Re: news from Google

2009-12-04 Thread Warren Bailey
Anyone volunteer to FedEx Scott here a tin foil hat?? If not, I'll be happy to 
provide one... *cue xfiles theme*

Sent from my Blackberry. Please execute spelling errors.

- Original Message -
From: Scott Weeks sur...@mauigateway.com
To: na...@merit.edu na...@merit.edu
Sent: Thu Dec 03 22:14:57 2009
Subject: Re: news from Google



j...@thejof.com

: 6.6.6.6 belongs to the US Army

look at AS 666.  At least they know their position in the universe.
---


andrey.gor...@gmail.com

: IMHO that's where we are heading with google taking over every service 
imaginable

Only if you let them.  DBS (don't be sheep)
---



At the most basic minimum manage your cookies. Just a quick search (not with 
google) gives:
google.com/support/urchin45/bin/answer.py?answer=28710  (you'll see a LOT of 
_utmx type cookies as soon as you start watching them)

There are many other companies out there that know more about you than you 
think possible.  Small example: Do you allow third party cookies unfettered 
access to what you do?

scott



Re: port scanning from spoofed addresses

2009-12-04 Thread Gregory Edigarov
On Thu, 3 Dec 2009 13:03:20 -0500
Matthew Huff mh...@ox.com wrote:

 I'm not at all concerned about door-knob twisting or network
 scanning. What concerns me is that the source addresses are spoofed
 from our address range and that our upstream providers aren't willing
 to even look at the problem. 
 
But that can be easy addressed by yourself.
just do not allow traffic originating from your range on your
external interfaces.

-- 
With best regards,
Gregory Edigarov



Re: port scanning from spoofed addresses

2009-12-04 Thread Suresh Ramasubramanian
On Thu, Dec 3, 2009 at 10:35 PM, Matthew Huff mh...@ox.com wrote:
 We are seeing a large number of tcp connection attempts to ports known to 
 have security issues. The source addresses are spoofed from our address 
 range. They are easy to block at our border router obviously, but the number 
 and volume is a bit worrisome. Our upstream providers appear to be 
 uninterested in tracing or blocking them. Is this the new normal? One of my 
 concerns is that if others are seeing probe attempts, they will see them from 
 these addresses and of course, contact us.

 Any suggestions on what to do next? Or just ignore.

Filter it out and then ignore.   Might as well filter it out - see
http://thespamdiaries.blogspot.com/2006/02/new-host-cloaking-technique-used-by.html



Re: news from Google

2009-12-04 Thread Jorge Amodio
 : IMHO that's where we are heading with google taking over every service 
 imaginable

Well nobody is forcing to use their services ...

For search you can use bing when is not down, for email you can use outlook when
the windoze bootnet is not being used to distribute viruses or
malware, or hotmail
if you want plenty of nice ads directed to fulfill your needs and
preferences, for
video you can still use YouTube, uuusss you right evil Google owns them now,
for maps you can use mapquest if you want to get to a place a mile away where
you intended to go, ohhh but they are owned by one of the
failed-ex-evils, want to
take a quick peak at a book, you can still go to your local library,
what else, ohhh yes
wanna blog ? use wordpress and wait for the poetry to become hacked.

Yes, all eggs in the same basket for some stuff is not a good
approach, but what's
wrong about using services that are relatively nice, regularly
available and being
constantly improved, and free ?

Well, right nothing is free, you are part of their monetization and
world domination
scheme ... bad boy Eric, bad boy ...

 Only if you let them.  DBS (don't be sheep)

That's 100% right, if you want privacy just don't make yourself public.

I'm more concerned about information that by law is being made public
and available
on-line (like property records in the US) out of my control, or not very easy to
opt-out.

Cheers
Jorge



Re: Consumer Grade - IPV6 Enabled Router Firewalls.

2009-12-04 Thread Jorge Amodio
I guess Cisco's 800's are out of the Consumer Grade price range, but
any comments
about v6 support on them and how they compare with other options.

Just looking for feedback about good options for sort remote/branch/home office.

Regards
Jorge



Re: Route Target rewrite

2009-12-04 Thread shake righa
Thanks Shahid.

On 11/30/09, Lala Lander ssh...@gmail.com wrote:
 Please try this URL. If it doesnt work for you, let me know and I'll send
 you a working example.

 http://www.cisco.com/en/US/docs/ios/12_2s/feature/guide/fsrtrw4.html

 Pretty straight forward configuration.

 thanks,
 Shahid

 On Sun, Nov 29, 2009 at 6:34 PM, shake righa ssri...@gmail.com wrote:

 Anyone with material on how to perform route target re-write as well as
 filtering during vpnv4 BGP sessions.

 Have been ttying but the rewrite is not occuring.

 Regards,
 Shake Righa





Re: Consumer Grade - IPV6 Enabled Router Firewalls.

2009-12-04 Thread Matthew Moyle-Croft
They work pretty well.

They're one of the few that you can buy which supports DSL and they work.   
IPv6 support on the WIFI interfaces is IOS version dependent.

They support DHCPv6 PD etc.   I'm using one right now with v6.

MMC


On 04/12/2009, at 10:41 PM, Jorge Amodio wrote:

 I guess Cisco's 800's are out of the Consumer Grade price range, but
 any comments
 about v6 support on them and how they compare with other options.
 
 Just looking for feedback about good options for sort remote/branch/home 
 office.
 
 Regards
 Jorge
 

-- 
Matthew Moyle-Croft
Peering Manager and Team Lead - Commercial and DSLAMs
Internode /Agile




Re: news from Google

2009-12-04 Thread Jeffrey Ollie
On Fri, Dec 4, 2009 at 5:29 AM, Jorge Amodio jmamo...@gmail.com wrote:

 I'm more concerned about information that by law is being made public
 and available
 on-line (like property records in the US) out of my control, or not very easy 
 to
 opt-out.

Property records have always been public information in the US, and no
one can opt out (well, I suppose you could sell your house).  Having
information like this available to the public is important because the
government uses those records to make decisions like property tax
rates.  If you were allowed to opt out it would be difficult or
impossible for the public to monitor these government actions.  For
example, if you thought that you were being charged more property tax
than you thought you should you could examine the property records for
properties that were comparable to yours and see what they were being
charged.  If all of your neighbors had opted out you wouldn't be able
to do that (at least not with out going to court).  Similarly, if you
were looking at buying a house you could check the property records to
see if any liens had been made against the property or if you could
afford to pay the property taxes.

-- 
Jeff Ollie



Re: news from Google

2009-12-04 Thread Bruce Williams
On Thu, Dec 3, 2009 at 2:20 PM, Paul S. R. Chisholm
psrchish...@gmail.comwrote:

 On Thu, Dec 3, 2009 at 5:07 PM, Ken Chase m...@sizone.org wrote:
  We all know that google is leveraging cross-referenceable information
 from all
  of its services for its profit/advantage ...
 
  /kc
  --
  Ken Chase - k...@heavycomputing.ca - +1 416 897 6284 - Toronto CANADA
  Heavy Computing - Clued bandwidth, colocation and managed linux VPS @151
 Front St. W.

 Ken, this was addressed in the announcement:

 http://code.google.com/speed/public-dns/privacy.html

 We built Google Public DNS to make the web faster and to retain as
 little information about usage as we could, while still being able to
 detect and fix problems. Google Public DNS does not permanently store
 personally identifiable information.

 http://code.google.com/speed/public-dns/faq.html#account
 http://code.google.com/speed/public-dns/faq.html#shared
 http://code.google.com/speed/public-dns/faq.html#info

 Is any of the information collected stored with my Google account?
 No.
 Does Google share the information it collects from the Google Public
 DNS service with anyone else?
 No.
 Is information about my queries to Google Public DNS shared with other
 Google properties, such as Search, Gmail, ads networks, etc.?
 No.

 Hope this helps.  --PSRC



And this will never change? Not even when you check the box for the latest
update that says it changes some terms and here is the link,,,

Bruce

-- 

“Discovering...discovering...we will never cease discovering...
and the end of all our discovering will be
to return to the place where we began
and to know it for the first time.”
-T.S. Eliot


Re: news from Google

2009-12-04 Thread Richard Bennett
   Bruce Williams wrote:

On Thu, Dec 3, 2009 at 2:20 PM, Paul S. R. Chisholm
[1]psrchish...@gmail.comwrote

On Thu, Dec 3, 2009 at 5:07 PM, Ken Chase [2]m...@sizone.org wrote:

We all know that google is leveraging cross-referenceable information

from all

of its services for its profit/advantage ...

/kc
--
Ken Chase - [3]...@heavycomputing.ca - +1 416 897 6284 - Toronto CANADA
Heavy Computing - Clued bandwidth, colocation and managed linux VPS @151

Front St. W.

Ken, this was addressed in the announcement:

[4]http://code.google.com/speed/public-dns/privacy.html

We built Google Public DNS to make the web faster and to retain as
little information about usage as we could, while still being able to
detect and fix problems. Google Public DNS does not permanently store
personally identifiable information.

[5]http://code.google.com/speed/public-dns/faq.html#account
[6]http://code.google.com/speed/public-dns/faq.html#shared
[7]http://code.google.com/speed/public-dns/faq.html#info

Is any of the information collected stored with my Google account?
No.
Does Google share the information it collects from the Google Public
DNS service with anyone else?
No.
Is information about my queries to Google Public DNS shared with other
Google properties, such as Search, Gmail, ads networks, etc.?
No.

Hope this helps.  --PSRC

And this will never change? Not even when you check the box for the latest
update that says it changes some terms and here is the link,,,

Bruce

   The Adsense tracking cookie was once an opt-in, but after Google
   acquired that company and crushed the competition it became an opt-out,
   unbeknownst to many consumers. This is the way these generally go.
   Google will be all sweetness and light until they've crushed OpenDNS,
   and when the competitor's out of the picture, they'll get down to the
   monetizing.
--
Richard Bennett

References

   1. mailto:psrchish...@gmail.com
   2. mailto:m...@sizone.org
   3. mailto:k...@heavycomputing.ca
   4. http://code.google.com/speed/public-dns/privacy.html
   5. http://code.google.com/speed/public-dns/faq.html#account
   6. http://code.google.com/speed/public-dns/faq.html#shared
   7. http://code.google.com/speed/public-dns/faq.html#info


Re: Consumer Grade - IPV6 Enabled Router Firewalls.

2009-12-04 Thread Mohacsi Janos




On Fri, 4 Dec 2009, Jorge Amodio wrote:


I guess Cisco's 800's are out of the Consumer Grade price range, but
any comments
about v6 support on them and how they compare with other options.

Just looking for feedback about good options for sort remote/branch/home office.


Some 800's are supporting IPv6 very well even DHCPv6-PD.  We tested 83x, 
87x, 88x. No IPv6 support however for 80x and 85x series.


We also tested Juniper Netscreen - they are also very capable devices.

Best Regards,
Janos Mohacsi



Re: news from Google

2009-12-04 Thread Andrey Gordon
I agree, one could find this though paranoid, but even if we don't use
google out of fear that they will take over everything they still seem to be
growing.
What I'm trying to say is that you/we/they can take all the placards
you/we/they want and go and try to convince (or at least educate) the public
that google is becoming an evil empire, but there are enough sheep out there
to make google succeed.
Google makes it's services very attractive to use (free, convenient, great
functionality, integration, etc) so we do for the most part. There is a
chance that soon google will be collecting statistics on all aspects of
your digital life and that government has to do is to pass a law or even
more than that, nationalize google. That's just one paranoid theory I've
got. Send your tin foil hats and emails to PO Box 666, Antarctica, The
World.

Remember? They started as a search engine? Not sure how, but they are
becoming (became) the new Micro$oft, IMHO.

-
Andrey Gordon [andrey.gor...@gmail.com]


On Fri, Dec 4, 2009 at 3:07 AM, Warren Bailey wbai...@gci.com wrote:

 Anyone volunteer to FedEx Scott here a tin foil hat?? If not, I'll be happy
 to provide one... *cue xfiles theme*

 Sent from my Blackberry. Please execute spelling errors.

 - Original Message -
 From: Scott Weeks sur...@mauigateway.com
 To: na...@merit.edu na...@merit.edu
 Sent: Thu Dec 03 22:14:57 2009
 Subject: Re: news from Google



 j...@thejof.com

 : 6.6.6.6 belongs to the US Army

 look at AS 666.  At least they know their position in the universe.
 ---


 andrey.gor...@gmail.com

 : IMHO that's where we are heading with google taking over every service
 imaginable

 Only if you let them.  DBS (don't be sheep)
 ---



 At the most basic minimum manage your cookies. Just a quick search (not
 with google) gives:
 google.com/support/urchin45/bin/answer.py?answer=28710  (you'll see a LOT
 of _utmx type cookies as soon as you start watching them)

 There are many other companies out there that know more about you than you
 think possible.  Small example: Do you allow third party cookies unfettered
 access to what you do?

 scott




Re: news from Google

2009-12-04 Thread Jorge Amodio
 Remember? They started as a search engine? Not sure how, but they are
 becoming (became) the new Micro$oft, IMHO.

Hmnm, I don't agree with your opinion, Micro$oft keeps making money out
of you just repackaging and reselling the same crappy software over and over
and making people pay for a large number of features they will never use,
imposing their OS through hardware distributors and crushing anyone
who they may feel becomes a threat to their biz model.

Remember? The started as a software company, and still don't get it, IMHO.

Regards
Jorge



Re: news from Google

2009-12-04 Thread Andrey Gordon
I didn't say that google is now a software company, i meant they are present
in more and more aspects of your life, but yeah, i guess not the best
example.

Cheers

-
Andrey Gordon [andrey.gor...@gmail.com]


On Fri, Dec 4, 2009 at 9:34 AM, Jorge Amodio jmamo...@gmail.com wrote:

  Remember? They started as a search engine? Not sure how, but they are
  becoming (became) the new Micro$oft, IMHO.

 Hmnm, I don't agree with your opinion, Micro$oft keeps making money out
 of you just repackaging and reselling the same crappy software over and
 over
 and making people pay for a large number of features they will never use,
 imposing their OS through hardware distributors and crushing anyone
 who they may feel becomes a threat to their biz model.

 Remember? The started as a software company, and still don't get it, IMHO.

 Regards
 Jorge



Re: news from Google

2009-12-04 Thread Bruce Williams
We plan to share what we learn from this experimental rollout of Google
Public DNS with the broader web community and other DNS providers, to
improve the browsing experience for Internet users globally.

I wonder how the world managed to function before Google came along

Bruce

On Fri, Dec 4, 2009 at 5:53 AM, Richard Bennett rich...@bennett.com wrote:

  Bruce Williams wrote:

 On Thu, Dec 3, 2009 at 2:20 PM, Paul S. R. Chisholmpsrchish...@gmail.com 
 psrchish...@gmail.comwrote

  On Thu, Dec 3, 2009 at 5:07 PM, Ken Chase m...@sizone.org 
 m...@sizone.org wrote:


  We all know that google is leveraging cross-referenceable information


  from all


  of its services for its profit/advantage ...

 /kc
 --
 Ken Chase - k...@heavycomputing.ca - +1 416 897 6284 - Toronto CANADA
 Heavy Computing - Clued bandwidth, colocation and managed linux VPS @151


  Front St. W.

 Ken, this was addressed in the announcement:
 http://code.google.com/speed/public-dns/privacy.html

 We built Google Public DNS to make the web faster and to retain as
 little information about usage as we could, while still being able to
 detect and fix problems. Google Public DNS does not permanently store
 personally identifiable information.
 http://code.google.com/speed/public-dns/faq.html#accounthttp://code.google.com/speed/public-dns/faq.html#sharedhttp://code.google.com/speed/public-dns/faq.html#info

 Is any of the information collected stored with my Google account?
 No.
 Does Google share the information it collects from the Google Public
 DNS service with anyone else?
 No.
 Is information about my queries to Google Public DNS shared with other
 Google properties, such as Search, Gmail, ads networks, etc.?
 No.

 Hope this helps.  --PSRC


  And this will never change? Not even when you check the box for the latest
 update that says it changes some terms and here is the link,,,

 Bruce


  The Adsense tracking cookie was once an opt-in, but after Google acquired
 that company and crushed the competition it became an opt-out, unbeknownst
 to many consumers. This is the way these generally go. Google will be all
 sweetness and light until they've crushed OpenDNS, and when the competitor's
 out of the picture, they'll get down to the monetizing.

 --
 Richard Bennett




-- 

“Discovering...discovering...we will never cease discovering...
and the end of all our discovering will be
to return to the place where we began
and to know it for the first time.”
-T.S. Eliot


Re: Consumer Grade - IPV6 Enabled Router Firewalls.

2009-12-04 Thread Brandon Ewing
On Fri, Dec 04, 2009 at 10:59:49PM +1030, Matthew Moyle-Croft wrote:
 They work pretty well.
 
 They're one of the few that you can buy which supports DSL and they work.   
 IPv6 support on the WIFI interfaces is IOS version dependent.
 
 They support DHCPv6 PD etc.   I'm using one right now with v6.
 
 MMC
 

Can you comment on what version you got it to work on?  I haven't futzed
with it much, but with 12.4(24)T2, you can't put an ipv6 address directly on
the wireless subinterface.  I tried putting it on a BVI interface, but 
didn't have much luck.

-- 
Brandon Ewing(nicot...@warningg.com)


pgpilnIUlILxp.pgp
Description: PGP signature


SPF Configurations

2009-12-04 Thread Jeffrey Negro
I'm wondering if a few DNS experts out there could give me some input on
SPF record configuration.  Our company sends out about 50k - 100k emails
a day, and most emails are on behalf of customers to their end users at
various domains (no, we're not spammers, these are email notifications
the end users have requested to receive).  Some customers insist on
making the FROM address use their domain name, but the emails leave our
mail servers on our domain.  SPF seems to be the way we could possibly
avoid more spam filters, and delivery rate is very important to our
company.

 

The server configuration consists of a mail server that sends outbound
only, out of a specific IP with proper MX, A, and PTR records.  This is
a sample of the SPF configuration I believe would be correct:

 

Our company (example.com) records:

 

IN   MX 10 mail.example.com

mailIN   A
ip address

example.com   IN   TXT v=spf1 mx -all

example.comIN   SPF v=spf1 mx -all

mailIN   TXT
v=spf1 a -all

mailIN   SPF
v=spf1 a -all

 

customer.com   IN   TXT v=spf1
include:example.com -all

customer.com   IN   SPF v=spf1
include:example.com -all

 

Our customer's (customer.com) records:

 

IN   MX
10 mail.customer.com

mailIN   A
ip address

customer.com   IN   TXT v=spf1 mx -all

customer.com   IN   SPF v=spf1 mx -all

mailIN   TXT
v=spf1 a -all

mailIN   SPF
v=spf1 a -all

 

customer.com   IN   TXT v=spf1
include:example.com -all

customer.com   IN   SPF v=spf1
include:example.com -all

 

I derived this from this tutorial:
http://www.zytrax.com/books/dns/ch9/spf.html . 

 

The other part of this that may be of importance would be the NATing.
The FQDN that the world sees for the outside address of the NAT is not
the same as the inside FQDN that Postfix is using internally.  Does this
cause any problems with SPF?

 

Any comments or suggestions would be great.  Thanks in advance!

 

Jeffrey



RE: SPF Configurations

2009-12-04 Thread Jeffrey Negro
Thanks for your input on this.  My main concern is mail filters at the
end users side thinking that our mail servers are spoofing our
customer's domain.  I'll check into MAAWG as well

Jeffrey Negro, Network Engineer
Billtrust - Improving Your Billing, Improving Your Business
www.billtrust.com
609.235.1010 x137
jne...@billtrust.com

-Original Message-
From: Joe St Sauver [mailto:j...@oregon.uoregon.edu] 
Sent: Friday, December 04, 2009 11:25 AM
To: Jeffrey Negro
Subject: Re: SPF Configurations

#Some customers insist on
#making the FROM address use their domain name, but the emails leave our
#mail servers on our domain.  

Then your IPs or outbound mail servers should be listed on the
customer's
SPF record... assuming they also send their own mail, they obviously
also
want to list their own mail servers.

#SPF seems to be the way we could possibly avoid more spam filters, 

SPF only provides a way of avoiding spoofing, it does not necessarily
enhance your IP reputation or your domain reputation

#and delivery rate is very important to our company.

Are you involved with MAAWG? (see www.maawg.org)

Regards,

Joe



Re: SPF Configurations

2009-12-04 Thread Bret Clark
If the customer insist on using their domain, then you would have to 
have the customer setup an SPF record within their domain that points to 
your email server IP blocks. I would just tell your customer that if 
they insist of using their FROM domain, to help get past someone's 
spamming system the customer is going to have to add the a SPF record to 
their domain similar to the following:


[customer domain].com. IN TXT v=spf1 a mx ip4:[your IP block]

Putting an SPF record in your DNS record will have no affect on spamming 
software. SPF is basically another form of reverse DNS at the mail level.


Bret

Jeffrey Negro wrote:

Thanks for your input on this.  My main concern is mail filters at the
end users side thinking that our mail servers are spoofing our
customer's domain.  I'll check into MAAWG as well

Jeffrey Negro, Network Engineer
Billtrust - Improving Your Billing, Improving Your Business
www.billtrust.com
609.235.1010 x137
jne...@billtrust.com

-Original Message-
From: Joe St Sauver [mailto:j...@oregon.uoregon.edu] 
Sent: Friday, December 04, 2009 11:25 AM

To: Jeffrey Negro
Subject: Re: SPF Configurations

#Some customers insist on
#making the FROM address use their domain name, but the emails leave our
#mail servers on our domain.  


Then your IPs or outbound mail servers should be listed on the
customer's
SPF record... assuming they also send their own mail, they obviously
also
want to list their own mail servers.

#SPF seems to be the way we could possibly avoid more spam filters, 


SPF only provides a way of avoiding spoofing, it does not necessarily
enhance your IP reputation or your domain reputation

#and delivery rate is very important to our company.

Are you involved with MAAWG? (see www.maawg.org)

Regards,

Joe

  





Re: SPF Configurations

2009-12-04 Thread James Bensley
2009/12/4 Bret Clark bcl...@spectraaccess.com

 If the customer insist on using their domain, then you would have to have
 the customer setup an SPF record within their domain that points to your
 email server IP blocks. I would just tell your customer that if they insist
 of using their FROM domain, to help get past someone's spamming system the
 customer is going to have to add the a SPF record to their domain similar to
 the following:

 [customer domain].com. IN TXT v=spf1 a mx ip4:[your IP block]

 Putting an SPF record in your DNS record will have no affect on spamming
 software. SPF is basically another form of reverse DNS at the mail level.

 Bret


The problem we face is that some people we work with can't do that, they
can't even grasp what an SPF record is and so as far as our own spam
filtering goes, we have filtered their emails to us sent with the FROM
address being an @mysurname.com domain which doesn't exist and as a result
we have filtered out their mails so we have had to lower our SPF checking
slightly which is so annoying :S

-- 
Regards,
James ;)

Charles de 
Gaullehttp://www.brainyquote.com/quotes/authors/c/charles_de_gaulle.html
- The better I get to know men, the more I find myself loving dogs.


Re: news from Google

2009-12-04 Thread Christopher Morrow
On Fri, Dec 4, 2009 at 5:53 AM, Richard Bennett rich...@bennett.com wrote:

   Google will be all sweetness and light until they've crushed OpenDNS,
   and when the competitor's out of the picture, they'll get down to the
   monetizing.

one note: OpenDNS is not the only 'competitor' here just one of
the better obviously known ones.

ie:
4.2.2.2  L(3)
198.6.1.1/2/3/4/5/122/142/146/195 ex-UU
Neustar (can't recall ips, sorry)

-chris



RE: SPF Configurations

2009-12-04 Thread Graeme Fowler
On Fri, 2009-12-04 at 11:45 -0500, Jeffrey Negro wrote:
 Thanks for your input on this.  My main concern is mail filters at the
 end users side thinking that our mail servers are spoofing our
 customer's domain.

If you really feel that SPF is going to help, then keep all the mail in
your domain's control by using VERP addresses as the envelope sender
address (like most decent modern MLM packages do).

That way you can have a From:  header in the customer domain (or of
your choosing), and the envelope sender in your own. The benefit here is
that not only does it make the usage of SPF a lot less complex, but it
also means that all bounces come back to the originating system and can
be handled accordingly.

Have a look at the headers of this message for a well-formed example.

Of course, this does depend upon people believing that SPF is actually
useful...

Graeme




RE: SPF Configurations

2009-12-04 Thread Jeffrey Negro
From talking to a few people so far it seems like it might be better to
have the development team here alter our applications to use a separate
Envelope From and friendly From.  I can display the email address with
the customers domain, but the mail will be coming from our address as
the Envelope From.  That way the customer is happy their end user is
seeing the email coming from their domain, while the Envelope From shows
an email address that matches our domain.  Seems like a simpler
solution.

Thank you all for your input, as I know this may be a bit off topic for
this list.

Jeffrey


-Original Message-
From: Graeme Fowler [mailto:gra...@graemef.net] 
Sent: Friday, December 04, 2009 1:59 PM
To: NANOG
Subject: RE: SPF Configurations

On Fri, 2009-12-04 at 11:45 -0500, Jeffrey Negro wrote:
 Thanks for your input on this.  My main concern is mail filters at the
 end users side thinking that our mail servers are spoofing our
 customer's domain.

If you really feel that SPF is going to help, then keep all the mail in
your domain's control by using VERP addresses as the envelope sender
address (like most decent modern MLM packages do).

That way you can have a From:  header in the customer domain (or of
your choosing), and the envelope sender in your own. The benefit here is
that not only does it make the usage of SPF a lot less complex, but it
also means that all bounces come back to the originating system and can
be handled accordingly.

Have a look at the headers of this message for a well-formed example.

Of course, this does depend upon people believing that SPF is actually
useful...

Graeme




Re: news from Google

2009-12-04 Thread Jorge Amodio
Put one more down on the evil list ...

http://www.techcrunch.com/2009/12/04/google-acquires-appjet-etherpad/

Cheers
Jorge



Re: news from Google

2009-12-04 Thread Martin Hannigan
On Fri, Dec 4, 2009 at 1:25 PM, Christopher Morrow
morrowc.li...@gmail.comwrote:

 On Fri, Dec 4, 2009 at 5:53 AM, Richard Bennett rich...@bennett.com
 wrote:

Google will be all sweetness and light until they've crushed OpenDNS,
and when the competitor's out of the picture, they'll get down to the
monetizing.

 one note: OpenDNS is not the only 'competitor' here just one of
 the better obviously known ones.

 ie:
 4.2.2.2  L(3)
 198.6.1.1/2/3/4/5/122/142/146/195 ex-UU
 Neustar (can't recall ips, sorry)

 -chris




Why did Google put an infrastructure critical application into PA space?



-- 
Martin Hannigan   mar...@theicelandguy.com
p: +16178216079
Power, Network, and Costs Consulting for Iceland Datacenters and Occupants


Weekly Routing Table Report

2009-12-04 Thread Routing Analysis Role Account
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
Daily listings are sent to bgp-st...@lists.apnic.net

For historical data, please see http://thyme.apnic.net.

If you have any comments please contact Philip Smith p...@cisco.com.

Routing Table Report   04:00 +10GMT Sat 05 Dec, 2009

Report Website: http://thyme.apnic.net
Detailed Analysis:  http://thyme.apnic.net/current/

Analysis Summary


BGP routing table entries examined:  305390
Prefixes after maximum aggregation:  142337
Deaggregation factor:  2.15
Unique aggregates announced to Internet: 150539
Total ASes present in the Internet Routing Table: 32849
Prefixes per ASN:  9.30
Origin-only ASes present in the Internet Routing Table:   28510
Origin ASes announcing only one prefix:   13915
Transit ASes present in the Internet Routing Table:4339
Transit-only ASes present in the Internet Routing Table:103
Average AS path length visible in the Internet Routing Table:   3.6
Max AS path length visible:  39
Max AS path prepend of ASN (22394)   36
Prefixes from unregistered ASNs in the Routing Table:  1081
Unregistered ASNs in the Routing Table: 172
Number of 32-bit ASNs allocated by the RIRs:342
Prefixes from 32-bit ASNs in the Routing Table: 281
Special use prefixes present in the Routing Table:0
Prefixes being announced from unallocated address space:174
Number of addresses announced to Internet:   2139389760
Equivalent to 127 /8s, 132 /16s and 127 /24s
Percentage of available address space announced:   57.7
Percentage of allocated address space announced:   65.4
Percentage of available address space allocated:   88.2
Percentage of address space in use by end-sites:   80.2
Total number of prefixes smaller than registry allocations:  146684

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:72874
Total APNIC prefixes after maximum aggregation:   25430
APNIC Deaggregation factor:2.87
Prefixes being announced from the APNIC address blocks:   69560
Unique aggregates announced from the APNIC address blocks:30973
APNIC Region origin ASes present in the Internet Routing Table:3883
APNIC Prefixes per ASN:   17.91
APNIC Region origin ASes announcing only one prefix:   1057
APNIC Region transit ASes present in the Internet Routing Table:601
Average APNIC Region AS path length visible:3.6
Max APNIC Region AS path length visible: 23
Number of APNIC addresses announced to Internet:  483411744
Equivalent to 28 /8s, 208 /16s and 71 /24s
Percentage of available APNIC address space announced: 80.0

APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911, 45056-46079
   55296-56319, 131072-132095
APNIC Address Blocks43/8,  58/8,  59/8,  60/8,  61/8, 110/8, 111/8,
   112/8, 113/8, 114/8, 115/8, 116/8, 117/8, 118/8,
   119/8, 120/8, 121/8, 122/8, 123/8, 124/8, 125/8,
   126/8, 133/8, 175/8, 180/8, 182/8, 183/8, 202/8,
   203/8, 210/8, 211/8, 218/8, 219/8, 220/8, 221/8,
   222/8,

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes:128363
Total ARIN prefixes after maximum aggregation:67377
ARIN Deaggregation factor: 1.91
Prefixes being announced from the ARIN address blocks:   102877
Unique aggregates announced from the ARIN address blocks: 38831
ARIN Region origin ASes present in the Internet Routing Table:13385
ARIN Prefixes per ASN: 7.69
ARIN Region origin ASes announcing only one prefix:5182
ARIN Region transit ASes present in the Internet Routing Table:1326
Average ARIN Region AS path length visible: 3.3
Max ARIN Region AS path length visible:  39
Number of ARIN addresses announced to Internet:   731875872
Equivalent to 43 /8s, 159 /16s and 138 /24s
Percentage of available ARIN address space announced:  

Re: news from Google

2009-12-04 Thread bmanning
On Fri, Dec 04, 2009 at 03:34:10PM -0500, Martin Hannigan wrote:
 On Fri, Dec 4, 2009 at 1:25 PM, Christopher Morrow
 morrowc.li...@gmail.comwrote:
 
  On Fri, Dec 4, 2009 at 5:53 AM, Richard Bennett rich...@bennett.com
  wrote:
 
 Google will be all sweetness and light until they've crushed OpenDNS,
 and when the competitor's out of the picture, they'll get down to the
 monetizing.
 
  one note: OpenDNS is not the only 'competitor' here just one of
  the better obviously known ones.
 
  ie:
  4.2.2.2  L(3)
  198.6.1.1/2/3/4/5/122/142/146/195 ex-UU
  Neustar (can't recall ips, sorry)
 
  -chris
 
 
 
 
 Why did Google put an infrastructure critical application into PA space?
 
 

whats PA space in this context?  clearly 8.0.0.0/8 was allocated
prior to any current group-think about what PA might be.

--bill



BGP Update Report

2009-12-04 Thread cidr-report
BGP Update Report
Interval: 26-Nov-09 -to- 03-Dec-09 (7 days)
Observation Point: BGP Peering with AS131072

TOP 20 Unstable Origin AS
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS815120301  2.5%  41.4 -- Uninet S.A. de C.V.
 2 - AS23700   13865  1.7%  27.3 -- BM-AS-ID PT. Broadband 
Multimedia, Tbk
 3 - AS764313095  1.6%  97.7 -- VNN-AS-AP Vietnam Posts and 
Telecommunications (VNPT)
 4 - AS980011181  1.4%  81.0 -- UNICOM CHINA UNICOM
 5 - AS30890   10047  1.2%  19.8 -- EVOLVA Evolva Telecom s.r.l.
 6 - AS14420   10023  1.2%  30.0 -- CORPORACION NACIONAL DE 
TELECOMUNICACIONES CNT S.A.
 7 - AS284779205  1.1%1022.8 -- Universidad Autonoma del 
Esstado de Morelos
 8 - AS141878753  1.1% 301.8 -- COMSAT COLOMBIA
 9 - AS9829 8676  1.1%  18.2 -- BSNL-NIB National Internet 
Backbone
10 - AS232168432  1.0%  46.1 -- MEGADATOS S.A.
11 - AS358057942  1.0%  17.2 -- UTG-AS United Telecom AS
12 - AS9394 7415  0.9%   3.9 -- CRNET CHINA RAILWAY 
Internet(CRNET)
13 - AS336486513  0.8%3256.5 -- ELEPHANT - ColoFlorida / 
Elephant Outlook
14 - AS6822 6494  0.8% 282.3 -- SUPERONLINE-AS SuperOnline 
autonomous system
15 - AS243426219  0.8% 144.6 -- BRAC-BDMAIL-AS-BD BRAC BDMail 
Network Ltd.
16 - AS5800 6071  0.8%  32.1 -- DNIC-ASBLK-05800-06055 - DoD 
Network Information Center
17 - AS4249 6011  0.7%  34.7 -- LILLY-AS - Eli Lilly and Company
18 - AS179744891  0.6%  18.1 -- TELKOMNET-AS2-AP PT 
Telekomunikasi Indonesia
19 - AS9583 4822  0.6%   6.1 -- SIFY-AS-IN Sify Limited
20 - AS7738 4660  0.6%  10.9 -- Telecomunicacoes da Bahia S.A.


TOP 20 Unstable Origin AS (Updates per announced prefix)
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS487544398  0.5%4398.0 -- SOBIS-AS SC SOBIS SOLUTIONS SRL
 2 - AS336486513  0.8%3256.5 -- ELEPHANT - ColoFlorida / 
Elephant Outlook
 3 - AS362393046  0.4%3046.0 -- EXIGEN-CANADA - Exigen Canada
 4 - AS5691 2390  0.3%2390.0 -- MITRE-AS-5 - The MITRE 
Corporation
 5 - AS276672239  0.3%2239.0 -- Universidad Autonoma de la 
Laguna
 6 - AS142511447  0.2%1447.0 -- MLSLI - Multiple Lising Service 
of Long Island, Inc.
 7 - AS393841205  0.1%1205.0 -- GUILAN-UNIV-AS University of 
Guilan AS System
 8 - AS410601078  0.1%1078.0 -- PRIMBANK-AS Joint-Stock 
Commercial Bank Primorye
 9 - AS474171069  0.1%1069.0 -- CELTRAK-AS Celtrak AS Number
10 - AS284779205  1.1%1022.8 -- Universidad Autonoma del 
Esstado de Morelos
11 - AS229171861  0.2% 930.5 -- INFOCHANNEL ASN-INFOCHAN
12 - AS484811850  0.2% 925.0 -- RYBALKA-AS ISP King-Online
13 - AS127322671  0.3% 890.3 -- bbTT GmbH
14 - AS37035 805  0.1% 805.0 -- MIC-AS
15 - AS178192892  0.4% 723.0 -- ASN-EQUINIX-AP Equinix Asia 
Pacific
16 - AS243232120  0.3% 530.0 -- GLOBAL-ONLINE-AS-AP aamra 
networks limited,
17 - AS174691507  0.2% 502.3 -- ACCESSTEL-AS-AP Access Telecom 
(BD) Ltd.
18 - AS26381 942  0.1% 471.0 -- HSBC-COM - hsbc.com
19 - AS413432543  0.3% 423.8 -- TRIUNFOTEL-ASN TRIUNFOTEL
20 - AS37786 843  0.1% 421.5 -- 


TOP 20 Unstable Prefixes
Rank Prefix Upds % Origin AS -- AS Name
 1 - 200.13.36.0/24 9141  1.0%   AS28477 -- Universidad Autonoma del 
Esstado de Morelos
 2 - 66.192.106.0/236254  0.7%   AS33648 -- ELEPHANT - ColoFlorida / 
Elephant Outlook
 3 - 212.253.4.0/24 4951  0.6%   AS6822  -- SUPERONLINE-AS SuperOnline 
autonomous system
 4 - 91.212.23.0/24 4398  0.5%   AS48754 -- SOBIS-AS SC SOBIS SOLUTIONS SRL
 5 - 203.162.118.128/   4184  0.5%   AS7643  -- VNN-AS-AP Vietnam Posts and 
Telecommunications (VNPT)
 6 - 72.28.75.0/24  3046  0.3%   AS36239 -- EXIGEN-CANADA - Exigen Canada
 7 - 89.144.140.0/243006  0.3%   AS39308 -- ASK-AS Andishe Sabz Khazar 
Autonomous System
 AS39384 -- GUILAN-UNIV-AS University of 
Guilan AS System
 8 - 143.138.107.0/24   2699  0.3%   AS747   -- TAEGU-AS - Headquarters, USAISC
 9 - 222.255.186.0/25   2662  0.3%   AS7643  -- VNN-AS-AP Vietnam Posts and 
Telecommunications (VNPT)
10 - 192.12.120.0/242390  0.3%   AS5691  -- MITRE-AS-5 - The MITRE 
Corporation
11 - 148.245.181.0/24   2239  0.2%   AS27667 -- Universidad Autonoma de la 
Laguna
14 - 212.42.236.0/242065  0.2%   AS12732 -- bbTT GmbH
15 - 202.177.223.0/24   1459  0.2%   AS17819 -- ASN-EQUINIX-AP Equinix Asia 
Pacific
16 - 65.223.235.0/241447  0.2%   AS14251 -- MLSLI - Multiple Lising Service 
of Long Island, Inc.
17 - 

The Cidr Report

2009-12-04 Thread cidr-report
This report has been generated at Fri Dec  4 21:11:26 2009 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.

Check http://www.cidr-report.org for a current version of this report.

Recent Table History
Date  PrefixesCIDR Agg
27-11-09309743  191782
28-11-09309731  191730
29-11-09309930  191931
30-11-09310070  192022
01-12-09309965  192378
02-12-09310335  192495
03-12-09310687  192616
04-12-09310737  192817


AS Summary
 33047  Number of ASes in routing system
 14059  Number of ASes announcing only one prefix
  4356  Largest number of prefixes announced by an AS
AS4323 : TWTC - tw telecom holdings, inc.
  92613824  Largest address span announced by an AS (/32s)
AS4134 : CHINANET-BACKBONE No.31,Jin-rong Street


Aggregation Summary
The algorithm used in this report proposes aggregation only
when there is a precise match using the AS path, so as 
to preserve traffic transit policies. Aggregation is also
proposed across non-advertised address space ('holes').

 --- 04Dec09 ---
ASnumNetsNow NetsAggr  NetGain   % Gain   Description

Table 310897   192801   11809638.0%   All ASes

AS6389  4235  318 391792.5%   BELLSOUTH-NET-BLK -
   BellSouth.net Inc.
AS4323  4356 1941 241555.4%   TWTC - tw telecom holdings,
   inc.
AS1785  1783  321 146282.0%   AS-PAETEC-NET - PaeTec
   Communications, Inc.
AS4766  1865  584 128168.7%   KIXS-AS-KR Korea Telecom
AS17488 1458  314 114478.5%   HATHWAY-NET-AP Hathway IP Over
   Cable Internet
AS22773 1125   71 105493.7%   ASN-CXA-ALL-CCI-22773-RDC -
   Cox Communications Inc.
AS8151  1586  674  91257.5%   Uninet S.A. de C.V.
AS4755  1280  402  87868.6%   TATACOMM-AS TATA
   Communications formerly VSNL
   is Leading ISP
AS19262 1044  236  80877.4%   VZGNI-TRANSIT - Verizon
   Internet Services Inc.
AS8452   957  282  67570.5%   TEDATA TEDATA
AS18101  984  328  65666.7%   RIL-IDC Reliance Infocom Ltd
   Internet Data Centre,
AS6478  1179  567  61251.9%   ATT-INTERNET3 - ATT WorldNet
   Services
AS3356  1221  635  58648.0%   LEVEL3 Level 3 Communications
AS24560  805  223  58272.3%   AIRTELBROADBAND-AS-AP Bharti
   Airtel Ltd., Telemedia
   Services
AS10620 1004  431  57357.1%   TV Cable S.A.
AS4808   764  196  56874.3%   CHINA169-BJ CNCGROUP IP
   network China169 Beijing
   Province Network
AS4804   635   72  56388.7%   MPX-AS Microplex PTY LTD
AS7303   665  103  56284.5%   Telecom Argentina S.A.
AS4134  1015  455  56055.2%   CHINANET-BACKBONE
   No.31,Jin-rong Street
AS7018  1588 1032  55635.0%   ATT-INTERNET4 - ATT WorldNet
   Services
AS18566 1059  510  54951.8%   COVAD - Covad Communications
   Co.
AS11492 1145  634  51144.6%   CABLEONE - CABLE ONE, INC.
AS22047  546   49  49791.0%   VTR BANDA ANCHA S.A.
AS4780   627  147  48076.6%   SEEDNET Digital United Inc.
AS9443   533   82  45184.6%   INTERNETPRIMUS-AS-AP Primus
   Telecommunications
AS17676  564  129  43577.1%   GIGAINFRA Softbank BB Corp.
AS5668   786  362  42453.9%   AS-5668 - CenturyTel Internet
   Holdings, Inc.
AS855614  191  42368.9%   CANET-ASN-4 - Bell Aliant
   Regional Communications, Inc.
AS28573  818  398  42051.3%   NET Servicos de Comunicao S.A.
AS7011  1033  628  40539.2%   FRONTIER-AND-CITIZENS -
   Frontier Communications of
   America, Inc.

Total  37274123152495967.0%   

Re: news from Google

2009-12-04 Thread Jorge Amodio
 Come on.  Acquiring a company is now considered evil?

It's a sarcasm about the ones crying wolf about Google becoming evil.



Re: news from Google

2009-12-04 Thread Martin Hannigan
On Fri, Dec 4, 2009 at 4:37 PM, bmann...@vacation.karoshi.com wrote:

 On Fri, Dec 04, 2009 at 03:34:10PM -0500, Martin Hannigan wrote:
  On Fri, Dec 4, 2009 at 1:25 PM, Christopher Morrow
  morrowc.li...@gmail.comwrote:
 
   On Fri, Dec 4, 2009 at 5:53 AM, Richard Bennett rich...@bennett.com
   wrote:
  
  Google will be all sweetness and light until they've crushed
 OpenDNS,
  and when the competitor's out of the picture, they'll get down to
 the
  monetizing.
  
   one note: OpenDNS is not the only 'competitor' here just one of
   the better obviously known ones.
  
   ie:
   4.2.2.2  L(3)
   198.6.1.1/2/3/4/5/122/142/146/195 ex-UU
   Neustar (can't recall ips, sorry)
  
   -chris
  
  
 
 
  Why did Google put an infrastructure critical application into PA space?
 
 

 whats PA space in this context?  clearly 8.0.0.0/8 was allocated
prior to any current group-think about what PA might be.

 --bill



Let's call it conceptual PA. I'm simply asking why something that has the
potential to impact all of us is being numbered into address space other
than their own?

And before the thinkpol start in, I'm referring to the v4 addresses and
their status. It's a fair question since it has major impact on the net. If
the store for legacy v4 addresses is open I'd like to know what street it's
on.

Best,

-M

-- 
Martin Hannigan   mar...@theicelandguy.com
p: +16178216079
Power, Network, and Costs Consulting for Iceland Datacenters and Occupants


AW: SPF Configurations

2009-12-04 Thread Andre Engel
John ,

Nice to meet you :-)

 Right.  The only major mail system that pays attention to SPF is
 Hotmail, but there are enough small poorly run MTAs that use it that
 an SPF record which lists your outbounds and ~all (not -all) can be
 marginally useful to avoid bogus rejections of your mail.

For example :

host -t TXT hotmail.com
hotmail.com TXT v=spf1 include:spf-a.hotmail.com
include:spf-b.hotmail.com include:spf-c.hotmail.com
include:spf-d.hotmail.com ~all

host -t TXT google.com :
google.com  TXT v=spf1 include:_netblocks.google.com
ip4:216.73.93.70/31 ip4:216.73.93.72/31 ~all

host -t TXT amazon.com :
amazon.com  TXT v=spf1 ip4:207.171.160.0/19
ip4:87.238.80.0/21 ip4:72.21.193.0/24 ip4:72.21.196.0/22 ip4:72.21.208.0/24
ip4:72.21.205.0/24 ip4:72.21.209.0/24 ip4:194.154.193.200/28
ip4:194.7.41.152/28 ip4:212.123.28.40/32 ip4:203.81.17.0/24 ~all
amazon.com  TXT spf2.0/pra ip4:207.171.160.0/19
ip4:87.238.80.0/21 ip4:72.21.193.0/24 ip4:72.21.196.0/22 ip4:72.21.208.0/24
ip4:72.21.205.0/24 ip4:72.21.209.0/24 ip4:194.154.193.200/28
ip4:194.7.41.152/28 ip4:212.123.28.40/32 ip4:203.81.17.0/24 ~all

host -t TXT ebay.de :
ebay.de TXT v=spf1 mx include:s._spf.ebay.com
include:m._spf.ebay.com include:p._spf.ebay.com include:c._spf.ebay.com
~all
ebay.de TXT spf2.0/pra mx include:s._sid.ebay.com
include:m._sid.ebay.com include:p._sid.ebay.com include:c._sid.ebay.com
~all

host -t TXT 1und1.de :

TXT v=spf1 ip4:82.165.0.0/16 ip4:195.20.224.0/19 ip4:212.227.0.0/16
ip4:87.106.0.0/16 ip4:217.160.0.0/16 ip4:213.165.64.0/19 ip4:217.72.192.0/20
ip4:74.208.0.0/17 ip4:74.208.128.0/18 ip4:66.236.18.66 ip4:67.88.206.40
ip4:67.88.206.48 ~all

host -t TXT gmx.com :
gmx.com TXT v=spf1 ip4:213.165.64.0/23
ip4:74.208.5.64/26 ip4:74.208.122.0/26 -all

host -t TXT enterprisemail.de :
enterprisemail.de   TXT v=spf1 a:mout.enterprisemail.de -all

etc

 As everyone here should already know, the fundamental problem with SPF
 is that although it does an OK job of describing the mail sending
 patterns of dedicated bulk mail systems, it can't model the way that
 normal mail systems with human users work.  But so deep is the faith
 of the SPF cult that they blame the world for not matching SPF rather
 than the other way around, believing that it prevent forgery, having
 redefined forgery as whatever it is that SPF prevents.  As the
 operator of one of the world's more heavily forged domains (abuse.net)
 I can report that if you think it prevents forgery blowback, you are
 mistaken.

You do know that I love they way abuse.net flys:

In mind of the following situation for instance a infection vector around
millions of bots which are sending millions 
of forged mails within evil polymorphic files camouflage as your customers
bills you
will be glade to enforce the directive -all for a while .

Sorry Im almost german :
http://www.heise.de/security/meldung/1-1-warnt-Kunden-vor-gefaelschten-Rechn
ungen-131420.html


I know SPF is not the answer of all but sometimes it helps to secure a
little bit of yours critical customers infrastructure and sometimes it
helps to save your operative resources .



I know there is a problem so far with forwarded emails but there is  also a
solution :


The solution could be to rewrite the envelope from of all forwarded mail so
that the given domain is a local domain with matching SPF records to the
originating mail server (or no SPF records at all). You have to transform
the original envelope from into a localpart and add some special local SRS
domain to it.

Find http://spf.pobox.com/srs.html http://spf.pobox.com/srs.html  and
http://www.libsrs2.org/ http://www.libsrs2.org/  for a full description of
SRS.

In practice

andre.en...@fhe3.com could receiving an email from mist...@google.com where
andre.en...@fhe3.com could be forwarded to andre.en...@hotmail.de. Before
forwarding the email to the hotmail server I could rewrite the envelope-from
from mist...@google.com mailto:mist...@google.com  to
google.com=mist...@srs.enterprisemail.de srs.enterprisemail.de could be a
valid domain for mails originating from our main mail
clusters(enterprisemail) so possible SPF checks at hotmail would not bother.

In case a bounce is generated at hotmail it could  be delivered back to the
SRS address, thus to our enterprisemail main mail cluster, where we would
recognise the SRS scheme and un-rewrite it back to mist...@google.com and
deliver the mail onward to the mist...@google.com mail system.

But in the real world the rewriting isn't that simple as stated in the
previous section. In fact you have to add some kind of checksum where the
original mail address is mangled with a secret password, and a time stamp
that makes the SRS address valid for some period of time.

The mail address from above could look more like this:

srs38=ldl23v=tz=google.com=mist...@srs.enterprisemail.de


Re: SPF Configurations

2009-12-04 Thread Suresh Ramasubramanian
On Fri, Dec 4, 2009 at 9:55 PM, Jeffrey Negro jne...@billtrust.com wrote:
 I'm wondering if a few DNS experts out there could give me some input on
 SPF record configuration.  Our company sends out about 50k - 100k emails
 a day, and most emails are on behalf of customers to their end users at

SPF records aren't going ot help as much as some list sending and
deliverability best practices (feedback loops etc) are.
Look at the MAAWG senders best practices document - www.maawg.org -
Published Documents

Other than delivery to hotmail, spf is a total waste of time - plus it
plays russian roulette with whatever email you handle



Re: AW: SPF Configurations

2009-12-04 Thread John R. Levine

Right.  The only major mail system that pays attention to SPF is
Hotmail, but there are enough small poorly run MTAs that use it that
an SPF record which lists your outbounds and ~all (not -all) can be
marginally useful to avoid bogus rejections of your mail.


For example :
[ various large ISPs that publish SPF ]


Perhaps this is a language problem.  In English, publishes is not a
synonym for pays attention to.  As I said, you need to publish SPF
to get mail into Hotmail.  That's why people do it.


I know there is a problem so far with forwarded emails but there is  also a
solution :
[ hoary SRS proposal to change every SMTP server in the world to make them
match what SPF does ]


Sigh.


Every time a mail arrives that is an SRS address the password and timestamp
could be checked, and faked or outdated recipients could be rejected.


You might want to look at BATV, which has nothing to do with SPF, but
I have found is quite useful for recognizing spam blowback.

R's,
John

PS:


This message (including any attachments) is the property of FHE3 and may
contain confidential or privileged information. Unauthorized use of this
communication is strictly prohibited and may be unlawful. If you have
received this communication in error, please immediately notify the sender
by reply e-mail and destroy all copies of the communication and any
attachments.


Our policy is to send messages with confidentiality notices to all of
your competitors.



Re: SPF Configurations

2009-12-04 Thread Lars Eggert
On 2009-12-4, at 7:25, John Levine wrote:
 The only major mail system that pays attention to SPF is
 Hotmail

FWIW, GMX (pretty popular in Europe) does too.

Lars

smime.p7s
Description: S/MIME cryptographic signature


Re: SPF Configurations

2009-12-04 Thread Dave CROCKER



Jeffrey Negro wrote:

   SPF seems to be the way we could possibly
avoid more spam filters, and delivery rate is very important to our
company.


You've seen the anti-SPF rants.  At the least, they should make clear to you 
that you should use SPF only and exactly for specific destinations that you 
already know require it.  If you have any doubts about the requirement, you'll 
try to verify it; otherwise assume SPF won't solve your problems.


The other obvious mechanisms for validated identification to receiving operators 
is, of course, with DKIM.  DKIM is entirely comfortable having a validated 
identifier (the d= parameter in the signature header field) be different than 
whatever is in the author header field (From:)


But either way, that's just identification.

As already noted on the thread, what matters most is the set of content and 
operations practices, to establish a rock solid reputation both of you and of 
your clients.


d/
--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net