ICANNs role [was: Re: On-going ...]

> Is there a difference between a decade-old domain with contact information
> where a web server got hacked, and a 1-day old domain with garbage for
> contact information that was set up explicitly for Bad Stuff? How do you
> tell?

Yup! One was registered a day ago and is now sending out loads of spaff.

It was a trick question. The next question is "how do you differentiate"?

I took two obvious cases and compared them. In such a case, it should be
reasonably obvious to the average person what the answer is.

The problem is that it is rarely so clear.

Take the example of what happened to seclists.org. Surely it looked like
a legitimate complaint, didn't it? You have a big company like MySpace
that has submitted a complaint claiming that a bunch of user passwords
have been posted on the seclists.org web site. Go to web site, sure
enough. Maybe look at registry info, see "insecure.com" mentioned, maybe
think it is some hacker web site. So shut it down.

The problem here is that any competent abuse department should have done
more research and laughed this into the circular file.

This is the costly bit that a domain registrar isn't going to be likely
to do.

First, analysis of the complaint itself.

Passwords - on seclists.org web site. Okay.

1) Realize that the web site is an archival copy of a mailing list. This
   means that heavy distribution has already happened, and any ancillary
   distribution happening by the web site is incidental.

2) Because heavy distribution has already happened, the passwords in
   question are not in any way "protected" by removing them from the web
   page (or removing the web page).

3) Notice that the data has already been posted on *other* web sites.

Conclusion #1 --> MySpace has a serious data breach on its hands.
Distribution is wide on visible community resources. This implies much
heavier distribution is likely on invisible blackhat resources.
Appropriate mitigation steps involve disabling and re-passwording all
accounts.

Conclusion #2 --> Continued listing of the passwords on the web site is
minimally harmful. Stand by for further processing.

Answer #1 to MySpace --> "Disable these accounts, your password list has
been widely distributed."

Further analysis: visit http://www.seclists.org. Notice the words
"security mailing list archive." Attempt to verify that it is what it
appears to be.

Conclusion #3 --> Given a security mailing list, one would expect that
there would be some discussion of current security problems. The inclusion
of an actual password list may have been in mildly poor taste, but it is
not due to deliberate intent of the website's operator. Since the password
list is already public and heavily distributed, it might be reasonable to
request the web site owner to remove the archive page pending a response
from MySpace that the passwords had been disabled.

Answer #1 to seclists.org -> "Disable this web page pending further
developments."

This is one reasonable resolution to the issue. I won't pretend it is the
only possible "whitehat" course of action, but there is no whitehat course
of action that ends with "seclists, we're suspending your domain."

If you do not have clear and obvious things to judge, analysis of a
situation becomes even more difficult. The above is not going to be
something that a first level support lackey is going to be able to work
out on his own... so that implies paying people who are skilled (and
who incidentally would probably have been on seclists mailing lists,
haha)

Right now, 1-day-old domains are a problem because nobody has a compelling
reason to let abuse domains age prior to using them. If it becomes common
policy for major providers to require domains to have existed for a certain
amount of time before they accept mail (as one example) containing that
domain name, then bad actors will simply register domains, allow them to
age, and then use them later.

I am not seeing easy solutions. I am seeing costly solutions that involve
a lot more involvement on the part of registrars. The obvious flags of
trouble (such as "1-day-old") are at best only useful in the short term,
because the bad actors can and will adapt.

Best people to know which domains are involved in sending out spaff? Hotmail?
Yahoo? AOL? Google? You know, those people who run millions and millions of
email accounts and can do rather scary statistical analysis on email..

You trust Hotmail? One of our businesses here has a mail server running
on a clean IP (an IP that had never before been used for mail in the
history of the Internet, and had been inactive for several years in any
case). It exclusively sends a very low volume of support replies and
the occasional billing problem. All mail is text - not HTML. There are
no images. There are no advertisements.

Hotmail is silently dropping every one of those messages sent to them. Not
junk folder. Dropping. Explain *that*.

While Hotmail *could* be bothered to do what you suggest, and I am sure
that it is an incredibly difficult task to handle a freemail system like
theirs, they're not doing it. Surely they've learned a lot of neat stuff
about dropping problematic e-mail, but they're also dropping legitimate
mail, so let's be real. Their priority isn't accurately determining what
domains are spamming. Their priority is running a heavily attacked
freemail provider without a trillion dollar budget. There is some
overlap, but only some.

We take in several megabits of traffic to our spam traps here, and I bet
we (and anyone like us, since there's a bunch of folks who do the same)
could generate some stats. I don't have time for any more projects though.

I wonder if any of the above would be interested in reporting spam-sending
hosts, URLs involved in spam/phish/scam/etc/ to a public group (or semi-public
group - open to join, but not publicly published) who could start working
on feeding these domains back to registrars?

If the registrars were interested in doing anything with the data, I
believe there are already some groups doing the collection of such data.

... JG

This is the costly bit that a domain registrar isn't going to be
likely to do.

Well, you're not likely to get it for the $8.95 that Godaddy charges.
Their abuse department does a remarkably good job, considering their
volume and margins.

Perhaps the message here is that you get what you pay for. For a rock
bottom price, You get rock bottom service. There are registrars that
charge considerably more and provide considerably more service.

ObOperations: I need a 1.5Mb net connection. I'm planning to pay
$29.95/month, since I see lots of ads on TV for places offering that.
Oh, and I expect five nines reliability and you can bet I will
complain loudly and bitterly when I call in an outage at 3 AM and get
the answering machine.

R's,
John

I was wondering if a few folks on this list could look at a problem I'm
seeing.

I've poked around most of yesterday and this morning and initially I thought
it was a dns problem but it appears to me that www.airfrance.com is blocking
a whole lot of the IP space in the US from accessing their website. Using
proxy servers I find that ATT network, my network are both blocked but
roadrunner can access their website. Can you?

Can a few of you check from wherever you are and see if I'm correct in my
assessment of the problem?

George Roettger
Netlink Services
www.nls.net

AF has country-specific front pages. Airfrance.com, the generic
corporate site, is OK from here; Airfrance.us is reachable from London
(if you lie:-)) but extremely slow loading. Airfrance.fr is OK.
Airfrance.co.uk is slow but OK.

1 1 1 0 0.7 ms
   
  66.36.240.2 AS14361
HOPONE-DCA c-vl102-d1.acc.dca2.hopone.net. 255 US Unix: 15:25:04.988
2 0 0 1 0.7 ms [+0ms]
   
  66.36.224.248 AS0
IANA-RSVD-0 gec3.core1.dca2.hopone.net. 0 miles [+0] 254 US Unix:
16:24:46. 18
3 5 3 1 1.4 ms [+0ms]
   
  66.36.224.18 AS0
IANA-RSVD-0 ge3-0.core1.iad1.hopone.net. 0 miles [+0] 253 US Unix:
15:26:48.426
4 3 1 1 1.5 ms [+0ms]
   
  66.36.224.178 AS0
IANA-RSVD-0 ge-3-0-0.ashbb2.ashburn.opentransit.net. 0 miles [+0]
  252 US Unix: 15:24:25. 45
5 3 1 2 1.5 ms [+0ms]
   
  193.251.243.141 AS5511
OPENTRANSIT gi4-0-0.ashcr1.ashburn.opentransit.net. 0 miles [+0]
  251 FR [Router did not respond]
6 * 82 81 81 ms [+80ms]
   
  193.251.242.97 AS5511
OPENTRANSIT po6-0.pascr3.paris.opentransit.net. 0 miles [+0]
  250 FR [Router did not respond]
7 120 82 82 82 ms [+0ms]
   
  193.251.129.61 AS5511
OPENTRANSIT po9-0.pascr1.paris.opentransit.net. 0 miles [+0]
  249 FR [Router did not respond]
8 128 83 84 82 ms [+0ms]
   
  193.251.126.57 AS0
IANA-RSVD-0 pos15-0.ntsta202.paris.francetelecom.net. -1 miles [+0]
0 miles [+0] 248 FR [Router did not respond]
9 154 82 82 82 ms [+0ms]
   
  193.251.126.70 AS0
IANA-RSVD-0 po14-0.ntsta302.paris.francetelecom.net. -1 miles [+0] 0
miles [+0] 247 FR [Router did not respond]
10 97 88 89 88 ms [+6ms]
   
  193.251.126.93 AS0
IANA-RSVD-0 pos0-3-0-0.nrlyo302.lyon.francetelecom.net. -1 miles
[+0] 0 miles [+0] 245 FR [Router did not respond]
11 150 96 96 96 ms [+7ms]
   
  193.252.101.149 AS0
IANA-RSVD-0 po9-2.ncmar302.marseille.francetelecom.net. -1 miles
[+0] 0 miles [+0] 245 FR [Router did not respond]
12 150 96 96 96 ms [+0ms]
   
  193.253.14.102 AS0
IANA-RSVD-0 pos-4-0.marg2.marseille.raei.francetelecom.net. -1 miles
[+0] 0 miles [+0] 244 FR [Router did not respond]
13 124 100 100 98 ms [+2ms]
   
  81.52.15.234 AS0
IANA-RSVD-0 atm-6-0-0-732.sph2.sophia.raei.transitip.francetelecom.net.
-1 miles [+0] 0 miles [+0] 241 FR [Router did not respond]
14 120 104 102 98 ms [+0ms]
   
  81.54.114.30 AS0
IANA-RSVD-0 unknown.rain.fr -1 miles [+0] 0 miles [+0]
  241 FR [Router did not respond]
15 121 100 106 98 ms [+0ms]
   
  [192.168.x.x] AS16559
REALCONNECT-01 [Internal] -1 miles [+0] 0 miles [+0]
  241 [??] [Router did not respond]
16 * * 106 98 ms [+0ms]
   
  [192.168.x.x] AS16559
REALCONNECT-01 [Internal] -1 miles [+0] 0 miles [+0]
  238 [??] [Router did not respond]
17 * * * 98 ms [+0ms]
   
  [Unknown] [Unknown - Firewall did not respond] -1 miles [+0] 0 miles
[+0]
18 * * 98 98 ms [+0ms]
   
  193.57.244.15 AS25186
TRANSIT-VPN-AS
[Reached Destination]double6.airfrance.fr.

AF has country-specific front pages. Airfrance.com, the generic
corporate site, is OK from here; Airfrance.us is reachable from London
(if you lie:-)) but extremely slow loading. Airfrance.fr is OK.
Airfrance.co.uk is slow but OK.

So far everyone who responded has managed to get the site to come up. When I
go to www.airfrance.com from anywhere in my network 216.144.0.0/18 I simply
get a timeout using anything including telnet to port 80, see below

15 297ms 299ms 299ms pos9-0.ncmar302.Marseille.francetelecom.net
[193.252.101.53]
16 300ms 295ms 300ms pos-4-0.marg2.marseille.raei.francetelecom.net
[193.253.14.102]
17 306ms 301ms 296ms
atm-6-0-0-732.sph2.sophia.raei.transitip.francetelecom.net [81.52.15.234]
18 306ms 298ms 307ms 81.54.114.30
19 * * * Request timed out.
20 * * * Request timed out.
21 * * * Request timed out.
22 ^C

g:\>telnet 193.57.244.15 80
Connecting To 193.57.244.15...Could not open a connection to host on port 80
: C
onnect failed

If anyone has any ideas I'm all eyes.

George Roettger
Netlink Services
www.nls.net

Perhaps the message here is that you get what you pay for. For a rock
bottom price, You get rock bottom service. There are registrars that
charge considerably more and provide considerably more service.

There just isn't enough hierarchy in the DNS. Back when I was running my
own ISP, I gave hosting customers free domain names like
bobscafe.myisp.net, and fredshardware.myisp.net. That was a rockbottom
price but because it was bundled with another product and FULLY UNDER MY
CONTROL, I could do it for free. It cost more money, $50 I believe, to
register a name like myisp.net. But unfortunately, it was darn near
impossible to register a new TLD unless you were a small country.

That is where the problem started. The charging structure should have
been hierarchical so that people could register a new TLD (4 chars or
more) for $1 million, and a new second level domain for $1000. That
would have driven smaller businesses to 3rd level domain names which
would probably range from free-with-hosting-service to $5 a year with
DNS hosting thrown in.

Now we have this horrible flat system where 3 char TLDs are free but
require a bloated and expensive evaluation process, 4 char and greater
TLDs do not exist, and everyone is crammed in on the 2nd level with far
too many trying to pretend that they have a TLD inside .com.

Blechhh!

Only one registry out there http://www.nic.name/ is even doing third
level registrations and most ISPs no longer give out meaningful third
level names, just stuff like cs182365536663.myhosting.net and the like.

What ICANN is missing, sorely missing, is an office of the CTO which
would look at naming and addressing *ARCHITECTURE* and advise the board
and ICANN councils. Eventually, we could have some intelligent
discussion of a better way to structure this whole thing and then we
would at least have a goal that we could work towards in fits and
starts. Instead of the floundering that happens today.

I remember when we had the IAHC and it seemed like we really would have
some system that was based on sound network architectural grounds.
Unfortunately, ICANN was formed to wrestle with the political issues and
left the technical issues sitting in a cloud of dust back at the
busstop.

--Michael Dillon

So far everyone who responded has managed to get the site to come up. When I

go to www.airfrance.com from anywhere in my network 216.144.0.0/18 I simply
get a timeout using anything including telnet to port 80, see below

15 297ms 299ms 299ms pos9-0.ncmar302.Marseille.francetelecom.net
[193.252.101.53]
16 300ms 295ms 300ms pos-4-0.marg2.marseille.raei.francetelecom.net
[193.253.14.102]
17 306ms 301ms 296ms
atm-6-0-0-732.sph2.sophia.raei.transitip.francetelecom.net [81.52.15.234]

That's almost certainly Sophia-Antipolis - a big location for data
centres, including France Tel and IBM Global Services, between Nice
and Cannes.

Irrelevant lame DNS server issue reported to SOA email address.

Well, you're not likely to get it for the $8.95 that Godaddy charges.
Their abuse department does a remarkably good job, considering their
volume and margins.

Perhaps the message here is that you get what you pay for. For a rock
bottom price, You get rock bottom service. There are registrars that
charge considerably more and provide considerably more service.

The problem here is that the community gets screwed not the guy paying $8.95. If he was getting what he paid for- well who cares. The problem is everyone else.

That said- even if domains were more expensive it wouldn't change anything for the phishers using their stolen credit cards.

There simply needs to be a better way for the community to quickly identify phishing sites- verified by some independent body (such as CERT) that can quickly verify the domain is a phishing site and alert the registrars to shut them down. Don't let it be used for copyright or any other non-sense complaint.

-Don

At the risk of prolonging a thread that should die....

Gadi forwarded a post suggesting DNSSEC is unneeded because we have security
implemented elsewhere (i.e. SSL).

Thus how does it affect me adversely if someone else registers a domain, if I
don't rely on the DNS for security?

Much of the phishing I see is hosted on servers that have been compromised, I
guess that is cheaper than the $8.95 for a domain.

If there is evidence that domain tasting is being used for abusive practices,
I'm sure the pressure to deal with it will increase. Much as I think the
practice is a bad thing, I don't see it as a major security issue.

The reason domain registration works quickly, is that it was a real pain when
they didn't (come on it wasn't that long ago). People registering domains
want it up and running quickly, as humans aren't good at the "I'll check it
all in 8 hours/2 days/whatever". I'm sure prompt
registration/activation/changes of domains is in general a good thing,
resulting in better DNS configurations.

Sure it is possible domains will be registered for abusive activity, and
discarded quickly, with a difficult path in tracing such. But if there is
some sort of delay or grace period it won't make a difference. When domains
took days to register spammers waited days. I don't suppose phishers are any
less patient.

Validation of names, addresses, and such like is impractical, and I believe
inappropriate. There is a method for such validations (purchase of SSL
certificates), and even there the software, methods, and tools are pitiful.
Why should the domain registrars be expected to do the job (or do it
better?), when it could be equally argued that ISPs are is a better position
to police the net.

The credit card companies are good at passing chargeback fees to the vendor,
so be assured if people are using fraudulent credit card transactions, the
domain sellers will have motivation to stop selling them domains.

The essential problem with Internet security is that there is little come back
on abusers. There have been obvious and extensive advanced fee fraud run from
a small set of IP addresses in Europe, using the same national telecomm
provider as a mail relay, and it took 4 years to get any meaningful action (I
assume the recent drying up of such things was a result of action, the
fraudster may just have retired with their ill gotten gains for all I know!).

There are specific technical, and market issues, but without any real world
policing, the abusers will keep trying, till either they succeed or go bust.
If they succeed they may well go on to become part of more organized abuse.

The other problem is that their is no financial incentive for ISPs to do
the "right thing". Where as domain registrars can cancel a domain, and get
another sale from the same abuser - so they have a financial incentive to
clean up. If ISPs close an account, the person will likely just switch ISP.

A classic example I commented on recently was "Accelerate Biz", unrepentant
spammers (at least their IP address range is from here, either that or so
thoroughly incompetent they might as well be). Their inbound email service is
filtered by "Mail Foundry", but despite being an "antispam" provider, Mail
Foundry have no financial incentive to stop providing services to these
spammers. Till companies (ISPs included) are fined for providing such
services, so it isn't profitable, we'll be spammed.

Port 25 SYN rate limiting isn't that much harder than ICMP :wink:

Simon, speaking in a personal capacity, views expressed are not necessarily
those of my employers.