Re: [anti-abuse-wg] Mysteries of the Internet: AS65000
On 15/04/19, 9:26 AM, "anti-abuse-wg on behalf of ac" <anti-abuse-wg-bounces@ripe.net on behalf of ac@main.me> wrote:
Sorry for top posting, but I fail to see how any of this is abuse related?
Given that it is RFG raising this, I think it is a pretty safe bet that this ASN is associated with some abusive activity that he has seen.
On Mon, 15 Apr 2019 09:40:35 +0530 Suresh Ramasubramanian <ops.lists@gmail.com> wrote:
On 15/04/19, 9:26 AM, "anti-abuse-wg on behalf of ac" <anti-abuse-wg-bounces@ripe.net on behalf of ac@main.me> wrote:
Sorry for top posting, but I fail to see how any of this is abuse related?
Given that it is RFG raising this, I think it is a pretty safe bet that this ASN is associated with some abusive activity that he has seen.
Okay, but this is not yet clear? pvt asn is leaked often (and sometimes voluminous) - so is common/frequent and in itself means nothing, if this is that, - but as this affects that network, there is no abuse? or I am missing something?
In message <CF75F9DC-0DB0-426B-9E91-AAD0BCD850C8@gmail.com>, Suresh Ramasubramanian <ops.lists@gmail.com> wrote:
Given that it is RFG raising this, I think it is a pretty safe bet that this ASN is associated with some abusive activity that he has seen.
Well, let's just say that some things that are relavant to AS65000 do appear to be to be a bit, um, questionable. Anyway, since the point has been raised, I will go ahead and say that my questions about AS65000 are really secondary to the -real- question that I'd very much like to have an answer to... from one of the *real* routing experts. (And I do plan to be sending this question to Doug Madory later on, just in case he is not actually reading everything that appears here.) Here is what I am -actually- most directly curious about... I have reason to believe that -somebody- may perhaps/possibly have been announcing a route to the (now unrouted) RIPE IPv4 block 91.244.204.0/22 in the not very distant past, beginning around 2018-10-21 21:01:47 -0000 and for some considerable time thereafter, perhaps exctending into multiple months. I further have reason to believe that this /22 block was in use by some professional snowshoe spammers at some point or points during this same time period. I would very much like to which ASN, exactly, was routing this block in and around that time period. That information would be an enormous help to my investigation of this matter. I have looked on the RIPE web site for an answer, specifically here: https://stat.ripe.net/widget/routing-history#w.resource=91.244.204.0 Switching to "Table View" and then sorting by date first seen, there would appear to be two plausible candidates, i.e.: 91.244.204.0/22 AS56630 2018-08-17 00:00:00 UTC 91.244.204.0/22 AS65000 2018-08-17 00:00:00 UTC I am not aware of any way to tell which of the above listed ASN is more likely to have been the ASN that was actually providing service to the aforementioned professional snowshoe spammers. I have noticed however that quite a number of the routes currently being announced by (reserved) AS65000 are simultaneously also being announced by various other ASNs. This makes the whole situation rather more confusing than I would like, and I am left with no clear answers as to who was/is responsible, If the responsible party is AS56630 then my attribution on this case is complete, I can share my resulting opinions about AS56630 and its predlictions with some other people I know, after which there will be nothing left for me to do but to go and make myself a marguerita. If on the other hand however, it was actually AS65000 that was providing service to the professional snowshoe spammers in this case, then it would appear that I have hit a dead end where no one is responsible, and yet -everyone- is. Needless to say this is not at all a satisfying outcome. I just now looked at the routing history for these additional blocks: 5.133.165.0/24 5.133.166.0/24 91.244.204.0/22 It would appear that the mysterious AS65000 has been sort of shadowing the movements of AS56630 for some time now... over six months, I guess, at least since 2018-08-17, according to the RIPE data on that last route shown above. Eveywhere AS56630 goes, AS65000 goes also. When one moves, the other does also, and on the same day. Quite a romance going on between those two! Regards, rfg P.S. I'm not entirely sure that I understand why a Lithuanian ASN (AS56630) would be called upon to provide routing for an alleged telecom company located in Tbilisi, Georgia (i.e. GE-RAILWAYTELECOM-20120605). That having been said, I personally harbor no doubts whatsoever about what the intentions are for the practical applications of the following blocks which are being routed by AS56630: https://bgp.he.net/net/5.133.165.0/24#_dns https://bgp.he.net/net/130.0.88.0/22#_dns (I must remember to thank HE.NET for their asistance in making abundantly clear that which might otherwise have have been less than entirely persuasive.)
Hi Ronald, All, On Sun, 14 Apr 2019, Ronald F. Guilmette wrote: (...)
It would appear that the mysterious AS65000 has been sort of shadowing the movements of AS56630 for some time now... over six months, I guess, at least since 2018-08-17, according to the RIPE data on that last route shown above. Eveywhere AS56630 goes, AS65000 goes also. When one moves, the other does also, and on the same day. Quite a romance going on between those two!
If anyone cares to look into AS-PATHs... https://stat.ripe.net/data/bgp-state/data.json?resource=91.244.204.0/22×tamp=2019-04-09T08:00 In this particular query AS65000 only shows up once (plus on a community entry), with AS-PATH "6881 3216 56630 56630 65000". (...)
P.S. I'm not entirely sure that I understand why a Lithuanian ASN (AS56630) would be called upon to provide routing for an alleged telecom company located in Tbilisi, Georgia (i.e. GE-RAILWAYTELECOM-20120605).
It's only 2500km (~1600 miles) between Tiblissi and Vilnius... :-)) Cheers, Carlos
In message <alpine.LRH.2.21.1904150814120.19497@gauntlet.corp.fccn.pt>, =?ISO-8859-15?Q?Carlos_Fria=E7as?= <cfriacas@fccn.pt> wrote:
P.S. I'm not entirely sure that I understand why a Lithuanian ASN (AS56630) would be called upon to provide routing for an alleged telecom company locat ed in Tbilisi, Georgia (i.e. GE-RAILWAYTELECOM-20120605).
It's only 2500km (~1600 miles) between Tiblissi and Vilnius... :-))
Right. And none of us should forget the strong historical ties between Lithuania and Iran ... https://bgp.he.net/net/185.104.193.0/24#_dns https://bgp.he.net/net/185.104.194.0/24#_dns see also: https://bgp.he.net/net/130.0.88.0/22#_dns https://bgp.he.net/net/194.29.52.0/22#_dns https://bgp.he.net/net/194.156.96.0/22#_dns https://bgp.he.net/net/213.183.47.0/24#_dns
Hi Ronald, It's a quite simple issue and it's absolutely irrelevant to any historical or political reasons. Someone from AS56630 forgot to enable remove-private-as for eBGP peers. Regards, Siyuan Miao On Mon, Apr 15, 2019 at 4:06 PM Ronald F. Guilmette <rfg@tristatelogic.com> wrote:
In message <alpine.LRH.2.21.1904150814120.19497@gauntlet.corp.fccn.pt>, =?ISO-8859-15?Q?Carlos_Fria=E7as?= <cfriacas@fccn.pt> wrote:
P.S. I'm not entirely sure that I understand why a Lithuanian ASN (AS56630) would be called upon to provide routing for an alleged telecom company locat ed in Tbilisi, Georgia (i.e. GE-RAILWAYTELECOM-20120605).
It's only 2500km (~1600 miles) between Tiblissi and Vilnius... :-))
Right. And none of us should forget the strong historical ties between Lithuania and Iran ...
https://bgp.he.net/net/185.104.193.0/24#_dns https://bgp.he.net/net/185.104.194.0/24#_dns
see also: https://bgp.he.net/net/130.0.88.0/22#_dns https://bgp.he.net/net/194.29.52.0/22#_dns https://bgp.he.net/net/194.156.96.0/22#_dns https://bgp.he.net/net/213.183.47.0/24#_dns
Hi, On Mon, Apr 15, 2019 at 04:15:39PM +0800, Siyuan Miao wrote:
It's a quite simple issue and it's absolutely irrelevant to any historical or political reasons.
Someone from AS56630 forgot to enable remove-private-as for eBGP peers.
And someone from their upstreams forgot to install proper as-path filters. Private ASes should *never* be expected from a downstream session. Gert Doering -- NetMaster -- have you enabled IPv6 on something today...? SpaceNet AG Vorstand: Sebastian v. Bomhard, Michael Emmer Joseph-Dollinger-Bogen 14 Aufsichtsratsvors.: A. Grundner-Culemann D-80807 Muenchen HRB: 136055 (AG Muenchen) Tel: +49 (0)89/32356-444 USt-IdNr.: DE813185279
In message <CAO3CAMpXS5-fw0KZFjCpHdgnDyifx-YbRawxV-3v0Eq5N5JyFg@mail.gmail.com> Siyuan Miao <siyuan@misaka.io> wrote:
It's a quite simple issue and it's absolutely irrelevant to any historical or political reasons.
Who said anything about politics? I merely offered the observation, in my own rather backhanded way, that Lithuania is not exactly geographically close to either Georgia or Iran. So, you know, it's not as if these chaps from Georgia -and- the chaps from Iran just happened to bump into anyone from this Lithianian ISP while they were having a drink in their local bar, or at their local Rotary Club meeting one day, and then started up a conversation that began with "Oh! So you are an ISP! That's good, because we've been needing some connectivity, and you are obviouly just the man for the job!" The word "implausible" comes immediately to mind.
Someone from AS56630 forgot to enable remove-private-as for eBGP peers.
That would explain at least -some- of the stupid route announcements. It would not explain why AS56630 seems to have decicated quite such a lot of their IPv4 address space... or that of their "customers"... to hosting what is rather clearly snowshoe spamming operations. Nor would it explain the original hijack that I asked about, nor a few other equally fishy looking historical route announcements that I am presently looking at. Regards, rfg
participants (6)
-
ac
-
Carlos Friaças
-
Gert Doering
-
Ronald F. Guilmette
-
Siyuan Miao
-
Suresh Ramasubramanian