Re: Atrivo/Intercage: Now Only 1 Upstream

2008-09-17 Thread Suresh Ramasubramanian
Looks like PIE got themselves a /22 in spamhaus -

http://www.spamhaus.org/sbl/sbl.lasso?query=SBL67906

_quote__

206.223.144.0/22 is listed on the Spamhaus Block List (SBL)

17-Sep-2008 09:57 GMT | SR04

Pacific Internet Exchange LLC. NT Technology ; nttec.com

http://cidr-report.org/cgi-bin/as-report?as=AS32335

Hosted/routed Scott Richter AND Alan Ralsky - now decided to pick up
Intercage/Atrivo. Perhaps someone does not read the news?

http://news.google.com/news?q=intercage
http://www.spamhaus.org/news.lasso?article=636

We hope that's the case and this is not a knowing routing decision.


On Wed, Sep 17, 2008 at 6:31 AM, Matthew Moyle-Croft
<[EMAIL PROTECTED]> wrote:
>
> On 16/09/2008, at 10:17 PM, *Hobbit* wrote:
>
>> So in cases like this where the community appears to agree that there's
>> a consistently bad apple, what's preventing everyone from simply
>> nullrouting the netblocks in question and imposing the death penalty?
>
> Dunno - but something did occur to me this morning on the drive into work:



Re: ingress SMTP

2008-09-13 Thread Suresh Ramasubramanian
On Sat, Sep 13, 2008 at 11:38 PM, Frank Bulk <[EMAIL PROTECTED]> wrote:
> How do you alert mail server operators who are smarthosting their e-mail
> through you that their outbound messages contain spam?
>
> Frank

If those are actual mailservers smarthosting and getting MX from you
then you doubtless have quite a lot of reporting already set up.

Have you seen what Messagelabs, MXLogic etc do?

There's also feedback loops, ARF formatted, where users on those
mailservers can report inbound spam to the filtering vendor.

.. or was that a rhetorical question and am I missing something here?

-- 
Suresh Ramasubramanian ([EMAIL PROTECTED])



Re: Why not go after bots? (was: ingress SMTP)

2008-09-03 Thread Suresh Ramasubramanian
On Wed, Sep 3, 2008 at 5:12 AM, Michael Thomas <[EMAIL PROTECTED]> wrote:
> That seems to be the convention wisdom, but the science experiment
> as it were in blocking port 25 doesn't seem to be correlated (must
> less causated) with any drop in the spam rate. Because so far as I've
> heard there isn't any such drop. Spammers and the rest are pretty
> resourceful.

Let's put it this way .. a lot of ISPs have already realized that
which is why port 25 blocking or management is the basics. They do
that and have done that for years (and various providers elsewhere
still proudly claim "hey, we do outbound port 25 blocking, we're
great!!!").  The real action is in walled gardens to automatically
detect and isolate botted hosts till they're cleaned up

Go talk to arbor, sandvine, perftech etc etc

srs



Re: ingress SMTP

2008-09-03 Thread Suresh Ramasubramanian
you just found one?  i think a few dozen over the last several years.

surprised though, i thought this particular horse was finally dead
after all the beatings it'd received.

srs

On Thu, Sep 4, 2008 at 8:13 AM, Ang Kah Yik <[EMAIL PROTECTED]> wrote:
> Hmm.. if it helps - here's a link to an archived discussion on the same
> issue earlier this year.
>
> http://www.mail-archive.com/[EMAIL PROTECTED]/msg52598.html



Re: ingress SMTP

2008-09-03 Thread Suresh Ramasubramanian
On Wed, Sep 3, 2008 at 10:18 PM, Justin Scott <[EMAIL PROTECTED]> wrote:
>> Do you operate your mailserver on a residential cablemodem or adsl
>> rather than a business account?
>
> No, we co-lo equipment at a professional facility that our customers on any
> type of connection need to have access to send mail through, regardless of
> whether their ISP blocks the standard ports or not.

That's why you set your outbound MTA to listen  - for auth'd outbound
connections only - on port 587

Endless loop of dead horse beating .. ouch

srs
-- 
Suresh Ramasubramanian ([EMAIL PROTECTED])



Re: ingress SMTP

2008-09-03 Thread Suresh Ramasubramanian
On Wed, Sep 3, 2008 at 9:26 PM, Justin Scott <[EMAIL PROTECTED]> wrote:
>> What is preventing this from being an operational no-brainer,
>> including making a few exceptions for customers that prove they know
>> how to lock down their own mail infrastructure?
>
> As a small player who operates a mail server used by many local businesses,
> this becomes a support issue for admins in our position.  We operate an SMTP

Do you operate your mailserver on a residential cablemodem or adsl
rather than a business account?

There's this little matter of a "no servers on home connections" type
AUP that most providers have ..

--srs



Re: ingress SMTP

2008-09-03 Thread Suresh Ramasubramanian
On Wed, Sep 3, 2008 at 8:46 PM, *Hobbit* <[EMAIL PROTECTED]> wrote:
>
> What I'm trying to get a feel for is this: what proportion of edge
> customers have a genuine NEED to send direct SMTP traffic to TCP 25
> at arbitrary destinations?  I'm thinking mostly of cable-modem and

Not too many - they got themselves port 587 to submit outbound mail.

Read the maawg managing port 25 document - and while you are at it
read the walled garden doc too.. port 25 abuse is the least of your
worries with cable/dsl cpe swamps

http://www.maawg.org/port25
http://www.maawg.org/about/whitepapers/MAAWG_Walled_Garden_BP_2007-09.pdf

--srs



Re: GLBX De-Peers Intercage [Was: RE: Washington Post: Atrivo/Intercag e, w hy are we peering with the American RBN?]

2008-09-02 Thread Suresh Ramasubramanian
Eric, as you say, it is a multi part test. With fairly clear
distinctions between a compromised node and one under the direct
control of a criminal

So while it is unrealistic when viewed in isolation, put together with
other factors it starts to make a lot of sense.

thanks
srs

On Wed, Sep 3, 2008 at 7:59 AM, Eric Brunner-Williams
<[EMAIL PROTECTED]> wrote:

> In a parallel universe we're considering profiles for "licit use" of some
> mechanism. One element of a multi-part test to distinguish "licit" from
> "illicit" was the presence or absence of known signatures for malware. After
> some thought it was understood that this test was equivalent to the node
> subject to the test being "cleaner" than the average for network attached
> consumer devices, and therefore not realistic.



Re: GLBX De-Peers Intercage [Was: RE: Washington Post: Atrivo/Intercag e, w hy are we peering with the American RBN?]

2008-09-02 Thread Suresh Ramasubramanian
There's this concept known as "dual criminality" in such situations,
when you're looking at international prosecutions (or whatever).

So, while lesé majesté - insult to the king - is a crime in thailand
(liable to get you lynched before you get prosecuted, at that) that
doesnt mean the thai authorities can do much about youtube videos ..

On the other hand, child pornography, malware, illegal sale of
prescription narcotics etc are generally criminal acts around the
world.

regards
srs

On Mon, Sep 1, 2008 at 9:03 PM, Steven M. Bellovin <[EMAIL PROTECTED]> wrote:
> I mostly agree with you -- but I get very worried about who defines
> "scum".  Consider the following cases, which I will assert are not very
> far-fetched:
>
> (a) China labels Falun Gong as "scum" and demands that international
> ISPs not carry it if they want to do business in China



Re: Washington Post: Atrivo/Intercage, why are we peering with the American RBN?

2008-08-29 Thread Suresh Ramasubramanian
On Sat, Aug 30, 2008 at 1:32 AM, Gadi Evron <[EMAIL PROTECTED]> wrote:
> 2. On a different note, why is anyone still accepting their route
> announcements? I know some among us re-route RBN traffic to protect users.
> Do you see this as a valid solution for your networks?
>
> What ASNs belong to Atrivo, anyway?

The ASNs you ask about - as per the report - are on pages 4..8 of
http://hostexploit.com/downloads/Atrivo%20white%20paper%20082808ac.pdf



Re: Revealed: The Internet's well known BGP behavior

2008-08-28 Thread Suresh Ramasubramanian
Most of the spammer acquired /16s have been

1. pre arin

2. caused by buying up assets of long defunct companies .. assets that
just happen to include a /16 nobody knew about

Not exactly hijacks this lot .. just like those "barely legal" teen mags.

srs

On Thu, Aug 28, 2008 at 2:28 PM, Gadi Evron <[EMAIL PROTECTED]> wrote:
>
> People (especially spammers) have been hijacking networks for a while now,
> maybe now that we have a presentation to whore around, operators can
> pressure vendors and bosses.
>



Re: [funsec] Subject line misleading. AT&T Pwned. Sweet Irony: Metasploit Creator a Victim of His Own Creation (fwd)

2008-07-30 Thread Suresh Ramasubramanian
I can point it to a colo'd resolver I have elsewhere - but opendns is
rather more redundant.  Yes I know what else it does re advertising
and such, but I dont do any sensitive work related stuff through those
resolvers anyway.

On Thu, Jul 31, 2008 at 9:55 AM, Skywing <[EMAIL PROTECTED]> wrote:
> If you don't mind OpenDNS proxying all your Google searches, sure.  < 
> http://blog.metasploit.com/2008/07/on-dns-attacks-in-wild-and-journalistic.html
>  >
>
> Personally, I would never use OpenDNS.  Tactics like that are not 
> particularly acceptable in my book, well-meaning or not.  Not, however, 
> trying to start a political debate - but OpenDNS does do a bit more than just 
> act as a plain DNS resolver for you, and you should make that aware to anyone 
> who uses it.
>



Re: [funsec] Subject line misleading. AT&T Pwned. Sweet Irony: Metasploit Creator a Victim of His Own Creation (fwd)

2008-07-30 Thread Suresh Ramasubramanian
On Thu, Jul 31, 2008 at 1:22 AM, Gadi Evron <[EMAIL PROTECTED]> wrote:
> I guess history decided the previous discussion in favor of vix. Although I
> doubt vix sees this compromise at ATT as a victory, but rather a loss.
>
> Note: HD has not been compromised.

Well so if any of you uses an iphone to surf the net now's the time to
see if an iphone's nameservers can be changed to opendns :)



Re: Looking for Network Solutions mail admin

2008-07-17 Thread Suresh Ramasubramanian
I hope it is not in 128.168.0.0/16?

http://www.spamhaus.org/sbl/sbl.lasso?query=SBL51908

http://www.47-usc-230c2.org/chapter3.html

srs

On Fri, Jul 18, 2008 at 12:41 PM, randal k <[EMAIL PROTECTED]> wrote:
> NANOGers,
> We're getting the run around from Network Solutions e-mail front-end
> support personnel and only canned replies from the postmaster, with no
> escalation available because we're the sender (i.e. not paying).
>
> Basic problem is that we have a client mail gateway that is unable to
> send mail to a particular netsol-hosted domain; acts like an RBL
> issue, even though the IP is squeeky clean.
>
> Can a NetSol email admin with some clue drop me a line?
>
> Thanks in advance --
> Randal
>
>



-- 
Suresh Ramasubramanian ([EMAIL PROTECTED])



Re: Linkedin Contacts

2008-07-10 Thread Suresh Ramasubramanian
On Thu, Jul 10, 2008 at 9:17 PM, mark seiden-via mac <[EMAIL PROTECTED]> wrote:
> it probably has something to do with the large proportion of fraudsters
> using linked in and every personals site in the world for 419 and
> other confidence schemes, don't you think?
>
> of course, this only forces the fraudsters to use proxies, aol and satellite
> providers which are more difficult to geolocate.

Well, half of west african connectivity IS satellite so you're going
to see a lot of Gilat, etc satellite carriers' IP space as the source
for 419 activity

Especially when it comes to a paid service like a lot of linkedin is,
if firewalling off a particular section of IP space means far less
chargebacks, well, it may not look good but it sure has a great impact
on your bottom line.

--srs



Re: Sure, I'm game (was Re: a business opportunity?)

2008-07-06 Thread Suresh Ramasubramanian
On Sun, Jul 6, 2008 at 3:25 AM, Lynda <[EMAIL PROTECTED]> wrote:
> Actually, that's not a bad idea. Of course, there's the larger problem;
> verifying that the address space previously sullied is now worthy of being
> cleaned up. In Nick Shank's case (and Bravo! to Nick), I would say that he's
> off doing the right thing. It would seem that some serious investigation
> would be necessary before acting as a third party for others in a similar
> boat, of course.

There's already a bunch of companies that have built up a business
model on this.. they call it "deliverability"



Re: uceprotect.net

2008-06-27 Thread Suresh Ramasubramanian
Do you actually have a problem beyond "ZOMG, dnsstuff.com says I am in
uceprotect?".  Its not a list that I personally would waste time with.

BTW, the kind of issue that often affects "cost effective" colo shops
- so-called snowshoe spam - typically HAS matching forward and
reverse.

srs

On Fri, Jun 27, 2008 at 7:06 PM, Drew Weaver <[EMAIL PROTECTED]> wrote:
>Hello everyone, this is possibly off-topic here, not entirely sure.
>
>I'm kind of confused about some of uceprotect's policies, they seem to 
> require every IP address to have reverse DNS with matching forwards (which 
> works fine for a wireless/broadband/dial-up ISP, but not so much for a



Re: Cloud service [was: RE: EC2 and GAE means end of ip addressreputation industry? (Re: Intrustion attempts from Amazon EC2 IPs)]

2008-06-23 Thread Suresh Ramasubramanian
On Mon, Jun 23, 2008 at 11:14 PM, Tomas L. Byrnes <[EMAIL PROTECTED]> wrote:
> Barracuda, or you could build the exact same thing using OSS.
>
> Procmail, Spamassasin, ClamAV, and your choice of RBLs (or use
> karmashpere to custom roll a hybrid one).

Hate to point out the obvious, but ... That isnt "network gear" as such.

It is an appliance that'll require repointing of MX records

srs



Re: Cloud service [was: RE: EC2 and GAE means end of ip address reputation industry? (Re: Intrustion attempts from Amazon EC2 IPs)]

2008-06-23 Thread Suresh Ramasubramanian
On Mon, Jun 23, 2008 at 6:01 PM, Frank Bulk - iNAME <[EMAIL PROTECTED]> wrote:
> Is there a vendor that makes a product that perform spam/malware filtering
> literally in the network, i.e. as a service provider, can I provide spam
> filtering for the enterprises in my customer base by adding a piece of
> network gear?  I'm not aware of one today except those who provide
> enterprise-oriented gateways like SonicWall.

Symantec Mail Security / Turntide
Mailchannels Traffic Control

--srs

-- 
Suresh Ramasubramanian ([EMAIL PROTECTED])



Re: EC2 and GAE means end of ip address reputation industry? (Re: Intrustion attempts from Amazon EC2 IPs)

2008-06-23 Thread Suresh Ramasubramanian
On Mon, Jun 23, 2008 at 7:20 PM, Patrick Giagnocavo <[EMAIL PROTECTED]> wrote:
> What I think would/should happen is that EC2 is never assumed to be a
> legitimate source of email; and any EC2 instance that sends email will
> instead be relaying through a non-EC2 mail server.

Mail / spam seems to be the least of ec2's problems though. This
thread started off with ssh port probes.

srs

-- 
Suresh Ramasubramanian ([EMAIL PROTECTED])



Re: EC2 and GAE means end of ip address reputation industry? (Re: Intrustion attempts from Amazon EC2 IPs)

2008-06-22 Thread Suresh Ramasubramanian
On Mon, Jun 23, 2008 at 1:13 AM, Steve Gibbard <[EMAIL PROTECTED]> wrote:

> Likewise, anybody blocking EC2 would miss out on whatever bad stuff might be
> coming out of EC2, but would miss out on being able to access services
> hosted there as well.  Would they miss it more than they'd miss their
> friends on GMail?  That seems far from guaranteed.

SMTP blocks, when most of what's on EC2 doesnt actually originate
email?   Access to it would be over http which isnt firewalled.  Or
maybe ssh gets firewalled off.

Death by a thousand access lists. Ouch.

This simply means there must be a lot more effort - from their
upstreams, and from their peers (not in a "network sense" as much as
"large network operators who are of a sufficient size to talk to
amazon and ensure that they're heard".   To convince them that some
filtering at their end, and implementation of abuse handling best
practices would be a good idea.

--srs



Re: Intrustion attempts from Amazon EC2 IPs

2008-06-22 Thread Suresh Ramasubramanian
Well, there's spam originating from there, and some cracked scripts generating
part of it.  So ok, someone's found that it makes a handy platform for ssh port
probes and such as well.

srs

"Paul Kelly :: Blacknight" <[EMAIL PROTECTED]> wrote:

> Hi there,
>
> Have any of you recently noticed a lot of ssh scanning coming from amazons EC
> "cloud" IP blocks?
>
> Today alone I've seen approx 4m attempts from EC2 IPs on just 20 nodes on our
> network.
>
> Has anyone any experience with Amazons abuse people?
>
> Thanks,
>
> Paul



Re: Latest instalment of the "hijacked /16s" story

2008-06-17 Thread Suresh Ramasubramanian
On Wed, Jun 18, 2008 at 9:40 AM, Justin Shore <[EMAIL PROTECTED]> wrote:
> Is the whole AS (33302) rogue like the AS advertising the SF Bay Packet
> Radio block is?  Looking at the WHOIS for some of the prefixes advertised by
> both ASs, I see some common company names.  That would lead me to believe
> that 33302 is no better than 33211 but I can't confirm that.  Any takers?

Not sure. The AS announces some more but an arin query for DATA102
simply has this /16 and a smaller netblock

That 47-usc site is not mine either .. its by Ron Guilmette,
interviewed in the Wash Post -
http://blog.washingtonpost.com/securityfix/2008/04/a_case_of_network_identity_the_1.html

[EMAIL PROTECTED] 22:17:45 <~> $ whois -h whois.arin.net Data102*
Data102 Abuse Team  (DAT13-ARIN) [EMAIL PROTECTED] +1-719-578-8842
Data102 Network Ops  (DNO44-ARIN) [EMAIL PROTECTED] +1-719-578-8842
Data Works Inc DATA102984 (NET-63-243-82-144-1) 63.243.82.144 - 63.243.82.159
Gold Hill Computers DATA102 (NET-128-168-0-0-1) 128.168.0.0 - 128.168.255.255



Latest instalment of the "hijacked /16s" story

2008-06-17 Thread Suresh Ramasubramanian
Another legacy /16, after the previous one - the sf bay packet radio /16

http://www.47-usc-230c2.org/chapter3.html

This time 128.168/16 - and by the same group that seems to have acquired
control of the earlier one.

--srs

-- 
Suresh Ramasubramanian ([EMAIL PROTECTED])



If bandwidth wasnt already cheap (!) enough ..

2008-06-16 Thread Suresh Ramasubramanian
http://telephonyonline.com/ethernet/news/Cogent_price_cuts_06112008/

> "Cogent this morning is announcing new discounts for customers who commit to
> three-year contracts and for higher volume service provider customers. The
> new three-year price for Ethernet service is a flat $7 a megabit, a dollar
> less than the previous rate for contracts of two years or more. For service
> providers who buy Ethernet services at volumes between 100 megabits per
> second and a Gigabit, rates are as low as $6 per megabit for a three-year
> contract.
>
> Service providers who buy between one Gigabit and 10 gigabits will enjoy a
> three-year contract rate of $5 a meg, and those that consume a full 10
> gigabit port can pay as little as $4 a meg on a three-year contract."



Re: amazonaws.com?

2008-05-29 Thread Suresh Ramasubramanian
On Thu, May 29, 2008 at 10:03 PM, Barry Shein <[EMAIL PROTECTED]> wrote:
> The most common fee is a $50 per incident charge for spam complaints
> after a stern warning or two which depends on frequency, a few per day
> is very different than one or two per month, and what to do with those
> phony AOL TOS complaints which almost always mean "I asked to be on
> this list but I forgot how to get off so maybe if I keep clicking the
> spam button..."?

You run a botique provider of shells that - at least today - almost
exclusively caters to geeks.  You arent as likely to pick up genuinely
badhat spamming customers as the rest of us large ISPs are - and the
large colo farms (he.net, softlayer etc) are even more vulnerable to
this kind of thing.

Feedback loops (such as those AOL provide, or we provide - and we were
the second ISP after AOL to offer ARF'd feedback loops) are about the
best tool any ISP has available to it, to get near real time spam
reports.

You're a corner case.  And an opinionated corner case at that.  That
doesnt change just how useful FBLs are to the vast majority of
consumer ISPs out there.

--srs



Re: amazonaws.com?

2008-05-24 Thread Suresh Ramasubramanian
On Sun, May 25, 2008 at 1:06 AM, Barry Shein <[EMAIL PROTECTED]> wrote:
> Even when someone declines a charge it doesn't mean you can't collect
> what you believe to be money legitimately owed you. You can hand it to
> a collection agency if it's worthwhile. If not (e.g., you took a card
> w/o any verification from someone in a country whose name you can't
> even pronounce) OH WELL, you're a fool, or it better be part of your
> cost of doing business.

The funny part is, the scam artists already know that "mismatch
between account holder's name and cc holder's name / address /
country" is one of the first and most elementary anti fraud checks.

So, if they steal a cc from Joe Sixpack of Bumfuck, Iowa, guess who
signs up to Amazon AWS for 200 VMs and 20 minutes worth of service?

--srs



Re: amazonaws.com?

2008-05-23 Thread Suresh Ramasubramanian
On Sat, May 24, 2008 at 5:29 AM, Barry Shein <[EMAIL PROTECTED]> wrote:
>
> Is it just us or does someone pWn *.amazonaws.com?
>
> ec2-67-202-36-134.compute-1.amazonaws.com
> ec2-67-202-37-35.compute-1.amazonaws.com

Why dont you just use spamhaus PBL?  That'd take care of email from
the EC2 cloud, dynamic IP ranges etc etc.

http://www.spamhaus.org/pbl/query/PBL181003

Ref: PBL181003

67.202.0.0/18 is listed on the Policy Block List (PBL)

Outbound Email Policy of The Spamhaus Project for this IP range:

This IP range has been identified by Spamhaus as not meeting our
policy for IPs which should deliver 'direct-to-mx' mail to PBL users.



Re: [NANOG] IOS rootkits

2008-05-18 Thread Suresh Ramasubramanian
On Mon, May 19, 2008 at 2:03 AM, Dragos Ruiu <[EMAIL PROTECTED]> wrote:
> So in my opinion the benefits of discussing serious issues at conferences
> far outweigh the potential drawbacks of misguided media coverage of them.
> What I infer from your post is that you are of the opinion that issues such

Well, there are any number of closed, no media, relevant people only
conferences, or communities like nsp-sec,  that come in useful

Report to CSIRT by all means but that doesnt imply  "brush it under
the carpet".  Getting releases out and fixes (if only router
management bcp like in Joel Jaeggli's post) without various people
spreading FUD about it should certainly be an achievable goal?

srs

___
NANOG mailing list
NANOG@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog


Re: [NANOG] IOS rootkits

2008-05-18 Thread Suresh Ramasubramanian
Let's put it this way.

1. Yes there's nothing to patch, as such

2. It can be prevented by what's widely regarded as BCP on router
security, and has been covered at *nog, in cisco training material,
etc etc for quite some time now.

I am much less concerned about security conferences discussing this
than about the (highly uninformed) publicity that accompanies these
conferences.

Yes, this sounds a lot more like the bugtraq v/s full disclosure
discussion than I'm comfortable with, but I still think this could
have been handled a lot better.

--srs

On Sun, May 18, 2008 at 7:27 PM, Dragos Ruiu <[EMAIL PROTECTED]> wrote:

> Bullshit.
> There is nothing to patch.
> It needs to be presented at conferences, exactly because people will play
> ostrich and stick their heads in the sand and pretend it can't happen to
> them, and do nothing about it until someone shows them, "yes it can happen"
> and here is how
> Which is exactly why we've accepted this talk. We've all known this is a
> possibility for years, but I haven't seen significant motion forward on this
> until we announced this talk. So in a fashion, this has already helped make
> people more realistic about their infrastructure devices. And the
> discussions, and idea interchange that will happen between the smart folks
> at the conference will undoubtedly usher forth other related issues and
> creative solutions.  Problems don't get fixed until you talk about them.
> cheers,
> --dr

___
NANOG mailing list
NANOG@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog


Re: [NANOG] IOS rootkits

2008-05-17 Thread Suresh Ramasubramanian
On Sat, May 17, 2008 at 12:47 PM, Matthew Moyle-Croft
<[EMAIL PROTECTED]> wrote:
> If the way of running this isn't out in the wild and it's actually
> dangerous then a pox on anyone who releases it, especially to gain
> publicity at the expensive of network operators sleep and well being.
> May you never find a reliable route ever again.

This needs fixing. It doesnt need publicity at security conferences
till after cisco gets presented this stuff first and asked to release
an emergency patch.

--srs
-- 
Suresh Ramasubramanian ([EMAIL PROTECTED])

___
NANOG mailing list
NANOG@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog


Re: [NANOG] BCP Muni WiFI?

2008-05-15 Thread Suresh Ramasubramanian
On Fri, May 16, 2008 at 2:51 AM, Deepak Jain <[EMAIL PROTECTED]> wrote:
>
> Are there any good (published) BCPs for building out Municipal WiFi
> networks? Particularly in the security/authentication/scaling areas?
>

Ask Earthlink, they just announced pulling out of Philly .. and I
guess they had a working deployment going by the time they pulled out
(and the reasons for that pullout would do for a great white paper all
by themselves, I expect...)


-- 
Suresh Ramasubramanian ([EMAIL PROTECTED])

___
NANOG mailing list
NANOG@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog


Re: [NANOG] Linkedin

2008-05-14 Thread Suresh Ramasubramanian
On Wed, May 14, 2008 at 11:23 AM, Felix Bako <[EMAIL PROTECTED]> wrote:
> Hi Guyz, anyone from linkedin please contact me off list as we have not
> been able to open the website www.linkedin.com for sometime now!!

Hi, have you tried to curb 419 spam sent over http/https from your IP
space (through linkedin among other services)?  Perhaps that would go
quite far towards reducing the occurence of such blocks.

___
NANOG mailing list
NANOG@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog


Re: [NANOG] fair warning: less than 1000 days left to IPv4 exhaustion

2008-05-03 Thread Suresh Ramasubramanian
Let's think smaller. /16 shall we say?

Like the /16 here.  Originally the SRI / ARPANET SF Bay Packet Radio
network that started back in 1977.  Now controlled by a shell company
belonging to a shell company belonging to a "high volume email
deployer" :)

http://blog.washingtonpost.com/securityfix/2008/04/a_case_of_network_identity_the_1.html

srs

On Sun, May 4, 2008 at 9:07 AM, Joel Jaeggli <[EMAIL PROTECTED]> wrote:
> William Warren wrote:
>  > That also doesn't take into account how many /8's are being hoarded by
>  > organizations that don't need even 25% of that space.
>
>  which one's would those be?
>
>  legacy class A address space just isn't that big...

___
NANOG mailing list
NANOG@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog


MAAWG BCP on something very similar Re: Interpersonal skills needed for Network Engineers

2008-02-18 Thread Suresh Ramasubramanian

On Feb 17, 2008 12:17 PM, Henry Linneweh <[EMAIL PROTECTED]> wrote:
>
> Funny that this issue came up, I recently took a class in Interpersonal
> Communications,
> which are essential in the "New Workforce", I highly recommend such classes

MAAWG came out with a doc on bcp for managing an abuse desk .. talks a
lot of hard / tech skills specific to abuse desking (or hell, to NOC,
tech support etc), and also soft skills (motivation, career path etc)

Might prove an interesting read:
http://www.maawg.org/about/publishedDocuments/Abuse_Desk_Common_Practices.pdf

srs


Re: Stupid Question: Network Abuse RFC?

2008-01-13 Thread Suresh Ramasubramanian

On Jan 14, 2008 12:39 AM, Sean Donelan <[EMAIL PROTECTED]> wrote:
> Although you need a some overlap, I think you get much better "buy-in"
> when people from the same industry are developing their operational
> standards.

Well, MAAWG does that, and has produced a lot of good work in the
past.  Has the same ISPs that come to NANOG, NSPSEC etc too, and in
some cases the same people.

So is that a call for *NOGs to come out with operational BCPs (no, not
"standards")?

--srs


Re: Stupid Question: Network Abuse RFC?

2008-01-13 Thread Suresh Ramasubramanian

On Jan 13, 2008 12:05 PM, Sean Donelan <[EMAIL PROTECTED]> wrote:
> The great thing about standards is there are so many to choose from.
> There is also ARF: Abuse Feedback Reporting Format from the Mutual
> Internet Practices Assocation.
> Messaging Anti-Abuse Working Group has multiple documents.

ARF is the de facto standard, widely deployed, for ISP spam reporting
feedback loops

As for INCH, standards track or not, as much as I keep asking about, I
can find very few instances of CERTs actually using the damned thing.
And quite a few feeds dont appear to provide "take" in INCH format.

> And then there are various one-shot things produced by many groups such as
> the OECD, ASTA, FTC, NASD, etc.

The only relevant one I remember that the OECD did, in the context of
their spam toolkit, was an earlier version of the MAAWG sender best
practices documents, developed by MAAWG jointly with OECD's business
constituency BIAC. Newer versions of the sender bcp (which is bcp for
legit bulk mailers) have since been published on the MAAWG website.

The ASTA docs became the MAAWG best practices, more or less ..pretty
much the same crowd behind both (large ISPs + email providers).  And
most of that lot is not reporting standards or formats, it is best
practices for abuse handling / legit email marketing etc.

--srs
-- 
Suresh Ramasubramanian ([EMAIL PROTECTED])


Re: Q: What do ISPs really think about security issues?

2008-01-12 Thread Suresh Ramasubramanian

On Jan 12, 2008 3:49 PM, Sean Donelan <[EMAIL PROTECTED]> wrote:
> We could just meet at the Universal Postal Union meeting, and get rid
> of all those extra organizations like the ITU, IETF, NANOG, etc :-)

The fun part is, they do take a lot of interest in this too .. the US
postal service, the various European Lapostes etc - anybody who
operates a postal bank + wire transfer system and gets to face
phishers, malware and such just like regular banks  do.

That wasn't an argument for consolidation .. more like "cooperation".
And the sort of cooperation that isnt aimed at  making headlines and
scoring points .. stuff like (for example) surveys of the top 10 best
and worst registrars (which dont name the very worst, and include some
very good registrars among the worst, but that's another story
altogether..).

> Having both shared and separate meetings and communications is important.
>
> We can all learn alot from sharing.  But its also important for
> organizations and people to be able to communicate just with similar

We're on the same page there, Sean.

srs


Re: Q: What do ISPs really think about security issues?

2008-01-11 Thread Suresh Ramasubramanian

On Jan 11, 2008 8:01 PM, Gadi Evron <[EMAIL PROTECTED]> wrote:

> Naturally, diversity is not *always* good, which is the second ammendment
> to the thinking process.

Yes, diversity is actually a good idea when everybody concerned is
aware of what the others are doing, and at least coordinate to some
extent if they are in the same space.

You aren't going to achieve some monolithic conference that will
become the go-to place for everything in this field, for sure.

> It is not about an holier than thou attitude, it's about understanding
> that the Internet is truly the only functioning anarchy, and that "doing"

Perhaps I ought to explain.

That remark was about at least some people / groups who routinely send
takedown notices.  Arrogance coupled with a sad lack of clue at one
end (lots of tier 1 techs, often outsourced to some place with far
more customer support clue than actual abuse desk clue, employed to
send alerts, without the least idea of how to send these)

One particular vendor that saw a nigerian create a free email account
[EMAIL PROTECTED] of our domains], and went after our registrar trying to get
the domain itself canceled.  Some fun ensued when I emailed all that
to the VP of their parent company (for whom takedown services appears
to be a sideline, at best).  That lot has behaved themselves for a
while I must say

Another vendor who, after being given clear escalation paths, first
kept cc'ing our upstream abuse desk, and every role account OTHER than
abuse at our domain.  When they finally get enough clue hammered into
them to cc our abuse desk, they escalate to my work address within two
hours of that, demanding it be taken down.

Our abuse desk would handle tix within a business day, or even
earlier.  And email about phish takes priority right after (say) LE
requests that find their way there (instead of the special POC we
already have given most LE agencies).   So, escalating a manual
complaint after two hours is a bit thick, I'd say.

Anyway, that particular vendor  got told to take a hike, told that we
wouldnt accept any further reports from them (and that our automated
scripts kill about 20 for every one that they report anyway), and that
we'd contact the one client they seem to send these alerts for
directly and set up something more automated, where they could send us
a list (in a standard format, and verified at their end) and we'd take
it down automatically.  Of course with manual review later.

Neither of those two takedown services (especially not the one in #2)
is going to get anything like this offered to them.  Not until they
actually learn to play nice with other ISPs.  Which comes right back
to Sean's remark that I replied to.

Sorry for the long emails, but I do wish more takedown services (and
more abuse / security desks) would read the MAAWG abuse desk best
practice document ..

http://www.maawg.org/about/publishedDocuments/Abuse_Desk_Common_Practices.pdf

--srs
-- 
Suresh Ramasubramanian ([EMAIL PROTECTED])


Re: Q: What do ISPs really think about security issues?

2008-01-10 Thread Suresh Ramasubramanian

On Jan 11, 2008 10:02 AM, Sean Donelan <[EMAIL PROTECTED]> wrote:

> That's why I suggested to Rob and other folks the importance of listening
> to what they tell you how to work their particular processes.  Every large
> organization has them, although often the real processes are unwritten.
> Once you understand how the organization works, its much easier to figure
> out how to make it work for you.

All of it translates to

1. X more mailing lists to sign up to (lots and lots more email, great)
2. X more conferences to attend (more miles, yay, that's plat for this
year taken care of)
3. A sizeable amount of reinvention of the wheel too

Fun, isn't it?

Listening is, of course, important. As is coming in with an open mind
and without a holier than thou attitude .. especially if the attitude
is combined with the sort of URGENT!! TAKE THIS PHISHER DOWN NOW!!"
abrasiveness nobody else really appreciates.

That, by the way, is why I'm glad to see more and more organizations
holding collocated / joint meetings .. across, to use some igov jargon
(and for want of a better word) "stakeholder communities" .. banks
talking to ISPs talking to LE / regulators talking to independent
researchers etc.

--srs


Re: Q: What do ISPs really think about security issues?

2008-01-10 Thread Suresh Ramasubramanian

On Jan 11, 2008 1:17 AM, Rob Thomas <[EMAIL PROTECTED]> wrote:

> I'll second this point.  We've had great luck working with providers
> globally, but only after folks (such as Sean) took us under their
> wing and mentored us on the processes and setups that best help
> ISPs.  That alone would make a great *NOG presentation.

Setups that best help *ISPs*?  The fun part is that there's this
fundamental disconnect even within ISPs .. their CERT guys or security
guys go talk to each other, their abuse desks go talk to each other,
their packet pushers go talk to each other .. at
nspsec/gadicon/whatever, at MAAWG, at *NOG ..

There's little or no cross pollination between these groups, if at
all.   It is this kind of gap that needs to be bridged, just as much
as the gaps between ISPs and LE, ISPs and the anti phishing community
(banks etc, + the takedown vendor crowd), ISPs and the security
community etc etc needs bridging.

Leads to the kind of fun situation where a guy who does CERT/security
stuff for a very large ISP was up in front of a mostly abuse desk
audience, describing the Hotlan trojan (which compromises PCs to
script account creation and spamming through various webmail sites).

He's like "they were hitting us, Y, Z  pity I didnt know who to
contact at Y or Z at all"

That, when people from the Y and Z abuse teams (Z being us in this
story), were in the same room as the abuse team from X (which the guy
works for).  And where the X, Y and Z abuse desks know each other very
well, are in constant touch over email / IM / face to face at various
conferences etc.

Talk about fundamental disconnects ..  not that I know the packet
pushers from X and Y at all (the one packet pusher I knew from X
recently got assimilated by G, so that puts paid to that ..)

--srs

disclaimer: Names replaced by X, Y and Z solely to render this little
story fit for public consumption .. it took place at a nominally
closed meeting.  It wont take you too long to arrive at reasonably
plausible guesses for X, Y and Z, so I will leave you to the guessing.
No points for the right answer, no comment either .. what I'm pointing
out is general enough that it could be any X, Y and Z companies,


Re: Comcast.net Email Admin

2007-11-30 Thread Suresh Ramasubramanian

On Nov 30, 2007 3:59 AM, Stasiniewicz, Adam <[EMAIL PROTECTED]> wrote:

>
> Can a Comcast.net email admin please contact me?  One of your non-outermost
> email servers is running an SPF/SenderID filter (so all messages from
> domains with –all SPF/SenderID records are getting rejected, regardless of
> sending server).
>

Well, silly of them to [1] run an spf/sender id filter and [2] to run
it on an internal mailhost

Equally silly of you to publish spf records in this day and age
though.  Get rid of the record and that solves your issue rather
neatly.

srs

-- 
Suresh Ramasubramanian ([EMAIL PROTECTED])


Re: Misguided SPAM Filtering techniques

2007-10-23 Thread Suresh Ramasubramanian

On 10/24/07, William Herrin <[EMAIL PROTECTED]> wrote:

> You must have been irked by the airport wireless in ABQ then. I
> couldn't figure out why my ssh connection was failing until I checked
> the DNS and relized that even after clicking "free access" button in a
> web browser they returned 192.168.1.1 for almost every name requested.
> :(

I will trade your ABQ wireless for almost anything that uses Nomadix's
hotspot product .. the one that has a login page on http://1.1.1.1 -
even more broken dns jail, returns 0.0.0.0 if I remember correctly for
random queries till their upstream dns resolver actually decides to go
update its cache.  Probably because I have a v6 aware resolver + some
of the hosts I accessed were dual v4/v6 or something, not sure.

I got a really well filled /etc/hosts file for trips through paris
airport (where the paris airport hilton charges 25 EUR a day for wifi,
and it is 9 EUR a hour at the airport, ugh)

srs


Re: Misguided SPAM Filtering techniques

2007-10-21 Thread Suresh Ramasubramanian

On 10/22/07, William Herrin <[EMAIL PROTECTED]> wrote:

> Do you publish SPF records so that remote sites can detect forgeries
> claiming to be from your domain?

In other words "Do you play russian roulette with your email"?

John Levine's got something really good on this at
http://www.circleid.com/posts/spf_loses_mindshare/

-srs


Re: Myanmar Internet turned off

2007-10-03 Thread Suresh Ramasubramanian

On 10/4/07, Marshall Eubanks <[EMAIL PROTECTED]> wrote:

> Given the 6 hour sampling, I have to assume that there have been
> other short term re-appearances of routes to Burma.
> Whether this is due to internal struggles, accidents, or urgent needs
> for data transfer I cannot say.

I believe the NYT said something about embassies, international
organizations and such being allowed to retain their dedicated
satellite connectivity?


Re: Yahoo! Mail/Sys Admin

2007-09-23 Thread Suresh Ramasubramanian

On 9/24/07, Raymond L. Corbin <[EMAIL PROTECTED]> wrote:

> Can a Yahoo! Mail/SysAdmin contact me off list? I am having a problem
> with multiple mail servers within our network not being able to send to
> Yahoo mail servers.

http://help.yahoo.com/l/us/yahoo/mail/yahoomail/postmaster/

-- 
Suresh Ramasubramanian ([EMAIL PROTECTED])


Re: An IPv6 address for new cars in 3 years?

2007-06-28 Thread Suresh Ramasubramanian


On 6/29/07, Rich Emmings <[EMAIL PROTECTED]> wrote:


Topicality: Looks like someone, somewhere intends to be live with IPv6 in 3-5 
years.
Off Topic: The privacy and security ramifications boggle the mind



Fully mobile, high speed botnets?

--
Suresh Ramasubramanian ([EMAIL PROTECTED])


Re: Quarantining infected hosts (Was: FBI tells the public to call their ISP for help)

2007-06-19 Thread Suresh Ramasubramanian


On 6/19/07, Leigh Porter <[EMAIL PROTECTED]> wrote:

Agreed, SMTP is not really a special vector, other than it's ovbious
commercial spam use. So just block all the usual virus vector ports,
block 25 and force people to use your own SMTP servers and the problem
9this particular one goes away..


No. the part of it you target (outbound spam) merely relocates itself,
and your smtp servers become huge spam sinks.  Filter all you want and
you'll still leak spam unless you take those hosts down

And in the meantime those hosts will also be launching dos attacks,
hosting "fast flux" pills / warez / kiddy pr0n sites, carrying out id
/ card theft .. best to isolate and take them down.

You can port block at your edge till you burst and you'll still be in
a lot of hot water.

--
Suresh Ramasubramanian ([EMAIL PROTECTED])


Re: Quarantining infected hosts (Was: FBI tells the public to call their ISP for help)

2007-06-18 Thread Suresh Ramasubramanian


On 6/19/07, Per Heldal <[EMAIL PROTECTED]> wrote:

Before you make it a technical or HR issue you first have to either find
a way to make aggressive ISP policies profitable or
introduce .gov-regulations that say you either operate according to some
standard or not at all.


Well - you have to have your management behind you on this one - it
involves monitoring and a change or two all across your network, not
just at the edge, or the core.  Plus changes to support and other.

--
Suresh Ramasubramanian ([EMAIL PROTECTED])


Re: Quarantining infected hosts (Was: FBI tells the public to call their ISP for help)

2007-06-18 Thread Suresh Ramasubramanian


On 6/18/07, Jack Bates <[EMAIL PROTECTED]> wrote:


Joe also pointed out the biggest problem with blocking port 25; it pushes the
abuse towards the smarthosts. This creates a lot of issues. Smarthosts have to


So .. great. You have a huge spam problem that flew under your radar
as it was spread across multiple /24s or far larger netblocks, now
concentrated within far fewer servers that are part of the same
cluster.  That kind of makes your job a bit easier then .. half full
glass v/s half empty glass, and all that.


I'd rather monitor and filter traffic patterns on port 25 (and the various other
ports that are also often spewing other things) than block it. It's not unusual
to see tcp/25 spewing at the same time as udp/135 and tcp/445 or even tcp/1025.


[...]

Which is what a lot of the kit Sean posted about does ..

srs
--
Suresh Ramasubramanian ([EMAIL PROTECTED])


Re: Quarantining infected hosts (Was: FBI tells the public to call their ISP for help)

2007-06-18 Thread Suresh Ramasubramanian


On 6/18/07, Sean Donelan <[EMAIL PROTECTED]> wrote:

Automation is a non-starter unless you have people to deal with the
exceptions.  If you don't deal with exceptions, eventually problems with
any automated system will overwhelm you.  You can only hid behind IVR
recordings "You call is very important to us" for so long.


You're preaching to the choir there.  That still doesnt underrate the
importance of automating this.  Throwing people at it simply doesnt
scale.

--
Suresh Ramasubramanian ([EMAIL PROTECTED])


Re: Quarantining infected hosts (Was: FBI tells the public to call their ISP for help)

2007-06-18 Thread Suresh Ramasubramanian


On 6/18/07, Sean Donelan <[EMAIL PROTECTED]> wrote:

The great thing about opinions is everyone has one.
See also
http://www.maawg.org/port25


MAAWG's port 25 management document is kind of based on consensus. Joe
is a senior tech advisor at MAAWG. contributed substantially to that
document .. and those two presentations were made at a maawg (san
diego in 2005 if I remember right) so ..


The best answer is probably paying for a strong ISP abuse team.  But for
whatever reasons, some ISPs prefer to invest in other areas.


Bah. Not to underrate having a strong and clued abuse team. However,
throwing more people at this is a non starter.  You need to automate.

--
Suresh Ramasubramanian ([EMAIL PROTECTED])


Re: Quarantining infected hosts (Was: FBI tells the public to call their ISP for help)

2007-06-18 Thread Suresh Ramasubramanian


On 6/18/07, Jeroen Massar <[EMAIL PROTECTED]> wrote:

Of course, though 25 is (afaik ;) the most abused one that will annoy a
lot of other folks with spam, phishings and virus distribution, though
the latter seems to have come to a near halt from what I see.


Read these and weep, then -
http://darkwing.uoregon.edu/~joe/port25.pdf
http://darkwing.uoregon.edu/~joe/zombies.pdf

As Joe says (and I agree), trying to fix infected hosts on your
network by blocking port 25 is like treating lung cancer with cough
syrup.

srs
--
Suresh Ramasubramanian ([EMAIL PROTECTED])


Re: Quarantining infected hosts (Was: FBI tells the public to call their ISP for help)

2007-06-18 Thread Suresh Ramasubramanian


On 6/17/07, Jeroen Massar <[EMAIL PROTECTED]> wrote:


IMHO ISPs should per default simply feed port 25 outbound through their
own SMTP relays. BUT always have a very easy way (eg a Control Panel
behind a user/pass on a website) to disable this kind of filtering. This


Y'know, port 25 is just the tip of the iceberg when it comes to what
all an infected host can do .. which is why quite a lot of ISPs (Bell
Canada is particularly good at it, as are some others) are getting
good at deploying "Walled Gardens" - vlan the infected host into its
own little sandbox from where it can access only windows update, AV
update sites and the ISP's support pages, nothing else, on any port.

The user has to fix (disinfect, reimage, whatever) his host before he
contacts the ISP support desk and gets let back onto their network.

--srs


Re: Port 1080 probes from AOL

2007-05-31 Thread Suresh Ramasubramanian


On 5/31/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:



One of my virtual web host servers have been getting multiple probes to
TCP port 1080 (socks) every day for months from AOL IP addresses.

Is AOL known to be doing something relatively innocuous on that port?  I
ask because I have portsentry null routing IP addresses that make probes
like this.



If they're  [SOME HEX].ipt.aol.com rDNS'd IPs - those are AOL dialups,
so probably compromised / virus infected nodes


Re: ISP CALEA compliance

2007-05-23 Thread Suresh Ramasubramanian


On 5/24/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:

The ITU itself is likely irrelevant.  However, those who run ISPs across
either the left or right puddle are likely to be hit with CALEA-like issues
within the next few years, when their countries adopt similar laws.  And those
who think the EU's stand on privacy of data will prevent a CALEA should
consider the sorts of data-retention proposals that are getting floated
over there.


Fully agree. But there's a bit more "system" about what's going on in
the EU, and stronger privacy safeguards.  The Council of Europe
convention on cybercrime should be a good starting point, as should at
least some of the presos here:

http://www.itu.int/osg/spu/cybersecurity/pgc/2007/events/agenda.phtml

Look at Session 5, and the special post lunch session the council of
europe organized

The meeting was audiocast as well so if you dont mind running
realplayer you should be able to listen to the panels as well

--
Suresh Ramasubramanian ([EMAIL PROTECTED])


Re: ISP CALEA compliance

2007-05-23 Thread Suresh Ramasubramanian


On 5/24/07, Owen DeLong <[EMAIL PROTECTED]> wrote:

The more I think about this, the more I think a refereed
boxing^h^h^h^h^h^hpanel discussion between representatives
from DHS, FBI, EFF, FCC, Verisign, Neustar, and ITU might
be a good approach to this.


Humor me.. but just where does ITU come into this whole mess?

--
Suresh Ramasubramanian ([EMAIL PROTECTED])


<    1   2   3   4   5   6