Re: Principles of Spam-abatement

2004-03-17 Thread Dave Crocker
Paul,

PV but i'll bet my bank has ways of trusting your bank.
...
PV if your bond is only $30/year then i probably wouldn't trust you no matter
PV what my bank told me about your insurance company or what your insurance


It depends upon what is being trusted and what the incentives are for
violating the trust.

Some trust does require a large, enforceable penalty for violations.
Other trust can work quite well based only on history.

A bank might give out small, unsecured loans based on that history, but
might require a big loan to be secured.

I might be willing to take a first-first email from someone who has a
history of not-spamming, without requiring that they suffer a penalty
(other than my reporting them to the third-party trust agency) if they
violate that.

d/
--
 Dave Crocker dcrocker-at-brandenburg-dot-com
 Brandenburg InternetWorking www.brandenburg.com
 Sunnyvale, CA  USA tel:+1.408.246.8253




Re: Principles of Spam-abatement

2004-03-17 Thread Paul Vixie
 I might be willing to take a first-first email from someone who has a
 history of not-spamming, without requiring that they suffer a penalty
 (other than my reporting them to the third-party trust agency) if they
 violate that.

no, you would not.

dave, you're not thinking of this as information warfare.  you have to.
every time you consider a plan, ask yourself where are the loopholes?
or how can it be abused?  (and, what if 6 billion people did this?)

identities without history will be a dime a dozen, or cheaper.  spammers
with no history could trample your privacy all day long if you allowed it.

accepting incoming communication from someone the world has no hooks into
is off the table.  allowing the world to have its hooks in someone whose
identity you don't know (and could never find out) has to continue to work,
but anonymity and homelessness are not the same thing.



Re: Principles of Spam-abatement

2004-03-17 Thread Vernon Schryver
 From: Paul Vixie 

 ...
 identities without history will be a dime a dozen, or cheaper.  spammers
 with no history could trample your privacy all day long if you allowed it.

 accepting incoming communication from someone the world has no hooks into
 is off the table.  allowing the world to have its hooks in someone whose
 identity you don't know (and could never find out) has to continue to work,
 but anonymity and homelessness are not the same thing.

Stated that way, but perhaps with an unintended interpretation, I agree.
Every mail sender is hooked by an entity that the mail receiver knows
and that has its own reputation that can be checked today.  The ISPs
that own the IP addresses in every IP packet that Ralsky sends have
their hooks in Ralsky.   You can decide whether the implicit no-spam
guarantee from that hooking agency is sufficient by checking your own
blacklist or the blacklists of others via DNS or BGP.

All of the possible good and bad aspects of any possible trust or
reputation system are already present in the current system.  

  - If you say that you can't trust ISPs to check that a new customer
 is not Al Ralsky in disguise or one of his proxies, then you must
 say the same about any other organization.

  - If you say that ISPs cannot check the reputation of new customers
 for a $30/month account, then you must say the same about any other
 organization.

  - If you say that you cannot trust ISPs to terminate the accounts of
 spammers, then you must say that you cannot trust any other outfit
 to revoke the PKI cert or other assurance for spammers. 

  - If you trust some of those other outfits to revoke their virtual
 letters of introduction and recommendation, than you must be
 willing to trust some ISPs to do the same and terminate accounts.

  - If you say that third party organization could assure you that a
 mail sender is not a spammer, then you must agree that an ISP
 could check with that organization before adding a password to a
 RADIUS server or or turn on a DSLAM, and that an ISP could terminate
 an account when that third party revokes is assurance.

  - You can be anonymous on the Internet only if your ISP protects you.
 No one is homeless on the Internet.  The SYN-ACK for your SYN to
 port 25 must get back to your source IP address home at your ISP.

The connection between you, the spam or mail target, and the ISP that
has its hooks in the mail sender is better than any PKI or crypto
related system could possibly be.  It is not only much cheaper than
anything Microsoft/Yahoo/AOL/Verisign would sell, but technically more
reliable.  IP address spoofing was practically impossible for spam
even before RFC 1948 and related defenses, because it was too hard and
unreliable if you need to make 10,000,000 successfully spoofed ISN
predicted TCP connections per day.  On the other hand, we all knew
even before the bogus Microsoft Corporation certs or the discovery
that those bogus certs could not be revoked that commercial PKI is eyewash.

If you believe that reputation or trust systems might help the
spam problem, then the only room for improvement is in the trust query
protocol.  DNS is a screw driver being used as a hammer in DNS blacklists.
However, this is merely a matter of optimization or elegance.


Vernon Schryver[EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-17 Thread Eric A. Hall

On 3/17/2004 9:33 AM, Paul Vixie wrote:

 identities without history will be a dime a dozen, or cheaper.
 spammers with no history could trample your privacy all day long if you
 allowed it.
 
 accepting incoming communication from someone the world has no hooks
 into is off the table.

Not applicable to sales@ or emergency@ type mailboxes.

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/



Re: Principles of Spam-abatement

2004-03-17 Thread Ed Gerck

Eric A. Hall wrote:
 
 On 3/17/2004 9:33 AM, Paul Vixie wrote:
  accepting incoming communication from someone the world has no hooks
  into is off the table.
 
 Not applicable to sales@ or emergency@ type mailboxes.

Why? Should someone arrive at your Sales or Emergency window
in your office, naked, what would you do? 

Off the table is IMO the correct action for an email address
that is naked -- i.e., that has no verification information.

Note that this is nothing new. We already do this with IP numbers.
If you send me a packet with a non-verifiable source IP there 
will be no communication possible. Why should it be different 
with email addresses?

Cheers,
Ed Gerck



Re: Principles of Spam-abatement

2004-03-17 Thread Paul Vixie
[EMAIL PROTECTED] (Vernon Schryver) writes:

 ...
 If you believe that reputation or trust systems might help the
 spam problem, then the only room for improvement is in the trust query
 protocol.  DNS is a screw driver being used as a hammer in DNS blacklists.
 However, this is merely a matter of optimization or elegance.

so, it's possible that there is some overlap between my universal privacy
goals, and my support for the long-awaited dnssec extensions, and my support
for the procket/juniper/cisco/paix/nasa/verio/shepfarm/isc multicast
deployment effort.
-- 
Paul Vixie



Re: Principles of Spam-abatement

2004-03-17 Thread Yakov Shafranovich
Vernon Schryver wrote:
If you believe that reputation or trust systems might help the
spam problem, then the only room for improvement is in the trust query
protocol.  DNS is a screw driver being used as a hammer in DNS blacklists.
However, this is merely a matter of optimization or elegance.
I had some preliminary conversations with blacklist operators about 
this. There wasn't any interest in making a better protocol, but some 
people did expressed a need to document the existing one.

Yakov



Re: Apology Re: Principles of Spam-abatement

2004-03-17 Thread Dean Anderson
On Tue, 16 Mar 2004, Ed Gerck wrote:

 Dean Anderson wrote:
  
  On Tue, 16 Mar 2004, Ed Gerck wrote:
   What information theory says is that the probability of detecting
   spam is less than 100%.
  
  No, information theory doesn't say that at all. 
 
 Sure it says, and that's why a spam filter will never be 100%
 effective. I guess we agreed on this before ;-) 

I think you must have missed my message noting our disagreement.
http://www.ietf.org/mail-archive/ietf/Current/msg24213.html

 Now, you may want to refer to that mythical element, the 'spam-free' 
 protocol, a protocol that an information theory model says cannot 
 be built. I guess we also agreed before that a 'spam-free' protocol 
 is impossible. The IETF should not attempt to develop it.
 
 Thus, in asking for IETF technical solutions for spam, it is
 obvious that I do not mean spam filters or 'spam-free' protocols.  
 We would all be very happy with a protocol that is almost 
 spam-free -- in fact, I believe we would be quite happy with 90% 
 at this time. Me thinks we don't need 100% ;-)
 
 An IETF technical solution to reduce spam is doable. Your comment
 on 'spam-free' is useful-free ;-)

The IETF cannot reduce spam either.  Protocol changes are simply
gratiutious.  One might say that there is very little spam on X.400 mail
systems.  But it is simply because spammers aren't interested, not because
X.400 has some special immunity.  Spammers will simply adapt to any
gratuitous change.  At best, only a temporary reduction would be obtained,
until the spammers adapt. After they adapt, there is no reduction.

However, I think there are things that show some promise that might be
harder to adapt to, such as automated text summarization, bayesian
filters, mail agents that filter on the user's interest in the message
subject, and such. I think these are worth pursuing, but these are not
subjects for the IETF.  Further, there are still inverse methods for
spammers, so even these will simply be temporary.  But I think the benefit 
of intelligent agents and summarization and interest filtering could be 
very beneficial in filtering even non-spam mail.  

Ages ago, managers had secretaries filter there postal mail and phone
calls.  I'd love to have a 'secretary' filter my email, so that I could
subscribe to noisy lists and see only the messages that I was interested
in. But this is technology that isn't a protocol, nor does it seem to be
in need of a protocol, so there is little or no reason for the IETF to be
involved.

  No, it is quite useful: The IETF can do nothing to prevent spam.
 
 ;-) this mantra is becoming a spam.

Or perhaps it is the mantra that the IETF can do something to reduce spam.

   What interests the IETF are technical spam solutions, for example,
   that would prevent email that comes from unidentifiable or rogue
   senders/MTAs to be ever received.
  
  The only thing that can acheive this is to turn off the computer.
 
 No, it's a matter of degree. Even if not all spam is preventable,
 preventing email address spoofing (even to a degree) would have
 a range of benefits. For example, I would no longer receive
 those undelivered messages for email that I purportedly sent,
 but actually never did. And people receiving email from me could 
 actually trust to some extent the outcome of their filters. And, 
 to be clear, I'm not talking about PKI. 

Actually, I want to receive those bounced messages. Otherwise I don't know
if someone is out there trying to abuse me. Often, the perpetrator can be
identfied from these bounce messages, since they usually include the
original message and its mail headers, which give an IP address and a time
of use.  But it is easy to delete messages from Mailer Daemon if you
don't want them.

The problem here is to distinguish the real you from the not-real you.  
Or rather, to distinguish the unauthorized not-real you from both the
authorized not-real-you and the real-you. Real users use relays.  Real
users also use agents, like cron jobs to send email. How do you know the
cron job is not a spammer?  It might be abuse.  It might not be abuse. We
don't know until we check on it. There is no way to avoid this check.

RMX can't work, because real users need to be able to use a wide range of
relays, which depends on their physical location as well as their
arrangements for outsourcing, as well as the service offerings of multiple
providers. For example, Av8 Internet provides relay services for users of
earthlink, because those users have leased line services from Av8, but
email services from Earthlink, and earthlink doesn't do relay service
outside its IP address space.

How is the relay to know if the message is really from you or not really
from you?  Password (or per-user account) style authentication (such as
SMTP AUTH) hasn't had any effect on spam, and it doesn't scale well, and
isn't widely supported. Passwords can be stolen by viruses, or by
disgruntled users if they are well-known. If you 

Re: Principles of Spam-abatement

2004-03-17 Thread Eric A. Hall

On 3/17/2004 10:47 AM, Ed Gerck wrote:

 Eric A. Hall wrote:

Not applicable to sales@ or emergency@ type mailboxes.
 
 Why? Should someone arrive at your Sales or Emergency window
 in your office, naked, what would you do? 

uh, public nudity is (mostly) criminal, so not a good analogy, although
comparisons to a no shirt, no shoes, no service policy statement would
be getting there.

A better analogy is with new checking accounts. Many places won't accept
checks numbered below 1000, since they indicate that the account has not
established a track record. Other places will accept the checks after
verification, other places will accept them with thumbprint or some other
identifier. In all these cases, the organization is able to determine its
risk limits and act accordingly.

I'm not going to get sucked into this endless debate, but it is equally
tyrannical to require everyone use some kind of hard trust as it is to
require everyone use no trust (what we are moving away from, in blobbish
fashion and pace). There must be consideration for exceptions; the
swimming pool snack bar probably cannot enforce a no shirt... policy.

Property rights (of which I am a big advocate) work because they can be
selected and enforced at the owner's scale; people can put up no
trespassing or no solicitation or no hunting or no shirt... signs
to advertise their chosen policies. The same kind of mechanism is needed
for property protection to work in networking as well.

 Note that this is nothing new. We already do this with IP numbers.
 If you send me a packet with a non-verifiable source IP there 
 will be no communication possible. Why should it be different 
 with email addresses?

Verification is different from trust. My position is that you need to be
able to validate and verify before you can successfully apply any kind of
trust (otherwise the trust is meaningless). Paul's message that I replied
to was specifically describing a minimum threshold of trust (it was akin
to the no checks below #1000 position).

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/



Re: Principles of Spam-abatement

2004-03-17 Thread Dean Anderson
When you cannot trust people like Paul Vixie and Bill Manning to terminate
sites that are engaging in plainly obvious and egregious defamation and
harrassment claiming that IP address space is hijacked when a quick check
of the registry indicates that it isn't, then you also can't trust them to
be in charge of a trust system.  They are people who have asked others to
trust them. They are people who have said that trust is important.  They
are people who have said ISP's should have AUP's, and should enforce them
against abusive users.

The world certainly has its hooks into them.  Yet, we find that they are
associated with court-proven liars and other disreputable people, who have
their own spiteful agenda, and they aren't even embarrassed by that
finding.  We find them misleading their subscribers, for example by
blocking companies outside of their criteria, or just completely falsely
for spite.

This type of thing hasn't happened just once, but many times, by many
blacklist operators.

Quite obviously, we can't have a trust based system, because the 
anti-spammers are even less trustworthy than the spammers.

--Dean

On Wed, 17 Mar 2004, Vernon Schryver wrote:

  From: Paul Vixie 
 
  ...
  identities without history will be a dime a dozen, or cheaper.  spammers
  with no history could trample your privacy all day long if you allowed it.
 
  accepting incoming communication from someone the world has no hooks into
  is off the table.  allowing the world to have its hooks in someone whose
  identity you don't know (and could never find out) has to continue to work,
  but anonymity and homelessness are not the same thing.
 
 Stated that way, but perhaps with an unintended interpretation, I agree.
 Every mail sender is hooked by an entity that the mail receiver knows
 and that has its own reputation that can be checked today.  The ISPs
 that own the IP addresses in every IP packet that Ralsky sends have
 their hooks in Ralsky.   You can decide whether the implicit no-spam
 guarantee from that hooking agency is sufficient by checking your own
 blacklist or the blacklists of others via DNS or BGP.
 
 All of the possible good and bad aspects of any possible trust or
 reputation system are already present in the current system.  
 
   - If you say that you can't trust ISPs to check that a new customer
  is not Al Ralsky in disguise or one of his proxies, then you must
  say the same about any other organization.
 
   - If you say that ISPs cannot check the reputation of new customers
  for a $30/month account, then you must say the same about any other
  organization.
 
   - If you say that you cannot trust ISPs to terminate the accounts of
  spammers, then you must say that you cannot trust any other outfit
  to revoke the PKI cert or other assurance for spammers. 
 
   - If you trust some of those other outfits to revoke their virtual
  letters of introduction and recommendation, than you must be
  willing to trust some ISPs to do the same and terminate accounts.
 
   - If you say that third party organization could assure you that a
  mail sender is not a spammer, then you must agree that an ISP
  could check with that organization before adding a password to a
  RADIUS server or or turn on a DSLAM, and that an ISP could terminate
  an account when that third party revokes is assurance.
 
   - You can be anonymous on the Internet only if your ISP protects you.
  No one is homeless on the Internet.  The SYN-ACK for your SYN to
  port 25 must get back to your source IP address home at your ISP.
 
 The connection between you, the spam or mail target, and the ISP that
 has its hooks in the mail sender is better than any PKI or crypto
 related system could possibly be.  It is not only much cheaper than
 anything Microsoft/Yahoo/AOL/Verisign would sell, but technically more
 reliable.  IP address spoofing was practically impossible for spam
 even before RFC 1948 and related defenses, because it was too hard and
 unreliable if you need to make 10,000,000 successfully spoofed ISN
 predicted TCP connections per day.  On the other hand, we all knew
 even before the bogus Microsoft Corporation certs or the discovery
 that those bogus certs could not be revoked that commercial PKI is eyewash.
 
 If you believe that reputation or trust systems might help the
 spam problem, then the only room for improvement is in the trust query
 protocol.  DNS is a screw driver being used as a hammer in DNS blacklists.
 However, this is merely a matter of optimization or elegance.
 
 
 Vernon Schryver[EMAIL PROTECTED]
 
 




Re: Principles of Spam-abatement

2004-03-17 Thread Robert G. Brown
On Wed, 17 Mar 2004, Vernon Schryver wrote:

(A bunch of beautifully said things that I agree with fully)

 If you believe that reputation or trust systems might help the
 spam problem, then the only room for improvement is in the trust query
 protocol.  DNS is a screw driver being used as a hammer in DNS blacklists.
 However, this is merely a matter of optimization or elegance.

The one other place that I think there COULD be room for improvement is
to make the process of identifying sites that are originating spam or
viruses more rapid and automatic, and to create a better/more formal set
of rules responding to a site (or an entire SP subnetwork) postmaster.
Such work might actually spell out all the steps between reporting and
being blacklisted.

Right now I think it is safe to say that most users don't know
anything about postmaster addresses.  Nor do they know how to read a
mail header (or they may be using a MUA that doesn't present the full
header even as an option).  Finally, complaining about spam takes time,
especially when you have a lot and have to write an actual message about
each one one at a time.  Consequently 99+% of all users are effectively
prevented from reporting spam to the hosting SP of the originator by a
mix of inertia, ignorance, and inability.

No wonder the SPs feel that they can ignore the problem -- instead of a
million pieces of spam generating a million complaints and burying the
poor postmaster admins of the enabling SP in an emergency consisting of
rapidly filling mail spool files and writing procmail rules to handle
them all so they can extract real communications from all the spam
complaints, they get ten reports of spam, maybe, from ten hardnosed old
timers who can read a mail header and care enough to report them (maybe
because they make it through their filters). I no longer bother -- if I
have to generate a complaint message per piece that my filters identify,
I'll never get ANY work done.

If every ten pieces of spam sent out of an SPs network -- even every 100
pieces -- generated a complaint message to postmaster with headers laid
out that clearly identified the offending host/client, I think that it
would provide SPs with a real incentive, AND the tools, to address the
problem.  

I don't know if this is a problem that could be addressed in protocol,
but it might be.  I can think of several things that an MTA (or MUA)
might do to facilitate a spam-bounce.

  a) Preparse the header so that the entire delivery path is the primary
content of the message, with the message itself added (header intact) as
an attachment.

  b) Return the complaint as mail to postmaster of the originating
network with a special error code that would allow it to be counted and
digested easily.  One doesn't want to create a new kind of DoS attack on
postmaster, and making it easy and automatic to return a complaint COUNT
of some sort on otherwise identical content can help prevent that while
making it easier for SP admins to deal with mounting complaint levels.

  c) Work out what to do about relays and proxies, again to prevent
man-in-the-middle DoS more than anything else.  One site should not be
able to generate mail that it forwards with fictitious headers and
evil content so that it appears to come from some hapless but innocent
network.

  d) Take steps to ensure that SPs run a postmaster address, and maybe
come up with things like Jeff Chase was proposing to continuously
measure their responsiveness to spam/virus-class bounce messages and
globally blacklist the worst (least responsive) offending SPs.  Etc.

Right now enabling SPs are insulated from any kind of RFC-based
responses or complaints about spam because MUA's and MTA's have no
predefined protocol for generating such a response in a constructive
way.  Most complaints/bounces that are automatically generated by
antivirus software or reported by humans (I've read plenty of both:-(
are hopeless and de facto useless without several rounds of
communications, and sometimes not even then: the humans don't even know
what a mail header IS and often have no way of knowing or suspecting
that the From address is bogus or sending in the real header so it can
be parsed by the SP postmaster.  Antivirus software developers should
know better (damn it!) but even THEY don't bother to parse the header or
include the header in the stupid bounces they generate, or validate
any sort of correspondance between originating host and From address.

So even though one could argue that adding a real protocol layer for a
preformatted, standardized, spam/virus bounce is not strictly necessary
because all the information is already IN the header, doing it anyway
might codify and standardize a complaint so that the complaint always
contains the essential information and so that a complaint to the right
target is easy to generate (can even be generated automatically).  It
could then guide the development of compliant tools that can deal with
this for 

Re: Principles of Spam-abatement

2004-03-17 Thread John Leslie
Vernon Schryver [EMAIL PROTECTED] wrote:
 
 All of the possible good and bad aspects of any possible trust or
 reputation system are already present in the current system.  

   Not so.

 - If you say that you can't trust ISPs to check that a new customer
   is not Al Ralsky in disguise or one of his proxies, then you must
   say the same about any other organization.

   ISPs operate in a _very_ different business environment than, say,
UNICEF.

 - If you say that ISPs cannot check the reputation of new customers
   for a $30/month account, then you must say the same about any
   other organization.

   ISPs offering $30-per-month service are very likely losing money
(and worrying who to lay off next). Your bank, OTOH, is probably
doing nicely on less than $30-per-month service charges. Also, some
ISPs have no reason to worry much about their reputation, because
they have in effect a government-mandated near-monopoly.

 - If you trust some of those other outfits to revoke their virtual
   letters of introduction and recommendation, then you must be
   willing to trust some ISPs to do the same and terminate accounts.

   Ah, yes, but _which_ ISPs?

 - If you say that third party organization could assure you that
   a mail sender is not a spammer, then you must agree that an ISP
   could check with that organization before adding a password to
   a RADIUS server or or turn on a DSLAM, and that an ISP could
   terminate an account when that third party revokes is assurance.

   The first part is actually true: I think we'd actually see that
if such third-party services come into common use. :^)

   The second part (terminating) is not true, IMHO. There's a real
danger of getting sued for that, not to mention the loss of revenue.
However, donning Pangloss's hat, I do hope that they might activate
some port-25 bandwidth-limiting. ;^)

 If you believe that reputation or trust systems might help
 the spam problem, then the only room for improvement is in the
 trust query protocol. DNS is a screw driver being used as a
 hammer in DNS blacklists.

   Current DNS blacklists are, IMHO, trying to do an impossible job.

 However, this is merely a matter of optimization or elegance.

   I disagree: it's a matter of biting off more than you can chew.

--
John Leslie [EMAIL PROTECTED]



Re: Principles of Spam-abatement

2004-03-17 Thread Charles E. Perkins

Hello folks,

Eric A. Hall wrote:

 uh, public nudity is (mostly) criminal

Too bad!  Actually, what is often proscribed
is lewd behavior, and nudity is often wrongly
considered lewd.

Anyway it's awfully difficult to really
reconcile nudity with criminal behavior.

Regards,
Charlie P.



Re: Principles of Spam-abatement

2004-03-17 Thread Robert G. Brown
On Wed, 17 Mar 2004, Eric A. Hall wrote:

 A better analogy is with new checking accounts. Many places won't accept
 checks numbered below 1000, since they indicate that the account has not
 established a track record. Other places will accept the checks after
 verification, other places will accept them with thumbprint or some other
 identifier. In all these cases, the organization is able to determine its
 risk limits and act accordingly.

Which is really pretty silly, right?  Since anybody will print you
checks that start with any number you like, completely legally.  In
fact, you can print your own checks with any number(s) you like,
completely legally, as long as the bank information at the bottom is
there and is correct and you actually own the account in question and
don't commit fraud or pass bad checks.

This kind of silly response is no obstacle to a criminal or spammer; it
is merely an inconvenience (a pain in the ass) to the innocent.  It also
leaves one with all sorts of catch-22 problems -- one cannot get a track
record until one is let onto the track, and one cannot get onto the
track without a track record.

Besides, this is all talking about IP numbers, right, since we all
AGREED that user identies were transient artifacts and impossible to
regulate.  In the checking account metaphor above, on the internet I can
print a new check with whatever numbers you like for each and every
transaction, and back it up with a shiny new driver's license and any
other identification tokens you require unless and until you create a
huge government bureaucracy to regulate it and harsh laws to punish
abuse.  Sort of like the ones we have for real driver's licenses and
checking accounts and human identities.  Banking (and other human
metaphors) are not correct for addressing IP number trust.  It's more
like can you trust the current residents of this neighborhood or that
house down the street...when you never get to see them, only their
masks.

And IF we're talking about IP addresses, we can pretty much stop
talking.  As Vernon has repeatedly pointed out, trust-like facilities
at the IP level are either ALREADY THERE and proving to be moderately
ineffective against spam or run square against the economics and
realities of the SP business.  We cannot do anything silly like not
trust a new IP number assigned by an SP to a new customer until they
have a track record.  Trusted has to be the default or the Internet and
a variety of business become impossible and incredibly burdensome on the
innocent (far more so than spam).  But I don't care if you agree -- as
you note, you can not trust any parts of IP space you choose according
to any criterion you select, within your own hosts or networks.  Just
don't blame anybody else when things stop working because you've punched
a hole through a path to a critical service or human.

  Note that this is nothing new. We already do this with IP numbers.
  If you send me a packet with a non-verifiable source IP there 
  will be no communication possible. Why should it be different 
  with email addresses?
 
 Verification is different from trust. My position is that you need to be
 able to validate and verify before you can successfully apply any kind of
 trust (otherwise the trust is meaningless). Paul's message that I replied
 to was specifically describing a minimum threshold of trust (it was akin
 to the no checks below #1000 position).

You have to be able to quantify trust as well, in order to be able to
use it as a filtering criterion.  I fear that your metaphor is exact --
it is NO more difficult for a spammer to achieve whatever level of
trust is required for acceptance for long enough to spew than it is
for me to ask the bank to start the checks for my brand new checking
account at #2000 since of course some merchants won't take them
otherwise.  Or going home and printing some new ones.

Somebody (Dean?) pointed out that if you can really solve the problem of
trust at the electronic level, scalably and more or less for zero
marginal cost, you're missing the real point.  These are the SAME
problems that are incredibly difficult to solve in the financial
industry where the penalties are large and expensive, laws that severely
punish identity theft artists and check forgers are vigorously enforced,
and where instruments for reasonably reliably affirming identity (photo
drivers' licenses, passports, birth certificates all abound and are
tightly constrained by law and expensive government agencies and
services.  It's hard to trust even paper money, let alone that some
stranger is who they assert themselves to be.

In that sense it is an excellent milieu to look for metaphors to the
network/spam/identity problems, just as paper spam and phone spam are
also good places.  If you can solve one, you can solve the other IF you
are willing to pay similar costs.

So next time anyone wants to advance a human-scale metaphor for a trust
model, please a) ensure that it actually is 

Re: Principles of Spam-abatement

2004-03-17 Thread Vernon Schryver
 From: Paul Vixie [EMAIL PROTECTED]

  If you believe that reputation or trust systems might help the
  spam problem, then the only room for improvement is in the trust query
  protocol.  DNS is a screw driver being used as a hammer in DNS blacklists.
  However, this is merely a matter of optimization or elegance.

 so, it's possible that there is some overlap between my universal privacy
 goals, and my support for the long-awaited dnssec extensions, and my support
 for the procket/juniper/cisco/paix/nasa/verio/shepfarm/isc multicast
 deployment effort.

DNSSEC would be a Good Thing(tm) on its own merits, but I don't see
any direct connection between it and a replacement for DNS blacklists.
Of course a replacement would start without reasonable authentication.
If you insist on using DNS screwdrivers as SMTP authorization hammers,
then DNSSEC blacklists would be a minor improvement.  DNS has the wrong
sorts of caching as well as the wrong sort of data for a reputation
database.  You want answers better than 32 bit number (PTR RR) or an
ASCII string (TXT RRT).

I don't see what multicast has much to do with my SMTP server asking
my chosen (and hired) clearinghouse about the reputation of the owner
the IP address of an SMTP client.  Some sort of anycast might be a
good optimization.  I guess anycasting can be seen as a form of
multicasting.  Is that what you mean?


] From: Yakov Shafranovich [EMAIL PROTECTED]

] I had some preliminary conversations with blacklist operators about 
] this. There wasn't any interest in making a better protocol, but some 
] people did expressed a need to document the existing one.

People with working code and large customers bases rarely choose to
replace a servicable solution like the current DNS blacklist kludge
with a proper solution, no matter how much more elegant.

Replacing the DNS blacklist kludge with something better today would
be little more than arranging the deck chairs.  What's needed is to
patch the hole in the hull, or for more ISPs to do as Earthlink has
done in recent years and get serious about dealing with spam.  Earthlink
is far from perfect, but they are far better than they were and far,
far better than other outfits.  For example, as far as I can tell,
today an SMTP connection from Comcast is likely to be carrying spam,
while a connection from Earthlink probably isn't.  If you don't have
your own traps, see the numbers at http://www.senderbase.org/ 
or the better but less immediate numbers at http://spamhaus.org/



} From: Robert G. Brown [EMAIL PROTECTED]

} ...
} The one other place that I think there COULD be room for improvement is
} to make the process of identifying sites that are originating spam or
} viruses more rapid and automatic, and to create a better/more formal set
} of rules responding to a site (or an entire SP subnetwork) postmaster.
} Such work might actually spell out all the steps between reporting and
} being blacklisted.

I strongly disagree.  There is and can be nothing better than the IP
address of the SMTP client for identifying the orgin of a mail message.
Some will object that's not the origin, but they're generally repeating
the nonsense and lies of ISPs trying to duck blaim for supporting
spammers.  The practical origin of a paper letter is wherever the
postals service, FedEx, etc.  accepts it, no matter whether you wrote
it while standing in the post office, at home, at work, or in an
airplaine 35,000 feet above practically unknowable real estate.

Yes, I've heard about UUCP, SMTP relays, smarthosts, and so forth and
so on.  As far as your SMTP server is concerned, a good, sufficient,
and necessary definition of the origin of a mail message is the IP
address of the sending SMTP client.  It doesn't matter whether the
sending IP address is an open proxy on a Comcast network, a system in
China, or Dell Computers' newsletter senders.  The IP address as
good as anything else could be, and already available.  It's only
defect is that it makes ISPs responsible for taking Ralsky's money.


} If every ten pieces of spam sent out of an SPs network -- even every 100
} pieces -- generated a complaint message to postmaster with headers laid
} out that clearly identified the offending host/client, I think that it
} would provide SPs with a real incentive, AND the tools, to address the
} problem.  

I used to say that, but then I saw that even (or especially) the worst
ISPs can figure out how to connect postmaster@ to /dev/null or to an
autoresponding ignorebot that lies about the responsibility of the ISP.


| From: John Leslie [EMAIL PROTECTED]

|  - If you say that you can't trust ISPs to check that a new customer
|is not Al Ralsky in disguise or one of his proxies, then you must
|say the same about any other organization.
|
|ISPs operate in a _very_ different business environment than, say,
| UNICEF.

Possibly true but certainly irrelevant.


|  - If you say that ISPs cannot check the reputation of new customers
|

Re: Principles of Spam-abatement

2004-03-17 Thread Dean Anderson
On Wed, 17 Mar 2004, Robert G. Brown wrote:

   a) Preparse the header so that the entire delivery path is the primary
 content of the message, with the message itself added (header intact) as
 an attachment.

This is true now.  Many people don't know how to parse the headers, but it 
obeys a specific syntax and is machine parseable.

   b) Return the complaint as mail to postmaster of the originating
 network with a special error code that would allow it to be counted and
 digested easily.  One doesn't want to create a new kind of DoS attack on
 postmaster, and making it easy and automatic to return a complaint COUNT
 of some sort on otherwise identical content can help prevent that while
 making it easier for SP admins to deal with mounting complaint levels.

This is possible now, and SpamCop does this. The problem with SpamCop is
that they alter the message, making it useless.  SpamCop complaints are
routinely deleted as a result.  I usually forward them on to customers
with an FYI that we don't consider such to be a valid complaint, but they 
may want to be aware of what someone said.

   c) Work out what to do about relays and proxies, again to prevent
 man-in-the-middle DoS more than anything else.  One site should not be
 able to generate mail that it forwards with fictitious headers and
 evil content so that it appears to come from some hapless but innocent
 network.

Relays don't add ficticious headers, nor do they add evil content.  They
may place their (true) headers on top of ficticious headers.  They cannot
verify that the headers given are accurate.  This is true of all relays, 
open or closed.

Proxies are another story. I don't know of any genuine reasons to run open
proxies, though closed proxies (web caches) are clearly useful. I don't
know of anyone claiming they are useful. But neither does that mean they
have no use.  However, as a service provider, I would say this much:  If a
customer found a useful reason to have an open proxy, then I would only
insist that they keep logs of its use. This is easy to place in a contract
or AUP.

   d) Take steps to ensure that SPs run a postmaster address, and maybe

There is already a BCP for this. Rarely is this a problem.

 come up with things like Jeff Chase was proposing to continuously
 measure their responsiveness to spam/virus-class bounce messages and
 globally blacklist the worst (least responsive) offending SPs.  Etc.

How would you define responsiveness? Does it mean getting an 
auto-responder message?  Does it mean getting a message saying something 
had been done?  You cannot give out certain information about customers.  
Basically, all you can do is send an auto-responder message and a notice 
that the ticket was closed.  That doesn't indicate what happened, nor does 
it indicate who the spammer was, or if the ISP agreed they were a spammer.  
Sometimes the action is obvious if, say, a website disappears. But how do 
you know they took action against a dialup customer?  You can't.

Continuous measurement is the same as a DOS attack.  A ping flood is a
continous measurement of the bandwidth available and its responsiveness.  
That's why there is a -f option to ping.  Unauthorized measurements are
illegal.

 Right now enabling SPs are insulated from any kind of RFC-based
 responses or complaints about spam because MUA's and MTA's have no
 predefined protocol for generating such a response in a constructive
 way.  

???  I'm not sure what you mean. By the time you -read- a spam, it is
delivered, and the SMTP protocol has long since finished.  Spam isn't the
only kind of abuse that an ISP responds to. The abuse@isp works pretty
well, since you can forward the complained-of message. There are some
things I'd like MUA's to do, such as include the whole headers(some MUA's
do, some MUA's don't), but that isn't an RFC issue, either.

 Most complaints/bounces that are automatically generated by
 antivirus software or reported by humans (I've read plenty of both:-(
 are hopeless and de facto useless without several rounds of
 communications, and sometimes not even then: the humans don't even know
 what a mail header IS and often have no way of knowing or suspecting
 that the From address is bogus or sending in the real header so it can
 be parsed by the SP postmaster.  Antivirus software developers should
 know better (damn it!) but even THEY don't bother to parse the header or
 include the header in the stupid bounces they generate, or validate
 any sort of correspondance between originating host and From address.

Yes, it would be good to send the entire headers.   

But users should know that the from: header can be forged. They should
also know some other things about email and the internet, such as don't
open attachments you aren't expecting. If you get an unexpected
attachment, ask the person if they sent it. This is an education problem.

--Dean




Re: Apology Re: Principles of Spam-abatement

2004-03-17 Thread Ed Gerck


Dean Anderson wrote:
 
 On Tue, 16 Mar 2004, Ed Gerck wrote:
 
  Dean Anderson wrote:
  
   On Tue, 16 Mar 2004, Ed Gerck wrote:
What information theory says is that the probability of detecting
spam is less than 100%.
  
   No, information theory doesn't say that at all.
 
  Sure it says, and that's why a spam filter will never be 100%
  effective. I guess we agreed on this before ;-)
 
 I think you must have missed my message noting our disagreement.
 http://www.ietf.org/mail-archive/ietf/Current/msg24213.html

Let me make sure. You think then that a spam filter can be 100% 
efficient? If you do, please log off and go sell it. If you
don't then I agree with you.

Cheers,
Ed Gerck



Re: Principles of Spam-abatement

2004-03-17 Thread Paul Vixie
[EMAIL PROTECTED] (Vernon Schryver) writes:

 ... but I don't see any direct connection between [DNSSEC] and a
 replacement for DNS blacklists.

i know.  but you asked about trust query protocols, not about blackhole
lists.  as the creator of the first blackhole list, let me just say,
they don't scale.

 I don't see what multicast has much to do with my SMTP server asking my
 chosen (and hired) clearinghouse about the reputation of the owner the IP
 address of an SMTP client.  Some sort of anycast might be a good
 optimization.  I guess anycasting can be seen as a form of multicasting.
 Is that what you mean?

no.  for one thing, this is not (at heart) an smtp problem.  more later.
-- 
Paul Vixie



Re: Principles of Spam-abatement

2004-03-17 Thread Doug Royer


Dean Anderson wrote (in part):

 c) Work out what to do about relays and proxies, again to prevent
man-in-the-middle DoS more than anything else.  One site should not be
able to generate mail that it forwards with fictitious headers and
evil content so that it appears to come from some hapless but innocent
network.
   

Relays don't add ficticious headers, nor do they add evil content.  They
may place their (true) headers on top of ficticious headers.  They cannot
verify that the headers given are accurate.  This is true of all relays, 
open or closed.
 

Sounds like his first point - fix it so they are checkable. If I am 
going to relay
for X number of domains, it seems reasonable that we share some kind
of shared key or password so they the headers they pass me can be verified.

Most complaints/bounces that are automatically generated by
antivirus software or reported by humans (I've read plenty of both:-(
are hopeless and de facto useless without several rounds of
communications, and sometimes not even then: the humans don't even know
what a mail header IS and often have no way of knowing or suspecting
that the From address is bogus or sending in the real header so it can
be parsed by the SP postmaster.  Antivirus software developers should
know better (damn it!) but even THEY don't bother to parse the header or
include the header in the stupid bounces they generate, or validate
any sort of correspondance between originating host and From address.
   

Yes, it would be good to send the entire headers.   

But users should know that the from: header can be forged. They should
also know some other things about email and the internet, such as don't
open attachments you aren't expecting. If you get an unexpected
attachment, ask the person if they sent it. This is an education problem.
 

There is (1.0) legal spam and (2.0) illegal spam.

Illegal spam can be (2.1) advertisements or (2.2) viruses.

(1.0) Is most often traceable using the headers and content.
 This is getting easier to stop and there can be things done
 to make it easier - a computer parseable unsubscribe link and
  a standard protocol to unsubscribe.
(2.1) Often is traceable by the content, and almost never by the headers.
 Content filters and blacklists of some kind can catch these 
and throw
 them in the trash or hang-up when the content matches a URL that
 somehow blacklisted.

(2.2) Is for a virus scanner to catch and is almost never traceable.

There are things the IETF can do to help with the spam problem (1.0).

--

Doug Royer |   http://INET-Consulting.com
---|-
[EMAIL PROTECTED] | Office: (208)520-4044
http://Royer.com/People/Doug   | Fax:(866)594-8574
  | Cell:   (208)520-4044
 We Do Standards - You Need Standards




smime.p7s
Description: S/MIME Cryptographic Signature


Re: Principles of Spam-abatement

2004-03-17 Thread Robert G. Brown
On Wed, 17 Mar 2004, Vernon Schryver wrote:

 } From: Robert G. Brown [EMAIL PROTECTED]
 
 } ...
 } The one other place that I think there COULD be room for improvement is
 } to make the process of identifying sites that are originating spam or
 } viruses more rapid and automatic, and to create a better/more formal set
 } of rules responding to a site (or an entire SP subnetwork) postmaster.
 } Such work might actually spell out all the steps between reporting and
 } being blacklisted.
 
 I strongly disagree.  There is and can be nothing better than the IP
 address of the SMTP client for identifying the orgin of a mail message.
 Some will object that's not the origin, but they're generally repeating
 the nonsense and lies of ISPs trying to duck blaim for supporting
 spammers.  The practical origin of a paper letter is wherever the
 postals service, FedEx, etc.  accepts it, no matter whether you wrote
 it while standing in the post office, at home, at work, or in an
 airplaine 35,000 feet above practically unknowable real estate.
 
 Yes, I've heard about UUCP, SMTP relays, smarthosts, and so forth and
 so on.  As far as your SMTP server is concerned, a good, sufficient,
 and necessary definition of the origin of a mail message is the IP
 address of the sending SMTP client.  It doesn't matter whether the
 sending IP address is an open proxy on a Comcast network, a system in
 China, or Dell Computers' newsletter senders.  The IP address as
 good as anything else could be, and already available.  It's only
 defect is that it makes ISPs responsible for taking Ralsky's money.

I AGREE with this.  There is a bit of difficulty associated with just
which IP address in a chain of delivery hops is the actual point of
origin, but at least at this point I generally trust that forwarding
hosts really are just forwarding hosts when I look at a header to see.
To be concrete (pulling a note at random out of the garbage for the
week):

From [EMAIL PROTECTED]  Sun Mar 14 15:28:51 2004
Return-Path: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
Received: from pohl.acpub.duke.edu (pohl.acpub.duke.edu [152.3.233.64])
by mail.phy.duke.edu (Postfix) with ESMTP id B5A33A77F7
for [EMAIL PROTECTED]; Sun, 14 Mar 2004 15:28:51 -0500 (EST)
Received: from 152.3.233.64 ([200.215.92.74])
by pohl.acpub.duke.edu (8.12.10/8.12.10/Duke-5.0.0) with SMTP id
i2EK4b0
3030509;
Sun, 14 Mar 2004 15:04:57 -0500
Received: from [7.197.76.17] by 152.3.233.64; Mon, 15 Mar 2004 02:01:00
+0600

Here I'm pretty sure that pohl.acpub.duke.edu (also 152.3.233.64) is
telling the truth about where it received the message from and isn't
forging the previous hop because its administrator(s) are local and
accountable and their address resolves.  This particular example is
interesting in that as far as I can tell from registry information,
7.197.76.17 doesn't exist and there is no route to it.  The
200.215.92.74 address is a relay in brazil.  Neither of them seems
promising in terms of being able to report the spam.

Note also that I have to WORK with whois, traceroute, host, dig, a
variety of tools trying just to figure out where the spam is coming
from (although admittedly spamassassin does the same work automatically
and better which is why the message is in the trash).  However, I'm
still left unable to complain to the enabling ISP.  They speak
portuguese and I don't.  They may have postmaster set up or may not.
They may give a rat's ass or may not (likely not).

To even START to fix this problem, postmaster has to work on the relay
and be responsive.  The relay host manager has to know that their access
to the entire Internet will be effectively terminated if they don't have
a working postmaster address and are not responsive to spam.  The
communication mechanism that reports spam has to both include the key
information about times, addresses, and so forth AND has to function
independent of knowledge and degree of expertise of the user.  I know
what I'm doing (at least, to a point:-) and I'm daunted by the prospect.
Most users wouldn't even know what all those words I just used mean...

So I have to say again -- there may be IETF work that could be done
here.  It shouldn't be this difficult, and there needs to be a whole
structure erected to make mail administrators accountable at some level.
And ultimately, we may all have to be willing to pull the plug on

[EMAIL PROTECTED]|B:747host 200.215.76.17
17.76.215.200.in-addr.arpa domain name pointer 
BrT-S4-1-2-22-bnuce300.brasiltelecom.net.br.

and effectively cut them off from the Internet if they don't police
their relays and e.g. refuse to accept mail from unregistered hosts.
Only thus can we forge a chain of responsibility back to the SPs that
they cannot easily evade.

 } If every ten pieces of spam sent out of an SPs network -- even every 100
 } pieces -- generated a complaint message to postmaster with headers laid
 } out that clearly identified the offending host/client, 

Re: Principles of Spam-abatement

2004-03-17 Thread Robert G. Brown
On Wed, 17 Mar 2004, Dean Anderson wrote:

 On Wed, 17 Mar 2004, Robert G. Brown wrote:
 
a) Preparse the header so that the entire delivery path is the primary
  content of the message, with the message itself added (header intact) as
  an attachment.
 
 This is true now.  Many people don't know how to parse the headers, but it 
 obeys a specific syntax and is machine parseable.

Of course.  To both -- many people don't know how to parse the headers.
I'd estimate some 499,950,000 of the half a billion users of mail.  So
the CAPABILITY of parsing the headers exists, but not even AV vendors
(who should know how and know better) do it.

b) Return the complaint as mail to postmaster of the originating
  network with a special error code that would allow it to be counted and
  digested easily.  One doesn't want to create a new kind of DoS attack on
  postmaster, and making it easy and automatic to return a complaint COUNT
  of some sort on otherwise identical content can help prevent that while
  making it easier for SP admins to deal with mounting complaint levels.
 
 This is possible now, and SpamCop does this. The problem with SpamCop is
 that they alter the message, making it useless.  SpamCop complaints are
 routinely deleted as a result.  I usually forward them on to customers
 with an FYI that we don't consider such to be a valid complaint, but they 
 may want to be aware of what someone said.

So what you are saying is, that this CAN be done and even is being done,
but it isn't done correctly and consistently and isn't widely available.
I agree.  In fact, I think that this is potential work for the IETF --
define a way for it to be done correctly and consistently (which
wouldn't be too difficult, I imagine) via a protocol.  Then SpamCop
could fix their tool, SpamAssassin could add a compliant interface,
Joe's Spam Seal (not yet written) could be written to comply with the
protocol and abuse@ or postmaster@ addresses could actually AUTOMATE a
response process based on consistent completely reported problems.  This
lowers their cost and makes it easier and more likely that they'll take
effective action.

As you say, if you get insufficient information, there is little that
you can do even with the best of will as the manager of an ISP with too
little time and too many things to fill it.  You probably don't have
time or energy to engage in the please resend your complaint with the
full header and message attached game (known to administrators
everywhere, and not just in regard to mail:-).

c) Work out what to do about relays and proxies, again to prevent
  man-in-the-middle DoS more than anything else.  One site should not be
  able to generate mail that it forwards with fictitious headers and
  evil content so that it appears to come from some hapless but innocent
  network.
 
 Relays don't add ficticious headers, nor do they add evil content.  They
 may place their (true) headers on top of ficticious headers.  They cannot
 verify that the headers given are accurate.  This is true of all relays, 
 open or closed.
 
 Proxies are another story. I don't know of any genuine reasons to run open
 proxies, though closed proxies (web caches) are clearly useful. I don't
 know of anyone claiming they are useful. But neither does that mean they
 have no use.  However, as a service provider, I would say this much:  If a
 customer found a useful reason to have an open proxy, then I would only
 insist that they keep logs of its use. This is easy to place in a contract
 or AUP.

Again, precisely.  So what this means is that if I set up a mail server
and send a lot of spam from it all with a header that is forged UPstream
from my host, I obscure my host as its true point of origin.  I can pick
on a hapless host somewhere far away and make it look like the spam
originates from THEIR network, and one would have to compare traffic
logs on the two hosts and/or intermediary hops to determine which of us
is lying.

This makes for an interesting attack -- send egregious spam purporting
to come from somebody you hate or some network you are in competition
with, in a messages with multiple relays.  Somebody with a big view of
the hand might finally figure out what was happening, but proving it
would be, well, difficult doesn't begin to describe it, given that all
the log data on both sides could be easily forged.

Again, there might be work for the IETF here that could help IF this
becomes a problem or as a preemptive measure now.  There are ways to do
this -- signing a key with a local secret and adding it to the message,
for example -- that even if you didn't have a universal PKI for all
participating hosts would make forging headers for openly fraudulent
reasons easy to catch.  You can forge the upstream route, but you cannot
forge the upstream keys, and the last common host whose key can unlock
their MTA-added tag is left holding the responsibilty bag.

d) Take steps to ensure that SPs run a postmaster 

Re: Principles of Spam-abatement

2004-03-17 Thread Vernon Schryver
 From: Robert G. Brown [EMAIL PROTECTED]

 From [EMAIL PROTECTED]  Sun Mar 14 15:28:51 2004
 Return-Path: [EMAIL PROTECTED]
 Delivered-To: [EMAIL PROTECTED]
 Received: from pohl.acpub.duke.edu (pohl.acpub.duke.edu [152.3.233.64])
 by mail.phy.duke.edu (Postfix) with ESMTP id B5A33A77F7
 for [EMAIL PROTECTED]; Sun, 14 Mar 2004 15:28:51 -0500 (EST)
 Received: from 152.3.233.64 ([200.215.92.74])
 by pohl.acpub.duke.edu (8.12.10/8.12.10/Duke-5.0.0) with SMTP id
 i2EK4b0
 3030509;
 Sun, 14 Mar 2004 15:04:57 -0500
 Received: from [7.197.76.17] by 152.3.233.64; Mon, 15 Mar 2004 02:01:00
 +0600

 Here I'm pretty sure that pohl.acpub.duke.edu (also 152.3.233.64) is
 telling the truth about where it received the message from and isn't
 forging the previous hop because its administrator(s) are local and
 accountable and their address resolves.  This particular example is
 interesting in that as far as I can tell from registry information,
 7.197.76.17 doesn't exist and there is no route to it.  The
 200.215.92.74 address is a relay in brazil.  Neither of them seems
 promising in terms of being able to report the spam.

I disagree: 
  1. pohl.acpub.duke.edu is not an external relay for you.  It is your
 system, even if you don't have a root password or any account on it.

  2. 200.215.92.74 is not just a misconfigured relay, because it used the
 spam trick of using the IP address of its target for its HELO value.
 It might be an owned box with a trojan or it might be worse.

  3. the Received line pointing to 7.197.76.17 is obviously silly
  nosnense for more than one reason.  Let's not educate the 
  listening spammers on the details.

  4. you don't need to know why I claim #2 or #3 to properly report
  that spam.  All you need is a tool that will pick out the only
  IP address that matters from the only Received header you can
  trust, the top one, and send a report.  There are several common
  tools that do exactly that.  Some involve commands lines, but
  most are point-and-click.  Their defects are mostly that they try
  to do more, such as detecting hosts of spamvertised URLs.

  5. #2-#4 are irrelevant.  Whether Comite Gestor da Internet no Brasil
  hears about the spam fountain at 200.215.92.74 is none of your
  concern unless you have an unhealthy obsession with spam.  All
  you should care is that by hosting that spam fountain, all hosts
  in 200.128/9 are less likely to be able to send mail to
  pohl.acpub.duke.edu and mailqueue1.duke.edu

  6. Yes, I am a certifiable expert on at least some unhealthy obsessions
  with spam.


 To even START to fix this problem, postmaster has to work on the relay
 and be responsive.  The relay host manager has to know that their access
 to the entire Internet will be effectively terminated if they don't have
 a working postmaster address and are not responsive to spam.  The
 communication mechanism that reports spam has to both include the key
 information about times, addresses, and so forth AND has to function
 independent of knowledge and degree of expertise of the user.  I know
 what I'm doing (at least, to a point:-) and I'm daunted by the prospect.
 Most users wouldn't even know what all those words I just used mean...

NO!  Nothing significant has changed since Steve Wolfe stopped being
the bogyman we used to frighten lusers into not being naughty.

   - all that is needed to fix this problem is for the operators of
  mailqueue1.duke.edu and pohl.acpub.duke.edu to have reasonable
  counts of the spam from 200.128/9 and take action, or to delegate
  those actions to the SMTP trust vendor of their choice (currently
  DNS blacklists).

   - If Comite Gestor da Internet no Brasil is a reputable outfit,
  then it will do as bazillions of other repubutable outfits,
  including Duke University, have long done, and detect and deal
  with its spam problem, without your let, leave, hindrance,
  assistence, notice, help, or nagging.

   - Purely for extra credit, someone might try to forward an unmodifed 
  copy of that spam with complete headers to [EMAIL PROTECTED],
  [EMAIL PROTECTED], and/or [EMAIL PROTECTED]  If the recipient can't
  figure out purely from the copy of spam what to do, then that's
  not our problem.  At most 200.128/9 we should disconnnected from
  the Internet that we use by adding to our blacklists.  If someone
  at Duke finds a need to receive mail from 200.128/9, you might
  review that blacklist entry or punch a hole in the blacklist.

Apologists for spam friendly ISPs including those who claim to believe
that $360/year is a fair price for a fundamental human right will say
that ISPs can't stop spam unless everyone reports it.  That claim is
nonsense.  When it comes from ISPs, it is a bald faced lie; it is
possible even for a raw IP bandwidth ISP to detect spam.


 So I have to say again -- 

Re: Apology Re: Principles of Spam-abatement

2004-03-17 Thread Dr. Jeffrey Race
On Wed, 17 Mar 2004 12:26:13 -0500 (EST), Dean Anderson wrote:
However, I think there are things that show some promise that might be
harder to adapt to, such as automated text summarization, bayesian
filters, mail agents that filter on the user's interest in the message
subject, and such.

How about You are a polluter, your connectivity has terminated, you
are on a customer blacklist, and you will never get connectivity from
us again?  Spammers would have a little trouble adapting to that.

I think these are worth pursuing, but these are not
subjects for the IETF. 

IETF's documenting that this is the behavior expected of any firm offering
connectivity is certainly within the IETF's purview.  And it would have
a dramatic effect.  (Partly because of norms; partly, at least in the
U.S., because it would expose pollution-enabling ISPs to heavy-duty
legal liabilities.  Stockholders would get after their boards.)

Jeffrey Race




Re: Principles of Spam-abatement

2004-03-17 Thread Dr. Jeffrey Race
On Wed, 17 Mar 2004 14:04:58 -0500, John Leslie wrote:

 - If you say that third party organization could assure you that
   a mail sender is not a spammer, then you must agree that an ISP
   could check with that organization before adding a password to
   a RADIUS server or or turn on a DSLAM, and that an ISP could
   terminate an account when that third party revokes is assurance.

   The first part is actually true: I think we'd actually see that
if such third-party services come into common use. :^)

   The second part (terminating) is not true, IMHO. There's a real
danger of getting sued for that,

Depends entirely on what the contract of carriage says.  Obviously
one of the norms we have to universalize in standards and practice
documents is that carriage is denied to polluters as part of the
contract, and this provision must bind everyone else who shares
connectivity under the contract.


 not to mention the loss of revenue.

There you have it!  Polluting pays!  See 
http://www.camblab.com/nugget/spam_03.pdf

Jeffrey Race




Re: Principles of Spam-abatement REALITY CHECK TIME

2004-03-17 Thread Dr. Jeffrey Race
On Wed, 17 Mar 2004 15:48:05 -0500 (EST), Dean Anderson wrote:

How would you define responsiveness?

That's an easy one!  'Does the pollution cease?' is the answer.

Let's pause this very interesting thread for a momentary reality
check.  See ROKSO.   The world's top spammers, accounting for
the great bulk of the packets, are known by name, address and telephone
number.  Their upload paths are known.  Their software is known.  The
stigmata of their transmissions are known.  (In many cases their
criminal records are known.)   It is trivially easy
to verify _at any moment_ whether a pollution-enabler has responded.

Does everyone agree?  Dean, you too?  :)

Jeffrey Race




Re: Principles of Spam-abatement

2004-03-17 Thread Dr. Jeffrey Race
On Wed, 17 Mar 2004 17:21:42 -0500 (EST), Robert G. Brown wrote:

To even START to fix this problem, postmaster has to work on the relay
and be responsive.  The relay host manager has to know that their access
to the entire Internet will be effectively terminated if they don't have
a working postmaster address

Work has already started on this:

 http://www.rfc-ignorant.com/




IETF 59 Plenary Meeting Minutes

2004-03-17 Thread Spencer Dawkins
The draft minutes are now available at
http://www.ietf.org/proceedings/04mar/minutes/plenary.htm. Please look
over them if you spoke at either plenary - I would like to quote
people correctly, and attribute quotes correctly.

I'm almost sure that Eric identified in the Jabber logs is usually
Erik Nordmark... I'll make this change in the revised version, due
around the end of March. Others?

Please send updates to me privately (no reason to disturb the
discussions on what can, and can't, be done with SMTP, right?)...

Spencer




GRE and L2TP

2004-03-17 Thread Rohit Gupta
Hi,

What is it in L2TP that i cant do with a simple GRE tunneling when implementing a 
remote access
VPN for a mobile client to connect to the corporate network. In L2TP, since it uses PPP
end-to-end, the LNS is able to supply dynamic IP address using IPCP to the remote 
client. LNS
takes this IP address from a pool of IP addresses it has. If one were to use GRE, then 
the same
can be done by using some out-of-band mechanism (or even have a fixed IP address which 
the mobile
client is instructed to use). GRE will tunnel the data packet originated from the 
mobile client,
the inner IP header will have the ip addresses as assigned by the corporate network. 
The outer IP
header will contain the IP address of teh ISP and the gateway to reach the corporate 
network.

My whole point is that i want to know as to what is the burning need to have L2TP!

Regards,
Rohit

P.S.

Am not sure if this is indeed the right place to ask this question. But since there 
will be a lot
of experienced people on this list who would have worked on both these protocols, 
replying to this
one should be very easy.

__
Do you Yahoo!?
Yahoo! Mail - More reliable, more storage, less spam
http://mail.yahoo.com



Re: Principles of Spam-abatement

2004-03-17 Thread Yakov Shafranovich
Robert G. Brown wrote:
Right now enabling SPs are insulated from any kind of RFC-based
responses or complaints about spam because MUA's and MTA's have no
predefined protocol for generating such a response in a constructive
way.  Most complaints/bounces that are automatically generated by
antivirus software or reported by humans (I've read plenty of both:-(
are hopeless and de facto useless without several rounds of
communications, and sometimes not even then: the humans don't even know
what a mail header IS and often have no way of knowing or suspecting
that the From address is bogus or sending in the real header so it can
be parsed by the SP postmaster.  Antivirus software developers should
know better (damn it!) but even THEY don't bother to parse the header or
include the header in the stupid bounces they generate, or validate
any sort of correspondance between originating host and From address.
So even though one could argue that adding a real protocol layer for a
preformatted, standardized, spam/virus bounce is not strictly necessary
because all the information is already IN the header, doing it anyway
might codify and standardize a complaint so that the complaint always
contains the essential information and so that a complaint to the right
target is easy to generate (can even be generated automatically).  It
could then guide the development of compliant tools that can deal with
this for ignorant humans using stupid MUAs and maybe even (presumably)
smarter AV programmer humans as well.
We have a closed subgroup in the ASRG for discussions of exactly this 
kind of stuff (http://asrg.sp.am/subgroups/abuse_reports.shtml). But we 
haven't gathered that much interest which makes us think that not 
everyone considers this a great idea.

Yakov




Re: Principles of Spam-abatement

2004-03-17 Thread Yakov Shafranovich
Robert G. Brown wrote:
On Wed, 17 Mar 2004, Dean Anderson wrote:
On Wed, 17 Mar 2004, Robert G. Brown wrote:
...


 b) Return the complaint as mail to postmaster of the originating
network with a special error code that would allow it to be counted and
digested easily.  One doesn't want to create a new kind of DoS attack on
postmaster, and making it easy and automatic to return a complaint COUNT
of some sort on otherwise identical content can help prevent that while
making it easier for SP admins to deal with mounting complaint levels.
This is possible now, and SpamCop does this. The problem with SpamCop is
that they alter the message, making it useless.  SpamCop complaints are
routinely deleted as a result.  I usually forward them on to customers
with an FYI that we don't consider such to be a valid complaint, but they 
may want to be aware of what someone said.


So what you are saying is, that this CAN be done and even is being done,
but it isn't done correctly and consistently and isn't widely available.
I agree.  In fact, I think that this is potential work for the IETF --
define a way for it to be done correctly and consistently (which
wouldn't be too difficult, I imagine) via a protocol.  Then SpamCop
could fix their tool, SpamAssassin could add a compliant interface,
Joe's Spam Seal (not yet written) could be written to comply with the
protocol and abuse@ or postmaster@ addresses could actually AUTOMATE a
response process based on consistent completely reported problems.  This
lowers their cost and makes it easier and more likely that they'll take
effective action.
We are actually soliciting volunteers in the ASRG specifically for this 
kind of work - protocols and formats for abuse reporting to be discussed 
in a closed subgroup separate from the main ASRG list 
(http://asrg.sp.am/subgroups/abuse_reports.html). So far, we haven't 
gotten much interest :(


As you say, if you get insufficient information, there is little that
you can do even with the best of will as the manager of an ISP with too
little time and too many things to fill it.  You probably don't have
time or energy to engage in the please resend your complaint with the
full header and message attached game (known to administrators
everywhere, and not just in regard to mail:-).
If part of the protocol and format states that specific information is 
required, you can discard non-compliant reports solely on the basis of 
being non-standard. Or you can just discard them :)


 d) Take steps to ensure that SPs run a postmaster address, and maybe
There is already a BCP for this. Rarely is this a problem.


In the US.  Try hitting the postmaster of 7.197.76.17, and good luck
communicating with the postmaster of the brazilian relay in my previous
reply.  (This is picking nits -- actually I agree that what can be done
largely has been done, but it would be lovely to be able to extend
overseas with a little more ease, to get a bit poetic...;-)
There has been a proposal in the ASRG from someone about storing contact 
data for abuse departments in the rDNS tree the same way there is a 
responsble RR type for forward DNS. So far hasn't seen much interest...


come up with things like Jeff Chase was proposing to continuously
measure their responsiveness to spam/virus-class bounce messages and
globally blacklist the worst (least responsive) offending SPs.  Etc.
How would you define responsiveness? Does it mean getting an 
auto-responder message?  Does it mean getting a message saying something 
had been done?  You cannot give out certain information about customers.  
Basically, all you can do is send an auto-responder message and a notice 
that the ticket was closed.  That doesn't indicate what happened, nor does 
it indicate who the spammer was, or if the ISP agreed they were a spammer.  
Sometimes the action is obvious if, say, a website disappears. But how do 
you know they took action against a dialup customer?  You can't.


No, I think that responsiveness has to be measured by the level of spam
reported as originating within the site -- results.  I don't think this
is that difficult, actually.  Vernon pointed out that once earthlink got
serious about controlling spam, the reduction in traffic was very
apparent.
If the IETF has any role here (and it may not) it might be to codify the
process of blacklisting ISPs that aren't serious as they are revealed.
You've pointed out several times that abuse of blacklists is pretty easy
as things stand.  It shouldn't be.  And people like you who have bad
experiences with the previous non-process should be the ones who end up
agreeing that whatever schema that might be proposed is fair and
equitable and not likely to punish ISPs who are doing their best.
A general BCP on blacklists and how to properly apply them would be 
higly useful. Another BCP on how to properly manage a blacklist would be 
useful as well. Both have been floated in the ASRG, no one volunteered :(


Right now enabling SPs are insulated 

Re: Principles of Spam-abatement

2004-03-17 Thread Paul Vixie
  ... you asked about trust query protocols, not about blackhole
  lists.  as the creator of the first blackhole list, let me just say,
  they don't scale.
 
 Are you saying that a new secure scalable trust query protocol be help?

more of a new trust system than what you said.  one thing to chew on is,
there are many orders of magnitude more potential bad actors than potential
good ones.

 What about the inherent resistance of existing people to change?

there's no way to get existing people to change... against their will.



Re: Principles of Spam-abatement

2004-03-17 Thread william(at)elan.net
On Thu, 18 Mar 2004, Yakov Shafranovich wrote:

 Paul Vixie wrote:
 
  [EMAIL PROTECTED] (Vernon Schryver) writes:
  
  
 ... but I don't see any direct connection between [DNSSEC] and a
 replacement for DNS blacklists.
  
  
  i know.  but you asked about trust query protocols, not about blackhole
  lists.  as the creator of the first blackhole list, let me just say,
  they don't scale.
  
 
 Are you saying that a new secure scalable trust query protocol be help? 
 What about the inherent resistance of existing people to change?

This excuse is used as stop sign for number of new idea or protocol change 
in case of IETF. Don't listen to it - propose the ideas and work on them, 
if its truly good - it should be at least attempted.

As far as trust protocol or whatever, this is very far from mainstream and 
current mechanisms are either within group of geeks using PGP or large 
corporations that use S/MIME and need it for their internal policies.
It has not entered society at large so we still have time to come up with 
something good that will make it worth it for that to happen. 
 
-- 
William Leibzon
Elan Networks
[EMAIL PROTECTED]





Re: Principles of Spam-abatement

2004-03-17 Thread Yakov Shafranovich
william(at)elan.net wrote:
On Thu, 18 Mar 2004, Yakov Shafranovich wrote:


Paul Vixie wrote:


[EMAIL PROTECTED] (Vernon Schryver) writes:



... but I don't see any direct connection between [DNSSEC] and a
replacement for DNS blacklists.


i know.  but you asked about trust query protocols, not about blackhole
lists.  as the creator of the first blackhole list, let me just say,
they don't scale.
Are you saying that a new secure scalable trust query protocol be help? 
What about the inherent resistance of existing people to change?


This excuse is used as stop sign for number of new idea or protocol change 
in case of IETF. Don't listen to it - propose the ideas and work on them, 
if its truly good - it should be at least attempted.

Thanks :)

As far as trust protocol or whatever, this is very far from mainstream and 
current mechanisms are either within group of geeks using PGP or large 
corporations that use S/MIME and need it for their internal policies.
It has not entered society at large so we still have time to come up with 
something good that will make it worth it for that to happen. 
 
The discussions here, on the main ASRG list, in ietf-mxcomp and 
smtp-verify subgroup of the ASRG are currently dancing around this issue 
of trust and trust protocols. I would like to converge all of these 
discussions into one single forum, possible the ASRG.

Yakov