Re: SMTP relaying policies for Commercial ISP customers...?

2004-02-13 Thread Andy Dills

On Fri, 13 Feb 2004, Dan Ellis wrote:

> 1)   Residential Policy:  Enable SMTPAUTH and disallow relaying
> unless the customer has a valid username/password.  If you're not paying
> for a mailbox, you don't get to relay outbound.  This should not break
> anything except those residential accounts that *should* be commercial
> anyway.
>
> 2)   Broadband commercial: This is the difficult one.  These are the
> customers that aren't big enough to rightfully run their own mailserver,
> but they are big enough to have roaming users on their networks (coffee
> shops, branch offices, hotels, SOHO).  They expect relaying service
> for either their mailserver or for all their various PC's.  At the same
> time, they don't have many, if any mailboxes through the ISP.  My
> thought is that they should ONLY be allowed to relay via SMTPAUTH by
> using a residential mailbox login/pass OR they need to purchase a
> commercial relay service (expensive because of the openness of it) for
> their IP space.
>
> 3)   T1+ : These customers should not be allowed to relay unless
> they purchase (expensive) relay services for their IP space.  Of course,
> they can always use a residential mailbox, but will have to use SMTPAUTH
> for it and will be restrained by the same policies residential mailboxes
> have (low tolerance tarpitting,...).

While the amount of effort you put into this so far is commendable, I
really think you're barking up the wrong tree.

At the end of the day, what have you done, besides annoy your customers
and increase the load on your support staff?

I don't really see what you're suggesting being anything other than a huge
effort, solving the wrong problem.

For any responsible ISP, the problem is the spam coming into your
mailservers, not leaving. As long as you quickly castrate the people who
do relay spam through you, you're not going to have an egress spam
problem.

Since you seem to have countless hours to invest in this problem, you'd be
better off writing a log parser to identify WHEN somebody is relaying spam
through you, so you can react.

Something else I've seen implemented is rate limiting. Keep track of the
number of messages sent by an IP over a variable amount of time and
implement thresholds.


I'd love to hear some of the conversations you have with your leased line
customers, when you tell them they have to pay for "(expensive) relay
services" to send mail through your mail server. How many times will they
laugh before hanging up on you? :)

That's like the IRS trying to charge you for the forms...

And I'd also like to see the looks on your technical support staff's faces
when you tell them they need to assist your ENTIRE USER BASE in switching
to authenticated SMTP :)

And then you have to deal with the customers who have MTAs that don't
support authenticated SMTP...and on and on.

Whenever the solution is more expensive than the problem, you need to go
back to the drawing board.

Andy

---
Andy Dills
Xecunet, Inc.
www.xecu.net
301-682-9972
---



RE: SMTP relaying policies for Commercial ISP customers...?

2004-02-13 Thread Dan Ellis

Andy,
These are exactly my concerns, and exactly what I feel I'm going to hear from the 
staff and the customers.  I am going to go back and make sure there isn't a "better" 
solution.  Thanks for the input.

The issue we have as a dynamic IP broadband provider is that it's a royal pain to 
shutdown a user - especially in regards to just mail.  Lets say we have a spammer and 
a script detects it. We then have to track him back to the MAC address of the modem, 
lookup that MAC in the customer DB, shutdown his access and then reset the modem.  And 
at the end, he loses all access, not just mail.  With AUTH we can just stop mail 
access.  Yeah, sure we could try to push some access list to the modem itself, 
blocking mail, but those modems are so flaky to start, it'll never work reliably.  
Can't just block the IP on the mail server because the user will or could just get a 
new IP, and then you are blocking a legit user.


I'm still not sure if the norm is for providers to let t1+ customers relay.  I have 
multiple OC3's and 12's from AT&T, MCI,...  Will they let me relay off their servers 
without SMTPAUTH?  Probably not.  

As always, comments welcome.

--
Daniel Ellis, CTO, PenTeleData
(610)826-9293

 "The only way to predict the future is to invent it."
  --Alan Kay


> -Original Message-
> From: Andy Dills [mailto:[EMAIL PROTECTED]
> Sent: Friday, February 13, 2004 12:35 PM
> To: Dan Ellis
> Cc: [EMAIL PROTECTED]
> Subject: Re: SMTP relaying policies for Commercial ISP customers...?
> 
> 
> On Fri, 13 Feb 2004, Dan Ellis wrote:
> 
> > 1)   Residential Policy:  Enable SMTPAUTH and disallow relaying
> > unless the customer has a valid username/password.  If you're not paying
> > for a mailbox, you don't get to relay outbound.  This should not break
> > anything except those residential accounts that *should* be commercial
> > anyway.
> >
> > 2)   Broadband commercial: This is the difficult one.  These are the
> > customers that aren't big enough to rightfully run their own mailserver,
> > but they are big enough to have roaming users on their networks (coffee
> > shops, branch offices, hotels, SOHO).  They expect relaying service
> > for either their mailserver or for all their various PC's.  At the same
> > time, they don't have many, if any mailboxes through the ISP.  My
> > thought is that they should ONLY be allowed to relay via SMTPAUTH by
> > using a residential mailbox login/pass OR they need to purchase a
> > commercial relay service (expensive because of the openness of it) for
> > their IP space.
> >
> > 3)   T1+ : These customers should not be allowed to relay unless
> > they purchase (expensive) relay services for their IP space.  Of course,
> > they can always use a residential mailbox, but will have to use SMTPAUTH
> > for it and will be restrained by the same policies residential mailboxes
> > have (low tolerance tarpitting,...).
> 
> While the amount of effort you put into this so far is commendable, I
> really think you're barking up the wrong tree.
> 
> At the end of the day, what have you done, besides annoy your customers
> and increase the load on your support staff?
> 
> I don't really see what you're suggesting being anything other than a huge
> effort, solving the wrong problem.
> 
> For any responsible ISP, the problem is the spam coming into your
> mailservers, not leaving. As long as you quickly castrate the people who
> do relay spam through you, you're not going to have an egress spam
> problem.
> 
> Since you seem to have countless hours to invest in this problem, you'd be
> better off writing a log parser to identify WHEN somebody is relaying spam
> through you, so you can react.
> 
> Something else I've seen implemented is rate limiting. Keep track of the
> number of messages sent by an IP over a variable amount of time and
> implement thresholds.
> 
> 
> I'd love to hear some of the conversations you have with your leased line
> customers, when you tell them they have to pay for "(expensive) relay
> services" to send mail through your mail server. How many times will they
> laugh before hanging up on you? :)
> 
> That's like the IRS trying to charge you for the forms...
> 
> And I'd also like to see the looks on your technical support staff's faces
> when you tell them they need to assist your ENTIRE USER BASE in switching
> to authenticated SMTP :)
> 
> And then you have to deal with the customers who have MTAs that don't
> support authenticated SMTP...and on and on.
> 
> Whenever the solution is more expensive than the problem, you need to go
> back to the drawing board.
> 
> Andy
> 
> ---
> Andy Dills
> Xecunet, Inc.
> www.xecu.net
> 301-682-9972
> ---



RE: SMTP relaying policies for Commercial ISP customers...?

2004-02-13 Thread Andy Dills

On Fri, 13 Feb 2004, Dan Ellis wrote:

> The issue we have as a dynamic IP broadband provider is that it's a
> royal pain to shutdown a user - especially in regards to just mail.
> Lets say we have a spammer and a script detects it. We then have to
> track him back to the MAC address of the modem, lookup that MAC in the
> customer DB, shutdown his access and then reset the modem.  And at the
> end, he loses all access, not just mail.  With AUTH we can just stop
> mail access.  Yeah, sure we could try to push some access list to the
> modem itself, blocking mail, but those modems are so flaky to start,
> it'll never work reliably.  Can't just block the IP on the mail server
> because the user will or could just get a new IP, and then you are
> blocking a legit user.

Yes, that is a little bit stickier of an issue, IFF your goal is to
somehow continue to provide the would-be spammer with the ability to send
traffic to the net, provided it doesn't transit your mail server. I feel
that you're overlooking the simple solution. Blocking the entire account
so they can't access anything is the proper response to a spamming
incident.

> I'm still not sure if the norm is for providers to let t1+ customers
> relay.  I have multiple OC3's and 12's from AT&T, MCI,...  Will they let
> me relay off their servers without SMTPAUTH?  Probably not.

I'm almost positive they would. Hell, many providers will give you a free
NNTP feed if you want it. The goal is to maximize the use of the link
between you and the customer while minimizing the use of the links between
you and other networks. Services like SMTP and NNTP are great for that.

Andy

---
Andy Dills
Xecunet, Inc.
www.xecu.net
301-682-9972
---



Re: SMTP relaying policies for Commercial ISP customers...?

2004-02-13 Thread Steven Champeon

on Fri, Feb 13, 2004 at 12:35:17PM -0500, Andy Dills wrote:
> For any responsible ISP, the problem is the spam coming into your
> mailservers, not leaving. As long as you quickly castrate the people who
> do relay spam through you, you're not going to have an egress spam
> problem.

I beg to differ (though you did qualify your statement with
"responsible", so maybe this critique doesn't apply). Yes, anyone
providing Internet services such as inbound mail has to deal with spam.
But to assume that all spam goes through your outbound mail servers is
simply not commensurate with the facts.

Since 1/1/04, we've rejected many email messages on our servers as
having originated from hosts with generic rDNS symptomatic of
dynamic/broadband/dialup/etc. IP assignment. Of those that were
rejected, here is a quick summary, showing the domain or ccTLD of the
originating host for those representing 20 or more attempts.

  585 comcast.net46 co.uk
  402 rr.com 46 tiscali.nl
  188 attbi.com  43 yahoo.com
  175 pacbell.net41 rogers.com
  165 ameritech.net  40 mchsi.com
  130 shawcable.net  38 cgocable.net
  128 adelphia.net   36 snet.net
  125 optonline.net  35 mindspring.com
  106 wanadoo.fr 34 interbusiness.it
  105 verizon.net32 surfer.at
  103 bellsouth.net  30 telus.net
   89 charter.com30 go2lnk.com
   88 dsl-verizon.net30 com.br
   80 t-dialin.net   29 net.au
   79 swbell.net 28 rima-tde.net
   63 ne.jp  27 wideopenwest.com
   61 videotron.ca   24 bbtt.de
   58 net.il 22 nuvox.net
   51 proxad.net 21 com.hk
   48 com.tw 21 bbtec.net
   48 a2000.nl   20 telia.com
 20 charter-stl.com

These are not messages originating through known ISP mail servers, which
we have to a large extent "offwhitelisted" - meaning we don't reject,
but rather add a header to, such messages so that the header can be used
as part of a quarantine strategy. Any large ISP mailhost we've received
spam through (such as the freemail providers who are the greatest source
of Nigerian 419/lottery scams) is "offwhitelisted" and may be subject to
further blocking on a case by case basis, or to further filtering.

Some of the messages aggregated above may well have been virus or worm
delivery attempts; I haven't analyzed the day-to-day breakdown, but I'd
be surprised if MyDoom doesn't figure in to a large extent in the cases
documented above. But that is of no consequence; spam or virus messages
both constitute abuse by out-of-band, often compromised, hosts.

The problem of abusive mail originating from dynamic and otherwise
non-sanctioned sources is real; viruses such as SoBig are suspected of
being used in a vast net of compromised hosts, to evade other filtering
strategies.

 Sobig.a and the Spam You Receive Today - LURHQ
 http://www.lurhq.com/sobig.html

 Sobig.e - Evolution of the Worm - LURHQ
 http://www.lurhq.com/sobig-e.html

 Sobig.f Examined - LURHQ
 http://www.lurhq.com/sobig-f.html

In an eight-minute window on one of my servers yesterday, I saw the
following:

--
WKS   Q 12:12:54 (9351)
  to: [EMAIL PROTECTED]
from: <[EMAIL PROTECTED]> at 68.59.188.188
  (pcp02265132pcs.batlfl01.tn.comcast.net)
--
WKS   Q 12:13:23 (9356)
  to: [EMAIL PROTECTED]
from: <[EMAIL PROTECTED]> at 81.9.232.163
  (cmr-81-9-232-163.telecable.es)
--
WKS   Q 12:15:21 (9513)
  to: [EMAIL PROTECTED]
from: <[EMAIL PROTECTED]> at 200.55.72.231
  (200-55-72-231.dsl.prima.net.ar)
--
WKS   Q 12:15:49 (9519)
  to: [EMAIL PROTECTED]
from: <[EMAIL PROTECTED]> at 142.169.46.107
  (c142.169.46-107.clta.globetrotter.net)
--
WKS   Q 12:15:51 (9520)
  to: [EMAIL PROTECTED]
from: <[EMAIL PROTECTED]> at 142.165.147.216
  (hsdbsk142-165-147-216.sasknet.sk.ca)
--
WKS   Q 12:15:56 (9521)
  to: [EMAIL PROTECTED]
from: <[EMAIL PROTECTED]> at 141.158.119.119
  (pool-141-158-119-119.pitt.east.verizon.net)
--
WKS   Q 12:17:03 (9556)
  to: [EMAIL PROTECTED]
from: <[EMAIL PROTECTED]> at 81.59.87.42
  (dslam42-87-59-81.dyndsl.zonnet.nl)
---

RE: SMTP relaying policies for Commercial ISP customers...?

2004-02-13 Thread Ejay Hire

You could use AOL's tactic and transparent proxy all
outbound port 25 traffic.  Then it'd  be a relatively simple
matter to add mr. spammer's ip to a hosts.deny.  If you were
really big-brother, you could do real-time Beaysean scanning
to identify "suspicious" hosts.
-Ejay

> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On 
> Behalf Of Dan Ellis
> Sent: Friday, February 13, 2004 11:55 AM
> To: Andy Dills
> Cc: [EMAIL PROTECTED]
> Subject: RE: SMTP relaying policies for Commercial ISP
customers...?
> 
> 
> Andy,
> These are exactly my concerns, and exactly what I feel I'm

> going to hear from the staff and the customers.  I am
going 
> to go back and make sure there isn't a "better" solution.

> Thanks for the input.
> 
> The issue we have as a dynamic IP broadband provider is
that 
> it's a royal pain to shutdown a user - especially in
regards 
> to just mail.  Lets say we have a spammer and a script 
> detects it. We then have to track him back to the MAC
address 
> of the modem, lookup that MAC in the customer DB, shutdown

> his access and then reset the modem.  And at the end, he 
> loses all access, not just mail.  With AUTH we can just
stop 
> mail access.  Yeah, sure we could try to push some access 
> list to the modem itself, blocking mail, but those modems
are 
> so flaky to start, it'll never work reliably.  Can't just 
> block the IP on the mail server because the user will or 
> could just get a new IP, and then you are blocking a legit
user.
> 
> 
> I'm still not sure if the norm is for providers to let t1+

> customers relay.  I have multiple OC3's and 12's from
AT&T, 
> MCI,...  Will they let me relay off their servers without 
> SMTPAUTH?  Probably not.  
> 
> As always, comments welcome.
> 
> --
> Daniel Ellis, CTO, PenTeleData
> (610)826-9293
> 
>  "The only way to predict the future is to invent it."
>       --Alan
Kay
> 
> 
> > -Original Message-
> > From: Andy Dills [mailto:[EMAIL PROTECTED]
> > Sent: Friday, February 13, 2004 12:35 PM
> > To: Dan Ellis
> > Cc: [EMAIL PROTECTED]
> > Subject: Re: SMTP relaying policies for Commercial ISP
customers...?
> > 
> > 
> > On Fri, 13 Feb 2004, Dan Ellis wrote:
> > 
> > > 1)   Residential Policy:  Enable SMTPAUTH and 
> disallow relaying
> > > unless the customer has a valid username/password.  If

> you're not paying
> > > for a mailbox, you don't get to relay outbound.  This 
> should not break
> > > anything except those residential accounts that
*should* 
> be commercial
> > > anyway.
> > >
> > > 2)   Broadband commercial: This is the difficult
one. 
>  These are the
> > > customers that aren't big enough to rightfully run
their 
> own mailserver,
> > > but they are big enough to have roaming users on their

> networks (coffee
> > > shops, branch offices, hotels, SOHO).  They expect

> relaying service
> > > for either their mailserver or for all their various 
> PC's.  At the same
> > > time, they don't have many, if any mailboxes through
the ISP.  My
> > > thought is that they should ONLY be allowed to relay
via 
> SMTPAUTH by
> > > using a residential mailbox login/pass OR they need to
purchase a
> > > commercial relay service (expensive because of the 
> openness of it) for
> > > their IP space.
> > >
> > > 3)   T1+ : These customers should not be allowed
to 
> relay unless
> > > they purchase (expensive) relay services for their IP 
> space.  Of course,
> > > they can always use a residential mailbox, but will
have 
> to use SMTPAUTH
> > > for it and will be restrained by the same policies 
> residential mailboxes
> > > have (low tolerance tarpitting,...).
> > 
> > While the amount of effort you put into this so far is 
> commendable, I
> > really think you're barking up the wrong tree.
> > 
> > At the end of the day, what have you done, besides annoy

> your customers
> > and increase the load on your support staff?
> > 
> > I don't really see what you're suggesting being anything

> other than a huge
> > effort, solving the wrong problem.
> > 
> > For any responsible ISP, the problem is the spam coming
into your
> > mailservers, not leaving. As long as you quickly
castrate 
> the people who
> > do relay spam through you, you're not going to have an
egress spam
> > problem.
&

Re: SMTP relaying policies for Commercial ISP customers...?

2004-02-13 Thread Leo Vegoda

You wrote:

[...]

> Yes, that is a little bit stickier of an issue, IFF your goal is to
> somehow continue to provide the would-be spammer with the ability to send
> traffic to the net, provided it doesn't transit your mail server. I feel
> that you're overlooking the simple solution. Blocking the entire account
> so they can't access anything is the proper response to a spamming
> incident.

If you block the entire account then the user can't use the account
to download the updates your Abuse Team will responsibly want to
point him/her at. If you want to lose the customer then that's your
business. If you want to keep the customer, helping them fix their
mistakes is probably a painful and thankless task - but important
and useful to the whole Internet community.

Regards,

-- 
leo vegoda
RIPE NCC
Registration Services Manager


Re: SMTP relaying policies for Commercial ISP customers...?

2004-02-13 Thread Petri Helenius
Leo Vegoda wrote:

If you block the entire account then the user can't use the account
to download the updates your Abuse Team will responsibly want to
point him/her at. If you want to lose the customer then that's your
business. If you want to keep the customer, helping them fix their
mistakes is probably a painful and thankless task - but important
and useful to the whole Internet community.
 

It is probably worth mentioning that numerous malware today make an 
effort to block an user from accessing AV or windowsupdate sites after 
infection. Also, if you mirror the software as a courtesy, you´ll run 
into interesting copyright issues.

Pete



Re: SMTP relaying policies for Commercial ISP customers...?

2004-02-13 Thread jlewis

On Fri, 13 Feb 2004, Leo Vegoda wrote:

> > Yes, that is a little bit stickier of an issue, IFF your goal is to
> > somehow continue to provide the would-be spammer with the ability to send
> > traffic to the net, provided it doesn't transit your mail server. I feel
> > that you're overlooking the simple solution. Blocking the entire account
> > so they can't access anything is the proper response to a spamming
> > incident.
> 
> If you block the entire account then the user can't use the account
> to download the updates your Abuse Team will responsibly want to
> point him/her at. If you want to lose the customer then that's your
> business. If you want to keep the customer, helping them fix their
> mistakes is probably a painful and thankless task - but important
> and useful to the whole Internet community.

What about http://www.nanog.org/mtg-0402/gauthier.html

After seeing that presentation, I wondered if an ISP could get away with 
something similar.  Eric has the advantage of being the monopoly service 
provider for the dorms.
 
--
 Jon Lewis [EMAIL PROTECTED]|  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



Re: SMTP relaying policies for Commercial ISP customers...?

2004-02-13 Thread Andy Dills

On Fri, 13 Feb 2004, Leo Vegoda wrote:

> You wrote:
>
> [...]
>
> > Yes, that is a little bit stickier of an issue, IFF your goal is to
> > somehow continue to provide the would-be spammer with the ability to send
> > traffic to the net, provided it doesn't transit your mail server. I feel
> > that you're overlooking the simple solution. Blocking the entire account
> > so they can't access anything is the proper response to a spamming
> > incident.
>
> If you block the entire account then the user can't use the account
> to download the updates your Abuse Team will responsibly want to
> point him/her at. If you want to lose the customer then that's your
> business. If you want to keep the customer, helping them fix their
> mistakes is probably a painful and thankless task - but important
> and useful to the whole Internet community.

RFC1918 is your friend, as is making internal copies of windowsupdate
patches and virus removal tools.

But even then, I would block 100% of access until we establish customer
contact and are sure that the issue will be dealt with. Then, I would
re-enable them on RFC1918 space, assist them in rectifying their problem,
and then re-enable the rest of their account.

This doesn't result in lost customers. This results in appreciative
customers, even if they were blocked when they had the problem. If you
don't block them, most people will never know until they've spewed gigs.

Andy

---
Andy Dills
Xecunet, Inc.
www.xecu.net
301-682-9972
---




RE: SMTP relaying policies for Commercial ISP customers...?

2004-02-13 Thread Daniel Reed

On 2004-02-13T15:30-0600, Ejay Hire wrote:
) You could use AOL's tactic and transparent proxy all
) outbound port 25 traffic.  Then it'd  be a relatively simple
) matter to add mr. spammer's ip to a hosts.deny.  If you were

You may also need to filter inbound packets with a source port of 25, or any
other ports you capture.

As I believe has been mentioned here before, some spammers may use a dialup
account just for its IP address, collecting return packets on the dialup
interface but sending the actual content through some higher-bandwidth,
unfiltered pipe. Filtering what goes out over the dialup account would be
largely ineffective in this case, as nothing actually needs to be sent
through that interface for the transmissions to succeed.

-- 
Daniel Reed <[EMAIL PROTECTED]> http://naim-users.org/nmlorg/   http://naim.n.ml.org/
"True nobility lies not in being superior to another man, but in being
superior to one's previous self."


Re: SMTP relaying policies for Commercial ISP customers...?

2004-02-13 Thread Joseph Noonan

On Fri, 13 Feb 2004 at 5:14pm [EMAIL PROTECTED] wrote:
>
> What about http://www.nanog.org/mtg-0402/gauthier.html
>
> After seeing that presentation, I wondered if an ISP could get
> away with something similar.  Eric has the advantage of being
> the monopoly service provider for the dorms.

I know of at least one ISP that does similar, Onramp.net in Austin
TX.  I'm a corporate IT Mgr and one of my remote users is an
Onramp customer that had ancient NAV on his personal PeeCee and
caught whatever worm was in vogue a few months back.

He is not a particularly computer savvy person, but he is not a
luser either.  He was quite pleasantly surprised at the service,
once he realized what was going on.



-- 

Joseph F. Noonan
Rigaku/MSC Inc.
[EMAIL PROTECTED]