Re: NetFlow - path from Routers to Collector

2015-09-02 Thread Roland Dobbins
ng it physically separately is best. --- Roland Dobbins

Re: NetFlow - path from Routers to Collector

2015-09-02 Thread Roland Dobbins
budgets, ASIC resources, LC-CPU resources, etc. are held in common in such scenarios. --- Roland Dobbins

Re: NetFlow - path from Routers to Collector

2015-09-02 Thread Roland Dobbins
it's running on (at least some of) the same hardware. It isn't as good as true physical separation, but there's no sense in making the perfect the enemy of the merely good. --- Roland Dobbins

Re: NetFlow - path from Routers to Collector

2015-09-02 Thread Roland Dobbins
minimally. Progress is being made in this arena, but as you indicate, it's unevenly distributed. --- Roland Dobbins

Re: NetFlow - path from Routers to Collector

2015-09-02 Thread Roland Dobbins
On 2 Sep 2015, at 23:29, Serge Vautour wrote: > I assume if someone has the ability to do so, you've got bigger problems. This is the key, IMHO. --- Roland Dobbins

Re: BGAN Optimized Laptops

2015-09-10 Thread Roland Dobbins
for it). --- Roland Dobbins

Re: BGAN Optimized Laptops

2015-09-10 Thread Roland Dobbins
download message on demand, only download attachments on demand, etc. --- Roland Dobbins

Re: SMS Gateway

2015-09-14 Thread Roland Dobbins
round! --- Roland Dobbins

Re: Synful Knock questions...

2015-09-15 Thread Roland Dobbins
. --- Roland Dobbins

Re: Synful Knock questions...

2015-09-16 Thread Roland Dobbins
raffic to/from router interfaces would potentially pick that up, as well. ------- Roland Dobbins

Re: DDoS auto-mitigation best practices (for eyeball networks)

2015-09-19 Thread Roland Dobbins
to get this sort of thing instituted on one's upstreams. --- Roland Dobbins

Re: correlation between ingress and egress traffic in case of volume-based DDoS

2015-09-23 Thread Roland Dobbins
which has gone down under the onslaught. And so forth. ----------- Roland Dobbins

Re: Recent trouble with QUIC?

2015-09-23 Thread Roland Dobbins
r flow telemetry analysis. ----------- Roland Dobbins

Re: GeoIP information

2015-09-24 Thread Roland Dobbins
On 25 Sep 2015, at 5:58, Ian Clark wrote: Any advice would be awesome! There is no inherent correlation between IP addressing and geopolitical boundaries. --- Roland Dobbins

Re: GeoIP information

2015-09-24 Thread Roland Dobbins
On 25 Sep 2015, at 7:47, William Herrin wrote: > Maxmind does not concur. <https://news.ycombinator.com/item?id=7888280> ------- Roland Dobbins

Re: GeoIP information

2015-09-24 Thread Roland Dobbins
On 25 Sep 2015, at 8:02, Eric Tykwinski wrote: Why ask, I guess it worked in the past? Because folks need to obviate 'GeoIP' filtering so that their services/content can be accessed. ------- Roland Dobbins

Re: GeoIP information

2015-09-25 Thread Roland Dobbins
On 25 Sep 2015, at 14:22, Fred Hollis wrote: See big telco's announcing /12's and having these IPs spread all over the country. All over the *world*. ------- Roland Dobbins

Re: GeoIP information

2015-09-25 Thread Roland Dobbins
On 25 Sep 2015, at 23:44, valdis.kletni...@vt.edu wrote: Which is why Akamai (and any other *sane* CDN) make their decisions based on network topology, not physical location +1 --- Roland Dobbins

Re: Quick Update on the North American BCOP Efforts

2015-09-30 Thread Roland Dobbins
On 30 Sep 2015, at 10:17, Mike Hammett wrote: If NANOG isn't developing and publishing BCOPs, what's the point of NANOG other than a mailing list? <https://en.wikipedia.org/wiki/North_American_Network_Operators'_Group> ----------- Roland Dobbins

Re: Quick Update on the North American BCOP Efforts

2015-10-01 Thread Roland Dobbins
understand that the problem space exists is The Problem, writ large. ------- Roland Dobbins

Re: /27 the new /24

2015-10-02 Thread Roland Dobbins
people's money. ;> ------- Roland Dobbins

Updated NANOG 65 DD4BC presentation file.

2015-10-06 Thread Roland Dobbins
I'd inadvertently failed to upload the final revision of the DD4BC presentation file from NANOG 65 - please find the updated .pdf file here, apologies for my confusion: <https://app.box.com/s/2kpbqfdl1ko3qhfhe4y8ekd1rvj24vfd> ------- Roland Dobbins

Re: DNSSEC and ISPs faking DNS responses

2015-11-13 Thread Roland Dobbins
On 14 Nov 2015, at 3:01, John Levine wrote: > Civilians definitely use these. A very tiny percentage. The power of the default reigns supreme. --- Roland Dobbins

Re: DNSSEC and ISPs faking DNS responses

2015-11-13 Thread Roland Dobbins
On 14 Nov 2015, at 5:22, David Conrad wrote: Thank you. I was wondering if anyone would mention this. +1. This is done in some countries which are heavy-handed with Internet censorship. --- Roland Dobbins

Re: DNSSEC and ISPs faking DNS responses

2015-11-13 Thread Roland Dobbins
this list are not representative of the global user base. --- Roland Dobbins

Re: DNSSEC and ISPs faking DNS responses

2015-11-13 Thread Roland Dobbins
On 14 Nov 2015, at 10:02, John Levine wrote: > People in New Zealand said differently. This is a corner-case, however. --- Roland Dobbins

Re: DNSSEC and ISPs faking DNS responses

2015-11-13 Thread Roland Dobbins
selection of random passers-by if they know what a VPN is, if they know how to install one, if they've installed one. ------- Roland Dobbins

Re: DNSSEC and ISPs faking DNS responses

2015-11-13 Thread Roland Dobbins
rs have no idea how computers actually work. They certainly don't know what a VPN is, or how (or why) to set one up. This state of affairs will continue until VPN technology becomes subsumed into applications and is enabled as a default, if it ever does. ------- Roland Dobbins

Re: DNSSEC and ISPs faking DNS responses

2015-11-14 Thread Roland Dobbins
On 14 Nov 2015, at 13:38, Royce Williams wrote: > They don't have to know what a VPN is in order to to use it -- and to pass > it on to their friends. That's still a very small proportion of the user base. ------- Roland Dobbins

Re: DNSSEC and ISPs faking DNS responses

2015-11-14 Thread Roland Dobbins
izable minority. ------- Roland Dobbins

Re: DNSSEC and ISPs faking DNS responses

2015-11-14 Thread Roland Dobbins
e in the first place. I'm wondering if perhaps major OS vendors/developers may start offering/OEMing VPN services, or at least distributing profiles in the same way as browser vendors/developers distribute CA certs? ------- Roland Dobbins

Re: DNSSEC and ISPs faking DNS responses

2015-11-14 Thread Roland Dobbins
isn't a simple default. If it ever becomes a simple default, we'll start to see greater adoption. And probably not in the form of 'tunneling-everything' VPNs, but 'application VPNs' which automagically utilize SSL/TLS ----------- Roland Dobbins

Re: DNSSEC and ISPs faking DNS responses

2015-11-14 Thread Roland Dobbins
, the other concern is that governments which don't already interfere with VPNs will outlaw VPNs in the name of 'national security'. Answering my own question, the OS/device vendors won't get into the VPN business due to this issue. --- Roland Dobbins

Re: DNSSEC and ISPs faking DNS responses

2015-11-14 Thread Roland Dobbins
they might need one, and aren't especially adept at installing applications, even from 'apps stores'. ----------- Roland Dobbins

Re: DNSSEC and ISPs faking DNS responses

2015-11-14 Thread Roland Dobbins
or the sake of discussion that it's reasonably accurate. Do you believe that percentage is going to significantly increase over time? ------- Roland Dobbins

Re: DNSSEC and ISPs faking DNS responses

2015-11-14 Thread Roland Dobbins
TM. Again, as compared to 3.2 billion. Most of those users probably don't know what "encryption" is. But they're using it. Sure, via http/s. But VPNs used in the sense of this discussion tend to imply topological masking, as well. --- Roland Dobbins

Re: DNSSEC and ISPs faking DNS responses

2015-11-14 Thread Roland Dobbins
making applications and data and services available to people, and keeping them that way. ----------- Roland Dobbins

Re: Project Fi and the Great Firewall

2015-11-14 Thread Roland Dobbins
On 15 Nov 2015, at 9:00, Sean Hunter wrote: While in China recently, I noticed that my Project Fi phone was accessing Google. Accessing, or attempting to access? Were you using a local SIM card, or roaming w/data? What about WiFi? --- Roland Dobbins

Re: Project Fi and the Great Firewall

2015-11-14 Thread Roland Dobbins
On 15 Nov 2015, at 11:02, Yury Shefer wrote: The phone uses roaming data to access Google and your phone gets IP assigned by your home mobile network packet gateway (P-GW). This is what I thought, as well - thanks for confirming! --- Roland Dobbins

Re: DNSSEC and ISPs faking DNS responses

2015-11-17 Thread Roland Dobbins
On 14 Nov 2015, at 14:32, Jaap Akkerhuis wrote: > There is now a push to forbid the sales of these thingies. A push to forbid the sale of Raspberry Pis, of VPNs, or of both? Where? Thanks! --- Roland Dobbins

Re: bad announcement taxonomy

2015-11-18 Thread Roland Dobbins
On 18 Nov 2015, at 17:06, Randy Bush wrote: > we need a name for 7007 other then vinnie Mis-distribution? --- Roland Dobbins

Re: bad announcement taxonomy

2015-11-18 Thread Roland Dobbins
On 18 Nov 2015, at 21:40, William Herrin wrote: > Creating jargon down in the weeds, though, that's a bad thing. 'AS 7007' is jargon to those unaware of the history and context. ----------- Roland Dobbins

Re: strategies to mitigate DNS amplification attacks in ISP network

2015-12-01 Thread Roland Dobbins
ed out' by programmatically-generated attack traffic). The real solution to this entire problem set is source-address validation, as you indicate. Until the happy day when we've achieved universal source-address validation arrives, various combinations of the above. ----------- Roland Dobbins

Re: strategies to mitigate DNS amplification attacks in ISP network

2015-12-01 Thread Roland Dobbins
On 2 Dec 2015, at 0:14, Roland Dobbins wrote: Until the happy day when we've achieved universal source-address validation arrives, various combinations of the above. I forgot to mention RRL on authoritative servers, apologies. --- Roland Dobbins

Re: Ransom DDoS attack - need help!

2015-12-03 Thread Roland Dobbins
ontact me 1:1 and I'll work to hook you up with the right folks. --- Roland Dobbins

Re: Ransom DDoS attack - need help!

2015-12-03 Thread Roland Dobbins
On 3 Dec 2015, at 22:26, Nick Hilliard wrote: > If you believe that someone who issues a ransom threat will stop if you pay > them off, you're smoking crack. +1 These attacks aren't rocket-science to defend against. OP, ping me 1:1. ------- Roland Dobbins

Re: Ransom DDoS attack - need help!

2015-12-03 Thread Roland Dobbins
On 3 Dec 2015, at 22:04, Josh Reynolds wrote: > None of those names you just mentioned have made the international news. Of course they have. --- Roland Dobbins

Re: Ransom DDoS attack - need help!

2015-12-03 Thread Roland Dobbins
On 4 Dec 2015, at 2:38, Dovid Bender wrote: > The last I spoke with NTT they said the largest they ever saw was > 300GB That wasn't DD4BC or Armada Collective. ------- Roland Dobbins

Re: Ransom DDoS attack - need help!

2015-12-03 Thread Roland Dobbins
pe. Start with the BCPs, then move to the macroanalytical. Only dip into the microanalytical when required, and even then, do so very selectively. ------- Roland Dobbins

Re: Staring Down the Armada Collective

2015-12-03 Thread Roland Dobbins
DDoS attacks, FYI. --- Roland Dobbins

Re: Questions regarding equipment for a large LAN event

2015-12-06 Thread Roland Dobbins
On 7 Dec 2015, at 13:41, Laurent Dumont wrote: > I appreciate any input on the matter! 1. cisco-nsp is a better list for this type of question. 2. The ASR9K is an edge router, not an access switch. 3. Why not just ask Cisco, for starters? --- Rol

Re: Ransom DDoS attack - need help!

2015-12-08 Thread Roland Dobbins
tuationally-specific. ------- Roland Dobbins

Re: Ransom DDoS attack - need help!

2015-12-09 Thread Roland Dobbins
lt;https://app.box.com/s/776tkb82634ewvzvp26nnout6v4ij39q> <https://app.box.com/s/r7an1moswtc7ce58f8gg> ----------- Roland Dobbins

Re: Ransom DDoS attack - need help!

2015-12-09 Thread Roland Dobbins
some preemptive ACLs so that you aren't forced into completing the DDoS. --- Roland Dobbins

Re: John McAfee: Massive DDoS attack on the internet was from smartphone botnet on popular app

2015-12-12 Thread Roland Dobbins
On 13 Dec 2015, at 0:23, Jim Shankland wrote: Am I missing something, or is an even distribution of originating IP addresses virtually impossible *without* using spoofing? If his remarks were reported correctly, they are incorrect. --- Roland Dobbins

Re: Netflix stuffing data on pipe

2015-12-30 Thread Roland Dobbins
x, or . . . ? --- Roland Dobbins

Re: Netflix NOC? VPN Mismarked?

2016-01-28 Thread Roland Dobbins
On 29 Jan 2016, at 0:05, Crane, Todd wrote: > Imagine the issues if EoL'ed and EoS'ed those iPads. Um, I think they are . . . ------- Roland Dobbins

Re: UDP Amplification DDoS - Help!

2016-02-08 Thread Roland Dobbins
he DNS changes. ------- Roland Dobbins

Re: UDP Amplification DDoS - Help!

2016-02-08 Thread Roland Dobbins
, apart from the immediate upstream. ------- Roland Dobbins

Re: Thank you, Comcast.

2016-02-25 Thread Roland Dobbins
ly emanate from broadband access networks due to abusable CPE. Others, as well, of course, but those are generally the most prevalent. ------- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
ckets *destined* for UDP/53 on broadband access networks, not *sourced from*. --- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
esponsible. ------- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
fiers (which is often the case). And even that small tenth of a percent who're deliberately running their own DNS servers can end up inadvertently causing disruption if they're running those DNS servers as open recursors. ----------- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
s://app.box.com/s/r7an1moswtc7ce58f8gg> ------- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
running out-of-date software that is abusable in multiple ways. --- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
ew up. Also, see this article: <http://arstechnica.com/security/2016/02/asus-lawsuit-puts-entire-industry-on-notice-over-shoddy-router-security/> and this .pdf preso: <https://app.box.com/s/rblnddlhda44giwfa8hy> ----------- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
nnection. Caveat emptor. ----------- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
what's being discussed in this thread. It's a different story for transit operators. ------- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
On 27 Feb 2016, at 4:03, John Levine wrote: A certain number of us work from home and connect to headquarters with a VPN. and have SIP phones, you know. Not typically via/requiring the protocols you mentioned. --- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
On 27 Feb 2016, at 7:23, John Levine wrote: The VoIP phones sure use SIP. True, but how prevalent are 'bare' SIP phones vs. VoIP systems utilized by remote workers via VPNs? ------- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
On 27 Feb 2016, at 7:59, John Levine wrote: I think that most if not all of the consumer over the top VoIP phones like Vonage use SIP. That's true. One would hope that they're not globally reachable, however. ------- Roland Dobbins

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
On 27 Feb 2016, at 8:06, Keith Medcalf wrote: Consumer Narrowband Access Networks use these protocols all the time. Most broadband access customers do not actively use these protocols, themselves, with the partial exception of SIP. --- Roland Dobbins

Re: sFlow vs netFlow/IPFIX

2016-02-28 Thread Roland Dobbins
27;t support 1:1. ------- Roland Dobbins

Re: sFlow vs netFlow/IPFIX

2016-02-28 Thread Roland Dobbins
acket, anyways. --- Roland Dobbins

Re: sFlow vs netFlow/IPFIX

2016-02-28 Thread Roland Dobbins
incorrect, and reflects an inaccurate understanding of how NetFlow/IPFIX actually works, in practice. It's often repeated by those with little or no operational experience with NetFlow/IPFIX. --- Roland Dobbins

Re: sFlow vs netFlow/IPFIX

2016-02-29 Thread Roland Dobbins
pes of DDoS attacks utilizing NetFlow implementations (with the exceptions of crippled implementations like the aforementioned EARL6/EARL7 and pre-Sup7 Cisco 4500) are simply untrue. ----------- Roland Dobbins

Re: sFlow vs netFlow/IPFIX

2016-02-29 Thread Roland Dobbins
ation about traffic via FNF or IPFIX EE mechanisms isn't desirable. But you are simply wrong about the utility of NetFlow and/or IPFIX with classical flow templates. I really like to hear feedback about my vision. See above. --- Roland Dobbins

Re: sFlow vs netFlow/IPFIX

2016-02-29 Thread Roland Dobbins
grow wearisome. I will not reply any further to this thread, so as to avoid further spamming the list. --- Roland Dobbins

Re: Why the US Government has so many data centers

2016-03-11 Thread Roland Dobbins
rvers just lying around in random rooms, and that those rooms are de facto government data centers, whether those who're responsible for said rooms/servers know it or not . . . ------- Roland Dobbins

Re: Why the US Government has so many data centers

2016-03-12 Thread Roland Dobbins
On 13 Mar 2016, at 3:03, George Herbert wrote: > It's a symptom of trying to save a few cents at the risk of dollars. Concur 100%. Not to mention the related security issues. --- Roland Dobbins

Re: Purpose of spoofed packets ???

2015-03-10 Thread Roland Dobbins
regate at the target will be relatively high. Another very real possibility is that the person or thing which sent you the abuse email doesn't know what he's/it's talking about. ;> ------- Roland Dobbins

Re: Getting hit hard by CHINANET

2015-03-17 Thread Roland Dobbins
tworks. --- Roland Dobbins

Re: Getting hit hard by CHINANET

2015-03-17 Thread Roland Dobbins
On 18 Mar 2015, at 9:13, Roland Dobbins wrote: Also, asking your upstreams/peers to block traffic sourced from this IP to your netblock(s) on their networks. It would also be a good idea to ensure that your systems which are being targeted aren't themselves compromised, and being us

Re: Getting hit hard by CHINANET

2015-03-17 Thread Roland Dobbins
same, if necessary. Even if that's not the case, that's how DDoS attacks are routinely and cooperatively mitigated between providers, when it's possible to block based on source, number of sources isn't overwhelming, etc. ----------- Roland Dobbins

Re: Getting hit hard by CHINANET

2015-03-18 Thread Roland Dobbins
S provider against hosts belonging to another customer of the same provider, for example; we've even seen the same server compromised by two different groups of miscreants attacked by both groups of miscreants, in this context. --- Roland Dobbins

Re: Getting hit hard by CHINANET

2015-03-18 Thread Roland Dobbins
n one form or another to end-customers who request same. ------- Roland Dobbins

Re: Getting hit hard by CHINANET

2015-03-18 Thread Roland Dobbins
via S/RTBH and/or flowspec). --- Roland Dobbins

Re: Getting hit hard by CHINANET

2015-03-18 Thread Roland Dobbins
On 18 Mar 2015, at 17:00, Roland Dobbins wrote: This is not an optimal approach, and most providers are unlikely to engage in such behavior due to its potential negative impact (I'm assuming you mean via S/RTBH and/or flowspec). Here's one counterexample: <https://ri

Re: Broken SSL cert caused by router?

2015-03-26 Thread Roland Dobbins
abled? Or some kind of content filtering capability which amounts to the same thing? --- Roland Dobbins

Re: IP DSCP across the Internet

2015-05-05 Thread Roland Dobbins
On 5 May 2015, at 17:27, Ramy Hashish wrote: Assume two ASs connected through two tier 1 networks, will the tier one networks trust any DSCP markings done from an AS to the other? The BCP is to re-color on ingress. --- Roland Dobbins

Re: IP DSCP across the Internet

2015-05-06 Thread Roland Dobbins
On 6 May 2015, at 8:22, Joel Mulkey wrote: > But don't trust that's going to be the rule. Yes, that's always the caveat. Just do what you can within your own span of administrative control. ----------- Roland Dobbins

Re: Question about co-lo in APAC region

2015-05-06 Thread Roland Dobbins
. --- Roland Dobbins

Re: Thousands of hosts on a gigabit LAN, maybe not

2015-05-08 Thread Roland Dobbins
e.facebook.com/posts/360346274145943/introducing-data-center-fabric-the-next-generation-facebook-data-center-network/> ----------- Roland Dobbins

Re: [SECURITY] Application layer attacks/DDoS attacks

2015-05-23 Thread Roland Dobbins
t; <https://app.box.com/s/4h2l6f4m8is6jnwk28cg> ------- Roland Dobbins

Re: [SECURITY] Application layer attacks/DDoS attacks

2015-05-23 Thread Roland Dobbins
On 24 May 2015, at 3:14, Scott Weeks wrote: Those that care (NANOG type folks) already have deployed it and those that don't care have not and will not. Concur 100%. <https://app.box.com/s/r7an1moswtc7ce58f8gg> ------- Roland Dobbins

Re: [SECURITY] Application layer attacks/DDoS attacks

2015-05-25 Thread Roland Dobbins
TNI_Info_Sheet_01-04-2015.pdf> ------- Roland Dobbins

Re: [SECURITY] Application layer attacks/DDoS attacks

2015-05-25 Thread Roland Dobbins
of my customer . . . ]. It's customers all the way down. <http://en.wikipedia.org/wiki/Turtles_all_the_way_down#History> ;> ----------- Roland Dobbins

Re: [SECURITY] Application layer attacks/DDoS attacks

2015-05-25 Thread Roland Dobbins
On 25 May 2015, at 20:31, Steve via NANOG wrote: Application layer DDoS attacks , in most (all?) cases require a valid TCP/IP connection DNS query-floods are a notable exception. --- Roland Dobbins

Re: [SECURITY] Application layer attacks/DDoS attacks

2015-05-25 Thread Roland Dobbins
attacks, but isn't intended to handle non-spoofed query-floods (hence S/RTBH, flowspec, IDMS, et. al.) like the particular ANY query-flood directed at your auths. --- Roland Dobbins

Re: Routing Insecurity (Re: BGP in the Washington Post)

2015-06-01 Thread Roland Dobbins
es offer a market-based solution. I know Bill Woodcock has some experience in this general arena. ------- Roland Dobbins

<    1   2   3   4   5   >