ICANN ICANN Email List Archives

[gnso-ff-pdp-may08]


<<< Chronological Index >>>    <<< Thread Index >>>

Re: [gnso-ff-pdp-may08] Section 5.10 Text

  • To: Rod Rasmussen <rod.rasmussen@xxxxxxxxxxxxxxxxxxxx>
  • Subject: Re: [gnso-ff-pdp-may08] Section 5.10 Text
  • From: Martin Hall <martinh@xxxxxxxxxxxxxxx>
  • Date: Fri, 14 Nov 2008 07:06:50 -0800

Rod,

One observation on the following suggested text:

- Proactively use available data to identify and/or shut-down malicious domains: There are numerous data sources that can provide information that may help in identifying malicious activity. Lists such as theSORBS Dynamic User and Host List can provide networks associated to dial-up, DSL, and cable networks that are more likely to be abused. The Composite Block List (XBL) may indicate fraud. Optimally a registrar would check against this information at DNS set- up or modification time, however periodic scanning should see good results.
I wonder if we should elaborate a little to callout the difference  
between IP address and domain name data sources. The two examples you  
quote are IP address-based. Data sources that provide domain name and  
even URL lists are also available both at a general abuse/fraud level  
and, in some cases, specifically wrt fast flux. Providing concrete  
examples depends on how specific we want to get. If the group thinks  
elaboration makes sense, I'm happy to suggest a specific change.
Martin

On Nov 13, 2008, at 2:03 PM, Rod Rasmussen wrote:

Hi folks,

Sending this around to everyone as I don't think we made the cut on getting it in Marika's latest draft.
This text is meant for section 5.10 that asks, "What are some of the  
best practices available with regard to protection from fast flux?"   
All that was done here was to add and explain references to two  
different documents that cover some possible best practices that  
could be brought to bear: the APWG Registrars Best Practices and the  
SSAC paper on Fast Flux hosting.  Some of the pertinent points were  
brought out to show their relevance, but the point here is to get  
references to relevant documents included here.
We should probably discuss any changes/additions/etc. to this along  
with our other work for tomorrow's call.
Thanks!

Rod

=====================

One source of best practices for protection from fast flux can be found in the phishing world. The Anti-Phishing Working Group has recently released a best practices document for domain registrars in dealing with domain names registered by phishers ("Anti-Phishing Best Practices Recommendations for Registrars" http://www.apwg.org/reports/APWG_RegistrarBestPractices.pdf) . Several of the practices outlined in that document apply directly or indirectly to dealing with fast flux domain names. While the audience for this particular document is the domain registrar community so some particular recommendations may not translate to other entities within the domain registration space, the same general principles can apply to domain registries, domain resellers, and other providers of domain registration or support services.
The following is a paraphrased sampling of some of the applicable  
practices mentioned in this document:
- Track the IP address, date, time, frequency and action of all  
account changes such as updating DNS or WHOIS information
- Limit the ability of registrants to repeatedly change their name  
servers via a programmatic interface to reduce or eliminate  
automated name server hopping.
- Proactively use available data to identify and/or shut-down  
malicious domains: There are numerous data sources that can provide  
information that may help in identifying malicious activity. Lists  
such as theSORBS Dynamic User and Host List can provide networks  
associated to dial-up, DSL, and cable networks that are more likely  
to be abused. The Composite Block List (XBL) may indicate fraud.  
Optimally a registrar would check against this information at DNS  
set-up or modification time, however periodic scanning should see  
good results.
- Use a "Registrar Lock" on registrations that are deemed to be  
suspicious enough to warrant further investigation.
Another source for suggested practices to mitigate the use of domain  
names in the "double flux" variant of fast flux attacks is SAC 025,  
Fast Flux Hosting and DNS (http://www.icann.org/committees/security/sac025.pdf 
).
SAC 035 identifies mitigations methods certain registrars practice  
today in cases where the registrar provides DNS for the customer's  
domains:
- Authenticate contacts before permitting changes to name server  
configurations.
- Implement measures to prevent automated (scripted) changes to name  
server configurations.
- Set a minimum allowed TTL (e.g., 30 minutes) that is long enough  
to thwart the double flux element of fast flux hosting. [The WG  
notes that this method could interfere with customers (registrants)  
who use low TTLs for legitimate uses, without harm to others. In  
such cases, the DNS provider might provide exception case processing  
or white listing.]
- Implement or expand abuse monitoring systems to report excessive  
DNS configuration changes.
- Publish and enforce a Universal Terms of Service agreement that  
prohibits the use of a registered domain and hosting services (DNS,  
web, mail) to abet illegal or objectionable activities (as  
enumerated in the agreement).
--
Martin Hall
skype: martin-hall
+1-408-838-2890







<<< Chronological Index >>>    <<< Thread Index >>>

Privacy Policy | Terms of Service | Cookies Policy