Out of Date Bogon Prefix

This is an heads-up from the Mediacom Network Operations Center about an
issue we are seeing. We

were recently given an IP scope from ARIN (American Registry for Internet
Numbers) that still

exists on older Bogon lists many web providers are currently using.

A Bogon prefix is a route that should never appear in the Internet routing
table. A packet routed

over the public Internet (not including over VPN or other tunnels) should
never have a source

address in a Bogon range. These are commonly found as the source addresses
of DDoS attacks.

The IP scope referenced is a 173.x.x.x. This IP scope was on the Bogon list
and was blocked by all

websites using a Bogon prefix up until February of 2008, when it was
released by IANA (Internet

Assigned Numbers Authority) for public use and an updated Bogon prefix was
provided. Mediacom

customers that are within this IP range are not able to reach a website
hosted by many organizations.

Mediacom is individually requesting that these providers update their Bogon
prefix to the most current version

to resolve this issue immediately. We are requesting assistance from this
community to make this issue known
and to advise administrators to update to the most current Bogon list.

We have provided some reference material that many may find helpful in
resolving this issue.
Bogons are defined as Martians (private and reserved addresses defined by
<http://www.ietf.org/rfc/rfc1918.txt> RFC 1918 <
<http://www.faqs.org/rfcs/rfc1918.html>
http://www.faqs.org/rfcs/rfc1918.html> and
<http://www.ietf.org/rfc/rfc3330.txt> RFC 3330 <
<http://www.faqs.org/rfcs/rfc3330.html>
http://www.faqs.org/rfcs/rfc3330.html>) and netblocks that have not been
allocated to a regional internet registry (RIR) by the Internet Assigned
Numbers Authority < <http://www.iana.org/> http://www.iana.org/>. IANA
maintains a convenient IPv4 summary page <
<http://www.iana.org/assignments/ipv4-address-space>
http://www.iana.org/assignments/ipv4-address-space> listing allocated and
reserved netblocks.

Please help to spread the word.

Nick Downey
Director
Network Operations Center
Mediacom Communications
Main (800)308-6715
Secondary (515)267-1167
ndowney@mediacomcc.com

Nick Downey wrote:

This is an heads-up from the Mediacom Network Operations Center about an
issue we are seeing. We

were recently given an IP scope from ARIN (American Registry for Internet
Numbers) that still

[..]

Please fix your mailer as it seems to be broken with respect to line-breaks and that makes reading very annoying.

The IP scope referenced is a 173.x.x.x. This IP scope was on the Bogon list
and was blocked by all

If you really want the block you have to be debogonized it would be handy if you:
  - provide the full prefix, including prefix length, and not just x.x.x
  - reference to the whois entry
  - the ASN you are announcing this from
  - an IP address in that prefix that replies to at least ICMP echo
    requests with an ICMP echo response so that people can check for
    you if they can reach it.

The people who care about these things would love to help you, but without proper information (173.0.0.0/8 is pretty big you know), that is very impossible, and why would they spend time on resolving your problem if you don't take the nice steps to provide proper information?

Please also do some work on your side, and read up on: http://www.ris.ripe.net/debogon/

Greets,
  Jeroen

PS: Most people here know what ARIN is and they also know what bogon routes are, repeating those terms is not very clueful :wink:

Will do. Thanks for the input. First time posting to this board.

When I get everything together, should I just resend the entire email or
just the information being requested?

Nick Downey

Out of curiosity - what percentage of connectivity providers are both clued
enough to be represented on NANOG and yet unclued enough to not understand
the need to keep bogon filters up to date (even if you just get a BGP feed
from Team Cymru)?

(By the way, Nick - if what you sent NANOG was a form letter template, I'd
lose a lot of the RFC references and point at Team Cymru's stuff instead)...

Thanks for the input.

Currently, we are receiving 173.16.x.x /19 and /18, with plans to get
additional IPs within the same range.

ASN 6478 or 7018 - Through AT&T

You can test access to this network by ping this gateway: 173.16.28.1

Whois information:

173.16.28.1
Record Type: IP Address

OrgName: Mediacom Communications Corp
OrgID: MCC-244
Address: 100 Crystal Run Rd.
City: Middletown
StateProv: NY
PostalCode: 10941
Country: US

ReferralServer: rwhois://rwhois.mediacomcc.com:4321

NetRange: 173.16.0.0 - 173.17.31.255
CIDR: 173.16.0.0/16, 173.17.0.0/19
NetName: MEDIACOM-RESIDENTIAL-CUST
NetHandle: NET-173-16-0-0-1
Parent: NET-173-0-0-0-0
NetType: Direct Allocation
NameServer: NS1.MCHSI.COM
NameServer: NS2.MCHSI.COM
Comment:
RegDate: 2008-05-19
Updated: 2008-07-29

OrgTechHandle: JSE90-ARIN
OrgTechName: Selvage, Joe
OrgTechPhone: +1-845-695-2706
OrgTechEmail: jselvage@mediacomcc.com

Ya sure, like any of us would admit to 50% clue-ness.

With all the posts here about bogons I would really be surprised that any nanog readers didn't know about keeping bogons updated.

Nick:

Out of curiosity and considering your position in the NOC, does anyone else
on your staff read this list regularly?

Frank

I'd be shocked it there were no people who read NANOG and misunderstood or blatantly ignored some of it.

Unfortunately, that means they would ignore / misunderstand the OP's request. But there is probably a small percentage clueless enough to have stale bogon filters, but just clueful enough to realize what the OP said might apply to them. A very small percentage....

Switching topics only slightly: Nick, do you have any data on what parts of the 'Net you can and cannot reach? Perhaps take a dump of route-views and ping some IPs in each ASN? Shouldn't be hard to script, and might yield useful data - both to you and the rest of us.

http://www.apricot.net/apricot2007/presentation/conference/plenary3-randy-bogon.pdf
is probably of interest to you.

Not sure if it's been published elsewhere, or if the work has been scripted and run recently.

Perhaps a monthly update would be useful?

Switching topics only slightly: Nick, do you have any data on what parts
of the 'Net you can and cannot reach? Perhaps take a dump of
route-views and ping some IPs in each ASN? Shouldn't be hard to script,
and might yield useful data - both to you and the rest of us.

tee hee. been there. done that. and for 173.0.0.0/20. paper
submitted a month ago, but you saw a preso of the technique a year ago,
see <http://rip.psg.com/~randy/070604.nanog-bogons.pdf&gt;\.

arin has the code from us so they could put it into production if they
so chose.

randy

Perhaps a monthly update would be useful?

we are running it approximately monthly from servers on three continents
to see how things change over time and how locations differ.

oh, and we do comparative traceroutes do diagnose *where* the filter is.
just pinging out there, as patrick suggested, does not tell you where
the blockage actually is.

sad to say, folk do not seem to remove filters. but when we wrote to
them, they did.

credit to olaf maennel, now of t-labs, tu berlin, etc., for most of the
hard work on this.

randy

"Bogon" filters made a lot of sense when most of the Internet was
bogons. Back when 5% of the IP space was allocated blocking the
other 95% was an extremely useful endevour. However, by the same
logic as we get to 80-90% used, blocking the 20-10% unused is
reaching diminishing returns; and at the same time the rate in which
new blocks are allocated continues to increase causing more and
more frequent updates.

Have bogon filters outlived their use? Is it time to recommend people
go to a simpler bogon filter (e.g. no 1918, Class D, Class E) that
doesn't need to be updated as frequently?

Yes. 1918 (10/8, 172.16/12, 192.168/16), D, E, reflective (outgoing
mirroring), and as always individual discretion.

--Patrick Darden

Was looking over 1918 again, and for the record I have only run into one
network that follows:

   "If two (or more) organizations follow the address allocation
   specified in this document and then later wish to establish IP
   connectivity with each other, then there is a risk that address
   uniqueness would be violated. To minimize the risk it is strongly
   recommended that an organization using private IP addresses choose
   *randomly* from the reserved pool of private addresses, when
allocating
   sub-blocks for its internal allocation."

I added the asterisks.

Most private networks start at the bottom and work up: 192.168.0.X++,
10.0.0.X++, etc. This makes
any internetworking (ptp, vpn, etc.) ridiculously difficult. I've seen
a lot of hack jobs
using NAT to get around this. Ugly.

--Patrick Darden

Where I work we are more aimed towards the SMB market, and we do run into that issue a lot. Of course a lot of the problem we run into is that the "engineers" who set up these SMB clients, even getting into some of the larger businesses just use what they always do. I can think of one specific engineer who everything he does is 192.168.1.0/24 .254 gateway .1 server which has cause issues. We have one particular client who has nearly 40 VPN's between partners and they have actually had to do a lot of natting at the vpn endpoint as they have 3 clients they connect to that are 10.0.1.0/24 and several that are 192.168.0.0/24 however a lot of the newer VPN firewalls that we work with actually do a pretty slick job. SonicWall NSA series devices have a "NAT VPN range" checkbox when you build the VPN and you just give it the range to use, as do the Fortinet devices.

This makes sense especially for static filters. Automated feeds, such as the bogon route-server or DNS zones, leaves folks with options.

Darden, Patrick S. wrote:

Most private networks start at the bottom and work up: 192.168.0.X++,
10.0.0.X++, etc. This makes
any internetworking (ptp, vpn, etc.) ridiculously difficult. I've seen
a lot of hack jobs
using NAT to get around this. Ugly.

Well, you can always do what one of the companies I work with does: allocate from 42.0.0.0/8 for networks that might need to interoperate with 1918 space and hope that it is "forever" before we run so low on IPv4 space that 42.0.0.0/8 needs to be taken out of reserved status.

How many more weeks is "forever" now?

Matthew Kaufman
matthew@eeph.com

Matthew Kaufman wrote:

do what one of the companies I work with does: allocate from
42.0.0.0/8

some italian isps use blocked american military /8s. i find that highly
amusing, especially when i think of the long-term implication for the
folk who blocked access to that they wanted to 'own'.

randy

Honestly, I don't believe the 80/20 rules applies here.

Until all transit networks are willing to strictly filter their downstreams (and themselves!), if there is any unused space (note I said "unused", not "unallocated"), the miscreants will use it. They are not going around saying "oh, damn, there are only a few /8s left, we better stop!".

Filter your bogons. But do it in an automated fashion, from a trusted source.

Of course, I recommend Team Cymru, which has a most sterling record. Nearly perfect (other than the fact they still recommend MD5 on BGP sessions :).

Until all transit networks are willing to strictly filter their
downstreams (and themselves!), if there is any unused space (note I said
"unused", not "unallocated"), the miscreants will use it.

serious curiosity:

what is the proportion of bad stuff coming from unallocated space vs
allocated space? real measurements, please. and are there longitudinal
data on this?

are the uw folk, gatech, vern, ... measuring?

randy