nanog mailing list archives

Re: Abuse Desks


From: "J. Hellenthal via NANOG" <nanog () nanog org>
Date: Wed, 29 Apr 2020 07:51:34 -0500

Enforcing rate limiting comes to mind. And if there is a blatant problem then very strict rate limiting to make even 
surfing yahoo news a pain is a good idea.

Not to mention conn tracking and limiting to allow a customer to fix their problem is much better than a plain cut-off.

The Oh my gawd!!! I’m being port scanned ... pffft it’s moot. There is blatant abuse and internet fuzz coming from 
legitimate sec corps that believe they are making the internet better by scanning your equipment without you asking 
them too and hoping to sell you services, and those are all just bullshit.

-- 
 J. Hellenthal

The fact that there's a highway to Hell but only a stairway to Heaven says a lot about anticipated traffic volume.

On Apr 29, 2020, at 07:35, Mike Hammett <nanog () ics-il net> wrote:


"What is it, exactly, that you expect a provider to do with your report of a few failed SSH login attempts to stop 
the activity?... disconnect the customer."

Yes.

Comcast does it. My wife's aunt and uncle had a compromised box on their network. They don't check their e-mail, so 
they didn't see the warnings from Comcast. They shut them off until the problem was resolved.


"Forcing disconnection for a port scan is also, by the way, a *great* way to create an absolute gold-plated A+ 
denial-of-service: "

Surely they have flow records showing suspicious activity from that customer. They may not confirm the specific IP 
being attacked, but they will see massive numbers of SSH, SMTP, SIP, etc. connections going out. It's likely if 
there's outbound activity of that nature and *someone* complained about it, not only were they a victim of it, but 
the activity is probably undesired by anyone else receiving it as well.


"cost you practically nothing." You're right. An insecure Internet doesn't cost any of us anything.


"there's no One True Format for automated abuse notifications"

So then "let's" make one? No one can follow it if it doesn't exist.






-----
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com

Midwest-IX
http://www.midwest-ix.com

From: "Matt Palmer" <mpalmer () hezmatt org>
To: nanog () nanog org
Sent: Wednesday, April 29, 2020 6:48:51 AM
Subject: Re: Abuse Desks

On Wed, Apr 29, 2020 at 12:24:01PM +0530, Mukund Sivaraman wrote:
On Tue, Apr 28, 2020 at 11:40:16PM -0700, Matt Corallo wrote:
Sadly dumb kids are plentiful. If you have to nag an abuse desk every
time they sell a server to a kid who’s experimenting with nmap for the
first time then.... we’ll end up exactly where we are - abuse contacts
are not a reliable way to get in touch with anyone, and definitely not
a reliable way to do so fast or with any reasonably large
network. Please don’t clog the otherwise-useful system.

If you have trouble sleeping at night, I’d recommend the
“PasswordAuthentication no” option in sshd_config.

Yes we use that, and PermitRootLogin no and an AllowUsers list.

I asked in my first email, if with security practices as above and use
of fail2ban to filter attempts, should we just ignore this problem and
think that nobody is ultimately reponsible to get rid of this activity?

In theory, no.  In practice, unfortunately, yes.

The typical service provider has so much low-level "noise" going on that if
everyone reported everything to them, they'd semi-literally drown. 
Certainly, there's no possible way they could economically handle all that
abuse reporting -- hiring all the people to examine, determine the veracity
of, and act upon the reports would cost a fortune, because you better
believe there's no One True Format for automated abuse notifications, nor
will there ever likely be one, so it's all humans, all the time.

Now, you could argue that they should clean up their network so they don't
have that volume of abuse reports coming in -- and you'd be right, in
theory.  But there's a *lot* of low-level stuff that it isn't practical to
stop, in and of itself.

Consider your own reports.  What is it, exactly, that you expect a provider
to do with your report of a few failed SSH login attempts to stop the
activity?  Say it's a residential ISP, or an IaaS provider.  They have only
a few very large hammers at their disposal -- they can (maybe) filter the
destination port, filter your destination IP, or disconnect the customer. 
Any of those will very possibly result in a support call, or lost customer. 
That's a very large cost you're expecting them to pay for something which
has, let's face it, cost you practically nothing.

Forcing disconnection for a port scan is also, by the way, a *great* way to
create an absolute gold-plated A+ denial-of-service: send in a
plausible-looking report of shenanigans to the ISP of someone you don't
like, and *boom* their Internet connection's cut off.  WINNAH!

So what are you left with, action-wise?  An ISP could keep a tally of abuse
reports by customer, and take action on whoever's at the top of the pile,
but that would then require a large and expensive army of humans to receive,
check, classify, and record all incoming abuse reports.  Do *you* want to
pay $1,000/month for your home Internet connection to cover the cost of all
those extra ISP staff?  Because, as I said before, there's no One True
Format for reporting abuse, and there never will be.

Not that it would work, anyway -- any sort of "threshold" system for abuse
ends up being gamed, anyway.  You only need to look at how Twitter users
with an axe to grind gang up to send in malicious reports about some other
Twitter they don't like, which trips Twitter's "lots of reports => autoban"
logic, to see how that would end if you started applying it to Internet
abuse reporting.

Finally, because nobody is ever convinced by rhetoric, here's an appeal to
your self-interest: "crying wolf" is never a good idea.  In the event that
you *do* have a real problem that needs to be dealt with some time in the
future, do you want to have your e-mail address, IP address, and whatever
else associated with a thousand previous GWF ("goober with firewall")
reports?  Any abuse desk who has seen your hundreds of previous unactionable
reports will almost certainly round-file that important one, and then you're
*really* up the creek sans paddle.  Far better to keep your powder dry and
be ready for when you actually need assistance from whoever you're
contacting.

- Matt


Attachment: smime.p7s
Description:


Current thread: