Who cares about abuse? Rodney Tillotson, JANET-CERT APNIC, August 2001 United Kingdom Education & Research Networking Association.

Slides:



Advertisements
Similar presentations
Clara CSIRTs in Latin America and the Caribbean CCIRN 2004 Cairns, Australia July 2004 Michael Stanton CLARA Technical Committee RNP- Brazil (material.
Advertisements

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E BOF: Network Abuse APNIC 12 th Open Policy Meeting Taipei, TW, 30 August 2001.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Network Abuse: The APNIC perspective Network Abuse BOF APNIC 12 th Open Policy Meeting.
Broadband Guideline Takashi Arano APNIC WG-BB Chair.
Policy SIG report 29 February 2008 APNIC 25, Taipei Toshiyuki Hosaka Randy Bush Jian Zhang.
R I P E N e t w o r k C o o r d i n a t i o n C e n t r e. h t t p : / / w w w. r i p e. n e t. n c r i p e. n e t 1 The Internet Registry System IPv4.
Anti-SPAM activities in Malaysia - Current Situation, Regulatory Environment and Future Developments ITU virtual conference on anti-spam regulation and.
Computer Emergency Response Teams
E - safety How e-safe are you?.
By Andy Scott, Michael Murray and Adam Kanopa
Internet – Part I. What is Internet? Internet is a global computer network of inter-connected networks.
Anti-Spam Management for Service Provider in Malaysia Alan Lee NTT MSC.
Introduction to the Anti-Spam Research Group (ASRG) Presented by Yakov Shafranovich, ASRG Co-chair NIST Spam Technology Workshop Gaithersburg, Maryland,
IPv6 Deployment CANTO Nate Davis, Chief Operating Officer 13 August 2014.
Managing IP addresses for your private clouds 2013 ASEAN CAS Summit Bangkok, Thailand 7 February 2013 George Kuo Member Services Manager.
Internet Identity For All.my ccTLD IPv6 Update By Lai Heng Choong Head of Application, Database and Security.my DOMAIN REGISTRY APTLD Member Meeting, 1.
Internet Online Safety How to have FUN and Stay in Control.
Handling Internet Network Abuse Reports at APNIC 21 October 2010 LAP-CNSA Workshop, Melbourne George Kuo.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Implications and Security Issues of the Internet By Neelesh Patel.
Using Traffic Analysis to Detect Spam Richard Clayton TERENA, Lyngby, 22 nd May 2007.
Joint efforts in incident response in AP region and future work with RIR Suguru Yamaguchi JPCERT/CC.
Methods for Stopping Spam James Lick
COS 125 DAY 4. Agenda Questions from last Class?? Today’s topics Communicating on the Internet Assignment #1 due Assignment #2 will be posted next week.
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
| University of Missouri Copyright ©2007 MOREnet and The Curators of the University of Missouri Statenet Security on the cheap and easy Beth.
1 Fighting Spam at AOL: Lessons Learned and Issues Raised Carl Hutzler Director of Anti-Spam Operations America Online, Inc. 12/9/2005.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Mapping Out Cyber Crime Infrastructure A Law Enforcement Approach Jon Flaherty UK National Cyber Crime Unit 13 th May 2015 RIPE 70 - Amsterdam.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
Taiwan Network Information Center Spam Status & Anti-Spam Schemes in Taiwan Taiwan Network Information Center David Chen Sep 5, 2002.
Network Abuse Handling in CNNIC and JPNIC Terence Zhang, CNNIC Izumi Okutani, JPNIC.
Combating Abuse Brian Nisbet NOC Manager HEAnet.
Taking Common Action Against Spam Internet Society of China Beijing – 2004 Dave Crocker Brandenburg InternetWorking
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
Malaysia’s strategy to combat SPAM Anti-SPAM Strategies: The Way Forward for the ASEAN Telecommunications Regulators Council (ATRC) Toh Swee Hoe Malaysian.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
1 Internet Presentation GCC-IT commity Saleem Al-Balooshi ETISALAT.
Telecommunications Communication over a long distance; Distant communication.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
1 APNIC Update. 2 4th time at NZNOG … Let’s do something different this time.
SCAMS and SPAM John Corker Senior Associate. Oz NetLaw  National Internet legal practice of the Communications Law Centre.  Website at oznetlaw.net.
A Retrospective on Future Anti-Spam Standards Internet Society of China Beijing – September, 2004 Dave Crocker Brandenburg InternetWorking
Phishing Problem Kristián Kučerák Milan Just. Abstract In this age of broadband, wireless, and network interconnectivity, we enjoy the unprecedented power.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
(Electronic Mail) Most popular use of Internet technology Advantages Disadvantages Setting up an account Your account –User id and password.
Internet Services. Internet Services: Discussion Groups The Internet is not just the world wide web, it also includes: discussion groups: newsgroups,
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
APNIC Security Update APSIRCC 2002 Tokyo, 25 March 2002.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
IP Addressing and ICT Development in the Pacific Islands Anne Lord and Save Vocea, APNIC ICT Workshop, Fiji, November, 2002.
Open Source abuse management by Erik Bais. Talking points -The history of AbuseIO -Why AbuseIO -Features -Deployment at A2B Internet -Workflows -Questions.
Rob Blokzijl. RIPE 61 Rome, November RIPE Réseaux IP Européens Rob Blokzijl RIPE Chairman
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
A week in the life of (IRT address) Frank Salanitri Project & Systems Services Manager, APNIC.
1 The Internet Registry System Mirjam Kühne RIPE NCC EC-POP Brussels 5 July 1999.
IPv4 IXP Address Policy APNIC Policy SIG Meeting Taipei, August 2001 Philip Smith.
1 Transition to IPv6: Should ISPs consider it now? PITA 11th AGM Meeting 2007 Tahiti, French Polynesia 24 April 2007.
Keith Mitchellhttp:// RIPE ncc IP Address Space Governance Keith Mitchell Executive Board Chairman, RIPE NCC (Chief Executive, LINX) European.
Mirjam Kühne. AfNOG Conference, 11 May Operational Co-ordination in the RIPE Region presented by: Mirjam Kühne RIPE NCC.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
Whois & Data Accuracy Across the RIRs. Terms ISP – An Internet Service Provider is allocated address space by an RIR for the purpose of providing connectivity.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
How to Know if You Need a Dedicated IP Address for Your Website?
Whois Data Privacy Issues in Japan
We Care About Data Quality at IXPs
Information Security Session October 24, 2005
Presentation transcript:

Who cares about abuse? Rodney Tillotson, JANET-CERT APNIC, August 2001 United Kingdom Education & Research Networking Association

Three points UBE is like other abuse Only global consensus will stop it We would like to talk with AP

RIPE Réseaux IP Européens Anti-spam Working Group WG chair

RIPE view Originate no spam Persuade originators to stop Block and filter

Originate no spam Contracts with customers Penalties available Act on reports of abuse RIPE-206

Problems Free accounts Cybercafé use Competitive advantage

Block and filter Local choice MAPS Other blacklists Outbound blocks

Filtering Content-based Subjective, always changing Can help with other abuse –Viruses, porn

DNS blacklists Test IP addresses Hooks in most mailers –(but not Exchange) Getting on/off the list –Who decides?

Other public blacklists ORBS not now operating Several others –A variety of behaviours

MAPS Paul Vixie, Dave Rand Highly respected Thorough, not fast –Will let through some spam Pressure on originators

MAPS update Subscription only from 1 Aug 2001 Costs –DNS operation –List management –Legal

UBE What is spam? –Usenet Unsolicited Bulk

Pressure on originators RBL –Realtime Blackhole List Focus for consensus and conflict –Advice on good practice

Other abuse The issues are the same Consensus is better Compliance is about the same

Who said this? I dont want to report spam to the spammers ISP. I want to report it to my own ISP, or if I am an ISP then I want to report it to my own peers. They ought to verify my identity and the complaint format and then pitch it on to their peers or upstreams or customers or whatever and so on …

Who said this? … until it finally gets to the owner of the the address space which is being abused. If that owner wont act, then they ought to lose peering or be dropped as a customer or whatever, because the standard contracts among Internet peers and between customers and their ISPs ought to require proper response.

Who said this? Paul Vixie –To a private list, June 2001 –(quoted with permission)

UBE issues with AP US is the major source Many relays in AP –Increased early 2000 Little response from

Code Red Many sources in AP –Fewer in US (still too many) Unclear where to report it Lots in JANET, too!

JANET-CERT Coordinate security responses Contacts at customer sites Network blocks if needed Contacts with other CSIRTs

Other CSIRTs FIRST TERENA Trusted Introducer

AP CSIRTs Useful responses from AP CSIRTs –AUS-CERT, JP-CERT, KR-CERT etc Whois data usually available –Not easy to find abuse contact

My guess Fast-growing networks and user communities –Support lags behind –Many small companies Expectations are different Guidance is in (bad) English

Those points again UBE is like other abuse Only global consensus will stop it We would like to talk with AP

My questions How should we make contact? What problems do you have with the RIPE region? Do we need a new forum? How can we help? Who cares about abuse?

Your questions?

Thank you! Rodney Tillotson senior JANET-CERT member