Those are the examples I used, mostly because that’s the world I live in for my 
day job.

And in agreement with Stephen, we can work to add more clearly defined use 
cases in the draft.

--
Alex Brotman
Sr. Engineer, Anti-Abuse & Messaging Policy
Comcast

From: Ben Schwartz <bem...@google.com>
Sent: Tuesday, March 3, 2020 11:55 PM
To: Brotman, Alex <alex_brot...@comcast.com>
Cc: dnsop@ietf.org; Stephen Farrell <stephen.farr...@cs.tcd.ie>
Subject: Re: [EXTERNAL] Re: [DNSOP] RDBD (Related Domains By DNS)

It sounds like you're proposing that this would be used as part of an 
anti-phishing e-mail filtering system.  That seems like a fine use-case, and I 
would suggest spelling it out precisely in the draft, instead of the current 
(vague) use cases.

I'm still not entirely clear on how this is supposed to work, which is why I 
would appreciate the worked example.  It seems like, in addition to RDBD, your 
filter also needs some kind of "appears-related" heuristic, and a list of 
"high-trust" domains, on the theory that one should block messages containing 
repudiated domains that look similar to a high-trust domain.  However, I don't 
think this is likely to be a reasonable use of the existing rdbd-tags, neither 
of which amounts to an accusation of phishing per se.  (Consider, for example, 
the entire ".sucks" TLD.)

Regardless of the use case, I think a more detailed example would be helpful 
for understanding what heuristics are needed, and to what extent RDBD would 
make the use case easier.

On Tue, Mar 3, 2020 at 10:09 PM Brotman, Alex 
<alex_brot...@comcast.com<mailto:alex_brot...@comcast.com>> wrote:
From the perspective of messaging anti-abuse, this can help when that 
department goes to an outside source.  If I see 
“example.com<http://example.com>” and “example-hr.com<http://example-hr.com>”, 
is there an easy way today to ensure they’re actually related if they’re not 
registered through the same firm or hosted at the same NS systems?  If one 
can’t definitively determine that, you might decide that they are spam/phishing 
messages, and treat them more harshly when trying to determine if they are 
legit/spam.  For example, I’m pretty sure that “google.com<http://google.com>” 
and “google-events.com<http://google-events.com>” aren’t related based on the 
content of the latter’s website, but if I were to receive an email message from 
google-events.com<http://google-events.com>, it might not be as easy to tell.  
As for cousin domains, if you already know that the malicious domain exists, 
you can assert a negative relationship.  If “example.com<http://example.com>” 
does not know “examp1e.com<http://examp1e.com>” exists, there would be neither 
a positive or negative relationship asserted, but the lack of a positive (when 
others are stated positively/negatively), could be used as some signal by the 
evaluator.

--
Alex Brotman
Sr. Engineer, Anti-Abuse & Messaging Policy
Comcast

From: Ben Schwartz <bem...@google.com<mailto:bem...@google.com>>
Sent: Tuesday, March 3, 2020 5:38 PM
To: Brotman, Alex <alex_brot...@comcast.com<mailto:alex_brot...@comcast.com>>
Cc: dnsop@ietf.org<mailto:dnsop@ietf.org>; Stephen Farrell 
<stephen.farr...@cs.tcd.ie<mailto:stephen.farr...@cs.tcd.ie>>
Subject: [EXTERNAL] Re: [DNSOP] RDBD (Related Domains By DNS)

Thanks for the draft.  I haven't been following this, and I found it 
interesting.

I would appreciate more fully worked use cases to explain the motivation.  What 
is the use in correlating different domains?  How would one use this to prevent 
"cousin" attacks?

On Tue, Mar 3, 2020 at 2:12 PM Brotman, Alex 
<alex_brot...@comcast.com<mailto:alex_brot...@comcast.com>> wrote:
Hello,

A while ago, Stephen and I had sent out a few versions of this, and we had some 
discussions and revisions were made.  At the time, discussion waned, however I 
wanted to pick this up again before the onset of IETF107.

https://datatracker.ietf.org/doc/draft-brotman-rdbd/

 I've had some folks contact me privately, and I saw an inquiry on another 
list.  There does seem to be some interest, at least in the anti-abuse and 
research communities, of making this a functional proposition.

To recap, the rough idea is that implementers would be able to positively or 
negatively confirm relationships between domains.  In the world of anti-abuse 
and research, these links are not always obvious.  For example, in a large 
corporation, some teams may go outside acceptable practice and register a 
domain through another provider.  Or it may be that you have international 
branches that operate on a different TLD, but you may not have registered with 
all TLDs.  In the latter case, being able to both positively and negatively 
state a relationship could be useful for anti-spam/phishing.

Any questions or comments would be greatly appreciated.  Thank you.

--
Alex Brotman
Sr. Engineer, Anti-Abuse & Messaging Policy
Comcast

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org<mailto:DNSOP@ietf.org>
https://www.ietf.org/mailman/listinfo/dnsop
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to