^ Top

NANOG28 Agenda

All times are in Mountain Standard Time

Real Video icon Click the Real Video icon to watch a presentation below. Download Real Player. 

NANOG 28 Agenda

Presentation File Key:

Windows Media video, requires Windows Media Player to view. 

Real Video, requires Real Player to view. 

PDF Document, requires Adobe Acrobat Reader to view/print.

Sunday, June 1 2003
Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
1:30pm - 3:00pmGranary

Tutorial: BGP Multihoming Techniques

This tutorial introduces service providers to some of the features available in BGP to aid multihoming to the Internet. After an explanation of multihoming and the principles being followed in this tutorial, several examples involving different scenarios will be given. This includes the options available when multihoming to the same ISP (including RFC2270) and to different upstreams. Configurations for modifying inbound and outbound traffic flows are covered. The tutorial concludes with a case study, and an examination of the use of BGP communities by several ISPs. The configuration examples throughout this tutorial use the Cisco IOS configuration syntax.

View full abstract page.

  • Philip Smith, Cisco Systems
  • Philip Smith joined Cisco Systems in January 1998. He is a member of the Service Provider Architectures Group of Consulting Engineering, within Corporate Development. His role includes working with many ISPs in the Asia-Pacific region and the rest of the world, specifically in network strategies, design, technology, and operations, as well as helping with network configuration and scaling. Other areas of interest also include Internet routing, Internet protocols, IPv6, and encouraging the growth of the Internet around the world. Prior to joining Cisco, he spent 5 years at PIPEX (now part of UUNET\'s global ISP business), the UK\'s first commercial Internet Service Provider. He was one of the first engineers working in the UK Internet, and played a fundamental role in building the modern Internet in the UK and Europe. Philip is co-author of Cisco ISP Essentials, ISBN 1-58705-041-2, published by Cisco Press. He holds a Doctor of Philosophy and has a First Class Honours Degree in Physics. He lives in Brisbane, Australia.
youtubeBGP Multihoming Techniques
pdfPhilip Smith Presentation(PDF)
1:30pm - 3:00pmHarvest

Tutorial: Deploying Interdomain IP Multicast

This session covers the protocols and topologies associated with inter-domain multicast routing, including details on the operation of MSDP and MBGP as they relate to PIM. The session also introduces the latest trends in inter-domain multicast routing, PIM Source Specific Multicast (SSM), Multicast VPNs, and IPv6 Multicast. During the tutorial, the basic fundamentals of MBGP and MSDP are covered along with their basic configuration, as well as the use of Anycast RP\'s. Numerous topology examples with regard to inter-domain multicast using MBGP and MSDP are presented, along with configuration examples for both the provider and customers. Next, the session introduces Source Specific Multicast and shows how this method of inter-domain multicast solves some of the problems associated with traditional inter-domain PIM-SM multicast. Methods to secure a multicast network will also be presented.

View full abstract page.

  • Mike McBride, Cisco Systems
  • Mike is a SW Engineer in the Multicast Development group at Cisco Systems. His focus is the deployment of Multicast in the Service Provider space.
youtubeDeploying Interdomain IP Multicast
pptMike McBride Presentation(PPT)
3:00pm - 3:30pmMarket LobbyBreak
3:30pm - 5:00pmGranaryTutorial: BGP Multihoming Techniques (Part 2)Speakers:
  • Philip Smith, Cisco Systems.
3:30pm - 5:00pmHarvest

Tutorial: Introduction to MPLS

This tutorial introduces network engineers and service providers to basic and intermediate features and techniques available for building an MPLS network. We will discuss basic topics of how MPLS operates in a service provider network, including terminology, the setup of label-switched paths (LSPs), and LSP maintenance. Both dynamic MPLS signaling options in widespread use today, RSVP and LDP, will be discussed. Throughout the tutorial, Juniper Networks and Cisco Systems routers are used to illustrate important MPLS concepts. Additionally, configuration and troubleshooting examples are provided using CLI commands from both vendors.

View full abstract page.

  • Joe Soricelli, Juniper
  • Joseph M. Soricelli is an Education Services Engineer at Juniper. He is a Juniper Networks Certified Internet Engineer, a Juniper Authorized Instructor, and a Cisco Certified Internet Expert. Joeseph is a contributing author to <I>Juniper Networks Routers: The Complete Reference</I> and <I>Juniper Networks Certified Internet Associate Study Guide</I>. In addition to writing numerous training courses, he has worked with and trained carriers, telcos, and ISPs throughout his career in the networking industry.
youtubeIntroduction to MPLS
pdfJoe Soricelli Presentation(PDF)
Monday, June 2 2003
Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
8:00am - 9:00amSeasons LobbyContinental Breakfast
9:00am - 9:15amSeasons BallroomWelcome, IntroductionsSpeakers:
  • Susan Harris, Merit Network.
  • Pete Kruckenberg, UEN
  • Pete Kruckenberg is the senior network engineer for Utah Education Network, a regional education and research network in Utah and southern Idaho. Prior to joining UEN, Pete co-founded a regional ISP in Utah and worked for a start-up managed services provider in Lindon, Utah. He co-founded the Utah Regional Exchange Point and serves in various roles with regional networking initiatives. Pete graduated in Computer Engineering from the University of Utah.

  • Val Oveson, State of Utah
  • Val Oveson is the CIO for the State of Utah. His prior experience includes working with KPMG as a consultant to government organzations, and as CIO of PricewaterhouseCoopers. He has served in various capacities in state and federal government organizations, acting as National Taxpayer Advocate for the IRS, Chair of the Utah State Tax Commissions, and, for two terms, as Lieutenant Governor of Utah. Mr. Oveson graduated from Brigham Young University with an accounting degree.
youtubeWelcome, Introductions
9:15am - 10:15amSeasons Ballroom

Interception Technology: The Good, The Bad, and The Ugly!

There is a conflict between the interests of privacy and the ability of law enforcement to intercept the communications of criminal targets. Yet interception technology is not without its own risks -- it is intended to be used only by authorized parties for lawful interception, but may also be abused by unauthorized individuals. This talk will focus on the technical risks of interception technology and discuss the wisdom of standardizing protocols and technologies to facilitate interception. This is a tricky topic, because one must balance the benefits and risks of privacy versus interception for lawful purposes. We will attempt to stay within the technical realm as opposed to the politics of interception.

View full abstract page.

  • Jeff Schiller, MIT
  • Jeff Schiller received his S.B. in Electrical Engineering from MIT in 1979. As MIT Network Manager, he has overseen the MIT Campus Computer Network since its inception in 1984. Prior to his work in the Network Group, he maintained MIT\'s Multics timesharing system during the ARPANet TCP/IP conversion. Jeff is an author of MIT\'s Kerberos Authentication system. From 1994 through 2003, he was the Internet Engineering Steering Group\'s Area Director for Security, responsible for overseeing security-related Working Groups of the IETF. He was responsible for releasing a U.S. legal freeware version of the popular PGP encryption program. Jeff is also responsible for the development and deployment of an X.509-based Public Key Infrastructure at MIT. He is the technical lead for the new Higher Education Certifying Authority being operated by the Corporation for Research and Educational Networking, and a founding member of the Steering Group of NEARnet, now part of Level3.
youtubeInterception Technology: The Good, The Bad, and The Ugly! PART 1
youtubeInterception Technology: The Good, The Bad, and The Ugly! PART 2
youtubeInterception Technology: The Good, The Bad, and The Ugly! PART 3
pdfJeff Schiller Presentation(PDF)
10:15am - 10:45am Break
10:45am - 11:00amSeasons Ballroom

The National Infrastructure Assurance Council (NIAC) Vulnerability Disclosure Framework and What It Might Mean to the ISP Community

The National Information Advisory Council (NIAC) was formed by executive order in September 2002 and is charged with advising the US Department of Homeland Security and the President regarding the security of information systems and networks essential to the nation\'s critical infrastructure. A key task in front of the NIAC is to provide guidance on disclosing vulnerabilities, and a working group has been created to establish a framework for vulnerability disclosure to include specific recommendations to the President. As part of its outreach and information-gathering efforts, the working group is presenting a brief overview of the project during the Monday morning General Session. Interested attendees are invited to contribute further via a dialog during the ISP Security BOF at 7:30 Monday evening.

View full abstract page.

  • Jim Duncan, Cisco Systems
  • Jim Duncan works in the Critical Infrastructure Assurance Group at Cisco Systems, where he is a topic expert on incident response, vulnerability handling, and cyberthreat assessment. Previously, Jim was an Incident Manager for the Cisco Systems Product Security Incident Response Team (PSIRT) for four years, where he handled customer security and product security vulnerabilities. In addition to his work with the NIAC Vulnerability Disclosure WG, Jim currently works on proactive issues supporting other incident response teams within Cisco. He is authoring an internal policy for information sharing, and he actively contributes to external projects for several Information Sharing and Analysis Centers (ISACs). In the background is a project to adapt \"Inter-NOC Dial By ASN\" technology for inter-ISAC communications. Jim contributed to RFC 1244, the Site Security Policy Handbook, co-authored a tutorial on building an incident response team for USENIX, and is a Liaison Member of the Forum of Incident Response and Security Teams. Prior to Cisco, Jim worked for Penn State University. He attended his first NANOG meeting at NANOG8, October 1996, in Ann Arbor.
  • Paul Vixie, ISC.
pdfJim Duncan Presentation(PDF)
youtubeThe National Infrastructure Assurance Council (NIAC)
11:00am - 11:20amSeasons Ballroom

IPv4/IPv6 Dual-Stack on Abilene

Abilene, the Internet2 backbone, has been running dual-stack on its backbone routers for over a year. In this talk, we discuss experiences with both the Cisco GSR and Juniper T640 platforms on issues ranging from IGP and BGP to monitoring and performance.

View full abstract page.

  • Grover Browning, Indiana University
  • Grover Browning is a senior engineer with the Global Research NOC at Indiana University. The NOC handles network operations services for Abilene, StarTap, AMPath, and a variety of other research and education networks.
pdfGrover Browning Presentation(PDF)
youtubeIPv4/IPv6 Dual-Stack on Abilene
11:20am - 12:00pmSeasons Ballroom

Research Forum: Achieving Record Speed Trans-Atlantic End-to-end TCP Throughput

In November 2002 and again in February 2003, an international team of scientists from Caltech, SLAC, and LANL in the U.S., CERN in Switzerland, and NIKHEF in Amsterdam broke the Internet2 TCP land speed record (i.e., the product of the bits/s times the distance) not once but twice. They achieved 923Mbits/s with an end-to-end application-to-application single TCP stream from Amsterdam to Sunnyvale (10,619 Tbit-meters/s) over a 1Gbit/s bottleneck, 8.6 Gbits/s between 10 machines in Sunnyvale and 10 machines in Baltimore over a 10 Gbits/s bottleneck, and 2.38 Gbits/s with a single TCP stream from Sunnyvale to Geneva over a 2.5 Gbits/s bottleneck. The records were broken with commercial off-the-shelf components, and demonstrate that TCP can scale from the original 56kbits/s Internet of the 1980s to tomorrow\'s multi Gbits/s rates. The talk will address the questions of: who did it; what exactly was done; how was it done (including descriptions of the testbeds, the challenges, the effects of various solutions, and gotchas); what was special about this; why it is important; and what\'s next?

View full abstract page.
  • Les Cottrell, Stanford University.
pdfLes Cottrell Presentation(PDF)
youtubeResearch Forum: Achieving Record Speed Trans-Atlantic End-to-end TCP Throughput
11:20am - 12:00pmSeasons Ballroom

Research Forum: Inter-provider Coordination for Real-Time Tracebacks

In the face of security incidents, network providers need to be equipped and ready to assist in tracing traffic flows across provider boundaries to their source. The Real-time Inter-network Defense described in internet-drafts/draft-moriarty-ddos-rid-03.txt is a proposed method to facilitate communication between networks. This approach allows for a variety of methods, existing or future, to be used to trace the packets within a given network domain. Standardization of inter-provider coordination by leveraging existing relationships between operators allows proper feedback and makes it possible for status information for the request to be communicated in a flexible manner. The results of a small-scale test of the system will be presented. Next steps would include an experiment to test the system at the ISP level, determining the integration necessary for inter-provider coordination and determining its effectiveness for tracebacks.

View full abstract page.

  • Kathleen M. Moriarty, MIT
  • Kathleen Moriarty is the lead Network Security Engineer at MIT Lincoln Laboratory, responsible for overseeing the protection and monitoring of the Laboratory\'s networks and computer systems. She also has experience working as a network and security engineer in both the ISP and financial sectors through previous positions and consulting work. In the financial sector, she previously held the position of Director of Information Security at FactSet Research Systems. Kathleen holds a Masters of Science degree in Computer Science from Rensselaer Polytechnic Institute and a Bachelor of Science in Mathematics and Computer Science from Siena College.
pdfKathleen Moriarty Presentation(PDF)
youtubeResearch Forum: Inter-provider Coordination for Real-Time Tracebacks
12:00pm - 1:30pm Lunch
1:30pm - 3:00pmSeasons BallroomPanel: XML Router Configs - Progress and PredictionsModerators:

  • Randy Bush, IIJ
  • Randy Bush works as Principal Scientist at Internet Initiative Japan. Previously he spent a bit over a year at AT&T doing research and working on network architecture. He got some operational experience from being on the founding team at Verio, a backbone provider, from which he graduated as VP of Networking after five years. Before that, he was the principal engineer of RAINet, an ISP in Oregon and Washington, which was Verio\'s first acquisition. Randy is currently a member of the IESG, serving as co-chair of the IETF Operations and Management Area, mainly covering the operations area. As PI for the Network Startup Resource Center, an NSF-supported pro bono effort, he has been involved for some years with the deployment and integration of appropriate networking technology in the developing world.
  • Andy Bierman, Cisco Systems.
  • John Heasley, Verio.
  • Phil Shafer, Juniper.
pptAndy Bierman Presentation(PPT)
youtubePanel: XML Router Configs - Progress and Predictions
pdfPhil Shafer Presentation(PDF)
pdfRandy Bush Presentation(PDF)
3:00pm - 3:30pm Break
3:30pm - 5:00pmSeasons Ballroon

Tutorial: ISP Security: Deploying and Using Sinkholes

Sinkholes are a flexible security tool that add a wealth of new capabilities to an ISP\'s security toolkit. ISPs are using sinkholes to track infrastructure port scanning, identify and classify attacks, packet capture attack flows, trace attacks through their networks, and divert attack flows from the target of the attacks. Sinkholes also enable a variety of new applications brought about through necessity and growing operational experience. Sinkholes go beyond narrowly focused tools like black hole servers, Tarpits, and Honeynets. Sinkholes may be used to perform any or all of these functions, but often incorporate all of these and more. This tutorial will explain how to build a sinkhole, using generalized examples from ISP deployments around the world. Configuration using JUNOS and IOS will be used to demonstrate the various ways trigger routers and target routers in the sinkholes are safely, scalably, and efficiently configured. Architectural considerations relating to network topology and placement of sinkholes in the ISP\'s network will be covered, along with anycast deployment options. A multitude of tools that can be placed inside the sinkhole will also be discussed. These include a variety of freeware, shareware, home-built, and commercial tools - covering the diversity available to ISPs of any size. This tutorial is recommended to ISP engineers of all experience levels. The source materials are derived from live operational deployments, which can be modified and applied to any large IP transport network.

View full abstract page.
  • Barry Raveendren Greene, Cisco Systems.
  • Danny McPherson, Arbor Networks.
youtubeISP Security: Deploying and Using Sinkholes
pdfISP Security: Deploying and Using Sinkholes(PDF)
3:30pm - 5:00pmHarvest Room

Issues in IPv6 Deployment

Although IPv6 has been deployed in a multitude of research and development networks worldwide, commercial deployment is still limited. The need for IPv6 is widely acknowledged in Asia, where IPv4 addresses are increasingly difficult to acquire. In North America, where some 74% of the allocated IPv4 addresses are located, there is not yet the sense of urgency for IPv6 as there is in Asia. Yet even here, there is growing interest and understanding IPv6 will eventually be required. It is therefore important that network operators begin familiarizing themselves with the technical issues surrounding the deployment of realistic IPv6 networks. This tutorial provides a technical overview of the existing state of the three classes of IPv6 transition technologies: dual stacks, tunnels, and translators. Specific technologies within each of these classes are examined. Outstanding transition issues, both resolved and unresolved, are also examined. These issues include multihoming, DNS, and security.

View full abstract page.

  • Jeff Doyle, Juniper
  • Jeff Doyle is the IPv6 Solutions Manager for Juniper Networks. Specializing in IP routing protocols, MPLS, and IPv6, Jeff has designed or assisted in the design of large-scale IP service provider networks throughout North America, Europe, Japan, Korea, and the People\'s Republic of China. Jeff is the author of <I>CCIE Professional Development: Routing TCP/IP, Volumes I and II</I>, is an editor and contributing author of <I>Juniper Networks Routers: The Complete Reference</I>, and is the author of a new series of books on large-scale networking, the first of which will be released in the summer of 2003. Jeff has presented numerous corporate seminars for Juniper Networks, and has also spoken at NANOG, JANOG, APRICOT, and at IPv6 Forum conferences.
youtubeIssues in IPv6 Deployment
pptJeff Doyle Presentation(PPT)
5:00pm - 7:00pmWasatch Room (2nd floor)Beer n Gear
  • Sponsors Arbor Networks; Avici Systems; Caspian Networks; Cisco Systems; Juniper Networks; OPNET Technologies; Riverhead Networks; Seranoa Networks.
  • Sponsors
  • 7:30pm - 9:00pmGranaryISP Security BOF IIIModerators:
    • Barry Raveendran Greene, Cisco Systems.
    pdfBarry Greene Presentation(PDF)
    pdfRob Thomas Presentation(PDF)
    7:30pm - 9:00pmHarvest

    XML-based Network Management Tools

    XML for network management has been a popular topic lately. The large toolset available for manipulating XML encoded data, the text-based nature of the data, and the natural applicability to encoding large sets of hierarchical data make XML a good choice for manipulating data representing network configuration and operational state. This BoF will present several examples of XML-based network management tools. Examples will include tools currently in production use at major ISPs, as well as examples of vendor-specific XML tools such as JUNOScript.

    View full abstract page.

    • Rob Enns, Juniper
    • Rob Enns is a Director of Software Engineering at Juniper Networks. Prior to Juniper he worked at Berkeley Networks, FORE Systems, and Bell-Northern Research.
    pdfRob Enns Presentation(PDF)
    9:00pm - 9:30pmSmoke HousePGP Key SigningSpeakers:
    • Joe Abley, ISC.
    Tuesday, June 3 2003
    Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
    8:00am - 9:00amSeasons LobbyContinental Breakfast
    9:00am - 9:30amSeasons Ballroon

    @Home Cable Backbone Deployment Experiences

    This presentation outlines some of the technical concerns and other issues that came up during deployment of the @Home Network.

    View full abstract page.
    • Cathy Wittbrodt, None.
    youtube@Home Cable Backbone Deployment Experiences
    pdfCathy Wittbrodt Presentation(PDF)
    9:30am - 10:15amSeasons Ballroon

    Bidirectional Forwarding Plane Deadness Detection

    This presentation will describe a technology intended to detect faults in the bidirectional path between two forwarding engines, including interfaces, data link(s), and, to the extent possible, the forwarding engines themselves, with potentially very low latency. The technology operates independently of media, data protocols, and routing protocols. We will also discuss scenarios of applicability and deployment.

    View full abstract page.
    • Dave Katz, Juniper Networks.
    • Dave Ward, Cisco Systems.
    youtubeBidirectional Forwarding Plane Deadness Detection
    pdfDave Ward Presentation(PDF)
    10:15am - 10:45am Break
    10:45am - 12:00pmSeasons BallroonS-BGP/soBGP Panel: What Do We Really Need and How Do We Architect a Compromise to Get It?Moderators:
    • Randy Bush, IIJ.
    • Steve Bellovin, AT&T Research.
    • Dave Meyer, Sprint.
    • Andrew Partan, Partan Labs.
    • Alvaro Retana, Cisco Systems.
    pdfAlvaro's Presentation(PDF)
    pdfDave and Andrew's Presentation(PDF)
    youtubeS-BGP/soBGP Panel
    pdfSteve's Presentation(PDF)
    12:00pm - 1:30pm Lunch
    1:30pm - 2:00pmSeasons Ballroon

    BGP Vulnerability Testing: Separating Fact from FUD

    Recently the security of BGP has been called into question by the government, security experts, and the media. Perhaps by assuming that a compromise of the Internet routing infrastructure would be relatively trivial to accomplish, most of the recent attention has focused on replacements to BGP rather than ways we can do the best with what we have. Because any possible replacement for BGP will not be widely deployed in the near-term, an understanding of the key threats and mitigation techniques against current BGP deployments needs to be better understood. Furthermore, since most of the existing work related to BGP vulnerabilities is largely theoretical in nature, any new effort should be based in real testing on implementations that are commonly deployed by ISPs. This talk presents the results of research in the area of BGP attacks. This research includes three main areas. First, specific attacks as outlined in the BGP Attack Tree draft were tested against lab networks to gauge attack results, difficulty, and the availability of best practices which mitigate the attack\'s effects. Where appropriate, these attacks were done against multiple BGP implementations to measure variations in response. Second, multiple implementations were tested using a BGP malformed message generator in an attempt to measure the resilience of BGP implementations against unexpected input. Third, the prevalence of generally accepted best practices on the Internet was measured by querying a representative set of the Internet\'s BGP routers on key management interfaces. Analysis of this data will be useful for operators looking to improve the security of their BGP networks today and to evaluate potential improvements to BGP in the future, especially given the challenge of balancing scalability and ease of deployment with security in any future \"secure BGP.\"

    View full abstract page.

    • Sean Convery, Cisco Systems
    • Sean Convery is a security researcher in Cisco\'s Critical Infrastructure Assurance Group (CIAG). The research arm of the CIAG is tasked to collaborate with various groups on security issues 3-5 years in the future. Before coming to the CIAG, Sean worked primarily on the SAFE blueprint, and is an author of several whitepapers on the subject. Prior to his five years at Cisco, Sean held various positions in both IT and security consulting during his 11 years in networking.

    • Matthew Franz, Cisco Systems
    • Matthew Franz is a security researcher in Cisco Systems\' Critical Infrastructure Assurance Group in Austin, Texas. Apart from work on BGP, interests include industrial automation (SCADA/DCS/Industrial Ethernet), security, and automated protocol test tools. Before joining CIAG, Matthew was senior security engineer in the Security Technologies Assessment team, where he conducted product security evaluations on a variety of Cisco products and network protocols. Before coming to Cisco in 2000, Matthew was a network security consultant and taught technical network security courses to government information warfare customers in San Antonio, Texas.
    youtubeBGP Vulnerability Testing: Separating Fact from FUD
    pdfRevised PDF presentation(PDF)
    2:00pm - 2:15pmSeasons BallroonBGP Attack Trees - Real World ExamplesSpeakers:
    • Vijay Gill, AOL Time Warner.
    • Sue Hares, NextHop.
    • Mike Lloyd, RouteScience.
    pdfSteve Bellovin Presentation(PDF)
    pdfSue Hares Presentation(PDF)
    2:15pm - 2:45pmSeasons Ballroon

    NRIC Best Practices for ISP Security

    The increasing economic importance of IP networking, combined with a sharp increase in the frequency and sophistication of attacks, has made security of critical importance for IP data networks. In response to this need, a group of service providers and vendors, operating as part of the Network Reliability and Interoperability Council (NRIC), has developed a set of best practices for enhancing data network security. This talk will give a short overview of NRIC and of the best practices for security. We will give an example of how best practices can be useful in stopping attacks such as the slammer/sapphire worm, and will provider pointers to more information on NRIC and the NRIC best practices for security.

    View full abstract page.

    • Ross Callon, Juniper
    • Ross Callon is an engineer in the protocols group at Juniper Networks. He has experience in Internet protocol standards, high-speed router design, and multi-protocol coexistence and interoperability. Ross is co-chair of Network Reliability and Interoperability Council 6, Focus Group 2, advising the FCC on network reliability. He also was a participant in a recent effort to advise the White House on security in communications networks. Ross is a long-standing participant in multiple IETF working groups, and has previous experience in the ATM Forum, IESG, IEEE, ANSI, and ISO. He has authored or contributed toward VPN, MPLS, PNNI, IPv6, IS-IS and CLNP networking standards. He is a former co-chair of the IETF IP Next Generation (IPv6) working group. Ross has published numerous articles and been awarded twelve patents. He holds a B.S. in Mathematics from MIT and an M.S. in Operations Research from Stanford University.
    youtubeNRIC Best Practices for ISP Security
    pdfRoss Callon Presentation(PDF)
    2:45pm - 3:00pm Break
    3:00pm - 3:30pmSeasons Ballroon

    Implementation of ARIN\'s Lame DNS Delegation Policy

    The members of ARIN instituted a policy to curb lame DNS delegations within ARIN\'s scope in the in-addr.arpa domain. The staff of ARIN has begun implementing the policy and has already witnessed a reduction in lame delegations. This presentation will outline the ARIN policy, results from early tests, and explain how ARIN is interacting with registrants and other registries on this issue.

    View full abstract page.

    • Ed Lewis, ARIN
    • Edward Lewis is the Research Engineer for ARIN. He has been involved in DNS and DNSSEC Working Groups in the IETF since 1996 and is one co-chair of the Provisioning Registry Protocol Working Group of the IETF.
    pptEd Lewis Presentation(PPT)
    youtubeImplementation of ARIN's Lame DNS Delegation Policy
    3:30pm - 4:00pmSeasons Ballroon

    BGP AS Number Exhaustion

    The 16-bit AS number field in BGP has 64,510 available values to use in the Internet\'s public routing space. Since some 30,000 AS numbers have already been assigned by the regional registries, the BGP protocol field will be exhausted at some point in the future. The solution, as outlined in www.merit.edu/internet/documents/internet-drafts/draft-ietf-idr-as4bytes-06.txt, is to use a 32-bit field for this value. Both the problem and the solution are discussed further in this presentation.

    View full abstract page.
    • K Claffy, CAIDA.
    • Geoff Huston, Telstra, author.
    youtubeBGP AS Number Exhaustion
    pdfGeoff Huston Presentation(PDF)
    3:30pm - 4:00pmSeasons Ballroon

    MPLS-Based Synchronous Traffic Shunt

    We present various MPLS-based methods to enable a service provider to divert traffic of specific destinations to a centralized scrubbing and inspection facility. The traffic may be diverted from several locations, such as peering points, to the central processing facility. This technique differs from the sinkhole approach, in which the traffic does not come out of the sink and thus does not reach the intended destination. Here, after being processed, the traffic is sent back to the network on its way to the intended destination. This facilitates scalable, focused, and targeted filtering and processing of different customer traffic for on demand tasks such as, reverse proxy (ala Hardie & Wessels, see Bellwether - Surrogate Services for Popular Content,\" NANOG19), traffic examination, or DDoS attack filtering. The experience of a successful real-life deployment in an ISP environment will be reviewed.

    View full abstract page.

    • Yehuda Afek, Riverhead
    • Yehuda Afek is a Professor in the School of Computer Science at Tel-Aviv University, and the CTO of Riverhead Networks Inc. Currently his research focuses on efficient forwarding and routing algorithms for IP networks, and methods for traffic engineering to stop DDoS attacks. Prior to joining Tel-Aviv University in 1989 he spent four years in AT&T Bell Laboratories. He received his M.Sc. and Ph.D. in Computer Science from UCLA in 1985 and 1983, respectively.
    • Roy Brooks, Cisco Systems.
    • Nicolas Fischbach, COLT Telecom
    • Nicolas Fischbach is a Senior Manager, responsible for the European IP Security Engineering team at COLT Telecom. He also manages the Swiss IP Engineering team, and after participating in the deployment of the Swiss IP network and Internet Solution Center, he helped create the security and network unit of the Professional Services department. He holds an Engineer degree in Networking and Distributed Computing. Nicolas is also co-founder of Sécurité.Org, a French-speaking portal on computer and network security.
    youtubeMPLS-Based Synchronous Traffic Shunt
    pptYehuda Afek Presentation(PPT)
    4:00pm - 4:15pmSeasons BallroonClosing RemarksSpeakers:
    • Susan Harris, Merit Network.
    youtubeClosing Remarks


    ^ Back to Top