[HN Gopher] Millions of the Pentagon's dormant IP addresses spra...
       ___________________________________________________________________
        
       Millions of the Pentagon's dormant IP addresses sprang to life on
       January 20
        
       Author : jimschley
       Score  : 328 points
       Date   : 2021-04-24 14:02 UTC (8 hours ago)
        
 (HTM) web link (www.washingtonpost.com)
 (TXT) w3m dump (www.washingtonpost.com)
        
       | throwaway2474 wrote:
       | Can someone explain how we know these "announcements" are real?
       | What's to stop me setting up a company and announcing random
       | dormant address ranges that I don't own?
        
       | ThothIV wrote:
       | Also adding 255.0/8 and 255/4 which is essentially just... IPV6.
       | So we're finally going ipv6, I guess!
        
       | yftsui wrote:
       | Previous story in 2015:
       | https://news.ycombinator.com/item?id=10006534 . This article is
       | exaggerating by saying it happened overnight, which started
       | actually 5 years ago.
        
         | frombody wrote:
         | Global Resource Systems LLC was only created in September of
         | last year.
         | 
         | It is very much worth asking who this legal entity is and why a
         | private company is better suited to these efforts than the
         | government.
        
           | yftsui wrote:
           | I read the article but I believe the key point is since when
           | 11.x.x.x stopped being dormant addresses, instead of these
           | IPs just transferred ownership but not "dormant".
           | 
           | As an interesting fact, when searching "aliyun 11.0.0.0"
           | which is the mentioned Chinese cloud provider I believe, they
           | apparently has been using that as internal IPs since 2015 as
           | well
        
           | jessriedel wrote:
           | In practice the US government is constrained from paying
           | market rates for tech talent. It can either hire companies to
           | complete the entire project, or it can hire a consulting
           | service (which skims off a massive overhead) to provide
           | technical talent inside a government agency.
        
         | [deleted]
        
       | jvdvegt wrote:
       | Paywall-free link: https://archive.is/tKOOA
        
         | codeproject wrote:
         | Thanks a lot, Appreciate. It is not I don't want to pay the
         | washingtonpost.com. I just don't have time to read them.
        
           | GekkePrutser wrote:
           | https://github.com/iamadamdev/bypass-paywalls-chrome also
           | really works well on the desktop. Unfortunately I haven't
           | found a way to get it working on Firefox on mobile (the
           | chrome repo also contains the FF one now ;) ). Thanks for the
           | archive link.
           | 
           | PS I understand that websites need to monetise.. But getting
           | a subscription to read one linked article per month or so is
           | just not going to happen. The sites I use a lot I do pay a
           | membership for.
        
             | fwn wrote:
             | You need Firefox 68 ( fennec 68.11.0 ) to use extensions
             | from the open internet. Mozilla axed general extension
             | support in later versions of their android browser.
             | 
             | I just keep it around next to my regular browser for the
             | occasional paywall.
        
               | GekkePrutser wrote:
               | Thanks, I'm not sure if I want to run a browser that old
               | though... Security-wise. Even if it's probably ok now,
               | it's never going to get updated.
               | 
               | I wish they just supported sideloading of extensions. I
               | wonder how developers are supposed to test their stuff on
               | mobile.
        
             | bagacrap wrote:
             | perhaps you should consider getting a subscription one
             | month per year and using the extension the other 11 if you
             | think that's a more fair price to pay
        
               | GekkePrutser wrote:
               | Good point. But I'm not sure if I'd do this with the
               | Washington post. I wouldn't normally read this unless
               | it's linked from somewhere else (I live in Europe).
               | 
               | I actually had an online subscription to the Guardian for
               | a while because they were really good on the privacy
               | advocacy news. I wanted to support a paper with deep
               | dives into privacy issues. However the last couple of
               | years I got annoyed with too much Brexit stuff (not
               | surprising for a UK based paper obviously but as I don't
               | live in the UK I don't want to read about it every day).
               | So I let it lapse.
               | 
               | But there's another thing holding me back. If I subscribe
               | I have to give all my personal details. I don't want to
               | have too many sites where I have that around, data leaks
               | are now happening too often. Even a couple days ago I got
               | yet another notification from haveibeenpwned (this time
               | it was the Spanish company phonehouse.es that was hit).
               | 
               | Anyway, I just wanted to say that while I use paywall
               | avoiding tools I'm not blind to the problem of
               | monetisation and the cost of real journalism :)
        
           | uptown wrote:
           | They'll actually take your money whether you read it or not.
        
           | joezydeco wrote:
           | If you have Amazon prime, it's half price and free for the
           | first month.
        
           | pelagic_sky wrote:
           | Thank you! Had to use Safari on mobile as the captcha did not
           | play well with Firefox.
        
             | gitowiec wrote:
             | Google recaptcha? I get the same problem continuously on FX
             | desktop and Android :(
        
               | GekkePrutser wrote:
               | Really? I use Firefox literally all the time (with the
               | minor exception of some internal work sites where they
               | require Edge) and while all captchas annoy me to no end,
               | recaptcha does work perfectly fine on Firefox even with
               | uBlock origin and pihole running. Both on Desktop (I use
               | FF on Windows, Mac, Linux and FreeBSD :) ) and on
               | Android.
               | 
               | What is the problem you're seeing?
               | 
               | In fact I really rarely have any issues with FF
               | whatsoever, and if I do it is always either uBlock Origin
               | blocking a little bit too much, or a site that
               | specifically rules out Firefox (like
               | https://business.apple.com ), probably for no real reason
               | other than not bothering to test their site with it.
        
           | rch wrote:
           | I've tried subscribing to a few news sources, including WaPo,
           | but I can't handle the political agendas (right, left, or any
           | of it).
           | 
           | I've had better luck with subscription based aggregators, but
           | nothing exciting enough to want to plug one in particular.
           | 
           | Always looking for new options to try.
        
             | dogman144 wrote:
             | Yeah all the news sources my parents sub'd to in the early
             | 00s and I sort of figured I'd sub to as well once ready are
             | aggravatingly narrative driven. I'm not sure if I never
             | noticed that, or if it's a new media approach, but I don't
             | need "baseball + narrative injection" articles in my life.
             | I'm actually fairly bummed out about this, I go to Reuters
             | now.
        
               | anigbrowl wrote:
               | News coverage has always been narrative driven to some
               | extent, but previously that was more in selectivity of
               | coverage. The quality of reporting has been in a long
               | slow decline due to a mix of sagging finances and low-no
               | quality control competition. The 'Action News' TV format
               | significantly degraded things, and then blogs and
               | specifically conservative-targeted media drove adoption
               | of the narrative approach.
               | 
               | This revealing interview gives an interesting perspective
               | on the media business around the turn of the century.
               | Note that this is a pdf archive copy saved to draw
               | attention to a particular segment, and I'd urge you
               | ignore that and rad the whole thing. I can't link to the
               | original as it vanished some time ago, and this archive
               | predates the establishment of the internet archive. Thus
               | the presentation is biased (sorry) but it's the only
               | complete copy of the interview I know of. https://zfacts.
               | com/zfacts.com/metaPage/lib/Weekly_Standard_M...
        
             | deanCommie wrote:
             | I think the key question isn't which political agenda they
             | have, but whether they report facts or opinions.
             | 
             | In that regard, WaPo is pretty good but you can still do
             | better: https://www.adfontesmedia.com/static-mbc/
        
               | axaxs wrote:
               | It's not nearly that simple. You can essentially print an
               | opinion based only in fact, both by picking carefully
               | which stories you cover, and also which details of which
               | story you choose to report. It's completely possible to
               | frame the exact same story as either left wing or right
               | wing using only facts.
               | 
               | If you want recent proof, look at that debacle with that
               | Toledo kid. Some reported police shoot an armed thug,
               | some report police shoot an unarmed kid. The video proof
               | shows neither side is telling the whole truth.
        
               | ufmace wrote:
               | That isn't really how it works anymore. It's possible
               | (and standard) to push any political agenda without ever
               | stating an opinion directly. It's all about which
               | specific facts you choose to report and which you choose
               | to ignore. It's very easy to select and report only facts
               | that make group A look good, or only facts that make them
               | look bad. In that way, 2 news sources can give people the
               | opposite opinion without anyone ever stating an opinion
               | or saying something that isn't true.
        
               | frogpelt wrote:
               | And furthermore, public sentiment (and therefore
               | elections) are decided by what the main sources of media
               | determine is the most important news.
               | 
               | Example: Cops have shot a thousand people a year for
               | several years in a row (maybe a decade). About 300 of
               | those each year have been black, which is a
               | disproportionate amount by some measures.
               | 
               | However, it is nowhere near the biggest problem in our
               | country even for black people. But because the media has
               | chosen to report on that problem near constantly since
               | Colin Kaepernick took a knee, it has dominated the public
               | consciousness and therefore influences thousands of
               | people to loot, burn, protest, riot and thousands more to
               | develop opinions and attitudes that create more and more
               | division in our country.
               | 
               | Most of what they report is factual but is it as
               | important as the lofty position they are giving it in the
               | news? Is it helping?
        
               | shigawire wrote:
               | Yes - cops should kill fewer people.
        
             | crooked-v wrote:
             | Every news source of any kind has some sort of bias. The
             | only way to escape that completely is to live alone in the
             | woods as a hermit.
        
           | dkdk8283 wrote:
           | It's the principle for me. I won't support any publication
           | with obvious bias.
        
             | crooked-v wrote:
             | Everyone has bias of one kind or another.
        
             | atat7024 wrote:
             | Do you pay for the Financial Times/WSJ?
        
             | mitchdoogle wrote:
             | All news outlets are biased. Choosing what to report is
             | part of bias. Nobody has the resources to report on every
             | possible news story. There is even such a thing as
             | "centrist bias". Better to choose a few reputable
             | publications with different bias (according to FAIR or
             | whoever) if you want a more balanced approach.
        
       | williesleg wrote:
       | Aah, the wapo, that's Bezos, isn't it?
        
       | dr_dshiv wrote:
       | "large amounts of data could provide several benefits for those
       | in a position to collect and analyze it for threat intelligence
       | and other purposes"
        
         | smoldesu wrote:
         | Another great example of computer literacy in the world of
         | journalism.
        
       | LogicX wrote:
       | Related: https://news.ycombinator.com/item?id=26924988
        
       | echelon wrote:
       | I want to reply to the following dead comment [1]
       | 
       | > Aah, the wapo, that's Bezos, isn't it?
       | 
       | It actually doesn't seem that unreasonable to me that a company
       | as large as Amazon sees vast, unused resources held by the
       | government. They publish an article as a sort of "wink wink,
       | nudge nudge" to see if they can get it put up for auction.
       | 
       | In fact, I'd be shocked if someone at Amazon or another company
       | hasn't tried to ask the Pentagon about this.
       | 
       | > Russell Goemaere, a spokesman for the Defense Department,
       | confirmed in a statement to The Washington Post that the Pentagon
       | still owns all the IP address space and hadn't sold any of it to
       | a private party.
       | 
       | I bet they'd find a buyer if they wanted to sell.
       | 
       | edit: Downvotes? Really? I'm just trying to start a conversation
       | on something I find interesting.
       | 
       | [1] https://news.ycombinator.com/item?id=26925616
        
         | judge2020 wrote:
         | I think the downvotes come from entertaining the idea that,
         | because WAPO writes about something, that it's ultimately in
         | order to further the interests of AWS/Amazon/Bezos. This is not
         | really supported by evidence, so any "conversation" regarding
         | this is pretty much useless and helps nobody.
        
         | 1MachineElf wrote:
         | Had Amazon won JEDI, a significant chunk of those IPs would
         | exist on their infrastructure.
        
           | bushn1989 wrote:
           | JEDI was a deal for internal cloud infrastructure. I don't
           | think they would be utilizing public IP address ranges.
        
         | pelagic_sky wrote:
         | I don't know why you're being down voted. It's an interesting
         | idea.
        
           | hobs wrote:
           | I didnt downvote, but random speculation with no evidence
           | doesn't get upvotes on hacker news; a discussion of things
           | you find interesting that others find baseless with get you
           | downvotes immediately.
        
             | blux wrote:
             | Well, the article sort of requires discussion on what might
             | be happening here, not?
        
           | cmeacham98 wrote:
           | "edit: Downvotes? Really?" is a surefire method of attracting
           | downvotes.
        
             | echelon wrote:
             | I got -4 in downvotes. (-2 before my edit.) I don't know
             | what's going on.
             | 
             | I understand when I call out Apple or Google for bad
             | behavior that I can attract downvotes. Sometimes my posts
             | are snarky, and I understand in that case too.
             | 
             | But I can point to instances where posts I made days ago
             | were all downvoted in unison. Or completely informational
             | threads where every single one of my comments gets a
             | downvote or two.
             | 
             | Just a few days ago I got downvoted the second after I
             | posted a comment. I spotted a typo immediately after
             | submitting, clicked edit, and found myself downvoted before
             | anyone could have possibly even read my comment (it was
             | long). Maybe it was a mis-click -- who knows? But it was
             | great feedback after having just submitted. And in concert
             | with all the other recent downvotes, it's frustrating...
             | 
             | I've been sitting at the same "karma" value for months, and
             | I don't think I'm being a bad member of the community.
             | 
             | It's more than likely noise, but it's got me rattled. It's
             | not actionable feedback. With the pandemic and lack of
             | social contact with other engineers, and this sort of
             | judgement, I don't like it. I honestly don't think I'm
             | being a nuisance.
             | 
             | (And here this comment is with downvotes and no comments.
             | Sigh.)
        
               | ufmace wrote:
               | I upvoted, if nothing else it's a perfectly reasonable
               | comment with an interesting hypothesis.
               | 
               | HN karma is a little weird. IMO, if you've never been
               | downvoted to -4, then you've never said anything really
               | interesting. It's easy to just tell the crowd what they
               | want to hear, saying true and important things doesn't
               | always go down so well. Don't sweat it too hard.
               | Sometimes posts do acquire downvotes at suspicious times
               | and rates. Makes me wonder if some external orgs managed
               | to build downvote bots for HN or are directing voting
               | somehow.
        
               | WalterGR wrote:
               | You already got feedback in hobs's comment. They wrote:
               | 
               | "I didnt downvote, but random speculation with no
               | evidence doesn't get upvotes on hacker news; a discussion
               | of things you find interesting that others find baseless
               | with get you downvotes immediately."
        
               | ratsmack wrote:
               | Speculation is part of the conversation.
        
         | regextegrity wrote:
         | Don't criticise lord bezos
        
         | [deleted]
        
       | dang wrote:
       | Related: https://www.kentik.com/blog/the-mystery-of-as8003/
       | 
       | (via https://news.ycombinator.com/item?id=26924988, but no
       | comments there to speak of)
        
       | pgn674 wrote:
       | "several Chinese companies use network numbering systems that
       | resemble the U.S. military's IP addresses in their internal
       | systems"
       | 
       | I don't think I've heard of this before. What does it mean? Does
       | China operate a disconnected BGP network? Or do they have some
       | modified protocol, or what?
        
         | fred256 wrote:
         | Not just Chinese companies. I know of one FAANG company that
         | used internal IP addresses in the 11.0.0.0/8 space (in addition
         | to, not instead of, RFC 1918 space).
        
           | walrus01 wrote:
           | Every time I've seen this it's because of inefficient and
           | wasteful use of 10/8 internally. Like, not every tiny site or
           | thing needs a /24. Once the wasteful use becomes entrenched
           | as a practice, it would be very labor intensive and time-
           | consuming to go on a renumbering plan. As compared to the
           | effort to just use 11/8.
           | 
           | And then ultimately because of refusal to get over the
           | technical hurdle of using IPv6 for internal management.
        
             | knorker wrote:
             | But have you seen inside of FAANG?
        
           | snowwrestler wrote:
           | Well I would hope it's not Apple since they already own all
           | of 17.0.0.0... one of only 7 private companies that own their
           | own /8, as far as I know.
        
         | nanliu wrote:
         | Alibaba for example use DoD address ranges for their management
         | servers running Alicloud services. They assumed since nothing
         | in their cloud platform would connect to those addresses they
         | can use these them to alleviate IPv4 shortage. In Alicloud, the
         | customer have the right to use any RFC1918 addresses, so they
         | had to be creative since they didn't have sufficient IPv4
         | addresses.
        
           | sterlind wrote:
           | but if they're not filtering BGP announcements for those
           | ranges (however unlikely), and the GFW isn't blocking traffic
           | out to those addresses (even more unlikely), and the internal
           | metrics were high (super unlikely), I guess it'd slurp out
           | all the traffic? maybe this was a weird smash-and-grab.
        
         | walrus01 wrote:
         | Lots of less clueful network operators worldwide have used the
         | DoD /8 IP blocks internally, under the impression that they'll
         | never show up in the global v4 routing table, essentially for
         | the same purposes that people would use the 10/8 RFC1918
         | blocks.
        
           | jeroenhd wrote:
           | Some of those less-cluefull operators include Juniper and
           | Azure[1], Cisco[2][3], and probably many other companies.
           | When Cloudflare put its 1.1.1.1 DNS server into use, it
           | started receiving huge amounts of packets destined to
           | unroutable addresses because the 1.0.0.0/8 space was
           | (mostly?) unused.
           | 
           | If you configure your routers correctly, none of these IP
           | addresses should resolve, anyway. If something in your
           | network is intentionally dialing the department of defence,
           | you probably have some kind of problem at hand. In theory
           | this might become a huge problem, but in practice it probably
           | won't.
           | 
           | [1]: https://www.juniper.net/documentation/en_US/vmx/informat
           | ion-...
           | 
           | [2]: https://www.ciscolive.com/c/dam/r/ciscolive/us/docs/2017
           | /pdf...
           | 
           | [3]: https://security.stackexchange.com/questions/157682/why-
           | does...
        
             | LinuxBender wrote:
             | I know of a couple companies that used 1.0.0.0/8 as their
             | internal VPN/WAN network. Myself and others explained why
             | this could be problematic but we were ignored. It's
             | actually _mostly_ fine as long as you 1) never need to
             | reach that network and 2) block traffic in that network
             | from leaving your edge network and 3) triple-check that you
             | have blocked that network from ever being announced from
             | your routers. Downside being you have to double or triple
             | NAT to reach anything in that network. Hamachi uses _or
             | used_ 25 /8 _ministry of defense_ as their VPN network.
        
               | ev1 wrote:
               | T-Mobile used or uses UK MoD space also for NAT.
        
             | walrus01 wrote:
             | Juniper and Cisco are equipment vendors, not ISPs. If the
             | DOD /8s are used in some documentation examples, that's a
             | whole other thing.
             | 
             | If network operators are taking the theoretical network
             | blocks provided in training examples and attempting to copy
             | and paste them into real world use, that is a whole other
             | problem with training and education. And lack of oversight
             | by senior people who should know better at their company.
             | 
             | 1/8 is also a whole other thing because it's a legitimately
             | announced block controlled by, as I recall, APNIC. If it's
             | in some peoples' 20 year old bogon folded that's their
             | problem, not apnic's.
        
             | ethbr0 wrote:
             | What IPs does the DoD actually host defense-related
             | services on?
             | 
             | E.g. https://www.defense.gov/Resources/Military-
             | Departments/A-Z-L...
        
               | walrus01 wrote:
               | NIPR and SIPR don't talk to the global routing tables for
               | v4 and v6. Generally if a DOD person needs to access
               | commercial internet resources for things, it'll be
               | through a separate commercial network purpose LAN, or
               | through something like an rdp session to a Citrix thin
               | client to do that.
        
               | chipsa wrote:
               | I think you'd be surprised. Most NIPR computers just use
               | a regular proxy server for internet access. But example:
               | 214 /8 is a DoD owned block, and "weather.af.mil" is on
               | that block, and both externally and internally reachable.
        
               | walrus01 wrote:
               | Not that NIPR computers don't have access to the internet
               | - but because this isn't 1987, those individual
               | workstations would never have public facing DoD v4 IPs.
               | They'll always be behind some combination of NAT and
               | firewall or as you mentioned, proxy. Certainly there
               | could be some DoD public IP on the external interfaces of
               | said firewalls. If I had to guess very often the public
               | facing side of those boxes might be a commercially
               | acquired local ISP using that ISP's IP space, and not
               | actual DoD IP space...
        
         | photon-torpedo wrote:
         | If I remember correctly, one of the large Chinese
         | supercomputers (ex #1 in the TOP500) uses the 11.0.0.0 address
         | space for its internal network.
        
         | woah wrote:
         | These IP addresses were unused for a very long time, so using
         | them on internal networks worked fine. Once the Floridian
         | company in the article started announcing them, gateway routers
         | on the Chinese internal networks may have started sending their
         | traffic to Florida.
        
           | pgn674 wrote:
           | Ohh, I think I see. So instead of (or in addition to)
           | creating internal subnets inside 10.0.0.0/8, 172.16.0.0/12,
           | and 192.168.0.0/16, they set up subsets inside DoD's
           | 11.0.0.0/8 etc., and it worked out because there were no
           | external BGP announcements for those ranges. But now that
           | there are, if they did not explicitly configure their border
           | gateways to route those ranges inside their networks, the
           | traffic may now leak out to DoD's pilot effort.
        
             | jasonhansel wrote:
             | Maybe DoD is trying to catch security flaws caused by
             | traffic intended for _their own_ internal networks
             | accidentally reaching the public internet? Advertising
             | those IPs publicly and logging all traffic could be a good
             | way of detecting such bugs in DoD systems.
        
               | dannyw wrote:
               | It also explains the lack of public commentary.
        
               | jasonhansel wrote:
               | Indeed. Publicly commenting on it would expose the
               | potential vulnerability (i.e. the accidental leakage of
               | traffic onto the public internet).
        
               | capableweb wrote:
               | Not sure. If the government is doing something large-
               | scale in public (like construction projects [or maybe
               | global IP routing]), they should communicate what is
               | happening before doing it, in order to not phase people.
        
               | kelnos wrote:
               | Eh, I wouldn't be surprised if an org like the Pentagon
               | is secretive about things that aren't really necessary to
               | be secrets. It's just kinda in their nature to be that
               | way (kinda like Apple's default-secrecy about products
               | and features).
               | 
               | (Also, sorry to be That Guy, but this one always gets to
               | me: in the sense you've used it, it's "faze", not
               | "phase".)
        
               | dunmalg wrote:
               | I used to work in intelligence. "Secrecy creep" has long
               | been a serious problem inside DoD. How information get
               | classified has largely been left up to low level federal
               | bureaucrats, people my father used to angrily refer to as
               | "big haired women from Mississippi". Basically, they are
               | low level federal office drones, with minimal knowledge
               | about the actual content of classified programs, who re
               | left to determine how they are classified. They start
               | with the core information of a project and classify it
               | "Top Secret". Then they take all the peripheral
               | information of that project and classify it TS as well,
               | just to be safe, because it might overlap with the core
               | info, but they have no clue because they're a GS-4 clerk
               | from Boogerville with a high school diploma. Later as
               | more content is generated in a program, stuff peripheral
               | to the previous peripheral data, which realistically
               | should be classified "Confidential" at most, it too gets
               | classified as TS because of its proximity to the
               | previously over-classified peripheral data. Lather-Rinse-
               | Repeat for a few decades and you have huge swathes of
               | widely known, utterly inconsequential information
               | classified Secret or Top Secret.
        
               | MereInterest wrote:
               | Don't answer this if it isn't legal to answer, but do you
               | have any examples you can share? I can entirely picture
               | the process, and completely believe that it happens, but
               | I don't have a mental image of what the end result looks
               | like.
        
               | spiritplumber wrote:
               | There has been a brief period in my life when I did not
               | have the clearance to read code I was writing.
        
               | withinboredom wrote:
               | From my personal experience: a cat died. A very non-
               | important cat. It was the only thing of note in my
               | report.
        
               | dwarfsandstuff wrote:
               | A random cat's death got to be top secret? Oh gawd...
        
               | wbl wrote:
               | The top secret lunch: someone ate an orange at Los
               | Alamos. That orange was top secret. This actually makes
               | some sense.
        
               | ajross wrote:
               | Right, because if there's anything the Pentagon has been
               | known for over the past seven decades or so it's clear
               | publication and transparent disclosure of all its large
               | scale classified projects so as not to phase the public.
        
               | xwolfi wrote:
               | Reading what the DOD said "officially" it appears that
               | maybe they were just looking to see if these IP could be
               | registered, simply.
               | 
               | It sounds a bit weird they would have needed 170+M ips to
               | get a good attack sample from the internet if the ip are
               | contiguous, a few thousands would have sufficed. It
               | sounds very weird to expect "China" to suddenly route
               | Xi's dirty videos and why not Iran, Japan, everyone
               | suddenly routing craps there, it's not very targetted and
               | would cost quite a bit to read all the potential tcp
               | packets that got lost by bad WAN vs LAN priority
               | decisions in routers.
               | 
               | Also, it's one shot, so why now ? They would have just
               | lost a huge weapon, if true, in a very public manner, for
               | no particular visible threat, not precise target and at
               | great cost possibly.
               | 
               | I'm okay to believe this was possibly just an
               | inventory/activation exercise because someone noticed
               | they owned stuff they can't use until they register them.
        
             | hujun wrote:
             | it is very unlikely to for a company like Alibaba not
             | configuring their BGP right
        
           | Havoc wrote:
           | Why would you do that though when there are perfectly fine
           | internal address ranges available?
        
             | twic wrote:
             | In our case, we were setting up VPN tunnels to a partner,
             | who for some reason required that the addresses on our side
             | should (appear to be) public IP addresses. So we couldn't
             | use 10/8 or 192.168/16 in (that part of) our network.
             | 
             | They didn't actually need the addresses to be routable from
             | the public internet (that was the whole point of the VPN).
             | I think the requirement was really a way of making sure
             | they were unique. I'm sure they had several partners who
             | used 10/8 internally.
        
               | GekkePrutser wrote:
               | There's also 172.16/12 :) But yeah I agree. If you're
               | running a VPN for a large company it's kinda hard to
               | avoid such conflicts.
               | 
               | In my work we use 10.0.0.0/8 but of course some people
               | use the same at home even though 192.168/16 is way more
               | common. In general I find 172.16/12 the least common in
               | the field.
        
               | jamiek88 wrote:
               | I know the old Apple extreme and time machine routers
               | used to default to 10 rather than 192 ever since then
               | I've kept my internal routing within that block.
               | 
               | It just looks nicer to me which shows the power of Apple
               | and how easily I am influenced.
        
             | [deleted]
        
             | Godel_unicode wrote:
             | I suspect there are a decent number of network engineers
             | who think it's funny to use DoD IPs for their internal
             | network, especially given what their logging system will
             | probably tell them by default.
             | 
             | If you drive around with a WiFi stumbler running, you'll
             | run into networks with names like "UTAH DATA CENTER" and
             | "SIPRnet", etc for the same reason.
        
               | imwillofficial wrote:
               | I always hated seeing "FBI Surveillance Van"
               | 
               | Made me wanna climb out of my FBI Surveillance Van and
               | have a word with them.
        
               | leesalminen wrote:
               | Ha! "Unmarked white van" is the WiFi name at my local dog
               | daycare. I got a good laugh.
        
               | dwarfsandstuff wrote:
               | My wifi is called nsa_net
        
             | Denvercoder9 wrote:
             | Two things that come to mind are running out of private
             | address space (a /8 isn't that large), or wanting address
             | space that doesn't clash with other private networks (e.g.
             | to ensure a VPN doesn't overlap with home networks).
             | There's probably more reasons.
        
               | VLM wrote:
               | > running out of private address space
               | 
               | Classic merger "solution".
               | 
               | Company A uses 10/8 Company B uses 10/8, company A buys
               | company B and orders new subsidiary B to renumber into
               | 11/8 "All you have to do is change every first octet to
               | 11"
        
               | woleium wrote:
               | or, you know, use NAT to do so :)
        
               | WanderPanda wrote:
               | how would nat help in this case?
        
               | xxpor wrote:
               | If they're not actually using the whole /8 (highly
               | likely), you can setup a 1:1 NAT. basically from network
               | b, if you want to talk to network a, you find out the
               | address in 11/8 that corresponds to the 10/8 address and
               | vice versa. You can use split horizon dns to make it
               | mostly transparent.
               | 
               | Every networking problem in the world can be solved with
               | more NAT or more encapsulation :)
        
               | jandrese wrote:
               | You don't have to use every address in 10.0.0.0/8 to
               | effectively fill it up. If your corporate policy is to
               | assign a /16 to each floor of a building, and you have a
               | LOT of buildings it's pretty easy to fill up the space
               | even if most of the /16s are sparsely populated. It's
               | much easier to move on to the 11. space when you build
               | that new building that pushes you over than renumbering
               | your entire corporate LAN.
        
               | woleium wrote:
               | what you call 1:1 NAT is just called NAT by cisco, the
               | stuff most folks think NAT is is actually NAT+PAT (like
               | what you run on your home router with a single public IP)
        
               | chiph wrote:
               | It basically maps addresses visible on one interface to
               | those on a different interface. So you can route many
               | addresses on 10.x to a single 10.x address that is on a
               | different network.
               | 
               | https://www.cisco.com/c/en/us/support/docs/ip/network-
               | addres...
        
               | kenniskrag wrote:
               | or upgrade to ipv6 :)
        
               | ratsmack wrote:
               | or maybe ask the question regarding why we're not all
               | running ipv6.
        
               | kenniskrag wrote:
               | why?
        
             | mrkstu wrote:
             | In the case of a managed service provider I worked for,
             | using non-announced gov/mil space allowed us to inject
             | routes for monitoring purposes into the MPLS vrfs of our
             | customers so we could poll the routers without using our
             | own public space.
        
           | Godel_unicode wrote:
           | There are lots of examples of this type of "squat space"
           | being used for largely internal addressing in addition to rfc
           | 1918 space:
           | 
           | https://teamarin.net/2015/11/23/to-squat-or-not-to-squat/
        
         | motohagiography wrote:
         | If that were true, depending on path inforation, any botnet or
         | other traffic destined to those networks would end up in this
         | new AS8003 traffic sink, which would create a map of candidate
         | CCP assets to target on the internet.
         | 
         | You could do the same with any AS. I haven't looked into bgp
         | spoofing since about '99, but it seems to have matured since
         | then. The idea of using it as ephemeral canary/honeynet space
         | for tracking botnet C&C traffic seems like a reasonable play.
        
           | xwolfi wrote:
           | But the internet is not just CCP vs Captain America. I mean
           | my home network has random ips and a shit network admin, so I
           | will also send crap data to the DOD, from Hong Kong.
           | 
           | You imagine the work to figure out if my tcp heartbeats
           | between my torrent server and my nginx proxy are CCP botnets
           | or me misconfiguring my router ? From the same place kinda ?
           | And you imagine the amount of people we are in China that are
           | doing shit networking but not CCP-relevant things ?
           | 
           | And the amount of botnets we have in China that are to scam
           | each other that even the CCP doesn't want ? :D
        
             | ufmace wrote:
             | Yeah, that's why the stated explanation sounds weird.
             | 
             | Suddenly advertise this never-used block, and you're just
             | going to get a massive torrent of previously-internal
             | traffic from bazillions of organizations all over the
             | planet that used it for something internal and were
             | slightly lazy and didn't set up their routing quite right.
             | Probably 99.9% of it is of no use whatsoever to anyone
             | outside that org. It's tough to imagine that anyone thought
             | they'd get any useful information on any hostile CCP
             | activity by doing this.
             | 
             | I would also expect that any department doing hostile
             | things on the net would be at least smart enough to not let
             | any of their internal traffic leak out like that, no matter
             | who they actually worked for.
        
             | Forbo wrote:
             | I once had a client who decided to use an IP block that was
             | registered to APNIC for their internal network. Made for
             | quite the headache as I tried to track down why there was a
             | ton of traffic supposedly going to China and Japan. -__-
        
         | TechBro8615 wrote:
         | Way back when, I was working at a startup with little clue what
         | I was doing. Long story short, I setup a VPN network to connect
         | 600 devices through 8 wifi routers to a VPC. I used 11.0.0.0/8
         | because I didn't want to bother sorting through the conflicts
         | with 10.x, 192.168.x, and 172.x which were all used at various
         | places throughout the chain (e.g. the routers on 192, some
         | upstream services on 10.x and 172.)
         | 
         | All I had to do to make it work, IIRC, was add an ip routing
         | rule to prioritize our internal routing for traffic on
         | 11.0.0.0/8 instead of sending it over the default interface.
         | 
         | This solution worked fine, but it broke in weird ways and I
         | remember one time I did arp -a on one of the Amazon boxes and
         | saw some DoD registered addresses, which was a little alarming,
         | but I just chalked it up to my not understanding the details.
        
           | twic wrote:
           | I did the same with 51/8 back when that was owned by the UK
           | Department of Work and Pensions but not publicly routable.
        
       | client4 wrote:
       | T-mobile does the same thing.
        
       | tyingq wrote:
       | Still seems a bit odd to me. It doesn't explain why "GLOBAL
       | RESOURCE SYSTEMS, LLC" is involved. Poking around, the
       | individuals associated with that aren't government employees. The
       | company was formed 9/8/2020 in Delaware.
        
         | cronix wrote:
         | If I were to guess, because private companies aren't subject to
         | FOIA requests. It's a little trick the gov't has been doing for
         | some time now to avoid legitimate, legal scrutiny by the
         | public.
        
           | [deleted]
        
           | mattkrause wrote:
           | Outsourcing to private companies also (somehow) appeases the
           | "small government" folks, even when it costs more/works
           | worse.
        
             | kdmdmdmmdmd wrote:
             | Somehow? Money the spent is money in the economy, not in
             | the government. It's pretty easy to understand, I think.
        
               | CameronNemo wrote:
               | Alternatively, money is grifted for political patronage.
        
               | kdmdmdmmdmd wrote:
               | Huh i wonder how we can prevent that problem
        
         | ttul wrote:
         | Who are the people associated with that company? I'd like to
         | further investigate them.
        
           | tyingq wrote:
           | You can look up the company name on Florida's Division of
           | Corporations:
           | http://search.sunbiz.org/Inquiry/CorporationSearch/ByName
           | 
           | The Delaware company is registered there as a an "outside of
           | the state of Florida" entity operating in Florida. Some
           | actual people names are listed. I'm fairly confident it's the
           | same company, as the Plantation, FL address is there.
        
             | anigbrowl wrote:
             | Allow me to suggest looking up their donation history at
             | https://www.fec.gov/data/
        
         | sam36 wrote:
         | The answer is clear. They sprang to life right as Trump was
         | leaving office because Biden knew he would win and though his
         | company is registered in Delaware, it is actually just a
         | Chinese front.
        
           | Lammy wrote:
           | Imagine believing in nationality as anything more than high-
           | end sports teams for the elite.
        
         | chiph wrote:
         | When you want to do some secret squirrel stuff, you start a
         | small closely-held company.
         | 
         | Wait until you read about Air America - an actual airline
         | started by Claire Chennault (of Flying Tigers fame), that was
         | bought by the CIA in the post WW-II years and used to run
         | missions in Southeast Asia up until the mid 1970's.
         | 
         | https://en.wikipedia.org/wiki/Air_America_(airline)
        
         | Fnoord wrote:
         | Means nothing. Companies can be a front for a government.
        
           | tyingq wrote:
           | Well, yes, but I'm interested in "for what purpose, in this
           | specific case".
        
             | dathinab wrote:
             | The simplest would be to make sure the addresses are _not_
             | announced by the DoD, which depending on the thinks they
             | want to test could matter, or could be irrelevant.
        
       | gumby wrote:
       | This is a complete side point, but what does this sentence mean?
       | 
       | > Created in 2015, the DDS operates a Silicon Valley-like office
       | within the Pentagon.
        
         | splithalf wrote:
         | Open office plan, ping pong and bean bag chairs. Slogans on the
         | walls. Sit stand desks. Lots of h1b workers. Have you never
         | silicon valley'd?
        
         | dogman144 wrote:
         | DDS hires professional engineers at a special paygrade pegged
         | to their civilian pay stubs for a 2 year tour of duty fixing
         | pressing issues in DoD tech via pretty broad authority to
         | sidestep
         | 
         | A) the usual senior military slow-roll* in the way of these
         | fixes
         | 
         | B) the sh**y govt contractors who made the tech and usually get
         | paid to fix their own bad tech.
         | 
         | DDS Hires a lot of motivated engineers who would be in civil
         | service but for the $180k -> $90k paycuts and fear of
         | bureaucratic hell. It is run by one of the ~founders of
         | opentable who, post opentable riches, was flying on 9/11/01,
         | decided to join the Chicago PD as a result, did west Chicago
         | homicide until the PD discovered his past, he then stood up
         | Chicago's data-based policing technical approaches, and
         | eventually the Obama admin heads about him asked him to take
         | over DDS (iirc, +/- details there).
         | 
         | Cool stuff and I'd work for them in a second, probably need
         | another few years in private sector though.
        
           | kelnos wrote:
           | > _DDS hires professional engineers at a special paygrade
           | pegged to their civilian pay stubs_
           | 
           | I wish USDS would do this as well; I feel like they'd attract
           | a lot more talent. Although perhaps they want to attract
           | exactly the kind of talent who would take a big pay cut out
           | of a sense of service/duty.
           | 
           | > _Cool stuff and I'd work for them in a second_
           | 
           | For myself, while I recognize that military is a necessary
           | evil in the world we live in, and I have a ton of respect for
           | the people who put themselves in harm's way, working for an
           | org with a .mil address would be against my values. I'm so
           | torn, though, since (e.g.) the Internet itself came out of
           | the DoD. It's a hard pill to swallow for me sometimes that a
           | lot of essential civilian tech was originally developed by or
           | for the military.
        
             | jamiek88 wrote:
             | Theres a strong argument that people,with this outlook are
             | needed in DOD.
             | 
             | It's the whole those who seek power are least suited to it
             | schtick.
             | 
             | I understand your reluctance and you of course make your
             | own life choices but something to consider.
        
           | kingkilr wrote:
           | I don't know Brett super well so I can't speak to the rest of
           | his background, but it's not correct that the Obama admin
           | asked him to take over DDS.
           | 
           | DDS's founding head was Chris Lynch, who served in that role
           | until the middle of the Trump administration, when he left
           | government service and that's when Brett got the job.
        
             | dogman144 wrote:
             | There ya go. +/- details.
             | 
             | I saw him present on DDS and his backstory at BSidesLV a
             | few years ago and did a bit of non-profit govt<>tech
             | chatter with the team there.
             | 
             | Correct, it was in the middle of the Trump Admin.
        
           | gumby wrote:
           | This is quite interesting -- glad I asked!
        
             | dogman144 wrote:
             | The org has done really interesting things under a few
             | different political climates. To the extent it's
             | safe/neutral to say we're entering a more pro-govt can-do
             | env, I think they'll have a cool next 4 years as an org.
             | 
             | Some of the projects they talk about doing have huge value-
             | adds to technically underserved groups like military
             | families during mandatory base moves every few years. Those
             | groups are totally dependent on following the system as
             | designed (get your travel voucher here, your goods shipped
             | here, etc) and much of it depends on single option, very
             | janky govt, almost intranet-like, porfals. Iirc, one of
             | their projects was fixing a portal was leaking SSNs like
             | gangbusters. Normal times, that's a 6 month -> 10 year
             | process to work with the contractor. DDS did it fairly
             | quickly.
        
         | lotsofpulp wrote:
         | More money, I assume. The government does not want to raise all
         | programmers' pay, so instead of adjusting the pay schedules
         | that apply to everyone, they make a special group that the
         | normal pay schedules don't apply to.
         | 
         | I wonder if it came about because how much of a dumpster fire
         | the first version of healthcare.gov was for the premier of the
         | Affordable Care Act. That probably embarrassed a lot of people.
        
           | wslack wrote:
           | healthcare.gov's problem led to a rescue team, whose members
           | helped to start USDS, whose members helped to start DDS!
           | 
           | To your first point, it'd be more accurate to say that many
           | government offices often don't hire any programmers, which
           | can (among other issues) make it challenging for those
           | offices to select strong contractors.
        
         | soared wrote:
         | The first paragraph a job description gives some context to
         | their culture:
         | 
         | > How do you feel about the cloud? Specifically, what are your
         | thoughts on the cumulus clouds of Bespin? Do you believe Cloud
         | City is composed of only cumulus clouds? Do you have any idea
         | about what we are asking? If your answer is yes, definitely
         | read on. If no, still read on, but we might find your lack of
         | faith disturbing!
        
         | wslack wrote:
         | The office has a deliberately different type of culture.
         | 
         | Edit: more info at https://www.dds.mil/about
        
           | Angostura wrote:
           | This page suggests a really interesting way of organising
           | things: https://www.dds.mil/team
        
           | gumby wrote:
           | Thanks for that informative link. I had no idea.
        
       | tiernano wrote:
       | when digging though some of the IPs, i came across 22.0.0.0/8,
       | which if you look at the DNS tab of bgp.he.net
       | (https://bgp.he.net/net/22.0.0.0/8#_dns) shows a LOT of people
       | are "using" those IPs... which means a LOT of people wont be
       | happy that their sites, email, dns, etc, are now essentially
       | being blackholed... for me (I run AS204994), the traffic hits
       | Frankfurt (i peer with HE there) goes over their network though
       | Paris, then to Ashburn and then is blackholed... gone after
       | that... wondering how much traffic is being seen by he.net with
       | this...
        
         | icedchai wrote:
         | If they're using them for internal networks, they'll (probably)
         | work just like they did before. It's likely many folks are
         | using these as like private RFC-1918 addresses.
        
       | djoldman wrote:
       | https://outline.com/3HuXPj
        
       | coderholic wrote:
       | Some details about the ASN announcing the DoD prefixes:
       | https://ipinfo.io/AS8003
       | 
       | It looks like they're not just announcing 11.0.0.0/8 but also a
       | bunch of more specific routes, including 11.0.0.0/13 and
       | 11.0.0.0/24
       | 
       | It looks like currently their only peer is Hurricane Electric:
       | https://ipinfo.io/AS6939
        
         | cptskippy wrote:
         | One peer? Does that mean all that traffic is flowing through
         | Hurricane Electric?
        
       | [deleted]
        
       | drawkbox wrote:
       | > _Defense Digital Service (DDS) authorized a pilot effort
       | advertising DoD Internet Protocol (IP) space using Border Gateway
       | Protocol (BGP). This pilot will assess, evaluate and prevent
       | unauthorized use of DoD IP address space. Additionally, this
       | pilot may identify potential vulnerabilities. This is one of
       | DoD's many efforts focused on continually improving our cyber
       | posture and defense in response to advanced persistent threats.
       | We are partnering throughout DoD to ensure potential
       | vulnerabilities are mitigated._
       | 
       | Interesting, seems an effort to find out who was abusing ranges
       | that were exclusively allowed or disallowed based on the ranges.
       | Malware that tries to look like something else that uses a state
       | level IP range to evade blocking, or check for blocks.[1]
       | 
       | > _I interpret this to mean that the objectives of this effort
       | are twofold. First, to announce this address space to scare off
       | any would-be squatters, and secondly, to collect a massive amount
       | of background internet traffic for threat intelligence._
       | 
       | > _On the first point, there is a vast world of fraudulent BGP
       | routing out there. As I've documented over the years, various
       | types of bad actors use unrouted address space to bypass
       | blocklists in order to send spam and other types of malicious
       | traffic._
       | 
       | Cloudflare example shows how much traffic some of these ranges
       | that are included/excluded have when turned on.
       | 
       | > _On the second, there is a lot of background noise that can be
       | scooped up when announcing large ranges of IPv4 address space. A
       | recent example is Cloudflare's announcement of 1.1.1.0 /24 and
       | 1.0.0.0/24 in 2018._
       | 
       | > _For decades, internet routing operated with a widespread
       | assumption that ASes didn't route these prefixes on the internet
       | (perhaps because they were canonical examples from networking
       | textbooks). According to their blog post soon after the launch,
       | Cloudflare received "~10Gbps of unsolicited background traffic"
       | on their interfaces._
       | 
       | > _And that was just for 512 IPv4 addresses! Of course, those
       | addresses were very special, but it stands to reason that 175
       | million IPv4 addresses will attract orders of magnitude more
       | traffic. More misconfigured devices and networks that mistakenly
       | assumed that all of this DoD address space would never see the
       | light of day._
       | 
       | Looks like a new cybersecurity policy/process started on
       | inauguration day. Probably a defensive or offensive measure to
       | combat the supply chain attacks that may well have used those
       | ranges in evading blocking.
       | 
       | [1] https://www.kentik.com/blog/the-mystery-of-as8003/
        
       ___________________________________________________________________
       (page generated 2021-04-24 23:00 UTC)