[129344] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: ISP port blocking practice

daemon@ATHENA.MIT.EDU (Owen DeLong)
Fri Sep 3 08:19:00 2010

From: Owen DeLong <owen@delong.com>
In-Reply-To: <4C8074D6.9050802@brightok.net>
Date: Fri, 3 Sep 2010 05:15:15 -0700
To: Jack Bates <jbates@brightok.net>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Sep 2, 2010, at 9:08 PM, Jack Bates wrote:

> Patrick W. Gilmore wrote:
>>> We should be seeking to stop damaging the network for ineffective =
anti spam measures (blocking outbound 25 for example) rather than to =
expand this practice to bidirectional brokenness.
>> Since at least part of your premise ('ineffective anti-spam =
measures') has been objectively proven false to fact for many years, I =
guess we can ignore the rest of your note.
>=20
> He's right though. tcp/25 blocks are a hack. Easy man's way out. =
Honestly, it'd be nicer if edge or even core systems could easily handle =
higher level filtering for things like this. There's plenty of systems =
that watch traffic patterns and issue blocks based on those patterns.
>=20
> I was working with a hotel today concerning just that. They were only =
doing a generic 500 connections in x period, block mac. They are now =
adding a tighter rule for 15 tcp/25 connections in 1 minute, block =
tcp/25 (or mac, doesn't matter to me). Of course, we didn't see valid =
reasons for mail blasts to be leaving a hotel and 15/minute is plenty of =
grace for a normal user. At an ISP level, it would work fine, though =
methods for determining exceptions would have to be planned (though that =
could easily be handled by customer classifications like everything =
else).
>=20
This seems to me like it would be much more effective and less damaging =
without being significantly harder to implement.

>> Also, just so everyone doesn't think I'm in favor of "damaging" the =
network, I would much prefer a completely open 'Net.  Who wouldn't?  =
Since that is not possible, we have to do what we can to damage the =
network as little as possible.  Port 25 blocking is completely =
unnoticeable to something on the order of 5-nines worth of users, and =
the rest should know how to get around it with a minimum of fuss =
(including things like "ask your provider to unblock" in many cases).
>=20
> Blocking inbound vs outbound is another story, though. Getting people =
to implement spoof protections is more useful. I'd be interested to see =
your data for concluding 5-nines of users, or did you just make that up?
>=20
I'm all for anti-spoof (BCP-38) and strict/loose (as appropriate) RPF. I =
implement those things on networks I run. That's not damage, that's =
blocking things that shouldn't happen.

I'd also like to see his data to support his claim that it is somehow =
effective at reducing spam.

Owen



home help back first fref pref prev next nref lref last post