Re: Upcoming change to SOA values in .com and .net zones

2004-01-07 Thread Richard D G Cox

On 7 Jan 2004 23:02 UTC Frank Louwers <[EMAIL PROTECTED]> wrote:
| > generated twice per day, so NN is usually either 00 or 01.)
| > January 1970.)  For example, a zone published on 9 February 2004 might
| > have serial number "1076370400".  The .com and .net zones will still
| > be generated twice per day, but this serial number format change is in
| > preparation for potentially more frequent updates to these zones.

| stuid question

Yup!

| but isn't 2004010101 (today) > 1076370400 (9 Feb 2004)?

Nope!

>> The new format will be the UTC time at the moment of zone generation
>> encoded as the number of seconds since the UNIX epoch.
   ^

... and not as MMDDHHMMSS or any contracted version thereof!

-- 
Richard







Re: Wired mag article on spammers playing traceroute games with trojaned boxes

2003-10-09 Thread Richard D G Cox

On Thu, 9 Oct 2003 12:01:35 -0400
"McBurnett, Jim" <[EMAIL PROTECTED]> wrote:

| I think even if we get all the ones for this domain name today,
| assuming we can muster even man hours to get it today, another
| 5000 will be added tomorrow.  And looking at my list We have US
| (a very small ISP and a large ISP) RIPE, and LACNIC.

This malware is not new, but is only just becoming widely visible.
It succeeds solely because of the "Dynamic-DYS" (real-time updating)
functionality built into the dot-biz registry.

Certainly it can be killed, but the techniques to achieve that are
better discussed OFF this list - for both AUP and other valid reasons.
As soon as this exploit is killed, no doubt another, similar, exploit
would follow.  We therefore need a more generic solution to the issue.

| This not only affects this instance but global security as a whole.
| Just a few days ago, Cisco was taken offline by a large # of Zombies,
| I am willing to say that those are potentially some of the same
| compromised systems.

Empirical evidence would seem to support your view.  Even where they are
not the same zombies, networks that allow this type of zombie to remain
in place are just as likely to allow DDoS zombies to continue undisturbed.

The problem is that many ISPs filter all issues of this nature through
their abuse teams, rather than sending them directly to their security
specialists.  Most abuse teams have neither the time nor experience to
investigate, and this particular trojan has been written to make it too
easy for abuse teams to dismiss reports of its activity, and then to
justify taking no action - that is exactly what the writers of the
malware intended to happen.

A step change in attitude from providers who offer 24/7-on connectivity
is what is needed now, and agreement to separate all network security
issues from their abuse desk procedures should be number one priority.

-- 
Richard Cox



Re: ftp.cisco.com broken ?

2003-10-07 Thread Richard D G Cox

On 7 Oct 2003 17:39 UTC Ezequiel Carson <[EMAIL PROTECTED]> wrote:

| hi, can you resolve ftp.cisco.com?
|   
| [EMAIL PROTECTED] /]# ping ftp.cisco.com
| ping: unknown host ftp.cisco.com
| [EMAIL PROTECTED] /]#
| 
| something is wrong here

I can both resolve and reach it from opposite ends of the planet ...

Trace ftp.cisco.com (198.133.219.27) ...
 1  192.168.34.2   1ms   FastEth8-1-0.sb1.optus.net.au
 2  61.88.178.81ms   gi3-0.ig6.optus.net.au
 3  203.208.148.101  232ms
 4  203.208.172.45   220ms   p6-1.plapx-cr1.ix.singtel.com
 5  203.208.168.225  231ms
 6  203.208.168.218  231ms
 7  63.169.235.133   164ms   leg-63-169-235-133-CHI.sprinthome.com
 8  144.232.20.125   213ms   sl-bb20-ana-4-3.sprintlink.net
 9  144.232.1.134165ms   sl-bb23-ana-9-0.sprintlink.net
10  144.232.20.159   166ms   sl-bb25-sj-9-0.sprintlink.net
11  144.232.3.134166ms   sl-gw11-sj-10-0.sprintlink.net
12  144.228.44.14167ms   sl-ciscopsn2-11-0-0.sprintlink.net
13  128.107.239.89   175ms   sjce-dirty-gw1.cisco.com
14  128.107.239.102  175ms   sjck-sdf-ciod-gw2.cisco.com
15  198.133.219.27   175ms   ftp-sj.cisco.com

Trace ftp.cisco.com (64.102.255.95) ...
 1  217.146.111.97 0ms   gateway.mandarin.com
 2  213.123.101.8920ms
 3  217.146.102.237   20ms
 4  213.200.77.93 50ms
 5  213.200.81.74 30ms
 6  213.206.159.5 40ms   sl-gw10-lon-5-1.sprintlink.net
 7  213.206.128.4530ms   sl-bb21-lon-8-0.sprintlink.net
 8  144.232.19.69150ms   sl-bb21-tuk-10-0.sprintlink.net
 9  144.232.20.13290ms   sl-bb20-tuk-15-0.sprintlink.net
10  144.232.20.122   120ms   sl-bb21-rly-14-3.sprintlink.net
11  144.232.14.134   160ms   sl-bb23-rly-11-0.sprintlink.net
12  144.232.14.46130ms   sl-gw20-rly-10-0.sprintlink.net
13  144.232.244.210  130ms   sl-ciscopsn2-12-0.sprintlink.net
14  64.102.254.194   100ms   rtp7-dirty-gw1.cisco.com
15  64.102.254.205   120ms   rtp5-ciod-gw2.cisco.com
16  64.102.255.95110ms   ftp-rtp.cisco.com

-- 
Richard


Re: Fun new policy at AOL

2003-08-28 Thread Richard D G Cox

On 28 Aug 2003 16:07 UTC Matthew Crocker <[EMAIL PROTECTED]> wrote:

| AOL for example could require ISPs to meet certain criteria before
| they are allowed direct connections.  ISPs would need to contact AOL,
| provide valid contact into and accept some sort of AUP (I shall not
| spam AOL...) and then be allowed to connect from their IPs. AOL could
| kick that mail server off later if they determine they are spamming.

If you replace "AOL" with some body or set of bodies, unrelated to
(but trusted by) large numbers of networks, then you have what I regard
as the only ultimately workable solution to the present situation.

The devil is in the details - finding and trusting such bodies: however
it may be that they are already amongst us but under a different name!

-- 
Richard Cox

%% HELO - the first word of every Email transaction - is in Welsh! %%



Re: Complaint of the week: Ebay abuse mail (slightly OT)

2003-08-04 Thread Richard D G Cox
Valdis Kletnieks <[EMAIL PROTECTED]> wrote:
> 1) What *immediate* benefits do you get if you are among the first to
>  deploy? (For instance, note that you can't stop accepting "plain old
>  SMTP" till everybody else deploys).

The immediate benefit (as sender) is that you reduce the (now ever-increasing)
risk of your mail being rejected by filtration processes and will be trusted
on arrival; the benefit for the recipient is of course less junk!

However you CAN stop accepting "plain old SMTP" right away, because you can
delegate that to a filtration service that hosts your old-style MX, applies
ever-increasingly stringent filtration rules, and then forwards to you using
the new protocol. Several such filtrations services may well appear when the
time is right.

> 2) Who bears the implementation cost when a site deploys, and who gets
>the benefit? (If it costs *me* to deploy, but *you* get the benefit,
>why do I want to do this?)

Both parties get benefits which seriously outweigh the costs!

> 3) What percentage of sites have to deploy before it makes a real
> difference, and what incremental benefit is there to deploying before that?

To some extent the concept is already here, and deployed, whether using
in-house filters or remote-MX, to subject the unauthenticated mail - which
of course is currently ALL the mail - to appropriate filtering.

> (For any given scheme that doesn't fly unless 90% or more of sites do it,
> explain how you bootstrap it).

That is a very valid point that most people don't address.  I define any
new scheme as unworkable unless someone can describe the present, albeit
unsatisfactory, arrangements that it offers to replace as a "special case"
of the new scheme for which there is clearly-defined correct handling.

> 4) Does the protocol still keep providing benefit if everybody deploys it?

That depends entirely on the contactual relationships that may exist between
mail-exchanging sites.  Just implementing an authenticating protocol on its
own will NOT help.  There will be a prima-facie need for a selection of
"trust-authorities" who specify what is acceptable for their trusted-senders
to send.  Recipients then get to choose which criteria are closest to their
requirements (including whitelisting if needed on a per-site basis).
 
> (This is a common problem with SpamAssassin-like content filters - if most
> sites filter phrase "xyz", spammers will learn to not use that phrase).

That goes for any precautions taken - not just content filters.  That is WHY
the contractual relationships are absolutely essential for any new scheme.
And there, too, lies the bulk of the work needed - the technical issues do
not place any great demands on the networking community.

> If you have a *serious* proposal that actually passes all 4 questions
> (in other words, it provides immediate benefit to early adopters, and
> still works when everybody does it), bring it on over to '[EMAIL PROTECTED]'.

Heh.  The noise-to-signal level *there* is far worse than in NANOG - by at
least 12dB last time I looked ;-)

--
Richard Cox
RC1500-RIPE


Re: National Do Not Call Registry has opened

2003-07-03 Thread Richard D G Cox

On Tue, 1 Jul 2003 11:28:05 +0200 "Petri Helenius" <[EMAIL PROTECTED]> wrote:

| bulk buying international minutes to non-regulated destinations costs
| you less than a consumer pays for interstate call within the US.

On which basis inbound telemarketing calls from ostensibly non-regulated
sources may be expected to start real soon now.  It is already happening
with unsolicited faxes, as some people are painfully aware.

This comment is not to be taken as a view on whether such calls would, or
would not, be caught by the new legislation.  It may however be taken as
a view as to whether the telemarketers think they can get away with it!

-- 
Richard D G Cox
Mandarin Technology






Re: Spam from weird IP 118.189.136.119

2003-06-16 Thread Richard D G Cox

On Mon, 16 Jun 2003 15:47 (UT), [EMAIL PROTECTED] wrote:

| I've never heard of the NNFMP protocol

It's the latest spammer exploit the "Network Nonsense - Fools Most People"
exploit.  You've not been hit by that one yet, then?

On Mon, 16 Jun 2003 17:47 (UT), Wayne Tucker <[EMAIL PROTECTED]> wrote:

| I have run into a considerable number of these that include headers
| suggesting that they were relayed through my server, but I have verified
| my logs, and the messages never even touched any of my machines.

But precisely which logs are you looking at?
The SMTP logs from your mail server or the machine's IP connection log?

| It seems that one of the new tricks is to throw some BS headers in there
| before relaying the message, just to throw a monkey wrench in the works.

That is one of the older tricks in the book.  The latest revision is to
throw some _matching_ headers in there so that it looks entirely genuine.

If you have a trojan executable on a server as well as an "authorised" mail
server then any mail sent by the trojan will NOT appear in the logs of the
SMTP server, but WILL appear on the next hop as coming from your server and
the only way to tell the difference is by examining the connecting port as
seen coming from your server by the machine at next hop.

-- 
Richard D G Cox



Re: Spam from weird IP 118.189.136.119

2003-06-16 Thread Richard D G Cox

On Mon, 16 Jun 2003 17:33:11 +0200, "Pascal Gloor" <[EMAIL PROTECTED]> wrote:

| Getting SPAM from 118.189.136.119 relayed by rr.com ?
|
| this network is not allocated, nor announced. I have been looking everywhere
| to find if it has been announced (historical bgp update databases, like RIS
| RIPE / CIDR REPORT / etc..)... I didnt found anything this probably mean
| rr.com is routing that network internaly.

This is very likely to be a known exploit I have been tracking.  In all the
cases which we have so far confirmed, the spam was not relayed, but proxied
by a trojan executable which is able to mimic a "previous" header with such
a degree of accuracy that it is indistinguishable from the genuine article!

| If there is any rr.com guy around. Could you please check this?

Our advice would be that the server-that-connected-to-you needs to be taken
offline by the security people at its site (which you say is RoadRunner) and
they should have ALL its disk(s) imaged for forensic analysis purposes.

Our experience is that sites hit by this exploit will do basic checks on
the server and claim it is uncompromised and "cannot possibly be sending
that spam".  Such a claim would be entirely incorrect.  You would need to
persuade them that something is wrong, which is difficult at the best of
times.  RoadRunner being involved in this case suggests this may *not* be
the "best of times".

-- 
Richard Cox