Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-10 Thread Rich Kulawiec

On Wed, Dec 07, 2005 at 02:15:00PM -0800, Douglas Otis wrote:
> >When auth fails, one knows *right then* c/o an SMTP reject.  No bounce
> >is necessary.
> 
> This assumes all messages are rejected within the SMTP session.

Yes, exactly and the point several of us have been making is that
this is (a) easy (well, provided you're using a quality MTA; if not,
then switch to one) (b) running a sane mail system (c) fast
(d) resource-friendly and (e) most important of all, the _only_ way to
avoid sending UBE in response to forgeries (which are not going away
any time soon or quite possibly ever).

(Please note: there are no exceptions to the UBE specification for DSNs.
If DSNs are:

- sent to forged senders (thus unsolicited)
- in bulk (thus bulk)
- via email (thus email)

then they are UBE, which is THE definition of spam -- and which
deliberately omits any mention of content, purpose or other things
that are irrelevant to the spam/not-spam question.)

---Rsk


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-09 Thread Simon Waters

On Thursday 08 Dec 2005 18:08, Douglas Otis wrote:
>
> When accepting messages from anonymous sources, seldom does one know
> the source.

On the contrary, short of the tricks played on AOL to defeat their original 
antispam system, TCP means you always know the source.

We manage to filter out ~98% of the unwanted email here with very nearly 100% 
accuracy at the SMTP transaction stage with low processor overhead on our new 
email servers. At which point any backscatter from what gets through is 
trivial, although alas there still is a little due to evil practices of the 
past in then forwarding email elsewhere.

But the point of this discussion is that SMTP will have to evolve to be a 
point to point system (or functional equivalent). The days of store and 
forward in intermediate MTAs should die as quickly as possible (which as our 
forwarding demonstrates may be quite slowly alas). The problem is that many 
of the antivirus gateways behave like new intermediate MTAs, especially when 
for many of the organisations involved it could easily be done during SMTP 
transactions.

The remaining issue is how much resource it costs to do your spam/malware 
detection, but I believe trying to do anything beyond policy enforcement ("no 
EXE/PIF/SCR here please") in terms of malware detection in the MTA is a 
mistake, especially when you only really need to protect the thick(!) 
clients, and they still need to be protected when the content is 
zipped/encrypted/novel/zipped+encrypted+novel etc.

This thread on the other hand should move to Spam-L.


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-08 Thread Douglas Otis



On Dec 8, 2005, at 2:18 AM, [EMAIL PROTECTED] wrote:


It seems reasonable to design a mail system so that notifications  
are sent back to the originator of the message when there is a  
problem somewhere along the delivery chain.


Agreed.  The alternative would be more like instant messaging.


It seems very UNreasonable to send notifications to random  
destinations that have nothing to do with originating the message  
in question.


It is also unreasonable to assume the return-path can always be  
associated with the sending MTA.



The crux of the matter is that if you don't KNOW the true source of  
the message, then you cannot return a DSN. You can go through the  
motions, but then you are originating SPAM (UBE), not returning DSNs.


When accepting messages from anonymous sources, seldom does one know  
the source.



Should you be accepting any mail at all from SMTP servers that you  
do not know and trust because of prior contact, i.e. negotiating an  
email peering agreement?


Making email a closed system would dramatically change who can send  
messages and how email would work.  The safest place to decide  
whether a DSN is legitimate is by the MTA located by the return- 
path.  Use of BATV allows the return-path MTA to immediately refuse  
DSNs determined to be illegitimate.  Immediately, the back-scatter  
problem would be substantially resolved and no RFC need to be  
changed, and the integrity of email delivery would not suffer.  This  
would also close the "back-door" used to evade black-hole lists.


-Doug



Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-08 Thread Niels Bakker


* [EMAIL PROTECTED] ([EMAIL PROTECTED]) [Thu 08 Dec 2005, 12:11 CET]:
The RFC process itself is broken when clueless vendors treat RFCs as 
inviolable specs and implement according to the RFC even when they find 
flaws in it. If they want to remain true to the RFC process, they should 
not implement dumb things found in an RFC, instead they should write and 
submit a new RFC correcting the error and explaining the right way to do 
things.


Exactly.  The nice thing about standards is that there are so many to 
choose from!  Why not add a few more?



-- Niels.

--
"Calling religion a drug is an insult to drugs everywhere. 
Religion is more like the placebo of the masses."

-- MeFi user boaz


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-08 Thread Michael . Dillon

> Perhaps DSNs should be sent to the original recipient, not the purported 

> sender.  RFC-compliant?  No.

The RFC process itself is broken when clueless vendors
treat RFCs as inviolable specs and implement according to
the RFC even when they find flaws in it. If they want to
remain true to the RFC process, they should not implement
dumb things found in an RFC, instead they should write and
submit a new RFC correcting the error and explaining the
right way to do things.

--Michael Dillon



Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-08 Thread Michael . Dillon

> Some may see it as a 
> violation of RFC to not return a DSN on failed delivery.

It seems reasonable to design a mail system so that 
notifications are sent back to the originator of the
message when there is a problem somewhere along
the delivery chain.

> Others, like myself 
> see the need to not return a failure notice on virus / trojan infected 
email 
> as it has become the norm that the sender information is forged.

It seems very UNreasonable to send notifications to 
random destinations that have nothing to do with 
originating the message in question.

The crux of the matter is that if you don't KNOW the
true source of the message, then you cannot return 
a DSN. You can go through the motions, but then you
are originating SPAM (UBE), not returning DSNs.

Should you be accepting any mail at all from SMTP
servers that you do not know and trust because of
prior contact, i.e. negotiating an email peering agreement?

--Michael Dillon



Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-07 Thread Edward B. Dreger

DO> Date: Wed, 7 Dec 2005 17:02:51 -0800
DO> From: Douglas Otis

DO> > H.  BATV-triggered bounces.  Virus triggers forged bounce which in
DO> > turn triggers "your DSN was misguided" bounce.  Perhaps the bandwidth
DO> > growth of the '90s will continue. ;-)
DO> 
DO> BATV should not trigger any bounce as this only changes the local-part of
DO> the bounce-address (a.k.a return-path).  BATV allows quick rejection of the
DO> session when a spoof is detected before any message is exchanged.  This

I've read the spec.


DO> should alleviate your concerns about bandwidth.  It would also depreciate

I usually don't use humor-related smileys when I'm worried.


DO> this tactic and further reduce related traffic.  Being sensitive about
DO> spoofed DSNs, one would expect to hear accolades for BATV rather than
DO> berating.

Wouldn't it be nice to let people know their DSNs are misplaced?  Or 
does that only apply to viruses and worms? ;-)

So much for "be conservative in what you send and liberal in what you 
accept".  Yes, BATV helps block the errant DSNs.  It's just a shame that 
we seem to be shifting responsibility to the recipient, treating the 
symptom instead of the disease.


Eddy
--
Everquick Internet - http://www.everquick.net/
A division of Brotsman & Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita

DO NOT send mail to the following addresses:
[EMAIL PROTECTED] -*- [EMAIL PROTECTED] -*- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.
Ditto for broken OOO autoresponders and foolish AV software backscatter.


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-07 Thread Douglas Otis



On Dec 7, 2005, at 4:06 PM, Edward B. Dreger wrote:


H.  BATV-triggered bounces.  Virus triggers forged bounce which in
turn triggers "your DSN was misguided" bounce.  Perhaps the bandwidth
growth of the '90s will continue. ;-)


BATV should not trigger any bounce as this only changes the local- 
part of the bounce-address (a.k.a return-path).  BATV allows quick  
rejection of the session when a spoof is detected before any message  
is exchanged.  This should alleviate your concerns about bandwidth.   
It would also depreciate this tactic and further reduce related  
traffic.  Being sensitive about spoofed DSNs, one would expect to  
hear accolades for BATV rather than berating.


-Doug


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-07 Thread Edward B. Dreger

DO> Date: Wed, 7 Dec 2005 14:15:00 -0800
DO> From: Douglas Otis

DO> > Perhaps DSNs should be sent to the original recipient, not the purported
DO> > sender.  RFC-compliant?  No.  Ridiculous?  Less so than pestering a
DO> > random third party.  Let the intended recipient communicate OOB or
DO> > manually if needed.
DO> 
DO> Being refused by the intended recipient would be the cause for the DSN.

Fine.  But where to send it?  Certainly not to a random address.


DO> > DO> furthermore a DSN could be desired even for cases where an
DO> > authorization
DO> > 
DO> > When auth fails, one knows *right then* c/o an SMTP reject.  No bounce
DO> > is necessary.
DO> 
DO> This assumes all messages are rejected within the SMTP session.

Perhaps we're examining different "authorization" cases.  Maybe my 
mindset of "SMTP auth" is too narrow for your intended scope.


DO> > DO> scheme fails.  Why create corner cases?
DO> > 
DO> > The corner case is that a virus _might_ actually have a realistic "From"
DO> > address. :-)
DO> 
DO> You mean bounce-address?  A From address often has nothing to do with where
DO> a message originated.
DO> 
DO> SPF has _nothing_ to do with the From address.

E, "return-path".  Freudian slip dealing with some site local 
experiments... "from" is not as accurate as "return-path", but it's far 
from (no pun intended) useless.


DO> Once again, not _all_ messages are rejected within the SMTP session.  False

Of course not.


DO> positives are not 0%.  To ensure the integrity of email delivery, not
DO> including message content and using a null bounce-address should be the
DO> recommended practice at the initial recipient.  If you do not want to see
DO> DSNs with spoofed bounce-addresses, employ BATV at _your_ end should be the
DO> recommended practice.  You would not need to insist that anything special be
DO> done at millions of other locations.

Oh well.  I guess I've pretty much given up on pre-body filtering... so 
I suppose it would be too idyllic to expect anything different with 
DSNs.

H.  BATV-triggered bounces.  Virus triggers forged bounce which in 
turn triggers "your DSN was misguided" bounce.  Perhaps the bandwidth 
growth of the '90s will continue. ;-)


Eddy
--
Everquick Internet - http://www.everquick.net/
A division of Brotsman & Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita

DO NOT send mail to the following addresses:
[EMAIL PROTECTED] -*- [EMAIL PROTECTED] -*- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.
Ditto for broken OOO autoresponders and foolish AV software backscatter.


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-07 Thread Douglas Otis



On Dec 7, 2005, at 1:35 PM, Edward B. Dreger wrote:

DO> Not all email is rejected within the SMTP session.  You are  
changing
DO> requirements for recipients that scan incoming messages for  
malware.  Fault
DO> them for returning content or not including a null bounce- 
address.  No one

DO> can guarantee an email-address within the bounce-address is valid,

Perhaps DSNs should be sent to the original recipient, not the  
purported

sender.  RFC-compliant?  No.  Ridiculous?  Less so than pestering a
random third party.  Let the intended recipient communicate OOB or
manually if needed.


Being refused by the intended recipient would be the cause for the DSN.


DO> furthermore a DSN could be desired even for cases where an  
authorization


When auth fails, one knows *right then* c/o an SMTP reject.  No bounce
is necessary.


This assumes all messages are rejected within the SMTP session.



DO> scheme fails.  Why create corner cases?

The corner case is that a virus _might_ actually have a realistic  
"From"

address. :-)


You mean bounce-address?  A From address often has nothing to do with  
where a message originated.



DO> DomainKeys and Sender-ID can not validate the bounce-address or  
the DSN.
DO> Even with an SPF failure, a DSN should still be sent, as SPF  
fails in


If you receive mail with

From: <[EMAIL PROTECTED]>

coming from 10.10.10.10, and everquick.net SPF records indicate  
that IP

address is bogus, how can you possibly justify "that mail may indeed
have come from how it's apparently addressed"?  Doubly so when a virus
is known to spoof "from" addresses!


SPF has _nothing_ to do with the From address.

Once again, not _all_ messages are rejected within the SMTP session.   
False positives are not 0%.  To ensure the integrity of email  
delivery, not including message content and using a null bounce- 
address should be the recommended practice at the initial recipient.   
If you do not want to see DSNs with spoofed bounce-addresses, employ  
BATV at _your_ end should be the recommended practice.  You would not  
need to insist that anything special be done at millions of other  
locations.


-Doug




Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-07 Thread Edward B. Dreger

DO> Date: Tue, 6 Dec 2005 16:26:16 -0800
DO> From: Douglas Otis

DO> I know of no cases where a malware related DSN would be generated by our

Good.


DO> products, nevertheless, DSNs are not Unsolicited Bulk Email.

Huh?  I get NDRs for mail that "I" sent.  I do not want those NDRs.  I 
did not request those NDRs.  Those NDRs are not in response to a message 
I sent.

I do not want backscatter NDR notices.  I frankly don't care that 
WhizBangAV caught WormOfTheWeek on Susie Smith's corporate mail in 
Argentina from Billy Boo's PC in China... just because my address 
happened to be the subject of a joe jobbing worm.

Really.  Even reading and posting to NANOG is more important. ;-)


DO> Not all email is rejected within the SMTP session.  You are changing
DO> requirements for recipients that scan incoming messages for malware.  Fault
DO> them for returning content or not including a null bounce-address.  No one
DO> can guarantee an email-address within the bounce-address is valid,

Perhaps DSNs should be sent to the original recipient, not the purported 
sender.  RFC-compliant?  No.  Ridiculous?  Less so than pestering a 
random third party.  Let the intended recipient communicate OOB or 
manually if needed.


DO> furthermore a DSN could be desired even for cases where an authorization

When auth fails, one knows *right then* c/o an SMTP reject.  No bounce 
is necessary.


DO> scheme fails.  Why create corner cases?

The corner case is that a virus _might_ actually have a realistic "From" 
address. :-)


DO> DomainKeys and Sender-ID can not validate the bounce-address or the DSN.
DO> Even with an SPF failure, a DSN should still be sent, as SPF fails in

If you receive mail with

From: <[EMAIL PROTECTED]>

coming from 10.10.10.10, and everquick.net SPF records indicate that IP 
address is bogus, how can you possibly justify "that mail may indeed 
have come from how it's apparently addressed"?  Doubly so when a virus 
is known to spoof "from" addresses!

Saying a DSN should be sent is just untenable.


DO> several scenarios, and false positives are never 0%.  BATV offers a
DO> unilateral option that can effectively discard spoofed bounce-addresses.
DO> When the AV software provides the DSN with a null bounce-address, BATV works
DO> as advertised.


Eddy
--
Everquick Internet - http://www.everquick.net/
A division of Brotsman & Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita

DO NOT send mail to the following addresses:
[EMAIL PROTECTED] -*- [EMAIL PROTECTED] -*- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.
Ditto for broken OOO autoresponders and foolish AV software backscatter.


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-07 Thread Todd Vierling

On Tue, 6 Dec 2005, Douglas Otis wrote:

> > Not my problem.  I don't need or want, and should not be hammered with,
> > virus "warnings" sent to forged addresses -- ever.  They are unsolicited (I
> > didn't request it, and definitely don't want it), bulk (automated upon
> > receipt of viruses by the offending server), e-mail... thus UBE.
>
> I know of no cases where a malware related DSN would be generated by our
> products,

That's good.  Unfortunately it is not the case for most commercial
anti-malware products.

> nevertheless, DSNs are not Unsolicited Bulk Email.

I don't see how this is relevant to my paragraph above.  I was not equating
DSNs to UBE -- I specifically mentioned virus "warnings".  Whether those
warnings are look like DSNs, smell like DSNs, or taste like DSNs is wholly
irrelevant; they are still UBE if sent to forged virus sender addresses.

-- 
-- Todd Vierling <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-07 Thread Micheal Patterson





- Original Message - 
From: "Douglas Otis" <[EMAIL PROTECTED]>

To: "Todd Vierling" <[EMAIL PROTECTED]>
Cc: "Steven M. Bellovin" <[EMAIL PROTECTED]>; "Church, Chuck" 
<[EMAIL PROTECTED]>; 

Sent: Tuesday, December 06, 2005 6:26 PM
Subject: Re: Clueless anti-virus products/vendors (was Re: Sober)





On Dec 6, 2005, at 2:15 PM, Todd Vierling wrote:


On Tue, 6 Dec 2005, Douglas Otis wrote:


Holding at the data phase does usually avoid the need for a DSN,  but 
this
technique may require some added (less than elegant) operations 
depending upon

where the scan engine exists within the email stream.


Not my problem.  I don't need or want, and should not be hammered  with, 
virus "warnings" sent to forged addresses -- ever.  They are  unsolicited 
(I didn't request it, and definitely don't want it),  bulk (automated 
upon receipt of viruses by the offending server), e- mail... thus UBE.


I know of no cases where a malware related DSN would be generated by  our 
products, nevertheless, DSNs are not Unsolicited Bulk Email.


That's good Doug, and IMHO, your products should never generate them. 
However, I will disagree with you concerning the DSN being UBE. As a general 
rule, you are correct, DSN's != UBE. However, in the case of av systems 
(scanning engine and mta configurations) they can be. While I agree with you 
that the scanning engine(s) used by most of us, do not actually send reject 
notifications, the mechanisms that employ them, both commercial and open 
source, usually can, and do, unless configured not to. Some may see it as a 
violation of RFC to not return a DSN on failed delivery. Others, like myself 
see the need to not return a failure notice on virus / trojan infected email 
as it has become the norm that the sender information is forged. Especially 
those systems that contain the infected data along with the message. To many 
trojans / viri as of late, the DSN's that include the message (with 
infection) are being used as a repeater to further propogate the infection. 
Those that release these things are starting to depend on our mechanisms to 
help them spread. I, like others, prefer not to help them break the net from 
my little piece of it.


--

Mike P. 



Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-07 Thread Steven J. Sobol

On Tue, 6 Dec 2005, Douglas Otis wrote:

> > Not my problem.  I don't need or want, and should not be hammered  
> > with, virus "warnings" sent to forged addresses -- ever.  They are  
> > unsolicited (I didn't request it, and definitely don't want it),  
> > bulk (automated upon receipt of viruses by the offending server), e- 
> > mail... thus UBE.
> 
> I know of no cases where a malware related DSN would be generated by  
> our products, nevertheless, DSNs are not Unsolicited Bulk Email.

Rght.

Virus notifications aren't DSNs.

99% of the time, they're ads for the publisher of whatever anti-virus 
filter is being used on the recipient's side.
 

-- 
Steve Sobol, Professional Geek   888-480-4638   PGP: 0xE3AE35ED
Company website: http://JustThe.net/
Personal blog, resume, portfolio: http://SteveSobol.com/
E: [EMAIL PROTECTED] Snail: 22674 Motnocab Road, Apple Valley, CA 92307





Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-06 Thread Douglas Otis



On Dec 6, 2005, at 2:15 PM, Todd Vierling wrote:


On Tue, 6 Dec 2005, Douglas Otis wrote:


Holding at the data phase does usually avoid the need for a DSN,  
but this
technique may require some added (less than elegant) operations  
depending upon

where the scan engine exists within the email stream.


Not my problem.  I don't need or want, and should not be hammered  
with, virus "warnings" sent to forged addresses -- ever.  They are  
unsolicited (I didn't request it, and definitely don't want it),  
bulk (automated upon receipt of viruses by the offending server), e- 
mail... thus UBE.


I know of no cases where a malware related DSN would be generated by  
our products, nevertheless, DSNs are not Unsolicited Bulk Email.



Generated virus "warnings" must not go to a known forged sender, or  
to a sender for which the forgery status is unknown.  If you cannot  
*guarantee* that the address in MAIL FROM:<> is correct, and cannot  
reject at SMTP time, your only options are to quarantine, discard,  
or allow delivery.  Do not send a DSN; do not pass Go; do not  
collect US$200.


Not all email is rejected within the SMTP session.  You are changing  
requirements for recipients that scan incoming messages for malware.   
Fault them for returning content or not including a null bounce- 
address.  No one can guarantee an email-address within the bounce- 
address is valid, furthermore a DSN could be desired even for cases  
where an authorization scheme fails.  Why create corner cases?



There is always BATV to clean-up spoofed bounce-addresses in the  
meantime.


And other methods (DK, SPF, SID, choose your poison).  However, if  
the server cannot verify that the MAIL FROM:<> is not forged with  
reasonable certainty, the server should not send a DSN, period.   
Otherwise, it's a direct contributor to the UBE problem.


DomainKeys and Sender-ID can not validate the bounce-address or the  
DSN.  Even with an SPF failure, a DSN should still be sent, as SPF  
fails in several scenarios, and false positives are never 0%.  BATV  
offers a unilateral option that can effectively discard spoofed  
bounce-addresses.  When the AV software provides the DSN with a null  
bounce-address, BATV works as advertised.



-Doug


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-06 Thread Todd Vierling

On Tue, 6 Dec 2005, Douglas Otis wrote:

> > > A less than elegant solution as an alternative to deleting the message, is
> > > to hold the data phase pending the scan.
> >
> > Contrary to your vision of this option, it is not only elegant; it happens
> > to be the *correct* thing to do.
>
> Holding at the data phase does usually avoid the need for a DSN, but this
> technique may require some added (less than elegant) operations depending upon
> where the scan engine exists within the email stream.

Not my problem.  I don't need or want, and should not be hammered with,
virus "warnings" sent to forged addresses -- ever.  They are unsolicited (I
didn't request it, and definitely don't want it), bulk (automated upon
receipt of viruses by the offending server), e-mail... thus UBE.

It's up to the server operator to choose how to handle virus protection in
the mail system, without generating any mail whatsoever to forged or
unknown-if-it-is-forged senders.

> It would seem that when a DSN is required, as a
> general practice, the DSN should not include message content.
> This should at least thwart this vector being used to spread
> malware and spam.  Preventing the spread of a virus seems key.

I, frankly, don't care about the issue of whether or not a "warning" message
includes the virus that triggered it; you've missed the point.

I care about the fact that these "warnings" are UBE, at levels that have
been peaking above those of direct spam from what I can see.

Generated virus "warnings" must not go to a known forged sender, or to a
sender for which the forgery status is unknown.  If you cannot *guarantee*
that the address in MAIL FROM:<> is correct, and cannot reject at SMTP time,
your only options are to quarantine, discard, or allow delivery.  Do not
send a DSN; do not pass Go; do not collect US$200.

> There is always BATV to clean-up spoofed bounce-addresses in the meantime.

And other methods (DK, SPF, SID, choose your poison).  However, if the
server cannot verify that the MAIL FROM:<> is not forged with reasonable
certainty, the server should not send a DSN, period.  Otherwise, it's a
direct contributor to the UBE problem.

-- 
-- Todd Vierling <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-06 Thread Douglas Otis



On Dec 6, 2005, at 8:19 AM, Todd Vierling wrote:



On Mon, 5 Dec 2005, Douglas Otis wrote:

A less than elegant solution as an alternative to deleting the  
message, is

to hold the data phase pending the scan.


Contrary to your vision of this option, it is not only elegant; it  
happens

to be the *correct* thing to do.


Holding at the data phase does usually avoid the need for a DSN, but  
this technique may require some added (less than elegant) operations  
depending upon where the scan engine exists within the email stream.   
Waiting for the scan to complete adds stack overhead (assuming a good  
black-hole list is being used).  Albeit small, there is never 0%  
false detections of malware.  It would seem that when a DSN is  
required, as a general practice, the DSN should not include message  
content.  This should at least thwart this vector being used to  
spread malware and spam.  Preventing the spread of a virus seems  
key.  There is always BATV to clean-up spoofed bounce-addresses in  
the meantime.


-Doug


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-06 Thread Todd Vierling

On Mon, 5 Dec 2005, Douglas Otis wrote:

> A less than elegant solution as an alternative to deleting the message, is
> to hold the data phase pending the scan.

Contrary to your vision of this option, it is not only elegant; it happens
to be the *correct* thing to do.

Dropping the message on the floor is arguably stretching the bounds of
RFC2821.  If a message is going to be dropped because of a policy (such as a
worm/virus flag), you really should be rejecting after DATA with a RFC1893
5.7.x extended result code.

> Another solution would be not returning message content within a DSN.

If you're still sending to a forged address, how is this not still UBE...?

-- 
-- Todd Vierling <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-05 Thread Valdis . Kletnieks
On Mon, 05 Dec 2005 17:38:00 PST, Douglas Otis said:

> pending the scan.  Another solution would be not returning message  
> content within a DSN.  This would mitigate the distribution of  
> viruses, as well as forged bounce-addresses sent to a backup MTAs as  
> a method for bypassing black-hole lists.  Would changing what is  
> returned within a DSN in all cases be a solution?

No. You're still sending a DSN to a destination that you know beforehand
is incorrect.


pgpIsMlepDe2K.pgp
Description: PGP signature


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-05 Thread Douglas Otis



On Dec 4, 2005, at 8:04 PM, Steven M. Bellovin wrote:


 "Church, Chuck" writes:


The ideal solution would be for the scanning software to send a  
warning only if the virus detected is known to use real addresses,  
otherwise it won't warn.


A-V companies are in the business of analyzing viruses.  They  
should *know* how a particular virus behaves.


It is common to find detailed descriptions offered by the company  
that indicates the behavior of the detected virus, which often  
includes spoofing the bounce-address.  A less than elegant solution  
as an alternative to deleting the message, is to hold the data phase  
pending the scan.  Another solution would be not returning message  
content within a DSN.  This would mitigate the distribution of  
viruses, as well as forged bounce-addresses sent to a backup MTAs as  
a method for bypassing black-hole lists.  Would changing what is  
returned within a DSN in all cases be a solution?


-Doug







Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-05 Thread Rich Kulawiec

On Sun, Dec 04, 2005 at 09:27:58PM -0600, Church, Chuck wrote:
> What about all the viruses out there that don't forge addresses?

Three responses.

First, these are pretty much a minority nowadays: so unless someone
wants to code AV responses on a case-by-case basis, the best default
is "don't respond, ever".

Second, rejecting virus-contaminated traffic during the SMTP phase
completely alleviates the need to address this question, since no
outbound mail is generated.

Third, put the first two points aside.  Let's suppose, for a moment,
that there existed a completely reliable mechanism for figuring out
the real sender (in the sense of "the owner of the infected system")
for a particular virus-contaminated message.

Think about what would happen if the 100 or 1000 or 1 or 10
people getting outbound viruses from that user all generated responses.

The first effect would be to double the quantity of useless mail
messages traversing the Internet.

The second effect would be to hammer the user's mailbox and whatever
mail server it happened to be residing on.  (Consider how this effect
would be multiplied if many users of X all had infected systems sending
SMTP traffic directly, but of course were all receiving inbound mail via
X's mail server(s).)

The third effect would really be a non-effect, as the user's most
likely response (thanks to years of conditioning imposed by the
problem we're discussing here) would be to do nothing: experience
has taught users that such warnings are bogus and can safely be ignored.
The user's second-most-likely response would be indignant denial (despite
logs showing positive identification).  The user's third-most-likely
response would be report the responses as spam and/or block the senders.


Bottom line: nothing good can come of generating outbound mail in
response to rejected inbound mail; the best course of action is to
issue the appropriate 5XX response and be done with it.

---Rsk


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-05 Thread Rich Kulawiec

On Sun, Dec 04, 2005 at 03:18:29PM -0800, Steve Sobol wrote:
> Blocking based on rDNS simply because it implies that a certain piece of 
> equipment is at that address is... not advisable.

Agreed.  Those blocks aren't in place because there's a certain piece
of equipment at those addresses (hostnames); they're in place because
all of them have emitted spam.

---Rsk


RE: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-04 Thread Daniel Senie


At 10:27 PM 12/4/2005, Church, Chuck wrote:


What about all the viruses out there that don't forge addresses?


As others have noted, these are so far lost in the noise as to not be a factor.


Sending a warning message makes sense for these.


Why? Because you need to be the one to tell the sender they are 
infected? Let sites patrol their own users.


Furthermore, if you did your virus scanning during the SMTP 
transaction, you'd be able to send back a 5xx error response during 
the transaction, thereby avoiding any concern about spamming an 
innocent third party.



  Unless someone has
done the research to determine the majority of viruses forge addresses,
you really can't complain about the fact that the default is to warn.


As others have noted, the vendors can and should know.


Calling vendors 'clueless' because a default doesn't match your needs


Excuse me, I think you may notice that a LOT of folks have piped up 
on this issue. The simple fact is as configured many vendors spam 
third parties adding to the noise floor. While backbone operators 
might in fact make a bit extra as a result, those of us who actually 
pay for bandwidth do not appreciate it. We certainly can and do 
blacklist sites that hammer us with bogus bounces, just the same as 
we'd block any company knowingly sending us undesired email.



 is
a little extreme, don't you think?  The ideal solution would be for the
scanning software to send a warning only if the virus detected is known
to use real addresses, otherwise it won't warn.


See question above, re: why do you think it's your systems' place to 
police the rest of the Internet, sending warnings out? Either reject 
virus-laden email during the SMTP session, or quietly own it (and 
dispose of it).





Chuck


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Todd Vierling
Sent: Sunday, December 04, 2005 4:53 PM
To: W.D.McKinney
Cc: nanog@merit.edu
Subject: RE: Clueless anti-virus products/vendors (was Re: Sober)


On Sun, 4 Dec 2005, W.D.McKinney wrote:

> > (Virus "warnings" to forged addresses are UBE, plain and simple.)
>
> Since when? I disagree.

UBE = "unsolicited bulk e-mail".

Which of those three words do[es] not apply to virus "warning"
backscatter
to forged envelope/From: addresses?  Think carefully before answering.

--
-- Todd Vierling <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>




Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-04 Thread Robert Bonomi

> From [EMAIL PROTECTED]  Sun Dec  4 22:34:54 2005
> Date: Mon, 05 Dec 2005 04:30:26 + (GMT)
> From: "Christopher L. Morrow" <[EMAIL PROTECTED]>
> Subject: Re: Clueless anti-virus products/vendors (was Re: Sober)
> To: "Steven M. Bellovin" <[EMAIL PROTECTED]>
> Cc: "Church, Chuck" <[EMAIL PROTECTED]>, nanog@merit.edu
>
>
> On Sun, 4 Dec 2005, Steven M. Bellovin wrote:
>
> > In message <[EMAIL PROTECTED]>, "Chur
> > ch, Chuck" writes:
> > >
> > >What about all the viruses out there that don't forge addresses?
> > >Sending a warning message makes sense for these.  Unless someone has
> >
> > A-V companies are in the business of analyzing viruses.  They should
> > *know* how a particular virus behaves.
>
> This has also been said before, but... they are also in the business of
> SELLING their product. It seems that the 'default' (note I don't either:
> use av, nor scan emails for virii so I'm not sure what defaults to what...
> just use something other than outlook and you can care less about it) is
> possibly there for advertising effect more than anything else :(
>
> Hey, bob's company stopped this virus with $PRODUCT_12, why aren't we
> using that product $VP_O_IT ??

"Because they 'very thoughtfully' fowarded the entire message, INCLUDING
 THE VIRUS ITSELF, to us.  _Even_though_ the original message did not 
 originate here.

"Do you _really_ think we should start forwarding viruses to our customers,
 'just because' their address was forged into a message sent us?  Just how
 do you think our customers would respond to _that_?"


There _is_ an art-form to backing management into an untennable corner, when
they are bound and determined to do something 'wrong'.  It's simply a matter
of finding the "right" consequences of the action, to illustrate _why_ the
proposed thing is 'wrong'.   'Revenues', and 'customer satisfaction' are 
almost _universal_ "hot buttons" that can frequently be used to advantage.



Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-04 Thread Christopher L. Morrow

On Sun, 4 Dec 2005, Steven M. Bellovin wrote:

> In message <[EMAIL PROTECTED]>, "Chur
> ch, Chuck" writes:
> >
> >What about all the viruses out there that don't forge addresses?
> >Sending a warning message makes sense for these.  Unless someone has
>
> A-V companies are in the business of analyzing viruses.  They should
> *know* how a particular virus behaves.

This has also been said before, but... they are also in the business of
SELLING their product. It seems that the 'default' (note I don't either:
use av, nor scan emails for virii so I'm not sure what defaults to what...
just use something other than outlook and you can care less about it) is
possibly there for advertising effect more than anything else :(

Hey, bob's company stopped this virus with $PRODUCT_12, why aren't we
using that product $VP_O_IT ??


RE: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-04 Thread Todd Vierling

On Sun, 4 Dec 2005, Church, Chuck wrote:

> What about all the viruses out there that don't forge addresses?

Not that there are nearly as many -- the main scourge is sender-forging
worms by a better than 90%/10% margin -- but I very specifically mentioned:

> > > (Virus "warnings" to forged addresses are UBE, plain and simple.)

I think that was pretty clear.

> Sending a warning message makes sense for these.  Unless someone has
> done the research to determine the majority of viruses forge addresses,

Are you living on Earth in 2005?  Unless your filters are VERY strict, no
research should be necessary; look at your own mailbox[es].  If you don't
know that most worm-viruses forge senders these days, you haven't been using
Internet e-mail long enough.  8-)

That said, it takes only a cursory glance through the worms listed on
Symantec's or F-Secure's or Sophos's web sites in reverse chronological
order to see, very clearly, that *nearly every* worm in recent history
forges sender addresses.  Finding three or more worms in the past two years
that don't forge is a challenge for the bored reader.

Some do it for a very good reason -- in the eyes of the worm's writer, mind
you.  A worm is more likely to get through if the user in envelope-FROM has
some sort of relationship with the recipient, because so many sites use
weighted scoring that includes auto-whitelist bias.  To a worm writer, just
using the address in the luser's settings isn't enough, as folks are
starting to understand "don't click on any random attachment."  So, gambling
on the luser having a circle of friends close enough to know each other, the
worm forges many different combinations.  (If you want more details on this
reasoning, take it off-list.)

> Calling vendors 'clueless' because a default doesn't match your needs is
> a little extreme, don't you think?

The vendors sending worm-virus "warning" UBE are indeed clueless now,
because they aren't paying attention to (often their own!) virus statistics
showing that the majority of worm-viruses forge sender addresses today.

Let me repeat myself:

> > > (Virus "warnings" to forged addresses are UBE, plain and simple.)

Not sending UBE is not just "my needs"; I think we can both agree on that.

To extend that concept, virus "warnings" triggered by worm-viruses for which
the forgery status is unknown is either UBE or very close to it.

With the massive amount if spew that is forged, any warning option that is
not absolutely confined to trigger on problem mail *known* not to be forged
is a part of the problem, not part of the solution.  The option for warning
on forged senders shouldn't just be off -- it should not exist.

>  The ideal solution would be for the scanning software to send a warning
> only if the virus detected is known to use real addresses, otherwise it
> won't warn.

Symantec reportedly did this at long last in one of their products recently
(see [EMAIL PROTECTED] archives for details).  I truly hope others
follow suit.  However, unless the option to warn forged senders is removed
entirely from their products, anti-malware vendors still have a large amount
of fault on their shoulders.

Things like clamav have had the option properly separated for some time, but
I'm mainly counting the slow-moving, commercial anti-malware products in the
prior pragraph.

-- 
-- Todd Vierling <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-04 Thread Jamie C. Pole



An even more cynical way would be to say that most antivirus  
companies aren't in the business of analyzing viruses - they are in  
the business of selling antivirus software.


I believe that is the fundamental problem.

Jamie

--
Jamie C. Pole
[EMAIL PROTECTED]
http://www.jcpa.com

InfoSec / InfoWar / Forensics


On Dec 4, 2005, at 11:18 PM, Edward B. Dreger wrote:



SMB> Date: Sun, 04 Dec 2005 23:04:52 -0500
SMB> From: Steven M. Bellovin

SMB> A-V companies are in the business of analyzing viruses.  They  
should

SMB> *know* how a particular virus behaves.

The cynical would say they _do_ know, and "accidental" backscatter  
is a

way to advertise their products. ;-)


Eddy
--
Everquick Internet - http://www.everquick.net/
A division of Brotsman & Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita
__ 
__

DO NOT send mail to the following addresses:
[EMAIL PROTECTED] -*- [EMAIL PROTECTED] -*- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.
Ditto for broken OOO autoresponders and foolish AV software  
backscatter.




Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-04 Thread Edward B. Dreger

SMB> Date: Sun, 04 Dec 2005 23:04:52 -0500
SMB> From: Steven M. Bellovin

SMB> A-V companies are in the business of analyzing viruses.  They should 
SMB> *know* how a particular virus behaves.

The cynical would say they _do_ know, and "accidental" backscatter is a 
way to advertise their products. ;-)


Eddy
--
Everquick Internet - http://www.everquick.net/
A division of Brotsman & Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita

DO NOT send mail to the following addresses:
[EMAIL PROTECTED] -*- [EMAIL PROTECTED] -*- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.
Ditto for broken OOO autoresponders and foolish AV software backscatter.


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-04 Thread Steven M. Bellovin

In message <[EMAIL PROTECTED]>, "Chur
ch, Chuck" writes:
>
>What about all the viruses out there that don't forge addresses?
>Sending a warning message makes sense for these.  Unless someone has
>done the research to determine the majority of viruses forge addresses,
>you really can't complain about the fact that the default is to warn.
>Calling vendors 'clueless' because a default doesn't match your needs is
>a little extreme, don't you think?  The ideal solution would be for the
>scanning software to send a warning only if the virus detected is known
>to use real addresses, otherwise it won't warn.
>

A-V companies are in the business of analyzing viruses.  They should 
*know* how a particular virus behaves.

--Steven M. Bellovin, http://www.cs.columbia.edu/~smb




Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-04 Thread Larry Smith

On Sunday 04 December 2005 21:27, Church, Chuck wrote:
> What about all the viruses out there that don't forge addresses?
> Sending a warning message makes sense for these.  Unless someone has
> done the research to determine the majority of viruses forge addresses,
> you really can't complain about the fact that the default is to warn.
> Calling vendors 'clueless' because a default doesn't match your needs is
> a little extreme, don't you think?  The ideal solution would be for the
> scanning software to send a warning only if the virus detected is known
> to use real addresses, otherwise it won't warn.

True, but the "capability" has been in most AV software for quite a long time 
now to know which ones "forge" and which do not.  Clamav has a "list" of 
which virii are "forging" and which are not - I am reasonably certain that 
most other AV products have the same information at hand (a quick search of 
Symantec confirms that they know [ref sober worm, para 23, From:   
(spoofed)).  So while I agree with your basic concept of notifying someone 
that they are infected - when you can notify the "right" person - blanket 
notifications are more trouble than the virus itself in many cases.  And yes, 
as of yesterday I have more "blowback" from sober than from the worm 
itself

-- 
Larry Smith
SysAd ECSIS.NET
[EMAIL PROTECTED]




Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-04 Thread Christian Kuhtz



Better safe than sorry.  Unless you can determine that it isn't  
forged, you shouldn't be sending anything because there is so much  
out there forging From: addresses (or To: for that matter, with Bcc:).


So, this isn't about ideal vs ok-close-enough.  Don't send me crap  
unless you have a reasonable level of confidence.  I don't believe  
that you can pass a straight face test with virus scanning responses  
on that one.


If you can, I think you need your head examined ;-)

On Dec 4, 2005, at 10:27 PM, Church, Chuck wrote:



What about all the viruses out there that don't forge addresses?
Sending a warning message makes sense for these.  Unless someone has
done the research to determine the majority of viruses forge  
addresses,

you really can't complain about the fact that the default is to warn.
Calling vendors 'clueless' because a default doesn't match your  
needs is
a little extreme, don't you think?  The ideal solution would be for  
the
scanning software to send a warning only if the virus detected is  
known

to use real addresses, otherwise it won't warn.


Chuck


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On  
Behalf Of

Todd Vierling
Sent: Sunday, December 04, 2005 4:53 PM
To: W.D.McKinney
Cc: nanog@merit.edu
Subject: RE: Clueless anti-virus products/vendors (was Re: Sober)


On Sun, 4 Dec 2005, W.D.McKinney wrote:


(Virus "warnings" to forged addresses are UBE, plain and simple.)


Since when? I disagree.


UBE = "unsolicited bulk e-mail".

Which of those three words do[es] not apply to virus "warning"
backscatter
to forged envelope/From: addresses?  Think carefully before answering.

--
-- Todd Vierling <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>




Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-04 Thread Geo.

>>What about all the viruses out there that don't forge addresses?

What virus in the past 2 years doesn't forge the from address?

George Roettger


RE: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-04 Thread Church, Chuck

What about all the viruses out there that don't forge addresses?
Sending a warning message makes sense for these.  Unless someone has
done the research to determine the majority of viruses forge addresses,
you really can't complain about the fact that the default is to warn.
Calling vendors 'clueless' because a default doesn't match your needs is
a little extreme, don't you think?  The ideal solution would be for the
scanning software to send a warning only if the virus detected is known
to use real addresses, otherwise it won't warn.


Chuck 


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Todd Vierling
Sent: Sunday, December 04, 2005 4:53 PM
To: W.D.McKinney
Cc: nanog@merit.edu
Subject: RE: Clueless anti-virus products/vendors (was Re: Sober)


On Sun, 4 Dec 2005, W.D.McKinney wrote:

> > (Virus "warnings" to forged addresses are UBE, plain and simple.)
>
> Since when? I disagree.

UBE = "unsolicited bulk e-mail".

Which of those three words do[es] not apply to virus "warning"
backscatter
to forged envelope/From: addresses?  Think carefully before answering.

-- 
-- Todd Vierling <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-04 Thread Robert Bonomi

> From [EMAIL PROTECTED]  Sun Dec  4 17:19:43 2005
> Date: Sun, 04 Dec 2005 15:18:29 -0800
> From: Steve Sobol <[EMAIL PROTECTED]>
> To: Rich Kulawiec <[EMAIL PROTECTED]>
> Cc: [EMAIL PROTECTED]
> Subject: Re: Clueless anti-virus products/vendors (was Re: Sober)
>
>
> Rich Kulawiec wrote:
>
> > And thus we now have blacklist entries such as:
> > 
> > barracuda1.aus.texas.net
> > barracuda.yale-wrexham.ac.uk
> > barracuda.morro-bay.ca.us
> > barracuda.ci.mtnview.ca.us
> > barracuda.elbert.k12.ga.us
> > barracuda.fort-dodge.k12.ia.us
> > barracuda.ci.garner.nc.us
> > barracuda.ship.k12.pa.us
> > 
> > and many, many more.
>
> Blocking based on rDNS simply because it implies that a certain piece of 
> equipment is at that address is... not advisable.

_UNTIL_ the first backscatter arrives from 'that' equipment, that is.


*wry*grin*



Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-04 Thread Steve Sobol


Rich Kulawiec wrote:


And thus we now have blacklist entries such as:

barracuda1.aus.texas.net
barracuda.yale-wrexham.ac.uk
barracuda.morro-bay.ca.us
barracuda.ci.mtnview.ca.us
barracuda.elbert.k12.ga.us
barracuda.fort-dodge.k12.ia.us
barracuda.ci.garner.nc.us
barracuda.ship.k12.pa.us

and many, many more.


Blocking based on rDNS simply because it implies that a certain piece of 
equipment is at that address is... not advisable.


--
Steve Sobol, Professional Geek   888-480-4638   PGP: 0xE3AE35ED
Company website: http://JustThe.net/
Personal blog, resume, portfolio: http://SteveSobol.com/
E: [EMAIL PROTECTED] Snail: 22674 Motnocab Road, Apple Valley, CA 92307



RE: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-04 Thread Todd Vierling

On Sun, 4 Dec 2005, W.D.McKinney wrote:

> > (Virus "warnings" to forged addresses are UBE, plain and simple.)
>
> Since when? I disagree.

UBE = "unsolicited bulk e-mail".

Which of those three words do[es] not apply to virus "warning" backscatter
to forged envelope/From: addresses?  Think carefully before answering.

-- 
-- Todd Vierling <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-04 Thread Rich Kulawiec

On Sun, Dec 04, 2005 at 09:58:20AM -0500, Todd Vierling wrote:
> If it is on by default, it is a bug, and not operator error.

(In the case of the Barracuda) there are at least two such switches:
one for spam, one for viruses.  Note that when both are set to "off" that
the box still occasionally emits such messages under as-yet-undetermined
circumstances.  I attempted to persuade one of Barracuda's engineers,
months ago, that there was absolutely no valid reason for including a
"feature" whose only purpose was abuse redirection.  Incredibly, I was
told "the customers want this feature", and that it would not be removed.

And thus we now have blacklist entries such as:

barracuda1.aus.texas.net
barracuda.yale-wrexham.ac.uk
barracuda.morro-bay.ca.us
barracuda.ci.mtnview.ca.us
barracuda.elbert.k12.ga.us
barracuda.fort-dodge.k12.ia.us
barracuda.ci.garner.nc.us
barracuda.ship.k12.pa.us

and many, many more.

Perhaps Barracuda should simply rename those switches as "spam
random individuals" and/or "get yourself blacklisted", as those
are the only two things likely to result from turning them on.

> (Virus "warnings" to forged addresses are UBE, plain and simple.)

When sent in bulk (as they inevitably are), absolutely.  There's
no exception in the canonical definition of spam (which _is_ "UBE")
for "messages sent by broken anti-virus software", nor should there be.

---Rsk


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-04 Thread Christian Kuhtz



On Dec 4, 2005, at 2:06 PM, W.D.McKinney wrote:



Can people building virus scanning devices PLEASE GET A %^&*^ CLUE?
This means you, Barricuda Networks, more than anyone else, but we
also see this annoyance from Symantec devices, and from some AOL
systems as well.


It's a simple switch in the GUI of Barracuda Networks to turn of  
this

annoyance. More operator error than Barracuda's fault, IMHO.


If it is on by default, it is a bug, and not operator error.

(Virus "warnings" to forged addresses are UBE, plain and simple.)



Since when? I disagree.


While we can argue whether it is UBE, it is a pretty dumb move I  
think we can all agree.. ;-)




RE: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-04 Thread W.D.McKinney



> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
> Todd Vierling
> Sent: Sunday, December 04, 2005 5:58 AM
> To: W.D.McKinney
> Cc: [EMAIL PROTECTED]
> Subject: Re: Clueless anti-virus products/vendors (was Re: Sober)
> 
> 
> On Sat, 3 Dec 2005, W.D.McKinney wrote:
> 
> > >Can people building virus scanning devices PLEASE GET A %^&*^ CLUE?
> > >This means you, Barricuda Networks, more than anyone else, but we
> > >also see this annoyance from Symantec devices, and from some AOL
> > >systems as well.
> >
> > It's a simple switch in the GUI of Barracuda Networks to turn of this
> > annoyance. More operator error than Barracuda's fault, IMHO.
> 
> If it is on by default, it is a bug, and not operator error.
> 
> (Virus "warnings" to forged addresses are UBE, plain and simple.)
> 

Since when? I disagree.

-Dee




Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-04 Thread Todd Vierling

On Sat, 3 Dec 2005, W.D.McKinney wrote:

> >Can people building virus scanning devices PLEASE GET A %^&*^ CLUE?
> >This means you, Barricuda Networks, more than anyone else, but we
> >also see this annoyance from Symantec devices, and from some AOL
> >systems as well.
>
> It's a simple switch in the GUI of Barracuda Networks to turn of this
> annoyance. More operator error than Barracuda's fault, IMHO.

If it is on by default, it is a bug, and not operator error.

(Virus "warnings" to forged addresses are UBE, plain and simple.)

-- 
-- Todd Vierling <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-03 Thread Suresh Ramasubramanian
On 12/3/05, Daniel Senie <[EMAIL PROTECTED]> wrote:
> Can people building virus scanning devices PLEASE GET A %^&*^ CLUE?
> This means you, Barricuda Networks, more than anyone else, but we
> also see this annoyance from Symantec devices, and from some AOL
> systems as well.

The worst offenders that I see -

MailMarshal
eSafe
Symantec devices, as you say

Comparatively little from Barracudas.

And some large carriers / ISPs who send bounces / virus notifications
back with (for example) [EMAIL PROTECTED] as the return path instead of
MAIL FROM:<>


RE: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-02 Thread W.D.McKinney



> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
> Richard Cox
> Sent: Friday, December 02, 2005 4:23 PM
> To: [EMAIL PROTECTED]
> Subject: Re: Clueless anti-virus products/vendors (was Re: Sober)
> 
> 
> On Sat, 03 Dec 2005 00:45:05 +
> "W.D.McKinney" <[EMAIL PROTECTED]> wrote:
> > It's a simple switch in the GUI of Barracuda Networks to turn of
> > this annoyance. More operator error than Barracuda's fault, IMHO.
> 
> Not if a software upgrade from Barracuda can cause the current
> configuration to be silently reverted to Barracuda's defaults ...

That never happened on any of our cluster.

-Dee


> 
> --
> Richard




Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-02 Thread Richard Cox

On Sat, 03 Dec 2005 00:45:05 +
"W.D.McKinney" <[EMAIL PROTECTED]> wrote:
> It's a simple switch in the GUI of Barracuda Networks to turn of
> this annoyance. More operator error than Barracuda's fault, IMHO.

Not if a software upgrade from Barracuda can cause the current
configuration to be silently reverted to Barracuda's defaults ...

-- 
Richard


Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-02 Thread W.D.McKinney

>-Original Message-
>From: Daniel Senie [mailto:[EMAIL PROTECTED]
>Sent: Friday, December 2, 2005 11:27 AM
>To: [EMAIL PROTECTED]
>Subject: Clueless anti-virus products/vendors (was Re: Sober)
>
>
>At 03:12 PM 12/2/2005, Michael Loftis wrote:
>
>
>
>>--On December 2, 2005 2:02:15 PM -0600 Dennis Dayman 
>><[EMAIL PROTECTED]> wrote:
>>
>>>
>>>Interested, but I see many Sober postings and outages on other lists and
>>>not here...has anyone been having issues? I know the ISP's are fighting
>>>the living out of the virus.
>>
>>I've been seeing a few really large bursts into our mailserver.  Not 
>>sure if it's a new variant or a reoccurrence of an old strain.  I 
>>put in a good number of new port 25 inbound blocks for infected 
>>systems and attempted to put up a few checks inside of our front end 
>>mail servers rather than in the virus and spam filtering (which 
>>happens later for us, so for bad surges we put a few custom rules up 
>>front early in postfix).
>
>Only stuff we're seeing is a lot of blowback from dumb mail systems 
>that accept email, THEN scan for viruses, and ultimately decide to 
>send a note back to the From: address in the body of the infected 
>email. Since the From: is invariably forged, the uninvolved owner of 
>those forged email addresses gets hammered.
>
>Can people building virus scanning devices PLEASE GET A %^&*^ CLUE? 
>This means you, Barricuda Networks, more than anyone else, but we 
>also see this annoyance from Symantec devices, and from some AOL 
>systems as well.
>

It's a simple switch in the GUI of Barracuda Networks to turn of this 
annoyance. More operator error than Barracuda's fault, IMHO.

-Dee




>Blasting a note back does two things:
>
>1. It allows the worm or virus author an opportunity to implement an 
>amplified attack on a third party using your filtering systems.
>
>2. The bounce messages mostly include an advertisement for the 
>filtering box's vendor. Get a clue... this is a REALLY negative 
>advertisement for your spam & virus filtering technology. If you 
>can't manage to realize the virus laden email should perhaps be 
>dropped, then it makes your box look poorly designed.
>
>Oh, and please delete the infected file rather than sending that along too.
>
>OK, off my soapbox.
>
>Dan
>
>





Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-02 Thread Larry Smith

On Friday 02 December 2005 14:27, Daniel Senie wrote:
> Oh, and please delete the infected file rather than sending that along too.

Here, Here  Roughly 50 percent of the sober messages I have been getting 
hammered with are the basic "sorry we could not deliver your virus message, 
so here it is" - intact

-- 
Larry Smith
SysAd ECSIS.NET
[EMAIL PROTECTED]