Re: BGP list of phishing sites?

2004-06-29 Thread David Barak

--- Iljitsch van Beijnum <[EMAIL PROTECTED]> wrote:

> > The principle has been analogized to describe
> larger
> > systems and items, and is a useful but not always
> > completely accurate metaphor.  It is entirely
> possible
> > to observe some things without affecting them.
> 
> Is it? If I want to look at you, I must bounce
> photons off of you. 
> Similar stuff needs to happen for other types of
> observation. This may 
> not have a very large effect on you, but there is
> _some_ effect.

for some value of _some_, right?  ;)

I agree that there is an affect, but not necessarily
due to the observation itself: consider a webcam. 
Whether I am observing you in the camera is not
dependent on my interacting with you per se: the
photons were already on their way from you to the
lens.  You could argue that those photons cause a
change, but I would respond that the photons would
have caused that change regardless of whether they are
measured.  

Perhaps some beer and philosophy at the October
meeting?




=
David Barak
-fully RFC 1925 compliant-



__
Do you Yahoo!?
Yahoo! Mail - 50x more storage than other providers!
http://promotions.yahoo.com/new_mail


Re: BGP list of phishing sites?

2004-06-29 Thread Iljitsch van Beijnum
On 29-jun-04, at 22:53, David Barak wrote:
Einstein taught as that even the simple act of
observation influences our surroundings. Wouldn't it make sense to 
try to
leverage this influence such that the future is shaped more to our
liking, however small the change may be?

nitpick: it wasn't Einstein, but rather Heisenberg who
developed the uncertainty principle.
Einstein's take on this was to ridicule it somewhat:
"When a person such as a mouse observes the universe, does that change 
the state of the universe?"

The principle has been analogized to describe larger
systems and items, and is a useful but not always
completely accurate metaphor.  It is entirely possible
to observe some things without affecting them.
Is it? If I want to look at you, I must bounce photons off of you. 
Similar stuff needs to happen for other types of observation. This may 
not have a very large effect on you, but there is _some_ effect.



Re: BGP list of phishing sites?

2004-06-29 Thread Dan Hollis

On Tue, 29 Jun 2004 [EMAIL PROTECTED] wrote:
> If they are notified that they are an 
> accessory to a crime and do not take any
> action, then doesn't this make the provider
> liable to criminal charges?

You would think it would. But who bothers to prosecute? No one.

> Did you really inform the provider's legal department of
> this fact or did you just send an email to some dumb droids in the 
> abuse department?

Yes and I was told they would not do anything unless they received a 
subpoena or law enforcement forced them to shut it down, and that if I 
wanted action I should talk to the police instead.

> Quite frankly, I don't consider messages to
> the complaints/abuse department to be "notice".
> How long does it take to find a head office
> fax number and draft up a legalistic looking
> "notice" document addressed to their legal 
> department?

Not long, but its a waste of time because they wont do anything anyway.

The only way to get their attention is with blacklists.

-Dan



Re: BGP list of phishing sites?

2004-06-29 Thread Paul Vixie

> So you think it's futile to try to get software vendors to improve their
> products. I suppose I can go along with that to a certain degree. But how
> can you expect end-users to work around the brokenness in the software they
> use? This seems both unfair and futile.

at my aforementioned sister's house, i did it by buying an off-the-shelf
$99 firewall and a $79 copy of suse-9 and spending an afternoon showing her
how to use them.  i guess the general form of the answer is "tell people to
get some tech support rather than believing what their vendors say."  i'm
not an expert on d-link firewalls, or on linux, but i know enough to know
that running MSIE and Outlook and not having a firewall was her problem.

> Einstein taught as that even the simple act of observation influences our
> surroundings. Wouldn't it make sense to try to leverage this influence such
> that the future is shaped more to our liking, however small the change may
> be?

as sad as this is, the best way to accomplish that is by heaping public
scorn and ridicule on sean's and chris's employers every time they whine
about how folks are widely blackholing their customers.  you won't
convince sbc or mci, but you might convince a lurker or two.

> >> But the real issue is that this is even necessary. The biggest problem
> >> we have with IP is that it doesn't provide for a way for a receiver to
> >> avoid having to receiving unwanted packets. It would be extremely
> >> useful if we could fix that.
> 
> > you realize that the virtual circuit X.25/TP4 people are laughing their
> > asses off as they read those words, don't you?
> 
> It's easy to laugh if you don't have a world wide network to run.

i once had the honour of taking over a network dave rand had built, which
became an unprofitable dot-bomb on my watch.  ouch!  but it wasn't because
we refused to take money from spammers, or because we disconnected folks
pre-emptively when they violated their AUP.  so, that's not what i meant.

if you want to put enough intelligence into the network so that "a receiver"
can "avoid having to receive unwanted packets" then you'll need to decide
how to throttle flow solicitations or else those flow solicitations will
become the new form of spam and ddos.  this will require state, not just in
your hosts and upstream router and provider, but globally, end to end.  and
if you do that you'll have bitten into the rotten apple of circuit switching
and x.25 and atm that the IP folks have been saying all these years wouldn't
scale and wasn't necessary.  and so, the people on the other side (the losing
side, in my opinion) of that argument will laugh their asses off, whether
they have a world wide network to run, or not.


Re: BGP list of phishing sites?

2004-06-29 Thread David Barak

--- Iljitsch van Beijnum <[EMAIL PROTECTED]> wrote:

> Einstein taught as that even the simple act of
> observation influences 
> our surroundings. Wouldn't it make sense to try to
> leverage this 
> influence such that the future is shaped more to our
> liking, however 
> small the change may be?

nitpick: it wasn't Einstein, but rather Heisenberg who
developed the uncertainty principle.  The uncertainty
principle only speaks of electrons (or other small
wavicles) and describes how it's not possible to know
both the position and momentum.  If you're not
interested in knowing both of those at the same time,
the uncertainty principle does not apply.  The
principle has been analogized to describe larger
systems and items, and is a useful but not always
completely accurate metaphor.  It is entirely possible
to observe some things without affecting them.  

-David Barak
-Fully RFC 1925 Compliant



__
Do you Yahoo!?
Yahoo! Mail Address AutoComplete - You start. We finish.
http://promotions.yahoo.com/new_mail 


Re: BGP list of phishing sites?

2004-06-29 Thread Iljitsch van Beijnum
On 29-jun-04, at 5:46, Paul Vixie wrote:
But if software is
created in such a way that regular users manage to screw up 
consistently,
maybe the software can be improved rather than the user chastised?

we're just not communicating here.  prescriptive statements ("can be
improved?") are inappropriate unless somebody's asking for your advice.
in this case i think it's safe to say that software vendors don't care
what we think about this topic and they have their own plans.
So you think it's futile to try to get software vendors to improve 
their products. I suppose I can go along with that to a certain degree. 
But how can you expect end-users to work around the brokenness in the 
software they use? This seems both unfair and futile.

what matters isn't what folks
ought to do, but what they will do and are doing, or won't do, etc.
Einstein taught as that even the simple act of observation influences 
our surroundings. Wouldn't it make sense to try to leverage this 
influence such that the future is shaped more to our liking, however 
small the change may be?

in the medium and long term, no arbitrary blacklist will have global or
lasting effect.  you don't need to take this effect into consideration,
it's a marginal corner case at best, and a distraction.
I disagree. Even bad stuff that's limited in time and space is bad, and 
should be avoided if possible.

I think the one true way is to be found somewhere between the extremes
of controlling every little thing a customer does and not doing 
anything.

ah.  you're pining for what are now thought of as "the good old days", 
eh?
For those who suffer from a bad case of nostalgia I recommend IPv6. 
It's the closest thing to traveling back in time and watch the net as 
it was ten years ago.

However, that's not the place where I'm coming from. It's simply that 
each absolute is worse than the middle of the scale. Same thing with 
copyright violations. If we were 100% unable to do anything that the 
copyright holder doesn't want us to do, we'd be spending much more 
money on much less content. But if people were able to copy to their 
heart's content with impunity, artists wouldn't be able to make a 
living and there wouldn't be any content. So the current situation is 
indeed the good old days, even though few people seem to realize it. 
Unfortunately this isn't entirely the case with abuse handling as there 
are both people who are to lax and those who are too strict.

But the real issue is that this is even necessary. The biggest problem
we have with IP is that it doesn't provide for a way for a receiver to
avoid having to receiving unwanted packets. It would be extremely
useful if we could fix that.

you realize that the virtual circuit X.25/TP4 people are laughing their
asses off as they read those words, don't you?
It's easy to laugh if you don't have a world wide network to run.


Re: BGP list of phishing sites?

2004-06-29 Thread Paul Vixie

> meanwhile your sister has the hassle of getting southwest to send that
> fax, or changing her travel plans. i'm sure glad you're not running my
> isp.

if i were running your isp, paying customers would get to choose.


Re: BGP list of phishing sites?

2004-06-29 Thread Michael . Dillon

> When a provider hosts a phishing site for _weeks on end_ and does 
> _nothing_ despite being notified repeatedly, sometimes a blacklist is 
the 
> only cluebat strong enough to get through the provider's thick skull.

If they are notified that they are an 
accessory to a crime and do not take any
action, then doesn't this make the provider
liable to criminal charges? Did you really
inform the provider's legal department of
this fact or did you just send an email
to some dumb droids in the abuse department?

Quite frankly, I don't consider messages to
the complaints/abuse department to be "notice".
How long does it take to find a head office
fax number and draft up a legalistic looking
"notice" document addressed to their legal 
department?

Some people in this industry seem to want to
manage it as a secret club for insiders and
solve all problems of the industry in one
cliquish venue. I just don't think that is
an appropriate way to operate on the scale
of today's Internet.

--Michael Dillon



Re: BGP list of phishing sites?

2004-06-29 Thread Michael . Dillon

> None of this would be an issue, if abuse desks were:
> 
> 1. Responsive
> 2. Responsible
> 3. Empowered
> 4. Accountable
> 
> Today, they are none of the above. 

A lot of people on this list are opposed to increasing
government regulation of the Internet industry.

But how would you feel about a law which required
all network operators to have an abuse department
which is responsive, responsible, empowered and
accountable? Now that is an area where the FCC 
and CRTC and Ofcom and the ACA could
probably do some good for the industry.

--Michael Dillon



RE: BGP list of phishing sites?

2004-06-29 Thread matthew.ford

> my sister called me last night to tell me that she was unable 
> to receive
> mail from southwest airlines, and that her e-ticket was in 
> limbo for some
> flight somewhere.  i checked and sure enough southwest 
> airlines has sent
> me three or messages per day that i don't want, for most days 
> out of the
> last six months.  since neither southwest nor their ISP was willing to
> take any responsibility for this unwanted e-mail, i 
> blackholed them, and
> i guess that means they'll have to fax that e-ticket.  or 
> something.  it's
> not my problem.

meanwhile your sister has the hassle of getting southwest to send that
fax, or changing her travel plans. i'm sure glad you're not running my
isp.

--mat


Re: BGP list of phishing sites?

2004-06-28 Thread Paul Vixie

> > the root cause of network abuse is humans and human behaviour, not
> > hardware or software or corporations or corporate behaviour.  if most
> > people weren't sheep-like, they would pay some attention to the results
> > of their actions and inactions.
> 
> It's easy to blame the user, and usually they deserve it, even if they're
> innocent this time they're guilty of something else. But if software is
> created in such a way that regular users manage to screw up consistently,
> maybe the software can be improved rather than the user chastised?

we're just not communicating here.  prescriptive statements ("can be
improved?") are inappropriate unless somebody's asking for your advice.
in this case i think it's safe to say that software vendors don't care
what we think about this topic and they have their own plans.  same
thing for sean's and chris's employers.

see padlipsky for the best description to date on prescriptive vs.
descriptive in the networking field.  what matters isn't what folks
ought to do, but what they will do and are doing, or won't do, etc.

> ... If people do the wrong thing, by all means let them suffer the
> consequences so they may think twice about doing it again. What
> worries me is the potential for hurting innocent bystanders, or even
> active subversion of these mechanisms. I mean, what better way to DoS
> someone than have them put on a blacklist?

in the medium and long term, no arbitrary blacklist will have global or
lasting effect.  you don't need to take this effect into consideration,
it's a marginal corner case at best, and a distraction.

> I think the one true way is to be found somewhere between the extremes
> of controlling every little thing a customer does and not doing anything.

ah.  you're pining for what are now thought of as "the good old days", eh?
when reasonable people wanted to do reasonable things and needed help from
vendors and suppliers, and unreasonable people hadn't discovered "the net"
yet and were still making money the old fashioned way (bilking little old
ladies out of their life savings, etc).  i have bad news and worse news.
the bad news is, there's no going back.  the worse news is, as carole king
so aptly sang, "THESE ARE the good old days".

> But the real issue is that this is even necessary. The biggest problem
> we have with IP is that it doesn't provide for a way for a receiver to
> avoid having to receiving unwanted packets. It would be extremely
> useful if we could fix that.

you realize that the virtual circuit X.25/TP4 people are laughing their
asses off as they read those words, don't you?


Re: BGP list of phishing sites?

2004-06-28 Thread Patrick W Gilmore
On Jun 28, 2004, at 6:24 PM, Iljitsch van Beijnum wrote:
On 28-jun-04, at 18:47, Paul Vixie wrote:
the root cause of network abuse is humans and human behaviour, not
hardware or software or corporations or corporate behaviour.  if most
people weren't sheep-like, they would pay some attention to the 
results
of their actions and inactions.
It's easy to blame the user, and usually they deserve it, even if 
they're innocent this time they're guilty of something else. But if 
software is created in such a way that regular users manage to screw 
up consistently, maybe the software can be improved rather than the 
user chastised?
Software definitely needs to improve.
However, if you mailed out an attachment with the subject "this is a 
virus, do not click on it", encrypted it and put the password in the 
body, the virus would still spread like wildfire.

Never underestimate the power of human stupidity.
Which is why blacklists that depend on the ISP to continually train 
"lusers" or risk disconnectivity for non-stupid users  may not be the 
right approach.  People who run such ISPs CANNOT train all lusers all 
the time.  And the alternative is to not have end-user ISPs (i.e. not 
an option).

Or maybe that is the way to go.  I really don't know at this point.
But I do know if I were still running an ISP, I would instantly filter 
any user / host / netblock proven to be infected / C&C / phishing site 
/ etc.  And I would not subscribe to any blacklist which had entries 
for non "bad" IPs.

As I Am Not An ISP, I can only vote with my dollars.
Your network, your decision.  My dollars, my decision.  And I buy a lot 
of bandwidth :)

--
TTFN,
patrick


Re: BGP list of phishing sites?

2004-06-28 Thread Iljitsch van Beijnum
On 28-jun-04, at 18:47, Paul Vixie wrote:
the root cause of network abuse is humans and human behaviour, not
hardware or software or corporations or corporate behaviour.  if most
people weren't sheep-like, they would pay some attention to the results
of their actions and inactions.
It's easy to blame the user, and usually they deserve it, even if 
they're innocent this time they're guilty of something else. But if 
software is created in such a way that regular users manage to screw up 
consistently, maybe the software can be improved rather than the user 
chastised?

actions like buying something from a
spammer or clicking the "unsubscribe me" button in spam mail,
The problem is that a few in a thousand that do this ruin things for 
the rest. In anything involving humans it's useless to expect the right 
thing to happen 100% of the time.

or running microsoft outlook.
Can't argue with you there.
inactions like leaving their cable/DSL pee cee up 24x7 and never 
wondering why the activity light on their modem flickers constantly.
:-)  My cable modem activity light starts blinking as soon as there is 
a link and never stops. A /20 can generate a significant amount of ARP 
traffic during the best of times...

if you want people to notice the results of their actions and 
inactions, then they have to be brought into the equation.
Ah, you are a BOFH follower. Unfortunately, rudeness rarely results in 
enlightenment.

Still, anti-spam blacklists are pretty much universally applied inside
SMTP implementations these days. So if 3828747.dhcp.bigcable.com is
blacklisted because it sources spam, people subscribing to the
blacklist will no longer receive spam from that host, but the host is
still capable of interacting with the net in general and the blacklist
users in particular over a host of other protocols.

i'm trying to figure out why you think it's in your best interest to
limit the impact of your defensive activities, or to limit the impact 
of
sheep-like behaviour on the sheep-like humans who own these infected
hosts.
That's not what I'm worried about. If people do the wrong thing, by all 
means let them suffer the consequences so they may think twice about 
doing it again. What worries me is the potential for hurting innocent 
bystanders, or even active subversion of these mechanisms. I mean, what 
better way to DoS someone than have them put on a blacklist?

i think "decide for themselves" is the right meme.
Good!
but where we differ is on the questions of ownership and
responsibility.  every network has to take responsibility for the
traffic is spews, and cannot just say "take it up with my customer"
since they're getting paid to make the spew possible.  and every 
network
has to be able to say "this shall not pass!"  concerning traffic that
does not match their "AUP", and the only recourse their customers can
have is to sign up with a different network.
I think the one true way is to be found somewhere between the extremes 
of controlling every little thing a customer does and not doing 
anything. But the real issue is that this is even necessary. The 
biggest problem we have with IP is that it doesn't provide for a way 
for a receiver to avoid having to receiving unwanted packets. It would 
be extremely useful if we could fix that.



Re: BGP list of phishing sites?

2004-06-28 Thread Simon Lockhart

On Mon Jun 28, 2004 at 03:12:12PM -0600, Smith, Donald wrote:
> So would ISP's block an phishing site if it was proven 
> to be a phishing site and reported by their customers?

Would you block access to a kiddie porn site? Do you block access to "warez"
sites? Both are illegal. I'm not convinced that phishing is illegal in its own
right (except possible as "passing off").

Phishing sites only work because Banks won't invest in strong authentication,
and users are stupid. Why should it become the ISPs problem to fix those
inadequacies?

Some banks in Europe use one-time-password token things (such as SecurID). Are
those banks being caught out by phishing?

Simon
-- 
Simon Lockhart |   Tel: +44 (0)1628 407720 (x(01)37720) | Si fractum 
Technology Manager |   Fax: +44 (0)1628 407701 (x(01)37701) | non sit, noli 
BBC Internet Ops   | Email: [EMAIL PROTECTED]| id reficere
BBC Technology, Maiden House, Vanwall Road, Maidenhead. SL6 4UB. UK



RE: BGP list of phishing sites?

2004-06-28 Thread Smith, Donald

I agree phishing bgp feed would disrupt the ip address 
to all ISP's that listened to the bgp server involved.
I was addressing a specific issue with listening to such 
a server and that is the loss of control issue. Sorry if that wasn't
clear.

So would ISP's block an phishing site if it was proven 
to be a phishing site and reported by their customers?


[EMAIL PROTECTED] GCIA
pgpFingerPrint:9CE4 227B B9B3 601F B500  D076 43F1 0767 AF00 EDCC
Brian Kernighan jokingly named it the Uniplexed Information and
Computing System (UNICS) as a pun on MULTICS.

> -Original Message-
> From: Stephen J. Wilcox [mailto:[EMAIL PROTECTED] 
> Sent: Monday, June 28, 2004 2:58 PM
> To: Smith, Donald
> Cc: Scott Call; [EMAIL PROTECTED]
> Subject: RE: BGP list of phishing sites?
> 
> 
> Hi Donald,
>  the bogon feed is not supposed to be causing any form of 
> disruption, the 
> purpose of a phishing bgp feed is to disrupt the IP address.. 
> thats a major 
> difference and has a lot of implications.
> 
> Steve
> 
> On Mon, 28 Jun 2004, Smith, Donald wrote:
> 
> > Some are making this too hard.
> > Of the lists I know of they only blackhole KNOWN active 
> attacking or 
> > victim sites (bot controllers, know malware download locations etc) 
> > not porn/kiddie porn/pr/choose-who-you-hate-sites ... clients 
> > (infected
> > pc's)
> > are usually not included but could make it on the list given enough
> > attacks.
> > It does mean giving up some control of your network which may not be
> > acceptable to some ISP's.
> > Its not much different then listening to an automated bogon feed.
> > 
> > 
> > [EMAIL PROTECTED] GCIA
> > pgpFingerPrint:9CE4 227B B9B3 601F B500  D076 43F1 0767 AF00 EDCC 
> > Brian Kernighan jokingly named it the Uniplexed Information and 
> > Computing System (UNICS) as a pun on MULTICS.
> > 
> > > -Original Message-
> > > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
> > > Behalf Of Stephen J. Wilcox
> > > Sent: Monday, June 28, 2004 11:56 AM
> > > To: Scott Call
> > > Cc: [EMAIL PROTECTED]
> > > Subject: Re: BGP list of phishing sites?
> > > 
> > > 
> > > 
> > > On Sun, 27 Jun 2004, Scott Call wrote:
> > > 
> > > > On the the things the article mentioned is that ISP/NSPs
> > > are shutting
> > > > off
> > > > access to the web site in russia where the malware is being
> > > downloaded
> > > > from.
> > > > 
> > > > Now we've done this in the past when a known target of 
> a DDOS was
> > > > upcoming
> > > > or a known website hosted part of a malware package, and it 
> > > is fairly
> > > > effective in stopping the problems.
> > > > 
> > > > So what I was curious about is would there be interest in a
> > > BGP feed
> > > > (like
> > > > the DNSBLs used to be) to null route known malicious sites
> > > like that?
> > > > 
> > > > Obviously, both operational guidelines, and trust of 
> the operator
> > > > would
> > > > have to be established, but I was thinking it might be 
> > > useful for a few
> > > > purposes:
> > > > 
> > > > 1> IP addresses of well known sources of malicious code 
> (like in 
> > > > 1> the
> > > > example above)
> > > > 2> DDOS mitigation (ISP/NSP can request a null route of a
> > > prefix which
> > > > will save the "Internet at large" as well as the NSP from
> > > the traffic
> > > > flood
> > > > 3> etc
> > > > 
> > > > Since the purpose of this list would be to identify and
> > > mitigate large
> > > > scale threats, things like spammers, etc would be outside
> > > of it's charter.
> > > > 
> > > > If anyone things this is a good (or bad) idea, please 
> let me know. 
> > > > Obviously it's not fully cooked yet, but I wanted to throw
> > > it out there.
> > > 
> > > Personally - bad.
> > > 
> > > So what do you want to include in this list.. phishing? But
> > > why not add bot C&C, 
> > > bot clients, spam sources, child porn, warez sites. Or if you 
> > > live in a censored 
> > > region add foreign political sites, any porn, or other 
> > > messages deemed bad.
> > > 
> > > Who maintains the feed, who checks the sites before adding

RE: BGP list of phishing sites?

2004-06-28 Thread Stephen J. Wilcox

Hi Donald,
 the bogon feed is not supposed to be causing any form of disruption, the 
purpose of a phishing bgp feed is to disrupt the IP address.. thats a major 
difference and has a lot of implications.

Steve

On Mon, 28 Jun 2004, Smith, Donald wrote:

> Some are making this too hard.
> Of the lists I know of they only blackhole KNOWN active attacking or
> victim sites (bot controllers, know malware download locations etc) not
> porn/kiddie porn/pr/choose-who-you-hate-sites ... clients (infected
> pc's)
> are usually not included but could make it on the list given enough
> attacks.
> It does mean giving up some control of your network which may not be
> acceptable to some ISP's.
> Its not much different then listening to an automated bogon feed.
> 
> 
> [EMAIL PROTECTED] GCIA
> pgpFingerPrint:9CE4 227B B9B3 601F B500  D076 43F1 0767 AF00 EDCC
> Brian Kernighan jokingly named it the Uniplexed Information and
> Computing System (UNICS) as a pun on MULTICS.
> 
> > -Original Message-
> > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
> > Behalf Of Stephen J. Wilcox
> > Sent: Monday, June 28, 2004 11:56 AM
> > To: Scott Call
> > Cc: [EMAIL PROTECTED]
> > Subject: Re: BGP list of phishing sites?
> > 
> > 
> > 
> > On Sun, 27 Jun 2004, Scott Call wrote:
> > 
> > > On the the things the article mentioned is that ISP/NSPs 
> > are shutting 
> > > off
> > > access to the web site in russia where the malware is being 
> > downloaded 
> > > from.
> > > 
> > > Now we've done this in the past when a known target of a DDOS was 
> > > upcoming
> > > or a known website hosted part of a malware package, and it 
> > is fairly 
> > > effective in stopping the problems.
> > > 
> > > So what I was curious about is would there be interest in a 
> > BGP feed 
> > > (like
> > > the DNSBLs used to be) to null route known malicious sites 
> > like that?
> > > 
> > > Obviously, both operational guidelines, and trust of the operator 
> > > would
> > > have to be established, but I was thinking it might be 
> > useful for a few 
> > > purposes:
> > > 
> > > 1> IP addresses of well known sources of malicious code (like in the
> > > example above)
> > > 2> DDOS mitigation (ISP/NSP can request a null route of a 
> > prefix which
> > > will save the "Internet at large" as well as the NSP from 
> > the traffic
> > > flood
> > > 3> etc
> > > 
> > > Since the purpose of this list would be to identify and 
> > mitigate large
> > > scale threats, things like spammers, etc would be outside 
> > of it's charter.
> > > 
> > > If anyone things this is a good (or bad) idea, please let me know.
> > > Obviously it's not fully cooked yet, but I wanted to throw 
> > it out there.
> > 
> > Personally - bad.
> > 
> > So what do you want to include in this list.. phishing? But 
> > why not add bot C&C, 
> > bot clients, spam sources, child porn, warez sites. Or if you 
> > live in a censored 
> > region add foreign political sites, any porn, or other 
> > messages deemed bad.
> > 
> > Who maintains the feed, who checks the sites before adding 
> > them, who checks them 
> > before removing them. 
> > 
> > What if the URL is a subdir of a major website such as 
> > aol.com or ebay.com or angelfire.com ... what if the URL is a 
> > subdir of a minor site, such as yours or 
> > mine? 
> > 
> > What if there is some other dispute over a null'ed IP, 
> > suppose they win, can 
> > they be compensated?
> > 
> > Does this mean the banks and folks dont have to continue to 
> > remove these threats now if the ISP does it? Does it mean the 
> > bank can sue you if you fail to do it? 
> > 
> > What if you leak the feed at your borders, I may not want to 
> > take this from you and now I'm accidentally null routing it 
> > to you. Should you leak this to downstream ASNs? Should you 
> > insist your Tier1 provides it and leaks it to you?.. 
> > just you or all customers?
> > 
> > What if someone mistypes an IP and accidentally nulls 
> > something real bad(TM)? 
> > What if someone compromises the feeder and injects prefixes 
> > maliciously?
> > 
> > What about when the phishers adapt and start changing DNS to 
> > point to different IPs quickly, will the system react 
> > quicker? Does that mean you apply less checks 
> > in order to get the null route out quicker? Is it just /32s 
> > or does it need to 
> > be larger prefixes in the future? Are there other ways 
> > conceivable to beat such 
> > a system if it became widespread (compare to spammer tactics)
> > 
> > What if this list gets to be large? Do we want huge amounts 
> > of /32s in our 
> > internal routing tables?
> > 
> > What if the feeder becomes a focus of attacks by those 
> > wishing to carry out 
> > phishing or other illegal activities? This has certainly 
> > become a hazard with 
> > spam RBLs.
> > 
> > 
> > Any other thoughts?
> > 
> > Steve
> > 
> > 
> > 
> 



Re: BGP list of phishing sites?

2004-06-28 Thread Edward B. Dreger

PWG> Date: Mon, 28 Jun 2004 15:04:59 -0400
PWG> From: Patrick W Gilmore

PWG> If the blacklist is only for sites which are weeks, or even
PWG> a couple days old, that probably would remove most of the
PWG> objections.  (I _think_ - I have not considered all the
PWG> ramifications, but it sounds like a plausible compromise.)

Put entries in without delay.  Let operators configure BGP-
munching boxen with a delay timer.


PWG> Unfortunately, that type of blacklist wouldn't stop 99% of
PWG> the phishing scams in operation.

The sites do seem to move around. :(

Anyone care for another round of discussion re PKI, DNSSEC, and
authenticated SMTP? ;)


Eddy
--
EverQuick Internet - http://www.everquick.net/
A division of Brotsman & Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita
_
DO NOT send mail to the following addresses:
[EMAIL PROTECTED] -*- [EMAIL PROTECTED] -*- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.



RE: BGP list of phishing sites?

2004-06-28 Thread Smith, Donald

Some are making this too hard.
Of the lists I know of they only blackhole KNOWN active attacking or
victim sites (bot controllers, know malware download locations etc) not
porn/kiddie porn/pr/choose-who-you-hate-sites ... clients (infected
pc's)
are usually not included but could make it on the list given enough
attacks.
It does mean giving up some control of your network which may not be
acceptable to some ISP's.
Its not much different then listening to an automated bogon feed.


[EMAIL PROTECTED] GCIA
pgpFingerPrint:9CE4 227B B9B3 601F B500  D076 43F1 0767 AF00 EDCC
Brian Kernighan jokingly named it the Uniplexed Information and
Computing System (UNICS) as a pun on MULTICS.

> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
> Behalf Of Stephen J. Wilcox
> Sent: Monday, June 28, 2004 11:56 AM
> To: Scott Call
> Cc: [EMAIL PROTECTED]
> Subject: Re: BGP list of phishing sites?
> 
> 
> 
> On Sun, 27 Jun 2004, Scott Call wrote:
> 
> > On the the things the article mentioned is that ISP/NSPs 
> are shutting 
> > off
> > access to the web site in russia where the malware is being 
> downloaded 
> > from.
> > 
> > Now we've done this in the past when a known target of a DDOS was 
> > upcoming
> > or a known website hosted part of a malware package, and it 
> is fairly 
> > effective in stopping the problems.
> > 
> > So what I was curious about is would there be interest in a 
> BGP feed 
> > (like
> > the DNSBLs used to be) to null route known malicious sites 
> like that?
> > 
> > Obviously, both operational guidelines, and trust of the operator 
> > would
> > have to be established, but I was thinking it might be 
> useful for a few 
> > purposes:
> > 
> > 1> IP addresses of well known sources of malicious code (like in the
> > example above)
> > 2> DDOS mitigation (ISP/NSP can request a null route of a 
> prefix which
> > will save the "Internet at large" as well as the NSP from 
> the traffic
> > flood
> > 3> etc
> > 
> > Since the purpose of this list would be to identify and 
> mitigate large
> > scale threats, things like spammers, etc would be outside 
> of it's charter.
> > 
> > If anyone things this is a good (or bad) idea, please let me know.
> > Obviously it's not fully cooked yet, but I wanted to throw 
> it out there.
> 
> Personally - bad.
> 
> So what do you want to include in this list.. phishing? But 
> why not add bot C&C, 
> bot clients, spam sources, child porn, warez sites. Or if you 
> live in a censored 
> region add foreign political sites, any porn, or other 
> messages deemed bad.
> 
> Who maintains the feed, who checks the sites before adding 
> them, who checks them 
> before removing them. 
> 
> What if the URL is a subdir of a major website such as 
> aol.com or ebay.com or angelfire.com ... what if the URL is a 
> subdir of a minor site, such as yours or 
> mine? 
> 
> What if there is some other dispute over a null'ed IP, 
> suppose they win, can 
> they be compensated?
> 
> Does this mean the banks and folks dont have to continue to 
> remove these threats now if the ISP does it? Does it mean the 
> bank can sue you if you fail to do it? 
> 
> What if you leak the feed at your borders, I may not want to 
> take this from you and now I'm accidentally null routing it 
> to you. Should you leak this to downstream ASNs? Should you 
> insist your Tier1 provides it and leaks it to you?.. 
> just you or all customers?
> 
> What if someone mistypes an IP and accidentally nulls 
> something real bad(TM)? 
> What if someone compromises the feeder and injects prefixes 
> maliciously?
> 
> What about when the phishers adapt and start changing DNS to 
> point to different IPs quickly, will the system react 
> quicker? Does that mean you apply less checks 
> in order to get the null route out quicker? Is it just /32s 
> or does it need to 
> be larger prefixes in the future? Are there other ways 
> conceivable to beat such 
> a system if it became widespread (compare to spammer tactics)
> 
> What if this list gets to be large? Do we want huge amounts 
> of /32s in our 
> internal routing tables?
> 
> What if the feeder becomes a focus of attacks by those 
> wishing to carry out 
> phishing or other illegal activities? This has certainly 
> become a hazard with 
> spam RBLs.
> 
> 
> Any other thoughts?
> 
> Steve
> 
> 
> 


Re: BGP list of phishing sites?

2004-06-28 Thread Paul Vixie

> > It's wholy unfair to the innocent parties affected by the blacklisting.
> > i.e. the collateral damage.

maybe so.  but it'll happen anyway, because victims often have no recourse
that won't inflict collateral damage.  the aggregate microscopic damage of
this kind is becoming measurable and "statistically interesting".

> > Say a phising site is "hosted" by geocities. Should geocities IP
> > addresses be added to the blacklist?
> >
> > What if it made it onto an akamaized service? Should all of akamai
> > be blacklisted?

you're using terms like "unfair" and "innocent" and "should" in ways
that lead me to wonder if we're having two different conversations here.
the internet has no government, no constitution, no laws, no rights, no
police, no courts.  don't talk about fairness or innocence, and don't
talk about what should be done.  instead, talk about what is being done
and what will be done by the amorphous unreachable undefinable blob
called "the internet user base."

if the cost:benefit is right for an endsystem to blackhole akamai or
geocities then they will do it, no matter how unfair anybody else thinks
it is, or how innocent other people think akamai/geocities might be, and
no matter how much you or anybody may think that something different
"should" be done.  welcome to the "dog-eat-dog phase."  spammers and
phishers don't care about what's fair or who's innocent.  sean's and
chris's employers certainly don't want to be lectured to about what
others think "should" be done.  the end result is that victims are
caring less and less about false positives or collateral damage --
nobody wants to be the last one to stop caring, since the other name for
that person is "rube" (or sometimes "dupe".)

while i've been keen to criticize sean's and chris's employers here, i
do it for entertainment value (my own, and the lurkers who occasionally
tell me i owe them a new keyboard because i was unexpectedly funny) and
not because i think sean or chris or their employers are wondering what
i think they "should" do.

> ...
> a) IP address that happen to have $nasty at one end of them; or
> b) IP address for whom no abuse desk even gives a response (even
>"we know, go away") when informed of $nasty.
> ...
> Seems to me (b) is, in general, a lot more reasonable than (a)
> particularly where there is very likely >1 administrative zone per IP
> address (for example HTTP/1.1). It also better satisfies Paul's
> criterion of being more likely to engender better behaviour (read:
> responsibility of network work operators for downstream traffic) if
> behaviour of the reporter is proportionate & targeted.

my sister called me last night to tell me that she was unable to receive
mail from southwest airlines, and that her e-ticket was in limbo for some
flight somewhere.  i checked and sure enough southwest airlines has sent
me three or messages per day that i don't want, for most days out of the
last six months.  since neither southwest nor their ISP was willing to
take any responsibility for this unwanted e-mail, i blackholed them, and
i guess that means they'll have to fax that e-ticket.  or something.  it's
not my problem.  as a victim, i can't let it be my problem.  if someone
wants their traffic to be accepted then they'll have to maintain a good
reputation, which will in the future be automated in various ways including
webs of trust/guaranty, forfeitable deposits, micropayments, and "living
in better neighborhoods".  in that way e-space will catch up to meat-space.

> WRT "apply greater sanctions", it is possible of course, though perhaps
> neither desirable nor scalable, to filter at layer>3 all sites on given IPs
> to minimize collateral damage. See
>  http://www.theregister.co.uk/2004/06/07/bt_cleanfeed_analysis/

collateral damage is irrelevant now.  minimizing it makes the problem worse,
maximizing it just costs you in lawyer payments, it's every endsystem for
itself now.  john gilmore warned me that i was hastening this day when i
started the first RBL.  i didn't consider it avoidable, then or now.  we
were both right.


Re: BGP list of phishing sites?

2004-06-28 Thread Alex Bligh

--On 28 June 2004 18:43 +0100 Simon Lockhart <[EMAIL PROTECTED]> 
wrote:

It's wholy unfair to the innocent parties affected by the blacklisting.
i.e. the collateral damage.
Say a phising site is "hosted" by geocities. Should geocities IP addresses
be added to the blacklist?
What if it made it onto an akamaized service? Should all of akamai be
blacklisted?
This is an issue wider than spam, phishing, etc.
That would depend on whether your block by IP address (forget whether
this is BGP black hole lists, DNSRBL for SMTP etc.) is of
a) IP address that happen to have $nasty at one end of them; or
b) IP address for whom no abuse desk even gives a response (even
  "we know, go away") when informed of $nasty.
It also depends on whether your response is "drop all packets" (a la
BGP blackhole) or "apply greater sanctions".
Seems to me (b) is, in general, a lot more reasonable than (a) particularly
where there is very likely >1 administrative zone per IP address (for
example HTTP/1.1). It also better satisfies Paul's criterion of being more
likely to engender better behaviour (read: responsibility of network work
operators for downstream traffic) if behaviour of the reporter is
proportionate & targeted.
WRT "apply greater sanctions", it is possible of course, though perhaps
neither desirable nor scalable, to filter at layer>3 all sites on given IPs
to minimize collateral damage. See
http://www.theregister.co.uk/2004/06/07/bt_cleanfeed_analysis/
This is effectively what tools like spamassassin do when taking RBL type
feeds as a scoring input to filtering, in a mail context.
Alex


Re: BGP list of phishing sites?

2004-06-28 Thread Christopher L. Morrow


On Mon, 28 Jun 2004, Dan Hollis wrote:


> When a provider hosts a phishing site for _weeks on end_ and does
> _nothing_ despite being notified repeatedly, sometimes a blacklist is the
> only cluebat strong enough to get through the provider's thick skull.

there are other reasons aside from 'lameness' that the ISP might keep the
site up:
1) law enforcement request, to prolong/preserve investigation
2) legal request by phishee (mother site being phished) to
prolong/preserve investigation

Just a thought as sometimes childporn sites stay up longer than desirable
due to these same reasons.


Re: BGP list of phishing sites?

2004-06-28 Thread Patrick W Gilmore
On Jun 28, 2004, at 2:43 PM, Dan Hollis wrote:
On Mon, 28 Jun 2004, Patrick W Gilmore wrote:
Unfortunately, I worry that this cure is worse than the disease.
Filtering IP addresses are not the right way to attack these sites -
the move too quickly and there is too much danger of collateral 
damage.
I think part of the point of this blacklist is similar to other
blacklists. It makes providers remove their head from their ass and
actually start cleaning up their networks.
When a provider hosts a phishing site for _weeks on end_ and does
_nothing_ despite being notified repeatedly, sometimes a blacklist is 
the
only cluebat strong enough to get through the provider's thick skull.
If the blacklist is only for sites which are weeks, or even a couple 
days old, that probably would remove most of the objections.  (I 
_think_ - I have not considered all the ramifications, but it sounds 
like a plausible compromise.)

Unfortunately, that type of blacklist wouldn't stop 99% of the phishing 
scams in operation.

--
TTFN,
patrick


Re: BGP list of phishing sites?

2004-06-28 Thread Dan Hollis

On Mon, 28 Jun 2004, Patrick W Gilmore wrote:
> Unfortunately, I worry that this cure is worse than the disease.  
> Filtering IP addresses are not the right way to attack these sites - 
> the move too quickly and there is too much danger of collateral damage.

I think part of the point of this blacklist is similar to other 
blacklists. It makes providers remove their head from their ass and
actually start cleaning up their networks.

When a provider hosts a phishing site for _weeks on end_ and does 
_nothing_ despite being notified repeatedly, sometimes a blacklist is the 
only cluebat strong enough to get through the provider's thick skull.

-Dan



Re: BGP list of phishing sites?

2004-06-28 Thread Dave Rand

[In the message entitled "Re: BGP list of phishing sites?" on Jun 28, 18:43, Simon 
Lockhart writes:]
> 
> On Mon Jun 28, 2004 at 04:47:21PM +, Paul Vixie wrote:
> > if it's easier for you to BGP-blackhole these bad sources and the only
> > reason you don't is because you think it would be unfair, then you're
> > part of the problem and you're helping to make the problem worse.
> 
> It's wholy unfair to the innocent parties affected by the blacklisting.
> i.e. the collateral damage.
> 
> Say a phising site is "hosted" by geocities. Should geocities IP addresses
> be added to the blacklist?
> 

None of this would be an issue, if abuse desks were:

1. Responsive
2. Responsible
3. Empowered
4. Accountable

Today, they are none of the above.  If any of you out there think that isn't
the case with your network, please let me know.  I'll be happy to provide you
with the spam from your network over the last 24 hours (or 24 days, or 24
months, or whatever other period you like).

Blackholing is simply a way to draw immediate, and unmistakable attention to a
problem, instead of sweeping it under the carpet.

The problem is going to get worse before it gets better, much as it pains me
to say that.

Let's look at ways that it can be made better.  A BGP feed, or other real time
distribution method, can be used to let your abuse desk know that there is a
problem, and to address it faster.  It can be abused for this purpose as well,
so it's important for *whatever* method is used to be run by responsible,
accountable people.

Think about it.  Please.


-- 


Re: BGP list of phishing sites?

2004-06-28 Thread Petri Helenius
Simon Lockhart wrote:
It's wholy unfair to the innocent parties affected by the blacklisting.
i.e. the collateral damage.
 

You´ll get burned anyway in a bad neighborhood because of the bandwidth 
consumed by the crap.

Say a phising site is "hosted" by geocities. Should geocities IP addresses
be added to the blacklist?
What if it made it onto an akamaized service? Should all of akamai be 
blacklisted?

 

As with any list, whitelisting space that takes care of complaints is 
always an option.

LINX produced a paper recently on why BGP poisoning is exactly the wrong 
answer to removing access to undesirable web content (i.e. phising sites).
I've asked if it can be made public.
 

Looking forward to it.
Pete


Re: BGP list of phishing sites?

2004-06-28 Thread Patrick W Gilmore
On Jun 28, 2004, at 1:56 PM, Stephen J. Wilcox wrote:
Personally - bad.
Another personal response (edited from my response to the LINX paper):
Fighting "phishing" web sites is a necessary and important task.  Of 
course, part of why it is necessary is because end users are ignorant, 
untrained, and/or gullible.  But the fact remains that phishing is a 
burden on society and the Internet.

Unfortunately, I worry that this cure is worse than the disease.  
Filtering IP addresses are not the right way to attack these sites - 
the move too quickly and there is too much danger of collateral damage.

Perhaps even more dangerous is the need for verification.  For the list 
to be at all effective, it has to move very, very quickly, as the 
phishing sites move very quick.  Creating an environment where the list 
is updated quickly increases the chance of mistakes or even malicious 
filtering.

In short, I cannot see a BGP list actually cutting down on phishing 
without massive collateral damage.  Reducing the collateral damage will 
likely make the list ineffective against phishing sites.  The 
combination makes this a no-win situation.

All, IMHO, of course. :)
--
TTFN,
patrick


Re: BGP list of phishing sites?

2004-06-28 Thread Stephen J. Wilcox

On Sun, 27 Jun 2004, Scott Call wrote:

> On the the things the article mentioned is that ISP/NSPs are shutting off 
> access to the web site in russia where the malware is being downloaded 
> from.
> 
> Now we've done this in the past when a known target of a DDOS was upcoming 
> or a known website hosted part of a malware package, and it is fairly 
> effective in stopping the problems.
> 
> So what I was curious about is would there be interest in a BGP feed (like 
> the DNSBLs used to be) to null route known malicious sites like that?
> 
> Obviously, both operational guidelines, and trust of the operator would 
> have to be established, but I was thinking it might be useful for a few 
> purposes:
> 
> 1> IP addresses of well known sources of malicious code (like in the 
> example above)
> 2> DDOS mitigation (ISP/NSP can request a null route of a prefix which 
> will save the "Internet at large" as well as the NSP from the traffic 
> flood
> 3> etc
> 
> Since the purpose of this list would be to identify and mitigate large 
> scale threats, things like spammers, etc would be outside of it's charter.
> 
> If anyone things this is a good (or bad) idea, please let me know. 
> Obviously it's not fully cooked yet, but I wanted to throw it out there.

Personally - bad.

So what do you want to include in this list.. phishing? But why not add bot C&C, 
bot clients, spam sources, child porn, warez sites. Or if you live in a censored 
region add foreign political sites, any porn, or other messages deemed bad.

Who maintains the feed, who checks the sites before adding them, who checks them 
before removing them. 

What if the URL is a subdir of a major website such as aol.com or ebay.com or
angelfire.com ... what if the URL is a subdir of a minor site, such as yours or 
mine? 

What if there is some other dispute over a null'ed IP, suppose they win, can 
they be compensated?

Does this mean the banks and folks dont have to continue to remove these threats
now if the ISP does it? Does it mean the bank can sue you if you fail to do it? 

What if you leak the feed at your borders, I may not want to take this from you
and now I'm accidentally null routing it to you. Should you leak this to
downstream ASNs? Should you insist your Tier1 provides it and leaks it to you?.. 
just you or all customers?

What if someone mistypes an IP and accidentally nulls something real bad(TM)? 
What if someone compromises the feeder and injects prefixes maliciously?

What about when the phishers adapt and start changing DNS to point to different
IPs quickly, will the system react quicker? Does that mean you apply less checks 
in order to get the null route out quicker? Is it just /32s or does it need to 
be larger prefixes in the future? Are there other ways conceivable to beat such 
a system if it became widespread (compare to spammer tactics)

What if this list gets to be large? Do we want huge amounts of /32s in our 
internal routing tables?

What if the feeder becomes a focus of attacks by those wishing to carry out 
phishing or other illegal activities? This has certainly become a hazard with 
spam RBLs.


Any other thoughts?

Steve



Re: BGP list of phishing sites?

2004-06-28 Thread Simon Lockhart

On Mon Jun 28, 2004 at 04:47:21PM +, Paul Vixie wrote:
> if it's easier for you to BGP-blackhole these bad sources and the only
> reason you don't is because you think it would be unfair, then you're
> part of the problem and you're helping to make the problem worse.

It's wholy unfair to the innocent parties affected by the blacklisting.
i.e. the collateral damage.

Say a phising site is "hosted" by geocities. Should geocities IP addresses
be added to the blacklist?

What if it made it onto an akamaized service? Should all of akamai be 
blacklisted?

LINX produced a paper recently on why BGP poisoning is exactly the wrong 
answer to removing access to undesirable web content (i.e. phising sites).
I've asked if it can be made public.

Simon
-- 
Simon Lockhart |   Tel: +44 (0)1628 407720 (x(01)37720) | Si fractum 
Technology Manager |   Fax: +44 (0)1628 407701 (x(01)37701) | non sit, noli 
BBC Internet Ops   | Email: [EMAIL PROTECTED]| id reficere
BBC Technology, Maiden House, Vanwall Road, Maidenhead. SL6 4UB. UK



Re: BGP list of phishing sites?

2004-06-28 Thread Paul Vixie

warning.  this is about humans rather than about IOS configs.  hit D now.

> >> Also, an "easy fix" like this may lower the pressure on the parties
> >> who are really responsible for allowing this to happen: the makers
> >> of insecure software / insecure operational procedures (banks!) and
> >> gullible users.
> 
> > actually, a bgp feed of this kind tends to supply the "missing
> > causal vector" whereby someone who does something sloppy or bad ends
> > up suffering for it.
> 
> ??? I don't understand?

the root cause of network abuse is humans and human behaviour, not
hardware or software or corporations or corporate behaviour.  if most
people weren't sheep-like, they would pay some attention to the results
of their actions and inactions.  actions like buying something from a
spammer or clicking the "unsubscribe me" button in spam mail, or running
microsoft outlook.  inactions like not installing patches that microsoft
has supplied free of charge over the years.  inactions like leaving
their cable/DSL pee cee up 24x7 and never wondering why the activity
light on their modem flickers constantly.

but the vast majority of humanity is and has always been sheep-like.
while i could talk about certain election victories and other meatspace
examples, that would be even more off-topic than we already are, so
let's just put it like this: if you want people to notice the results of
their actions and inactions, then they have to be brought into the
equation.  don't let worms be symbiotic, make them host-killing
parasites, and that will make the host bodies sit up and take notice.
this trick works every time.

> > ... the internet is very survivable and the necessary traffic always
> > finds a way to get through.  fixing layer >7 problems by denying
> > layer 3 service has indeed proven to be the only way to get remote
> > CEO's to care (or notice).
> 
> Still, anti-spam blacklists are pretty much universally applied inside
> SMTP implementations these days. So if 3828747.dhcp.bigcable.com is
> blacklisted because it sources spam, people subscribing to the
> blacklist will no longer receive spam from that host, but the host is
> still capable of interacting with the net in general and the blacklist
> users in particular over a host of other protocols.

i'm trying to figure out why you think it's in your best interest to
limit the impact of your defensive activities, or to limit the impact of
sheep-like behaviour on the sheep-like humans who own these infected
hosts.  in psycho- babble the term would best apply to your proposal is
"enabler".  why do you want to enable this kind of sheep-like behaviour?
what's in it for you?  if you think it'll leave more pee cee's online
and able to access your shopping cart system that's one thing.  but if
you think you're somehow helping the owners of these pee cees you're
wrong.  and you are in fact hurting yourself, and the rest of us, every
time you choose to be an "enabler" rather than letting these people stew
in their own sheep-like juices.

if it's easier for you to BGP-blackhole these bad sources and the only
reason you don't is because you think it would be unfair, then you're
part of the problem and you're helping to make the problem worse.

> ...
> My position is that end-user networks should decide for themselves if
> this is something they want, but it would be wrong for transit
> networks to make these decisions for all their customers, especially
> as they seem to be growing more and more impervious to incoming email
> or phone support requests that require knowledge of the proper order
> of the letters "I" and "P".

thanks for explaining your position, and very clearly i might add.
we're not so different -- i think "decide for themselves" is the right
meme.  but where we differ is on the questions of ownership and
responsibility.  every network has to take responsibility for the
traffic is spews, and cannot just say "take it up with my customer"
since they're getting paid to make the spew possible.  and every network
has to be able to say "this shall not pass!"  concerning traffic that
does not match their "AUP", and the only recourse their customers can
have is to sign up with a different network.

naturally, sean's and chris's employers don't see it that way at all,
and prefer to take no responsibility and exercise no control, except
where revenue is concerned.


Re: BGP list of phishing sites?

2004-06-27 Thread Paul Vixie

> > So what I was curious about is would there be interest in a BGP feed 
> > (like the DNSBLs used to be) to null route known malicious sites like 
> > that?

i dunno much about this new-fangled "DNSBL" thing you speak of, but the
original MAPS RBL is still alive and well and available by BGP.  the fine
folks now running MAPS include Dave Rand (my co-founder) and if you visit
their web site (www.mail-abuse.org) you can probably figure out how to
sign up for it.  there's a fee involved, but there are lawyers involved,
and those two things seem to come in pairs.

> I'm sure there is; but I'm slightly worried that transit networks may 
> be tempted to subscribe to such a feed and in essence start censoring 
> their customer's access to the net.

we (speaking for the original MAPS which i still had a hand in operating)
faced that from most bgp-subscribing customers.  there are easy workarounds.

> Also, an "easy fix" like this may lower the pressure on the parties who
> are really responsible for allowing this to happen: the makers of
> insecure software / insecure operational procedures (banks!) and gullible
> users.

actually, a bgp feed of this kind tends to supply the "missing causal vector"
whereby someone who does something sloppy or bad ends up suffering for it.

> Fixing layer 7+ problems at layer 3 just doesn't work and leads to 
> significant collateral damage in the long run.

that's what everybody always said about MAPS but it didn't happen.  the
internet is very survivable and the necessary traffic always finds a way
to get through.  fixing layer >7 problems by denying layer 3 service has
indeed proven to be the only way to get remote CEO's to care (or notice).
-- 
Paul Vixie


Re: BGP list of phishing sites? Website behind Net attack offline

2004-06-27 Thread Henry Linneweh

http://www.news.com.au/common/story_page/0,4057,9975753%255E1702,00.html

-Henry

--- Scott Call <[EMAIL PROTECTED]> wrote:
> 
> Happy Sunday nanogers...
> 
> I was doing some follow up reading on the
> "js.scob.trojan", the latest 
> "hole big enough to drive a truck through" exploit
> for Internet Explorer.
> 
> On the the things the article mentioned is that
> ISP/NSPs are shutting off 
> access to the web site in russia where the malware
> is being downloaded 
> from.
> 
> Now we've done this in the past when a known target
> of a DDOS was upcoming 
> or a known website hosted part of a malware package,
> and it is fairly 
> effective in stopping the problems.
> 
> So what I was curious about is would there be
> interest in a BGP feed (like 
> the DNSBLs used to be) to null route known malicious
> sites like that?
> 
> Obviously, both operational guidelines, and trust of
> the operator would 
> have to be established, but I was thinking it might
> be useful for a few 
> purposes:
> 
> 1> IP addresses of well known sources of malicious
> code (like in the 
> example above)
> 2> DDOS mitigation (ISP/NSP can request a null route
> of a prefix which 
> will save the "Internet at large" as well as the NSP
> from the traffic 
> flood
> 3> etc
> 
> Since the purpose of this list would be to identify
> and mitigate large 
> scale threats, things like spammers, etc would be
> outside of it's charter.
> 
> If anyone things this is a good (or bad) idea,
> please let me know. 
> Obviously it's not fully cooked yet, but I wanted to
> throw it out there.
> 
> Thanks
> -Scott
> 



Re: BGP list of phishing sites?

2004-06-27 Thread Iljitsch van Beijnum
On 27-jun-04, at 20:17, Scott Call wrote:
On the the things the article mentioned is that ISP/NSPs are shutting 
off access to the web site in russia where the malware is being 
downloaded from.

Now we've done this in the past when a known target of a DDOS was 
upcoming or a known website hosted part of a malware package, and it 
is fairly effective in stopping the problems.

So what I was curious about is would there be interest in a BGP feed 
(like the DNSBLs used to be) to null route known malicious sites like 
that?
I'm sure there is; but I'm slightly worried that transit networks may 
be tempted to subscribe to such a feed and in essence start censoring 
their customer's access to the net.

Also, an "easy fix" like this may lower the pressure on the parties who 
are really responsible for allowing this to happen: the makers of 
insecure software / insecure operational procedures (banks!) and 
gullible users.

Fixing layer 7+ problems at layer 3 just doesn't work and leads to 
significant collateral damage in the long run.



Re: BGP list of phishing sites?

2004-06-27 Thread Christopher L. Morrow



On Sun, 27 Jun 2004, Scott Call wrote:

>
> Happy Sunday nanogers...
>
> I was doing some follow up reading on the "js.scob.trojan", the latest
> "hole big enough to drive a truck through" exploit for Internet Explorer.
>
> On the the things the article mentioned is that ISP/NSPs are shutting off
> access to the web site in russia where the malware is being downloaded
> from.
>
> Now we've done this in the past when a known target of a DDOS was upcoming
> or a known website hosted part of a malware package, and it is fairly
> effective in stopping the problems.
>
> So what I was curious about is would there be interest in a BGP feed (like
> the DNSBLs used to be) to null route known malicious sites like that?
>

don't reinvent the wheel: www.cymru.com has a project already under way
for this, with many operators participating at this time.