![]() ![]() ![]() ![]() |
|
insane:pristle:
The client has already asked about other provider options.
If the client is actively taking part in the cause of the issue, then perhaps they should be looking inwards before looking outwards? As far as I know every ISP has rights to kick users off who are affecting their service/core infrastructure.
Unless I've misunderstood what your issue is.
Please note all comments are from my own brain and don't necessarily represent the position or opinions of my employer, previous employers, colleagues, friends or pets.
Keef: I was advised to check the DNS entries in the router, it seems they may have retired / disabled some DNS servers over the weekend.
Primary 122.56.237.1 ns1.xtra.co.nz Secondary 210.55.111.1 ns2.xtra.co.nz http://www.spark.co.nz/help/internet/manually-change-your-dns-server-setting/
Please note all comments are from my own brain and don't necessarily represent the position or opinions of my employer, previous employers, colleagues, friends or pets.
Talkiet:
Without getting involved in every individual customer issue, I should clarify what in this case 'blocking' or 'kick users off' means.
If users were specifically identified as sending a lot of DNS lookups to OUR DNS servers for specific (and very precise/odd/uncommon) domain names which had huge responses, their access to our primary DNS infrastructure was blocked. THOSE users could still use Google DNS etc.
There are a few types of router on the network (not large numbers / NOT Telecom/Spark supplied) that refuse to play nice with one of the network level mitigations we carried out over the weekend. This is because those old routers do not implement their DNS relay in according to current (or even moderately old) best practises. We are speaking with the vendors involved right now. These users will need to put DNS settings on their client devices directly in order to access the Internet. We can't release the list of affected routers right now.
There's a crazy chance you might fall into both categories- I haven't done the corss reference, but it's unlikely.
We have ABSOLUTLEY NO INTENTION of kicking people off the service permanently as a result of the issues, or the inadvertent participation in the amplification attack. We've only done what we've done to stabilise the network for everyone.
I understand that if you have been hit by either of these mitigation processes it will be annoying, but the helpdesk DOES have processes to help in either case.
Cheers - N
pristle:
Blaming the non 'Telecom"/"Spark" routers is a bit of a cop out. If there was a vulnerablility in them, why was this not picked up in the Telepermit process?
My views are my own, and may not necessarily represent those of my employer.
cbrpilot:pristle:
Blaming the non 'Telecom"/"Spark" routers is a bit of a cop out. If there was a vulnerablility in them, why was this not picked up in the Telepermit process?
Just a point of clarification I would like to add here so as people understand what a Telepermit is and what it is not.
A Telepermit is a Permit to Connect (PTC). What that means is that it has been tested and proved that it will not electrically interfere with or damage the infrastructure that it is directly connected to - in the case of DSL, the copper network, and the Chorus DSLAMs. The device is not tested to make sure it works. It is not tested to make sure that it has no security vulnerabilities etc. It just means that it is safe to connect to the network. If you connect a non-Telepermitted device to the network, and it damages a Chorus DSLAM, you would be legally liable for that damage. If it was a Telepermitted device, I understand that in the same circumstance, you would not be legally liable.
So from the point of view of device operations (i.e. that it actually works) and security, that responsibility rests solely with the supplier of that device.
Talkiet:
While using the Google DNS servers is a perfectly reasonable short term fix, you will likely be directed offshore for Akamai content, although Youtube content should still come from an optimal location.
cyril7: Just like to update that with the help of Spark staff who frequent here (thanks guys) the schools router was removed from the blacklist, it would seem that a machine in the school seems to be infested with malware that took part in an amplification attack, naturally I have requested the site admin take a look into that aspect.
Cheers
Cyril
nickt1: I am just thankful I am not running a major business enterprise otherwise...
quickymart:nickt1: I am just thankful I am not running a major business enterprise otherwise...
...you would be using a business-grade connection?
|
![]() ![]() ![]() ![]() |