Re: intra-AS messaging for route leak prevention

2016-06-10 Thread Job Snijders
Hi All, On Wed, Jun 08, 2016 at 08:48:11AM -0400, Joe Provo wrote: > On Wed, Jun 08, 2016 at 11:48:36AM +, Sriram, Kotikalapudi (Fed) wrote: > > Thanks for the inputs about the inter-AS messaging and route-leak > > prevention techniques between neighboring ASes. Certainly helpful > > informati

Re: NANOG67 - Tipping point of community and sponsor bashing?

2016-06-16 Thread Job Snijders
On Thu, Jun 16, 2016 at 03:52:02PM +0200, Nurani Nimpuno wrote: > A growing exchange point is not only a "nice-to-have" for those > operating it, but vital to those networks who peer there. If you stop > adding value to those networks peering at the IX, you will slowly > become irrelevant. I view

Re: Timeouts Loading Major Websites

2016-06-21 Thread Job Snijders
On Tue, Jun 21, 2016 at 06:13:10PM -0400, Christopher Morrow wrote: > "the internet is on fire" > > not as helpful a troublereport as one might want. > > please provide at least (so everyone else can verify/help/troubleshoot): > 1) from location X > 2) site Y with protocol Z (which resolves t

Re: packet loss question

2016-07-07 Thread Job Snijders
Hi Philip, I can't address your immediate concern, but I do have some hints regarding traceroute: 1/ Please review the excellent presentation from RA{T,S}: https://www.nanog.org/meetings/nanog47/presentations/Sunday/RAS_Traceroute_N47_Sun.pdf https://www.youtube.com/watch?v=a1IaRAVGPEE

Re: netflow + as path = buildout decision

2016-08-15 Thread Job Snijders
On Mon, Aug 15, 2016 at 10:40:40AM +0200, Randy Bush wrote: > my poor memory says that, some years back, someone announced or > mentioned an open tool which i, a small isp, could feed my netflow data > and bgp and ask if i should peer with X or build out or ... > > anyone with a more precise memor

Re: Zayo Extortion

2016-08-17 Thread Job Snijders
Dear nanog, I'm asking the group to stay focussed on network operator topics. While I appreciate the time and effort spend on the original legal research in this thread, I fear the problem space of what defines libel or slander is too far removed from the mailing list charter as described here: h

Re: AS4233852001 advertising 192.0.0.0/2?

2016-09-26 Thread Job Snijders
On Mon, Sep 26, 2016 at 08:52:20AM -0400, Adam Greene wrote: > We were alerted to this by https://radar.qrator.net. > > This seems wrong from a number of angles . Maybe the alerting system was confused. I don't see this confirmed in RIPE RIS: https://stat.ripe.net/AS4233852001#tabId=routing Ther

Re: AS47860 - 93.175.240.0/20 - Wiskey Tango Foxtrot

2016-10-07 Thread Job Snijders
On Fri, Oct 07, 2016 at 10:28:10AM +0100, Martin List-Petersen wrote: > On 06/10/16 16:38, Sandra Murphy wrote: > > Private reply: > > > > bgp.he.net sees it. For me. > > > > http://bgp.he.net/net/93.175.240.0/20 > > > > I don’t know why they do and you do not. > > That just means, they "have"

Large BGP Communities beacon in the wild

2016-10-11 Thread Job Snijders
Dear all, Large BGP Communities are a novel way to signal information between networks. An example of a Large BGP Communities is: 2914:4056024901:80. Large BGP Communities are composed of three 4-octet integers, separated by something like a colon. This is easy to remember and accommodates advanc

Re: Just a quick question...

2016-10-12 Thread Job Snijders
Hi Eric, On Wed, Oct 12, 2016 at 06:43:18PM -0400, Eric Tykwinski wrote: > IPv4 routes did a quick bounce to 600,949 around 9:30AM EST, than went > back down to 599,241 shortly after. Seemed like a big jump so I setup > an alert, just wondering if anyone else noticed anything, I’m not > overly co

Re: Large BGP Communities beacon in the wild

2016-10-26 Thread Job Snijders
:56PM +0200, Job Snijders wrote: > Large BGP Communities are a novel way to signal information between > networks. An example of a Large BGP Communities is: 2914:4056024901:80. > > Large BGP Communities are composed of three 4-octet integers, separated > by something like a colon. This

Re: Here we go again.

2016-11-09 Thread Job Snijders
Hi all, Please consider our Mail List Charter and Policy: http://nanog.org/list The NANOG mailing list is established to provide a forum for the exchange of technical information and the discussion of specific implementation issues that require cooperation among network service providers. In ord

Re: peeringdb contact me please

2016-11-19 Thread Job Snijders
Hi Erich, everyone, On Sat, Nov 19, 2016 at 02:02:15PM -0600, Kaiser, Erich wrote: > Anyone out there from PeeringDB, please contact me offlist, we are > having trouble updating our records. You can reach PeeringDB support at supp...@peeringdb.com. Feel free to CC me. Kind regards, Job

Re: list scrap by long time participant?

2016-11-20 Thread Job Snijders
On Sun, Nov 20, 2016 at 12:19:35PM -0800, Scott Weeks wrote: > --- Begin forwarded message: > > Hi Ladies and Gentlemen, > > . > Contact me for further details. > - > > Did anyone get this? I hesitate to think a long time NANOG > parti

Re: Looking for some Quagga experience to discuss 32 bit ASN + community issue with

2016-12-02 Thread Job Snijders
On Fri, Dec 02, 2016 at 09:00:57AM +, Nick Hilliard wrote: > Eric Germann wrote: > > Basically trying to advertise 4 byte ASN’s + communities, and then > > pick them off elsewhere in a private network. Can’t get the config > > right for the route map to import them on the “receiving” side. >

Forwarding issues related to MACs starting with a 4 or a 6 (Was: [c-nsp] Wierd MPLS/VPLS issue)

2016-12-02 Thread Job Snijders
Hi all, Ever since the IEEE started allocating OUIs (MAC address ranges) in a randomly distributed fashion rather then sequentially, the operator community has suffered enormously. Time after time issues pop up related to MAC addresses that start with a 4 or a 6. I believe IEEE changed their stra

Re: Looking for some Quagga experience to discuss 32 bit ASN + community issue with

2016-12-02 Thread Job Snijders
On Fri, Dec 02, 2016 at 09:13:25AM -0800, Eric Germann wrote: > So from reading the draft, if I’m understanding it correctly, I should > be able (with the patch) to encode the 32 bit ASN + a community in to > this as > > as32:x:y > > Is that correct? yes. I recommend you take a look at https:/

Re: Forwarding issues related to MACs starting with a 4 or a 6 (Was: [c-nsp] Wierd MPLS/VPLS issue)

2016-12-02 Thread Job Snijders
On Fri, Dec 02, 2016 at 09:32:37AM -0800, Leo Bicknell wrote: > I also do not think this is an IEEE/MAC assignement problem. This is a > vendor's box can't forward a particular payload problem. On Fri, Dec 02, 2016 at 04:59:37PM +, Nick Hilliard wrote: > Job Snijders w

Re: Forwarding issues related to MACs starting with a 4 or a 6 (Was: [c-nsp] Wierd MPLS/VPLS issue)

2016-12-06 Thread Job Snijders
re combinations, but we didn't iterate through all possibilities. Big thank you to Richard van Looijen (Flowmailer) for finding this issue, Edwin Kalle (2hip) for pointing us at this thread, and Job Snijders, his email which prompted us to investigate the intermediate switches. Kind regards, Robert

Re: Forwarding issues related to MACs starting with a 4 or a 6 (Was: [c-nsp] Wierd MPLS/VPLS issue)

2016-12-07 Thread Job Snijders
Dear Alexandru, > > > MACs that didnt make it through the switch when running 4.12.3.1: > > > > > > 4*:**:**:**:**:** > > > 6*:**:**:**:**:** > > > *4:**:**:**:**:** > > > *6:**:**:**:**:** > > > **:**:*B:**:6*:** > > > **:**:*F:**:4*:** > > > > Can anyone explain the last

Re: Prepending with another ASN you don't own

2016-12-16 Thread Job Snijders
Hi Andrew, On Thu, Dec 15, 2016 at 01:54:34PM -0500, Andrew Imeson wrote: > Is it acceptable to prepend using another networks ASN as long as your > ASN is the last one in the path? I can think of a few scenarios where > this is helpful. Your milage may vary. You risk introducing breakage instead

Re: NTT Taipei 3 data center address?

2016-12-20 Thread Job Snijders
On Tue, Dec 20, 2016 at 02:15:31PM +, Rivera, Alberto wrote: > I am searching for NTT Taipei 3 data center address. Do you have it by > any chance? I'll ping you off-list. Kind regards, Job

Re: Soliciting your opinions on Internet routing: A survey on BGP convergence

2017-01-10 Thread Job Snijders
On Tue, Jan 10, 2017 at 03:51:04AM +0100, Baldur Norddahl wrote: > If a transit link goes, for example because we had to reboot a router, > traffic is supposed to reroute to the remaining transit links. > Internally our network handles this fairly fast for egress traffic. > > However the problem is

Re: IPv6 BGP prefix filters

2017-01-16 Thread Job Snijders
On Mon, Jan 16, 2017 at 10:01:00PM +, Alistair Mackenzie wrote: > So recently I've come across an issue with a large ISP announcing a > /22 and /25 of IPv6 space. We are currently filtering <28 and >48 > which until now has worked fine for us. > > What are others using as their prefix filters

Re: radb mirroring

2017-01-25 Thread Job Snijders
This is a clear case of broken mirroring. Unfortunately this is not immediately apparent (for the operator) through the IRRd software. Usually this is resolved by directly contacting the other side. I've found RADB support staff to be responsive and courteous. radb-supp...@merit.edu (mailto:rad

Re: Lumos Salesman

2018-04-23 Thread Job Snijders
Rod, Please take the "Pre-Posting Guide" (https://nanog.org/list) into consideration before diluting this mailing list with classifieds like the one below. Regards, Job On Mon, Apr 23, 2018 at 8:49 PM, Rod Beck wrote: > Hi, > > > Please contact me off list. I have a 100 gig wave to discuss. It

Re: The story about MyEtherWallet.com hijack or how to become a millionare in 2 hours.

2018-04-24 Thread Job Snijders
On Tue, Apr 24, 2018 at 10:22:19PM +0200, Fredrik Korsbäck wrote: > Id take it that 15169 accepted the prefix for some reason over a > bilateral peering-sesssion (to the best of my knowledge the equinix > routeservers does indeed do filter, but please correct me on this one) > with 10297 and hence

Re: BGP Optimizers (Was: Validating possible BGP MITM attack)

2018-05-17 Thread Job Snijders
Dear Francois, On Thu, May 17, 2018 at 10:14:19AM +, Francois Devienne wrote: > The examples you mention confirm the issues are mainly due to poorly > configured networks where routes are leaked out although they > shouldn’t be. Adequate routers are able to filter out prefixes based > on attri

Re: BGP Hijack/Sickness with AS4637

2018-05-31 Thread Job Snijders
On Thu, May 31, 2018 at 09:49:47AM -0400, Alain Hebert wrote: > Well bad news on the ColoAU front, they refused to cooperate. > > We'll pushback thru our GTT accounts...  But I'm running out of ideas. > > If anyone has any good ideas how to proceed at this point feel free to > share =D. This fee

Re: BGP Hijack/Sickness with AS4637

2018-05-31 Thread Job Snijders
On Thu, May 31, 2018 at 10:31:26AM -0400, Alain Hebert wrote: > Thanks for the ideas and the hint.  Good read. > > Will do. Upon further inspection, it seems more likely that the bgp optimiser is in ColoAU's network. Given the scale of AS 4637, if it were deployed inside Telstra I'd expect more p

Re: BGP Hijack/Sickness with AS4637

2018-05-31 Thread Job Snijders
On Thu, May 31, 2018 at 02:40:06PM +, Job Snijders wrote: > Upon further inspection, it seems more likely that the bgp optimiser is > in ColoAU's network. Given the scale of AS 4637, if it were deployed > inside Telstra I'd expect more problem reports. AS 4637 may ac

Re: What are people using for IPAM these days?

2018-06-10 Thread Job Snijders
Hey Mike, On Sun, Jun 10, 2018 at 8:48 PM, Mike Lyon wrote: > Title says it all... Currently using IPPlan, but it is kinda antiquated.. This is always a good thing to review every 2-3 years or so. My current favorites in the open source world are: Netbox - https://github.com/digitalocean/netbo

Re: IPv6 faster/better proof? was Re: Need /24 (arin) asap

2018-06-11 Thread Job Snijders
I suspect that this may not be an apples to apples comparison. Perhaps lack of IPv6 is more prevalent in rural areas with poorer connectivity to the rest of the Internet? Perhaps both these CDNs serve content for different types of devices over the different AFIs (maybe old mediaboxes with a slow

Re: IPv6 faster/better proof? was Re: Need /24 (arin) asap

2018-06-11 Thread Job Snijders
On Mon, Jun 11, 2018 at 10:03 PM, Ca By wrote: > A similar take, is that big eyeballs (tmobile, comcast, sprint, att, verizon > wireless) and big content (goog, fb, akamai, netflix) are ipv6. Whats left > on ipv4 is the long tail of people asking for help on how to buy a /24 Joking aside, I susp

Re: IPv6 faster/better proof? was Re: Need /24 (arin) asap

2018-06-11 Thread Job Snijders
On Mon, Jun 11, 2018 at 05:01:24PM -0700, Ca By wrote: > > I posit that the more miles a packet has to travel, the more likely > > it is to be an IPv4 packet. > > Related. The more miles the traffic travels the more likely it is the > long tail ipv4 15% of internet that is not the wales : google,

Time to add 2002::/16 to bogon filters?

2018-06-18 Thread Job Snijders
Dear all, TL;DR: Perhaps it is time to add 2002::/16 to our EBGP bogon filters? It is kind of strange that in the default-free zone (where we don’t announce defaults to each other) - we will propagate what is effectively an IPv4 default-route, in the IPv6 DFZ. IETF has politely abandoned the pre

Fwd: New on RIPE Labs: BGP Large Communities - Uptake by the Community at Large?

2018-06-20 Thread Job Snijders
Large BGP Communities are on the rise! :-) -- Forwarded message - From: Mirjam Kuehne Date: Wed, 20 Jun 2018 at 07:51 Subject: [routing-wg] New on RIPE Labs: BGP Large Communities - Uptake by the Community at Large? To: Dear colleagues, In this new article on RIPE Labs we look

Re: AS3266: BitCanal hijack factory, courtesy of Cogent, GTT, and Level3

2018-06-25 Thread Job Snijders
On Mon, 25 Jun 2018 at 22:49, Ronald F. Guilmette wrote: > Without the generous support of Cogent, GTT, and Level3 this dumbass > lowlife IP address space thief would be largely if not entirely toast. > So what are they waiting for? Why don't their turf this jackass? Are > they waiting for an e

Re: AS3266: BitCanal hijack factory, courtesy of many connectivity providers

2018-06-26 Thread Job Snijders
(I've updated the email subject to make it more accurate) On Tue, Jun 26, 2018 at 12:18:19PM -0400, Stephen Fulton wrote: > Unless of course they are not actually on an IXP listed. Of course. > Bitcanal is not a member of TorIX and as far as I recall, never has > been. The IP they list in Peerin

Re: AS3266: BitCanal hijack factory, courtesy of many connectivity providers

2018-06-26 Thread Job Snijders
Dear Simon, On Tue, Jun 26, 2018 at 12:13:26PM -0600, Simon Muyal wrote: > On the France-IX route servers, we are applying filters based on IRR > DBs. I double checked the list https://pastebin.com/raw/Jw1my9Bb and > these prefixes should be filtered if bitcanal starts announcing them. > Currently

Re: AS3266: BitCanal hijack factory, courtesy of many connectivity providers

2018-06-26 Thread Job Snijders
On Tue, 26 Jun 2018 at 12:28, Mike Hammett wrote: > Any solution to that? Yell at the IRRs more? Or more generally, everyone involved should consider to stop selling services to well-known BGP hijackers. Kind regards, Job

Re: AS3266: BitCanal hijack factory, courtesy of many connectivity providers

2018-06-26 Thread Job Snijders
On Tue, Jun 26, 2018 at 09:57:14PM +0200, Radu-Adrian Feurdean wrote: > On Tue, Jun 26, 2018, at 20:23, Job Snijders wrote: > > I'm very happy FranceIX apply filters - however Bitcanal is known to > > submit fabricated/falsified IRR information to databases like RADB > &g

Re: AS3266: BitCanal hijack factory, courtesy of Cogent, GTT, and Level3

2018-06-27 Thread Job Snijders
People - please just stop the off topic chatter. It is ludicrous that a thread about bgp hijacks morphed into font discussions. Either contribute to the operational issue at hand by evaluating your terms & conditions (or abuse policies) and applying them to your operations, or remain silent.

Re: Time to add 2002::/16 to bogon filters?

2018-06-28 Thread Job Snijders
Dear alll, Thank you all for your input. Just a heads-up - we deployed a few days ago. NTT / AS 2914 now considers “2002::/16 le 128” and “192.88.99.0/24 le 32” to be bogon prefixes, and no longer accepts announcements for these destinations from any EBGP neighbor. Kind regards, Job

Re: BGP Communities

2018-07-05 Thread Job Snijders
On Thu, 5 Jul 2018 at 21:47, Matthew Crocker wrote: > I’m just getting started setting up communities for my network. Is there > any standard convention for community numbering (*:666 for RTBH for > example)? I’ve looked at some examples from other carriers and it looks > like everyone does th

deploying RPKI based Origin Validation

2018-07-12 Thread Job Snijders
Hi all, I wanted to share with you that a ton of activity is taking place in the Dutch networker community to deploy RPKI based BGP Origin Validation. The mantra is "invalid == reject" on all EBGP sessions. What's of note here is that we're now seeing the first commercial ISPs doing Origin Valida

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Job Snijders
On Fri, Jul 13, 2018 at 02:37:32PM +0200, Mark Tinka wrote: > Anyway, the operational issue we ran into was due to our aggressive > policy to drop Invalids. The reason this became an issue was networks > that ROA'd just their aggregates, but either forgot to or decided not to > ROA the longer prefi

Re: deploying RPKI based Origin Validation

2018-07-13 Thread Job Snijders
On Fri, Jul 13, 2018 at 4:25 PM, Christopher Morrow wrote: > On Fri, Jul 13, 2018 at 11:19 AM Grant Taylor via NANOG > wrote: >> The reading I did on RPKI / OV yesterday made me think that it is >> possible to have validated routes preferred over unknown routes which >> are preferred over invalid

Re: deploying RPKI based Origin Validation

2018-07-14 Thread Job Snijders
On Fri, Jul 13, 2018 at 02:53:30PM +0200, Mark Tinka wrote: > That, though, still leaves the problem where you end up providing a > partial routing table to your customers, while your competitors in the > same market aren't. I actually view it as a competitive advantage to carry a cleaner set of r

Re: deploying RPKI based Origin Validation

2018-07-16 Thread Job Snijders
On Sat, Jul 14, 2018 at 11:03:16AM +0200, Mark Tinka wrote: > On 14/Jul/18 09:11, Baldur Norddahl wrote: > > In the RIPE part of the world there is no excuse for not getting > > RPKI correct because RIPE made it so easy. Perhaps the industry > > could agree on enabling RPKI validation on all europe

Re: deploying RPKI based Origin Validation

2018-07-17 Thread Job Snijders
On Tue, Jul 17, 2018 at 01:27:09PM +0200, Mark Tinka wrote: > > Markus Weber from KPN is generating a daily report here and drew > > similar conclusions: https://as286.net/data/ana-invalids.txt Markus > > scrapes all routes from the AS 286 PEs and marks the routes for > > which no valid or unknown

Re: deploying RPKI based Origin Validation

2018-07-18 Thread Job Snijders
On Wed, Jul 18, 2018 at 07:30:48PM +, Michel Py wrote: > Not in lieu, but when deploying RPKI is not (yet) possible. My > routers are not RPKI capable, upgrading will take years (I'm not going > to upgrade just because I want RPKI). Can you elaborate what routers with what software you are us

Re: deploying RPKI based Origin Validation

2018-07-18 Thread Job Snijders
On Wed, Jul 18, 2018 at 05:55:23PM -0400, Randy Bush wrote: > > Can you elaborate what routers with what software you are using? It > > surprises me a bit to find routers anno 2018 which can't do OV in > > some shape or form. > > depends on how picky you are about "some shape or form." I was thin

Re: Quickstart Guide to IRR/RPSL

2018-07-19 Thread Job Snijders
Dear Kenneth, On Wed, Jul 18, 2018 at 09:38:23PM -0700, Kenneth Finnegan wrote: > As part of setting up a new Internet Exchange in Fremont, California, > we've been investigating prefix filtering on the route servers based > on IRR. Excellent, have you also considered using ARIN-WHOIS and RPKI as

Re: Quickstart Guide to IRR/RPSL

2018-07-19 Thread Job Snijders
On Thu, Jul 19, 2018 at 11:19:12AM -0700, Kenneth Finnegan wrote: > As for ARIN-WHOIS, I think I had gotten confused whether it was > additive or exclusive of IRR objects for allowing prefixes. Indeed, in arouteserver it is 'additive'. Documentation from ARIN is here: https://teamarin.net/2016/0

NTT now treats RPKI ROAs as IRR route(6)-objects

2018-07-19 Thread Job Snijders
er that we hope to deploy in the not too distant future. Using RPKI ROAs in this way is an important step forward in this process. Kind regards, Job Snijders Post scriptum on prior work: Dragon Research Labs implemented the idea in 2015: https://github.com/dragonresearch/rpki.net/blob/

Re: Question about bird RS config with BGP Community support

2018-07-23 Thread Job Snijders
On Mon, 23 Jul 2018 at 23:00, Anurag Bhatia wrote: > We are running a small IX fabric (in Mumbai, India) and with multiple > route servers based on a bird. There has been a demand of support of BGP > communities from some of our members and I am trying to find a way to set > it up in the bird. Id

Re: Question about bird RS config with BGP Community support

2018-07-24 Thread Job Snijders
On Tue, Jul 24, 2018 at 11:36:21PM +0530, Anurag Bhatia wrote: > Thanks a lot for your advice. I was aware of IXP Manager and there > were certain issues we faced due to which we couldn't use it when we > tried last time (which was a few months ago before the latest stable > release). I wish to re-

Re: AS205869, AS57166: Featured Hijacker of the Month, July, 2018

2018-07-25 Thread Job Snijders
On Wed, Jul 25, 2018 at 12:58:46PM +0200, Jérôme Nicolle wrote: > From your initial list, I can still see some prefixes with the NLnog ring : > > http://lg.ring.nlnog.net/prefix_detail/lg01/ipv4?q=206.41.128.0 > http://lg.ring.nlnog.net/prefix_detail/lg01/ipv4?q=52.128.192.0 > http://lg.ring.nlnog

Re: deploying RPKI based Origin Validation

2018-07-27 Thread Job Snijders
Dear Alex, On Thu, 26 Jul 2018 at 19:11, Alex Band wrote: > NLnet Labs recently committed to building a full RPKI Toolset, including a > (Delegated) Certificate Authority, a Publication Server and Relying Party > software. As an RP implementation was the easiest way to get going, we now > have

Re: NTT US contact

2018-07-30 Thread Job Snijders
We are reaching out off list! Kind regards, Job On Mon, 30 Jul 2018 at 22:52, Christopher Morrow wrote: > job > > On Mon, Jul 30, 2018 at 4:49 PM Michel Py wrote: > > > Can someone from NTT US contact me off-list please ? > > Preferably someone with some RPKI clue. > > > > Thanks, > > > > Mic

Re: Confirming source-routed multicast is dead on the public Internet

2018-07-31 Thread Job Snijders
On Tue, 31 Jul 2018 at 23:29, Sean Donelan wrote: > Its tought to prove a negative. I'm extremely confident the answer is yes, > public internet multicast is not viable. I did all the google searches, > check all the usual CAIDA and ISP sites. IP Multicast is used on private > enterprise networks

Re: [Nanog] BGPMon RPKI Validation Failed (Code: 9)

2018-08-02 Thread Job Snijders
Dear Michel, This question is probably best answered by Andree Toonk from the BGPMon project. I've CCed him. Kind regards, Job On Thu, Aug 2, 2018 at 10:27 PM, Michel Py wrote: > Hi Nanog, > > I received recently some of these messages, and I don't understand the logic > of them. > If there i

celebrating 10 years of routing insecurity

2018-08-10 Thread Job Snijders
Dear all, Today marks the 10th anniversary of the famous Kapela-Pilosov Man-in-the-middle BGP attack! It is a fantastic and innovative attack that would be worthy of referencing in the next Mr Robot season. :-) video: https://www.youtube.com/watch?v=S0BM6aB90n8 slide: https://www.defcon.

Re: tcp md5 bgp attacks?

2018-08-14 Thread Job Snijders
On Tue, Aug 14, 2018 at 05:28:13PM -0600, Grant Taylor via NANOG wrote: > On 08/14/2018 03:38 PM, Randy Bush wrote: > > so we started to wonder if, since we started protecting our bgp > > sessions with md5 (in the 1990s), are there still folk trying to > > attack? > > n00b response here > > I tho

Re: adding graphs for actually unreachable RPKI INVALID prefixes to RPKI Monitor?

2018-09-17 Thread Job Snijders
On Mon, 17 Sep 2018 at 18:38, nusenu wrote: > Dear NIST RPKI Monitor Team, > > thanks for creating and maintaining the RPKI Monitor > https://rpki-monitor.antd.nist.gov/#rpki_adopters > I've seen your graphs in multiple routing security presentations :) > > What do you think about adding graphs t

Re: Reaching out to ARIN members about their RPKI INVALID prefixes

2018-09-18 Thread Job Snijders
Owen, On Tue, Sep 18, 2018 at 10:23:42AM -0700, Owen DeLong wrote: > Personally, since all RPKI accomplishes is providing a > cryptographically signed notation of origin ASNs that hijackers should > prepend to their announcements in order to create an aura of > credibility, I think we should stop

Re: Reaching out to ARIN members about their RPKI INVALID prefixes

2018-09-18 Thread Job Snijders
On Tue, Sep 18, 2018 at 12:04:19PM -0700, Owen DeLong wrote: > > Perhaps said another way: > > > > "How would you figure out what prefixes your bgp peer(s) should be sending > > you?" > >(in an automatable, and verifiable manner) > > In theory, that’s what IRRs are for. You may be overlook

Re: Reaching out to ARIN members about their RPKI INVALID prefixes

2018-09-18 Thread Job Snijders
On Tue, Sep 18, 2018 at 02:35:44PM -0700, Owen DeLong wrote: > > "rir says owen can originate route FOO" > > "ROA for 157.130.1.0/24 says OWEN can originate" > > Nope… ROA says (e.g.) AS1734 (or anyone willing to impersonate AS1734) > can originate 192.159.10.0/24. I'd phrase slightly different (

Re: Reaching out to ARIN members about their RPKI INVALID prefixes

2018-09-18 Thread Job Snijders
On Tue, Sep 18, 2018 at 02:44:30PM -0700, Owen DeLong wrote: > ROAs are useful for one hop level validation. At the second AS hop > they are 100% useless. This conversation cannot be had without acknowledging there are multiple layers of defense in securing BGP. We should also acknowledge that the

Re: Reaching out to ARIN members about their RPKI INVALID prefixes

2018-09-19 Thread Job Snijders
On Tue, Sep 18, 2018 at 06:18:00PM -0700, Owen DeLong wrote: > That depends. If you ONLY allow the maintainer of NET-192.159.10.0/24 > to update the route objects for it, then the word ONLY is effectively > present by the lack of any other route objects. Ah, so you are now applying the RPKI Origin

Re: Reaching out to ARIN members about their RPKI INVALID prefixes

2018-09-19 Thread Job Snijders
On Wed, Sep 19, 2018 at 01:07:42AM -0700, Christopher Morrow wrote: > > it is about whether it is acceptable that RIRs (and more > > specifically ARIN in this mailing list's context) notify affected > > parties of their prefixes that suffer from stale ROAs. > > This I still think is a bad plan.. m

Re: O365 IP space

2018-09-25 Thread Job Snijders
On Tue, Sep 25, 2018 at 12:18:50PM -0400, Steve Meuse wrote: > https://docs.microsoft.com/en-us/office365/enterprise/urls-and-ip-address-ranges I think it is cool that companies take the time and effort to publish such useful lists. Keep it up! Kind regards, Job

ARIN RPKI TAL deployment issues

2018-09-25 Thread Job Snijders
Dear NANOG, I'd like to draw attention to a very concerning development: it appears that the ARIN TAL is not as widely deployed as other RPKI TALs (such as RIPE or APNIC's TAL). This means that ARIN members are needlessly put at higher risk. Ben Cartwright-Cox performed RPKI research a few weeks

Re: ARIN RPKI TAL deployment issues

2018-09-25 Thread Job Snijders
On Tue, Sep 25, 2018 at 03:07:54PM -0400, John Curran wrote: > On Sep 25, 2018, at 1:30 PM, Job Snijders wrote: > > > >"""Using the data, we can also see that the providers that have not > >downloaded the ARIN TAL. Either because they were not aware

Re: ARIN RPKI TAL deployment issues

2018-09-25 Thread Job Snijders
Dear John, On Tue, Sep 25, 2018 at 08:28:54PM +, John Curran wrote: > On 25 Sep 2018, at 3:34 PM, Job Snijders wrote: > > > > On Tue, Sep 25, 2018 at 03:07:54PM -0400, John Curran wrote: > >> On Sep 25, 2018, at 1:30 PM, Job Snijders wrote: > >>> > &

Re: ARIN RPKI TAL deployment issues

2018-09-25 Thread Job Snijders
On Tue, Sep 25, 2018 at 09:17:56PM +, John Curran wrote: > On 25 Sep 2018, at 5:04 PM, Job Snijders wrote: > >> It would be informative to know how many organizations potentially > >> have concerns about the indemnification clause in the RPA but > >> already agr

Re: ARIN RPKI TAL deployment issues

2018-09-26 Thread Job Snijders
On Wed, Sep 26, 2018 at 11:07:49AM +, John Curran wrote: > > Let's Encrypt does not require an agreement from relying parties > > (i.e. browser users), whereas ARIN does. > > That is correct; I did not say that they were parallel situations, > only pointing out that the Let’s Encrypt folks al

Re: NANOG Security Track: Route Security

2018-09-30 Thread Job Snijders
Hi all, Speaking as presenter in this track, I’d be fine with video recording and online distribution. In fact, I’d encourage it, I don’t assume any secrecy or confidentiality in this meeting. Perhaps for the NANOG74 meeting it is too late to organize video recording, but going forward I’m a prop

Re: NANOG Security Track: Route Security

2018-10-01 Thread Job Snijders
Perhaps the moderator and the presenters for this track can figure out (off list!) if there is unanimous support to record the session and reconsider. Kind regards, Job

Re: Towards an RPKI-rich Internet (and the appropriate allocation of responsibility in the event an RIR RPKI CA outage)

2018-10-01 Thread Job Snijders
Dear all, I'm very happy to see the direction this conversation has taken, seems we've moved on towards focussing on solutions and outcomes - this is encouraging. On Mon, Oct 01, 2018 at 05:44:17PM +0100, Nick Hilliard wrote: > John Curran wrote on 01/10/2018 00:21: > > There is likely some on th

Re: Software installation tools retrieving ARIN TAL (was: Re: ARIN RPKI TAL deployment issues)

2018-10-13 Thread Job Snijders
ran wrote: > On 25 Sep 2018, at 3:34 PM, Job Snijders wrote: > > ... > > What I'm hoping for is that there is a way for the ARIN TAL to be > > included in software distributions, without compromising ARIN's > > legal position. > > > > Perhaps

Re: Amazon now controls 3.0.0.0/8

2018-11-08 Thread Job Snijders
On Fri, Nov 9, 2018 at 0:54 Eric Kuhnke wrote: > https://news.ycombinator.com/item?id=18407173 > > Quoting from the post: > > " > > Apparently bought in two chunks: 3.0.0.0/9 and 3.128.0.0/9. > > Previous owner was GE. > > Anecdotal reports across the Internet that AWS EIPs are now being assigned

Re: IGP protocol

2018-11-12 Thread Job Snijders
The war is over. In IETF the OSPF and ISIS working groups merged. Now all of it is “link-state routing”. https://datatracker.ietf.org/group/lsr/about/

Re: IGP protocol

2018-11-16 Thread Job Snijders
Let’s please stay on topic.

progress report: modernizing OpenBGPD

2018-11-29 Thread Job Snijders
Dear fellow BGP aficionados, Over the last few months we've spend considerable time modernizing the OpenBSD's BGP-4 implementation "OpenBGPD", with the explicit goal to offer more diversity in the IXP Route Server space. OpenBGPD now is faster, has RFC 8212 support, RFC 6811 Origin Validation sup

Re: rfd

2018-12-18 Thread Job Snijders
On Tue, Dec 18, 2018 at 6:40 PM Randy Bush wrote: > > do you have rfd on? with what parms? I assume rfd in this context means "Route Flap Dampening". NTT / AS 2914 does *not* have Route Flap Dampening configured, as is documented here https://us.ntt.net/support/policy/routing.cfm#routedampening

Re: rfd

2018-12-18 Thread Job Snijders
Hi Steve, Lowering the LP would achieve the outcome you desire, provided there are (stable) alternative paths. What you advocate results in absolute outages in what may already be precarious situations (natural disasters?) - what Saku Ytti suggests like a less painful alternative with desirable p

Re: rfd

2018-12-18 Thread Job Snijders
Dear Steve, No worries, I have not forgotten the transitive properties of the LOCAL_PREF BGP Path Attribute! :-) You are right that any LOCAL_PREF modifications (and the attribute itself), are local to the Autonomous System in which they were set, but the effects of such settings can percolate fur

Re: BGP Experiment

2018-12-20 Thread Job Snijders
Dear Italo, Thanks for giving the community a heads-up on your plan! I think your announcement like these are the best anyone can do when trying legal but new BGP path attributes. I'll forward this message to other NOGs and make sure that our NOC adds it to their calendar. Kind regards, Job On

Re: Announcing Peering-LAN prefixes to customers

2018-12-20 Thread Job Snijders
Dear Dominic, On Thu, Dec 20, 2018 at 6:49 PM Dominic Schallert wrote: > this might be a stupid question but today I was discussing with a colleague > if Peering-LAN prefixes should be re-distributed/announced to direct > customers/peers. My standpoint is that in any case, Peering-LAN prefixes

Re: Facebook doesn't have a route to my ISP's (Cogeco) IPv6 space?

2018-12-20 Thread Job Snijders
At this moment it appears there are multiple rifts in the IPv6 default-free zone (that don’t exist in the IPv4 realm), between various organizations. Focusing on one particular partitioning may not help address the other issues. Kind regards, Job

Re: 192.208.19.0/24 hijack transiting 209, 286, 3320, 5511, 6461, 6762, 6830, 8220, 9002, 12956

2019-01-04 Thread Job Snijders
Dear all, NTT / AS 2914 deployed explicit filters to block this BGP announcement from AS 4134. I recommend other operators to do the same. I’d also like to recommend AS 32982 to remove the AS_PATH prepend on the /24 announcement so the counter measure is more effective. Kind regards, Job On Fr

Re: Report on Legal Barriers to RPKI Adoption

2019-01-06 Thread Job Snijders
Dear Christopher, David, NANOG community, Thank you for your research and report. I found the report quite readable (not having a legal background) and well structured. Definitely edifying and worth the read! In this mail I’ll reply specifically to a few points from the executive summary (and snip

Re: BGP Experiment

2019-01-08 Thread Job Snijders
OOn Tue, Jan 8, 2019 at 19:59 Tom Ammon wrote: > On Tue, Jan 8, 2019, 11:50 AM >> * cu...@dcc.ufmg.br (Italo Cunha) [Tue 08 Jan 2019, 17:42 CET]: >> >[A] https://goo.gl/nJhmx1 >> >> For the archives, since goo.gl will cease to exist soon, this links to >> >> https://docs.google.com/spreadsheets/

Re: BGP Experiment

2019-01-08 Thread Job Snijders
On Wed, Jan 9, 2019 at 9:55 Randy Bush wrote: > >>> We plan to resume the experiments January 16th (next Wednesday), and > >>> have updated the experiment schedule [A] accordingly. As always, we > >>> welcome your feedback. > >> i did not realize that frr updates propagated so quickly. very coo

Re: Announcing Peering-LAN prefixes to customers

2019-01-16 Thread Job Snijders
On Wed, Jan 16, 2019 at 10:56 Mark Tinka wrote: > On 3/Jan/19 22:08, Andy Davidson wrote: > > > There are no stupid questions! It is a good idea to not BGP announce > and perhaps also to drop traffic toward peering LAN prefixes at > customer-borders, this was already well discussed in the thread

Re: Announcing Peering-LAN prefixes to customers

2019-01-16 Thread Job Snijders
On Wed, Jan 16, 2019 at 12:39 Christoffer Hansen wrote: > > On 16/01/2019 08:56, Mark Tinka wrote: > > Running a few exchange points in Africa since 2002, the news was that > > the exchange point LAN should not be visible anywhere on the Internet. > > Do you use AS0 as origin on the RPKI objects

Re: Announcing Peering-LAN prefixes to customers

2019-01-16 Thread Job Snijders
On Wed, Jan 16, 2019 at 14:49 Mark Tinka wrote: > On 16/Jan/19 11:38, Christoffer Hansen wrote: > > > Do you use AS0 as origin on the RPKI objects for said exchange point > > LAN(s) to prevent route propagation? > > I don't operate any exchange points anymore, but I am not aware of any > such ope

Re: Announcing Peering-LAN prefixes to customers

2019-01-16 Thread Job Snijders
On Wed, Jan 16, 2019 at 15:24 Randy Bush wrote: > > Do you use AS0 as origin on the RPKI objects for said exchange point > > LAN(s) to prevent route propagation? > > but as0 does not exactly do that as it can be overridden by a different > roa for the same prefix. as0 is pretty useless. Why wo

<    1   2   3   4   5   6   >