Re: Broken SSL cert caused by router?

2015-03-26 Thread Lewis,Mitchell T.
Meraki Access Points are interesting devices. I have found they cause issues with Linux firewalls if the merakis are not configured "correctly". Meraki Access Points do content inspections which I have found can cause produce symptoms similar to yours, although I have not experienced what you

Re: More specifics from AS18978 [was: Prefix hijack by INDOSAT AS4795 / AS4761]

2015-03-26 Thread ML
Wouldn't it be a BCP to set no-export from the Noction device too? On 3/26/2015 6:20 PM, Nick Rose wrote: Several people asked me off list for more details, here is what I have regarding it. This morning a tier2 isp that connects to our network made an error in their router configuration cau

Re: Broken SSL cert caused by router?

2015-03-26 Thread Eygene Ryabinkin
Thu, Mar 26, 2015 at 03:38:55PM -0700, Mike wrote: > I have a customer however that uses our web mail system now secured > with ssl. I myself and many others use it and get the green lock. But, > whenever any station at the customer tries using it, they get a broken > lock and 'your connection i

Re: Broken SSL cert caused by router?

2015-03-26 Thread Joe
You might want to look at some of the documentation on that device. Looks like it might be doing some proxy stuff. Regards, -Joe On Thu, Mar 26, 2015 at 5:38 PM, Mike wrote: > Hi, > > I have a very odd problem. > > We've recently gotten a 'real' ssl certificate from godaddy to cover our

Re: Broken SSL cert caused by router?

2015-03-26 Thread Roland Dobbins
On 27 Mar 2015, at 5:38, Mike wrote: How is this possible? Can anyone comment on these devices and tell me what might be going on here? It's been compromised and its being used for MITM? Or has some sort of TLS inspection capability built in which is essentially MITM, and which is enabled?

Broken SSL cert caused by router?

2015-03-26 Thread Mike
Hi, I have a very odd problem. We've recently gotten a 'real' ssl certificate from godaddy to cover our domain (*.domain.com) and have installed it in several places where needed for email (imap/starttls and etc) and web. This works great, seems ok according to various online TLS cer

RE: More specifics from AS18978 [was: Prefix hijack by INDOSAT AS4795 / AS4761]

2015-03-26 Thread Nick Rose
Several people asked me off list for more details, here is what I have regarding it. This morning a tier2 isp that connects to our network made an error in their router configuration causing the route leakage. The issue has been addressed and we will be performing a full post mortem to ensure t

Re: godaddy contact

2015-03-26 Thread Anne P. Mitchell, Esq.
> Anyone from godaddy on here or have contact details for them? We are > having a routing issue to them. > Tim, please contact me offlist. Anne Anne P. Mitchell, Esq. CEO/President ISIPP SuretyMail Email Reputation, Accreditation & Certification Your mail system + SuretyMail accreditation = del

Re: Frontier: Blocking port 22 because of illegal files?

2015-03-26 Thread Aaron C. de Bruyn
Someone with Frontier contacted me off-list and assured me they don't block port 22, and that it could have been related to port scans, infected PCs, etc... They are looking in to it. Apologies for the noise and for being a prat. ;) -A On Wed, Mar 25, 2015 at 7:31 PM, Aaron C. de Bruyn wrote:

RE: More specifics from AS18978 [was: Prefix hijack by INDOSAT AS4795 / AS4761]

2015-03-26 Thread Nick Rose
This should be resolved from AS18978. If you experience anything else please let me know and I will get it addressed immediately. Regards, Nick Rose CTO @ Enzu Inc. -Original Message- From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Randy Sent: Thursday, March 26, 2015 12:14 PM

RE: More specifics from AS18978 [was: Prefix hijack by INDOSAT AS4795 / AS4761]

2015-03-26 Thread Randy
On 03/26/2015 9:00 am, Peter Rocca wrote: +1 The summary below aligns with our analysis as well. We've reached out to AS18978 to determine the status of the leak but at this time we're not seeing any operational impact. +2, after the morning coffee sunk in and helpful off list replies I can

Charter Engineer

2015-03-26 Thread Shawn L
Could a Charter engineer with familiarity with Michigan contact me off-list? We have a mutual client who's having issues communicating between sites. Thanks

RE: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Peter Rocca
+1 The summary below aligns with our analysis as well. We've reached out to AS18978 to determine the status of the leak but at this time we're not seeing any operational impact. -Original Message- From: Andree Toonk [mailto:andree+na...@toonk.nl] Sent: March-26-15 11:54 AM To: Peter R

Re: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Andree Toonk
Hi List, this morning our BGPmon system picked up many new more specific announcements by a variety of Origin ASns, the interesting part is that the majority of them were classified as BGP Man In The middle attacks (MITM). A typical alert would look like:

Re: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Christian Teuschel
Hi Randy, Assuming that your prefix is 198.98.180.0/22 (AS29889 - FSNET-1 - Fast Serv Networks, LLC) none of the mentioned more specifics are currently seen from the RIPE NCC's RIS network, see the Looking Glass widget: https://stat.ripe.net/198.98.180.0/23#tabId=routing https://stat.ripe.net/198

Re: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Chuck Anderson
We are AS 10326 130.215.0.0/16 and I just received a BGPmon alert as well: 130.215.160.0/20 4795 4795 4761 9304 40633 18978 4436 10326 130.215.176.0/20 4795 4795 4761 9304 40633 18978 4436 10326 On Thu, Mar 26, 2015 at 10:45:09AM -0400, Christopher Morrow wrote: > On Thu, Mar 26, 2015 at 10:43 AM

Re: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Paul S.
Same here. These Indosat guys can't seem to catch a break =/ On 3/26/2015 午後 11:43, Peter Rocca wrote: We just received a similar alert from bgpmon - part of 108.168.0.0/17 is being advertised as /20's - although we're still listed as the origin. We are 40788. 108.168.64.0/20 4795 4795 4761 9

Re: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Pierre Emeriaud
Hi, 2015-03-26 15:08 GMT+01:00 Randy : > On Thursday March 26th 2015 at 12:18 UTC (and on-going) we are seeing more > specifics on one of our prefixes. Anyone else seeing similar or is it just > us? > > 198.98.180.0/23 4795 4795 4761 9304 40633 18978 4436 29889 > 198.98.182.0/23 4795 4795 4761

Re: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Randy
All, Info gathered off-list indicates this may be a couple of issues in our case - possible routing leak by 18978 (check your tables!) and more specifics on our prefixes from 4795 that we couldn't see before the leak hence the apparent hijack. -- ~Randy

Re: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Christopher Morrow
On Thu, Mar 26, 2015 at 10:43 AM, Peter Rocca wrote: > We just received a similar alert from bgpmon - part of 108.168.0.0/17 is > being advertised as /20's - although we're still listed as the origin. We are > 40788. > > 108.168.64.0/20 4795 4795 4761 9304 40633 18978 6939 40788 > 108.168.80.0/

Re: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Christopher Morrow
On Thu, Mar 26, 2015 at 10:38 AM, Randy wrote: > On 03/26/2015 7:27 am, Christopher Morrow wrote: >> >> is your AS in the path below? (what is your AS so folk can check for >> your prefixes/customer-prefixes and attempt to help?) > > > Sorry, we're 29889. > ok, and it looks like the path you clip

RE: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Peter Rocca
We just received a similar alert from bgpmon - part of 108.168.0.0/17 is being advertised as /20's - although we're still listed as the origin. We are 40788. 108.168.64.0/20 4795 4795 4761 9304 40633 18978 6939 40788 108.168.80.0/20 4795 4795 4761 9304 40633 18978 6939 40788 108.168.96.0/20 47

Re: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Randy
On 03/26/2015 7:27 am, Christopher Morrow wrote: is your AS in the path below? (what is your AS so folk can check for your prefixes/customer-prefixes and attempt to help?) Sorry, we're 29889.

Re: Frontier: Blocking port 22 because of illegal files?

2015-03-26 Thread Daniel Corbe
Nothing helps promote a free and open Internet more than micromanaging your users' download activity. Not really sure how someone comes to the conclusion that nobody really *needs* ssh for anything. "Livingood, Jason" writes: > ISPs are generally expected to disclose any port blocking. A qui

Re: Frontier: Blocking port 22 because of illegal files?

2015-03-26 Thread Jeff Richmond
All, I have reached out to Aaron privately for details, but we do not block port 22 traffic unless it is in direct response to an attack or related item. Please let me know directly if you have any specific questions. Thanks, -Jeff > On Mar 26, 2015, at 7:09 AM, Livingood, Jason > wrote: > >

Re: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Christopher Morrow
On Thu, Mar 26, 2015 at 10:08 AM, Randy wrote: > On Thursday March 26th 2015 at 12:18 UTC (and on-going) we are seeing more > specifics on one of our prefixes. Anyone else seeing similar or is it just > us? is your AS in the path below? (what is your AS so folk can check for your prefixes/custo

Re: Frontier: Blocking port 22 because of illegal files?

2015-03-26 Thread Livingood, Jason
ISPs are generally expected to disclose any port blocking. A quick Google search shows this is Frontier’s list: http://www.frontierhelp.com/faq.cfm?qstid=277 On 3/25/15, 10:31 PM, "Aaron C. de Bruyn" mailto:aa...@heyaaron.com>> wrote: I've had a handful of clients contact me over the last week

Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Randy
On Thursday March 26th 2015 at 12:18 UTC (and on-going) we are seeing more specifics on one of our prefixes. Anyone else seeing similar or is it just us? 198.98.180.0/23 4795 4795 4761 9304 40633 18978 4436 29889 198.98.182.0/23 4795 4795 4761 9304 40633 18978 4436 29889 -- Randy

Re: Frontier: Blocking port 22 because of illegal files?

2015-03-26 Thread Jens Link
Stephen Satchell writes: > It's been a while since I did this, but you can select an additional > port to accept SSH connections. That's easy: jens@screen:~$ grep Port /etc/ssh/sshd_config Port 22 Port 443 > Picking the right port to use is an exercise, though, that will depend > on what

booster to gain distance above 60km

2015-03-26 Thread Rodrigo Augusto
Hi folksŠ we have a point and have a 63km between point A to point BŠ. We have a sigle fiber ( only one fiber) and use a fiberstore sfp+ 10GB dibi 1270/1330 module to connect these sites. All attenuation are okŠI don¹t have any trouble on fiber Š. I have received this signal on my sfp+: Receiver s

Re: Frontier: Blocking port 22 because of illegal files?

2015-03-26 Thread Seth Mos
Stephen Satchell schreef op 26-3-2015 om 12:24: > On 03/25/2015 07:31 PM, Aaron C. de Bruyn wrote: >> After getting a few helpful users on the phone to run some quick >> tests, we found port 22 was blocked. > > It's been a while since I did this, but you can select an additional > port to accept S

Re: Frontier: Blocking port 22 because of illegal files?

2015-03-26 Thread Stephen Satchell
On 03/25/2015 07:31 PM, Aaron C. de Bruyn wrote: > After getting a few helpful users on the phone to run some quick > tests, we found port 22 was blocked. It's been a while since I did this, but you can select an additional port to accept SSH connections. A Google search indicates you can specify