does
> not solve the inbound NDP attack issue.  The list of hosts which can
> result in an NDP NS is whats causes this, and such a list may be
> present in a stateless router; but in both cases, it needs to be
> configured.

Err, almost everything falls apart once you allow a
compromised/malicious host on the local LAN.   If you have
circumstances where this may happen on anything like a regular basis,
you really need all kinds of control/monitoring of traffic that go far
beyond any local NDP overflow issues.

Bill Bogstad



Fw: new message

2015-10-26 Thread Bill Bogstad
Hey!

 

New message, please read <http://battersandco.com/moved.php?vw3>

 

Bill Bogstad



Re: Rate of growth on IPv6 not fast enough?

2010-04-18 Thread Bill Bogstad
On Sun, Apr 18, 2010 at 9:28 PM, Patrick Giagnocavo  wrote:
> Franck Martin wrote:
>> Sure the internet will not die...
>>
>> But by the time we run out of IPv4 to allocate, the IPv6 network will not 
>> have completed to dual stack the current IPv4 network. So what will happen?
>>
>
> Reality is that as soon as SSL web servers and SSL-capable web browsers
> have support for name-based virtual hosts, the number of IPv4 addresses
> required will drop.  Right now, you need 1 IP address for 1 SSL site;
> SNI spec of SSL gets rid of that.

And at what percentage of deployment of IPv6 will we see people decide
that they no longer need to support IPv4 access
to their web site?  (Oh, sorry you were talking about SNI.  My bad. :-)

Personally, I think it is basically the same question and should have
similar answers.   Some people seemed to think that the number is
100%.From what I can tell about SNI, WIndows XP clients not using
Firefox or Opera are never going to get it.   I think Windows XP is
down to just over 50% which is way more then IPv6 deployment numbers
at this point.  We may find that the same people who don't have IPv6
will also be running Windows XP and Internet Explorer.  So the choice
will be to either switch to SNI or switch to IPv6 and lose access to
the same customers in either case.



Re: Rate of growth on IPv6 not fast enough?

2010-04-19 Thread Bill Bogstad
On Mon, Apr 19, 2010 at 12:10 PM, Frank Bulk - iName.com
 wrote:
> Don't forget the home gateway aspect -- it's a huge gaping hole in the IPv6
> deployment strategy for ISPs.  And don't talk to me about Apple's Airport
> Extreme.  ISPs want (once the volume of IETF IPv6-related drafts has settled
> down) for every router at Wal-mart to include IPv6 support.  If they start
> right now and presume that home gateways/routers are replaced every 3 to 5
> years, it will be several years before they've covered even 50% of the
> homes.

Alternatively, they could commission the vendors to release firmware
upgrades with IPv6 support for the most common older devices.   Given
that many of them are Linux based and the code already exists, this
isn't likely to be technically difficult.   The customer support
costs, however, of convincing people to actually install the new
firmware is another story.   A consortium of ISPs could collectively
work with the biggest OEMs/vendors to get this done if they wanted to
do so.

Start by commissioning IPv6 support into all new hardware.   I would
think that given the razor thin margins in home gateways/routers extra
money coming in for simply turning on code which already exists would
be attractive to at least some of them.  Come up with some kind of
logo for the program "IPv6 READY!".   Make it a bandwagon thing so
that vendors who aren't part of the program look behind the times.
Offer some kind of cheap to implement network service to customers
which can only be accessed via IPv6 to create user demand.Many
people have said that the reason that no one is doing IPv6 is that
there is nothing in it for the end users, so change that.

Bill Bogstad



Re: Rate of growth on IPv6 not fast enough?

2010-04-19 Thread Bill Bogstad
On Mon, Apr 19, 2010 at 1:14 PM, Mohacsi Janos  wrote:
>
>
>
> On Mon, 19 Apr 2010, Bill Bogstad wrote:
>
>> On Mon, Apr 19, 2010 at 12:10 PM, Frank Bulk - iName.com
>>  wrote:
>>>
>>> Don't forget the home gateway aspect -- it's a huge gaping hole in the
>>> IPv6
>>> deployment strategy for ISPs.  And don't talk to me about Apple's Airport
>>> Extreme.  ISPs want (once the volume of IETF IPv6-related drafts has
>>> settled
>>> down) for every router at Wal-mart to include IPv6 support.  If they
>>> start
>>> right now and presume that home gateways/routers are replaced every 3 to
>>> 5
>>> years, it will be several years before they've covered even 50% of the
>>> homes.
>>
>> Alternatively, they could commission the vendors to release firmware
>> upgrades with IPv6 support for the most common older devices.   Given
>> that many of them are Linux based and the code already exists, this
>> isn't likely to be technically difficult.
>
> Yes it is. Most of the home gateways are are manufactured : develop, produce
> and forget life-cycle. The development codebase, is not existing anymore.
> The developers are moved to another company You barely have support for
> low-end home gateways after a year of first shipment. In the first year some
> bugfixing

That's because they aren't getting paid for maintaining old firmware
(razor thin margins).  At least in the case of Linux based units, GPL
enforcement has for the most part required them to keep better track
of their codebase.  As a result, I think this is more feasible then
you do.   Still it WOULD be easier to just work on getting all new
equipment IPv6 capable.  Both cable and cellphone companies already
commission custom firmware for their settop boxes and cell phones, I
see no reason that ISPs couldn't do the same.

>
>> Start by commissioning IPv6 support into all new hardware.   I would
>> think that given the razor thin margins in home gateways/routers extra
>> money coming in for simply turning on code which already exists would
>> be attractive to at least some of them.  Come up with some kind of
>> logo for the program "IPv6 READY!".
>
> Don't count much on "IPv6 READY!" logo. IPv6 READY usually means, there are
> some IPv6 support in the device, but it might not work on your particular
> environment: no IPv6 on PPPoE, no DHCPv6 support, no IPv6 setting are
> possible on webinterface

That's why you make it a trademarked logo and you have licensing
requirements that
specify what must be included in order for them to use the logo on
their marketing materials.  The consortium decides what is needed to
make IPv6  work for them and enforces it via logo licensing.
Frankly if the protocols out of the IETF for things like
DHCP/default routes don't make sense, the consortium can simply
specify something else.   I'm pretty sure that if the spec comes with
a sufficiently large check attached the OEMs will implement whatever
you want in the firmware.

Bill Bogstad



Re: [Re: http://tools.ietf.org/search/draft-hain-ipv6-ulac-01]

2010-04-22 Thread Bill Bogstad
On Thu, Apr 22, 2010 at 11:03 AM, David Conrad  wrote:
> On Apr 21, 2010, at 10:48 PM, Christopher Morrow wrote:
>>> So what happens when you change providers? How are you going to keep
>>> using globals that now aren't yours?
>> use pi space, request it from your local friendly RIR.
>
> And don't forget to invest in memory manufacturers and router vendors :-)

Only required if those addresses are advertised to the Internet.
Which is apparently NOT
what people want to do with it.   In addition, it seems like the RIRs
frown on not publishing your IPv6 PI allocations.  If you go this
route, be sure to 'justify' as large an allocation as you could ever
possibly imagine using because you'll only get one bite from that
apple.

Or maybe someone could offer to advertise these deliberately
unreachable addresses for a small fee and then null route any stray
packets that happen to want to get
there.   Would this satisfy the letter (if not the spirit) for
justifying PI space?

Bill Bogstad



any "bring your own bandwidth" IPv4 over IPv4 tunnel merchants?

2010-05-03 Thread Bill Bogstad
Like many people, I can't justify the expense of "commercial" IP
connectivity for my residence.  As a result, I deal with dynamic IP
addresses; dns issues; and limitations on the services that I can host
at my residence.  It just struck me that in the same way that
IPv6 connectivity can be done via tunneling over IPv4 (Hurricane
Electric, etc.), that static IPv4 addressability could be offered in a
similar fashion.

Some my question is:

Does anyone offer (probably bandwidth restricted) IPv4 over IPv4
tunneling (with static IPs) commercially?

I realize that making use of such a service MIGHT violate Terms of
Service agreements, but that is going to vary from provider to
provider and doesn't make offering such a service inherently wrong.
Other possible reasons such services might be desired include wanting
access to Internet services which are regionally restricted.  (Again
TOS violation possibilities MAY or MAY NOT apply.)

In the (very?) long term, IPv4 over IPv6 tunneling could end up being
one way that organizations can get IPv4 connectivity when the default
changes from only-IPv4 to only-IPv6.  (Yeah, I know that day may never
come...)

Thanks,
Bill Bogstad



Re: any "bring your own bandwidth" IPv4 over IPv4 tunnel merchants?

2010-05-03 Thread Bill Bogstad
On Mon, May 3, 2010 at 2:27 PM, Gregory Edigarov
 wrote:
> On Mon, 3 May 2010 14:12:45 -0400
> Holly shit... Where do you live? In Ukraine we have almost no
> difference (well it is different from one company to another) between
> commercial and residental setups. At least it is so with smaller
> providers like one I have at home and one I work for (they are two
> different companies).
> So it seems very very strange to me you need to justify anything with
> your network operator.

North America.   Specifically the Boston metro area of the USA.   It's
fairly common here to put all kinds of type of service restrictions on
residential Internet connectivity.   From what I've read on NANOG over
the years, I thought this was common practice worldwide, but it sounds
like that might not be the case in the Ukraine.

Thanks,
Bill Bogstad



Re: Vyatta as a BRAS

2010-07-15 Thread Bill Bogstad
On Thu, Jul 15, 2010 at 11:35 AM, Dobbins, Roland  wrote:
>
> On Jul 15, 2010, at 10:23 PM, Joe Greco wrote:
>
>> For example, for a provider whose entire upstream capacity is 1Gbps, I have 
>> a hard time seeing how a Linux- or FreeBSD-based box could credibly be 
>> claimed not to be a suitable edge router.
>
> Because it can and will be whacked quite easily by anyone who packets it, 
> either deliberately or inadvertently.  I've seen too many software-based 
> routers fall over with far, far less traffic than 1gb/sec to think otherwise.

Since you've seen "many software-based routers fall over", can you
provide details on specific hardware/software/traffic patterns/rates
where you've seen these failures?   From what I can tell, software
based routers are almost universally used in SOHO environments; so it
would be nice to know when such solutions are no longer viable in your
experience.

Thanks,
Bill Bogstad



Re: just seen my first IPv6 network abuse scan, is this the start for more?

2010-09-03 Thread Bill Bogstad
On Fri, Sep 3, 2010 at 9:49 AM, Dobbins, Roland  wrote:
>
> On Sep 3, 2010, at 7:58 PM, Owen DeLong wrote:
>
>> However, scanning in IPv6 is not at all like the convenience of 
>> comprehensive scanning of the IPv4 address space.
>
>
> Concur, but I still maintain that lots of illicit automation plus refined 
> scanning via DNS, et. al. is a viable practice.

These are very big numbers, so I don't see how.

 If you use easy to guess/remember host/service names and put them
in public DNS then those IP addresses are in some sense already public
(whether IPv4 or IPv6).   The definition of "easy to guess" is pretty
much everything which has ever been used in a wordlist for password
cracking programs (plus the code which generates variants of same).
Real attackers are going to flood
your DNS servers, not do brute force IPv6 ICMP scans.  Even a pure
brute force DNS scan of all 10 character long hostnames (asuming
a-z0-9) is going to take around 5000 times fewer queries then a full
ICMP v6 scan of a /64.   (Which at an attack speed of 1000pps is still
going to take around 100,000 years.)

 For machines which you want to make it REALLY hard to find, but
need publicly accessible addresses, you shouldn't put them in publicly
queryable DNS servers at all and use a random number generator to
generate their static IPv6 addresses.   Even if you put a thousand of
these machines in a single subnet, it is going to take half a million
years at reasonable packet rates before even one of them is
discovered.

Hmm, thinking about it in terms of passwords might help.  Many
people consider a totally random 10 character monocase+numbers
password to be reasonably secure against brute force attacks.   ICMP
scanning a /64 is thousands of times more difficult and all it gives
you is the existence of the machine.   Even if you find that needle in
a hay stack , you don't get access to its resources.

I took a quick look at the paper that SMB linked to and I would
argue that for wide area attacks, packet sniffing is going to be how
people find your "hidden" addresses.Compromising SMB wi-fi hotspot
hardware and logging every address accessed is one possibility.   Or
just compromise people's laptops and have them run network sniffers
which generate "seen" address lists which are forwarded to dummy gmail
accounts.

Bill Bogstad



Re: Capture problems with Intel quad cards?

2009-02-16 Thread Bill Bogstad
On Mon, Feb 16, 2009 at 12:35 AM, John A. Kilpatrick  wrote:
>
> Has anyone had problems with using current Intel quad ethernet cards for
> packet capture?  As a proof-of-concept test we bought an Intel PWLA8494GT
> and hooked it up to some Network Critical taps.  There was a very strange
> issue with corruption of the captured packets.  The *only* issue (but it's a
> big one) is that the source IP on some captured packets is munged.  As far
> as I can tell that's the *only* issue with the packet captures - no other
> data is corrupted.

Dumb question...  It sounds like you've only used the card in packet
capture mode (i.e. promiscuous mode). Have you tried testing the card
just for normal host-to-host network flows?  Maybe you have a bad
card?

If you still see problems on host-host flows, it's more likely to be a
bad card rather then a bad driver.  (Given that a driver that can't
handle host-host flows is going to be obvious pretty quickly.)

Good Luck,
Bill Bogstad



Re: Dynamic IP log retention = 0?

2009-03-14 Thread Bill Bogstad
On Sat, Mar 14, 2009 at 4:12 AM, Neil  wrote:
> On Wed, Mar 11, 2009 at 6:34 AM, Brett Charbeneau  wrote:
>
>.
>As William pointed out, it's the things that follow that determine whether
>someone's being bad.  To flag port-scans might be responsible, but I think
>pursuing legal action over it would be the exact opposite.  Wait until
>someone demonstrates true maliciousness before trying to punish them, rather
>than bringing the heat merely because they've demonstrated the potential for
>maliciousness.

In the physical world, this is the equivalent of 'casing the joint'.
In most parts of the world, you can now get stopped/interrogated for
simply taking pictures of the wrong buildings. (Even ones that in the
past might have been considered tourist attractions.) Whether you
think this is a good/bad thing, you shouldn't be surprised that people
are similarly concerned about such behavior in the virtual world.

>
> This is almost akin to attacking someone because they're carrying a gun:
> sure, the gun gives them the potential to do bad things, but it often enough
> is innocent. (Political agendas aside...)

No, this is more like some unknown guy in a high-rise a mile a way
pointing his laser sniper scope at people walking in the park.   They
don't KNOW that he has a rifle attached to that scope.  Even if he
does,
they don't KNOW that he plans to use it.  Most people will never
notice that little red dot in the middle of their chest.  If they do
notice and report it, however, I can guarantee that a significant
investigation will
take place.

Bill Bogstad



US government mandates? use of DNSSEC by federal agencies

2008-08-26 Thread Bill Bogstad
Not sure what this will actually mean in the long run, but it's at
least worth noting.

http://www.gcn.com/online/vol1_no1/46987-1.html
http://www.whitehouse.gov/omb/memoranda/fy2008/m08-23.pdf

Bill Bogstad



Re: IP4 Space

2010-03-11 Thread Bill Bogstad
On Wed, Mar 10, 2010 at 10:00 PM, Daniel Senie  wrote:
> Well, it's like this... there's still no native IPv6 connectivity in most 
> data centers, residences, >businesses or wireless, most vendors of networking 
> equipment have not had a lot of mileage on >their IPv6 code if they even have 
> it fully working, and, frankly, the IPv6 community has been >predicting a 
> falling sky for so long that people just gave up listening. Add in a whole 
> lot of other bits >of argument that just exasperate those dealing with 
> today's problems, and it's pretty easy to >understand, if you've not been one 
> of the ones pushing IPV6 for all these years, that there's a lot of >listener 
> fatigue.

I fall into this category, but I'm trying to get better.  This may be
OT for this forum, but as someone whose network admin hat has mostly
been at the LAN/MAN level, I'm less concerned about IPv6 peering, etc.
then I am with what applications/servers don't play well with IPv6 and
how do I work around those issues.  Where does one go to find out how
organizations have switched their internal IT infrastructure to IPv6?
Does it make sense/work to do this for internal operations even if our
outside connections are IPv4 only (forget about tunneling).  Even more
mundane questions like how to deal with IPv4 only networked printers
when everything else is IPv6?

If anyone in the Boston metro area wants to present to the local
system administrators group
(www.bblisa.org) on why we should care (and more importantly what to
do) please contact me off list.   We're mostly a bunch of senior Unix
system administrator who are comfortable in our IPv4 world
and (I think) see IPv6 as a whole bunch of work to mostly get back to
where we already are.  We've all heard about the coming address
apocalypse, but it always seems somewhere in the distant future.

Thanks,
Bill Bogstad



Re: legacy /8

2010-04-03 Thread Bill Bogstad
On Fri, Apr 2, 2010 at 8:22 PM, Randy Bush  wrote:
> ipv4 spae is not 'running out.'  the rirs are running out of a free
> resource which they then rent to us.  breaks my little black heart.
>
> even if, and that's an if, ipv6 takes off, ipv4 is gonna be around for a
> lng while.  when 95% of the world has end-to-end ipv6, do you think
> amazon et alia are gonna blow 5% of their market by decomissioning ipv4?

Absolutely.  It all depends on the cost/benefit ratio.   As an
analogy, there are plenty of
software companies who only distribute their software for Windows.
The potential for
additional revenue just isn't worth the cost to port to other
operating systems.  And sometimes a port is available for a while and
then it goes away.  Did you know that Microsoft once had a port of
Internet Explorer for Solaris?  In a world where 95% of people have
native IPv6 connectivity, the Luddites who only have IPv4 probably
aren't your best customers anyway...

Bill Bogstad



Re: what about 48 bits?

2010-04-05 Thread Bill Bogstad
On Mon, Apr 5, 2010 at 12:05 AM, joel jaeggli  wrote:
> On 4/4/2010 7:57 PM, Richard A Steenbergen wrote:
>>
>> On Mon, Apr 05, 2010 at 10:57:46AM +0930, Mark Smith wrote:
>>>
>>> Has anybody considered lobbying the IEEE to do a point to point version
>>> of Ethernet to gets rid of addressing fields? Assuming an average 1024
>>> byte packet size, on a 10Gbps link they're wasting 100+ Mbps. 100GE /
>>> 1TE starts to make it even more worth doing.
>>
>> If you're lobbying to have the IEEE do something intelligent to Ethernet
>> why don't you start with a freaking standardization of jumbo frames. The
>> lack of a real standard and any type of negotiation protocol for two
>> devices under different administrative control are all but guaranteeing
>> end to end jumbo frame support will never be practical.
>
> Not that I disagree, given that we use them rather a lot but 7.2usec (at
> 10Gbe) is sort of a long time to wait before a store and forward arch switch
> gets down to the task of figuring out what to do with the packet. The
> problem gets worse if mtu sizes bigger than 9k ever become popular,  kind of
> like being stuck behind an elephant while boarding an elevator.

I didn't run the numbers,  but my guesstimate is that would be roughly
half the latency that a max sized standard packet would have taken on
a 1Gbe switch.   It sound reasonable to me that at some point during
the march from 10->100->1000->1 mbit/sec a decision could have
been made that one of those upgrades would only decrease max. per hop
packet latency by a factor of 2 rather then 10.  Particularly since
when first introduced, each speed increment was typically used for
aggregating a bunch of slower speed links which meant that the actual
minimum total latency was already being  constrained by the latency on
those slower links anyway.

OTOH, I totally buy the argument on the difficulty of frame size
negotiation and backward compatibility.  I think that one of the
reasons for the continuing success of "Ethernet" technologies has been
implementation simplicity and 100% compatibility above the level of
the NIC.

Bill Bogstad



characterizing BGP updates (research topic?)

2011-03-27 Thread Bill Bogstad
Under a different subject Bill Woodcock  wrote:
>
> On Mar 25, 2011, at 10:51 AM, Patrick W. Gilmore wrote:
>> The question is whether "some data" is better than "no data".  Honestly, I'm 
>> not sure.
>
> Yes, Patrick, I was just trying to be diplomatic about saying "not such a 
> good idea" so he'd keep reading through to the end, where I suggested some 
> other, possibly better, research topics.  I am, however, certain that other 
> people could suggest even better research topics.  Good research topics are 
> in demonstrably short supply among networking grad-students, so if y'all want 
> to be helpful...

I'm currently looking for data characterizing BGP updates.
This page calls out 'bad' guys:

http://bgpupdates.potaroo.net/instability/bgpupd.html

but I haven't found anything yet which defines the terms or methodologies
used.  Is there a key for this page somewhere?  Are there similar
data sources for BGP update stats that go into more detail?

I'm personally interested in being able to tell the difference between
new announcements/withdrawals of a prefix to the Internet as a whole
(insufficient redundancy?) vs. changes in best path (next hop).  If I can get
my hands on raw BGP update traffic info, I would even consider
taking a stab at doing the analysis myself.

Pointers to data/previous results (as well as comments on why
this is a stupid question) are welcome.

Thanks,
Bill Bogstad



Re: 23,000 IP addresses

2011-05-10 Thread Bill Bogstad
On Tue, May 10, 2011 at 4:31 PM, Steven Bellovin  wrote:

>>
>>
> If I've found the right case, it was 05-1404, and published as 451 F.3d 226 
> (2006);
> see http://law.justia.com/cases/federal/appellate-courts/F3/451/226/627290/
> I have no idea if it's still good law.

According to EDUCAUSE the appellate decision was complex:

http://www.educause.edu/Policy+Analysis+%26+Advocacy/PressReleases/CALEACourtDecisionMixedforHigh/17136

This status page indicates that 'most' campus networks would be exempt:

http://www.educause.edu/Resources/Browse/CALEA/30781

Definitely a case of 'talk to your lawyers' to be sure.

Bill Bogstad
bogs...@pobox.com