Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Christopher L. Morrow


On Thu, 24 Jun 2004, Dr. Jeffrey Race wrote:


 On Thu, 24 Jun 2004 03:05:41 + (GMT), Christopher L. Morrow wrote:
 Sure, customer of a customer we got emailtools.com kicked from their
 original 'home' now they've moved off (probably several times since 2000)
 to another customer. This happens to every ISP, each time they appear we
 start the process to disconnect them.

 This is too flagrant to let pass without comment.

 This endless loop situation does NOT happen to every ISP, only to those who
 have not emplaced procedures to prevent serial signups of serial
 abusers.  This is

Sorry, you mistook my statement, or I mis-spoke it such that you would
misunderstand it :( So, the point I was trying to make I'll try again with
an example: (situtation not made up, parties made up)

1) spammer#12 signs up as a webhosting customer of Exodus who is a
customer of As701
2) 701 gets complaints, notifies good customer Exodus who terms the
spammer's website/box/blah
3) spammer#12 signs up with next 50$/month hosting site Abovenet off 1239
4) 1239 gets complaints notifies the good customer abovenet who terms the
customer.
.
.
.
12) spammer#12 signs up with webhosting group rackspace who is a 701
customer
13) return to step 2

This process happens repeatedly, spammers know they can get about a month
of time (or more, depending on upstreams and hosting providers in
question) of life, either way it's just 50 bucks At all times, they
are not customers of 1239, 701, whomever... they are a customer of a
customer. So, 701 or 1239 never know who the downstream is, in the
particular case of emailtools.com this is the case... Or, that's what
seems to have happened since they were a customer of some NYC based
customer 4 years ago, and are now a customer of some TPA based customer
now.

 trivially easy to do and your firm's failure to do so and to enforce
 this rule on your
 contracting parties definitively proves your management's decision to
 profit from
 spam rather than to stop spam.


I'd also point out someting that any provider will tell you: Spammers
never pay their bills. This is, in fact (for you nanae watchers), the
reason that most of them get canceled by us FASTER... Sadly, non-payment
is often a quicker and easier method to term a customer than 'abuse', less
checks since there is no 'percieved revenue' :(

-Chris


Re: Unplugging spamming PCs

2004-06-24 Thread Peter Galbavy

Larry Pingree wrote:
 Can you suggest another method that would have more accuracy? I think
 it's ridiculous that every service on the internet is provided without
 any authentication and integrity services, if we allowed anyone to
 call from anywhere within the telephone network, you'd have rampant
 falsification, which is what we have today.

It is these characteristics that has made the Internet work and grow the way
it has.

You comment about the telephone network; Erm, that's just the way it works
today - the AAA is in the SS7/C7/etc. layer, similar to BGP in IP.

The problem being raised in this thread is too old to solve this way. If
e-mail was regulated from early on, then it may have worked. Now there are
too many ways to get around any regulations proposed.

Anyhow, I don't want my e-mail correspondants vetted and approved by a
(never neutral) third party.

Peter



Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Dr. Jeffrey Race

Chris why do you give me such easy ones? :)

This situation has been known for years and it is I repeat trivially easy to solve.

1-There are relatively small numbers of serious spammers and of ISPs.
2-In your contract you require all your customers to know the true identities of
their customers (if juridical entities, their officers and directors) and to impose
this requirement on every subcontract.  ISP violators will be terminated 
immediately.
3-The end-user contract must state that spamming is forbidden; there are
   penalties for infraction, notionally $500 for the first offense, $5,000 for
  the next, $50,000 for the third, AT WHATEVER CARRIER IN THE SYSTEMWIDE
  DATABASE.   The end-user
  must provide a validated credit card.   Customer agrees that violation will
  result in immediate termination with prejudice which will be logged in a system-wide
  shared database.
4-No applicant can be accepted without first checking this database and ROKSO.

Violation of such a contract is not just a civil matter resulting in penalties (charged
against the credit card which affects the applicant's credit history).   It is also the
criminal offense of fraud in the inducement because the perp signed the 
agreement with the prior intention to violate it.

Therefore when your downstream terminates a perp, they enter him (by real name)
in the system-wide database, collect the penalty, and file a police report and have
him criminally prosecuted.  If they refuse, you terminate the downstream.

Poof!  MCI spam problem goes away in 30 days.

I went through all this with your counsel Neil Patel.  Your company refused to
do anything, because it wanted to continue to profit from spam.The adventure
continues.

Chris--nothing personal.   It's just business.  These are the facts.  Lots of
companies have procedures like this in place which is why they don't have
spam problems.

Jeffrey Race





On Thu, 24 Jun 2004 06:34:25 + (GMT), Christopher L. Morrow wrote:
On Thu, 24 Jun 2004, Dr. Jeffrey Race wrote:
 On Thu, 24 Jun 2004 03:05:41 + (GMT), Christopher L. Morrow wrote:
 Sure, customer of a customer we got emailtools.com kicked from their
 original 'home' now they've moved off (probably several times since 2000)
 to another customer. This happens to every ISP, each time they appear we
 start the process to disconnect them.

 This is too flagrant to let pass without comment.

 This endless loop situation does NOT happen to every ISP, only to those who
 have not emplaced procedures to prevent serial signups of serial
 abusers.  This is

Sorry, you mistook my statement, or I mis-spoke it such that you would
misunderstand it :( So, the point I was trying to make I'll try again with
an example: (situtation not made up, parties made up)

1) spammer#12 signs up as a webhosting customer of Exodus who is a
customer of As701
2) 701 gets complaints, notifies good customer Exodus who terms the
spammer's website/box/blah
3) spammer#12 signs up with next 50$/month hosting site Abovenet off 1239
4) 1239 gets complaints notifies the good customer abovenet who terms the
customer.
.
.
.
12) spammer#12 signs up with webhosting group rackspace who is a 701
customer
13) return to step 2

This process happens repeatedly, spammers know they can get about a month
of time (or more, depending on upstreams and hosting providers in
question) of life, either way it's just 50 bucks At all times, they
are not customers of 1239, 701, whomever... they are a customer of a
customer. So, 701 or 1239 never know who the downstream is, in the
particular case of emailtools.com this is the case... Or, that's what
seems to have happened since they were a customer of some NYC based
customer 4 years ago, and are now a customer of some TPA based customer
now.

 trivially easy to do and your firm's failure to do so and to enforce
 this rule on your
 contracting parties definitively proves your management's decision to
 profit from
 spam rather than to stop spam.


I'd also point out someting that any provider will tell you: Spammers
never pay their bills. This is, in fact (for you nanae watchers), the
reason that most of them get canceled by us FASTER... Sadly, non-payment
is often a quicker and easier method to term a customer than 'abuse', less
checks since there is no 'percieved revenue' :(





Re: Unplugging spamming PCs

2004-06-24 Thread Michael . Dillon

 And again, much of this comes down to enforcement. When was the last
 time you heard of a spammer's domain being pulled? How about the last
 time you saw a spammer be even remotely bothered by having their
 domain pulled? Do you think they'll really care less about losing a
 mail server when they've got another dozen lined up ready and waiting?

Well, just a couple of days ago I read about a Russian court in
Chelyabinsk that sentenced a spammer to two years in prison. It's
the first conviction under a Russian law that forbids the use
of malicious software and the court felt that the spamming scripts
used by this guy were malicious software.

What he did was to send text messages to mobile phone
subscribers of a single company by means of a web gateway.
I think the main reason he was put on trial was because the
mobile operator whose customers were getting the spam and
whose gateway was being misused, went to the police and
complained. How many ISPs in the USA go to the police and 
register official complaints about spammers? We have lots
of smart people who can track down and identify spammers
but it does no good unless the companies who suffer damage
register an official police complaint.

--Michael Dillon


Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread George Roettger


 This process happens repeatedly, spammers know they can get about a month
 of time (or more, depending on upstreams and hosting providers in
 question) of life, either way it's just 50 bucks

forgive my question, but why does it take a month? If you had a bad route
causing an outage for the spammer, would it take a month for the involved
ISPs to fix that?

Geo.



Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread william(at)elan.net

On Thu, 24 Jun 2004, Curtis Maurand wrote:

 spamhaus has gotten too agressive.  Its now preventing too much legitimate 
 email.

Spammers have gotten too agressive. If you don't filter you would not
see any legitimate email.

-- 
William Leibzon
Elan Networks
[EMAIL PROTECTED]



Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Jun-ichiro itojun Hagino

  spamhaus has gotten too agressive.  Its now preventing too much legitimate 
  email.
 
 Spammers have gotten too agressive. If you don't filter you would not
 see any legitimate email.

a couple of days before my primary email server crashed, so i
configured a backup machine.  the backup machine does not have spam
filtering database at first.  i managed to install bogofilter,
but anyways, it became apparent that i get 50+ Mbytes of spams per day.
what a waste of electrons!  we need to conserve electrons!!

itojun


Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Robert E. Seastrom


Dr. Jeffrey Race [EMAIL PROTECTED] writes:

 Poof!  MCI spam problem goes away in 30 days.

http://www.rhyolite.com/anti-spam/you-might-be.html

I think the discussion is over.

---Rob



Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Stephen Perciballi


[Thu, Jun 24, 2004 at 10:20:33AM +0700]
Dr. Jeffrey Race Inscribed these words...


 
 On Thu, 24 Jun 2004 03:05:41 + (GMT), Christopher L. Morrow wrote:
 Sure, customer of a customer we got emailtools.com kicked from their
 original 'home' now they've moved off (probably several times since 2000)
 to another customer. This happens to every ISP, each time they appear we
 start the process to disconnect them.
 
 This is too flagrant to let pass without comment.
 
 This endless loop situation does NOT happen to every ISP, only to those who
 have not emplaced procedures to prevent serial signups of serial abusers.  This is 
 trivially easy to do and your firm's failure to do so and to enforce this rule on 
 your
 contracting parties definitively proves your management's decision to profit from
 spam rather than to stop spam.
 

I think you may be missing a major point.  UUNET/MCI provides dedicated internet 
services to so many downstreams that it is impossible to stop spammers from 
signing up to those downstreams.  Preventing spammers from signing up for 
UUNET/MCI services is, yes, trivial.  Preventing spammers from signing up on a 
downstream of a downstream of a downstream etc is impossible.


 Jeffrey Race
 
 
 

-- 

Stephen (routerg)
irc.dks.ca


Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Dr. Jeffrey Race

On Thu, 24 Jun 2004 09:20:30 -0400, Stephen Perciballi wrote:
I think you may be missing a major point.  UUNET/MCI provides dedicated internet 
services to so many downstreams that it is impossible to stop spammers from 
signing up to those downstreams.  Preventing spammers from signing up for 
UUNET/MCI services is, yes, trivial.  Preventing spammers from signing up on a 
downstream of a downstream of a downstream etc is impossible.

With this procedure (please re-read it carefully, everyone in the entire contractual
chainv) is bound) they can sign up ONCE.  After that they go in the
common database.

It is the same way credit reporting works: you mess up, you get no
credit.

Come on guys, you are all smart engineers.   This is not rocket science.

Jeffrey Race




Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Brian W. Gemberling


Is it possible for some people to chime in on backbone scaling
issues that have a linksys cable modem router to test on?

On Thu, 24 Jun 2004, Robert E. Seastrom wrote:



 Dr. Jeffrey Race [EMAIL PROTECTED] writes:

  Poof!  MCI spam problem goes away in 30 days.

 http://www.rhyolite.com/anti-spam/you-might-be.html

 I think the discussion is over.

 ---Rob



Re: Unplugging spamming PCs

2004-06-24 Thread Chris Horry
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Larry Pingree wrote:
| Mail servers should be registered just like domains and shutdown by a
| registrar if they are misusing their registered services. This really
| needs to be handled by a multi-lateral legal solution, industry will not
| fix it alone.
Very bad, very unworkable solution.  There's just too many mail servers
out there (legitimate ones) for this to be even remotely feasible.
Systems like SPF are on the right tracks but it's still not a very
elegant solution.
My vote is still for some kind of public key authentication built around
already existing protocols (TLS for example).  The free e-mail providers
would be number one on my list to implement this!  It'd still be a lot
of work and require total cooperation from the Internet community, however.
Of course, if I knew a total solution that'd please everyone I wouldn't
be sitting here writing this.  I'd be sitting on my private Island in
the South Pacific sipping cocktails :-)
Chris
- --
Chris Horry KG4TSM   You're original, with your own path
[EMAIL PROTECTED]   You're original, got your own way
PGP: DSA/2B4C654E-- Leftfield
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFA2uFTnAAeGCtMZU4RAkB0AJ9Hg8Y/zK4KO7kBqqHyYrIMYqXlrACfbwnC
owpXEEltr3LD7hdhEcMeitY=
=G1Fw
-END PGP SIGNATURE-


Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Michael . Dillon

 It is the same way credit reporting works: you mess up, you get no
 credit.
 
 Come on guys, you are all smart engineers.   This is not rocket science.

If anyone really cared about SPAM, then the credit reporting
companies would already be collecting information about
SPAMmers and network operators would pay them for that info
when they sign up new customers.

But most people are happy with things the way
they are. They love SPAM because it gives them
something to complain about and get emotional about.

Personally, I find SPAM to be a minor annoyance. I just delete
the dozen or so messages a day that make their way through the
SPAM filter. 

But what concerns me far more than SPAM is the
fundamental insecurity of the email system which
makes it impossible to trust the source of any
email message unless you have some prior knowledge 
of the sender. Back in the old days, at least we
had alternatives like Compuserve and MCI-Mail. Now
there is only one email system and it is rotten
at the core. If we would fix that then most of the
time, SPAM would be a minor annoyance like graffitti
or vandalism is in the real world. As it currently
stands, SPAM is like terrorism circa 1999, i.e. it's
escalating and you ain't seen nuthin' yet...

--Michael Dillon



Re: Can a customer take IP's with them?

2004-06-24 Thread Jeroen Massar
On Thu, 2004-06-24 at 06:49, [EMAIL PROTECTED] wrote:
 On Wed, 23 Jun 2004 15:48:14 MDT, John Neiberger [EMAIL PROTECTED]  said:
 
  IANAL, but it appears that from a contractual perspective it is clear
  that ARIN retains all 'ownership' rights to the address space. They
  subdivide it to those who are willing to contractually agree to their
  conditions, but the ownership is never transferred. I would think that
  that is an important distinction to make.
 
 IANAL either, but I believe that ARIN doesn't claim to own 32-bit integers.
 What they're providing is a *registry service* to keep track of what entities
 are using what ranges of 32-bit integers, to prevent duplication.  There's no
 *requirement* that you use any particular address range, except that by
 community agreement, nobody wants to deal with non-registered addresses.
 
 If ARIN actually *owned* the address space, we'd not have the perennial
 flame-war regarding 1918-space source addresses on the global net - everybody
 would do a really fast and good job of implementing ingress/egress filtering
 because ARIN could sue you for using their addresses... :)

I think you meant IANA there, not ARIN ;) Indeed nobody will complain if
you setup your own RIR and start handing out addresses, it is a registry
and those work as long as common believe is that they are the central
sources of authority. The same goes for DNS and basically everything
else.

On another, related note:

RFC2544 (C.2.2):
8--
   The network addresses 192.18.0.0 through 198.19.255.255 are have been
   assigned to the BMWG by the IANA for this purpose.  This assignment
   was made to minimize the chance of conflict in case a testing device
   were to be accidentally connected to part of the Internet.  The
   specific use of the addresses is detailed below.
--8
Thus 192.18.0.0/15 is IANA ?reserved? for the BMWG (btw note also
the are have been ;), but in whois.arin.net:

8--
OrgName:Sun Microsystems, Inc
OrgID:  SUN
Address:4150 Network Circle
City:   Santa Clara
StateProv:  CA
PostalCode: 95054
Country:US

NetRange:   192.18.0.0 - 192.18.194.255
CIDR:   192.18.0.0/17, 192.18.128.0/18, 192.18.192.0/23,
192.18.194.0/24
NetName:SUN1
NetHandle:  NET-192-18-0-0-1
Parent: NET-192-0-0-0-0
NetType:Direct Allocation
NameServer: NS1.SUN.COM
NameServer: NS2.SUN.COM
NameServer: NS7.SUN.COM
NameServer: NS8.SUN.COM
Comment:
RegDate:1985-09-09
Updated:2003-10-10
-8

The RFC is from 1999, according to the above Sun owns and is using that
block a lot longer what is correct?
RFC1944 (from 1996) also notes that block.
RFC1062 (from 1988) then again mentions SUN there ;)

Anyone who has some thoughts about this?
Because a /15 is a very nice testrange if you don't want to break
connectivity to existing rfc1918 addresses and of course not to forget
SUN if you like watching pictures of highend servers to name an example
:)

Greets,
 Jeroen



signature.asc
Description: This is a digitally signed message part


Suggestion: identify and thread trouble tickets

2004-06-24 Thread Colm MacCarthaigh


Many network operators have Trouble Ticket systems (as per RFC1297)
which send mails notifying customers, peers and other interested parties
of network problems, events and so on. Many of these mails cross my
desk, so I thought it might be useful to make two small suggestions to
trivially increase the functionality of these mails ... use the mail
headers cleverly.

Firstly, a lot of us receive a lot of tickets and to ease the workload
we filter them into seperate mailboxes. To assist this process, rather
than making us all use unreliable filters based on a sender address or a
particular format to the subject, consider including a custom X-header,
here at HEAnet we use:

   X-HEAnet-TicketID: [ticket id]
   X-HEAnet-Ticket-Distribution: [public|noc|personal ..]

But only one is really neccessary (though I guess it depends on how easy
you want to make subfiltering), and it should be committed to.  No
matter what you do to your trouble ticketing system the X header should
remain. This would avoid the situation of breaking filtering on people
when you change whatever unique subtlety they happen to be relying upon.

Now secondly, after you've made it easy for people to distuingish your
tickets from those of others, consider making it easy for people to
distinguish your tickets from each other.

For 1 year now, HEAnet have been issueing tickets with Message-ID's
generated by our ticketing system, for example:

   To: [EMAIL PROTECTED]
   From: Colm MacCarthaigh [EMAIL PROTECTED]
   Subject: HEA-NOC/20040519-11 [OPEN] IPv6 packet loss on backbone
   X-HEAnet-TicketID: 20040519-11
   X-HEAnet-Ticket-Distribution: public
   Message-ID: [EMAIL PROTECTED]

And then subsequent updates to the ticket have headers such as:

   To: [EMAIL PROTECTED]
   From: Colm MacCarthaigh [EMAIL PROTECTED]
   Subject: HEA-NOC/20040519-11 [UPDATE] IPv6 packet loss on backbone
   X-HEAnet-TicketID: 20040519-11
   X-HEAnet-Ticket-Distribution: public
   In-Reply-To: [EMAIL PROTECTED]
   References: [EMAIL PROTECTED]
   Message-ID: [EMAIL PROTECTED]

I'm sure everyone can predict that the next mail would look like:

   To: [EMAIL PROTECTED]
   From: Colm MacCarthaigh [EMAIL PROTECTED]
   Subject: HEA-NOC/20040519-11 [UPDATE] IPv6 packet loss on backbone
   X-HEAnet-TicketID: 20040519-11
   X-HEAnet-Ticket-Distribution: public
   In-Reply-To: [EMAIL PROTECTED]
   References: [EMAIL PROTECTED]
   Message-ID: [EMAIL PROTECTED]

This simple feature has the effect of enabling mails concerning the same
ticket to be threaded/grouped (and whatever gmail is calling it these
days) in the users mail client, if their mail-client supports threaded
viewing. We all know what it looks like :). If a user wants to see them
chronologically instead, just turning the threaded viewing off is
enough. We've had no reports of problems and many people have found it
useful, and personally I find TT mails substantially more manageable in
this form.

If tickets are logged to a HTML archive, threaded mails can help there
also by allowing a nice way to see all ticket updates relevant to a
single issue.

I would imagine that all ticketing systems already have a unique number
per ticket (the ticket id) and incrementing a counter for each
update/close is not hard, so it's a simple enough feature to add (though
making sure the message ID's are in fact unique is critical). 

It's probably not a new idea, and it has almost certainly been implemented
before but none of the trouble tickets I get implement it. So, my humble 
suggestion is to consider adding it in the next rewrite of your ticketing 
system, or requesting it as a feature from your TT system vendor.

There may be problems we have not encountered in operation or I have not
considered, if so - comments welcome. 

-- 
Colm


Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Christopher L. Morrow



On Thu, 24 Jun 2004, George Roettger wrote:



  This process happens repeatedly, spammers know they can get about a month
  of time (or more, depending on upstreams and hosting providers in
  question) of life, either way it's just 50 bucks

 forgive my question, but why does it take a month? If you had a bad route
 causing an outage for the spammer, would it take a month for the involved
 ISPs to fix that?

spammer comes, starts work, spams, complaints arrive, downstream customer
is notified of 'problem', they get their 3 strikes to deal with said
problem, then the ip is null routed. Sometimes it's a month, sometimes
less. It's situationally dependent :( I picked a round number because
saying: Spammers get 9.759 days on average per webhosting adventure is
cumbersome.


Re: Unplugging spamming PCs

2004-06-24 Thread Henry Linneweh

That sentence is A joke 15000 subscribers affected

Court Convicts Obscene Text Messager

http://www.reuters.com/newsArticle.jhtml;jsessionid=IPQ4NZVA4P24ACRBAELCFEY?type=technologyNewsstoryID=5504916

--- [EMAIL PROTECTED] wrote:
 
  And again, much of this comes down to enforcement.
 When was the last
  time you heard of a spammer's domain being pulled?
 How about the last
  time you saw a spammer be even remotely bothered
 by having their
  domain pulled? Do you think they'll really care
 less about losing a
  mail server when they've got another dozen lined
 up ready and waiting?
 
 Well, just a couple of days ago I read about a
 Russian court in
 Chelyabinsk that sentenced a spammer to two years in
 prison. It's
 the first conviction under a Russian law that
 forbids the use
 of malicious software and the court felt that the
 spamming scripts
 used by this guy were malicious software.
 
 What he did was to send text messages to mobile
 phone
 subscribers of a single company by means of a web
 gateway.
 I think the main reason he was put on trial was
 because the
 mobile operator whose customers were getting the
 spam and
 whose gateway was being misused, went to the police
 and
 complained. How many ISPs in the USA go to the
 police and 
 register official complaints about spammers? We have
 lots
 of smart people who can track down and identify
 spammers
 but it does no good unless the companies who suffer
 damage
 register an official police complaint.
 
 --Michael Dillon
 



Re: Can a customer take IP's with them?

2004-06-24 Thread Howard C. Berkowitz
At 7:29 PM -0400 6/23/04, Robert Blayzor wrote:
Howard C. Berkowitz wrote:
This would absolutely have to be challenged on cross-examination. 
Were I the attorney, especially if the plaintiff had mentioned 
telephone number portability, I would ask the plaintiff to explain 
what additional work had to be done to the POTS network to 
implement portability. Should the plaintiff start mumbling, I'd 
impugn his credibility, and then ask a bunch of hard questions 
about SS7 (including the TCAP mechanism for portable number 
translation), how IP routing works, how IP routing has no 
authoritative mechanism for global translation, etc.  I'd 
interrogate the customer about DNS and why they weren't able to 
solve their portability requirement with it. I'd look for detailed 
familiarity with RFC 2071 and 2072.

I wouldn't expect the customer to be able to answer many of these. 
As the defendant, I would expect to bring in my own expert witness 
who is very good at explaining these differences, and how the 
telephone and IP routing environments are different.
Apples and Oranges.
My point exactly, that enough explanation will show there is no 
operational or protocol equivalent to number portability.  The 
defendant has to be prepared to shoot down that argument.

There is something called DNS which handles how hosts are known 
by.  The whole reason behind DNS is so a user owns a name but 
doesn't matter what number they have.
Well, yes.
In the telco world you do not have this option since many businesses 
advertise their telephone number.  (ie: yellow page ads, business 
cards, advertisements, etc.)  When it comes to the net IP 
addresses are irrelevant as people are known by name, names which 
are transparently resolved to IP addresses.

The technology exists so that people don't have to bring IP space 
with them.  The routing tables are big enough as it is and the last 
thing we need is a bunch of judges comparing number portability to 
IP space portability.
Again, I don't see how we are in disagreement. What I was describing 
was an approach to getting the judge and/or jury to see they are NOT 
the same thing.


Re: Unplugging spamming PCs

2004-06-24 Thread Michael . Dillon

 That sentence is A joke 15000 subscribers affected

A joke? Doing hard time is no joke.

 http://www.reuters.com/newsArticle.jhtml;
 jsessionid=IPQ4NZVA4P24ACRBAELCFEY?type=technologyNewsstoryID=5504916

Maybe I read the Russian wrong here
http://www.echel.ru/news/?page=2id=3421#3421
but it seemed to me like he was sentenced
to two years with the possibility of early
release after one year. Nevertheless, when
you read the details of what he actually did,
this is a real wakeup call for anyone in 
Russia who sends spam. The police take it
as seriously as releasing viruses or worms.

Wouldn't we all like to see our courts treat
spammers this way? Write a few lines of PERL
to pump out SPAM and go to jail.

--Michael Dillon 



Re: .ORG DNS Problem?

2004-06-24 Thread Adam Kujawski

Seems to be working fine now:

% dig nanog.org ns +trace

;  DiG 9.2.2-P3  nanog.org ns +trace
;; global options:  printcmd
.   298767  IN  NS  C.ROOT-SERVERS.NET.
.   298767  IN  NS  D.ROOT-SERVERS.NET.
.   298767  IN  NS  E.ROOT-SERVERS.NET.
.   298767  IN  NS  F.ROOT-SERVERS.NET.
.   298767  IN  NS  G.ROOT-SERVERS.NET.
.   298767  IN  NS  H.ROOT-SERVERS.NET.
.   298767  IN  NS  I.ROOT-SERVERS.NET.
.   298767  IN  NS  J.ROOT-SERVERS.NET.
.   298767  IN  NS  K.ROOT-SERVERS.NET.
.   298767  IN  NS  L.ROOT-SERVERS.NET.
.   298767  IN  NS  M.ROOT-SERVERS.NET.
.   298767  IN  NS  A.ROOT-SERVERS.NET.
.   298767  IN  NS  B.ROOT-SERVERS.NET.
;; Received 404 bytes from 64.246.100.1#53(64.246.100.1) in 4 ms

org.172800  IN  NS  TLD1.ULTRADNS.NET.
org.172800  IN  NS  TLD2.ULTRADNS.NET.
;; Received 109 bytes from 192.33.4.12#53(C.ROOT-SERVERS.NET) in 9 ms

NANOG.ORG.  172800  IN  NS  DNS2.MERIT.NET.
NANOG.ORG.  172800  IN  NS  DNS.MERIT.NET.
NANOG.ORG.  172800  IN  NS  DNS3.MERIT.NET.
ORG.86400   IN  NS  TLD2.ULTRADNS.NET.
ORG.86400   IN  NS  TLD1.ULTRADNS.NET.
;; Received 180 bytes from 204.74.112.1#53(TLD1.ULTRADNS.NET) in 10 ms


-Adam

Quoting Adam Kujawski [EMAIL PROTECTED]:

 
 Anybody else having problems resolving .ORG domains via TLD1.ULTRADNS.NET
 (204.74.112.1) and TLD2.ULTRADNS.NET. (204.74.113.1). I'm seeing slow
 respones,
 or no responses.
 
 Traceroutes look fine:
 
 % tcptraceroute 204.74.112.1 53
 Selected device fxp0, address 64.246.100.1, port 55786 for outgoing packets
 Tracing the path to 204.74.112.1 on TCP port 53, 30 hops max
  1  fastethernet-0-0.angola-gw.amplex.net (64.246.100.126)  9.403 ms  7.361
 ms 
 9.148 ms
  2  dtrtmi1wce1-ser2-5-5.wcg.net (65.77.89.53)  9.801 ms  8.061 ms  9.917 ms
  3  brvwil1wcx2-pos14-1.wcg.net (64.200.240.33)  9.748 ms  8.341 ms  9.612
 ms
  4  chcgil9lcx1-pos6-0-oc48.wcg.net (64.200.103.118)  10.001 ms  9.172 ms 
 8.762 ms
  5  ge-4-3-0.r00.chcgil06.us.bb.verio.net (206.223.119.12)  9.646 ms  8.960
 ms 
 9.502 ms
  6  ge-0-3-0.r02.chcgil06.us.bb.verio.net (129.250.2.121)  9.323 ms  9.071 ms
 
 9.039 ms
  7  ge-1-1.a00.chcgil07.us.ra.verio.net (129.250.25.136)  9.848 ms  9.306 ms
 
 9.003 ms
  8  fa-2-1.a00.chcgil07.us.ce.verio.net (128.242.186.134)  9.679 ms  9.697 ms
 
 9.684 ms
  9  tld1.ultradns.net (204.74.112.1) [open]  10.296 ms  10.625 ms  9.537 ms
 
 
 -AND -
 
 
 % tcptraceroute 204.74.113.1 53
 Selected device fxp0, address 64.246.100.1, port 55792 for outgoing packets
 Tracing the path to 204.74.113.1 on TCP port 53, 30 hops max
  1  fastethernet-0-0.angola-gw.amplex.net (64.246.100.126)  5.402 ms  7.282
 ms 
 9.738 ms
  2  dtrtmi1wce1-ser2-5-5.wcg.net (65.77.89.53)  9.973 ms  7.958 ms  9.909 ms
  3  brvwil1wcx2-pos14-1.wcg.net (64.200.240.33)  9.800 ms  10.295 ms  8.835
 ms
  4  chcgil9lcx1-pos6-0-oc48.wcg.net (64.200.103.118)  8.878 ms  8.786 ms 
 9.187 ms
  5  fe9-2.IR1.Chicago2-IL.us.xo.net (206.111.2.149)  9.512 ms  8.964 ms 
 8.869 ms
  6  p5-0-0.RAR2.Chicago-IL.us.xo.net (65.106.6.137)  9.580 ms  9.214 ms 
 9.120 ms
  7  p4-1-0.MAR2.Chicago-IL.us.xo.net (65.106.6.154)  9.512 ms  10.285 ms 
 9.594 ms
  8  p15-0.CHR1.Chicago-IL.us.xo.net (207.88.84.14)  10.126 ms  9.517 ms 
 9.472 ms
  9  10.11.102.1 (10.11.102.1)  10.990 ms  9.808 ms  10.182 ms
 10  tld2.ultradns.net (204.74.113.1) [open]  9.933 ms  10.124 ms  9.778 ms
 
 
 Source IP for the traceroutes is 64.246.100.1.
 
 
 Dig's don't get very far:
 
 % dig nanog.org +trace
 
 ;  DiG 9.2.2-P3  nanog.org +trace
 ;; global options:  printcmd
 .   300086  IN  NS  C.ROOT-SERVERS.NET.
 .   300086  IN  NS  D.ROOT-SERVERS.NET.
 .   300086  IN  NS  E.ROOT-SERVERS.NET.
 .   300086  IN  NS  F.ROOT-SERVERS.NET.
 .   300086  IN  NS  G.ROOT-SERVERS.NET.
 .   300086  IN  NS  H.ROOT-SERVERS.NET.
 .   300086  IN  NS  I.ROOT-SERVERS.NET.
 .   300086  IN  NS  J.ROOT-SERVERS.NET.
 .   300086  IN  NS  K.ROOT-SERVERS.NET.
 .   300086  IN  NS  L.ROOT-SERVERS.NET.
 .   300086  IN  NS  M.ROOT-SERVERS.NET.
 .   300086  IN  NS  A.ROOT-SERVERS.NET.
 .   300086  IN  NS  B.ROOT-SERVERS.NET.
 ;; Received 388 bytes from 

Re: .ORG DNS Problem?

2004-06-24 Thread Alexander Bochmann

Hi,

...on Thu, Jun 24, 2004 at 11:18:26AM -0400, Adam Kujawski wrote:

  Anybody else having problems resolving .ORG domains via TLD1.ULTRADNS.NET
  (204.74.112.1) and TLD2.ULTRADNS.NET. (204.74.113.1). I'm seeing slow 
  respones, or no responses.

Same here, until a few minutes ago. Didn't work 
(connection timed out) from various places in 
Europe, while I had no problems when coming from 
a host in the US.

Alex.
-- 
AB54-RIPE



RE: .ORG DNS Problem?

2004-06-24 Thread Mike Damm

rant
A reminder to folks giving status reports on anycasted DNS deployments,
don't forget to mention which node you are querying.

For the F root (and other BIND implementations):
dig +norec @f.root-servers.net hostname.bind chaos txt

For UltraDNS:
dig +norec @tld1.ultradns.net whoareyou.ultradns.net in a
/rant

I'm seeing no problems with tld1.ultradns.net (udns2pxpa.ultradns.net) or
tld2.ultradns.net (udns2eqsj.ultradns.net).

   -Mike


-Original Message-
From: Alexander Bochmann [mailto:[EMAIL PROTECTED] 
Sent: Thursday, June 24, 2004 7:49 AM
To: [EMAIL PROTECTED]
Subject: Re: .ORG DNS Problem?


Hi,

...on Thu, Jun 24, 2004 at 11:18:26AM -0400, Adam Kujawski wrote:

  Anybody else having problems resolving .ORG domains via TLD1.ULTRADNS.NET
  (204.74.112.1) and TLD2.ULTRADNS.NET. (204.74.113.1). I'm seeing slow 
  respones, or no responses.

Same here, until a few minutes ago. Didn't work 
(connection timed out) from various places in 
Europe, while I had no problems when coming from 
a host in the US.

Alex.
-- 
AB54-RIPE


Re: .ORG DNS Problem?

2004-06-24 Thread Ray Wong



Or if you can't reach em, even good old traceroute can be useful...

Ray

On Thu, Jun 24, 2004 at 09:45:24AM -0700, Mike Damm wrote:
 
 rant
 A reminder to folks giving status reports on anycasted DNS deployments,
 don't forget to mention which node you are querying.
 
 For the F root (and other BIND implementations):
   dig +norec @f.root-servers.net hostname.bind chaos txt
 
 For UltraDNS:
   dig +norec @tld1.ultradns.net whoareyou.ultradns.net in a
 /rant
 
 I'm seeing no problems with tld1.ultradns.net (udns2pxpa.ultradns.net) or
 tld2.ultradns.net (udns2eqsj.ultradns.net).
 
-Mike
 
 
 -Original Message-
 From: Alexander Bochmann [mailto:[EMAIL PROTECTED] 
 Sent: Thursday, June 24, 2004 7:49 AM
 To: [EMAIL PROTECTED]
 Subject: Re: .ORG DNS Problem?
 
 
 Hi,
 
 ...on Thu, Jun 24, 2004 at 11:18:26AM -0400, Adam Kujawski wrote:
 
   Anybody else having problems resolving .ORG domains via TLD1.ULTRADNS.NET
   (204.74.112.1) and TLD2.ULTRADNS.NET. (204.74.113.1). I'm seeing slow 
   respones, or no responses.
 
 Same here, until a few minutes ago. Didn't work 
 (connection timed out) from various places in 
 Europe, while I had no problems when coming from 
 a host in the US.
 
 Alex.
 -- 
 AB54-RIPE

-- 

Ray Wong
[EMAIL PROTECTED]



MTU discovery

2004-06-24 Thread Edward B. Dreger

Is it just me, or are more sites breaking pmtud these days?  It's
getting tempting to hack up ietf-pmtud-method support even before
it becomes standard...


Eddy
--
EverQuick Internet - http://www.everquick.net/
A division of Brotsman  Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita
_
DO NOT send mail to the following addresses:
[EMAIL PROTECTED] -*- [EMAIL PROTECTED] -*- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.



Re: MTU discovery

2004-06-24 Thread James

no, its not just you. i've had issues with couple customers having problems
visiting two large sites due to pMTUd breakage. it was discouraging to see
some fortune100 web sites breaking their filtering too much over the line.

-J

On Thu, Jun 24, 2004 at 05:25:09PM +, Edward B. Dreger wrote:
 
 Is it just me, or are more sites breaking pmtud these days?  It's
 getting tempting to hack up ietf-pmtud-method support even before
 it becomes standard...
 
 
 Eddy
 --
 EverQuick Internet - http://www.everquick.net/
 A division of Brotsman  Dreger, Inc. - http://www.brotsman.com/
 Bandwidth, consulting, e-commerce, hosting, and network building
 Phone: +1 785 865 5885 Lawrence and [inter]national
 Phone: +1 316 794 8922 Wichita
 _
 DO NOT send mail to the following addresses:
 [EMAIL PROTECTED] -*- [EMAIL PROTECTED] -*- [EMAIL PROTECTED]
 Sending mail to spambait addresses is a great way to get blocked.

-- 
James JunTowardEX Technologies, Inc.
Technical LeadNetwork Design, Consulting, IT Outsourcing
[EMAIL PROTECTED]  Boston-based Colocation  Bandwidth Services
cell: 1(978)-394-2867   web: http://www.towardex.com , noc: www.twdx.net


Re: MTU discovery

2004-06-24 Thread Jun-ichiro itojun Hagino

 no, its not just you. i've had issues with couple customers having problems
 visiting two large sites due to pMTUd breakage. it was discouraging to see
 some fortune100 web sites breaking their filtering too much over the line.

in many cases, those companies put web load-balancing device, and
the device prevents PMTU from working.  maybe identify vendor which
ships 'drop all icmp6' and teach them nicely?

itojun


RE: Homeland Security now wants to restrict outage notifications

2004-06-24 Thread Scott McGrath


I did read the article and having worked for gov't agencies twice in my
career a proposal like the one floated by DHS is just the camel's nose.

I should hope the carriers oppose this.

Now a call comes into our ops center I cant reach my experiment at
Stanford.  Ops looks up the outages Oh yeah there's a fiber cut affecting
service we will let you know when it's fixed.   They check it's fixed they
call the customer telling them to try it now.

Under the proposed regime We know its dead do not know why or when it
will be fixed because it' classified information  This makes for
absolutely wonderful customer service and it protects public safety how?.



Scott C. McGrath

On Thu, 24 Jun 2004, Tad Grosvenor wrote:

 Did you read the article?  The DHS is urging that the FCC drop the proposal
 to require outage reporting for significant outages.   This isn't the DHS
 saying that outage notifications should be muted.  The article also
 mentions: Telecom companies are generally against the proposed new
 reporting requirements, arguing that the industry's voluntary efforts are
 sufficient.

 -Tad



 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
 Scott McGrath
 Sent: Thursday, June 24, 2004 12:58 PM
 To: [EMAIL PROTECTED]
 Subject: Homeland Security now wants to restrict outage notifications



 See

 http://www.theregister.co.uk/2004/06/24/network_outages/

 for the gory details.  The Sean Gorman debacle was just the beginning
 this country is becoming more like the Soviet Union under Stalin every
 passing day in its xenophobic paranoia all we need now is a new version of
 the NKVD to enforce the homeland security directives.

 Scott C. McGrath




Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Valdis . Kletnieks
On Thu, 24 Jun 2004 15:22:02 +0700, Dr. Jeffrey Race [EMAIL PROTECTED]  said:

 Not at all.  You can terminate for actions prejudicial to the safety and security
 of the system.   Has nothing to do with anti-trust.

I suspect that the spammer can find a lawyer who is willing to argue the idea
that the safety and security of the AS701 backbone was not prejudiced by
the spammer's actions, unless AS701 is able to show mtrg graphs and the
like showing that the spammer was actually sending enough of a volume to
swamp their core routers

And of course, none of the Tier-1's wants to argue in court that one spammer is
able to present enough of a load to jeopardize their network stability, when
even large DDoS attacks usually aren't much of a blip except near the victim
node...



pgpTCGZWkwbxZ.pgp
Description: PGP signature


RE: Homeland Security now wants to restrict outage notifications

2004-06-24 Thread Larry Pingree

I agree, there are much more important things to protect than
this information. It would be almost impossible to manage, and even more
unlikely to ever have a positive effect. Besides, if someone with ill
intentions has the abilities to act so quickly on such short notice,
then we have much greater failures of our intelligence system that would
need to be addressed.

LP
 
Best Regards,
 
Larry
 
Larry Pingree

Visionary people, are visionary, partly because of the great many
things they never get to see. - Larry Pingree

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Scott McGrath
Sent: Thursday, June 24, 2004 11:06 AM
To: [EMAIL PROTECTED]
Subject: RE: Homeland Security now wants to restrict outage
notifications



I did read the article and having worked for gov't agencies twice in my
career a proposal like the one floated by DHS is just the camel's nose.

I should hope the carriers oppose this.

Now a call comes into our ops center I cant reach my experiment at
Stanford.  Ops looks up the outages Oh yeah there's a fiber cut
affecting
service we will let you know when it's fixed.   They check it's fixed
they
call the customer telling them to try it now.

Under the proposed regime We know its dead do not know why or when it
will be fixed because it' classified information  This makes for
absolutely wonderful customer service and it protects public safety
how?.



Scott C. McGrath

On Thu, 24 Jun 2004, Tad Grosvenor wrote:

 Did you read the article?  The DHS is urging that the FCC drop the
proposal
 to require outage reporting for significant outages.   This isn't
the DHS
 saying that outage notifications should be muted.  The article also
 mentions: Telecom companies are generally against the proposed new
 reporting requirements, arguing that the industry's voluntary efforts
are
 sufficient.

 -Tad



 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
Of
 Scott McGrath
 Sent: Thursday, June 24, 2004 12:58 PM
 To: [EMAIL PROTECTED]
 Subject: Homeland Security now wants to restrict outage notifications



 See

 http://www.theregister.co.uk/2004/06/24/network_outages/

 for the gory details.  The Sean Gorman debacle was just the beginning
 this country is becoming more like the Soviet Union under Stalin every
 passing day in its xenophobic paranoia all we need now is a new
version of
 the NKVD to enforce the homeland security directives.

 Scott C. McGrath




RE: Unplugging spamming PCs

2004-06-24 Thread Larry Pingree

But if you telnet from an IP that is not registered, you would
be denied. Thus at least eliminating many of the erroneous email servers
out there on the DSL, dial-up and other broadband connections, this has
been tried in the open with such things as MABS RBL, etc by blocking
common spamming IP's and mail servers. But since it is not mandatory, it
falls apart too easily.

LP
 
Best Regards,
 
Larry
 
Larry Pingree

Visionary people, are visionary, partly because of the great many
things they never get to see. - Larry Pingree


-Original Message-
From: Joe Hamelin [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, June 23, 2004 5:26 PM
To: Larry Pingree
Cc: [EMAIL PROTECTED]
Subject: Re: Unplugging spamming PCs

On Wed, 23 Jun 2004 16:40:23 -0700, Larry Pingree [EMAIL PROTECTED]
wrote:

 I agree with you it's a hard problem to solve. But unless there is
 mandatory cooperation within mail server software (which can be
 monitored) to interface with a registry of acceptable/registered
sites,
 then this model could work. 

I can telnet to a mailserver and send mail to that host without much
thought.  What good will a registry do?  What will solve spam is
getting some of these virus writers to actually write some code that
will trash disks of poorly patched (if a at all) hosts.  Let Darwin
take over.

-Joe


Re: Homeland Security now wants to restrict outage notifications

2004-06-24 Thread Jeff Shultz

I think you (and possibly The Register) are overreacting. 

The DHS is doing what it is paid to do: Look for the worst case
scenario, predict the damage. 

And the reporting requirements that the DHS is arguing against _aren't
even in effect yet._ 

** Reply to message from Scott McGrath [EMAIL PROTECTED] on
Thu, 24 Jun 2004 14:05:56 -0400 (EDT)

 I did read the article and having worked for gov't agencies twice in my
 career a proposal like the one floated by DHS is just the camel's nose.
 
 I should hope the carriers oppose this.
 
 Now a call comes into our ops center I cant reach my experiment at
 Stanford.  Ops looks up the outages Oh yeah there's a fiber cut affecting
 service we will let you know when it's fixed.   They check it's fixed they
 call the customer telling them to try it now.
 
 Under the proposed regime We know its dead do not know why or when it
 will be fixed because it' classified information  This makes for
 absolutely wonderful customer service and it protects public safety how?.
 
 
 
 Scott C. McGrath
 
 On Thu, 24 Jun 2004, Tad Grosvenor wrote:
 
  Did you read the article?  The DHS is urging that the FCC drop the proposal
  to require outage reporting for significant outages.   This isn't the DHS
  saying that outage notifications should be muted.  The article also
  mentions: Telecom companies are generally against the proposed new
  reporting requirements, arguing that the industry's voluntary efforts are
  sufficient.
 
  -Tad
 
 
 
  -Original Message-
  From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
  Scott McGrath
  Sent: Thursday, June 24, 2004 12:58 PM
  To: [EMAIL PROTECTED]
  Subject: Homeland Security now wants to restrict outage notifications
 
 
 
  See
 
  http://www.theregister.co.uk/2004/06/24/network_outages/
 
  for the gory details.  The Sean Gorman debacle was just the beginning
  this country is becoming more like the Soviet Union under Stalin every
  passing day in its xenophobic paranoia all we need now is a new version of
  the NKVD to enforce the homeland security directives.
 
  Scott C. McGrath
 
 

-- 
Jeff Shultz
A railfan pulls up to a RR crossing hoping that
there will be a train. 



Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Paul G


- Original Message - 
From: Dr. Jeffrey Race [EMAIL PROTECTED]
To: Robert E. Seastrom [EMAIL PROTECTED]
Cc: Christopher L. Morrow [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Thursday, June 24, 2004 9:59 AM
Subject: Re: Attn MCI/UUNet - Massive abuse from your network



 On 24 Jun 2004 09:26:15 -0400, Robert E. Seastrom wrote:
 Dr. Jeffrey Race [EMAIL PROTECTED] writes:

-- snip --

 We see this all the time on Spam-L.  It shows up quickly in the numbers
when there is a
 management decision.

perhaps we can move this discussion there, then?

paul



RE: Unplugging spamming PCs

2004-06-24 Thread John Payne

--On Thursday, June 24, 2004 11:17 AM -0700 Larry Pingree 
[EMAIL PROTECTED] wrote:

Hi Joe,
If only those who are approved email senders are allowed to be
accepted, this allows police, FBI, or DHS to go after only those who are
registered and abusing it. It's for the same purpose that we administer
car registrations, so that at the end of the day, someone is responsible
for the car. In this case, someone can be responsible for the domain and
mail server. In its current state, we are left way in the open. I don't
disagree that government control is un-desirable, but remember, at least
in my mind, even though it may be undesirable, it may be a necessary
action. Anyone know why we have to get a drivers license? How about a
passport?  What about a SSN?  All of these things are ways in which we
can have accountability. Without accountability we will remain in
anarchy. All that government does is bridge a gap when corporations,
which only do things for profit, will not collaborate on an appropriate
solution to a problem, even though one exists.
But why stop at email servers?  spam is only one of the unsociable and 
illegal acts happening on the Internet.  Why not license ownership of every 
IP capable device?   That'll stop all forms of DoS (DDoS and otherwise too).

Just to make sure, let's require that all vendors both inspect the license 
from their customers *and* notify the government on every purchase or 
upgrade.

Hmm.  Which government though?  Better to be safe... you can't be sure 
which country the device is being installed in, or which country the 
packets flowing through the device will also visit.  So let's require 
licenses from every country... and vendors to notify every government on 
every purchase or upgrade.

Yep, that'll do the trick.


Boston UUNET Issue(s)

2004-06-24 Thread Williams, Ken

Did anyone notice any network related issues on the Boston UUNET network
earlier this morning (4:00AM PST - 8:30 AM PST). What we observed was
high latency for the following network 208.254.32.0/20?

Regards,

Ken Williams 



Re: Unplugging spamming PCs

2004-06-24 Thread Jeff Shultz

And all the spammers move to China where the FBI, DHS and police have
no authority. 

Oh wait - you say they already have?

** Reply to message from Larry Pingree [EMAIL PROTECTED] on Thu,
24 Jun 2004 11:17:37 -0700

 Hi Joe,
 
   If only those who are approved email senders are allowed to be
 accepted, this allows police, FBI, or DHS to go after only those who are
 registered and abusing it. It's for the same purpose that we administer
 car registrations, so that at the end of the day, someone is responsible
 for the car. In this case, someone can be responsible for the domain and
 mail server. In its current state, we are left way in the open. I don't
 disagree that government control is un-desirable, but remember, at least
 in my mind, even though it may be undesirable, it may be a necessary
 action. Anyone know why we have to get a drivers license? How about a
 passport?  What about a SSN?  All of these things are ways in which we
 can have accountability. Without accountability we will remain in
 anarchy. All that government does is bridge a gap when corporations,
 which only do things for profit, will not collaborate on an appropriate
 solution to a problem, even though one exists.
 


-- 
Jeff Shultz
A railfan pulls up to a RR crossing hoping that
there will be a train. 



Re: Homeland Security now wants to restrict outage notifications

2004-06-24 Thread Eric A. Hall


On 6/24/2004 11:57 AM, Scott McGrath wrote:

 http://www.theregister.co.uk/2004/06/24/network_outages/

http://www.securityfocus.com/news/8966 is the original, for those of us
who have our doubts about the register as a news source

To summarize:

  there are existing FCC requirements to report major voice outages

  the FCC ran a proposal up the flag pole to extend this to data and
wireless networks

  DHS did their job by analyzing the proposal and suggesting that it
might not be a good idea to make the additional data too public

  Further: If the FCC is going to mandate reporting, the DHS argued,
it should channel the data to a more circumspect group: the
Telecom ISAC (Information Sharing and Analysis Center), an
existing voluntary clearinghouse for communications-related
vulnerability information, whose members include several
government agencies and all the major communications carriers.
Data exchanged within the Telecom-ISAC is protected from public
disclosure. 

Presumably the FCC will take this opinion into consideration and weigh it
alongside clear-headed debates as:

 this country is becoming more like the Soviet Union under Stalin every 
 passing day in its xenophobic paranoia all we need now is a new version
 of the NKVD to enforce the homeland security directives.

At least the paranoia is right

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/


RE: Unplugging spamming PCs

2004-06-24 Thread Larry Pingree

Hi John,
I'm not taking it to extremes. I'm talking about the middle of
the road, and certainly spam is the on the top of the scales on
everyone's statistics. I'm certainly not condoning or suggesting that
the government control everything, and I'm not for absolutely no
government involvement either. A balanced approach is most appropriate
just as with anything there also can be regional registries similar
to how ARIN is setup that allow inter-continental and inter-country
registration. Unless someone can come up with a better idea, I see no
other choice. FYI, we do already license IP's, through ARIN, APNIC, etc
so that's already been done :)

LP
 
Best Regards,
 
Larry
 
Larry Pingree

Visionary people, are visionary, partly because of the great many
things they never get to see. - Larry Pingree

-Original Message-
From: John Payne [mailto:[EMAIL PROTECTED] 
Sent: Thursday, June 24, 2004 11:40 AM
To: Larry Pingree
Cc: [EMAIL PROTECTED]
Subject: RE: Unplugging spamming PCs



--On Thursday, June 24, 2004 11:17 AM -0700 Larry Pingree 
[EMAIL PROTECTED] wrote:


 Hi Joe,

   If only those who are approved email senders are allowed to be
 accepted, this allows police, FBI, or DHS to go after only those who
are
 registered and abusing it. It's for the same purpose that we
administer
 car registrations, so that at the end of the day, someone is
responsible
 for the car. In this case, someone can be responsible for the domain
and
 mail server. In its current state, we are left way in the open. I
don't
 disagree that government control is un-desirable, but remember, at
least
 in my mind, even though it may be undesirable, it may be a necessary
 action. Anyone know why we have to get a drivers license? How about a
 passport?  What about a SSN?  All of these things are ways in which we
 can have accountability. Without accountability we will remain in
 anarchy. All that government does is bridge a gap when corporations,
 which only do things for profit, will not collaborate on an
appropriate
 solution to a problem, even though one exists.

But why stop at email servers?  spam is only one of the unsociable and 
illegal acts happening on the Internet.  Why not license ownership of
every 
IP capable device?   That'll stop all forms of DoS (DDoS and otherwise
too).

Just to make sure, let's require that all vendors both inspect the
license 
from their customers *and* notify the government on every purchase or 
upgrade.

Hmm.  Which government though?  Better to be safe... you can't be sure 
which country the device is being installed in, or which country the 
packets flowing through the device will also visit.  So let's require 
licenses from every country... and vendors to notify every government on

every purchase or upgrade.


Yep, that'll do the trick.



Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Ben Browning
At 11:16 AM 6/24/2004, [EMAIL PROTECTED] wrote:
On Thu, 24 Jun 2004 15:22:02 +0700, Dr. Jeffrey Race 
[EMAIL PROTECTED]  said:

 Not at all.  You can terminate for actions prejudicial to the safety 
and security
 of the system.   Has nothing to do with anti-trust.

I suspect that the spammer can find a lawyer who is willing to argue the idea
that the safety and security of the AS701 backbone was not prejudiced by
the spammer's actions, unless AS701 is able to show mtrg graphs and the
like showing that the spammer was actually sending enough of a volume to
swamp their core routers
Likewise, I imagine MCI could argue that the damage is to their core 
product; namely, the trust of other ISPs and their willingness to exchange 
traffic with MCI.

~Ben
---
   Ben Browning [EMAIL PROTECTED]
  The River Internet Access Co.
 WA Operations Manager
1-877-88-RIVER  http://www.theriver.com


Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Ben Browning
Chris,
To start off, thank you for taking this issue seriously and investigating it.
At 08:05 PM 6/23/2004, Christopher L. Morrow wrote:
The sbl lists quite a few /32 entries, while this is nice for blocking
spam if you choose to use their RBL service I'm not sure it's a good
measure of 'spamhaus size'. I'm not sure I know of a way to take this
measurement, but given size and number if IPs that terminate inside AS701
there certainly are scope issues.
Netmasks aside, a spammer is a spammer. One spammer sending 100,000 emails 
from 4 machines is functionally equivalent to one sending 100,000 from 1 
machine.

All that said, I'm certainly not saying spam is good, I also believe
that over the last 4.5 years uunet's abuse group has done quite a few good
things with respect to the main spammers.
That's possible, I suppose, but the view from outside sees only the bad(and 
there's plenty).

 As an example, I see a posting that says emailtools.com was alive on
 206.67.63.41 in 2000. They aren't there any more... But now:

 [EMAIL PROTECTED] telnet mail.emailtools.com 25
 Trying 65.210.168.34...
 Connected to mail.emailtools.com.
 Escape character is '^]'.
Sure, customer of a customer we got emailtools.com kicked from their
original 'home' now they've moved off (probably several times since 2000)
to another customer. This happens to every ISP, each time they appear we
start the process to disconnect them. I'm checking on the current status
of their current home to see why we have either: 1) not gotten complaints
about them, 2) have not made progress kicking them again.
Excellent! I (and I am sure the rest of the antispam community) will be 
looking forward to hearing how all this pans out, and I am very glad I 
could bring some of this to your attention.

 On Mon, 21 Jun 2004, Ben Browning wrote:
 Allow me to rephrase- I wanted it to be read and hoped someone would act on
 complaints. I have no doubt MCI is serious about stopping DDOS and other
 abusive traffic of that ilk- when it comes to proxy hijacking and spamming,
 though, abuse@ turns a blind eye. What other conclusion can I draw from the
This is not true, the action might not happen in the time you'd like, but
there are actions being taken. I'd be the first to admit that the
timelinees are lengthy :( but part of that is the large company process,
getting all the proper people to realize that this abuse is bad and the
offendors need to be dealt with.
A lengthy timeline for action to be taken, from the viewpoint of the 
attacked, is indistinguishable from tacit approval of the attacks. I don't 
imagine MCI has a lengthy timeline when replying to sales email or billing 
issues.

 200ish SBL entries under MCI's name? Why else would emailtools.com(for
 example) still be around despite their wholesale raping of misconfigured
 proxies?
emailtools will be around in one form or another, all the owner must do is
purchase 9$ virtual-hosting from some other poor ISP out there who needs
the money... they may not even know who emailtools is, if that ISP is a
uunet/mci customer then we'll have to deal with them as well, just like
their current home. you must realize you can't just snap your fingers and
make these things go away.
Omaha Steaks has been there for 3+ weeks (since being added to the SBL).
Scott Richter has likewise been spamming from there for a month. Do you 
need a permission slip to terminate him? Does it take a month to get one? I 
can snap my fingers many times in a month!

According to ARIN records, both of these are swipped space only one step 
below yours(IE not a customer-of-a-customer).

It's nice to say Oh well they move around and we can't stop them, but the 
point is that if they got terminated in a timely fashion (measured in hours 
or days at the most, *not* weeks and months) they would not keep moving 
around on your network; they would find another one to abuse instead. As it 
stands, they get a month to spam, then they have to move- that's pink gold 
in spammerland.

 All I want is a couple of straight-up answers. Why do complaints to uunet
 go unanswered and the abusers remain connected if, in fact, the complaints
I believe you do get an answer, if not the auto-acks are off still from a
previous mail flood ;(
An auto-ack is not an answer.
Please let me know if you are NOT getting ticket
numbers back. They might be connected still if there were:
1) not enough info in the complaints to take action on them
I've never been asked to furnish more info.
2) not enough complaints to terminate the account, but working with the
downstream to get the problem resolved
I've never been looped into this process either. What is the window you 
guys give your downstreams for ceasing such activities?

3) action is awaiting proper approvals.
What's the timeframe on these approvals happening? Do you need such 
approvals in the event of a DDOS or other abuse?

 are read? Why has MCI gone from 111 SBL listings as of January 1 to 190 as
I think the answer is 

Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Ben Browning
At 11:34 PM 6/23/2004, Christopher L. Morrow wrote:
I'd also point out someting that any provider will tell you: Spammers
never pay their bills.
Yes, but this is not a problem for a large carrier, as the people that 
receive it sure do. In other words, the money you lose on the spammer is 
subsidized by all the people that pay you to receive it.

This is, in fact (for you nanae watchers), the
reason that most of them get canceled by us FASTER... Sadly, non-payment
is often a quicker and easier method to term a customer than 'abuse', less
checks since there is no 'percieved revenue' :(
A revenue check has no place in abuse terminations.
---
   Ben Browning [EMAIL PROTECTED]
  The River Internet Access Co.
 WA Operations Manager
1-877-88-RIVER  http://www.theriver.com


Re: Homeland Security now wants to restrict outage notifications

2004-06-24 Thread Valdis . Kletnieks
On Thu, 24 Jun 2004 11:27:10 PDT, Jeff Shultz [EMAIL PROTECTED]  said:

 The DHS is doing what it is paid to do: Look for the worst case
 scenario, predict the damage. 

At some point, somebody with some sanity needs to look at the proposal, and say
If we think we have to resort to this, then the terrorists have already won.

 And the reporting requirements that the DHS is arguing against _aren't
 even in effect yet._ 

Wander over to www.chillingeffects.org or Ed Felton's www.freedom-to-tinker.org
or any number of other sites that keep track of just how much trouble can be
caused by the *threat* or *suggestion* of something



pgpXgAYKYfofl.pgp
Description: PGP signature


RE: Unplugging spamming PCs

2004-06-24 Thread John Payne

--On Thursday, June 24, 2004 12:08 PM -0700 Larry Pingree 
[EMAIL PROTECTED] wrote:

Hi John,
I'm not taking it to extremes. I'm talking about the middle of
the road, and certainly spam is the on the top of the scales on
everyone's statistics. I'm certainly not condoning or suggesting that
the government control everything, and I'm not for absolutely no
government involvement either. A balanced approach is most appropriate
just as with anything there also can be regional registries similar
to how ARIN is setup that allow inter-continental and inter-country
registration. Unless someone can come up with a better idea, I see no
other choice. FYI, we do already license IP's, through ARIN, APNIC, etc
so that's already been done :)
No.  As much as I hate spam... it's not on the top of the list of things to
fix.
If the ARIN, APNIC, RIPE, LANIC, etc registries are so upto date and 
accurate, why would you need to license anything at layer 4 or above? 
You've already got the contact details for people responsible for routing 
packets to those devices.



LP
Best Regards,
Larry
Larry Pingree
Visionary people, are visionary, partly because of the great many
things they never get to see. - Larry Pingree
-Original Message-
From: John Payne [mailto:[EMAIL PROTECTED]
Sent: Thursday, June 24, 2004 11:40 AM
To: Larry Pingree
Cc: [EMAIL PROTECTED]
Subject: RE: Unplugging spamming PCs

--On Thursday, June 24, 2004 11:17 AM -0700 Larry Pingree
[EMAIL PROTECTED] wrote:
Hi Joe,
If only those who are approved email senders are allowed to be
accepted, this allows police, FBI, or DHS to go after only those who
are
registered and abusing it. It's for the same purpose that we
administer
car registrations, so that at the end of the day, someone is
responsible
for the car. In this case, someone can be responsible for the domain
and
mail server. In its current state, we are left way in the open. I
don't
disagree that government control is un-desirable, but remember, at
least
in my mind, even though it may be undesirable, it may be a necessary
action. Anyone know why we have to get a drivers license? How about a
passport?  What about a SSN?  All of these things are ways in which we
can have accountability. Without accountability we will remain in
anarchy. All that government does is bridge a gap when corporations,
which only do things for profit, will not collaborate on an
appropriate
solution to a problem, even though one exists.
But why stop at email servers?  spam is only one of the unsociable and
illegal acts happening on the Internet.  Why not license ownership of
every
IP capable device?   That'll stop all forms of DoS (DDoS and otherwise
too).
Just to make sure, let's require that all vendors both inspect the
license
from their customers *and* notify the government on every purchase or
upgrade.
Hmm.  Which government though?  Better to be safe... you can't be sure
which country the device is being installed in, or which country the
packets flowing through the device will also visit.  So let's require
licenses from every country... and vendors to notify every government on
every purchase or upgrade.
Yep, that'll do the trick.




Re: Homeland Security now wants to restrict outage notifications

2004-06-24 Thread Adam 'Starblazer' Romberg

 I think you (and possibly The Register) are overreacting.

With the current state of the government and it's previous legislation, I
would consider that not overreacting at all...  We as NANOG'ers need to
make sure that we're in the clue.  The issue of non-information leads for
longer troubleshooting, and more irate customers.

To each his own, however..

Thanks,

Adam



Adam 'Starblazer' Romberg Appleton: 920-738-9032
System Administrator   Valley Fair: 920-968-7713
ExtremePC LLC-=-  http://www.extremepcgaming.net


RE: Homeland Security now wants to restrict outage notifications

2004-06-24 Thread Scott McGrath


I also believe that critical infrastructure needs to be protected and I am
charged with protecting a good chunk of it.   Also as a Ham operator I
work in concert with the various emergency management organizations in
dealing with possible worst case scenarios.

No, not everyone who asks about some piece of infrastructure under my
control gets an answer but for now we can still choose who receives an
answer without you having to contact a govt agency and ask whether I can
respond to a query from Joe Shmoe.

Unfortunately information=power and control of information is power^2 and
many people in the permanent bureaucracy are there only in pursuit of
power over others and 9/11 was a wonderful excuse to extend their scope
of control over people's everyday lives.

Right now in Boston cameras are now illegal in the subway for 'security
reasons' who hasnt had a picture taken with their friends on the way
to/from a gathering on the subway.

Back when I was younger the only places with restrictions like that were
the countries Iron Curtain.  In the 50's my family helped resettle
refugees from Hungary in the aftermath of the failed Hungarian Revolution
freedom is a valuable thing unfortunately we are losing it bit by bit.


Scott C. McGrath

On Thu, 24 Jun 2004, Harris, Michael C. wrote:

   Scott McGrath said:
   See

   http://www.theregister.co.uk/2004/06/24/network_outages/

   for the gory details.  The Sean Gorman debacle was just the
 beginning this country
   is becoming more like the Soviet Union under Stalin every
 passing day in its xenophobic
   paranoia all we need now is a new version of the NKVD to enforce
 the homeland security directives.

 Scott C. McGrath
 --

 Ask and you shall receive! Fresh from the DHS website yesterday morning.

 (quoting the end of the 4th paragraph below)

 In addition, HSIN-CI network, in partnership with the FBI, provides a
 reporting feature that allows the public to submit information about
 suspicious activities through the FBI Tips Program that is then shared
 with the Department's HSOC.

 Just call the party hotline and report your neighbors, coworkers and
 friends...

 Don't get me wrong, I am a supporter of protecting critical
 infrastructure. There are already programs, Infragard is an example,
 that perform the same kind of information sharing by choice rather than
 decree.  Infragard is supported by public private and sectors both, with
 similar support from the FBI.

 (yes, I am an Infragard member just to be 100% above board)
 Mike Harris
 Umh.edu

 --
 http://www.dhs.gov/dhspublic/display?content=3748

 Homeland Security Launches Critical Infrastructure Pilot Program to
 Bolster Private Sector Security
 - Dallas First of Four Pilot Communities Sharing Targeted Threat
 Information

 For Immediate Release
 Office of the Press Secretary
 Contact: 202-282-8010
 June 23, 2004

 Homeland Security Information Network - Critical Infrastructure

 The U.S. Department of Homeland Security in partnership with local
 private sector and the Federal Bureau of Investigation, today launched
 the first Homeland Security Information Network-Critical Infrastructure
 (HSIN-CI) Pilot Program in Dallas, Texas with locally operated pilot
 programs in Seattle, Indianapolis and Atlanta to follow.  The pilot
 program will operate throughout the course of this year to determine the
 feasibility of using this model for other cities across the country.

 The HSIN-CI pilot program, modeled after the FBI Dallas Emergency
 Response Network expands the reach of the Department's Homeland Security
 Information Network (HSIN) initiative--a counterterrorism communications
 tool that connects 50 states, five territories, Washington, D.C., and 50
 major urban areas to strengthen the exchange of threat information--to
 critical infrastructure owners and operators in a variety of industries
 and locations, first responders and local officials.  As part of the
 HSIN-CI pilot program, more than 25,000 members of the network will have
 access to unclassified sector specific information and alert
 notifications on a 24/7 basis.

 The Homeland is more secure when each hometown is more secure, said
 Secretary of Homeland Security Tom Ridge. HSIN-CI connects our
 communities - the government community to the private sector community
 to the law enforcement community -- the better we share information
 between our partners, the more quickly we are able to implement security
 measures where necessary.

 The HSIN-CI network allows local and regional areas to receive targeted
 alerts and notifications in real-time from Department's Homeland
 Security Operations Center (HSOC) using standard communication devices
 including wired and wireless telephones, email, facsimile and text
 pagers.  The network requires no additional hardware or software for
 

Re: Homeland Security now wants to restrict outage notifications

2004-06-24 Thread Eric A. Hall


On 6/24/2004 2:24 PM, [EMAIL PROTECTED] wrote:

 On Thu, 24 Jun 2004 11:27:10 PDT, Jeff Shultz [EMAIL PROTECTED]
 said:

 And the reporting requirements that the DHS is arguing against
 _aren't even in effect yet._

 or any number of other sites that keep track of just how much trouble
 can be caused by the *threat* or *suggestion* of something

Was it really your intention to imply that this recommendation (and which
should have been expected, given the DHS' job) is some kind of a threat?

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/


Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Christopher L. Morrow


On Thu, 24 Jun 2004, Ben Browning wrote:


 like showing that the spammer was actually sending enough of a volume to
 swamp their core routers

 Likewise, I imagine MCI could argue that the damage is to their core
 product; namely, the trust of other ISPs and their willingness to exchange
 traffic with MCI.

you mean the phone companies we do business with?


Re: SprintPCS spam policies

2004-06-24 Thread Eric Kuhnke

I just wanted to give everyone a heads-up on the antispam policies of
SprintPCS, so that you will know what to expect if you start getting blocked
by their mx.messaging.sprintpcs.com mail servers.
As a non-sprint-related side note, I know of somebody whose ATT 
Wireless phone service was rendered completely unusable by incoming spam 
via the email-to-SMS gateway.  The typical rate was one message every 30 
minutes, the only solution offered by customer service was to change the 
phone number.   Has anyone ever encountered spammers doing a dictionary 
attack (emailing all  phone numbers in a NXX) via email-to-SMS 
gateways?





Re: Homeland Security now wants to restrict outage notifications

2004-06-24 Thread Henry Linneweh

Consider the source of policy makers that make these
decisions, are clueless to networks and infrastructure
themselves. They fail to understand any costing
metrics
by adding another loop of useless people to he cycle
at
the expense of everyone, which will in the long run
be damaging to the economy of those companies who will
then move those centers offshore to remove the DHS
from
their loop, which causes job loss and skill base
destruction beyond what it already is in the US.

My vote on this proposal is no and contact my gov
rep and complain.

-Henry


--- Adam 'Starblazer' Romberg
[EMAIL PROTECTED] wrote:
 
  I think you (and possibly The Register) are
 overreacting.
 
 With the current state of the government and it's
 previous legislation, I
 would consider that not overreacting at all...  We
 as NANOG'ers need to
 make sure that we're in the clue.  The issue of
 non-information leads for
 longer troubleshooting, and more irate customers.
 
 To each his own, however..
 
 Thanks,
 
 Adam
 
 
 
 Adam 'Starblazer' Romberg Appleton: 920-738-9032
 System Administrator   Valley Fair: 920-968-7713
 ExtremePC LLC-=-  http://www.extremepcgaming.net
 



Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Grant A. Kirkwood

Ben Browning said:

snip

 A lengthy timeline for action to be taken, from the viewpoint of the
 attacked, is indistinguishable from tacit approval of the attacks. I don't
 imagine MCI has a lengthy timeline when replying to sales email or billing
 issues.


You ARE kidding, right?


-- 
Grant A. Kirkwood - grant(at)tnarg.org
Fingerprint = D337 48C4 4D00 232D 3444 1D5D 27F6 055A BF0C 4AED



Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Christopher L. Morrow

On Thu, 24 Jun 2004, Ben Browning wrote:

 At 11:34 PM 6/23/2004, Christopher L. Morrow wrote:
 I'd also point out someting that any provider will tell you: Spammers
 never pay their bills.

 Yes, but this is not a problem for a large carrier, as the people that
 receive it sure do. In other words, the money you lose on the spammer is
 subsidized by all the people that pay you to receive it.

this is not entirely true, a majority of these far-end customers are
paying the same price regardless of utilization. Even the utilization
charged customers are not having their 95th Percentile changed because of
spam, or that'd be my guess. In the end there is no money for mci from
spammers.

-chris


Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Christopher L. Morrow

On Thu, 24 Jun 2004, Grant A. Kirkwood wrote:

 Ben Browning said:
 
 snip
 
  A lengthy timeline for action to be taken, from the viewpoint of the
  attacked, is indistinguishable from tacit approval of the attacks. I don't
  imagine MCI has a lengthy timeline when replying to sales email or billing
  issues.


 You ARE kidding, right?

Sorry, I'll reply to ben's message part here: Actually getting sales
involved is a timely process from my perspective :( I used to know a sales
person I could count on, he got RIF'd so now finding someone to help a
customer that needs an upgrade is a very difficult task.

Keep in mind, this is a very large corporation, Abuse/Security is in an
entirely different arm of the beast than the Sales/marketting folks :(
Affecting change from either direction is often times 'challenging'.

-Chris



Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Paul G


- Original Message - 
From: Christopher L. Morrow [EMAIL PROTECTED]
To: Ben Browning [EMAIL PROTECTED]
Cc: Dr. Jeffrey Race [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Thursday, June 24, 2004 5:55 PM
Subject: Re: Attn MCI/UUNet - Massive abuse from your network

--- snipped ---

 this is not entirely true, a majority of these far-end customers are
 paying the same price regardless of utilization. Even the utilization
 charged customers are not having their 95th Percentile changed because of
 spam, or that'd be my guess. In the end there is no money for mci from
 spammers.

agreed, in the majority of the cases. on the other had, implementing the
FUSSP jrace proposed would cost mci (or any other carrier) revenue as they
would be seen as frothing-at-the-mouth fanatics that present a business risk
when used for upstream transit even for folks that run clean networks and
deal with abuse complaints properly.

and yes, it's time for this thread to die.

paul



Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Tom (UnitedLayer)

On Thu, 24 Jun 2004 [EMAIL PROTECTED] wrote:
 But most people are happy with things the way they are. They love SPAM
 because it gives them something to complain about and get emotional
 about.

I unfortunately have to agree there.
There's a large portion of the internet who has nothing better to do than
sit around and do essentially nothing.
Be it IRC, read email, spam, complain about spam, complain about hijacked
netblocks, complain about how slow their dialup is, complain about how
slow their cablemodem is, complain about how slow their computer
is, etc...

Spammers and Spamcomplainers belong to eachother, eventually they'll get
their own private intarweb, and they can torment eachother directly :)



Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Tom (UnitedLayer)

On Thu, 24 Jun 2004, Ben Browning wrote:
 This is, in fact (for you nanae watchers), the reason that most of them
 get canceled by us FASTER... Sadly, non-payment is often a quicker and
 easier method to term a customer than 'abuse', less checks since there
 is no 'percieved revenue' :(

 A revenue check has no place in abuse terminations.

That would be nice, but this is the real world.
We (presumably technical people) don't get to make all of the choices in
life. If we did, things might be a lot better, but then again maybe only
10-15% of us would still be employed :)



Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Ben Browning
At 02:36 PM 6/24/2004, Christopher L. Morrow wrote:
On Thu, 24 Jun 2004, Ben Browning wrote:

 like showing that the spammer was actually sending enough of a volume to
 swamp their core routers

 Likewise, I imagine MCI could argue that the damage is to their core
 product; namely, the trust of other ISPs and their willingness to exchange
 traffic with MCI.
you mean the phone companies we do business with?
No, I mean the internet. (Hence, ISPs). Your product, in the context of 
this discussion anyways, is access to the internet. When the actions of a 
downstream damage that product(IE more and more networks nullroute UUNet 
traffic), I would assume that you have appropriate privilege to toss them 
overboard in the contracts.

IANAL, though.
~Ben
---
   Ben Browning [EMAIL PROTECTED]
  The River Internet Access Co.
 WA Operations Manager
1-877-88-RIVER  http://www.theriver.com


RE: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Hannigan, Martin



 At 02:36 PM 6/24/2004, Christopher L. Morrow wrote:
 On Thu, 24 Jun 2004, Ben Browning wrote:
 

[ SNIP ]

 this discussion anyways, is access to the internet. When the 
 actions of a 
 downstream damage that product(IE more and more networks 
 nullroute UUNet 
 traffic),  


[ Operations content: ] Do you know of any ISP's null routing AS701? 


-M





Teaching/developing troubleshooting skills

2004-06-24 Thread Pete Kruckenberg

I'm working on trying to teach others in my group (usually
less-experienced, but not always) how to improve their
large-network troubleshooting skills (the techniques of
isolating a problem, etc).

It's been so long since I learned network troubleshooting
techniques I can't remember how I learned them or even how I
used to do it (so poorly).

Does anyone have experience with developing a
skills-improvement program on this topic? If you've tried
such a thing, what worked/didn't work for you? Outside
training? Books? Mentoring? Motivational posters?

I'm particularly sensitive to the I got my CCNA, therefore
I know everything there is to know about troubleshooting  
perspective, and how to encourage improving troubleshooting
skills without making it insultingly basic.

Thanks for your help.
Pete.



RE: Teaching/developing troubleshooting skills

2004-06-24 Thread Larry Pingree

Hi Pete,
If you have a test lab, a good thing would be to setup a
complete functional network. Show the engineer how it's configured. Then
have them leave the room and then break it. Send them back in to look at
what is wrong. As they move through the process, help them by guiding
them through the troubleshooting process in a mentoring fashion, help
them analyze and break apart the problem.

LP
 
Best Regards,
 
Larry
 
Larry Pingree

Visionary people, are visionary, partly because of the great many
things they never get to see. - Larry Pingree

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Pete Kruckenberg
Sent: Thursday, June 24, 2004 4:09 PM
To: [EMAIL PROTECTED]
Subject: Teaching/developing troubleshooting skills


I'm working on trying to teach others in my group (usually
less-experienced, but not always) how to improve their
large-network troubleshooting skills (the techniques of
isolating a problem, etc).

It's been so long since I learned network troubleshooting
techniques I can't remember how I learned them or even how I
used to do it (so poorly).

Does anyone have experience with developing a
skills-improvement program on this topic? If you've tried
such a thing, what worked/didn't work for you? Outside
training? Books? Mentoring? Motivational posters?

I'm particularly sensitive to the I got my CCNA, therefore
I know everything there is to know about troubleshooting  
perspective, and how to encourage improving troubleshooting
skills without making it insultingly basic.

Thanks for your help.
Pete.



Re: Teaching/developing troubleshooting skills

2004-06-24 Thread Jon R. Kibler
Pete Kruckenberg wrote:
 
 I'm working on trying to teach others in my group (usually
 less-experienced, but not always) how to improve their
 large-network troubleshooting skills (the techniques of
 isolating a problem, etc).

There are several vendors that offer these types of courses, and I am sure that if you 
search for courseware, you can find some good materials you could use to teach your 
own sessions in house.

Jon
-- 
Jon R. Kibler
Chief Technical Officer
A.S.E.T., Inc.
Charleston, SC  USA
(843) 849-8214




==
Filtered by: TRUSTEM.COM's Email Filtering Service
http://www.trustem.com/
No Spam. No Viruses. Just Good Clean Email.



Re: SprintPCS spam policies

2004-06-24 Thread David A . Ulevitch

On Jun 24, 2004, at 2:44 PM, Eric Kuhnke wrote:
 Has anyone ever encountered spammers doing a dictionary attack 
(emailing all  phone numbers in a NXX) via email-to-SMS gateways?

If they didn't before, they surely will now.
-davidu

  David A. Ulevitch - Founder, EveryDNS.Net
  http://david.ulevitch.com -- http://everydns.net



Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Christopher L. Morrow


On Thu, 24 Jun 2004, Ben Browning wrote:

 At 02:36 PM 6/24/2004, Christopher L. Morrow wrote:
 On Thu, 24 Jun 2004, Ben Browning wrote:
 
  
   like showing that the spammer was actually sending enough of a volume to
   swamp their core routers
  
   Likewise, I imagine MCI could argue that the damage is to their core
   product; namely, the trust of other ISPs and their willingness to exchange
   traffic with MCI.
 
 you mean the phone companies we do business with?


whoops, forgot my smilies :(

 No, I mean the internet. (Hence, ISPs). Your product, in the context of
 this discussion anyways, is access to the internet. When the actions of a

I'm not sure that there are many who are wholesale null routing uunet ip
space, if they do they might be causing their customers unnecessary
outages.

 downstream damage that product(IE more and more networks nullroute UUNet
 traffic), I would assume that you have appropriate privilege to toss them
 overboard in the contracts.






Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Tom (UnitedLayer)

On Thu, 24 Jun 2004, Ben Browning wrote:
 you mean the phone companies we do business with?

 No, I mean the internet. (Hence, ISPs). Your product, in the context of
 this discussion anyways, is access to the internet. When the actions of a
 downstream damage that product(IE more and more networks nullroute UUNet
 traffic), I would assume that you have appropriate privilege to toss them
 overboard in the contracts.

I think you'll be hard pressed to find anyone running a real ISP who will
null route any/all of UUNet.

UUNet is a large organization, network wise, and people wise.
The fact that they don't have people dedicated to jumping on customers who
you consider to be spamming, should not be suprising nor expected.



Re: Teaching/developing troubleshooting skills

2004-06-24 Thread Bruce Pinsky
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Pete Kruckenberg wrote:
| I'm working on trying to teach others in my group (usually
| less-experienced, but not always) how to improve their
| large-network troubleshooting skills (the techniques of
| isolating a problem, etc).
|
| It's been so long since I learned network troubleshooting
| techniques I can't remember how I learned them or even how I
| used to do it (so poorly).
|
| Does anyone have experience with developing a
| skills-improvement program on this topic? If you've tried
| such a thing, what worked/didn't work for you? Outside
| training? Books? Mentoring? Motivational posters?
|
| I'm particularly sensitive to the I got my CCNA, therefore
| I know everything there is to know about troubleshooting
| perspective, and how to encourage improving troubleshooting
| skills without making it insultingly basic.
|
If you are looking for some courses on just analytical troubleshooting
and/or problem solving techniques, you might want to look at the Kepner
Tregoe stuff (www.kepner-tregoe.com).  It is not network specific but
rather teaches techniques.  Some of their courses include:
Problem Solving and Decision Making
Analytic Trouble Shooting
Implementing Corrective and Preventive Actions
- --
=
bep
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (MingW32)
iD8DBQFA23J8E1XcgMgrtyYRAun6AKCmtmTkq8Pyq5xYBud478424x67kACeP6w9
uBUJo/El3rVXRC7TBkpb2DA=
=q+YH
-END PGP SIGNATURE-


Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Paul Vixie

 spamhaus has gotten too agressive.
 Its now preventing too much legitimate email.

that's funny, really funny.  s/spamhaus/maps/ or s/spamhaus/sorbs/ or indeed
look at any receiver-side filtering mechanism that gets a little traction,
and sooner or later folks will say it's too aggressive and prevents too much
legitimate e-mail.

the internet as a disintermediator is going to cause more things like maps
and spamhaus and sorbs to be created and to become successful/effective over
time.  the only way to remain a successful sender of e-mail is to find a way
to thread all of those needles at once, plus new ones that come along later.

same thing for anti-spam features of common MTA's.  once in a while someone
can't get e-mail to me because they don't have a DNS-PTR or DNS-MX, or
because their SMTP-HELO doesn't match their DNS-PTR, and they complain,
quite rightly, that RFC821 doesn't require them to do it and that i'm in
violation of the protocol by rejecting their e-mail.  i usually respond by
telling them my fax number.  they usually respond by changing their DNS or
SMTP configuration to conform to my violations of the protocol.  lather,
rinse, repeat.

somebody told me the other day that we couldn't implement graylisting here
because a lot of mail relays wouldn't retry for way too long, or would retry
too quickly, or would retry from a different ip address each time, or etc.
i said our fax number is on the web page, so senders will have recourse.

spam is fundamentally an exercise in unilateral cost shifting, by advertisers
toward eyeballs, with all kinds of middlemen.  to cope with this, these costs
are going to have to be shifted elsewhere.  it would be loverly to shift them
back toward advertisers, with fines and lawsuits and lost connectivity and
increased transit disconnection/reconnection fees, but that's not working.
(compare the u.s. federal anti-spam law with california's to see what i mean.)

so, the costs are being shifted toward legitimate e-mail senders.  oh well.
if somebody can't reach you because they don't know how to thread the needle,
then send them your fax number or postal address.  getting legitimate e-mail
has to become the sender's problem, because receiver costs are too high now.

i'm not preaching that this should be so; i'm explaining that it's become so.
it's like with chris and sean not being able to disco their spewing endsystems:
just because the source-provider or transit-provider doesn't make connectivity
less available to these spewers, doesn't mean it won't become less available.
all it does is change who does it, and it usually ends up getting done by
folks whose tools aren't as sharp as the (source|transit)-provider's.

it's a very twisted variation on you broke it, you bought it.


Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Dr. Jeffrey Race

On Thu, 24 Jun 2004 14:16:49 -0400, [EMAIL PROTECTED] wrote:

I suspect that the spammer can find a lawyer who is willing to argue the idea
that the safety and security of the AS701 backbone was not prejudiced by
the spammer's actions, 

OK, let them sue.  If you are against spam, you have to stand up in 
court and say so.

Anyway all the spamming is now in violation of contracts.   These people 
would come to court with 'dirty hands' in the term of art, and the court
would not look favorably on any case they might try to make

Jeffrey Race





Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Dr. Jeffrey Race

On Thu, 24 Jun 2004 21:33:35 + (GMT), Christopher L. Morrow wrote:
This is true. The 'security' or 'safety' of the backbone is not affected
by:
1) portscaning by morons for openshares
2) spam mail sending
3) spam mail recieving

(atleast not to my view, though I'm no lawyer, just a chemical engineer)

So, the issue of termination for this reason isn't really valid. Hence the
off-topic-ness of this thread.

Compromise to connectivity due to harboring spammers is a security
and safety issue by any reasonable definition.Being a vector for trojan
horse mechanisms is a security issue.  




RE: Unplugging spamming PCs

2004-06-24 Thread Joe Shen

Hi,

Mail servers should be registered just like domains and shutdown by a
registrar if they are misusing their registered services. This really
needs to be handled by a multi-lateral legal solution, industry will not
fix it alone.

No, I don't think this is good solution


First of all, we could not ask customers to register everything they planned with 
leased line without legal reasons. 
Second,  if I hire DSL/leased_line service  from ISP and set up domain name for 
myself,  ISP could not ask me to 
tell them which port should be opened as I'm not taking a firewalling service, I'm not 
a member of my service provider.
I should be able to do anything that are not perhibited by law or affact someothers.  

 Blocking_port_25 indicates  ISP  pre-assume that customers  will SPAM their network.  
But, SPAMmer is just a very small 
group of people.  Maybe most of them comes from other countries ( what happens in 
China).  

To me,  the proper way of anti-spam may ask cooperation between ISPs and Email service 
providers.  Anyway, 
strengthening anti-spam ability in Email server is a must.

regards

Joe 




LP

Best Regards,

Larry


Cool Things Happen When Mac Users Meet! Join the community in Boston this July: 
www.macworldexpo.com


RE: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Dr. Jeffrey Race

On Thu, 24 Jun 2004 19:26:10 -0600, Smith, Donald wrote:

Are you offering to finance ISP's legal battles against spammers?

No, it's their network and their legal responsibility to keep it clean.  However
I did voluntarily prepare a case for Neil Patel to file on behalf of UUNET
under the Va computer crimes act, and he refused.  I would have been
a witness.   At this point (esp when he said the matter lay with Mr
Ebbers, who is now up on other criminal charges) it became obvious what
was the ethical level of this firm's management.   

Jeffrey Race




Re: SprintPCS spam policies

2004-06-24 Thread Suresh Ramasubramanian
Eric Kuhnke  writes on 6/25/2004 5:44 AM:
As a non-sprint-related side note, I know of somebody whose ATT 
Wireless phone service was rendered completely unusable by incoming spam 
via the email-to-SMS gateway.  The typical rate was one message every 30 
minutes, the only solution offered by customer service was to change the 
phone number.   Has anyone ever encountered spammers doing a dictionary 
attack (emailing all  phone numbers in a NXX) via email-to-SMS 
gateways?
I used to run an email to sms gateway at a previous job (where we 
consulted for one of india's largest mobile phone providers)

I was seeing multiple instances of this even 4..5 years ago.
srs
--
suresh ramasubramanian [EMAIL PROTECTED] gpg EDEDEFB9
manager, security and antispam operations, outblaze ltd


RE: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Smith, Donald

I am not a lawyer. I am not aware of the law that requires uunet to
go to court to prevent spammers who are not their direct customers from using their 
network. Spammers use many differnt means to send their spam. Most ISPs use AUP's to 
prevent spamming but afaik no isp has successfully sued a spammer and recovered any 
reasonable percentage of their expenses in fighting this same spam. When that becomes 
a method to pay for combating spam I am sure most ISPs will pursue it. This is a money 
issue. 

NSP/ISP have shareholders who desire a return on their investment. 

When I notify the abuse team at uunet of a spammer they act promptly shutting down any 
account that I can show is being used for spam. 

Chris is a very trusted and active member of the NSP community, to his credit is a 
detailed document on blackhole filtering one of the primary tools used by other 
NSP/ISP's for stopping bad traffic. AFAIK he can not authorize legal action against 
spammers.

[EMAIL PROTECTED] my opinions are mine and do not reflect qwest policy.

 

-Original Message-
From: Dr. Jeffrey Race
To: Smith, Donald
Cc: [EMAIL PROTECTED]
Sent: 6/24/2004 9:40 PM
Subject: RE: Attn MCI/UUNet - Massive abuse from your network

On Thu, 24 Jun 2004 19:26:10 -0600, Smith, Donald wrote:

Are you offering to finance ISP's legal battles against spammers?

No, it's their network and their legal responsibility to keep it clean.
However
I did voluntarily prepare a case for Neil Patel to file on behalf of
UUNET
under the Va computer crimes act, and he refused.  I would have been
a witness.   At this point (esp when he said the matter lay with Mr
Ebbers, who is now up on other criminal charges) it became obvious what
was the ethical level of this firm's management.   

Jeffrey Race





RE: Attn MCI/UUNet - Massive abuse from your network

2004-06-24 Thread Dr. Jeffrey Race

On Thu, 24 Jun 2004 21:39:26 -0600, Smith, Donald wrote:

I am not a lawyer. I am not aware of the law that requires uunet to
go to court to prevent spammers who are not their direct customers from using 
their network.


Doctrine of attractive nuisance




AOL Orders the Spam Special

2004-06-24 Thread Henry Linneweh

And just when things looked dismal this had to happen
to make it more so

http://www.washingtonpost.com/wp-dyn/articles/A1898-2004Jun24.html?referrer=email

-Henry