On 10/28, David F. Skoll wrote:
> Perhaps you have heard of a recent phenomenon called "a botnet"?  Just
> what security do you think TCP really buys you?

Requiring them to use the botnet.

> And what kind of account registration do you envision that lets you
> easily register "millions" of accounts?

Free.  Unrestricted.

> We have some users who report to us whom we do not charge.  These are
> MIMEDefang users that we know and trust, and who use our Perl client
> library to report back.

Right, so you're doing something quite different.

> That's why I think it's folly to accept IP reputation submissions from people
> with whom you have no trust relationship.  They could be feeding you utter
> garbage and you'd never know.

Yeah, that's the primary problem with what I was talking about.  As I said.
The reason I posted about it.  I think it might be possible to get useful
data out of it.  It would probably be challenging.

Which is precisely why I feel it is absolutely necessary to prevent the
sender IP forging which UDP allows.

> Hence, we restrict reports to people we know and trust and to our
> customers.  (We may not know and trust all of our CanIt customers, but
> we have a reasonable level of trust in the reporting software.  It
> would take a fair bit of effort for one of our customers to try to
> game the system.)

And that's great for you, but not for people who aren't paying you.

> Apart from the fact that our system has been running in production for
> many months, has collected billions of reports, collects >1000
> reports/second on commodity hardware with practically no CPU overhead,
> has been used to build DNSBL lists of 8 million+ machines, and has a
> peer-reviewed RFC incorporating many suggestions from knowledgeable
> experts in the field, no, I can't really think of a reason.

So if I just open a socket, dump over the IP, whether it's ham or spam, and
maybe a protocol version, it just won't work huh?

That RFC is a great checklist.  But I really don't see a reason to conform
to it.


On 10/28, David F. Skoll wrote:
> On a somewhat less sarcastic note:  One reason we didn't use TCP is that
> it simply doesn't scale.  If you have clients that open a TCP connection,
> do a report, and then close the TCP connection, there's a huge bandwidth
> penalty.  On the other hand, if your clients maintain persistent TCP
> connections, your server is going to run out of sockets rather quickly.

I expect scaling to be much more of an issue with your reputation system
than the free system I've been talking about.  And if I'm wrong, I hope
others will donate server resources.  As has happened with similar
projects.

Also, sender IP forging.

> Remember, our system is designed to scale to tens or hundreds of thousands
> of reporting systems sending tens or hundreds of thousands of reports
> per second.

That's great.  And not what I expect to do.


On 10/28, Lawrence @ Rogers wrote:
> What reporting system do you use? and how does one avail of the data
> it provides?

http://www.roaringpenguin.com/products/canit-reputation-rbl

Pay them.

-- 
"Government is not reason, it is not eloquence, it is force; like fire,
a troublesome servant and a fearful master. Never for a moment should
it be left to irresponsible action." - George Washington
http://www.ChaosReigns.com

Reply via email to