[anti-abuse-wg] ORG-NL14-RIPE - Netcetera Limited (Isle of Man)

2024-09-05 Thread Ronald F. Guilmette
Please be advised that Netcetera Limited (Isle of Man) aka ORG-NL14-RIPE
does not currently accept spam reports if a complete copy of the spam
message being reported is included:

: host mx.spamexperts.com[38.89.254.156] said: 550 A URL
in this email (subrigneten . co . in) is listed on https://spamrl.com/.
Please resolve and retry (in reply to end of DATA command)
[ part 2 - message/delivery-status - Delivery report   474B (suppressed) ]
[ part 3 - message/rfc822 - Undelivered Message   16KB  ]
Number is required after -h


Relevant IP blocks for this network are as follows:

81.27.96.0/20
146.247.48.0/20
146.247.53.0/24
146.247.54.0/24
146.247.55.0/24
146.247.56.0/24


Regards,
rfg
-
To unsubscribe from this mailing list or change your subscription options, 
please visit: https://mailman.ripe.net/mailman3/lists/anti-abuse-wg.ripe.net/
As we have migrated to Mailman 3, you will need to create an account with the 
email matching your subscription before you can change your settings. 
More details at: https://www.ripe.net/membership/mail/mailman-3-migration/


Re: [anti-abuse-wg] Yet another BGP hijacking towards AS16509

2022-08-22 Thread Ronald F. Guilmette
In message 
, 
Siyuan Miao  wrote:

>Hjacking didn't last too long. AWS started announcing a more specific
>announcement to prevent hijacking around 3 hours later. Kudos to Amazon's
>security team :-)

Sorry.  I'm missing something here.  If the hijack was of 44.235.216.0/24, then
how did AWS propagate a "more specific" than that?


Regards,
rfg

-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


Re: [anti-abuse-wg] So many idiots. So little time.

2022-08-13 Thread Ronald F. Guilmette
In message , you wrote:

>Am 13.08.22 um 14:13 schrieb jer...@hackersbescherming.nl:
>> I would say perfect for that anti abuse training!
>
>Training is useful if you want to learn and achieve the training subject 
>matter. Serverius (like many other 
>hosting/colocation providers) is in the business of deflecting trouble from 
>their customers. In an old antispam forum 
>post I found this quote without exact source, which could be used verbatim by 
>most of them:
>
>> Serverius IT infrastructure is providing underlying infrastructure services 
>> without any hosting activities. Serverius 
>> is not a hosting provider as it has no data carrier hardware like servers or 
>> disk storage services under management 
>> (only our clients do). Serverius is only providing the parent data center 
>> colocation of client hardware and/or IP 
>> connectivity services that are used by clients to build their own 
>> infrastructure. Their services are used by millions 
>> of companies in the world. Therefore Serverius does not know what Serverius 
>> network users are hosting (it's 
>> technically impossible for us to see and forbidden by law) and Serverius is 
>> therefore not liable for what our customer 
>> hosts behind its own network and/or on his own infrastructure. 
>Legally, they may be right (of course they are not allowed to peek into their 
>customer's servers). However, there's 
>something more to it - you could have contract and AUP clauses which prohibit 
>spamming/abuse and give the provider 
>leverage to enforce that prohibition. But some providers apparently prefer to 
>keep such clauses out of their contracts 
>and don't want to waste money on abuse desk training because a well-paying 
>customer is a well-paying customer after all. 
>"Pecunia non olet", as Vespasian is reported to have said.

Digital Ocean apparently has the exact same sort of "Not our problem man!" 
attitude.

I've reported spams to them, and they say "OK, thanks.  We have forwarded this 
to our customer."

(Nice of them to do this so that their customer can then DDoS me.)


Regards,
rfg

-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


Re: [anti-abuse-wg] So many idiots. So little time.

2022-08-12 Thread Ronald F. Guilmette
In message , 
Hans-Martin Mosner  wrote:

>Idiots is the wrong choice of word here. Hanlon's Razor does not apply to 
>Serverius.

Thank you for this information.  I shall be adjusting my local blacklists
accordingly.

ORG-SHB2-RIPE:

5.178.64.0/21
5.188.12.0/22
5.255.64.0/19
46.249.32.0/19
89.47.1.0/24
91.221.69.0/24
93.158.200.0/21
93.158.208.0/20
160.20.152.0/22
178.21.16.0/21
185.1.222.0/23
185.8.176.0/22
185.12.12.0/22
185.53.160.0/22
185.79.112.0/22
194.107.76.0/22


-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


[anti-abuse-wg] So many idiots. So little time.

2022-08-12 Thread Ronald F. Guilmette
[ part 1 - text/plain - Notification  574B  ]
This is the mail system at host segfault.tristatelogic.com.

I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.

For further assistance, please send mail to postmaster.

If you do so, please include this problem report. You can
delete your own text from the attached returned message.

   The mail system

: host mail.serverius.net[91.221.69.174] said: 554 5.7.1
This message has been blocked because ASE reports it as spam. (in reply to
end of DATA command)
[ part 2 - message/delivery-status - Delivery report   435B (suppressed) ]
[ part 3 - message/rfc822 - Undelivered Message   23.2KB  ]
Number is required after -h
Return-Path: 
Received: by segfault.tristatelogic.com (Postfix, from userid 1237)
id 754EF4E7D0; Fri, 12 Aug 2022 14:59:24 -0700 (PDT)
From: "Ronald F. Guilmette" 
To: ab...@serverius.net
Cc: spamrepo...@tristatelogic.com
Subject: Spam from your network (AS50673): [194.104.236.160]
Date: 12 Aug 2022 14:59:24 -0700
X-Rfg-Spam-Report: (AS50673): [194.104.236.160]
Message-Id: <20220812215924.754ef4e...@segfault.tristatelogic.com>
...

-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


[anti-abuse-wg] Reclamation of Number Resources

2022-07-07 Thread Ronald F. Guilmette
Greetings all,

As many of you no doubt know, there has been quite an extraordinarily large
brouhaha of late within the AFRINIC region relating to AFRINIC's efforts to
reclaim certain large blocks of IPv4 addresses from one particular member
organization.  This effort has resulted in considerable litigation within
Mauritius, the home country of AFRINIC.

Partially as a result of this ongoing controversy, but also just for my
own edification, I would like to ask a number of questions about any and
all prior instances in which RIPE has reclaimed number resources from
member organizations, based on policy.

It seems safe to assume that there have historically been some instances in
which RIPE memberships have been terminated, and any associated assigned
number resources reclaimed, if and when a given member has simply failed
to pay fess due to RIPE.  My questions however have to do with situations
where policy violations other than the non-payment of fees are involved.
Specifically, I would like to know if any of you can recall past instances
where number resources have been reclaimed, by RIPE, for any of the following
reasons:

*)  Usage of the assigned number resources was no longer consistant with
the original justification submitted to RIPE.

*)  Violation(s) of out-of-region usage policy.

*)  Any other policy violations.

Thanks in advance for any and all responses.


Regards,
rfg

-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


Re: [anti-abuse-wg] Proposal 2022-01

2022-06-23 Thread Ronald F. Guilmette
In message , 
 =?ISO-8859-15?Q?Carlos_Fria=E7as?=  wrote:

>> https://www.ripe.net/participate/policies/proposals/2022-01
>>
>> I suspect that many of you are going to want to read those sections before
>> you have your memberships revoked for non-compliance.
>
>I can't read any details about membership revokation. Also i don't see it 
>as implicit.

Well, I have been asking for various policies that would place some
restrictions on member conduct (in other context) for quite some
years now, and every time I have asked about such things, either in this
region (RIPE) or ibn other regions I have always been told "Sorry, no,
we can't do that because we have no enforcement mechanism and we have
no way to disipline members."

Any yet here we have a proposal that clearly intend to -force- members to
put accurate information into their WHOIS records.  This raises the obvious
question:  How?  How will members be forced into this, when it has previously
been asserted (in other contexts) that there never has been (and never will
be) any way to force members to do anything OTHER THAN to pay their RIPE
dues?

>The three sections make perfect sense to me. In section 6.0, if i 
>understood correctly this won't apply to legacy resources which are still 
>out of any contractual relationship -- which also seems fine.

That's not the way that *I* read it.


Regards,
rfg

-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


[anti-abuse-wg] Proposal 2022-01

2022-06-23 Thread Ronald F. Guilmette
Just curious... How many of you folks have actually read sections 4.0, 5.0,
and 6.0 of this pending proposal from the Database Working Group?

https://www.ripe.net/participate/policies/proposals/2022-01

I suspect that many of you are going to want to read those sections before
you have your memberships revoked for non-compliance.


Regards,
rfg

-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


Re: [anti-abuse-wg] Unanimity

2022-06-20 Thread Ronald F. Guilmette
In message , 
=?ISO-8859-15?Q?Carlos_Fria=E7as?=  wrote:

>The RIPE NCC Service Region spans over 70+ economies.
>
>In fact it spans over the whole planet when someone from outside the 
>service region details some plans to use IP addresses mostly within the 
>service region -- is this verified some time after the resources are 
>allocated?

I'm sorry Carlos, but I am not understanding either your question or its
relevance to what I recently posted (which you quoted).

Can you elaborate please?


Regards,
rfg

-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


[anti-abuse-wg] Unanimity

2022-06-19 Thread Ronald F. Guilmette
Just a brief point.  I previously noted here that RIPE's rules requiring
unanimity or near unanimity in order to declare "consensus" with respect
to any given proposal has recently been recognized, by some EU politicians
at least, as being a material impediment to forward movement on various
issues.

I only just noted that this growing sentiment has now apparently extended
even to the Chancellor of Germany:

https://twitter.com/EuromaidanPress/status/1538637496124317704

My hope, of course, is that RIPE and its various WGs are taking notes.


Regards,
rfg

-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


[anti-abuse-wg] Busted!

2022-06-11 Thread Ronald F. Guilmette
https://krebsonsecurity.com/2022/06/adconion-execs-plead-guilty-in-federal-anti-spam-case/


-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


Re: [anti-abuse-wg] personal data in the RIPE Database

2022-06-06 Thread Ronald F. Guilmette
In message 
=?UTF-8?Q?Cynthia_Revstr=C3=B6m?=  wrote:

>AFAIK the "org-name" attribute on the organisation object does get
>verified if the organisation is a LIR or an end user that has received
>resources directly from the RIPE NCC (through a sponsoring LIR). (and
>possibly a few other cases like legacy resource holders with service
>agreements)
>I believe there are also many policies that say that information
>should be accurate, and while this might not be actively verified for
>the most part, it is still policy in many cases.

Policy in the total absence of -any- validation or enforcement is vacuous.
It is a NO-OP.  It is a joke.

>Part of the issue is that the RIPE NCC has some responsibility for
>this under the GDPR...

Or to be more accurate, RIPE NCC is -alleged- to have some responsibility
for this, e.g. by yourself and by other privacy extremists.

In point of fact however this opinion, on your part, has never been adjudicated
in any court of law.  And more to the point, GDPR has explicit carve outs
for the sharing and/or publication of data as may be necessary for an entity
to carry out its mission.

Some of us, at least (who may, coincidently have been on the Internet since
well before you were born),  still maintain the "old school" view that it
was, is, and remains an integral part of the mission of both domain name
registrars and also Regional Internet Registries to promote, foster, and
enable the smooth functioning of the Internet.  We also believe that that
continued smooth functioning can be either (a) enabled by openess and
transparency or else (b) hobbled by pointlessly and unnecessarily fetishizing
secrecy, specifically within WHOIS records.

If our interpretation of GDPR is the correct one, i.e. that RIPE and other
such organizations have both a current and a longstanding/historical duty
to *not* "hide the ball", then your claim that the GDPR obliges RIPE NCC to
do anything in particular now which is different from what it has been doing
for the past 20+ years is both meaningless and not at all supported by
*any* legal findings.  In short, this contention that GDPR is (suddenly?)
forcing RIPE to do something today that it was not forced to do at any time
last week, or indeed, at any time over the past 20 years is simply fallacious -
an imaginary imperative that doesn't actually exist.

>and it can be really difficult to do this
>correctly, but I think the legal team could explain those details
>better.

And I think that the legal team has also been sucked into the vortex of
privacy paranoia and extremism, and that they will say whatever they want
to say, regardless of whether their position has been endorsed or verified
in a court of law or not.

In short, they are part of the problem.  As I have previously noted RIPE
is a *private* organization mostly composed of *private* member organizations,
virtually all of which are loath to disclose anything to anybody ever.
Thus, I would not be in the least surprised if you told me tomorrow that
the RIPE legal team had come out in favor of making the entire WHOIS data
base private and accessible to "law enforcement only, eyes only".  The
legal team doesn't have any incentive whatsoever pulling them in the
direction of transparency.  All of their incentives run in the opposite
direction...  i.e. *against* any and all openness & transparency, even
if that means degrading the ongoing smooth functioning of the Internet.

>I run a hobby network and have an ASN and a /48 of PI assigned to me
>from RIPE NCC (through a sponsoring LIR) and also know many other
>people who are in a similar situation.
>Many people who do this are uncomfortable with having to publish their
>home address in the RIPE database...

I have two responses:

1)  Why don't you get a P.O. box if you are really that worried about it?

2)  So if I understand why you're saying, you are saying that because there
exists some small, but finite and non-zero set of people who, like you,
are "uncomfortable", then everybody else in the universe should bend over
backwards, throw out 20+ years of precedent, and should hobble the public
WHOIS data base, all just so that -you- won't be made to feel "uncomfortable".
Is that what you are saying?

If so, then I'd like to suggest that you consider moving to sunny Florida.
I think that you might fit in nicely there.

Although you may not have heard about it, the Governor of that state recently
signed into law a new state statute which makes it now illegal for teachers
in that state to say the word "gay".

The justification for this new law was that that word makes some small
minority of the parents in the State of Florida "uncomfortable".

My point of course, is that this is how the dictatorship of the minority
begins.  You are "uncomfortable" so everyone else must change what they
are doing.

And how shall we resolve the matter if, hypothetically, the discomfort of
you and your friends someday makes me and my friends "uncomfortable"?

>Sure, I could

Re: [anti-abuse-wg] personal data in the RIPE Database

2022-06-06 Thread Ronald F. Guilmette
In message 
denis walker  wrote:

>The bottom line is that there are honest, law abiding people who are,
>or would like to be, resource holders but are exposed to considerable
>personal danger by making their name and address public. We must take
>the personal privacy issue seriously...

These are exactly the central fallacies that have driven and that are
driving so much of the GDPR-inspired "privacy" fanaticism that's coming
out of Europe these days.

Who exactly are these unspecified "law abiding people" and what is it,
exactly, that is preventing them from taking measures on their own
(such as renting a P.O. box) to protect themselves and their privacy?

I do not dispute for a moment that there are many people, most notably
journalists, many of whom I have had the pleasure to work with (and even
some inside of Russia) whose freedom & lives could be endangered by
publication of their exact whereabouts.  And yet this current proposal
was not, as far as I know, generated by any of *them*.  *They* already know
all about the many readily available ways at their disposal to avoid having
their exact whereabouts published.  (And God help us all if they ever have
to rely on the good graces of RIPE to protect their locations!)

Perhaps even more to the point, I'd like to see any actual Venn Diagram
which would show us the -actual- (as opposed to postulated, by the 
privacy fear-mongers) overlap between the set of people who need any
kind of anonymity and/or protection of their location info and the set
of people who ALSO provably *need* to have RIPE number resources.

Oh!  Nevermind!  Conveniently, some kind soul on the Internet has already
generated & published this exact Venn Diagram:

https://www.amcharts.com/docs/v4/wp-content/uploads/sites/2/2020/02/image-768x377.png

So this is really the first-order fallacy:  The assertion, without a single
shred of supporting proof offered, that there exists some tiny minority of
people who both (a) need either anonymity or else secrecy as regards to
their actual physical address, and who also (b) need to have RIR number
resources.

If we are to believe this alarmist point of view, even, as it is, backed up
by zero actual evidence, then we must accept on blind faith that there
are some journalists or other "activists" who need to get their stories
out to the public but who cannot use *any* form of existing social media
to do that, and who cannot even do it via some shared or dedicated web
hosting arrangement.  No no!  We must believe that there are, somewhere
out there, activists and/or journalists who both (a) have reason to fear
for their physical safety and who also (b) really need at least an ASN or
a /24 or else they will be as good as gagged, for all practical purposes.

This is clearly nonsense on the face of it.  We are blessed to live in an
era where communication... even mass communication... has never been easier
OR more widley available.  And yet the contention is that edgy activism and/or
journalism will be entirely wiped from the map if the person who wants to
distribute a controversial newsletter cannot get hold of an entire /24.
Rubbish.

It is this exact sort of illogical thinking that has led to a situation,
in Europe, where you now can't even know if the new neighbor who just
moved in next door to you is a previously convicted serial pedophile.
You aren't allowed to know because your newspapers are no longer allowed
to print even just the names of convicted serial sexual predators, much
less their photographs.

Why any of you folks in Europe ever thought that this would be a good idea
is, I confess, beyond me.  You have placed this newfound fetish for "privacy"
above the competing societal values of free speech, freedom of the press,
transparency in public affairs, and the individual citizen's right to know.
So now you have to live with the downsides of those value choices.  But
those obviously dubious value choices DO NOT have to spill over into the
public RIPE WHOIS data base.  And they will only do so if the same inability
to judge fairly the cost/benefit ratio is sold to the membership at large
by the privacy extremists.

And now, at last, we come to the second absurd fallacy driving this debate.
I quote:  "We must take the personal privacy issue seriously..."

Simple question:  Why?  Who says we do?

Did the EU Council pass a resolution while I was sleeping which has rendered
RIPE legally responsible for the privacy of its members or their physical
addrsses?  If so, I didn't get the memo.

Seriously, who exactly is "we" and when did "we" become legally, ethically,
or morally responsible for hiding the physical addresses of members who
could, as I have noted above, quite easily take care of this on their own?
Was RIPE actually responsible for hiding physical addresses for all of
the past 20 odd years of its existance, but for some strange reason we are
only finding out about it now?

Again, I think not.  Nothing has changed, morally, eithically, or

Re: [anti-abuse-wg] personal data in the RIPE Database

2022-06-06 Thread Ronald F. Guilmette
In message 
denis walker  wrote:

>We are talking about restricting access to one piece of data, the
>address of natural persons. I accept that a lot of abuse may come from
>address space held by natural people. I understand that a lot of
>investigation work is done by companies and individuals. How much of
>an impact would it be on your activities to not know the private
>address of these natural people?

Just a second.  Let's pause here for a moment and look at this question
of the "physical address" information as it relates to WHOIS records.

One of the many things that have, over the past several years, rendered
almost all of the information that is now available in *domain name*
WHOIS records virtually entirely worthless was the decision, some
considerable time ago, by ICANN, to permit the use of essentially
anonymous P.O. box addresses in the WHOIS records for domains registered
within the gTLDs.  Additional commonly used methods of obfsucation in
these domain name WHOIS records include but are not limited to (a) the
use of "proxy" registrants and (b) the use of addresses of incorporation
agents and (c) use of the addresses of attorneys.  (I have not surveyed the
policies of the various ccTLDs with regards to their level of acceptance
of such shenanigans but I have no reason to doubt that even the .US TLD
allows for all of these clever methods of "hiding the ball" with respect
to the actual physical location of the domain name registrant.  Hell!
The policies governing the .US domain are crystal clear in prohibiting
non-US legal entities from registering .US domains, but the operators of
the .US registry demonstratably make no attempt whatsoever to check for
conformance with even this minimal requirement.)

So, as I have listed above, there are many different frequently-used ways
that any natural person may use to obfsucate their actual physical location
when registering a domain name.

This prompts a rather obvious question:  Do there exist any policies,
rules, or regulations which would prevent a natural person from using any
one of the several techniques I have listed above to obfsucate their
actual physical location when they generate their RIPE organization
WHOIS record?  And more to the point, is it true or false that, as I have
previously asserted, any member can put literally any inaccurate garbage
they want into their public-facing RIPE WHOIS records with no consequence
whatsoever?

If the answer to *either* question is "yes", then it seems to me that
enlisting RIPE NCC to embark upon a deliberate program to hide personal
information in public-facing WHOIS records EVEN WHEN THE CORRESPONDING
REGISTRANTS HAVE NOT THEMSELVES REQUESTED THAT is not only clearly
unnecessary, but actually and demonstratably counterproductive.  Should
a natural-person who actually WANTS to be directly contacted for any and
all issues relating to their RIPE number resources have that opportunity
closed out, perhaps without even their knowledge or consent, by some
small over-agressive cabal of GDPR fanatics acting unilaterally?  I think
not.

As noted above, if any RIPE registrant wants to have their physical address
info obfsucated then there appears to be any number of simple alternatives
available to the registrant themself to achieve exactly that.  Thus, this
new push to get RIPE NCC to hide information in public-facing WHOIS records
seems to be a solution in search of a problem, and just another misguided
top-down enforcement of an extremist view of "privacy", pushed onto the
community whether the people actually affected, i.e. the registrants
themselves, like it or not.

(Note: I am not intending to pick specifically on RIPE here.  To the best
of my current knowledge there are -no- policies or rules in -any- RIR
globally that explicitly prohibit the use of P.O. boxes, proxy registrants,
or the addrsses of associated corporate registration agents or lawyers
within public-facing number resource WHOIS�records.  Nor do any RIRs
have any clear policies which would have the effect of requiring there
to be -any- clear correlation between what appears in a registrant's
public-facing WHOIS records and anything corresponding to objective
reality.)

>I can only think of three reasons why
>you would need the full address. You intend to visit them (unlikely),
>you want to serve legal papers on them or you attempt some kind of
>heuristics with the free text search in the database to match up
>resources with the same address.

I agree with this list of possibilities, 1, 2, 3.

So which of these three are you attempting to hobble?

Are you in favor of making it harder to serve people with legal papers?
If so, why would you do that and who would be the beneficiaries of that?

Are you in favor of making it harder for open-source researchers to search
the data base for textual correlations that might provide clues to untoward
activities?  If so, why would you do that and who would be the beneficiaries
of that?


Regards,
rfg

-- 

Re: [anti-abuse-wg] personal data in the RIPE Database

2022-06-06 Thread Ronald F. Guilmette
In message ,  Suresh Ramasubramanian  wrote:

>The person you should invite for this is Ron Guilmette
>
>Ask him about Romanian LIRs from eight or nine years back and you will
>probably get chapter and verse.
>
>For example https://seclists.org/nanog/2013/Jan/328

Indeed.  I could write a book about the voracious Romanian gang.  And a
whole additional one about some similarly voracious folks in Moldova.
The only question is:  Who would read them?  Nobody seems to care.


Regards,
rfg

-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


Re: [anti-abuse-wg] personal data in the RIPE Database

2022-06-04 Thread Ronald F. Guilmette
In message <5f2f5fec-15cd-a307-dac4-366dd76b6...@heeg.de>, 
Hans-Martin Mosner  wrote:

>> If you say yes to both, then I am compelled to point out there there is,
>> as far as I understand it, *no* requirement, within the RIPE region, at
>> present for there to be *any* correlation between what appears in any
>> public RIPE WHOIS record and the actual bona fides of the corresponding
>> member, the -actual- identity o which remain secret & hidden behind an
>> opaque wall of stony silence, backed up by RIPE's legal counsel.
>
>I can't really judge this, but I see why that is your point of view.

It isn't a point of view.  It's a simple fact and easy enough to verify.

Members are allowed to put any garbage they like into their WHOIS records.
Nobody will stop them, nobody will police them if they do this, and there
exists no policy, rule, procedure, or mechanism to correct the WHOIS
records if they contain absolute horse manure.

And if you or I suspect that someone has in fact put inaccurate garbage into
their WHOIS records, you can ask the ever helpful folks at RIPE NCC to let
you see the actual bona fides documents that the corporate entity in question
gave to RIPE NCC when it first became a RIPE member.  You can ask, and you
will be told to get lost, because that is considered to be "secret" and
"confidential" info.

Again, I'm talking about non-person CORPORATE entities here.

And again, I'm talking about corporate legal registration documents...
documents which SHOULD BE PUBLIC anyway due to EU Anti-Money Laundering
rules.

Yes, even the EU got tired of its own opacity when it came to shell
companies and other corporate entities years ago, and they developed sets
of "Anti Money Laundering Directives" that all of the EU member states were
*supposed* to enact as local national laws years ago, starting, I guess,
with 1AMLD, then 2AMLD, then 3AMLD, 4AMLD, and finally, in 2018, 5AMLD.

But just like with RIPE, the EU member states, having approved these new
transparency measures at the EU level were apparently loath to actually
implement them, as required, as national laws in a majority of the EU
countries.  The result was that as of the year 2020, 22 out of 27 EU
member states were still playing "hide the ball" with corporate registration
and ownership information.  This should be a scandalous embarassment, but
both the lethargic EU member countries and also RIPE have never been
accused of having anything approximating shame.

You can read the whole shameful story here:

https://www.globalwitness.org/en/campaigns/corruption-and-money-laundering/anonymous-company-owners/5amld-patchy-progress/

Of course this is just the EU/AML part.  For now I won't even go into
the story of the time law enforcement officers showed up at RIPE
headquarters in 2009 and started asking questions in connection with a
money laundering investigation they were working on... which apparently
involved RIPE itself.


Regards,
rfg

-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


Re: [anti-abuse-wg] personal data in the RIPE Database

2022-06-03 Thread Ronald F. Guilmette
In message , 
Hans-Martin Mosner  wrote:

>For resources allocated to legal entities (companies, organizations, etc.)
>an identification of the organization should be mandatory.

Would you agree also that such identification of non-person legal entities
that are the registrants of number resources should be:

a)  public, and

b)  accurate and consistant with the bona fides that were submitted to
RIPE NCC at the time the member was made a member, and at any & all
times thereafter when the non-person member requested or was granted
number resources?

If you say yes to both, then I am compelled to point out there there is,
as far as I understand it, *no* requirement, within the RIPE region, at
present for there to be *any* correlation between what appears in any
public RIPE WHOIS record and the actual bona fides of the corresponding
member, the -actual- identity o which remain secret & hidden behind an
opaque wall of stony silence, backed up by RIPE's legal counsel.

In short, everything you see in any and all public RIPE WHOIS records is
subject to the whims of the corresponding member, whose true identity
may be well and truly hidden, and thus, the WHOIS data often is nothing
more than totally made-up bovine excrement.

I hasten to add that this is due not to any single mistake or specific
deliberate policy choice on the part of RIPE or its members or its legal
counsel.  Rather it is due entirely to the fundamental nature of RIPE
which is a -private- member-based corporation, the membership of which
is composed almost entirely of -private- corporate entities whose most
sincere and fervent wish is to be accountable to, answerable to, and
transparent to absolutely no one, and often times not even to their own
shareholders[1] and/or Boards of Directors[2].

In short, I have some time ago given up entirely in the idea that RIPE
could be gradually "refomed" to be more accountable, e.g. to the billion+
ordinary people who now rely on the number resources that it distributes.
Reform isn't possible for an organization that has stealthy secrecy and
deliberate opacity baked in, as a guiding principal, from its very inception.



Regards,
rfg


[1] The mere existance of "activist" investors like Carl Icahn illustrates
the point that corporate entities many times do not even feel any special
obligations to be honest, open, and transparent with their own shareholders,
let alone the "unwashed masses" of the public at large.

[2]  The now well-known story of the rise and fall of the U.S. corporation
known as "Theranos" and its all-too-clever former CEO, Elizabeth Holmes,
vividly demonstrates that management sometimes (often?) has incentives to
keep even a company's own Board of Directors in the dark.  And if management
isn't telling the truth to its own Board, then they quite certainly are not
likely to be truthful, open, honest or transparent with the public at large.

-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


Re: [anti-abuse-wg] personal data in the RIPE Database

2022-06-02 Thread Ronald F. Guilmette
In message <009401d8768b$4286eca0$c794c5e0$@hackersbescherming.nl>, 
jer...@hackersbescherming.nl wrote:

>But again, i get the feeling this group hardly has any people in it from the
>public interest and is bassicly filled with internet cowboys who don't care
>about all the crap that is being pushed over the internet.
>
>I have gotten the feeling that Ripe is just a waste of my time when u give
>answers like u have done so far!
>
>And with that being said, this will be my last reply in Ripe mailing lists
>since i get the feeling that the whole Ripe organisation is just looking the
>other way when something obviously wrong is going on

For whatever little it's worth, everything you just said is 100% accurate,
and it explains why I myself have largely stopped wasting any more of my
time trying to create change within the RIPE structures of power.  They
don't care, and they are not obliged to care, under law.  So they can do
whatever they want, and do.  They hide information that should be public,
using GDPR as a pretense, and allow members to put any gibberish they want
into WHOIS records.  If you ever have the audacity to ask anybody connected
with RIPE for the REAL identification of the REAL owners of any given IP
block, RIPE's corporate legal counsel will tell you to come back with a
warrant or else go pound sand, because no law obliges them to give this
to you, and neither ethical considerations nor public policy considerations
carry any weight with RIPE whatsoever.  It's all just about preserving the
status quo and protecting the guilty.  (As regards to the former, all you
have to do is to just look at the remarkable absence of ANY progress or
notable achievement whatsoever by this, the so-called Anti-Abuse Working
Group, over the past 10+ years.  The group managers, together with a small
group of reliable naysayers, have been rather spectacularly successful at
suppressing any meaningful action or decisions whatsoever for at least
that long and, i believe, longer.)

And it's even getting worse, day by day.  Now they are considering hiding
EVEN MORE of the WHOIS data.  The excuse, once again, is GDPR.  They don't
really care to get any input from either law enforcement or legitimate
security researchers.  God NO!  That might force them to at least have to
acknowlege the existance of some other point of view that doesn't conform
to their already planned agenda of recalcitrance, obstructionism,
consistant inaction, and protecting the guilty.

And yes, over the years this do-nothing agenda has been quite successful in
driving out of these groups and these mailing lists anybody and everybody
who had ever hoped for some positive change but who valued their time and
came to realize that they were just pounding their head against an
impenetrable wall... a wall created deliberately, and in no small measure
by the "consensus" rule that reqires EVERYONE to agree before anything at
all can happen... a moronic rule that applies also in the structures of
the European Union (EU) and that at least some of the elected members of
that body have now gone on television to say is (now) glaringly and rather
obviously unworkable, in practice.

Welcome to the institutionalized dysfunction that is Europe and RIPE -- the
only place on earth where you may be assured of perfect, continued, and
uninterrupted Internet connectivity for your country's hacking and
crypto-scam communities, even as you threaten to touch off World War III.


Regards,
rfg

-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


Re: [anti-abuse-wg] personal data in the RIPE Database

2022-06-02 Thread Ronald F. Guilmette
In message , Matthias Merkel  wrote:

>... If you think someone is
>intentionally sending you malicious traffic, the police is the point of
>contact for you.

Yes, because in practice THAT works oh so well!

Worldwide, and even in Russia, the police just LOVE cleaning up the messes
that we in the networking community have managed to manufacture for ourselves.

Sigh.  If only we didn't first have to educate them all on the meaning of
the word "packet".


Regards,
rfg

-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


Re: [anti-abuse-wg] Another incompetent ISP - Signet, B.V. - transip.net / signet.nl

2022-04-28 Thread Ronald F. Guilmette
In message 
denis walker  wrote:

>Why is this not possible?

Because of you.  Because you basically told me to just go away when I
previously requested on the db-wg mailing list to have -all- of the
WHOIS records for -all- IP block allocations include a org: field.

(I have just posted my more complete & detailed description of this issue /
problem to the db-wg mailing list so you can find that there.)

>Your list below seems to be a full list of their IPv4.

Well, I know it -seems- that way, but it isn't, for reasons I've explained
on the db-wg list.


Regards,
rfg

-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


[anti-abuse-wg] Another incompetent ISP - Signet, B.V. - transip.net / signet.nl

2022-04-27 Thread Ronald F. Guilmette
I recently attempted to report spam that was sent to me from [136.144.219.231].
This address is being routed by AS20857 (ORG-SI6-RIPE / Signet B.V.) and the
containing IP block (136.144.128.0/17) is registered to TransIP B.V. (NOTE:
no associated ORG record) which appears to be just a different face of the
same Dutch company (Signet).

My spam report was sent to the abuse reporting address contained in the RIPE
WHOIS record for the revevant ASN (AS20857) i.e. .

Of course, I included in the report a complete copy of the spam message
I received so that the people on the other end could have a clear picture
of the nature of this incident and those responsible for it.

Unfortunately, Signet/transIP appears to be yet another in a succession of
ISPs that have failed to grasp the seemingly obvious fact that enabling
spam filtering on your own inbound spam reporting email address is
counterproductive.  Thus, for my trouble I received back:

 (expanded from ): host
mx.transip.email[86.105.244.9] said: 550 5.7.1 Our system has detected that
this message is likely unsolicited mail (SPAM). To reduce the amount of
spam, this message has been blocked. (4Kpghy5Bcvz1J9nY) (in reply to end of
DATA command)

Based on this rejection it is now my intention to locally blacklist all IPv4
blocks assigned to this ISP.  A partial list of these is included below.

Unfortunately, due to ongoing and longstanding issues with the RIPE data
base (which I will be mentioning yet again on the RIPE db-wg mailing list,
for all the good it will do) it is not easily possible to derive a full
list of all of the IP address blocks assigned to this company, at least
not in a simple automated fashion.

Blocks assigned to ORG-SI6-RIPE (fully aggregated):

31.3.8.0/21
31.3.96.0/21
31.14.96.0/22
31.223.160.0/20
37.17.208.0/20
37.34.48.0/20
37.97.128.0/17
37.230.96.0/21
46.21.224.0/20
46.226.56.0/21
77.72.144.0/21
78.108.128.0/20
79.170.88.0/21
80.69.64.0/19
80.84.224.0/19
80.246.192.0/20
80.255.240.0/20
81.4.64.0/19
81.4.96.0/22
81.4.112.0/21
81.21.136.0/21
81.30.32.0/20
83.96.128.0/17
84.247.8.0/21
85.10.128.0/18
85.158.248.0/21
85.222.224.0/21
86.105.244.0/22
87.253.128.0/19
89.31.96.0/21
89.41.168.0/22
91.142.240.0/20
91.205.32.0/22
91.216.162.0/24
93.119.0.0/20
93.191.128.0/21
94.142.208.0/21
95.170.64.0/19
141.138.136.0/21
141.138.192.0/20
141.255.176.0/21
149.210.128.0/17
171.33.128.0/21
176.74.224.0/19
178.18.80.0/20
185.3.208.0/22
185.10.48.0/22
185.15.248.0/22
185.21.188.0/22
185.65.52.0/22
185.69.232.0/22
185.76.236.0/22
185.84.72.0/22
185.89.152.0/22
185.95.68.0/22
185.96.4.0/22
185.105.204.0/22
185.105.216.0/22
185.108.112.0/22
185.110.172.0/22
185.110.200.0/22
188.240.52.0/22
188.241.148.0/22
193.93.172.0/22
193.138.204.0/22
193.242.119.0/24
194.60.207.0/24
195.8.195.0/24
195.135.195.0/24
213.187.240.0/21
217.21.240.0/20
217.149.128.0/20

-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


Re: [anti-abuse-wg] ORG-OG2-RIPE -- plusserver.com / plusserver.de

2022-04-05 Thread Ronald F. Guilmette
In message <746a4ef3-204f-4f3f-913f-22544eeaf...@plusserver.com>, 
Christian Adler  wrote:

>you are completely right. This is not acceptable and I escalate this to my
>collegues who are in charge of this problem.

Thank you Christian for proactively addressing this issue.  It will certainly
be helpful if it becomes possible to email a proper sort of spam report to
Plusserver.  Separately and additionally however, I hope that you and your
collegues will invest some brain cycles also to consider the other part of
the critique that I posted here the other day.

It is apparent that Plusserver does have the technical ability in place to
detect and block spam, at least when it is incoming to your network and to
your company mail server.  Thus it seems apparent that if that same
technology were applied equally and also to all email flowing -out- from
the Plusserver network, this would have an undeniably salutary effect.

It may be technically difficult to set that all up, but as you may be
aware, many larger networks across the globe do already block direct
outbound port 25 TCP connects from their network customers, asking them
all instead to utilize the company's own outbound "smart host" mail
server for all outbound email.  The technology to do this is relatively
easy to put in place, and is quite mature.  If Plusserver were to do this,
possibly with the exception of its large and well-trusted customers, tnen
EVEN IF Plusserver did not also implement any sort of filtering or spam
detection on that one outbound "smart host" mail server, the company would
at least still have some very helpful realtime logs that would clearly
show when some individual customer had been sending a large and atypical
amount of outbound emails.  And that alone might be just enough to disuade
spammers from trying to use the Plusserver network for their disruptive
and abusive activities.


Regards,
rfg

-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


[anti-abuse-wg] ORG-SOVF2-RIPE -- "Oleksandr Siedinkin" -- thehost.ua

2022-04-01 Thread Ronald F. Guilmette
Sending a spam report to this network results in the following ignorebot reply:
 
--
Mailbox confirmation

Hello.
 
You sent an email to our support team, but unfortunately you are not registered
in our customer support system.
In order for the message to be accepted, you need to follow the link https://
my.thehost.com.ua/manager/billmgr?func=confirmemail&code=
REDACTED and confirm the registration.
 
TheHost Team
Official website - TheHost.ua TheHost - Hosting-provider
Customer support - supp...@thehost.ua
TelegramFacebookInstagramVKTwitter
--
 
My feeling is that one should not have to register in order to simply report
spam received from any given network.  Thus I've decided to locally blacklist
all RIPE blocks currently assigned to this network.  The fully aggregated 
set of these is as follows:
 
45.154.116.0/22
88.218.188.0/22
91.223.180.0/24
91.234.32.0/22
176.114.0.0/20
185.166.216.0/22
185.230.88.0/22
185.252.24.0/22


-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


[anti-abuse-wg] ORG-OG2-RIPE -- plusserver.com / plusserver.de

2022-04-01 Thread Ronald F. Guilmette
I just wanted to make you all aware that whereas most networks require
any spam report to include the entire spam message, attempting to include
an actual spam sample in an abuse report sent to ORG-OG2-RIPE aka
plusserver.com results in an an undeliverable (5xx) bounce message
contain text like the following:

: host mx01.hornetsecurity.com[94.100.132.8] said: 554
5.6.3 Your mail contains SPAM. To unblock visit
http://cloud-security.net/unblock?REDACTED
(in reply to end of DATA command)

Is is of course admirable that this network is able to accurately recognize
-inbound- spam messages so accurately.  It is rather a shame however that
this network is apparently incapable of doing likewise when it comes to
spam flowing outwards from their network.

For reference, the fully aggregated set of IPv4 CIDRs currently assigned to
this network within the RIPE region is as follows:

46.22.32.0/20
46.23.208.0/20
46.163.80.0/22
46.163.88.0/21
46.163.100.0/22
46.163.120.0/21
46.231.88.0/21
62.75.128.0/23
62.75.131.0/24
62.75.132.0/23
62.75.135.0/24
62.75.140.0/24
62.75.153.0/24
62.75.154.0/24
62.75.172.0/24
62.75.174.0/24
62.75.176.0/24
62.75.180.0/24
62.75.205.0/24
62.75.206.0/24
62.75.212.0/24
62.75.226.0/23
62.75.231.0/24
62.75.239.0/24
62.138.64.0/18
62.138.192.0/18
78.138.64.0/19
78.138.108.0/22
78.138.112.0/22
78.138.116.0/23
78.138.119.0/24
78.138.120.0/22
78.138.124.0/23
80.86.80.0/24
80.86.88.0/23
80.237.131.0/24
80.237.134.0/24
80.237.140.0/23
80.237.152.0/21
80.237.176.0/20
80.237.192.0/23
80.237.196.0/22
80.237.200.0/21
80.237.208.0/22
80.237.213.0/24
80.237.216.0/21
80.237.224.0/20
80.237.240.0/21
80.237.250.0/24
80.242.128.0/19
83.169.48.0/22
83.169.56.0/21
83.220.128.0/19
85.25.18.0/23
85.25.21.0/24
85.25.22.0/23
85.25.24.0/23
85.25.28.0/22
85.25.65.0/24
85.25.69.0/24
85.25.70.0/24
85.25.80.0/21
85.25.88.0/22
85.25.96.0/23
85.25.101.0/24
85.25.111.0/24
85.25.121.0/24
85.25.158.0/24
85.25.175.0/24
85.25.212.0/24
85.25.221.0/24
85.25.234.0/24
85.25.240.0/23
85.25.245.0/24
85.25.247.0/24
85.119.200.0/21
87.119.192.0/23
87.119.194.0/24
87.119.196.0/22
87.119.200.0/21
87.119.208.0/21
87.119.216.0/22
87.230.36.0/22
87.230.50.0/23
87.230.52.0/22
87.230.56.0/22
87.230.65.0/24
87.230.72.0/22
87.230.82.0/23
87.230.96.0/21
87.230.108.0/23
87.230.120.0/22
87.230.124.0/23
87.230.127.0/24
89.19.224.0/19
91.209.52.0/24
91.250.72.0/21
91.250.92.0/22
91.250.104.0/22
92.51.152.0/21
92.51.168.0/23
92.51.171.0/24
92.51.172.0/22
92.51.176.0/22
92.51.184.0/21
93.187.112.0/21
151.106.64.0/19
176.28.24.0/21
176.28.60.0/23
176.28.63.0/24
178.77.88.0/21
178.77.120.0/22
178.77.125.0/24
178.77.126.0/23
185.55.68.0/22
185.209.64.0/22
188.64.192.0/21
188.138.64.0/22
188.138.80.0/24
193.33.20.0/23
193.34.200.0/25
194.15.144.0/24
194.24.192.0/19
194.64.0.0/16
194.163.16.0/20
194.163.64.0/18
194.163.192.0/18
194.195.0.0/18
194.195.64.0/20
194.195.96.0/20
194.195.128.0/18
194.195.192.0/20
194.195.224.0/20
194.233.0.0/18
194.233.112.0/20
194.233.128.0/19
194.233.192.0/18
195.177.0.0/18
195.179.0.0/17
195.179.128.0/18
195.179.208.0/20
195.179.240.0/20
195.180.0.0/16
195.191.26.0/23
195.206.128.0/19
195.244.96.0/19
195.252.128.0/18
212.1.32.0/19
212.40.160.0/24
212.40.166.0/24
212.40.168.0/24
212.40.174.0/23
212.40.176.0/24
212.40.181.0/24
212.40.182.0/23
212.40.186.0/24
212.116.0.0/19
212.224.0.0/18
213.131.224.0/19
213.174.32.0/19
213.203.192.0/18
217.69.64.0/19
217.115.136.0/22
217.115.140.0/24
217.115.144.0/24
217.115.148.0/22
217.119.48.0/24
217.119.51.0/24
217.119.52.0/23
217.119.55.0/24
217.119.57.0/24
217.119.58.0/23
217.119.60.0/22
217.172.163.0/24
217.172.165.0/24
217.172.166.0/23
217.172.168.0/23
217.172.173.0/24
217.172.174.0/23
217.172.191.0/24

-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


Re: [anti-abuse-wg] Fwd: [dns-wg] EU: DNS abuse study

2022-02-08 Thread Ronald F. Guilmette
In message , 
=?UTF-8?Q?Markus_de_Br=c3=bcn?=  wrote:

>f) The top five most abused registrars account for 48% of all 
>maliciously registered domain names (Appendix 1 - Technical Report, 
>Section 11.2, pp. 43-44).

Hey!  I have an idea!

What if we created one global organization to accredit and monitor
literall all domain name registrar companies, and what if we allowed
that organization to actually *disipline* domain name registrars which
have proven by their actions that they are purely profit-oriented
anti-social assholes?

Now I know what you are thinking.  "Impossible!", right?  But I can
dream, can't I?


Regards,
rfg


P.S.  Namecheap, Inc., whose name comes up repeatedly in this study,
has at various times claimed to have its headquarters in California
and then, subsequently, in Arizona.  as far as I have been been able
to determnine it has never been properly registered in either state.

It is, I believe, logical to infer from that fact that it has never
filed a state-level tax return in either California or Arizona, quite
possibly violating the law in either or both states.

Not that ICANN would give a shit.   Aa long as no officers of any accredited
registrar have murdered anybody lately, or been convicted of robbing any
banks lately, I think that ICANN is OK with pretty much anything else,
as long as they keep on getting their checks regularly.

I am reminded of that old saying... "Fish rots from the head down."

https://opencorporates.com/companies?q=Namecheap&utf8=%E2%9C%93

-- 

To unsubscribe from this mailing list, get a password reminder, or change your 
subscription options, please visit: 
https://lists.ripe.net/mailman/listinfo/anti-abuse-wg


Re: [anti-abuse-wg] Anti-Abuse Training: Questions for the WG

2021-10-22 Thread Ronald F. Guilmette
In message <26f1df33-b958-bed4-f748-f82324d0b...@tana.it>, 
Alessandro Vesely  wrote:

>Shouldn't there be a standard for automatically forwarding messages destined
>to abuse-c following a path similar to that of RFC 2317 delegations?  I'd love 
>if AA training encouraged such behavior.

Although delegation of abuse report handling may sound like a good idea
in theory, in practice it is a tragically bad idea.

What happens when the customer is a spammer and abuse handling is delegated
to that customer?  Google for the term "list washing".

This isn't merely a theoretical possibility.  Digital Ocean has previously
sent me multiple response emails saying quite explicitly that they had
forwarded my spam reports to their spammer customer(s).  Those customers
will then surely cease to spam *me* but will continue to spam everyone
else on the planet.  This does not create any meaningful reduction in the
global spam load.  It simply rewards those "responsible" spammers who remove
from their target lists the email addreses of the few "complainers" who
nowadays take the time to report spam.


Regards,
rfg



Re: [anti-abuse-wg] New on RIPE Labs: RIPE NCC Anti-Abuse Support - What to Do if It Happens to You

2021-05-28 Thread Ronald F. Guilmette
In message <366ab1dc-8e7e-4ca9-b68d-0cfddad96...@blacknight.com>, 
Michele Neylon - Blacknight  wrote:

>Please explain.

I'm not sure there's anything really to explain. I said what I meant and
meant what I said.  When it comes to cybercrime generally, law enforcement
generally hasn't had what I would call a sterling history of unbridled and/or
and consistant sucess.  Rather the opposite, in fact.


Regards,
rfg



Re: [anti-abuse-wg] New on RIPE Labs: RIPE NCC Anti-Abuse Support - What to Do if It Happens to You

2021-05-27 Thread Ronald F. Guilmette
In message <7ed28c86-0c0d-4e0f-95d0-3f7374b1f...@ripe.net>, 
Alun Davies  wrote:

>At the RIPE NCC, we get lots of requests for assistance from people
>dealing with online abuse. In this new article on RIPE Labs, Angela
>Dall'Ara talks about how you can use RIPE NCC tools to help resolve
>abuse issues, but also takes a look at what you can do when further
>steps need to be taken.
>
>https://labs.ripe.net/author/angela_dallara/ripe-ncc-anti-abuse-support-what-to-do-if-it-happens-to-you/

This is an interesting tutorial, however I would like to just suggest
that the subsections titled "When to Contact a Law Enforcement Agency"
and "Contacting LEAs in Other Countries" be removed in order to prevent
naive readers of this tutorial from incorrectly inferring that law
enforcement agencies might be at all likely to be of any assistance
when dealing with online abuse issues.


Regards,
rfg



Re: [anti-abuse-wg] AS8003 and U.S. Department of Defense routing

2021-04-27 Thread Ronald F. Guilmette
In message , 
Randy Bush  wrote:

>interesting wg to do routing security analysis.

To be 100% clear, it was not my intention that anyone here should attempt
to engage in any sort of "security analysis" with respect to the current
rather inexplicable routing for much DoD IPv4 address space.  I just
posted here because, as I said, I felt some folks here might find the
information interesting.

>as i do really not know the dod's or their proxy's motive(s), i can not
>say much about their tactics let alone strategy.

Neither do I.  Nor do I even much care.  It's their space.  They can do
whatever the hell they want with it.

The only reason that any of this is even intersting is because it all
is really rather bizzare.  Why did they even need to bother with a
goofy shell company?  It's silly, really, and it didn't actually hide
anything.

>is some random (small, i hope) isp using my address space internally as
>1918 equivalent abusive, beyond their customers maybe not be able to
>reach my network?  if so, maybe the vigilantes are looking in the wrong
>direction.

Which "vigilantes" would those be, exactly?


Regards,
rfg




[anti-abuse-wg] AS8003 and U.S. Department of Defense routing

2021-04-25 Thread Ronald F. Guilmette
Greetings friends,

I though that you all might like to be aware of this:

https://apnews.com/article/technology-business-government-and-politics-b26ab809d1e9fdb53314f56299399949


Regards,
rfg



[anti-abuse-wg] AFRINIC -- The Saga Continues

2021-03-29 Thread Ronald F. Guilmette
Just published.
 
https://mybroadband.co.za/news/internet/390378-afrinic-hired-a-convicted-criminal-to-look-after-valuable-it-assets.html




Re: [anti-abuse-wg] Question about spam to abuse inbox

2021-02-21 Thread Ronald F. Guilmette
In message , 
Randy Bush  wrote:

>we are in a 'maturing' industry...

That excuse might almost be a reasonable justification for bad behavior
and even worse operating policies if it hadn't already been in continuous
use for the past 20+ years.

The spam problem has existed on the Internet since the late 1990s.  May
we optimistically hold out some hope that this industry might be able
to get its shit together by, say, 2045?

>so margins are low and people are overworked and underpaid. 

Maybe margins are low *structurally*, because just like in the spam trade,
everybody and his brother got enticed by the low barriers to entry in the
commercial hosting business, resulting in tens of thousands of "me too"
operators that, in point of fact, have no commercial advantage, and thus
no reason to even exist.  And they are all now competing with tens of
thousands just like them, as well as trying, vainly, to compete with a
few othjer outfits you may have heard of, e.g. Amazon, Google, Microsoft.

"Margins are low" is the same excuse that polluters used back in the day
for dumping toxic waste into rivers in the dead of night.  Now it is being
trotted out as an excuse for an inability... or rather an unwillingness...
to do this simple things (like blocking outbound port 25) needed to stop
the effluent of spam from leaking out into and onto the global Internet.

Profits may be in short supply in the commecial hosting business, but
fortunately there is never any shortage of lame excuses to justify the
status quo.


Regards,
rfg


P.S.  I am at pains to stress that essentially 100% of *all* network abuse
of ALL KINDS these days originates from commercial hosting providers.

I do not, in general, get spam, or break-in attempts, or port scans, or
any other such abuse from government networks, from academic networks,
from non-profit associations, or from legitimate businesses that have
their own netblocks and that are not fundamentally in the Internet
services business.  Nor do I have to endure such crap from any of the
thousands of so-called "eyeball networks", e.g.  Comcast, etc.  Rather,
the sum total of essentially all network abuse these days is consistantly
emanating from commercial hosting providers, and specifically from the
ones that have elected to entice miscreants and criminals to their
services by having deliberately loose contractual policies or else
deliberately loose enforcement of their stated policies.

It's a fairly moronic way to try to make a living, or to turn a profit,
but I guess that when you have nothing else to offer in the way of
competitive advantage...



Re: [anti-abuse-wg] Question about spam to abuse inbox

2021-02-21 Thread Ronald F. Guilmette
In message , 
Randy Bush  wrote:

>there is a fair bit of spectrum between the internet of cooperating
>competitors running their networks as prudently as they can afford
>and an internet desired by some where everything is done uniformly
>by rigid written rules.

You are using the word "afford" in this context as a blanket excuse
for incompetence and/or willful anti-social negligence.

What is the cost of adding a "cleanup fee" clause to your standard
service contracts, and why are you so abysmally bad at business that
you cannot afford to do that?

What is the cost of filtering outbound port 25 by default, and why are
you so abysmally bad at business that you cannot afford to do that?

The data is in, and applying one or both of these simple measures to
any given network has been demonstrated to reduce the need to pay
humans to staff an "abuse desk" dramatically.

Are you also unable to "afford" to implement BCP 38?


Regards,
rfg



Re: [anti-abuse-wg] Question about spam to abuse inbox

2021-02-20 Thread Ronald F. Guilmette
In message 
, 
=?UTF-8?Q?Cynthia_Revstr=C3=B6m?=  wrote:

>Can you please stop attacking ideas (such as web forms) implying that they
>only have malicious use cases.

You have missed my point entirely.

Web-based abuse reporting forms are not merely "an idea" any more than
discrimination is merely an "idea".  Rather it is an attitude and a
way of life.  It is the Internet equivalent of refusing to wear a
face mask, for the good of all, in a crowded elevator in the middle of
a global pandemic.  It is demonstratably and provably a selfish and
self-serving anti-social behavior pattern.  I don't know where you
live, but where I live we have already had more than enough of this
kind of attitude, and this kind of childish anti-social behavior.

>> I hold them responsible because they obviously
>> fail to have in place contractual clauses that would persuasively
>> deter this behavior on the part of their customers.
>
>In many cases it is practically impossible to know if your customers are
>sending legit emails or spam without having people reporting it.

Again, you have missed my point quite entirely.

Some providers have clauses in their service contracts that say explicitly
that custiomers who are caught spamming will face a manditory (and heavy)
"cleanup fee".  Many other providers do not have such clauses in their
standard service contracts.  Can you guess which providers are the sources
of most spams?

>> The provider in question is a perfectly lousy coder and is thus
>> unable and/or unwilling to write code to parse emailed abuse
>> reports.
>
>Hi, I am actually primarily a software dev and not a network engineer, it
>is not even close to as easy as you make it out to be.

Fine.  Have it your way.  The point can be argued either way, but I see no
point in us doing so at this moment, since I made a different and *overriding*
point that renders this question of parsing abuse reports sent via email
moot.

I say again, any professional treatment of an abuse report will necessarily
require a human being to actually LOOK at the bloody thing.  When viewed
with that context, the manner in which the report arrives is utterly
irrelevant.

If a human being is, in the end, going to end up looking at the bloody thing
anyway, then what difference does it make if the report arrives via email
or via a web form?  None.  None at all.

>My point here is that parsing free form text in this way without having a
>clearly defined structure is far from trivial.
>Also please stop assuming bad faith by saying that providers are
>"unwilling" to do this.

I do not assume.  I observe.  And I've been doing this a LONG time.

With the highly prohable exception of my friend Michele Neylon, it has
been my experience that those providers that set up web-based abuse
reporting forms ignore most or all of what they receive via those
forms.  Either that or they just forward the reports on to their pet
spammers, whichj is provably even WORSE thanm idf they had just dropped
the reports into /dev/null.

>> And anyway, don't actual human beings need to look at these things,
>> in the end, in order to be able to react to each of them properly
>> and in a professional fashion?
>
>Web forms can have pros and cons, I am just going to take the case of a
>VPS/Dedicated server hosting company.
>
>If the hosting company provides a web form, they can have a field where
>they explicitly ask for the offending IP address.

Oh!  So you want and indeed *demand* that the spam *victim* should be
obliged to fish this tidbit of information out of the headers, so that
the actual offending network doesn't have to do that part of the analysis
work, yes?

Where I come from, that's called cost shifting... onto the victim...
and it is no more morally or ethically defensible than trying to
justify sexual abuse by saying that the victim wore a short skirt.

>This report could then automatically also be sent to the customer in
>question

Do you really not understand why this is an extraordinarily BAD IDEA?

>(I believe Hetzner as an example does this or something similar.)

Yes, Hetzner has more than once ratted me out to their spammer customers.

Are you seriously holding that company up as a shining example of ethical
behavor for others to follow or be guided by??

>> A provider that is routinely receiving so many abuse reports that
>> it can barely keep up with them all has bigger problems that just
>> the manner in which abuse reports are received.
>
>Due to the automated procedure by some providers for abuse reports, if I
>have one bad host sending spam, I might get an abuse report for every
>single email they receive, so even if it is just one customer I might wake
>up to 200 emails.

So you're saying that you work as an outsourced abuse department for various
providers?  And you're OK with spammers being allowed to send out 200 spams,
but you really don't want to then have to deal with 200 reports of same?

I just want top make sure that I understand hat you're sayi

[anti-abuse-wg] Anti-social assholes

2021-02-20 Thread Ronald F. Guilmette
I get an email spam so I report it... via email.

I *do not * don snorkle gear.  I do not contort my body into odd
shapes.  I do not make my report out-of-band, via smoke signals,
or morse code, or via modulated infrared wavelengths.

Call me old fashioned, but as I have already made plain, I do not think
that I should be required to do any of these things.  It is easier for
me just to block all of Hostdime, which I had plenty of reasons to
do already anyway.


Regards,
rfg


P.S.  Seriously, how much arrogance does it take for them to say to
me that it is OK for me to have taken up *my* time to have read the
crap that was originated by *their* customer, but *they* cannot be
bothered to read *my* mail to them?



--- Forwarded Message

Date:Sat, 20 Feb 2021 19:47:33 -0500
From:ab...@hostdime.com 
To:  r...@tristatelogic.com
Subject: [AUTOREPLY] - Please submit complaint to https://www.hostdime.com/abus
  e-report/

Hello,

Thank you for contacting HostDime.

Please resubmit your original message at the following link for action to be co
nsidered:
- ---
HostDime Abuse Report Form
https://www.hostdime.com/abuse-report/
- ---
Thank you,
HostDime.com, Inc

NOTE: This is an automated message. Please do not reply to this email. This mai
lbox is not monitored.

--- End of Forwarded Message



Re: [anti-abuse-wg] On the abuse handling policy of manitu.net (AS34240)

2021-02-20 Thread Ronald F. Guilmette
In message , 
furio ercolessi  wrote:

>remarks:trouble:|  ab...@manitu.net  |
>remarks:trouble:||
>remarks:trouble:| IMPORTANT:Your message will probably sent to   |
>remarks:trouble:| the customer concerned by an automatic system. |
>...

>This is so absurd, I had to read it twice to make sure that I was not 
>misreading it.
>They state that they automatically pass all my personal data to abusers if I
>send a report to them...

A representative of Digital Ocean told me point blank that they have the
exact same policy.  They just don't put it into their WHOIS records.

Until there is some serious downside, companies will continue to get away
with this shit without paying any price for this asshole-ness.


Regards,
rfg



Re: [anti-abuse-wg] Question about spam to abuse inbox

2021-02-20 Thread Ronald F. Guilmette
In message <20210218200036.066496e36...@ary.qy>, 
"John Levine"  wrote:

>Report web forms are out of the question because they do not scale. I
>send about a hundred abuse reports a day about spam received from all
>over the Internet, and I have no interest in using your form or anyone
>else's to make a manual special case for under 1% of my reports.

I'm real glad that John posted the above comment, as he has saved me
from having to do so myself.  (But I will take this opportunity to
elaborate on what John said anyway.)

I am in 1000% agreement with John on this.  Abuse reporting forms do
not scale... at least not for the *victims* of the abuse.

I report email spams... by far the most common form of network abuse...
to dozens of different providers every week.  At the moment in time
when I send each of these reports, I have already been abused by each
of these providers.  (I hold them responsible because they obviously
fail to have in place contractual clauses that would persuasively
deter this behavior on the part of their customers.)

To make me "jump through the hoops" of first even just *finding* each
provider's unique abuse reporting web form, and then navigating it
sufficiently well to insure that I have dotted all of the i's and
crossed all of the t's, as required, uniquely, for each different
provider, just *adds* injury to the insult that I have already suffered
at the hands of these same providers, and these same networks.

The demand to use a web-based reporting form is itself a form of cost
shifting.  It shifts more of the costs of dealing with network abuse
onto the victims of abuse and away from the providfers that are actually
originating the abuse in the first place.   In that sense it is arguably
the same as spam itself.  Email spam only exists because it is a way
of shifting the costs of advertising onto the recipient and away from
the senders.  Likewise, demanding that I must find my way to, and then
properly complete *your* unique web reporting form is yet another way
of shifting the costs of dealing with *your* abuse of *my* inbox away
from yourself and onto me.  Sure, it is maximally convenient FOR YOU,
but how about a little more consideration for the victim?

As John and others have noted, if I take up *my* time and effort to
report to you abuse that is coming from *your* network, then I am NOT
doing that for *my* benefit.  Rather all of the benefits of abuse
reports flow to the network operator of the network where the abuse
originated.

I am not an imbecile, and I can easily enough block any arbitrary sender
in my own local configuration, either by full email address, or by
domain name, or by IP address range.  Thus, nothing obligates me to
report any spam, and I can easily enough prevent myself from gettting
spammed twice or more from the same source.  So how does it benefit
*me* as a spam recipient, or send in a spam report?

The answer is that it doesn't.  Period, full stop. I only do it out of
a sense of community responsibility, i.e. to do my part to help pick
up trash that other people leave lying around on the Internet.  In an
ideal world the networks/providers who are the recipients of my spam
reports would be greatful for my help in truing to keep their networks
clean, EVEN TO THE POINT WHERE THEY SHOULD PAY ME OUT OF GRATITUDE upon
receiving any professionally prepared report from me.  But they don't.
(Sigh.)  At the very least they should have the minimal courtesy and
respect to not make the task of sending them a report more cumbersome
and more tedious than it needs to be.   Web reporting forms do the
exact opposite, and they are thus every bit as anti-social as spam
itself.


Regards,
rfg


P.S.  Some providers try to justify or excuse their clearly anti-social 
demand that everyone reporting abuse to them must use a web form by
claiming that they get too abuse many reports, on a regular basis, to
allow them to do anything sane or useful with such reports UNLESS they
come to them via a web form.

This is 1000% bullshit, and it indicates two things:

   1)  The provider in question is a perfectly lousy coder and is thus
   unable and/or unwilling to write code to parse emailed abuse
   reports.

   And anyway, don't actual human beings need to look at these things,
   in the end, in order to be able to react to each of them properly
   and in a professional fashion?  If so, then how does the additional
   automation of a web form even provide any real or useful service to
   *either* the originator of an abuse report *or* to the sender of
   such a report?  It doesn't, clearly.  It is just a way of maximally
   inconveniencing the originators of abuse reports, and thus to
   quite apparently deter them from reporting AT ALL.

   In fact, for me, any time a provider says to me "Oh, you need to
   use our web form to report that" I take any such statement as a
   nearly 100% reliable indicator that the provider/networ

Re: [anti-abuse-wg] Question about spam to abuse inbox

2021-02-20 Thread Ronald F. Guilmette
In message <0a339f88-8746-458d-a868-7bd3058b8...@consulintel.es>, 
JORDI PALET MARTINEZ  wrote:

>I see it in the other way around. Forms are not useful at all. You need to
>manually fill in the form, unless you modify the automated reporting tools for
>?each? ?form-holder?. Many of them also ask you to create an account in their
>ticketing system, but because you?re not their customer, you actually can?t do
>it, or can?t use it, etc. ? When I tried to follow the steps, with major
>datacenters, such as OVH (one very common hoster of ?bad? customers, not to say
>criminals), they never solve the issues, or you can?t see the ?results? of the
>investigation (I tend to think that never investigated in fact ?).

It's really too bad that this WG could never even agree to define the term
"abuse".

If there was a definition of "abuse", the perhaps some further forward
movement would be possible, specifically, as should be obvious from what
Jordi posted (which reflects the common and shared experience of most of
us) if we had a definition of "abuse" to start from, then we might be
able to move on to developing a Best Practices document for -responding-
to various kinds of abuse reports.

It's crystal clear, and has been already for many many years, that many
networks are so far away from what might be called "optimal" abuse report
handing that many are actually doing things that no only do not prevent
or deter abuse, but rather, the actions of some networks are actually and
actively encouraging, fostering, and supporting abuse.

Unlike the present situation here on earth, on any sane planet there would
at least be some generally agreed upon yardstick that would allow the
community to say definitively, and based on evidence, that "Provider X is
doing a perfectly abysmal job of handling abuse reports" or conversely that
"Provider Y is doing a fine job of professionally handing abuse reports."
Unfortunately, as of now, here on planet earth we can only share unscientific
anecdotes and (possibly biased) personal opinions.


Regards,
rfg



Re: [anti-abuse-wg] Question about spam to abuse inbox

2021-02-20 Thread Ronald F. Guilmette
In message 
=?UTF-8?Q?Cynthia_Revstr=C3=B6m?=  wrote:

>For some context, today and yesterday I have been receiving spam in the
>form of fake abuse notices to my abuse contact email address.


Example please?

In what sense are these "fake"?


Regards,
rfg



[anti-abuse-wg] REPORT: DDoS-Guard - AS57724, AS262254, AS49612

2021-02-03 Thread Ronald F. Guilmette
I hope that you all will read this report:

English version:
https://meduza.io/en/feature/2021/01/29/remove-this-infection-from-your-network

Russian version:
https://meduza.io/feature/2021/01/28/uberite-etu-zarazu-iz-svoey-seti


Regards,
rfg



[anti-abuse-wg] AFRINIC Audit report

2021-01-29 Thread Ronald F. Guilmette
The following has recebntly been posted to the RIPE web site:

https://labs.ripe.net/Members/alun_davies/outcome-of-the-afrinic-audit

I have attempted to lodge the following comment, but apparently my comment
is being held for review, presumably to insure that it does not contain
any four letter words, nor any material that might violate GDPR, another
four letter word.

   When I and my journalistic colleague, Jan Vermeulen of MyBroadband.co.za
   began our investigations into this colossal and truly epic malfeasance
   and theft of valuable IPv4 resources in mid 2019, the notion of either
   of us becoming famous or of receiving any credit for unraveling and
   publicly documenting this gigantic scandal was not what motivated us,
   nor has it been, since the beginning.  Rather, we merely wished to right
   some wrongs and return to the people of Africa some valuable IP resources
   critically needed for the ongoing development of the Internet in Africa.
   Nonetheless, it would have been, I think, at least minimally respectful
   if either AFRINIC or (now) RIPE had taken a moment to at least mention
   our names and our very evident, abundant, and key contributions towards
   exposing this whole huge mess.  Neither organization, it seems, has thus
   far elected to do so publicly.  Such is the reward, or lack thereof, of
   a job well done.


Regards,
rfg



[anti-abuse-wg] BREAKING: AFRINIC IPv4 address skulduggery FINAL REPORT - Just released

2021-01-21 Thread Ronald F. Guilmette
Holy Hell!  I didn't know until this moment that the U.S. FBI was
looking into this colossal mess, starting apparently from even before
March of 2019.

Nontheless, I still claim credit for having planted the flag first.
I was publicly bitching about all of the apparent AFRINIC funny
business starting from November 17, 2016.

https://afrinic.net/20210121-afrinic-whois-database-accuracy-report


Regards,
rfg



Re: [anti-abuse-wg] 196.52.0.0/14 revoked, cleanup efforts needed

2021-01-21 Thread Ronald F. Guilmette
In message 
, 
Ostap Efremov  wrote:

>196.52.0.0/14 was recently revoked.

Confirmed.  It appears that AFRINIC returned that /14 to its free pool.

>Before it was revoked, the whois for this /14 was:
>
>> inetnum:196.52.0.0 - 196.55.255.255
>> netname:LogicWeb-Inc
>> descr:  LogicWeb Inc.
>> descr:  3003 Woodbridge Ave
>> descr:  Edison, NJ 08837
>> country:ZA

Confirmed.  Please note however that contrary to all rumors, Edison,
New Jersey is -not- actually located in "ZA" (South Africa).

>I believe this /14 was under control from our big friend from Israel...

No.

This block -somehow- made its way... for some several years anyway...
directly into the hands of a certain Mr. Chad Abizeid, proprietor of
LogicWeb, in New Jersey, most specifically the one that's located in
in the U.S..  There's no involvement of any Israeli personages with
this specific block as far as I can determine.

>This is a BOGON, unallocated space.

Yes.  *Now* it is.

>I would appreciate if any network that is on that list and on this mailing
>list, would stop announcing parts of this hijacked /14.

That would be Good, yes.

>I reached out to  RADB to remove all the radb entries concerning this /14,
>however after 72 hours they still haven't.

In my experience, neither accuracy nor security are among RADB's strong
suits.

>How is it possible that they can't just delete all entries?

Other things just take priority sometimes, you know.

Have you never heard of Tetris?

>It is UNALLOCATED SPACE, it shouldn't be routed, it shouldn't have radb.

Well, yea.  But also, we in these United States should not have had to live
with four full years of totally unprecedented social lunacy, the likes of
which none of us have ever before known in our entire lives.  But we have
fixed that now.  Sometimes you just have to be patient.  These things take
time.


Regards,
rfg



Re: [anti-abuse-wg] DDoS-Guard, a dodgy Russian firm that also hosts the official site for the terrorist group Hamas

2021-01-20 Thread Ronald F. Guilmette
In message 
, 
Siyuan Miao  wrote:

>hamas.ps seems to be hosted on Sucuri ... a doggy US based firm?

I bitched about this to Sucuri.  They ignored me for a few days but then
kicked the site from their reverse proxy service and now it is now back
on a Russian network again:

# ORG: (RU) ORG-FG2-RIPE "OOO FREEnet Group"
#
193.233.15.207 hamas.ps

The entire 193.233.0.0/16 block is registered to this "FREEnet Group"
thing, whose contact info includes this:

address:FREEnet NOC
address:Institute of Organic Chemistry RAS
address:47, Leninsky prospect
address:119991 GSP-1, Moscow
address:Russia

(I can only speculate that the Institute of Organic Chemistry is probably
as good a source as any for DIY homemade rocket fuel formulas.)

Meanwhile the 193.233.15.0/24 sub-block is being routed by AS42745
aka "Safe Value Limited"... allegedly of the Seychelles Islands. 

I'm a bit slow on the uptake, so if someone would be so kind as to
explain to me again why RIPE is in the habit of giving out AS numbers
to companies located in tax & corporate secrecy havens which are
themselves located the Indian Ocean, I'd appreciate it.

Well, anyway. this outfit does have a very impressive web site. :-)

http://safevalue.pro/


Regards,
rfg



Re: [anti-abuse-wg] DDoS-Guard, a dodgy Russian firm that also hosts the official site for the terrorist group Hamas

2021-01-12 Thread Ronald F. Guilmette
In message 
, you wrote:

>hamas.ps seems to be hosted on Sucuri ... a doggy US based firm?

According to data provided by Farsight Security, Inc. the site was
formerly located at 190.115.18.139, which is indeed DDos-Guard,
up until 2020-11-12, and it was then moved to its current location,
192.124.249.13, which is indeed, Securi.


--
;;  bailiwick: hamas.ps.
;;  count: 70144
;; first seen: 2019-05-14 23:18:11 -
;;  last seen: 2020-11-12 13:40:58 -
hamas.ps. IN A 190.115.18.139

;;  bailiwick: hamas.ps.
;;  count: 11017
;; first seen: 2020-11-12 13:45:02 -
;;  last seen: 2021-01-12 14:21:11 -
hamas.ps. IN A 192.124.249.13




Re: [anti-abuse-wg] Huge List of Domains Cloaking to Malware (5, 000+)

2021-01-11 Thread Ronald F. Guilmette
In message 
, 
steve payne  wrote:

>There is a huge amount of some type of fraud happening with .it, .pl, .xyz
>and other domains being registered (see links below).
>
>https://docs.google.com/document/d/159Sbik8CkO9WDbLjH_tqAhr-dkpODWS1kt4UULLLfk0/edit?usp=sharing
>
>https://docs.google.com/document/d/1z43WugqqgyVjNy6-IPgON118YaE0HxrgRMKbVwW42NM/edit?usp=sharing
>
>These links contain a list of over 5,000 domains that are currently
>spamming search engines with spun text and then cloaking users to malware
>that have the search engine referrer.

I'm confused.  How exactly does one "spam" a search engine?

And what is "spun text", exactly?


Regards,
rfg


P.S.  Please send me via private email the full list of suspicious URLs.
I may not be able to actually do anything with those, but I can at least
have a look.  (For some reason my browser is not allowing me to just cut
and paste from your google docs.)



[anti-abuse-wg] Second Notice: Squatting / Fraud / Identity theft by AS13259 - Delta Telesystems Ltd. (RU)

2021-01-02 Thread Ronald F. Guilmette
Greetings all and Happy New Year.

It is my sad duty to report to you all that since my posting of 2020-12-21
noting the several squats onto various IPv4 address blocks and multiple
ASNs, little if anything has changed.  Here is a link to that prior posting:

https://www.ripe.net/ripe/mail/archives/routing-wg/2020-December/004212.html

(Note that there was one minor typo in that posting -- I wrote "AS1065" in
one place where I should have written "AS10650".)

As noted in that prior posting, all of this illicit activity quite clearly
traces back to AS13259 - Delta Telesystems Ltd. (RU).  Several abandoned
AS numbers were and are being used in an attempt to disguise that fact,
but the evidence is clear that 100% of these squats are tracable back to
AS13259.

The only thing that appears to have changed since my original report of
2020-12-21 is that now, instead of using fradulent RADB route objects to
try to frame up an apparently innocent party (Leaseweb Deutschland GmbH)
the perpetrator of these squats has removed those prior fradulent RADB
route objects and has simpley replaced them with a new set of fradulent
RADB route objects which now attempt to shift blame instead onto a different
German company, specifically the owners of AS8208, Teamware GmbH.  It is
easy to see past this new deception however, since all of the same old
squatted blocks are still being squatted.

A full listing of the affected squatted blocks is given below, along with
annotations that show, for each block, the identity of the legitimate
registrant organization and also the identity of the organization that
is routing each squatted block.

As noted in my prior report, many of these ASNs are themselves being squatted
on, specifically:

AS39325 - Viptelecom LLC
AS41762 - PE Logvinov Vladimir Vladimirovich
AS56968 - TemirLan Net Ltd
AS34498 - Jilcomservice
AS10650 - Extreme Internet

The non-squatted ASNs that are still active & willing participants in these
ongoing frauds are as follows:

AS13259  - Delta Telesystems Ltd. (RU)
AS9009   - M247 Ltd (UK)
AS397373 - H4Y Technologies LLC (US)

Given that this entire mess quite evidently originates from within the RIPE
region, it would be Nice if more could be done, by RIPE and/or the RIPE
community to put a stop to these ongoing squats.


Regards,
rfg


P.S. Most of you will no doubt have heard by now about the large and ongoing
SolarWinds[tm] hack/scandal, and probably also the belief, expressed by some,
that this gigantic hack originated in Russia.

Nobody has had the courtesy to show me the hard evidence which supports
that attribution, so I personally remain entirely ambivalent about it.
That hack, wherever it originated, does however provide me with the
opportunity to remind all of you here of the age-old differention between
abuse "on the Internet" versus abuse "of the Internet".

Regardless of origin, the SolarWinds[tm] hack did not and does not in any
way threaten the stability of the Internet.  It thus must be properly
categorized as being a kind of abuse "on the Internet"... and shame on
all those whose security missteps, on the receiving end, allowed it to
happen.

In contrast, what I have described with respect to these squats is, I think,
quite clearly abuse "of the Internet", and as such I hope that this sort
of skulduggery will earn truly international and non-partisan condemnation,
and suitably immediate attention from all quarters.  It is not in the
interests of any faction or any nation to see the Internet descend into
lawless routing chaos.


#
# ORG: (KZ) ORG-TNL11-RIPE "TemirLan Net Ltd"
#
91.229.148.0/22 - routed by AS56968  - TemirLan Net Ltd (KZ)
#
# ORG: (RU) ORG-CC3-RIPE "Gorodskaya elektronnaya svyaz Ltd"
#
85.28.48.0/20 - routed by AS13259 - Delta Telesystems Ltd. (RU)
#
# ORG: (RU) ORG-OA780-RIPE "OOO \"IT-Region\""
#
79.173.104.0/21 - routed by AS13259 - Delta Telesystems Ltd. (RU)
#
# ORG: (RU) ORG-PL249-RIPE "Prime-Service LLC"
#
128.0.80.0/20 - routed by AS34498 - Jilcomservice (RU)
#
# ORG: (RU) ORG-TCUL3-RIPE "Telecommunications center UMOS, LLC"
#
85.89.104.0/21 - routed by AS13259 - Delta Telesystems Ltd. (RU)
#
# ORG: (UA) ORG-FA278-RIPE "Filite Ltd"
#-

Re: [anti-abuse-wg] AS28753 - Leaseweb Deutschland GmbH -- Facilitating legacy squatting?

2020-12-20 Thread Ronald F. Guilmette
In message <73c593e8-88b4-0c47-bda3-b1a053b9f...@storey.ovh>, 
PP  wrote:

>and more importantly, how much of this crap is occurring that even he 
>himself has not yet noticed?

Thank you for your kind comments.

More coming.  You ain't seen nuttin' yet!

NOTE:   Yes, there's more... way more.  The main constraint that
slows me down in posting and presenting this kind of stuff is
*not* my ability to find such things.  Rather, the main constraint
is the time it takes to write up my findings, carefully, in a way
so that everyone can see the real issue/problem, and in ways that
that won't get me sued (because all of the relevant, undeniable,
and independently verifiable facts are presented).

For example, I really can't say for sure whether or not AS28753 -
Leaseweb Deutschland GmbH actually has any involvement with this
set of apparent squats or not, and it is really entirely possible
that they don't.  (Note that whoever did this used a disposable
@yahoo.com email address.)  If Leaseweb actually doesn't have anything
to do with this, then maybe they will do the planet a favor and
register their unhappiness about being framed for this crime with
the people who run the fundamentally flawed RADB data base, who
are effectively allowing such bogus frame-ups to take place.


Regards,
rfg



[anti-abuse-wg] AS28753 - Leaseweb Deutschland GmbH -- Facilitating legacy squatting?

2020-12-20 Thread Ronald F. Guilmette
In the period from 2020-12-04 until 2020-12-10 someone representing
AS28753 - Leaseweb Deutschland GmbH, or someone purporting to represent
that ASN/company created a set of thirteen (13) new route: entries in
the security-free RADB data base:

https://pastebin.com/raw/qs9yywFe

It appears somewhat more than coincidental that many of these new RADB
route entries refer to either(a) legacy IPv4 address blocks in the ARIN
region or else (b) unassigned (bogon) IPv4 address space in the ARIN
region.

A listing of the relevant IPv4 cidrs along with the top-level allocation
holders for each CIDR is given in the following table:

https://pastebin.com/raw/rnqMXHW0

Although there is some ambiguity regarding the status of the non-US/non-ARIN
blocks listed in the above table, my inspection of the relevant WHOIS
records for the US/ARIN blocks indicates to me that these are all either
(a) abandoned IPv4 legacy blocks or else (b) unassigned ARIN bogons.  This
strongly suggests that all of the IPv4 address blocks named in all of the
relevant RADB rote entries may be, and likely are being squatted on at the
present time.

Please note however that AS28753 - Leaseweb Deutschland GmbH - is not
itself doing any of the squatting.  Rather, the squatting is being
undertaken by the various ASNs mention in the following active routing
summary:

62.182.160.0/21AS39325   RU  Viptelecom LLC
79.173.104.0/21AS13259   RU  Delta Telesystems Ltd.
85.28.48.0/20  AS13259   RU  Delta Telesystems Ltd.
85.89.104.0/21 AS13259   RU  Delta Telesystems Ltd.
89.187.8.0/21  AS41762   UA  PE Logvinov Vladimir Vladimirovich
91.229.148.0/22AS56968   KZ  TemirLan Net Ltd
128.0.80.0/20  AS34498   RU  Jilcomservice
199.61.32.0/19 AS9009GB  M247 Ltd
204.229.64.0/19AS10650   US  Extreme Internet
205.134.96.0/19AS10650   US  Extreme Internet
205.148.96.0/19AS397373  US  H4Y Technologies LLC
209.151.96.0/19AS9009GB  M247 Ltd
216.93.0.0/19  AS9009GB  M247 Ltd

Note that AS10650 (Extreme Internet) is itself a legacy abandoned ARIN
ASN.  It is likely also squatted.  It's one and only current upstream,
according to bgp.he.net, is AS13259 - Delta Telesystems Ltd. (Russia).

In fact, all of the following ASNs from the above table also have AS13259,
Delta Telesystems Ltd. (Russia) as their one and only upstream at the
present time:

AS39325 - Viptelecom LLC
AS41762 - PE Logvinov Vladimir Vladimirovich
AS56968 - TemirLan Net Ltd
AS34498 - Jilcomservice
AS1065  - Extreme Internet

On this basis it would appear that the root of the problem in this case
lies at AS13259, Delta Telesystems Ltd. (Russia).

As a mitigation for these squats, I recommend dropping/blocking all of
the IPv4 CIDRs listed above.  Additionally, since AS13259 appears to
be highly untrustworth at the present time. I would advise blocking
all traffic to/from these blocks also:

https://bgp.he.net/AS13259#_prefixes

79.173.104.0/21
82.147.68.0/24
82.147.70.0/24
82.147.71.0/24
82.147.75.0/24
85.28.48.0/20
85.89.104.0/21
91.206.16.0/23
193.107.92.0/22
2001:678:68c::/48


Regards,
rfg



Re: [anti-abuse-wg] AS47510 & AS35555 -- Bogon ASNs routing Bogon IPv4 space

2020-12-12 Thread Ronald F. Guilmette
In message 
=?UTF-8?Q?T=C3=B6ma_Gavrichenkov?=  wrote:

>On Sat, Dec 5, 2020, 1:57 AM Ronald F. Guilmette 
>wrote:
>
>> It appears that AS47510 is itself an unallocated bogon at the present
>> time:
>>
>> https://bgp.he.net/AS47510#_asinfo
>>
>> As can be readily seen at the above link, AS47510 is peering with only
>> two other ASNs, i.e. AS29226 - JSC Mastertel (Russia) and AS3 -
>> Crex Fex Pex Internet System Solutions" LLC.
>>
>
>Both peering links are now down.
>
>The matters with AS3 may be harder to resolve, though.

If possible please elaborate.

It appears that AS3, which is a bogon ASN, is bdeing kept alive at
this point only by AS213254 -- Rait Telecom, which is just a seven-month
old Russian company/ASN with -zero- IP allocations and apparently NO WEB
SITE.

And yet despite being only 7 months old and having absolutely no IP space
of its own (and also no web site), Rait Telecom has somehow managed to work
itself into the fabric of no fewer than seven European IXes:

https://bgp.he.net/AS213254#_ix

And it also has managed to acquire all these IPv4 peers:

AS25091  IP-Max SA
AS50340  OOO "Network of data-centers "Selectel"
AS35297  Dataline LLC
AS199524  G-Core Labs S.A.
AS3  "Crex Fex Pex Internet System Solutions" LLC
AS49673  Truenetwork LLC
AS8492  "OBIT" Ltd.
AS42861  Foton Telecom CJSC
AS35598  INETCOM LLC
AS47441  TRUNK MOBILE, INC

How exactly does that even happen?

And who the hell are these people anyway?


Regards,
rfg



Re: [anti-abuse-wg] AS16019, vodafone.cz == idiots

2020-12-12 Thread Ronald F. Guilmette
In message <83900d1f-3eb8-4d72-8a8e-2086bcd0d...@devnull.ru>, 
Sergey Myasoedov  wrote:

>my two cents on this:
>http://www.openspf.net/Why?s=3Dmfrom;id=3Drfg%40tristatelogic.com;ip=3D80.=
>95.99.97;r=3Dmail2.dkm.cz
>
>There are many SMTP relays in the world checking SPF record for the
>incoming mail and providing a diagnostics with openspf.net web.

That would be fine, BUT... there isn't a goddamn single thing wrong with
my domain's SPF record.

The brain damage is on THEIR END.  Apparently they don't even know how
to check SPF TXT properly.

>But unfortunately this website is down for almost two years and this
>diagnostics leads to nowhere.

Yea, there's that also.

Basically, it is stupid layered on top of stupid.

It's a stupid sandwich.


Regards,
rfg



[anti-abuse-wg] AS16019, vodafone.cz == idiots

2020-12-12 Thread Ronald F. Guilmette
Some days I am inclined to wonder how or why anything at all actually
works on this planet.  I suspect that I am not alone, given that
Covid-19 has now exposed for all the world to see just how inept and
dysfunctional even so-called "first world" systems are at dealing
with anything that is even just a little bit out of the ordinary.

Another case in point: AS16019 aka vodafone.cz, whose formally
declared abuse reporting address, as given in the WHOIS record
for the ASN, is ab...@vodafone.cz.  Unfortunately, if you send
a copy of a spam that you have received from their network to that
address, you will get back something that may look vaguely like this:

: host mail2.dkm.cz[62.24.64.36] said: 550 5.7.1
: Recipient address rejected: Please see

http://www.openspf.net/Why?s=mfrom;id=rfg%40tristatelogic.com;ip=80.95.99.97;r=mail2.dkm.cz

So, the retorical question for the day is:  Just how completely idiotic
does any given group of network operators have to be in order to be
unable to just simply operate a functioning email address for inbound
messages?

I guess Vodafone is either too broke or too cheap to hire merely competent
people.

It would be one thing if this was an impoverished third-world country
involved here, but it isn't.  It's the Czech Republic.  So what is their
excuse for this level of sheer incompetence?

Does someone need to send a formal memo to Vodafone, explaining to them
about this thing called spam?

And why are they even leaving port 25 outbound open on end-luser lines?


Regards,
rfg



[anti-abuse-wg] AS47510 & AS35555 -- Bogon ASNs routing Bogon IPv4 space

2020-12-04 Thread Ronald F. Guilmette
I have just received a spam which has a so-called "payload" URL which
the spammer wants me to visit, apparently so that I can be sold some
male performance drugs of dubious origin.

The domain part of the URL resolves to the IPv4 address 217.8.117.98.

That address lies within a pair of bogon (unallocated) IPv4 address
blocks, 217.8.116.0/24 and 217.8.117.0/24, that are both being routed
by a common ASN, i.e. AS47510.

https://bgp.he.net/AS47510#_prefixes

It appears that AS47510 is itself an unallocated bogon at the present
time:

https://bgp.he.net/AS47510#_asinfo

As can be readily seen at the above link, AS47510 is peering with only
two other ASNs, i.e. AS29226 - JSC Mastertel (Russia) and AS3 -
Crex Fex Pex Internet System Solutions" LLC.

The latter ASN, AS3 also appears to be an unallocated bogon ASN
at the present time.  Nontheless, that does not appear to be preventing
it from peering with yet another Russian network, AS213254 - OOO Rait
Telecom:

https://bgp.he.net/AS3

It would be Nice, in my opinion, if someone who speaks Russian could
make contact with the operators of AS29226 and AS213254 and respectfully
suggest to them that they should cease peering with bogon ASNs, such as
AS47510 and AS3, including but not limited to bogon ASNs that are
at present routing bogon IPv4 address space.


Regards,
rfg


P.S.  It appears that the company "Crex Fex Pex Internet System Solutions,
LLC" which was the former owner of AS47510 and AS3 and also AS60031
was a Russian entity, and one that most likely no longer qualifies as
what one would call a "going concern":

https://crex-fex-pex.ru/




[anti-abuse-wg] ORG-TKDS1-RIPE - VECTRA S.A. - Spam filters & abuse reporting addresses

2020-12-04 Thread Ronald F. Guilmette
Based on my experience, if one is reporting spam to most typical
networks, the network operators generally like to actually -see-
the spam being reported.  Thus, I always include a copy.

It is Good that RIPE resource holders now all have abuse reporting
addresses in their WHOIS records.  It is also Good that RIPE NCC is
now checking these abuse reporting  contact email addresses to insure
that they actually function, at least minimally.

What is un-good, in my opinion, is for any network to have an abuse
reporting address set up with *content based* anti-spam filters.

To illustrate this point, I have recently received a spam from an
IP address that is currently being routed by AS29314 - Vectra S.A.,
located in Poland.  I duly forwarded a full copy of that spam to
the abuse reporting address provided in the RIPE WHOIS for AS29314,
i.e. ab...@vectra.pl.  That message was rejected with the following
SMTP reject message:

: host smtp.vectra.pl[88.156.64.22] said: 554 Spam. Email
Session ID: 86748699 (in reply to end of DATA command)

Given that outcome, I now feel compelled to locally blacklist all IP
space associated with ORG-TKDS1-RIPE (VECTRA S.A.) until such time as
some kind soul provides the operators of this network with some education
on the topic of how to operate an abuse reporting address.

The space in question is as follows:

31.11.128.0/17
31.22.96.0/21
31.135.168.0/21
37.8.192.0/18
37.77.152.0/21
46.36.224.0/19
62.122.112.0/21
77.222.224.0/19
78.31.152.0/21
78.31.209.0/24
78.88.0.0/16
82.139.0.0/18
83.143.40.0/21
83.143.136.0/21
83.243.104.0/21
88.156.0.0/16
89.151.0.0/18
91.192.76.0/22
91.230.159.0/24
91.230.162.0/23
91.230.164.0/22
91.231.116.0/23
91.238.232.0/22
93.105.0.0/16
94.231.48.0/20
95.160.0.0/16
109.107.0.0/19
109.197.56.0/21
109.197.64.0/21
109.241.0.0/16
178.235.0.0/16
185.51.180.0/22
192.166.120.0/23
193.108.228.0/23
193.201.18.0/23
194.54.188.0/22
195.26.72.0/22
195.28.170.0/23
195.95.170.0/24
195.191.162.0/23
195.225.92.0/22
195.242.252.0/22




Re: [anti-abuse-wg] IPv4 squatting -- Courtesy of AS44050, AS58552

2020-12-03 Thread Ronald F. Guilmette
In message 
, 
IP Abuse Research  wrote:

>What the
>continued findings indicate is a need for IANA and the RIRs to adapt to a
>new stage in the resource issuance and governance lifecycle. Since this is
>by definition a working group, would it make sense to establish some
>metrics to quantify the perceived impact of this phenomenon on abuse?
>
>If we establish a process to collect these observations of either
>"abandoned" resources, prefixes or ASNs, which then re-appear mysteriously
>or in the case of an ASN start routing space that is unexpectedly,
>"hijack", we can take a step as a community to quantify the phenomenon?

This kind of stuff certainly could be done, but this would be a serious
research project, requiring sme serious manpower expenditure.  That's not
to say that it would not be worth the investment.  I think it would be.
But someone or something would have to step up to make the investment.

In the meantime, there is other work, and other steps that would obviously
be worthwhile.

The first is doing everything possible to try to get RPKI adopted more
widely.

The second is persuading everyone, certainly including Petersburg Internet,
to stop even trying to use an data from RADB.  That thing has -zero-
security.  Any fool can use that at any time to create any route object
he/she/it wants.

And speaking of which, I for one would love to know if Petersburg Internet
was performing -any- checking on those route announcements it was passing
on behalf of its customer in this case.  If not, then that right there
constitutes some "low hanging fruit" in terms of moving things forward so
as to prevent repeats of this kind of situation.


Regards,
rfg




Re: [anti-abuse-wg] IPv4 squatting -- Courtesy of AS44050, AS58552

2020-12-03 Thread Ronald F. Guilmette
In message 
=?UTF-8?Q?T=C3=B6ma_Gavrichenkov?=  wrote:

>On Wed, Dec 2, 2020 at 12:42 PM T=C3=B6ma Gavrichenkov  =
>wrote:
>> AS44050 is basically the SOHO provider for the St. Petersburg Internet
>> Exchange.  St. Petersburg's population is slightly below 5 million
>> people, not counting satellite cities and suburbs (which, if counted,
>> would contribute another 2 millions I think), and the city has quite
>> got a reputation for hidden criminal activity.  It's Chicago-style if
>> you will.  Surely there are also quite a few criminals in one of the
>> largest ISP networks of the city.
>
>To avoid blatant misunderstanding and inappropriate jokes: that's a
>few criminals AS CUSTOMERS of the largest SOHO ISP network of the city.

I, for one, am not offended.  We do indeed have plenty of our own criminals
right here in the U.S. of A., including in Chicago, and that includes cyber-
criminals.

>There's no reason at this point to suspect intentional harm from the
>employees.

OK, who then?

Someone is responsible, even if no one wishes to take responsibility.

Those several bogus route announcements did not create themselves.

And this shouldn't be a hard question to get an answer to.  The fact
that it is, for some unexplained reason, is indicative of just how far
trust & cooperation in the "Internet community" have deteriorated to
the point where they are nothing more that the butts of jokes.


Regards,
rfg



Re: [anti-abuse-wg] IPv4 squatting -- Courtesy of AS44050, AS58552

2020-12-03 Thread Ronald F. Guilmette
In message 
, 
=?UTF-8?Q?T=C3=B6ma_Gavrichenkov?=  wrote:

>> Neither AS44050 nor AS58552 was never announcing any of the squatted
>> prefixes themselves directly.
>> Rather AS44050 was... for reasons which have yet to be explained... peering
>> with the set of four apparently squatted ASNs
>
>Yes, this is understood.  There's no peering anymore. See e.g.:

Very good.  I have confirmed.

>> If you are in a position to have one more short conversation with the
>> owners and/or operators of AS44050, Petersburg Internet Network Ltd.,
>> then please be so kind as to ask them on my behalf why they were
>> peering with those four different apparently squatted & abandoned ASNs.
>
>I don't think I'm anywhere close to a position where I can ask them
>questions like that.

OK.  Just give me the contact information that was used to have this
previous "brief conversation" with them, and I will ask them myself.

See, I'm not like most folks who just shrug and move on after an incident
like this.  I sort of like to find out what really happened, why, and who
is actually responsible.

Either Petersburg Internet Network did this themselves, or else *somebody*
was paying them a *lot* of money to get them to provide peering & transit
to all of these bogus squatted ASNs.

>> The name "Petersburg Internet" has come up, time and time again,
>> in relation to online skulduggery and malfesance. [..]
>> https://krebsonsecurity.com/page/2/?s=3DPetersburg+Internet&x=3D0&y=3D0
>
>This search yields all the results containing "petersburg" OR
>"internet".  There's no doubt there would be many in this case.

That's actually not correct, but it turns out that we were both half
right and both half wrong about Brian Kerbs' web site search function.

I looked into this, and it now appears that if you search for "Petersburg
Internet" on Brian's site, you *do not* get the results for "Petersburg
OR Internet" and you also *do not* get results for "Petersburg AND Internet".
In fact, it looks like the search function just ignores the second word
entirely, so the search is effectively for just "Petersburg".

In any case, you may wish to have a loook at the following article in
which the company *is* mentioned, and not in any good way:

https://krebsonsecurity.com/2016/07/carbanak-gang-tied-to-russian-security-firm/

I would also recommend perusing page 28 of the following expert witness
statement, which relates to botnet command & control servers:

http://cdn.cnn.com/cnn/2019/images/03/15/xbt.doc.248.2.pdf

See also page 5 of this academic paper about automated Internet attacks:

https://grehack.fr/data/2017/slides/GreHack17_Automation_Attacks_at_Scale_paper.pdf

>AS44050 is basically the SOHO provider for the St. Petersburg Internet
>Exchange.  St. Petersburg's population is slightly below 5 million
>people, not counting satellite cities and suburbs (which, if counted,
>would contribute another 2 millions I think), and the city has quite
>got a reputation for hidden criminal activity.  It's Chicago-style if
>you will.  Surely there are also quite a few criminals in one of the
>largest ISP networks of the city.

Yes, but if any of -our- criminals attack people or businesses located in
other countries, we will allow them to be extradited to those other countries
to face trial.  Your country, I am sad to say, instead protects online
miscreants, and insures that they never have to face justice.  You know
that, I know that, everybody who knows even the first thing about online
cybercrime knows that.  It's not exactly a secret.


Regards,
rfg



Re: [anti-abuse-wg] IPv4 squatting -- Courtesy of AS44050, AS58552

2020-12-02 Thread Ronald F. Guilmette
In message 
,
 
Brian Nisbet  wrote:

>My comments about the apnic-talk address was that I wasn't sure if that list
>was used to the kind of content, and I was worried that it might not get
>Ronald's message where it would it best for it to go...

I've looked around and frankly, the pickings, when it comes to APNIC mailing
lists, are rather on the lean/sparse side.  That region doesn't have a "abuse"
working group or mailing list.  It does have a "Routing Security" Special
Interest Group (SIG) and an associated mailing lists for that,  and you're
right, Brian, that I might have been better off to send my notice there, rather
than sending it to apnic-talk, as I did do, but then again it could be argued,
albeit a bit tongue-in-cheek, that what I posted had more to do with routing
IN-security than it did with routing security, per se.

Not that any of this matters much anyway.   As I have been infomred several
thousand times, none of the RIRs are "the Internet Police" and thus all are
utterly powerless to even so much as officially -care- about such matters.
But given the general difficulty of finding anybody anywhere who cares about
such events/schemes, I confess that I do have a tendency to just shout into
the wind and hope that someone somwhere who has the authority to act will
see what I have written, will care, and will act.


Regards,
rfg



Re: [anti-abuse-wg] IPv4 squatting -- Courtesy of AS44050, AS58552

2020-12-01 Thread Ronald F. Guilmette
In message 

=?UTF-8?Q?T=C3=B6ma_Gavrichenkov?=  wrote:

>On Mon, Nov 30, 2020 at 10:09 AM Ronald F. Guilmette
> wrote:
>> Please be advised that the set of IPv4 blocks listed below appear to be
>> squatted on at the present time, with the apparent aid and assistance of
>> AS44050 -- "Petersburg Internet Network Ltd." (Russia) and also AS58552
>> "PT Multidata Rancana Prima" (Indonesia).
>
>Please be informed that after a (pretty short) conversation AS44050 is
>not announcing those prefixes anymore.

Neither AS44050 nor AS58552 was never announcing any of the squatted
prefixes themselves directly.

Rather AS44050 was... for reasons which have yet to be explained... peering
with the set of four apparently squatted ASNs which were in turn announcing
the various squatted prefixes.

If you are in a position to have one more short conversation with the
owners and/or operators of AS44050, Petersburg Internet Network Ltd.,
then please be so kind as to ask them on my behalf why they were
peering with those four different apparently squatted & abandoned ASNs.

If, as I suspect, they wish to blame some other party for all of this
apparent skulduggery, and if they wish such an excuse to be believable,
then at the very least they should be willing to identify whatever
other party they would like to shift the blame to.

Not that any of their lame excuses will be too awfully believable in any
event.  The name "Petersburg Internet" has come up, time and time again,
in relation to online skulduggery and malfesance.  And not just among
the anti-abuse people that I hang out with.  I just now did a search on
the web site of journalist Brian Krebs for the name "Petersburg Internet"
and found no fewer than 19 different stories, written by Krebs, that
featured this network, in some supporting role or another... and not in
any good way.

https://krebsonsecurity.com/page/2/?s=Petersburg+Internet&x=0&y=0

(Full disclosure: I have direct personal knowledge of, and had direct
participation in the development of some, but certainly not all of
those Krebs stories.)


Regards,
rfg



Re: [anti-abuse-wg] IPv4 squatting -- Courtesy of AS44050, AS58552

2020-12-01 Thread Ronald F. Guilmette
In message , Brian Nisbet  wrote:

>However I suspect that X-posting to a list like apnic-talk may not be the
>wisest idea, given the different populations etc...

It is among my fondest hopes that cybercriminals of all stripes, and
particularly the ones who squat on IPv4 space that doesn't belong to
them, will, in future, show more respect for regional boundaries, such
that their devious activities will only oblige me to notify the
members of a single one of the five RIR regions regarding any single
one of these elaborate criminal schemes.  Alas, in this instance
however, the perpetrators, in a very unsportsmanlike manner, elected
to make messes whose roots were found in both the RIPE region and also
in the APNIC region.  (And that's not even to mention that most of the
squatted IPv4 real estate was and is under the administration of the
ARIN region.)

Clearly, authorities in all five regions should be devoting somewhat
more effort towards the cultivation of a better and more respectful
class of cybercriminals who will confine their convoluted schemes to
their own home regions.


Regards,
rfg



Re: [anti-abuse-wg] IPv4 squatting -- Courtesy of AS44050, AS58552

2020-11-30 Thread Ronald F. Guilmette
In message , Randy Bush  wrote:

>> Amongst the greatest mysteries of the shady underbelly of the
>> internet: how to pronounce "Guilmette"
>
>speaking of anti-abuse; back in the '80s we agreed that making fun of
>others' typos, misspellings, personal names, etc. was impolite.

I do not believe the original poster was making fun of my name, and
I likely would not take exception even if the OP had done so.

There have certainly been far more scurrilous and disturbing things
said about me personally, on various mailing lists, so I am somewhat
inoculated against taking too much offense nowadays about virtually
anything personal.

If one is fortunate to live long enough, one develops a thick skin.


Regards,
rfg



[anti-abuse-wg] AS55330 -- Routing oddities

2020-11-30 Thread Ronald F. Guilmette
Some people seem to think that I'm sort of a master Internet sleuth.
The truth is that I'm just as dumb as anybody else, and maybe even
moreso.  But if one spends enough time looking at stuff on the Internet,
it really takes both very little time and also very little in the way
of brains to notice many many inexplicable oddities.

AS55330 is a case in point.  This ASN was allocated/assigned to the
Afghan government by APNIC, circa 2009-12-08.  Given the nature of
the registrant in this case, One might thus reasonably assume that
this ASN, belonging as it does to a national government, would be one
of the last ones that one would ever see as being involved in any
kind of untoward hanky panky or funny business on the Internet.

But despite that, I feel compelled to ask if anyone would like to take
a stab at explaining to me why the Afghan national government's ASN
would be announcing routes to IP blocks belonging to (a) a Chinese
commercial enterprise (180.94.99.0/24) and also (b) several RIPE-issued
IPv4 blocks that appear to be the property of some Airbus facility
located in Norway (182.50.176.0/24, 182.50.177.0/24, 182.50.178.0/23,
182.50.180.0/22):

https://bgp.he.net/AS55330#_prefixes

I am not persuaded that Airbus/Norway's apparent reliance on the Afghan
government to route their IPv4 space for them is an entirely sustainable
business model, over the longer term.

If I have misunderstood any of the data I'm looking at, then I do apologize
to all parties concerned.


Regards,
rfg



Re: [anti-abuse-wg] IPv4 squatting -- Courtesy of AS44050, AS58552

2020-11-30 Thread Ronald F. Guilmette
In message , 
Alessandro Vesely  wrote:

>Only a few of them are listed on https://www.spamhaus.org/drop/

I have some hope and faith that that state of affairs will be rectified
in due course, and likely before too long, now that I have shared this
info widely.


Regards,
rfg



[anti-abuse-wg] IPv4 squatting -- Courtesy of AS44050, AS58552

2020-11-29 Thread Ronald F. Guilmette
Please be advised that the set of IPv4 blocks listed below appear to be
squatted on at the present time, with the apparent aid and assistance of
AS44050 -- "Petersburg Internet Network Ltd." (Russia) and also AS58552 --
"PT Multidata Rancana Prima" (Indonesia).

These blocks appear to be mostly or entirely very old "legacy" block,
primarily from the ARIN region.

It should additionally be noted that downstream from AS44050 and AS58552
there appear to be a number of other ASNs which themselves appear to be
squatted on, without the consent or permission of the rightful owners,
at the present time, and tghat these are the ASNs that are actually routing
most or all of the squatted-on IPv4 space listed in teh table below,
specifically:

AS6603US  CottonWood CyberVentures  (NOTE: legacy ASN)
AS7309US  The Virtual Marketing Corporation  (NOTE: legacy ASN)
AS24199   ID  Dini Nusa Kusuma, P.T.  (allocated: 2011-03-01)
AS62927   US  Moose-Tec  (allocated: 2015-02-20)
AS198448  -- unknown/unallocated

All parties are advsed to take action as seems appropriate, under the
circumstances.

Looking at the RIPE Routing History, specifically for AS7309, strongly
suggests that this extensive squatting campaign has been ongoing since
at least 2019-09-29.  The table below only lists currently active squats
however.  Most or all of these are represented in the (unsecured) RADB
data base in association with the somewhat mysterious email addresses
 and/or .

The uswo.network domain name was registered on 2020-07-24.  It has no
associated web site, nor indeed does it or any subdomain associated with
it have any IP address.  (MX is set to send email to the mail servers of
registrar namecheap.com.)


#
# COUNT: 1 ORG: (CA) ARENAC "Arena Communications"
#
199.84.16.0/20
#
# COUNT: 1 ORG: (CA) HUSKY-1 "Husky Energy Inc."
#
199.185.144.0/20
#
# COUNT: 1 ORG: (CA) NINS-1 "AllCore Communications Inc."
#
68.66.48.0/20
#
# COUNT: 16 ORG: (ID) IRT-DNK-ID "PT Dini Nusa Kusuma"
#
202.89.208.0/24
202.89.209.0/24
202.89.210.0/24
202.89.211.0/24
202.89.212.0/24
202.89.213.0/24
202.89.214.0/24
202.89.215.0/24
202.89.216.0/24
202.89.217.0/24
202.89.218.0/24
202.89.219.0/24
202.89.220.0/24
202.89.221.0/24
202.89.222.0/24
202.89.223.0/24
#
# COUNT: 1 ORG: (PT) HS2098-RIPE "Rumos, SA"
#
192.199.16.0/20
#
# COUNT: 1 ORG: (US) CORP "Corporate Communications, Inc."
#
207.70.224.0/20
#
# COUNT: 1 ORG: (US) DHIN "Dean Health Information Network"
#
199.217.16.0/20
#
# COUNT: 1 ORG: (US) DTEK "Friends of Synergytics"
#
207.228.192.0/20
#
# COUNT: 1 ORG: (US) EVANS-25 "Evanston Data & Colocation, Inc."
#
96.45.144.0/20
#
# COUNT: 1 ORG: (US) FLEXFA "Flexfab Division"
#
204.44.208.0/20
#
# COUNT: 1 ORG: (US) HASTIN-6 "Hastings Entertainment Inc."
#
204.156.192.0/20
#
# COUNT: 2 ORG: (US) HAWK "Hawk Communications"
#
69.8.64.0/20
69.8.96.0/20
#
# COUNT: 1 ORG: (US) IE "Enternet Express"
#
206.125.16.0/20
#
# COUNT: 1 ORG: (US) MACROV-1 "Rovi Corporation"
#
64.92.224.0/20
#---

[anti-abuse-wg] Phishing for your RIPE credentials

2020-04-29 Thread Ronald F. Guilmette
If any odf you happen to get a phishing spam that looks anything like
this one:

   https://pastebin.com/raw/1MJGMbUK

then please do report it to ab...@orange-business.com since the source
IP (212.234.232.249) belongs to Orange, as does the domain name
gmessaging.net (which someone @ Orange foolishly didn't even bother
to create a web site for).


Regards,
rfg



Re: [anti-abuse-wg] RIPE NCC Executive Board election

2020-04-16 Thread Ronald F. Guilmette
In message 
,
 
Brian Nisbet  wrote:

>While obviously I can only make comments for AA-WG (I note there are many
>WGs in x-post) I need to point out that this is not a suitable email for
>this working group.

Others may disagree.  I most certainly do.

The Anti-Abuse Working Group has been repeatedly given ample opportunities 
to provide a formal definition for the term "abuse" with respect to the
Internet, and Internet resources.  It has declined all of these opportunities.

It logically and inescapably follows from that fact that as far as the
entire RIPE community goes, "abuse" remains in the eye of the beholder.

I know more than a few people, both on this list and elsewhere, who,
like me, are of the opinion that active participation in the fradulent
theft of IP address blocks, regadless of which portion of the world's
Internet they are stolen from, consititutes "abuse" of a kind that quite
properly is and should be a concern of this working group.

Also and likewise, I know more than a few people, both in this Working
Group, and elsewhere, who, like me, are of the opinion that the act of
attempting to fradulently extort IP address assets from the rightful
owner of said assets, e.g. the City of Cape Town, South Africa, is
"abuse" of a type that is and rightly should be of concern to this
Working Group, and further, that these acts are also a repugnant abuse
against simple honesty, decency, and humanity generally, and ones that
cannot be either excused or dismissed, let alone rewarded with a RIPE NCC
executive board seat.

You, Brian, along with every other member of this Working Group had
your opportunity to codify a definition of "abuse" that would explicitly
exclude theft, fraud, and extortion, thuse rendering exactly such gross
misdeeds explicitly irrelevant to this Working Group.  You declined to do
so, as did others.  It follows that you cannot now say that such acts
have no relevance to the Anti-Abuse Working Group.  You are the Chainman
of the Working Group.  You are not the King... an entirely salient point
which our own Mr. Trump has of late needed to be reminded of also.

Theft, fraud, and extortion, especially as they relates to IP address
allocations, as in this case, may be something that you personally
prefer to turn a blind eye to, but your personal preferences in this
regard cannot and will not override the conscience of those who prefer to
see things as they are, based on abundant evidence, even if those members
of this WG who still place some value on simple decency and honesty are
in the minority.


Regards,
rfg




[anti-abuse-wg] RIPE NCC Executive Board election

2020-04-16 Thread Ronald F. Guilmette
Greetings all,

I know that all is not right with the world right now, and that most of
you, like me, have much more pressing things on your minds right now, but
someone just sent me the following link and I cannot exactly ignore it:

https://www.ripe.net/participate/meetings/gm/meetings/may-2020/confirmed-candidates

I would like to call everyone's attention to the last of the three candidates
who have, it seems, "qualified" as candidates for open seats of the RIPE NCC
Executive Board.

As I have already said, I know that things are bad in the world right now,
but I must ask this question:  Is there really no one other than these
three candidates who is willing and/or able to stand for the three open
seats on the RIPE NCC Executive board... three open seats that will be
voted on at the next general meeting, 13-15 May 2020 ?

If not, then it seems that RIPE NCC will soon be following in the new
tradition, established first by AFRINIC only last year, of placing well
and widely known crooks on it board.

I desperately hope it won't come to that, but that is not for me to decide.

The decision is in your hands dear friends.


Regards,
rfg



[anti-abuse-wg] Reporting abuse to OVH -- don't bother

2020-02-12 Thread Ronald F. Guilmette
The RIPE WHOIS data base says that the abose contact for AS16276 is
ab...@ovh.net.

It would appear thet the folks at OVH haven't yet quite figured how
this whole email thing works.

Give them time.  Another decade or two and they should have it down pat.


--- Forwarded Message

Date:12 Feb 2020 10:26:23 +0200
From:mailer-dae...@mx1.ovh.net
To:  r...@tristatelogic.com
Subject: failure notice

Hi. This is the qmail-send program at mx1.ovh.net.
I'm afraid I wasn't able to deliver your message to the following addresses.
This is a permanent error; I've given up. Sorry it didn't work out.

:
user does not exist, but will deliver to /homez.12/vpopmail/domains/ovh.net/abu
se/
can not open new email file errno=2 file=/homez.12/vpopmail/domains/ovh.net/abu
se/Maildir/tmp/1581495983.28582.mail141.ha.ovh.net,S=10651
system error

- --- Below this line is a copy of the message.

Return-Path: 
Received: from localhost (HELO queue) (127.0.0.1)
by localhost with SMTP; 12 Feb 2020 10:26:23 +0200
Received: from unknown (HELO output55.mail.ovh.net) (10.108.98.118)
  by mail141.ha.ovh.net with AES256-GCM-SHA384 encrypted SMTP; 12 Feb 2020 10:2
6:23 +0200
Received: from vr15.mail.ovh.net (unknown [10.101.8.15])
by out55.mail.ovh.net (Postfix) with ESMTP id 48HXmH0nz4z7SwqFq
for ; Wed, 12 Feb 2020 08:26:23 + (UTC)
Received: from in32.mail.ovh.net (unknown [10.101.4.32])
by vr15.mail.ovh.net (Postfix) with ESMTP id 48HXm96hlfz1DGZD
for ; Wed, 12 Feb 2020 08:26:17 + (UTC)
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=69.62.255.118; helo=
outgoing.tristatelogic.com; envelope-from=r...@tristatelogic.com; receiver=abuse
@ovh.net 
Authentication-Results: in32.mail.ovh.net; dkim=none; dkim-atps=neutral
Received: from outgoing.tristatelogic.com (segfault.tristatelogic.com [69.62.25
5.118])
by in32.mail.ovh.net (Postfix) with ESMTP id 48HXm91ZjszZ0l2m
for ; Wed, 12 Feb 2020 08:26:16 + (UTC)
Received: by segfault.tristatelogic.com (Postfix, from userid 1237)
id 5A1884E69A; Wed, 12 Feb 2020 00:26:10 -0800 (PST)
From: "Ronald F. Guilmette" 
To: ab...@ovh.net
Cc: spamrepo...@tristatelogic.com
Subject: Spam from your network (AS16276): [54.39.173.134]
Date: 12 Feb 2020 00:26:10 -0800
X-Rfg-Spam-Report: (AS16276): [54.39.173.134]
Message-Id: <20200212082610.5a1884e...@segfault.tristatelogic.com>
X-Ovh-Remote: 69.62.255.118 (segfault.tristatelogic.com)
X-Ovh-Tracer-Id: 13162051389114427986
X-VR-SPAMSTATE: OK
X-VR-SPAMSCORE: 0
X-VR-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgedugedrieeggdduudehucetufdoteggode
trfdotffvucfrrhhofhhilhgvmecuqfggjfdpvefjgfevmfevgfenuceurghilhhouhhtmecuhedttd
enucenucfjughrpefhvffusedttddttddttddtnecuhfhrohhmpedftfhonhgrlhguucfhrdcuifhui
hhlmhgvthhtvgdfuceorhhfghesthhrihhsthgrthgvlhhoghhitgdrtghomheqnecuffhomhgrihhn
peguihhgihhtrghlvggsohhokhifrhhithhinhhgrdgtohhmpdhiphdqheegqdefledqudejfedrnhg
vthdpthhrihhsthgrthgvlhhoghhitgdrtghomhdpghhoohhglhgvuhhsvghrtghonhhtvghnthdrtg
homhdpohhvhhdrtggrpdhvihguvghorghnihhmrghtihhonhhnvghtfihorhhkrdgtohhmnecukfhpp
eeiledriedvrddvheehrdduudeknecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmohgu
vgepshhmthhppdhhvghlohepihhnfedvrdhmrghilhdrohhvhhdrnhgvthdpihhnvghtpeeiledried
vrddvheehrdduudekpdhmrghilhhfrhhomheprhhfghesthhrihhsthgrthgvlhhoghhitgdrtghomh
dprhgtphhtthhopegrsghushgvsehovhhhrdhnvght
X-Ovh-Spam-Status: OK
X-Ovh-Spam-Reason: vr: OK; dkim: disabled; spf: disabled
X-Ovh-Message-Type: OK

I have received the email spam message which is appended below from your
network, AS16276.  I did not request this spam, and I have had no prior
contact with the sender.  Indeed, I do not even know the sender, and I do
not know how the sender even acquired my email address.

Please terminate this spamming from your network immediately.

Thank you for your assistance in this matter.

=
Return-Path: 
X-Original-To: rfg-dyna...@tristatelogic.com
Delivered-To: rfg-dyna...@tristatelogic.com
Received: from craig.digitalebookwriting.com (ip134.ip-54-39-173.net [54.39.173
.134])
by segfault.tristatelogic.com (Postfix) with ESMTP id 391A44E68A
for ; Thu, 30 Jan 2020 09:25:09 -0800 (P
ST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
d=craig.digitalebookwriting.com; s=default; h=Message-ID:Date:Content-T
ype:
Subject:To:Reply-To:From:MIME-Version:Sender:Cc:Content-Transfer-Encodi
ng:
Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender:
Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id:
List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Arc
hive;
 bh=G73Y84vFDgG+jBeFAVpzuuyKr+8smk3J4l/NIzyP9C4=; b=tCn5obRIaLbJNpqABwp
FNHbHR
OXQwDJeK7/0PlQ+mSB2UL6WPrfiATe7chmWgIBAn44xXMWeo77fOIn8Eu1FQ5hC37rugcpO
B0I9Ja
/FJynsra3Z2/5oW49syyroNwHTbWWuMj1Hex7

[anti-abuse-wg] The Great AFRINIC Heist -- The Enablers

2020-01-29 Thread Ronald F. Guilmette
As the primary investigator pursuing this case, I have invested more
than a little effort into continuing to track what has been going
on as AFRINIC attempts to remediate the effects of these thefts.
I would like now to provide you all with some insight into the current
situation and status relating to the affected stolen AFRINIC blocks
and the multiple parties in your own region who are continuing, at
present, to provide routing to the various bits and pieces of the
stolen AFRINIC IPv4 space.

My hope, of course, is that you will all join with me in trying to
persuade these networks to cease all routing to all of the stolen
AFRINIC address space.

A full list of all of the stolen AFRINIC blocks that are still of
ongoing concern at the present moment is available here:

https://pastebin.com/raw/71zNNriB

Note that many of the blocks listed at the link above have already
been "reclaimed" as far as the AFRINIC WHOIS records are concerned.
But because routing remains almost entirely decoupled from RIR WHOIS
data bases, much of this "reclaimed" space is still being routed as
I write this.  The only difference is that now the space is being
routed as bogons, rather than as "legitimately" allocated space.

A summary of all of the current routing for all of the stolen AFRINIC
IPv4 address space that is still of concern (including routing for
recently reclaimed address space that AFRINIC will eventually be
returning to its free pool) is provided below.  This list is sorted
by the number of constituent stolen /24 blocks being routed by each
listed network, thus showing the most major offenders at the top.
A few footnotes concerning specific ASNs in this list follow below
the listing.

I urge everyone on this mailing list to share this data as widely as
possible in and among the global networking community.  In all cases
noted below, the networks in question are unambiguously routing IP
blocks that were obtained, in the first instance, via thefts perpetrated
by one or more AFRINIC insiders and then resold on the black market
in secretive deals.  In many and perhaps most cases listed below, the
relevant networks appear to have been more than happy to accept some
cash in exchange for their services, while not looking all that
carefully at the purported (but fradulent) "LOA" documents that they
were given in order to persuade them to announce routes to stolen IP
space.  (Repeated use of blatantly fradulent documents has been one
of the consistant features of this entire ongoing criminal enterprise.)

I would also like to request the assistance of every person on this
mailing list in the task of informing all of the networks that are
mentioned in the list below, and that are within your own geographic
region, that they are each currently announcing routes to stolen IP
space.  Of course, it is my hope that you will also encourage them,
in no uncertain terms, to stop doing this immediately, if not sooner.

As you can see below, this Internet crime spree is a globe-spanning
and ongoing disaster.  There is no way that I can get all of this
mess cleaned up on my own.  I am therefore relying on all people of
honesty and good will, in all regions, to assist me in getting the
word to the networks mentioned below, and telling them, very directly,
that they are each facilitating a colossal fraud that affects the
whole of the global Internet community.  (I know for a fact that
there is ongoing criminal activity which is being perpetrated from
at least some of this provably stolen IP address space, so it is in
the self interest of every honest netizen to get this all turned
off and shut down.)

All routing data is derived from current data published by RIPEstat.

==
  3719  0   ??  UNROUTED IP SPACE
   629  132165  PK  Connect Communication
   512  18013   HK  Asline Limited
   504  19969   US  Joe's Datacenter, LLC
   500  62355   CO  Network Dedicated SAS
   423  202425  SC  IP Volume inc
   286  58895   PK  Ebone Network (PVT.) Limited
   250  136525  PK  Wancom (Pvt) Ltd.
   192  18530   US  Isomedia, Inc.
   186  9009GB  M247 Ltd
   134  262287  BR  Maxihost LTDA
   132  204655  NL  Novogara LTD
79  132116  IN  Ani Network Pvt Ltd
75  136384  PK  Optix Pakistan (Pvt.) Limited
68  132422  HK  Hong Kong Business Telecom Limited
60  137443  HK  Anchnet Asia Limited
48  63956   AU  Colocation Australia Pty Ltd
26  132335  IN  LeapSwitch Networks Pvt Ltd
21  131284  AF  Etisalat Afghan
20  139043  PK  WellNetworks (Private) Limited
19  43092   JP  OSOA Corporation., LTD
17  36351   US  SoftLayer Technologies Inc.
16  56611   NL  REBA Communications BV
16  199267  IL  Netstyle A. Ltd
16  23679   ID  Media Antar Nusa PT.
14  137085  IN  Nixi
10  63018   US  Dedicated.com
 9  136782  JP  Pingtan Hotline Co., Limited
 8  45671   AU  Servers Australia Pty. Ltd
 8  57717   NL  FiberXpress

[anti-abuse-wg] ORG-DTL20-RIPE

2020-01-29 Thread Ronald F. Guilmette
46.3.0.0/16
46.232.0.0/17
80.243.128.0/20
149.126.192.0/18

https://bgp.he.net/AS55933#_prefixes
https://bgp.he.net/AS207636#_prefixes



Re: [anti-abuse-wg] [routing-wg] AS12679 -- 206.195.224.0/19

2020-01-29 Thread Ronald F. Guilmette
In message <20200129091215.gk3...@vurt.meerval.net>, 
Job Snijders  wrote:

>It appears changes have been made to the record, perhaps by ARIN staff.
>
>$ whois -h whois.arin.net 206.195.224.0
>
>NetRange:   206.195.224.0 - 206.195.255.255
>CIDR:   206.195.224.0/19
>NetName:THRIFTD
>NetHandle:  NET-206-195-224-0-1
>Parent: NET206 (NET-206-0-0-0-0)
>NetType:Direct Assignment
>OriginAS:
>Organization:   Thrift Drug, Inc. (THRIFT)
>RegDate:1995-08-03
>Updated:2020-01-28
>Ref:https://rdap.arin.net/registry/ip/206.195.224.0
>
>The 'OriginAS:' attribute is now empty, also the 'Updated:' date
>changed.


Great!  One down.  Many more to go.


Regards,
rfg



[anti-abuse-wg] The curious case of 159.174.0.0/16

2020-01-29 Thread Ronald F. Guilmette
Just posted:

https://mailman.nanog.org/pipermail/nanog/2020-January/105672.html




Re: [anti-abuse-wg] [routing-wg] AS12679 -- 206.195.224.0/19

2020-01-27 Thread Ronald F. Guilmette
In message 
, 
Job Snijders  wrote:

>All snide aside, did you report this prefix=E2=80=99s current state to ARIN
> through
>their fraud form? If not, I'm happy to do so.

Negative.  I did not do so and I shall not do so.

Like all of the RIRs, ARIN's forms and their procedures for dealing with
these kinds of issues are, by intent, black holes.  I give them the
product of my hard work and my diligent effort and research and what do
I get back?  Do I get a bug bounty?  No.  Do I get a 10% finders fee for
finding the facts that allow some block to be returned to its rightful
(legacy) owner or to the RIR free pool?  No.  Do I get any kind of
reward whatsoever?  No.  Do I at least get a courtesy follow-up after
a certain period of time has elapsed, telling me whether they think I
am right or wrong?  NO!  I don't get squat!  I don't get either a
confirmation, or a rebuttal.  In fact I don't get anything at all.
I don't even get a polite thank you.

But let's just forget about that.  Do you really think that me filling
some bloody stupid form is really going to chage the process -or- the
outcomes?  Do you seriously think that YOU filling out the form will
have any better effect?  If so, I'm going to have to ask you to defend
that belief in light of the known facts.

Do you really think that ARIN is utterly ignorant about this, even though
I got an on-the-record ``no comment'' comment directly from John Curran
about it before I even posted it?

https://mailman.nanog.org/pipermail/nanog/2019-August/102791.html

If not, then how do you explain the fact that after 5 months ARIN hasn't
lifted a finger to do a damn thing about it?

Looking forward to you explaining this to me Job.  I'm all ears.


Regards,
rfg


P.S.  I don't need to seek out any web forms or any RIR if I want to
experience first-hand this level of lethargic and studied inaction.
As I like to tell people, if I ever want to experience this kind of
utter lack of productive activity...  well... I have relatives for that!



Re: [anti-abuse-wg] [routing-wg] AS12679 -- 206.195.224.0/19

2020-01-26 Thread Ronald F. Guilmette
In message <20200127071712.gn36...@vurt.meerval.net>, 
Job Snijders  wrote:

>Hold on a second, are you sure there ever *was* a request to change who
>controls this legacy block? I am not so sure.
>
>I suspect what happened is that the 'thriftdrug.org' domain name
>registration expired, and the alleged thief registered thriftdrug.org...

Nope.  I have already looked at the ARIN WhoWas report.  Here are the
relevant records, with date stamps:

https://pastebin.com/raw/M3fDR7nh

>> But from where I am sitting it does appear that there was exactly and
>> only -zero- review of this take-over request.
>
>There was no take-over request, I'd call this impersonation or a
>compromised account.

I agree that "impersonation" occurred.  I *do not* agree that this
was enabled by any kind of account compromise.

Furthermore, I have no reason to believe that suddenly, after a couple
of decades of utter dormancy, someone just guessed the acocunt password
needed to take control over this ARIN WHOIS record.  (And in this instance
I apply Occam's razor.)

>> I mean that it appears that absolutely *nothing* was done in the way
>> of vetting in this case.  The age of the new contact domain... which
>> would have been a BIG red flag...  quite apparentkly wasn't checked.  
>
>Have you considered asking ARIN to take the 'domain name creation' date
>into consideration when usernames are retrieved or passwords are reset?
>Perhaps there are some simple heuristics that can be applied to improve
>the password reset process.

Thank you for a nice laugh Job!

No, I have not suggested to ARIN how to do their jobs in this kind
of a context.  And no, I *do not* think that I should even have to
suggest that such factors should be considered when giving someone control
over a nice juicy legacy block that has sat dormant for a couple of
decades.  Nor do I think that -I- should have to suggest such a step to
the ARIN folks for the simple reason that it is JUST TOO EFFING OBVIOUS...
a fact which this present case renderes even more bloody obvious than
it already was.

>ARIN has a fine working process to publicly log enhancement requests
>called the 'ACSP' https://www.arin.net/participate/community/acsp/

Gee.  Thanks Job.  I just love to spend time jumping through mindless
bureaucratic hoops, just so that I can claim the privilege of
informing some folks of what should have been bloody obvious to those
same folks from the get-go anyway.

>ARIN would not be unique in having trouble preventing account
>compromises when the control over the domain name falls in the wrong
>hands.

See above.  That's not what happened in this case.


Regards,
rfg



Re: [anti-abuse-wg] [routing-wg] AS12679 -- 206.195.224.0/19

2020-01-26 Thread Ronald F. Guilmette
In message <2020012700.gk36...@vurt.meerval.net>, 
Job Snijders  wrote:

>I think it is very counter-productive to frame things as 'incompetence @
>ARIN', we rather should assume positive intent. If this indeed is a case
>of theft, the attacker was sophisiticated enough to understand the rules
>of the game and how to cheat them. The various registries may be tricked
>at times, that's part of life, the real failure would be if they don't
>act after the registration problem is reported to them. I have no reason
>to believe this will be the case. Please be nice ronald! :-)

Ok, just a couple of points:

#1)  I *was* being nice!  I *am* being nice.  I am taking it as an apriori
given that this is NOT another AFRINIC situation.  That is only sheer
generosity and kindness and deep regard on my part.  I am applying Hanlon's
razor.

#2)  No, this is *not* just "part of life".  The people at the RIRs are
being paid to do a job.  The job is to make allocations and keep track
of who has them.  Everything else they do, including all of the time
and effort they all spend, e.g. arranging lavish conferences and explaining
to everyone why they are not the routing police... all that stuff is secondary.

Maybe this simple graphic will underscore my point:

https://i.kym-cdn.com/entries/icons/original/000/012/300/you-had-one-job34-580x425.jpg

I'll tell you what Job, I'll make you a deal.  You tell me what ARIN did
to properly review and vet this request (i.e. for a change to who controls
this legacy block) and then, if I am persuaded that they did that *and* that
what they did was both reasonable and sufficient, then I'll grovel and beg
forgivness from all, including ARIN.

But from where I am sitting it does appear that there was exactly and only
-zero- review of this take-over request.  I mean that it appears that
absolutely *nothing* was done in the way of vetting in this case.  The
age of the new contact domain... which would have been a BIG red flag...
quite apparentkly wasn't checked.  The web site associated with that
domain name wasn't checked.  And clearly nobody ever even tried dialing
the new contact phone number, as I did, which took me all of ten seconds.

So what did the vetting consist of in this case, exactly?  Whatever it
was, please persuade me that I could not have hired a well-educated and
well-qualified chimpanzee with a top-notch resume and paid him less
money to perform the same job, thereby saving the ARIN membership
thousands or tens of thousands per year.

Given that ARIN walks around, all day every day, with a huge "Kick me!
I won't sue you if you do!" sign on its back, I think they need to take
this vetting stuff a wee bit more seriously.  It would be a different
story if they had a reputation for coming down hard, in a legal sense,
on anybody who tries to screw with them by pulling these kinds of fraud
games on them.  But in point of fact, and in the dark Internet underground
where all of us decent people never go, they, ARIN, and indeed all of the
RIRs have the exact opposite reputation, i.e. a reputation for their
standing policy of always wanting to "catch and release" when
it comes to fraudsters.  And what is the predictable outcome of this
longstanding policy, when combined with inadequate due diligence in
the vetting process?  I'll tell you what it is.  Rught now, as we speak,
the U.S. Department of Justice is spending my tax dollars to prosecute
not one but -two- active criminal fraud prosecutions against two
separate groups of fraudsters who ARIN allowed to snooker it.

Is shifting this burden onto the taxpayers fair?  Is it made fair just
because the respective memberships of each of the five RIRs do not wish
to get their hands dirty by legally going after the fraudsters who mess
with the RIRs, and because they do not wish to absorb the time, expense,
and risk of handling these kinds of problems themselves, like most other
businesses have to do?

Sorry, Job, but you hit a raw nerve as you can see.  As far as I am
concerned, the RIRs, and their ultimate parent, ICANN, seem to want
to have their cake and eat it too. They don't want to spend the time
or effort to do proper vetting, and yet when things like this happen,
and when they are then, predictably, defrauded, they want someone else
to fight their legal battles for them... using taxpayer money instead of
member money.

This cereats a situation that is often referred to as "moral hazard",
i.e. where one party doesn't have to absorb the actual costs if they
recklessly gamble and then lose.

Thanks to the late great Jack Valenti, the MPAA and the RIAA already
managed to successfully lobby to get the government to treat content
piracy as a criminal offense, thus allowing the FBI to become the
unpaid police force of the content producers while relieving said
content producers of any obligation to solve their own damn problems.

So now, I ask you, how is the situation with the five RIRs any different?

Nobody wants the RIRs to be the r

Re: [anti-abuse-wg] [routing-wg] AS12679 -- 206.195.224.0/19

2020-01-26 Thread Ronald F. Guilmette
In message <20200127052621.gj36...@vurt.meerval.net>, 
Job Snijders  wrote:

>The dates, the website at https://www.thriftdrug.org/, the non-US origin
>of the announcement all seem to suggest that someone discovered the
>block was dangling, the domain unregistered, and some quick registration
>& forgery could lead to treasure.

Yes.  My apologies to all.  I made a bit of a mistake here.

Note that I no longer use the term "hijacked" because it is too imprecise.
These days I only use the terms "squatted" or "stolen" where the latter
is a term that I reserve for cases where the relevant WHOIS record has
actually been fiddled.

Upon further review, this block (206.195.224.0/19) now appears to have
been stolen, i.e. with the (assumed unwitting) participation of ARIN.

As Job has noted, multiple aspects of the WHOIS record are most certainly
non-conformant with common sense.  I highlight these below.  (I have
attempted to call the new contact phone number and it is dead/disconnected.)

It is my hope, of course, that the apparent illicit take-over of this
block was a product of garden variety incompetence @ ARIN, rather than,
you know, the alternative.

It appears from ARIN WhoWas data that this takeover began on 2019-08-12
with additional fradulent changes to the WHOIS also on 2019-08-14,
2019-08-15, and lastly 2019-09-24, when the OriginAS was fiddled to
its present state.

==
[Source: whois://whois.arin.net  2020-01-27 04:18:39 UTC]

NetRange:   206.195.224.0 - 206.195.255.255
CIDR:   206.195.224.0/19
NetName:THRIFT-NET-1
NetHandle:  NET-206-195-224-0-1
Parent: NET206 (NET-206-0-0-0-0)
NetType:Direct Assignment
OriginAS:   AS12679 <= Russia 
Organization:   Thrift Drug, Inc. (THRIFT)
RegDate:1995-08-03
Updated:2019-09-24
Ref:https://rdap.arin.net/registry/ip/206.195.224.0

OrgName:Thrift Drug, Inc.
OrgId:  THRIFT
Address:100 Delta Drive
City:   Pittsburgh
StateProv:  PA
PostalCode: 15238
Country:US
RegDate:1994-03-15
Updated:2019-08-14
Ref:https://rdap.arin.net/registry/entity/THRIFT

OrgAbuseHandle: WEBBK16-ARIN
OrgAbuseName:   Webb, Kristi 
OrgAbusePhone:  +1-885-923-1290   < dead/bogus
OrgAbuseEmail:  kw...@thriftdrug.org  <=== bogus/parked
OrgAbuseRef:https://rdap.arin.net/registry/entity/WEBBK16-ARIN

OrgTechHandle: WEBBK16-ARIN
OrgTechName:   Webb, Kristi 
OrgTechPhone:  +1-885-923-1290   < dead/bogus
OrgTechEmail:  kw...@thriftdrug.org  <=== bogus/parked
OrgTechRef:https://rdap.arin.net/registry/entity/WEBBK16-ARIN




[anti-abuse-wg] AS12679 -- 206.195.224.0/19

2020-01-26 Thread Ronald F. Guilmette
Thrift Drug, Inc. of Pennsylvania was bought out in October, 1996 by
the Rite Aid pharmacy chain (US):

https://www.riteaid.com/corporate/news/-/pressreleases/news-room/1996/rite-aid-to-acquire-thrifty-payless-inc-
https://en.wikipedia.org/wiki/Thrift_Drug
https://opencorporates.com/companies/us_pa/2002644

Unfortunately, the parent company, Rite Aid, never got the memo to tell
that that Thrify Drug, Inc owned the legacy IPv4 block 206.195.224.0/19.

The results were predictable.  This /19 has been repeatedly squatted on
in recent years, as shown by RIPEstat:

https://stat.ripe.net/widget/routing-history#w.resource=206.195.224.1

2016-08-15  AS42861  RU  Foton Telecom, CJSC Network Operation Centre
2017-12-08  AS65075  --  {{reserved ASN}}
2018-03-26  AS28191  BR  Jupiter Telecomunicacoes e Informatica Ltda
2019-08-24  AS20473  US  Choopa, LLC
2019-10-11  AS12679  RU  Iceberg Telecom Ltd.

The 206.195.224.0/19 block is currently being squatted on by AS12679,
Iceburg Telecom (Moscow).

It appears that this ASN is also and likewise squatting on a great number
of other blocks as well:

https://bgp.he.net/AS12679#_prefixes

AS12679 (Iceburg) appears to be a "leaf" ASN, connected to the public
Internet only via AS25227 (Avantel, Close Joint Stock Company, Moscow)
which it turn appears to be getting more than 3/4ths of its own IPv4
connectivity from AS9002 (RETN):

https://bgp.he.net/AS25227

Suggest filtering all route announcements from both AS12679 -and- also
AS25227 until they each decide if they would like to be part of the
civilized internet.

==
[Source: whois://whois.arin.net  2020-01-27 04:18:39 UTC]

NetRange:   206.195.224.0 - 206.195.255.255
CIDR:   206.195.224.0/19
NetName:THRIFT-NET-1
NetHandle:  NET-206-195-224-0-1
Parent: NET206 (NET-206-0-0-0-0)
NetType:Direct Assignment
OriginAS:   AS12679
Organization:   Thrift Drug, Inc. (THRIFT)
RegDate:1995-08-03
Updated:2019-09-24
Ref:https://rdap.arin.net/registry/ip/206.195.224.0

OrgName:Thrift Drug, Inc.
OrgId:  THRIFT
Address:100 Delta Drive
City:   Pittsburgh
StateProv:  PA
PostalCode: 15238
Country:US
RegDate:1994-03-15
Updated:2019-08-14
Ref:https://rdap.arin.net/registry/entity/THRIFT

OrgAbuseHandle: WEBBK16-ARIN
OrgAbuseName:   Webb, Kristi 
OrgAbusePhone:  +1-885-923-1290 
OrgAbuseEmail:  kw...@thriftdrug.org
OrgAbuseRef:https://rdap.arin.net/registry/entity/WEBBK16-ARIN

OrgTechHandle: WEBBK16-ARIN
OrgTechName:   Webb, Kristi 
OrgTechPhone:  +1-885-923-1290 
OrgTechEmail:  kw...@thriftdrug.org
OrgTechRef:https://rdap.arin.net/registry/entity/WEBBK16-ARIN



Re: [anti-abuse-wg] @EXT: RE: working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-16 Thread Ronald F. Guilmette
In message <2ff201d5cccf$f6ffe640$e4ffb2c0$@makeitsimple.pt>, 
"=?iso-8859-1?Q?S=E9rgio_Rocha?="  wrote:

>Someone said: You must be new here, yes it's true, I'm on the list for a
>few months. Maybe that's why you're still optimistic.

You completely mis-read my comment.

What I meant was that you must be new here, because YOU are still optimistic
that anything said or done here will ever have any effect.

Some of us have already been here for years and know that it won't.


Regards,
rfg



Re: [anti-abuse-wg] @EXT: RE: working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-16 Thread Ronald F. Guilmette
In message , 
Volker Greimann  wrote:

>As the abuse using domains registered through us usually does not happen 
>on our networks, we have zero ability to detect it in advance, all we 
>can do is take care of them after the fact, which we do dilligently. We 
>have a team tasked exclusively with reviewing abuse complaints and 
>taking appropriate action.

You already clarified what your idea of "appropriate action" is, i.e.
ratting out the "troublemaker/complainer" to your spammer customer's
reseller, so that that company can in turn rat out the "complainer"
to the spammer, so that the spammer can then launch a DDoS or other
type of attack.  (And for the record, I have myself been DDoS'd
*twice* in the past 20 years, since I have been working on network
abuse issues.)

I'm sorry, sir, but this is *not* my idea of "appropriate action".  Far
from it in fact.

>Clearly you have never looked at what normal end users put in the Org 
>fields.

I have *actually* looked at more domain name WHOIS records, and carefully
studied them, that you will likely even glance at in your entire lifetime.

>In our experience, they put anything in there, not just org names.

That is not my problem and it is also not your problem.

The fact that some tiny percentage of the world's population are perfect
imbecils who are unable to grasp the simple and obvious concept of an
"organization" as something other than a natural person is not a fact
which either can or should drive global policy as it relates to the
overall health and safety of the entire Internet.

More to the point, how many natural persons have names that end with
", LLC" or ", Inc." or ", Ltd." or ", S.A.R.L." ?  Could your company
and your entire industry at least display in public WHOIS records the
Organization fields that contain these suffixes?  Of course you could!
Will you do so?  Of course not, because as I have said, you folks who
are in the domain registration business are not interested at all in
either transparency *or* in the health of the Internet.  Your only goals
are to helpfully hide the details of your crooked and wicked primary
revenue-generating customers, i.e. spammers and phishers, and maximizing
your own revenue at the expense of everyone else.

Ladies and gentlemen, for those of you who may think that I have just gone
off the deep end, and that I am just ranting against the domain name
registration industry without any basis, I ask you to just consider this:

There exists a domain name registrar company, NameSilo, here in the U.S.
and on its web site it proudly displays the details of its bulk discount
policies for domain name buyers:

https://www.namesilo.com/Support/Discount-Program

As you can all see, the discount schedule for bulk purchases maxes out
and yields the highest level of discounts for buyers at the level where a
single buyer is purchasing FIVE THOUSAND DOMAIN NAMES IN A SINGLE SITTING.

So now, everyone, ask yourselves:  Who needs to buy FIVE THOUSAND domain
names in a single transaction?  Who even WANTS to buy FIVE THOUSAND domain
unique names in a single transaction?  And whoever wants that, would you
trust them to hold your wallet?

The entire scam that is the modern domain name business is an open secret.
The domain name registrars don't even hide what they are up to anymore.
They display it right out in the open and on their web sites, almost as
if it were something to be proud of, rather than something that they should
be ashamed to tell their mothers about.

I have talked to a senior official at ICANN about this practice of ICANN's
accredited registrars offering discounts for bulk purchases... which are
clearly and unambiguously intended to draw in the Internet criminal
element... and this ICANN official said to me point blank "Yea, we know.
There is nothing we can do about it."

Why can't ICANN control this outrageous behavior of the part of its own
contractually bound accredited registrars?  The answer is as simple as
it is obvious:  The problem isn't that ICANN actually "can't" do anything
about this explicit catering to the criminal element.  The real problem is
that ICANN has no incentive to put a stop to this, and in fact makes lots
of money itself by the perpetuation of this sordid trade, which they and
everyone else who has been paying attention all know about.

>If you have the perfect method of 
>differentiating between personal data and non-personal data, you could 
>do a lot of good by sharing that instead of mouthing off.

See above.  This isn't rocket science.  But you are now displaying, on
behalf of your entire crooked industry, your willful and self-serving
blindness to the obvious.

If the value in the Organization: field ends in "Inc." or "LLC" or "Ltd."
or "Limited" or "Co.", or "Company" or  "OOO" or "SRL" or "S.R.L." or
"SARL" or "S.A.R.L." then guess what?  That is NOT the name of a natural
person.  and therfroe the infomation in that field is clearly NOT covered
under or by GDPR.

If I thought t

Re: [anti-abuse-wg] @EXT: RE: working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-16 Thread Ronald F. Guilmette
In message , 
Volker Greimann  wrote:

>Hi Robert,

The  nane is Ron, actually.

>in 99,9% of the cases, the customer we forward the complaint to is not 
>the spammer, but the service provider used by the spammer for their 
>domain registration services, e.g. the party who has the closer 
>relationship and can actually do something about the issue, such as 
>disabling their customers access to the service.

OK, two points:

1)  *YOU* can do something about the issue if you are the registrar of
record.  All of this crap designed to evade any and all -responsibility-
on your part is just that, crap.  You hide behind multiple layers of
"resellers" and try to tell the world that because you elect to do
business this way, your company is can dodge all responsiblity.

These lame excuses and attemps to evade personal or corporate responsibility
don't work in war crimes trials and if there were any justice in the world
they wouldn't work any better on the Internet.

2)  You have "resellers".  OK.  Fine.  So you forward *my* spam complaint
on to your reseller.  Then your reseller forwards it on to his pet spammer...
you know... the one that is providing 93% of that reseller's domain
registration revenue.  Now, please explain to me, slowly and carefully,
what it is that either compels or even motivates your reseller to take
action against the party that is putting bread on his table?  More to the
point, please tell me what prevents that reseller from ratting me out to
his pet spammer, so that his pet spammer can then DDoS "the troublemaker"?

Your entire industry, with all of its sellers and re-sellers and re-re-sellers
is all just one colossal layered ponzi scheme which is funded and fueled
more than 90% these days by snowshoe spammers.  You know it and I know it.
The only people who don't know it are the people who haven't taken the
time to study what is really going on.

There are, at last count, something like eighty seven thousand ICANN
Accredited domain name registrars, and 98% of them would be out of
business tomorrow if it were not for the snowshoe spammer trade, because
there is NO real money to be made just selling domain names, one or two
at a time, to butcher shops and dentist's offices.  You are just porcine
animals, feeding at the trough of a corrupt trade made possible by what
amounts to your over-arching industry lobbying organization, ICANN.

>Also, our treatment of WHOIS is not in violation of ICANN contracts, but 
>in compliance with it. Check out the Temporary Specification to the 
>agreements that ICANN put out.

I really don't give a rat's ass what self-serving fradulent justifications
ICANN has put out to try to excuse their own inaction *or* your non-compliance
with your contractual commitments.  The fact remains that GDPR *does not*
restrict domain registrars from displaying the Organization: fields in
WHOIS records, specifically when the named organizations represent things
other than natural persons... which is almost always the case... and yet
I can name right now any number of ICANN Accredited domain name registrars
that are, and that have been, for quite some time now, very deliberately
suppressing literally *all* WHOIS data fields, period.  How do you justify
that?  How does your corrupt industry justify that?

>We are working hard to bring back some model to provide access to 
>registration data to parties with a legitimate interests, but...

Screw that! This is just a clever smoke-screen, invented by your corrupt
industry to try to fool naive and stupid people into believing that
there is really some complex issue here when there isn't.  The Organization:
field of each and every domain name WHOIS records is quite clearly SUPPOSED
to contain the name of the non-natural-person to which the domain name is
registered.  So why do most domain name registrars suppress this data?
What is your excuse for that, when GDPR clearly does not apply?

I am *not* talking about your industry's lame attempts to limit access
to the data to only *your* hand-picked non-troublemaker "parties with a
legitimate interest".  These are just industry code words for "law
enforcement only" access.  This is what your industry wants, because
you all know good and goddamn well that law enforcement doesn't have the
time, the interest, the training, or the manpower to chase down mere
small-time hackers and spammers, so your industry-wide plan is to
proceeding according to these two phases:

1)  Suppress *all* WHOIS information, even for entities not covered
by GDPR, and then...

2)  When people complaint that you are violating your clear contractual
commitments to ICANN (which ICANN, which also profits handsomely
from the snowshoe spammer trade, is conveniently doing nothing
about) then your industry offers to "compromise" by allowing WHOIS
access *only* to untrained, ineffective, and mostly uninterested
law enforcement.

Actually, I must complement your whole ind

Re: [anti-abuse-wg] @EXT: RE: working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-16 Thread Ronald F. Guilmette
In message <23ad49c8-8fc4-41fa-a8fc-cae3479ad...@key-systems.net>, 
Volker Greimann  wrote:

>In the domain industry, we were required to provide an abuse contact, 
>however the reports we get to that address usually deal with issues we 
>cannot do much about other than pulling or deactivating the domain name, 
>which is usually the nuclear option. So we spend our time forwarding 
>abuse mails to our customers that the complainant should have sent to 
>the customer directly.

Digital Ocean does the same thing.  If you send them a spam complaint,
they will thoughtlessly and immediately forward it on directly to their
spammer customers, as you do, so that that spammer customer will then
know exactly who ratted him out, and thus, who he should put out a
contract on, to have that party immediately DDoS'd.

You sir, and your company, are part of the problem.

In fact your entire industry is also.  Working together you have all
succeded in serving you own financial ends while shamlessly twisting
and exploiting the true meaning of GDPR, using it as a blunt instrument
to demolish and bludgeon to death the perfectly usable system that used
to be called "WHOIS"...  in clear violation of your contractual commitments
to ICANN I might add... a system (WHOIS) which is now little more than a
useless joke for all practical purposes.

Congratulations on maximizing your own revenue at the expense of everyone
else, and at the expense of civilization and a civilized Internet.

I can only hope that the facts of what you and your company have done, and
what the entire domain registrar inustry has done, will ultimately become
a part of your permanent epitaph, following you to wherever you go from here,
which I have some hopes will not be upwards.

Please let me know if I have failed to be adequately clear.


Regards,
rfg



[anti-abuse-wg] Proposal

2020-01-16 Thread Ronald F. Guilmette
My apologies.  I see that I must make a slight but important correction
to my proposal...

Be it resolved that:

Henceforth, and until this policy is retracted, it shall be the
policy and practice of RIPE NCC to place electronic copies of
all documents used to establish the bona fides of each and every
RIPE member WHICH IS NOT A NATURAL PERSON on the RIPE web site,
and in a manner which will allow free and unfettered public
access to all such documents.

Discuss.


Regards,
rfg




Re: [anti-abuse-wg] @EXT: RE: working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-16 Thread Ronald F. Guilmette
In message , 
JORDI PALET MARTINEZ via anti-abuse-wg  wrote:

>I'm sure that this is the same in every EU country. Can we agree on that?

Quite certainly not!  Doing so would break ALL established precedent!

When was the last time this working group agreed on *anything*?


Regards,
rfg


P.S.  And anyway, as I myself have just been reminded, RIPE != EU.



Re: [anti-abuse-wg] @EXT: RE: working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-16 Thread Ronald F. Guilmette
In message , 
JORDI PALET MARTINEZ  wrote:

>{... quoting Sara...}
>"Complete, accurate information goes hand in hand with a duty of care..."

A simple proposal:

Be it resolved that:

Henceforth, and until this policy is retracted, it shall be the
policy and practice of RIPE NCC to place electronic copies of
all documents used to establish the bona fides of each and every
RIPE member on the RIPE web site, and in a manner which will
allow free and unfettered public access to all such documents.

Discuss.


Regards,
rfg


P.S.  For those new members who are only just joining us, please reserve
your judgements regarding the ineffectiveness of this group for anything
other that blocking any and all forward progress until you see the
reactions to the above simple proposal.  Those reactions should be
educational, and will tell you everything you need to know.



Re: [anti-abuse-wg] @EXT: RE: working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-16 Thread Ronald F. Guilmette
In message <33b2e10eb9694eadb4bdaba30eb25...@elvas.europol.eu.int>, 
"Marcolla, Sara Veronica"  wrote:

>If the community does not agree that everyone has the right to a safe, spam
>free, crime free Internet, maybe we have some issue to solve here first.

Welcome to the Working Group.  You must be new here.


Regards,
rfg



Re: [anti-abuse-wg] working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-16 Thread Ronald F. Guilmette
In message <077501d5cc69$d9427020$8bc75060$@makeitsimple.pt>, 
"=?iso-8859-1?Q?S=E9rgio_Rocha?="  wrote:

>Agree, This anti-abuse list seems the blocking group to any anit-abuse
>response measure.
>
>It's amazing that nobody cant propose anything without receiving a
>shower of all sorts of arguments against

Welcome to the Working Group.  You must be new here.


Regards,
rfg



Re: [anti-abuse-wg] working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-16 Thread Ronald F. Guilmette
In message <4be52277-cecb-603f-6840-4ee76245b...@first.org>, 
Serge Droz  wrote:

>I think we already spent way more executive time on this thread than it
>would cost us to verify e-mail addresses.

I think that I may cut that out, print it in a 48-point type face, have
it framed, and hang it on my office wall. :-)

This is true even though I expressed some similar view on some similar
situation here already some years ago.

>And honestly: taking a step back and reading this entire thread, I'm not
>surprised that the bad guys are winning. You know: They don't care about
>the purty and beauty of a solution. They just do it and profit, and
>probably have a fabulous time seeing us argue and go at each others
>throats.

I myself have certainly expressed this view previously, in private if not
also in public.


Regards,
rfg



Re: [anti-abuse-wg] working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-15 Thread Ronald F. Guilmette
In message , 
Richard Clayton  wrote:

>bottom line is that if you want to run a reputation site and not be
>under an obligation to remove libellous material (not fair comment) you
>would be unwise to do it outside the USA

As much as I would like to claim, on behalf of my countrymen, an absolutely
unique status in this regard, I do believe that there are any number of
other locales from whence a similar feat could be accomplished.  Iceland
seems like a possibility, but also Belize, perhaps Gibraltar, The
Dominican Republic, and quite certainly Nevis & St. Kitts.

Oh!  And the sovereign Republic of Sealand, of course.


Regards,
rfg


P.S.  I cannot help but offer the entirely gratuitous observation that
in many parts of the world it may indeed be more legally tenable to be
either a spammer or a spam-fiendly provider than it is to be a person
or other form of legal entity which publishes anything not qualifying
as glowing positive commentary about any such.



Re: [anti-abuse-wg] working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-15 Thread Ronald F. Guilmette
In message <20200115155949.af7f9f79718891d8e76b551cf73e1563.e548b98006.mailapi@
email19.asia.godaddy.com>, "Fi Shing"  wrote:

>That is the most stupid thing i've read on this list.

Well, I think you shouldn't be quite so harsh in your judgement.  It is
not immediately apparent that you have been on the list for all that long.
So perhaps you should stick around for awhile longer before making such
comments.  If you do, I feel sure that there will be any number of
stupider things that may come to your attention, including even a few
from your's truly.

Best not to judge the race until it has been fully run.

>Which criminal is paying you to say this nonsense, because no ordinary person
>that has ever received a spam email would ever say such crap.

I would also offer the suggestion that such inartful commentary, being as
it is, ad hominem, is not at all likely to advance your agenda.  It may
have felt good, but I doubt that you have changed a single mind, other
than perhaps one or two who will now be persuaded to take the opposing
position, relative to whatever it was that you had hoped to achieve.


Regards,
rfg



Re: [anti-abuse-wg] working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-15 Thread Ronald F. Guilmette
In message <68c5238d-b796-45b9-8735-5849140dc...@consulintel.es>, 
JORDI PALET MARTINEZ  wrote:

>When some operators aren't responding to abuse cases, or when they are boun=
>cing emails, or you get a response from someone telling "sorry I'm not the =
>right contact for this, the email is mistaken", and many other similar situ=
>ations ... the operator is telling you "we don't care about abuse from our =
>customer to other networks".

Just a quick follow-up note on this.

These days, about half of the time when I report a spam that came to me
from one of Microsoft's ASNs, I get a reply back telling me that the
spam in question came from an Outlook user, and giving me some other
reporting email address, and vaguely encouraging me to re-report the
spam to that different address.

I never do.

(This happens EVEN IF I had, in the first instance, reported the spam
to the exact email address that is given as the abuse reporting address
for the relevant ASN in the official ARIN WHOIS records.)

If the people at Microsoft who handle abuse cannot be bothered to just
simply forward a spam report from one of their own departments to
another, internally, then I am not persuaded that any part of their
organization is adequately motivated to do anything at all about it,
no matter who I sent it to.


Regards,
rfg



[anti-abuse-wg] Fresh News from the Dark Continent

2020-01-15 Thread Ronald F. Guilmette
This was to be expected, but it is good to know that it really did happen.

https://mybroadband.co.za/news/security/335226-here-are-the-police-charges-filed-in-the-great-african-ip-address-heist.html

I have high hopes for the new AFRINIC CEO.  Quite obviously, he is not
at all tained by the sins of the past, which have been, rather unfortunately,
replete.


Regards,
rfg



Re: [anti-abuse-wg] working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-15 Thread Ronald F. Guilmette
In message <58ece9f6-4d64-4315-8ee5-88574f6b4...@consulintel.es>, 
JORDI PALET MARTINEZ  wrote:

>Right, and that was a part of my point about eBay-like feedback ratings
>for resource holders, i.e. "Let's not even try."
>Instead, let the people decide.  Let anyone register a feedback point,
>positive or negative, against any resource holder, with the proviso
>that if they are registering a negative feedback point, they should assert
>exactly *why* they are unhappy (e.g. "mail to abuse address bounced as
>undeliverable", "no response for eight days" etc.) and if possible,
>provide some context also, e.g. a copy of the spam, a copy of some
>logs showing hack attempts, etc.
>
>This may have legal consequences for RIPE NCC, as somebody could use the
>system to publish untrue information for competitors ... not a good idea.

OK, two points:

1)  I cannot and will not dispute that rating systems which allow votes
from the public at large can be gamed, e.g. by unscrupulous competitors,
and indeed, it is my belief that there have already been some well-
documented cases of this.  That's not to say that I think that adequate
counter-measures could not be developed.  I think they could be.

2) As regards to the "legal" issue, I can only express my deepest sympathies
for all you folks on your side of the pond and beyond, especially as you all
seem to be at least somewhat constrained in your freedom to speak truth to
power.


Regards,
rfg



Re: [anti-abuse-wg] working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-15 Thread Ronald F. Guilmette
In message 

Leo Vegoda  wrote:

>E-mail does not scale well. It was great in the 1990s, when the
>Internet was smaller and people knew each other. About half the
>world's population now has some sort of Internet connectivity.
>Expecting organizations to be able to understand reports from such a
>diverse group of people is unreasonable.

You're right.  Email is shit.  However as long as network operators
allow their errant end-lusers to spam me via email, I expect them to
also accept reports about that via email. If they don't want to, then
fine.  They can just block outbound port 25 for their entire networks
at and in the routers.  Problem solved and everybody's happy.


Regards,
rfg



Re: [anti-abuse-wg] working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-15 Thread Ronald F. Guilmette
In message <9ew8xocpiyhef...@highwayman.com>, 
Richard Clayton  wrote:

>these (which are the most interesting parts of the Communications
>Decency Act that did not get invalidated by the application of the First
>Amendment which swept away much of it) provide a safe harbour for the
>people operating platforms regarding what the users of those platforms
>say ... so yes this is very much on point
>
>within the EU (and the RIPE region is far bigger than that) there is NOT
>an equivalent regime -- there is a safe harbour (under the ECommerce
>Directive) for hosting companies but ONLY up to the point at which they
>have "actual knowledge" that material is problematic (eg that it is
>defamatory) after that they are on the hook if they fail to act
>appropriately
>
>companies such as EBay and TripAdvisor are well aware of this and
>operate their platforms accordingly -- so this means that problematic
>material will not be visible within the EU (and doubtless in other RIPE
>region countries) ... whether they remove it entirely (so that US
>residents miss out) I could not say, you'd need to ask each company
>individually as to how they configure their systems

I reiterate and slightly rehprase my question:

Do you people in within the RIPE region see, or not see critical reviews
on, for example, eBay, TripAdvisor, etc?

It is being seriously suggested that eBay erases or makes magically and
selectively invisible just those bad seller (or buyer) reviews which
implicate some draconian defamation laws that exist in some one of
the fiefdoms of Europe, perhaps even one small enough to be entirely
covered in shag carpeting?  It is being seriously suggested that
TripAdvisor likewise selectively erases complaints about lousey coffee
at each and every litigious brothel in Amsterdam?

If this is what is being suggested, then color me skeptical.

>note that companies that operate solely in the USA can take some solace
>from the USA SPEECH Act...

The notion of "operating solely in the USA" is not one which lacks
ambiguity, at least when it comes to Internet-based services, as I am
sure you are all too aware.

Still, pragmatics and commerce, like time and tide, wait for no man.
And the services I have named and used as examples *do* exist, *do*
survive, and *do* provide, collect, organize, and disseminate reviews
entered by globe-spanning armies of individual end users.

I would argue that if they can do it, we can do it.

As regards to jurisdiction and legal responsibility, I would be more than
happy to host the thing here in the United States, and take full, personal,
and sole legal responsibility for it.  I am not afraid, because 47 USC 230(c)
is both abundantly clear and already very much tested, in real courts of
law, and it has consistantly prevailed.  The operator of a platform is
*not* legally liable for the speech of others.  Not in these United States
anyway.

I would do these things, but I cannot -build- such a review platform,
because frankly, I just don't have the time.

That small fact doesn't make it a fundamentally Bad or Unworkable idea.


Regards,
rfg



Re: [anti-abuse-wg] working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-15 Thread Ronald F. Guilmette
In message <02d201d5cb84$89d6b950$9d842bf0$@makeitsimple.pt>, 
"=?iso-8859-1?Q?S=E9rgio_Rocha?="  wrote:

>Maybe we can change the approach.
>If RIPE website had a platform to post abuse report, that send the email for
>the abuse contact, it will be possible to evaluate the responsiveness of the
>abuse contact.
>
>This way anyone that report an abuse could assess not only the response but
>also the effectiveness of the actions taken by the network owner. After some
>time with this evaluations we would easy to realize who manages the reports
>and even who does not respond at all.

This is essentially similar to what I had proposed.  As such please put
me down as a:

+1




Re: [anti-abuse-wg] working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-15 Thread Ronald F. Guilmette
In message <20200115080615.gq72...@space.net>, 
Gert Doering  wrote:

>So why is it preferrable to send mails which are not acted on, as
>opposed to "not send mail because you know beforehand that the other
>network is not interested"?

Not sure that I understand fully the context of the question here, 
but in relation to what I suggested, which would be an "eBay-like"
public review collection & publication service, it would be, and is,
always helpful to know which networks just don't give a damn about
being responsible in responding to abuse arising from their networks.
Because there are these things called blacklists.

>I can see that it is frustrating - but I still cannot support a policy
>change which will not help dealing with irresponsible networks in any
>way, but at the same time increases costs and workload for those that
>do the right thing alrady.

As I have said, "You can lead a horse to water, but you can't make him
drink."

No matter how much any of us here might wish it, we should at
long last resign ourselves to the unambigous and ever-present reality
that no significant portion of the RIPE connunity is ever going to be
persuaded to do -anything- in the way of forcing, or even just strongly
encouraging good behavior and/or social responsibility on the part of
independent individual network operators.  It just isn't going to happen,
ever.  We should thus move on and should take heed of ancient wisdom of
1 Corinthians 13:11:

When I was a child, I spake as a child, I understood as a child,
I thought as a child: but when I became a man, I put away childish
things.

It is a childish thing to still hope or believe that any part of RIPE
or its community will ever take any meaningful action to *directly*
influence the behavior of networks that simply wish to minimize their
costs and maximize their revenue through a corporate strategy of ignoring
all acts of customer network abuse.

This is why I have suggested that, at the very least, RIPE NCC could set
up and maintain just a basic review "platform" where the public at large
can at least make it known to all observers which networks are the assholes
and which ones aren't.

>> To an extreme, there should always be a known contact responsible for
>> any network infrastructure.

Yes, but the operative word there is "should".  Who will *mandate* and
*enforce* this rule?  Not RIPE NCC and not the RIPE community.  I and
others have been on this list for years and years and the result is
as recurrent as it is entirely predictable by now.  There are those,
here and elsewhere, who religiously cling to their God-given "right"
to refuse, stubbornly, adamantly, and absolutely, to be told what to
do or how to responsibly run their networks by any other party, including
even the RIPE community.  (Hell!  Some of them are apparently not even
entirely convinced that they have any clear obligations to stay within
the bounds proscribed by criminal law!)

Thus, in short, it is well past time to move on and to put away childish
things, specifically the eternal and ever-unfulfilled forlorn hope that
either RIPE or it's community will someday, at long last, come to its
senses and start demanding even some minimal level of responsibility
and/or accountability from its members.

The only small thing that RIPE -might- actually be able to do to improve
the present situation... without all of the usual vetos from all of the
usual quarters... would be for it to set up a public review platform so
that members of the public at large could at least document, in full
public view, which networks are the shitheads and which are the good guys.
That way RIPE is not expressing *any* viewpoint itself... not about any
network and not even about what does or does not constitute "abuse" or
"responsible network behavior"... and thus just this one small thing
might actually be achievable, where all of the years of ranting and raving,
of tearing of hair and gnashing of teeth about the wanton abuse of the
Internet by networks within the RIPE community has achieved -zero-, zip,
nada, nothing of any substance in the way of prudently setting even just
a minimum floor on behavior, let alone actually enforcing that minimal
floor.

Time to put away childish things and childish hopes that RIPE will be
someday persuaded to be a part of the solution.  For the moment it
remains, as it has remained for quite some years now, a part of the
problem.  RIPE will never itself enforce -any- code of network behavior.
Period.   Full stop.  There are too many people making too much money
based on the present utter absence of any behaviorly rules, much less
enforcement, to allow that to change any time soon.

Get over it and move on.


Regards,
rfg



Re: [anti-abuse-wg] working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-14 Thread Ronald F. Guilmette
In message , 
Hans-Martin Mosner  wrote:

>While this would probably paint a pretty solid picture of which network o=
>perators can be trusted and which can't,
>there's another point besides your valid concern about abusers gaming the=
> system: Whoever publishes the results of such
>user ratings would most likely expose themselves to litigious lawsuits, w=
>hich neither you nor me nor RIPE NCC really
>wants to do.

That comment, and that concern, certainly does not seem to apply in any
country in which either eBay or TripAdvisor operate.

Do you folks on your side of the pond not receive eBay?  Are you not able to
view Tripadvisor.Com?

Here in this country (U.S.) there are actually -three- separate and clearly
discrenable legal protections that would cover and that do cover circumstances
like this.  In no particular order, they are:

 (*)  The First Amendment.
 
 (*)  47 USC 230(c)(1)

 (*)  47 USC 230(c)(2)(B)

Ref:
https://www.law.cornell.edu/uscode/text/47/230

The middle one is actually the first-order go-to provision for situations
like this, and provides for quick dismissal for any silly cases brought
against *me* for something that *you* have said on some discussion or
review web site that I just happen to provide electricity, connectivity,
and CPU cycles for.

One would hope that european law might have some counterpart for that,
but I confess that I really have no idea about that, one way or the other.

So, um, is the european continent utterly devoid of any and all web sites
where reviews can or do appear?  Does europe have its own GDPR mandated
Great Firewall to keep the evil likes of eBay and TripAdvisor out?

Or were you, Hans-Martin, just saying that in europe, free speech is reserved
only for those who can afford it, and who conveniently have hoards of corporate
lawyers covering their backsides?

Asking seriously, because I don't know the answer.  I'm just puzzled by this
whole thing, and this concern about lawsuits.


Regards,
rfg



Re: [anti-abuse-wg] working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-14 Thread Ronald F. Guilmette
In message <30174d32-225f-467e-937a-5bc42650f...@consulintel.es>, 
JORDI PALET MARTINEZ via anti-abuse-wg  wrote:

>I think if we try to agree on those ratings, we will never reach consensus

Right, and that was a part of my point about eBay-like feedback ratings
for resource holders, i.e. "Let's not even try."

Instead, let the people decide.  Let anyone register a feedback point,
positive or negative, against any resource holder, with the proviso
that if they are registering a negative feedback point, they should assert
exactly *why* they are unhappy (e.g. "mail to abuse address bounced as
undeliverable", "no response for eight days" etc.) and if possible,
provide some context also, e.g. a copy of the spam, a copy of some
logs showing hack attempts, etc.

>So it is not just easier to ask the abuse-c mailboxes that don't want to
>process to setup an autoresponder with an specific (standard) text about
that, for example:...

In the "eBay feedback" model I am proposing there is no need for *RIPE NCC*
to ask anybody about anything.  People will register negative points
against any resource holder with an undeliverable abuse address.  (I know
I will!)

I'm sorry Jordi, if this idea sounds like it is undermining everything
you have been trying to do, which is all very very admirable.  But I have
only just realized what you said above, i.e. if we really start to try
to design a system where RIPE NCC will do 100% of the work of "reviewing"
all one zillion RIPE resource holders, the size of the task will almost
be the least of the worries.   The first order problem, as you already
know since you have been doing yeoman's work on this for awhile now, is
just getting people in the various RIRs to agree on the numerous fine
details.  (Hell! You can't even get *me* to agree that a 15 day turn-
around is in any sense "reasonable", and apparently I'm not alone in
that regard.)

So, my solution is just don't.  Let the whole planet vote on whether
they think this provider or that provider are ***heads, and let the
chips fall where they may.

I'm not saying that even this idea would neessarily be piece-of-cake easy.
The first problem would be working out a way to prevent the system from
being gamed by bad actors for malicious purposes, or for positive "PR"
purposes.  (Don't get me started about the fake positive review over on
TripAdvisor.)  But I am not persuaded that these are in any sense
insoluable problems.


Regards,
rfg



Re: [anti-abuse-wg] working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-14 Thread Ronald F. Guilmette
In message <671286eb-7fad-4d70-addd-efa0a680b...@consulintel.es>, 
JORDI PALET MARTINEZ via anti-abuse-wg  wrote:

>>Section 3.0 part 3.  Why on earth should it take 15 days for
>>anyone to respond to an email??  Things on the Internet happen
>>in millseconds.  If a provider is unable to respond to an issue
>>within 72 hours then they might as well be dead, because they
>>have abandoned all social responsibility.
>>
>>I fully agree! My original proposal was only 3 working days, but the
>>community told me "no way". This was the same input I got in APNIC
>>and LACNIC (in both regions it reached consensus with 15 days).
>>
>>So, I will keep 15 days ...
>
>I think this is provable, and also transparently obvious and colossal
>bullshit, but that's just my opinion.
>
>And mine!, but as a proposal author, I need to try to match as much as poss=
>ible the wishes of the community.

You are hereby officially absolved from all guilt in the matter.

In nomine patri et fili spiritu sancte.

Go in peace my son, and do what you have to do.


Regards,
rfg



Re: [anti-abuse-wg] working in new version of 2019-04 (Validation of "abuse-mailbox")

2020-01-13 Thread Ronald F. Guilmette
In message 
, 
=?utf-8?B?w4FuZ2VsIEdvbnrDoWxleiBCZXJkYXNjbw==?=  
wrote:

>Well, I do see the value of an option (a magic email value?) meaning "this
>entity supports the use of its network for abusive purposes and will take no
>action on any abuse report".
>
>That would save time for everyone involved, and would allow to easily block
>those networks from accesing ours!

These are pretty much my sentiments exactly.

The only questions remaining are:

   1)   Should there just be a simple yes/no one-bit flag published for
each resource holder, or would a scale and a range of possible
"rating" values be more useful?

   2)   How shall the "ratings" be computed and by whom?

I have provided my personal opinions on both of these points in my
prior posting.


Regards,
rfg




  1   2   3   4   >