Re: Monitoring dark address space?

2004-04-17 Thread Andrew - Supernews

 Paul == Paul Vixie [EMAIL PROTECTED] writes:

 Paul since this space has no dns records pointing into it, the only
 Paul traffic it will see is from errors/typo's, and network
 Paul scanners.

And blowback from other people forging your addresses as sources.

(We've had quite a few goober-with-firewall reports of that type -
especially from a certain manufacturer of networking equipment who
shall remain nameless, even though they ought to know better.)

  3) What sort of threshold metrics for considering something to be 
  malicious have you found to be good?  (ports/second, ip/second, etc)

 Paul the false positives are less than one in ten million.
 Paul blackhole 'em all.

If you're actually going so far as to accept the connections, yes. If
you're just counting packets, then a little more caution is possibly
indicated.

 Paul it's a l-l-lotta d-d-data, m-m-man.  otoh, between this and
 Paul postprocessing my maillogs looking for wormspoor, i have a
 Paul personal blackhole list with almost a million hosts on it now,
 Paul and about 20% of the ones who probe my smtpk (which always
 Paul accepts all mail you send it) later try to spam my main mail
 Paul server (which is in a different netblock).

Oh. _Very_ interesting.

-- 
Andrew, Supernews



Re: Lazy network operators

2004-04-17 Thread Rob Nelson


Steve, you're authorized if you say you are and agree to accept 
responsibility.
Most corporations would readily provide the addresses of their mail servers;
anyone on DSL or cable connection could do the same.  But by changing the
default behavior to block port 25 until requested, you could readily 
address the
spam problem.   It would take some work on the part of operator community
(hence the subject), and doesn't fit in the world wide commune perspective
of networking, but it would make the Internet far more useful for everyone.
(I realize I'm a few days late on this, been travelling all week)

What about that small business with a remote site on a cable modem? All 
they want is their local server to talk to the one upstream, and they'd 
rather pay, say, Time Warner $50 a month on a dynamic instead of $200 for a 
single static IP. Can't really blame them, can you? Is this 
authorization-filter-scheme going to account for servers on dynamic IP?

Rob Nelson
[EMAIL PROTECTED]


IDDB: Companion Domains Database to IADB (and IADB Update)

2004-04-17 Thread Anne P. Mitchell, Esq.
All,

We have not yet announced, but have made available, the IDDB - ISIPP 
Domains Database.  This is a companion database to IDDB, and allows 
queriers to do a query by domain name;  if the domain name is listed, 
it will return a list of IP addresses from which the domain is properly 
allowed to mail, along with the listee's IADB registration number for 
cross reference.  Obviously, the resulting IP addresses can than be 
plugged into an IADB query to get the IADB data about the sender's 
status, opt-in policies, etc..

This is _not_ intended as a replacement for SPF, MS Caller ID for 
Email, Domain Keys, etc..  Rather it is simply a companion database to 
IADB, which we are offering at the request of both senders and 
receivers who wanted this ability.

IADB is also growing, now offering additional information (the newest 
is the data code which means the only email which comes from this IP 
address is mailing list email, and that mailing list email is entirely 
confirmed (double) opt-in), and providing such information to ISPs, 
spam filters, and other queriers for more than 325million pieces of 
email per month.  The full list if current information provided by an 
IADB lookup is at http://www.isipp.com/iadbquery.php

Querying IDDB, as with IADB, is free (and always will be), and can be 
done by filling out a short form at 
http://www.isipp.com/iadb_query_sign_up.php   We hope that you will get 
good use out of IDDB as well as IADB, and I want to thank those of you 
already supporting it.

Anne




Re: Monitoring dark address space?

2004-04-17 Thread Hank Nussbacher
At 09:06 AM 16-04-04 -0500, David A.Ulevitch wrote:

NANOG,

I was wondering how many of you are running some sort of detection tool on 
dark address space on your network?  In an effort to curb malicious 
outbound non-spoofed traffic from owned client machines I think one of 
the easiest methods we have is to look for scans in what should be dead 
space.  The source-address spoofed traffic is easy to drop, the legal 
traffic is a bit more complex and I'm looking for non-inline methods of 
curbing this traffic.

My questions are:

1) Are you doing this and if so, what tools are you using?  Some sort of 
simple listening device with thresholds would probably do the trick if one 
machine monitored an entire /24 or some random /32's out of a /16.
We run one on a /16.  You can find details here:
http://noc.ilan.net.il/research/riverhead/
We also know of the SWITCH dark address monitor at:
http://www.switch.ch/security/services/IBN/
I'd be interested in knowing of any others.
The stats haven't been updated in a while but that will change over the 
next few months.

-Hank


2) What techniques seem to be better? Monitoring an entire /24 or picking 
a distributed selection of IPs from a /16? (using a /24 or /25 is much 
easier on the administrative end of things from where I sit...)

3) What sort of threshold metrics for considering something to be 
malicious have you found to be good?  (ports/second, ip/second, etc)

4) Are there downsides to this (aside from false positives, which would 
hopefully be rare in truly dark address space).

Off-list replies are fine and I'll summarize after a few days.

thanks,
davidu

  David A. Ulevitch - Founder, EveryDNS.Net
  Washington University in St. Louis
  http://david.ulevitch.com -- http://everydns.net




Re: Anyone alive at ALTDB?

2004-04-17 Thread Jason Lixfeld
On Apr 14, 2004, at 2:47 PM, Robert E. Seastrom wrote:

Jason Lixfeld [EMAIL PROTECTED] writes:

messages to db-admin have so far gone unanswered.
I spoke with the db-admin; he advises as follows:

1) you sent a single message to create a maintainer object, about 24
hours before posting to NANOG.  The turnaround time that you have
experienced is well within historical norms for creating new maint
objects.  Please be patient.
There was no documentation anywhere specifying the turnaround time for 
maintainer object creation.  Had there been a message returned with the 
object saying hold your horses for 3 days, I would have.



Re: Anyone from ATT here? (ATT bogus DNSBL answers)

2004-04-17 Thread jlewis

Steve Linford wrote:

 ATT customers have contacted us saying they can't reach any of our
 DNSBLs, seems ATT have defined a fake sbl.spamhaus.org zone in their
 DNS servers so when ATT customers ask ATT's NS 12.149.189.2 for
 sbl.spamhaus.org they get:
 ...

I was looking at this some more last night, and noticed this appears to
have been some kind of mistaken identity issue.  Check the whois and
PTR for 12.149.189.2.  It certainly doesn't appear to be an ATT
maintained DNS server.

If there really are/were ATT customers who couldn't resolve the various
popular DNSBLs, I wonder, was the issue caused by something else?  Are
they setup to query the wrong DNS servers...perhaps 12.149.189.2 used to
be an ATT DNS server before 2001-09-05, but since then, it's been an ATT
customer's machine.  Maybe that customer is getting hammered with queries
from old ATT customers and is trying to encourage them to go elsewhere
for DNS service.

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_


Re: Anyone from ATT here? (ATT bogus DNSBL answers)

2004-04-17 Thread Steve Linford
At 16:06 -0400 (GMT) 17/4/04, [EMAIL PROTECTED] wrote:
 Steve Linford wrote:

 ATT customers have contacted us saying they can't reach any of our
 DNSBLs, seems ATT have defined a fake sbl.spamhaus.org zone in their
 DNS servers so when ATT customers ask ATT's NS 12.149.189.2 for
 sbl.spamhaus.org they get:
 ...
 I was looking at this some more last night, and noticed this appears to
 have been some kind of mistaken identity issue.  Check the whois and
 PTR for 12.149.189.2.  It certainly doesn't appear to be an ATT
 maintained DNS server.
No mistake, although 12.149.189.2 is a customer's NS it uses ATT's 
NS as the resolver. We've have complaints from other ATT users about 
the same thing, as does another DNSBL (SpamCop), and there's now an 
answer from ATT to one of their customers who forwarded ATTs 
response:

I finally talked to someone who knows what the problem is.  Your sbl sites
have been blocked by the standard DNS forwarders supplied by ATT. This is
due to the workload being generated on them from mailservers.
--
  Steve Linford
  The Spamhaus Project
  http://www.spamhaus.org


Re: Anyone alive at ALTDB?

2004-04-17 Thread Joe Abley


On 17 Apr 2004, at 14:48, Jason Lixfeld wrote:

There was no documentation anywhere specifying the turnaround time for 
maintainer object creation.  Had there been a message returned with 
the object saying hold your horses for 3 days, I would have.
Ask for your money back :-)



Re: Anyone from ATT here? (ATT bogus DNSBL answers)

2004-04-17 Thread Raymond Dijkxhoorn

Hi!

 No mistake, although 12.149.189.2 is a customer's NS it uses ATT's 
 NS as the resolver. We've have complaints from other ATT users about 
 the same thing, as does another DNSBL (SpamCop), and there's now an 
 answer from ATT to one of their customers who forwarded ATTs 
 response:
 
 I finally talked to someone who knows what the problem is.  Your sbl sites
 have been blocked by the standard DNS forwarders supplied by ATT. This is
 due to the workload being generated on them from mailservers.

Duh! This is really dumb. 

Will they also block microsoft in their forwarders when there are new 
patches like last week, thats also generating NS traffic... 

Unbelievable.

Bye,
Raymond.



Re: Lazy network operators

2004-04-17 Thread Rob Nelson


Spammers are users too. You can't spell abuser without user. You
are inherently trying to diminish the power of the abuser users. No
spam mitigation solution can ever answer, yes, to that question
without the qualification that at least some users, the abusers, will be
disempowered. The equation will always come to balancing how hard you
hit the spammers versus minimizing the collateral damage. Or it's another
classic example of security versus usability.


But speaking of usability, email becomes IMMEDIATELY unusable if there is a 
technological anti-spam measure in place, be it something client-side 
like spamassassin or another RFC implemented server-side, that prevents 
even a single wanted email from getting to you. Especially if you are, for 
example, sitting at home on the phone with another person saying Email me 
that file, again and it's not going anywhere. At that point, email is 100% 
dead.

Rob Nelson
[EMAIL PROTECTED]
Rob Nelson
[EMAIL PROTECTED]


Re: Lazy network operators

2004-04-17 Thread Paul Jakma

On Fri, 16 Apr 2004, Paul Vixie wrote:

 it's still quite astounding to me that when we finish deploying
 ipv6 we'll still have provider assigned addresses that customers
 are afraid to use beyond the edge of their campus, and we'll still
 have the age-old tension between i could get global routing for
 that address block and i could qualify with my RIR to obtain that
 address block (and afford the fees).
 
 anyway, there will absolutely be NAT in ipv6 enterprise networks, but the
 reason for it won't be a shortage of globally unique address space.

Hmmm, or rather, there just wont be any demand for IPv6 deployment,
at least from the edges (consumers, small/medium networks). Why
bother changing if, despite the (almost indefinitely) availability of
sparse address space, one can not claim a tiny piece as ones' own?
Which is IPv4's only problem, at least as seen from the edges.

Provider independence (to some degree, even by DNS A6 or otherwise)  
for all should have been IPv6's biggest selling point. It doesnt have
it, judging by multi6 it's not likely it ever will, and hence it's
similarly unlikely there ever will be any real demand for v6.

(i write this hoping it won't be so, but i'm not very optimistic
about it).

regards,
-- 
Paul Jakma  [EMAIL PROTECTED]   [EMAIL PROTECTED]   Key ID: 64A2FF6A
warning: do not ever send email to [EMAIL PROTECTED]
Fortune:
consultant, n.:
Someone who knowns 101 ways to make love, but can't get a date.


Re: Anyone alive at ALTDB?

2004-04-17 Thread Steve Rubin


There was no documentation anywhere specifying the turnaround time for 
maintainer object creation.  Had there been a message returned with the 
object saying hold your horses for 3 days, I would have.
Maybe there is no auto responder because of the huge amount of spam 
auto-dbm receives?



RE: Lazy network operators

2004-04-17 Thread Michel Py

 Paul Jakma wrote:
 Hmmm, or rather, there just wont be any demand for
 IPv6 deployment, at least from the edges (consumers,
 small/medium networks).

Oh oh I see another one taking the path that leads to the dark side.


_.-'~~`-._
/  ||  \
   /   ||   \
  ||||
  | ___||___ |
  |/ - \/ - \|
 /  ( )  ( )  \
/ \  - () -  / \
   /   \  /||\  /   \
  / \/\/ \
 /   \  /||\  /   \
/_\oo/_\
  `--...__|`-._  _.-'|__...--'
  |`'|



Re: Lazy network operators - NOT

2004-04-17 Thread Doug White


:
: Ok, you have eloquently described the problem, now, please be good enough to
: give your solution
:
:
: There is no easy solution. That's why we still have problems with spam in
: postal mail, and that's been around for how many centuries? I'd go so far
: as to say there's no easy solution, either. If there's authentication, then
: new worm/trojans will focus on breaking the auth scheme or the auth
: servers. If there's a blackout on port 25, then they'll use other ports. If
: there's a list of trusted hosts, that list will be attacked.
:
: The only chance in hell of making a dent in spam is making a dent in its
: profitability. If the guy sending the spam gets hassled once in a while, he
: probably thinks it's worth it considering the new house and stable of
: sports cars he has. If he's getting hassled AND he's just as poor or rich
: as when he started, then and only then will it not be worth the hassles to
: the spammer.
:
: Honestly, I don't understand how the spammers make money at all, so I can't
: comment on it. However, I'd definitely suggest any solution look at the
: profitability of spam, not the feasibility.
:
:
: Rob Nelson
: [EMAIL PROTECTED]
:
:
:
Cost transference.  The cost of Spam via postal mail is borne by the sender.
When sent via email, the cost is shouldered by the recipient.

Spamming is pervasive mainly due to the inattention or failure to enforce
acceptable use policies by the service provider.  A response rate of .0001 is
sufficient for the spammer to profit because of being able to take advantage of
the recipient bearing the cost of delivery.  There is no only chance.  What
seems to be required is the blended approach.

Educating that user who does respond to UCE is a monumental, if not impossible
task, while the safety and protection of individual networks is a need which is
far more immediate.  That education task is beyond the resources and capability
of the offended mail server administrator.

There is a plethora of methodology, and suggestions as to how best to combat the
spew, and most of us have accepted the risk of the occasional false positive,
especially when your correspondent chooses to continue to do business with a
black hat provider.

We have resorted to trying to get the customer to bring his own pressure on his
provider, we have tried to pressure providers to be more responsive,
unfortunately with mixed results.  Especially when legislation and rules are
formulated that can be at odds with the advertising campaigns of the providers
themselves.

All in all though we are trying to fight the good fight, and believe in
technology, not legislation.

cheers.

Doug

==
We can get rid of spam on your domain! , Anti-spam solutions
http://www.clickdoug.com/mailfilter.cfm
For hosting solutions http://www.clickdoug.com
==



RE: Lazy network operators

2004-04-17 Thread Paul Jakma

On Sat, 17 Apr 2004, Michel Py wrote:

 Oh oh I see another one taking the path that leads to the dark side.

Well, let's be honest, name one good reason why you'd want IPv6
(given you have 4)? And, to be more on-topic, name one good reason
why a network operator would want it? Especially given that, apart
from the traditional bleeding edges (academic networks), no customers
are asking for it.

As Paul Vixie points out, without a multihoming solution beyond that
offered by 4, v6 networks will look just v4 - most of it will be on
non-global address space and NAT. Not really interesting..

[snip darth vader]

I know, what's worse is that I know it need not be so. (how's your
MHAP doing?  How's Iljitsch's geo-assigned addressing proposal?)
 
regards,
-- 
Paul Jakma  [EMAIL PROTECTED]   [EMAIL PROTECTED]   Key ID: 64A2FF6A
warning: do not ever send email to [EMAIL PROTECTED]
Fortune:
One nice thing about egotists: they don't talk about other people.


Re: Lazy network operators - NOT

2004-04-17 Thread John Curran

At 9:42 PM -0500 4/17/04, Doug White wrote:

Spamming is pervasive mainly due to the inattention or failure to enforce
acceptable use policies by the service provider.

It's pervasive because its profitable.  It's been profitable because even a few weeks
of a high-speed circuit can generate millions of messages which don't need much of a
response rate to generate revenue.  The problem now is that a growing percentage
of spam is originating from distributed farms of broadband connected users
(Commtouch says 80% in one article, but I'm not yet convinced its that high -
http://www.clickz.com/stats/big_picture/applications/article.php/3337751)
This would suggest that spam is pervasive largely because of the large number
of insecure systems available for origination (via port 25 :-), not because of
providers failing to close barn doors after the fact...

/John


Re: Lazy network operators

2004-04-17 Thread Paul Vixie

  ...
  anyway, there will absolutely be NAT in ipv6 enterprise networks, but the
  reason for it won't be a shortage of globally unique address space.
 
 Hmmm, or rather, there just wont be any demand for IPv6 deployment, at
 least from the edges (consumers, small/medium networks). Why bother
 changing if, despite the (almost indefinitely) availability of sparse
 address space, one can not claim a tiny piece as ones' own?  Which is
 IPv4's only problem, at least as seen from the edges.

ipv6 solves problems that large providers have, or speculate that
they'll have, and at some point the edge/enterprise will adopt a dual
stack approach just to be reachable by 3G-etc, assuming that 3G-etc
ever stops having the 6to4/ISATAP/etc features it'll have to have
before it has v6 at all.  so, theoretically, there's a tipping point
where dualstack or even v6-only will make sense even to someone who
refuses the lockins and stays with a NAT-based or proxy-based design.

 Provider independence (to some degree, even by DNS A6 or otherwise)
 for all should have been IPv6's biggest selling point. It doesnt have
 it, judging by multi6 it's not likely it ever will, and hence it's
 similarly unlikely there ever will be any real demand for v6.

provider independence is not a clear virtue in the eyes of those powerful
enough to sway vendors toward implementation -- that is, people with
billion dollar annual capital budgets.  it may not even be a clear virtue
in the eyes of the edge/enterprise consumers who want to avoid lockin,
since they've gotten comfortable with NAT and proxies over the years, and
since in a post-CIDR world, everybody knows that the equilibrium between
can-route and can-qualify has to be more toward can-route and the people
who can't-qualify just need to make other arrangements.

i dearly wish i had understood this market equation at the time i was
pushing for A6/DNAME, since at that time i stupidly thought that this was
a technical problem and the people on the other side of the argument just
didn't understand the technical issues well enough.  (oops.)