ietf-asrg
[Top] [All Lists]

Re: [Asrg] What are the IPs that sends mail for a domain?

2009-06-17 20:18:53

On Jun 17, 2009, at 7:59 AM, Steve Atkins wrote:
On Jun 16, 2009, at 4:17 PM, Daniel Feenberg wrote:

Because it would be impossible to maintain a DNSBL for IPV6,

I keep hearing people say this, but I've not seen any clear justification for it. It seems to me to be no more difficult to run a blacklist for IPv6 addresses than IPv4 addresses (neither is easy, but the details of the address representation don't seem to make more than minor differences).

Can you expand on why you think it's the case, or point me at some discussion of it?


Factors that make managing an IPv6 block-listing service fairly impractical go beyond 96 additional address bits. The term impractical is used because, with enough money, anything is possible.

1) Publishing behavior based address lists require evidence collection in the event of disputes, and this does not scale well. (expensive)

2) IPv6 to IPv4 and IPv6 to IPv6 NATs obfuscates who might be involved. (problematic)

3) Reverse DNS scanning does not scale well. (slow)

4) Diverse and rapidly expanding address space allows bad-actor's activity to stay ahead of the massive amounts of IP address related information publishing. (futile)

5) An extremely low cost for IP addresses allows bad actors to persist at sporadic use for many years. (futile)

The collection of evidence is often constrained by the related identifier, such as the IP address. Unfortunately, IPv6 allows a new IP address to be used for each message sent. Some countries already place thousands of MTAs behind carrier grade NATs. Any scheme that concludes the use or abuse of an IP address indicates which individual originated a message makes it ill-equipped to deal with today's evolving network environment. Block-listing must soon be replaced by acceptance-listing. Things like CSV would permit a means to consolidate the sources managed by acceptance-lists, where reputation could be based upon MTA domains, rather than a vast array of IP address or the domains controlled by their customers.

With email so heavily abused, attempting to acquire and process the ten to two hundred SPF transactions per message is not possible at today's magnitude of abuse per legitimate message. SPFs use of macros and exists functions requires a process done in conjunction with message acceptance, while at the same time placing DNS itself in peril. Any strategy that attempts to place the customers of an email provider responsible simply does not scale as an abuse deterrent. Management efforts can be reduced a million fold when directly holding the immediate outbound public MTA accountable, rather than attempting to shift accountability toward one of a provider's many users, which is the real (and admitted) motivation behind SPF/Sender-ID/A-R. This Nast cartoon depicts the situation fairly well by changing the question to asking who is responsible for email's dire situation and having the men in the circle represent that of the providers.

http://en.wikipedia.org/wiki/File:Tammany_Ring,_Nast.jpg

Pushing responsibility to the edge does not work, and email provides ample evidence. This nonsense is putting the Internet itself in peril.

-Doug



_______________________________________________
Asrg mailing list
Asrg(_at_)irtf(_dot_)org
http://www.irtf.org/mailman/listinfo/asrg

<Prev in Thread] Current Thread [Next in Thread>