Re: How do you stop outgoing spam?

2002-09-10 Thread Petri Helenius


Eliot Lear wrote:
 
 Please be aware that this could have unintended consequences, and should
 be used in very constrained ways.  In particular, there are any number
 of applications, including VPN applications that use port 80.  I would
 recommend that only specified destinations get such treatment, if you
 apply it at all.
 
If somebody is ignorant enough to implement IP over HTTP, why should
they be accommodated? There are numerous reasons why there are other 
port numbers to TCP than 80 and other protocol numbers to IP than 6.

We could save a lot by eliminating unneccessary headers...

Pete



Re: How do you stop outgoing spam?

2002-09-10 Thread Rafi Sadowsky



## On 2002-09-10 10:02 +0300 Petri Helenius typed:

PH 
PH If somebody is ignorant enough to implement IP over HTTP, why should
PH they be accommodated? There are numerous reasons why there are other
PH port numbers to TCP than 80 and other protocol numbers to IP than 6.

 Why do you think they're ignorant ?
Isn't TCP over HTTP is normally used to attempt bypassing of firewalls ?

 IMHO Firewall/Security admins are ignorant
if they don't take this into account

AFAIK you can tunnel IP over(at least):

 1) HTTP(not just use port 80 for non HTTP traffic)

 2) ICMP ...

 3) DNS queries(needs an external custom cooperating DNS)

-- 
Rafi






Re: How do you stop outgoing spam?

2002-09-10 Thread Marshall Eubanks


On Tue, 10 Sep 2002 01:48:57 +0200 (CEST)
 Iljitsch van Beijnum [EMAIL PROTECTED] wrote:
 
 On Mon, 9 Sep 2002, Marshall Eubanks wrote:
 
   Ok, suppose someone can touch type. The world record is something like
 600
   key presses per minute, which is 10 41-byte TCP packets per second ~= 4
   kbps.
 
  When I go to Internet cafe's (I like Global Gossip), I connect my Ti-book
  to the local ethernet if at all possible (that's why I like Global Gossip)
 and
  use high bit rates (i.e., file transfers) in both direction.
 
 Would the uploads be HTTP? That's the only thing I'd want to limit to a
 few kbps. (Well, and outgoing SMTP to 0 kbps.)


When I am at a cafe I use a web based encrypted email program, and
if I email a large attachment (say a pdf file), then it goes http outbound.
The other major outbound bandwidth use is scp (very rarely, ftp or ssh).

I do not really see what the touch typing limit is relevant to - whose primary
Internet use is telnet /ssh now-a-days ?

Again, when I go to a cafe in another city, I am generally there to
get some work done, and frequently have a bunch of previously prepared
files to send. I may not be a typical user...

Regards
Marshall

 
  If I was limited to 4 kbps outbound, I would want my money back.
 
  Just one customer viewpoint :)
 
 Understandable. On the other hand, spammers using internet cafes isn't
 good either.
 




Re: How do you stop outgoing spam?

2002-09-10 Thread alex


 If somebody is ignorant enough to implement IP over HTTP, why should
 they be accommodated? There are numerous reasons why there are other 
 port numbers to TCP than 80 and other protocol numbers to IP than 6.

Unlike some people that immediately jump to conclusions, that someone may be
not arrogant, but bright - using port TCP 80 is an excellent way to bypass
firewalls. If your firewall performs content analysis, one can simply encode
the data in valid HTML code.

Alex




Re: How do you stop outgoing spam?

2002-09-10 Thread alex


 Hi Eliot
 
  Maybe I'm missing something obvious but do how you get rate-limiting per
 TCP *flow* with Cisco IOS ?

It is more trouble than its worth. SPAM is not a technical problem. It is a
social problem. Using technical methods is not going to solve the problem.
In the end, every time we come up with another method of detecting and
blocking spam, another method is bypassing this defense is going to show up. 

Alex




Re: How do you stop outgoing spam?

2002-09-10 Thread David Charlap


Rafi Sadowsky wrote:
 
 AFAIK you can tunnel IP over(at least):
 
  1) HTTP(not just use port 80 for non HTTP traffic)
 
  2) ICMP ...
 
  3) DNS queries(needs an external custom cooperating DNS)

E-mail: http://detached.net/mailtunnel

-- David




VU#210321

2002-09-10 Thread CERT(R) Coordination Center


-BEGIN PGP SIGNED MESSAGE-

Hello,

The CERT/CC has recently seen discussions in a public forum detailing
potential vulnerabilities in several TCP/IP implementations (Linux,
OpenBSD, and FreeBSD). We are particularly concerned about these types
of vulnerabilities because they have the potential to be exploited
even if the target machine has no open ports.

The messages can be found here:

http://lists.netsys.com/pipermail/full-disclosure/2002-September/001667.html
http://lists.netsys.com/pipermail/full-disclosure/2002-September/001668.html
http://lists.netsys.com/pipermail/full-disclosure/2002-September/001664.html
http://lists.netsys.com/pipermail/full-disclosure/2002-September/001643.html

Note that one individual claims two exploits exist in the
underground. At this point in time, we do not have any more
information, nor have we been able to confirm the existence of these
vulnerabilities.

We would appreciate any feedback or insight you may have. We will
continue to keep an eye out for further discussions regarding this
topic.

FYI,
Ian

Ian A. Finlay
CERT (R) Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA  USA  15213-3890
-BEGIN PGP SIGNATURE-
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBPX3/VqCVPMXQI2HJAQFEqQQAr54e9c5SGgrIfmK5+EWqSOdvySKRtjwa
6dE4Z4DcoyHS57W5BEwW2OSXSGwrBL+mzippfTEnwAVT/otLYAADsnlPSQioRYNi
qHVh8yRXgh3kBgx3cMdhe3NC6zaSWffOsc/EvhkCDo2xa8FQItOqE5MjOeASjt1L
st5qq4mgM+E=
=kHt1
-END PGP SIGNATURE-



RE: VU#210321

2002-09-10 Thread Derek Samford


Ian,
So right now this is a scary rumor floating around the security
scene? Is there any particular trace, or any further details your aware
of? Also, I think it may be safe to assume the Mac OS X/Jaguar may be
vulnerable as well. AFAIK it runs of the BSD IP Stack, so it's more than
likely that it is vulnerable if this exploit is in fact a reality. I'll
keep an eye out for any suspicious traffic myself, as I'm sure will the
rest of the list. Thanks for the warning, as if this is real, it could
be be potentially very harmful. Any great C Coders out there start
pouring over the code yet?

Derek

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf
Of
 CERT(R) Coordination Center
 Sent: Tuesday, September 10, 2002 10:16 AM
 To: [EMAIL PROTECTED]
 Cc: CERT(R) Coordination Center
 Subject: VU#210321
 
 
 -BEGIN PGP SIGNED MESSAGE-
 
 Hello,
 
 The CERT/CC has recently seen discussions in a public forum detailing
 potential vulnerabilities in several TCP/IP implementations (Linux,
 OpenBSD, and FreeBSD). We are particularly concerned about these types
 of vulnerabilities because they have the potential to be exploited
 even if the target machine has no open ports.
 
 The messages can be found here:
 
 http://lists.netsys.com/pipermail/full-disclosure/2002-
 September/001667.html
 http://lists.netsys.com/pipermail/full-disclosure/2002-
 September/001668.html
 http://lists.netsys.com/pipermail/full-disclosure/2002-
 September/001664.html
 http://lists.netsys.com/pipermail/full-disclosure/2002-
 September/001643.html
 
 Note that one individual claims two exploits exist in the
 underground. At this point in time, we do not have any more
 information, nor have we been able to confirm the existence of these
 vulnerabilities.
 
 We would appreciate any feedback or insight you may have. We will
 continue to keep an eye out for further discussions regarding this
 topic.
 
 FYI,
 Ian
 
 Ian A. Finlay
 CERT (R) Coordination Center
 Software Engineering Institute
 Carnegie Mellon University
 Pittsburgh, PA  USA  15213-3890
 -BEGIN PGP SIGNATURE-
 Version: PGPfreeware 5.0i for non-commercial use
 Charset: noconv
 
 iQCVAwUBPX3/VqCVPMXQI2HJAQFEqQQAr54e9c5SGgrIfmK5+EWqSOdvySKRtjwa
 6dE4Z4DcoyHS57W5BEwW2OSXSGwrBL+mzippfTEnwAVT/otLYAADsnlPSQioRYNi
 qHVh8yRXgh3kBgx3cMdhe3NC6zaSWffOsc/EvhkCDo2xa8FQItOqE5MjOeASjt1L
 st5qq4mgM+E=
 =kHt1
 -END PGP SIGNATURE-




RE: VU#210321

2002-09-10 Thread CERT(R) Coordination Center


-BEGIN PGP SIGNED MESSAGE-

Hi, Derek.

So right now this is a scary rumor floating around the security
scene? 

Right. Rumors for now...

Is there any particular trace, or any further details your aware
of? 

Not at this time.

Also, I think it Amay be safe to assume the Mac OS X/Jaguar may be
vulnerable as well. AFAIK it runs of the BSD IP Stack, so it's more than
likely that it is vulnerable if this exploit is in fact a reality. I'll
keep an eye out for any suspicious traffic myself, as I'm sure will the
rest of the list. 

Thank you, we really appreciate it.

Thanks for the warning, as if this is real, it could
be be potentially very harmful. Any great C Coders out there start
pouring over the code yet?

Glad to be of help. I really appreciate the feedback we get from the
NANOG community.

Thanks again,
Ian

Ian A. Finlay
CERT (R) Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA  USA  15213-3890




-BEGIN PGP SIGNATURE-
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBPX4I9aCVPMXQI2HJAQFabAQAnwkyxn2LZJ0VOv3L7RT5jwzGEy0pRL7A
FRE920tu4ys8fuaoweFp1YaiUUlVPFuoPFgFWlsHJ7uUkUVcL0T6Kzm5bzp8C5hz
QYdYjuumEj1thy/zxzzAJIsJqiLcXG0rW0iAlpaQ0X30JqH13OEHVr4Wuev0a2Pi
efDOLkEzliQ=
=dZDX
-END PGP SIGNATURE-



Re: How do you stop outgoing spam?

2002-09-10 Thread Valdis . Kletnieks

On Tue, 10 Sep 2002 09:45:19 EDT, [EMAIL PROTECTED] said:

 It is more trouble than its worth. SPAM is not a technical problem. It is a
 social problem. Using technical methods is not going to solve the problem.

There are two saying that come to mind:

You can't solve social problems with technical solutions

There are very few inter-personal problems that can't be solved by the
suitable application of high explosives

Most spam-fighting efforts on the technical side make the basic assumption
that spam has similar characteristics to a properly designed TCP stack - that
dropped/discarded spam-grams will trigger backoff at the sender.  Unfortunately,
discarding a high percentage of the grams will trigger a retransmit multiple
times.

Spam is likely going to be a problem until we either hire some thug muscle from
pick ethnic organized crime group, or the government does it for us...

-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg05279/pgp0.pgp
Description: PGP signature


Deja vu all over again

2002-09-10 Thread sal . sabella



Pawlukiewicz Jane wrote:
 Quick Question, how much memory does the bgp tables actually take. I'm
 estimating 32 mb in my plan, but I'm worried that's not enough.

Jane, nothing with you is ever quick.  Rather than just searching google to find the 
answers to your silly questions, you have to waste all our time.  I don't care what 
bet you have going with your boss, or how many full views you're attempting to cram 
into that 700 series ISDN router.

Repeat after me, Jane: SEARCH FIRST, ASK QUESTIONS LATER.

Sal Sabella




Get your free encrypted email at https://www.hushmail.com



RE: How do you stop outgoing spam?

2002-09-10 Thread Al Rowland


Okay, I'm going to break my promise, 

Can anyone document more than one isolated instance, if that, of
spammers using North American Cyber Cafes? (This is NANOG)

If so, wouldn't appropriate AUP with appropriate fines to the CC the
user used for access be a more appropriate sniper rifle shot rather than
just shot gunning all your users?

As far as 'loading' spam software, any Cyber Café that has the cpu out
where Joe User has access and/or hasn't set appropriate user rights
preventing software installation or system access, won't be in business
very long anyway.

Best regards,
_
Alan Rowland


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of
Iljitsch van Beijnum
Sent: Monday, September 09, 2002 4:49 PM
To: Marshall Eubanks
Cc: [EMAIL PROTECTED]
Subject: Re: How do you stop outgoing spam?



On Mon, 9 Sep 2002, Marshall Eubanks wrote:

  Ok, suppose someone can touch type. The world record is something 
  like 600 key presses per minute, which is 10 41-byte TCP packets per

  second ~= 4 kbps.

 When I go to Internet cafe's (I like Global Gossip), I connect my 
 Ti-book to the local ethernet if at all possible (that's why I like 
 Global Gossip) and use high bit rates (i.e., file transfers) in both 
 direction.

Would the uploads be HTTP? That's the only thing I'd want to limit to a
few kbps. (Well, and outgoing SMTP to 0 kbps.)

 If I was limited to 4 kbps outbound, I would want my money back.

 Just one customer viewpoint :)

Understandable. On the other hand, spammers using internet cafes isn't
good either.





Re: How do you stop outgoing spam?

2002-09-10 Thread sal . sabella



Marshall Eubanks wrote:
 When I am at a cafe I use a web based encrypted email program, and
 if I email a large attachment (say a pdf file), then it goes http
 outbound.

When I am at a cafe, I eat, drink, and sometimes converse with others.

 Again, when I go to a cafe in another city, I am generally there
 to get some work done

Again, when I go to a cafe in another city, I am generally there to eat, drink, 
converse, and soak in the local sights.

I might be in Burbank next week on business.  We should meet up then. Think you could 
get me tickets and a VIP backstage tour at the Tonight Show?  I'd like to meet with 
NBC execs and weigh the pros and cons of multicasting your band's performance in PIM 
Dense vs. Sparse mode.  You're a great musician BTW.  Tell Jay I said hi.

Sal Sabella




Get your free encrypted email at https://www.hushmail.com



Re: How do you stop outgoing spam?

2002-09-10 Thread sal . sabella



Susan, why do your rules not apply to Jane?  I realize she's a larger-than-life figure 
here, but enough is enough.  I won my bet with my boss that she would violate AUP at 
least five (5) times and not get removed from the list.

Please read the NANOG FAQ at http://www.nanog.org/aup.html.  If there are further 
hypocrisies on your part, I'll have to ask Brad Knowles for an AOL account to post 
from.

Sal

Please do not post personal messages on the NANOG mailing list,
 which
focuses on Internet engineering and operations issues. In my la
st message
to you I pointed to our AUP:
 
http://www.nanog.org/aup.html

If there are further AUP violations on your part, we'll need to
 remove
your posting privileges from the list.

Susan Harris, Ph.D. 
Merit Network/Univ. of Mich.
 

On Tue, 10 Sep 2002 [EMAIL PROTECTED] wrote:

 
 
 Marshall Eubanks wrote:
  When I am at a cafe I use a web based encrypted email progr
am, and
  if I email a large attachment (say a pdf file), then it goe
s http
  outbound.
 
 When I am at a cafe, I eat, drink, and sometimes converse wit
h others.
 
  Again, when I go to a cafe in another city, I am generally 
there
  to get some work done
 
 Again, when I go to a cafe in another city, I am generally th
ere to eat, drink, converse, and soak in the local sights.
 
 I might be in Burbank next week on business.  We should meet 
up then. Think you could get me tickets and a VIP backstage tour at the Tonight Show? 
 I'd like to meet with NBC execs and weigh the pros and cons of multicasting your 
band's performance in PIM Dense vs. Sparse mode.  You're a great musician BTW.  Tell 
Jay I said hi.
 
 Sal Sabella
 
 
 
 
 Get your free encrypted email at https://www.hushmail.com
 







Get your free encrypted email at https://www.hushmail.com



Re: How do you stop outgoing spam?

2002-09-10 Thread Valdis . Kletnieks

On Tue, 10 Sep 2002 09:12:15 PDT, Joe St Sauver said:
 Actually, our experience *does* follow the backoff paradigm: if you block a 
 particular source of spam, that rejection *does* seem to trigger message
 volume backoff at the source, with only periodic check probes apparently 
 designed to see if the spam source is really still blocked (and of course 
 it really still is). 

Yes - but since they need to have N replies to their spam to make it worth
the effort, they will just pound on somebody ELSE.  I saw one quote from
a very unapologetic spammer who was complaining that with all these blocks
he had to send a lot more spam and his costs were up 1000% as a result.

Let's say a spammer needs 100 replies to turn a profit, and 1% of the things
that make it into a mailbox get a reply.  If nobody blocks spam, then the
spammer only needs to send 10K messages before he profits.  If 99% of spam
is blocked, he has to send a million.  That's why we're seeing statistics
like receives 2 billion pieces of mail a day and 80% is spam.

Think of it like a host with multiple A records - if one A goes down, they
*do* stop trying that one, but they then fail to use backoff on the OTHER
addresses ;)
-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg05286/pgp0.pgp
Description: PGP signature


Re: How do you stop outgoing spam?

2002-09-10 Thread Dave Crocker


At 08:20 PM 9/9/2002 +, Paul Vixie wrote:
outbound SMTP should be blocked for any dynamic or dialup source within

One of the basic problems with discussions about spam control is that it 
focuses entirely on spam.  Blocking output SMTP from individual dial-ups 
has a serious negative consequence:

 Laptop mobile users cannot use their home SMTP server.

 At best, they must reconfigure for each venue -- goodbye wireless 
hotspot convenience -- and that is IF they know the SMTP server address for 
the local access.

 In other words, by blocking output SMTP, mobile users are hurt 
badly.  I know that *I* certainly am.  Constantly and serously.

d/

--
Dave Crocker mailto:[EMAIL PROTECTED]
TribalWise, Inc. http://www.tribalwise.com
tel +1.408.246.8253; fax +1.408.850.1850




Re: How do you stop outgoing spam?

2002-09-10 Thread Iljitsch van Beijnum


On Tue, 10 Sep 2002 [EMAIL PROTECTED] wrote:

  It is more trouble than its worth. SPAM is not a technical problem. It is a
  social problem. Using technical methods is not going to solve the problem.

 There are two saying that come to mind:

 You can't solve social problems with technical solutions

That's what happens when you hang around with software engineers too long.
They think all problems are solvable. And most problems, especially social
ones, aren't: they need to be managed. Sure, you can't stop spam entirely
by technical (or other) means, but that's no reason to ignore the problem
and run an open relay.

 There are very few inter-personal problems that can't be solved by the
 suitable application of high explosives

Sounds like a technical solution to me...

 Spam is likely going to be a problem until we either hire some thug muscle from
 pick ethnic organized crime group, or the government does it for us...

Or we throw out SMTP and adopt a mail protocol that requires the sender to
provide some credentials that can't be faked. Then known spammers are easy
to blacklist.




Re: How do you stop outgoing spam?

2002-09-10 Thread Christopher L. Morrow



On Tue, 10 Sep 2002, Dave Crocker wrote:


 At 08:20 PM 9/9/2002 +, Paul Vixie wrote:
 outbound SMTP should be blocked for any dynamic or dialup source within

 One of the basic problems with discussions about spam control is that it
 focuses entirely on spam.  Blocking output SMTP from individual dial-ups
 has a serious negative consequence:

  Laptop mobile users cannot use their home SMTP server.

Why are mobile laptop users NOT using ssl/esmtp ? This uses port 587 or
425 or something like that... additionally, it provides authenitcation for
the connection. Atleast in small scenarios it works beautifully.




Re: Internet connection secure from surveilance?

2002-09-10 Thread bdragon


 Here is my reply to Joe
 
 Your solution is good. In general, anyone worried about this kind of invasion of 
privacy 
 should arrange to run their own root servers. The more the merrier. This is not 
neccessarily
 about having multiple roots with colliding TLDs, but about security from 
surveillance. 

A better solution would be to turn off recursion, this _may_ lead to
partitioning away from the rest of the internet, just as running a local
root may lead to partitioning away. The benefit, of course, is that
you don't worry about someone tapping into any sub-domain dns
server.

Slightly better than that is to disconnect from the network entirely.
This will help prevent someone from eavesdropping on other protocols
as well. Again, this may lead to partitioning away from the rest of the
network.




Re: How do you stop outgoing spam?

2002-09-10 Thread Barton F Bruce





A twist we saw spammers using on dialup accounts in Miami could come to
cyber cafes and could be ugly.

They were dialing in and then using the IP address to send spam out some
other connection elsewhere where RPF wasn't in use. The return packets all
came back on their dialup into us, but bypassed our filters that were then
only on outbound packets.

Since these were wholesaled dial ports, we know there are no valid servers
customers needed in RIPE annd APNIC blocks and in long ACLs blocking various
MSN servers, AND we know the dialup user's account. In a free cafe, you know
none of that.

Having an inbound mirror image of the outbound ACL helped initially, and
then a coworker crafted a reflexive access list that really stopped them.
Inbound packets had to have matching outbound ones or were tossed.

We had visions of their finding a $spam$ friendly ISP that would sell them a
SPAM OC-3 as long as he got no spam complaints. It could have served many
spam machines running with dynamic IPs from many different ISPs and many
user accounts on each - all at once.

In the free cyber cafe that does not NAT and that does not know who the
users are, there is potential for similar abuse.





Re: How do you stop outgoing spam?

2002-09-10 Thread Barry Shein



The best way to stop spam from going out of an ISP is to:

A) Make a clear policy as part of the terms  conditions, including a
significant clean-up fee + direct charges (e.g., if they ask you or
prompt a legal question they can pay the legal fee for you to get it
answered.)

B) KNOW WHO THE HELL YOU'RE GIVING ACCOUNTS TO so that (A) works. Get
a credit card or verify the phone number and other info (e.g., call
them back, insist on calling them back.)

C) Use (B) to enforce (A).

The problem in 99% of the cases is either (B) or ISPs who just don't
care at all.

I no longer believe it was a throwaway account is a reasonable
excuse except in a rare case where something slipped through the
cracks, I understand it can happen.

But when a spammer is creating throwaway after throwaway the ISP needs
to change their account creation procedures because this information
is shared by spammers and they've become a target.


-- 
-Barry Shein

Software Tool  Die| [EMAIL PROTECTED]   | http://www.TheWorld.com
Purveyors to the Trade | Voice: 617-739-0202| Login: 617-739-WRLD
The World  | Public Access Internet | Since 1989 *oo*



Re: How do you stop outgoing spam?

2002-09-10 Thread Barry Shein



On September 9, 2002 at 14:47 [EMAIL PROTECTED] ([EMAIL PROTECTED]) wrote:
  On Mon, 09 Sep 2002 10:37:35 PDT, Al Rowland [EMAIL PROTECTED]  said:
   How many (more) protocols are we willing to cripple in the name of
   fighting spam?
  
  Crippling protocols won't help, in the long run.  What will help is
  the use of a baseball bat, properly applied. Unfortunately, although
  it would probably be *cheaper* to hire insert ethnic organized crime
  group to simply whack the cluelessmailers.org list of top 100
  offenders, network providers fall into two distinct classes:

You've certainly gotten to the heart of the problem, Valdis.

The problem is we're up against a new organized crime on the internet
in the form of scams and spams.

And, although some won't like me saying this, having the technical
community deal with these new criminals is a bit like sending the boy
scouts after Al-Qaida.

Unfortunately it's going to take a much harsher view of reality than
maybe this regexp will stop crime.

-- 
-Barry Shein

Software Tool  Die| [EMAIL PROTECTED]   | http://www.TheWorld.com
Purveyors to the Trade | Voice: 617-739-0202| Login: 617-739-WRLD
The World  | Public Access Internet | Since 1989 *oo*



RE: How do you stop outgoing spam?

2002-09-10 Thread Dan Hollis


On Tue, 10 Sep 2002, Al Rowland wrote:
 Can anyone document more than one isolated instance, if that, of
 spammers using North American Cyber Cafes? (This is NANOG)

They usually use copy places like kinko's, or public libraries.
Cyber cafes tend to be too conspicuous.

-Dan
-- 
[-] Omae no subete no kichi wa ore no mono da. [-]




Re: How do you stop outgoing spam?

2002-09-10 Thread Andy Dills


On Tue, 10 Sep 2002, Dave Crocker wrote:


 At 08:20 PM 9/9/2002 +, Paul Vixie wrote:
 outbound SMTP should be blocked for any dynamic or dialup source within

 One of the basic problems with discussions about spam control is that it
 focuses entirely on spam.  Blocking output SMTP from individual dial-ups
 has a serious negative consequence:

  Laptop mobile users cannot use their home SMTP server.

I don't think Paul meant to say blocked as in 'connection refused', I
think he meant that they should be redirected to a local machine that will
happily send their mail (with reasonable limits on number of recipients
per arbitrary time period, which all of your mail servers should have
anyway).

Andy


Andy Dills  301-682-9972
Xecunet, LLCwww.xecu.net

Dialup * Webhosting * E-Commerce * High-Speed Access




Re: How do you stop outgoing spam?

2002-09-10 Thread alex


 and bypassing firewalls is an excellent way to get into BIG trouble with
 whomever is running the firewall.  It is irrelevant how ignorant that
 person might be about the traffic which passes through their firewall.
 I'm sure if they were only slightly less ignorant they'd run a strict
 HTTP gateway on port 80 of their firewall and then you'd be stuck
 wrappging everything up to look like proper HTTP in order to bypass
 their firewall.  It is better that you learn to negotiate the access you
 need than to have to resort to using covert channels which could get you
 busted.

Steno is a great thing, so it wont get anyone busted.

Alex




Re: How do you stop outgoing spam?

2002-09-10 Thread Valdis . Kletnieks

On Tue, 10 Sep 2002 19:18:59 +0200, Iljitsch van Beijnum said:

 Or we throw out SMTP and adopt a mail protocol that requires the sender to
 provide some credentials that can't be faked. Then known spammers are easy
 to blacklist.

It's nice to say we make it easy to blacklist spammers.  The problem is
that those systems that *HAVE* made it easy to blacklist spammers are *ALWAYS*
taking heat for making it easy - remember how ORBS was held in little high
regard?  And even the MAPS people have had their share of legal hassles.

We don't even have to throw out SMTP - there's STARTTLS, AUTH, PGP, and
so on.  The problem is that we don't know how to do a PKI that will
scale (note that the current SSL certificate scheme isn't sufficient, as
it usually does a really poor job of handling CRLs - and the *lack* of
ability to distribute a CRL (which is essentially a blacklist) is the crux
of the problem.  There's also the problem of distributing valid credentials
to half a billion people - while still preventing spammers from getting
any.  The DMV hasn't learned how to keep *teenagers* from getting fake ID's,
why should we expect to do any better in keeping a motivated criminal from
getting a fake credential?

It's not as easy as it looks. As Bruce Schneier talked about in Secrets and
Lies, where he does a hypothetical threat analysis regarding getting dinner
in a restaurant without paying, most of the attacks actually have nothing to
do with the part of the transaction where money changes hands...

-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg05297/pgp0.pgp
Description: PGP signature


Re: How do you stop outgoing spam?

2002-09-10 Thread Barry Shein



Point of information:

Can you really distinguish all this intentionality vs. the spammer
just changing which relay to rape? Perhaps because the raped relay was
shut down or secured when the owner found out what was going on?

Or the spammer just switching relays to rape for no specific reason
other than they seem to go bad after a few hours so use one for a
while (perhaps a batch of addresses to spam) and then switch to the
next in the list?


On September 10, 2002 at 09:12 [EMAIL PROTECTED] (Joe St Sauver) wrote:
  Actually, our experience *does* follow the backoff paradigm: if you block a 
  particular source of spam, that rejection *does* seem to trigger message
  volume backoff at the source, with only periodic check probes apparently 
  designed to see if the spam source is really still blocked (and of course 
  it really still is). 
  
  Now it is true that in many cases the spammer *will* do a set of probes in an 
  effort to see just how broad a given block is (e.g., is it just a /32 that's 
  being blocked? is it my entire netblock? is it a domain based filter? can I 
  slide in via an open SMTP relay or an abusable proxy server?), but at least 
  here at the U of O, we're NOT seeing spammers waste their time attempting 
  delivery of hundreds or thousands of messages per day via hosts that have 
  been identified and filtered. 
  
  Regards,
  
  Joe

-- 
-Barry Shein

Software Tool  Die| [EMAIL PROTECTED]   | http://www.TheWorld.com
Purveyors to the Trade | Voice: 617-739-0202| Login: 617-739-WRLD
The World  | Public Access Internet | Since 1989 *oo*



Re: How do you stop outgoing spam?

2002-09-10 Thread Barry Shein



On September 10, 2002 at 10:16 [EMAIL PROTECTED] (Dave Crocker) wrote:
  
  At 08:20 PM 9/9/2002 +, Paul Vixie wrote:
  outbound SMTP should be blocked for any dynamic or dialup source within
  
  One of the basic problems with discussions about spam control is that it 
  focuses entirely on spam.  Blocking output SMTP from individual dial-ups 
  has a serious negative consequence:

Yeah, well, too late, that battle was fought and settled years
ago. The spammers are driving the standards at this point, not
reasonable people trying to make things work.

Ultimately that's one of my big problems with spammers, they're like
termites in the RFCs quietly chewing away at both the letter and
intent.

At this point your easy-to-agree-with point is kinda like saying

  I pay taxes, I damned well ought to be able to walk any street in any
   city at any time of the day or night and be safe!

nice sentiment, but unfortunately no longer realistic, not where the
criminals are in charge.

-- 
-Barry Shein

Software Tool  Die| [EMAIL PROTECTED]   | http://www.TheWorld.com
Purveyors to the Trade | Voice: 617-739-0202| Login: 617-739-WRLD
The World  | Public Access Internet | Since 1989 *oo*



Re: How do you stop outgoing spam?

2002-09-10 Thread Paul Vixie


 One of the basic problems with discussions about spam control is that it 
 focuses entirely on spam.  Blocking output SMTP from individual dial-ups 
 has a serious negative consequence:
 
  Laptop mobile users cannot use their home SMTP server.

in the business, we call this tough noogies.

  At best, they must reconfigure for each venue -- goodbye wireless 
 hotspot convenience -- and that is IF they know the SMTP server address for 
 the local access.

i've gotten very good mileage out of ssl-smtp, and out of port forwarding
so that my laptop uses 127.0.0.1:25 for outbound mail, which is actually a
(ssh-borne) tunnel to my home smtp server.

  In other words, by blocking output SMTP, mobile users are hurt 
 badly.  I know that *I* certainly am.  Constantly and serously.

yes.  let me take this opportunity to thank you for your significant
contributions to smtp and of course rfc822.  i'm sorry that you have to
be hurt now.  but the design calls for a polite population, and while
that was true of the internet in 1983, it is absolutely not true today.
the nonpolite nature of the overall population means that you will have
to be hurt and you will have to change how you use mail in order to make
the pain stop.  there's a slight choice on the pain menu -- you can have
(A) an unusable mail system clogged with unwanted traffic such as spam
and viruses, or (B) a barely-usable mail system where everything you want
to do is less convenient because you have to use ssl-smtp and ssh tunnels.
either way you have to be hurt now.  and that saddens me, it really does.



RE: How do you stop outgoing spam?

2002-09-10 Thread Al Rowland


Steganography looked great in that hollywood movie Along Came a Spider
with Morgan Freeman (or at least the 'screen friendly' version they
portrayed) but a recent study of millions of graphics across USENET
found zero steganographic images. Great theory, no examples found in the
wild, other than in Hollywood scripts and some folk trading porn of the
type not usually posted to the public Internet.

Anyone interested my try:
http://www.earthweb.com/article/0,,10456_624101,00.html

Just my 2¢.

Best regards,
_
Alan Rowland


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of
[EMAIL PROTECTED]
Sent: Tuesday, September 10, 2002 12:15 PM
To: Greg A. Woods
Cc: [EMAIL PROTECTED]
Subject: Re: How do you stop outgoing spam?



 and bypassing firewalls is an excellent way to get into BIG trouble 
 with whomever is running the firewall.  It is irrelevant how ignorant 
 that person might be about the traffic which passes through their 
 firewall. I'm sure if they were only slightly less ignorant they'd run

 a strict HTTP gateway on port 80 of their firewall and then you'd be 
 stuck wrappging everything up to look like proper HTTP in order to 
 bypass their firewall.  It is better that you learn to negotiate the 
 access you need than to have to resort to using covert channels which 
 could get you busted.

Steno is a great thing, so it wont get anyone busted.

Alex





RE: How do you stop outgoing spam?

2002-09-10 Thread alex


 Steganography looked great in that hollywood movie Along Came a Spider
 with Morgan Freeman (or at least the 'screen friendly' version they
 portrayed) but a recent study of millions of graphics across USENET
 found zero steganographic images. Great theory, no examples found in the
 wild, other than in Hollywood scripts and some folk trading porn of the
 type not usually posted to the public Internet.

Steno principals are alive and well. Covert channel transmissions are alive
and well. Both were used to bypass compartmentalization on a certain secure
OS. If anyone needs to encode data in valid HTML to tunnel it through a
firewall, it *will* be done. Several years ago, we had implementations of
telnet over email, I am sure modifying it to do telnet over HTML would be a
rather trivial task.

Alex




Re: How do you stop outgoing spam?

2002-09-10 Thread Paul Vixie


[EMAIL PROTECTED] (Barton F Bruce) writes:

 A twist we saw spammers using on dialup accounts in Miami could come to
 cyber cafes and could be ugly.
 
 They were dialing in and then using the IP address to send spam out some
 other connection elsewhere where RPF wasn't in use. The return packets all
 came back on their dialup into us, but bypassed our filters that were then
 only on outbound packets.

this has been going on for some time.  the example you gave of an OC3
used for outbound-only tcp streams is noncontrived and has been seen
more than twice.

it's been a year or so, so i'll renew my question.  is anybody, anywhere,
including as a term of their peering agreement things like must have a
responsive abuse@ mailbox and act credibly to prevent spammers from 
becoming or remaining customers or must filter both bgp advertisements
and ip source addresses from all customers, and require them to do
likewise?

and if not, why not, and how long do you think it's going to take before
we use economic methods to solve this scourge?
-- 
Paul Vixie



Re: How do you stop outgoing spam?

2002-09-10 Thread Majdi S. Abbas


On Tue, Sep 10, 2002 at 12:45:01PM -0700, Al Rowland wrote:
 Steganography looked great in that hollywood movie Along Came a Spider
 with Morgan Freeman (or at least the 'screen friendly' version they
 portrayed) but a recent study of millions of graphics across USENET
 found zero steganographic images. Great theory, no examples found in the
 wild, other than in Hollywood scripts and some folk trading porn of the
 type not usually posted to the public Internet.

I was going to stay out of this one, but then this came
along.  It is trivially easy to encrypt, transpose, or otherwise
bury the message inside an image, or what have you.

If I use a PRNG, prearrangement, or some other selection method 
to decide which bytes, or which files, or some combination of both will
receive a chunk of the data to be hidden, and then encrypt it with
a decent enough algorithm, it will not be easy to determine there is
something there at all, particularly in a medium like USENET where lots
and lots of large binary postings are common.

Just because someone ran through a pile of images using jpegv4
with the jsteg patches, or some similar commercial application, does
not mean it wasn't there -- it just means it wasn't obviously there.

I myself have encrypted my PGP key's revocation certificates
and buried them in some images on a website as a fallback storage
method.

Is it widely used?  Probably not.  Is it safe to say it's not
being used on the basis of a quick check with an off the shelf 
utility or two?  No.

--msa



Re: How do you stop outgoing spam?

2002-09-10 Thread Richard A Steenbergen


On Tue, Sep 10, 2002 at 12:45:01PM -0700, Al Rowland wrote:
 
 Steganography looked great in that hollywood movie Along Came a Spider
 with Morgan Freeman (or at least the 'screen friendly' version they
 portrayed) but a recent study of millions of graphics across USENET
 found zero steganographic images. Great theory, no examples found in the
 wild, other than in Hollywood scripts and some folk trading porn of the
 type not usually posted to the public Internet.

Well, I wouldn't say that.

There is an EXTENSIVE trade of some unknown data going to and from Asia
(primarily Japan and China) through various forms of steganography in jpg
png and gif images on free web hosting services. I can personally account
for over 5Gbps (every day) of this traffic just from people I know, which
I would hardly consider to be everyone.

I've managed to reconstruct the data from pieces of scripts they have
accidentally left behind, and come up with encrypted .zip files. Left a
zip cracker running on a 1GHz machine for a couple months and came up with
no results.

I'm not gonna take any guesses as to the content, but I can tell you that
they are very diversified, very persistant (you filter one route or
transit path and they'll have moved to another within hours), and very
innovative in hiding the data so that you can't detect what they're doing
short of looking at every picture.

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



Re: How do you stop outgoing spam?

2002-09-10 Thread Rafi Sadowsky



## On 2002-09-10 09:45 -0400 [EMAIL PROTECTED] typed:


  Hi Eliot
 
   Maybe I'm missing something obvious but do how you get rate-limiting per
  TCP *flow* with Cisco IOS ?

 It is more trouble than its worth.

 IMHO there are other problems beside SPAM that can use per flow
shaping/rate-limiting


  SPAM is not a technical problem. It is a
 social problem. Using technical methods is not going to solve the problem.
 In the end, every time we come up with another method of detecting and
 blocking spam, another method is bypassing this defense is going to show up.

 How about using a combination of technical and social measures
For example in a Cyber Cafe use passive technical measures to count the
total number of outbound SMTP sessions and charge 1$ per Email over an
average rate of 2 Emails/minute and 10$ per Email exceeding a rate of 10
per minute



 Alex



-- 
Rafi




Re: How do you stop outgoing spam?

2002-09-10 Thread Vadim Antonov



herecy

Or unless we design a network which does not rely on good will of its
users for proper operation.

/herecy

--vadim

On Tue, 10 Sep 2002 [EMAIL PROTECTED] wrote:

 Most spam-fighting efforts on the technical side make the basic assumption
 that spam has similar characteristics to a properly designed TCP stack - that
 dropped/discarded spam-grams will trigger backoff at the sender.  Unfortunately,
 discarding a high percentage of the grams will trigger a retransmit multiple
 times.
 
 Spam is likely going to be a problem until we either hire some thug muscle from
 pick ethnic organized crime group, or the government does it for us...




Re: How do you stop outgoing spam?

2002-09-10 Thread Vadim Antonov



On Tue, 10 Sep 2002, Iljitsch van Beijnum wrote:

 Or we throw out SMTP and adopt a mail protocol that requires the sender to
 provide some credentials that can't be faked. Then known spammers are easy
 to blacklist.

The credentials that can't be faked is a rather hard to implement 
concept.  Simply because there's no way to impose a single authority on 
the entire world.  The question is whom to trust to certify the sender's
authenticity?  I have correspondents in parts of the world where I'd be 
very reluctant to trust proper authorities.  I'd be so very easy to 
silence anyone by _not_ issuing credentials.

Besides, anonymous communication has its merits.  So what's needed is 
zero-knowledge authentication and Web-of-trust model.  And don't forget 
key revocation and detection of fake identity factories.  Messy, messy, 
messy.

--vadim




RE: How do you stop outgoing spam?

2002-09-10 Thread Tony Hain


Rafi Sadowsky wrote:
  How about using a combination of technical and social 
 measures For example in a Cyber Cafe use passive technical 
 measures to count the total number of outbound SMTP sessions 
 and charge 1$ per Email over an average rate of 2 
 Emails/minute and 10$ per Email exceeding a rate of 10 per minute

So the person who connects after sitting on a plane for 5 hours gets
charged extra because the laptop bursts 50 messages ... There is no
automated technical approach to a social problem. Public executions
would be much more effective than preventing legitimate customers from
getting their job done.

Tony





Re: How do you stop outgoing spam?

2002-09-10 Thread Iljitsch van Beijnum


On Tue, 10 Sep 2002 [EMAIL PROTECTED] wrote:

 We don't even have to throw out SMTP - there's STARTTLS, AUTH, PGP, and
 so on.  The problem is that we don't know how to do a PKI that will
 scale (note that the current SSL certificate scheme isn't sufficient, as
 it usually does a really poor job of handling CRLs - and the *lack* of
 ability to distribute a CRL (which is essentially a blacklist) is the crux
 of the problem.

So let everyone have their own. If you want to send me email, create a
certificate for yourself. Then before you can actually tranfser messages,
your system asks permission to do so, my system sends back a challenge to
yours so I'm sure you haven't faked your reply address and your
certificate is whitelisted. If you spam me, I can blacklist your
certificate, your email address or your domain. If I handle mail for many
users, I can apply some heuristics: new certificates/domains only get to
send a small number of messages per hour initially or something similar.

 It's not as easy as it looks.

Granted, but it's also not so hard we can't improve on a 20 year old
protocol. As (nearly) always, the problem is backward compatibility. That
makes it next to impossible to get something useful off the ground.




Re: How do you stop outgoing spam?

2002-09-10 Thread Vadim Antonov



On Tue, 10 Sep 2002, Barry Shein wrote:

 And, although some won't like me saying this, having the technical
 community deal with these new criminals is a bit like sending the boy
 scouts after Al-Qaida.
 
 Unfortunately it's going to take a much harsher view of reality than
 maybe this regexp will stop crime.


Last time I checked policemen weren't designing door locks.  Not even in
business of selling them.

What we have is a lot of open doors having prominent signs come in and
take whatever you please on them.  This can and should be fixed by the
technical community.

US is not going to send troops to Nigeria just to catch some spammers 
anyway.  Consider that a harsher view of reality :)

--vadim

PS. Criminals are criminals because they are stupid.  If they were smart
they could make good living legally.  Governments avoid competition, 
too.




Re: How do you stop outgoing spam?

2002-09-10 Thread Eliot Lear


Tony Hain wrote:
 Public executions would be much more effective than preventing
 legitimate customers from getting their job done.

A proposed activity for Portland?  Network engineer assisted homocide?

;-)




Re: Console Servers

2002-09-10 Thread Charles Sprickman


Hello all,

Here's what I've found out.  It's a mix.  If any one solution looks to
be the winner it's the roll-your-own solution.  This is what I'm going
for since it's relatively cheap for low-density installs.  The only
problem I'm finding is that it's tough to get a 1U box that has 2 PCI
slots open.  2U seems overkill.  Since Compact Flash adapters are cheap
(about $20) and the cards themselves can be had for $59 (128MB), I'm going
to go diskless.  I'll probably use conserver, but I'll be giving rtty a
try as well.

If anyone has pointers to cheap 1U or 2U's, I'm all ears.  Just need a
minimal box, don't need much CPU for this.

With about 13 replies, I can report the following:

 Lantronix - http://www.lantronix.com/products/cs/scs820_scs1620/index.html

1 vote for, one against.  The complaint was that the Lantronix has a very
bad management interface.

I also noted that BBC is using a mess of these at Telehouse...

 Cyclades - http://www.cyclades.com/products/ts_series.php

4 for.

Under the covers, it's your average linux box with ttys0-ttys31.  The
portslave software is pretty nice, too.  Offline data buffering and the
ability to stick a hostname relationship with a serial port.  [Ex:  ssh2
bob:myserver@cyclades to connect to server myserver ]

Another poster is using the cyclades and the digi, and if I'm reading him
right, uses the Cyclades 48 port for smaller installations and the digi on
larger.

 Digi - http://www.digi.com/solutions/devtermsrv/cm/index.shtml
 Looks to run about $1800 for 16 ports

1 for (kind of).  The poster has a large installed base and it mostly
works and has a very high density.  Apparently it's a two-piece system
where a cable fans out to boxes that further split it.  But if one of the
splitters locks up, everything dasiy-chained through it locks up.  This
person is now using Cyclades (please correct me if I'm wrong on this one).

Equinox - 2 folks using these (cards).

We use the Equinox SST-128P (theoretically expandable to 128 ports,
comes in 16-port chunks) on Linux. Their linux drivers work well [...]
It's aPCI card with a cable to an external plugboard with the 16 RJ-45s.

I have had a bit of experience with Equinox (http://www.equinox.com/)
gear and can recommend them. Their serial hubs will talk serial to almost
anything out there and when plugged into cat5, tunnel those serial ports
back to physical mappings on a host system.  [...] Geared more towards
industrial applications (what I'm using them for) but I have often
considered slapping one in our telecomm rack to map serial ports
on my local box to our various gear.

Cisco -

2 suggestions to use a 2511 or a 3620 with 16 port async cards.  The 2511
would probably be a bit too slow if you enable ssh though...

Livingston -

2 for an old portmaster behind an ssh-able box (if you have the space)

Arula Systems (www.arula.com)-

1 vote for this, apparently a new company.

Build your own -

5 for this solution.  Everyone is using FreeBSD, and the RocketPort cards
seem to work better than the Cyclades cards under FreeBSD.  3 people are
using conserver (www.conserver.com) to make it easier to manage.  Paul
Vixie shared the following (he gave permission to quote in full):

We use RocketPort, FreeBSD, IronSystems, and ISC rtty.

http://www.rocketport.com/products/specs/rack16_foto.asp
http://www.rocketport.com/products/specs/specs.asp?product=rp_pci

http://www.freebsd.org/
http://www.ironsystems.com/

ftp://ftp.vix.com/pub/vixie/rtty-4.0.shar.gz

This puts a BSD box in every POP, which is very useful for many reasons.

So there you are...  Thanks for all the responses.

Charles




ISPs who de-aggregate intentionally?

2002-09-10 Thread Jeffrey Haas


As part of the process of making the latest BGP draft an IETF standard,
the IDR working group is in the process of reviewing how the current
draft reflects deployed code.

As part of this effort, if anyone is aware of ISPs who intentionally
de-aggregate routes and could contact me to share some of the
reasoning and their methodologies behind this, I would greatly
appreciate it.

Please note - no names will be named, unless you want to be.
A summary of the results will be posted back to this list.

-- 
Jeff Haas 
NextHop Technologies



Re: Console Servers

2002-09-10 Thread Simon Lockhart


On Tue Sep 10, 2002 at 04:53:02PM -0400, Charles Sprickman wrote:
  Lantronix - http://www.lantronix.com/products/cs/scs820_scs1620/index.html
 
 1 vote for, one against.  The complaint was that the Lantronix has a very
 bad management interface.
 
 I also noted that BBC is using a mess of these at Telehouse...

...a mess... ?

http://support.bbc.co.uk/support/standards/rack_top.jpg

We do indeed use the Lantronix, have done since '97 or before. Not really
had any reliability problems with them. The odd fan bearing has gone, but 
they keep running none-the-less.

The CLI is very VMSish, but not bad when you get used to it, plenty of
online help.

Only minor niggle is that they changed the authentication procedure in
a recent code version, without flagging it in big letters.
 
 Cisco -
 
 2 suggestions to use a 2511 or a 3620 with 16 port async cards.  The 2511
 would probably be a bit too slow if you enable ssh though...

I use a 2610 with the 16 port async card for personal colo, and it works
well. Not noticed any performance problems for occasional use. Biggy niggle
is that you can't easily setup ssh to a port with per-port passwords. Had
to fudge it thus:

username port1 noescape password 7 **
username port1 autocommand telnet 123.45.67.89 2033

interface Loopback0
 ip address 123.45.67.89 255.255.255.255

access-list 1 permit 123.45.67.89

line 33 48
 access-class 1 in
 no exec  
 transport input telnet

Simon
-- 
Simon Lockhart   |   Tel: +44 (0)1737 839676 
Internet Engineering Manager |   Fax: +44 (0)1737 839516 
BBC Internet Services| Email: [EMAIL PROTECTED] 
Kingswood Warren,Tadworth,Surrey,UK  |   URL: http://support.bbc.co.uk/



Re: How do you stop outgoing spam?

2002-09-10 Thread Dave Crocker


Well, it's clear that the real point I was trying to make was entirely 
missed by everyone, so let me try again.

Dealing with problems, by focusing on absolute outbound port control, 
restricts legitimate use, as well as problematic use.  For a group that is 
largely dominated by libertarian thinking, opting for blanket, outbound 
port control is odd.  Very odd.

Security mechanisms can choose between a default-yes or a default-no 
mode.  Choosing to restrict outbound ports is a default-no.  Think of this 
as the difference between democracy and totalitarianism.  You get to do 
things until you try to do something wrong, versus you are not allowed to 
do anything until you first prove that it is ok.

Spamming is a serious problem, and it needs serious responses, but we need 
to be very careful that dealing with the problem does not kill the net.


At 03:34 PM 9/10/2002 -0400, Barry Shein wrote:
On September 10, 2002 at 10:16 [EMAIL PROTECTED] (Dave Crocker) wrote:
   One of the basic problems with discussions about spam control is that it
   focuses entirely on spam.  Blocking output SMTP from individual dial-ups
   has a serious negative consequence:

Yeah, well, too late, that battle was fought and settled years
ago. The spammers are driving the standards at this point, not
reasonable people trying to make things work.

There are no standards for these practises.  There are component 
mechanisms, but no integrated solution that is documented in a standard. 
That's part of the problem.  In reality what is being done is entirely ad 
hoc and inconsistent.  Otherwise we could at least know what will work for 
all conforming sites.  And we could migrate everyone over to it.

And, again, let me stress that I am not saying spamming isn't a 
problem.  But rather that dealing with spamming simplistically carries very 
serious side-effects.


At this point your easy-to-agree-with point is kinda like saying
   I pay taxes, I damned well ought to be able to walk any street in any
city at any time of the day or night and be safe!

No.  It is like saying that because there is some street crime, in some 
places, let's make it illegal to walk anywhere, ever.

And it is like saying that because some people make obscene phone calls, 
all phone calls will now be monitored.

That really is what these blanket outbound controls are like.



At 07:40 PM 9/10/2002 +, Paul Vixie wrote:
   Laptop mobile users cannot use their home SMTP server.
in the business, we call this tough noogies.

I had hoped that my reference to wireless hot-spot implications would make 
the scale and import of this approach adequately clear.

That it does not nicely demonstrates why techies must not be in charge of a 
business that makes any claim to serving their customers.

Broad-sweep, large-scale crippling of legitimate activity is not a 
realistic way to deal with a problem, even one as serious as spam.


   At best, they must reconfigure for each venue -- goodbye wireless
  hotspot convenience -- and that is IF they know the SMTP server address 
 for
  the local access.

i've gotten very good mileage out of ssl-smtp, and out of port forwarding
so that my laptop uses 127.0.0.1:25 for outbound mail, which is actually a
(ssh-borne) tunnel to my home smtp server.

There are always technical solutions that techies can follow.  A more 
relevant question is what it will take for 100 million average users.  As 
everyone on this list knows, the Internet is about scaling.

So it is entirely irrelevant what any one of the people on this list can do 
to make things work.  It is ONLY relevant what the impact is on 100 million 
other folks.  Folks who are not sysadmins.  Folks who cannot constantly 
reconfigure their systems.

And ultimately it does not matter that a particular hack can be propagated, 
such as mapping 25 to a local ssl redirect.

What matters is that the model that leads to that hack is broken even worse 
than spamming, because it says that the way to respond to a problem by some 
folks is to block all folks.  Today, port 25.  Tomorrow -- and in some 
places, today -- all ports except a precious few and even those are mediated.


be hurt now.  but the design calls for a polite population, and while
that was true of the internet in 1983, it is absolutely not true today.

Since I never said anything against adding security mechanisms, I'll just 
assume that you missed my point.  In order not to bog down too far on that 
point, let me just ask:

 And the BCP that specifies the correct set of technologies, 
configurations, and use is...?

However the danger of going down this path is to miss the larger point 
about the problem with wholesale outbound port blocking.

d/


--
Dave Crocker mailto:[EMAIL PROTECTED]
TribalWise, Inc. http://www.tribalwise.com
tel +1.408.246.8253; fax +1.408.850.1850




Re: Console Servers

2002-09-10 Thread Kevin Oberman


 Date: Tue, 10 Sep 2002 16:53:02 -0400 (EDT)
 From: Charles Sprickman [EMAIL PROTECTED]
 Sender: [EMAIL PROTECTED]
 
 
 Hello all,
 
 Here's what I've found out.  It's a mix.  If any one solution looks to
 be the winner it's the roll-your-own solution.  This is what I'm going
 for since it's relatively cheap for low-density installs.  The only
 problem I'm finding is that it's tough to get a 1U box that has 2 PCI
 slots open.  2U seems overkill.  Since Compact Flash adapters are cheap
 (about $20) and the cards themselves can be had for $59 (128MB), I'm going
 to go diskless.  I'll probably use conserver, but I'll be giving rtty a
 try as well.
 
 If anyone has pointers to cheap 1U or 2U's, I'm all ears.  Just need a
 minimal box, don't need much CPU for this.
 
 With about 13 replies, I can report the following:
 
  Lantronix - http://www.lantronix.com/products/cs/scs820_scs1620/index.html
 
 1 vote for, one against.  The complaint was that the Lantronix has a very
 bad management interface.

One issue is that there are two very different Lantronix boxes, the
SCSx00 and the SCSx20. The SCSx20 boxes were designed by Lightwave
Communications before they were bought out by Lantronix. They are
Linux boxes that reportedly have a very different management interface
from the 800/1600. I have used only the 1620 and, other than the high
price, I have been very pleased with them.

Despite the similarity of model numbers, the two product lines are
totally different.

I found a review of console servers from Network Computing that
reviewed quite a number of boxes at:

http://www.lantronix.com/news/news/network_computing.html

R. Kevin Oberman, Network Engineer
Energy Sciences Network (ESnet)
Ernest O. Lawrence Berkeley National Laboratory (Berkeley Lab)
E-mail: [EMAIL PROTECTED]  Phone: +1 510 486-8634




Re: How do you stop outgoing spam?

2002-09-10 Thread Dan Hollis


On Tue, 10 Sep 2002, Barry Shein wrote:
 A problem with spam is not only aren't you likely to get caught, it's
 not even generally agreed to be illegal.

Worse yet, even in cases of clear criminal violations (eg relay rape, 
forgery, scams, death threats), it goes unprosecuted -- even when its 
trivial to track down the offenders.

And you would not BELIEVE the effort it takes to get the US military to 
close their open relays (not to mention close their smurf amps and shut 
down their rooted boxes).

Fully half the fault and responsibility for the current state of affairs 
lies with providers who are unwilling to take any action to shut down well 
known spammers and abusers.

-Dan
-- 
[-] Omae no subete no kichi wa ore no mono da. [-]




Re: How do you stop outgoing spam?

2002-09-10 Thread Tim Thorne


Rafi Sadowsky [EMAIL PROTECTED] wrote:

 How about using a combination of technical and social measures.

How about nuking their DNS (providing they use DNS and not a URL with
an IP address) from the face of the planet making sure they can't
re-register it with any registrar? I know it gives them another hoop
to jump through, but the jumping will keep them from spamming for a
bit.

Tim



Re: ISPs who de-aggregate intentionally?

2002-09-10 Thread Jeffrey Haas


As a quick followup to my request:

On Tue, Sep 10, 2002 at 05:06:51PM -0400, Jeffrey Haas wrote:
 As part of this effort, if anyone is aware of ISPs who intentionally
 de-aggregate routes and could contact me to share some of the
 reasoning and their methodologies behind this, I would greatly
 appreciate it.

Explicit de-aggregation, in this case, is taking an existing announcement
and creating more specific announcements from it.  For example,
taking 10/8 and creating (where it didn't exist before) 10/9 and 10.128/9.

The leaking of more specific routes that actually exist in your
network is more a case of failing to aggregate, even if the assiged
internal networks are a result of taking your assigned block and
breaking it into several subnets.

Thanks for all the responses thus far.

-- 
Jeff Haas 
NextHop Technologies



Re: How do you stop outgoing spam?

2002-09-10 Thread Barry Shein



On September 10, 2002 at 14:20 [EMAIL PROTECTED] (Dave Crocker) wrote:
  
  Well, it's clear that the real point I was trying to make was entirely 
  missed by everyone, so let me try again.
  
  Dealing with problems, by focusing on absolute outbound port control, 
  restricts legitimate use, as well as problematic use.  For a group that is 
  largely dominated by libertarian thinking, opting for blanket, outbound 
  port control is odd.  Very odd.

I think we do understand very well.

In a nutshell: We're hosed.

Everyone is running around willy-nilly doing things like blocking
outbound port servers, analyzing mail headers which were never meant
to be analyzed, doing full body text searching against hundreds of
regexp patterns, blocking hundreds if not thousands of IP addresses
and entire (CIDR forgive me) nets, etc.

At this point your easy-to-agree-with point is kinda like saying
   I pay taxes, I damned well ought to be able to walk any street in any
city at any time of the day or night and be safe!

No.  It is like saying that because there is some street crime, in some 
places, let's make it illegal to walk anywhere, ever.

The word for this is curfew and it's not unusual in troubled areas.

And it is like saying that because some people make obscene phone calls, 
all phone calls will now be monitored.

All phone calls are potentially monitorable because of problems like
this.

etc etc etc let's not quibble the analogies too much.

My point is that we are now in a high crime zone, and what the laws
(standards) say are becoming less and less influential versus frantic
attempts to stop crime (spam.)

You can't have law without order.

Put another way, if no one will (or can) enforce the law such that
order prevails people will just do what they have to. This often
results in chaos.

1. Outlaws running crazy in the streets, drunk, raping, looting,
   tipping badly, etc.

2. Citizens meet in the church, yell at the sheriff, sheriff shrugs
   shoulders, bunch of men grab rifles and march out to confront
   outlaws themselves.

3. Massacre, vigilantes shoot each other, other honest townspeople,
   criminals laugh hysterically and vow to get drunker and have
   more fun (Dave, you've come in just about here.)

4. New sheriff comes into town, scares the crap out of everyone
   because he's so mean. Threatens to hang any citizen who takes
   law into own hands, etc.

5. New sheriff cleverly thwarts criminals while citizenry cowers
   behind closed doors and drawn curtains.

6. Law and order is restored, townspeople tearfully beg new sheriff
   to stay. Sheriff sneers, rides into sunset, next time you have to
   do it for yourselves.

7. Haunting tune whistled, credits roll.


-- 
-Barry Shein

Software Tool  Die| [EMAIL PROTECTED]   | http://www.TheWorld.com
Purveyors to the Trade | Voice: 617-739-0202| Login: 617-739-WRLD
The World  | Public Access Internet | Since 1989 *oo*



Re: How do you stop outgoing spam?

2002-09-10 Thread Barry Shein



On September 10, 2002 at 14:41 [EMAIL PROTECTED] (Dan Hollis) wrote:
  On Tue, 10 Sep 2002, Barry Shein wrote:
   A problem with spam is not only aren't you likely to get caught, it's
   not even generally agreed to be illegal.

...some stuff snipped...

  Fully half the fault and responsibility for the current state of affairs 
  lies with providers who are unwilling to take any action to shut down well 
  known spammers and abusers.

But much of that goes back to spamming not being clearly illegal, in
two ways:

1. Some just take the attitude that if it's not illegal then it's ok,
ignorable even if obnoxious behavior. No doubt the fact that it's
paying customers doing the spamming in some cases colors this
view. For others it's probably just overworked, yet another
distraction.

2. Some others take the attitude that if it's not illegal they're
taking a chance (of lawsuit etc) if they shut someone down.

Unless of course they have clear TC's, but no matter how you write
them some obnoxious, agressive, pond-scum can try to dispute that it
applies to them. Been there, done that.

Unless you do something nice and transparent like you get 5
complaints per month free, the rest cost you $100/each.

-- 
-Barry Shein

Software Tool  Die| [EMAIL PROTECTED]   | http://www.TheWorld.com
Purveyors to the Trade | Voice: 617-739-0202| Login: 617-739-WRLD
The World  | Public Access Internet | Since 1989 *oo*



Drive-by spam hits wireless LANs

2002-09-10 Thread blitz





And you think the terresterial sources are hard to shut down



Drive-by spam hits wireless LANs

By Graeme Wearden
Special to CNET News.com
September 6, 2002, 10:14 AM PT
http://news.com.com/2100-1033-956911.html

LONDON--The proliferation of insecure corporate wireless networks is
fueling the growth of drive-by spamming, a security expert warned on
Thursday.




Re: Drive-by spam hits wireless LANs

2002-09-10 Thread Joel Jaeggli


It always figures, that when you create a commons, virtual or actual that 
someone will come along and mess it up.

joelja

On Tue, 10 Sep 2002, blitz wrote:

 
 
 
 
 And you think the terresterial sources are hard to shut down
 
 
 
 Drive-by spam hits wireless LANs
 
 By Graeme Wearden
 Special to CNET News.com
 September 6, 2002, 10:14 AM PT
 http://news.com.com/2100-1033-956911.html
 
 LONDON--The proliferation of insecure corporate wireless networks is
 fueling the growth of drive-by spamming, a security expert warned on
 Thursday.
 

-- 
-- 
Joel Jaeggli  Academic User Services   [EMAIL PROTECTED]
--PGP Key Fingerprint: 1DE9 8FCA 51FB 4195 B42A 9C32 A30D 121E  --
  In Dr. Johnson's famous dictionary patriotism is defined as the last
  resort of the scoundrel.  With all due respect to an enlightened but
  inferior lexicographer I beg to submit that it is the first.
-- Ambrose Bierce, The Devil's Dictionary





Re: How do you stop outgoing spam?

2002-09-10 Thread Dan Hollis


On Tue, 10 Sep 2002, Barry Shein wrote:
 2. Some others take the attitude that if it's not illegal they're
 taking a chance (of lawsuit etc) if they shut someone down.

But they often dont shut abusers down even when the activity IS illegal 
(eg flooding attacks, rooting boxes, scanning and dictionary attacks, 
 criminal trespass relay rape, etc.)

 Unless of course they have clear TC's, but no matter how you write
 them some obnoxious, agressive, pond-scum can try to dispute that it
 applies to them. Been there, done that.

Or companies which dont enforce them (eg exodus) even when its criminal 
trespass...

-Dan
-- 
[-] Omae no subete no kichi wa ore no mono da. [-]




RE: ISPs who de-aggregate intentionally?

2002-09-10 Thread dalph



 As part of the process of making the latest BGP draft an IETF
 standard, the IDR working group is in the process of reviewing how
 the current draft reflects deployed code.
 
 As part of this effort, if anyone is aware of ISPs who intentionally
 de-aggregate routes and could contact me to share some of the
 reasoning and their methodologies behind this, I would greatly
 appreciate it.

It's great for traffic engineering.  We have two different upstreams in
two different cirites, and use it to avoid traffic on our core.  We
wanted to offer static IP dialups for roaming users, but had troubles
with /32 prefixes being filtered by the big players.

-Dalph




Get your free encrypted email at https://www.hushmail.com



Re: Console Servers

2002-09-10 Thread Charles Sprickman


On Tue, 10 Sep 2002, Simon Lockhart wrote:

  I also noted that BBC is using a mess of these at Telehouse...

 ...a mess... ?

Just to be clear, when I say mess I don't mean messy, but a lot,
bunches, oodles, etc.

You have a very nice neat setup there, one of the better organized open
cabinets I saw in the facility.  I was working about 3 cabinets down.  I
also was wondering where that Axis cam was displayed, now I know.

I did see on major carrier there with a bunch of Juniper equipment and
about 3 OC-48, 2 OC-12 and 2 or 3 OC-3 interfaces.  No door on the
cabinet.  Very frightening given the recent security thread.  It was so
messy I'd be worried someone walking by could accidentally take out a few
OC-48 lines...

Charles

   http://support.bbc.co.uk/support/standards/rack_top.jpg

 We do indeed use the Lantronix, have done since '97 or before. Not really
 had any reliability problems with them. The odd fan bearing has gone, but
 they keep running none-the-less.

 The CLI is very VMSish, but not bad when you get used to it, plenty of
 online help.

 Only minor niggle is that they changed the authentication procedure in
 a recent code version, without flagging it in big letters.

  Cisco -
 
  2 suggestions to use a 2511 or a 3620 with 16 port async cards.  The 2511
  would probably be a bit too slow if you enable ssh though...

 I use a 2610 with the 16 port async card for personal colo, and it works
 well. Not noticed any performance problems for occasional use. Biggy niggle
 is that you can't easily setup ssh to a port with per-port passwords. Had
 to fudge it thus:

   username port1 noescape password 7 **
   username port1 autocommand telnet 123.45.67.89 2033

   interface Loopback0
ip address 123.45.67.89 255.255.255.255

   access-list 1 permit 123.45.67.89

   line 33 48
access-class 1 in
no exec
transport input telnet

 Simon
 --
 Simon Lockhart   |   Tel: +44 (0)1737 839676
 Internet Engineering Manager |   Fax: +44 (0)1737 839516
 BBC Internet Services| Email: [EMAIL PROTECTED]
 Kingswood Warren,Tadworth,Surrey,UK  |   URL: http://support.bbc.co.uk/





Re: How do you stop outgoing spam?

2002-09-10 Thread Barry Shein



Ya know Vadim, with all due respect, some people choose to live on
their knees, one govt after another.

You do know what happened to HUAC et al don't you? They got their
butts thrown out of congress. Sen Joe McCarthy died a lonely, bitter,
drunk.

Meanwhile, civilization demands of us to use a govt or govt-like
entity to run a legal system, not vigilantism.

   -b

On September 10, 2002 at 18:29 [EMAIL PROTECTED] (Vadim Antonov) wrote:
  Some of us came from places where the new sheriff came and stayed. And
  because just scaring didn't work after some time, he proceeded to hang and
  hang and hang, murdering millions just to keep the rest properly scared.
  
  When someone gets power he's quite unlikely to part with it on his own.  
  Harsher view of the reality, if you wish.  Or, rather, real life
  experience.
  
  Calling on government to come and fix problems which can conceivably be
  fixed without it is a surefire way to get more sheriffs on your neck.  
  HUAC[*] reading your e-mail to determine if it contains loathed
  un-american terrorist-sponsoring spam. With Ashcroft being in charge of
  grilling spammers. Or whomever he declared an enemy today.
  
  Be careful with what you wish.  Your wish may be granted.
  
  --vadim
  
  [*] House Un-American Activities Commitee.



Re: How do you stop outgoing spam?

2002-09-10 Thread Dave Crocker


At 09:53 PM 9/10/2002 -0400, Barry Shein wrote:
You do know what happened to HUAC et al don't you? They got their
butts thrown out of congress. Sen Joe McCarthy died a lonely, bitter,
drunk.

barry, look around and what's been happening over the last year.

he's popular again.

d/


--
Dave Crocker mailto:[EMAIL PROTECTED]
TribalWise, Inc. http://www.tribalwise.com
tel +1.408.246.8253; fax +1.408.850.1850




Just another day on the Internet

2002-09-10 Thread Sean Donelan



Experts predicted that Wednesday is likely to be just another day on the
Internet, and if anything a quiet day for cybercriminals.

http://story.news.yahoo.com/news?tmpl=storyncid=581e=7cid=581u=/nm/20020911/tc_nm/attack_tech_cyberthreat_dc

What is a normal day on the Internet?

http://www.caida.org/outreach/papers/2001/BackScatter/

Measured 12,000 attacks over a three week period, or 570 attacks a day.

http://www.fcc.gov/Bureaus/Engineering_Technology/Filings/Network_Outage/

There is a significant outage on average every 2-3 days.