NANOG28 Agenda
All times are in Mountain Standard Time
Click the Real Video icon to watch a presentation below. Download Real Player.
NANOG 28 Agenda
Sunday, June 1 2003
Time/Webcast: | Room: | Topic/Abstract: | Presenter/Sponsor: | Presentation Files: |
1:30pm - 3:00pm | Granary | Tutorial: BGP Multihoming TechniquesThis tutorial introduces service providers to some of the features available in BGP to aid multihoming to the Internet. After an explanation of multihoming and the principles being followed in this tutorial, several examples involving different scenarios will be given. This includes the options available when multihoming to the same ISP (including RFC2270) and to different upstreams. Configurations for modifying inbound and outbound traffic flows are covered. The tutorial concludes with a case study, and an examination of the use of BGP communities by several ISPs. The configuration examples throughout this tutorial use the Cisco IOS configuration syntax. View full abstract page. | Speakers:
- Philip Smith, Cisco Systems
Philip Smith joined Cisco Systems in January 1998. He is a member of the Service Provider Architectures Group of Consulting Engineering, within Corporate Development. His role includes working with many ISPs in the Asia-Pacific region and the rest of the world, specifically in network strategies, design, technology, and operations, as well as helping with network configuration and scaling. Other areas of interest also include Internet routing, Internet protocols, IPv6, and encouraging the growth of the Internet around the world.
Prior to joining Cisco, he spent 5 years at PIPEX (now part of UUNET\'s global ISP business), the UK\'s first commercial Internet Service Provider. He was one of the first engineers working in the UK Internet, and played a fundamental role in building the modern Internet in the UK and Europe.
Philip is co-author of Cisco ISP Essentials, ISBN 1-58705-041-2, published by Cisco Press. He holds a Doctor of Philosophy and has a First Class Honours Degree in Physics. He lives in Brisbane, Australia.
| BGP Multihoming Techniques
Philip Smith Presentation(PDF)
|
1:30pm - 3:00pm | Harvest | Tutorial: Deploying Interdomain IP MulticastThis session covers the protocols and topologies associated with inter-domain multicast routing, including details on the operation of MSDP and MBGP as they relate to PIM. The session also introduces the latest trends in inter-domain multicast routing, PIM Source Specific Multicast (SSM), Multicast VPNs, and IPv6 Multicast.
During the tutorial, the basic fundamentals of MBGP and MSDP are covered along with their basic configuration, as well as the use of Anycast RP\'s. Numerous topology examples with regard to inter-domain multicast using MBGP and MSDP are presented, along with configuration examples for both the provider and customers. Next, the session introduces Source Specific Multicast and shows how this method of inter-domain multicast solves some of the problems associated with traditional inter-domain PIM-SM multicast. Methods to secure a multicast network will also be presented. View full abstract page. | Speakers:
- Mike McBride, Cisco Systems
Mike is a SW Engineer in the Multicast Development group at Cisco Systems. His focus is the deployment of Multicast in the Service Provider space.
| Deploying Interdomain IP Multicast
Mike McBride Presentation(PPT)
|
3:00pm - 3:30pm | Market Lobby | Break | | |
3:30pm - 5:00pm | Granary | Tutorial: BGP Multihoming Techniques (Part 2) | Speakers:
- Philip Smith, Cisco Systems.
| |
3:30pm - 5:00pm | Harvest | Tutorial: Introduction to MPLSThis tutorial introduces network engineers and service providers to basic and intermediate features and techniques available for building an MPLS network. We will discuss basic topics of how MPLS operates in a service provider network, including terminology, the setup of label-switched paths (LSPs), and LSP maintenance. Both dynamic MPLS signaling options in widespread use today, RSVP and LDP, will be discussed. Throughout the tutorial, Juniper Networks and Cisco Systems routers are used to illustrate important MPLS concepts. Additionally, configuration and troubleshooting examples are provided using CLI commands from both vendors. View full abstract page. | Speakers:
- Joe Soricelli, Juniper
Joseph M. Soricelli is an Education Services Engineer at Juniper. He is a Juniper Networks Certified Internet Engineer, a Juniper Authorized Instructor, and a Cisco Certified Internet Expert. Joeseph is a contributing author to <I>Juniper Networks Routers: The Complete Reference</I> and <I>Juniper Networks Certified Internet Associate Study Guide</I>. In addition to writing numerous training courses, he has worked with and trained carriers, telcos, and ISPs throughout his career in the networking industry.
| Introduction to MPLS
Joe Soricelli Presentation(PDF)
|
Monday, June 2 2003
Time/Webcast: | Room: | Topic/Abstract: | Presenter/Sponsor: | Presentation Files: |
8:00am - 9:00am | Seasons Lobby | Continental Breakfast | | |
9:00am - 9:15am | Seasons Ballroom | Welcome, Introductions | Speakers:
- Susan Harris, Merit Network.
- Pete Kruckenberg, UEN
Pete Kruckenberg is the senior network engineer for Utah Education Network, a regional education and research network in Utah and southern Idaho. Prior to joining UEN, Pete co-founded a regional ISP in Utah and worked for a start-up managed services provider in Lindon, Utah. He co-founded the Utah Regional Exchange Point and serves in various roles with regional networking initiatives. Pete graduated in Computer Engineering from the University of Utah. - Val Oveson, State of Utah
Val Oveson is the CIO for the State of Utah. His prior experience includes working with KPMG as a consultant to government organzations, and as CIO of PricewaterhouseCoopers. He has served in various capacities in state and federal government organizations, acting as National Taxpayer Advocate for the IRS, Chair of the Utah State Tax Commissions, and, for two terms, as Lieutenant Governor of Utah. Mr. Oveson graduated from Brigham Young University with an accounting degree.
| Welcome, Introductions
|
9:15am - 10:15am | Seasons Ballroom | Interception Technology: The Good, The Bad, and The Ugly!There is a conflict between the interests of privacy and the ability of law enforcement to intercept the communications of criminal targets. Yet interception technology is not without its own risks -- it is intended to be used only by authorized parties for lawful interception, but may also be abused by unauthorized individuals.
This talk will focus on the technical risks of interception technology and discuss the wisdom of standardizing protocols and technologies to facilitate interception. This is a tricky topic, because one must balance the benefits and risks of privacy versus interception for lawful purposes. We will attempt to stay within the technical realm as opposed to the politics of interception. View full abstract page. | Speakers:
- Jeff Schiller, MIT
Jeff Schiller received his S.B. in Electrical Engineering from MIT in 1979. As MIT Network Manager, he has overseen the MIT Campus Computer Network since its inception in 1984. Prior to his work in the Network Group, he maintained MIT\'s Multics timesharing system during the ARPANet TCP/IP conversion. Jeff is an author of MIT\'s Kerberos Authentication system. From 1994 through 2003, he was the Internet Engineering Steering Group\'s Area Director for Security, responsible for overseeing security-related Working Groups of the IETF. He was responsible for releasing a U.S. legal freeware version of the popular PGP encryption program.
Jeff is also responsible for the development and deployment of an X.509-based Public Key Infrastructure at MIT. He is the technical lead for the new Higher Education Certifying Authority being operated by the Corporation for Research and Educational Networking, and a founding member of the Steering Group of NEARnet, now part of Level3.
| Interception Technology: The Good, The Bad, and The Ugly! PART 1
Interception Technology: The Good, The Bad, and The Ugly! PART 2
Interception Technology: The Good, The Bad, and The Ugly! PART 3
Jeff Schiller Presentation(PDF)
|
10:15am - 10:45am | | Break | | |
10:45am - 11:00am | Seasons Ballroom | The National Infrastructure Assurance Council (NIAC) Vulnerability Disclosure Framework and What It Might Mean to the ISP CommunityThe National Information Advisory Council (NIAC) was formed by executive order in September 2002 and is charged with advising the US Department of Homeland Security and the President regarding the security of information systems and networks essential to the nation\'s critical infrastructure. A key task in front of the NIAC is to provide guidance on disclosing vulnerabilities, and a working group has been created to establish a framework for vulnerability disclosure to include specific recommendations to the President.
As part of its outreach and information-gathering efforts, the working group is presenting a brief overview of the project during the Monday morning General Session. Interested attendees are invited to contribute further via a dialog during the ISP Security BOF at 7:30 Monday evening. View full abstract page. | Speakers:
- Jim Duncan, Cisco Systems
Jim Duncan works in the Critical Infrastructure Assurance Group at Cisco Systems, where he is a topic expert on incident response, vulnerability handling, and cyberthreat assessment. Previously, Jim was an Incident Manager for the Cisco Systems Product Security Incident Response Team (PSIRT) for four years, where he handled customer security and product security vulnerabilities. In addition to his work with the NIAC Vulnerability Disclosure WG, Jim currently works on proactive issues supporting other incident response teams within Cisco. He is authoring an internal policy for information sharing, and he actively contributes to external projects for several Information Sharing and Analysis Centers (ISACs). In the background is a project to adapt \"Inter-NOC Dial By ASN\" technology for inter-ISAC communications.
Jim contributed to RFC 1244, the Site Security Policy Handbook, co-authored a tutorial on building an incident response team for USENIX, and is a Liaison Member of the Forum of Incident Response and Security Teams. Prior to Cisco, Jim worked for Penn State University. He attended his first NANOG meeting at NANOG8, October 1996, in Ann Arbor. - Paul Vixie, ISC.
| Jim Duncan Presentation(PDF)
The National Infrastructure Assurance Council (NIAC)
|
11:00am - 11:20am | Seasons Ballroom | IPv4/IPv6 Dual-Stack on AbileneAbilene, the Internet2 backbone, has been running dual-stack on its backbone routers for over a year. In this talk, we discuss experiences with both the Cisco GSR and Juniper T640 platforms on issues ranging from IGP and BGP to monitoring and performance. View full abstract page. | Speakers:
- Grover Browning, Indiana University
Grover Browning is a senior engineer with the Global Research NOC at Indiana University. The NOC handles network operations services for Abilene, StarTap, AMPath, and a variety of other research and education networks.
| Grover Browning Presentation(PDF)
IPv4/IPv6 Dual-Stack on Abilene
|
11:20am - 12:00pm | Seasons Ballroom | Research Forum: Achieving Record Speed Trans-Atlantic End-to-end TCP ThroughputIn November 2002 and again in February 2003, an international team of scientists from Caltech, SLAC, and LANL in the U.S., CERN in Switzerland, and NIKHEF in Amsterdam broke the Internet2 TCP land speed record (i.e., the product of the bits/s times the distance) not once but twice. They achieved 923Mbits/s with an end-to-end application-to-application single TCP stream from Amsterdam to Sunnyvale (10,619 Tbit-meters/s) over a 1Gbit/s bottleneck, 8.6 Gbits/s between 10 machines in Sunnyvale and 10 machines in Baltimore over a 10 Gbits/s bottleneck, and 2.38 Gbits/s with a single TCP stream from Sunnyvale to Geneva over a 2.5 Gbits/s bottleneck. The records were broken with commercial off-the-shelf components, and demonstrate that TCP can scale from the original 56kbits/s Internet of the 1980s to tomorrow\'s multi Gbits/s rates. The talk will address the questions of: who did it; what exactly was done; how was it done (including descriptions of the testbeds, the challenges, the effects of various solutions, and gotchas); what was special about this; why it is important; and what\'s next? View full abstract page. | Speakers:
- Les Cottrell, Stanford University.
| Les Cottrell Presentation(PDF)
Research Forum: Achieving Record Speed Trans-Atlantic End-to-end TCP Throughput
|
11:20am - 12:00pm | Seasons Ballroom | Research Forum: Inter-provider Coordination for Real-Time TracebacksIn the face of security incidents, network providers need to be equipped and ready to assist in tracing traffic flows across provider boundaries to their source. The Real-time Inter-network Defense described in internet-drafts/draft-moriarty-ddos-rid-03.txt is a proposed method to facilitate communication between networks. This approach allows for a variety of methods, existing or future, to be used to trace the packets within a given network domain. Standardization of inter-provider coordination by leveraging existing relationships between operators allows proper feedback and makes it possible for status information for the request to be communicated in a flexible manner.
The results of a small-scale test of the system will be presented. Next steps would include an experiment to test the system at the ISP level, determining the integration necessary for inter-provider coordination and determining its effectiveness for tracebacks. View full abstract page. | Speakers:
- Kathleen M. Moriarty, MIT
Kathleen Moriarty is the lead Network Security Engineer at MIT Lincoln Laboratory, responsible for overseeing the protection and monitoring of the Laboratory\'s networks and computer systems. She also has experience working as a network and security engineer in both the ISP and financial sectors through previous positions and consulting work. In the financial sector, she previously held the position of Director of Information Security at FactSet Research Systems. Kathleen holds a Masters of Science degree in Computer Science from Rensselaer Polytechnic Institute and a Bachelor of Science in Mathematics and Computer Science from Siena College.
| Kathleen Moriarty Presentation(PDF)
Research Forum: Inter-provider Coordination for Real-Time Tracebacks
|
12:00pm - 1:30pm | | Lunch | | |
1:30pm - 3:00pm | Seasons Ballroom | Panel: XML Router Configs - Progress and Predictions | Moderators:
- Randy Bush, IIJ
Randy Bush works as Principal Scientist at Internet Initiative Japan. Previously he spent a bit over a year at AT&T doing research and working on network architecture. He got some operational experience from being on the founding team at Verio, a backbone provider, from which he graduated as VP of Networking after five years. Before that, he was the principal engineer of RAINet, an ISP in Oregon and Washington, which was Verio\'s first acquisition.
Randy is currently a member of the IESG, serving as co-chair of the IETF Operations and Management Area, mainly covering the operations area.
As PI for the Network Startup Resource Center, an NSF-supported pro bono effort, he has been involved for some years with the deployment and integration of appropriate networking technology in the developing world. Panelists:
- Andy Bierman, Cisco Systems.
- John Heasley, Verio.
- Phil Shafer, Juniper.
| Andy Bierman Presentation(PPT)
Panel: XML Router Configs - Progress and Predictions
Phil Shafer Presentation(PDF)
Randy Bush Presentation(PDF)
|
3:00pm - 3:30pm | | Break | | |
3:30pm - 5:00pm | Seasons Ballroon | Tutorial: ISP Security: Deploying and Using SinkholesSinkholes are a flexible security tool that add a wealth of new capabilities to an ISP\'s security toolkit. ISPs are using sinkholes to track infrastructure port scanning, identify and classify attacks, packet capture attack flows, trace attacks through their networks, and divert attack flows from the target of the attacks. Sinkholes also enable a variety of new applications brought about through necessity and growing operational experience. Sinkholes go beyond narrowly focused tools like black hole servers, Tarpits, and Honeynets. Sinkholes may be used to perform any or all of these functions, but often incorporate all of these and more.
This tutorial will explain how to build a sinkhole, using generalized examples from ISP deployments around the world. Configuration using JUNOS and IOS will be used to demonstrate the various ways trigger routers and target routers in the sinkholes are safely, scalably, and efficiently configured. Architectural considerations relating to network topology and placement of sinkholes in the ISP\'s network will be covered, along with anycast deployment options. A multitude of tools that can be placed inside the sinkhole will also be discussed. These include a variety of freeware, shareware, home-built, and commercial tools - covering the diversity available to ISPs of any size.
This tutorial is recommended to ISP engineers of all experience levels. The source materials are derived from live operational deployments, which can be modified and applied to any large IP transport network. View full abstract page. | Speakers:
- Barry Raveendren Greene, Cisco Systems.
- Danny McPherson, Arbor Networks.
| ISP Security: Deploying and Using Sinkholes
ISP Security: Deploying and Using Sinkholes(PDF)
|
3:30pm - 5:00pm | Harvest Room | Issues in IPv6 DeploymentAlthough IPv6 has been deployed in a multitude of research and development networks worldwide, commercial deployment is still limited. The need for IPv6 is widely acknowledged in Asia, where IPv4 addresses are increasingly difficult to acquire. In North America, where some 74% of the allocated IPv4 addresses are located, there is not yet the sense of urgency for IPv6 as there is in Asia. Yet even here, there is growing interest and understanding IPv6 will eventually be required. It is therefore important that network operators begin familiarizing themselves with the technical issues surrounding the deployment of realistic IPv6 networks.
This tutorial provides a technical overview of the existing state of the three classes of IPv6 transition technologies: dual stacks, tunnels, and translators. Specific technologies within each of these classes are examined. Outstanding transition issues, both resolved and unresolved, are also examined. These issues include multihoming, DNS, and security. View full abstract page. | Speakers:
- Jeff Doyle, Juniper
Jeff Doyle is the IPv6 Solutions Manager for Juniper Networks. Specializing in IP routing protocols, MPLS, and IPv6, Jeff has designed or assisted in the design of large-scale IP service provider networks throughout North America, Europe, Japan, Korea, and the People\'s Republic of China. Jeff is the author of <I>CCIE Professional Development: Routing TCP/IP, Volumes I and II</I>, is an editor and contributing author of <I>Juniper Networks Routers: The Complete Reference</I>, and is the author of a new series of books on large-scale networking, the first of which will be released in the summer of 2003. Jeff has presented numerous corporate seminars for Juniper Networks, and has also spoken at NANOG, JANOG, APRICOT, and at IPv6 Forum conferences.
| Issues in IPv6 Deployment
Jeff Doyle Presentation(PPT)
|
5:00pm - 7:00pm | Wasatch Room (2nd floor) | Beer n Gear | Sponsors Arbor Networks; Avici Systems; Caspian Networks; Cisco Systems; Juniper Networks; OPNET Technologies; Riverhead Networks; Seranoa Networks.Sponsors | |
7:30pm - 9:00pm | Granary | ISP Security BOF III | Moderators:
- Barry Raveendran Greene, Cisco Systems.
| Barry Greene Presentation(PDF)
Rob Thomas Presentation(PDF)
|
7:30pm - 9:00pm | Harvest | XML-based Network Management ToolsXML for network management has been a popular topic lately. The large toolset available for manipulating XML encoded data, the text-based nature of the data, and the natural applicability to encoding large sets of hierarchical data make XML a good choice for manipulating data representing network configuration and operational state.
This BoF will present several examples of XML-based network management tools. Examples will include tools currently in production use at major ISPs, as well as examples of vendor-specific XML tools such as JUNOScript. View full abstract page. | Moderators:
- Rob Enns, Juniper
Rob Enns is a Director of Software Engineering at Juniper Networks. Prior to Juniper he worked at Berkeley Networks, FORE Systems, and Bell-Northern Research.
| Rob Enns Presentation(PDF)
|
9:00pm - 9:30pm | Smoke House | PGP Key Signing | Speakers:
| |
Tuesday, June 3 2003
Time/Webcast: | Room: | Topic/Abstract: | Presenter/Sponsor: | Presentation Files: |
8:00am - 9:00am | Seasons Lobby | Continental Breakfast | | |
9:00am - 9:30am | Seasons Ballroon | @Home Cable Backbone Deployment ExperiencesThis presentation outlines some of the technical concerns and other issues that came up during deployment of the @Home Network. View full abstract page. | Speakers:
| @Home Cable Backbone Deployment Experiences
Cathy Wittbrodt Presentation(PDF)
|
9:30am - 10:15am | Seasons Ballroon | Bidirectional Forwarding Plane Deadness DetectionThis presentation will describe a technology intended to detect faults in the bidirectional path between two forwarding engines, including interfaces, data link(s), and, to the extent possible, the forwarding engines themselves, with potentially very low latency. The technology operates independently of media, data protocols, and routing protocols. We will also discuss scenarios of applicability and deployment. View full abstract page. | Speakers:
- Dave Katz, Juniper Networks.
- Dave Ward, Cisco Systems.
| Bidirectional Forwarding Plane Deadness Detection
Dave Ward Presentation(PDF)
|
10:15am - 10:45am | | Break | | |
10:45am - 12:00pm | Seasons Ballroon | S-BGP/soBGP Panel: What Do We Really Need and How Do We Architect a Compromise to Get It? | Moderators: Panelists:
- Steve Bellovin, AT&T Research.
- Dave Meyer, Sprint.
- Andrew Partan, Partan Labs.
- Alvaro Retana, Cisco Systems.
| Alvaro's Presentation(PDF)
Dave and Andrew's Presentation(PDF)
S-BGP/soBGP Panel
Steve's Presentation(PDF)
|
12:00pm - 1:30pm | | Lunch | | |
1:30pm - 2:00pm | Seasons Ballroon | BGP Vulnerability Testing: Separating Fact from FUDRecently the security of BGP has been called into question by the government, security experts, and the media. Perhaps by assuming that a compromise of the Internet routing infrastructure would be relatively trivial to accomplish, most of the recent attention has focused on replacements to BGP rather than ways we can do the best with what we have. Because any possible replacement for BGP will not be widely deployed in the near-term, an understanding of the key threats and mitigation techniques against current BGP deployments needs to be better understood. Furthermore, since most of the existing work related to BGP vulnerabilities is largely theoretical in nature, any new effort should be based in real testing on implementations that are commonly deployed by ISPs.
This talk presents the results of research in the area of BGP attacks. This research includes three main areas. First, specific attacks as outlined in the BGP Attack Tree draft were tested against lab networks to gauge attack results, difficulty, and the availability of best practices which mitigate the attack\'s effects. Where appropriate, these attacks were done against multiple BGP implementations to measure variations in response. Second, multiple implementations were tested using a BGP malformed message generator in an attempt to measure the resilience of BGP implementations against unexpected input. Third, the prevalence of generally accepted best practices on the Internet was measured by querying a representative set of the Internet\'s BGP routers on key management interfaces.
Analysis of this data will be useful for operators looking to improve the security of their BGP networks today and to evaluate potential improvements to BGP in the future, especially given the challenge of balancing scalability and ease of deployment with security in any future \"secure BGP.\" View full abstract page. | Speakers:
- Sean Convery, Cisco Systems
Sean Convery is a security researcher in Cisco\'s Critical Infrastructure Assurance Group (CIAG). The research arm of the CIAG is tasked to collaborate with various groups on security issues 3-5 years in the future. Before coming to the CIAG, Sean worked primarily on the SAFE blueprint, and is an author of several whitepapers on the subject. Prior to his five years at Cisco, Sean held various positions in both IT and security consulting during his 11 years in networking. - Matthew Franz, Cisco Systems
Matthew Franz is a security researcher in Cisco Systems\' Critical Infrastructure Assurance Group in Austin, Texas. Apart from work on BGP, interests include industrial automation (SCADA/DCS/Industrial Ethernet), security, and automated protocol test tools. Before joining CIAG, Matthew was senior security engineer in the Security Technologies Assessment team, where he conducted product security evaluations on a variety of Cisco products and network protocols. Before coming to Cisco in 2000, Matthew was a network security consultant and taught technical network security courses to government information warfare customers in San Antonio, Texas.
| BGP Vulnerability Testing: Separating Fact from FUD
Revised PDF presentation(PDF)
|
2:00pm - 2:15pm | Seasons Ballroon | BGP Attack Trees - Real World Examples | Speakers:
- Vijay Gill, AOL Time Warner.
- Sue Hares, NextHop.
- Mike Lloyd, RouteScience.
| Steve Bellovin Presentation(PDF)
Sue Hares Presentation(PDF)
|
2:15pm - 2:45pm | Seasons Ballroon | NRIC Best Practices for ISP SecurityThe increasing economic importance of IP networking, combined with a sharp increase in the frequency and sophistication of attacks, has made security of critical importance for IP data networks. In response to this need, a group of service providers and vendors, operating as part of the Network Reliability and Interoperability Council (NRIC), has developed a set of best practices for enhancing data network security. This talk will give a short overview of NRIC and of the best practices for security. We will give an example of how best practices can be useful in stopping attacks such as the slammer/sapphire worm, and will provider pointers to more information on NRIC and the NRIC best practices for security. View full abstract page. | Speakers:
- Ross Callon, Juniper
Ross Callon is an engineer in the protocols group at Juniper Networks. He has experience in Internet protocol standards, high-speed router design, and multi-protocol coexistence and interoperability. Ross is co-chair of Network Reliability and Interoperability Council 6, Focus Group 2, advising the FCC on network reliability. He also was a participant in a recent effort to advise the White House on security in communications networks.
Ross is a long-standing participant in multiple IETF working groups, and has previous experience in the ATM Forum, IESG, IEEE, ANSI, and ISO. He has authored or contributed toward VPN, MPLS, PNNI, IPv6, IS-IS and CLNP networking standards. He is a former co-chair of the IETF IP Next Generation (IPv6) working group. Ross has published numerous articles and been awarded twelve patents. He holds a B.S. in Mathematics from MIT and an M.S. in Operations Research from Stanford University.
| NRIC Best Practices for ISP Security
Ross Callon Presentation(PDF)
|
2:45pm - 3:00pm | | Break | | |
3:00pm - 3:30pm | Seasons Ballroon | Implementation of ARIN\'s Lame DNS Delegation PolicyThe members of ARIN instituted a policy to curb lame DNS delegations within ARIN\'s scope in the in-addr.arpa domain. The staff of ARIN has begun implementing the policy and has already witnessed a reduction in lame delegations. This presentation will outline the ARIN policy, results from early tests, and explain how ARIN is interacting with registrants and other registries on this issue. View full abstract page. | Speakers:
- Ed Lewis, ARIN
Edward Lewis is the Research Engineer for ARIN. He has been involved in DNS and DNSSEC Working Groups in the IETF since 1996 and is one co-chair of the Provisioning Registry Protocol Working Group of the IETF.
| Ed Lewis Presentation(PPT)
Implementation of ARIN's Lame DNS Delegation Policy
|
3:30pm - 4:00pm | Seasons Ballroon | BGP AS Number ExhaustionThe 16-bit AS number field in BGP has 64,510 available values to use in the Internet\'s public routing space. Since some 30,000 AS numbers have already been assigned by the regional registries, the BGP protocol field will be exhausted at some point in the future. The solution, as outlined in www.merit.edu/internet/documents/internet-drafts/draft-ietf-idr-as4bytes-06.txt, is to use a 32-bit field for this value. Both the problem and the solution are discussed further in this presentation. View full abstract page. | Speakers:
- K Claffy, CAIDA.
- Geoff Huston, Telstra, author.
| BGP AS Number Exhaustion
Geoff Huston Presentation(PDF)
|
3:30pm - 4:00pm | Seasons Ballroon | MPLS-Based Synchronous Traffic ShuntWe present various MPLS-based methods to enable a service provider to divert traffic of specific destinations to a centralized scrubbing and inspection facility. The traffic may be diverted from several locations, such as peering points, to the central processing facility. This technique differs from the sinkhole approach, in which the traffic does not come out of the sink and thus does not reach the intended destination. Here, after being processed, the traffic is sent back to the network on its way to the intended destination. This facilitates scalable, focused, and targeted filtering and processing of different customer traffic for on demand tasks such as, reverse proxy (ala Hardie & Wessels, see Bellwether - Surrogate Services for Popular Content,\" NANOG19), traffic examination, or DDoS attack filtering. The experience of a successful real-life deployment in an ISP environment will be reviewed. View full abstract page. | Speakers:
- Yehuda Afek, Riverhead
Yehuda Afek is a Professor in the School of Computer Science at Tel-Aviv University, and the CTO of Riverhead Networks Inc. Currently his research focuses on efficient forwarding and routing algorithms for IP networks, and methods for traffic engineering to stop DDoS attacks. Prior to joining Tel-Aviv University in 1989 he spent four years in AT&T Bell Laboratories. He received his M.Sc. and Ph.D. in Computer Science from UCLA in 1985 and 1983, respectively. - Roy Brooks, Cisco Systems.
- Nicolas Fischbach, COLT Telecom
Nicolas Fischbach is a Senior Manager, responsible for the European IP Security Engineering team at COLT Telecom. He also manages the Swiss IP Engineering team, and after participating in the deployment of the Swiss IP network and Internet Solution Center, he helped create the security and network unit of the Professional Services department. He holds an Engineer degree in Networking and Distributed Computing. Nicolas is also co-founder of Sécurité.Org, a French-speaking portal on computer and network security.
| MPLS-Based Synchronous Traffic Shunt
Yehuda Afek Presentation(PPT)
|
4:00pm - 4:15pm | Seasons Ballroon | Closing Remarks | Speakers:
- Susan Harris, Merit Network.
| Closing Remarks
|
|
|