IIALP - Abuse Logging Protocol 173
George Davey sent us a press release about abuselog.org, a site for the development of a generalized protocol for logging internet annoyances and abuses to a set of central servers, which could then be queried to find out which IPs are luserish.
that's cool! (Score:5, Funny)
which could then be queried to find out which IPs are luserish.
Interesting: 66.35.250.150 and 66.35.250.151 are the only entries. Truly uncanny AI.
Re:that's cool! (Score:1)
For some record types the condensed records might be compressed
in a supported compression format for that template set.
A template set is a specification set for a template format for
a full and a condensed record pair.
Supported compression types will likely be added as new
technologies arise.
Encoding is necessary for SPAM
Re:that's cool! (Score:5, Informative)
Web site for the Iowa Internet Annoyance Logging Protocol (IIALP) Working Group.
IIALP is pronounced: E'-alp.
A copy of the current IETF "Internet-Draft" which represents a work in progress for IIALP is here:
http://www.ietf.org/internet-drafts/draft-davey-i
RTF versions of all the internet-draft work in progress revisions are here::
http://www.abuselog.org/Documents/00/draft-davey-
http://www.abuselog.org/Documents/00/draft-davey-
Next Revision Peak Ahead:
Working on the sample templates and template root structure
Your comments are welcome, please email your comments to the email address shown below:
Make sure to include IIALP first in the subject line followed by the actual subject.
Is it RFC3514 compliant? (Score:3, Funny)
Re:that's cool! (Score:1)
Re:that's cool! (Score:1)
I hope (Score:5, Insightful)
In and of itself, this could be very easily abused by, say, people with a grudge who want to essentially get someone else an internet death penalty.
Re:I hope (Score:1)
Re:I hope (Score:1)
Re:I hope (Score:2)
Re:I hope (Score:5, Interesting)
I recently had Comcast shut down my port 25 access due to spam reports. Of course, they refused to tell me who reported me or what they reported, so even giving them logs of my outgoing port 25 access from a sniffer isn't enough for them to remove the mark from my record. (However, if I tell them I went to Windows update and ran a virus scanner they enable my access again. Nevermind that Windows Update doesn't do much on my Linux box.
Re:I hope (Score:2)
So tell 'em you've upgraded your operating system (true enough) and hopefully whatever typo screwed you in the first place won't happen again.
Re:I hope (Score:4, Interesting)
I recently had Comcast shut down my port 25 access due to spam reports. Of course, they refused to tell me who reported me or what they reported, so even giving them logs of my outgoing port 25 access from a sniffer isn't enough for them to remove the mark from my record.
And for starters, we could use some legislation requiring cable companies to treat all customers equally, regardless of how much they're paying. If you have a business account for cable modem service, they'll forward you reports of spam or other abuses (ie: port scanning from your machine), and they'll bend over backwards to help you, and if you say "there is no way this is my machine", they'll actually accept it on the first try and push the complainant to give more details or more proof.
(yes, I know legislation for that will never work, but it's most unfortunate that end users can get screwed more easily just because they're paying less. I mean, the power company won't ignore your report of a blackout just because you don't keep your lights and A/C on 24 hours a day)
Re:I hope (Score:1)
You're new to the country aren't you?
Re:I hope (Score:2, Insightful)
That is a sure way to legislate that they charge everyone the same price and offer exactly one level of (lousy) service.
Re:I hope (Score:4, Informative)
Re:I hope (Score:2, Insightful)
There is a pair of ID's on DNSBL technical details [ietf.org]and best practices [ietf.org] which seems to me more than enough. Actual law would be hopelessly unenforced window-dressing (see the millions of spamming zombies around the USA? Every one is a federal felony in pro
Re:I hope (Score:1)
Re:I hope (Score:1)
I think the worst of those RBLs is the Blars [blars.org] one. The guy is a pompous ass who has serious attitude problems. I already had to spend hours getting our newly-assigned IP off of a dozen other lists, and they had fully-automated systems to verify that my system wasn't a spamhouse. He doesn't even accept removal requests without payment! Sounds like a blackmail scheme to me. I basically figured that I shouldn't need to worry about someone like that, but that kind of disregard for the social contracts of the Int
Re:I hope (Score:1)
Also, if your "newly-assigned IP" was already on "several dozen" other lists then your service provider probably doesn't have a very strong anti-spam enforcement policy. As well, your service provider pro
Re:I hope (Score:2)
And once again, restriction of free speech in the name of "fairness" rears its ugly head...
The proper thing to do in this case is to stop patronizing Comcast -- or, alternatively, live with it, if it's not that important to you. Telling the government to handle it for you is generally not the
Re:I hope (Score:3, Interesting)
However, if your version of "free speech" include
Re:I hope (Score:3, Insightful)
Incidentally, this is seperate from Comcast's right to use their private equipment as they see fit -- which is what blocking ports based on spam reports is.
Re:I hope (Score:1)
Re:I hope (Score:1)
A shameless plug (Score:2)
Re:I hope (Score:4, Interesting)
If this group is merely validating complaints by including only those that have been submitted on many different occasions by unique hosts, then a malevolent individual could hypothetically establish a distributed network of compromised machines - perhaps by deploying an Internet worm - and then submit his false complaint, thus circumventing that precaution.
Re:I hope (Score:1)
Re:I hope (Score:1)
I've got a better idea. Why not propose a standard abuse@domain way to report abuses? A human has to look over them anyway, and it's gonna be the ISP, so why should we make up some new scheme to capture the complaints? Just give me an abuse address and a responsive abuse department and I'm fine, thanks.
I'll take a human with soft skin over a machine that pretends to be smart.
Re:I hope (Score:1)
I troll slashdot (Score:1, Funny)
Trolls untied!
Re:I troll slashdot OFF-Topic Reply -1 -1 -1 -1 -1 (Score:2)
DHCP and MAC (Score:4, Interesting)
Re:DHCP and MAC (Score:5, Informative)
Re:DHCP and MAC (Score:1)
People could complain about an IP, but have the complaints automatically assigned as knocks against the ARIN the IP falls in.
Core BGP routers could be set to a particular threshold level of complaints, after which they'd drop their routes to that ARIN for a set period of time, in some sort of back-off protocol.
Of course, this doesn't solve the dis
Re:DHCP and MAC (Score:2)
Re:DHCP and MAC (Score:5, Interesting)
Re:DHCP and MAC (Score:2)
Re:DHCP and MAC (Score:2)
Re:DHCP and MAC (Score:4, Interesting)
Re:DHCP and MAC (Score:1)
The card manufacturers are given prefixes to use in the MAC of cards they make, and are supposed to not manufacture two cards with the same MAC. In practice, it happens, and you can usually just set a MAC address anyway. This is just a bit of trivia, however, in regard to why the MAC cannot be used for this purpose.
The reason the suggestion to use a MAC address won
Re:DHCP and MAC (Score:2)
Simon
Re:DHCP and MAC (Score:3, Informative)
It's also only 'guaranteed' unique on the local broadcast segment. In quotes, because somebody could spoof yours and receive all your traffic.
Sure, you could log it. It's just not as secure an identifier as you think it is.
Re:DHCP and MAC (Score:1)
Re:DHCP and MAC (Score:2, Informative)
Re:DHCP and MAC (Score:1)
You aren't a Linux user, are you?
I wrote the command into my startup script ever since my college banned my laptop's MAC address.
Re:DHCP and MAC (Score:1)
Re:DHCP and MAC (Score:1)
I mean, sure, so guy A pisses off guy B in a chatroom or online game, so guy B sets his zombies to DDOS guy A's IP. (That's happened to me, as guy A.) Change that to "guy B sets his zombies to DDOS guy A, whatever his IP may become".
And then there's privacy issues, where someone may decide to deal with the problem in person.
Sure, some vigilant
Re:DHCP and MAC (Score:2)
Re:DHCP and MAC (Score:2)
Routers don't forward the MAC addresses of the communicating nodes. That's the beauty of a stacked protocol like TCP/IP.
Re:DHCP and MAC (Score:1)
You're right though that reporter probably only has access to the IP of the abuser. If the abuser is a website, you obviously have the domain name. If we're talking about comcast zombies, you'd either need the abuser's ISP's cooperation, or the complaint gets applied to the ISP's entire subnet.
A possible solu
Re:DHCP and MAC (Score:2)
I have a Linksys wireless router with (4 wired ports) between the computers in my household and our DSL connection. All internet traffic goes through the router; all the computers on the internal network have non-routable 192.168.1.x IP addresses assigned to them by the router using DHCP. I can connect to the router's management interface just as if it were a website by using its default 192.168.1.1 addre
Re:DHCP and MAC (Score:1)
Hmmmmm...... (Score:1)
I wonder if slashdot will ever use this, for controlling the trolls and ACs?
Re:Hmmmmm...... (Score:2)
that or you're being facetious.
Re:Hmmmmm...... (Score:1)
Comment removed (Score:4, Insightful)
Re:what about DHCP (Score:2)
That list'll get long quick (Score:4, Interesting)
63.189.X.196 - - [12/Jul/2004:16:31:04 -0700] "SEARCH
I could probably contribute a thousand IPs from last month alone.
Re:That list'll get long quick (Score:2)
And they're probably all 14 year old dweebs on a dial up connection that changes IP everytime the idiot gets called by his mother.
This is a stupid idea and, if they're serious, the people who are proposing it are stupid for doing so.
Re:That list'll get long quick (Score:2)
yes, I have it too. wtf is that?
Re:That list'll get long quick (Score:1)
yes, I have it too. wtf is that?
It's an attempt to exploit an IIS vulnerability.
Re:That list'll get long quick (Score:2, Informative)
I added this in my httpd.conf just for fun
RedirectMatch permanent (.*)\/x90\/(.*)$ http://www.microsoft.com
Re: (Score:2)
Re:That list'll get long quick (Score:1, Informative)
Looks like script kitties and/or worms that are running a known buffer-overflow to me.
Re:That list'll get long quick (Score:1)
Port Scanning is not offensive (Score:2)
Are you going to claim you never have to port-scan in order to solve a problem? C'mon, man, get a grip. Sometimes even end-users have a legitimate need to portscan! Log it and move on, the real bad guys don't stop with a simple port-scan.
Re:Port Scanning is not offensive (Score:1)
No. But I have never legitimately port scanned any network other than my own (ie work and home).
Re:Port Scanning is not offensive (Score:2)
Look at it this way: All the people that ever attempted to crack your security breathe air. Obviously, punishing people for breathing air makes no sense... just because it's a prerequisite activity to cracking your system does not mean that in and of itself it's a bad thing. Portscanning, same same.
Within the next few hours I will be portsca
Re:That list'll get long quick (Score:1)
Thats plain silly. Why are you protecting them?
For the same reason this type of thing will never work. This could be coming from a worm or virus on some unsuspecting housewife's laptop. You going to go 'own' them?
Re:That list'll get long quick (Score:2)
correct me if I'm wrong but did that spammer NOT come through your account?
ok thought so.. bye bye housewife you just violated the AUP/TOS.
yet another standard (Score:5, Insightful)
Do we need yet another "standard", or do we just need ISPs that are actually reading/handling any kind of abuse notice. Some are great about this, but others just route them to
Re:yet another standard (Score:2)
Re:yet another standard (Score:2)
that anything that standardizes complaint formats is a good thing (as
long as everyone uses it of course). I have written several tools to
automate abuse handling so that I can keep up with it (when "virus of
the week" hits or a spammer signs up with a customer's customer; these
aren't really preventable things), but that is time consuming. I'm
trying to handle (in at least a semi-automatic way) AOL's feedback loop,
SpamCop, DShield, SecurePipe, and myNetWatchman
Re:yet another standard (Score:1)
4/1 (Score:4, Interesting)
Come on... this is a joke, right? After annoyance queries, we can move on to annoyance mining and then the troll database and the lousy-speller's database with new improved SQL (Soundex Query Language for the spelling-impaired).
Annoyance queries? Pshaw.
IOWA IALP (Score:1, Flamebait)
TVP (Score:4, Funny)
127.0.0.1 (Score:4, Funny)
And why oh why does the owner of this "localhost" system insist on using non-standard ports all the time.
Re:127.0.0.1 (Score:1)
Signal to Noise ratio (Score:4, Insightful)
Re:Signal to Noise ratio (Score:2)
Also, does anyone really expect their STUPID!@!!@ .log TLD proposal to be accepted?!??!!
Totally. We've been waiting since 1990 - 1990! for this [faqs.org], which seemed so great for so long, but sadly never was adopted.
:)
Re:Signal to Noise ratio (Score:1)
You don't know the half of it. Slashdot actually port scans every computer that posts anonymously looking for proxies. If this protocol went into affect, Slashdot would be at the top of the list, continually proxy scanning the hundreds of anonymous posters it gets per minute [slashdot.org]. If ISPs implemented it, no one would even be able
Re:Signal to Noise ratio (Score:1)
Good thing it's not in Kansas. (Score:1, Funny)
Oh, it'd still be created, it just wouldn't evolve.
Ah yes... (Score:1)
I don't see this going anywhere useful, that's all.
-Erwos
So its going to be... (Score:1, Funny)
Two words: (Score:4, Funny)
My first submission (Score:3, Funny)
All network administrators should blackhole this address space.
Banned from the internet! (Score:1)
Fatal flaw in environmental assumption (Score:5, Insightful)
Having just skimmed the draft, there's a fatal flaw with this solution. To quote:
However, they don't seem to address the idea that one person controlling a million drones that send spam today... can control a million drones that submit IIALP reports about, say, cnn.com tomorrow, resulting in an DOS from all the sites that block based on the IIALP lists. They rely upon the reports of end-users, but do not take into account the fact that massive volumes of "end-user" machines are compromised and usable as drones for whatever nefarious uses their 0wner wants.
In short, their anti-spoof assumes individual malicious user endpoint hosts. If the malicious users on the Internet were limited to individual endpoint hosts, we wouldn't need solutions like IIALP!
Re:Fatal flaw in environmental assumption (Score:2)
I liked what the first person said and I like your idea of using cap
Re:Fatal flaw in environmental assumption (Score:3, Interesting)
So use a "real person" validation technique... like when you sign up for free email and they require you to tell them what the distorted word in the .jpg is...
Three problems off the top with that...
Frontpage? (Score:4, Funny)
(speechless)
internet abuse == Verisign? (Score:1)
Description wasn't quite right... (Score:2)
Re:Description wasn't quite right... (Score:2)
SPAM is a trademark of Hormel (Score:3, Informative)
Re:Guess? (Score:2, Funny)
But then it would *hardly* be slashdot then, would it?
Re:Cool (Score:2)