Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-16 Thread Mark Andrews

In message <[EMAIL PROTECTED]>, Florian Weimer writes:
> * Mark Andrews:
> 
> > In message <[EMAIL PROTECTED]>, Florian Weimer writes:
> >> * Stephane Bortzmeyer:
> >> 
> >> > Second question, the document indeed standardizes many things which
> >> > are not in common use but does not point towards a rationale, so some
> >> > choices are puzzling. Why TXT records to point to an URL and not
> >> > NAPTR? Is this because of current usage in DNSxL? If so, this should
> >> > be noted. But why IPv6 lists use a A record and not a ? I am not
> >> > aware of existing IPv6 lists so this cannot be the current usage?
> >> 
> >> The lack of a macro capability also means that it's basically
> >> impossible to secure DNSBL zones with DNSSEC when they contain larger
> >> chunks of address space; see the example in section 2.1.
> >
> > How so?
> 
> The expectation is that error messages generated from TXT records
> contain the actual IP addresses which triggered the DNSBL lookups.  As
> a result, if you list a /16 (say), you need publish 65,536 different
> TXT records.
> 
> Currently, these records are synthesized using a macro capability in
> the DNS server.

Which is independent of DNSSEC.  I ask again how this a
DNSSEC problem.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: [EMAIL PROTECTED]
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-16 Thread Mark Andrews

In message <[EMAIL PROTECTED]>, Florian Weimer writes:
> * Mark Andrews:
> 
> >> >> The lack of a macro capability also means that it's basically
> >> >> impossible to secure DNSBL zones with DNSSEC when they contain larger
> >> >> chunks of address space; see the example in section 2.1.
> >> >
> >> >  How so?
> >> 
> >> The expectation is that error messages generated from TXT records
> >> contain the actual IP addresses which triggered the DNSBL lookups.  As
> >> a result, if you list a /16 (say), you need publish 65,536 different
> >> TXT records.
> >> 
> >> Currently, these records are synthesized using a macro capability in
> >> the DNS server.
> >
> > Which is independent of DNSSEC.  I ask again how this a
> > DNSSEC problem.
> 
> I didn't say it was a DNSSEC problem.  I just wanted to note it's
> impossible to secure some existing DNSBL zones using DNSSEC without
> sacrificing some of the functionality which is mentioned in section
> 2.1 in the draft.

I still don't believe your claim.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: [EMAIL PROTECTED]
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-16 Thread Chris Lewis
Florian Weimer wrote:

> I can't sign a thousand million RRsets and serve it in a DoS-resilient
> manner, even with John's partitioning idea (which is rather neat,
> thanks!).

I may have to keep that in mind if I ever DNSSEC our internal composite
DNSBL zone, which has probably near 500M IPs listed (both "bad" and "good").

[The zone file is > 500Mbytes]

> Macro expansion in the client brings down the number of RRsets to a
> challenging, but manageable level.  Chris says there's precedent for
> that, so I think we can end this subthread (or move the discussion to
> some place where the topic of DNSSEC scalability would be more
> on-topic).

Even more for a client-supplied string being macro-expanded in the
client.  Eg: no TXT query at all.

If I had to guess, I suspect that more than half of clients don't issue
a TXT query and synthesize their own error message instead.  The vast
majority of DNSBLs are arranged so that a single message with macro
substitution of IP is sufficient to produce a useful error message, so
why wait for a TXT query if you can configure the client to generate its
own?

Even tho I publish TXT records in our internal DNSBL zone, the filters
themselves don't query them.  The TXT records are used by administrative
tools as part of the FP process because they contain diagnostic
information on the entries.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-16 Thread Florian Weimer
* Mark Andrews:

>> I didn't say it was a DNSSEC problem.  I just wanted to note it's
>> impossible to secure some existing DNSBL zones using DNSSEC without
>> sacrificing some of the functionality which is mentioned in section
>> 2.1 in the draft.
>
>   I still don't believe your claim.

I can't sign a thousand million RRsets and serve it in a DoS-resilient
manner, even with John's partitioning idea (which is rather neat,
thanks!).

Macro expansion in the client brings down the number of RRsets to a
challenging, but manageable level.  Chris says there's precedent for
that, so I think we can end this subthread (or move the discussion to
some place where the topic of DNSSEC scalability would be more
on-topic).
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-16 Thread Florian Weimer
* Chris Lewis:

> Florian Weimer wrote:
>
>> The expectation is that error messages generated from TXT records
>> contain the actual IP addresses which triggered the DNSBL lookups.  As
>> a result, if you list a /16 (say), you need publish 65,536 different
>> TXT records.
>> 
>> Currently, these records are synthesized using a macro capability in
>> the DNS server.
>
> How does that break DNSSEC?

You'd need online signature generation (which implies sharing the key
with all mirrors), or hundreds of millions of precomputed signatures
for some existing zones.  (Due to the prevalent attack scenario, more
frequent than usual key rollovers are needed, so this really hurts.)

> A number of DNSBLs merely suggest an error message in their usage
> instructions, and leave it up to the client to synthesize a
> combination of the suggested error message and the IP address.
> Macro expansion in the client (either of supplied TXT or
> client-configured string) seems common.

I've been told that this approach would not be acceptable.  But my
source probably lacked your insight into the field.

With macro expansion in the client, signing and serving typical DNSBLs
is still somewhat of a challenge, but doable.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-16 Thread John Levine
>The expectation is that error messages generated from TXT records
>contain the actual IP addresses which triggered the DNSBL lookups.  As
>a result, if you list a /16 (say), you need publish 65,536 different
>TXT records.

Some do, some don't.  In any event I agree that DNSSEC is not ideally
suited to signing DNSBLs, but I would think that with some judicious
partitioning into subzones the problem wouldn't be intractable.

R's,
John
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-16 Thread Florian Weimer
* Mark Andrews:

>> >> The lack of a macro capability also means that it's basically
>> >> impossible to secure DNSBL zones with DNSSEC when they contain larger
>> >> chunks of address space; see the example in section 2.1.
>> >
>> >How so?
>> 
>> The expectation is that error messages generated from TXT records
>> contain the actual IP addresses which triggered the DNSBL lookups.  As
>> a result, if you list a /16 (say), you need publish 65,536 different
>> TXT records.
>> 
>> Currently, these records are synthesized using a macro capability in
>> the DNS server.
>
>   Which is independent of DNSSEC.  I ask again how this a
>   DNSSEC problem.

I didn't say it was a DNSSEC problem.  I just wanted to note it's
impossible to secure some existing DNSBL zones using DNSSEC without
sacrificing some of the functionality which is mentioned in section
2.1 in the draft.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-16 Thread Chris Lewis
Florian Weimer wrote:

> The expectation is that error messages generated from TXT records
> contain the actual IP addresses which triggered the DNSBL lookups.  As
> a result, if you list a /16 (say), you need publish 65,536 different
> TXT records.
> 
> Currently, these records are synthesized using a macro capability in
> the DNS server.

How does that break DNSSEC?

A number of DNSBLs merely suggest an error message in their usage
instructions, and leave it up to the client to synthesize a combination
of the suggested error message and the IP address.  Macro expansion in
the client (either of supplied TXT or client-configured string) seems
common.

Of course, they're still only suggestions, and some DNSBL users will
generate their own.

The worst of all is the clients that don't tell you what the IP was and
no other way to remediate issues.  There are situations like this which
even leave admins scratching their heads.

[While the BCP isn't yet on the table w.r.t. the spec (it may be), this
issue is covered in the BCP.]
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-16 Thread Florian Weimer
* Mark Andrews:

> In message <[EMAIL PROTECTED]>, Florian Weimer writes:
>> * Stephane Bortzmeyer:
>> 
>> > Second question, the document indeed standardizes many things which
>> > are not in common use but does not point towards a rationale, so some
>> > choices are puzzling. Why TXT records to point to an URL and not
>> > NAPTR? Is this because of current usage in DNSxL? If so, this should
>> > be noted. But why IPv6 lists use a A record and not a ? I am not
>> > aware of existing IPv6 lists so this cannot be the current usage?
>> 
>> The lack of a macro capability also means that it's basically
>> impossible to secure DNSBL zones with DNSSEC when they contain larger
>> chunks of address space; see the example in section 2.1.
>
>   How so?

The expectation is that error messages generated from TXT records
contain the actual IP addresses which triggered the DNSBL lookups.  As
a result, if you list a /16 (say), you need publish 65,536 different
TXT records.

Currently, these records are synthesized using a macro capability in
the DNS server.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-16 Thread Mark Andrews

In message <[EMAIL PROTECTED]>, Florian Weimer writes:
> * Stephane Bortzmeyer:
> 
> > Second question, the document indeed standardizes many things which
> > are not in common use but does not point towards a rationale, so some
> > choices are puzzling. Why TXT records to point to an URL and not
> > NAPTR? Is this because of current usage in DNSxL? If so, this should
> > be noted. But why IPv6 lists use a A record and not a ? I am not
> > aware of existing IPv6 lists so this cannot be the current usage?
> 
> The lack of a macro capability also means that it's basically
> impossible to secure DNSBL zones with DNSSEC when they contain larger
> chunks of address space; see the example in section 2.1.

How so?

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: [EMAIL PROTECTED]
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-14 Thread Florian Weimer
* Stephane Bortzmeyer:

> Second question, the document indeed standardizes many things which
> are not in common use but does not point towards a rationale, so some
> choices are puzzling. Why TXT records to point to an URL and not
> NAPTR? Is this because of current usage in DNSxL? If so, this should
> be noted. But why IPv6 lists use a A record and not a ? I am not
> aware of existing IPv6 lists so this cannot be the current usage?

The lack of a macro capability also means that it's basically
impossible to secure DNSBL zones with DNSSEC when they contain larger
chunks of address space; see the example in section 2.1.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-13 Thread Doug Otis


On Nov 10, 2008, at 7:18 AM, Keith Moore wrote:


John Levine wrote:

As I said a few messages up in this string, although the structure  
of IPv4 DNSxLs has long since been cast in concrete, IPv6 DNSxLs  
aren't that mature yet and one of my goals was to make them  
interoperate equally well so, for example, if you find you're using  
cruddy ones you can easily switch to better ones.


I suspect it will be very difficult to make IPv6 DNSxLs work  
anywhere nearly as well as IPv4 DNSxLs, because in IPv6 it is fairly  
easy to use a different address for every SMTP conversation.


Agreed.   One might hope that the future will use DKIM domains and "on- 
behalf-of" tuples as an alternative to that of an IP address blocking  
list.  Ideally, the "on-behalf-of" would be an opaque value assigned  
by the provider, that is changed whenever a problem is corrected.   
This would eliminate the need for coordination between those that run  
reputation services and the senders.  Those that abuse this freedom  
would be at risk of finding their entire domain blocked instead.  The  
problem that needs solved is how to block compromised systems, more  
than blocking individuals.  Frankly, it would be best not to have any  
personably identifiable values used.


Unfortunately, being able to detect misbehavior at a sufficient level  
to safely conclude whether an outbound MTA is poorly managed requires  
rather extensive infrastructure. This infrastructure is often several  
times larger than the typical infrastructure of a client being  
protected.  These services address the problem of scaling email  
defenses.  Assessments are fairly difficult when the MTA being judged  
has little volume, since even an occasional misidentification of NDN  
as spam might create a profile fairly similar to those created by bot- 
nets.  Bot-nets represent a sizable portion of today's spam sources.


IMHO, the goal of the black-hole list should be to inform ISPs and  
have them remove bad actors from their network and hopefully to  
encourage them to better monitor their own traffic.  ISPs will not  
agree with this.  Even the largest decoy infrastructure sees only a  
tiny fraction of the overall traffic.  A desire to rapidly block any  
IP address that appears to be actively spamming provides bad actors a  
simple way to locate decoys and render the system less effective.   
While there are ways to deal with this problem, it both increases the  
infrastructure required, and the duration of a listing applied to  
problematic addresses.


While there may be some concern that DNSxLs use A records as a flag,  
normally these records are limited to an address range of  
127.255.255.255 - 127.0.0.2 (only  23 bits worth of data).  It seems  
unlikely that the use of these IP addresses will lead to any problem.   
The reason for suggesting that the document be published as  
Informational has to do with there not being _any_ real experience yet  
in attempting to block IPv6 addresses.  Routers will only be handling  
a faction of the total IP address space that IPv6 makes available.  
IPv6 DNSxL entries will not represent the same number of routes  
managed by routers.  This would suggest that entire networks are to be  
blocked whenever a significant level of abuse is detected that  
warrants blocking.  This would be a rather bunt tool.


There are a few points that this draft attempts to answer in a  
reasonable way.  The software used by the DNS servers is not going to  
change to support the IPv6 address space.  The servers will continue  
in the same fashion as before.  Instead of a query address of  
127.0.0.2, this draft suggest the value :::7F00:2 to test the  
existence of the list.  Until there is some greater experience in  
handling IPv6 address space, do not get ahead of the problem by  
concluding how this service is to resolve the practical challenges  
ahead.  When a network handles a mixture of legitimate and abusive  
traffic, it may be impossible to cope with the volume of tracking data  
that will be required.


After all, evidence MUST BE retained for everything blocked to squelch  
erroneous customer complaints and the occasional law suit threat.   
While SANs are getting bigger, to scale these systems for tracking  
addresses within an IPv6 network is unlikely to be economically all  
that practical.  This might be wrong, but it should be less expensive  
for reputation services to use DKIM domains and an opaque "on-behalf- 
of" value instead.  DKIM would also create less danger with respect to  
collateral blocking.  MTAs may need to be equipped with crypto  
hardware to deal with foo signature abuse.  At least MTAs should be  
able to rate limit any IP address sending foo signatures.


-Doug




___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: IPv6 traffic stats (was: Re: Last Call: draft-irtf-asrg-dnsbl(DNS Blacklists and Whitelists))

2008-11-13 Thread Hallam-Baker, Phillip
Who cares about the use measurement?
 
I care about the proportion of the Internet where I can obtain acceptable 
service with full functionality via an IPv6-only endpoint connection.



From: [EMAIL PROTECTED] on behalf of David Kessens
Sent: Wed 11/12/2008 4:28 PM
To: Joe St Sauver
Cc: ietf@ietf.org
Subject: Re: IPv6 traffic stats (was: Re: Last Call: draft-irtf-asrg-dnsbl(DNS 
Blacklists and Whitelists))




Joe,

On Tue, Nov 11, 2008 at 03:12:53PM -0800, Joe St Sauver wrote:
> David mentioned:
>
> On the other hand, just to put this in context and to pick on an
> application I'm somewhat familiar with, a single full-ish Usenet news
> feed is now in excess of 3TByte/day (see the daily volume stats quoted
> at http://en.wikipedia.org/wiki/Usenet ). Just two or three full-ish
> Usenet News feeds over IPv6, if done across AMS-IX, would account
> for most of that 800Mbps traffic load (assuming that Usenet is what
> was making up most of that traffic, an assertion that I'm explictly
> NOT making). My point? It is possible that the IP transport choices
> of just a few cooperating server administrators might (at least
> hypothetically) account for virtually all the observed growth in
> AMS-IX IPv6 traffic.

Very good analysis: rumor has it that a large part of the AMS-IX
traffic is indeed usenet traffic. However, that doesn't mean that it
is not real IPv6 traffic: eg. we don't decide not to count IPv4 Usenet
traffic either. On the other hand, this graph only shows native
traffic so there is most likely more than what is visible in the
graph.

However, there are quite a few other observations by others (also
mentioned on this list) that put the total amount of IPv6 traffic to
various other parts of the Internet at a bit more but in the same
order of magnitude so it doesn't seem that the AMS-IX data is out of
line (various presentations on this topic from the last RIPE
meeting are available on rosie.ripe.net, look for ipv6 working group
or plenary).

> So to bring this post to a close, I continue to believe that IPv6
> traffic, at least IPv6 email traffic, remains very, very low, to
> the point where, as I've previous mentioned, it just hasn't justified
> DNS block list operator attention in any material way (love to hear
> about any counter examples, BTW).

This of course depends a bit on what you define as very, very low.
However, I can certainly see that it is not enough to get the
attention of a DNS block list operator. I do do know however, that I
received my first spam mail over IPv6 several years ago.

The reason for my mail was not to disproof your point but to put the
arbornetworks numbers in a bit more perspective.

David Kessens
---
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IPv6 traffic stats (was: Re: Last Call: draft-irtf-asrg-dnsbl(DNS Blacklists and Whitelists))

2008-11-12 Thread Olivier MJ Crepin-Leblond
"Danny McPherson" <[EMAIL PROTECTED]> wrote:

> To be clear, our attempt with this study was to measure
> observable IPv6 traffic in production networks across a
> large number of production ISP networks.  It was not to
> discredit IPv6 in any way, quite the contrary.

That's great and it will be even better when this study is repeated in
a few months using the same data set and methodology. This way, you
can start tracking growth.
Comparing this set of results with other sets obtained using different
methodologies & data sets would be like comparing apples and oranges.

Warm regards,

Olivier

-- 
Olivier MJ Crepin-Leblond, Ph.D
Global Information Highway Ltd
http://www.gih.com/ocl.html

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IPv6 traffic stats (was: Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists))

2008-11-12 Thread David Kessens

Danny,

On Wed, Nov 12, 2008 at 06:11:11PM -0700, Danny McPherson wrote:
>
> I look forward to any credible data that you can provide
> to support wider adoption, or being made aware of any
> unacknowledged issues with our methodology.

As I mentioned in another mail to the ietf list today:

 various presentations on this topic from the last RIPE
 meeting are available on rosie.ripe.net, look for ipv6 working group
 or plenary

David Kessens
---
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IPv6 traffic stats (was: Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists))

2008-11-12 Thread Danny McPherson


On Nov 12,


The report as presented at the RIPE meeting indeed mentions the
possibility of undercounting. However, it appears that there is an
undercount of several orders of magnitude.  At that point you really
cannot claim that the report provides a perspective on Internet IPv6
traffic as it does. It is quite reasonable to conclude that something
went wrong with the methodology, measurements or analysis.


Nothing is wrong in the methodology and the places where
undercounting likely occurred (namely: flow types supported
by exporting routers, Teredo data channels, etc..) have been
identified.  Caveat-aware, I believe the report to be both
very quantitive and qualitative.  Furthermore, what we measured
is what the ISPs involve have visibility to, which is a critical
consideration - if you can't see it, and can't measure it, then
you certainly can't qualify it.

If you have any more *quantitative* and qualitative studies
that you can point to I and many others would be quite
interested.


The difference between something that is barely measurable and
something small but measurable like 0.1% is huge. Basically, 0.1% on
the scale of the Internet means that a very large group of people is
using IPv6 today. There is no question that that group pales to the
total number of Internet users but it sure is more than a few people
in IETF experimenting with IPv6.



That's great news, and I look forwarding to seeing more
data from this large group of people...

To be clear, our attempt with this study was to measure
observable IPv6 traffic in production networks across a
large number of production ISP networks.  It was not to
discredit IPv6 in any way, quite the contrary.

I look forward to any credible data that you can provide
to support wider adoption, or being made aware of any
unacknowledged issues with our methodology.

-danny

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IPv6 traffic stats (was: Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists))

2008-11-12 Thread David Kessens

Joe,

On Tue, Nov 11, 2008 at 03:12:53PM -0800, Joe St Sauver wrote:
> David mentioned:
> 
> On the other hand, just to put this in context and to pick on an 
> application I'm somewhat familiar with, a single full-ish Usenet news 
> feed is now in excess of 3TByte/day (see the daily volume stats quoted 
> at http://en.wikipedia.org/wiki/Usenet ). Just two or three full-ish
> Usenet News feeds over IPv6, if done across AMS-IX, would account 
> for most of that 800Mbps traffic load (assuming that Usenet is what
> was making up most of that traffic, an assertion that I'm explictly
> NOT making). My point? It is possible that the IP transport choices
> of just a few cooperating server administrators might (at least
> hypothetically) account for virtually all the observed growth in 
> AMS-IX IPv6 traffic. 

Very good analysis: rumor has it that a large part of the AMS-IX
traffic is indeed usenet traffic. However, that doesn't mean that it
is not real IPv6 traffic: eg. we don't decide not to count IPv4 Usenet
traffic either. On the other hand, this graph only shows native
traffic so there is most likely more than what is visible in the
graph.

However, there are quite a few other observations by others (also
mentioned on this list) that put the total amount of IPv6 traffic to
various other parts of the Internet at a bit more but in the same
order of magnitude so it doesn't seem that the AMS-IX data is out of
line (various presentations on this topic from the last RIPE
meeting are available on rosie.ripe.net, look for ipv6 working group
or plenary).

> So to bring this post to a close, I continue to believe that IPv6
> traffic, at least IPv6 email traffic, remains very, very low, to 
> the point where, as I've previous mentioned, it just hasn't justified
> DNS block list operator attention in any material way (love to hear
> about any counter examples, BTW).

This of course depends a bit on what you define as very, very low.
However, I can certainly see that it is not enough to get the
attention of a DNS block list operator. I do do know however, that I
received my first spam mail over IPv6 several years ago.

The reason for my mail was not to disproof your point but to put the
arbornetworks numbers in a bit more perspective.

David Kessens
---
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IPv6 traffic stats (was: Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists))

2008-11-12 Thread David Kessens

Danny,

On Wed, Nov 12, 2008 at 01:15:07PM -0700, Danny McPherson wrote:
>
> On Nov 11, 2008, at 11:57 AM, David Kessens wrote:
>>
>> It seems that arbornetworks estimates are extremely low to the point
>> where one has to ask whether there were other issues that caused such
>> a low estimate.
>
> No, the methodology is outlined in the referenced report.
> Given what we were measures and what data was supplied, those
> were the results.

The report as presented at the RIPE meeting indeed mentions the
possibility of undercounting. However, it appears that there is an
undercount of several orders of magnitude. At that point you really
cannot claim that the report provides a perspective on Internet IPv6
traffic as it does. It is quite reasonable to conclude that something
went wrong with the methodology, measurements or analysis.

>> There is no question that IPv6 traffic is quite low in the Internet.
>> However, many other reports that I have seen recently measure multiple
>> orders of magnitude more IPv6 traffic (for an easily accesible example
>> see: http://www.ams-ix.net/technical/stats/sflow/)
>
> Indeed, and multiple orders (less than two) of magnitude is still,
> from this, only .1% on average.  I believe the point remains very
> much the same.

The difference between something that is barely measurable and
something small but measurable like 0.1% is huge. Basically, 0.1% on
the scale of the Internet means that a very large group of people is
using IPv6 today. There is no question that that group pales to the
total number of Internet users but it sure is more than a few people
in IETF experimenting with IPv6.

David Kessens
---
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IPv6 traffic stats (was: Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists))

2008-11-12 Thread Danny McPherson


On Nov 11, 2008, at 11:57 AM, David Kessens wrote:



Joe,

On Tue, Nov 11, 2008 at 08:20:11AM -0800, Joe St Sauver wrote:


I'm not aware of DNS block lists which cover IPv6 address spaces at
this time, probably in part because IPv6 traffic remains de minimis
(see http://asert.arbornetworks.com/2008/8/the-end-is-near-but-is-ipv6/
showing IPv6 traffic as constituting only 0.002% of all Internet  
traffic).


For the record:

It seems that arbornetworks estimates are extremely low to the point
where one has to ask whether there were other issues that caused such
a low estimate.


No, the methodology is outlined in the referenced report.
Given what we were measures and what data was supplied, those
were the results.


There is no question that IPv6 traffic is quite low in the Internet.
However, many other reports that I have seen recently measure multiple
orders of magnitude more IPv6 traffic (for an easily accesible example
see: http://www.ams-ix.net/technical/stats/sflow/)


Indeed, and multiple orders (less than two) of magnitude is still,
from this, only .1% on average.  I believe the point remains very
much the same.

-danny


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-12 Thread Tony Finch
On Wed, 12 Nov 2008, Andrew Sullivan wrote:
> On Wed, Nov 12, 2008 at 05:23:12PM +, Tony Finch wrote:
> > On Tue, 11 Nov 2008, Andrew Sullivan wrote:
> > >
> > > In addition, the document proposes to continue using the existing
> > > mechanism in order to support IPv6 hosts.  There is little evidence of
> > > a widespread deployment of such use,
> >
> > Exim has had support for IPv6 DNS lists as described by this draft for
> > many years.
>
> I fail completely to see how that is even a little bit evidence that
> there is widespread deployment of IPv6 mail hosts, use of them, or
> anything of the sort.

Sorry, I thought you were referring to deployment of the DNSxL protocol
that the draft documents.

Tony.
-- 
f.anthony.n.finch  <[EMAIL PROTECTED]>  http://dotat.at/
SOUTHEAST ICELAND: SOUTHEASTERLY VEERING SOUTHWESTERLY 4 OR 5, INCREASING 6 AT
TIMES, VEERING NORTHERLY 5 TO 7 LATER. MODERATE OR ROUGH. OCCASIONAL RAIN.
MODERATE OR GOOD, OCCASIONALLY POOR.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-12 Thread Andrew Sullivan
On Wed, Nov 12, 2008 at 05:23:12PM +, Tony Finch wrote:
> On Tue, 11 Nov 2008, Andrew Sullivan wrote:
> >
> > In addition, the document proposes to continue using the existing
> > mechanism in order to support IPv6 hosts.  There is little evidence of
> > a widespread deployment of such use,
> 
> Exim has had support for IPv6 DNS lists as described by this draft for
> many years.

I fail completely to see how that is even a little bit evidence that
there is widespread deployment of IPv6 mail hosts, use of them, or
anything of the sort.  I gather our point wasn't clear enough, though,
so I'll try to make it clearer.

The point is that we do not have today a large installed base of
IPv6-native networks interoperating, with large-scale spam problems
that need urgent attention, in the way that we have those problems on
IPv4-hosted mail infrastructure.  I am aware that there is some IPv6
deployment, and I am aware that in those environments there are of
course mail servers.  But deployment is nowhere near the scale of the
deployed v4 architecture.  Therefore, we have an opportunity now,
before v6 is everywhere, to do something about the deployed code.
That isn't to say there will not need to be some
backward-compatibility efforts (which you may pronounce "kludges" if
your local policy permits).  I think we said that in our original
message, however.

Best regards,

Andrew

-- 
Andrew Sullivan
[EMAIL PROTECTED]
Shinkuro, Inc.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-12 Thread Tony Finch
On Tue, 11 Nov 2008, Andrew Sullivan wrote:
>
> In addition, the document proposes to continue using the existing
> mechanism in order to support IPv6 hosts.  There is little evidence of
> a widespread deployment of such use,

Exim has had support for IPv6 DNS lists as described by this draft for
many years.

Tony.
-- 
f.anthony.n.finch  <[EMAIL PROTECTED]>  http://dotat.at/
SOUTHEAST ICELAND: SOUTHEASTERLY 5 OR 6, VEERING SOUTHWESTERLY 4 OR 5 LATER.
MODERATE OR ROUGH. OCCASIONAL RAIN. MODERATE OR GOOD, OCCASIONALLY POOR LATER.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-11 Thread Andrew Sullivan
Dear colleagues,

We have read draft-irtf-asrg-dnsbl-07.  We have some comments on the
draft in response to the last call.  We wish to emphasise that, while we
currently serve as the co-chairs of the DNS Extensions working group,
these comments are merely our own, and are not representative of the
views of the working group.

We believe we understand the purpose of DNSxLs, and we think they can, in
some circumstances, provide a useful service (even though they
sometimes cause difficulty for users of Internet mail).  We also think
that describing current behaviour of DNSxLs is a good thing.  

That said, we are uncomfortable with the draft in its current form,
and are strongly opposed to adopting it as a Proposed Standard.  We
believe that most, but not all, of the draft would be an excellent
candidate for adoption as an Informational document.

One problem with the document is its outline of the way that DNSxLs
use A records to indicate reasons to accept or reject traffic from a
given site.  The trouble is that these A records are not host
addresses, even though that's the definition of an A record.  The A
records merely _look_ like host addresses.  In order to understand
that they are not host addresses, you have to know what DNS server you
are querying and interpret the owner name at the record.

What this really does is use the context of the query, plus the
content of the query and answer, as meta-data in order to add new
semantics to A records: if you happen to query server
dnsbl.example.org with just the right owner name, you get an A record
that is not a host address.  Note that merely knowing the DNS server
name is not enough: the document points out that if you query the same
server with a different owner name, you might get an A record that
_is_ a host address.  In addition, the context of the answer
determines its use: the same server can use the same zone data to
provide whitelist and blacklist services to two different groups of
querying agents.

Now, it is surely a service to the Internet community to document that
there are DNS servers where the content of the answer determines the
semantics of the record, but we don't really think this is something
that we should plan to advance on the standards track.  It seems plain
to us that the reason DNS has RRTYPEs is so that the client doesn't
need to guess what kind of record it has when it gets a resource
record.

In our view, the document really needs to make clear that DNSxLs are
violating the semantics of A records when they make this use of them.
One way to do that would be to modify the first paragraph in section
2 along the following lines:

   A DNSxL is a zone in the DNS[RFC1034][RFC1035].  The zone containing
   resource records identifies hosts present in a blacklist or
   whitelist.  Hosts were originally encoded into DNSxL zones using a
   transformation of their IP addresses, but now host names are
   sometimes encoded as well.  Most DNSxLs still use IP addresses.
   The zone accepts and responds to DNS queries in apparently standard
   ways.  The zone data, however, is not DNS data, and has special
   semantics that can be understood only in the context of the DNSxL
   service.  In particular, A records returned by the server usually
   do not contain a host address.  Instead, they usually contain a 32 bit
   value to be interpreted as bitfields.  For historical reasons,
   implementations used the DNS A RRTYPE to represent these values,
   rather than a distinct RRTYPE.

   As noted in section 5, some A records in a DNSxL zone MAY contain
   host records.  How clients interpret different A records in the
   same DNSxL zone is implementation- and context-dependent.


In addition, the document proposes to continue using the existing
mechanism in order to support IPv6 hosts.  There is little evidence of
a widespread deployment of such use, and there is therefore still time
to come up with a better solution that does not overload the meaning
of RRTYPEs before we have widespread use of IPv6 mail
infrastructure.  Therefore, in our opinion, extending the current
practice to IPv6 hosts is not a good idea.  The current draft makes
the best of a bad principle, but it should recommend an alternative
approach as preferable.  

One simple solution would be to introduce one or, better, two new
RRTYPE(s) that work(s) exactly the same way as the A RRTYPE, so that
deployed software would need to be modified only to query for the new
RRTYPE instead of an A record.  We appreciate that a long, or maybe
indefinite, transition period would be needed.  Presumably, however,
the widespread introduction of IPv6 in the mail infrastructure of
organisations will occasion the installation of new software as well.

Best regards,

Olafur Gudmundsson 
[EMAIL PROTECTED]

Andrew Sullivan
[EMAIL PROTECTED]
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: IPv6 traffic stats (was: Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists))

2008-11-11 Thread Joe St Sauver
David mentioned:

#For the record: 
#
#It seems that arbornetworks estimates are extremely low to the point
#where one has to ask whether there were other issues that caused such
#a low estimate.
#
#There is no question that IPv6 traffic is quite low in the Internet.
#However, many other reports that I have seen recently measure multiple
#orders of magnitude more IPv6 traffic (for an easily accesible example
#see: http://www.ams-ix.net/technical/stats/sflow/)

The Ether Type graph on the AMS-IX page indicates that IPv6 is on average 
1/10th of 1% all the traffic they measure, and looking at the associated 
RRDtool graphs, that works out to be ~800Mbits/second.

A sustained ~800 Mbits/second is certainly nothing to sneeze at, and
everyone who has worked hard to encourage IPv6 deployment deserves many
kudos. Progress is happening!

On the other hand, just to put this in context and to pick on an 
application I'm somewhat familiar with, a single full-ish Usenet news 
feed is now in excess of 3TByte/day (see the daily volume stats quoted 
at http://en.wikipedia.org/wiki/Usenet ). Just two or three full-ish
Usenet News feeds over IPv6, if done across AMS-IX, would account 
for most of that 800Mbps traffic load (assuming that Usenet is what
was making up most of that traffic, an assertion that I'm explictly
NOT making). My point? It is possible that the IP transport choices
of just a few cooperating server administrators might (at least
hypothetically) account for virtually all the observed growth in 
AMS-IX IPv6 traffic. 

As to why the AMS-IX number might differ from Arbor's statistic, we 
know that traffic at exchange points may have a dramatically different 
composition than traffic measured elsewhere, due in part to the 
economics of that environment. 

E.g., continuing to pick on poor old Usenet, people may be willing to 
exchange Usenet feeds across a settlement-free peering point while 
they might NOT be willing to exchange Usenet feeds that required 
(comparatively expensive) transit bandwidth. Those sort of economic 
choices mean that it is risky to extrapolate Internet-wide traffic 
statistics from the somewhat atypical settlement-free peering 
environment.

But what sort of growth pattern do we actually see at 
http://www.ams-ix.net/technical/stats/sflow/ ?

That graph *isn't* growing in the characteristic "stair step" pattern 
one might expect if you were to suddenly flopping full news feeds over 
onto IPv6. The growth we see there is much more consistent with what you 
might find from growth in end user traffic (which could be dominated by 
web, or P2P, or flash videos or scientists ftp'ing large data sets, or
yes, even email, who knows, since there's no way to definitively know 
w/o doing deep packet inspection, which I doubt would be possible in 
this case). 

So to bring this post to a close, I continue to believe that IPv6
traffic, at least IPv6 email traffic, remains very, very low, to 
the point where, as I've previous mentioned, it just hasn't justified
DNS block list operator attention in any material way (love to hear
about any counter examples, BTW).

Regards,

Joe St Sauver ([EMAIL PROTECTED])
http://www.uoregon.edu/~joe/
Disclaimer: all opinions strictly my own. 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-11 Thread SM

At 11:50 10-11-2008, der Mouse wrote:

What the IETF _does_ have a chance to do here is to improve the quality
of a critical piece of Internet infrastructure (email without DNSLs in
today's net is either unusable or very heavily balkanized) by
standardizing those aspects that are in shape to be standardized.  The
IETF says "rough consensus and running code".  We have the running
code.  We even have something close to rough consensus in the field, in
the form of the many DNSL providers and users; I hope the IETF can
recognize that consensus and echo it enough to do what it can to help.


As this document is Standard Track, it's in the IETF 
stream.  Documents on the Standard track require IETF review and the 
consensus of the IETF community.  It's not the same as rough 
consensus in the field.


Quoting the document:

  "This document represents the consensus of the Anti-Spam Research
   Group of the Internet Research Task Force."

If this document is published in its current form, I suggest removing 
the IRTF Notice.


There is a large user-base for DNSBLs as it's viewed as a cheap 
(resource-wise) way to stop spam.  Most MTAs have built-in features 
to query DNSBLs and reject incoming SMTP connections if the IP 
address is listed.  Some vendors enable DNSBLs in the default 
configuration of the MTA they ship.  This has lead to problems over 
the years as some DNSBLs were receiving queries even after they were 
shut down.  Some of them resorted to returning positive responses for 
all queries get the attention of the mail administrator as it caused 
all mail to be rejected.  The document recommends that:


  "DNSxL clients SHOULD periodically check appropriate test entries to ensure
  that the DNSxLs they are using are still operating."

That would require a change, for the better, in the implementation of 
DNSBLs in MTAs.  I would go further and suggest that DNSxL clients 
should rate limit their queries if the test address does not exist 
and must not generate queries to the DNSxL if the test is 
unsuccessful after a period of time.


In Section 6:

  "A client MUST interpret any returned A record as meaning that an
   address or domain is listed in a DNSxL."

There have been cases where a mail server used a DNS server which 
returned an A record instead of NXDOMAIN.  That can lead to incorrect 
results if the above recommendation is followed.  It may be better 
for the client to validate the returned A record for correctness.


The Security Considerations could have been more exhaustive for a 
Standard Track document.  For example, if the DNSxLs are 
unresponsive, it can affect mail delivery.  DNSBLs are 
somewhat  different from other DNS based services due to their 
controversial role.  They are generally subject to Denial of Service 
and it is worth the emphasis instead of only having a pointer to RFC 3833.


  "Since DNSxL users usually make a query for every incoming e-mail
   message, the operator of a DNSxL can extract approximate mail volume
   statistics from the DNS server logs."

Operators of some types of DNSxLs might also be able to extract some 
information about the senders.


As mentioned in the document, name-based DNSBLs are also used to 
check the domains found in URLs in message bodies.  That can lead to 
unintended information disclosure.


Regards,
-sm 


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-11 Thread Keith Moore
Chris Lewis wrote:
> Tony Finch wrote:
> 
>> Note that anti-spam blacklists are distributed by more mechanisms than
>> just the DNS. Questions of listing policy apply whatever protocol is
>> used, so they shouldn't be addressed in a document that just describes
>> a DNS-based query protocol.
> 
> I have a similar objection the proposal of a WG for "reputation lists".
> 
> The problem it seems intended to solve is far broader than reputation
> lists, and is completely orthogonal to a reputation delivery protocol
> standard. [...]

Assuming IESG is interested in chartering some WG in this space, it's
reasonable to have a discussion about the appropriate scope of said WG.

But I don't buy the "content is independent of the container" arguments.
 In my experience, containers (or protocols, or data representations)
nearly always have implied semantics.  Even if this isn't intentional,
or even if the intention is for them to be free of semantics, they tend
to have them in practice, and the semantics tend to be encouraged or
enforced by the kinds of tools that were built to deal with those
containers.

There is also a strong tendency to tailor the data model to make it fit
the container.  So chances are good that (for example) a data model
designed for use with XML would not fit handily into another
representation such as email-style headers or DNS resource records.
This is part of why I don't assume that DNS is a good way to transmit
reputation information.  I feel confident that a less constrained
protocol would facilitate a better data model.

Keith
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-11 Thread Chris Lewis
Tony Finch wrote:

> Note that anti-spam blacklists are distributed by more mechanisms than
> just the DNS. Questions of listing policy apply whatever protocol is
> used, so they shouldn't be addressed in a document that just describes
> a DNS-based query protocol.

I have a similar objection the proposal of a WG for "reputation lists".

The problem it seems intended to solve is far broader than reputation
lists, and is completely orthogonal to a reputation delivery protocol
standard.

The problems that people ascribe to reputation mechanisms are just as
severe in virtually every other type of filtering method.  Poorly chosen
or implemented content filtering systems have exactly the same problems
as poorly chosen or implemented DNSBLs, and have the same implications
for "reliability of email".  These are SMTP filter signaling protocol
issues, and have nothing to do with filtering engine decision mechanisms.

The real issue underlying this is standards and practises on how the
decision making is implemented _at_ the filter itself.  In other words,
we need generalized principles of practise how filtering should be
signaled through SMTP to enhance reliability, repeatability, and and the
ability to identify/resolve problems.

I've long been considering the draft of a BCP on how filters should
operate.  And have written bits and pieces of it in point form.  Eg:
rejects not bounces, SMTP codes, error texts, C/R, SAV, remediation
channels etc.  That doesn't belong in a DNSBL protocol specification. It
would be entirely missed in a WG about "reputation".  It's covered, in
part, in the still-draft DNSBL BCP, insofar as they directly relate to
details specific to DNSBLs.

If a WG were chartered to explore ways to improve filter
reliability/interoperability, eg: standardizing filter response
mechanisms, I'd participate in that.  But that has nothing whatsoever to
do with DNSBL protocols - which is nothing more then a delivery
mechanism for certain classes of information, the interpretation thereof
the choice of who implements whatever uses it.  [I use DNSBL protocols
for far more than filtering decisions.  It works really well to resolve
IP addresses into ASNs, allocation ranges, ownership and geolocation
information for example.]
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


IPv6 traffic stats (was: Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists))

2008-11-11 Thread David Kessens

Joe,

On Tue, Nov 11, 2008 at 08:20:11AM -0800, Joe St Sauver wrote:
> 
> I'm not aware of DNS block lists which cover IPv6 address spaces at
> this time, probably in part because IPv6 traffic remains de minimis 
> (see http://asert.arbornetworks.com/2008/8/the-end-is-near-but-is-ipv6/
> showing IPv6 traffic as constituting only 0.002% of all Internet traffic).

For the record: 

It seems that arbornetworks estimates are extremely low to the point
where one has to ask whether there were other issues that caused such
a low estimate.

There is no question that IPv6 traffic is quite low in the Internet.
However, many other reports that I have seen recently measure multiple
orders of magnitude more IPv6 traffic (for an easily accesible example
see: http://www.ams-ix.net/technical/stats/sflow/)

David Kessens
---
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-11 Thread der Mouse
 The fact that [DNSBLs] are widely used is sad, not a justification
 for standardization.
>> True.  The justification is not simply that they are widely used; it
>> is that they are widely used, they are often done wrong, they are of
>> tremendous value when done right, and of actively negative value
>> when done wrong.
> I agree that this might be a justification for standardizing some
> sort of reputation protocol.  But it's not at all clear the document
> at hand describes [...]

Perhaps.  But this is not a place where the IETF gets to choose what
will be used.  DNSLs are in live use, have been for years, and will
continue to be; the IETF can jump up and down all it wants, but that
isn't going to change - the question is whether people will use DNSLs
with an IETF standard or without one, not whether people will use
DNSBLs or something else the IETF likes more.  (In principle it's
possible people might switch to something better.  But I sure don't see
any such "something better" even on the horizon, much less in even
experimental use - and even if one appears, the adoption time is going
to be measured in years.  DNSLs will be here for a long time to come.)

What the IETF _does_ have a chance to do here is to improve the quality
of a critical piece of Internet infrastructure (email without DNSLs in
today's net is either unusable or very heavily balkanized) by
standardizing those aspects that are in shape to be standardized.  The
IETF says "rough consensus and running code".  We have the running
code.  We even have something close to rough consensus in the field, in
the form of the many DNSL providers and users; I hope the IETF can
recognize that consensus and echo it enough to do what it can to help.

/~\ The ASCII Mouse
\ / Ribbon Campaign
 X  Against HTML[EMAIL PROTECTED]
/ \ Email!   7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-11 Thread Tony Finch
On Tue, 11 Nov 2008, Theodore Tso wrote:
>
> Questions like, "so how does this work in the face of the expanded
> IPv6 address space", ideally should be addressed earlier during the
> standardization process, and not in last call (where, "oh well, we'll
> just block the whole /48 or /32" might have unfortunate side effects
> not forseen yet)

That's a matter of listing policy not of protocol. It would be premature
to lay down regulations about what can be put in an IPv6 blacklist, since
we don't have enough operational experience yet. If you try to guess and
the rules turn out not to work in practice, then they will be ignored and
cast doubt on the rest of the document.

This document should concentrate on the mechanisms, which are simple and
uncontroversial, and leave questions of policy aside.

Note that anti-spam blacklists are distributed by more mechanisms than
just the DNS. Questions of listing policy apply whatever protocol is
used, so they shouldn't be addressed in a document that just describes
a DNS-based query protocol.

> --- but which don't make sense if the goal is to document existing
> practice.

The goal is to document existing practice AND extend it in a straight-
forward way to IPv6 so that implementations are ready BEFORE IPv6 spam
becomes a problem.

Tony.
-- 
f.anthony.n.finch  <[EMAIL PROTECTED]>  http://dotat.at/
VIKING NORTH UTSIRE SOUTH UTSIRE: SOUTHEASTERLY BACKING NORTHWESTERLY 5 TO 7.
ROUGH OR VERY ROUGH DECREASING MODERATE OR ROUGH. RAIN OR SHOWERS. MODERATE OR
GOOD.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-11 Thread Jamie Tomasello
There has been some debate in this forum on whether DNSxLs are an appropriate 
tools for stopping spam. Whether or not IP-based blocking is a philosophically 
appropriate method to use, every large scale ISP uses these lists as a first 
line defense against spam. DNSxLs are a much-used and effective tool in 
preventing the delivery of spam to the inbox and should be standardized to 
reduce the cost of implementation of anti-spam measures. The draft outlines the 
structure and functionality of DNSxLs, but does not dictate or require the use 
of them. Moreover, it is not the role of this draft to outline the policies for 
DNSxL listings and procedures for list management.

We at Cloudmark support draft-irtf-asrg-dnsbl-07 on the Standards Track and 
believe that standardization of DNSxL queries and response codes eliminates 
confusion, eases tool writing, aids email administrators, and reduces 
everyone's mail infrastructure operating cost.

---
Jamie Tomasello
Abuse Operations Manager
Cloudmark, Inc.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-11 Thread Joe St Sauver
Theodore mentioned:

#Let me get this straight.  It's OK to block e-mail messages on the
#basis of unauthenticated rumors, 

Most DNS block lists are based on empirical factors, not rumors.

For example, in the case of manual anti-spam block lists, like the
Spamhaus SBL, typically listings include spam samples, although other 
block lists may use different empirical criteria (for example, the 
Day Old Bread list looks at the age of domain names in determining 
its coverage). Other lists may identify hosts from dynamic IP address
ranges, etc.

#but now you are complaining that it's somehow dirty pool to block 
#a standard based on the same thing?  

Block lists aren't going to go away if this standard isn't 
published; block lists have broad community acceptance in and of 
their own right.

On the other hand, without standards, block lists may be run in ways 
that will primarily disadvantage those who end up blocked by them.

Standards for block lists provide a basis for evaluating block
list operational practices, and a standard against which poorly
run block lists can (and should!) rightfully be pilloried.

As such, I think it is unfortunate that some have elected to oppose
this draft.

#Questions like, "so how does this work in the face of the expanded
#IPv6 address space", ideally should be addressed earlier during the
#standardization process, and not in last call (where, "oh well, we'll
#just block the whole /48 or /32" might have unfortunate side effects
#not forseen yet) --- but which don't make sense if the goal is to
#document existing practice.

I'm not aware of DNS block lists which cover IPv6 address spaces at
this time, probably in part because IPv6 traffic remains de minimis 
(see http://asert.arbornetworks.com/2008/8/the-end-is-near-but-is-ipv6/
showing IPv6 traffic as constituting only 0.002% of all Internet traffic).

#There's a big difference between "use" and "Use".  If a spamassassin
#configuration (by default) uses a DNSBL to add a point or a fraction
#of a point to a spam score, where it might take a spam score of 10-15
#before spam is dropped, that's a very different usage model than
#someone who, on the unsubstatiated word of SORBS or APEWS, drops the
#e-mail on the floor where it is never seen again.

Distinguish two types of spam filtering:

-- filtering at connect time, where a message that doesn't get accepted
   for delivery can signal that rejection to the system that's
   *still connected* to the rejecting MTA

-- filtering post connect time, as with SpamAssassin, where a message 
   that ends up scored as spam may (at best) end up filed in a spam 
   folder

DNS block lists can be used in either model, but they work best for
filtering at connect time because in that model, the delivering host
knows that a message has been accepted or rejected.

Post connect time filtering means that a message which has apparently
been accepted for delivery may never be seen (e.g., if it has been
spam foldered or deleted).

That critical difference is one reason why DNS blocks lists, used at
connect time, are vastly preferable to other non-deterministic
approaches, although things like SpamAssassin (particularly with 
SURBL rules) unquestionably play a crucial role in stopping some types 
of spam that can't be addressed by connect time DNS block lists. 

But let me just mention one other pragmatic reason why I believe DNS 
block lists used at connect time are preferable to some other 
alternatives, such as site-by-site local anti-spam rules. 

Consider a sending site that may have a temporary spam problem, perhaps 
due to a compromised user account, or an accidental system 
misconfiguration. Having emitted spam, that site ends up being blocked. 

If it is blocked by one (or two, or some small number ) DNS block 
lists, after that site has fixed its problem, there's one (or two, 
or some small ) places they need to go to get unblocked. Moreover,
DNS block list operators typically do a nice job of explaining how
to get in touch with them, and what sort of process is involved in
getting delisted. 

On the other hand, if thousands or tens of thousands of sites employ 
unannounced local blocks to deal with that temporary spam problem, you 
may be trying for months (if not years!) to get all those private 
site-by-site blocks removed.

#And for those who would argue that it's not their problem how the
#DNSBL is used, since after all that's the responsibility of the folks
#using the DNSBL, 

DNS block listings are the DNS block list operator's expression of an 
opinion about a site's email traffic. Just like a food critic's 
opinion about a restaurant, people can choose to pay attention to
that critic's opinions, or not.

If the critic likes undercooked tainted and bland food poorly presented 
by surly wait staff, and that aligns well with your dining preferences, 
by all means follow that critic's reviews. Most diners, however, with 
more conventional preferences, will quickly learn to discount or

Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-11 Thread Lisa Dusseault
I'm the sponsor of the DNSBL Internet-Draft.  I've been following this
discussion and it seems to me there have been fair objections raised
to putting the document as-is on the Standards Track.  I'll consult with
the authors about whether they'd like to figure out exactly what the IETF
does have consensus to recommend and change the document, or
whether Informational would make everybody happy.

thanks!
Lisa
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-11 Thread Steve Linford

On 11 Nov 2008, at 15:38, Theodore Tso wrote:


On Mon, Nov 10, 2008 at 05:12:56PM +, Steve Linford wrote:
I certainly agree that there are hundreds of small DNSBLs run from  
kid's
bedrooms which list on incomprehensible wildly over-broad policies  
and
that such DNSBLs are both antagonistic and useless and as a result  
are
used by almost nobody - that's 'market force'. But to pretend that  
the

dozen major DNSBLs make listings based on "unauthenticated rumor" or
"because the IP did not have 'mail.' or 'mx.'" is just silly mud- 
slinging
itself based on equally "unauthenticated rumor" and is especially  
odd if

it's coming from within IETF itself.


Let me get this straight.


Yes please...


It's OK to block e-mail messages on the
basis of unauthenticated rumors


No.

  Steve Linford
  The Spamhaus Project
  http://www.spamhaus.org


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-11 Thread michael.dillon

> there's a lot of evil e-mail messages out there; the cost of 
> letting even one of those messages through is unacceptable, 
> so false positives are OK. 

This is precisely the sort of thing that should have been 
covered in much more detail in the Security Considerations
section of the draft.

> I have no problem with the IETF documenting the world as it exists.
> That's what an informational track RFC does.  

> (where, "oh well, we'll just block the whole /48 or /32" 
> might have unfortunate side effects not forseen yet)

Again, this is missing from the Security Considerations.

--Michael Dillon
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-11 Thread Theodore Tso
On Mon, Nov 10, 2008 at 05:12:56PM +, Steve Linford wrote:
> I certainly agree that there are hundreds of small DNSBLs run from kid's 
> bedrooms which list on incomprehensible wildly over-broad policies and 
> that such DNSBLs are both antagonistic and useless and as a result are 
> used by almost nobody - that's 'market force'. But to pretend that the 
> dozen major DNSBLs make listings based on "unauthenticated rumor" or 
> "because the IP did not have 'mail.' or 'mx.'" is just silly mud-slinging 
> itself based on equally "unauthenticated rumor" and is especially odd if 
> it's coming from within IETF itself.

Let me get this straight.  It's OK to block e-mail messages on the
basis of unauthenticated rumors, but now you are complaining that it's
somehow dirty pool to block a standard based on the same thing?  After
all, it's the same argument; there's a lot of evil e-mail messages out
there; the cost of letting even one of those messages through is
unacceptable, so false positives are OK.  Similarly, there are a lot
of bad ideas out there, many of which have folks clamoring to have
them be standardized, just as spammers hope to get people to visit
their spamvertised web sites.  And in both cases, it's "just
business"

I have no problem with the IETF documenting the world as it exists.
That's what an informational track RFC does.  There's a process by
which a specification gets annointed to become a standard, and others
more eloquent than I have already pointed out the dangers of trying to
skip steps in the standardization process.

Questions like, "so how does this work in the face of the expanded
IPv6 address space", ideally should be addressed earlier during the
standardization process, and not in last call (where, "oh well, we'll
just block the whole /48 or /32" might have unfortunate side effects
not forseen yet) --- but which don't make sense if the goal is to
document existing practice.

> The fact some DNSBLs are in widespread use (I can speak only for  
> Spamhaus, our DNSBLs are today used by something in the region of 2/3 of 
> internet networks) is good reason why it's important to publish a  
> standard and format for the technology.

There's a big difference between "use" and "Use".  If a spamassassin
configuration (by default) uses a DNSBL to add a point or a fraction
of a point to a spam score, where it might take a spam score of 10-15
before spam is dropped, that's a very different usage model than
someone who, on the unsubstatiated word of SORBS or APEWS, drops the
e-mail on the floor where it is never seen again.

And for those who would argue that it's not their problem how the
DNSBL is used, since after all that's the responsibility of the folks
using the DNSBL, I'm reminded of the line from the Tom Lehrer song:

"Vonce the rockets go up, 
 who cares vhere
 they come down?
 It's not my department,
 says Verner von Brown."


- Ted
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-11 Thread Tim Chown
On Mon, Nov 10, 2008 at 07:04:27PM +, Tony Finch wrote:
> On Mon, 10 Nov 2008, Keith Moore wrote:
> >
> > okay.  I found myself wondering if the change in address space size, and
> > in granularity of assignment, might make DNSBLs less reliable.  Which is
> > a different kind of scalability.
> 
> IPv6's bigger address space affects more security mechanisms than just
> DNSBLs, such as defensive port scanning, traffic auditing, etc.
> 
> http://www.watersprings.org/pub/id/draft-chown-v6ops-port-scanning-implications-02.txt

Thanks Tony - that draft has now emerged as RFC5157:

http://www.ietf.org/rfc/rfc5157.txt

The granularity of the address space that might appear in a blacklist is
an interesting question.   I would guess that where today a single IPv4
address appears, a whole IPv6 /64 would be required, at least, since a
client on a IPv6 link could in principle use any of the 2^64 available
host addresses.But it may be worse, if whole /48's are assigned to 
DSL users for example (although there seems to be pushback to /56 for SOHO
type networks).The question then is whether the single IPv6 address
or link it is on is blacklisted, or whether the blacklist includes the
'default' site prefix size.

On a related tack, I've been gathering stats on our recorded IPv6 transport 
mail volumes and identified spam since Dublin, and will analyse these soon 
and pop out a draft with appropriate observations.We've seen a fairly
consistent figure of 50% of our IPv6 transport connections being classified
as spam by our MailScanner system since Dublin.

Tim
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-10 Thread Tony Finch
On Mon, 10 Nov 2008, Keith Moore wrote:
>
> okay.  I found myself wondering if the change in address space size, and
> in granularity of assignment, might make DNSBLs less reliable.  Which is
> a different kind of scalability.

IPv6's bigger address space affects more security mechanisms than just
DNSBLs, such as defensive port scanning, traffic auditing, etc.

http://www.watersprings.org/pub/id/draft-chown-v6ops-port-scanning-implications-02.txt

Tony.
-- 
f.anthony.n.finch  <[EMAIL PROTECTED]>  http://dotat.at/
WIGHT PORTLAND PLYMOUTH: SOUTHWEST VEERING WEST 6 TO GALE 8. ROUGH OR VERY
ROUGH. RAIN THEN SQUALLY SHOWERS. MODERATE OR GOOD, OCCASIONALLY POOR AT
FIRST.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-10 Thread Keith Moore
Tony Finch wrote:
> On Mon, 10 Nov 2008, Keith Moore wrote:
>> Tony Finch wrote:
>>
>>> In any case, DNSBLs should scale roughly according to the size of the
>>> routing table, not the size of the address space.
>> What does it mean for a DNSBL to "scale"?
> 
> I was referring to the number of entries that have to be maintained.

okay.  I found myself wondering if the change in address space size, and
in granularity of assignment, might make DNSBLs less reliable.  Which is
a different kind of scalability.

Keith

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-10 Thread Tony Finch
On Mon, 10 Nov 2008, Keith Moore wrote:
> Tony Finch wrote:
>
> > In any case, DNSBLs should scale roughly according to the size of the
> > routing table, not the size of the address space.
>
> What does it mean for a DNSBL to "scale"?

I was referring to the number of entries that have to be maintained.

Tony.
-- 
f.anthony.n.finch  <[EMAIL PROTECTED]>  http://dotat.at/
MALIN HEBRIDES: CYCLONIC BECOMING NORTHWEST 7 TO SEVERE GALE 9. VERY ROUGH OR
HIGH. SQUALLY SHOWERS. MODERATE OR POOR.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-10 Thread Keith Moore
Tony Finch wrote:
> On Mon, 10 Nov 2008, Keith Moore wrote:
>> I suspect it will be very difficult to make IPv6 DNSxLs work anywhere
>> nearly as well as IPv4 DNSxLs, because in IPv6 it is fairly easy to use
>> a different address for every SMTP conversation.
> 
> I expect that attack will make /48 or /64 listings common. This has the
> obvious downside of an increased risk of one infected host spoiling email
> connectivity for its immediate neighbours, even more than is already the
> case for IPv4 DNSBLs. Perhaps ISPs and hosting providers can mitigate that
> by enforcing address allocation policies.

Or perhaps enterprise networks will be forced to outsource their mail
submission to third parties with supposedly "trustworthy" addresses.
Which IMHO would not be a desirable result.

> In any case, DNSBLs should scale roughly according to the size of the
> routing table, not the size of the address space.

What does it mean for a DNSBL to "scale"?

Keith
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-10 Thread Tony Finch
On Mon, 10 Nov 2008, Keith Moore wrote:
>
> I suspect it will be very difficult to make IPv6 DNSxLs work anywhere
> nearly as well as IPv4 DNSxLs, because in IPv6 it is fairly easy to use
> a different address for every SMTP conversation.

I expect that attack will make /48 or /64 listings common. This has the
obvious downside of an increased risk of one infected host spoiling email
connectivity for its immediate neighbours, even more than is already the
case for IPv4 DNSBLs. Perhaps ISPs and hosting providers can mitigate that
by enforcing address allocation policies.

In any case, DNSBLs should scale roughly according to the size of the
routing table, not the size of the address space.

Tony.
-- 
f.anthony.n.finch  <[EMAIL PROTECTED]>  http://dotat.at/
FISHER: SOUTHWEST 6 TO GALE 8 BACKING SOUTH 5 OR 6. VERY ROUGH BECOMING
MODERATE OR ROUGH. SHOWERS. MODERATE OR GOOD.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-10 Thread Keith Moore
der Mouse wrote:
> [Keith Moore]
>>> The fact that [DNSBLs] are widely used is sad, not a justification
>>> for standardization.
> 
> True.  The justification is not simply that they are widely used; it is
> that they are widely used, they are often done wrong, they are of
> tremendous value when done right, and of actively negative value when
> done wrong.

I agree that this might be a justification for standardizing some sort
of reputation protocol.  But it's not at all clear the document at hand
describes a protocol which is technically sound, and it certainly
doesn't have rough IETF consensus.  I'm willing to defer judgment about
whether such a protocol might reasonably resemble DNSxL, or whether it
can reasonably use DNS at all - but I have reason to doubt it.

Keith
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-10 Thread Keith Moore
Steve Linford wrote:

> I certainly agree that there are hundreds of small DNSBLs run from kid's
> bedrooms which list on incomprehensible wildly over-broad policies and
> that such DNSBLs are both antagonistic and useless and as a result are
> used by almost nobody - that's 'market force'. But to pretend that the
> dozen major DNSBLs make listings based on "unauthenticated rumor" or
> "because the IP did not have 'mail.' or 'mx.'" is just silly
> mud-slinging itself based on equally "unauthenticated rumor" and is
> especially odd if it's coming from within IETF itself.

It's only odd if you refuse to recognize our experiences as valid.

> The fact some DNSBLs are in widespread use (I can speak only for
> Spamhaus, our DNSBLs are today used by something in the region of 2/3 of
> internet networks) is good reason why it's important to publish a
> standard and format for the technology.

Wrong.  Read RFC 2026 and stop demanding that we change our technical
criteria just for you.

> Like everyone we'd like to see poorly managed, arrogant or anonymous
> DNSBLs given a high standard to attain ('shape up or ship out'), since
> an irresponsible DNSBL listing something for little discernible reason
> is what creates "I hate all DNSBLs" poster children. Lets have the
> technology, standards and how to do it correctly published for the
> future and leave aside silly "I once had a client blacklisted"
> arguments. The question "are DNSBLs bad for the world" or "are DNS
> queries a bad use" is irrelevant to the need for draft-irtf-asrg-dnsbl
> and a false argument against it.
> 
> I can see no legitimate reason for IETF not publishing
> draft-irtf-asrg-dnsbl.

The proposal has neither technical soundness nor rough consensus of the
community.

Keith
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-10 Thread der Mouse
[Keith Moore]
>> The fact that [DNSBLs] are widely used is sad, not a justification
>> for standardization.

True.  The justification is not simply that they are widely used; it is
that they are widely used, they are often done wrong, they are of
tremendous value when done right, and of actively negative value when
done wrong.

[John C Klensin]
> Sadly, I have to agree with Keith.   While these lists are a fact of
> life today, and I would favor an informational document or document
> that simply describes how they work and the issues they raise,
> standardizing them and formally recommending their use is not
> desirable at least without some major changes in our email model and
> standards for what gets addresses onto --and, more important, off
> of-- those lists.

And this, I mostly disagree with.

Just because something is something we'd rather not have around does
not mean standardizing it is a bad idea.  SSH is an example; I would
much rather the net were still the open, friendly place it was back in
the ARPAnet and NSFnet days, where SSH was unnecessary.  But that's no
longer today's net, and SSH or something like it is necessary; I think
standardizing it is a Good Thing (indeed, a necessary thing in the case
of SSH).

Similarly, I too find DNSBLs' necessity regrettable.  But I do find
them necessary, and I think we're better off standardizing those
aspects that are currently agreed-upon enough to standardize.

I do not think that standards for how addresses get onto and off of
DNSBLs is even desirable.  As long as the list is technically well-run
and adheres to what it tells its users its (de)listing policies are,
exactly what those policies are is entirely up to the list; a wide
variety of policies is good because there is an equally wide variety of
receiving sites' desires - and because the price to the net of a DNSL
nobody uses is so close to zero as no matter, so there's no harm in
having a wide variety available to pick from.

And that "technically well-run" is the part that I think not only can
be standardized but should be standardized.

Not that my opinion counts for all _that_ much, since I'm not the one
doing the work.  But it's not total randomness; email operations and
administration has been part of my paid job for some 18 of the last 25
years, and I was on the CAUCE Canada board before we merged with CAUCE
USA.  (I think I'm actually still technically on CAUCE North America
board, but I've been trying to get out of abuse-fighting for a year or
two now).

/~\ The ASCII Mouse
\ / Ribbon Campaign
 X  Against HTML[EMAIL PROTECTED]
/ \ Email!   7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-10 Thread Tony Finch
On Sun, 9 Nov 2008, Tony Hansen wrote:
>
> Does anyone have issues with the use of this protocol for WHITE lists?

DNSWLs already exist and are used by e.g. SpamAssassin.

Tony.
-- 
f.anthony.n.finch  <[EMAIL PROTECTED]>  http://dotat.at/
TYNE DOGGER FISHER: SOUTHWEST 6 TO GALE 8, BACKING SOUTH 5 OR 6 IN FISHER.
ROUGH OR VERY ROUGH, OCCASIONALLY MODERATE LATER. SHOWERS. MODERATE OR GOOD.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-10 Thread Steve Linford
I'm coming in a bit late into this strange argument, but from what  
I'm reading it sounds like someone *from IETF* is contesting the need  
for DNSBLs and thus the need for draft-irtf-asrg-dnsbl and on grounds  
which are misguided at best.


I certainly agree that there are hundreds of small DNSBLs run from  
kid's bedrooms which list on incomprehensible wildly over-broad  
policies and that such DNSBLs are both antagonistic and useless and  
as a result are used by almost nobody - that's 'market force'. But to  
pretend that the dozen major DNSBLs make listings based on  
"unauthenticated rumor" or "because the IP did not have 'mail.' or  
'mx.'" is just silly mud-slinging itself based on equally  
"unauthenticated rumor" and is especially odd if it's coming from  
within IETF itself.


The fact some DNSBLs are in widespread use (I can speak only for  
Spamhaus, our DNSBLs are today used by something in the region of 2/3  
of internet networks) is good reason why it's important to publish a  
standard and format for the technology.


Like everyone we'd like to see poorly managed, arrogant or anonymous  
DNSBLs given a high standard to attain ('shape up or ship out'),  
since an irresponsible DNSBL listing something for little discernible  
reason is what creates "I hate all DNSBLs" poster children. Lets have  
the technology, standards and how to do it correctly published for  
the future and leave aside silly "I once had a client blacklisted"  
arguments. The question "are DNSBLs bad for the world" or "are DNS  
queries a bad use" is irrelevant to the need for draft-irtf-asrg- 
dnsbl and a false argument against it.


I can see no legitimate reason for IETF not publishing draft-irtf- 
asrg-dnsbl.


  Steve Linford
  The Spamhaus Project
  http://www.spamhaus.org




___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-10 Thread Dave CROCKER



Steven M. Bellovin wrote:

My concern is centralization of power.  If used properly, white lists
are fine.  If used improperly, they're a way to form an email cartel,
forcing organizations to buy email transit from a member of the inner
circle.



Steve,

Email reputation lists have been around for a very long time.  The current 
specification codifies this existing practice.  So we have plenty of track 
record to test your concern.


Perhaps you know of some pattern that validates that concern, but I don't.

Such services have always been easy to set up and, indeed, there is a wide range 
of reputation services. (Positive reputation services are more recent so there 
is a smaller set to evaluate... so far.)


A standard reduces switching costs, so that consumers of reputation data are not 
locked in to their current reputation provider.


Hence, standardizing the details for obtaining reputation data -- postivie or 
negative -- ought to mitigate against centralization.


d/
--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-10 Thread Keith Moore
John Levine wrote:

> As I said a few messages up in this string, although the structure of
> IPv4 DNSxLs has long since been cast in concrete, IPv6 DNSxLs aren't
> that mature yet and one of my goals was to make them interoperate
> equally well so, for example, if you find you're using cruddy ones you
> can easily switch to better ones.

I suspect it will be very difficult to make IPv6 DNSxLs work anywhere
nearly as well as IPv4 DNSxLs, because in IPv6 it is fairly easy to use
a different address for every SMTP conversation.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-10 Thread Livingood, Jason
> -Original Message-
> From: Keith Moore [mailto:[EMAIL PROTECTED] 
>
> > Keith - I encourage you to consult with several very large 
> scale email domains around the world to see if they think 
> that DNSxBLs are useful, effective, and in widespread use or not.
> 
> Jason - I encourage you to consult with users whose mail 
> isn't getting delivered, and see whether they think DNSBLs 
> are useful and effective, or whether their mail is 
> effectively being bounced by third parties who aren't 
> accountable for their actions.

The buck ultimately stops with any mail admin (or user of any particular
technology), not the DNSxLs and any other filtering tools they may
choose to employ.  As for consulting with users, you will find me (and
my team) posting (and reading of course) almost daily on the Comcast
section of BroadbandReports and our customer support forum's email
section (http://forums.comcast.net).  I could give you countless other
examples of how I am my team works with senders and customers, and works
to increase our transparency (such as http://postmaster.comcast.net). I
work hard to be in touch with customers, and consider it a centrally
important part of my job to understand how my team's use of technology
affects our customers and other users on the Internet.  Also, I am sure
you would not be surprised to know there is a correlation betewen spam
effectiveness and user satisfaction with email.  Yes, there are always
individual sender problems, but no matter the tool or technology you
always have exceptional use cases that must be worked through.

Regards
Jason
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-10 Thread John Levine
> That's a rather narrow view. Very large numbers of people think that
> Instant Messaging is a far superior alternative to DNSBLs, not to
> mention VoIP, web forums and other variations on the theme.

I can certainly believe that there are people who think that, but if
those very large numbers of people aren't even aware that IM, VoIP,
and web forums also use DNSBLs and DNSWLs to manage their abuse
problems, it's hard to see how their impressions would be helpful
here.

> I think it is a positive thing to document the technology of DNSBLs
> but I have no idea why this has come to the IETF.

As I said a few messages up in this string, although the structure of
IPv4 DNSxLs has long since been cast in concrete, IPv6 DNSxLs aren't
that mature yet and one of my goals was to make them interoperate
equally well so, for example, if you find you're using cruddy ones you
can easily switch to better ones.

R's,
John
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-09 Thread Matthias Leisi

Steven M. Bellovin schrieb:

> In some sense, I have more trouble with white lists than black lists.  
> 
> My concern is centralization of power.  If used properly, white lists
> are fine.  If used improperly, they're a way to form an email cartel,
> forcing organizations to buy email transit from a member of the inner
> circle.

That is fundamentally true, and is the very reason dnswl.org is _not_
built around a business model, but as an all-volunteer organisation.

The "value" of such an organisation is the trust given by the users of
the whitelist data. Abuse of this trust would very fast be sanctioned by
not using the data any more.

However, this is independent from the technical specification of the
protocol, which I think is valuable. While this draft does not specify
the only protocol available to query our data, it is by far (in the high
90%-region) the most important one (either through queries to our public
servers or through local/private mirrors).

-- Matthias

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-09 Thread Chris Lewis
Steven M. Bellovin wrote:
> On Sun, 09 Nov 2008 23:40:43 -0500
> Tony Hansen <[EMAIL PROTECTED]> wrote:

> In some sense, I have more trouble with white lists than black lists.  
> 
> My concern is centralization of power.  If used properly, white lists
> are fine.  If used improperly, they're a way to form an email cartel,
> forcing organizations to buy email transit from a member of the inner
> circle.

Hi Steven, long time...

Sort of a protection racket.

This only works insofar as the mail receivers (the ones who choose to
deploy a whitelist) is willing to let them.  Receivers are driven, first
and foremost, by their users's complaint rates.

Receivers will notice increased complaint rates from a whitelist like
this, and begin to discount their input.  As they also do with FP rates
on the blacklists they use.  We see that now in take-up rates of various
DNSBL/DNSWLs.

Much as, say, people realized that TrustE logos didn't mean very much.

There's a much larger potential with proprietary reputation systems -
the buy-in costs are high, so it eventually becomes impossible for new
reputation vendors to get into the act, and receivers are reluctant to
switch vendors because they have to put yet another proprietary thingie
in their MTAs.

[A few years ago, at a MAAWG session, I caused a bit of slack-jawed
consternation when I strongly put forth the idea that reputation vendors
had to move to open protocols if they wanted acceptance at more than a
few of the very largest ISPs that could afford it.  I'm glad to report
that at least one or two have since seen the light.]

In an standard protocol environment, startup costs are minimal,
receivers find it very easy to switch or mix-and-match.

Same goes with negative reputation.

A standardized open protocol greatly reduces the likelyhood of cartelish
behaviour.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-09 Thread Steven M. Bellovin
On Sun, 09 Nov 2008 23:40:43 -0500
Tony Hansen <[EMAIL PROTECTED]> wrote:

> I'm personally very interested in getting the format for querying DNS
> *white* lists standardized. I want to be able to use DNSWLs as part of
> *positive reputation* checking: given an *authenticated* domain name
> (say, with DKIM), can we say something positive about them beyond
> "they send email"?
> 
> The protocol described in this draft covers both cases, both positive
> and negative checking.
> 
> While the majority of the examples in the document concentrates on
> negative examples, the protocol *is* useful for the positive case.
> 
> Does anyone have issues with the use of this protocol for WHITE lists?
> 
In some sense, I have more trouble with white lists than black lists.  

My concern is centralization of power.  If used properly, white lists
are fine.  If used improperly, they're a way to form an email cartel,
forcing organizations to buy email transit from a member of the inner
circle.


--Steve Bellovin, http://www.cs.columbia.edu/~smb
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-09 Thread Tony Hansen
I'm personally very interested in getting the format for querying DNS
*white* lists standardized. I want to be able to use DNSWLs as part of
*positive reputation* checking: given an *authenticated* domain name
(say, with DKIM), can we say something positive about them beyond "they
send email"?

The protocol described in this draft covers both cases, both positive
and negative checking.

While the majority of the examples in the document concentrates on
negative examples, the protocol *is* useful for the positive case.

Does anyone have issues with the use of this protocol for WHITE lists?

Tony Hansen
[EMAIL PROTECTED]

John C Klensin wrote:
> Sadly, I have to agree with Keith.   While these lists are a
> fact of life today, and I would favor an informational document
> or document that simply describes how they work and the issues
> they raise, standardizing them and formally recommending their
> use is not desirable at least without some major changes in our
> email model and standards for what gets addresses onto --and,
> more important, off of-- those lists.
> 
> john
> 
> 
> --On Friday, 07 November, 2008 18:38 -0500 Keith Moore
> <[EMAIL PROTECTED]> wrote:
> 
>> DNSBLs work to degrade the interoperability of email, to make
>> its delivery less reliable and system less accountable for
>> failures.  They do NOT meet the "no known technical omissions"
>> criterion required of standards-track documents.
>>
>> The fact that they are widely used is sad, not a justification
>> for standardization.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-09 Thread michael.dillon
> And what does this have to do with the technical details of 
> running and using one?  We all know that spam stinks and 
> DNSBLs stink, too.
> Unfortunately, the alternatives to DNSBLs are worse.

That's a rather narrow view. Very large numbers of people
think that Instant Messaging is a far superior alternative
to DNSBLs, not to mention VoIP, web forums and other variations
on the theme. Fortunately, the IETF has done some good work
in the area of SIP and XMPP has steadily been gaining traction.

I think it is a positive thing to document the technology
of DNSBLs but I have no idea why this has come to the IETF.
Maybe it is a veiled test of the IETF's relevance to the 
21st century Internet.

--Michael Dillon

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-09 Thread Keith Moore
Matthias Leisi wrote:
> [Disclosure: I am the leader of the dnswl.org project; I provided some
> input into the DNSxL draft as far as it concerns whitelists.]
> 
> Keith Moore schrieb:
> 
>> These incidents happen one at a time.  It's rarely worth suing over a
>> single dropped message, and yet the aggregate amount of harm done by IP
>> based reputation services is tremendous.
> 
> I would not want to reduce the situation to blacklists only. You use the
> correct term - IP based reputation services - but fail to mention that
> this includes whitelists, and that decisions other than "drop" can be
> made based upon data returned by such services.

I suspect DNSWLs have problems also, but I haven't tried to analyze the
problems with DNSWLs to the extent I have the problems with DNSBLs.

> Regarding the "dropped message": While outside the scope of the DNSxL
> draft, it is pretty much consensus that messages should not be dropped
> in the sense of deleted or "stored in a seldomly reviewed quarantine
> folder", but that a clear SMTP 5xx error code should be returned.

I don't think it should be outside the scope of a standard.

> I believe it is generally agreed that false positives are the main risk
> with spam filter solutions. This applies both to individual tools like
> DNSxLs and to the "filtering machine" as a whole as perceived by the
> recipient (and the sender). No automated solution can guarantee the
> absence of false positives.
> 
> On the other hand, the manual solution is far worse in terms of false
> positives, in my experience - the human error rate is pretty high when
> eg a spammy inbox must be reviewed manually.

Agreed.  But it is not uniform for all recipients - it depends highly on
how much legitimate mail they receive, how much spam they receive, and
the similarity between the two.  And there's a important difference in
liability between a recipient filtering his own mail and an unrelated
third party filtering it for him.

>> And the relative number of complaints is not
>> a reliable indicator of those costs.
> 
> It's probably the best indicator available?

perhaps, but that doesn't make it a compelling argument.

Keith
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-09 Thread Matthias Leisi

[Disclosure: I am the leader of the dnswl.org project; I provided some
input into the DNSxL draft as far as it concerns whitelists.]

Keith Moore schrieb:

> These incidents happen one at a time.  It's rarely worth suing over a
> single dropped message, and yet the aggregate amount of harm done by IP
> based reputation services is tremendous.

I would not want to reduce the situation to blacklists only. You use the
correct term - IP based reputation services - but fail to mention that
this includes whitelists, and that decisions other than "drop" can be
made based upon data returned by such services.

Regarding the "dropped message": While outside the scope of the DNSxL
draft, it is pretty much consensus that messages should not be dropped
in the sense of deleted or "stored in a seldomly reviewed quarantine
folder", but that a clear SMTP 5xx error code should be returned.

DNSBLs in conjunction with SMTP 5xx error codes actually increase the
value of the overall email system by enhancing it's reliability.

> receive.  But they're not as likely to know about messages that they
> never receive because of false positives, so of course they're less
> likely to complain about them.  And the cost (to sender or recipient) of
> a message blocked for bogus reasons can be far higher than the cost to
> the recipient of a spam.   

I believe it is generally agreed that false positives are the main risk
with spam filter solutions. This applies both to individual tools like
DNSxLs and to the "filtering machine" as a whole as perceived by the
recipient (and the sender). No automated solution can guarantee the
absence of false positives.

On the other hand, the manual solution is far worse in terms of false
positives, in my experience - the human error rate is pretty high when
eg a spammy inbox must be reviewed manually.

It is true that many spam filter solutions are short on "ham rules"
which would offset erroneous (or bogus, as you chose to call it) "spam
rules". The reason is obvious: most ham rules would be trivially to
forge for a spammer -- something which is not practical with IP
addresses. That's why IP addresses are so important for spam filter
decisions, both for black- and for whitelisting.

> And the relative number of complaints is not
> a reliable indicator of those costs.

It's probably the best indicator available?

-- Matthias, for dnswl.org
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-09 Thread Keith Moore
Chris Lewis wrote:

> So, where's this accountability gap you keep talking about?

The gap is where ISPs can drop my mail without a good reason, and
without my having any recourse against them.  The gap increases when
they delegate those decisions to a third party.   It increases further
when the mail is dropped without any notice to sender or recipient.

These incidents happen one at a time.  It's rarely worth suing over a
single dropped message, and yet the aggregate amount of harm done by IP
based reputation services is tremendous.

> I found out what our users thought of DNSBLs when I accidentally turned
> off DNSBL queries.  We were flooded with hundreds of complaints  about
> the spam.  We get _far_ fewer complaints about false positives we have.

You're comparing apples to oranges here.  It's not surprising that
recipients complain about an increase in the amount of spam they
receive.  But they're not as likely to know about messages that they
never receive because of false positives, so of course they're less
likely to complain about them.  And the cost (to sender or recipient) of
a message blocked for bogus reasons can be far higher than the cost to
the recipient of a spam.   And the relative number of complaints is not
a reliable indicator of those costs.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Chris Lewis
Keith Moore wrote:
> Livingood, Jason wrote:
> 
>> Keith - I encourage you to consult with several very large scale email 
>> domains around the world to see if they think that DNSxBLs are useful, 
>> effective, and in widespread use or not.
> 
> Jason - I encourage you to consult with users whose mail isn't getting
> delivered, and see whether they think DNSBLs are useful and effective,
> or whether their mail is effectively being bounced by third parties who
> aren't accountable for their actions.

DNSBL operators can and do get sued for their actions.  Sometimes
rightfully so.

Further, accountability both for the block and its remediation, rests
mostly with the admin who deploys the filters, whether it be something
they've designed themselves, or choose to delegate to someone else
(whether it be DNSBL, Brightmail filter downloads or A-V signature
downloads etc).  Which in our case is _me_.  I don't get to blame others
for _my_ choices.

So, where's this accountability gap you keep talking about?

I found out what our users thought of DNSBLs when I accidentally turned
off DNSBL queries.  We were flooded with hundreds of complaints  about
the spam.  We get _far_ fewer complaints about false positives we have.

So the real result of your suggestion is clear.  You need to do what
Jason suggests.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Keith Moore
Livingood, Jason wrote:

> Keith - I encourage you to consult with several very large scale email 
> domains around the world to see if they think that DNSxBLs are useful, 
> effective, and in widespread use or not.

Jason - I encourage you to consult with users whose mail isn't getting
delivered, and see whether they think DNSBLs are useful and effective,
or whether their mail is effectively being bounced by third parties who
aren't accountable for their actions.

Keith
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Chris Lewis
John C Klensin wrote:

> As a thought experiment, if Nortel or Comcast are developing
> these lists and like them, are they willing to assume liability?

One would _assume_ you mean "assume liability if we lost a lawsuit",
rather than fork out money to anybody who sticks their hand out.

Well, of course we do.  We wouldn't be doing it if we didn't - we can't
wave a magic wand and escape the law.

We have MUCH bigger worries than legal liability like you're talking
about here.  Losing an important sale because of a filter mistake is a
far more likely risk than getting sued.  So, no lost legitimate email is
the absolute overriding priority.

Or, are you thinking that a whole new set of law needs to be created to
cover the source IP-based version of filtering, and holds DNSBL
operators to a higher standard than anyone else?

Why?  There have been many legal actions already.  A few losses, but
mostly wins.

Note also: e360 vs Comcast.  e360 sues Comcast for source-IP blocking
them.  Case thrown out on summary judgement.  Comcast has absolute right
to do it explicitly enshrined in the DMCA "hold harmless for good faith
blocking of objectionable email" clause.

This is probably extensible to the suppliers that ISPs use to do that
blocking.  Hence, DNSBLs are also immune as long as the plaintiff can't
prove bad faith.

That case is not entirely over yet, but the final result isn't going to
be any different.  Comcast's counter to the initial complaint is amazing
reading.

> If not, what does that say about the model?

Legal theory around DNSBLs has already been partially established in
case law.

Your questions have already had their answers demonstrated in a way that
only enhances the model.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Livingood, Jason
John C Klensin wrote:

> I've got two separate and unrelated incidents in the last 10
> days in which RBL lists have decided to block some (but not all)
> of Comcast's outbound mail servers.   

Interestingly, this draft is about both blacklists and whitelists.  Many large 
domains maintain whitelists of other large mail domains.  For example, our 
comcast.net outbound servers are all listed here at 
http://postmaster.comcast.net/outbound-mail-servers.aspx and you can get an RSS 
feed of the addresses so that you can get updates.  But every large sender 
tends to do this in an entirely different way.

And, here is how we list our dynamic IP address space, at 
http://postmaster.comcast.net/dynamic-IP-ranges.aspx and in RSS feed at 
http://postmaster.comcast.net/dynamic-ip-ranges.xml.  In the case of dynamic 
space, several DNSxBLs exist that aggregate ISP dynamic IP space to make it 
easier on large domains to put all of those together.

Jason
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread John Levine
> I've got two separate and unrelated incidents in the last 10 days in
> which RBL lists have decided to block some (but not all) of
> Comcast's outbound mail servers. ...

I remain baffled by this line of argument.  

If anecdotes about DNSBLs not run the way you like disqualify even
describing the technology in a standards track document, how could you
in good concience allow the publication of RFC 5321, which describes
the technology used to send several billion phishes, 419 scams, and
penis pill ads every day?  The vast majority of SMTP usage, over 95%
of all transactions, is for mail that is unwanted, fraudulent, and
probably illegal.  I dare say that considerably less than 95% (heck,
less than 1%) of DNSBL lookups produce a problematic result.

R's,
John

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Livingood, Jason
-Original Message-
From: [EMAIL PROTECTED] on behalf of Keith Moore
Sent: Sat 11/8/2008 2:50 PM
To: John Levine
Cc: [EMAIL PROTECTED]; ietf@ietf.org
Subject: Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

Keith Moore wrote:
 
>and there's a billion and a half users whose email is being degraded by
>such mechanisms.

>if you ask them whether they want to not receive spam, they'll say yes.
> if you ask them whether they want their incoming mail filtered on the
>basis of unsubstantiated rumor and unreliable identifiers, they'll say no.

Keith - I encourage you to consult with several very large scale email domains 
around the world to see if they think that DNSxBLs are useful, effective, and 
in widespread use or not.

Regards
Jason

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread John C Klensin


--On Saturday, 08 November, 2008 16:46 -0800 David Conrad
<[EMAIL PROTECTED]> wrote:

> I thought the role of the IETF was to define standards that
> facilitate interoperability implementations of protocols, not
> make value judgements about operational decisions made by
> folks who use those protocols.
> 
> Is the goal here to force the folks who are interested in
> standardizing DNSBLs to do so in another venue?

David,

I would be much more sympathetic to the notion that this was
just about standardizing neutral formats to facilitate
interoperability among those who had decided to use these lists
if the Security Considerations section addressed a broader range
of the issues that have been raised in this thread.  It does
not, and that leads one to wonder whether that argument from
some of the participants is a little bit disingenuous.  

And, in theory, the IETF still has a system of recommendation
levels for standards-track documents on the books that is
orthogonal to maturity levels and that includes such categories
as "recommended", "not recommended", and something like
"mandatory".  While we haven't used those categories regularly
for years, the default remains, AFAIK, "recommended" ... that
that doesn't mean a neutral "we recommend that you use this data
format if you decide to do that thing".

In addition, although we were well into the thread before it
came up, if the ASRG is planning to ask for publication of a
"companion document" that specifies how to use this stuff, as a
BCP no less, the two documents should be treated in the same way
we would normally treat WG or conventional individual submission
documents that were that closely related and put into Last Call
together.

 john



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread John C Klensin


--On Saturday, 08 November, 2008 13:46 -0700 Doug Ewell
<[EMAIL PROTECTED]> wrote:

> Several years ago, my employer's e-mail spam filter blocked
> the Unicode mailing list as a "suspect site."  Earlier this
> year, GoDaddy (registrar of my domain name) did the same, and
> it took months to figure out what was going on.  It's
> conceivable that someone might have used this high-profile
> mailing list as part of a spam, at some point, but to block
> the entire domain is complete overkill.  I'm no expert on
> e-mail security, and I detest spam, but there is such a thing
> as a cure that is worse than the disease.

I've got two separate and unrelated incidents in the last 10
days in which RBL lists have decided to block some (but not all)
of Comcast's outbound mail servers.   Note that these are not
messages being sent from the desktop of a Comcast cable modem
customer direct to a destination but messages sent from the
customer to Comcast's mail servers acting as submission servers,
to a destination... and blocked at the last step.   That class
of thing has become an epidemic.

What I don't know is whether Comcast is moving servers in and
out of address pools that are used to service residential users
(so that the RBL lists can't keep up) or whether "bad guy by
rumor" tactics are being used to punish Comcast for aggressive
use of RBLs, or whether this is just random nonsense.I do
know an increasing number of Comcast customers who are switching
their primary mailboxes to other services because of
seemingly-unpredictable blocks to their incoming and outgoing
messages.  Perhaps Comcast likes that -- lowers expenses without
lowering revenues -- but I hope that motivation has not been
considered.

Two additional comments to avoid sending more messages in this
thread, parts of which have started to resemble a religious war.

* The "reject at SMTP time, rather than generate NDNs, all there
will be no blowback problems" is bogus unless one managed to
design one's mail environment to completely eliminate relaying
or one has some other highly secure and reliable way to
authenticate senders (not just sending servers or permission of
identities to send from those servers).  A change to get rid of
relaying would be, IMO, another significant change in the
architecture, whether one believes it is feasible or not.

* Regardless of the particulars of the email environment and
what people (I think temporarily) have been able to get away
with on the Internet, the business of being a third-party who
evaluates and/or certifies the reputations of others is
traditionally a very serious one in the real world.
Organizations that do it traditionally assume huge liabilities
that they may, or may not, be able to constrain depending on
what people use the reputations to do.  Libel laws often apply,
especially if ones procedures are lax enough (or depend enough
on unsubstantiated rumors) to constitute reckless disregard of
the truth.   Many years ago, when the IETF and others still
believed in general-purpose cert issuers and we weren't far away
from the "one true root" model, Jeff Schiller famously commented
that an organization would have to be insane to take on that
general purpose role without sovereign immunity.

If IP addresses weren't such a lousy instrument, I could find
myself believing in RBL databases if the parties taking
responsibility for the entries would identify themselves in
clear and authenticatable ways and post bonds against
accidentally damaging the reputations of people and enterprises
by accusing them of being spammers.  That is unlikely in the
present environment because the current environment gets one
blacklisted by inference and anonymous rumor, with some list
maintainers bragging about how they can't be found or affected
by legal processes.  It is not clear to me that such
arrangements would have much to do with the DNS, for reasons
that we should probably all understand by now.   It it also not
clear to me that facilitating interoperation among that class of
operators is a good thing, although I could be convinced that it
might be a step toward more maturity and responsibility in the
business.

As a thought experiment, if Nortel or Comcast are developing
these lists and like them, are they willing to assume liability?
If not, what does that say about the model?

  john


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread John C Klensin


--On Friday, 07 November, 2008 12:10 -0500 Sam Hartman
<[EMAIL PROTECTED]> wrote:

> It seems quite clear to me that RFC 2418 does not apply at all
> to the output of an RG.  From a process and consensus building
> standpoint, this last call needs to be treated the same as an
> individual submission, not WG output.  RGs are not required to
> maintain the level of openness, minutes, etc that WGs do.
> Thus, they don't get the presumption of consensus that a WG
> does and the comments in 2418 about last calls do not apply.
> Even if a particular RG is open, it's still not a WG; just as
> we would expect input from an external organization to be
> treated through the individual process regardless of the
> openness of that organization, we should do the same for IRTF
> output.

Because of exactly this reasoning, there was once a time that
the IAB and ISRG Chair insisted on keeping the ISRG/IETF
boundary clear by prohibiting RGs from producing standards-track
documents.  If something got close to the point at which
standardization was appropriate, either (1) the document had to
be handled as an individual submission, with, at most, an
acknowledgment to the RG or (2) the RG got shut down with advice
to go through the IETF's WG chartering process.   Unless my
memory is failing me, one of the people who is now advocating
giving the RG status comparable to WGs was strongly supportive
of that model.

Perhaps an RG might produce a standards-track document as an
accidental side-effect of its work and the community should be
relaxed about that under the principle of not putting rigid
rules ahead of good sense.   It still wouldn't rate treatment as
a WG for the reasons Sam cites.   But, if an RG starts regularly
producing candidate documents for standards track or BCPs (and I
note that this thread has led to a discussion of at least one
"companion document" for which BCP processing is expected to be
requested RSN), then it isn't doing research as its exclusive
focus any more: at least a non-trivial amount of its effort has
become protocol engineering and its close relatives.

Independent of what happens with this document, I urge the IRTF
Chair and the IAB to bring that situation under control.

john


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread David Conrad

On Nov 8, 2008, at 4:07 PM, John Levine wrote:

And what does this have to do with the technical details of running
and using one?  We all know that spam stinks and DNSBLs stink, too.



Unfortunately, the alternatives to DNSBLs are worse.


This whole discussion is confusing.

I thought the role of the IETF was to define standards that facilitate  
interoperability implementations of protocols, not make value  
judgements about operational decisions made by folks who use those  
protocols.


Is the goal here to force the folks who are interested in  
standardizing DNSBLs to do so in another venue?


Thanks,
-drc

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread John Levine
>Indeed; reputation system for the reputation servers!  Of course, if
>DNSBL operaters were to find the that shoe was on the other foot, such
>that their reputations were getting judged by the same criteria that
>sites are declared "unclean" (i.e., by unauthenticated rumor), ...

Why do you assume that nobody looks at the quality of DNSBLs?  See,
for example, http://stats.dnsbl.com/

And what does this have to do with the technical details of running
and using one?  We all know that spam stinks and DNSBLs stink, too.
Unfortunately, the alternatives to DNSBLs are worse.

R's,
John
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Theodore Tso
On Sat, Nov 08, 2008 at 05:41:41PM -0500, Keith Moore wrote:
> I really think that if you can design and standardize a protocol for
> reporting reputation which includes a mechanism for making the
> reputation service accountable to end users, and also is reasonably
> secure, you might seriously improve email reliability.  I just don't
> think that DNSBL is good enough for that and I doubt that DNS can be
> stretched far enough to make that work well.

Indeed; reputation system for the reputation servers!  Of course, if
DNSBL operaters were to find the that shoe was on the other foot, such
that their reputations were getting judged by the same criteria that
sites are declared "unclean" (i.e., by unauthenticated rumor), maybe
there would be more attention and care towards some secure,
accountable way for conclusions to be reached on some particular
host's reputations, whether it is running a SMTP server or a DNSBL,
and for a more secure, authenticated, and accountable way for that
reputation to be carried across the network.

- Ted
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Keith Moore
Paul Hoffman wrote:

> The IETF has repeatedly tried and failed to fix the "RFC levels" problem.

Paul, our criteria for standards-track documents haven't changed in
several years.  Sure they're imperfect but that's not a justification
for abandoning them.  And this document doesn't meet them.

Keith
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Keith Moore
You keep citing 1.5 billion users.  I haven't asked all of them, of
course, but I keep finding that users don't trust their email to be
reliable, and they don't know how to find an email service that is
reliable.  Mostly they maintain several different email accounts and try
sending from multiple accounts in the hopes that one of those messages
will get there.  Those that haven't given up on email entirely, that is.

I really think that if you can design and standardize a protocol for
reporting reputation which includes a mechanism for making the
reputation service accountable to end users, and also is reasonably
secure, you might seriously improve email reliability.  I just don't
think that DNSBL is good enough for that and I doubt that DNS can be
stretched far enough to make that work well.

Keith

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread John Levine
>Several years ago, my employer's e-mail spam filter blocked the Unicode 
>mailing list as a "suspect site."  Earlier this year, GoDaddy (registrar 
>of my domain name) did the same, and it took months to figure out what 
>was going on.

What connection does any of this have to do with DNSBLs?  There are lots
of less than fabulous ways to manage a mail system poorly, most of which
have nothing to do with looking up IP addresses in a DNS list.

R's,
John
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Keith Moore
Chris Lewis wrote:
> Keith Moore wrote:
>> I think you're missing the point.
> 
> Oh, no, I fully understand the point.  In contrast, I think you're
> relying on false dichotomies.
> 
> For example:
> 
>> Better "interoperation" of a facility that degrades the reliability of
>> email, by encouraging an increased reliance on dubious filtering
>> criteria and rumors, is not a desirable goal.
> 
> There is no such thing as a filtering mechanism that is 100% accurate,
> and hence all are dubious to one degree or another. 

Fine.  So please explain to me why, and under what conditions, using IP
addresses as a basis for filtering is reliable.

And please also explain why, and under what conditions, using DNS as a
means of communicating whether a particular IP address is spamming is a
good way to do that.  In particular, please explain how it encourages or
discourages selection of good criteria for filtering, how it enhances or
 degrades accountability for the party blacklisting the site (and/or the
party trusting the blacklist).  Explain the limitations of DNS for doing
this kind of rumor mongering and how they are addressed.  Explain the
mechanism for reporting blacklisting errors to the parties most affected
(which would include not only the senders of inappropriately filtered
messages but the intended recipients of inappropriately filtered
messages) and how use of DNS enhances or degrades those parties'
abililty to improve their email reliability.  Explain how DNS enhances
or degrades a party's ability to correct both a blacklist's mislabeling
of a site and a user's ability to correct his MSP's inappropriate use of
a blacklist.  Explain how the DNS ttl should be chosen and how it should
vary on a per-domain basis.  Explain the security risks associated with
trusting DNS as a blacklist query protocol, and in particular what
potentials exist for denial-of-service attacks and what can be done
about them.

See, it really appears that the design work that we would rationally
expect out of any standards-track protocol has not been done in this
case.  It appears that large-scale use of IP addresses as identifiers
for potential spammers is not well-considered, especially in an era with
widespread use of NAT.  It also appears that use of DNS as a query
protocol is not well considered beyond the fact that such a query could
be implemented by a sendmail rewrite rule.

In other words, this is a hack that has gotten way out of hand.  And not
a particularly well-designed hack at that.

> A demonstrable assertion that "IP x is demonstrably infected with
> Srizbi and anything it emits is probably crap" and communicated by
> DNS is much less dubious than "this combination of random content
> fragments makes it look like a Nigerian 419, sorta, marginally".

I'd probably agree with that statement on its face, but (a) comparing
DNSBL to SA like schemes is damning DNSBL with faint praise.  To my
knowledge nobody has requested that IETF standardize SA, but just
because SA sucks doesn't mean that DNSBL is standards-track quality even
if it sucks a bit less.  (b) DNSBL, in practice, doesn't actually
provide anywhere near that level of assurance.  It doesn't say that a
host is infected with Srizbi, it just alleges that a host is bad.   And
in fact the alleged badness might well have been "this host sent out a
combination of random content fragments that look like a Nigerian 419".
 Indeed, DNSBL doesn't actually say that a host is bad, it associates
the badness with an IP address which might or might not be associated
with the same host now as it was when the badness was observed.  It
doesn't say when traffic from that IP address was observed to be bad.  etc.

> Indeed, experience shows that a correctly chosen set of DNSBLs is often
> not only more effective than other techniques in correctly identifying
> malicious email, can often have far fewer false positives than just
> about any other mechanism.

In other words, if you make the selection the filtering criteria someone
else's problem, you can pretend that the problem has gone away - even if
that "someone else" is not responsible to either sender or recipient,
and that "someone else" is not accountable for misrepresentation.

That certainly doesn't sound like something that would pass muster for
standards track.  Maybe the security folks would like to comment on the
sanity of extending trust to unaccountable third parties?

> It certainly is counterintuitive that "source reputation" might be more
> accurate than "per email evaluation".  But, experience in the field
> demonstrates the true reality - the current state of the art is that
> intelligently chosen DNSBLs (the aforementioned BCP is intended to help
> that) often work much better than complete reliance on the latter.

I can accept that it makes some sense to identify compromised hosts, for
instance, and that blocking mail from hosts known to be compromised with
a spamming virus can in some cases be more reliable than block

Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Theodore Tso
Speaking as someone who runs their own private mail server
(thunk.org), and having suffered from "collateral damage" when an
entire ISP range was listed, and where I had absolutely no way of
getting off a DNSBL that operating in a liability-free zone, with
administrators who refused to communicate with me, and where I had no
way of getting off the list, and thus had my e-mail blocked(*), forgive
me if I'm a bit less sanguine than you about the suitability of
DNSBL's, and whether your BCP will have any effectiveness whatsoever.
If DNSBL operators are content to operate in the dark, and refuse to
communicate, what makes you think they will pay attention to a BCP?

(*) Fortunately in most cases it was people asking me for help with
Linux, so I simply found another way to send the e-mail, and then sent
them a note saying that until they switched ISP's or fixed their mail
server to remove the use of the DNSBL, I would refuse to help them
with their Linux ext3 problem.  :-)

But I view DNSBL's as fundamentally the Wrong Answer, and it breaks
the intended SMTP and Internet architecture, with fundamentally wrong
power dynamics.  Of course, if you run a major mail operation, where
DNSBL's don't dare block you lest it become obvious that the whole
mechanism is corrupt, you don't see these problems.

- Ted
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Chris Lewis
John Levine wrote:
>> Today, messages can just disappear on the way to the user's mailbox
>> (often at or after that last-hop MTA).  They do so without NDNs out
>> of fear of blowback, and they do so for two main reasons. ...

> You know, DNSBLs make mystery disappearances less likely, not more.
> 
> The DNSBLs that most people use are typically checked at SMTP time, sp
> MTAs can give a 5xx rejection using the TXT record from the DNSBL that
> identifies why the mail was rejected.

Indeed, and more concretely: NDNs aren't inherently bad (blowback).
It's "accept then generate NDN" that's inherently bad.  Anti-spam
techniques that are after the destination's MX should not generate NDNs,
because all of it is potentially blowback by definition.

The "just disappear" argument more applies to techniques that can't NDN
without blowback.  Which, includes, for example, ALL client-side
filtering no matter what filtering they use, and all server-based
"accept-then-analyse" filtering.  Not DNSBLs per-se.

By far the most common server-based implementations using DNSBLs reject
at SMTP time (usually with some sort of remediation information in the
error message), which suppresses almost all blowback, yet "you" still
find out what happened.   In contrast, for example, the most common
implementations of (say) content analysis do accept-then-analyse, and
should not NDN because it'll be blowback.

Full analysis during SMTP time of (say) content and rejecting at SMTP
time is considerably rarer (we're one of the rarer ones).   In part
because older revisions of the SMTP standards weren't very clear about
handling of rejections after DATA.  We decided to ignore that limitation.

In other words, in general you're far more likely to find out about your
email not getting through (and how to fix it) if it was a DNSBL hit than
most other techniques.  It's not intrinsically inherent to DNSBLs, it's
just the "overwhelming experience".

>> Unlike you, I don't see "overwhelming community consensus for
>> this mechanism".
> 
> Aw, come on.  There's a billion and a half mailboxes using the
> Spamhaus DNSBLs, on systems ranging from giant ISPs down to hobbyist
> Linux boxes.

All of the very largest email and spam filtering infrastructures use
DNSBLs (generally IP-based reputation lists) in one way or another,
whether they tell you or not.  I said "all" because I meant "all" -
that's not hyperbole for "most".

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Chris Lewis
Keith Moore wrote:
> John Levine wrote:
> 
>>> Unlike you, I don't see "overwhelming community consensus for
>>> this mechanism".
>> Aw, come on.  There's a billion and a half mailboxes using the
>> Spamhaus DNSBLs, on systems ranging from giant ISPs down to hobbyist
>> Linux boxes.
> 
> and there's a billion and a half users whose email is being degraded by
> such mechanisms.
> 
> if you ask them whether they want to not receive spam, they'll say yes.
>  if you ask them whether they want their incoming mail filtered on the
> basis of unsubstantiated rumor and unreliable identifiers, they'll say no.

Then you go to the next logical step, and turn Spamhaus off, and you ask
them whether they want it back on.  They'll say yes.  They did here (the
question was an accidental goof on my part that turned off Spamhaus
queries, the answer (trouble tickets about spam filtering not working,
despite all the other filtering mechanisms unaffected by the goof) was
overwhelming)

Secondly, the term "unsubstantiated rumor" - that implies that Spamhaus
accepts unsubstantiated allegations from anyone.  They don't.

"Unsubstantiated rumor" - unsubstantiated by whom?  Represented how? I'd
contend that Spamhaus's listings are all substantiated by them, but no
matter.  PSBL, for example, substantiates every listing with a spam
sample via their web site.  CBL (Spamhaus XBL) entries are substantiated
by SMTP transactions from the IP in question, usually with specific
identification of the spambot that did it.  They may not reveal precise
details of their heuristics of how they detected it, nor a sample, but
experience indicates that they are right virtually 100% of the time.

I don't need 100% full transparency or 100% substantiation, if
experience shows I can trust it.

And I do.  Those that represent 1 1/2 billion mail accounts trust it too.

This is also that false dichotomy again: just because a DNSBL might
issue "unsubstantiated rumor" doesn't mean that they ALL necessarily do.

"Some A does B" != "All A does B".

Indeed, I would contend that to most people, the appearance of Miriam
Abacha (that will trigger some non-DNSBL-based filters) as being spam
sign is unsubstantiated rumor.  But that is the basis for other
filtering methods.  One might reply that the IETF should not standardize
the insides of those methods.  But who cares?  They don't need
consistent inter-machine protocols.  DNSBLs do.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Chris Lewis
Keith Moore wrote:
> I think you're missing the point.

Oh, no, I fully understand the point.  In contrast, I think you're
relying on false dichotomies.

For example:

> Better "interoperation" of a facility that degrades the reliability of
> email, by encouraging an increased reliance on dubious filtering
> criteria and rumors, is not a desirable goal.

There is no such thing as a filtering mechanism that is 100% accurate,
and hence all are dubious to one degree or another.  Every technique
relies upon factors that are based on intuition and experience, rather
than physical law.   A demonstrable assertion that "IP x is demonstrably
infected with Srizbi and anything it emits is probably crap" and
communicated by DNS is much less dubious than "this combination of
random content fragments makes it look like a Nigerian 419, sorta,
marginally".

Indeed, experience shows that a correctly chosen set of DNSBLs is often
not only more effective than other techniques in correctly identifying
malicious email, can often have far fewer false positives than just
about any other mechanism.

It certainly is counterintuitive that "source reputation" might be more
accurate than "per email evaluation".  But, experience in the field
demonstrates the true reality - the current state of the art is that
intelligently chosen DNSBLs (the aforementioned BCP is intended to help
that) often work much better than complete reliance on the latter.

Furthermore, incorrect DNSBL listings are easier to cope with than, say,
random combinations of SpamAssassin scores that just happen to zap a
desirable email.

This is not specific to SA.  It's just as applicable to other things
like Bayesian.

We run DNSBLs and SpamAssassin here on the MXes.  The former catches 10
times as much as the latter, FPs less, and is a lot easier to explain
and remediate than the latter.  We _hate_ SA FPs, because it's so much
more difficult to ensure that it doesn't repeat.

[The obvious Bayesian/SA remediation (whitelisting email addresses)
isn't good enough.  Virtually all malicious email is forged.  Thus,
whitelisting senders leaves you wide open to getting zapped by forgeries.]

> Even assuming that there's some benefit in having third-party reputation
> services (which IMHO is not well-established),

Again, a false dichotomy: DNSBLs are not necessarily third-party, and
other perfectly reputable techniques (eg: outsourcing your spam
filtering to a spam filtering company or relying on your ISPs filtering)
are third party by definition.  Indeed, running your own copy of
SpamAssassin on your own mail box is just as much giving away "control"
of your filtering to a third party with their own evaluations techniques
of greater or lesser dubiousness.

Is it not third party because you can tweak the rules of SA?  You can
also locally whitelist around DNSBL entries.

The only way you can get away from "third party" is to write your own
filters from scratch, and ignore everybody else's heuristics.

I generate several DNSBLs for use here only.  Why shouldn't there be a
standard so that mail server software I buy/lease/license will
interoperate with DNSBLs I create?

"Not well-established"?  You don't seem to have any idea how prevalent
the use of DNSBLs is.  It's probably the industry's dirty little secret
because of the occasional media event.  But there have been similar
media events about other filtering techniques that aren't 3rd party, nor
source reputation.

The reality is: almost everybody uses DNSBLs, and ALL of the very big
sites do.

> use of DNS to communicate
> such reputation, and basing such reputation on IP addresses, is itself
> very dubious.

You may think it dubious, but it is usually more reliable and effective
than any other, and its popularity alone means it needs to be standardized.

Rejecting the standardization of DNSBL protocols because the entries of
a specific DNSBL _might_ be dubious is in itself a dubious position.

> The problem isn't just the rumor passing mechanism, but
> the mechanism is indeed part of the problem.
> 
> It's not as if we're arguing about whether to standardize a facility
> that is widely believed to work well.

It is widely believed to work well.  That's part of the point.

> We're arguing about whether to
> standardize a facility that causes problems for everyone.

No more so than filtering in general.

> Back when I started working with email, getting a message reliably
> delivered was something of a black art, because you had to know how to
> thread your message through the hodgepodge of Internet, uucp, BITNET,
> DECnet, fidonet, and whatnot.  That was in some sense understandable
> because Internet access was not widely available, and there wasn't
> really any common network that everybody could tap into.
> 
> Today, getting a message reliably delivered is once again a black art.
> But today, it's not for lack of standards or network connectivity.  It's
> because so many messages are filtered for dubious reasons, or on

Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Doug Ewell

Keith Moore  wrote:


Today, getting a message reliably delivered is once again a black art.
But today, it's not for lack of standards or network connectivity.
It's because so many messages are filtered for dubious reasons, or on
the basis of what are essentially unsubstantiated rumors, or because
of over-reliance on IP source addresses as identifiers.


Several years ago, my employer's e-mail spam filter blocked the Unicode 
mailing list as a "suspect site."  Earlier this year, GoDaddy (registrar 
of my domain name) did the same, and it took months to figure out what 
was going on.  It's conceivable that someone might have used this 
high-profile mailing list as part of a spam, at some point, but to block 
the entire domain is complete overkill.  I'm no expert on e-mail 
security, and I detest spam, but there is such a thing as a cure that is 
worse than the disease.


--
Doug Ewell  *  Thornton, Colorado, USA  *  RFC 4645  *  UTN #14
http://www.ewellic.org
http://www1.ietf.org/html.charters/ltru-charter.html
http://www.alvestrand.no/mailman/listinfo/ietf-languages  ˆ

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Paul Hoffman
Sometimes, people say "this shouldn't even be an Informational RFC because 
people can't tell the difference between the types of RFCs and they'll think 
the IETF supports the technology".

Sometimes, people say "this shouldn't be a standards-track RFC but it is OK for 
it to be an Informational RFC because people notice the difference and think 
the difference is important".

Sometimes, those are the same people talking about different documents.

The IETF has repeatedly tried and failed to fix the "RFC levels" problem. It is 
absurd to have the debate repeatedly and try to hold documents to one temporary 
belief or the other. Unless we fix the RFC levels problem, we can only rely on 
the content of the document itself.

To my reading, this document does not promote the use of blacklists, much less 
of crappy blacklists (of which I am an erroneous target). The text seems to be 
all about bits-on-the-wire interoperability that affects large and small ISPs.

--Paul Hoffman, Director
--VPN Consortium
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Keith Moore
John Levine wrote:

>> Unlike you, I don't see "overwhelming community consensus for
>> this mechanism".
> 
> Aw, come on.  There's a billion and a half mailboxes using the
> Spamhaus DNSBLs, on systems ranging from giant ISPs down to hobbyist
> Linux boxes.

and there's a billion and a half users whose email is being degraded by
such mechanisms.

if you ask them whether they want to not receive spam, they'll say yes.
 if you ask them whether they want their incoming mail filtered on the
basis of unsubstantiated rumor and unreliable identifiers, they'll say no.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Keith Moore
I think you're missing the point.

Better "interoperation" of a facility that degrades the reliability of
email, by encouraging an increased reliance on dubious filtering
criteria and rumors, is not a desirable goal.

Even assuming that there's some benefit in having third-party reputation
services (which IMHO is not well-established), use of DNS to communicate
such reputation, and basing such reputation on IP addresses, is itself
very dubious.  The problem isn't just the rumor passing mechanism, but
the mechanism is indeed part of the problem.

It's not as if we're arguing about whether to standardize a facility
that is widely believed to work well.  We're arguing about whether to
standardize a facility that causes problems for everyone.

Back when I started working with email, getting a message reliably
delivered was something of a black art, because you had to know how to
thread your message through the hodgepodge of Internet, uucp, BITNET,
DECnet, fidonet, and whatnot.  That was in some sense understandable
because Internet access was not widely available, and there wasn't
really any common network that everybody could tap into.

Today, getting a message reliably delivered is once again a black art.
But today, it's not for lack of standards or network connectivity.  It's
because so many messages are filtered for dubious reasons, or on the
basis of what are essentially unsubstantiated rumors, or because of
over-reliance on IP source addresses as identifiers.

Keith



Chris Lewis wrote:
> As the architect of a large email infrastructure, a senior technical
> advisor to the Mail Anti-Abuse Working Group, and ASRG member, I find
> myself disagreeing with the points made by John and Keith that I
> included at the end.
> 
> As a consumer (and producer) of DNSBLs, I need technical standards that
> define DNSBL protocol so I can spec/build/acquire/use software that
> interoperates correctly and maintains/improves the reliability of our
> email and email in general.
> 
> I also want policy predictability in the DNSBLs I use or am likely to
> encounter when our users send email, but that does not belong in a DNSBL
> technical standard on protocols.  It belongs in a different document.
> More below.
> 
> Yes, the very existence of DNSBLs is unfortunate, but they have become
> an outright necessity for many mail systems.  Our (and many other,
> including all of very largest) mail infrastructures heavily rely on
> DNSBLs for the majority of their filtering.  No other filtering
> technique deals as effectively with the massive floods of spam and other
> malicious content that we receive (in some cases well in excess of 90%
> of all email).
> 
> Yes, some people honestly believe that the use of DNSBLs for blocking is
> a bad idea.  But those objections fall away when they're used in
> aggregate scoring systems like SpamAssassin, where they're just one
> minor factor of many.  DNSBLs need to be standardized, whether they
> block an email, tweak a score a bit like SpamAssassin, or as in some
> environments, improve an email's likelihood of getting through (eg:
> whitelists).
> 
> There are many advanced non-DNSBL techniques that can and do work well
> in place of DNSBLs on small to medium systems.  Unfortunately, they are
> either considerably less ineffective or are impractical in large to very
> large systems trying to withstand the full spectrum of email abuse that
> they have to deal with daily.  DNSBLs (locally sourced or otherwise)
> often make the difference between email remaining useable or becoming
> unuseable in environments like ours.
> 
> It is but one tool of many tools.  Yet, for many infrastructures, by far
> the most effective.  Virtually every major email system uses DNSBLs in
> one way or another, whether it's visible or not, whether it's used
> directly by themselves, or in concert with other mechanisms (eg: scoring).
> 
> Failing to standardize the technical protocols used by them would be a
> major mistake.
> 
> More specific points:
> 
> 1) There are no technical omissions in the specification that I am aware
> of.  It is a technical specification of the bits on the wire (the
> protocol), with little else.
> 
> 2) I presume the "technical omissions" comment was intended to mean a
> lack of standardization of "how things got on and off DNSBLs".  These
> are not, and should not, be considered technical issues.  Specifying how
> something got on and off a DNSBL would be equivalent to insisting that
> RFC2822 attempt to standardize how mail readers insert an email address
> in the To header.  RFC2822 specifies the format of To headers, not how
> they got there.
> 
> Yes, there are issues about such things, and consistency in some of
> these areas is desired.  But, they do not belong in a technical
> standard.  This is why I, Matt Sergeant, and others have been working on
> a DNSBL policy BCP what could be considered a companion document:
> http://www.ietf.org/internet-drafts/draft-irtf-asrg-bcp-blac

Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread John Levine
>Today, messages can just disappear on the way to the user's mailbox
>(often at or after that last-hop MTA).  They do so without NDNs out
>of fear of blowback, and they do so for two main reasons. ...

You know, DNSBLs make mystery disappearances less likely, not more.

The DNSBLs that most people use are typically checked at SMTP time, sp
MTAs can give a 5xx rejection using the TXT record from the DNSBL that
identifies why the mail was rejected.  Even if the DNSBL isn't in the
rejection message, there aren't that many lists that are widely enough
used to matter, and since DNSBL listings (unlike the private
per-system blacklists that are the most likely alternative) are by
their nature public, it is easy enough to check a bunch of them and
see if you're on one of them, thereby identifying the problem.  The
other approach is to use them in a scoring filter, but they'll do what
they do whether or not they mix DNSBLs into the score.

>Unlike you, I don't see "overwhelming community consensus for
>this mechanism".

Aw, come on.  There's a billion and a half mailboxes using the
Spamhaus DNSBLs, on systems ranging from giant ISPs down to hobbyist
Linux boxes.

R's,
John
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Chris Lewis
As the architect of a large email infrastructure, a senior technical
advisor to the Mail Anti-Abuse Working Group, and ASRG member, I find
myself disagreeing with the points made by John and Keith that I
included at the end.

As a consumer (and producer) of DNSBLs, I need technical standards that
define DNSBL protocol so I can spec/build/acquire/use software that
interoperates correctly and maintains/improves the reliability of our
email and email in general.

I also want policy predictability in the DNSBLs I use or am likely to
encounter when our users send email, but that does not belong in a DNSBL
technical standard on protocols.  It belongs in a different document.
More below.

Yes, the very existence of DNSBLs is unfortunate, but they have become
an outright necessity for many mail systems.  Our (and many other,
including all of very largest) mail infrastructures heavily rely on
DNSBLs for the majority of their filtering.  No other filtering
technique deals as effectively with the massive floods of spam and other
malicious content that we receive (in some cases well in excess of 90%
of all email).

Yes, some people honestly believe that the use of DNSBLs for blocking is
a bad idea.  But those objections fall away when they're used in
aggregate scoring systems like SpamAssassin, where they're just one
minor factor of many.  DNSBLs need to be standardized, whether they
block an email, tweak a score a bit like SpamAssassin, or as in some
environments, improve an email's likelihood of getting through (eg:
whitelists).

There are many advanced non-DNSBL techniques that can and do work well
in place of DNSBLs on small to medium systems.  Unfortunately, they are
either considerably less ineffective or are impractical in large to very
large systems trying to withstand the full spectrum of email abuse that
they have to deal with daily.  DNSBLs (locally sourced or otherwise)
often make the difference between email remaining useable or becoming
unuseable in environments like ours.

It is but one tool of many tools.  Yet, for many infrastructures, by far
the most effective.  Virtually every major email system uses DNSBLs in
one way or another, whether it's visible or not, whether it's used
directly by themselves, or in concert with other mechanisms (eg: scoring).

Failing to standardize the technical protocols used by them would be a
major mistake.

More specific points:

1) There are no technical omissions in the specification that I am aware
of.  It is a technical specification of the bits on the wire (the
protocol), with little else.

2) I presume the "technical omissions" comment was intended to mean a
lack of standardization of "how things got on and off DNSBLs".  These
are not, and should not, be considered technical issues.  Specifying how
something got on and off a DNSBL would be equivalent to insisting that
RFC2822 attempt to standardize how mail readers insert an email address
in the To header.  RFC2822 specifies the format of To headers, not how
they got there.

Yes, there are issues about such things, and consistency in some of
these areas is desired.  But, they do not belong in a technical
standard.  This is why I, Matt Sergeant, and others have been working on
a DNSBL policy BCP what could be considered a companion document:
http://www.ietf.org/internet-drafts/draft-irtf-asrg-bcp-blacklists-04.txt

I hope to make a few final grammatical changes to the above document in
the next few days and move it on towards last call.

3) Making draft-irtf-asrg-dnsbl a standard (and ultimately approving the
BCP) serves to improve the consistency and interoperability of DNSBLs,
and therefore email itself.  Not making it a standard only perpetuates
uncertainty on the protocol itself, failure to implement software that
interoperates correctly, unpredictable (and some times capricious)
failure modes, and ultimately impairs the reliability of email.

Case in point: If a DNSBL domain becomes unregistered, and is picked up
by a reseller, they usually insert DNS A record wildcards causing web
queries to go to a common web page.  Or if a DNSBL domain is mispelled
by its users, it may collide with a different domain that wildcards A
records.  Such scenarios aren't rare, they happen frequently.  Without
this standardization, the implementors of DNSBL clients don't realize
that DNSBL queries that return A records outside of 127/8 is an error
condition not a positive result.  Such mail servers usually end up
blocking ALL of their email - concrete examples of where lack of
standardization drastically impairs email interoperability.

John C Klensin wrote:

> Sadly, I have to agree with Keith.   While these lists are a
> fact of life today, and I would favor an informational document
> or document that simply describes how they work and the issues
> they raise, standardizing them and formally recommending their
> use is not desirable at least without some major changes in our
> email model and standards for what gets addresses on

Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Keith Moore
John C Klensin wrote:

> I'm am beginning to wish for the days at which, at least in
> principle, we could standardize something and immediately put a
> "not recommended" label on it.  

Well, I have often wished we had a clear label (or maybe even a separate
document series) for things of the form "if you're going to implement
this dubious idea, please do it this way because it appears to be less
harmful than other ways."  But we don't have one of those yet.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread John C Klensin


--On Saturday, 08 November, 2008 12:31 -0500 Keith Moore
<[EMAIL PROTECTED]> wrote:

> John Levine wrote:
>>> standardizing them and formally recommending their use
>> 
>> I'm not aware of any language in the current draft that
>> recommends that people use DNSBLs. 
> 
> Standardizing it is an implicit recommendation.  In particular
> it's a statement that there are "no known technical omissions"
> about the protocol.  Which is not an accurate description of
> the protocol at hand.

I'm am beginning to wish for the days at which, at least in
principle, we could standardize something and immediately put a
"not recommended" label on it.   I agree with John and Dave that
having an agreed-upon specification for how to do these things
if one insists on doing them would be a good idea.   I'm just
concerned about the implication of encouragement to do it, at
least without much stronger Security and Operational
considerations material than is now present (and, Dave, that
isn't a vague "don't like it" complaint -- it is a reference to
my earlier note, Keith's notes, ekr's notes, etc.).

john


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread John C Klensin


--On Saturday, 08 November, 2008 07:53 -0800 Dave CROCKER
<[EMAIL PROTECTED]> wrote:

> John C Klensin wrote:
>> Sadly, I have to agree with Keith.   While these lists are a
>> fact of life today, and I would favor an informational
>> document or document that simply describes how they work and
>> the issues they raise, standardizing them and formally
>> recommending their use is not desirable at least without some
>> major changes in our email model and standards for what gets
>> addresses onto --and, more important, off of-- those lists.
> 
> 
> John,
> 
> What are the technical deficiencies of this specification?

Dave, Sorry if my note was incomplete.  I've halfway around the
world, trying to focus on something else and thought that the
issue Keith raised were clear enough that they didn't require an
in-depth explanation.  Ekr's comment reinforces that view.
However...

Our email model assumes that messages that are sent either get
delivered or that the sender gets an NDN back.  We have never
had a culture of receipts for delivery to what SMTP thinks of as
the last-hop MTA, much less delivery to the user's mailbox.
Today, messages can just disappear on the way to the user's
mailbox (often at or after that last-hop MTA).  They do so
without NDNs out of fear of blowback, and they do so for two
main reasons.  One has to do with analysis of message content
for patterns consistent with spam, the other has to with various
address and domain blacklisting techniques.  The problem with
the latter is that it is extremely subject to abuse, both
intentional and unintentional.  One variation on the former has
involved a DoS attack against a particular domain by used that
domain in faked addresses in spam.   That problem is worsened by
operational difficulties in getting off the lists once one has
been classified onto them, a problem exacerbated by "guilty
until proven innocent using standards of proof that are unclear"
that is built into the operational systems.

In theory, we could address this problem by writing a Security
Considerations section that includes "deployment and use of this
mechanism, even by others, undermines the assumption that mail
will either be delivered or NDNs produced and delivered to you
and neither you nor the final recipient will necessarily have
control over the mechanisms and decisions in use".  But that
raises issues that are quite similar to the "decision-making
middlebox not controlled from either endpoint" issue as well as
opening up the issue of whether we need to change the mail model
to be more strongly based  on delivery confirmations.   FWIW,
Security / Operational Considerations like that have been
considered more than adequate to block standardizion... and are
"known technical defects" relative to successful interoperation
with existing and established protocols and models.

> What are the specific problems the mechanism it defines pose
> to "our email model and standards"?

See above.

> What are the specific, "major changes" that would be required
> to the model and standards, to make the current specification
> acceptable?

Again, see above.

> This type of mechanism has massive adoption throughput the
> Internet.  It's perceived efficacy also is massive.  The
> current specification merely seeks to provide a stable
> technical basis for that mechanism.

Another part of the traditional mail model is that any
legitimate actor ought to be able to run his or her own mail
server.  I suspect, based on what is now a fairly large,
although opportunistic, sample, that a very large fraction of
those who are running a mail server on less than a T1/E1 link,
in PD space, and with mail system volume several orders of
magnitude smaller than that of AOL/ Gmail/ Hotmail/ Yahoo have
been burned at least once or twice by these mailing lists.
That implies that these methods are reducing the reliability and
predictability of the email system, which is exactly what Keith
said and, again, is a reason to not standardize.

> In the face of overwhelming community consensus for this
> mechanism, you offer a simple, flat, fundamental rejection,
> yet provide no substantiation.

Unlike you, I don't see "overwhelming community consensus for
this mechanism".   There is probably consensus among those for
whom mail system reliability in terms of delivery of legitimate
messages is less important than deleting spam, and especially
among those whose mail operations are large enough that they
will never find themselves blacklisted (although I vaguely
remember an incident in which some outgoing Gmail addresses
ended up on a blacklist).  But there is no consensus at all
among those of us who see this sort of technique as
operationally dangerous and problematic... so much so as to call
its value into question.

> Really, John, it would help for a posting to do more than say
> that you don't like the idea of the mechanism.

I don't think that characterization of what I (or Keith) said is
fair.  I also don't th

Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Eric Rescorla
At Sat, 08 Nov 2008 08:53:36 -0800,
Dave CROCKER wrote:
> 
> 
> 
> Eric Rescorla wrote:
> > Speaking as someone who just got burned by exactly such a list,
> > I think I need to agree with John: I don't object to the IETF
> > publishing an informational document on this, but a PS implies
> > that IETF endorses the practice, which I don't think we should do.
> 
> 
> Eric,
> 
> Roughly 95% of all mail is spam.  That makes email a pretty onerous 
> "practice".
> 
> So we ought to remove standards status for all email specifications.

I don't think this follows from my comment.


> Or we could consider keeping mechanism and policy separate, standardizing 
> technologies (mechanisms) and refraining from condemning them because some 
> operators have misguided policies and use the mechanisms badly.

This sounds like a false choice to me.


> Really, guys, everything we standardize has examples of misuse.  So that 
> hardly 
> makes your current line of argument substantive.

You're certainly welcome to have that opinion, but I don't think that's
what I'm saying. For the reasons Keith is suggesting, among others,
I don't think this is a very good mechanism and therefore the IETF
shouldn't endorse it. As I said, I don't have a problem with this
document being advanced as Informational, but PS is different.

-Ekr

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Keith Moore
John Levine wrote:
>> standardizing them and formally recommending their use
> 
> I'm not aware of any language in the current draft that recommends
> that people use DNSBLs. 

Standardizing it is an implicit recommendation.  In particular it's a
statement that there are "no known technical omissions" about the
protocol.  Which is not an accurate description of the protocol at hand.

 What it does say is that if you use or
> publish DNSBLs, here's how they work so you can, you know,
> interoperate and all that.  As I'm sure everyone is aware, there are
> large numbers of independently written implementations, both
> publishers and users of DNSBLs, so they seem ripe to me for
> standardization.

So there's a clear justification for an Informational document
describing current practice - and also what's wrong with it.
Widespread deployment is not a justification for standardization.

Keith
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Steven M. Bellovin
On 8 Nov 2008 17:05:00 -
John Levine <[EMAIL PROTECTED]> wrote:

> > standardizing them and formally recommending their use
> 
> I'm not aware of any language in the current draft that recommends
> that people use DNSBLs.  What it does say is that if you use or
> publish DNSBLs, here's how they work so you can, you know,
> interoperate and all that. 

I hear you -- but http://xkcd.com/463/ comes to mind.


--Steve Bellovin, http://www.cs.columbia.edu/~smb
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread John Levine
> standardizing them and formally recommending their use

I'm not aware of any language in the current draft that recommends
that people use DNSBLs.  What it does say is that if you use or
publish DNSBLs, here's how they work so you can, you know,
interoperate and all that.  As I'm sure everyone is aware, there are
large numbers of independently written implementations, both
publishers and users of DNSBLs, so they seem ripe to me for
standardization.

> standards for what gets addresses onto --and, more important, off
> of-- those lists.

Some other people are working on a separate document codifying best
practices based on the experience of both people who run widely used
highly accurate DNSBLs and operators of large mail systems that use
them.  It should come along in the next month or so and might be BCP
or Informational.

But I have to say I am concerned that it will be picked to death by
people whose opinions of DNSBLs haven't been reexamined since they
were formed based on anecdotes in the late 1990s.  If you want to
start picking now, feel free to do so on the ASRG list.  For links see
http://wiki.asrg.sp.am

R's,
John
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Keith Moore
Dave,

you're mischaracterizing the situation and you ought to know better.

basing reputation on IP address is pretty dubious.
transmitting reputation over DNS is not "otherwise-acceptable"

and there's at least some argument to be made that this choice of
mechanism lends itself to abuse, or even encourages it.

and it appears that there's considerably less than rough consensus in
favor of DNSBLs ... especially if you ask people whose mail has been
blocked because of them.

Keith


> Eric,
> 
> Roughly 95% of all mail is spam.  That makes email a pretty onerous
> "practice".
> 
> So we ought to remove standards status for all email specifications.
> 
> Or we could consider keeping mechanism and policy separate,
> standardizing technologies (mechanisms) and refraining from condemning
> them because some operators have misguided policies and use the
> mechanisms badly.
> 
> Really, guys, everything we standardize has examples of misuse.  So that
> hardly makes your current line of argument substantive.
> 
> Are you actually saying that there is something inherently inappropriate
> in having published reputation lists and that a technical standards body
> like the IETF is tasked with rejecting standardization of
> otherwise-acceptable technical specifications because we don't like how
> some people will use them?
> 
> Are you seriously lobbying for the IETF to be an idealistic island that
> ignores rough consensus and very well-established practice among the
> broader Internet community?
> 
> d/
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Dave CROCKER



Eric Rescorla wrote:

Speaking as someone who just got burned by exactly such a list,
I think I need to agree with John: I don't object to the IETF
publishing an informational document on this, but a PS implies
that IETF endorses the practice, which I don't think we should do.



Eric,

Roughly 95% of all mail is spam.  That makes email a pretty onerous "practice".

So we ought to remove standards status for all email specifications.

Or we could consider keeping mechanism and policy separate, standardizing 
technologies (mechanisms) and refraining from condemning them because some 
operators have misguided policies and use the mechanisms badly.


Really, guys, everything we standardize has examples of misuse.  So that hardly 
makes your current line of argument substantive.


Are you actually saying that there is something inherently inappropriate in 
having published reputation lists and that a technical standards body like the 
IETF is tasked with rejecting standardization of otherwise-acceptable technical 
specifications because we don't like how some people will use them?


Are you seriously lobbying for the IETF to be an idealistic island that ignores 
rough consensus and very well-established practice among the broader Internet 
community?


d/
--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Keith Moore
Ned Freed wrote:
>> Sadly, I have to agree with Keith.   While these lists are a
>> fact of life today, and I would favor an informational document
>> or document that simply describes how they work and the issues
>> they raise, standardizing them and formally recommending their
>> use is not desirable at least without some major changes in our
>> email model and standards for what gets addresses onto --and,
>> more important, off of-- those lists.
> 
> Such a criticism might be a sensible response to a document that defines an
> actual whitelisting or blacklisting service. But that's not what this document
> does. Rather, this document defines vaarious formats for storing such
> information in the DNS and procedures for querying that data. Specification of
> actual services based on these formats and procedures is left for later
> specifications.
> 
> Standardizing these formats and procedures is important for at least two
> reasons: (1) Without a specification nailing down these details there can be
> (and in practice have been) interoperability problems between various
> implementations and (2) Without something describing how to structure and
> operate these systems they can, independent of the actual list content, create
> serious operational problems.

I could almost buy this argument.  The reasons I don't buy it in this
case are:

(1) using the IP source address as an indicator of any kind of identity
has been dubious for a long time (even in an enterprise network, but
especially in the Internet at large), and it is only going to get more
dubious in an era of IPv4/IPv6 transition where IPv4 addresses are
shared between different entities.

(2) use of DNS to communicate this information is a stretch at best.
the protocol is too constrained, and not designed for a use case like
this where the information that needs to be conveyed is very short-lived
in nature.

(3) the security considerations associated with such use, including
considerations for denial-of-service attack, are quite difficult to address.

so I think there's a compelling case to be made that any kind of DNSBL
is a poor design not worthy of standardization.

> Now, I am of course aware of the line of reasoning that says we should not
> publish specifications for things that can potentially be abused. I'm sorry,
> but if we take a candid look at how this strategy has played out with other
> technologies ranging from MIME downgrading to NAT to Bonjour, I think the
> record is fairly clear: We're much better off specifying things while calling
> out the dangers of their use than we are when we all run off out our 
> respective
> corners and pout about the sad state of the world.

I don't think the examples you cite demonstrate that.  Standardizing
NATs in the 1990s would not have helped because the widespread
assumptions at that time were that you couldn't really change NAT
behavior and that the NATs had to operate "transparently" to the
applications.  Even today we still don't know how to make a NAT that
works well, without making the endpoints aware of the NAT, and giving
them explicit control over bindings.

As for Bonjour, I at least did try to call out dangers of the use of
IPv4 linklocal addresses, and with overloading DNS names and APIs, and
the WG repeatedly, stubbornly denied that those dangers existed and
continued to do so until IESG pushed back on at least some of those points.

But of course the question is not whether something like this can be
abused - anything can be abused.  The question is whether something like
this encourages abuse, or if not deliberate abuse, whether it encourages
 degraded reliability of the email system.  And I think there's a fair
amount of empirical evidence that it does.

That doesn't mean that we shouldn't try to design a better system for
identifying and reporting sources of spam or viruses.  But to me it
seems entirely plausible that relying on DNS to transmit this
information is part of the reason that DNSBLs are so often associated
with abuse and denial-of-service attack.  If we were designing such a
system from scratch we'd naturally be concerned about things like
accountability, repeatability, polling intervals, and identifying the
precise criteria used to blacklist an address.  We'd probably want to
expose more information to the client about why a site was blacklisted,
when it was blacklisted, and so forth, so that the client wouldn't be
bouncing mail without a good reason.  But trying to shoehorn this kind
of service into DNS forces most of these considerations to be overlooked
simply because there's not a good way to communicate them in DNS.

Really what this document is trying to do is to standardize a crude hack
- as well as being a blatant attempt at an end-run around our concensus
processes.  Publishing it as informational, with appropriate caveats
about the inherent limitations of the approach (including security
considerations) could be beneficial.  But I can't see how the prot

Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Eric Rescorla
At Sat, 08 Nov 2008 06:46:54 -0500,
John C Klensin wrote:
> 
> Sadly, I have to agree with Keith.   While these lists are a
> fact of life today, and I would favor an informational document
> or document that simply describes how they work and the issues
> they raise, standardizing them and formally recommending their
> use is not desirable at least without some major changes in our
> email model and standards for what gets addresses onto --and,
> more important, off of-- those lists.

Speaking as someone who just got burned by exactly such a list,
I think I need to agree with John: I don't object to the IETF
publishing an informational document on this, but a PS implies
that IETF endorses the practice, which I don't think we should do.
I appreciate that there is a fine distinction here, but it seems
to me that it's precisely for cases like this where the distinction
is appropriate.

-Ekr
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread Dave CROCKER



John C Klensin wrote:

Sadly, I have to agree with Keith.   While these lists are a
fact of life today, and I would favor an informational document
or document that simply describes how they work and the issues
they raise, standardizing them and formally recommending their
use is not desirable at least without some major changes in our
email model and standards for what gets addresses onto --and,
more important, off of-- those lists.



John,

What are the technical deficiencies of this specification?

What are the specific problems the mechanism it defines pose to "our email model 
and standards"?


What are the specific, "major changes" that would be required to the model and 
standards, to make the current specification acceptable?


This type of mechanism has massive adoption throughput the Internet.  It's 
perceived efficacy also is massive.  The current specification merely seeks to 
provide a stable technical basis for that mechanism.


In the face of overwhelming community consensus for this mechanism, you offer a 
simple, flat, fundamental rejection, yet provide no substantiation.


Really, John, it would help for a posting to do more than say that you don't 
like the idea of the mechanism.


d/
--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread ned+ietf
> Sadly, I have to agree with Keith.   While these lists are a
> fact of life today, and I would favor an informational document
> or document that simply describes how they work and the issues
> they raise, standardizing them and formally recommending their
> use is not desirable at least without some major changes in our
> email model and standards for what gets addresses onto --and,
> more important, off of-- those lists.

Such a criticism might be a sensible response to a document that defines an
actual whitelisting or blacklisting service. But that's not what this document
does. Rather, this document defines vaarious formats for storing such
information in the DNS and procedures for querying that data. Specification of
actual services based on these formats and procedures is left for later
specifications.

Standardizing these formats and procedures is important for at least two
reasons: (1) Without a specification nailing down these details there can be
(and in practice have been) interoperability problems between various
implementations and (2) Without something describing how to structure and
operate these systems they can, independent of the actual list content, create
serious operational problems.

Now, I am of course aware of the line of reasoning that says we should not
publish specifications for things that can potentially be abused. I'm sorry,
but if we take a candid look at how this strategy has played out with other
technologies ranging from MIME downgrading to NAT to Bonjour, I think the
record is fairly clear: We're much better off specifying things while calling
out the dangers of their use than we are when we all run off out our respective
corners and pout about the sad state of the world.

Assuming that the document does in fact define sensible formats that can be
operated at Internet scale (I think it does but am willing to be shown
otherwise by those with more expertise in large-scale DNS operations than I
have) and does not preclude operating a reliable and accountable service
(again, I think it does but I am willing to be proved wrong with specific
examples), I support publication of this specification. 

Ned
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-08 Thread John C Klensin
Sadly, I have to agree with Keith.   While these lists are a
fact of life today, and I would favor an informational document
or document that simply describes how they work and the issues
they raise, standardizing them and formally recommending their
use is not desirable at least without some major changes in our
email model and standards for what gets addresses onto --and,
more important, off of-- those lists.

john


--On Friday, 07 November, 2008 18:38 -0500 Keith Moore
<[EMAIL PROTECTED]> wrote:

> DNSBLs work to degrade the interoperability of email, to make
> its delivery less reliable and system less accountable for
> failures.  They do NOT meet the "no known technical omissions"
> criterion required of standards-track documents.
> 
> The fact that they are widely used is sad, not a justification
> for standardization.




___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-irtf-asrg-dnsbl (DNS Blacklists and Whitelists)

2008-11-07 Thread Keith Moore
DNSBLs work to degrade the interoperability of email, to make its
delivery less reliable and system less accountable for failures.  They
do NOT meet the "no known technical omissions" criterion required of
standards-track documents.

The fact that they are widely used is sad, not a justification for
standardization.

> 
> As an operator of a large mail domain, I'd like to reiterate John's
> comments above.  DNSBLs work, are very cost (and computationally)
> effective, and are in widespread use.
> 
> Regards
> Jason
> ___
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


  1   2   >