Re: your mail

2002-08-21 Thread Martin Hannigan


At 12:32 AM 8/21/2002 -0400, David Lesher wrote:

Unnamed Administration sources reported that N. Richard Solis said:
 
 
  If you haven't worked in an environment where you had to turn in your
  cellphone and pager at the front desk, show a badge to a camera around 
 every
  corner, and get your office keys from a vending machine you dont know what
  real security looks like.

You missed the places w/ real security. That's where the very
polite Marine Security Guard with the 870 shotgun asks to see
your badge again...


Can we all stop talking shit for a moment?

Real security is when nobody can talk about it.





Regards,

--
Martin Hannigan[EMAIL PROTECTED]




Re[2]: your mail

2002-08-21 Thread Richard Welty


On Wed, 21 Aug 2002 00:32:24 -0400 (EDT) David Lesher [EMAIL PROTECTED] wrote:
 Unnamed Administration sources reported that N. Richard Solis said:
  If you haven't worked in an environment where you had to turn in your
  cellphone and pager at the front desk, show a badge to a camera around
 every
  corner, and get your office keys from a vending machine you dont know
 what
  real security looks like.
 
 You missed the places w/ real security. That's where the very
 polite Marine Security Guard with the 870 shotgun asks to see
 your badge again...

or you're standing in the parking lot, and suddenly find yourself
surrounded by men in suits carrying mac-10s.

richard
--
Richard Welty [EMAIL PROTECTED]
Averill Park Networking 518-573-7592
  Unix, Linux, IP Network Engineering, Security





RE: your mail

2002-08-21 Thread N. Richard Solis


Who did you think held the cellphone and the pager? :-)

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
David Lesher
Sent: Wednesday, August 21, 2002 12:32 AM
To: nanog list
Subject: Re: your mail



Unnamed Administration sources reported that N. Richard Solis said:


 If you haven't worked in an environment where you had to turn in your
 cellphone and pager at the front desk, show a badge to a camera around
every
 corner, and get your office keys from a vending machine you dont know what
 real security looks like.

You missed the places w/ real security. That's where the very
polite Marine Security Guard with the 870 shotgun asks to see
your badge again...



--
A host is a host from coast to [EMAIL PROTECTED]
 no one will talk to a host that's close[v].(301) 56-LINUX
Unless the host (that isn't close).pob 1433
is busy, hung or dead20915-1433




RE: Shared facilities (was Re: your mail)

2002-08-21 Thread N. Richard Solis


Sean,

For a lot of people, these locations are a place to store an entire web
presence.  That might include order information or private email or credit
card records for an entire day's transactions.  My feeling is that the
general purpose of security at these locations is to make sure that no one
is tampering with any equipment in any way, to include unauthorized removal.

That was the point of my previous email.  The connections to those machines
and the data stored on them is what is of value in those locations, not the
physical security of the people.

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Sean Donelan
Sent: Wednesday, August 21, 2002 2:03 AM
To: [EMAIL PROTECTED]
Subject: Shared facilities (was Re: your mail)



On Wed, 21 Aug 2002, David Lesher wrote:
 Unnamed Administration sources reported that N. Richard Solis said:
  If you haven't worked in an environment where you had to turn in your
  cellphone and pager at the front desk, show a badge to a camera around
every
  corner, and get your office keys from a vending machine you dont know
what
  real security looks like.
 You missed the places w/ real security. That's where the very
 polite Marine Security Guard with the 870 shotgun asks to see
 your badge again...

Sigh, and in places with real security you rarely find enemies/competitors
sitting in the same room.  Exchange points are like the United Nations,
not high security military bases.  AMS-IX, Equinix, Linx/Telehouse, PAIX,
etc provide a neutral facility for competitors to exchange network traffic.
The facility operators provide a reasonable level of security, and try to
keep the diplomats from punching each other.  Its in all (most?) the
competitors' self-interest to follow the rules.

Let's not lose sight of the purpose of colocation/exchange points.
If we start requiring you to be a US citizen and have top secret
clearance in order to enter a colocation facility, we've probably
decreased the usefulness of the exchange points.





Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread sjj


 what are the more basic problems you're trying to fix?
   
 I'd like to be able to publish DNS records announcing my domain's *outbound*
mail servers, with nice abbreviated forms to say they're the same as my
inbound (MX) records or any IP in x.y.z/24.  Then cooperative ISPs (like say
America Online) could refuse any email from my domain that originated from some
random cable modem, instead of accepting it and then flooding me with 2
bounce messages.

 Spam?

 Yeh, but it would also help with things like KLEZ.



RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Robert Blayzor


  I'd like to be able to publish DNS records announcing my 
 domain's *outbound*
 mail servers, with nice abbreviated forms to say they're the 
 same as my
 inbound (MX) records or any IP in x.y.z/24.  Then 
 cooperative ISPs (like say
 America Online) could refuse any email from my domain that 
 originated from some
 random cable modem, instead of accepting it and then flooding 
 me with 2
 bounce messages.

It's almost to the point to where mail servers need their own
registrar, sort of the way domains are tracked now, track mail
servers.  Give mail server admins the option to accept mail from
registered mail servers only or from any mail server.  Of course there
would need to be a ramp up period, like six months to a year, to make
sure all of your mail servers are registered.  And of course one should
only be able to register mail servers if the IP space is actually SWIP
to them.  If the IP space is NOT SWIP, it would need to be registered by
the customer ISP or via owners rwhois server.  Just my $.02; for what
it's worth 

--
Robert Blayzor, BOFH
INOC, LLC
[EMAIL PROTECTED]

When all else fails, let a = 7.  If that doesn't help, then read the
manual.




Re: your mail

2002-08-21 Thread Pawlukiewicz Jane


Sounds like a nuclear power plant I used to work at. Except the nuke
plants don't trust the marines to do the job. They hire and train their
own security teams. 

I had to go through more screening to work there than anything I've gone
through re security clearances and the government. The scary thing is,
(IMHO) the nuclear industry is being held up as the model for all other
industries re security. 

Of course, there isn't the issue of many companies sharing one facility,
which makes things far more interesting. A colo is no place for guns,
imho.

Jane

David Lesher wrote:
 
 Unnamed Administration sources reported that N. Richard Solis said:
 
 
  If you haven't worked in an environment where you had to turn in your
  cellphone and pager at the front desk, show a badge to a camera around every
  corner, and get your office keys from a vending machine you dont know what
  real security looks like.
 
 You missed the places w/ real security. That's where the very
 polite Marine Security Guard with the 870 shotgun asks to see
 your badge again...
 
 --
 A host is a host from coast to [EMAIL PROTECTED]
  no one will talk to a host that's close[v].(301) 56-LINUX
 Unless the host (that isn't close).pob 1433
 is busy, hung or dead20915-1433



Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Ron da Silva


On Wed, Aug 21, 2002 at 10:00:02AM -0400, [EMAIL PROTECTED] wrote:
 
  what are the more basic problems you're trying to fix?

  I'd like to be able to publish DNS records announcing my domain's *outbound*
 mail servers, with nice abbreviated forms to say they're the same as my
 inbound (MX) records or any IP in x.y.z/24.  Then cooperative ISPs (like say
 America Online) could refuse any email from my domain that originated from some
 random cable modem, instead of accepting it and then flooding me with 2
 bounce messages.

What about this email from you which came to me from Merit and not your
mail server?  Would break mailing lists and listserves unless the from
field is overwritten.

-ron



Eliminating physical colocation (was Re: Shared facilities)

2002-08-21 Thread Sean Donelan


On Wed, 21 Aug 2002, Martin Hannigan wrote:
 Since Sept 11, my experience probably doesn't cut the mustard, but that's
 how it has been to this point.

Consider the various public statements on colocation security.

http://www.state.ma.us/dpu/catalog/6688.htm

   Verizon MA believes that the most effective means of ensuring network
   safety and reliability is to eliminate physical collocation entirely in
   all its COs, converting existing physical collocation arrangements to
   virtual and requiring that all future collocation arrangements be
   virtual only.

Of course, this is a very different colocation model than used by
companies such as Equinix.  Just because they use the same terms doesn't
make them the same thing.





Re: Eliminating physical colocation (was Re: Shared facilities)

2002-08-21 Thread Mike Leber



LOL, heck of a way to make it so they never have to sell another unbundled
network element.

Mike.

On Wed, 21 Aug 2002, Sean Donelan wrote:

 
 On Wed, 21 Aug 2002, Martin Hannigan wrote:
  Since Sept 11, my experience probably doesn't cut the mustard, but that's
  how it has been to this point.
 
 Consider the various public statements on colocation security.
 
 http://www.state.ma.us/dpu/catalog/6688.htm
 
Verizon MA believes that the most effective means of ensuring network
safety and reliability is to eliminate physical collocation entirely in
all its COs, converting existing physical collocation arrangements to
virtual and requiring that all future collocation arrangements be
virtual only.
 
 Of course, this is a very different colocation model than used by
 companies such as Equinix.  Just because they use the same terms doesn't
 make them the same thing.
 
 

+- H U R R I C A N E - E L E C T R I C -+
| Mike Leber   Direct Internet Connections   Voice 510 580 4100 |
| Hurricane Electric Web Hosting  Colocation   Fax 510 580 4151 |
| [EMAIL PROTECTED]   http://www.he.net |
+---+




QWest internet the 1996 Telecom Act

2002-08-21 Thread Andy



[Searching the NANOG archives, I haven't found this topic yet]



Can anyone confirm either of the following:

  -the 1996 Telecom Act restricts baby bells from exchanging internet
   traffic directly to each other.

  -that any other baby bell besides QWest is claiming this restriction.


The new QWest addition to our internet feeds is restricted to their 14
state operating region.  Traffic outside of the region has to traverse
qwest.net, then tamerica.net, then uswest.net before it gets out.

Personally, I do not see where in the 96TA restrictions apply to internet
traffic - only to long distance.  It feels to me they are using this to
pressure FCC/PSC leadership.  QWest's [271] filing to have 4 of their 14
states join long-distance suggests their 'regional' network will be
getting even smaller.


---
Andy Dalrymple
XMission Telecom Mgr.   (8/21/02)





Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Gary E. Miller


Yo Avleen!

On Wed, 21 Aug 2002, batz wrote:

 Spam is very much a security problem.

 Spam would not exist if both MUA's and MTA's had adequate policy
 enforcement features on them, so that users could set granular
 controls on what was allowed into their mailboxes.

Nice try, but not close enough.

Spam is a LEGAL problem.

There are many cases where spammers negotiated a service contract with
out anti-spamming clauses.  Then when the ISP figures out they have
a bulk spammer for a custmoer they can not shut down the spammer because
the spammer gets a court order to enforce the service agreement.

Same goes on the other side.  Many BLs have been sued, AND LOST, for
putting spammers on their BLs.

Put those two together and no technical solution will fix the problem.

If legislatures say Pi is equal to 3 then there is not much we
can do to fix it except fight the legislature.

RGDS
GARY
---
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
[EMAIL PROTECTED]  Tel:+1(541)382-8588 Fax: +1(541)382-8676





DNS entries for infrastructure equipment

2002-08-21 Thread Dan Lockwood
Title: Message



Does anyone have a 
resource that has recommendations about how to name interfaces in a DNS name 
space? Is there a standard that is used? TIA

Dan 
Lockwood


Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread batz


On Wed, 21 Aug 2002, Gary E. Miller wrote:

: Spam would not exist if both MUA's and MTA's had adequate policy
: enforcement features on them, so that users could set granular
: controls on what was allowed into their mailboxes.
:
:Nice try, but not close enough.
:
:Spam is a LEGAL problem.

Actually, I'm bang on. :) 

It's not a legal problem, yet. The reason for this is that there 
is no legal definition of spam that is applicable outside a small
number of jurisdictions. In fact, there is no single 
comprehensive definition of spam other than that its most 
consistent attribute, which is users inability to filter it 
without losing legitimate mail. 

Look at CAUCE, Brightmail, SpamAssassin. None of them provide 
a comprehensive definition of all spam, rather, they define it by
some of its effects, or deal with it as a matter of heuristic 
scoring. 

By looking at its one unique attribute, we see that it is a direct
leveraging/exploitation of the openness of the SMTP protocol and 
the culture of the Internet SMTP was designed to serve.  

That openness used to be the social contract of email, now it 
is simply a lack of enforcable policy and tools. 


:There are many cases where spammers negotiated a service contract with
:out anti-spamming clauses.  Then when the ISP figures out they have
:a bulk spammer for a custmoer they can not shut down the spammer because
:the spammer gets a court order to enforce the service agreement.

Yes, but that does not give the end recipient any direct recourse, 
and also defines spam as a contract violation between an ISP and its
client, and has no regard for the messages themselves. 

:Put those two together and no technical solution will fix the problem.

Actually it will. The model that TMDA uses (whitelists and confirmed
corespondant registration with the recipient) is partial  example of a 
solution that will make all spam an explicit case of unauthorized 
access, which can then be a legal issue. 

One of the most basic principles of computer security is:  
No Policy = No Crime.  Until users have adequate tools and 
protocol support to control of what comes into their mailboxes, 
there will be spam. 

Cheers, 

--
batz




RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Robert Blayzor


 Really good idea (no sarcasm, I actually like it).. But what 
 stops spammers
 from registering their mail server?..Ie..
   1) Get a dsl account
   2) Ips get swipped to you
   3) Register the server
   4) SPAM 
   5) Apologize, get a second chance
   6) get booted off
   7) Call the next ISP with a zero install
   8) Rinse and repeat.

Treat them sort of like SSL certs now.  Charge an annual registrar fee
per company, not per server. (Something like $100 a year)  The more they
have to go out of their way to get their spam server online, the more
they would be deterred to do so.  They're only going to want to change
so many ISP's, go through SWIP and then change their legal name for the
registrar so many times.

--
Robert Blayzor, BOFH
INOC, LLC
[EMAIL PROTECTED]

Life would be much easier if I had the source code.




Re: DNS entries for infrastructure equipment

2002-08-21 Thread jnull


Dan Lockwood([EMAIL PROTECTED])@2002.08.21 12:16:20 +:
 Does anyone have a resource that has recommendations about how to name
 interfaces in a DNS name space?  Is there a standard that is used?  TIA
  
 Dan Lockwood

I'm certain there are some good resources available, but f
m my experience, the most important thing is to work your convention to integrate with 
you exising or proposed management systems. If your managment system only works from a 
set domain (i.e. xyz.abc.net--abc being your company and xyz being a subsection) then 
that label xyz should only have dashes and not periods, otherwise they become a domain 
themselves.

So, it may depend on the size of your network:
primary device: r1.company.net
interface name: pos1-2-r1.company.net
or  pos1-2.r1.company.net 
or if you're there is need
primary device: r1.area-or-function.company.net
...ect...
There may be some customization involved with using domain subsets, but using insert 
lang scripts you can parse at either - or . do retrieve information. So, unless 
size demains creating subsections I would keep the whole name in the top label by 
using dashes.


sig=$header




.mil domain root only hosted by one server??

2002-08-21 Thread Vinny Abello


I just stumbled across something I thought was interesting. All the .mil 
domain names used by the U.S. Military are served by one single root 
server. I thought that was a bit odd. I'm sure that one server is more than 
enough to handle the queries for all the .mil domains with no problem, but 
it doesn't seem very redundant or safe at all. Especially for something our 
military uses. There's something that could be beefed up a little bit. My 
other thought (which others may know) was that perhaps the military runs 
G.ROOT-SERVERS.NET and I'm just not aware of it. Maybe it's a policy to 
only run .mil on what they can control? Even still, I think it might be in 
their best interest to setup a few more.

These are the results I got when I queried A.ROOT-SERVERS.NET:

;  DiG 9.2.1  @a.root-servers.net mil.
;; global options:  printcmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 41
;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;mil.   IN  A

;; AUTHORITY SECTION:
mil.86400   IN  SOA G.ROOT-SERVERS.NET. 
HOSTMASTER.N
IC.mil. 2002082000 3600 900 1209600 86400

;; Query time: 390 msec
;; SERVER: 198.41.0.4#53(a.root-servers.net)
;; WHEN: Wed Aug 21 15:38:58 2002
;; MSG SIZE  rcvd: 90


I'd like comments from anyone with more information on this. I'm just 
curious as to why it is this way and what the reasoning behind it is. Maybe 
I'll email hostmaster.nic.mil and ask. ;)

Vinny Abello
Network Engineer
Server Management
[EMAIL PROTECTED]
(973)300-9211 x 125
(973)940-6125 (Direct)
PGP Key Fingerprint: 3BC5 9A48 FC78 03D3 82E0  E935 5325 FBCB 0100 977A

Tellurian Networks - The Ultimate Internet Connection
http://www.tellurian.com (888)TELLURIAN




RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Robert Blayzor


 I really like this. A sort of IRR for mail servers. Maybe when
 registered it could even check if the server was an open 
 relay, and not
 allow those servers to be registered until properly configured. Any
 thoughts?

Righto, that would all be part of a registration process.  As well as
things like forward and reverse DNS matching for the mail server, etc.
But whos to say that once they pass the test they just open up things.

As well as the registrar, there would have to be a complaint and
investigation department.  But going that far legally tends to destroy
good ideas.  The most important things is the legal handling of
exceptions and complaints and the actual steps on getting someone shut
off.  We all know how people are sue happy...

--
Robert Blayzor, BOFH
INOC, LLC
[EMAIL PROTECTED]

Exclusive: We're the only ones who have the documentation.




Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Jared Mauch


I'd seen back in the mid 1990s a user that got banned from
all the isps on his island (or fairly close to it) due to
abuse of services.

obviously when you have a set of only 3-4 isps to choose from
this makes it a lot easier to keep the guy from doing anything evil.

but these days everyone that can negotiate a bulk-dial
agreement with someone and run a radius server can sign up
users and make the abuse a bit harder to track ...

i do think some sort of smtp-callback would be nice/useful
for validation of e-mail addresses.  it'll make it so
the bounces go to someplace at least instead of Postmaster.

- jared


On Wed, Aug 21, 2002 at 03:29:46PM -0400, Robert Blayzor wrote:
 
  Really good idea (no sarcasm, I actually like it).. But what 
  stops spammers
  from registering their mail server?..Ie..
  1) Get a dsl account
  2) Ips get swipped to you
  3) Register the server
  4) SPAM 
  5) Apologize, get a second chance
  6) get booted off
  7) Call the next ISP with a zero install
  8) Rinse and repeat.
 
 Treat them sort of like SSL certs now.  Charge an annual registrar fee
 per company, not per server. (Something like $100 a year)  The more they
 have to go out of their way to get their spam server online, the more
 they would be deterred to do so.  They're only going to want to change
 so many ISP's, go through SWIP and then change their legal name for the
 registrar so many times.
 
 --
 Robert Blayzor, BOFH
 INOC, LLC
 [EMAIL PROTECTED]
 
 Life would be much easier if I had the source code.

-- 
Jared Mauch  | pgp key available via finger from [EMAIL PROTECTED]
clue++;  | http://puck.nether.net/~jared/  My statements are only mine.



RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Robert Blayzor


 I'm not a company, I'm Joe Blow private citizen - do you expect me to
 pay $100 just to sign up with AOL? 

If you are Joe Blow private citizen, why would you need to run a mail
server?  Would you not use your ISP's, at least as a smart relay?  If
running a mail server is that important to you, just like registering a
domain, you'll pay it.

--
Robert Blayzor, BOFH
INOC, LLC
[EMAIL PROTECTED]

Profanity is the one language all programmers know best.




Re: .mil domain root only hosted by one server??

2002-08-21 Thread Valdis . Kletnieks

On Wed, 21 Aug 2002 15:46:22 EDT, Vinny Abello [EMAIL PROTECTED]  said:
 I just stumbled across something I thought was interesting. All the .mil 
 domain names used by the U.S. Military are served by one single root 
 server. I thought that was a bit odd. I'm sure that one server is more than 

The fact that you only see one doesn't mean there's only one.  And note
that the .MIL domain perhaps has a vested interest in *NOT* having a fully
redundant view of the world accessible from outside.  Sure, it's one point
of failure - but if you're battening down the hatches because of an attack,
it's also a one-stop place to cut yourself off
-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg04612/pgp0.pgp
Description: PGP signature


Re: .mil domain root only hosted by one server??

2002-08-21 Thread Vinny Abello


Ooops... My apologies (before I get slammed). I forgot the query type of NS 
in my dig.

;  DiG 9.2.1  @a.root-servers.net ns mil.
;; global options:  printcmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 41
;; flags: qr aa rd; QUERY: 1, ANSWER: 11, AUTHORITY: 0, ADDITIONAL: 11

;; QUESTION SECTION:
;mil.   IN  NS

;; ANSWER SECTION:
mil.86400   IN  NS  E.ROOT-SERVERS.NET.
mil.86400   IN  NS  PAC2.NIPR.mil.
mil.86400   IN  NS  CON1.NIPR.mil.
mil.86400   IN  NS  B.ROOT-SERVERS.NET.
mil.86400   IN  NS  A.ROOT-SERVERS.NET.
mil.86400   IN  NS  EUR1.NIPR.mil.
mil.86400   IN  NS  PAC1.NIPR.mil.
mil.86400   IN  NS  H.ROOT-SERVERS.NET.
mil.86400   IN  NS  G.ROOT-SERVERS.NET.
mil.86400   IN  NS  CON2.NIPR.mil.
mil.86400   IN  NS  EUR2.NIPR.mil.

;; ADDITIONAL SECTION:
E.ROOT-SERVERS.NET. 360 IN  A   192.203.230.10
PAC2.NIPR.mil.  86400   IN  A   199.252.155.234
CON1.NIPR.mil.  86400   IN  A   199.252.175.234
B.ROOT-SERVERS.NET. 360 IN  A   128.9.0.107
A.ROOT-SERVERS.NET. 360 IN  A   198.41.0.4
EUR1.NIPR.mil.  86400   IN  A   199.252.154.234
PAC1.NIPR.mil.  86400   IN  A   199.252.180.234
H.ROOT-SERVERS.NET. 360 IN  A   128.63.2.53
G.ROOT-SERVERS.NET. 360 IN  A   192.112.36.4
CON2.NIPR.mil.  86400   IN  A   199.252.173.234
EUR2.NIPR.mil.  86400   IN  A   199.252.143.234

;; Query time: 500 msec
;; SERVER: 198.41.0.4#53(a.root-servers.net)
;; WHEN: Wed Aug 21 16:07:56 2002
;; MSG SIZE  rcvd: 412


That's better. :) Go back to your regularly scheduled threads.

At 03:04 PM 8/21/2002 -0500, you wrote:
On Wed, Aug 21, 2002 at 03:46:22PM -0400, Vinny Abello wrote:
 
  I just stumbled across something I thought was interesting. All the .mil
  domain names used by the U.S. Military are served by one single root
  server. I thought that was a bit odd. I'm sure that one server is more 
 than
  enough to handle the queries for all the .mil domains with no problem, but
  it doesn't seem very redundant or safe at all. Especially for something 
 our
  military uses. There's something that could be beefed up a little bit. My
  other thought (which others may know) was that perhaps the military runs
  G.ROOT-SERVERS.NET and I'm just not aware of it. Maybe it's a policy to
  only run .mil on what they can control? Even still, I think it might be in
  their best interest to setup a few more.
 
  These are the results I got when I queried A.ROOT-SERVERS.NET:
 
  ;  DiG 9.2.1  @a.root-servers.net mil.
  ;; global options:  printcmd
  ;; Got answer:
  ;; -HEADER- opcode: QUERY, status: NOERROR, id: 41
  ;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
 
  ;; QUESTION SECTION:
  ;mil.   IN  A
 
  ;; AUTHORITY SECTION:
  mil.86400   IN  SOA G.ROOT-SERVERS.NET.
  HOSTMASTER.N
  IC.mil. 2002082000 3600 900 1209600 86400
 
U. The SOA MNAME field is always a single server.

bastet[~]$ dig +short mil ns @g.root-servers.net
PAC1.NIPR.mil.
H.ROOT-SERVERS.NET.
G.ROOT-SERVERS.NET.
CON2.NIPR.mil.
EUR2.NIPR.mil.
E.ROOT-SERVERS.NET.
PAC2.NIPR.mil.
CON1.NIPR.mil.
B.ROOT-SERVERS.NET.
A.ROOT-SERVERS.NET.
EUR1.NIPR.mil.
bastet[~]$

-Pete


Vinny Abello
Network Engineer
Server Management
[EMAIL PROTECTED]
(973)300-9211 x 125
(973)940-6125 (Direct)
PGP Key Fingerprint: 3BC5 9A48 FC78 03D3 82E0  E935 5325 FBCB 0100 977A

Tellurian Networks - The Ultimate Internet Connection
http://www.tellurian.com (888)TELLURIAN




RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Larry Rosenman


What about individuals that run their own mail servers?  (E.G. me).? 



On Wed, 2002-08-21 at 14:28, Derek Samford wrote:
 
 I really like this. A sort of IRR for mail servers. Maybe when
 registered it could even check if the server was an open relay, and not
 allow those servers to be registered until properly configured. Any
 thoughts?
 
 Derek
 
  -Original Message-
  From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf
 Of
  Mark Segal
  Sent: Wednesday, August 21, 2002 3:12 PM
  To: 'Robert Blayzor'; [EMAIL PROTECTED]
  Subject: RE: IETF SMTP Working Group Proposal at smtpng.org
  
  
   It's almost to the point to where mail servers need their own
   registrar, sort of the way domains are tracked now, track
   mail servers.  Give mail server admins the option to accept
   mail from registered mail servers only or from any mail
   server.  Of course there would need to be a ramp up period,
   like six months to a year, to make sure all of your mail
   servers are registered.  And of course one should only be
   able to register mail servers if the IP space is actually
   SWIP to them.  If the IP space is NOT SWIP, it would need to
   be registered by the customer ISP or via owners rwhois
   server.  Just my $.02; for what it's worth
  
  Really good idea (no sarcasm, I actually like it).. But what stops
  spammers
  from registering their mail server?..Ie..
  1) Get a dsl account
  2) Ips get swipped to you
  3) Register the server
  4) SPAM
  5) Apologize, get a second chance
  6) get booted off
  7) Call the next ISP with a zero install
  8) Rinse and repeat.
  
  
  Regards,
  Mark
  
  --
  Mark Segal
  Director, Data Services
  Futureway Communications Inc.
  Tel: (905)326-1570
 
-- 
Larry Rosenman http://www.lerctr.org/~ler
Phone: +1 972-414-9812 E-Mail: [EMAIL PROTECTED]
US Mail: 1905 Steamboat Springs Drive, Garland, TX 75044-6749




RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Robert Blayzor


 What about individuals that run their own mail servers?  (E.G. me).? 

Get your mail server registered just like everyone else I suppose.  If
your address space is not registered to you directly, your ISP would
have to do this for you.  You're ISP would then handle any complaints
(if any) from the registrar and coordinate it with you directly.  I
honestly like that idea because as a network operator, I like to know
what customers are running mail servers on our network, where they are,
and who owns them.

--
Robert Blayzor, BOFH
INOC, LLC
[EMAIL PROTECTED]

YOUR PC's broken and I'VE got a problem? 
 -- The BOFH Slogan 




RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Larry Rosenman


On Wed, 2002-08-21 at 14:50, Robert Blayzor wrote:
  What about individuals that run their own mail servers?  (E.G. me).? 
 
 Get your mail server registered just like everyone else I suppose.  If
 your address space is not registered to you directly, your ISP would
 have to do this for you.  You're ISP would then handle any complaints
 (if any) from the registrar and coordinate it with you directly.  I
 honestly like that idea because as a network operator, I like to know
 what customers are running mail servers on our network, where they are,
 and who owns them.
Actually, it's swip'ed to me (I work for said ISP), but I also run a
SMTP server on my laptop which bounces usually between two addresses
(one at home, one at work), and I suppose that the work address (NOT
swip'ed) would have a problem under this proposal. 

I DO understand the reasoning, but it is a **BIG** culture change, and
would take a year or two or more to implement network wide. 

I think $100/year is STEEP, if it is PER SERVER, but per
COMPANY/INDIVIDUAL it **might** be acceptable. 

(I have 3 boxes + the laptop that do SMTP regularly). 

Ideas given this? 

-- 
Larry Rosenman http://www.lerctr.org/~ler
Phone: +1 972-414-9812 E-Mail: [EMAIL PROTECTED]
US Mail: 1905 Steamboat Springs Drive, Garland, TX 75044-6749




Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Jared Mauch


If there were some sort of smtp callback pki, as long as
you controled your dns and server you could do something useful
on that front.

here's an example i gave last night in a private
e-mail:

-- snip --
There is an important need to perform callback but allow for
the ability to protect information from possible spammers for
harvesting/verificiation.

eg:

220 welcome, but no spam
ehlo spammer
250-callback-secure
250 help
mail from:[EMAIL PROTECTED] callback=spammer.example.com
250 ok
rcpt to:[EMAIL PROTECTED]
451 try again, pending callback

vs:

220 welcome, but no spam
ehlo spammer
250-callback-secure
250 help
mail from:[EMAIL PROTECTED] callback=spammer.example.com
250 ok
rcpt to:[EMAIL PROTECTED]
550 no such user here

there's also the need to do some sort of pki to allow
callback to be secure.  eg: the dns record for nether.net should have
some public-key in it and then some other stuff like possibly

mail from:[EMAIL PROTECTED] callback=validate.hotmail.com;key=alkjsdfj   
then pass the 'key' through the public-key availble via dns to
provide back an authentication system to allow for more secure
callback.

but this can still be abused depending...

just some thoughts,
-- snip --

- jared

On Wed, Aug 21, 2002 at 02:38:31PM -0500, Larry Rosenman wrote:
 
 What about individuals that run their own mail servers?  (E.G. me).? 
 
 
 
 On Wed, 2002-08-21 at 14:28, Derek Samford wrote:
  
  I really like this. A sort of IRR for mail servers. Maybe when
  registered it could even check if the server was an open relay, and not
  allow those servers to be registered until properly configured. Any
  thoughts?
  
  Derek
  
   -Original Message-
   From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf
  Of
   Mark Segal
   Sent: Wednesday, August 21, 2002 3:12 PM
   To: 'Robert Blayzor'; [EMAIL PROTECTED]
   Subject: RE: IETF SMTP Working Group Proposal at smtpng.org
   
   
It's almost to the point to where mail servers need their own
registrar, sort of the way domains are tracked now, track
mail servers.  Give mail server admins the option to accept
mail from registered mail servers only or from any mail
server.  Of course there would need to be a ramp up period,
like six months to a year, to make sure all of your mail
servers are registered.  And of course one should only be
able to register mail servers if the IP space is actually
SWIP to them.  If the IP space is NOT SWIP, it would need to
be registered by the customer ISP or via owners rwhois
server.  Just my $.02; for what it's worth
   
   Really good idea (no sarcasm, I actually like it).. But what stops
   spammers
   from registering their mail server?..Ie..
 1) Get a dsl account
 2) Ips get swipped to you
 3) Register the server
 4) SPAM
 5) Apologize, get a second chance
 6) get booted off
 7) Call the next ISP with a zero install
 8) Rinse and repeat.
   
   
   Regards,
   Mark
   
   --
   Mark Segal
   Director, Data Services
   Futureway Communications Inc.
   Tel: (905)326-1570
  
 -- 
 Larry Rosenman http://www.lerctr.org/~ler
 Phone: +1 972-414-9812 E-Mail: [EMAIL PROTECTED]
 US Mail: 1905 Steamboat Springs Drive, Garland, TX 75044-6749

-- 
Jared Mauch  | pgp key available via finger from [EMAIL PROTECTED]
clue++;  | http://puck.nether.net/~jared/  My statements are only mine.



Re: .mil domain root only hosted by one server??

2002-08-21 Thread bmanning


 the .mil domain has an master source, just like .com or your tld here
 it has a list of authoritative servers, just like .com or your tld here

 You are reading your response incorrectly.  your dig query ask for the
 default, which is an A record.  .MIL has no A rr at the apex.  The
 authority for .MIL, according to a.root-servers.net, is g.root-servers.net.

 the NSlist for mil is:

$ dig mil. ns

;  DiG 8.3  mil. ns 
;; res options: init recurs defnam dnsrch
;; got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 4
;; flags: qr rd ra; QUERY: 1, ANSWER: 11, AUTHORITY: 0, ADDITIONAL: 11
;; QUERY SECTION:
;;  mil, type = NS, class = IN

;; ANSWER SECTION:
mil.2D IN NSCON1.NIPR.mil.
mil.2D IN NSCON2.NIPR.mil.
mil.2D IN NSEUR1.NIPR.mil.
mil.2D IN NSEUR2.NIPR.mil.
mil.2D IN NSPAC1.NIPR.mil.
mil.2D IN NSPAC2.NIPR.mil.
mil.2D IN NSA.ROOT-SERVERS.NET.
mil.2D IN NSH.ROOT-SERVERS.NET.
mil.2D IN NSG.ROOT-SERVERS.NET.
mil.2D IN NSB.ROOT-SERVERS.NET.
mil.2D IN NSE.ROOT-SERVERS.NET.

-  

all over the world.  Some inside the military, some out.



 I just stumbled across something I thought was interesting. All the .mil 
 domain names used by the U.S. Military are served by one single root 
 server. I thought that was a bit odd. I'm sure that one server is more than 
 enough to handle the queries for all the .mil domains with no problem, but 
 it doesn't seem very redundant or safe at all. Especially for something our 
 military uses. There's something that could be beefed up a little bit. My 
 other thought (which others may know) was that perhaps the military runs 
 G.ROOT-SERVERS.NET and I'm just not aware of it. Maybe it's a policy to 
 only run .mil on what they can control? Even still, I think it might be in 
 their best interest to setup a few more.
 
 These are the results I got when I queried A.ROOT-SERVERS.NET:
 
 ;  DiG 9.2.1  @a.root-servers.net mil.
 ;; global options:  printcmd
 ;; Got answer:
 ;; -HEADER- opcode: QUERY, status: NOERROR, id: 41
 ;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
 
 ;; QUESTION SECTION:
 ;mil.   IN  A
 
 ;; AUTHORITY SECTION:
 mil.86400   IN  SOA G.ROOT-SERVERS.NET. 
 HOSTMASTER.N
 IC.mil. 2002082000 3600 900 1209600 86400
 
 ;; Query time: 390 msec
 ;; SERVER: 198.41.0.4#53(a.root-servers.net)
 ;; WHEN: Wed Aug 21 15:38:58 2002
 ;; MSG SIZE  rcvd: 90
 
 
 I'd like comments from anyone with more information on this. I'm just 
 curious as to why it is this way and what the reasoning behind it is. Maybe 
 I'll email hostmaster.nic.mil and ask. ;)
 
 Vinny Abello
 Network Engineer
 Server Management
 [EMAIL PROTECTED]
 (973)300-9211 x 125
 (973)940-6125 (Direct)
 PGP Key Fingerprint: 3BC5 9A48 FC78 03D3 82E0  E935 5325 FBCB 0100 977A
 
 Tellurian Networks - The Ultimate Internet Connection
 http://www.tellurian.com (888)TELLURIAN
 




Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Valdis . Kletnieks

On Wed, 21 Aug 2002 15:51:36 EDT, Jared Mauch said:
   i do think some sort of smtp-callback would be nice/useful
 for validation of e-mail addresses.  it'll make it so
 the bounces go to someplace at least instead of Postmaster.

The fact that you can call back in no way means that bounces won't
double-bounce into the postmaster mailbox. I'm sure that yahoo.com
would buy into a callback scheme, but it wouldn;t have done squat for
this double-bounce:

   - Transcript of session follows -
... while talking to mx1.mail.yahoo.com.:
 DATA
 554 delivery error: dd Sorry, your message to [EMAIL PROTECTED] cannot be 
delivered.  This account is over quota. - mta461.mail.yahoo.com
554 5.0.0 Service unavailable

(OK, so THIS double-bounce was a W32/Klez-H generated one, but I get enough
of the same thing for spam with a Yahoo return adress).
-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg04621/pgp0.pgp
Description: PGP signature


Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread sjj


 IMHO I don't think it would be that horrible of an idea with the right amount
 of notification and education to state something such as register your mail
 servers by this date or risk service interruption.
] but I also run a SMTP server on my laptop which bounces usually between two
] addresses (one at home, one at work)

 Actually, I don't care too much about the rest of you, nothing would force
you to publish your outbound mail servers.  As long as a few big sites (spam
targets) honor the white list I publish for *my* own domain, great.  It's
voluntary, and to your advantage both as a sender and a receiver to adopt it
(assuming the mailing list thing is resolvable).
 Domains like pobox.com wouldn't be able to use this, so it shouldn't be a
requirement.



 Of course this period would be several months, if not a year+ .

 Planned obsolescence is another interesting idea, but a sure way to implement
it isn't coming to mind.  Basically I want my MTA to refuse deliveries from
MTAs 'X' years/days older than itself.  Years older vs absolute age is
important, so that an isolated enterprise network somewhere could continue to
inter-operate with itself no matter how old it grew.

 How about: use the skey style unrolling (or is that pre-rolled?) passwords
to generate cookies.  Someone we trust creates the 'generation 0' cookie,
one-way encrypts it one thousand times, and tells us all the 'generation 1000'
cookie, which we put into our MTA configs.  At the next tick of the clock (one
year later), the authority releases the cookie for 'generation 999', and some
of us update our configs (or Microsoft and Sendmail update their new
distributions - but NOT Windows Update?).  You can go 'X' years without
updating your configs if you want - for whatever 'X' you think most of the
Internet has chosen.

 Talking to MTAs newer than me: If my MTA is setup with cookie 'generation 950'
and an MTA connects to me offering cookie 'generation 948', then I should be
able to one-way encrypt the offered cookie twice and compare it to my cookie
and verify that they really are two generations ahead of me, and allow the
connection.  The skey trick means I don't need to know future cookies to accept
email from them.

 Talking to MTAs older than me: I don't talk to machines 'X' generations older
than me.  I have the last 'X' cookies hard coded in my configs, or I just (at
start time) one-way encrypt my current cookie a maximum of 'X' times to
generate all of the valid old cookies I'll accept.


 The idea isn't to take live humans (including spammers) out of the loop, just
the no-admin Windows/Solaris/Linux/whatever machines that haven't been patched
in 'X' years.  This year's cookie isn't a secret, just next year's and the year
after's, so an admin can't setup a box with 'generation 0' and leave it alone
for a thousand years to annoy the rest of us.



Re: .mil domain root only hosted by one server??

2002-08-21 Thread Randy Bush


% dig +norec a.root-servers.net. mil. ns

;  DiG 9.3.0s20020722  +norec a.root-servers.net. mil. ns
;; global options:  printcmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 17626
;; flags: qr aa; QUERY: 1, ANSWER: 11, AUTHORITY: 0, ADDITIONAL: 11

;; QUESTION SECTION:
;mil.   IN  NS

;; ANSWER SECTION:
mil.86400   IN  NS  PAC1.NIPR.mil.
mil.86400   IN  NS  H.ROOT-SERVERS.NET.
mil.86400   IN  NS  G.ROOT-SERVERS.NET.
mil.86400   IN  NS  CON2.NIPR.mil.
mil.86400   IN  NS  EUR2.NIPR.mil.
mil.86400   IN  NS  E.ROOT-SERVERS.NET.
mil.86400   IN  NS  PAC2.NIPR.mil.
mil.86400   IN  NS  CON1.NIPR.mil.
mil.86400   IN  NS  B.ROOT-SERVERS.NET.
mil.86400   IN  NS  A.ROOT-SERVERS.NET.
mil.86400   IN  NS  EUR1.NIPR.mil.

;; ADDITIONAL SECTION:
PAC1.NIPR.mil.  86400   IN  A   199.252.180.234
H.ROOT-SERVERS.NET. 360 IN  A   128.63.2.53
G.ROOT-SERVERS.NET. 360 IN  A   192.112.36.4
CON2.NIPR.mil.  86400   IN  A   199.252.173.234
EUR2.NIPR.mil.  86400   IN  A   199.252.143.234
E.ROOT-SERVERS.NET. 360 IN  A   192.203.230.10
PAC2.NIPR.mil.  86400   IN  A   199.252.155.234
CON1.NIPR.mil.  86400   IN  A   199.252.175.234
B.ROOT-SERVERS.NET. 360 IN  A   128.9.0.107
A.ROOT-SERVERS.NET. 360 IN  A   198.41.0.4
EUR1.NIPR.mil.  86400   IN  A   199.252.154.234

;; Query time: 104 msec
;; SERVER: 198.41.0.4#53(a.root-servers.net.)
;; WHEN: Wed Aug 21 13:15:28 2002
;; MSG SIZE  rcvd: 412

% doc -p -w mil
Doc-2.2.3: doc -p -w mil
Doc-2.2.3: Starting test of mil.   parent is .
Doc-2.2.3: Test date - Wed Aug 21 13:19:12 PDT 2002
Summary:
   No errors or warnings issued for mil.
Done testing mil.  Wed Aug 21 13:19:21 PDT 2002




Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread don


I agree with getting personal mail servers registered, as far as paying 
$100 for a mail server registration (as mentioned in previous 
messages)...that's no good.  As a user with a personal mail server, it 
is bad enough to have pay for connectivity and a domain name.  Having to 
pay for the privilege of running a mail server is too much.

Robert Blayzor wrote:

What about individuals that run their own mail servers?  (E.G. me).? 



Get your mail server registered just like everyone else I suppose.  If
your address space is not registered to you directly, your ISP would
have to do this for you.  You're ISP would then handle any complaints
(if any) from the registrar and coordinate it with you directly.  I
honestly like that idea because as a network operator, I like to know
what customers are running mail servers on our network, where they are,
and who owns them.

--
Robert Blayzor, BOFH
INOC, LLC
[EMAIL PROTECTED]

YOUR PC's broken and I'VE got a problem? 
 -- The BOFH Slogan 
  





Re: .mil domain root only hosted by one server??

2002-08-21 Thread Randy Bush


   [jabley@peppermill]% for n in a b c d e f g h i j k l m; do
   for dig ${n}.root-servers.net ns mil. | egrep -qi '^mil.*NS'  \
   for cmdand echo ${n}.root-servers.net provides a delegation for MIL.
   for done

man doc

randy




RE: .mil domain root only hosted by one server??

2002-08-21 Thread Al Rowland


Perhaps the military has more interest in controlling access than in
making sure John Q. Public is able to reach their sites? There's also
little commercial interest in making sure they're available. 

I'm willing to bet the important stuff doesn't rely on DNS anyway. ;)

Just my 2Ā¢

Best regards,
_
Alan Rowland
USAF, Ret


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of
Vinny Abello
Sent: Wednesday, August 21, 2002 12:46 PM
To: [EMAIL PROTECTED]
Subject: .mil domain root only hosted by one server??



I just stumbled across something I thought was interesting. All the .mil

domain names used by the U.S. Military are served by one single root 
server. I thought that was a bit odd. I'm sure that one server is more
than 
enough to handle the queries for all the .mil domains with no problem,
but 
it doesn't seem very redundant or safe at all. Especially for something
our 
military uses. There's something that could be beefed up a little bit.
My 
other thought (which others may know) was that perhaps the military runs

G.ROOT-SERVERS.NET and I'm just not aware of it. Maybe it's a policy to 
only run .mil on what they can control? Even still, I think it might be
in 
their best interest to setup a few more.

These are the results I got when I queried A.ROOT-SERVERS.NET:

;  DiG 9.2.1  @a.root-servers.net mil.
;; global options:  printcmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 41
;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;mil.   IN  A

;; AUTHORITY SECTION:
mil.86400   IN  SOA G.ROOT-SERVERS.NET. 
HOSTMASTER.N
IC.mil. 2002082000 3600 900 1209600 86400

;; Query time: 390 msec
;; SERVER: 198.41.0.4#53(a.root-servers.net)
;; WHEN: Wed Aug 21 15:38:58 2002
;; MSG SIZE  rcvd: 90


I'd like comments from anyone with more information on this. I'm just 
curious as to why it is this way and what the reasoning behind it is.
Maybe 
I'll email hostmaster.nic.mil and ask. ;)

Vinny Abello
Network Engineer
Server Management
[EMAIL PROTECTED]
(973)300-9211 x 125
(973)940-6125 (Direct)
PGP Key Fingerprint: 3BC5 9A48 FC78 03D3 82E0  E935 5325 FBCB 0100 977A

Tellurian Networks - The Ultimate Internet Connection
http://www.tellurian.com (888)TELLURIAN





RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Al Rowland


Then the question becomes, Is running your own mail server worth some
registration cost? Very similar to the I want my own special part of
the Internet (web server). Okay, pay your $70 for two years (or
whatever).

BTW, just curious, who announces your MX records?

Best regards,
_
Alan Rowland



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of
Larry Rosenman
Sent: Wednesday, August 21, 2002 12:39 PM
To: Derek Samford
Cc: 'Mark Segal'; 'Robert Blayzor'; [EMAIL PROTECTED]
Subject: RE: IETF SMTP Working Group Proposal at smtpng.org



What about individuals that run their own mail servers?  (E.G. me).? 



On Wed, 2002-08-21 at 14:28, Derek Samford wrote:
 
 I really like this. A sort of IRR for mail servers. Maybe when 
 registered it could even check if the server was an open relay, and 
 not allow those servers to be registered until properly configured. 
 Any thoughts?
 
 Derek
 
  -Original Message-
  From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf
 Of
  Mark Segal
  Sent: Wednesday, August 21, 2002 3:12 PM
  To: 'Robert Blayzor'; [EMAIL PROTECTED]
  Subject: RE: IETF SMTP Working Group Proposal at smtpng.org
  
  
   It's almost to the point to where mail servers need their own 
   registrar, sort of the way domains are tracked now, track mail 
   servers.  Give mail server admins the option to accept mail from 
   registered mail servers only or from any mail server.  Of course 
   there would need to be a ramp up period, like six months to a 
   year, to make sure all of your mail servers are registered.  And 
   of course one should only be able to register mail servers if the 
   IP space is actually SWIP to them.  If the IP space is NOT SWIP, 
   it would need to be registered by the customer ISP or via owners 
   rwhois server.  Just my $.02; for what it's worth
  
  Really good idea (no sarcasm, I actually like it).. But what stops 
  spammers from registering their mail server?..Ie..
  1) Get a dsl account
  2) Ips get swipped to you
  3) Register the server
  4) SPAM
  5) Apologize, get a second chance
  6) get booted off
  7) Call the next ISP with a zero install
  8) Rinse and repeat.
  
  
  Regards,
  Mark
  
  --
  Mark Segal
  Director, Data Services
  Futureway Communications Inc.
  Tel: (905)326-1570
 
-- 
Larry Rosenman http://www.lerctr.org/~ler
Phone: +1 972-414-9812 E-Mail: [EMAIL PROTECTED]
US Mail: 1905 Steamboat Springs Drive, Garland, TX 75044-6749





Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Jared Mauch


I'm not saying it's a solution for all problems
but that lets-say-for-example,

AOL probally gets a lot of mail with forged yahoo,hotmail,
btamail.net.cn or smiliar MAIL FROM:'s

Lets say AOL, hotmail, yahoo all today had a way they
could say we would like to cooperate in validating source addresses
as at least somewhat more valid than today and had a mechanisim to
do this with a patch to sendmail/qmail/postfix/zmailer.

This would allow for while a few extra commands and bytes
per smtp-transaction the ability to authenticate such data.

You could also then start keeping statistics and rate-limit
the callback mechanisim.  AOL (and i'm sure others) have done so,
you want to bulk-mail aol users, sign here.  Including this
ability to increase customer satisfaction is in all ISPS
interest today.

- jared

http://story.news.yahoo.com/news?tmpl=storyu=/ap/20020820/ap_wo_en_po/fea_us_spammed_war_of_attrition_1

On Wed, Aug 21, 2002 at 04:17:53PM -0400, [EMAIL PROTECTED] wrote:
 On Wed, 21 Aug 2002 15:51:36 EDT, Jared Mauch said:
  i do think some sort of smtp-callback would be nice/useful
  for validation of e-mail addresses.  it'll make it so
  the bounces go to someplace at least instead of Postmaster.
 
 The fact that you can call back in no way means that bounces won't
 double-bounce into the postmaster mailbox. I'm sure that yahoo.com
 would buy into a callback scheme, but it wouldn;t have done squat for
 this double-bounce:
 
- Transcript of session follows -
 ... while talking to mx1.mail.yahoo.com.:
  DATA
  554 delivery error: dd Sorry, your message to [EMAIL PROTECTED] cannot be 
delivered.  This account is over quota. - mta461.mail.yahoo.com
 554 5.0.0 Service unavailable
 
 (OK, so THIS double-bounce was a W32/Klez-H generated one, but I get enough
 of the same thing for spam with a Yahoo return adress).
 -- 
   Valdis Kletnieks
   Computer Systems Senior Engineer
   Virginia Tech
 



-- 
Jared Mauch  | pgp key available via finger from [EMAIL PROTECTED]
clue++;  | http://puck.nether.net/~jared/  My statements are only mine.



RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread James Smith
Title: RE: IETF SMTP Working Group Proposal at smtpng.org





 -Original Message-
 From: Robert Blayzor [mailto:[EMAIL PROTECTED]]
 Subject: RE: IETF SMTP Working Group Proposal at smtpng.org
 
  I'm not a company, I'm Joe Blow private citizen - do you 
 expect me to
  pay $100 just to sign up with AOL? 
 
 If you are Joe Blow private citizen, why would you need to run a mail
 server? Would you not use your ISP's, at least as a smart relay? 
 
Because he doesn't want to. He already provides POP3/SMTP services to me under his own domain name, and why should he change his servers to permit me to send mail as if from another domain where I do have a real mail account?

I hate the free stuff (no POP3/SMTP unless you pay), I already have my own on another domain (for which I pay), and I don't want his (because I don't want to keep changing email addresses everytime they get bought out/sold).

In short, because if I have to depend on my ISP for my convenience, it won't get done, unless it's done their way. I use it for outbound only, I pop my mail from my other provider...

James H. Smith II
Speaking for myself...





[Fwd: Re: IETF SMTP Working Group Proposal at smtpng.org]

2002-08-21 Thread don




I agree with getting personal mail servers registered, as far as paying 
$100 for a mail server registration (as mentioned in previous 
messages)...that's no good.  As a user with a personal mail server, it 
is bad enough to have pay for connectivity and a domain name.  Having to 
pay for the privilege of running a mail server is too much.

Robert Blayzor wrote:

What about individuals that run their own mail servers?  (E.G. me).? 



Get your mail server registered just like everyone else I suppose.  If
your address space is not registered to you directly, your ISP would
have to do this for you.  You're ISP would then handle any complaints
(if any) from the registrar and coordinate it with you directly.  I
honestly like that idea because as a network operator, I like to know
what customers are running mail servers on our network, where they are,
and who owns them.

--
Robert Blayzor, BOFH
INOC, LLC
[EMAIL PROTECTED]

YOUR PC's broken and I'VE got a problem? 
 -- The BOFH Slogan 
  






RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Robert A. Hayden


Yea.  Good luck getting a DSL provider to swip an IP to you or to be
willing to register an IP for you.

On Wed, 21 Aug 2002, Robert Blayzor wrote:


  What about individuals that run their own mail servers?  (E.G. me).?

 Get your mail server registered just like everyone else I suppose.  If
 your address space is not registered to you directly, your ISP would
 have to do this for you.  You're ISP would then handle any complaints
 (if any) from the registrar and coordinate it with you directly.  I
 honestly like that idea because as a network operator, I like to know
 what customers are running mail servers on our network, where they are,
 and who owns them.

 --
 Robert Blayzor, BOFH
 INOC, LLC
 [EMAIL PROTECTED]

 YOUR PC's broken and I'VE got a problem?
  -- The BOFH Slogan







RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Gary E. Miller


Yo Robert!

How about moving this discussion to a more appropriate list?  Nanog
is not the place to discuss spam and we are re-inventing the wheel,
badly, on nanog.

Half the spam I get is from throw away AOL, netzero, earthlink, etc.
accounts.  Spend $10 for a new ISP account, sent 10,000 emails with
MY return address which is valid and on whitelists.  Do it on a long
weekend and get 30k out before you get stopped.

If the spammers can not run their own name servers then they will just
use someone elses.  Last I checked there where over 6,000 ISPs in the
country.  Cancel them one place and they just go to another.

RGDS
GARY
---
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
[EMAIL PROTECTED]  Tel:+1(541)382-8588 Fax: +1(541)382-8676

On Wed, 21 Aug 2002, Robert Blayzor wrote:

 Treat them sort of like SSL certs now.  Charge an annual registrar fee
 per company, not per server. (Something like $100 a year)  The more they
 have to go out of their way to get their spam server online, the more
 they would be deterred to do so.  They're only going to want to change
 so many ISP's, go through SWIP and then change their legal name for the
 registrar so many times.




Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Petri Helenius



 Treat them sort of like SSL certs now.  Charge an annual registrar fee
 per company, not per server. (Something like $100 a year)  The more they
 have to go out of their way to get their spam server online, the more
 they would be deterred to do so.  They're only going to want to change
 so many ISP's, go through SWIP and then change their legal name for the
 registrar so many times.

Why donĀ“t you just start using SSL certs with SMTP ? The protocol is there,
ways to get certificates are there, no need to start smoothing a square
piece
to make a new wheel.

Pete





RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Robert Blayzor


 I agree with getting personal mail servers registered, as far 
 as paying 
 $100 for a mail server registration (as mentioned in previous 
 messages)...that's no good.  As a user with a personal mail 
 server, it 
 is bad enough to have pay for connectivity and a domain name. 
  Having to 
 pay for the privilege of running a mail server is too much.

Well owners of the IP space that have accounts in the registrar pay the
$100 per year, per account, not server.  So if you have a personal mail
server, but the space is not SWIP'd to you, you'd get your ISP to
authorize it.  Whether they charge you extra for it would be up to them.

--
Robert Blayzor, BOFH
INOC, LLC
[EMAIL PROTECTED]

I haven't lost my mind; it's backed up on tape somewhere.






RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Robert Blayzor


   but these days everyone that can negotiate a bulk-dial
 agreement with someone and run a radius server can sign up
 users and make the abuse a bit harder to track ...

Well yes and no.  Using a regisrar, people on dialups who want to run
mail servers simply cannot do it.  The IP space would be owned by the
ISP, and the ISP would have to do the mail server registrations for the
customer, or SWIP a block (on a dialup, oh boy) and let the customer do
the registration themselves.  (which would be a legal check as well as
technical check).

I guess it makes it a lot harder for those customers that setup not
online all the time mail servers, and that rely on things like ETRN.
But mail servers need static IP's, and network operators must know about
those customers that need static addresses and if there is a mail server
on the end of it.  That's a major problem now, mail servers getting
online are not tracked.
 
   i do think some sort of smtp-callback would be nice/useful
 for validation of e-mail addresses.  it'll make it so
 the bounces go to someplace at least instead of Postmaster.

I'm not disputing this at all, but I believe it would take a lot more
work to get something set, agreed upon, standardized / RFC'd, the mail
server software, etc., than it would to make a registrar type system.
Most mail servers pretty much support this already with RBL functions,
which would probably be moderately changed.

--
Robert Blayzor, BOFH
INOC, LLC
[EMAIL PROTECTED]

Never trust a program unless you have the source.





Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread batz


On Wed, 21 Aug 2002, Gary E. Miller wrote:

:Then how do you account for all the lawsuits?  MAPS would love to hear
:you say they have no legal problems.  The CA and WA legislatures that
:passed laws defineing and banning spam would love to hear you as well.

The lawsuits were against the solution providers, not against the spammers.
In the few cases where there were lawsuits against spammers, it was 
a civil suit, as there isn't an existing legislative solution that 
spans more than a few jurisdictions. 

California and Washington may seem like important jurisdictions, 
but not compared to .kr, .cn, .ru, .br, .mx, or even .ca.   

:I set up a lot of help desks, online shopping carts, etc.  White lists
:do not work in those roles.  The mail is just too all over the place
:and telling a boss that he is only losing a few orders or losing a
:few customers due to a white list is not an option.

I do IT secuirity incident response for about 60k 
people, 45k hosts, their AV gateways, IDS's and firewalls and
I can assure you, spam is a security problem. Security as
a discipline is uniquely positioned to articulate solutions  
to spam. 

Read the tmda.net site. Read the FAQ and the README files. Mail 
isn't lost, it is queued. See myprivacy.ca for an example of
how it operates. 

The system works as follows:

Sender sends message to recipient.
Recipients MTA/MUA checks to see if they are a registered recipient.
If yes, mail is delivered.
If no, mail is queued, and a confirmation asking if they they are a 
legitimate corespondant is sent to the sender. 
The sender responds with the confirmation ticket, and is whitelisted. 
Queued mail is delivered. 

Now, the confirmation message will also include a policy stating
that UCE, solicitations and all the other crap that people associate
with spam are not to be sent to this address and by returning
this message you accept this policy.

It doesn't matter if even if someone comes up with a way to 
autorespond to this message, as if they violate the recipients
policy, they are commiting unauthorized access, theft of 
services etc.. 

What TMDA-like systems do is escalate a problem that engineering
and regular expressions do not have the adequate breadth 
to comprehensively express, and into a question of policy, where 
the conceptual and legal tools already exist. 

What this doesn't cover is everything that AV gateway filters do, 
but that's another story. 

:Policies do not define crimes, Common Law and Written Law do.

There is a reason why there have to be notices that unauthorized 
access to systems is prohibited in /etc/motd in any government 
system you access. It is so that there is no legal ambiguity 
when someone gets caught hacking and the case shows up in court. 

Ask any CISA, CISSP, computer forensics specialist, or 
anyone else who deals professionaly in information security, 
and they will tell you, that if you don't have a policy, you 
will have trouble convincing anyone a crime has been committed. 





--
batz




RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Randy Bush


 If you are Joe Blow private citizen, why would you need to run a mail
 server?

the internet is a peer network.  this is not pay to be screwed.

randy




RE: Eliminating physical colocation (was Re: Shared facilities)

2002-08-21 Thread Gerald


These places do not have cameras and evidence that point to malicious
intent to destroy your network?

I'm sorry but that would make me just about irate, and definitely insist
on moving the equipment ASAP. I don't plan on paying for colo facilities
that I have any doubt in the integrity of the people with access to the
facility.

(Similar Disclaimer: I've never met a union worker that wanted to do more
for the customer, than for themselves. Their blatant apathy can be a
detriment to real work in times of emergencies.)

G

On Wed, 21 Aug 2002, Deepak Jain wrote:



 We have seen disgruntled Union members hit the EPO in data centers in
 Union-friendly cities.

 Not pretty outcome, no matter how much redundancy you have.

 Fire code is not compatible with Union rules.

 DJ

 (Disclaimer, I have a completely unbalanced view of Union workers, all bad.
 I know
 there are good Union workers, but I have never met any professionally -- I
 have met
 plenty AFTER retirement though).

  -Original Message-
  From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
  Vincent J. Bono
  Sent: Wednesday, August 21, 2002 2:50 PM
  To: N. Richard Solis; Sean Donelan; [EMAIL PROTECTED]
  Subject: Re: Eliminating physical colocation (was Re: Shared facilities)
 
 
 
  We have always had more of an issue with Union Members rather than
  Verizon Employees per se.  If you don't use Union Labor to install in
  Boston or New York you had best have a secured cabinet or else 25 pair
  bundles seem to spontaneously develop slices.
 




RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Robert Blayzor


 Actually, it's swip'ed to me (I work for said ISP), but I also run a
 SMTP server on my laptop which bounces usually between two addresses
 (one at home, one at work), and I suppose that the work address (NOT
 swip'ed) would have a problem under this proposal. 

No, it's not a problem.  Your ISP is registered with the registrar.
They can simply list your IP you've been assigned as a valid mail
server.  They then accept responsibility for your mail server
registration.

 I DO understand the reasoning, but it is a **BIG** culture change, and
 would take a year or two or more to implement network wide. 

That I would agree.  No disputing that.  But at the same time, everyone
agrees that SOMETHING needs to be done.  Regardless of what is done, it
will be a big change.

 I think $100/year is STEEP, if it is PER SERVER, but per
 COMPANY/INDIVIDUAL it **might** be acceptable. 

No, per company.  Not per server.  Per server would be a bit extreme.
Especially for those that have dozens of legit mail servers.  As a
service provider you pay $100 a year for your account, in which you can
manage adding and removing mail server IP addresses from the list.  But
only IP's that are in your SWIP'd space.

 Ideas given this? 

Above.  Thanks for your input.

--
Robert Blayzor, BOFH
INOC, LLC
[EMAIL PROTECTED]

Your mouse has moved. Windows NT must be restarted for the change to
take effect. Reboot now? [ OK ]




RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Robert A. Hayden


I know the DSL provider doesn't for the /29 serving my mail server.  It's
under the general announcement for the ISP.  I can't even get them to
personalize reverse DNS without knowing someone that runs the DNS servers.

On 21 Aug 2002, Larry Rosenman wrote:

 On Wed, 2002-08-21 at 15:25, Robert A. Hayden wrote:
  Yea.  Good luck getting a DSL provider to swip an IP to you or to be
  willing to register an IP for you.
 If you have a /29 or shorter they **HAVE** to swip it.  Else they can't
 get numbers from ARIN.

 So, that point is moot.








Draft of a new NANOG FAQ

2002-08-21 Thread Susan Harris


Thanks to the help of many wonderful contributors we have a draft of an
FAQ for the NANOG list:

http://www.nanog.org/listfaq.html

I hope that many of you will want to contribute.  This is truly a draft
and we welcome your comments, additions, subtractions, etc.  Please send
mail to me privately and I'll forward it to the ever-growing group of
editors.




Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread william


Your quite wrong. With email we do in fact know phone for the calling 
party - its their FROM address and for callback we can specify if we trust 
or do not trust the other party to provide some different domain, so they 
may not be given a change to specify where to callback to. As example If 
they are trying to send email from [EMAIL PROTECTED] the callback would
have to go to somedomain.com mail server and the callback must use the 
authorization code given during initial mail call. The callback can also be
authenticated with TLS giving even more security that somedomain.com is a 
real operation. This will prevent 99% of spammers just there.

And as pointed an NANOG and other places other ways to verify that server 
is ok can also be used such as having whitelist for mailservers, using 
AUTH, etc. What is missing is glue in the protocol to allow servers to 
decide on level of trust as well as actual definitions for all these 
verification mechanisms.

 On Wed, 21 Aug 2002 15:55:41 EDT, Jared Mauch said:
 
  There is an important need to perform callback but allow for
  the ability to protect information from possible spammers for
  harvesting/verificiation.
  
  eg:
  
  220 welcome, but no spam
  ehlo spammer
  250-callback-secure
  250 help
  mail from:[EMAIL PROTECTED] callback=spammer.example.com
  250 ok
  rcpt to:[EMAIL PROTECTED]
  451 try again, pending callback
 
 OK.. So now *you* have to callback and pick up the spammer's mail.
 
 What did that gain you?
 
  there's also the need to do some sort of pki to allow
  callback to be secure.  eg: the dns record for nether.net should have
  some public-key in it and then some other stuff like possibly
 
 Much easier would be to use the existing STARTLS stuff and use the cert
 presented to decide if you want to accept the mail.  
 
  mail from:[EMAIL PROTECTED] callback=validate.hotmail.com;key=alkjsdfj   
  then pass the 'key' through the public-key availble via dns to
  provide back an authentication system to allow for more secure
  callback.
 
 Note that the concept of a callback doesn't mean the same things on an
 IP network as it did on a POTS network.  Not that callback on the POTS
 network was ever as secure as people thought, anyhow...
 
  but this can still be abused depending...
 



 
 The only callback systems that ever came anywhere near working on the POTS
 network were ones that you told the callback this is Fred. Call me back at
 the home number you've been configured with, and it called you at Fred's
 previously-configured phone number.  Having it say 'This is Fred, call me
 back at 127.0.4.5' doesnt do anything for security if you're just going to
 call 127.0.4.5.
 




EPOs in critical facilities

2002-08-21 Thread Sean Donelan


On Wed, 21 Aug 2002, Deepak Jain wrote:
 We have seen disgruntled Union members hit the EPO in data centers in
 Union-friendly cities.

 Not pretty outcome, no matter how much redundancy you have.

I believe the Uptime Institute has some statistics showing EPO problems
are one of the top five reasons for critical facility outages.

Almost no telco CO's have facility-wide EPOs.

Equinix facilities do not have facility-wide EPOs.

 Fire code is not compatible with Union rules.

The fire code is your friend.  Learn it, use it, follow it.  It doesn't
always say what everything thinks it says.  Following the code, you can
build a telecommunications facility without an EPO next to every door.





RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Gary E. Miller


Yo Robert!

On Wed, 21 Aug 2002, Robert Blayzor wrote:

 But mail servers need static IP's, and network operators must know about
 those customers that need static addresses and if there is a mail server
 on the end of it.

Uh, no.  I have seen spammers use dynamic DNS to use throw away
dial-ups accounts for incoming main service.

How about moving this to an approriate forum where people really know
spam and mail?  Nanog is for moving packets.  Nanog does not usually
care what is in the packet unless it is a routing protocol.

RGDS
GARY
---
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
[EMAIL PROTECTED]  Tel:+1(541)382-8588 Fax: +1(541)382-8676





mail delivery time on nanog-l (was Re: Die thread, DIE!)

2002-08-21 Thread Mikael Abrahamsson


On Wed, 21 Aug 2002, Vinny Abello wrote:

 
 OK. People can stop correcting me now. :) I did catch the mistake 
 immediately after I sent the email. Now something REALLY useful in an email 
 client would be an unsend feature... I'm joking of course. I have to say 
 that before I get slammed with the technical reasons why that wouldn't work 
 for mail on the Internet which I'm already well aware. ;)

I guess that if mail sent to the nanog list wouldnt take 5-60 minutes to
get delivered to all people on the list, people would sooner see that
someone else has actually answered the email in question, and wont answer 
themselves.

I remember this being discussed earlier, is there any perticular reason
why this hasnt been fixed? If nanog-l is supposed to be a list for
operational purposes, doesnt that require speedy delivery in a lot of
cases?

-- 
Mikael Abrahamssonemail: [EMAIL PROTECTED]





Re: EPOs in critical facilities

2002-08-21 Thread Richard Welty


On Wed, 21 Aug 2002 17:28:48 -0400 (EDT) Sean Donelan [EMAIL PROTECTED] wrote:

 
 On Wed, 21 Aug 2002, Deepak Jain wrote:
  We have seen disgruntled Union members hit the EPO in data centers in
  Union-friendly cities.
 
  Not pretty outcome, no matter how much redundancy you have.
 
 I believe the Uptime Institute has some statistics showing EPO problems
 are one of the top five reasons for critical facility outages.

i've seen poorly trained, inexperienced electricians hit EPOs for
totally bogus reasons. putting a big red EPO button in front of them is
like dangling a shiney object in front of some people i know.

once at GE RD, we had an electrician announce that the room was running
on emergency power, so he had to turn the emergency power off.

richard
--
Richard Welty [EMAIL PROTECTED]
Averill Park Networking 518-573-7592
  Unix, Linux, IP Network Engineering, Security





Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Peter E. Fry


Larry Rosenman wrote:
[...]
 I think $100/year is STEEP, if it is PER SERVER, but per
 COMPANY/INDIVIDUAL it **might** be acceptable.
 
 (I have 3 boxes + the laptop that do SMTP regularly).
 
 Ideas given this?

  Relay through your upstream (hierarchical approach)?  i.e. Register
your server(s) with your provider, who is presumably trusted (registered
with the global system).
  A bit of an aside: I recall ATT Canada blocked all SMTP from exiting
their network (excepting their own servers, of course) a few years back
in response to a large spam.  I don't know the details -- this is from a
response to a complaint I filed.  Interesting idea, though -- you then
catch 'em when they attempt to relay through your server.  And as far as
that goes, I've seen a system that worked quite well...  Larry might be
familiar with it, as it was his.

Peter E. Fry



Re: DNS entries for infrastructure equipment

2002-08-21 Thread Stephen Miller



another way is to use subdomains to separate device, geographic area, and
primary function so that a core router in Washington DC might look like this:

core-1.wdc.infrastructure.net

this would be a subdomain as well as it would interfaces under it as well
and possibly sub-interfaces. if you're thinking that this could make the
FQDM be quite long...you're right...but one advantage is to be able to do
a "dig axfr" on the sub to see all of the devices in a specific location
such as "dig wdc.infrastructure.net axfr" would return all of the devices
in that geographic location. Then you could dig on a specific device (as
a subdomain) to see all of the interfaces configured on that device. This
can lead to lots of admin overhead but some good scripts to automate it...it
works. of course this is just my opinion.

steve

jnull wrote:
[EMAIL PROTECTED]">
  Dan Lockwood(dloc[EMAIL PROTECTED])@2002.08.21 12:16:20 +:
  
Does anyone have a resource that has recommendations about how to nameinterfaces in a DNS name space?  Is there a standard that is used?  TIA Dan Lockwood

I'm certain there are some good resources available, but fm my experience, the most important thing is to work your convention to integrate with you exising or proposed management systems. If your managment system only works from a set domain (i.e. xyz.abc.net--abc being your company and xyz being a subsection) then that label xyz should only have dashes and not periods, otherwise they become a domain themselves.So, it may depend on the size of your network:primary device: r1.company.netinterface name: pos1-2-r1.company.netor		pos1-2.r1.company.net or if you're there is needprimary device: r1.area-or-function.company.net...ect...There may be some customization involved with using domain subsets, but using insert lang scripts you can parse at either "-" or "." do retrieve information. So, unless size demains creating subsections I would keep the whole name in the top label by using dashes.<
br>sig=$header






RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Brad Knowles


At 11:50 AM -0400 2002/08/21, Robert Blayzor wrote:

  Well yes, it could be done with certificates, but it can also be done
  via some type of root server system like DNS uses.  A database
  distributed among many root servers from the registrars is proven.

Look.  The DNS is seriously screwed-up enough as it is.  Let's 
not take a bad model and replicate it elsewhere.

  Tracking valid servers seems much easier to track rather than
  blacklisting IP's that are not mail servers at all or are abusive
  servers.

Sure.  Only accept e-mail from white-listed servers.  You don't 
need a complex system to manage that.

IMHO I don't think it would be that horrible of an idea with
  the right amount of notification and education to state something such
  as register your mail servers by this date or risk service
  interruption.

Sure.  Are you willing to be the first?

-- 
Brad Knowles, [EMAIL PROTECTED]

They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety.
 -Benjamin Franklin, Historical Review of Pennsylvania.

GCS/IT d+(-) s:+(++): a C++(+++)$ UMBSHI$ P+++ L+ !E W+++(--) N+ !w---
O- M++ V PS++(+++) PE- Y+(++) PGP+++ t+(+++) 5++(+++) X++(+++) R+(+++)
tv+(+++) b+() DI+() D+(++) G+() e++ h--- r---(+++)* z(+++)



RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Brad Knowles


At 3:50 PM -0400 2002/08/21, Robert Blayzor wrote:

  Get your mail server registered just like everyone else I suppose.  If
  your address space is not registered to you directly, your ISP would
  have to do this for you.

When you're willing to do this for your own personal private mail 
server, and you're willing to lose e-mail until you get your mail 
server on all known whitelists in existence, I might reconsider.

-- 
Brad Knowles, [EMAIL PROTECTED]

They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety.
 -Benjamin Franklin, Historical Review of Pennsylvania.

GCS/IT d+(-) s:+(++): a C++(+++)$ UMBSHI$ P+++ L+ !E W+++(--) N+ !w---
O- M++ V PS++(+++) PE- Y+(++) PGP+++ t+(+++) 5++(+++) X++(+++) R+(+++)
tv+(+++) b+() DI+() D+(++) G+() e++ h--- r---(+++)* z(+++)



Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Brad Knowles


At 4:25 PM -0400 2002/08/21, Jared Mauch wrote:

   Lets say AOL, hotmail, yahoo all today had a way they
  could say we would like to cooperate in validating source addresses
  as at least somewhat more valid than today and had a mechanisim to
  do this with a patch to sendmail/qmail/postfix/zmailer.

Doesn't help.  AOL uses a proprietary MTA that they have 
developed in-house, which would need to be modified.  Of course, 
you'd also need to modify all the other standard MTAs, too.  And 
don't forget about all those Microsoft and Lotus Notes gateways out 
there.

   You could also then start keeping statistics and rate-limit
  the callback mechanisim.  AOL (and i'm sure others) have done so,
  you want to bulk-mail aol users, sign here.  Including this
  ability to increase customer satisfaction is in all ISPS
  interest today.

AOL uses all sorts of mechanisms to try to detect and eliminate 
spam, but I wouldn't want to go into too much detail here.

-- 
Brad Knowles, [EMAIL PROTECTED]

They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety.
 -Benjamin Franklin, Historical Review of Pennsylvania.

GCS/IT d+(-) s:+(++): a C++(+++)$ UMBSHI$ P+++ L+ !E W+++(--) N+ !w---
O- M++ V PS++(+++) PE- Y+(++) PGP+++ t+(+++) 5++(+++) X++(+++) R+(+++)
tv+(+++) b+() DI+() D+(++) G+() e++ h--- r---(+++)* z(+++)



RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Robert Blayzor


 Uh, no.  I have seen spammers use dynamic DNS to use throw 
 away dial-ups accounts for incoming main service.

Right, but to run a real mail server you need a static address.  Which
can be registered as a valid mail server.  Dynamic IP's cannot.

 How about moving this to an approriate forum where people 
 really know spam and mail?  Nanog is for moving packets.  
 Nanog does not usually care what is in the packet unless it 
 is a routing protocol.

The NANOG mailing list is established to provide a forum for the
exchange of technical information and the discussion of specific
implementation issues that require cooperation among network service
providers. In order to continue to provide a useful forum for discussion
of relevant technical issues, the list is governed by the following
guidelines:  

...

Doesn't mention anything about Nanog is for moving packets.  An
anti-spam/security discussion seems perfectly acceptable to me.

--
Robert Blayzor, BOFH
INOC, LLC
[EMAIL PROTECTED]

Exclusive: We're the only ones who have the documentation.
 




RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Vivien M.


 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On 
 Behalf Of Gary E. Miller
 Sent: August 21, 2002 5:57 PM
 To: Robert Blayzor
 Cc: [EMAIL PROTECTED]
 Subject: RE: IETF SMTP Working Group Proposal at smtpng.org
 
 Uh, no.  I have seen spammers use dynamic DNS to use throw 
 away dial-ups accounts for incoming main service.

Well, that's nice... until their dynamic DNS gets promptly killed (if
they got it from us or someone responsible - I can't speak for everyone
in this industry), at which point they're back at square one with all
their email gone.

A lot of people seem to think that dynamic DNS services are a way to
cover up abuse (eg: spam, warez, etc); they're not, as a decent amount
of spammers have found out the hard way. 

Vivien
-- 
Vivien M.
[EMAIL PROTECTED]
Assistant System Administrator
Dynamic DNS Network Services
http://www.dyndns.org/ 




RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Robert Blayzor


 Half the spam I get is from throw away AOL, netzero, 
 earthlink, etc. accounts.  Spend $10 for a new ISP account, 
 sent 10,000 emails with MY return address which is valid and 
 on whitelists.  Do it on a long weekend and get 30k out 
 before you get stopped.

Of course my typical answer here is those ISP's need to be
responsible.  Quite honestly the simple fix is to firewall all outbound
port 25 connections from non-static IP assignments, and force them to
use specific SMTP servers.  It's possible then to have mail servers
detect incoming spam from customers through their mail server farms by
counting a number of messages in a given period of time, then take
action.  These throw away accounts you claim are usually simple
residential products in which 99% of all customers don't send over 1000
messages within ten minutes. (example)

I'm just throwing out ideas on trying to deal with the problem.

--
Robert Blayzor, BOFH
INOC, LLC
[EMAIL PROTECTED]

Exclusive: We're the only ones who have the documentation.




RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Gary E. Miller


Yo Robert!

On Wed, 21 Aug 2002, Robert Blayzor wrote:

  Uh, no.  I have seen spammers use dynamic DNS to use throw
  away dial-ups accounts for incoming main service.

 Right, but to run a real mail server you need a static address.  Which
 can be registered as a valid mail server.  Dynamic IP's cannot.

Read what I wrote again.  Do not say it is not possible, I see it
every day.

These people, and others will be happy to help you set it up:
http://www.no-ip.com

 Do you own a domain name? Run your own web, mail, ftp, or any server
connected your cable, dsl, or dialup connection using your personal
domain name.

Do some googling before posting nonsense...

 Doesn't mention anything about Nanog is for moving packets.  An
 anti-spam/security discussion seems perfectly acceptable to me.

From the proposed nanog FAQ:


Off-Topic Questions
1. Spam
2. Local DNS
[...]

So take this topic to somewhere it belongs.

RGDS
GARY
---
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
[EMAIL PROTECTED]  Tel:+1(541)382-8588 Fax: +1(541)382-8676




RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Robert Blayzor


   Look.  The DNS is seriously screwed-up enough as it is.  Let's 
 not take a bad model and replicate it elsewhere.

I'm not saying use DNS specifically, but using something DNS like.
Whether it be a database of public keys or certs really doesn't make a
difference at this level.

   Sure.  Are you willing to be the first?

If it came down to the wire and something like this were implemented,
and enforced, then yes, I'd be the first in line.  If the software, the
system and the means are available, I'd make sure we were registered
before the system went live.

--
Robert Blayzor, BOFH
INOC, LLC
[EMAIL PROTECTED]

Exclusive: We're the only ones who have the documentation.




Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Brad Knowles


At 5:42 PM -0500 2002/08/21, Peter E. Fry wrote:

(Checking... OK, whew -- it doesn't appear to be me...)  Get a real
  provider.

That's easier said than done, especially for DSL and cablemodem 
customers, who most likely have no other choice.

-- 
Brad Knowles, [EMAIL PROTECTED]

They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety.
 -Benjamin Franklin, Historical Review of Pennsylvania.

GCS/IT d+(-) s:+(++): a C++(+++)$ UMBSHI$ P+++ L+ !E W+++(--) N+ !w---
O- M++ V PS++(+++) PE- Y+(++) PGP+++ t+(+++) 5++(+++) X++(+++) R+(+++)
tv+(+++) b+() DI+() D+(++) G+() e++ h--- r---(+++)* z(+++)



RE: EPOs in critical facilities

2002-08-21 Thread Deepak Jain


 On Wed, 21 Aug 2002, Deepak Jain wrote:
  We have seen disgruntled Union members hit the EPO in data centers in
  Union-friendly cities.
 
  Not pretty outcome, no matter how much redundancy you have.

 I believe the Uptime Institute has some statistics showing EPO problems
 are one of the top five reasons for critical facility outages.

 Almost no telco CO's have facility-wide EPOs.

 Equinix facilities do not have facility-wide EPOs.

  Fire code is not compatible with Union rules.

 The fire code is your friend.  Learn it, use it, follow it.  It doesn't
 always say what everything thinks it says.  Following the code, you can
 build a telecommunications facility without an EPO next to every door.



Like anything, clue is hard to come by in consistent quantities. Yes, you
can do a lot of things once you understand the code, but even a small
(areawise) EPO causes lots of problems for whoever's equipment was hit.

If the reason was a disgruntled Union worker, so much's the pity.

DJ




Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Brad Knowles


At 5:35 PM -0500 2002/08/21, Peter E. Fry wrote:

Relay through your upstream (hierarchical approach)?  i.e. Register
  your server(s) with your provider, who is presumably trusted (registered
  with the global system).

This is the approach I recommend, and have recommended for years.

A bit of an aside: I recall ATT Canada blocked all SMTP from exiting
  their network (excepting their own servers, of course) a few years back
  in response to a large spam.

AOL does the same.  They have a transparent SMTP proxy for all 
outgoing connections.  They've also explicitly asked to have this 
machine added to certain blacklists, so that people who don't want to 
receive what is almost certainly going to be spam can choose to do so.

If you want to send real e-mail using AOL, then use the mail 
client provided by AOL.  It's that simple.

-- 
Brad Knowles, [EMAIL PROTECTED]

They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety.
 -Benjamin Franklin, Historical Review of Pennsylvania.

GCS/IT d+(-) s:+(++): a C++(+++)$ UMBSHI$ P+++ L+ !E W+++(--) N+ !w---
O- M++ V PS++(+++) PE- Y+(++) PGP+++ t+(+++) 5++(+++) X++(+++) R+(+++)
tv+(+++) b+() DI+() D+(++) G+() e++ h--- r---(+++)* z(+++)



Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Brad Knowles


At 2:15 PM -0700 2002/08/21, [EMAIL PROTECTED] wrote:

  Your quite wrong. With email we do in fact know phone for the calling
  party - its their FROM address and for callback we can specify if we trust
  or do not trust the other party to provide some different domain, so they
  may not be given a change to specify where to callback to. As example If
  they are trying to send email from [EMAIL PROTECTED] the callback would
  have to go to somedomain.com mail server and the callback must use the
  authorization code given during initial mail call. The callback can also be
  authenticated with TLS giving even more security that somedomain.com is a
  real operation. This will prevent 99% of spammers just there.

It's bad enough waiting for DNS responses so that you can 
determine whether or not the envelope sender domain even exists.  Now 
you want to slow down every single e-mail transaction by many, many, 
many orders of magnitude so that you can do a callback on each and 
every connection?!?

Man, wanna talk about ideas that would bring all e-mail to a 
complete stop across the entire Internet?  Imagine what it would be 
like if AOL did this, so that it could take five, ten, or even 
fifteen minutes just to get one callback on one message, if the 
remote server was slow enough.  Now, if you start up a sendmail queue 
runner every sixty minutes, you only need a very small number of 
messages in your queue before you start stacking up more and more and 
more sendmail processes, until such time as you run out of memory, 
your mail server crashes, and you might potentially lose all your 
queued e-mail.


Jeezus.  Do you have to be the one guy who got blamed for 
shutting down all e-mail across the entire Internet on Black 
Tuesday, just to see the flaws in this plan?!?

-- 
Brad Knowles, [EMAIL PROTECTED]

They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety.
 -Benjamin Franklin, Historical Review of Pennsylvania.

GCS/IT d+(-) s:+(++): a C++(+++)$ UMBSHI$ P+++ L+ !E W+++(--) N+ !w---
O- M++ V PS++(+++) PE- Y+(++) PGP+++ t+(+++) 5++(+++) X++(+++) R+(+++)
tv+(+++) b+() DI+() D+(++) G+() e++ h--- r---(+++)* z(+++)



Re: mail delivery time on nanog-l (was Re: Die thread,DIE!)

2002-08-21 Thread Brad Knowles


At 12:09 AM +0200 2002/08/22, Mikael Abrahamsson wrote:

  I guess that if mail sent to the nanog list wouldnt take 5-60 minutes to
  get delivered to all people on the list, people would sooner see that
  someone else has actually answered the email in question, and wont answer
  themselves.

Show me the headers that demonstrate these delays.  On the 
message I am responding to, I see an end-to-end delay of just a few 
minutes, and that amount of time could easily be accounted for by 
your clock being slightly off from mine.

  I remember this being discussed earlier, is there any perticular reason
  why this hasnt been fixed? If nanog-l is supposed to be a list for
  operational purposes, doesnt that require speedy delivery in a lot of
  cases?

For more details on the issues involved, read the following:

  Author: Rob Kolstad
Title: Tuning Sendmail for Large Mailing Lists
Pages: 195
Publisher: USENIX
  Proceedings: Eleventh Systems Administration Conference (LISA '97)
 Date: October 26-31, 1997
 Location: San Diego, California
  Institution: Berkeley Software Design, Inc.


   Author: Strata Rose Chalup
   Author: Christine Hogan
   Author: Greg Kulosa
   Author: Bryan McDonald
   Author: Bryan Stansell
Title: Drinking from the Fire(walls) Hose: Another Approach to 
Very Large Mailing Lists
Pages: 317
Publisher: USENIX
  Proceedings: Twelfth Systems Administration Conference (LISA '98)
 Date: December 6-11, 1998
 Location: Boston, Massachusetts
  Institution: Global Networking and Computing, Inc.

-- 
Brad Knowles, [EMAIL PROTECTED]

They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety.
 -Benjamin Franklin, Historical Review of Pennsylvania.

GCS/IT d+(-) s:+(++): a C++(+++)$ UMBSHI$ P+++ L+ !E W+++(--) N+ !w---
O- M++ V PS++(+++) PE- Y+(++) PGP+++ t+(+++) 5++(+++) X++(+++) R+(+++)
tv+(+++) b+() DI+() D+(++) G+() e++ h--- r---(+++)* z(+++)



Re: Eliminating physical colocation (was Re: Shared facilities)

2002-08-21 Thread Vincent J. Bono


Bell COs do not have Cameras, at least not those in Verizon, Bell South, or
SBC land that we have seen.

- Original Message -
From: Gerald [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Wednesday, August 21, 2002 5:30 PM
Subject: RE: Eliminating physical colocation (was Re: Shared facilities)



 These places do not have cameras and evidence that point to malicious
 intent to destroy your network?

 I'm sorry but that would make me just about irate, and definitely insist
 on moving the equipment ASAP. I don't plan on paying for colo facilities
 that I have any doubt in the integrity of the people with access to the
 facility.

 (Similar Disclaimer: I've never met a union worker that wanted to do more
 for the customer, than for themselves. Their blatant apathy can be a
 detriment to real work in times of emergencies.)

 G

 On Wed, 21 Aug 2002, Deepak Jain wrote:

 
 
  We have seen disgruntled Union members hit the EPO in data centers in
  Union-friendly cities.
 
  Not pretty outcome, no matter how much redundancy you have.
 
  Fire code is not compatible with Union rules.
 
  DJ
 
  (Disclaimer, I have a completely unbalanced view of Union workers, all
bad.
  I know
  there are good Union workers, but I have never met any professionally --
I
  have met
  plenty AFTER retirement though).
 
   -Original Message-
   From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
   Vincent J. Bono
   Sent: Wednesday, August 21, 2002 2:50 PM
   To: N. Richard Solis; Sean Donelan; [EMAIL PROTECTED]
   Subject: Re: Eliminating physical colocation (was Re: Shared
facilities)
  
  
  
   We have always had more of an issue with Union Members rather than
   Verizon Employees per se.  If you don't use Union Labor to install
in
   Boston or New York you had best have a secured cabinet or else 25 pair
   bundles seem to spontaneously develop slices.
  





RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Brad Knowles


At 7:23 PM -0400 2002/08/21, Robert Blayzor wrote:

  Sure.  Are you willing to be the first?

  If it came down to the wire and something like this were implemented,
  and enforced, then yes, I'd be the first in line.  If the software, the
  system and the means are available, I'd make sure we were registered
  before the system went live.

Right.  How are you going to enforce *anything* on the Internet? 
Every single RFC in existence is optional, at best.  Every single 
black list is certainly optional.  And until you can control the 
entire Internet and operate the mail servers for everyone in the 
world, there's no way in hell that you're going to get everyone to 
subscribe to the same white list.

Sorry, guy.  Ain't gonna happen.

-- 
Brad Knowles, [EMAIL PROTECTED]

They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety.
 -Benjamin Franklin, Historical Review of Pennsylvania.

GCS/IT d+(-) s:+(++): a C++(+++)$ UMBSHI$ P+++ L+ !E W+++(--) N+ !w---
O- M++ V PS++(+++) PE- Y+(++) PGP+++ t+(+++) 5++(+++) X++(+++) R+(+++)
tv+(+++) b+() DI+() D+(++) G+() e++ h--- r---(+++)* z(+++)



RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Robert Blayzor


 Read what I wrote again.  Do not say it is not possible, I 
 see it every day.
 
 These people, and others will be happy to help you set it up:
   http://www.no-ip.com
 
  Do you own a domain name? Run your own web, mail, ftp, or 
 any server connected your cable, dsl, or dialup connection 
 using your personal domain name.
 
 Do some googling before posting nonsense...

I read what you wrote, but I'm trying to understand how dynamic DNS has
anything to do with sending spam.  Dynamic DNS only does forward DNS
for a host IP assignment.  If AOL issues an IP to a dialup customer,
it's still an AOL address with AOL access restrictions, AOL reverse DNS,
etc.

--
Robert Blayzor, BOFH
INOC, LLC
[EMAIL PROTECTED]

Exclusive: We're the only ones who have the documentation.




RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Robert Blayzor


   Sure they can.  For sending e-mail, all you need is an IP 
 address.  It would help if the reverse DNS is set up correctly, and 
 that you claim this same name in the SMTP dialog, but this isn't 
 required.

Yes, I know they can today.  My point is that with a registrar based
system, they cannot, because they cannot be registered as valid mail
servers.

   For receiving mail, all you need is a domain name, which has a 
 set of advertised MXes.  Those MXes could point to mail servers 
 operated by friends of yours who might use UUCP, or some private 
 routing method to send your mail to whatever your current IP address 
 is.  Those MXes could even point to your own host/domain names, and 
 the mail would be deferred until such time as you re-connect with 
 your dynamic DNS provider and update the IP addresses for these names.

Correct, but MX's (mail servers) have static assignments, unless you
change DNS every time.  Running MX's on dynamic IP's to receive mail
would be quite silly.

--
Robert Blayzor, BOFH
INOC, LLC
[EMAIL PROTECTED]

Exclusive: We're the only ones who have the documentation.




RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Brad Knowles


At 7:13 PM -0400 2002/08/21, Robert Blayzor wrote:

  Right, but to run a real mail server you need a static address.  Which
  can be registered as a valid mail server.  Dynamic IP's cannot.

Sure they can.  For sending e-mail, all you need is an IP 
address.  It would help if the reverse DNS is set up correctly, and 
that you claim this same name in the SMTP dialog, but this isn't 
required.

For receiving mail, all you need is a domain name, which has a 
set of advertised MXes.  Those MXes could point to mail servers 
operated by friends of yours who might use UUCP, or some private 
routing method to send your mail to whatever your current IP address 
is.  Those MXes could even point to your own host/domain names, and 
the mail would be deferred until such time as you re-connect with 
your dynamic DNS provider and update the IP addresses for these names.

Works just fine.

-- 
Brad Knowles, [EMAIL PROTECTED]

They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety.
 -Benjamin Franklin, Historical Review of Pennsylvania.

GCS/IT d+(-) s:+(++): a C++(+++)$ UMBSHI$ P+++ L+ !E W+++(--) N+ !w---
O- M++ V PS++(+++) PE- Y+(++) PGP+++ t+(+++) 5++(+++) X++(+++) R+(+++)
tv+(+++) b+() DI+() D+(++) G+() e++ h--- r---(+++)* z(+++)



RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Vivien M.


 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On 
 Behalf Of Robert Blayzor
 Sent: August 21, 2002 7:14 PM
 To: 'Gary E. Miller'
 Cc: [EMAIL PROTECTED]
 Subject: RE: IETF SMTP Working Group Proposal at smtpng.org
 
 
 
  Uh, no.  I have seen spammers use dynamic DNS to use throw
  away dial-ups accounts for incoming main service.
 
 Right, but to run a real mail server you need a static 
 address.  Which can be registered as a valid mail server.  
 Dynamic IP's cannot.

Dynamic/static IPs, though, is a distinction that's much harder to make
these days (ahhh, how I miss the days of dialup... NOT). There are
plenty of people (myself included) who have cable/DSL connections at
home with IPs that change every 6 months or a year. Similarly, people
whose organizations can't justify the /20 from ARIN will have to
renumber their servers every time they change ISPs (how many
WorldCom/KPN Qwest/etc single-homed customers have switched or will
switch?) or outgrow the ridiculously puny allocation they were able to
justify from their upstream will have to change their static IPs. Oh,
and what about a DHCP setup that's set to allocate the same IP to a
certain MAC address? Is that static or dynamic? 

As for registration, well, let's try to avoid a mess like that created
by the mandatory glue record creation process involved in name server
registration, shall we? With the name server registration, you end up
having all kinds of unnecessary glue records floating around which
either a) drive someone crazy when they move their domain around, or b)
cause random people out there to end up having DNS queries showing up at
machines that aren't DNS servers (anyone care to guess how someone with
a personal firewall would react when they see the queies on port
53/udp?). Same thing with SWIP delegations and the like; sadly, there
are still all kinds of incorrect old information floating around in
these databases, and I'd rather not rely on some three year old
registration in deciding whether to trust some machine.

I admit that something non-IP-specific, like SSL certificates, to me
seem like a much more flexible long-term solution. Plus that way when
you renumber your mail server, you wouldn't need to reregister the new
IP, etc.

That said, I (and our several tens of thousands of users running their
own mail servers) would like to know how you define a real mail
server. Is a real mail server a server that you've arbitrarily
decided needs a static IP? Is a real mail server a closed relay (if
so, someone on this list may feel insulted that his deliberately open
relay isn't real by your standards)? Is your real mail server
something operated by an organization with more than 200 accounts (in
which case, you're telling me that my mail server with 25 or so accounts
sitting in an Exodus colo with a perfectly static IP is not real?)? Etc.

Vivien
-- 
Vivien M.
[EMAIL PROTECTED]
Assistant System Administrator
Dynamic DNS Network Services
http://www.dyndns.org/ 





Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread william


1. I want to create specification that would allow server operators 
themselve to decide what kind of verification they want, if you do not 
like callback, do not implement it.
2. Most estimate that up to 50% of mail system resources are used for 
processing unwanted email, viruses, etc. The amount of processing time due 
to new specification will be smaller then what has been gained from not 
having to deal with unwanted emails as much.
3. The processing is server cpu resource, while sending email is bandwidth 
used. I'll give up some more cpu resources to decrease used bandwidth. 
4. For last years cpu speed  hardware have been increasing at 2x per 2 
years and are more and more powerfull. Even if the initiative goes 
through fairly fast (I projected2 years, that is already too optimistic), 
it'll be another 4 years at least before its used, by that time servers 
would be 8 times faster!

 At 2:15 PM -0700 2002/08/21, [EMAIL PROTECTED] wrote:  
   Your quite wrong. With email we do in fact know phone for the calling
   party - its their FROM address and for callback we can specify if we trust
   or do not trust the other party to provide some different domain, so they
   may not be given a change to specify where to callback to. As example If
   they are trying to send email from [EMAIL PROTECTED] the callback would
   have to go to somedomain.com mail server and the callback must use the
   authorization code given during initial mail call. The callback can also be
   authenticated with TLS giving even more security that somedomain.com is a
   real operation. This will prevent 99% of spammers just there.
 
   It's bad enough waiting for DNS responses so that you can 
 determine whether or not the envelope sender domain even exists.  Now 
 you want to slow down every single e-mail transaction by many, many, 
 many orders of magnitude so that you can do a callback on each and 
 every connection?!?
 
   Man, wanna talk about ideas that would bring all e-mail to a 
 complete stop across the entire Internet?  Imagine what it would be 
 like if AOL did this, so that it could take five, ten, or even 
 fifteen minutes just to get one callback on one message, if the 
 remote server was slow enough.  Now, if you start up a sendmail queue 
 runner every sixty minutes, you only need a very small number of 
 messages in your queue before you start stacking up more and more and 
 more sendmail processes, until such time as you run out of memory, 
 your mail server crashes, and you might potentially lose all your 
 queued e-mail.
 
 
   Jeezus.  Do you have to be the one guy who got blamed for 
 shutting down all e-mail across the entire Internet on Black 
 Tuesday, just to see the flaws in this plan?!?
 





RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Dave Israel



Wow.  I turned my back on this thread to move to my new office,
and it got interesting.

The answer to your quesiton is, the cert itself can do this, if it
includes a unique/semi-unique identifier, such as an SSN, a name and
address, etc.  Many governments give their people some unique
identifier.  You sign up for my service and say you wanna send mail, I
say, Sure!  Lemmie just check your ID against the revocation list...

-Dave


On 8/21/2002 at 15:11:59 -0400, Mark Segal said:
 
  It's almost to the point to where mail servers need their own 
  registrar, sort of the way domains are tracked now, track 
  mail servers.  Give mail server admins the option to accept 
  mail from registered mail servers only or from any mail 
  server.  Of course there would need to be a ramp up period, 
  like six months to a year, to make sure all of your mail 
  servers are registered.  And of course one should only be 
  able to register mail servers if the IP space is actually 
  SWIP to them.  If the IP space is NOT SWIP, it would need to 
  be registered by the customer ISP or via owners rwhois 
  server.  Just my $.02; for what it's worth 
 
 Really good idea (no sarcasm, I actually like it).. But what stops spammers
 from registering their mail server?..Ie..
   1) Get a dsl account
   2) Ips get swipped to you
   3) Register the server
   4) SPAM 
   5) Apologize, get a second chance
   6) get booted off
   7) Call the next ISP with a zero install
   8) Rinse and repeat.
 
 
 Regards,
 Mark
 
 --
 Mark Segal
 Director, Data Services
 Futureway Communications Inc.
 Tel: (905)326-1570

-- 
Dave Israel
Senior Manager, DNE SE



Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread J.A. Terranson




On Wed, 21 Aug 2002 [EMAIL PROTECTED] wrote:


 1. I want to create specification that would allow server operators
 themselve to decide what kind of verification they want, if you do not
 like callback, do not implement it.

Ultimately, only the system that is flexible in this regards will
succeed as a viable solution.


 3. The processing is server cpu resource, while sending email is bandwidth
 used. I'll give up some more cpu resources to decrease used bandwidth.

The trick (and I steal this openly and completely from a recent
thread on Cypherpunks) is make mail delivery computationally difficult
- for the sender.  This of course assumes that we are throwing out the
fools gold of Hashcash itself.

Presenting a computationally difficult problem to a connecting MTA
moves the requirement for the CPU power to the sender while keeping
the recipient site unfettered.  Let's face it, the spam problem is
merely one of cost shifting from sender to reciever, and this
proposal shifts the load back.  Any site that wishes to maintain
the current system of email subsidies to the sender domain need
only provide a computationally simple token.


 4. For last years cpu speed  hardware have been increasing at 2x per 2
 years and are more and more powerfull. Even if the initiative goes
 through fairly fast (I projected2 years, that is already too optimistic),
 it'll be another 4 years at least before its used, by that time servers
 would be 8 times faster!


Yet, all of this would not help the spam originating sites at all
because of the sheer volume of mail they must send in order to turn a
profit.


Yours,

J.A. Terranson




Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Dave Israel



The problem with SSL is it doesn't include certificate chain to
arbitrary authorities.  However, there's a space for web of trust in
SSL, I believe, so yeah, a new verison of SSL might be just the ticket.

On 8/22/2002 at 00:02:24 +0300, Petri Helenius said:
 
 
  Treat them sort of like SSL certs now.  Charge an annual registrar fee
  per company, not per server. (Something like $100 a year)  The more they
  have to go out of their way to get their spam server online, the more
  they would be deterred to do so.  They're only going to want to change
  so many ISP's, go through SWIP and then change their legal name for the
  registrar so many times.
 
 Why donĀ“t you just start using SSL certs with SMTP ? The protocol is there,
 ways to get certificates are there, no need to start smoothing a square
 piece
 to make a new wheel.
 
 Pete
 
 



RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread J.A. Terranson



 On 8/21/2002 at 15:11:59 -0400, Mark Segal said:
 
   It's almost to the point to where mail servers need their own
   registrar, sort of the way domains are tracked now, track
   mail servers.  Give mail server admins the option to accept
   mail from registered mail servers only or from any mail
   server.  Of course there would need to be a ramp up period,
   like six months to a year, to make sure all of your mail
   servers are registered.  And of course one should only be
   able to register mail servers if the IP space is actually
   SWIP to them.

And of course, Netsol should be the only registrar for the first 75
years, not counting their first extension...






Re: DNS entries for infrastructure equipment

2002-08-21 Thread Richard A Steenbergen


On Wed, Aug 21, 2002 at 12:16:20PM -0700, Dan Lockwood wrote:
 Does anyone have a resource that has recommendations about how to name
 interfaces in a DNS name space?  Is there a standard that is used?  TIA

Hrm, a useful nanog discussion, will wonders never cease...

Lets start by examining some examples from exiting important networks:

0.so-5-1-0.TL2.DCA6.ALTER.NET
pos1-0-622M.cr1.SFO1.gblx.net
p16-7-0-0.r02.stngva01.us.bb.verio.net
sl-bb22-rly-3-0.sprintlink.net
ge5-1.mpr1.iad5.us.mfnx.net
bbr01-p4-0.nycm01.exodus.net
ges1-ge-1-1.Restonrst.cw.net
so-2-0-0.mp2.Denver1.Level3.net
gbr3-p40.sl9mo.ip.att.net

Obviously you don't NEED to state much at all, but you probably want
to come up with a naming scheme which is logical and understandable to 
both your engineers and the rest of the internet.

The general components of a naming scheme are the geographic location, 
the facility information, the device information, the port information, 
any subint info, and optionally a speed (if you like to brag). Let's look 
at each one individually.

Location -- Most networks use either airport codes, clli codes, or some
nonstandard written-out description, each with their own advantages and
disadvantages. If you are looking to describe metro areas moreso than
specific cities, they may be for you. On the other hand, if you expect to
have a wide variety of areas, clli code may be more appropriate. One of
the problems with airport codes comes in defining exact boundries on
overlap, for example IAD/DCA/BWI, SFO/PAO/SJC, LGA/JFK/EWR, etc. Another
problem comes when the codes aren't obvious to the average person (for
example, what the heck is IAD? ORD? LGA?). Clli codes are a little more
difficult to search, but sometimes a little bit easier to figure out.  
Made up codes (for example CHI for Chicago, WDC for Washington DC) or
written out names tend to be the most confusing.

Facility information -- Most people tend to stick a number on their 
location code and use it to name a facility, for example IAD1, stngva01, 
etc.

Device information -- Here is where things get a little trickier. The
general idea is to come up with a descriptor for the role of the
device, and attach a number. The fun part comes when you start trying to
think up role names which are short and simple, but which people can
get without needing some inside info or a cheat sheet. There are a
number of ways you can go here, personally I'm kindof partial to GX's CR
(core routers)  BR (border)  HR (hosting)  AR (access, for cust
circuits), etc. Some of the more complex ones are impossible to guess 
unless you know the meaning behind them.

Port information -- There are a couple ways you can go here too, 
depending on the devices you're using. Juniper's naming scheme for 
interfaces solves the problem for you, with Cisco you have to get a 
little more creative (p or pos? gi or ge? fa or fe?), and Foundry is even 
worse (everything is called Ethernet). Usually you want to just replace 
/'s with -'s. And if you have any sub-ints, you should throw them in too.

Speed -- This can sometimes be useful, sometimes bragging, or sometimes
just funny when someone gets the math wrong. If you want to tack on a
-oc48 or -2488M it won't hurt anything, but please don't do something
stupid like sprint's 405xT1 to mean OC12.

Put it all together in a way that suits you and your specific needs, and 
you've got a naming scheme. Personally I prefer using the hierarchy 
inherient in DNS to come up with something simple like: 

0.ge-0-1-0.core1.iad1.yourcompany.net
or
pos4-0.cr1.asbnva01.us.yourcompany.net

But if you're going to be one of the one big word or lots of dashes 
people, I (unfortunately) can't stop you. Some very good examples of a 
logical layout you could model from are UU/GX, and Verio. My award for 
most annoying layout goes to CW.

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread William Rockwood



All very interesting discussion, but discussing it here on NANOG is
probably about the worst idea ever -- No offense intended, I'm sure
you had only good intentions.  I will now go on to continue the
discussion. grin

As a sysadmin at a large ISP which provides DSL and dial (and hosting,
colo, bla bla bla) I have to admit that I am very interested in seeing
something like this happen (registration of mail servers, trustdb, 
anything...) as I've had a few similar thoughts in the past, but figured
that something with such a global impact would be utterly unfeaseable
(and likely is, but still it is fun to dream.)

Spam definitely impacts services from time to time, even on the most
robust servers I have.  I catch customers spamming frequently (and of
course follow through with my abuse team and suspend their account and
kick them offline and clean their crap out of my queues, etc etc..) but
the absolute worst is all the open proxies being used (not 3rd party
mail relays, but hosts which are in fact not even mail servers at all,
merely running an insecure proxy (socks, squid, analogx, etc..))

Anyhow, I don't want to go too far off topic, or rant about spam, or
any of the other impolitic things folks do on this list, but I figured
I'd let you all know that there's a sysadmin at a DSL provider who 
cares enough to show interest in this concept. :-)  I'd have no issue
with working on a system to allow customers to run their own mail
servers.  Then again, I'm not an engineer, or in marketing, or any
of the other decision-making groups, so that'd be my opinion only I'm
talking about there.



(note: I rarely have time to read this list, it was pure accident that
I switched to this mailbox and saw this thread, so if you wish to reply
to me, please include me in the cc:--Thanks:)

/wjr


On Wed, Aug 21, 2002 at 03:25:50PM -0500, Robert A. Hayden wrote:
 
 Yea.  Good luck getting a DSL provider to swip an IP to you or to be
 willing to register an IP for you.
 
 On Wed, 21 Aug 2002, Robert Blayzor wrote:
 
 
   What about individuals that run their own mail servers?  (E.G. me).?
 
  Get your mail server registered just like everyone else I suppose.  If
  your address space is not registered to you directly, your ISP would
  have to do this for you.  You're ISP would then handle any complaints
  (if any) from the registrar and coordinate it with you directly.  I
  honestly like that idea because as a network operator, I like to know
  what customers are running mail servers on our network, where they are,
  and who owns them.
 
  --
  Robert Blayzor, BOFH
  INOC, LLC
  [EMAIL PROTECTED]
 
  YOUR PC's broken and I'VE got a problem?
   -- The BOFH Slogan
 
 
 
 

-- 
  +--+
  | William Rockwood | Sr. System Administrator
  | [EMAIL PROTECTED]| XO Communications,  Chicago DCO
  +--+



RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Robert Blayzor


 The problem with SSL is it doesn't include certificate chain 
 to arbitrary authorities.  However, there's a space for web 
 of trust in SSL, I believe, so yeah, a new verison of SSL 
 might be just the ticket.

Lets not forget that you need an SSL cert for every server with a
different host name, and you need to go through companies like Verisign
to get them.  (yes, there are lesser evils I know).  But using SSL certs
could be more expensive then just registering your company, netblock or
whatever with a management account.

--
Robert Blayzor, BOFH
INOC, LLC
[EMAIL PROTECTED]

Exclusive: We're the only ones who have the documentation.




Re: [Fwd: Re: IETF SMTP Working Group Proposal at smtpng.org]

2002-08-21 Thread Paul Vixie


 I agree with getting personal mail servers registered, as far as paying 
 $100 for a mail server registration (as mentioned in previous 
 messages)...that's no good.  As a user with a personal mail server, it 
 is bad enough to have pay for connectivity and a domain name.  Having to 
 pay for the privilege of running a mail server is too much.

e-mail isn't free.  in my own experience, i can pay a high price by just
hitting delete a couple hundred times a day, or a medium price by turning
on all kinds of anti-spam features in my MTA and sending complaints out
to network owners on whatever sneaks through the blockade, or a low price
by only accepting e-mail from people who have paid to register their
servers with some certifier whom i am willing to trust.

we'll be seeing this kind of require signed-by-trusted certificates before
permitting use logic in the personal certificate field soon.  why not do
it at the mail server level, where there are fewer certificates and more
total lifetime value per signature?

the secret is in correctly answering the question who gets the money.  i
would love to see a bona fide nonprofit use this as a fundraising method.
(any organized religion's church comes to mind here as an ideal candidate.)

server-level openpgp is also an option, and would more closely reflect the
social realities: (1) introducers i'm willing to trust may not be at the top
of any virtual certification hierarchy other than my own; and (2) there's
no compelling technical reason to keep the number of ultimately trusted keys
small.  (verisign/thawte may feel that there are compelling business reasons,
however.)
-- 
Paul Vixie



Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Paul Vixie


 Lets not forget that you need an SSL cert for every server with a
 different host name, and you need to go through companies like Verisign
 to get them.  (yes, there are lesser evils I know).  But using SSL certs
 could be more expensive then just registering your company, netblock or
 whatever with a management account.

i won't glock up this already busy list with a full copy of the proposal,
but before y'all go off and invent something, here's some prior art that's
been resoundingly pooh-pooh'd by the smtp community.

http://www.vix.com/~vixie/mailfrom.txt

   Abstract

  At the time of this writing, more than half of all e-mail received by
  the author has a forged return address, due to the total absence of
  address authentication in SMTP (see [RFC2821]).  We present a simple
  and backward compatible method whereby cooperating e-mail senders and
  receivers can detect forged source/return addresses in e-mail.

-- 
Paul Vixie



RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Vivien M.


 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On 
 Behalf Of Robert Blayzor
 Sent: August 21, 2002 7:39 PM
 To: 'Brad Knowles'
 Cc: [EMAIL PROTECTED]
 Subject: RE: IETF SMTP Working Group Proposal at smtpng.org
 
 
 Correct, but MX's (mail servers) have static assignments, 
 unless you change DNS every time.  Running MX's on dynamic 
 IP's to receive mail would be quite silly.

Then perhaps you'd like to tell me how we have tens of thousands of
users quite happily doing it?

True, I wouldn't run Hotmail/AOL/EarthLink/etc's MXes off dynamic IPs,
but for a home/small biz mail server...

Oh, and one last thing, when you specify an MX (statically, as you say),
you don't put in the IP but rather a name created with A record, so what
prevents that A record from being a low-TTL dynamic DNS A record?

Vivien
-- 
Vivien M.
[EMAIL PROTECTED]
Assistant System Administrator
Dynamic DNS Network Services
http://www.dyndns.org/ 




RE: Eat this RIAA (or, the war has begun?) - Why not all ISPs?

2002-08-21 Thread Nigel Clarke


Why don't larger ISPs follow through on this? Simply deny RIAA any access...


 
 
 http://www.informationwave.net/news/20020819riaa.php
 
 Too bad it's just a small ISP.
 
  - Joost
 
 ___
 music-bar mailing list
 [EMAIL PROTECTED]
 http://www.ampfea.org/mailman/listinfo/music-bar
 




RE: Eat this RIAA (or, the war has begun?) - Why not all ISPs?

2002-08-21 Thread Ralph Doncaster


Is someone mainitaining a server I can get an eBGP feed from that will
blackhole all RIAA IPs?  If not, how do you propose to block the RIAA?

Ralph Doncaster
principal, IStop.com 

On Wed, 21 Aug 2002, Nigel Clarke wrote:

 
 Why don't larger ISPs follow through on this? Simply deny RIAA any access...
 
 
  
  
  http://www.informationwave.net/news/20020819riaa.php
  
  Too bad it's just a small ISP.
  
   - Joost
  
  ___
  music-bar mailing list
  [EMAIL PROTECTED]
  http://www.ampfea.org/mailman/listinfo/music-bar
  
 
 




Re: Eat this RIAA (or, the war has begun?) - Why not all ISPs?

2002-08-21 Thread Richard A Steenbergen


On Wed, Aug 21, 2002 at 09:08:03PM -0700, Nigel Clarke wrote:
 
 Why don't larger ISPs follow through on this? Simply deny RIAA any
 access...

And what IPs precisely are you planning to deny? So far its all idle
threats, we have no idea where they plan to launch their scans or hacking
attempts from, or even if they have any clue how to hack anything. I
highly doubt they'll be attaching riaa.com to it either.

I suppose if you want symbolism, you can host -l riaa.com and wack their 
wcom webserver and other stuff at att, but I'd harly call that 
productive.

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



Controlling RIAA's hired guns

2002-08-21 Thread Nigel Clarke



I know that this has somewhat thoroughly discussed here as of late, but when
has it ever been acceptable to allow hackers to
break into a customer's computer? I thought that abuse and security teams
were designed to stop this type of thing.



--
Nigel Clarke
Network Security Engineer
Forever Networks





RE: Eat this RIAA (or, the war has begun?) - Why not all ISPs?

2002-08-21 Thread Nigel Clarke


Start now, do whatever it takes.

Amongst the paperwork passed to congress, RIAA must have indicated where
it's hackers would work from. Why not start there?

NANOG should not sit on this.

Trust me, if RIAA tried to function without email and internet access for a
day or two I think they would get the message.

Nigel



-Original Message-
From: Richard A Steenbergen [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, August 21, 2002 6:30 PM
To: Nigel Clarke
Cc: Jerry Eyers; [EMAIL PROTECTED]
Subject: Re: Eat this RIAA (or, the war has begun?) - Why not all ISPs?


On Wed, Aug 21, 2002 at 09:08:03PM -0700, Nigel Clarke wrote:

 Why don't larger ISPs follow through on this? Simply deny RIAA any
 access...

And what IPs precisely are you planning to deny? So far its all idle
threats, we have no idea where they plan to launch their scans or hacking
attempts from, or even if they have any clue how to hack anything. I
highly doubt they'll be attaching riaa.com to it either.

I suppose if you want symbolism, you can host -l riaa.com and wack their
wcom webserver and other stuff at att, but I'd harly call that
productive.

--
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)




Re: Eat this RIAA (or, the war has begun?) - Why not all ISPs?

2002-08-21 Thread Richard A Steenbergen


On Wed, Aug 21, 2002 at 09:36:29PM -0700, Nigel Clarke wrote:
 Start now, do whatever it takes.
 
 Amongst the paperwork passed to congress, RIAA must have indicated where
 it's hackers would work from. Why not start there?
 
 NANOG should not sit on this.
 
 Trust me, if RIAA tried to function without email and internet access for a
 day or two I think they would get the message.

Ok, start listing IPs...

If you have them (and can confirm them of course :P), I'm certain a dozen
people on this list would put up a bgp feed before you can say
blackhole. Heck I'm certain people would have something to do if you 
even knew the provider that was planning on giving them service for such 
activities.

Until then, it's all a bunch of speculation, and my money is still on 
idle threats and hype.

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



RE: Eat this RIAA (or, the war has begun?) - Why not all ISPs?

2002-08-21 Thread J.A. Terranson





 On Wed, Aug 21, 2002 at 09:08:03PM -0700, Nigel Clarke wrote:
 
  Why don't larger ISPs follow through on this? Simply deny RIAA any
  access...

 And what IPs precisely are you planning to deny? So far its all idle
 threats, we have no idea where they plan to launch their scans or hacking
 attempts from, or even if they have any clue how to hack anything. I
 highly doubt they'll be attaching riaa.com to it either.


The blocking of any an all directly RIAA sites, feeds, etc, would
produce an economic reaction.  Cut off their sales websites, their
basic connectivity (how much money do you think it would cost them
to go back to snail mail today?), their [few] subscription sites.

Let the money do the work.


Yours,

J.A. Terranson
[EMAIL PROTECTED]

* SPEAKING STRICTLY IN A PERSONAL CAPACITY *  at this time anyway.
We'll see if we can't change that.  Tomorrow.  Goddamn right!




RE: Eat this RIAA (or, the war has begun?) - Why not all ISPs?

2002-08-21 Thread Dan Hollis


On Wed, 21 Aug 2002, Miles Fidelman wrote:
 On Wed, 21 Aug 2002, Nigel Clarke wrote:
  Start now, do whatever it takes.
  Amongst the paperwork passed to congress, RIAA must have indicated where
  it's hackers would work from. Why not start there?
 What they plan to do sounds incredibly illegal. Now if we could arrange
 for their top management to spend the next few years fighting criminal
 charges, that might keep them out of everybody's hair :-)

Theres always the possible angle of a few hundred pissed off consumers all 
filing individual lawsuits against the top RIAA management as individuals, 
going after each one of them as a person and not as a corporate entity.

Then there is also the angle of blacklisting providers who provide RIAA 
access to the net, blacklist them like spammers or any other net abusers.

-Dan
-- 
[-] Omae no subete no kichi wa ore no mono da. [-]




RE: Eat this RIAA (or, the war has begun?) - Why not all ISPs?

2002-08-21 Thread Nigel Clarke


However, this type of action might not be necessary at all.

Some of the users on this list think RIAA's recent actions are nothing more
than empty threats.
Why doesn't NANOG make a few of its own?

A polite letter from a NANOG representative should do the trick.

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
J.A. Terranson
Sent: Wednesday, August 21, 2002 7:01 PM
To: Nigel Clarke
Cc: Richard A Steenbergen; Jerry Eyers; [EMAIL PROTECTED]
Subject: RE: Eat this RIAA (or, the war has begun?) - Why not all ISPs?






 On Wed, Aug 21, 2002 at 09:08:03PM -0700, Nigel Clarke wrote:
 
  Why don't larger ISPs follow through on this? Simply deny RIAA any
  access...

 And what IPs precisely are you planning to deny? So far its all idle
 threats, we have no idea where they plan to launch their scans or hacking
 attempts from, or even if they have any clue how to hack anything. I
 highly doubt they'll be attaching riaa.com to it either.


The blocking of any an all directly RIAA sites, feeds, etc, would
produce an economic reaction.  Cut off their sales websites, their
basic connectivity (how much money do you think it would cost them
to go back to snail mail today?), their [few] subscription sites.

Let the money do the work.


Yours,

J.A. Terranson
[EMAIL PROTECTED]

* SPEAKING STRICTLY IN A PERSONAL CAPACITY *  at this time anyway.
We'll see if we can't change that.  Tomorrow.  Goddamn right!




Re: Eat this RIAA (or, the war has begun?) - Why not all ISPs?

2002-08-21 Thread Marshall Eubanks


On Wed, 21 Aug 2002 22:32:22 -0700
 Nigel Clarke [EMAIL PROTECTED] wrote:
 
 However, this type of action might not be necessary at all.
 
 Some of the users on this list think RIAA's recent actions are nothing more
 than empty threats.
 Why doesn't NANOG make a few of its own?

Well, it seems pretty certain that RIAA is doing DOS attacks on the
file sharing systems (by trying to flood them with fake files
masquerading as real MP3's). 

I would assume that these are not idle threats.

Regards
Marshall Eubanks


 
 A polite letter from a NANOG representative should do the trick.
 
 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
 J.A. Terranson
 Sent: Wednesday, August 21, 2002 7:01 PM
 To: Nigel Clarke
 Cc: Richard A Steenbergen; Jerry Eyers; [EMAIL PROTECTED]
 Subject: RE: Eat this RIAA (or, the war has begun?) - Why not all ISPs?
 
 
 
 
 
 
  On Wed, Aug 21, 2002 at 09:08:03PM -0700, Nigel Clarke wrote:
  
   Why don't larger ISPs follow through on this? Simply deny RIAA any
   access...
 
  And what IPs precisely are you planning to deny? So far its all idle
  threats, we have no idea where they plan to launch their scans or hacking
  attempts from, or even if they have any clue how to hack anything. I
  highly doubt they'll be attaching riaa.com to it either.
 
 
 The blocking of any an all directly RIAA sites, feeds, etc, would
 produce an economic reaction.  Cut off their sales websites, their
 basic connectivity (how much money do you think it would cost them
 to go back to snail mail today?), their [few] subscription sites.
 
 Let the money do the work.
 
 
 Yours,
 
 J.A. Terranson
 [EMAIL PROTECTED]
 
 * SPEAKING STRICTLY IN A PERSONAL CAPACITY *  at this time anyway.
 We'll see if we can't change that.  Tomorrow.  Goddamn right!
 




RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Robert Blayzor


 Then perhaps you'd like to tell me how we have tens of 
 thousands of users quite happily doing it?
 
 True, I wouldn't run Hotmail/AOL/EarthLink/etc's MXes off 
 dynamic IPs, but for a home/small biz mail server...
 
 Oh, and one last thing, when you specify an MX (statically, 
 as you say), you don't put in the IP but rather a name 
 created with A record, so what prevents that A record from 
 being a low-TTL dynamic DNS A record?

Running a mail server off a dynamically assigned dialup *CAN* work, but
it really isn't the thing to do even if you put in a low TTL on the A
record.  Sure it works.  But what about all the messages that will
requeue on remote mail servers and depending on the remote queueing
strategy of the remote mail server, it can take hours before mail could
be re-attempted for delivery.  A dynamically assigned MX box isn't
really the best thing to do.  If you want to do that then you should at
least have a lower preference backup MX that is on 24/7 that will accept
mail on your behalf, and when your server dynamic SMTP server comes
online it can simply do an ETRN to requeue the mail on the backup MX.  

Having one MX on a dynamic DNS mail server is just rude to remote mail
servers that try to deliver mail.  Why should my servers consume more
resources to benefit your customers?

--
Robert Blayzor, BOFH
INOC, LLC
[EMAIL PROTECTED]

Exclusive: We're the only ones who have the documentation.




RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Vivien M.


 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On 
 Behalf Of Robert Blayzor
 Sent: August 21, 2002 10:53 PM
 To: 'Vivien M.'; [EMAIL PROTECTED]
 Subject: RE: IETF SMTP Working Group Proposal at smtpng.org
 
 
 Running a mail server off a dynamically assigned dialup *CAN* 
 work, but it really isn't the thing to do even if you put in 
 a low TTL on the A record.  Sure it works.  But what about 
 all the messages that will requeue on remote mail servers and 
 depending on the remote queueing strategy of the remote mail 
 server, it can take hours before mail could be re-attempted 
 for delivery.  A dynamically assigned MX box isn't really the 
 best thing to do.  If you want to do that then you should at 
 least have a lower preference backup MX that is on 24/7 that 
 will accept mail on your behalf, and when your server dynamic 
 SMTP server comes online it can simply do an ETRN to requeue 
 the mail on the backup MX.  
 
 Having one MX on a dynamic DNS mail server is just rude to 
 remote mail servers that try to deliver mail.  Why should my 
 servers consume more resources to benefit your customers?

You're assuming that these people aren't permanently online. I expect
most of our users (I hesitate to call them customers, simply because a
lot of them haven't paid anything) are using 24/7 type connections.
Certainly, running your own mail server and being online two hours a day
is foolish.

However, this has NOTHING to do with IP allocation. A friend, years ago,
had a static IP dialup with an ISP that billed him for an X hour/month
package, where I think X was 120 or so. He could have run a mail server
that met your static IP standard of approval, and yet was (unless he
wanted to pay extra) only online 1/6th of the time. Now, most of our
users may not have static IPs, but they're most likely online 24/7 or
close enough. 

Which of the two uses more resources on your servers? I'm willing to bet
the static IP dialup person will, so there goes your argument.

Running mail servers on non-permanent dialup connections is foolish,
I'll grant you that any day, but that wasn't the point you were making.
Your point was that mail servers on dynamic IPs (and you never answered
my question on how you define dynamic) are bad, no matter the
circumstances surrounding them, and that's just plain not true.

Oh, and BTW, you're not benefiting our users by having your servers
queue mail for our users. You're benefitting YOUR customers who
presumably want to be able to send mail to our users, and who expect
your servers to queue mail.

Vivien
-- 
Vivien M.
[EMAIL PROTECTED]
Assistant System Administrator
Dynamic DNS Network Services
http://www.dyndns.org/ 




RE: Eat this RIAA (or, the war has begun?) - Why not all ISPs?

2002-08-21 Thread Christopher L. Morrow



On Wed, 21 Aug 2002, Nigel Clarke wrote:


 Start now, do whatever it takes.

 Amongst the paperwork passed to congress, RIAA must have indicated where
 it's hackers would work from. Why not start there?

 NANOG should not sit on this.

 Trust me, if RIAA tried to function without email and internet access for a
 day or two I think they would get the message.

Surprisingly enough, they didn't seem to care too much that their website
was offline fora  few days. You never can tell though.


 Nigel



 -Original Message-
 From: Richard A Steenbergen [mailto:[EMAIL PROTECTED]]
 Sent: Wednesday, August 21, 2002 6:30 PM
 To: Nigel Clarke
 Cc: Jerry Eyers; [EMAIL PROTECTED]
 Subject: Re: Eat this RIAA (or, the war has begun?) - Why not all ISPs?


 On Wed, Aug 21, 2002 at 09:08:03PM -0700, Nigel Clarke wrote:
 
  Why don't larger ISPs follow through on this? Simply deny RIAA any
  access...

 And what IPs precisely are you planning to deny? So far its all idle
 threats, we have no idea where they plan to launch their scans or hacking
 attempts from, or even if they have any clue how to hack anything. I
 highly doubt they'll be attaching riaa.com to it either.

 I suppose if you want symbolism, you can host -l riaa.com and wack their
 wcom webserver and other stuff at att, but I'd harly call that
 productive.

 --
 Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
 PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)





Re: Eat this RIAA (or, the war has begun?) - Why not all ISPs?

2002-08-21 Thread Valdis . Kletnieks

On Wed, 21 Aug 2002 21:30:27 EDT, Richard A Steenbergen said:

 And what IPs precisely are you planning to deny? So far its all idle
 threats, we have no idea where they plan to launch their scans or hacking
 attempts from, or even if they have any clue how to hack anything. I
 highly doubt they'll be attaching riaa.com to it either.

If you read the URL originally referenced, they intend to blackhole riaa.com
itself, and then run a honeynet gnutella network.  Anything that pokes their
Gnutella and then does anything else on their net that looks suspicious will
get blackholed.

Just imagine it - lots and lots of ISPs running honeynet Gnutellas, and if
you poke around in it you get blackholed.  That would make the RIAA's day. ;)

-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg04707/pgp0.pgp
Description: PGP signature


Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Valdis . Kletnieks

On Thu, 22 Aug 2002 01:08:52 +0200, Brad Knowles [EMAIL PROTECTED]  said:

   It's bad enough waiting for DNS responses so that you can 
 determine whether or not the envelope sender domain even exists.  Now 
 you want to slow down every single e-mail transaction by many, many, 
 many orders of magnitude so that you can do a callback on each and 
 every connection?!?

Worse yet, under his proposal, you're calling back to a callback address
provided by the spammer on the MAIL FROM, to verify a spammer-provided token.
What's wrong with this picture?



-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg04708/pgp0.pgp
Description: PGP signature


  1   2   >