Re: XSServer / Taking down a spam friendly provider

2011-10-26 Thread Nicolai
On Wed, Oct 26, 2011 at 10:12:33AM -0400, Chris wrote:

> Before somebody screams the path of least resistance of "just install
> Akismet or (insert spam plugin here)", that type of thinking just
> makes spam even worse because we just keep large, possibly stale,
> databases of IP addresses that may or may not be active spammers and
> does not address the issue.
> 
> Does anyone have any recommendations

> Examples of the offending IPs are:
> 109.230.216.225
> 109.230.220.34
> 109.230.217.166
> 109.230.220.95

All four addresses are in the Spamhaus sbl-xbl list.  It would take ~10
lines of python in your cgi program to work this out.

Nicolai



Re: [SHAME] Spam Rats

2013-01-09 Thread Nicolai
On Thu, Jan 10, 2013 at 12:58:59PM +1000, Julian DeMarchi wrote:
> This is the first RBL I have seen list a /24 for lack of PTRs.

Maybe because it's redundant: a PTR check should be automatic on any
incoming SMTP connection.  Just think of all the traffic their survey
tool generated in compiling this totally useless list.

The humanity!

Nicolai



BGP hijack of Spamhaus?

2013-03-29 Thread Nicolai
Hi all,

Regarding the Spamhaus DDoS attack, there's a Cisco article [0]
detailing its chronology, which cites greenhost.nl [1] claiming a BGP
hijack by AS34109 (CB3ROB).  Here, a /32 was announced (and accepted...)
for 0.ns.spamhaus.org, and the fraudulent server returned 127.0.0.2 for
*all* DNSBL queries, with the intent to undermine confidence in
Spamhaus.

Are there any confirmations of this claim?  This needs to be
investigated and proven/disproven.

Nicolai

0. http://blogs.cisco.com/security/chronology-of-a-ddos-spamhaus/
1. https://greenhost.nl/2013/03/21/spam-not-spam-tracking-hijacked-spamhaus-ip/



Re: BGP hijack of Spamhaus?

2013-03-30 Thread Nicolai
On Fri, Mar 29, 2013 at 07:14:52PM +0100, Job Snijders wrote:
> Hi Nicolai,
> 
> It really happened, here are my notes. 
> 
>   http://instituut.net/~job/cb3rob-spamhaus-hijack-21-mar-2013.txt

Thanks again for this, Job.  (Other response in private mail.)

I just wanted to note for anyone interested, there's another article
stating that AS34109 (CB3ROB) had also recently hijacked 205.19.72.0/23,
owned by the DoD, over the two week period from March 7-21.

http://www.bgpmon.net/looking-at-the-spamhouse-ddos-from-a-bgp-perspective/

Nicolai



nanog@nanog.org

2012-02-08 Thread Nicolai
On Tue, Feb 07, 2012 at 10:20:07PM -0500, Ryan Rawdon wrote:
> Assuming it is not a futile/wasted effort, where is the current best
> place/resource to report an active botnet C&C to?

I don't know if there's a single best option, but there are several good
ones.  In addition to Cymru I'd mention abuse.ch, which runs several
public botnet C&C trackers.

 http://www.abuse.ch

Nicolai



Re: Operation Ghost Click

2012-05-02 Thread Nicolai
On Fri, Apr 27, 2012 at 11:14:40PM -0500, A. Pishdadi wrote:
> At some point in like 10 years when all the computer illiterate people are
> gone there will be no more excuses for not being educated on malware and
> viruses.

The "non-techies" I know would consider switching from IE to Firefox a
major change, one they think would qualify as a technical achievement.
If you ask people about the underlying technical aspects of the software
or hardware they use, most will know very little, if anything.  Some
won't even understand the question.

On a weirdly related note, here's a story from a friend of mine who is a
high school teacher.  He told me once that a significant number of his
students believe that the *original source* of food is a grocery store.
Not a farm, but the food literally comes into being on a shelf in the
produce section or meat counter.

It all comes down to a lack of interest in what's going on under the
hood, and this disinterest won't be gone in 10, 20, or 50 years.  It's
actually deepening as time goes on.

Nicolai



Re: Cogent for ISP bandwidth

2012-05-15 Thread Nicolai
On Mon, May 14, 2012 at 09:38:34PM -0500, Ameen Pishdadi wrote:
> No way they stack up against level3 or any of the other 4 big tier 1s
> but if you throw them in a blend with level3 there shouldn't be any
> issue and I wouldn't pay more the .75 cents a meg for a gig

That's $7.50 per 1000mbps.  Sign me up!

Nicolai



Re: Please, talk me down.

2012-10-17 Thread Nicolai
On Wed, Oct 17, 2012 at 03:35:11AM +, Joseph Anthony Pasquale Holsten wrote:

> First off, I'm using djbdns internally and it doesn't support 
> records. So we really aren't using it internally.

I assume you mean stock djbdns doesn't support ip6, because it does
indeed support  records.  I use both dnscache and tinydns from
djbdns and  records work fine for me.  Note: I'm not using Felix von
Leitner's ip6 patch.

$ dig  chocolatine.org +short
2610:130:103:e00:201:2ff:fe45:8308

Resolver is dnscache, authoritate server is tinydns.  No problem.

I think the problem you're experiencing, if there is one, is not related
to either djbdns or ip6.

Nicolai



Re: Please, talk me down.

2012-10-21 Thread Nicolai
On Sun, Oct 21, 2012 at 10:09:24PM +1100, Jay Mitchell wrote:
> On 18/10/2012, at 7:44 AM, Nicolai  wrote:

> > I assume you mean stock djbdns doesn't support ip6, because it does
> > indeed support  records.  
> 
> Actually, it doesn't, as you so kindly pointed out. It does WITH a patch.

No.  djbdns 1.05 supports  records as anyone can verify.  To make
sure myself I just downloaded stock djbdns from the cr.yp.to website,
installed, and ran some  queries.  Works as it always has.

$ dig  he.net +short
2001:470:0:76::2

That's an unpatched, stock dnscache.  John Levine already described in
this thread how tinydns supports  records, so there's no point going
over it again.

I only responded to this thread to correct misinformation.  sigh

As an aside, you may want to fix your DNS, as some mail receivers don't
like this:

$ dig -x 72.249.91.101 +short
static.serversandhosting.com.
$ dig a static.serversandhosting.com +short
72.249.3.27

Nicolai



Re: GMail contact - misroute / security issue

2014-09-29 Thread Nicolai
On Sun, Sep 28, 2014 at 10:42:56PM -0500, Grant Taylor wrote:

> Specifically she is receiving emails for  name>@gmail.com (no dots) when her email address is really  name>..@gmail.com (dots).
> 
> I don't know if this is a "feature" or a "bug", but either way, it's
> disquieting my wife.  (Unhappy wife = unhappy life.)

Have your wife log in while omitting the dots, using e.g. "janeqpublic"
instead of "jane.q.public" as the username.  She'll see there's only
one account, and it's her's, and that someone just typed the wrong
address.

Most likely reason: gmail is so common that someone mistypes
johnsm...@example.com as johnsm...@gmail.com, not paying attention to
what they're doing.  It happens.

Nicolai


Re: This is a coordinated hacking. (Was Re: Need help in flushing DNS)

2013-06-21 Thread Nicolai
On Thu, Jun 20, 2013 at 05:28:17PM -0400, valdis.kletni...@vt.edu wrote:
> It's relatively small when you consider there's something like 140M .com's

Just FWIW, the current size of .com is roughly 109M domains.  Someday it
will reach 140M but not today.

Nicolai



Re: The US government has betrayed the Internet. We need to take it back

2013-09-06 Thread Nicolai
On Fri, Sep 06, 2013 at 02:27:32PM +, Naslund, Steve wrote:

> If everyone cancelled their gmail accounts, stopped using Google search,
> and stopped paying for Google placement and ads, their stock would go to
> zero nearly overnight.  Again, no one seems to care about the issue
> enough to do this because I have seen no appreciable backlash against
> these companies.

I think Joe 6mbps sitting at home reads that everything he uses has been
subverted.  He doesn't know what alternatives exist, and doesn't have
the technical knowledge neccessary to find them on his own.  And faced
with a false choice -- stop using the Internet, or continue using it as
he knows how -- he chooses the one that retains his ability to
communicate with family and friends and keep up on the things he cares
about.

Schneier is saying we need to build better options for Joe 6mbps,
competing with the PRISM-compatable services, so that privacy-respecting
services become known and commonplace.

Nicolai



Re: The US government has betrayed the Internet. We need to take it back

2013-09-06 Thread Nicolai
On Fri, Sep 06, 2013 at 01:52:16PM -0400, Sam Moats wrote:

> The problem being is when you do have a provider that appears to be 
> secure and out of reach, think lavabit, that provider will not survive
> for long.

That's true -- it is far easier to subvert email than most other
services, and in the case of email we probably need a wholly new
protocol.

But many or most services can be sufficiently improved, and that's the
goal: improvement.

http://prism-break.org/ lists examples of this improvement.

Nicolai



Re: The US government has betrayed the Internet. We need to take it back

2013-09-06 Thread Nicolai
On Fri, Sep 06, 2013 at 12:03:56PM -0700, Michael Thomas wrote:
> On 09/06/2013 11:19 AM, Nicolai wrote:
> >That's true -- it is far easier to subvert email than most other
> >services, and in the case of email we probably need a wholly new
> >protocol.
> >
> 
> Uh, a first step might be to just turn on [START]TLS. We're not using the
> tools that have been implemented and deployed for a decade at least.

Agreed.  Although some people are uncomfortable with OpenSSL's track record,
and don't want to trade system security for better-than-plaintext
network security.

But the deeper issue is coercing providers to give up mail stored on
private servers, bypassing the network altogether.  TLS doesn't address
this problem.  Short term: deploy [START]TLS.  Long term: we need a new
email protocol with E2E encryption.

Nicolai



Re: OpenNTPProject.org

2014-01-15 Thread Nicolai
On Tue, Jan 14, 2014 at 09:18:30AM +0200, Saku Ytti wrote:

> DNS, NTP, SNMP, chargen et.al. could trivially change to QUIC/MinimaLT
> or compared, getting same 0 RTT penalty as UDP without reflection
> potential.

I wouldn't say trivial, but QUIC and MinimaLT are hopefully the future.
The near future, I hope!

For now I'd just like to mention that OpenNTPD, from the OpenBSD
project, is immune to the kind of large NTP amplification attacks now
being discussed.  It's certainly a good fit for some
organizations/setups.

http://www.openntpd.org

Nicolai