dar...@chaosreigns.com wrote:
On 02/09, Kris Deugau wrote:
I'm still not seeing the whole picture; maybe you can explain the difference between these two cases:

1) Legitimate sender, uses the NAT machine as the legitimate, designated

(10.0.0.2) with a certain rDNS (exchange.smallbusiness.com).
2) Spam, from an infected machine on the same LAN, either via relay

(10.0.0.2) with a certain rDNS (exchange.smallbusiness.com).

The IP is sending spam, so it gets blacklisted (by a blacklist of domains
which have MTX records for spamming IPs).

... So what incentive do I as:  (pick any one or more hats below)

ISP mail/DNS admin
Colo/self-hosted domain admin
Inbound mail admin

have to either set up this extra A record, or check for it, that existing blacklists don't provide? Chicken<->egg.

Where do you draw the lines for adding someone to a/the blacklist? 0.0001% spam? 0.01%? 1%?

How would you publish the blacklist? Globally? Rely on individual local DNS operators running their own blacklist? (Good luck getting *off* ten million local blacklists...)

Two options where smallbusiness.com doesn't have the ability to define its
own PTR records.  For example, the PTR record is defined by isp.com.

1) isp.com sets the PTR record to exchange.smallbusiness.isp.com, and
   creates the MTX record for it (2.0.0.10.mtx.smallbusiness.isp.com
   with a value of 127.0.0.1).  If 10.0.0.2 sends spam, isp.com gets
   blacklisted.

Immediately? Would you *really* blacklist eg AOL, Hotmail, or Gmail if you received *one* spam from any of their networks?

If you have paying customers using your mail systems, you'd be out of business in a matter of months.

2) isp.com sets the PTR record to exchange.smallbusiness.com, and
   smallbusiness.com creates their own MTX record
   (2.0.0.10.mtx.smallbusiness.com = 127.0.0.1).  If 10.0.0.2 sends spam,
   smallbusiness.com gets blacklisted.

 and some arbitrary (sub^n)domain A record based on the PTR.

Yes.  That's all.  What format should this arbitrary A record be?

Aside from considerations above, what you've posted is fine, structurally. From a pure "how to publish data" perspective, a new DNS RR type would be slightly better, but reversed IPs concatenated to a subdomain is a well-established way to publish this type of data.

About all your scheme seems to do is identify IPs which may emit legitimate email, generally; it's certainly nothing I'd score at anything more than an advisory -0.001 in SA.

Of course, unless you use a blacklist of domains which have MTX records for
spamming domains.

Well, aside from getting tougher on customers with infected systems, how do you propose to actually stop the spam from being generated? If you can't stop that, you-as-ISP *CAN NOT* fully prevent spam from being relayed through your servers unless you unplug the network and power cables...

Consider the case of a legitimate ISP's outbound relay - most of the mail is perfectly legitimate, but sooner or later *someone* on an IP controlled by that ISP (and therefore allowed to relay through that outbound relay host) will have their machine infected or someone with an account with that ISP will have their password stolen, and then that infected machine will spew out junk via the relay, or a machine somewhere else will use that stolen password to send SMTP AUTH mail through that relay....

We regularly see both of those cases here (medium-sided ISP).

It's an issue of blacklisting.  What is involved in keeping your ISP off of
IP blacklists?

Blocking outbound connections to port 25 from residential IP blocks, responding to reports (cutting of residential customers found to be infected, warning and eventually cutting off static-IP business customers; notifying users whose passwords seem to have been cracked or stolen - among other standard measures). It helps, and we've signed up for the feedback loop widgets with a number of places (AOL, Comcast), but there is NO WAY we can absolutely stop all spam from emitting from IP space under our control, short of turning off our core routers.

This is not exactly unusual.

The more I think about it and the more I read of what you're describing, the more most of it seems like a reasonable component of any blacklist operation, not a whole FUSSP[1] in its own right.

[1] http://www.claws-and-paws.com/fussp.html, among other references

I have been directed to that url frequently in the last few days :)

<g> The form may be a bit tongue-in-cheek, but taking it at face value is helpful in seeing if you're really trying something new, or if you're just putting a new coat of paint on something that's already in practice as a small subset of a larger operation. (Or trying to resurrect a dead horse that was already beaten to a thin paste ten years ago. I don't think you've gotten *that* far yet.)

TBH, what you seem to be trying to do seems far better suited to a local system of some kind that sees where mail is coming from, and whether it's spam or not, and applies some degree of filter white bias to sites generating less spam over time. (.... AWL anyone?) I'd exclude Hotmail, Gmail, and Yahoo from it though; it's far too easy to pick up an account, spew out a bunch of garbage and then drop the account.

It's looking like effort (admittedly, not much) for no real return, given that *any* scheme like this needs a significant fraction of the Internet to be using it to see it behaving properly.

-kgd

Reply via email to