Re: [anti-abuse-wg] Proposal: Publish effective users' abuse-c
Hi Alessandro On Fri, 21 Jan 2022 at 13:03, Alessandro Vesely wrote: > > Hi Denis, > > I followed the discussion, and got a rough idea of how it works. At the time, > I succeeded convincing my ISP (Eutelia) to assign an abuse-mailbox to me. > Afterwards the policy changed, but meanwhile my ISP went belly up and I > couldn't convince the new one to set abuse-c for me. > > The idea is to add extra addresses to assignment objects, irrespective of the > resource holder, based on the wish of its customer who is actually connected > to > the resource. Would that be at all possible? When you say " irrespective of the resource holder, based on the wish of its customer" do you mean without their consent or control? That is not possible as they maintain the assignment object. I would also say it is not desirable. That would allow an abuser to override the resource holders abuse-c and ignore all abuse reports. > And, if yes, would it be > acceptable by the resource holder or are there contractual impediments? > Finally, if feasibility is ok, would operators take advantage of it or is it > only me? If you are talking about adding extra abuse addresses to assignment objects by agreement with the resource holder, as I explained, that is possible now by simply adding an abuse-c to the assignment . cheers denis co-chair DB-WG > > > Best > ale > > > On Thu 20/Jan/2022 16:18:10 +0100 denis walker wrote: > > Hi Alessandro > > > > Do you realise that abuse-c works hierarchically? The resource holder > > is required to have an abuse-c in their ORGANISATION object as a > > default. It was agreed by the community a few years ago to allow > > additional abuse-c attributes in the resource objects. So if an end > > user wants to receive abuse reports for their network the resource > > holder can add an additional abuse-c attribute into the assignment > > object (which is usually maintained by the resource holder). The abuse > > ROLE object can be maintained by the end user so they can set their > > own abuse email address. A query will only return the closest abuse > > email address to any given IP address. So for any address in the end > > user's range it will return their abuse email. > > > > cheers > > denis > > co-chair DB-WG > > > > On Thu, 20 Jan 2022 at 13:37, Alessandro Vesely wrote: > >> > >> Hi all, > >> > >> we all know abuse-c data is to be filled by the IP assignee, which I call > >> ISP > >> in the following. > >> > >> I understand that, since ISPs own IP space it is their job to ensure that > >> it > >> isn't abused. If they give up the receiving of abuse complaints and give > >> it to > >> their customer instead, and they don't receive the complaints as a result, > >> then > >> they won't be aware if their customer is violating important policies. > >> > >> However, it is the ISPs' customers who are the effective users of those > >> IPs. > >> Any complaint, whether reporting spam or botnet activity, can probably be > >> handled more effectively by the people who run the systems connected to a > >> given > >> IP than the actual owner. > >> > >> I propose that RIPE accepts abuse-c email addresses from verified effective > >> users of a range of IP numbers, stores them in the database, and serves > >> them in > >> RDAP/ WHOIS queries besides the abuse-c addresses provided by the ISP. > >> Various > >> automated methods can be adopted to allow an effective user to be > >> verified; for > >> example publishing an HTTP URL or a DNS entry. Abuse contacts added that > >> way > >> can expire after a few months, forcing the effective user to renew them, > >> so as > >> to avoid stale entries. > >> > >> I'm unsure if the above requires proposing a new policy or what else. For > >> the > >> time being, it would be interesting to gauge if this WG likes the idea and > >> if > >> there are effective users, apart from me, who would be interested in > >> publishing > >> their abuse-c. > >> > >> > >> Best > >> Ale > >> -- > >> > >> > >> > >> > >> > >> -- > >> > >> To unsubscribe from this mailing list, get a password reminder, or change > >> your subscription options, please visit: > >> https://lists.ripe.net/mailman/listinfo/anti-abuse-wg > > -- To unsubscribe from this mailing list, get a password reminder, or change your subscription options, please visit: https://lists.ripe.net/mailman/listinfo/anti-abuse-wg
Re: [anti-abuse-wg] Proposal: Publish effective users' abuse-c
Am 20.01.22 um 13:37 schrieb Alessandro Vesely: However, it is the ISPs' customers who are the effective users of those IPs. Any complaint, whether reporting spam or botnet activity, can probably be handled more effectively by the people who run the systems connected to a given IP than the actual owner. In a considerable amount of cases, the ISP's customer is also the spammer. I would prefer not to talk to them when complaining about their behavior - in the best case, they will ignore me, in the worst case, they might do something in revenge. The IP owner is the one who can pull the plug on misbehaving customers. As it is much easier to identify IP owners, I can collect reputation data about who I can trust to handle my abuse complaint responsibly, who will just ignore it, who will forward it unedited to their customer. Depending on this assessment of their trustworthiness, I will or won't report. There are very few cases where reporting to end users makes much sense. Either they operate their system responsibly including monitoring the mail rejects and bounces, then they already know there's something that needs to be fixed, or they don't, and most often don't care, and my complaint will probably not change that. Cheers, Hans-Martin -- To unsubscribe from this mailing list, get a password reminder, or change your subscription options, please visit: https://lists.ripe.net/mailman/listinfo/anti-abuse-wg
Re: [anti-abuse-wg] Proposal: Publish effective users' abuse-c
Hi Ángel, On Thu 20/Jan/2022 16:27:59 +0100 Ángel González Berdasco wrote: Alessandro Vesely wrote: I propose that RIPE accepts abuse-c email addresses from verified effective users of a range of IP numbers, stores them in the database, and serves them in RDAP/ WHOIS queries besides the abuse-c addresses provided by the ISP. Various automated methods can be adopted to allow an effective user to be verified; for example publishing an HTTP URL or a DNS entry. Abuse contacts added that way can expire after a few months, forcing the effective user to renew them, so as to avoid stale entries. I think you should describe how this proposal differs from what is available nowadays. Wouldn't they already be able to configure verified effective users for the IP addresses (e.g. with an abuse-c of the client and another of theirs) ? They may be unwilling to do so or consider it a hurdle, requiring them to create new objects and so on, but what makes you believe they would be willing to use that new system? Curiously, IME, they're keen on doing RFC 2317 delegations, but refrain from assigning abuse-c attributes. I don't know if those belong to different departments or if there's just a different policy. The concept that they are safer holding abuse-c for themselves was expressed on mailop recently. If I were an ISP, I'd set up different abuse-c addresses for each customer, something like abuse-customer@isp.example, with possible auto-forward to a customer supplied address. But I'm not. RDAP allows some leeway in responses, so that something could be set to indicate whether a vcard entry belongs to the ISP or to the final operator. I don't think ARIN or other RIRs are already featuring that kind of facility. Is it because nobody asked? Best Ale -- -- To unsubscribe from this mailing list, get a password reminder, or change your subscription options, please visit: https://lists.ripe.net/mailman/listinfo/anti-abuse-wg
Re: [anti-abuse-wg] Proposal: Publish effective users' abuse-c
Hi Denis, I followed the discussion, and got a rough idea of how it works. At the time, I succeeded convincing my ISP (Eutelia) to assign an abuse-mailbox to me. Afterwards the policy changed, but meanwhile my ISP went belly up and I couldn't convince the new one to set abuse-c for me. The idea is to add extra addresses to assignment objects, irrespective of the resource holder, based on the wish of its customer who is actually connected to the resource. Would that be at all possible? And, if yes, would it be acceptable by the resource holder or are there contractual impediments? Finally, if feasibility is ok, would operators take advantage of it or is it only me? Best ale On Thu 20/Jan/2022 16:18:10 +0100 denis walker wrote: Hi Alessandro Do you realise that abuse-c works hierarchically? The resource holder is required to have an abuse-c in their ORGANISATION object as a default. It was agreed by the community a few years ago to allow additional abuse-c attributes in the resource objects. So if an end user wants to receive abuse reports for their network the resource holder can add an additional abuse-c attribute into the assignment object (which is usually maintained by the resource holder). The abuse ROLE object can be maintained by the end user so they can set their own abuse email address. A query will only return the closest abuse email address to any given IP address. So for any address in the end user's range it will return their abuse email. cheers denis co-chair DB-WG On Thu, 20 Jan 2022 at 13:37, Alessandro Vesely wrote: Hi all, we all know abuse-c data is to be filled by the IP assignee, which I call ISP in the following. I understand that, since ISPs own IP space it is their job to ensure that it isn't abused. If they give up the receiving of abuse complaints and give it to their customer instead, and they don't receive the complaints as a result, then they won't be aware if their customer is violating important policies. However, it is the ISPs' customers who are the effective users of those IPs. Any complaint, whether reporting spam or botnet activity, can probably be handled more effectively by the people who run the systems connected to a given IP than the actual owner. I propose that RIPE accepts abuse-c email addresses from verified effective users of a range of IP numbers, stores them in the database, and serves them in RDAP/ WHOIS queries besides the abuse-c addresses provided by the ISP. Various automated methods can be adopted to allow an effective user to be verified; for example publishing an HTTP URL or a DNS entry. Abuse contacts added that way can expire after a few months, forcing the effective user to renew them, so as to avoid stale entries. I'm unsure if the above requires proposing a new policy or what else. For the time being, it would be interesting to gauge if this WG likes the idea and if there are effective users, apart from me, who would be interested in publishing their abuse-c. Best Ale -- -- To unsubscribe from this mailing list, get a password reminder, or change your subscription options, please visit: https://lists.ripe.net/mailman/listinfo/anti-abuse-wg -- To unsubscribe from this mailing list, get a password reminder, or change your subscription options, please visit: https://lists.ripe.net/mailman/listinfo/anti-abuse-wg