Network Abuse Handling in CNNIC and JPNIC Terence Zhang, CNNIC Izumi Okutani, JPNIC.

Slides:



Advertisements
Similar presentations
Who cares about abuse? Rodney Tillotson, JANET-CERT APNIC, August 2001 United Kingdom Education & Research Networking Association.
Advertisements

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Network Abuse: The APNIC perspective Network Abuse BOF APNIC 12 th Open Policy Meeting.
Copyright (c) 2002 Japan Network Information Center Introduction of JPNICs New Registry System Izumi Okutani IP Address Section Japan Network Information.
Major Activities in JPNIC Since APNIC17 Izumi Okutani Japan Network Information Center NIR 18, Fiji 31 August – 3 September, 2004.
ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
Handling Internet Network Abuse Reports at APNIC 21 October 2010 LAP-CNSA Workshop, Melbourne George Kuo.
Registrar experiences with WHOIS Bruce Tonkin Melbourne IT Ltd.
Proposal of Policy for Mirroring on IRR 2003/08/21 APNIC Junichi Matsumoto Japan Telecom Co., Ltd. JPNIC IRR-Planning Team.
Copyright (c) 2005 Japan Network Information Center JPNIC IPv6 registry service experience Toshiyuki Hosaka Japan Network Information Center (JPNIC) September.
Computer Monitoring System for EE Faculty By Yaroslav Ross And Denis Zakrevsky Supervisor: Viktor Kulikov.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Copyright (c) 2003 Intec NetCore, Inc. All rights Reserved. 1 Proposal: NIR Operated IRR Kuniaki KONDO Intec NetCore, Inc. JPNIC IRR Planning Team Chair.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Live Support A “receptionist” on your website (typing) Can answer questions Transfer calls to different departments Take messages Automatically “push”
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Database SIG APNIC Database Privacy Issues 1 March 2001 APRICOT, Malaysia Fabrina.
Scaling IXPs Scalable Infrastructure Workshop. Objectives  To explain scaling options within the IXP  To introduce the Internet Routing Registry at.
Policy Proposal 109 Standardize IP Reassignment Registration Requirements ARIN XXV 18 April, 2010 – Toronto, Ontario Chris Grundemann.
1 APNIC reverse DNS management roadmap DNS operations SIG, APNIC 21 2 March 2006.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Copyright © 2011 Japan Network Information Center JPNIC ’ s RQA and Routing Related Activities JPNIC IP Department Izumi Okutani APNIC32 Aug 2011, Busan.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 43 Shopping on the Internet.
Copyright © 2008 Japan Network Information Center JPNIC's review of IPv4 address transfer  Izumi Okutani  Japan Network Information.
Desired IRR Operational Model ~IRR/Whois Interaction~ Kuniaki Kondo (JPNIC IRR Workshop/IIJ) Ikuo Nakagawa (Intec) Takashi Arano (Asia Global Crossing)
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
APNIC Internet Routing Registry An introduction to the IRR TWNIC Meeting, 3 December 2003 Nurani Nimpuno, APNIC.
Draft Policy Standardize IP Reassignment Registration Requirements ARIN XXVI 6 October, 2010 – Atlanta, Georgia Chris Grundemann.
IP Policy in APNIC and What about TWNIC ? Kuo-Wei Wu.
Consultation on Policy Documentation Adam Gosling APNIC 40 Policy SIG 10 September 2015.
IPortal Bringing your company and your business partners together through customized WEB-based portal software. SanSueB Software Presents iPortal.
1 DMIS COG Administrator Course DMIS Web Services Release 2.3.
Welcome meeting for Erasmus students School of Modern Languages and Cultures.
Network Abuse Update Frank Salanitri Project & Systems Services Manager, APNIC.
Self-Service Open Resolver Scanning Duane Wessels DNS-OARC Workshop Dublin May 12, 2013.
3.4 How do businesses operate1 Unit 3.3/4.3 Information in Decision Making.
What is WHOIS?. 2  Internet Protocol you can use to search registry and registrar databases and discover who registered a domain name or IP address 
JPNIC Open Policy Meeting Update Yuka Suzuki IP Department Japan Network Information Center (JPNIC) NIR Meeting Aug. 21st, 2003.
Inaccuracy of IRT-Objects Aftab A. Siddiqui Cyber Internet Services (Pvt) Ltd/ IPv6 Task Force Pakistan/ NRO NC/ASO AC.
APNIC Security Update APSIRCC 2002 Tokyo, 25 March 2002.
Izumi Okutani JPNIC IP Department NIR Meeting Feb 2004 JPNIC Open Policy Meeting Update.
IP Addressing and ICT Development in the Pacific Islands Anne Lord and Save Vocea, APNIC ICT Workshop, Fiji, November, 2002.
IP Address Management Team KRNIC Project for Updated and Advanced Whois Database August, 2003 IP Address Management Team Korea Network Information Center.
Update of WHOIS Data Privacy in JP Izumi Okutani Japan Network Information Center (JPNIC) DB SIG APNIC Indonesia.
KRNIC Development Plan of IPv6 Management System Korea Network Information Center Mar
A week in the life of (IRT address) Frank Salanitri Project & Systems Services Manager, APNIC.
APNIC abuse procedures Network abuse BOF. Types of abuse reported Spam Hacking Viruses Identity/credit card fraud Threats and stalking.
JPNIC UPDATE ~ Personal Data Protection in JPNIC WHOIS ~ Toshiyuki Hosaka Japan Network Information Center (JPNIC) September 7 th, 2005 NIR SIG APNIC
Proposed APNIC protocol for handling of abuse complaints Network abuse BOF Gerard Ross, APNIC.
JPNIC Update Izumi Okutani Japan Network Information Center APNIC19, NIR SIG.
Membership closure management Vivek Nigam
Margie Milam, Senior Director 27 March 2014 Privacy/Proxy Accreditation Survey Results.
Whois & Data Accuracy Across the RIRs. Terms ISP – An Internet Service Provider is allocated address space by an RIR for the purpose of providing connectivity.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
1 FRED – open source registry system CZ.NIC, z.s.p.o. Jaromír Talíř
The Importance of Whois Accuracy Leslie Nobile
Whois Data Privacy Issues in Japan
Where to from here…...
Consideration on IPv6 Address Management
Izumi Okutani (JPNIC) Terence Zhang (CNNIC)
A Proposal of “IRR Mirroring Policy”
A week in the life of (IRT address)
Izumi Okutani (JPNIC) Terence Zhang (CNNIC)
CNNIC IP group of Technical dept. 23 Feb. 2005
Privacy of Customer Assignment Records
Kuniaki Kondo IRR Workshop Chair, JPNIC IIJ
Disclosures Right to Consent You have a right to consent to how Innovative Results Group / IRG Consulting uses your data. Below is a list of the data.
Presentation transcript:

Network Abuse Handling in CNNIC and JPNIC Terence Zhang, CNNIC Izumi Okutani, JPNIC

Contents Whois operated by NIRs IRT object in NIR Whois Network abuse handling as an NIR Observation from abuse handling in an NIR Abuse Handling in an ISP –Example –Observation Issues about Abuse Handling with Whois contacts Future Considerations

Whois operated by NIRs Whois operations vary by NIRs CNNIC and JPNIC run our own Whois in our own languages We mirror with APNIC Whois to have consistent information Most ISPs in our economies refer to NIR Whois to view information in their own language

IRT object in NIR Whois Situation varies depending on NIRs CNNIC WHOIS has IRT object, but it’s not mandatory –According to survey, most network-abuse contact is the same as tech-c JPNIC WHOIS doesn't have IRT object –Based on community's feedback –Our community felt more needs for correctness of POCs than creating a new object

Network abuse handling as an NIR Our main role is to provide whois query services and to maintain the Whois database We require member organizations register valid contact details in the whois database, but we don't verify if those contact is valid When we receive network abuse complaints, we advice to contact POCs of upstream ISP and the network in question (in JPNIC) –JPNIC receive about 500 comlaints per week –Responds to , takes about 1.5h-2h of our HM's time per week

Observation from abuse handling in an NIR People send complaints by machines, so always the same people send us s, even if we advice them to contact the upstream ISP Some ISPs consider abuse handling as additional cost, and do not wish to register an effective POC Small enterprises do not have staff who can handle complaints in English LIRs wish to exchange POCs with each other rather than make it public privacy reasons, avoid spam An example from JPNIC

An Example of Abuse Handling in an ISP Keep whois contacts up to date, and have an agreement with their customers –Not to use their network service to perform abuse activities like spamming,hacking and phishing When they receive spamming complaint –they will notify the server administrator to investigate When they receive complaint about phishing activities: –they will do some basic analysis like whois query to verify, if they confirm that's phishing, they will block the phishing server's IP, and contact the server owner to further investigate. When they receive complaint about hacking activities: –they will check their log to verify, if they confirm the hacking activity, they will block the server's IP, and contact the server owner to further investigate. An example from an ISP in China

Observation from abuse handling in an ISP in China Most organizations in China tend to strengthen their network security mechanism (software or hardware) to prevent hacking and filter spam Also there are widely recognized software to automatically check about phishing if you are visiting major banking or online-shopping web sites Hence there are not many people choose to complaint to ISP or registry about network abuse activities Observation from an ISP in China

Issues about Abuse Handling with Whois contacts Whois POCs are not always considered as an effective way for reaching an appropriate POCs in its current state Registering POCs generate spams for ISPs, which lowers the motivation to register effective POCs

Future Considerations Is there an effective way to exchange POCs without generating spams? –There is a talk about privately exchanging PKIs between POCs for our major operators for IRR in Japan –allow LIR portable to share POC info between LIRs? Would co-ordination with local CERTS be useful? –Registries simply provides POCs and not involved in co- ordination between parties, but sometimes this is requested especially due to language problem Do we need a mechanism to ensure updating reachable POCs in WHOIS? –we do garbage collections of registered objects in JPIRR