Re: Past policies versus present and future uses

2021-01-25 Thread Rob McEwen

On 1/25/2021 11:34 AM, Rubens Kuhl wrote:

They are not losing IPs because of hosting questionable content.


Correct - but from reading the Brian Krebs article on this, that was the 
justification that Ron Guilmette used for going after Parler and DDoS-Guard.


--
Rob McEwen
https://www.invaluement.com
+1 (478) 475-9032




Re: Past policies versus present and future uses

2021-01-25 Thread Rob McEwen
/(sent again since the last one had the inline graphic stripped out - so 
this one links to the graphic on a website)/


A take on the 1979 movie "When A Stranger Calls" - "have you checked the 
children?" becomes "have you checked the IP registration?"


Have you checked the IP registration?

https://www.invaluement.com/have-you-checked-the-ip-registration.jpg

The vast majority of the time, Ron Guilmette does "the Lord's work" - 
but THIS time - it looks to me like he put his political biases ahead of 
legit anti-abuse, and it's no surprise that we now have a trail of 
destruction left behind, along with much "innocent bystander" collateral 
damage.


Is DDoS-Guard without blame? Probably not, but them hosting some 
occasional criminals is NOT UNLIKE EVERY OTHER GLOBAL NETWORK! So like 
other large and diversity global networks, anti abuse should focus on 
removing their worst criminals/spammers. By these SAME standards, many 
other large and famous networks should lose most or much of their IPs too!


So here we are, with many OTHER networks now legitimately freaked out 
about losing their IPs, and with massive potential collateral damage 
that might hurt many "innocent bystanders" each time that is done!


-- Rob McEwen, invaluement



Re: Past policies versus present and future uses

2021-01-25 Thread Rob McEwen


A take on the 1979 movie "When A Stranger Calls" - "have you checked the 
children?" becomes "have you checked the IP registration?"


Have you checked the IP registration?


The vast majority of the time, Ron Guilmette does "the Lord's work" - 
but THIS time - it looks to me like he put his political biases ahead of 
legit anti-abuse, and it's no surprise that we now have a trail of 
destruction left behind, along with much "innocent bystander" collateral 
damage.


Is DDoS-Guard without blame? Probably not, but them hosting some 
occasional criminals is NOT UNLIKE EVERY OTHER GLOBAL NETWORK! So like 
other large and diversity global networks, anti abuse should focus on 
removing their worst criminals/spammers. By these SAME standards, many 
other large and famous networks should lose most or much of their IPs too!


So here we are, with many OTHER networks now legitimately freaked out 
about losing their IPs, and with massive potential collateral damage 
that might hurt many "innocent bystanders" each time that is done!


-- Rob McEwen, invaluement



Re: AFRINIC IP Block Thefts -- The Saga Continues

2020-11-16 Thread Rob McEwen

On 11/16/2020 9:54 AM, Tom Beecher wrote:
I would like to formally request that Mr. Cohen's privileges to post 
to this list be revoked, or otherwise curtailed.



+1

Several months ago, Elad Cohen went on record claiming that I was 
secretly "Rob Shultz" from Spamhaus - an outrageous lie. (Spamhaus is 
actually my competitor... and I've only ever known a few people there - 
and not even that well.) What I had to do to (somewhat!) clear my name - 
so that the average person who doesn't know me could tell with a high 
degree of certainty that Elad Cohen lies about me weren't true - took 
away many hours out of my life and got me in trouble with maawg for 
discussing too many details about the people at maawg events whom I had 
interacted with (to show that me and this other Rob couldn't possibly be 
the same person). Note that I barely know "Rob Shultz", and hadn't even 
heard of "Rob Shultz" until AFTER I saw Cohen's accusation. I don't 
think that "Rob Shultz" is a bad person at all - from what little I know 
about him - but these accusations could potentially cause 
frustration/confusion in the niche market served by both invaluement (my 
company) and Spamhaus. The way Elad Cohen pushes ludicrous/unfounded 
conspiracy theories that are easily proven false - makes me question his 
mental heath. Ironically, at the same time, I'm actually somewhat of an 
*EXTREMIST* when it comes to free-speech and the free flow of ideas. I 
absolutely hate it when others shut down opposing ideas due to being 
"offended". But what makes this case DIFFERENT - is that I draw a line 
at slander/libel. I gave Elad Cohen every opportunity to prove his 
accusations - and he wasn't able to. And, again, what I had to explain 
about my meetings with people (aka "witnesses") at maawg - to prove that 
Elad was lying - caused me irreparable damage with maawg. His 
slander/libel is damaging to others. He doesn't add any value (at least, 
none that I can find) - he only harms other people in malicous ways.


--
Rob McEwen, invaluement



Re: CNAME records in place of A records

2020-11-08 Thread Rob McEwen

On 11/8/2020 7:10 PM, Matt Palmer wrote:

On Fri, Nov 06, 2020 at 05:07:26AM -0500, Dovid Bender wrote:

Sorry if this is a bit OT. Recently several different vendors (in
completely different fields) where they white label for us asked us to
remove A records that we have going to them and replace them with CNAME
records. Is there anything *going around* in the security aranea  that has
caused this?

The closest thing to a *security* issue I can think of is IP agility in the
face of DDoS attacks -- most booter-style attacks are dumb as rocks, and
null-routing the target IP and moving all the customers on that IP to
another one is the easiest solution.

However, there are many *other* great reasons to get customers to CNAME onto
their SaaS vendors, including:

* No need to coordinate routine renumbering events;
* IPv6 support;
* CAA record (SSL cert issuance) support; and
* no doubt a bunch of other reasons I've forgotten for the moment.

Basically, if you sign up for a SaaS that uses your own domain and they
*don't* give you a CNAME target to point at, I'd be very cautious, because
they're either *very* new to the game, or they're probably also
operationally deficient in a lot of other areas, too.

- Matt



except - don't forget that the root of a domain (that domain without 
"www." or any other label) - cannot have a CNAME as the "A" record - fwiw...


--
Rob McEwen, invaluement
 



Re: Consolidation of Email Platforms Bad for Email?

2020-09-08 Thread Rob McEwen via NANOG

On 9/8/2020 10:59 AM, Matt Harris via NANOG wrote:
Once you get into that small club, it's just as hard to get kicked 
out, and unfortunately that means that if abuse, UCE, etc is coming 
from those hosts, they've got an even higher chance of hitting your 
inbox. So while in theory it might work the way you're thinking, in 
practice it hasn't because once you are in that club, a lot of the 
financial motivation to prevent abuse of your service - that is, inbox 
deliverability for your client base - goes away.


+1

Likewise, we're at a point now where if a criminal phish or virus comes 
from the largest few email hosters, and you provide them emails with 
full headers - the accounts do NOT get shut down. They literally don't 
think this is their problem. And likewise, data storage sites 
(GoogleDrive, OneDrive, etc) from the largest providers often will host 
malware for weeks or months without being shut down - or the malware at 
least persists for many days after being reported. The same is often 
true for their redirectors.


Wwhat is frustrating is that the long-standing industry standard of 
"you're responsible both for what you both send and host - even if the 
malware wasn't intended" - seems to be lost.


Likewise, back in the spring months of 2018, google's "goo[.]gl" 
shortner went crazy for a few months, and was being MASSIVELY abused by 
spammers, and was being used as an "end run around" URI DNSBLs (SURBL, 
URIBL, ivmURI, DBL). I collected 15K examples of abused shortners that 
were "live", and sent those to Google. At the time I sent those, only 
about 500 of that 15K had been shut down. What was infuriating was that 
80% of these 15K shortners were pointing to only 12 spammer's domains. 
These should have been trivial to prevent!


The OTHER infuriating thing was that my INITIAL response from my 
contacts at Google was - (I paraphrase) "other spam filters should just 
follow the redirect, and block these spams based on the URI it redirects 
to" - WOW! I sent them a very stern email about that. (and for 
comparison, abused Bitly shortners were mostly getting shut down within 
2 hours - so "everyone does it" was NOT a decent excuse!)


Like I said - the long-standing industry standard of "you're response 
both for what you both send and host - even if the malware wasn't 
intended" - seems to be lost on some of these large providers.


Thankfully, this had a happy ending. After some "tough love" - Google 
replied back and said (I paraphrase), "we were planning on shutting that 
down - or at least shutting down the ability to add new ones - and due 
to your feedback - we're going to push that up a few months" - and so 
soon afterwards, they finally did terminate those 15K shortners - and 
stopped allowing new ones. So this is to Google's credit - but the 
problem had persisted for months - and it seemed like a lot of 
cultural/industry standards in the Internet Security industry seemed 
lost on them.


Sadly, while this situation had a good ending - similar problems with 
the largest providers persist. At the same time, they sure can be 
draconian in how they block smaller providers who had a rare and 
short-lived security incident. The hypocrisy is incredible. For example, 
Microsoft will sometimes *permanently* block a small email hoster for a 
short one or two hour compromised email account situation that caused 
spam to be sent from that small hosters - but that was quickly fixed - 
even if that hoster sends MUCH legit email. It almost FEELS like 
extortion - since many of the IT people running those small-ish servers 
sometimes get frustrating - and move their email to the cloud - and then 
guess who OFTEN gets their email hosting business?


-- Rob McEwen, invaluement



Re: CloudFlare Issues?

2020-07-17 Thread Rob McEwen
I think they were down for about 30 or so minutes, but came back up 
right about the time you hit the send button

--Rob McEwen

On 7/17/2020 5:38 PM, Chris Grundemann wrote:
Looks like there may be something big up (read: down) at CloudFlare, 
but their status page is not reporting anything yet.


Am I crazy? Or just time to give up on the internet for this week?

--
@ChrisGrundemann
http://chrisgrundemann.com



--
Rob McEwen
invaluement




Re: RIPE NCC Executive Board election

2020-05-13 Thread Rob McEwen

On 5/13/2020 9:46 AM, Elad Cohen wrote:

Real identities behind "The Spamhaus Project":

"Rob Shultz" - Rob McEwen (https://www.invaluement.com/)



Elad made this public allegation one of RIPE "Open Source Working Group" 
mailing lists, that he started here:


https://www.ripe.net/ripe/mail/archives/opensource-wg/2020-April.txt

Here is my response to this allegation (new thread):

https://www.ripe.net/ripe/mail/archives/opensource-wg/2020-May/93.html

It went back and forth - you can read all the *drama* in that thread. 
Elad "doubled down" by publicly saying to me:


/*"You are a complete liar. You are Rob Shultz."*/

I then put it to bed in the following thread:

https://www.ripe.net/ripe/mail/archives/opensource-wg/2020-May/000100.html

If anyone has the SLIGHTEST SUSPICION that this might be true, PLEASE 
read those threads.


He ended up being put on "moderated" status on the RIPE forum and was 
publicly reprimanded here:


https://www.ripe.net/ripe/mail/archives/opensource-wg/2020-May/99.html

He called me a "liar" - but has produced ZERO evidence to support his 
assertion - even though I "called his bluff" and asked him to "put up 
for shut up". He wouldn't "shut up" - but he also is not capable for 
"putting up" because the only evidence he has - is delusions that only 
exist inside his mind. I'm not a psychiatrist - but Elad is either very 
maliciously and unprofessionally lying to attack anti-spam people - or 
has a serious mental illness and needs psychiatric help. One or the 
other.  Does this mean everything he says is factually wrong? I didn't 
claim that. I don't have the time nor inclination to fact check his long 
rants. But I do know that I'm not, nor have ever been, "Rob Schultz" and 
that I don't secretly work with/for Spamhaus in any way/shape/form. And 
I really don't like being called a "liar" on a public forum by someone. 
There are many out there who might run across posts like that and not 
bother to get the whole context, and might not know the real truth. So 
things like this can become an annoyance for many years to come.


--
Rob McEwen
https://www.invaluement.com



Re: IPv6 Pain Experiment

2019-10-07 Thread Rob McEwen

On 10/7/2019 7:37 AM, Valdis Klētnieks wrote:

On Mon, 07 Oct 2019 03:03:45 -0400, Rob McEwen said:

Likewise for spam filtering - spam filtering would be knocked back to
the stone ages if IPv4 disappeared overnight. IPv6 is a spam sender's
dream come true, since IPv6 DNSBLs are practically worthless.

Riddle me this:  Why then have spammers not abandoned IPv4 and moved to
IPv6 where we're totally powerless to stop their floods of spam?

I'm tired of hearing the excuse "We can't move to IPv6 because then we couldn't
stop the spam" - if that were true, then every organization that *has* moved
to IPv6 would be drowning in spam.


(1) as Stephen Satchell said... because a huge percentage of mailboxes 
(perhaps the vast majority?) are still behind servers that (wisely!) 
only listen on IPv4 for non-auth connections, so spammers would have to 
make extremely large deletions to their distribution list if they only 
sent to emails where the mail server only listened on IPv6.


(2) For my own commercial anti-spam blacklist, I've had SEVERAL new 
subscribers this past year who specifically complained about spams that 
my anti-spam blacklists (AND all the other ones like Spamhaus, etc!) 
were NOT blocking. I requested more information about the ones that 
weren't getting blocked... and they were almost all IPv6-sent spams. I 
simply explained to them that they do NOT have to do this, and that most 
of that spam will go away the moment that their server only listens on 
IPv4 (at least, for non-SMTP-AUTH email - they can still listen for IPv6 
authenticated email without these problems). I also explained to them 
that there hadn't been a situation in the history of the world where an 
email didn't make it to a server that only listened on IPv4 for 
non-authenticated email.


(3) Many IPv6 mail servers have had to invest/expend significantly more 
resources per mailbox.


(4) trying to get everyone to move too quickly to IPv6 POTENTIALLY 
actually damages email and harms OTHER's spam filtering. Why? Because it 
enables listwashing. A spammer can literally send to 10s of thousands of 
email addresses each from a separate /64 block, with a one-to-one 
relationship between the /64 block and the recipient email address. Then 
they can listwash spamtrap addresses based on which of those /64 blocks 
get blacklisted. It ALSO harms email because shady marketers get the 
idea that there are endless new IPs to burn through, and that only 
emboldens them. So when it comes to email, it turns out that IPv4 
scarcity (for non-auth connections) is a feature not a bug! But, if 
desired, you can STILL have massive amounts of IPv6 clients sending via 
SMTP authentication - so this won't limit your ability for your 
refrigerator to send authenticated email to you! (so that greatly 
minimizes the "but we're running out" longer-term argument - besides the 
fact that this isn't really a HUGE problem anyways - since IPv6 clients 
already are already able to connect to IPv4 servers)


--
Rob McEwen
https://www.invaluement.com




Re: IPv6 Pain Experiment

2019-10-07 Thread Rob McEwen

On 10/7/2019 2:03 AM, Masataka Ohta wrote:

Forrest Christian (List Account) wrote:

I've been ignoring this discussion because I feel this ship sailed 
many years ago, and IPv6, like it or hate it, is the best way

forward we have.


A problem is that there is a cliff edge in front of you.



Likewise for spam filtering - spam filtering would be knocked back to 
the stone ages if IPv4 disappeared overnight. IPv6 is a spam sender's 
dream come true, since IPv6 DNSBLs are practically worthless. Yes, there 
are OTHER filtering techniques, but none that scale nearly so much with 
as extremely little resources required. And this is a problem for large 
and small organizations. Even the very largest email systems would be 
extremely disrupted if IPv4 DNSBLs (internal and/or 3rd party) were not 
available within the very near future. Solutions to this problem would 
then severely disrupt their business/financial models for those mail 
systems since the overhead costs per mailbox would significantly increase.


--
Rob McEwen
https://www.invaluement.com




Re: What can ISPs do better? Removing racism out of internet

2019-08-07 Thread Rob McEwen

On 8/7/2019 10:50 AM, Tony Patti wrote:


FYI, /Bloomberg BusinessWeek/ published _TODAY_ a 3,200-word article 
by Felix Gillette entitled*

"Section 230 Was Supposed to Make the Internet a Better Place. It Failed"*
https://www.bloomberg.com/news/features/2019-08-07/section-230-was-supposed-to-make-the-internet-a-better-place-it-failed 





If the whole Section 230 gets deleted - and isn't carefully replaced - 
then many DNSBLs and spam filters and spam filtering technology 
providers with get sued out of business (even if just by SLAPP lawsuits 
suddenly making more progress and costing a fortune in attorney feeds). 
These costs will then get passed onto consumers in the form of either 
MUCH WORSE spam filtering, or much higher costs for email hosting 
services. The same is true for Internet content filters, too.


Be careful what you wish for, you might get it!

--
Rob McEwen



Re: What can ISPs do better? Removing racism out of internet

2019-08-06 Thread Rob McEwen
I'm so tired of this thread - but the bottom line is that censorship and 
even the definition of "hate" and "racism" (especially when used in the 
vernacular!) are extremely subjective and can lead to situations where 
reasonable people disagree. And if/when such policies are implemented to 
try to limit or shut down such speech, horrific unintended collateral 
damage will LIKELY occur. Also, totalitarian regimes OFTEN use the same 
arguments to get their foot in the door of controlling and suppressing 
speech. Even now, the mainstream news media is ALREADY highlighting a 
very selective part of these murderer's ideologies, and suppressing 
other parts, in order to convey an overall impression of their 
ideologies that doesn't actually match them, but furthers certain biased 
agendas. So actions to suppress "hate speech" and "racism" based on the 
1/2 truths that most have been brainwashed to believe about these evil 
murderers' beliefs (1/2 contradicted by their own actual writings, which 
are already evil!), is ALREADY well on its way towards potentially 
causing collateral damage by unplugging or suppressing forums/platforms 
that really don't closely match the actual ideology of the shooters.


Again, I'm not defending the murderers in the slightest - I'm just 
saying that many of those in favor of limiting speech are the SAME crowd 
that is either publishing or consuming content that describes the 
shooters' ideologies in a certain particular way that purposely tries to 
make them look like a DIFFERENT group of deranged people, in order to 
advance a biased agenda. So we're already well on the way towards the 
collateral damage I mentioned above.


Also, I'm not saying that nothing should ever be done, or that we can't 
make any changes or improvements, but the cure might end up being 
potentially much worse than the disease if we're not careful.


--
Rob McEwen




Re: Announcing: "dumpsterfire", the mailing list for IoT security/privacy issues

2019-01-11 Thread Rob McEwen

On 1/11/2019 2:50 PM, Grant Taylor via NANOG wrote:

On 01/11/2019 12:32 PM, Rob McEwen wrote:
but if done right, fwiw,, wouldn't that be sent over SMTP using TLS 
encryption?


Oy vey.  in-flight vs at-rest encryption.  


which is why i said "fwiw", acknowledging upfront that TLS transmission 
encryption has a limited scope. I guess you missed that?  But I was 
specifically replying to a complaint about passwords being sent in plain 
text, and I was suggesting that TLS would solve that problem. At that 
point in the discussion, it wasn't a discussion about all things 
encryption. ("context" is very helpful - are you still facepalming?)




On 01/11/2019 12:32 PM, Rob McEwen wrote:

(but, then again, that ALSO requires a certificate!)
Let's Encrypt works perfectly fine for that too.  }:-) 



Exactly! That was sort of my point too. The person creating that 
dumpsterfire list seemed to be trying to avoid having to install a 
security certificate, but having that security certificate solves other 
problems besides the website getting https, such as enabling TLS, too. 
That was my basic point, I was just trying to be less wordy.


--
Rob McEwen, invaluement




Re: Announcing: "dumpsterfire", the mailing list for IoT security/privacy issues

2019-01-11 Thread Rob McEwen

On 1/11/2019 1:11 PM, Andreas Ott wrote:

Admittedly, mailman does
send you the password in clear text over SMTP if you ask for it



 but if done right, fwiw,, wouldn't that be sent over SMTP using TLS 
encryption? (but, then again, that ALSO requires a certificate!)


--
Rob McEwen, invaluement




Re: Rising sea levels are going to mess with the internet

2018-07-26 Thread Rob McEwen

On 7/26/2018 4:22 PM, valdis.kletni...@vt.edu wrote:

Let's run the math.  1mm/additional per year. So 1 the first year, 2 aditional
the second, ... and the century year then adds 100mm or 4 inches*by itself*.
But we need to add years 1 to 99's contributions too...

sum(1..100) = 101 * 50 or 5050mm.  Divide by 25.4 and you get 198 inches
cumula


You misinterpreted what I said. I was merely saying that the current 
yearly increase is about 1 mm more than the yearly increase was from 40 
years ago. (But maybe not even that much!) I was NOT saying that each 
year was increasing by a rate that was mm more than the previous year.


Your calculation is based on year-to-year acceleration of growth. In 
fact, that year-to-year /*acceleration*/ of rising sea levels is 
actually a ~0.025 mm average increase over the previous year. (this is 
HALF the thickness of a single sheet of paper!) So try your calculation 
again - except see how impressive that "compound interest" you talk 
about is when the year-to-year acceleration of growth over the previous 
year is only 0.025 mm.


ALSO - I say "average rate of increase" because the graph is not a 
smooth line. Like almost everything, it is jagged - where some years 
show signs of more rapid acceleration, and other years show a decrease 
in acceleration, or even a lowering of the sea levels. Anytime one of 
the other hits a historical extreme, it raises curiosity that we might 
be in the middle of a fundamental shift to a "new normal". But before 
anyone assumes that we're about to hit a new normal where that .025 mm 
year-to-year increase in the rate of rising - is about to accelerate - 
note that, in fact, the sea levels have actually LOWERED in the past 
couple of years. (not just rising less fast - ACTUALLY LOWERING). (see 
blue line at the end of this graph: 
https://insideclimatenews.org/content/average-global-sea-level-rise-1993-2017)


--
Rob McEwen
https://www.invaluement.com
+1 (478) 475-9032




Re: Rising sea levels are going to mess with the internet

2018-07-26 Thread Rob McEwen

On 7/26/2018 3:49 PM, valdis.kletni...@vt.edu wrote:

On Thu, 26 Jul 2018 15:39:51 -0400, Rob McEwen said:


JUST BARELY curve upwards. So I dug into THEIR actual data - and even
THEIR data shows something like a cumulative 1mm/year increase - and -
it took ~40 years or so to get to that 1mm increase (to be extra clear,
this is a reported increase over how much oceans are rising now compared
to ~40 years ago. But I'm not even sure this added up to even a full 1 mm.)

Compound interest is a bitch.



But NOT so much when the rate of increase is THIS tiny. Yes, if the rate 
of the increase holds steady, then this could start causing a lot of 
problems EVENTUALLY. But this still only adds up to an ADDITIONAL 4 
inches (total!) per century (over what would have happened). That is an 
amount and time-scale that warrants concern and long-range planning. 
However, extreme measures that would harm our economy in the short term 
(and in many cases wouldn't have helped anyways) are counter productive 
because they then put us on a long-term less healthy economic trajectory 
that would make us less able to afford the future changes that would be 
needed to deal with this extremely long-term problem.


ANALOGY: Freshman college kid becomes a health nut and spends all his 
money on only the best specialized organic foods, exotic vitamins, and a 
membership at the best health club, even paying extra for a personalized 
trainer. Then he has to drop out of college because he can't afford it. 
Then he runs out of money and can't get a decent paying job because he 
doesn't have a college education. Now he eats horrible cheap food and 
works long hours at a low paying job that leaves him little time to 
properly exercise. (in general - solving a SMALL problem with a BIG 
solution - like this - causes problems)


--
Rob McEwen




Re: Rising sea levels are going to mess with the internet

2018-07-26 Thread Rob McEwen

On 7/26/2018 1:32 PM, Rod Beck wrote:

You are simply wrong. The sea level is rising at an increasing rate. The 
average sea level will go up by 30 centimeters to 1 meter by 2100. And of 
course, the storm surge will increase by a multiple of that. Sources: NOAA.


Looking at the SAME sources (NOAA, NASA, etc) - as scary as those "Mt 
Everest" charts look (where they make 3.5mm/year rising look like Mt 
Everest) - the lines on THEIR charts are ALMOST perfectly straight and 
JUST BARELY curve upwards. So I dug into THEIR actual data - and even 
THEIR data shows something like a cumulative 1mm/year increase - and - 
it took ~40 years or so to get to that 1mm increase (to be extra clear, 
this is a reported increase over how much oceans are rising now compared 
to ~40 years ago. But I'm not even sure this added up to even a full 1 mm.)


These sources ALSO have all kind of scary PREDICTIONS or ESTIMATES about 
FUTURE acceleration that goes MUCH faster - just like they did 10 and 20 
years go - but their scary predictions never materialize.


Does pointing out these FACTS - using data from the SAME sources that 
you are using - STILL qualify me for the "flat earth society"?


On this same thread, I've also been called a "climate change denier", 
and otherwise insulted multiple times - for just pointing out clear 
indisputable facts. Others keep pointing out how "a majority of 
scientist disagree" - yet that 97% figure that keeps getting thrown 
around - was from ONE SINGLE extremely flawed study that has since been 
thoroughly debunked.


BTW - in my original message, I did state:


"But I suppose that it might be a good idea to take inventory of the 
absolute lowest altitude cables and make sure that they are not 
vulnerable to the type of flooding that might happen more often after a 
few decades from now after the ocean has further risen about 2 inches? 
But the sky is not falling anytime soon."



So ALSO - everyone - please ALSO stop arguing with a "straw man" here - 
I never said that there wasn't anything to be concerned about.


--
Rob McEwen




Re: Rising sea levels are going to mess with the internet

2018-07-23 Thread Rob McEwen

On 7/23/2018 2:03 PM, Owen DeLong wrote:

Actually, the graphic that is at the top of that link does support his claims.


I was thinking that too - but it could ALSO have something to do with 
the fact that literally hundreds of millions of Indians and Chinese 
citizens joined the 1st world economy - and started doing things like 
driving cars - in recent decades. That could be a larger factor than 
their particular political/economic systems.


ALSO: The BEST arguments on this thread for why we should worry about 
flooding or rising water levels - came from arguments that the actual 
continents are shifting in ways that cause certain coasts to rise or 
sink - regardless of the actual overall ocean depth. I don't know much 
about that - but I do know that (1) THAT particular situation has 
NOTHING to do with CO2 levels or emissions. (2) the parts of this 
conversation that does have to do with CO2 levels is specifically based 
on the theory that (a) high CO2 levels cause warming, which then (b) 
causes the icecaps to melt, which then causes (c) the sea levels to rise 
at an accelerated pace (beyond what it did when the overall CO2 levels 
were lower), as a direct result of increasing levels of CO2 in the 
atmosphere.


but (c) is junk science - since it is NOT happening - the acceleration 
of sea levels rising beyond an average of 3.5mm/year is almost 
non-existent - therefore discussions of CO2 levels and emissions 
unnecessarily politicizes this discussion.


Or, at least, the people who are complaining about how this doesn't 
belong on NANOG (which is a reasonable assessment) - and who complain 
about "climate deniers" - shouldn't be able to shut down certain factual 
and logical arguments (that rock their world) - yet not have a problem 
with continued discussion about CO2 levels and emissions. (that would be 
hypocritical and unscientific)


--
Rob McEwen



Re: Rising sea levels are going to mess with the internet

2018-07-23 Thread Rob McEwen

On 7/23/2018 3:55 AM, Saku Ytti wrote:

On Mon, 23 Jul 2018 at 05:55, Rob McEwen  wrote:

Meanwhile, global warming
alarmists have ALREADY made MANY dire predictions about oceans levels
rising - that ALREADY didn't even come close to true.

Now this discussion does not belong to NANOG


Yes - sad isn't it - that someone else brought this up.


but 'global warming
alarmist' is worrying term to me. What is the perceived harm you're
trying to reduce? Are the acts which try to address the problem the
harm you'd like to see avoided?


Anytime a "big solution" is applied to a "small problem" (or 
non-existent problem), problems arise. At the least, mis-allocation of 
resources  can cause situations where other important issues fail to get 
addressed when the small problem gets an over-allocation of resources. 
(and real peoples' lives get damaged in the process)



Much in same way, compelling majority of scientists (>95%) believe in
human caused global warming


Your ">95%" is MORE junk science. The popular percentage to throw out is 
"97%" - as quoted by Obama  and many others - this came from 2013 paper 
by John Cook - that was so incredibly and dishonestly flawed as to 
basically be unscientific propaganda. (1) many scientists' papers were 
falsely classified and (2) he did a "bait and switch" where he "read 
into" certain papers stuff that wasn't really there.


http://www.populartechnology.net/2013/05/97-study-falsely-classifies-scientists.html
https://www.theguardian.com/environment/blog/2014/jun/06/97-consensus-global-warming

Real science makes "risky predictions" and then is willing to redo the 
hypothesis when those predictions don't happen as predicted. In 
contrast, junk science stubbornly sticks to preconceived biases even 
when the data continually fails to validate the hypothesis (which is 
happening here!). The fact that you're so quick to try your "appeal to 
authority" with that fake ">95%" percentage - and you don't seem to 
understand that a mis-allocation of resources based on junk science is 
NOT a victim-less crime (so to speak - not technically a crime - but 
REAL people ARE damaged by this) - undermines your credibility.


Tell you what, I'll admit that I might be wrong the first time that we 
see a 5+mm per year average of sea level rising over a 5 year period.


HINT: We won't. For example, look at the blue line at the end of this 
"scary graph" from a "climage change" site that has your same viewpoint: 
https://insideclimatenews.org/content/average-global-sea-level-rise-1993-2017 
- as scary as that chart looks like at first glance - it shows 
little-to-no *acceleration* - the rate of increase holds steady at 3.5 
mm/year - BUT HERE IS THE INTERESTING PART: even this pro-climate change 
site's own graph shows that the sea levels have failed to rise AT ALL 
over the past couple of years.


But 15 years from now, we'll see new rounds of NEW dire predictions 
about alarming FUTURE sea level risings that are allegedly just around 
the corner.


--
Rob McEwen



Re: Rising sea levels are going to mess with the internet

2018-07-22 Thread Rob McEwen
For the past 100+ years, the sea levels have been rising by about 2-4 mm 
per year. If you go to the following two sites:


https://oceanservice.noaa.gov/facts/sealevel.html
https://climate.nasa.gov/vital-signs/sea-level/

You'll see all kinds of scary language about dire predictions about how 
the sea levels are rising and accelerating. And you'll see SCARY charts 
that look like Mt. Everest. But when you dig into the actual data, 
you'll find that there MIGHT have been (at most!) a CUMULATIVE 1mm/year 
acceleration... but even that took about 4 decades to materialize, it 
could be somewhat within the margin of error, and it might be a part of 
the fake data that often drives this debate. Meanwhile, global warming 
alarmists have ALREADY made MANY dire predictions about oceans levels 
rising - that ALREADY didn't even come close to true.


The bottom line is that there is no trend of recently observed sea level 
rising data that is even close to being on track to hit all these dire 
predictions within the foreseeable future. And even as the West has 
reduced (or lessened the acceleration of) CO2 emissions - this has been 
easily made up for by the CO2 emission increases caused by the 
modernization of China and India in recent decades.


And, again, there were articles like this 10, 15, and even 20 years ago 
that made very similar predictions - that didn't happen. So, it is hard 
to believe that the dire predictions in this article could come true in 
15 years.


But I suppose that it might be a good idea to take inventory of the 
absolute lowest altitude cables and make sure that they are not 
vulnerable to the type of flooding that might happen more often after a 
few decades from now after the ocean has further risen about 2 inches? 
But the sky is not falling anytime soon.


Rob McEwen


On 7/22/2018 9:01 PM, Sean Donelan wrote:

https://www.popsci.com/sea-level-rise-internet-infrastructure

Rising sea levels are going to mess with the internet, sooner than you 
think


[...]
Despite its magnitude, this network is increasingly vulnerable to sea 
levels inching their way higher, according to research presented at an 
academic conference in Montreal this week. The findings estimate that 
within 15 years, thousands of miles of what should be land-bound 
cables in the United States will be submerged underwater.


“Most of the climate change-related impacts are going to happen very 
soon,” says Paul Barford, a computer scientist at the University of 
Wisconsin and lead author of the paper.

[...]



--
Rob McEwen



Re: Whois vs GDPR, latest news

2018-05-26 Thread Rob McEwen

On 5/26/2018 3:36 PM, JORDI PALET MARTINEZ via NANOG wrote:

Talking from the experience because the previous laws in Spain, LOPD and LSSI


Jordi,

LOPD/LSSI does not = GDPR

But even if there was a probability that GDPR would operate like they do: (1) it is 
alarming that the fines mentioned on GDPR are 10-20X higher than even LOPD/LSSI's higher 
fines -AND- regarding LOPD/LSSI's relatively low minimum fine of 600 EUROs that you 
mentioned - it was explicated mentioned on the page you referenced - HOWEVER there is NOT 
any similar official (relatively) low-cost fines mentioned for GDPR anywhere there is 
only that NOT-reassuring "up to" phrase.

For someone hit with a GDPR fine, I don't think telling them, "JORDI PALET MARTINEZ 
claimed that the fine will be more reasonable for a smaller business that had a less 
egregious offense" - is going to necessarily make it so.

Believe me, I WANT you to be my GDPR fairy. I really really do. But I have to 
operate my business more realistically.

--
Rob McEwen
https://www.invaluement.com




Re: Whois vs GDPR, latest news

2018-05-26 Thread Rob McEwen

On 5/26/2018 2:36 PM, Michel 'ic' Luczak wrote:

Original text from EU Commission:
"Infringements of the following provisions shall, in accordance with paragraph 
2, be subject to administrative fines up to 10 000 000 EUR, or in the case of an 
undertaking, up to 2 % of the total worldwide annual turnover of the preceding 
financial year, whichever is higher”

-> Administrative fines_up to_  10M (or 2% if your 2% is higher than 10M).

It’s a cap, not a minimum.



Thanks for the clarification. But whether that fine will be less than 
10M is extremely vague and (I guess?) left up to the opinions or whims 
of a Euro bureaucrat or judge panel, or something like that... based on 
very vague and subjective criteria. I've searched and nobody can seem to 
find any more specifics or assurances. Therefore, there is NOTHING that 
a very small business with a very small data breach or mistake, could 
point to... to give them confidence than their fine will be any less 
than 10M Euros, other than that "up to" wording - that is in the same 
sentence where it also clarifies "whichever is larger".


All these people in this discussion who are expressing opinions that 
penalties in such situations won't be nearly so bad - are expressing 
what may very with be "wishful thinking" that isn't rooted in reality.


--
Rob McEwen
https://www.invaluement.com
 



Re: Whois vs GDPR, latest news

2018-05-26 Thread Rob McEwen

On 5/26/2018 12:29 PM, JORDI PALET MARTINEZ via NANOG wrote:

I don't recall right now the exact details about how they calculate the fine



The *MINIMUM* fine is 10M euros.

SEE: https://www.gdpreu.org/compliance/fines-and-penalties/

This is true no matter how small the business, and (potentially) even if 
there was just one minor incident.


And the law is so vague and expansive - and with such massive minimum 
fines - that I wonder if this might be exploited to target political 
rivals/enemies? Or those who donate to such? It certainly could easily 
be weaponized!


And before it even gets nearly to that point, it could also turn into 
the equivalent of the tiny city of Waldo, Florida (USA) (population 
1K)... who turned their police force into a speeding-ticket revenue 
factory for some time before the State of FL shut them down. Certainly, 
the Euro bureaucrats are incentivized.


--
Rob McEwen
https://www.invaluement.com



Re: Email security: PGP/GPG & S/MIME vulnerability drop imminent

2018-05-15 Thread Rob McEwen

On 5/15/2018 5:34 AM, Rich Kulawiec wrote:

That's enough right there.  HTML markup in email is used exclusively
by three kinds of people: (1) ignorant newbies who don't know any
better (2) ineducable morons who refuse to learn (3) spammers.
There are no exceptions.



For years, I was very disciplined about using plain-text only for my 
outbound messages... but then I got frustrated with seeing email I had 
posted (to lists like this) - come back with horribly bad line wrapping 
- that made for very choppy readability. (This may have been better or 
worse depending on which software or device I was reading it on?)


Then, when I switched to using my Thunderbird client's "plain and html" 
setting, that problem went away, and posts that I made didn't look like 
someone high on drugs typed them.


--
Rob McEwen
https://www.invaluement.com
 



Re: Is WHOIS going to go away?

2018-04-25 Thread Rob McEwen

On 4/25/2018 10:50 AM, Anne P. Mitchell Esq. wrote:

And of course then there's the conventional wisdom that (some) anti-spammers 
see secret registration as a sign that you are likely a spammer, or otherwise 
engaged in bad activities


For example:

http://www.spamresource.com/2010/02/whois-privacy-protect-what-spamfighters.html

(and I concur... although I do understand the frustration about the 
phone spam, too - I recently registered a dozen domains and I was 
getting 10+ calls a day for weeks - which I why I recommend starting 
with a hidden registration - then switching to an unhidden registration 
some weeks later. This isn't a perfect solution, but it helps since the 
hit freshly registered domains the hardest.)


--
Rob McEwen
https://www.invaluement.com





Re: Is WHOIS going to go away?

2018-04-25 Thread Rob McEwen

On 4/25/2018 11:39 AM, Aaron C. de Bruyn via NANOG wrote:

don't happen if I use private registration



SUGGESTION: Initially register with private registration - then change 
it to regular non-hidden registration a few weeks later or so. 
(hopefully before putting it into production, especially if used 
for/with/in emails) I think this will cut down on the majority of those 
crazy spam phone calls.


--
Rob McEwen
https://www.invaluement.com



Re: Attacks from poneytelecom.eu

2018-01-04 Thread Rob McEwen

On 1/4/2018 12:36 PM, valdis.kletni...@vt.edu wrote:

On Thu, 04 Jan 2018 09:48:24 -0700, Michael Crapse said:

I've never dealt with a support queue that resolved the issue faster than a
direct contact.

Which would the user prefer - a guaranteed 15 minute response time from the 
queue,
or 10 minute from a direct contact, unless it's an hour because they're in a 
meeting,
or the next day because they're out sick, or 2 weeks because they're on 
vacation?

Bonus points for recognizing there's a confirmation bias effect here - people 
will
remember the 2 week response time more than they'll remember the 5 minutes
faster the rest of the time.

Hint: How many "I haven't heard back in a week" do we see here and on the mailop
list, and how many "Congrats to so-n-so who fixed my problem in 5 minutes flat?"



Also, unless the requester already has a close relationship with someone 
in that department at the company they are contacting - it is sort of 
offensive to contact them without FIRST filling out the form and 
allotting a reasonable time for a response. Then, if filling out the 
form didn't work as fast as expected - THEN it might be appropriate to 
contact someone directly to help escalate the form submission. That is 
the RIGHT way to do these things. The opposite of this produces 
insufficiency, miscommunication, legal entanglements (if things didn't 
get handled properly), lost audit-trails/metrics etc. Some larger 
companies FORBID their employees from doing such direct help that is 
entirely outside their regular support system.


--
Rob McEwen
 



Re: Purchased IPv4 Woes

2017-03-20 Thread Rob McEwen

On 3/20/2017 10:25 AM, Mike Hammett wrote:

He did mention Hotmail.


I have no idea which blacklist is allegedly charging $2500 for 
investigating a listing. (I wonder if he meant to type $25.00?) Either 
way, I don't know who that is.


But I will say that, in general, many requesting a delisting from a 
blacklist OFTEN assume that a particular hoster that is blocking their 
messages MUST therefore be caused by the particular "known" blacklist 
they found themselves to be on. But, in many such cases, the host had 
their own internal blacklist or was using some OTHER 3rd party blacklist 
- that was possibly responding to the same "root cause" that the other 
"known" blacklist was reacting to as well, but where that particular 
"known" blacklist wasn't actually the direct reason that this hoster was 
blocking that sender.


So (absent more specific info proving such) this "known" blacklist that 
is allegedly charging a fee for research... could easily NOT be related 
to hotmail. (and probably isn't!)


--
Rob McEwen



Re: Purchased IPv4 Woes

2017-03-12 Thread Rob McEwen

On 3/12/2017 2:00 PM, Baldur Norddahl wrote:

Sorry but this is not true. The address space does not lose that much in
value and in fact most address space that has been used for end users is
already tainted in the same way (due to botnets etc).


Also, you're comparing apples-to-oranges. Dynamically allocated IPs for 
"end users" are not suppose to host mail and web servers - at least not 
professional and high-quality hosting services. This is why their 
outbound speed is almost always governed down to a trickle (often order 
of magnitudes slower then the download speeds), and port 25 is often 
blocked (when not headed to the mail server hosted by the particular ISP 
which controls that space).


Such IPs are OFTEN preemptively blacklisted by Spamhaus's PBL list:

https://www.spamhaus.org/pbl/

If someone wants to run a mail server (or even a web server) from such 
space - then they have a whole bunch of OTHER problems besides who/what 
damaged the space before they acquired it. Their first problem is that 
they are trying to tow a boat with their bicycle.


--
Rob McEwen




Re: Purchased IPv4 Woes

2017-03-12 Thread Rob McEwen

On 3/12/2017 2:00 PM, Baldur Norddahl wrote:

Den 12/03/2017 kl. 18.49 skrev Rob McEwen:

This motivation goes a LONG way towards countering the profit motives
that hosters/ISPs/Datacenters/ESPs have in selling services to
spammers - there is MUCH money to be made doing so. But the longer
term repercussions of damaged IP reputation makes that a *bad*
long-term investment (even if the short-term gains are lucrative).


Sorry but this is not true. The address space does not lose that much in
value and in fact most address space that has been used for end users is
already tainted in the same way (due to botnets etc).


First, I'm on the front lines of this particular fight - and my 
conversations I have with mail senders (of all various types) gives me 
constant 1st-hand confirmation of these facts you deny.


But don't take my word for it - consider the following article written 
by Brian Krebs:


https://krebsonsecurity.com/2015/08/like-cutting-off-a-limb-to-save-the-body/

If what you said is true, then Hostwinds wouldn't have ever seen a need 
to reform - and they wouldn't have ever reformed. And many of the 
hosters who had more foresight and never had to learn this less the hard 
way - would have likewise followed hostwinds footsteps (except without 
the the reform part)


Also, if any good hosting company just let their guard down and started 
allowing just any spammer to purchase services - their IP space 
reputation would nosedive across-the-board to the lowest of depths... 
that occasional random botnets on a residential dynamic IPs - could 
never get to.


--
Rob McEwen




Re: Purchased IPv4 Woes

2017-03-12 Thread Rob McEwen

On 3/12/2017 11:40 AM, valdis.kletni...@vt.edu wrote:

How does Spamhaus find out the block has been resold?
How do other DNS-based blacklist operators find out?


Spamhaus and other reasonable and well-run DNSBLs:

(1) have reasonable auto-expiration mechanisms (which cover the vast 
majority of these situations where a block gets a new and more ethical 
owner)


(2) and have all various different monitoring and feedback mechanisms - 
which may not be perfect and may not have God-like omniscience - but 
generally get things right before too long - they have overall very 
excellent telemetry and they don't get very much wrong at any one point 
in time.


In contrast, much of the cause of this problem described on this thread 
is caused by system admins relying less on well-run blacklists, and rely 
more on "set it and forget it" manual blocking of IPs and subnets at 
their perimeter.


(in contrast to well-run DNSBLs...) They then often have ZERO 
expirations happening - listing are basically permanent - until manually 
removed - and their telemetry/feedback is just horrific compared to a 
well-run DNSBL.


There also are not any public lookup forms in the world where a sender 
can determine which such manual blocks are found on which 
ISP/hosters/datacenters.


The good news here - is that this becomes further motivation for senders 
to be vigilant to protect their IPs reputation - knowing that a lack of 
such effort can quickly lead to their IP space becoming "damaged goods".


This motivation goes a LONG way towards countering the profit motives 
that hosters/ISPs/Datacenters/ESPs have in selling services to spammers 
- there is MUCH money to be made doing so. But the longer term 
repercussions of damaged IP reputation makes that a *bad* long-term 
investment (even if the short-term gains are lucrative).


Meanwhile, btw - moving all mail servers to IPv6 too fast... ELIMINATES 
that motivation. Almost everyone reading this paragraph on NANOG has no 
idea just (a) how much this incentive keeps email sane and manageable - 
and (b) just how bad things will get if this incentive is removed, via 
moving all MTAs to IPv6. (In an all-IPv6 world - if you ruin your IP 
reputation by making a ton of money selling to spammers - there are 
always vast amounts of new space to acquire)


I can tell you that, ultimately, this is the ONLY thing keeping 
hosters/ISPs/Datacenters/ESPs from selling services to spammers. Some 
who deny that this statement applies to them - will at least move the 
goalposts somewhat, now matter how good of intentions they may think 
they have. (human nature always dominates)


(but there is no problem moving all email *clients* to IPv6 - where 
their IPv6-sent mail then SMTP-authenticates to mail servers... which 
then send that message to other mail servers via IPv4 - at least for the 
foreseeable future)


--
Rob McEwen



Re: Wanted: volunteers with bandwidth/storage to help save climate data

2016-12-16 Thread Rob McEwen

On 12/16/2016 4:48 PM, Hugo Slabbert wrote:

This started as a technical appeal, but:
https://www.nanog.org/list
1. Discussion will focus on Internet operational and technical issues as
described in the charter of NANOG.
6.  Postings of political, philosophical, and legal nature are prohibited.


EXACTLY - but I had to finally respond because it was getting 
obnoxious... all the "we all think this way and we KNOW that the other 
side is wrong"--implications/statements embedded in various previous posts.


--
Rob McEwen




Re: Wanted: volunteers with bandwidth/storage to help save climate data

2016-12-16 Thread Rob McEwen

On 12/16/2016 3:30 PM, Ken Chase wrote:

http://abcnews.go.com/US/north-carolina-bans-latest-science-rising-sea-level/story?id=16913782


North Carolina is not banning science. It is banning absolutely 
preposterous and manipulated junk science.


A 39-inch rise in the ocean levels over the next century is based on 
fear-mongering and junk science designed to scare politicians into 
increasing grant $$ from the federal government. It is not based on science.


In fact, the sea levels continue to rise at the SAME TINY 2-4mm per year 
that they've been rising at for decades, with ZERO sign of an increase.


If global warming was real and cumulative - this shouldn't even be 
possible, based all that we've been told over the past 20 years.


Every article that states that oceans rising at alarmingly faster rates 
- due to global warming - either lie about or manipulate the the data... 
or they grab one relatively small short term spike and extrapolates from 
that.


Meanwhile, dozens of sea-level rising predictions from so-called 
credible scientists have not only failed, but failed by order of 
magnitudes, and again, relied upon junk science. True science makes 
"risky predictions" and is willing to throw out the theory when that 
theories "risky predictions" don't come true.


But I truly due hope that this collection process is successful because 
I hope that ALL of this (mostly) manipulated data gets recorded for 
posterity so that (honest) scientists a century from now can do 
extensive studies on how/why science became so political and manipulated 
as they look back on the first few decades of the 21st century's slide 
into a strong long-term cooling trend, due to long term cyclical sun cycles.


This is not a victim-less crime. This manipulation of the data by global 
warmongers harms people because is miscalculates resources and damages 
the economy. Does that mean we should spew toxic waste into rivers or 
streams or spew smog into the air? Of course not. But global warming and 
CO2 being a cause of it... and "oceans rising" has MUCH junk science 
behind it.


Still, I hope this data is preserved. The truth will win out in the long 
term. (as is already starting to happen)


--
Rob McEwen




improved NANOG filtering

2015-10-26 Thread Rob McEwen

On 10/26/2015 12:06 PM, Job Snijders wrote:

I expect some protection mechanisms will be implemented,
rather sooner then later, to prevent this style of incident from
happening again.


Job,

I can't tell for sure if you're a NANOG admin? Or if you're making 
educated guesses about what you think that NANOG will do?


If you really are a NANOG admin, I suggest adding some kind of URI 
filtering for blocking the message based on the the domains/IPs found in 
the clickable links in the body of the message.


Here are 4 such lists:
SURBL
URIBL
invaluement URI
SpamHaus' DBL list

(all very, very good!)

My own invaluementURI list did particularly well on this set of (mostly 
hijacked) spammy domains, possibly listing ALL of them! I spot checked 
about 40 of them and couldn't find a single one that wasn't already 
listed on ivmURI at the time of the sending. But then I discovered that 
my sample set wasn't truly random. So I can't say for sure, but it looks 
like ivmURI had the highest hit rate, possibly by a wide margin. (I wish 
I had meticulously collected ALL of them and checked ALL of them at the 
time they were received!) Since then, more of these are now listed on 
the other URI/domain blacklists. (but that doesn't mean as much if they 
weren't listed at the time the spam was sent!)


Nevertheless, going forward, I recommend checking these at 
multirbl.valli.org (or mxtoolbox) to see *which* domain blacklist(s) 
would have blocked the spam at the time of the sending... to get an idea 
of which blacklists are best for blocking this very sneaky series of spams.


PS - I'd be happy to provide complementary access to invaluement data to 
NANOG, if so desired.


--
Rob McEwen



Re: The spam is real

2015-10-26 Thread Rob McEwen

On 10/26/2015 3:25 PM, William Allen Simpson wrote:

What's the exploit that corrupted the sites?
...
All the sites that I checked (without the added suffix) seem
legit.  But maybe they are spammer sites?  How do we know?



Most involve wordpress vulnerabilities that a spammer exploited, where 
the spammer then installed their spammy content on someone else's 
otherwise legit website. (other vulnerabilities happen too.)


NOTE: Anyone using wordpress need to be vigilante about keeping it 
updated (and associated plugins updated)!


That makes these particularly hard to blacklist because they always 
involve SOME amount of "collateral damage" (though often a small and 
well-justified amount) AND the same algorithms that help URI/domain 
blacklists to not have FPs, likewise often (and often mistakenly) 
prevent many of these from getting blacklisted... which explains why 
many of these were not on very many URI or domain blacklists.


--
Rob McEwen




Re: improved NANOG filtering

2015-10-26 Thread Rob McEwen

On 10/26/2015 5:15 PM, Patrick W. Gilmore wrote:

And the first person who says “who has seen $URL” or similar in a message gets 
bounced, then bitches about “operational nature” of NANOG.

I think it is probably not a great idea to add things like URI checkers to NANOG. 
We can bitch & moan about people supposed to modify it to hxxp or whatever, but 
reality is people like to copy/paste and this is not unreasonable on NANOG.


That is a good point. Personally, I think whole spam samples should be 
linked to a pastebin post. and individual references to a spammer's 
domain or ip should have a space inserted before each dot. What can be 
frustrating when this isn't done ... is that discussions about spam can 
intermittently get filtered on the client side, sometimes by active 
participants in a thread... and inconsistently. which is frustrating... 
and which is why everyone OUGHT to use such tactics when providing spam 
samples or when discussing spammy IPs or domains.


But you're correct. Filtering on the server side of lists is not as 
simple as it sounds due to the risk of mistakenly blocking legit 
messages in a discussion about spam.


Still, it may not be as problematic as you think to deploy such 
measures. When the sender gets a rejection notice, they often figure out 
what happened and resend with the spam obfuscated, fwiw. If someone 
complains, tell them that they should have known to obfuscate the spam 
(or spammy domain or IP), or post the spam sample to pastebin


As least, that is my suggestion. But I know there isn't an easy answer 
to this.


--
Rob McEwen



Re: surge of "new message" spams hitting NANOG

2015-10-26 Thread Rob McEwen

On 10/24/2015 11:04 PM, Rob McEwen wrote:
I just checked the all the spammy domains found on tonight's surge of 
spams that hit NANOG


oops. "all" didn't really mean "all". I had mistakenly though that I was 
getting all of them and that I was bypassing all spam filtering for 
NANOG messages. Turns out, I was instead doing minimal filtering... so 
that caused most of them to be blocked in my spam filtering. Then I ran 
those stats on what was really a small subset of the ones that slipped 
past that minimal level of filtering i was using on NANOG message. So my 
sample set may not have been representative of the whole. Sorry for the 
confusion.


--
Rob McEwen
 



surge of "new message" spams hitting NANOG

2015-10-26 Thread Rob McEwen
I just checked the all the spammy domains found on tonight's surge of 
spams that hit NANOG ...I checked them at http://multirbl.valli.org to 
see *which* DNS blacklists had each domain in the clickable link of each 
spam blacklisted. I did that check about an hour after those were sent, 
which was went I sat down at my computer and saw that.


Here are the results:

africancichlidphotos DOT com
--listed on ivmURI
--listed on HostKarma

africameetsafrica DOT com
--listed on ivmURI

arpitshah DOT co DOT in
--listed on ivmURI
--listed on SpamHaus DBL

dinkinsautoservice.com
--listed on ivmURI
--listed on HostKarma

electronicstradingllc DOT com
--listed on ivmURI

hutsonlegal DOT com
--listed on ivmURI
--listed on HostKarma

janatyachar.org
--listed on ivmURI
--listed on URIBL
--listed on HostKarma

marketingdeguerrilla DOT net
--listed on ivmURI
--listed on URIBL
--listed on SURBL

micheleruiz DOT com
--listed on ivmURI
--listed on HostKarma

ogdenautomotiveinc DOT com
--listed on ivmURI

pilotsref DOT com
--listed on ivmURI

photographytoday DOT org
--listed on ivmURI
--listed on HostKarma

probeautystudios DOT com
--listed on ivmURI

purefitnesslincoln DOT com
--listed on ivmURI

rosasmedley DOT com
--listed on ivmURI
--listed on HostKarma

thomasanthonyguerriero DOT co
--listed on ivmURI

throughaglassdarkly DOT net
--listed on ivmURI

signranch DOT com
--listed on ivmURI
--listed on SpamHaus DBL

stillbontechnology DOT com
--listed on ivmURI

studioprodutora DOT com DOT br
--listed on ivmURI

urbanfoodstrategies DOT com
--listed on ivmURI

As shown, I was happy to see that my own ivmURI blacklist was 21 for 21, 
and nothing else came close to that. (I also verified that ALL of the 
ivmURI listings happened BEFORE those spams were sent to NANOG).


Keep in mind... this isn't a true measure of any one of those domain 
blacklists' overall effectiveness since this is just one tiny metric of 
one small type of very sneaky spam. So please don't think I'm trying to 
say that ivmURI is a replacement for SpamHaus' DBL list or SURBL or 
URIBL, etc... because those lists do likewise catch some spammy domains 
that ivmURI misses or hadn't gotten to yet. But it was still very 
satisfying to see this success. If it would help, I'll be happy to 
provide the operator of NANOG complementary access if so desired.


PS - if the "hits" on other blacklists for these domains suddenly 
expands, that would be due to added listings which happened AFTER those 
spams were sent to the NANOG list. (and after I did this check)


--
Rob McEwen
+1 478-475-9032



Re: Fw: important message

2015-10-08 Thread Rob McEwen
A lot of web sites have been infected by criminal spammers in the past 
couple of years. More recently, massive amounts of legitimate web sites 
run by non-spammers which used older versions of WordPress (in 
particular)... have had their web sites hacked into by criminal 
spammers. The WordPress exploit is epidemic. Since most of these sites 
are legitimate, they are difficult to blacklist because blacklisting 
them does cause some amount of collateral damage (though usually a very 
acceptable and targeted amount of collateral damage--given the 
circumstances). The problem here is that the SAME algorithms which help 
the better domain-based anti-spam blacklists to NOT have false 
positives--OFTEN--also prevent THESE sites from getting 
blacklisted--even when the infection is active. Those are arguably False 
Negatives, especially in the more extreme cases when much spam is 
spewing, with relatively little legit mail containing these domains!


Plus, feeling sorry for the site owner's "collateral damage" is like 
thinking that it is unfair that someone with a highly contagious 
disease, who got it from irresponsible behavior (dirty needle, etc), 
wasn't allowed allowed to walk in a crowded public area. When a web site 
is hosting such malicious content, the web site owner SHOULD lose some 
privileges until such time that they've cleaned up their mess.


Because of this situation, some changes were made to the invaluementURI 
domain blacklist (ivmURI) about 1 or 2 years ago... to enable it to 
better surgically target THESE types of exploited domains, yet with a 
reasonable balance that (hopefully) wouldn't trigger too many FPs. So 
far, that has been highly successful and I see evidence that other such 
lists (surbl, uribl, and SpamHaus's DBL list) have made some 
improvements in this area too.


For example, ivmURI had THIS particular domain blacklisted for over a 
week now (with nobody else listing it!)... and I seem to recall two such 
messages slipping through just weeks ago ago where the domain in one was 
only on SpamHaus' DBL list, and the other was only listed on ivmURI. (or 
was that the SA list where I saw those 2 messages?)


even as I type this, ivmURI seems to be the only blacklist which has 
"globalreagents DOT com" blacklisted, fwiw


--
Rob McEwen



Re: How to wish you hadn't forced ipv6 adoption (was "How to force rapid ipv6 adoption")

2015-10-03 Thread Rob McEwen
 percentage if you 
don't include client-to-server SMTP-Authenticated traffic?


Also, since such a low percentage of mail servers currently accept IPv6 
traffic, all my worst fears about spam filtering in the IPv6 world are 
not going to be on display since the vast majority of spammers don't 
send via IPv6. This a ticking time bomb if IPv6 mail server traffic is 
pushed too fast. Just because it works now doesn't mean it will be 
workable later.


I DO have some solutions in mind, but at this point in the discussion... 
it seems like a waste of time to even mention them when so many don't 
take these problems seriously. I think many are underestimating how much 
scarcity of IPs is helping ESPs and hosters try hard to keep their IPs 
clean. I'm on the front lines in fighting the most sneakiest spam and in 
dealing with grayhat ESPs who try to not send spam, but don't try that 
hard and WOULD be more worried about making more sales that 
month--EXCEPT that but don't want to see their *scarce* IPv4 IPs soiled. 
When others who are not on the front lines blow these concerns off, I'm 
reminded of the phrase, "let them eat cake".


--
Rob McEwen
+1 478-475-9032



Re: How to wish you hadn't forced ipv6 adoption (was "How to force rapid ipv6 adoption")

2015-10-02 Thread Rob McEwen

On 10/2/2015 1:10 AM, Mark Andrews wrote:

or working out how many addresses a
site needs when handing out address blocks


At first, I'm with you on this.. but then when you got to the part I 
quoted above...


it then seems like dividing lines can get really blurred here and this 
statement might betray your premise. A site needing more than 1 
address... subtly implies different usage case scenarios... for 
different parts or different addresses on that block... which could slip 
back into... "you blocked my whole /48... but the spam was only coming 
from this tiny corner of the block over here (whether that be a one IP, 
a /64, or a /56)... and now other parts of the block that were sending 
out legit mail, are suffering".


Likewise, sub-allocations can come into play, where a hoster is 
delegated a /48, but then subdivides it for various customers.


--
Rob McEwen
+1 478-475-9032



How to wish you hadn't forced ipv6 adoption (was "How to force rapid ipv6 adoption")

2015-10-01 Thread Rob McEwen
tnet spam directly to the 
recipient's mail server).


So push IPv6 all you want.. .even "force" it... but please don't be too 
quick to rush the elimination of IPv4 anytime soon. And lets keep MTA 
sending IPs (which is server-to-server traffic) as IPv4-only, even if 
they are able to receive their own customers' SMTP auth mail via IPv6.


Otherwise, we'll be having discussions one day about how to limit WHICH 
and HOW MANY IPv6 addresses can be assigned to MTAs! (hey, maybe that 
isn't a bad idea either!)


--
Rob McEwen



Re: How to wish you hadn't forced ipv6 adoption (was "How to force rapid ipv6 adoption")

2015-10-01 Thread Rob McEwen

On 10/1/2015 11:18 PM, corta...@gmail.com wrote:
Excuse my probable ignorance of such matters, but would it not then be 
preferred to create a whitelist of proven Email servers/ip's , and 
just drop the rest?  Granted, one would have to create a process to 
vet anyone creating a new email server, but would that not be easier 
then trying to create and maintain new blacklists?




I have heard that mentioned before. Unfortunately, this wouldn't work:

(1) we already have extensive IPv4 whitelists, many of which are used by 
prominent anti-spam blacklists (and ISPs) to prevent false positives. 
However, if tomorrow, ALL IPv4 blacklists disappears, and all mail 
servers only allowed in the traffic coming from the IPs listed on the 
better IPv4 whitelists, then a massive percentage of VERY legit mail 
would STILL be blocked. Therefore, if IPv4 whitelists can't keep up in 
the IPv4 work, how are they going to do so in the IPv6 world?


(2) Then there is the chicken-N-egg problem. How do you get your mail 
delivered if you are a new sender, but aren't on that list yet. How do 
you prove your sending practices are valid if you can't get your first 
e-mail delivered?


(3) Any solution to that "chicken-N-egg problem"... which tries to 
provide some kind of verification of legit senders... is a hoop that the 
spammers could jump through just as easily... and they will! (some of 
them doing so convince that they are doing nothing wrong because they 
were told that the list they bought isn't spam because the recipient 
forgot to uncheck a button that said, "receive offers from third parties"!)


(4) and this idea oversimplifies the complexity of the spam problem. For 
example, many of the better blacklists know just when it is appropriate 
to blacklist that legit sender who sends 100 legit messages a day, but 
had a compromised system that triggered 50 thousand spam to be sent out 
that day... and the better blacklists are good about delisting that 
sender soon after the problem is fixed. But in a whitelist-only world, 
you're stuck receiving all that spam!


--
Rob McEwen
+1 478-475-9032



Re: How to wish you hadn't forced ipv6 adoption (was "How to force rapid ipv6 adoption")

2015-10-01 Thread Rob McEwen

On 10/1/2015 11:44 PM, Mark Andrews wrote:

IPv6 really isn't much different to IPv4.  You use sites /48's
rather than addresses /32's (which are effectively sites).  ISP's
still need to justify their address space allocations to RIR's so
their isn't infinite numbers of sites that a spammer can get.


A /48 can be subdivided into 65K subnets. That is 65 *THOUSAND*... not 
the 256 IPs that one gets with an IPv4 /24 block. So if a somewhat legit 
hoster assigns various /64s to DIFFERENT customers of theirs... that is 
a lot of collateral damage that would be caused by listing at the /48 
level, should just one customer be a bad-apple spammer, or just one 
legit customer have a compromised system one day.


Conversely, if a more blackhat ESP did this, but it was unclear that 
this was a blackhat sender until much later.. then LOTS of spam would 
get a "free pass" as individual /64s were blacklisted AFTER-THE-FACT, 
with the spammy ESP still having LOTS of /64s to spare.. remember, they 
started with 65 THOUSAND /64 blocks for that one /48 allocation (Sure, 
it would eventually become clear that the whole /48 should be blacklisted).


other gray-hat situations between these two extremes can be even more 
frustrating because you then have the same "free passes" that the 
blackhat ESP gets... but you can't list the whole /48 without too much 
collateral damage.


SUMMARY: So even if you moved into blocking at the /64 level, the 
spammers have STILL gained an order of magnitudes advantage over the 
IPv4 world any way you slice it. And blocking at the /48 level WOULD 
cause too much collateral damage if don't indiscriminately.


And this is assuming that individual IPs are NEVER assigned individually 
(or in smaller-than-/64-allocations) . (maybe that is a safe assumption? 
I don't know? regardless, even if that were a safe assumption, the 
spammers STILL have gained a massive advantage)


--
Rob McEwen
+1 478-475-9032



Re: How to wish you hadn't forced ipv6 adoption (was "How to force rapid ipv6 adoption")

2015-10-01 Thread Rob McEwen

On 10/1/2015 11:58 PM, Rob McEwen wrote:
And blocking at the /48 level WOULD cause too much collateral damage 
if don't indiscriminately. 


I meant, "if done indiscriminately"

excuse my other more minor typos too. I get in a hurry and my fingers 
don't always type what my brain is thinking :)


--
Rob McEwen
+1 478-475-9032



Re: How to wish you hadn't forced ipv6 adoption (was "How to force rapid ipv6 adoption")

2015-10-01 Thread Rob McEwen

On 10/2/2015 12:18 AM, Mark Andrews wrote:

A hoster can get /48's for each customer.  Each customer is technically
a seperate site.  It's this stupid desire to over conserve IPv6
addresses that causes this not IPv6.


In theory, yes. In practice, I'm skeptical. I think many will 
sub-delegate /64s


Plus, nobody has yet addressed the fact that new /48s will be just so 
EASY to obtain since they are going to be plentiful... therefore... the 
LACK of scarcity will make hosters and ESP... NOT be very motivated to 
keep their IP space clean... as is the case now with IPv4.


Also, it seems so bizarre that in order to TRY to solve this, we have to 
make sure that MASSIVE numbers of individual IPv6 IP addresses.. that 
equal numbers that my calculate can't reach (too many digits)... would 
all be allocated to one single combined usage scenario. Then allocating 
only /48s multiples that number by 65K. Mind boggling


--
Rob McEwen
+1 478-475-9032



Re: SPAM: AW: important

2015-09-24 Thread Rob McEwen

On 9/24/2015 9:20 AM, TR Shaw wrote:

Strange as it has been listed in SURBL for ever since the site was cracked.


fwiw, likewise, that same spammy domain has been on invaluement's URI 
blacklist since 9/17/2015 2:27 a.m. (+- a couple of minutes)


--
Rob McEwen



Re: FCC releases Open Internet document

2015-03-12 Thread Rob McEwen

On 3/12/2015 1:30 PM, William Kenny wrote:

NO BLOCKING:
A person engaged in the provision of broadband Internet access service,
insofar as such person is so engaged, shall not block lawful content,
applications, services, or nonharmful devices, subject to reasonable
network management.


The document (if I read it correctly) states that reasonable network 
management includes spam filtering (yeah!)


However, in spite of that... it seems to give the MISTAKEN impression that:

(1) ALL spam is ALWAYS... NOT-lawful content
(2) ALL lawful content is NEVER spam.

(again, I'm not saying the document says this directly... only that it 
seems to give that impression at times!)


But, in fact, there is actually MUCH spam that is 100% legal,  but also 
100% unsolicited/undesired and therefore frequently blocked by spam 
filters, and rightly so. I just hope that nobody argues in a court of 
law that their exceptions for spam filtering only applies to UNLAWFUL 
spam!!! THAT would be a DISASTER!!!


Nevertheless, in such a circumstance, 47 USC 230(c)(2) should prevail 
and trump any such interpretation of this!


(If anyone thinks that 47 USC 230(c)(2) might not prevail over such an 
interpretation, please let me know... and let me know why?)


--
Rob McEwen



Re: Verizon Policy Statement on Net Neutrality

2015-02-28 Thread Rob McEwen

On 2/28/2015 1:48 PM, Lamar Owen wrote:
The bigger picture is (a) HOW they got this authority--self-defining 
it in, and (b) the potential abuse and 4th amendment violations, not 
just today's foot in the door details!
How they got the authority is through the Communications Act of 1934, 
as passed and amended by our elected representatives in Congress, with 
the approval of our elected President.


For roughly two decades of having a widely-publicly-used Internet, 
nobody realized that they already had this authority... until suddenly 
just now... we were just too stupid to see the obvious all those years, 
right? And how nice that the people who decided that this authority 
suddenly existed, are the ones who voted themselves that authority 
(referring to the vote on Thursday), and will be wielding that authority.


Nobody has refuted my statement that their stated intentions for use of 
this authority, and their long term application of that authority, could 
be frighteningly different. What they say they will do for now... and 
what they COULD do in the future if this power grab stands--without 
anything more than another one of their little votes amongst 
themselves--could be very very different.


FOR PERSPECTIVE... CONSIDER THIS HYPOTHETICAL: Suppose that the EPA was 
given a statutory power to monitor air quality (which is likely true, 
right)... decades later, a group of EPA officials have a little vote 
amongst themselves and they decide that they now define the air INSIDE 
your house is also covered by those same regulations and monitoring 
directives for outside air. Therefore, to carry out their task of 
monitoring the air inside your home, they conduct random warrent-less 
raids inside your homes, thus violating your 4th amendment rights. If 
the CO2 levels are too high (because someone likes to smoke), that 
person then gets fined, or their house gets bulldozed, etc. When asked 
about how they get that authority, someone like Lamar Owen points out 
that Congress gave them this authority in such-in-such clean air act 
past so many decades ago.


I know that hypothetical example is even more preposterous than this net 
neutrality ruling... but probably not that much more! (in BOTH cases, 
the power grab involves an intrusion upon privately-owned space.. using 
a statute that was originally intended for public space)


But the bigger picture isn't what the FCC STATES that they will do now.. 
it is what unelected FCC officials could do, with LITTLE accountability, 
in the future. Arguing for/against this power grab... only based on what 
they say they will do for now, is very naive. Future generations may ask 
us, why didn't you stop this? When we answer, well, it wasn't 
implemented as badly when it first started. They'll reply, but you 
should have checked to see how far this could go once that power grab 
was allowed (or ignored!)


--
Rob McEwen



Re: Verizon Policy Statement on Net Neutrality

2015-02-27 Thread Rob McEwen

Scott Fisher,

I think Verizon's statement was brilliant, and entirely appropriate. 
Some people are going to have a hard time discovering that being in 
favor of Obama's version of net neutrality... will soon be just about 
as cool as having supported SOPA.


btw - does anyone know if that thick book of regulations, you know... 
those hundreds of pages we weren't allowed to see before the vote... 
anyone know if that is available to the public now? If so, where?


Rob McEwen


On Fri, Feb 27, 2015 at 9:10 AM, Scott Fisher littlefish...@gmail.com 
wrote:

Funny, but in my honest opinion, unprofessional. Poor PR.

On Fri, Feb 27, 2015 at 9:05 AM, Larry Sheldon larryshel...@cox.net wrote:

http://publicpolicy.verizon.com/blog/entry/fccs-throwback-thursday-move-imposes-1930s-rules-on-the-internet




Re: Verizon Policy Statement on Net Neutrality

2015-02-27 Thread Rob McEwen

On 2/27/2015 11:04 AM, Miles Fidelman wrote:

[VERISON should say...] this won't effect us at all


Until those hundreds of pages are made public, how can anyone possibly 
know if that if that is even a truthful statement? Furthermore, what 
they SAY they intend to do with that authority... and what they COULD 
possibly do with such authority in the not-too-distant future... might 
be frighteningly different.


FOR EXAMPLE... can I borrow your credit card? I'm just going to lock it 
in my safe and not use it until the next time we meet up again? (what I 
say I will do with it.. and what I COULD do with your credit card... 
could be frighteningly different!)


sarcasmBut since we they did such a great job rolling out Obamacare 
with no unintended consequences, I'm sure their promises and good 
intentions for their use of the authority over the packets moving across 
PRIVATELY-OWNED internet infrastructure... that they just voted 
themselves... will be just peachy, right?/sarcasm


BTW - you should see my seashell collection... I keep it spread 
thoughout all the beaches of the entire world. Yesterday, I voted myself 
ownership over all of them.


--
Rob McEwen



Re: Verizon Policy Statement on Net Neutrality

2015-02-27 Thread Rob McEwen

On 2/27/2015 12:49 PM, Stephen Sprunk wrote:
This case seems to prove that the telco/cable duopoly can't _always_ 
buy the FCC rulings they desire; every now and then, the US govt 
surprises us and actually represents the people.


I know that ISPs are not perfect. Nothing is perfect. But what is 
incredible about this whole debate... is


(1) how few people are actually suffering right now. If net neutrality 
had never made the news... and you went out and talked to 10,000 people, 
and forced them to sit down and write out their top 100 problems in 
life... and compiled all 1 million answers... I doubt internet 
connectivity problems or slow internet speeds would come up more than a 
few times... if even once!


(2) meanwhile, we're such spoiled brats because... the bandwidth usage 
per second... AND the total number of users... AND the usage 
scenarios... AND the amount of hours of usage per day per person... has 
all SKYROCKETED in the past 15 years. It is AMAZING that the ISPs have 
kept pace. And this wasn't easy. My business is spam filtering and 
e-mail hosting... and in that related business... the usage levels per 
dollar of revenue (literally.. the # of MBs per dollar of revenue) is 
order of magnitudes higher than it was 15 years ago... and, like others, 
I've had to do amazing things to keep things flowing well with the same 
basic $/user. (getting faster hardware wasn't even nearly enough) That 
wasn't easy.


(3) when ISPs abuse their power, consumers can vote with their wallet to 
another access points. Yes, the choices are somewhat limited, but there 
are CHOICES (including 4G).. and, btw, there would have been MORE 
choices if the economy wasn't continuing to be anemic over the past 
several years. In contrast, when the government abuses their power, it 
is MUCH harder to move to another country. Plus, a bad ISP can only make 
someone's life so miserable. But an out-of-control government that has 
too much power can fine you, imprison you, IRS audit you, over-regulate 
you, legally (and illegally) spy on you, etc. (Just merely defining 
private networks as if they were public airways... is already a huge 
potential 4th amendment violation... why stop with cables moving data? 
Why not just make your hard drive... or your files in your filing cabnet 
part of their jurisdiction, too? Can they vote that in too? If you think 
not, tell me... what is stopping them that applies DIFFERENTLY from what 
they just did?)


We're solving an almost non-existing problem.. by over-empowering an 
already out of control US government, with powers that we can't even 
begin to understand the extend of how they could be abused... to fix 
an industry that has done amazingly good things for consumers in recent 
years.


--
Rob McEwen



Re: Verizon Policy Statement on Net Neutrality

2015-02-27 Thread Rob McEwen

On 2/27/2015 1:28 PM, Lamar Owen wrote:
You really should read 47CFR§8.  It won't take you more than an hour 
or so, as it's only about 8 pages. 


The bigger picture is (a) HOW they got this authority--self-defining it 
in, and (b) the potential abuse and 4th amendment violations, not just 
today's foot in the door details!


Today's altruistic intentions... is a DIFFERENT ISSUE (though still 
important.. and I find much of their wording very open-ended... lots of 
reasonables in there.. and lots of possible protections or legal 
things that are EXTREMELY abusive... yet still universally considered 
legal!)


To use an extreme example, if a democratically elected chief executive 
of a republic self-appointed himself a dictator-for-life, and stated 
that he would use those powers to imprison those who engage in human 
trafficking... would you really cheerleader him for fighting human 
trafficking and call his new authority a good thing?


In the same way, I don't like the BASIS for this authority... and what 
it potentially means in the long term... besides what they state that 
they intend to do with this new authority they've appointed themselves 
in the short term.


--
Rob McEwen
+1 478-475-9032



Re: More Godaddy DNS and whois server issues?

2014-09-04 Thread Rob McEwen
On 9/4/2014 12:55 PM, Steve Atkins wrote:
 On Sep 4, 2014, at 9:22 AM, Mark Keymer m...@viviotech.net wrote:

  Hi,
  
  So this started a little while ago but seems to be getting worse.
  
  What I am seeing is dns servers over at godaddy not replying however I 
  seem to be able to traceroute ok to them. Also I have started to see that 
  the whois.godaddy.com servers also seem to be having issues as well with 
  Whois information is currently unavailable.  Please try again later.
  
  Anyone else also seeing issues this morning? And able to confirm the issue 
  is with godaddy?
 I've seen reports of this for a week or so, with the symptoms looking like 
 overly aggressive abuse / query rate handling - packets from networks 
 containing busy resolvers being blocked.

 Grapevine tells me that they don't think they're doing it intentionally 
 (maybe they outsourced something and it broke?).


a few hours ago... One of my MX gateway filtering clients (for the small
spam filtering portion of my business) was having trouble this morning
with their own users accessing webmail (hosted on their exchange
server), and I discovered that the a record was resolving from some
locations, but not from others.  The domain was using GoDaddy's
domaincontrol.com series of name servers. I thought that they might
have had wrong host names in their registrar records and I told my
client to contact Godaddy, verify that these were correct, and ask
Godaddy about possible timeout and/or no answer issues. I tried
querying the host name from one location (direct to Godaddy's DNS) and
I'd get an answer, then from another location (direct to Godaddy's DNS)
and I would get a seemingly endless timeout.

-- 
Rob McEwen
+1 (478) 475-9032



Re: QOS improvement suggestion for NANOG list members

2014-08-20 Thread Rob McEwen
On 8/19/2014 1:44 PM, Doug Barton wrote:

  or, learn how to filter e-mail into folders like the big kids. :) 

At first glance, that sounds wise... but there is a problem with that
strategy... doing that can EASILY cause a person to miss (or read too
late!) critical zero hour issues that come up on occasion...

btw - Even thought the following analogy is far from perfect, this sort
of reminds me of a poor quality spam filtering system where the end
users spend so much time looking for FPs in the spam folder...that the
spam might as well have been delivered to the inbox!

In the meantime, I'm very good at quickly ignoring the messages that
aren't relevant to my business nor time-sensitive... based on the
subject line... especially since it is easy to ignore entire threads
based on their subject line... and NANOG's volume isn't huge... but then
the word URGENT in all caps gets a little annoying.

-- 
Rob McEwen
+1 (478) 475-9032



Re: Next steps in extortion case - ideas?

2014-06-28 Thread Rob McEwen
On 6/28/2014 10:32 AM, Markus wrote:
 There's an individual out there on the web that has been blackmailing
 hundreds of people and companies in a specific area of business for years.

You mentioned that this person resides in the US. Does he always target
people outside the US? (from what you know about him)

-- 
Rob McEwen
+1 (478) 475-9032



Re: Next steps in extortion case - ideas?

2014-06-28 Thread Rob McEwen
On 6/28/2014 1:57 PM, Markus wrote:
 Sorry, maybe that line wasn't clear. What I meant is: he targets
 anyone, everywhere, including individuals and businesses in the US.

I think it will be easier/faster if a US victim pursues this with law
enforcement, since, in general, legal systems often don't take
complaints from foreign nationals very seriously. Maybe you join forces
with a US-victim?

-- 
Rob McEwen
+1 (478) 475-9032



Re: why IPv6 isn't ready for prime time, SMTP edition

2014-03-25 Thread Rob McEwen
On 3/25/2014 9:24 PM, Brielle Bruns wrote:
 Last time I checked, there is no RFC that states that using SMTP
 transport is mandatory with the originator having rDNS (ipv4/ipv6). 
 It may be SUGGESTED or RECOMMENDED, but not MANDATORY or REQUIRED.  It
 is an arbitrary decision made by each mail provider. 

For IPv6, FCrDNS... using NOT dynamic formatted  host names... and
with the host name ending in the sender's main domain... *should* be
mandatory. And +1 THOUSAND for everything that John Levine said in his
last few messages!

Additionally... [addressing this topic in general from here on, not
talking specifically to Brielle...]

I have a unique perspective on this... as I manage an anti-spam
blacklist which blacklists many of the snowshoe spammers and can-spam
complient spammers whose practices are 100% legal, and who are not
sending to a single caught-you-red-handed honeypot trap. Many of them
abuse blackhat and grayhat ESPs. Unfortunately, in some instanaces, that
abuse is symbiotic (wink wink), where the blackhat ESP will know
that a sender's practices are extremly suspect (or worse), but will look
the other way in exchange for much needed revenue. In fact, with the
worldwide economy still in somewhat of a drag for about the 6th year in
the row, I'm seeing evidences that *some* ESPs are lowering their
standards a little to even more accommodate this crap. Some once-proud
ESP who claimed they never do this, are in fact doing it.

Still, a HUGE deterrent is getting their IP reputation soiledup on
senderbase.org and getting on many blacklists. That becomes a safety
net that keeps some of these ESPs from going off the deep end. And,
again, I'm on the front lines dealing with this everyday. Therefore,
SCARCITY of IPv4 IPs... is a FEATURE.. NOT a bug when it comes to
keeping ESPs under control. And it also gives hosters/datacenters
motivation to likewise police potential customers because the hoster
or datacenter is left with the damage long after they've kicked a
spammer off of their network.

ALL of that would unravel... ALL OF IT! ... if we all started
using IPv6 for sending authenticated mail. (workstations sending mail to
their own mail server could send via IPv6 all they wanted to.. that
wouldn't be a problem at all) But if all or most MTAs switched to IPv6,
it would be a nightmare and what is sad is that MANY people reading this
message are STILL going to GREATLY underestimate my warning after
reading  this. There are, unfortunately, many poeple who won't listen to
reason and logic and require a real world nightmare before they
believe... much like a 2-year-old who doesn't believe his parents'
warning to not touch a hot stove... until AFTER he touches it. But we
don't all have that luxury, do we?

IPv6 is a spammer's dream!

But REQUIRING FCrDNS for IPv6 ... using a NOT dynamic formatted  host
name... and with the host name ending in the sender's main domain...
would go a long way towards mitigating these problems as then there
would be more truth in sending as the rDNS would then properly convey
both reputation and identity to the sender. I wish that could becomes a
universal IPv6 SMTP standard... yesterday!
 
PS - but even then, I'm told that there may be issues with overrunning
DNS caches should spammers send each spam from a unique IP and
slowing down of processing of mail when rDNS lookups happen on each
individual IP. To go back over the root problem that I never
mentioned, a spammer would send out a million spams, each from a unique
IP address, without even having that large of an IPv6 allocation. IPv6
MTAs is NOT something to be rushed into. Anyone promoting rushing into
that... is not very well informed. (to put it nicely).. or they are a
spammer who can't wait for all the fun to commence.

-- 
Rob McEwen
 




Re: why IPv6 isn't ready for prime time, SMTP edition

2014-03-25 Thread Rob McEwen
On 3/25/2014 10:25 PM, Brielle Bruns wrote:

 Like I said in a previous response, if you are going to make rdns a
 requirement, why not make SPF and DKIM mandatory as well? 

many ISPs ALREADY require rDNS. So making that standard official for
IPv6 is isn't asking for much! It is a NATURAL progression. As I
mentioned in a previous message, i think IPv6 should go farther and
require FCrDNS, with the host name ending with the sender's actual real
domain so that proper identity is conveyed. (then when a spammer uses a
throwaway domain or known spammy domain... as the domain at the end of
the rDNS, they have only themselves to blame when the message is rejected!)

SPF is somewhat dead... because it breaks e-mail forwarding
situations. Anyone who blocks on a bad SFP is going to have significant
FPs. And by the time you've dialed down the importance of SPF to prevent
FPs (either by the receiver not making too big of a deal about ir, or
the sender using a NOT strict SFP), it then becomes impotent. About the
only good usage of SPF is to change a domain's record to strict in
situations where some e-mail on that domain is being picked on by a
joe job where their address is forged into MANY spams over a period of
time. (not just the occasional hit that everyone gets). otherwise, SPF
is worthless.

Maybe we should require DKIM for IPv6, too? But what I suggested about
FCrDNS seems like a 1st step to me.

-- 
Rob McEwen
+1 (478) 475-9032




Re: why IPv6 isn't ready for prime time, SMTP edition

2014-03-25 Thread Rob McEwen
On 3/25/2014 10:51 PM, Jimmy Hess wrote:
 I would suggest the formation of an IPv6 SMTP Server operator's club,

That comes across too much like the failed FUSSP ideas. What happens
when spammers try to get onboard? Who is the arbitrator? How fast could
they react? And then you have legit senders who get infections or
compromised accounts? Or what about a hoster who gets one bad-apple
customer. This isn't so simple! Not so black  white. Yet if we instead
focus on truthful labeling of identity, then established e-mail
reputation systems and established blacklists which have spent YEARS
fine tuning these things... can be best prepared to sort these things
about based on the reputation of the domain at the end of a sender's
FCrDNS. Then the free market will properly choose the best blacklists
that block the most spam with the least FPs... and the politics of
some club won't be a negative factor.

NOTE: antispam blacklists don't effectively work like men with their
feet on a desk smoking cigars asking, 'should we block this sender'...
'should we whitelist this sender'... the spammers are ORDER OF
MAGNITUDES faster than that! And then you'd have too many legit orgs
that happen to be small.. that would be effectively blacklisted by not
being able to get into the club. i would be a nightmare!

-- 
Rob McEwen
+1 (478) 475-9032




Re: AOL Email Blocking

2014-01-24 Thread Rob McEwen
On 1/24/2014 2:53 PM, Robert Webb wrote:
 A while back I enlisted help for setting up a small email list server.
 It is now complete but only AOL is blocking my outbound email. 


Send me your IP (off list if desired) and I'll evaluate it and possibly
provide some feedback that may be helpful!

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: DNS Whois Requirements

2013-07-27 Thread Rob McEwen
On 7/27/2013 6:11 PM, John Curran wrote:
 Excellent pointer Frank...

I confess, I haven't followed this conversation very closely (which
meandered around much, given the random few messages I saw.. who has the
time to read them all?). So forgive me if I'm repeating some of the info
already covered. But I think you all would be very interested in some of
my experiences this past year!

To ARIN's credit, they revamped their requirements for data access just
this past year. They cut off all access, then made members resend in new
Bulk Whois agreements to keep their access turned on.

So ARIN is obviously doing some GOOD things to try to prevent their data
from being used by marketers!

I think our usage of that data might be one of the most credible
situations in existence. I manage an anti-spam blacklist which is used
by hundreds of organizations across the world, including multiple
Fortune 500 technology companies and  even a few notable ISPs. One of
our three blacklists preemptively blocks /24 blocks if/when we see a
pattern where a snowshoe spammer is burning through the IPs on that
block one at a time... we then blacklist that /24 block (well... sort
of...). But our ivmSIP/24 list is no ordinary /24 list. We OFTEN set up
boundaries if/when we detect either (a) any other IP(s) on that block
that we deem as legit, and/or (b) a situation where portions of the same
/24 block are delegated to DIFFERENT organizations. In those cases, we
only blacklist the subsection of the /24 block belonging to the
spammers, making ivmSIP/24 a much safer list for outright blocking or
high scoring... in comparison to what can be accomplished with other /24
anti-spam blacklists.

Having ARIN data is an invaluable tool that helps ivmSIP/24 do a better
job of only blacklisting the spammers, while leaving the innocent
bystandards untouched, in situations where the /24 block is shared by
spammers and non-spammers.

I know it is frustrating that marketers somehow continue to game the
system... but I hope that this never causes the legit uses of that data,
such as what we're doing... to be discontinued.

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: DNS Whois Requirements

2013-07-27 Thread Rob McEwen
On 7/27/2013 7:20 PM, Rob McEwen wrote:
 They cut off all access

Correction... that didn't come across the right way.

They didn't just cut everyone's access off. What I meant was that anyone
who didn't re-signup by filling out a rather comprehensive form, with
very pointed questions about their usage, were cut off. But PLENTY of
warning was given. I actually got lazy and didn't get the form in on
time... so my access was cut off for a period of time. But that was my
own fault. (and showed that they were serious about this!)

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: PRISM: NSA/FBI Internet data mining project

2013-06-09 Thread Rob McEwen
Dan,

I doubt anyone can answer your question easily because you seem to have
contradictions in your scenario. At one point you say:

 private company to collect information about terrorist entities, who
 in turn privately contracts with the top X telecom providers and Y
 social media companies

but then you continue:
 to obtain all available information that it can, via TAP ports or
 direct database access.

and then:
 That private organization, through analysis, knows a lot about you

I'm confused, in your scenario, is the data collection limited to
terrorist entities, or does your statement, all available information
that it can mean that it gets everyone's info, and then does their
filtering later?

Additionally, one would hope that by terrorist entities, you would be
referring to those who plan on hurting or killing innocent people,
whether that be an Islamofactist terrorist planning to blow up a
government building, or a right wing terrorist planning to do the same
(for different reasons), or a environmentalists planning to sink a legal
whaling boat, or a anti-abortionist planning to blow up an abortion
clinic... take your pick. The point being that mass-killing of innocent
people is the common thread... NOT the politics. And I hope that you
haven't downward defined this to someone that could be easily used to
pick off political opponents, right?

 Have your 4th Amendment rights been abridged in this scenario

Sorry if this comes across as rude or snobby, but I think you just need
to read the 4th Amendment about 20 times to yourself and let it all soak in.

TO ANSWER YOUR QUESTION:
If the Federal Government is paying a private entity to do the snooping,
then they are a defacto agent of the state. That doesn't make the 4th
amendment apply any less applicable. Even then, to abide by the 4th
amendment, there should be SPECIFIC persons/orgs AND specific info/items
that are being searched where that search is SPECIFICALLY approved by a
judge or court IN ADVANCE (no super wide blanket approvals, no broad
fishing expeditions)... only THEN does the searching for the information
meet 4th amendment requirements. The fact that the search was of your
e-mail or phone records doesn't make the 4th amendment apply any less
than if they were looking inside the drawer in the nightstand next to
your bed!

There are notable exceptions... for example, an employer is really the
owner of the mailbox, not their employee. Therefore, there is an
argument that government employees don't have privacy rights from the
government for their official work e-mail accounts. There are probably
several other exceptions like that. But such exceptions are a tiny
percentage of the whole.

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: PRISM: NSA/FBI Internet data mining project

2013-06-09 Thread Rob McEwen
On 6/9/2013 2:26 PM, Rob McEwen wrote:
 There are notable exceptions... for example, an employer is really the
 owner of the mailbox, not their employee. Therefore, there is an
 argument that government employees don't have privacy rights from the
 government for their official work e-mail accounts. There are probably
 several other exceptions like that. But such exceptions are a tiny
 percentage of the whole.

I should mention... there also exceptions to the exceptions. While it
is totally legal and ethical for a boss to snoop on his employee's
e-mails (in a business), I would think it would be very unethical and
illegal, for example, for the executive branch to snoop on a
congressional aide's e-mail, to gain intel on political opponents
even if that congressional aide were a government employee and the
e-mail was a .gov address. But I'm not sure where those lines are
drawn with regards to the US Federal Government.

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: PRISM: NSA/FBI Internet data mining project

2013-06-07 Thread Rob McEwen
The oh well, it happens, who cares, guess you need PGP comments on
this thread are idiotic. Some of you would benefit from reading the text
of the 4th Amendment:

The right of the people to be secure in their persons, houses, papers,
and effects, against unreasonable searches and seizures, shall not be
violated, and no Warrants shall issue, but upon probable cause,
supported by Oath or affirmation, and particularly describing the place
to be searched, and the persons or things to be seized

The Washington Post mentioned some safeguards... but those were
pathetic. Why? They seemed to be similar to the following analogy:
we'll keep that video camera in your home, recording your every move,
and we promise we'll close our eyes when reviewing the tape whenever it
shows you naked. THAT is essentially what they're saying. The access
described by both the Washington Post and The Guardian is essentially
unfettered/unmetered/unmonitored.

Just as a doctors take the hippocratic oath to maintain decent
standards which are to the benefit of modern civilization... shouldn't
IT/Networking/Internet professionals (NANOG readers!!!) have standards
that, hopefully, distinguishes us from... say... the State-run ISP of
North Korea.

And if these allegations are true... then...

I have a difficult time believing that there was no quid pro quo
involved. Especially since such companies risk a backlash and huge loss
of customers if/when this gets out. So I don't think they'd do this
without some kind of return in favor. Did they get special tax
treatment? Tarp money of any kind (maybe to a parent company)? Easing of
regulation enforcement?

If there was quid pro quo, then what a bunch of F'ing whores, selling
their own customers down the river... to make a buck... and potentially
contributing to a future tyranny. Sure, the US government probably only
use this to catch the bad guys today... but what would a *corrupt*
adminstration do with such data in the future... stick the IRS on their
political enemies? (oh, wait, that just happened... h)

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-932




Re: PRISM: NSA/FBI Internet data mining project

2013-06-07 Thread Rob McEwen
On 6/7/2013 9:50 AM, Dan White wrote:
 OpenPGP and other end-to-end protocols protect against all nefarious
 actors, including state entities. I'll admit my first reaction yesterday
 after hearing this news was - so what? Network security by its nature
 presumes that an insecure channel is going to be attacked and
 compromised.
 The 4th Amendment is a layer-8 solution to a problem that is better
 solved
 lower in the stack.

That is JUST like saying...

|| now that the police can freely bust your door down and raid your
house in a fishing expedition, without a search warrant, without court
order, and  without probable cause... the solution is for you to get a
stronger metal door and hide all your stuff better.||

You're basically saying that it is OK for governments to defy their
constitutions and trample over EVERYONE's rights, and that is OK since a
TINY PERCENTAGE of experts will have exotic means to evade such
trampling. But to hell with everyone else. They'll just have to become
good little subjects to the State.  If grandma can't do PGP, then she
deserves it, right?

Yet... many people DIED to initiate/preserve/codify such human rights...
but I guess others just give them away freely. What a shame. Ironically,
many who think this is no big deal have themselves benefited immensely
from centuries of freedom and prosperity that resulted from rule of
law and the U.S. Constitution/Bill of Rights.

 I assume these taps were put in place under the auspices of (by order of)
 homeland security or some such. If there were some financial incentive
 involved, I'd be surprise.

Some of the authors of the laws that were used to justify these are
already starting to come forward saying, it wasn't suppose to go that
far. And to the extent that some laws were followed correctly, any such
laws that do not conform to the 4th Amendment are suppose to be invalid,
and eventually, officially invalidated. I think what has happened here
is that stuff like this was nudging the 4th amendment aside... and
little-by-little, kept getting worse... just like the Frog in the slowly
heating water who doesn't know that he is now boiling to death. Does ANY
REASONABLE person on this list REALLY think that the government snooping
through your e-mail without warrant or court order is DIFFERENT in
nature than the government sneaking into your home and snooping through
your desk? Yes, it is easier. Yes, we ought to know that mail is less
secure (from the BAD guys!!!). Otherwise, there really isn't any
difference. This is a flagrant violation of the 4th amendment.

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: PRISM: NSA/FBI Internet data mining project

2013-06-07 Thread Rob McEwen
On 6/7/2013 11:42 AM, Dan White wrote:
 I believe it's your responsibility to protect your own data, not the
 government's, and certainly not Facebook's. 

Dan, I agree with everything you said in your last post. Except this
part misses the point. Yes, it may not be their job to protect the data,
but they do have certain responsibilities to not enable the
snooping/sharing of my data beyond what is either obviously expected
and/or what is clearly found in licensing/terms.

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: Ok: this is a targetted attack

2013-02-11 Thread Rob McEwen
On 2/11/2013 4:39 PM, Sean Lazar wrote:
 Jay, you need to have SPF records for your domain. This will prevent the
 spoofing you are seeing.

yep, while the purpose and effectiveness of SPF records are generally
VERY overrated... yet for a situation like this, an SPF record is VERY
valuable and it would be advised that you set this to a rather strict
record for a period of time. (just try to account for all the various
3rd party sending scenarios your users do, like sending from a
blackberry server, or e-mail forwarding, for any other situation where a
legit 3rd party IP would be legitimately sending mail with a from
address using your domain, etc.)

Then again, if this is spear phishing or very personalized harassment,
then the value of an SPF record would be somewhat uncharted territory
(at least for me)... it would be interesting to see if that improves
things. But, at the least, it would likely help some.

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: Looking for success stories in Qwest/Centurylink land

2013-01-29 Thread Rob McEwen
 do I defend
all practices of ISPs' bandwidth allocations. But, again, their
customers do have the option to vote with their wallets. Such options
are lost with a Federal Gov't monopoly.)

 Finally, while I've witnessed incompetence amongst certain unnamed baby
 bells, there ARE... MANY... bright spots in Internet connectivity.
 Frankly, we're spoiled by our successes. And the worst of the baby
 bells, like all baby bells, do NOT have a monopoly. [...]

 You seem to be living in an alternate universe.  Those of us who
 actually owned an ISP know the ILEC oligopolies well.

Nope. I've seen it where I live... where I routinely notice some of the
most incompetent behavior/service from our baby bell... yet I've often
seen very excellent and competent service from Cox Communications.

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: Muni network ownership and the Fourth

2013-01-29 Thread Rob McEwen
On 1/29/2013 10:59 AM, Jay Ashworth wrote:
 From: Rob McEwen r...@invaluement.com
 (C) The fact that the Internet is a series of PRIVATE networks... NOT
 owned/operated by the Feds... is a large reason why the 4th amendment
 provides such protections... it becomes somewhat of a firewall of
 protection against Federal gov't trampling of civil liberties... but
 if they own the network, then that opens up many doors for them.
 Regular readers know that I'm really big on municipally owned fiber networks
 (at layer 1 or 2)... but I'm also a big constitutionalist (on the first, 
 second, fourth, and fifth, particularly), and this is the first really good
 counter-argument I've seen, and it honestly hadn't occurred to me.

 Rob, anyone, does anyone know if any 4th amendment case law exists on muni-
 owned networks?

Good question. Here is another thing to consider regarding SOME muni
network... (at least where private citizens/businesses subscribe to that
network)

When any government entity desires log files from an ISP, and if that
ISP is very protective of their customer's privacy and civil liberties,
then the ISP typically ONLY complies with the request if there is a
proper court order, granted by a judge, after probable cause of some
kind of crime has been established, where they are not on a fishing
expedition. But, in contrast, if the city government owns the network,
it seems like a police detective contacting his fellow city employee in
the IT department could easily circumvent the civil liberties
protections. Moreover, there is an argument that the ISP being stingy
with such data causes them to be heros to the public, and they gain
DESIRED press and attention when they refuse to comply with such
requests without a court order. In contrast, the city's IT staff and the
police detective BOTH share the SAME boss's boss's boss. The IT guy
won't get a pat on the back for making life difficult for the police
department. He'll just silently lose his job eventually, or get passed
up for a promotion. The motivation will be on him to PLEASE his fellow
city employees, possibly at the expense of our civil liberties.

PS - of course, no problems here if the quest to gain information
involves a muni network that is only used by city employees.

PPS - then again, maybe my log file example doesn't apply to the
particular implementation that Jay described? Regardless, it DOES apply
to various government implementations of broadband service.

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: Looking for success stories in Qwest/Centurylink land

2013-01-29 Thread Rob McEwen
On 1/29/2013 11:38 AM, valdis.kletni...@vt.edu wrote:
 So where are all the arrests and convictions for the mortgage games and
 other Wall Street malfeasance that led to the financial crisis of 2008?
 Seems that was a tad more egregious than anything Enron did, so there should
 have been more arrests and convictions?

Not everyone gets caught. But across the board, corrupt private
businesses get caught  pay a price and/or disappear ...far more often
than corrupt government entities.

But even with the financial crisis of 2008, there was SOME reckoning.
Bernie Madoff is in jail. Lots of CEOs lost their jobs. Boards of
Fortune 500 companies are NOW... FINALLY... doing the due diligence that
used to not get done. Those things have to be done since everyone if
fighting for survival right now. Nobody can afford to do less... except
the Feds... who continue to operate/spend like its 1999.

More locally, on a smaller scale, I know of specific appraisers  real
estate investors who are in jail right now because they finally got
caught in a scam where (1) the investor would buy a property at a low
price, (2) his appraiser, who was in on the scam, would issue an
appraisal that was ridiculously high, (3) the real estate investor would
then get a LARGE loan on that property, (4) the investor would then
spend that money on expenses... showing no money on paper, it was
laundered (5) investor would declare bankruptcy and give those
properties back to the bank. (6) bank discovers that their collateral
on a 200K loan is really worth 40K. (repeat times 10 since the investor
did this several times over just before declaring bankruptcy.

Again, those guys are in jail. And the rules on preventing that have
been tightened. I agree, not enough people like that went to jail... but
LESS of this gets caught and punished with regard to the Federal
government's graft  corruption.

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: Looking for success stories in Qwest/Centurylink land

2013-01-29 Thread Rob McEwen
On 1/29/2013 12:21 PM, William Allen Simpson wrote:
 ill-informed racist

Really? And you call me a troll, too?

 anti-Obama diatribe that has no place on this list.

I never said anything about Obama, but, at face value, the 'Disclose'
Act was totalitarian in nature. Something I'd expect to see only
seriously proposed in the old Soviet Union. Those who enthusiastically
supported it are/were statist thugs. Proposing a bill which limits free
political speech by putting ridiculous and hugely-expensive burdens on
mom  pop bloggers typing from their living room computers is
something straight out of East Germany circa 1960 (except with today's
technology). If that means I'm talking about Obama, so be at... if the
shoe fits... but to say this is racist is laughable. Also, you can
try to dismiss the Disclose act critics by throwing labels at them...
but interesting that you didn't go on record challenging the facts in
that wsj op-ed, or go on record supporting the Disclose act. (attach
the messenger as a means of avoiding the actual subject material...
much like your 100% baseless racist accusation towards me.)

Also, you're right, at a couple of points, I did get FCC and FEC labels
mixed up. But my larger points stand. The campaign finance law passed
several years ago and the proposed 'Disclose' Act demonstrated less than
pure intentions regarding the Federal Government's desire to control
information. And the Federal Government's net neutrality proposals ARE
100% all about 4th amendment violations, as a means towards controlling
information. Even if I'm wrong and those proposing net neutrality have
100% best intentions (they don't), then a trampling of the 4th amendment
would STILL become a law of unintended consequences, at least in the
implementation proposes I've read.

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: Looking for success stories in Qwest/Centurylink land

2013-01-28 Thread Rob McEwen
On 1/28/2013 4:57 PM, david peahi wrote:
 and underscores the need for a national broadband buildout in the USA, funded 
 and run by the Federal Government

Maybe Australia has a better track record... but over the past few
decades, the US Federal government:

(A) ...cannot do a darn thing without MASSIVE graft  corruption... plus
massive overruns in costs... including a HEAVY dose of crony
capitalism where, often, the companies who get the contracts are the
ones who pad the wallets of the politicians in charge. About the ONLY
thing the Feds do efficiently is write  mail checks.

(B) In the US, we have this thing called the 4th amendment which
ensures a certain level of freedom and civil liberties and privacy.
Unfortunately, 4th amendment rights essentially disappear if the US
Federal government owns and operates broadband access. Additionally,
such ownership will then allow them to control/regulate the
information... to ensure that information damaging to the incumbent
politicians is minimized, especially close to election times. (as they
did with campaign finance reform!) And their ability to eavesdrop
increases exponentially, as legal and technical hurtles significantly
lessen!

(C) This allows them to do what the FCC ACTIVELY trying to do recently,
but hasn't yet found a way.

Ya think this is conspiracy hysteria? Again, look at aspects of
campaign reform law, which limited certain ads close to election time in
a manner which disproportionately benefits incumbents! Furthermore, when
the Federal Government proposes atrocious things like the proposed
Disclose Act (from just a few years ago), then you have to wonder
about their true motivations. Here is an article written by 8 former FCC
chairmen about the Disclose Act:

http://online.wsj.com/article/SB10001424052748703460404575244772070710374.html
...can any sane person read that article... and then trust the US
Federal Gov't motives with owning/operating vast amounts of Broadband?

Finally, while I've witnessed incompetence amongst certain unnamed baby
bells, there ARE... MANY... bright spots in Internet connectivity.
Frankly, we're spoiled by our successes. And the worst of the baby
bells, like all baby bells, do NOT have a monopoly. Often, they must
compete with (at minimum) the local cable access provider. For example,
in many areas that the baby bells failed to provide competent service,
the local cable access provider filled the void, and did much better.
I'm trying to not name  shame... but I've seen THAT... FIRST HAND.
The market will eventually sort this out... and in many cases already
has! Meanwhile, Amtrack and the Post Office show no signs of ever making
it without their MASSIVE taxpayer subsidies. And the Department of
Education continues to not know where billions of dollars goes each
year... Yet, in contrast, Enron execs in are jail and Enron is no longer
in existence. As I said, the free market tends to sort these things out
over time. (especially when crony capitalism is NOT a part of the mix.)

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Contact at Tucows domains?

2013-01-21 Thread Rob McEwen
RE: Contact at Tucows domains?

Anyone know a good high-level contact at Tucows Domains? I have a
customer who is having a problem with a Tucows Reseller. (massive
problems!)... and Tucow's own domain support line isn't being very
helpful. (the guy just wants to pay with a credit card for the renew his
domain... he is NOT asking for much!)

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: Contact at Tucows domains?

2013-01-21 Thread Rob McEwen
On 1/21/2013 12:24 PM, Rob McEwen wrote:
 RE: Contact at Tucows domains?

I just got a very good contact sent off-list. Assume this is resolved
unless/until I can't get a reply/resolution from the e-mail I just sent.
In that case, I'll post an update.

Thanks!

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: Contact at Tucows domains?

2013-01-21 Thread Rob McEwen
On 1/21/2013 12:58 PM, Rob McEwen wrote:
 I just got a very good contact sent off-list. Assume this is resolved
 unless/until I can't get a reply/resolution from the e-mail I just sent.
 In that case, I'll post an update.

I keep getting off-list lectures about how accepting payment via credit
card (verses another payment method) is NOT a requirement of a registrar
(or registrar reseller). That is/was NOT the issue and is besides the
point. The problems are MUCH more fundamental than that. Sorry if my
original wording of my original e-mail contributed to that
misunderstanding. But, as I mentioned, I think I've just alerted the
right people at Tucows who SHOULD be able to resolve this.

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: [SHAME] Spam Rats

2013-01-09 Thread Rob McEwen
On 1/9/2013 9:58 PM, Julian DeMarchi wrote:
 There is an anti-spam company called Spam Rats[1]
 They have listed a /24 of my companies for lack of PTRs in the range

I find SpamRats' lists helpful in spam filtering as a low scoring list
because it puts some new emitters which haven't had time to build up bad
reputation over the top. Having said that, they actually have 3 lists,
and only one of those 3 lists involves listing IPs ONLY based on no
PTR. They also have an all list, but they document on their web site
how to query the all list, but then ignore those return codes
indicating the no PTR list.

That is how I use them because I didn't need their no PTR list since
it would be redundant for me since I was already checking for no PTR
myself... and I didn't want to score twice on that one attribute.

But if your information is accurate and I understand you correctly, then
I agree that they shouldn't list the whole /24 in their PTR list if SOME
of those IPs *do* have PTRs.

(Actually, I wasn't aware that any of their lists involved /24 blocks.
They should probably be more clear about that on their web site.)

On their web site, on the http://www.spamrats.com/about.php page, under
the heading, NEW - SpamRats All, they describe this method of querying
their all list, but ignoring their PTR list's particular return code.
I think they made THAT suggestion FOR VERY GOOD REASON. Therefore, you
could use this to your advantage by going back to whichever recipient
blocked your mail and say... hey, you're NOT using spamRATS in a manner
that they suggested, then point them to the section I referenced and
explain that many don't use their no PTR list since most spam filters
already do that. Maybe that could be a short term solution for you?
(probably better than nothing)

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: guys != gender neutral

2012-09-27 Thread Rob McEwen
On 9/27/2012 2:47 PM, Brian Christopher Raaen wrote:
 Here is the south we simply use y'all.

That's what I was thinking.

Also, btw, I disagree with that earlier comment about gender usage in
the Bible, as least in regards to the New Testament. The Greek language
of that time period is the most specific/nuanced/sophisticated language
in the history of the world far more specific/nuanced/sophisticated
than modern day European languages.

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: ZOMG: IPv6 a plot to stymie FBI !!!11!ONE!

2012-06-15 Thread Rob McEwen
On 6/15/2012 11:59 AM, Jay Ashworth wrote:
 http://news.cnet.com/8301-1009_3-57453738-83/fbi-dea-warn-ipv6-could-shield-criminals-from-police/

I don't know how much of this has been covered on NANOG, and I
personally have a healthy innate distrust of government power grabs and
intrusive government information grabs.

However, having said that, as someone on the anti-spam front lines, I
think that IPv6 may well be a tremendous gift to spammers if accepting
mail from IPv6 becomes a free-for-all, as I understand it to be.

First, it is NOT a problem to accept your own authenticated user's mail
via their IPv6 connection to your server. Therefore, for the point I'm
raising, consider that the millions of a large ISP's *own* customers can
transition to sending their mail through that ISP's mail server vi IPv6
without any problems. (if problems arise, it would probably be more a
problem with weak authentication?)

But for all other mail, such as mail sent from valid mail servers to
other valid mail servers... then the following two suggestions would go
a long way:

(1) simple don't accept IPv6 mail for the foreseeable future. (In this
case, scarcity of IPv4 addresses is a FEATURE, not a bug.)

(2) And/or limit (what would be considered) valid IPv6 mail servers to
those assigned a particular IP on particularly large-sized block... then
sending IP not within those specs.

(3) MANY hosters who aren't deliberate spammers, but really don't care
to police abusive customers much except when dragged kicking and
screaming... and there are MANY such hosters... have a motivation to
keep their IPv4 mail server addresses clean. in an IPv6 world, I think
they'll not care because they'll get these huge allocations where
they'll figure that they have YEARS of IP blocks to burn through before
recycling them. As it stands now, if they get too sloppy, then their
next customer isn't happy when senderbase.org has their new IPs as
already in the poor category. Again, THAT is a feature, not a bug.

Moreover, as I said, scarcity of IPs, with regards to mail servers, is a
feature... not a bug. If these suggestions are not followed/heeded, MANY
reading this right now will look back a decade from now and say,
wouldn't it have been great if we could have somehow created a
situation where valid mail server IPs for IPv6 could have been more
scarce and not a free-for-all?

In the free for all world, a spammer could send thousands or even
millions of spams, each from a different IPv6 address... with each IP
indexed back to the sender (to aid in listwashing of recipient
addresses that triggered blacklistings), and not use a single IP twice.
Furthermore, even if the IPs are blacklisted at the /64 level, as I
understand it,  some of the allocations happening are so generous, this
statement could still be somewhat true where the spammer send each spam
from a separate /64 block? Certainly, 65,536 /64 blocks in a /24
allocation is a hell of a lot more /64 blocks to burn through than the
256 IPs in an IPv4 /24 allocation!!!

Again, keep in mind that the massive expansion of sending IP from a
customer that is routed via to their own ISP's mail server, hopefully
using authentication, is unaffected by this suggestion. So your future
refrigerator and oven can STILL send you an e-mail from its IPv6 ip address.

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: ZOMG: IPv6 a plot to stymie FBI !!!11!ONE!

2012-06-15 Thread Rob McEwen
On 6/15/2012 4:30 PM, Rob McEwen wrote:
 And/or limit (what would be considered) valid IPv6 mail servers to
 those assigned a particular IP on particularly large-sized block... then
 sending IP not within those specs.

oops. typo. That last part should have been:

then block sending IPs not within those specs

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: ZOMG: IPv6 a plot to stymie FBI !!!11!ONE!

2012-06-15 Thread Rob McEwen
On 6/15/2012 4:30 PM, Rob McEwen wrote:
 Certainly, 65,536 /64 blocks in a /24
 allocation

another typo. I meant:

Certainly, 65,536 /64 blocks in a /48
allocation

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032




Re: Configuration Systems

2012-06-08 Thread Rob McEwen
On 6/8/2012 10:44 AM, Keith Medcalf wrote:
 That is *the* definition of Cloud.  The term Cloud is a proxy for the 
 expression under the exclusive control of a third-party over which we have 
 no influence nor control in order to gain plausibile denibility and CYA 
 ptotection if something bad happens.

Here is my take on this...

I think that hosting/datacenter admins sat around one day and lamented
about the fact that so many of their clients were buying dedicated
hosting servers and utilizing a very tiny percent of the CPU  storage.
Often, the customer had been burned by shared hosting years earlier
because of another shared hosting customer on the same server crashing
the entire server, thus making everyone on that box suffer. So dedicated
hosting became critical for many businesses who outsourced their
hosting. But, again, many of those boxes sat year round utilizing
something like 5% of CPU, and 5% of the available disk space (after OS
installation).

Then virtual servers matured, where you could create entire logically
partitioned boxes running on the same server. These were sold as
virtual dedicated servers, which was a step up from shared hosting,
and a step down from getting a dedicated server. But many didn't like
this because they it was inherent that they were stuck on the same box
with other customers. Those with deep pockets didn't take the bait. It
had a niche, but didn't make for a good sales pitch.

Next, they found a way to leverage virtual servers by making it so that
the virtual server didn't have to reside on one box... but could
dynamically use various resources from a server farm, as needed. (for a
simplified explanation). Thus, the cloud was then born.

Now... all those unused CPU cycles and disk space are not wasted any
more... they are dynamically put to use. RESULTthe aggregate sum of
all that re-allocatable drive space and CPU cycles is ENORMOUS. It makes
for a massively more efficient leveraging of hardware and software. The
ratio of hardware costs to costumer revenue is massively better for a
hoster/datacenter compared to selling traditional dedicated servers.

That is not necessarily bad because some of the cost savings is passed
back to the consumer in the form of lower prices. So this is not evil.
Plus, there is an ability to scale up that exists with the cloud
(where affordable!).

But the funny part about this is that (a) the extent that cost savings
are passed back to the client AND (b) the improved scale up
technology.. those are the ONLY 2 benefits of cloud computing.
Everything else is to benefit the hoster/datacenter. That so many
CEOs/CTOs/directors/etc have bought into the hype, and see some kind of
magical benefits seemingly beyond this... is just amazing.

Personally, I prefer paying a little extra for my own dedicated and/or
co-located servers... where I'm in total control of ALL aspects of
hardware/software.

-- 
Rob McEwen
http://dnsbl.invaluement.com/
r...@invaluement.com
+1 (478) 475-9032