*Dear Colleagues,I am Satoru Tsurumaki from Japan Open Policy Forum.I would like to share key feedback in our community for prop-125,based on a meeting we organised on 22nd Aug to discuss these proposals.Many supporting opinions were expressed on this proposal. - Agree, you should. - When mail address is posted in whois DB, a lot of SPAM is sent. We should take some measures.* Regards, Satoru Tusrumaki
2018-08-17 14:52 GMT+11:00 Sumon Ahmed Sabir <su...@fiberathome.net>: > Dear SIG members, > > The proposal "prop-125-v001: Validation of "abuse-mailbox" and other IRT > emails" has been sent to the Policy SIG for review. > > It will be presented at the Open Policy Meeting at APNIC 46 in > Noumea, New Caledonia on Thursday, 13 September 2018. > > We invite you to review and comment on the proposal on the mailing list > before the meeting. > > The comment period on the mailing list before an APNIC meeting is an > important part of the policy development process. We encourage you to > express your views on the proposal: > > - Do you support or oppose this proposal? > - Does this proposal solve a problem you are experiencing? If so, > tell the community about your situation. > - Do you see any disadvantages in this proposal? > - Is there anything in the proposal that is not clear? > - What changes could be made to this proposal to make it more > effective? > > Information about this proposal is available at: > > http://www.apnic.net/policy/proposals/prop-125 > > Regards > > Sumon, Bertrand, Ching-Heng > APNIC Policy SIG Chairs > > https://www.apnic.net/wp-content/uploads/2018/08/prop-125-v001.txt > > ---------------------------------------------------------------------- > > prop-125-v001: Validation of "abuse-mailbox" and other IRT emails > > ---------------------------------------------------------------------- > > Proposer: Jordi Palet Martínez - jordi.pa...@theipv6company.com > Aftab Siddiqui - aftab.siddi...@gmail.com > > > 1. Problem Statement > -------------------- > APNIC implemented mandatory IRT references on 8 November 2010. This means > it is mandatory to register an Incident Response Team (IRT) object for each > resource record in the APNIC Whois Database. The policy mandates IRT > references for each inetnum, inet6num and aut-num objects, however in many > cases, those contain out-of-date, inaccurate, non-existent or not actively > monitored abuse-mailbox information. > > In practice, this contact becomes ineffective to report abuses and > generally gives rise to security issues and costs for the victims. > > This proposal aims to solve the problem and ensure the existence of a > proper abuse-mailbox contact and the process for its utilization. > > 2. Objective of policy change > ----------------------------- > The Internet community is based on collaboration. In many cases, however, > this is not enough and we all need to be able to contact those LIRs which > may be experiencing a problem in their networks and may not be aware of the > situation. > > This proposal aims to solve this problem by means of a simple, periodic > verification of IRT object emails, and establishes the basic rules for > performing such verification and thus avoids unnecessary costs to third > parties who need to contact the persons responsible for solving the abuses > of a specific network. > > The proposal guarantees that the cost of processing the abuse falls on the > LIR whose client is causing the abuse (and from whom they receive financial > compensation for the service), instead of falling on the victim, as would > be the case if they had to resort to the courts, thus avoiding costs > (lawyers, solicitors, etc.) and saving time for both parties. > > 3. Situation in other regions > ----------------------------- > A similar proposal is being discussed in LACNIC and being prepared for > AfriNIC and RIPE NCC. > > Currently, ARIN conducts an annual POC (point of contact) validation and > RIPE NCC validates the “abuse-mailbox:” attribute annually (ripe-705). > > 4. Proposed policy solution > --------------------------- > 1. About the "abuse-mailbox", “email”, “admin-c” and “tech-c” > > Emails sent to "abuse-mailbox", “email”, “admin-c” and “tech-c” must > require manual intervention by the recipient at some time, and may not be > filtered, as in certain cases this might prevent the reception of the abuse > reports, for example a case of spam, as it would include the spam message > itself or URLs or content usually classified as spam. > > The mailboxes may initially send an automatic reply, for example, > assigning a ticket number, applying classification procedures, requesting > further information, etc. However, it may not require the use of a form, as > this would imply that each company that needs to report cases of abuse (a > task that is typically automated) would be forced to develop a specific > interface for each case, which is neither feasible nor logical, as it would > place the cost of processing the abuse on those who submit the claim and > are therefore victims of the abuse, instead of being paid by the those > whose client causes the abuse (and from whom they obtain income). > > By way of information, it is worth noting that it is reasonable for the > person reporting the abuse to do so from the start and in that first > report, sending the logs, or a copy of the spam message (attaching an > example of the spam email or its full headers) or similar evidence proving > the abuse. Likewise, it is reasonable to expect that the initial auto-reply > email will specify that the claim will not be processed unless such > evidence has been submitted, thus allowing the sender the opportunity to > repeat the submission and include the pertinent evidence. This allows > automatic reporting, for example, via fail2ban, SpamCop or others, keeping > costs at a minimum for both parties involved. > > 2. Objectives of "abuse-mailbox", “email”, “admin-c” and “tech-c” > validation > > The procedure, which is to be developed by APNIC, must meet the following > objectives: > > 1) A simple process that guarantees its functionality and allows the > helpdesks that deal with abuse reports to verify that validation requests > actually come from APNIC and not from third parties (which might involve > security risks), avoiding, for example, a single "direct" URL for > validation. > > 2) Avoid automated processing. > > 3) Confirm that the person performing the validation ensure that > understands the procedure and the policy, that they regularly monitor the > "abuse-mailbox", “email”, “admin-c” and “tech-c”, that measures are taken, > and that the abuse report receives a response. > > 4) Validation period no longer than fifteen (15) days. > > 5) If validation fails, escalate to the LIR and set a new validation > period not to exceed the fifteen (15) days. > > (By way of example, a detailed procedure is included in this policy > proposal under "Additional Information") > > > 3. Validation of "abuse-mailbox", “email”, “admin-c” and “tech-c” > > APNIC will validate compliance with the items above, both when the > "abuse-mailbox", “email”, “admin-c” and/or “tech-c” attributes are created > or updated, as well as periodically, not less than once every six months, > and whenever APNIC sees fit. > > At the discretion of APNIC, in general or in specific cases (for example, > for confirmation in cases of escalation under 4., APNIC may use domains > other than apnic.*, and even modify the subject and body of the message, in > order to perform said validations more effectively. > > Lack of compliance will imply a more exhaustive follow-up, in accordance > with the relevant APNIC policies, procedures and membership agreement and a > temporary lock of myapnic access, until resolved. > > 4. Escalation to APNIC > > To avoid fraudulent behavior (for example, an "abuse-mailbox" that only > replies to APNIC’s emails, or to messages with a specific subject or > content), or failure to comply with the remaining aspects of this policy > (incorrect or lack of response to cases of abuse) and, therefore, to > guarantee the quality of the services in the region with the resources > allocated by APNIC, a mailbox will be available (for example, " > escalation-ab...@apnic.net"), to escalate such situations, thus allowing > for a re-validation (according to section 3. above) and even the > intermediation by APNIC and, where appropriate, the application of the > relevant policies/procedures, APNIC policies, procedures and membership > agreement. > > i) In case there is no response from all the email addresses associated > with the IRT object, then mark that IRT object invalid and block access to > myapnic and use other means to contact the member (e.g. via billing contact > or corporate contact) > > ii) if there is no response from some of the email address associated with > the IRT object, then mark those attributes invalid and contact the member > for the resolution. If the problem is not fixed after fifteen (15) days > then block access to myapnic and use other means to contact the member > (e.g. via billing contact or corporate contact). > > 5. Advantages / Disadvantages > ----------------------------- > > Advantages: > The purpose of creating IRT object in the APNIC whois database is to > provide a more accurate and efficient way for abuse reports to reach the > correct network contact. Fulfilling the objectives above indicated and > ensuring that a real contact can be approached in case of abuse cases and > effectively serve the purpose of creating IRT object. > > This will improve the quality of the information and help to achieve the > goal of handling network abuses. > > Disadvantages: > None foreseen. > > > 6. Impact on resource holders > ----------------------------- > APNIC members have to verify and update (if required) their IRT objects > periodically. > > > 7. References > ------------- > ADDITIONAL INFORMATION > > a. Since this proposal is implemented, APNIC will publish the IRT also as > abuse-c, in order to facilitate the search in whois, for the same > information, regardless if looking for abuse-c or IRT. This is done in > order to assimilate the IRT to the majority of the RIRs where it is abuse-c. > > b. It is recommend that all NIRs implement a similar validation process > within their own jurisdictions. > > > c. Example of the validation procedure. > > 1) APNIC initiates the validation automatically, sending TWO consecutive > emails to each of the mailboxes. > > 2) These emails will be sent containing plain text only. > > 3) The first email will contain the URL where the validation is to be > performed ("validation.apnic.net") and may contain information about the > procedure, a brief summary of this policy, etc. > > 4) The second email will contain a unique alphanumeric validation code. > > 5) The person in charge of the each of the mailboxes must go to the URL > and paste the code received in the second email in the form. > > 6) This URL must be designed in such a way that it prevents the use of an > automated process (for example, "captcha"). In addition, it must contain a > text that confirms that the person performing the validation understands > the procedure and the policy, that they regularly monitor the mailboxes, > that measures are taken to solve reported cases of abuse, and that the > abuse report receives a response, with a "checkbox" that must be accepted > in order to proceed. > > 7) The alphanumeric code will only be valid for a maximum of fifteen days. > > 8) If the code is not entered within that time, the system will mark the > IRT as "temporarily invalid” and will send a reminder with another unique > code and alert APNIC staff, so they can initiate a personalized follow-up > with the LIR. > > 9) If no reply is received confirming that the situation has been > corrected, after an additional period of three business days, the IRT will > be permanently marked as "invalid". > > 10) Once the issue has been resolved, the validation process will be > repeated automatically (items 1 to 7 above). If satisfactory, the IRT will > be marked as "valid"; otherwise it will be considered in breach of the > policy. > > * sig-policy: APNIC SIG on resource management policy > * > _______________________________________________ > sig-policy mailing list > sig-policy@lists.apnic.net > https://mailman.apnic.net/mailman/listinfo/sig-policy >
* sig-policy: APNIC SIG on resource management policy * _______________________________________________ sig-policy mailing list sig-policy@lists.apnic.net https://mailman.apnic.net/mailman/listinfo/sig-policy