Vidéotron CPE bug

2016-06-06 Thread Simon Perreault
Any Vidéotron engineer listening? On your CPE there's a SIP ALG on TCP port 5060 that is causing issues to our clients with Cisco 79xx phones. I'm referring to the CPE that is used for business subscribers with static IP addresses. Please contact me for all the details. Thanks, Simon

Re: mrtg alternative

2016-02-28 Thread Simon Perreault
Le 2016-02-27 20:42, B a écrit : > Graphite/grafana. I strongly recommend Graphite to all my competitors! :) Simon

Re: Carrier Grade NAT

2014-07-29 Thread Simon Perreault
Le 2014-07-29 13:19, Owen DeLong a écrit : Usually the window they give is ~ 3-5 seconds so they're pretty specific. This assumes that your log server and theirs are synchronized to an accurate time source within 3-5 seconds Not really, since usually port blocks are not immediately reallocat

Re: Cheap LSN/CGN/NAT444 Solution

2014-06-30 Thread Simon Perreault
Le 2014-06-30 09:05, Roland Dobbins a écrit : On Jun 30, 2014, at 7:42 PM, Simon Perreault wrote: Why? Cause that (per-subscriber limits on ports and memory) is exactly what we recommend in RFC 6888... <https://app.box.com/s/a3oqqlgwe15j8svojvzl> I can't tell you how many

Re: Cheap LSN/CGN/NAT444 Solution

2014-06-30 Thread Simon Perreault
Le 2014-06-30 06:12, Roland Dobbins a écrit : what is needed however is session timeouts. This can help, but it isn't a solution to the botted/abusive machine problem. They'll just keep right on pumping out packets and establishing new sessions, 'crowding out' legitimate users and filling up

Re: Applications that break when not using /64

2014-06-18 Thread Simon Perreault
Le 2014-06-17 17:31, Matthew Petach a écrit : > Not sure who I'd > file the bug with, though. b...@freebsd.org (Looking at Bjoern with an evil grin...) Simon

Re: Requirements for IPv6 Firewalls

2014-04-22 Thread Simon Perreault
Le 2014-04-19 06:23, Florian Weimer a écrit : >>> I agree with Bill. You can poopoo NAT all you want, but it's a fact >>> of most networks and will continue to remain so until you can make a >>> compelling case to move away from it. >> >> Does that mean all IPv6 firewalls should support NAT? > >

Re: Requirements for IPv6 Firewalls

2014-04-18 Thread Simon Perreault
Le 2014-04-18 14:57, William Herrin a écrit : > Excluding references and remarks RFC 6888 is 8 pages long with 15 > total requirements. Short. Given the trend toward ever-fluffier RFCs, I'll take that as a compliment. :) > I'll let the firewall document's authors speak for themselves about > thei

Re: Requirements for IPv6 Firewalls

2014-04-18 Thread Simon Perreault
Le 2014-04-18 14:20, William Herrin a écrit : > On Fri, Apr 18, 2014 at 2:06 PM, Simon Perreault wrote: >> IMHO, what the IETF can do is recommend a set of behavioural traits that >> make IPv6 firewalls behave like good citizens in the Internet ecosystem. >> Meaning that

Re: Requirements for IPv6 Firewalls

2014-04-18 Thread Simon Perreault
Le 2014-04-18 14:00, William Herrin a écrit : > On Fri, Apr 18, 2014 at 1:40 PM, Simon Perreault wrote: >> Le 2014-04-18 13:35, William Herrin a écrit : >>> Your document specifies "Enterprise" firewalls. Frankly I think that's >>> wise. Consumer and ente

Re: Requirements for IPv6 Firewalls

2014-04-18 Thread Simon Perreault
Le 2014-04-18 13:35, William Herrin a écrit : >> Does that mean all IPv6 firewalls should support NAT? >> >> Remember, we're aiming for a base set of requirements applying to all >> IPv6 firewalls. > > Your document specifies "Enterprise" firewalls. Frankly I think that's > wise. Consumer and ente

Re: Requirements for IPv6 Firewalls

2014-04-18 Thread Simon Perreault
Le 2014-04-18 13:25, Mike Hale a écrit : > I agree with Bill. You can poopoo NAT all you want, but it's a fact > of most networks and will continue to remain so until you can make a > compelling case to move away from it. Does that mean all IPv6 firewalls should support NAT? Remember, we're aimi

Re: [[Infowarrior] - NSA Said to Have Used Heartbleed Bug for Years]

2014-04-14 Thread Simon Perreault
Le 2014-04-14 10:38, Matthew Black a écrit : > Shouldn't a decent OS scrub RAM and disk sectors before allocating them to > processes, unless that process enters processor privileged mode and sets a > call flag? I recall digging through disk sectors on RSTS/E to look for > passwords and other in

Re: spamassassin

2014-02-20 Thread Simon Perreault
Le 2014-02-19 21:48, Randy Bush a écrit : > as the fix is not yet out, would be cool if someone with more fu than i > posted a recipe to hack for the moment. The fix is out now! :D Simon -- DTN made easy, lean, and smart --> http://postellation.viagenie.ca NAT64/DNS64 open-source--> http

Re: random dns queries with random sources

2014-02-19 Thread Simon Perreault
Le 2014-02-19 11:28, Dobbins, Roland a écrit : >> I am late to this train, but it appears no one else has brought this up. It >> is a DNS tunneling setup, not an attack. > > This makes a lot of sense - good insight, will look into this further! I use this for free wi-fi in airports and such:

Re: spamassassin

2014-02-19 Thread Simon Perreault
Daniel is correct, he gets a cookie! The the others: please learn to recognize when you have no clue. We've been having the same problem here for the last three days. I tracked it down to BAYES_999. Glad to see other people are suffering as much as I am. :) Simon Le 2014-02-19 01:46, Daniel Staa

Re: SDN - Killer Apps

2013-02-25 Thread Simon Perreault
Le 2013-02-25 09:23, Glen Kent a écrit : Yahoo, Google, etc applications are running on one server and each application could be theoretically associated with a unique VXLAN tag. This way service providers will be able to provide QoS per application (by effectively providing QoS to the VXLAN carr

Re: CGN fixed/hashed nat question

2013-01-23 Thread Simon Perreault
Le 2013-01-23 16:37, William Herrin a écrit : NAT traversal using port prediction is a Worst Current Practice. In fact, were someone to use those "worst current practices" to build some generic p2p VPN software, even old games could leverage it to allow someone behind a CGN to host. Have a lo

Re: CGN fixed/hashed nat question

2013-01-23 Thread Simon Perreault
Le 2013-01-23 14:22, William Herrin a écrit : I thought this was desirable behavior for a CGN since effective port prediction facilitates p2p nat traversal? No. NAT traversal using port prediction is a Worst Current Practice. Simon

Re: guys != gender neutral

2012-09-28 Thread Simon Perreault
Le 2012-09-28 12:15, Jay Ashworth a écrit : The assumption of a 1-1 correspondence between gender and sex is old fashioned nowadays. Mammals have sex. *Words* (and only words) have gender. There's an RFC about that! RFC 6350, section 6.2.7, about the GENDER vCard property: 6.2.7. GENDER

Re: Dear Linkedin,

2012-06-11 Thread Simon Perreault
On 2012-06-11 15:05, Owen DeLong wrote: OK, someone shows you a Quebec driver's license. You ask for a passport, she says, I don't have one, and points at the blue word Plus after the words Permis de Conduire at the top of the license. Now what? To the best of my knowledge, ICE stopped accept

Re: Dear Linkedin,

2012-06-08 Thread Simon Perreault
On 2012-06-08 15:48, Michael Thomas wrote: * Make sure you update your password on LinkedIn (and any site that you visit on the Web) at least once every few months. * Do not use the same password for multiple sites or accounts. * Create a strong password for your account, one that includes letter

Re: Peer1/Server Beach support for BGP on dedicated servers

2012-05-22 Thread Simon Perreault
On 2012-05-22 15:02, J.J. Mc Kenna wrote: http://www.voxel.net/assets/VoxCAST-Whitepaper.pdf This is not what I would call "BGP support". It's just a CDN. Thanks, Simon -Original Message----- From: Simon Perreault [mailto:simon.perrea...@viagenie.ca] Sent: Tuesday, May 22

Re: Peer1/Server Beach support for BGP on dedicated servers

2012-05-22 Thread Simon Perreault
On 2012-05-19 22:24, Adam Rothschild wrote: http://www.voxel.net offers web-orderable servers and VMs, with BGP support (IPv4 and IPv6) available as a paid add-on in all service locations. Is this publicly advertised or do you have to ask for it? I can't find anything about BGP on their web si

Re: pbx recco

2012-05-16 Thread Simon Perreault
On 2012-05-15 19:01, Tom Hill wrote: On 15/05/12 18:00, Randy Bush wrote: i run a raw asterisk and would not wish it on my worst enemy. I've been itching to try Freeswitch I know FreeSWITCH and Asterisk from the inside out because we ported both of them to IPv6. Verdict: - Asterisk start

Re: incoming smtp from v6 addresses

2012-01-04 Thread Simon Perreault
Randy Bush wrote, on 01/04/2012 05:10 AM: > 7.8% is over ipv6 transport > > but only 2% of outgoing deliveries are over ipv6. A consequence of whitelisting? Simon -- DTN made easy, lean, and smart --> http://postellation.viagenie.ca NAT64/DNS64 open-source--> http://ecdysis.viageni

Re: NAT444 or ?

2011-09-07 Thread Simon Perreault
David Israel wrote, on 09/07/2011 04:21 PM: > In theory, this > particular performance problem should only arise when the NAT gear insists on > a > unique port per session (which is common, but unnecessary) What you're describing is known as "endpoint-independent mapping" behaviour. It is good fo

Re: VRF/MPLS on Linux

2011-08-24 Thread Simon Perreault
On 2011-08-24 13:37, Jussi Peltola wrote: >> Just FYI: on OpenBSD you can set the VRF (aka "routing table" or >> "routing domain") per socket with code like this: >> >> int s, table; >> s = socket(...); >> table = 123; >> setsockopt(s, IPPROTO_IP, SO_RTABLE, &table, sizeof(table)); >> > >

Re: VRF/MPLS on Linux

2011-08-24 Thread Simon Perreault
On 2011-08-24 06:06, Brian Raaen wrote: > The only issue with this is that the Linux box is not acting as a > router, but as the egress devices. I'm trying to figure out how to > properly get my application to 'color' the traffic. standard BSD > sockets appear to have no concept of 'Labels'. Jus

Re: Real World NAT64 deployments

2011-03-04 Thread Simon Perreault
On 2011-03-04 08:32, Francois Tigeot wrote: >> http://ecdysis.viagenie.ca/ > > What about its integration in upstream software ? None of it is integrated yet. > The dns64 part is integrated in the newly released Bind 9.8 That's not our code. ISC made their own DNS64 implementation for Bind 9.8.

Re: Real World NAT64 deployments

2011-03-04 Thread Simon Perreault
On 2011-03-03 15:31, Elliot Finley wrote: > So as not to re-invent the wheel - if you are currently doing NAT64 in > production and are willing to share: > > What software/hardware are you using? http://ecdysis.viagenie.ca/ > Why? Dogfooding. http://en.wikipedia.org/wiki/Eating_your_own_dog_foo

Re: quietly....

2011-02-03 Thread Simon Perreault
On 2011-02-03 15:29, Lamar Owen wrote: > On Thursday, February 03, 2011 02:55:39 pm Jack Bates wrote: >> Do you think we have to have a standard for them to implement it? >> >> If they can ignore the CPE router rules, they can implement NAT66 on >> their own, too. > > See the map66 Sourceforge.ne

Re: Ipv6 for the content provider

2011-01-31 Thread Simon Perreault
On 2011-01-31 12:38, Blake Hudson wrote: > I was under the impression that the later versions of 5 (e.g. 5.5, 5.6) > had backported stateful connection tracking. Has anyone tested recently? The command # ip6tables -A INPUT -m state --state ESTABLISHED -j ACCEPT works on CentOS 5.5. And there's n

Re: How to have open more than 65k concurrent connections?

2010-10-14 Thread Simon Perreault
On 2010-10-14 12:53, Joel Jaeggli wrote: > you've only got 64511 ports per ip on the box, to use for > outgoing connections. As long as you're not connecting to the same destination IP/port pair, the same source IP/port pair can be reused. So even for outgoing connections there is virtually no li

Re: IPv6 Server Load Balancing - DSR

2010-08-12 Thread Simon Perreault
On 2010-08-12 08:32, Leland Vandervort wrote: > I'm looking at server load balancing for IPv6 and specifically need > DSR (direct server return). Additionally, I need to support both TCP > and UDP. This is easily done with OpenBSD. See here for starters: http://www.undeadly.org/cgi?action=articl

Re: Addressing plan exercise for our IPv6 course

2010-07-21 Thread Simon Perreault
On 2010-07-21 14:47, Marco Hogewoning wrote: > For a novice ? I wouldn't recommend it. From what I get back 'in the field' > it's already hard enough to get people familliar to the whole concept of > hexadecimal without going into bit level. But then again, if you are a fairly > technical compan

Re: Addressing plan exercise for our IPv6 course

2010-07-21 Thread Simon Perreault
On 2010-07-21 12:57, Alex Band wrote: > We've been working on an exercise for the IPv6 training course we deliver for > LIRs. It's aimed at people who are unfamiliar with IPv6, so the goal is to > get them to the point where once they get their IPv6 /32 allocation, they > have a good idea how to

Re: DNS performance...

2010-05-05 Thread Simon Perreault
On 2010-05-05 10:41, Donald Eastlake wrote: Does anyone know of good performance comparisons, especially for high end applications with lots of data/zones and/or high query/update rates? Recursive or authoritative? For recursive, there are pretty good graphs here: http://unbound.net/documentat

Re: Rate of growth on IPv6 not fast enough?

2010-04-22 Thread Simon Perreault
On 2010-04-22 07:18, William Herrin wrote: On the other hand, I could swear I've seen a draft where the PC picks up random unused addresses in the lower 64 for each new outbound connection for anonymity purposes. That's probably RFC 4941. It's available in pretty much all operating systems. I

Re: Rate of growth on IPv6 not fast enough?

2010-04-20 Thread Simon Perreault
On 04/20/2010 04:51 PM, Jack Bates wrote: > uPNP at a larger scale? Would require some serious security and > scalability analysis. This is the latest proposal. The Security Considerations section needs some love... http://tools.ietf.org/html/draft-wing-softwire-port-control-protocol Simon -- N

Re: Rate of growth on IPv6 not fast enough?

2010-04-20 Thread Simon Perreault
On 2010-04-20 10:53, John Levine wrote: Other than the .01% of consumer customers who are mega multiplayer game weenies, what's not going to work? Actual experience as opposed to hypothetical hand waving would be preferable. http://tools.ietf.org/html/draft-ford-shared-addressing-issues Simon

Re: Rate of growth on IPv6 not fast enough?

2010-04-19 Thread Simon Perreault
On 2010-04-19 13:22, Bryan Fields wrote: If we look a the total number of translations for 250k users we see 10.5M entries. As TCP/UDP only has 65,536 ports and about 1025 of them are unusable, this leaves 64,511 ports to work with per IP. Divided out we need 163 public IP's min just to nat the

Re: IP4 Space

2010-03-22 Thread Simon Perreault
On 2010-03-22 17:42, Christopher Morrow wrote: the current ietf draft for 'simple cpe security' (draft-ietf-v6ops-cpe-simple-security-09.txt) is potentially calling for some measures like nat, not nat today but... This is being reversed as we speak. Simon -- NAT64/DNS64 open-source --> http://

Re: Consumer Grade - IPV6 Enabled Router Firewalls.

2009-12-12 Thread Simon Perreault
On 12/12/2009 01:55 AM, Mark Newton wrote: Would you be using "Consumer Grade - IPV6 Enabled Router Firewalls" in the enterprise? 'cos if you would, I think I might have entered the wrong thread :) Yeah, I think I did. Sorry for the noise. Simon -- DNS64 open-source --> http://ecdysis.viage

Re: Consumer Grade - IPV6 Enabled Router Firewalls.

2009-12-11 Thread Simon Perreault
Joe Greco wrote, on 2009-12-11 08:36: > Everyone knows a NAT gateway isn't really a firewall, except more or less > accidentally. There's no good way to provide a hardware firewall in an > average residential environment that is not a disaster waiting to happen. > > If you make it "smart" (i.e.

Re: Consumer Grade - IPV6 Enabled Router Firewalls.

2009-12-11 Thread Simon Perreault
valdis.kletni...@vt.edu wrote, on 2009-12-11 08:06: > On Fri, 11 Dec 2009 07:41:59 EST, Simon Perreault said: >> Mark Newton wrote, on 2009-12-11 03:09: >>> You kinda do if you're using a stateful firewall with a "deny >>> everything that shouldn't be acce

Re: Consumer Grade - IPV6 Enabled Router Firewalls.

2009-12-11 Thread Simon Perreault
Mark Newton wrote, on 2009-12-11 03:09: > You kinda do if you're using a stateful firewall with a "deny > everything that shouldn't be accepted" policy. UPnP (or something > like it) would have to tell the firewall what should be accepted. That's putting the firewall at the mercy of viruses, worm

Re: IPv6 Allocations

2009-10-19 Thread Simon Perreault
Esposito, Victor wrote, on 2009-10-19 16:01: > Since there is a lot of conversation about IPv6 flying about, does > anyone have a document or link to a good high level allocation structure > for v6? See RFC 3531 and here: http://www.ipv6book.ca/allocation.html Simon -- DNS64 open-source --> h