[129330] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: ISP port blocking practice

daemon@ATHENA.MIT.EDU (Daniel Senie)
Thu Sep 2 23:05:04 2010

From: Daniel Senie <dts@senie.com>
In-Reply-To: <ADDAD2C4-04B0-4E61-AF65-826186A4BD94@umich.edu>
Date: Thu, 2 Sep 2010 23:04:54 -0400
To: Zhiyun Qian <zhiyunq@umich.edu>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Ingress filtering is the correct tool for the job. The whole point here =
is that packets are coming from somewhere they should not, and they are =
thus spoofed. The tools have been in place to deal with this for a very =
long time now. The drafts that became RFC 2267 (precursor of RFC 2827 / =
BCP38) date from mid-1996. Paul and I wrote the original drafts to solve =
something else, but the issue is the same. Solving the vector you're =
concerned about doesn't need another layer of implementation in the mail =
servers. The packet routing fabric needs to handle it, and doing so =
addresses far more than just the email situation. I agree it'd be nice =
to get the asymmetric attack stopped, but disagree we need yet another =
mechanism to do it.

- Dan


On Sep 2, 2010, at 10:55 PM, Zhiyun Qian wrote:

> I skimmed through these specs. They are useful but seems only related =
specific to IP spoofing prevention. I see that IP spoofing is part of =
the asymmetric routing story. But I was more thinking that given that IP =
spoofing is not widely adopted, the other defenses that they can more =
perhaps more easily implement is to block incoming traffic with source =
port 25 (if they already decided to block outgoing traffic with =
destination port 25). But according to our study, most of the ISPs =
didn't do that at the time of study (probably still true today).
>=20
> -Zhiyun
> On Sep 2, 2010, at 9:20 PM, Suresh Ramasubramanian wrote:
>=20
>> BCP38 / RFC2827 were created specifically to address some quite
>> similar problems.  And googling either of those two strings on nanog
>> will get you a lot of griping and/or reasons as to why these aren't
>> being more widely adopted :)
>>=20
>> --srs
>>=20
>> On Fri, Sep 3, 2010 at 7:47 AM, Zhiyun Qian <zhiyunq@umich.edu> =
wrote:
>>> Suresh, thanks for your interest. I see you've had a lot of =
experience in fighting spam, so you must have known this. Yes, I know =
this spamming technique has been around for a while. But it's surprising =
to see that the majority of the ISPs that we studied are still =
vulnerable to this attack.  That probably indicates that it is not as =
widely known as we would expect. So I thought it would be beneficial to =
raise the awareness of the problem.
>>>=20
>>> In terms of more results, the paper is the most detailed document we =
have. Otherwise, if you interested in the data that we collected (which =
ISPs or IP ranges are vulnerable to this attack). We can chat offline.
>>>=20
>>> Regards.
>>> -Zhiyun
>>=20
>>=20
>=20
>=20



home help back first fref pref prev next nref lref last post