ICANN ICANN Email List Archives

[gnso-ff-pdp-may08]


<<< Chronological Index >>>    <<< Thread Index >>>

RE: [gnso-ff-pdp-may08] Fast Flux Definition - V4.1

  • To: mike@xxxxxxxxxx
  • Subject: RE: [gnso-ff-pdp-may08] Fast Flux Definition - V4.1
  • From: Joe St Sauver <joe@xxxxxxxxxxxxxxxxxx>
  • Date: Sat, 26 Jul 2008 11:35:59 -0700

Hi Mike,

Sorry that I couldn't make yesterday's call, but I was in the air en route
back from the Internet2 Joint Techs meeting in Lincoln.

Regarding the definition:

# "A volatile compromised host service network, the operators of which 
# are difficult or impossible to contact."

I must admit that if I didn't otherwise know what we were talking about,
I'd have a hard time connecting that definition with the phenomena we're
talking about. That strikes me as a bad thing.

Secondly, from an operational point of view, the addition of the clause
"the operators of which are difficult or impossible to contact" also
troubles me. If that definition is adopted, then an attempt at 
communication with the operators of the fastflux network becomes a
condition precedent which must be satistied before a fastflux host can
be identified as such. I don't think that's a good idea, nor one that's
necessary. And what of a bold fastflux operator who has an email
address that auto-acks emails to a nominal email address, but nothing
beyond that? Does that then exlude those hosts from being fastflux by
definition?

#The "longer version" can be found in the notes from yesterday's call 
#in the Definition of Fastflux part of the Discussion Topics;
#
#  https://st.icann.org/pdp-wg-ff/index.cgi?july_25_call

The longer definition doesn't feel quite gel'd up to me in its current
form. :-;

I will says that with respect to the comment,

    "# Limit the problem to "within the scope of ICANN to address"

    "* Operation of the DNS system
    "* Registration services
    "* Does NOT include; routing, end-point security,"

Routing *is* at least partially within scope, in so far as autonomous
system numbers are involved. 

How is that germane you ask? Well, a growing trend is the reporting of
abuse based upon the ASN of the last hop associated with an IP (in
large part because of (a) the dismal state to which domain whois has 
been allowed to degenerate, and (b) because of a lack of enforcement 
of the NRPM 4.2.2.1.2 requirement that "ISPs must provide reassignment 
information on the entire previously allocated block(s) via SWIP or 
RWHOIS server for /29 or larger blocks.")

Predictably, the bad guys/bad gals have noticed this, and some have
found that having their own ASN gives them insulation and allows 
them to conveniently begin to receive complaints about their own 
misbehaviors, complaints which they can then conveniently ignore. 
At least some supicious ASNs of this sort can be readily identified 
based on things like a lack of acertainable multihoming, nominally 
a basic requirement for obtaining an ASN in the first place per the
NRPM Section 5. (And yes, there are *many* apparently singly-homed 
ASNs out there)

When we run out of two-byte ASNs, and we're all strugling with 
four-byte ASN-related issues, remember those singly homed ASNs, 
folks, and the fact that ICANN "shouldn't pay attention to 
routing" :-;

I would also argue that end point security is, or should also be,
within scope. Why? Well, again, because it directly impacts the 
demand for number resources, namely IP addresses. 

Because reputation accumulates on an IP-by-IP basis, and botted or
compromised misbehaving hosts get blocklisted on an IP-by-IP basis, 
traffic which might otherwise be comingled behind a single IP 
instead ends up spread out over multiple IPs.

Likewise, we've repeatedly seen "snowshoe spammers" hop from one 
block to another, leaving behind a wasteland of impaired IP address 
space from which email (if not light itself) may have a hard time 
leaving. And given the difficulty of "reclaiming" widely blocklisted
space once it has been abused, what do folks do? Why, they then 
request an additional "clean" allocation/assignment, of course. 

<SARCASM>But hey, no problem, we've got an infinite supply of IPv4 
addresses for spammers to squander for us, right?</SARCASM> :-;

Looking at the call notes, a few additional comments/questions...

Under "Roll Call" can the list of those who were on the call be included 
as part of the minutes? (or of those, like me, who weren't on?) Knowing
that information can help with the interpretation of the remainder of 
the items reported.

Under "Data Needs," can you identify the feeds that have been received
so far? Doing so would help me to identify potential data sources that
haven't yet stepped up with data, and then additional outreach can take
place to them.

Under highlights of early data, "fishing" should presumably be rendered 
"phishing"

Under "Legitimate Users" there's an empty bullet -- was there supposed
to be something there from the call that accidentally got omitted or
are we still seaching for an example to list?

Under "Action Items" "Team Camry" should probably be "Team Cymru"

Anything happen under "Other Business?"

Regards,

Joe

Disclaimer: all opinions strictly my own.



<<< Chronological Index >>>    <<< Thread Index >>>

Privacy Policy | Terms of Service | Cookies Policy