RE: ingress SMTP

2008-09-13 Thread Frank Bulk
How do you alert mail server operators who are smarthosting their e-mail
through you that their outbound messages contain spam?

Frank

-Original Message-
From: Matthew Moyle-Croft [mailto:[EMAIL PROTECTED] 
Sent: Saturday, September 13, 2008 12:41 AM
To: Bill Stewart
Cc: nanog@nanog.org
Subject: Re: ingress SMTP

Hi Bill,

Bill Stewart wrote:
 In some sense, anything positive you an accomplish by blocking Port 25
 you can also accomplish by leaving the port open and advertising the IP
 address
 on one of the dynamic / home broadband / etc. block lists,
 which leaves recipients free to whitelist or blacklist your users.

Except that this tends to lead to a worse situation for people like
yourself who wish to run a mailserver - because ultimately you'll have
to resort to using an ISP's forwarder anyway because there will be more
spam from the IP ranges you're in leaving to the wide world, thus a
worse reputation, and so more blocking.

ie.  by blocking outbound SMTP by default and getting customers to use
our mail cluster their email is more likely to arrive and not be dropped
as coming from a potential spam source.

 I've toned down my vehemence about the blocking issue a bit -
 there's enough zombieware out there that I don't object strongly to an ISP
 that has it blocked by default  but makes it easy for humans to enable.

That's what we do - by default most customers have a small ACL applied
which protects them from traffic from various windows ports, ensures
SMTP goes via our mail cluster etc.   Having customers send mail out via
us is actually better because we do spam checking and can alert
customers to their machines being compromised etc (or at least customers
can look at their status themselves).   But, customers can easily turn
the filtering off via the portal we have.

We have no issues with customers running servers - most people don't,
and those who do value the ability to do so.

MMC

--
Matthew Moyle-Croft - Internode/Agile - Networks
Level 4, 150 Grenfell Street, Adelaide, SA 5000 Australia
Email: [EMAIL PROTECTED]  Web: http://www.on.net
Direct: +61-8-8228-2909 Mobile: +61-419-900-366
Reception: +61-8-8228-2999  Fax: +61-8-8235-6909






Re: ingress SMTP

2008-09-13 Thread Suresh Ramasubramanian
On Sat, Sep 13, 2008 at 11:38 PM, Frank Bulk [EMAIL PROTECTED] wrote:
 How do you alert mail server operators who are smarthosting their e-mail
 through you that their outbound messages contain spam?

 Frank

If those are actual mailservers smarthosting and getting MX from you
then you doubtless have quite a lot of reporting already set up.

Have you seen what Messagelabs, MXLogic etc do?

There's also feedback loops, ARF formatted, where users on those
mailservers can report inbound spam to the filtering vendor.

.. or was that a rhetorical question and am I missing something here?

-- 
Suresh Ramasubramanian ([EMAIL PROTECTED])



Re: ingress SMTP

2008-09-13 Thread *Hobbit*
How do you alert mail server operators who are smarthosting their
e-mail through you that their outbound messages contain spam?

You don't let them falsify their envelope or headers to contain
fields utterly unrelated to your own infrastructure, for starters.
They try it, their mail bounces.  It's a very rare piece of
spam that actually comes from who it says it comes from anymore.

Do that before thinking about rate-limiting or any other fanciness,
and you've likely licked 90% of the problem right there.  A
smarthost with a strong sense of self backed up by port-25
rules is exactly what I'm talking about, and if certain large
providers ever *read* their abuse boxes they'd find the same
advice from me in more than one instance followed by a clear
example of why.

_H*



Re: ingress SMTP

2008-09-13 Thread Matthew Moyle-Croft

*Hobbit* wrote:

How do you alert mail server operators who are smarthosting their
e-mail through you that their outbound messages contain spam?

You don't let them falsify their envelope or headers to contain
fields utterly unrelated to your own infrastructure, for starters.
They try it, their mail bounces.  It's a very rare piece of
spam that actually comes from who it says it comes from anymore.
  
Are you suggesting that only ISP domains should be allowed through?  
(eg.  [EMAIL PROTECTED])
If you're forcing people to use your mail servers as a smart host then 
you wouldn't be very popular ...


MMC




RE: ingress SMTP

2008-09-13 Thread Frank Bulk
Apologies for not being more clear, because I see the responses going in
tangents I hadn't expected.

Most anti-spam products drop the connection or issue some kind of rejection
message during the SMTP exchange.  If the connection is dropped, the
subscriber's MTA/MUA will likely try and try again until it reaches
expiration time.  For MS Exchange I think that's two or three days.  For
Outlook Express, that message just sits in the Outbox.  If a rejection
message was issued, hopefully the sender can interpret what the MUA is
saying, or the MTA sends back an undeliverable.

So, for service providers who require their subscribers to smarthost
messages through their server, how are they letting the subscribers know in
some kind of active way?  

Frank

-Original Message-
From: Suresh Ramasubramanian [mailto:[EMAIL PROTECTED] 
Sent: Saturday, September 13, 2008 8:39 PM
To: Frank Bulk
Cc: Matthew Moyle-Croft; nanog@nanog.org
Subject: Re: ingress SMTP

On Sat, Sep 13, 2008 at 11:38 PM, Frank Bulk [EMAIL PROTECTED] wrote:
 How do you alert mail server operators who are smarthosting their e-mail
 through you that their outbound messages contain spam?

 Frank

If those are actual mailservers smarthosting and getting MX from you
then you doubtless have quite a lot of reporting already set up.

Have you seen what Messagelabs, MXLogic etc do?

There's also feedback loops, ARF formatted, where users on those
mailservers can report inbound spam to the filtering vendor.

.. or was that a rhetorical question and am I missing something here?

--
Suresh Ramasubramanian ([EMAIL PROTECTED])




Re: ingress SMTP

2008-09-12 Thread Bill Stewart
Hi, Hobbit - we met back in the late 80s / early 90s at various New Jersey
things
such as Trenton Computer Fair, but you probably don't remember me; Tigger
says hi as well...

Be Liberal in what you accept, be conservative in what you send,
and be really really clear in your error messages,
except occasionally if you're lying to spammers.

IMHO, selling somebody connectivity that blocks various ports isn't
selling them Internet Service, it's selling them Walled Garden Couch-Potato
Service.
For many people that's ok, and if they're sending traffic on Port 25
it's only because some zombieware has taken over their PC,
as opposed to because they're actually trying to send it.

But the old PC on my desk upstairs has about 2500 times as much CPU
and 500 times as much disk space as the Vaxen that I used
to run email for a department of 30 people,
and the network connection is about 300 times as fast,
and there's no particular reason that it shouldn't have
full end-to-end Internet presence like anybody's commercial mail server.
That's different from 15 years ago when I only had dialup at home,
because dialup wasn't really a full-time process, and sending mail was
sufficiently unreliable that it made sense to run a dumb client at home
that talked to a full-time smart host that knew how to queue messages and
retry on failure.

Blocking port 25 has become popular, not only with
walled-garden connectivity services that are really scared of their
customers running their own servers (e.g. most cable modem companies),
but also with other ISPs that don't want to deal with the problems
of having customers who are spamming (whether deliberate or zombified.)
So anybody buying something lower-priced than a T1 typically needs to
have a mail client or mail transfer agent that can use other ports,
unless they want to trust their ISP's mail service or use webmail.
And also obviously if you're running an outbound mail relay smarthost for
your clients
you need to accept mail from known people on the various authenticated ports
in case they're stuck behind a randomly misbehaving ISP, and you should also
support encrypted SMTP in general.

In some sense, anything positive you an accomplish by blocking Port 25
you can also accomplish by leaving the port open and advertising the IP
address
on one of the dynamic / home broadband / etc. block lists,
which leaves recipients free to whitelist or blacklist your users.
And you can certainly provide better service to your customers by
redirecting Port 25 connections to an SMTP server that returns
550 We block Port 25 - see www.example.net/faq/port25blocking
or some similarly useful message as opposed to just dropping the packets.

I've toned down my vehemence about the blocking issue a bit -
there's enough zombieware out there that I don't object strongly to an ISP
that has it blocked by default  but makes it easy for humans to enable.

-- 

Thanks; Bill Stewart

Note that this isn't my regular email account - It's still experimental so
far.
And Google probably logs and indexes everything you send it.


Re: ingress SMTP

2008-09-12 Thread Mark Foster



Blocking port 25 has become popular, not only with
walled-garden connectivity services that are really scared of their
customers running their own servers (e.g. most cable modem companies),
but also with other ISPs that don't want to deal with the problems
of having customers who are spamming (whether deliberate or zombified.)
So anybody buying something lower-priced than a T1 typically needs to
have a mail client or mail transfer agent that can use other ports,
unless they want to trust their ISP's mail service or use webmail.


What proportion of an ISP's customers genuinely need the ability to talk 
to external hosts on 25/tcp? I mean really?  We're talking about home 
users who can use their home ISP SMTP service and it'll meet their needs.


Agree that there should be a mechanism to opt out, but smart organisations 
will offer alternative, authenticated services to address any requirement 
for direct SMTP (except perhaps for situations where you actually intend 
to run a mail server at home.)




In some sense, anything positive you an accomplish by blocking Port 25
you can also accomplish by leaving the port open and advertising the IP
address
on one of the dynamic / home broadband / etc. block lists,
which leaves recipients free to whitelist or blacklist your users.
And you can certainly provide better service to your customers by
redirecting Port 25 connections to an SMTP server that returns
550 We block Port 25 - see www.example.net/faq/port25blocking
or some similarly useful message as opposed to just dropping the packets.


I concur with the latter, but then again, if it's well publicised and 
clear from the get-go that external pot 25 is not a service offered, it 
should be no big deal.
I do disagree that advertising the IP on blocklists serves the same 
purpose, because it pushes responsibility to a third party (ala ISP is 
waving its hands in the air and saying 'it's not my problem, we're just a 
means of access to the cloud', and suddenly third party outfits get a 
whole bunch more clout than is necessary - and noise levels on the 
internet go up and/or junk volumes go up.


(Wonder how much spam the port-25-blockers actually stop?)

Would seem easier and a whole bunch more flexible for ISPs to manage their 
own turf, as it were, third party blocklists are a little on the ugly 
side. (False Positives are very hard to get dealt with, from experience.)



I've toned down my vehemence about the blocking issue a bit -
there's enough zombieware out there that I don't object strongly to an ISP
that has it blocked by default  but makes it easy for humans to enable.


Fair enough. I think there's probably agreement on this point, but I would 
also make the point that the only legitimate reason to enable 25/tcp 
outbound to external hosts should be to run a mail server.  SMTP-Auth for 
private use, for example, shouldn't be on 25.


Mark.



Re: ingress SMTP

2008-09-12 Thread Matthew Moyle-Croft

Hi Bill,

Bill Stewart wrote:

In some sense, anything positive you an accomplish by blocking Port 25
you can also accomplish by leaving the port open and advertising the IP
address
on one of the dynamic / home broadband / etc. block lists,
which leaves recipients free to whitelist or blacklist your users.
  
Except that this tends to lead to a worse situation for people like 
yourself who wish to run a mailserver - because ultimately you'll have 
to resort to using an ISP's forwarder anyway because there will be more 
spam from the IP ranges you're in leaving to the wide world, thus a 
worse reputation, and so more blocking.  

ie.  by blocking outbound SMTP by default and getting customers to use 
our mail cluster their email is more likely to arrive and not be dropped 
as coming from a potential spam source.  


I've toned down my vehemence about the blocking issue a bit -
there's enough zombieware out there that I don't object strongly to an ISP
that has it blocked by default  but makes it easy for humans to enable.
  
That's what we do - by default most customers have a small ACL applied 
which protects them from traffic from various windows ports, ensures 
SMTP goes via our mail cluster etc.   Having customers send mail out via 
us is actually better because we do spam checking and can alert 
customers to their machines being compromised etc (or at least customers 
can look at their status themselves).   But, customers can easily turn 
the filtering off via the portal we have.


We have no issues with customers running servers - most people don't, 
and those who do value the ability to do so.


MMC

--
Matthew Moyle-Croft - Internode/Agile - Networks
Level 4, 150 Grenfell Street, Adelaide, SA 5000 Australia
Email: [EMAIL PROTECTED]  Web: http://www.on.net
Direct: +61-8-8228-2909 Mobile: +61-419-900-366
Reception: +61-8-8228-2999  Fax: +61-8-8235-6909




Re: ingress SMTP

2008-09-11 Thread Robert E. Seastrom

Joel Jaeggli [EMAIL PROTECTED] writes:

 Does anyone bother to run an MSA on 587 and *not* require authentication?

 All my normal relay or lack thereof and delivery rules are in place on
 my 587 port. Of course muas's and mtas will also do tls as well as
 authentication over port 25 where available. I don't sea any reason to
 preclude a host that would be allowed to relay via 25 to do so via 587...

 Congruent policy makes administration simpler.

Counterpoint here:

I do not allow relaying (only local delivery and maybe MX but I think
I'm not doing secondary MX for anyone anymore) over port 25 and I do
not allow authentication over port 25 either.

Likewise, I do not allow unauthenticated local delivery on port 587,
demand STARTTLS on port 587, and generally you have to auth to do anything.

The extra effort required to set this up (exim recipes available) pays
dividends by ensuring that people have their MUAs configured properly
at home - otherwise they won't work at all - and helps avoid whiney
long distance phone calls asking for help from some user who's off in
Bonaire or something.

-r





Re: ingress SMTP

2008-09-10 Thread Robert E. Seastrom

Mark Foster [EMAIL PROTECTED] writes:

 On Fri, 5 Sep 2008, Mikael Abrahamsson wrote:

 We don't allow most of our residential customer base to speak SMTP
 TCP/25 to anywhere at all (and we have millions of them). Wish more
 ISPs would do the same.


 Probably fair enough, if you as an ISP can get away with enforcing
 this sort of policy then so much the better.

 However relaying through your own ISPs 25/tcp should surely then make
 it relatively easy for noise to be tracked down and nailed at the
 source - by ISPs?  (Do abuse@ desks investigate spam these days?)

As others have noted, intercepting 25 breaks SPF.  It also
gratuitously creates weird anomalous behaviour that is much harder for
a reasonably clued person to debug than a simple blocked port, so it's
more likely to buy you a help desk call (with a subtle problem that
your level 1 folks probably can't get sorted anyway).  Perhaps you
aren't in a position where you have to care about the balance sheets,
but keeping the load off the help desk is a wonderful thing to do in
terms of cost control.  Doing traffic analysis looking for noise is
just extra work for your abuse people - when I was setting policy for
this sort of thing we put a cap at 1000 discrete destinations per day
per authenticated user (with a daily report of who'd busted it, and
most days the report was 0) and only once ran into a problem where
someone was legitimately trying to send mail to a bajillion people and
called the help desk.

-r




Re: ingress SMTP

2008-09-10 Thread *Hobbit*
I am completely convinced that abuse@ in most big providers is a
black hole with an autoresponder hung off it, and nothing ever
gets done with complaints.  NO HUMAN ever sees them, and even if
they did, most of the humans at these outfits wouldn't recognize
a Received: header if it bit them in the ass.

I invite and welcome anyone from the big boyz I named in the
original question -- verizon, comcast, roadrunner,  charter,
bellsouth/SBC, and now Google -- *especially* Gmail, given that
counterproductive privacy policy we noted -- to inform me
otherwise.

_H*



Re: ingress SMTP

2008-09-10 Thread Joel Jaeggli
Jay R. Ashworth wrote:
 On Wed, Sep 03, 2008 at 12:58:53PM -0400, Nicholas Suan wrote:
 On Sep 3, 2008, at 12:49 PM, Jay R. Ashworth wrote:
 You're forgetting that 587 *is authenticated, always*.
 I'm not sure how that makes much of a difference since the usual spam  
 vector is malware that has  (almost) complete control of the machine  
 in the first place.
 
 Well, that depends on MUA design, of course, but it's just been pointed
 out to me that the RFC says MAY, not MUST. 
 
 Oops.
 
 Does anyone bother to run an MSA on 587 and *not* require authentication?

All my normal relay or lack thereof and delivery rules are in place on
my 587 port. Of course muas's and mtas will also do tls as well as
authentication over port 25 where available. I don't sea any reason to
preclude a host that would be allowed to relay via 25 to do so via 587...

Congruent policy makes administration simpler.

 Cheers,
 -- jra




Re: ingress SMTP

2008-09-07 Thread Eugeniu Patrascu


On Sep 3, 2008, at 6:52 PM, Tim Sanderson wrote:

Anybody not wanting to use their ISP email would notice it. I see  
filtering 25 FROM the customer as something that is not likely to  
happen because of this. When a customer buys bandwidth, they want to  
be able to use it for whatever they choose. This would be just one  
more restriction giving competitive advantage to any ISP not doing  
the filtering.




In my country, some ISPs block outbound SMTP for home users and they  
require those users to use the ISPs SMTP server for outgoing which  
happen to do antivirus and antispam filtering.


They will unblock port 25 if you provide  good and rational  
explanation why you need it open and that you understand that in case  
of problems you will be held responsible.


Eugen.



Re: ingress SMTP

2008-09-07 Thread Michael Thomas

Eugeniu Patrascu wrote:


On Sep 3, 2008, at 8:08 PM, Winders, Timothy A wrote:



Yes, setting up a 587 submit server internally would be best, but man 
power

is at a premium and it hasn't happened.



I don't know what SMTP server you're using, but on Postfix you just 
need to uncomment one line in master.cf, do a reload and that's it. it 
takes less than a minute to do it on server. YMMV.

Would that it were so easy :) You also have the more daunting task
of hooking up your auth/aaa infrastructure with your MTA's, and all
of the care and feeding that entails.

 Mike



Re: ingress SMTP

2008-09-07 Thread matthew


- Original Message -
From: Michael Thomas [EMAIL PROTECTED]
Date: Monday, September 8, 2008 7:31 am
Subject: Re: ingress SMTP

 Would that it were so easy :) You also have the more daunting task
 of hooking up your auth/aaa infrastructure with your MTA's, and all
 of the care and feeding that entails.

As a matter of interest, it took but a couple of person hours to sort
this out at my last place of work, the largest time chunk in equation
was the compiling of TLS and the various SASL modules into Postfix.  The
second from largest chunk of time was to get the script to get the
information required from the various other back end mail servers on
campus, including, but not limited to, Lotus Notes, M$ Exchange, and
Sun/iPlanet messaging server and it's LDAP server.  The only down side
to the system was password changed took up to 15 minutes to get to the
mail systems as there was no direct connection between the external
gateways and the internal auth systems.

Of course the above doesn't take into account the several weeks of
political badgering and grandstanding that we endured to get the
faculties to actually accept that that was the way it was going to be. 
They couldn't stand that there would only be incoming and outgoing mail
via the central gateway.  Such is life at Universities.

Regards,

M 



RE: SMTP rate-limits [Was: Re: ingress SMTP]

2008-09-06 Thread Frank Bulk
Can anyone comment authoritatively on the percentage of spam that's from a
leaky faucet compared to fire hose?  The stuff I see in my customer base are
all fire hoses at the rate of 2.5, sometimes 5 message connection attempts
per second. (I bet an academic could study the rate of spam emissions from a
certain IP to identify their upstream bandwidth).

Frank

-Original Message-
From: Michael Thomas [mailto:[EMAIL PROTECTED] 
Sent: Friday, September 05, 2008 9:46 AM
To: Paul Ferguson
Cc: nanog@nanog.org
Subject: Re: SMTP rate-limits [Was: Re: ingress SMTP]

snip 

I thought that these bot nets were so massive that it is pretty
easy for them to fly under the radar for quotas, rate limiting, etc.
Not that all bot nets are created equal, and there aren't local hot
spots for whatever reason, but putting on the brakes in a way that
users wouldn't feel pain is simply not going to make any appreciable
difference in the overall mal-rate.

No?

   Mike





Re: ingress SMTP

2008-09-05 Thread Simon Waters
On Friday 05 September 2008 00:33:54 Mark Foster wrote:

 *rest snipped*

 Is the above described limitation a common occurrance in the
 world-at-large?

If the ISP blocks port 25, then the ISP is taking responsibility for 
delivering all email sent by a user, and they have to start applying rate 
limits. Otherwise if they send all email from their users, all they've done 
is take the spam, and mix it in with the legitimate email, making spam 
filtering harder.

Locally one of the big ISP insists you register all sender addresses with 
them, so all the spam from them has legitimate sender credentials.

The problem is that by blocking port 25, you are basically then switching 
users to arbitrary per ISP rules for how to send email. This is probably good 
for ISPs (provides some sort of lock-in) but bad for their users.

Whilst the antispam folk think it is a godsend because their block lists are 
smaller, it is relatively easy to block spewing IP addresses, and hard to 
filter when good and bad email is combined. Which is why they hate Google 
hiding the source IP address.

This will continue until the real issue is addressed, which is the security of 
end user systems.



Re: ingress SMTP

2008-09-05 Thread Mikael Abrahamsson

On Fri, 5 Sep 2008, Simon Waters wrote:


If the ISP blocks port 25, then the ISP is taking responsibility for
delivering all email sent by a user, and they have to start applying rate
limits.


MUAs should stop sending email via 25 and use 587 or equivalent instead. 
There is little actual reason why someone should be able to send TCP/25 
SMTP email from a residential connection when most software support 
authenticated TCP/587 submits.


We don't allow most of our residential customer base to speak SMTP TCP/25 
to anywhere at all (and we have millions of them). Wish more ISPs would do 
the same.


--
Mikael Abrahamssonemail: [EMAIL PROTECTED]



SMTP rate-limits [Was: Re: ingress SMTP]

2008-09-05 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -- Simon Waters [EMAIL PROTECTED] wrote:

If the ISP blocks port 25, then the ISP is taking responsibility for 
delivering all email sent by a user, and they have to start applying rate 
limits. Otherwise if they send all email from their users, all they've done
is take the spam, and mix it in with the legitimate email, making spam 
filtering harder.


Okay, I can understand why an ISP might want to apply SMTP
rate-limits, but to clarify, I'm assuming you meant that ISPs
(if they do block tcp/25 outbound to anything other than their
own MTAs) need to watch for excessive SMTP utilization, which might
indicate a spammer-client (?).

...as opposed to arbitrary SMTP rate-limits.

Yes?

- - ferg

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFIwO90q1pz9mNUZTMRAneaAJwMgmIz99bPUYJ2HgUD6Zs1MOFXgQCgmsPY
eUtV2bBKymWfxNwNOgWfp5w=
=bdk+
-END PGP SIGNATURE-


--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/




Re: ingress SMTP

2008-09-05 Thread Mark Foster



On Fri, 5 Sep 2008, Mikael Abrahamsson wrote:


On Fri, 5 Sep 2008, Simon Waters wrote:


If the ISP blocks port 25, then the ISP is taking responsibility for
delivering all email sent by a user, and they have to start applying rate
limits.


MUAs should stop sending email via 25 and use 587 or equivalent instead. 
There is little actual reason why someone should be able to send TCP/25 SMTP 
email from a residential connection when most software support authenticated 
TCP/587 submits.


We don't allow most of our residential customer base to speak SMTP TCP/25 to 
anywhere at all (and we have millions of them). Wish more ISPs would do the 
same.




Probably fair enough, if you as an ISP can get away with enforcing this 
sort of policy then so much the better.


However relaying through your own ISPs 25/tcp should surely then make it 
relatively easy for noise to be tracked down and nailed at the source - by 
ISPs?  (Do abuse@ desks investigate spam these days?)






Re: SMTP rate-limits [Was: Re: ingress SMTP]

2008-09-05 Thread Tony Finch
On Fri, 5 Sep 2008, Michael Thomas wrote:

 I thought that these bot nets were so massive that it is pretty
 easy for them to fly under the radar for quotas, rate limiting, etc.
 Not that all bot nets are created equal, and there aren't local hot
 spots for whatever reason, but putting on the brakes in a way that
 users wouldn't feel pain is simply not going to make any appreciable
 difference in the overall mal-rate.

Right.

In practice the rate of delivery failures is a more useful indication of
spam than the overall email rate.

Tony.
-- 
f.anthony.n.finch  [EMAIL PROTECTED]  http://dotat.at/
IRISH SEA: NORTHEASTERLY BACKING NORTHERLY 6 TO GALE 8, BUT CYCLONIC 5 IN
SOUTH AT FIRST. MODERATE BECOMING ROUGH. SQUALLY SHOWERS. MODERATE OR GOOD.



Re: ingress SMTP

2008-09-05 Thread Jeff Kinz
On Fri, Sep 05, 2008 at 10:35:15AM +0200, Mikael Abrahamsson wrote:
 On Fri, 5 Sep 2008, Simon Waters wrote:
 
 If the ISP blocks port 25, then the ISP is taking responsibility for
 delivering all email sent by a user, and they have to start applying rate
 limits.
 
 MUAs should stop sending email via 25 and use 587 or equivalent instead. 
 There is little actual reason why someone should be able to send TCP/25 
 SMTP email from a residential connection when most software support 
 authenticated TCP/587 submits.

Just FYI- the ISP has the same 220 email address limit even when I send
thru port 587, authenticated.  (its comcast)
 
 We don't allow most of our residential customer base to speak SMTP TCP/25 
 to anywhere at all (and we have millions of them). Wish more ISPs would do 
 the same.
 
 -- 
 Mikael Abrahamssonemail: [EMAIL PROTECTED]

-- 



Re: ingress SMTP

2008-09-04 Thread Jean-François Mezei
re: intercepting port 25 calls and routing them to the ISP's own SMTP
server.

Consider an employee of chocolate.com working from home. he connects to
Chocolate.com's SMTP server to send mail, but his ISP intercepts the
connection and routes the email via its own. The email will then be sent
 by the ISP's SMTP server.

In a context where SPF has been implemented, it means that the email
will have been sent by an SMTP server that has not been authorized to
send emails from chocolate.com and thus rejected by the recipient, and
it is not clear how the rejection message would be handled.

Also, the ISP might not only intercept the call, but then reject the
email because it doesn't have a from from the ISP's domain.


Secondly, and more importantly. If you are dealing with mass market ISPs
who have clear no servers policies, then no customer would have
legitimate need to run an SMTP server from home.

However, there are smaller ISPs who do cater to SOHO /small businesses
and those would have legitimate needs to run their own SMTP servers, and
if the small ISP ends up using last mile from a large ISP, that large
ISP would be negatively impacting the smaller ISP's customers.

One option is to block port 25, but allow unblocking on an individual
basis to those who have fixed IPs or make a good justification to their
ISP that they need the port unblocked.

In terms of mass-market people using email services from the outside of
their ISP (hotmail, yahoo, gmail), then I guess port 587 would be the
required way to get it done).





Re: ingress SMTP

2008-09-04 Thread Tony Finch
On Wed, 3 Sep 2008, Jay R. Ashworth wrote:

 Well, that depends on MUA design, of course, but it's just been pointed
 out to me that the RFC says MAY, not MUST.

Note that there are TWO relevant RFCs: RFC 4409 and RFC 5068. The latter
says:

3.1.  Best Practices for Submission Operation

   Submission Authentication:

  MSAs MUST perform authentication on the identity asserted during
  all mail transactions on the SUBMISSION port, even for a message
  having a RCPT TO address that would not cause the message to be
  relayed outside of the local administrative domain.

Tony.
-- 
f.anthony.n.finch  [EMAIL PROTECTED]  http://dotat.at/
FISHER GERMAN BIGHT: SOUTHWESTERLY 5 TO 7, OCCASIONALLY GALE 8 IN GERMAN
BIGHT, DECREASING 4 AT TIMES. ROUGH OR VERY ROUGH, BECOMING MODERATE LATER.
SQUALLY SHOWERS. MODERATE OR GOOD.



Re: ingress SMTP

2008-09-04 Thread Tony Finch
On Thu, 4 Sep 2008, Jean-François Mezei wrote:

 Consider an employee of chocolate.com working from home. he connects to
 Chocolate.com's SMTP server to send mail, but his ISP intercepts the
 connection and routes the email via its own. The email will then be sent
 by the ISP's SMTP server.

A user that has this problem has failed to choose the right port number
and set up SMTP authentication and TLS properly.

Tony.
-- 
f.anthony.n.finch  [EMAIL PROTECTED]  http://dotat.at/
ROCKALL MALIN: MAINLY NORTHERLY 4 OR 5 INCREASING 5 TO 7, PERHAPS GALE 8 LATER
IN ROCKALL. MODERATE OR ROUGH. SHOWERS. GOOD.

Re: ingress SMTP

2008-09-04 Thread Tony Finch
On Wed, 3 Sep 2008, Keith Medcalf wrote:

 Why would the requirements for authentication be different depending on
 the port used to connect to the MTA?

It's easier to configure the MTA if you make a distinction between
server-to-server traffic and client-to-server traffic. In fact my systems
distinguish three classes of traffic: MX, message submission, and
smarthost.

The MX service has lots of anti-spam features. You want to separate it
from the others so that techniques like teergrubing don't make message
submission painfully slow. You can also avoid interoperability problems
with server-to-server TLS. You can limit the number of connections used by
the MX service to that when it is being hammered by spammers, you can
reserve some capacity so that message submission and outgoing relay still
work.

Having a message submission service that always requires TLS and
authentication makes it easier for users to check their configuration. A
mistake such as not turning on AUTH can be hidden when they test on their
home network, only to be discovered later when they are roaming far from
tech support.

Separating your smarthost (outgoing relay service) from your MX can avoid
some strange problems. Back in the dim and distant past before remote
AUTHed message submission and before separate MX and smarthost, our
roaming users who failed to change their smarthost setting would have
working email when contacting colleagues but not anyone else, with a
mysterious relaying is not permitted error instead of something clear
and helpful. There's also some advantage to making it harder for spammers
to work out the name of your smarthost: we once (years ago) had a
problem with an open web proxy that spammers used as the first half of a
two-stage open relay, the second half of which was the MX of the proxy's
parent domain.

We separate these functions by having separate names and IP addresses for
each one. They are all just facets of the same MTA, so we don't have to
maintainn lots of different configurations.

Tony.
-- 
f.anthony.n.finch  [EMAIL PROTECTED]  http://dotat.at/
LUNDY FASTNET IRISH SEA: WESTERLY OR SOUTHWESTERLY 4 OR 5, BECOMING CYCLONIC
OR NORTHEASTERLY 5 TO 7, PERHAPS GALE 8 LATER. ROUGH OR VERY ROUGH. RAIN OR
SHOWERS. MODERATE OR GOOD, OCCASIONALLY POOR.



Re: ingress SMTP

2008-09-04 Thread Alec Berry
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Robert Bonomi wrote:

 One small data-point -- on a personal vanity domain, approximately 2/3 of 
 all the spam (circa 15k junk emails/month) was 'direct to inbound MX' 
 transmissions.  The vast majority of this is coming from end-user machines 
 outside of North America. 

This confirms the limited data I have. I configure my edge firewall (pf)
to drop anything to/from the Spamhaus DROP list, as well as sendmail to
use their XBL. The DROP list seems like it blocks mostly MX lookups
(nice to see the blocking of mail start so early in the process!), so it
is hard to say how many SMTP connections never happen (remote server/bot
does not know where to connect). The XBL list, which is mostly
residential IPs around the world, seems to be the single most effective
technique in blocking incoming traffic-- on port 25. Obviously, these
connections are coming from ISPs that do *not* block egress TCP 25.

Slightly off topic-- I found it quite easy to configure the DROP list to
work with pf (or is that the other way around?). I would be happy to
share the small Perl script that updates the pf table. When I configured
the DROP list on a free public wireless system I maintain, I was amazed
at how much egress traffic it blocked-- obviously rogue/bad/evil
webservers, IRC hosts, etc.

I wonder if anyone else is using it that way?

...
alec

- --
`
/ Alec Berry \__
| Senior Partner and Director of Technology \
| PGP/GPG key 0xE8E9030F|
| http://alec.restontech.com/#PGP   |
|---|
| RestonTech, Ltd.  |
|http://www.restontech.com/ |
|  Phone: (703) 234-2914|
\___/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIv+YdREO1P+jpAw8RAnWzAKDxOmneR6j6DBVyo5/CO1wRYngorQCgo9SJ
sArBQqQStX7zIuYK3qo1El0=
=C2FM
-END PGP SIGNATURE-



Re: ingress SMTP

2008-09-04 Thread Mark Andrews
In article [EMAIL PROTECTED] you write:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Robert Bonomi wrote:

 One small data-point -- on a personal vanity domain, approximately 2/3 of 
 all the spam (circa 15k junk emails/month) was 'direct to inbound MX' 
 transmissions.  The vast majority of this is coming from end-user machines 
 outside of North America. 

This confirms the limited data I have. I configure my edge firewall (pf)
to drop anything to/from the Spamhaus DROP list, as well as sendmail to
use their XBL. The DROP list seems like it blocks mostly MX lookups
(nice to see the blocking of mail start so early in the process!), so it
is hard to say how many SMTP connections never happen (remote server/bot
does not know where to connect). The XBL list, which is mostly
residential IPs around the world, seems to be the single most effective
technique in blocking incoming traffic-- on port 25. Obviously, these
connections are coming from ISPs that do *not* block egress TCP 25.

You do realise that there a mail clients that check MX
records *before* submitting email (or before on sending the
email) so that typos get detected in the client before any
email is sent from the client.

But you would never see those false positives.  I know they
exist because I've experienced them because I work from
home and even though I tunnel email out via the office
servers I prefer the typos to be caught locally.

I doubt this will change your mind but it might stop someone
else from making a bad decision to do what you are doing.

Mark

Slightly off topic-- I found it quite easy to configure the DROP list to
work with pf (or is that the other way around?). I would be happy to
share the small Perl script that updates the pf table. When I configured
the DROP list on a free public wireless system I maintain, I was amazed
at how much egress traffic it blocked-- obviously rogue/bad/evil
webservers, IRC hosts, etc.

I wonder if anyone else is using it that way?

...
alec

- --
`
/ Alec Berry \__
| Senior Partner and Director of Technology \
| PGP/GPG key 0xE8E9030F|
| http://alec.restontech.com/#PGP   |
|---|
| RestonTech, Ltd.  |
|http://www.restontech.com/ |
|  Phone: (703) 234-2914|
\___/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIv+YdREO1P+jpAw8RAnWzAKDxOmneR6j6DBVyo5/CO1wRYngorQCgo9SJ
sArBQqQStX7zIuYK3qo1El0=
=C2FM
-END PGP SIGNATURE-






Re: ingress SMTP

2008-09-04 Thread David Champion
  Well, that depends on MUA design, of course, but it's just been pointed
  out to me that the RFC says MAY, not MUST.

(That was me.)


 Note that there are TWO relevant RFCs: RFC 4409 and RFC 5068. The latter
 says:
 
 3.1.  Best Practices for Submission Operation

Thanks, Tony.  I hadn't taken account of superceding RFCs, and quoted
2476 to Jay.  2476 permits authN without encouraging or requiring it,
but 4409 both obsoletes 2476 and makes authN mandatory, so it's more
even than a best practice.  It's the law, to the extent that two sites
involved in a dispute may or may not consider RFC to be law.

But as I noted privately, sendmail for one enables MSP out of the box
without authentication -- or did the last few times I set it up --
so there's certainly a significant base of systems that at least are
running MSP on 587 without requiring authentication.  In such cases,
blocking ports is just whacking moles, whether you ticket and fine the
moles for violating RFC or not.

-- 
 -D.[EMAIL PROTECTED]NSITUniversity of Chicago



Re: ingress SMTP

2008-09-04 Thread Alec Berry
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Mark Andrews wrote:

  You do realise that there a mail clients that check MX
  records *before* submitting email (or before on sending the
  email) so that typos get detected in the client before any
  email is sent from the client.

I think you are not familiar with the difference between the DROP list
and the XBL. The DROP list is *not* an RBL!

I do not allow any traffic at all to or from the DROP list-- including
MX lookups. I can't think of any good reasons why I would.

The XBL is used only to block mail transport-- it is configured in
sendmail, not at the firewall. The scenario you lay out will still work:

- - end user on a dial up that happens to be on the XBL (common)
- - end user queries MX records, either directly or via their name server
- - end user submits mail to their SMTP server (not on the XBL)
- - SMTP server transports mail to my system

Unless one of those systems mentioned above is a hijacked name server in
Kyiv (and thus on the DROP list), everything will work.

...
alec

- --
`
/ Alec Berry \__
| Senior Partner and Director of Technology \
| PGP/GPG key 0xE8E9030F|
| http://alec.restontech.com/#PGP   |
|---|
| RestonTech, Ltd.  |
|http://www.restontech.com/ |
|  Phone: (703) 234-2914|
\___/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIv/dTREO1P+jpAw8RAqiyAKDJt7FbFvplXB1JTe+dKDOOSXUijQCdH/cZ
4m4o9vE5FS96huARs2Rq5yU=
=Paen
-END PGP SIGNATURE-



Re: ingress SMTP

2008-09-04 Thread Mark Foster
 On Thu, Sep 04, 2008 at 02:01:48PM +1200, Mark Foster wrote:
 So in terms of the OP,
 I don't see why joe-user on a dynamic-IP home connection should need the
 ability to use port 25 to talk to anywhere but their local ISP SMTP
 server
 on a normal basis[1].

 Whats a normal basis?

 My Home ISP won't let me send to more than 200 (or so) email addresses
 per day.  If I used my ISP's email system I would constantly be losing
 my email service due to hitting the limit.

 I do the field scheduling for my local town soccer league.
 [Never volunteer!  :-)   ]

 So when I send a few announcements out to coaches, referees and
 administrators, I hit that limit and get my email shutoff for two days
 or so.  I eventually switched to MailHop at DynDNS (smtp auth)

 I would have used port 25 but our ISP has begun blocking outbound
 port 25 nationwide, due to large amount of outbound spam from their
 customers. :-)



*rest snipped*

Is the above described limitation a common occurrance in the world-at-large?

I've not heard of ISPs doing number-of-recipients-per-day limitations.
I've heard of them doing number-of-recipients-per-email limitations (thus
limiting large cc/bcc lists) but not total number of emails.
Who's to say that there arent legitimate reasons to email a large number
of people - perhaps your customers??

Certainly if my own ISP did something like that, you're quite right, i'd
have to find an alternative. (Or perhaps, an alternative ISP. )

(who set the limit at 200? Can you opt-out of the limit or have it upped?)

Mark.




ingress SMTP

2008-09-03 Thread *Hobbit*
I've been blackholing NANOG mail for a while due to other things
displacing the time I'd need to read it, so I might be a little out
of touch on this, but I did grovel through some of the archives
looking for any discussion on this before posting.  Didn't find a
really coherent answer yet.

What I'm trying to get a feel for is this: what proportion of edge
customers have a genuine NEED to send direct SMTP traffic to TCP 25
at arbitrary destinations?  I'm thinking mostly of cable-modem and
DSL/fiber swamps, dialup pools [do they even exist anymore?], and
other clouds basically containing end-users rather than the more
bidirectional business-class customers.

The big providers -- comcast, verizon, RR, charter, bellsouth, etc --
seem to be some of the most significant sources of spam and malware
attempts, mostly from compromised end-user machines, and it seems
that simply denying *INGRESS* of TCP 25 traffic except to the given
ISP's outbound relay servers would cut an awful lot of it off at the
pass.  Decent anti-header-spoofing configuration on said mailservers
would take care of even more.  I realize this might be a total
hot-button but I'm not talking about filtering TOWARD customers, I'm
talking about filtering FROM them, upstream -- possibly less often
discussed.  And only SMTP.  Not censorship, just a simple technical
policy that the vast majority of customers wouldn't even notice.

I've got a paper out about this that was put together quite a
while ago, in fact:

  http://www.usenix.org/publications/login/2005-10/openpdfs/hobbit.pdf

I can weigh the decision to trust a PTR lookup, but most of the big
players seem to have their inverse DNS automated fairly well which
helps such little hacks work.  But really, I'd like to see more done
at the SOURCE of the problem, which should be as simple as two ACL
lines dropped into some edge routers.

What is preventing this from being an operational no-brainer,
including making a few exceptions for customers that prove they know
how to lock down their own mail infrastructure?

And why do the largest players seem to have the least clue about it?

_H*



Re: ingress SMTP

2008-09-03 Thread Suresh Ramasubramanian
On Wed, Sep 3, 2008 at 8:46 PM, *Hobbit* [EMAIL PROTECTED] wrote:

 What I'm trying to get a feel for is this: what proportion of edge
 customers have a genuine NEED to send direct SMTP traffic to TCP 25
 at arbitrary destinations?  I'm thinking mostly of cable-modem and

Not too many - they got themselves port 587 to submit outbound mail.

Read the maawg managing port 25 document - and while you are at it
read the walled garden doc too.. port 25 abuse is the least of your
worries with cable/dsl cpe swamps

http://www.maawg.org/port25
http://www.maawg.org/about/whitepapers/MAAWG_Walled_Garden_BP_2007-09.pdf

--srs



RE: ingress SMTP

2008-09-03 Thread Tim Sanderson
Anybody not wanting to use their ISP email would notice it. I see filtering 25 
FROM the customer as something that is not likely to happen because of this. 
When a customer buys bandwidth, they want to be able to use it for whatever 
they choose. This would be just one more restriction giving competitive 
advantage to any ISP not doing the filtering.

--
Tim Sanderson, network administrator
[EMAIL PROTECTED]

-Original Message-
From: *Hobbit* [mailto:[EMAIL PROTECTED]
Sent: Wednesday, September 03, 2008 11:16 AM
To: nanog@nanog.org
Subject: ingress SMTP

I've been blackholing NANOG mail for a while due to other things
displacing the time I'd need to read it, so I might be a little out
of touch on this, but I did grovel through some of the archives
looking for any discussion on this before posting.  Didn't find a
really coherent answer yet.

What I'm trying to get a feel for is this: what proportion of edge
customers have a genuine NEED to send direct SMTP traffic to TCP 25
at arbitrary destinations?  I'm thinking mostly of cable-modem and
DSL/fiber swamps, dialup pools [do they even exist anymore?], and
other clouds basically containing end-users rather than the more
bidirectional business-class customers.

The big providers -- comcast, verizon, RR, charter, bellsouth, etc --
seem to be some of the most significant sources of spam and malware
attempts, mostly from compromised end-user machines, and it seems
that simply denying *INGRESS* of TCP 25 traffic except to the given
ISP's outbound relay servers would cut an awful lot of it off at the
pass.  Decent anti-header-spoofing configuration on said mailservers
would take care of even more.  I realize this might be a total
hot-button but I'm not talking about filtering TOWARD customers, I'm
talking about filtering FROM them, upstream -- possibly less often
discussed.  And only SMTP.  Not censorship, just a simple technical
policy that the vast majority of customers wouldn't even notice.

I've got a paper out about this that was put together quite a
while ago, in fact:

  http://www.usenix.org/publications/login/2005-10/openpdfs/hobbit.pdf

I can weigh the decision to trust a PTR lookup, but most of the big
players seem to have their inverse DNS automated fairly well which
helps such little hacks work.  But really, I'd like to see more done
at the SOURCE of the problem, which should be as simple as two ACL
lines dropped into some edge routers.

What is preventing this from being an operational no-brainer,
including making a few exceptions for customers that prove they know
how to lock down their own mail infrastructure?

And why do the largest players seem to have the least clue about it?

_H*




Re: ingress SMTP

2008-09-03 Thread Justin Scott

What is preventing this from being an operational no-brainer,
including making a few exceptions for customers that prove they know
how to lock down their own mail infrastructure?


As a small player who operates a mail server used by many local 
businesses, this becomes a support issue for admins in our position.  We 
operate an SMTP server of our own that the employees of these various 
companies use from work and at home.  Everything works great until an 
ISP decides to block 25 outbound.  Now our customer cannot reach our 
server, so they call us to complain that they can receive but not send 
e-mail.  We, being somewhat intelligent, have a support process in place 
to walk the customer through the SMTP port change from 25 to one of our 
two alternate ports.


The problem, however, is that the customer simply cannot understand why 
their e-mail worked one day and doesn't the next.  In their eyes the 
system used to work, and now it doesn't, so that must mean that we broke 
it and that we don't know what we're doing.


Your comment about exceptions for customers that prove they know how to 
lock down is not based in reality, frankly.  Have you ever tried to 
have Joe Sixpack call BigISP support to ask for an exception to a port 
block on his consumer-class connection with a dynamic IP?  That's a wall 
that I would not be willing to ask my customers to climb over.


Now, having said all that, I do agree that big ISPs should do more to 
prevent spam from originating at their networks.  A basic block of 25 
isn't the solution, in my opinion.  Unfortunately I don't know what is. 
 Perhaps monitoring the number of outgoing connections on 25 and 
temporarily cutting off access if a threshold is reached?  Set it high 
enough and the legitimate users won't notice, but low enough that it 
disrupts the spammers.  Perhaps I'm talking out of my ass and don't have 
a clue.


In any case, I don't believe a blanket block of 25 is the answer.


-Justin Scott, GravityFree


smime.p7s
Description: S/MIME Cryptographic Signature


Re: ingress SMTP

2008-09-03 Thread Jay R. Ashworth
On Wed, Sep 03, 2008 at 11:56:51AM -0400, Justin Scott wrote:
 As a small player who operates a mail server used by many local 
 businesses, this becomes a support issue for admins in our position.  We 
 operate an SMTP server of our own that the employees of these various 
 companies use from work and at home.  Everything works great until an 
 ISP decides to block 25 outbound.  Now our customer cannot reach our 
 server, so they call us to complain that they can receive but not send 
 e-mail.  We, being somewhat intelligent, have a support process in place 
 to walk the customer through the SMTP port change from 25 to one of our 
 two alternate ports.
 
 The problem, however, is that the customer simply cannot understand why 
 their e-mail worked one day and doesn't the next.  In their eyes the 
 system used to work, and now it doesn't, so that must mean that we broke 
 it and that we don't know what we're doing.

I feel your pain, local compadre, but I'm on their side.

Here's your script:

Allowing unfiltered public access to port 25 is one of the things that
increases everyone's spam load, and your ISP is trying to be a Good
Neighbor in blocking access to anyone's servers but their own; many ISPs
are moving towards this safer configuration. We're a good neighbor, as
well, and support Mail Submission Protocol on port 587, and here's how
you set it up -- and it will work from pretty much anywhere forever.

Which is a safe thing to tell people because it is decidedly *not* best
practice to block 587.

Cheers,
-- jra
-- 
Jay R. Ashworth   Baylink  [EMAIL PROTECTED]
Designer The Things I Think   RFC 2100
Ashworth  Associates http://baylink.pitas.com '87 e24
St Petersburg FL USA  http://photo.imageinc.us +1 727 647 1274

 Those who cast the vote decide nothing.
 Those who count the vote decide everything.
   -- (Josef Stalin)



Re: ingress SMTP

2008-09-03 Thread Justin Scott

Why don't you set the alternate ports up as the defaults when the
customer signs up?


Excellent question and unfortunately I don't have an answer.  I will run 
that one by management as it is an obviously great idea now that you 
mention it.



We use TLS on port 587 and SSL on 465, most mail clients default to
these ports when you click the TLS or SSL box. Bonus-- we tell our
clients that we only support encrypted access to their mail. They
understand.


We also support SSL access for SMTP and POP, so that could be a 
possibility as well.


I appreciate the feedback on this from everyone.  I'm still not 100% 
convinced that a blanket port block is the answer, but then again I'm 
not an ISP so my opinion shouldn't be on the top of the list of 
considerations either.  I do have some things to think about for new 
customers though g.



-Justin Scott, GravityFree



smime.p7s
Description: S/MIME Cryptographic Signature


Re: ingress SMTP

2008-09-03 Thread Michael Thomas

Jay R. Ashworth wrote:

On Wed, Sep 03, 2008 at 11:56:51AM -0400, Justin Scott wrote:
  
As a small player who operates a mail server used by many local 
businesses, this becomes a support issue for admins in our position.  We 
operate an SMTP server of our own that the employees of these various 
companies use from work and at home.  Everything works great until an 
ISP decides to block 25 outbound.  Now our customer cannot reach our 
server, so they call us to complain that they can receive but not send 
e-mail.  We, being somewhat intelligent, have a support process in place 
to walk the customer through the SMTP port change from 25 to one of our 
two alternate ports.


The problem, however, is that the customer simply cannot understand why 
their e-mail worked one day and doesn't the next.  In their eyes the 
system used to work, and now it doesn't, so that must mean that we broke 
it and that we don't know what we're doing.



I feel your pain, local compadre, but I'm on their side.

Here's your script:

Allowing unfiltered public access to port 25 is one of the things that
increases everyone's spam load, and your ISP is trying to be a Good
Neighbor in blocking access to anyone's servers but their own; many ISPs
are moving towards this safer configuration. We're a good neighbor, as
well, and support Mail Submission Protocol on port 587, and here's how
you set it up -- and it will work from pretty much anywhere forever.

  

I think this all vastly underrates the agility of the bad guys. So lots of
ISP's have blocked port 25. Has it made any appreciable difference?
Not that I can tell. If you block port 25, they'll just use another port and
a relay if necessary.

But the thing that's really pernicious about this sort of policy is that 
it's

a back door policy for ISP's to clamp down on all outgoing ports in
the name of security. And it's almost plausible, except for the annoying
problem that the net becomes secure and useless in one swell foop.

That said, I heard a pretty amazing claim made by somebody while
I was still at the big ol networking company that ISP's in general
not only didn't know which of their customers computers were
owned, but that they didn't want to know. Even putting aside the
claim of blissful ignorance, port 25 blocking is nothing more than
a Maginot Line for the larger problems of infected computers. If
we really wanted to curb spam, why don't we just put them in the
penalty box until they are remediated? Heck, that even stops lots
of other attacks that have nothing to do with port 25 too.

  Mike



Re: ingress SMTP

2008-09-03 Thread Justin Scott

Do you operate your mailserver on a residential cablemodem or adsl
rather than a business account?


No, we co-lo equipment at a professional facility that our customers on 
any type of connection need to have access to send mail through, 
regardless of whether their ISP blocks the standard ports or not.



-Justin Scott, GravityFree



smime.p7s
Description: S/MIME Cryptographic Signature


Re: ingress SMTP

2008-09-03 Thread Jay R. Ashworth
On Wed, Sep 03, 2008 at 09:40:20AM -0700, Michael Thomas wrote:
 Allowing unfiltered public access to port 25 is one of the things that
 increases everyone's spam load, and your ISP is trying to be a Good
 Neighbor in blocking access to anyone's servers but their own; many ISPs
 are moving towards this safer configuration. We're a good neighbor, as
 well, and support Mail Submission Protocol on port 587, and here's how
 you set it up -- and it will work from pretty much anywhere forever.

 I think this all vastly underrates the agility of the bad guys. So lots of
 ISP's have blocked port 25. Has it made any appreciable difference?
 Not that I can tell. If you block port 25, they'll just use another port and
 a relay if necessary.

You're forgetting that 587 *is authenticated, always*.

The issue here, though, was that of an Enhanced Mail Provider's clients
being unable to get through blocks *set by their client's ISPs*.

The EMP has no control over that except to switch said clients to MSP
(which they really should have done to begin with, as someone else
notes).

Cheers,
-- jra
-- 
Jay R. Ashworth   Baylink  [EMAIL PROTECTED]
Designer The Things I Think   RFC 2100
Ashworth  Associates http://baylink.pitas.com '87 e24
St Petersburg FL USA  http://photo.imageinc.us +1 727 647 1274

 Those who cast the vote decide nothing.
 Those who count the vote decide everything.
   -- (Josef Stalin)



Re: ingress SMTP

2008-09-03 Thread Alec Berry
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Michael Thomas wrote:
 I think this all vastly underrates the agility of the bad guys. So
 lots of ISP's have blocked port 25. Has it made any appreciable
 difference? Not that I can tell. If you block port 25, they'll just
 use another port and a relay if necessary.

I'm pretty sure it has, although without aggregate stats from various
ISPs it is hard to tell. Since mail transport is exclusively on port 25
(as opposed to mail submission), a bot cannot just hop to another port.

 But the thing that's really pernicious about this sort of policy is
 that it's a back door policy for ISP's to clamp down on all outgoing
 ports in the name of security.

I don't think ISPs have anything to gain by randomly blocking ports.
They may block a port that is often used for malicious behavior
(135-139, 194, 445, 1433, 3306 come to mind) as a way to reduce their
support calls-- but they would have to balance that with the risk of
loosing customers. It's not as much a slippery slope as much as it is a
tightrope act (yes-- I am metaphorically challenged).

...
alec

- --
`
/ Alec Berry \__
| Senior Partner and Director of Technology \
| PGP/GPG key 0xE8E9030F|
| http://alec.restontech.com/#PGP   |
|---|
| RestonTech, Ltd.  |
|http://www.restontech.com/ |
|  Phone: (703) 234-2914|
\___/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIvsINREO1P+jpAw8RAvKNAKC83NJgwv4EakAv/jw5biO79D/xEwCgldZ+
JHkb3LboeAD2GC77vcb06Y4=
=nfVP
-END PGP SIGNATURE-



Re: ingress SMTP

2008-09-03 Thread Suresh Ramasubramanian
On Wed, Sep 3, 2008 at 10:18 PM, Justin Scott [EMAIL PROTECTED] wrote:
 Do you operate your mailserver on a residential cablemodem or adsl
 rather than a business account?

 No, we co-lo equipment at a professional facility that our customers on any
 type of connection need to have access to send mail through, regardless of
 whether their ISP blocks the standard ports or not.

That's why you set your outbound MTA to listen  - for auth'd outbound
connections only - on port 587

Endless loop of dead horse beating .. ouch

srs
-- 
Suresh Ramasubramanian ([EMAIL PROTECTED])



Re: ingress SMTP

2008-09-03 Thread Stephen Sprunk

Alec Berry wrote:

Michael Thomas wrote:
  

But the thing that's really pernicious about this sort of policy is
that it's a back door policy for ISP's to clamp down on all outgoing
ports in the name of security.



I don't think ISPs have anything to gain by randomly blocking ports.  They may 
block a port that is often used for malicious behavior (135-139, 194, 445, 
1433, 3306 come to mind) as a way to reduce their support calls-- but they 
would have to balance that with the risk of loosing customers. It's not as much 
a slippery slope as much as it is a tightrope act (yes-- I am metaphorically 
challenged).
  


I see nothing wrong with filtering commonly abused ports, provided that 
the ISP allows a user to opt out if they know enough to ask.


When port 25 block was first instituted, several providers actually 
redirected connections to their own servers (with spam filters and/or 
rate limits) rather than blocking the port entirely.  This seems like a 
good compromise for port 25 in particular, provided you have the tools 
available to implement and support it properly.


I also agree with the comments about switching customers to 587.  My 
former monopoly ISP only accepted mail on 25 and I had endless problems 
trying to send mail from airports, hotels, coffee shops, etc. while 
traveling.  The same hotspots also tended to block port 22, so I 
couldn't even forward mail via my own server.  However, my new monopoly 
ISP only accepts mail on 587, and I have yet to have a single problem 
with that from any hotspot I've used since the switch.  Ditto for 
reading my mail via IMAPS/993, whereas I used to have occasional 
problems reading it via IMAP/143.


S



Re: ingress SMTP

2008-09-03 Thread Winders, Timothy A
On 9/3/08 10:50 AM, Suresh Ramasubramanian [EMAIL PROTECTED] wrote:

 On Wed, Sep 3, 2008 at 8:46 PM, *Hobbit* [EMAIL PROTECTED] wrote:
 
 What I'm trying to get a feel for is this: what proportion of edge
 customers have a genuine NEED to send direct SMTP traffic to TCP 25
 at arbitrary destinations?  I'm thinking mostly of cable-modem and
 
 Not too many - they got themselves port 587 to submit outbound mail.
 
 Read the maawg managing port 25 document - and while you are at it
 read the walled garden doc too.. port 25 abuse is the least of your
 worries with cable/dsl cpe swamps
 
 http://www.maawg.org/port25
 http://www.maawg.org/about/whitepapers/MAAWG_Walled_Garden_BP_2007-09.pdf
 
 --srs
 

We have not setup a port 587 smtp submit server.  Our smtp servers run only
on port 25.  We point our clients outbound email to these servers, which
require authentication for relaying.

We run into problems with ISPs and hotels which block outbound SMTP.  They
can't send email.  We have to work with them to work with their ISPs to find
out what SMTP server they can use for outgoing email.  It's a big problem.

Yes, setting up a 587 submit server internally would be best, but man power
is at a premium and it hasn't happened.

So, for us, having ISPs block port 25 is a problem.

=== Tim

Tim Winders | Associate Dean of Information Technology | South Plains
College




Re: ingress SMTP

2008-09-03 Thread Simon Waters
On Wednesday 03 September 2008 18:07:22 Stephen Sprunk wrote:

 When port 25 block was first instituted, several providers actually
 redirected connections to their own servers (with spam filters and/or
 rate limits) rather than blocking the port entirely.  This seems like a
 good compromise for port 25 in particular, provided you have the tools
 available to implement and support it properly.

It generated some very confused support calls here, where folks said I sent 
email to your server, and we had to tell them no you didn't, you only 
thought you did.

Please if you are going to block it block it clearly and transparently.

On the other hand abuse by bots isn't restricted to SMTP, and I suspect ISPs 
would be better of long term having a way of spotting compromised/malicious 
hosts and dealing with them, than applying a sticky plaster to port 25. 
Indeed spewing on port 25 is probably a good sign you need to apply said 
system.




Re: ingress SMTP

2008-09-03 Thread Nicholas Suan


On Sep 3, 2008, at 12:49 PM, Jay R. Ashworth wrote:


On Wed, Sep 03, 2008 at 09:40:20AM -0700, Michael Thomas wrote:
Allowing unfiltered public access to port 25 is one of the things  
that

increases everyone's spam load, and your ISP is trying to be a Good
Neighbor in blocking access to anyone's servers but their own;  
many ISPs
are moving towards this safer configuration. We're a good  
neighbor, as
well, and support Mail Submission Protocol on port 587, and here's  
how
you set it up -- and it will work from pretty much anywhere  
forever.


I think this all vastly underrates the agility of the bad guys. So  
lots of

ISP's have blocked port 25. Has it made any appreciable difference?
Not that I can tell. If you block port 25, they'll just use another  
port and

a relay if necessary.


You're forgetting that 587 *is authenticated, always*.



I'm not sure how that makes much of a difference since the usual spam  
vector is malware that has  (almost) complete control of the machine  
in the first place.




RE: ingress SMTP

2008-09-03 Thread Skywing
Intercepting port 25 traffic of your customers (as an ISP), redirecting it to 
your own servers, and allowing the connection to complete sounds like a pretty 
slippery slope of badness to me.

Sure, you should be using TLS anyway, but slurping up port 25 traffic begs the 
question of what is happening to the SMTP authentication credentials or the 
mail data that flows through said intercept.

Blocking traffic versus intercepting it wholesale are very different ballgames.

Now, obviously, whoever is providing your pipe has the technical ability to 
intercept your traffic.  Actually doing this has proven widely unpopular (to 
place it nicely) when uncovered, even with the best of intentions.

There is usually an implicit trust that your ISP won't be employing underhanded 
tactics like that in most people's minds, I think.  I suspect that most people 
will call any interception of their outbound mail traffic underhanded, even 
for if done for a perceived good reason in the mind of said ISP.

- S

-Original Message-
From: Stephen Sprunk [EMAIL PROTECTED]
Sent: Wednesday, September 03, 2008 12:09
To: Alec Berry [EMAIL PROTECTED]
Cc: north American Noise and Off-topic Gripes [EMAIL PROTECTED]
Subject: Re: ingress SMTP


Alec Berry wrote:
 Michael Thomas wrote:

 But the thing that's really pernicious about this sort of policy is
 that it's a back door policy for ISP's to clamp down on all outgoing
 ports in the name of security.


 I don't think ISPs have anything to gain by randomly blocking ports.  They 
 may block a port that is often used for malicious behavior (135-139, 194, 
 445, 1433, 3306 come to mind) as a way to reduce their support calls-- but 
 they would have to balance that with the risk of loosing customers. It's not 
 as much a slippery slope as much as it is a tightrope act (yes-- I am 
 metaphorically challenged).


I see nothing wrong with filtering commonly abused ports, provided that
the ISP allows a user to opt out if they know enough to ask.

When port 25 block was first instituted, several providers actually
redirected connections to their own servers (with spam filters and/or
rate limits) rather than blocking the port entirely.  This seems like a
good compromise for port 25 in particular, provided you have the tools
available to implement and support it properly.

I also agree with the comments about switching customers to 587.  My
former monopoly ISP only accepted mail on 25 and I had endless problems
trying to send mail from airports, hotels, coffee shops, etc. while
traveling.  The same hotspots also tended to block port 22, so I
couldn't even forward mail via my own server.  However, my new monopoly
ISP only accepts mail on 587, and I have yet to have a single problem
with that from any hotspot I've used since the switch.  Ditto for
reading my mail via IMAPS/993, whereas I used to have occasional
problems reading it via IMAP/143.

S



Re: ingress SMTP

2008-09-03 Thread Alec Berry
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Winders, Timothy A wrote:

 We have not setup a port 587 smtp submit server.  Our smtp servers run only
 on port 25.

Sorry to be harsh, but that's just not the right way to do things
these days. At the very least, you can run stunnel to allow incoming
mail submission on port 465 (SMTP + SSL).

 So, for us, having ISPs block port 25 is a problem.

Read: for us, running a mail server is a problem

...
alec

- --
`
/ Alec Berry \__
| Senior Partner and Director of Technology \
| PGP/GPG key 0xE8E9030F|
| http://alec.restontech.com/#PGP   |
|---|
| RestonTech, Ltd.  |
|http://www.restontech.com/ |
|  Phone: (703) 234-2914|
\___/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIvs30REO1P+jpAw8RAtBUAJsFmxNfi9UGcDCfmkDs7Tni+iHuKwCgtKyg
01N7WA1sXhzuWsYD4ZG6go0=
=66IU
-END PGP SIGNATURE-



Re: ingress SMTP

2008-09-03 Thread Winders, Timothy A
On 9/3/08 12:48 PM, Alec Berry [EMAIL PROTECTED] wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 Winders, Timothy A wrote:
 
 We have not setup a port 587 smtp submit server.  Our smtp servers run only
 on port 25.
 
 Sorry to be harsh, but that's just not the right way to do things
 these days. At the very least, you can run stunnel to allow incoming
 mail submission on port 465 (SMTP + SSL).
 
 So, for us, having ISPs block port 25 is a problem.
 
 Read: for us, running a mail server is a problem

Not harsh at all.  It's reality.  We do have the option for SMTP/SSL/TLS
over port 25.  It is only required for an authenticated session.

I agree, it's not the right way to do things.  Running a mail server used
to be much easier.  Volunteers to help set things up the right way are
always welcome.  :-)

Otherwise, it will happen eventually.  :-(

Tim Winders | Associate Dean of Information Technology | South Plains
College




Re: ingress SMTP

2008-09-03 Thread Jason Fesler

I agree, it's not the right way to do things.  Running a mail server used
to be much easier.  Volunteers to help set things up the right way are
always welcome.  :-)


Supporting those clients who can't connect is cheaper or more accessible 
for you?





Re: ingress SMTP

2008-09-03 Thread Winders, Timothy A
On 9/3/08 12:59 PM, Jason Fesler [EMAIL PROTECTED] wrote:

 I agree, it's not the right way to do things.  Running a mail server used
 to be much easier.  Volunteers to help set things up the right way are
 always welcome.  :-)
 
 Supporting those clients who can't connect is cheaper or more accessible
 for you?
 

At this point, yes.  We offer SSL/VPN connections back into the network
which (so far) has always fixed the problem if the client is unable to work
with their ISP to get smtp settings for their email program.

It's a matter of resources and priorities.  I'd also like to setup an
automated provisioning server, but don't know how to do that.

There are many projects in the wings.  Registering students and making
sure they can pay for classes always seems to bubble to the top, though.
;-)

Of course, this is getting a bit off topic for NANOG, so I'll stop there.

Tim Winders | Associate Dean of Information Technology | South Plains
College




Re: ingress SMTP

2008-09-03 Thread *Hobbit*
Wow, lots of responses already.  Thanks, good discussion.

I should clarify a little, that it's not necessarily about blanket
port blocking or denying random ports as threats are perceived,
but where needed in a well thought-out manner and trying to take
customer needs [stated or observed] into account first.  And back
it up with AUP verbiage.  There must be plenty of places where it
just makes sense, and others where it's borderline, iffy, or
unmanageable.  One has to start *someplace*.

Oh, and don't get me started about abuse-desk competency, or even
existence, especially in the big providers.  I'll bet most of them
can't even find the *rack* where the autoresponder machine is, let
alone actually figure out why its disk has been full for six months.

Related question, now that some discussion has started: why the F
does Gmail refuse to put real, identifiable injection-path headers
in mail they relay out?  The current policy only protects spammer
identities behind a meaningless 10.x and is completely at odds with
what almost every other freemail provider does, which of course
breaks any receiving-end model.  Who's here from Google that I can
chat with about this?

_H*



Re: ingress SMTP

2008-09-03 Thread Steven Champeon
on Wed, Sep 03, 2008 at 05:15:41PM +, *Hobbit* wrote:
 Related question, now that some discussion has started: why the F
 does Gmail refuse to put real, identifiable injection-path headers
 in mail they relay out?  The current policy only protects spammer
 identities behind a meaningless 10.x and is completely at odds with
 what almost every other freemail provider does, which of course
 breaks any receiving-end model.  Who's here from Google that I can
 chat with about this?

Dunno who's here from Google, but every time I've asked about this (as
the basis for a discussion of why they do such a sucky job of blocking
419 scams, which we otherwise block by injection point analysis) I've
been told that it's a privacy issue. I long suspected it was just a
side effect of an inflexible network architecture, but have been assured
that, no, it's the privacy issue. 

And yes, this is completely at odds with the fact that they *do* put
injection point IP audit trail into mail they relay via SMTP. 

In the end, it's an idiotic policy, and I hope they wake up and fix it.
In the meantime, I'm reporting every 419 scam I get from them.

-- 
hesketh.com/inc. v: +1(919)834-2552 f: +1(919)747-9073 w: http://hesketh.com/
antispam news, solutions for sendmail, exim, postfix: http://enemieslist.com/



Re: ingress SMTP

2008-09-03 Thread Jay R. Ashworth
On Wed, Sep 03, 2008 at 12:58:53PM -0400, Nicholas Suan wrote:
 On Sep 3, 2008, at 12:49 PM, Jay R. Ashworth wrote:
 You're forgetting that 587 *is authenticated, always*.
 
 I'm not sure how that makes much of a difference since the usual spam  
 vector is malware that has  (almost) complete control of the machine  
 in the first place.

Well, that depends on MUA design, of course, but it's just been pointed
out to me that the RFC says MAY, not MUST. 

Oops.

Does anyone bother to run an MSA on 587 and *not* require authentication?

Cheers,
-- jra
-- 
Jay R. Ashworth   Baylink  [EMAIL PROTECTED]
Designer The Things I Think   RFC 2100
Ashworth  Associates http://baylink.pitas.com '87 e24
St Petersburg FL USA  http://photo.imageinc.us +1 727 647 1274

 Those who cast the vote decide nothing.
 Those who count the vote decide everything.
   -- (Josef Stalin)



Re: ingress SMTP

2008-09-03 Thread Winders, Timothy A
On 9/3/08 1:04 PM, Winders, Timothy A [EMAIL PROTECTED]
wrote:

 On 9/3/08 12:59 PM, Jason Fesler [EMAIL PROTECTED] wrote:
 
 I agree, it's not the right way to do things.  Running a mail server used
 to be much easier.  Volunteers to help set things up the right way are
 always welcome.  :-)
 
 Supporting those clients who can't connect is cheaper or more accessible
 for you?
 
 
 At this point, yes.  We offer SSL/VPN connections back into the network which
 (so far) has always fixed the problem if the client is unable to work with
 their ISP to get smtp settings for their email program.
 
 It's a matter of resources and priorities.  I'd also like to setup an
 automated provisioning server, but don't know how to do that.
 
 There are many projects in the wings.  Registering students and making sure
 they can pay for classes always seems to bubble to the top, though.  ;-)
 
 Of course, this is getting a bit off topic for NANOG, so I'll stop there.
 
 Tim Winders | Associate Dean of Information Technology | South Plains College

This thread has inspired me to get off my duff and get it done.  I now
have a properly working MSA running on port 587 requiring authentication.  A
few updates to user documentation and we'll be setup and running.

Thanks for the kick in the pants.  :-)

Tim Winders | Associate Dean of Information Technology | South Plains
College




Re: ingress SMTP

2008-09-03 Thread Valdis . Kletnieks
On Wed, 03 Sep 2008 15:00:15 EDT, Jay R. Ashworth said:

 Does anyone bother to run an MSA on 587 and *not* require authentication?

Presumably only sites that don't care if they end up in half the anti-spam
blacklists on the planet.  Based on the evidence I have, there's a depressingly
large number of those sort of sites


pgp0qwfyKGamw.pgp
Description: PGP signature


Re: ingress SMTP

2008-09-03 Thread Charles Wyble

*Hobbit* wrote:

What I'm trying to get a feel for is this: what proportion of edge
customers have a genuine NEED to send direct SMTP traffic to TCP 25
at arbitrary destinations? 


Probably very few.


The big providers -- comcast, verizon, RR, charter, bellsouth, etc --
seem to be some of the most significant sources of spam and malware
attempts, mostly from compromised end-user machines, and it seems
that simply denying *INGRESS* of TCP 25 traffic except to the given
ISP's outbound relay servers would cut an awful lot of it off at the
pass. 



I have SBC / ATT / Yahoo DSL in Southern California and they block 
outbound 25 to anything but Yahoo SMTP server farm, and they only allow SSL

connectivity at that. I'm all for that personally.

It was a minor effort to setup my [EMAIL PROTECTED] address to be 
allowed out (had to fill out a webform and click a verify link).


Since most people use the address given to them by the provider and most 
likely use webmail this certainly won't affect them.


To top it all off I can fill out another web form and specifically 
request unblocking of ports and relay out mail server wherever I want.


So SBC has a policy of

deny SMTP relaying by default,
provide clear instructions to allow outbound relay via  approved server 
farm
if you don't want to be blocked request unblocking via a self service 
web form.


Seems perfectly acceptable to me.

Thoughts?


--
Charles Wyble (818) 280 - 7059
http://charlesnw.blogspot.com
CTO Known Element Enterprises / SoCal WiFI project




RE: ingress SMTP

2008-09-03 Thread Frank Bulk
I would like to point my customers to port 587, but that kind of
configuration is still in its infancy.

We ask our employees of our business customers to VPN into work and for
everyone else to use our webmail.

Frank

-Original Message-
From: Justin Scott [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, September 03, 2008 10:57 AM
To: nanog@nanog.org
Subject: Re: ingress SMTP

 What is preventing this from being an operational no-brainer,
 including making a few exceptions for customers that prove they know
 how to lock down their own mail infrastructure?

As a small player who operates a mail server used by many local 
businesses, this becomes a support issue for admins in our position.  We 
operate an SMTP server of our own that the employees of these various 
companies use from work and at home.  Everything works great until an 
ISP decides to block 25 outbound.  Now our customer cannot reach our 
server, so they call us to complain that they can receive but not send 
e-mail.  We, being somewhat intelligent, have a support process in place 
to walk the customer through the SMTP port change from 25 to one of our 
two alternate ports.

The problem, however, is that the customer simply cannot understand why 
their e-mail worked one day and doesn't the next.  In their eyes the 
system used to work, and now it doesn't, so that must mean that we broke 
it and that we don't know what we're doing.

Your comment about exceptions for customers that prove they know how to 
lock down is not based in reality, frankly.  Have you ever tried to 
have Joe Sixpack call BigISP support to ask for an exception to a port 
block on his consumer-class connection with a dynamic IP?  That's a wall 
that I would not be willing to ask my customers to climb over.

Now, having said all that, I do agree that big ISPs should do more to 
prevent spam from originating at their networks.  A basic block of 25 
isn't the solution, in my opinion.  Unfortunately I don't know what is. 
  Perhaps monitoring the number of outgoing connections on 25 and 
temporarily cutting off access if a threshold is reached?  Set it high 
enough and the legitimate users won't notice, but low enough that it 
disrupts the spammers.  Perhaps I'm talking out of my ass and don't have 
a clue.

In any case, I don't believe a blanket block of 25 is the answer.


-Justin Scott, GravityFree




RE: ingress SMTP

2008-09-03 Thread Frank Bulk
Mediacom appears to require SSL to POP3 access:
http://www.mchsi.com/help/read/publisher_02/2002-01-28.01
If you are off the Mediacom Online network you can still access your e-mail
using your e-mail client.  However, you will need to configure your e-mail
program to connect to our secure e-mail server via SSL.

Frank

-Original Message-
From: Jay R. Ashworth [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, September 03, 2008 11:07 AM
To: nanog@nanog.org
Subject: Re: ingress SMTP

On Wed, Sep 03, 2008 at 11:52:48AM -0400, Tim Sanderson wrote:
 Anybody not wanting to use their ISP email would notice it. I see
 filtering 25 FROM the customer as something that is not likely to
 happen because of this. When a customer buys bandwidth, they want to
 be able to use it for whatever they choose. This would be just one
 more restriction giving competitive advantage to any ISP not doing the
 filtering.

Just as long as consumer ISPs don't start filtering *110* inbound from
the net... as ATT used to.  I had a client move from dialup to
cablemodem about 10 years ago... and it took us a *week* to get ATT to
admit they didn't accept inbound POP pickups.  Client (intemperately) had
printed the att.com email address of lots of crap -- they had to keep the
dialup for a long time, since att wouldn't forward either...

Thank ghod I'm out of the jungle now...

Cheers,
-- jra
--
Jay R. Ashworth   Baylink
[EMAIL PROTECTED]
Designer The Things I Think   RFC
2100
Ashworth  Associates http://baylink.pitas.com '87
e24
St Petersburg FL USA  http://photo.imageinc.us +1 727 647
1274

 Those who cast the vote decide nothing.
 Those who count the vote decide everything.
   -- (Josef Stalin)





Re: ingress SMTP

2008-09-03 Thread Robert Bonomi
 From [EMAIL PROTECTED]  Wed Sep  3 11:58:37 2008
 From: Alec Berry [EMAIL PROTECTED]
 Subject: Re: ingress SMTP

 Michael Thomas wrote:
  I think this all vastly underrates the agility of the bad guys. So
  lots of ISP's have blocked port 25. Has it made any appreciable
  difference? Not that I can tell. If you block port 25, they'll just
  use another port and a relay if necessary.

 I'm pretty sure it has, although without aggregate stats from various
 ISPs it is hard to tell. Since mail transport is exclusively on port 25
 (as opposed to mail submission), a bot cannot just hop to another port.


One small data-point -- on a personal vanity domain, approximately 2/3 of 
all the spam (circa 15k junk emails/month) was 'direct to inbound MX' 
transmissions.  The vast majority of this is coming from end-user machines 
outside of North America.  China, India Thailand, Brazil, Poland, CZ, and 
a couple of providers each in Germany and France, appear to be the most 
prevalent sources _I_ see.

The message count would be a fair bit higher, but I have several overseas
networks  (4 in DE, 2 in TW, 1 in CZ) plus pieces of 2 domestic networks
(*da.uu.net, *pub-ip.psi.net) blocked at the firewall.  Also firewalled are
a  couple of dozen IP addresses that have -each- made over 10k attempts
to _relay_ mail through me.


I'm seeing a significant amount of 'Received' header forgery, apparently
intended to fool dumb header parsers into believing the direct-to-MX
transmission _did_ go through the server associated with the domain used
in the 'from: , from , and Reply-to:  lines.  The good news is that
only a _really_ dumb parser would be fooled by most of what I'm seeing. :)




Re: ingress SMTP

2008-09-03 Thread Chris Boyd


On Sep 3, 2008, at 4:36 PM, Frank Bulk wrote:


I would like to point my customers to port 587, but that kind of
configuration is still in its infancy.


We're a small managed services provider, and we started doing  
authenticated SMTP with TLS on port 587 six years ago.  It's at least  
in kindergarten :-)


Once we explain the advantages, our customers love it since their  
email just works pretty much wherever they go.


As a former manager for a small resnet, blocking port 25 outbound is A  
Good Thing.  Cut abuse email down by a huge factor.


--Chris




Re: ingress SMTP

2008-09-03 Thread Daniel Senie

At 12:48 PM 9/3/2008, you wrote:


Do you operate your mailserver on a residential cablemodem or adsl
rather than a business account?


No, we co-lo equipment at a professional facility that our customers 
on any type of connection need to have access to send mail through, 
regardless of whether their ISP blocks the standard ports or not.



-Justin Scott, GravityFree



I've been running a similar operation for over a decade, offering 
email services, web services and collocation to businesses from the 
tiny to the multinational. We have, since the beginning, provided 
instructions on using port 587 and port 465 for email submission. 
This is not hard to explain, and it has never been a problem for our 
customers or their tech folks to accomplish.


Our servers are in data centers, our customers are on DSL, cable or 
even dialup circuits. We assume port 25 will be blocked, and while it 
isn't always, starting with that assumption simplifies matters. We 
also encourage our customers to always use TLS or SSL for all 
exchanges with the mail servers.


Because we have many users who are road warriors, they never know who 
their local access ISP will be. Getting them set up for 587 or 465 
before they leave home has always kept folks out of trouble. And 
those few who don't heed our advice have had their email hijacked by 
hotel networks that consume traffic to any remote port 25 themselves 
in an attempt to help. So again, just get your customers configured 
right at the start, and there will be few support calls on the subject.


This is just part of being a third-party supplier of email services 
in the current reality.


Dan







Re: ingress SMTP

2008-09-03 Thread matthew


- Original Message -
From: Jay R. Ashworth [EMAIL PROTECTED]
Date: Thursday, September 4, 2008 5:00 am
Subject: Re: ingress SMTP
 
 Does anyone bother to run an MSA on 587 and *not* require 
 authentication?


Many can be configured that way (example: Sun One/iPlanet mail server
can).  Whether they are or not depends on the admin.

/ M



Why not go after bots? (was: ingress SMTP)

2008-09-03 Thread Michael Thomas

Charles Wyble wrote:


I have SBC / ATT / Yahoo DSL in Southern California and they block 
outbound 25 to anything but Yahoo SMTP server farm, and they only 
allow SSL

connectivity at that. I'm all for that personally.

That seems to be the convention wisdom, but the science experiment
as it were in blocking port 25 doesn't seem to be correlated (must
less causated) with any drop in the spam rate. Because so far as I've
heard there isn't any such drop. Spammers and the rest are pretty
resourceful.

So I still haven't heard why there isn't any emphasis on going after
the bots that are by far the biggest problem instead of erecting damage
for them to route around. I can sort of understand why providers are
leery of getting sucked into that battle, but it's got to cost them a
fortune for every My internet is slow call they take.

  Mike



ingress SMTP

2008-09-03 Thread Keith Medcalf

 On Wed, Sep 03, 2008 at 12:58:53PM -0400, Nicholas Suan wrote:
  On Sep 3, 2008, at 12:49 PM, Jay R. Ashworth wrote:

  You're forgetting that 587 *is authenticated, always*.

  I'm not sure how that makes much of a difference since the
  usual spam vector is malware that has (almost) complete
  control of the machine in the first place.

 Well, that depends on MUA design, of course, but it's just
 been pointed out to me that the RFC says MAY, not MUST.

 Oops.

 Does anyone bother to run an MSA on 587 and *not* require
 authentication?

Raises hand.

Why would the requirements for authentication be different depending on the 
port used to connect to the MTA?

No matter how a session comes into the MTA (port 25, 465, 587, anything else) 
and no matter whether it is encrypted or not, the requirement for 
authentication (which is always available and advertized), is based on a simple 
policy:

 - local delivery originating from a non-blacklisted or internal/customer 
address does not require authentication;

 - relay from internal/customer IP Addresses does not require authentication;

 - any connection from a blacklisted IP requires authentication or no mail will 
be accepted;

 - relay from external/non-customer IP Addresses requires authentication;

Is there a valid reason why a different configuration is justified?

As an aside, outbound port 25 traffic is also blocked except from the MTA.






Re: ingress SMTP

2008-09-03 Thread Mark Foster

 On Wed, Sep 03, 2008 at 12:58:53PM -0400, Nicholas Suan wrote:
  On Sep 3, 2008, at 12:49 PM, Jay R. Ashworth wrote:

  You're forgetting that 587 *is authenticated, always*.

  I'm not sure how that makes much of a difference since the
  usual spam vector is malware that has (almost) complete
  control of the machine in the first place.

 Well, that depends on MUA design, of course, but it's just
 been pointed out to me that the RFC says MAY, not MUST.

 Oops.

 Does anyone bother to run an MSA on 587 and *not* require
 authentication?

 Raises hand.

 Why would the requirements for authentication be different depending on
 the port used to connect to the MTA?

 No matter how a session comes into the MTA (port 25, 465, 587, anything
 else) and no matter whether it is encrypted or not, the requirement for
 authentication (which is always available and advertized), is based on a
 simple policy:

  - local delivery originating from a non-blacklisted or
 internal/customer address does not require authentication;

  - relay from internal/customer IP Addresses does not require
 authentication;

  - any connection from a blacklisted IP requires authentication or no mail
 will be accepted;

  - relay from external/non-customer IP Addresses requires
 authentication;

 Is there a valid reason why a different configuration is justified?

 As an aside, outbound port 25 traffic is also blocked except from the MTA.


I'm glad someone finally posted the above.

When I came 'up through the ranks' the policy could be explained simply,
by separating POP3 and SMTP.  The following is the users-perspective
explanation I used to offer:

- Mail from World to Client is checked via user/password check (POP3 in
your mail client).  Because its authenticated, it can be done from
anywhere - subject to your ISPs policies on the subject.

- Mail from Client to World is not authenticated (generally speaking) but
what is checked is where you are.  The rules:

- Mail from ISP-IP to ISP-SMTP-SERVER is accepted regardless of destination.
- Mail from anywhere else to ISP-SMTP-SERVER is accepted only if the
destination is 'local' to the ISP.
- There's no reason to do anything else as a general rule.

Privately managed outbound mail solutions (such as a colo, or a corporate
network, which subjects you to some other sort of validation before
accepting your message) should be 'accountable' and in order to circumvent
Port 25 blocking, should be found on other ports anyway. Port 25 traffic
should be subject to the above.

(I realise this doesnt account for SMTP-Auth.  The reality today is that
ISPs are blocking Port 25 to reduce spam from drones and that people
should be prepared to work around this.)

So in terms of the OP,
I don't see why joe-user on a dynamic-IP home connection should need the
ability to use port 25 to talk to anywhere but their local ISP SMTP server
on a normal basis[1]. Theyre not doing MX lookups so theyre not going
direct to remote MTAs[2].  Regardless of where they got the mail _from_,
the outbound mail should be via SMTP to their local SMTP server.[3]

If you separate inbound (pop3) and outbound (smtp) mail delivery in your
thinking you can start to make sense of things (from a users perspective).
This is always the tack i've taken when trying to educate users about why
their email outbound doesn't work when theyre moving from ISP to ISP.
(At which point you offer them your authenticated-another-way service,
such as 587 with SMTP auth).

[1] Customers with a specific need to do so should have the means to
opt-out. I believe most of the ISPs in NZ who block 25-outbound from
clients also offer this option.

[2] Customers doing MX lookups are either drones or people with mail
servers at home. The former are obviously the target of the block. The
latter are likely going to be any one of:

- Blocked by SORBS or similar as a dynamic IP
- Running a mail server in breach of AUP
- On a fixed IP and (theoretically) capable of securing their system and
not being a drone or open mail relay (and being traceable via their ISP).

[3] Note also [2].  Outbound mail is associated with your ISP and their
SMTP service. Has nothing to do with inbound mail.  Nothing. Nada. Zip.

Or doesn't the rest of the world think like this?

Mark.

PS: It occurs to me that SPF has an influence here, if you're aggressively
using it then you should also be offering alternatives to Port 25 SMTP.
IMHO.




BCP blocking list for edge networks? (was: ingress SMTP)

2008-09-03 Thread Jay R. Ashworth
Ok, mine is actualy even edgier than that; no transit at all, to
paraphrase Steeley Dan.

But does anyone have a pointer to a good set of ports to block in each
direction through my Shorewall DNAT setup, preferably annotated?

On reflection, that's actually only outbound; the necessity to set up
inbound DNAT manually makes it a default-deny environment, which is one
of the reasons that some people like NAT as a component of an edge
firewall.

Cheers,
-- jra
-- 
Jay R. Ashworth   Baylink  [EMAIL PROTECTED]
Designer The Things I Think   RFC 2100
Ashworth  Associates http://baylink.pitas.com '87 e24
St Petersburg FL USA  http://photo.imageinc.us +1 727 647 1274

 Those who cast the vote decide nothing.
 Those who count the vote decide everything.
   -- (Josef Stalin)



RE: ingress SMTP

2008-09-03 Thread Justin D. Scott
 iiNet a reasonably sized Aussie ISP has a web page 
 (specifially part of the 'My Account' page) where
 you can, with a simple check box, choose to have
 commonly abused ports blocked *for outgoing
 connections* or not.

That's great, and an excellent solution.  Unfortunately many of the larger
providers here in the United States are not as enlightened from my
experience.  Of course, YMMV.


-Justin Scott




ingress SMTP

2008-09-03 Thread Ang Kah Yik
Hmm.. if it helps - here's a link to an archived discussion on the same
issue earlier this year.

http://www.mail-archive.com/[EMAIL PROTECTED]/msg52598.html

-- 
Ang Kah Yik (bangky) -- http://blog.bangky.net


Re: ingress SMTP

2008-09-03 Thread Suresh Ramasubramanian
you just found one?  i think a few dozen over the last several years.

surprised though, i thought this particular horse was finally dead
after all the beatings it'd received.

srs

On Thu, Sep 4, 2008 at 8:13 AM, Ang Kah Yik [EMAIL PROTECTED] wrote:
 Hmm.. if it helps - here's a link to an archived discussion on the same
 issue earlier this year.

 http://www.mail-archive.com/[EMAIL PROTECTED]/msg52598.html



Re: ingress SMTP

2008-09-03 Thread Ang Kah Yik
Nah. There have been plenty. This just happened to be one of the recent
ones.
But as you've rightly pointed out, the dead horse magically revives itself
every once in a while ;)

On Thu, Sep 4, 2008 at 10:51 AM, Suresh Ramasubramanian [EMAIL PROTECTED]
 wrote:

 you just found one?  i think a few dozen over the last several years.

 surprised though, i thought this particular horse was finally dead
 after all the beatings it'd received.

 srs

 On Thu, Sep 4, 2008 at 8:13 AM, Ang Kah Yik [EMAIL PROTECTED]
 wrote:
  Hmm.. if it helps - here's a link to an archived discussion on the same
  issue earlier this year.
 
  http://www.mail-archive.com/[EMAIL PROTECTED]/msg52598.html




-- 
Ang Kah Yik


RE: Why not go after bots? (was: ingress SMTP)

2008-09-03 Thread Frank Bulk
If the service providers spent as much resources implementing systems that
automatically erected a walled-garden for botted hosts as they have with
bandwidth monitoring, our internet would look at lot cleaner.

But apparently the money trail didn't lead them there.

Frank

-Original Message-
From: Suresh Ramasubramanian [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, September 03, 2008 10:09 PM
To: Michael Thomas
Cc: nanog@nanog.org
Subject: Re: Why not go after bots? (was: ingress SMTP)

On Wed, Sep 3, 2008 at 5:12 AM, Michael Thomas [EMAIL PROTECTED] wrote:
 That seems to be the convention wisdom, but the science experiment
 as it were in blocking port 25 doesn't seem to be correlated (must
 less causated) with any drop in the spam rate. Because so far as I've
 heard there isn't any such drop. Spammers and the rest are pretty
 resourceful.

Let's put it this way .. a lot of ISPs have already realized that
which is why port 25 blocking or management is the basics. They do
that and have done that for years (and various providers elsewhere
still proudly claim hey, we do outbound port 25 blocking, we're
great!!!).  The real action is in walled gardens to automatically
detect and isolate botted hosts till they're cleaned up

Go talk to arbor, sandvine, perftech etc etc

srs





RE: ingress SMTP

2008-09-03 Thread Frank Bulk
If you leave port 587 un-authenticated then spammers just need to move their
spambots to try port 587 *and* you're never sure who sent the message.  If
you're going to have the customer click a few extra buttons to get to port
587, might as well get them to authenticate.

Authenticating port 587 is not the silver bullet, but it buys you a little
bit.

Frank

-Original Message-
From: Keith Medcalf [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, September 03, 2008 7:34 PM
To: nanog@nanog.org
Subject: ingress SMTP


 On Wed, Sep 03, 2008 at 12:58:53PM -0400, Nicholas Suan wrote:
  On Sep 3, 2008, at 12:49 PM, Jay R. Ashworth wrote:

  You're forgetting that 587 *is authenticated, always*.

  I'm not sure how that makes much of a difference since the
  usual spam vector is malware that has (almost) complete
  control of the machine in the first place.

 Well, that depends on MUA design, of course, but it's just
 been pointed out to me that the RFC says MAY, not MUST.

 Oops.

 Does anyone bother to run an MSA on 587 and *not* require
 authentication?

Raises hand.

Why would the requirements for authentication be different depending on the
port used to connect to the MTA?

No matter how a session comes into the MTA (port 25, 465, 587, anything
else) and no matter whether it is encrypted or not, the requirement for
authentication (which is always available and advertized), is based on a
simple policy:

 - local delivery originating from a non-blacklisted or internal/customer
address does not require authentication;

 - relay from internal/customer IP Addresses does not require
authentication;

 - any connection from a blacklisted IP requires authentication or no mail
will be accepted;

 - relay from external/non-customer IP Addresses requires authentication;

Is there a valid reason why a different configuration is justified?

As an aside, outbound port 25 traffic is also blocked except from the MTA.