96.2.0.0/16 Bogons

I am a network engineer for Midcontinent Communications We are an ISP in the American Midwest. Recently, we were allocated a new network assignment: 96.2.0.0/16. We’ve been having major issues with sites still blocking this network. I normally wouldn’t blanket post to the group, but I’m looking to hit as many direct network engineers/operators as possible. Would it be possible to have people do a quick check on their inbound filters?

Thanks!

Eric Ortega
Midcontinent Communications
Network Engineer
605.357.5720
eric.ortega@midco.net

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Eric Ortega wrote:

I am a network engineer for Midcontinent Communications We are an ISP in
the American Midwest. Recently, we were allocated a new network
assignment: 96.2.0.0/16. We've been having major issues with sites still
blocking this network. I normally wouldn't blanket post to the group,
but I'm looking to hit as many direct network engineers/operators as
possible. Would it be possible to have people do a quick check on their
inbound filters?

Pingable IP address in that network please :slight_smile:

- --
COO
Entanet International
T: 0870 770 9580
http://www.enta.net/

After I sent that mail I realized that I didn't give enough information.
96.2.0.1 is pingable from the net.

Thank you all for your quick response!

We found out last Thursday we were blocking that range (our customer base is
across the state line from this Midcon). Our upstream internet provider,
who manages the BGP side of things, had had their automated Bogon update
process stalled since last fall. =)

Frank

I am a network engineer for Midcontinent Communications We are an ISP in
the American Midwest. Recently, we were allocated a new network
assignment: 96.2.0.0/16. We've been having major issues with sites still
blocking this network. I normally wouldn't blanket post to the group, but
I'm looking to hit as many direct network engineers/operators as possible.
Would it be possible to have people do a quick check on their inbound
filters?

you may find the presentation i will be giving on thursday (bali time)
at apricot/apnic relevant, even though it is not being given in the
USA.

randy

We found out last Thursday we were blocking that range (our customer base is
across the state line from this Midcon). Our upstream internet provider,
who manages the BGP side of things, had had their automated Bogon update
process stalled since last fall. =)

frank, could your links be in

   http://psg.com/filter-candidates.txt

would love to know if anyone knows that indeed they were caught in
that list. fyi, the ASns listed are. would very much appreciate
  o if you see your asn listed
  o go to http://psg.com/filter-candidates.txt
  o get the links associated with your as
  o and tell us if indeed that link was filtering 96/8 97/8 or 98/8
    about 22/23 jan 2007

thanks!

randy

174
209
286
293
701
702
703
721
1239
1267
1273
1299
1668
2152
2497
2500
2828
2854
2914
3257
3292
3320
3343
3356
3491
3549
3561
4323
4637
4755
4761
4766
5400
5539
5568
6429
6453
6461
6467
6471
6517
6619
6730
7018
7473
7474
7575
8468
8928
9942
10026
11908
11955
12180
12695
12956
13237
15412
15830
17557
19029
19094
19151
19158
19752
21318
21413
21414
21922
22291
22773
23342
23504
25462
25973
29226
29278
29668
32869

-30-

Randy:

Sorry, our upstream provider's ASN is not listed in that
filter-candidates.txt document.

Kind regards,

Frank

i know its all the rage to post/shame the offending parties (those whois filtering
policies don't reflect our own) - BUT - how hard would it be for you perl jocks
to publish the ASNs of the "good guys"

--bill

i know its all the rage to post/shame the offending parties (those
whois filtering policies don't reflect our own)

bull

we are trying to validate experimental results. sorry if that
offends you or you do your research result validation differently.

randy

none taken... although "name/shame" as a technique for
  validating experimetnal results is a tried & ture method,
  an equally valid technique is to look in the other direction
  and praise/name those whose practices match your expected
  results. ... i'd prefer to see the full curve, not just the
  sigma-six folks on the left side.

--bill

bmanning@karoshi.com wrote:

your interpersonal skills are improving.
  will be interesting in the reported progress of your experiments.
  
--bill (gmt+10)

your interpersonal skills are improving.

well, at least i am actually doing research instead of doing nothing but
blindly whining abour anything by others that moves.

e.g. you may want to contemplate the silliness of your suggestion that
we list all the asns' links that were not troubled. the list of
suspected troubled links is a few kb. the list of good links would be
gigabytes and no one would look at it.

many thanks to those isps who have helped us with the validation so far.
the results have been quite cheering.

fwiw, the preso we gave a few hours ago on this research project is at

   http://rip.psg.com/~randy/070228.apnic-bogons.pdf

randy

I'd like to thank the group for the responses and help with this issue. I
find it ironic that Randy's study actually uses 96 space.

Thanks again!

Eric

The amazing/sad thing is that people have been facing and fixing the same problem for more than 4 years. How many times does a network have to fix their static bogon filters before coming to the realization that those filters are a bad idea?

For my "solution" to the problem, see http://69box.atlantic.net/
It's also http://not69box.atlantic.net/ for the 69/8 challenged.

So, where are static bogon filters appropriate? (loaded question perhaps)
I ask because just about every 'security expert' and 'security whitepaper'
or 'security suggestions' has some portion that speaks to "why it's a
grand idea to have acl-lines/firewall-policy tp block 'bogon' ip space"
(for some definition of 'bogon' of course).

-Chris

#define static

Obviously, one's bogon filters (both for iACLs and for prefix-lists or whatever other mechanism one uses to filter the route announcements one accepts) must be dynamic enough in nature to accommodate updates when new blocks are cracked open. 'Static' shouldn't be read as 'eternal', although that's often what ends up happening.

;>

I suppose they're appropriate when done by network security consultants, as it guarantees future / repeat business. :slight_smile:

Jon Lewis wrote:

So, where are static bogon filters appropriate? (loaded question perhaps)
I ask because just about every 'security expert' and 'security whitepaper'
or 'security suggestions' has some portion that speaks to "why it's a
grand idea to have acl-lines/firewall-policy tp block 'bogon' ip space"
(for some definition of 'bogon' of course).

I suppose they're appropriate when done by network security consultants, as it guarantees future / repeat business. :slight_smile:

I'll second this opinion, As most of DDoS attacks are from zombies, which are in registered networks.
Especially I did never see any traffic from so called bogons. Perhaps, bogon acls are helpful when they are configured on backbone, but not everywhere.

just my 1E-10 cents :slight_smile:

Perhaps,
bogon acls are helpful when they are configured on backbone, but not

everywhere.

And if ever major backbones (read tier 2/3) would do so all us little
guys wouldn't have to (yet for some reason I keep getting the odd hit
in my acl logs from bogon space daily).

Yes I know they will defend this with "we sell unfiltered service"
(which of course isn't true); I am just not convinced filtering bogon's
would invalidate this any more than their MPLS QoS clouds do.