ietf-asrg
[Top] [All Lists]

Re: [Asrg] What are the IPs that sends mail for a domain?

2009-06-18 15:01:58

On Jun 17, 2009, at 5:51 PM, der Mouse wrote:

Factors that make managing an IPv6 block-listing service fairly impractical go beyond 96 additional address bits.

1) Publishing behavior based address lists require evidence collection in the event of disputes, and this does not scale well. (expensive)

I can't see why v6 versus v4 makes any difference at all to this.

You have concluded that resolution of an IPv6 address reputation can safely ignore portions of the address. Assuming the lower bits don't matter (64 bits of interface or 16 bits of site level identifiers, which will in some cases), that still leaves 53 or 37 bits of unicast address space in which to contend.

This also represents a space likely to evolve as routes become consolidated. In an effort to constrain zone growth and to thwart address hopping, IPv4 addresses may have been consolidated into CIDRs that don't cross route announcements when the majority of addresses abuse email. This might then result in a CIDR of /30 that contains a single IP address where evidence had not been collected. Invariably, the user of that one IP address will complain and request removal. Imagine who might be affected when CIDR consolidation goes from groups of of 256 or 4096 to groups of 18x10^18 or 1.2x10^24 based upon the evidence of a single IP address?

In addition, the collection of IP address related evidence must be retained and reviewed. IPv6's increased range ensures a greater workload for review and a much greater need for storage. This increase will entail a sizable expenditure.

2) IPv6 to IPv4 and IPv6 to IPv6 NATs obfuscates who might be involved. (problematic)

I can't see why this is any worse than the v4-to-v4 NATs the net is already full of.

It is not as common to find carrier grade NATs. Excluding these sources has already become problematic in a few countries, and will only get worse.

3) Reverse DNS scanning does not scale well. (slow)

True. DNSBLs that depend on rDNS scanning may die. There are plenty of DNSBLs, including some of the most useful, that do not.

A reactive system that list addresses as abused and then automatically expire provides bad-actors two advantages:

a) bad-actors can avoid effective blocking by rapidly moving both source and target.

b) professional bad-actors can quickly identify the location of spam traps.

4) Diverse and rapidly expanding address space allows bad-actor's activity to stay ahead of the massive amounts of IP address related information publishing. (futile)

I see no real difference here between a v4 list that lists at the / 32 level and a v6 list that lists at the /48 (or maybe even /64) level.

It already takes minutes to build zones and distribute information. Making zones larger increases processing and transfer time which already erodes effectiveness.

5) An extremely low cost for IP addresses allows bad actors to persist at sporadic use for many years. (futile)

And this differs from v4...how?

It is fairly common to see abusive activity cycle through a range of addresses for one day every few weeks. With IPv6, the addresses being abused could then cycle through a range for 1 minute every decade. What policy deal effectively with that strategy?

The collection of evidence is often constrained by the related identifier, such as the IP address. Unfortunately, IPv6 allows a new IP address to be used for each message sent.

So, collect evidence at the /64, or even /48, level, rather than at the individual address level.

Even to the extent that these problems are real, they are theoretical. It certainly behooves us to think about them ahead of time, but absent experience demonstrating that they are more than potential, I don't see them as a reason to give up on v6 DNSBLs without even trying.

It seems insane to repeatedly do the same thing and then expect different results each time. IPv4 is already approaching the majority of all the addresses being blocked. It will not be long for this to transition into only listing IP addresses registered as outbound mail servers. The registration process might be as simple as having both an MX and CSV record published.

Pushing responsibility to the edge does not work, and email provides ample evidence.

It's not that doing that has been tried and found wanting; rather, it has not been tried.

Have you heard of SPF?

SPF represents a strategy to shift MTA accountability onto the domains of their customers (the preverbal edge). This scheme may entail a maximum of 10 or 11 SPF record transactions, which may then include 10 transactions per contained MX target. For each legitimate message, there is typically at least 20 abusive messages (which also publish SPF records). So the potential of 10 to 200 additional SPF transactions (when Sender-ID is included) should be multiplied by 20, where the 200 transactions becomes 4000 per legitimate message.

The ratio of legitimate to abusive is getting worse. At what point does one admit that SPF, when used as designed, does not scale, that it imperils the integrity of DNS, and that it imperils the viability of SMTP. If nothing else, SPF/Sender-ID has been responsible for delaying more scalable and safer solutions. Just as you can't ask lenders using securitization to dodge lending accountability how they might be held accountable, you can't ask a group of large providers this question either and expect a reasonable answer. The system needs to hold providers directly accountable. That is what CSV attempted, where publishing too many such records or using too many EHLOs should also be considered abusive.

(Actually, it has been tried in a limited way; there are pieces of the net that _do_ push responsibility to the end user. Oddly enough, they are basically nonexistent as far as abuse emitters go; what evidence I see indicates that it _does_ work.)

Can you provide some specifics?

-Doug

_______________________________________________
Asrg mailing list
Asrg(_at_)irtf(_dot_)org
http://www.irtf.org/mailman/listinfo/asrg

<Prev in Thread] Current Thread [Next in Thread>