Politech mailing list archives

FC: Politech members reply over RoadRunner scanning email senders


From: Declan McCullagh <declan () well com>
Date: Mon, 17 Mar 2003 00:09:34 -0500

Previous Politech message:

"Email a RoadRunner address, get scanned by their security system"
http://www.politechbot.com/p-04556.html

---

From: "Sanford Olson" <solson () mailbag com>
To: <declan () well com>
References: <5.1.1.6.0.20030314152453.02ca9008 () mail well com>
Subject: Re: Email a RoadRunner address, get scanned by their security  system
Date: Fri, 14 Mar 2003 16:01:16 -0600

Hi Declan,

If RR's e-mail server forwards an e-mail message on your e-mail server's
behalf, having your e-mail server try to forward a message for them seems
reasonable to me.

Sanford Olson

---

Subject: Re: FC: Email a RoadRunner address, get scanned by their security
        system
From: Ron Guerin <ron () vnetworx net>
To: declan () well com
In-Reply-To: <5.1.1.6.0.20030314152453.02ca9008 () mail well com>

The scans are fine by many (but hardly all) of us running mail servers.
And there's really little ground to stand on complaining about it since
it's only the result of an attempt to connect to their servers.  Note I
said little, not none.  For one thing you wouldn't know you were going
to be scanned until the first time you send mail to RR.

What you may find more interesting however, is that Road Runner forbids
others from scanning them!  If you're still on SPAM-L, there was a
thread about it this and last week.

Excerpt:

        RR ultimately demanded that anybody who wants to test a host in
        their network for relay or open proxy requires prior permission
        from security for 'penetration testing'.

This page generated the initial post: http://openrbl.org/roadrunner.htm

You'll probably want to read the thread for more context though.  That
page itself is the subject of some controversy.

- Ron

---

Date: Sat, 15 Mar 2003 01:49:06 +0000 (GMT)
From: Suresh Ramasubramanian <suresh () outblaze com>
X-X-Sender: mdrop () smtp1 hk1 outblaze com
To: Declan McCullagh <declan () well com>
cc: Gunnar Hellekson <gunnar () onepeople org>
Subject: Re: FC: Email a RoadRunner address, get scanned by their security
 system

On Fri, 14 Mar 2003, Declan McCullagh wrote:

> From: Gunnar Hellekson <gunnar () onepeople org>
> After sending an email to a friend at a RoadRunner address, I see this in
> my web access log:
>
> 24.30.199.228 - - [13/Mar/2003:15:11:25 -0500] "CONNECT security.rr.com:25
> HTTP/1.0" 404 535 "" ""

Lots of other ISPs are doing this, fwiw.  It is either that, or drown in
the torrents of spam sent at them.

Here's what we tell people (in the body of our relaytests / proxy tests,
and when someone complains to us).  We also whitelist people from further
testing if they are not running an open relay / proxy, and their admins
give us a point of contact email address for their IP(s).

        --srs

--
srs (postmaster|suresh)@outblaze.com // gpg : 420776FC
outblaze.com postmaster & messaging systems specialist

-------


Hello

Thank you for contacting the Outblaze postmaster desk.

The obsl.outblaze.com machine is a Outblaze Security resource that is used
as a tool to assist us in determining if machines being used to send us
mail may be abused from outside sources, allowing them to be used to spam
our customers and role accounts. We fully understand your concerns
surrounding the probing of your machine. This issue has been raised
internally and we hope this email helps you better understand our process.

The intention of this process is truly not meant to be a "big brother"
system, but we understand that some may view it as such. Our ultimate
goal, however, is to protect our network and our customers.  Given that we
are an ISP with over 30 million users, we have to adopt this strategy.

To that end, Outblaze has begin the reactive testing of IP addresses which
connect to its inbound SMTP gateways. If your machine connects to ours to
send email, we perform SMTP relay and open proxy server tests upon the
connecting IP address to ensure that the machine at that IP address cannot
be abused for malicious purposes.

Your mail server is most likely being tested because your IP

[1] Delivered a spam to us

[2] Triggered antispam filters (such as sent us a significant number of
emails with hotmail, yahoo or other freemail domains in the envelope
sender, but not from a hotmail / yahoo IP)

[3] We were previously blocking you, and we are retesting your host.  If
your host is now seen to be closed to relaying, it will be delisted from
our blocklist.

If your server is found to be an open relay or proxy it will be locally
blocked by us.  In such a case, please secure your server using the
documentation at http://www.mail-abuse.org/tsi/ar-fix.html (open relays)
and http://www.cyberabuse.org (for open proxies).

Alternatively, you can ask your software manufacturer / on mailing lists
and usenet newsgroups discussing your mail / proxy server), and then
contact us at postmaster () outblaze com once your relay or proxy is secured.

This message is a test of your mail server to determine if it will perform
relaying or proxying (re-sending) of e-mail messages for unauthorized
outside parties.  This capability, if enabled in your server, is widely
considered to be a serious flaw in server security.

For additional information about this test message, please contact
postmaster () outblaze com

Please note also that if you are reading this message, then the
implication is that your mail server has PASSED this one particular
relaying test.  However other types of relaying tests may perhaps still
indicate mail relaying vulnerabilities in your mail server.

If your IP is not running an open mail relay or proxy, we sincerely
apologize for the inconvenience caused.  Your IP will, in such a case, be
whitelisted from further testing for a period of time.

The status of your mailserver can be checked at this URL -
http://spamblock.outblaze.com/your_ip_here

Sincerely,

postmaster () outblaze com

---

Date: Fri, 14 Mar 2003 17:40:12 -0500
Subject: Re: FC: Email a RoadRunner address, get scanned by their security system
Content-Type: text/plain; delsp=yes; charset=US-ASCII; format=flowed
Mime-Version: 1.0 (Apple Message framework v551)
Cc: Declan McCullagh <declan () well com>
To: Thomas Shaddack <shaddack () ns arachne cz>
From: Gunnar Hellekson <gunnar () onepeople org>
In-Reply-To: <Pine.LNX.4.33.0303142150200.23298-100000@Zeta>

Without exhausting you, let me clarify the matter. I'm not complaining
about the scanning.  I get scanned all day.

Though relatively harmless, the RR policy isn't effective.  It's
foolish of them to think that they can protect themselves by
whitelisting every SMTP server on the Internet, and to check every one
of these servers at least once a week.  It's too little, too late.

The checks they are performing are not proper responses to the
potential threat.  I sent them mail, and they checked for my
vulnerability to relayed spam.  That makes no sense.

Providing the opt-out is the worst.  Haven't the bad guys already
figured out how to exempt themselves from the scan before the launch
their spam payload?

A more sensible policy would be more cautious.  Taking for granted that
a vulnerability check is absolutely necessary, only check for
vulnerabilities on servers that are attempting to transmit spam, or
have transmitted spam in the past.  Regularly vet those servers in
real-time, forget the weekly checks.  Publicize these probes to
increase their own credibility and reduce unnecessary alarm.  Eliminate
the opt-out which works only to benefit the bad guys.

These small adjustments would vastly improve the effectiveness of their
effort, and keep intrusiveness to a minimum.  This is also more
efficient from RR's point of view -- fewer hosts to check, and the spam
is more effectively prevented.  The current policy is unnecessarily
invasive, poorly implemented, and ineffective to boot.

While they're at it, they should make their blacklist public so
eliminate duplicate effort and allow everyone to benefit from their
work.  That would be a lovely show of good faith.

My other concern, less compelling, is the slippery slope.  RR's probes
appears acceptable under the CFAA, since they cause no intentional
damage.  It seems that as long as the promise not to break anything,
there's no limit to the checks.  Why not check for trivial root
passwords?  As long as they promise, cross-their-heart-and-hope-to-die,
that they won't do anything if they're successful.

It's a matter of degrees, and while I certainly sympathize with their
effort, this policy is poor thinking.  As it stands, RR is
distinguishable from the script kids only in their scale and intent --
which isn't sufficiently comforting.  Their policy needs to change.

-Gunnar

---

Date: Fri, 14 Mar 2003 16:05:35 -0500 (EST)
From: "Matthew G. Saroff" <msaroff () fellspt charm net>
Reply-To: "Matthew G. Saroff" <msaroff () pobox com>
To: Declan McCullagh <declan () well com>
cc: politech () politechbot com
Subject: Re: FC: Email a RoadRunner address, get scanned by their security
 system

        You know, I have to be on RRs side on this one.
        With all the complaints about people erroneously being listed by
things like spamcop, the idea of an ISP doing it on their own is rather
refreshing.
--
  Matthew G. Saroff
Navicula hydraulica plena anguilarum est.

---

User-Agent: Microsoft-Entourage/10.1.1.2418
Date: Fri, 14 Mar 2003 13:12:10 -0800
Subject: Re: FC: Email a RoadRunner address, get scanned by their security
        system
From: Amos Jessup <amos () san rr com>
To: <declan () well com>
Message-ID: <BA9785AA.5575%amos () san rr com>

Roadrunner's general reputation for service in this neck of the woods is
excellent.

There have been cases of genuine slime-spammers stealing a Road Runner user
address and using it as a reply-to in spams all over the world.  Usually
they compound the insult by adding a wrong, imaginary plain-language name to
boot! The sad side-effect is that all the "nixies" bounce back to the victim
and fill his mailbox.

I found RR to be highly responsive to this problem in seeking to protect the
customer's interest.

A

---

Date: Fri, 14 Mar 2003 14:14:10 -0700
To: declan () well com
From: Charles Oriez <coriez () oriez org>
Subject: Re: FC: Email a RoadRunner address, get scanned by their
  security system
In-Reply-To: <5.1.1.6.0.20030314152453.02ca9008 () mail well com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed

Their server, their rules.  Seems reasonable to me:


2. Do not connect to our inbound SMTP servers. Again, this test is only
conducted on servers that connect to our servers.


--
Charles Oriez, coriez () oriez org
39  34' 34.4"N / 105 00' 06.3"W

---

Date: Fri, 14 Mar 2003 22:21:34 +0100 (CET)
From: Thomas Shaddack <shaddack () ns arachne cz>
X-X-Sender: <shad@Zeta>
To: Declan McCullagh <declan () well com>
cc: <gunnar () onepeople org>
Subject: Re: FC: Email a RoadRunner address, get scanned by their security
 system
In-Reply-To: <5.1.1.6.0.20030314152453.02ca9008 () mail well com>

Essentially harmless, could be quite effective.

RR is defending themselves and their customers against the barrage of
spam. Open proxies supporting the HTTP CONNECT method are one of the most
common spam sources. Automated scan of an SMTP traffic source is one of
the possible effective ways of discovering one class of potential
offenders.

Check your firewall logs. You will possibly find connection attempts to
ports 25, 8080, 1080, 3128, maybe 8000 and couple others. One such probe
set will maybe be RR-related. You are likely to see many others there;
there are many various probe sources, both "white" (eg, spam blackhole
list providers), and "black" (spammers, crackers...). (Other common probes
these days are 137, 139, 445, 57, 515, 81, 79, 21, 22, 23, 109, 110, and
111, and these are only the ones I got either from memory or from a
subsequent quick peek to my fw logs.)

Scans of various nature are daily reality for any computer connected to
the Net. Any Net-connected machine should be able to withstand such
individual attempts without any problem; if it crashes or fails other way
as a result of mere scan, you got MUCH more serious problem and should be
thankful you were alerted about it before someone exploited it in
malicious way. Complaining you are scanned won't make your situation
better. Accepting the reality and securing your machine (and occassionally
scanning it yourself - Nmap, Nessus, and Whisker are your friends) will.

---

From: "John Ellingsworth" <jellings () mail med upenn edu>
To: <declan () well com>
References: <5.1.1.6.0.20030314152453.02ca9008 () mail well com>
Subject: Re: Email a RoadRunner address, get scanned by their security  system
Date: Fri, 14 Mar 2003 16:24:09 -0500
MIME-Version: 1.0
Content-Type: text/plain;

It's certainly a viable option - trying to determine if you are running an
open relay - read this in yesterday's WP about spam; particularly relevant
is this quote:

" At the quieter end of the battlefield, activists such as Chip Rosenthal, a
computer consultant in Texas, create e-mail accounts for the express purpose
of attracting spam.
"If they hit one of my spam traps, I launch probes" to figure out the
location of the senders' computers, Rosenthal said.

Sometimes, Rosenthal identifies unprotected computers that were unwittingly
taken over by a spammer, launching spam without the owners' knowledge.

But Rosenthal is part of a loose network of anti-spam advocates whose
primary goal is to collect and publicize "blacklists" of spammers' Internet
addresses. These are then incorporated into spam filters used by small
Internet service providers, company system administrators and individual
users, blocking any e-mail that comes from those addresses."

http://www.washingtonpost.com/ac2/wp-dyn/A17754-2003Mar12?language=printer

It's a harmless scan, and it isn't as if RR attempted to hide their domain
or their intention from the individual.

Thanks,

John Ellingsworth
Project Leader
Virtual Curriculum
http://ellingsworth.org/john/

---

From: "Christopher Null" <cnull () mindspring com>
To: <declan () well com>
Subject: RE: Email a RoadRunner address, get scanned by their security  system
Date: Fri, 14 Mar 2003 13:02:40 -0800
Organization: filmcritic.com

Based on informal and unscientific perusing of email headers, a >LOT< of
spam comes through rr.com.  It's interesting that they appear to be trying
to do something about it, though I can't see how port scanning is going to
aid that effort.

CN

------------------------------------------------------
Christopher Null / cnull () mindspring com / journalist, film critic, novelist
www.filmcritic.com - www.sutropress.com - www.chrisnull.com
"A stunning accomplishment!" "Completely absorbing!" "I am deeply
impressed!"
Get your copy of HALF MAST at www.sutropress.com

---

From: Zero Sum <count () shalimar net au>
Organization: Tobacco Chewers and Body Painters Association
To: declan () well com
Subject: Re: FC: Email a RoadRunner address, get scanned by their security system
Date: Sat, 15 Mar 2003 08:18:11 +1100
User-Agent: KMail/1.5
References: <5.1.1.6.0.20030314152453.02ca9008 () mail well com>


On Sat, 15 Mar 2003 07:25, Declan McCullagh wrote:
> After sending an email to a friend at a RoadRunner address, I see this in
> my web access log:
>
> 24.30.199.228 - - [13/Mar/2003:15:11:25 -0500] "CONNECT
security.rr.com:25
> HTTP/1.0" 404 535 "" ""
>
Check your firewall log.  You'll find road runner at more than Port 80.

> Basically, RoadRunner tried to spam themselves using my server.  I mailed
> abuse () rr com about this, and received a canned response, enclosed.  It's
> a humble response, but woefully inadequate.  Have anti-spam measures come
> to this?  This seems like an ill-considered compromise between privacy
> and anti-spam efforts.  A blunt instrument that betrays less-than-careful
> thinking.  The opt-out option, which was revealed only after my
> complaint, is even more obnoxious.
>
I requested that they stop probing my machine.  They declined.
The emails have been preserved.  It is my belief that according to the law
of _this_ country, they are both "tresspassing" and "appropriating the
resource of others".

Since Bush the Younger, complaints to American companies have been answere
with appalling arrogance.

> Under their logic, I feel entitled to poke and prod their customers, just
> to make sure they don't spam me.  Is that fair?  I promise to provide an
> opt-out if anyone complains.
>
> I'm curious whether this preemptive measure is effective at all.
>
No.  I have them firewalled, but it is still annoying to see their
arrogance in my logs.

--
Zero Sum <count () shalimar net au> - Nullus Anxietas Sanguinae

Q.)  What's the difference between a scientist and an engineer?
A.)  A scientist thinks that two points are enough to define a strait
line while an engineer wants more data!!!

---

X-Mailer: exmh version 2.4 06/23/2000 with nmh-1.0.4
To: declan () well com
cc: hmurray () suespammers org
Subject: Re: FC: Email a RoadRunner address, get scanned by their security
 system

RR has been doing that for a while.  I think AOL does it too.

In some sense, it's a reasonable approach.  Finding one of the many holes
that the spammers use is a very strong indication that spam will come from
from that machine.

The problem with RR scanning your system after you send them email is that
they don't want you doing the same thing back to them.

That can also be considered reasonable - most of the scans are probably from
spammers.

I think the real question is how many scanning sites do we need and/or who
should run them.

If you are an AOL or RR, you probably can't afford to trust info from a
volunteer anti-spam organization.  Should each ISP do their own scanning?
How many ISPs are there on the net?
...


--
The suespammers.org mail server is located in California.  So are all my
other mailboxes.  Please do not send unsolicited bulk e-mail or unsolicited
commercial e-mail to my suespammers.org address or any of my other addresses.
These are my opinions, not necessarily my employer's.  I hate spam.

---

Date: Fri, 14 Mar 2003 17:13:05 -0500
From: Adam Lynch <alynch () sprawl net>
To: declan () well com
Subject: Re: FC: Email a RoadRunner address, get scanned by their security system
MIME-Version: 1.0

Quoting Declan McCullagh <declan () well com>:

> Under their logic, I feel entitled to poke and prod their customers, just
> to make sure they don't spam me.  Is that fair?  I promise to provide an
> opt-out if anyone complains.


I myself saw this a few nights ago on a number of my mailhosts. A quick visit
to http://sec.rr.com/probing.htm explains their policy in-depth.

  I find this very interesting, as the ISP I'm sysadmin for ran into an issue
where a number of their MX servers made it into an open-relay database, which we
use.

Further investigation of that issue proved that RR.com *actively blocks access
to their MX servers from automated testing bots.* They consider it a security
probe (and an attempted security violation, theft of services, etc), and have
decided that blocking these bots and making it into some ORDBs is acceptible,
and justified.

  To me, it seems that RR.com is basically forcing on the rest of the Net
policies that they themselves would consider unacceptable.


--
---
AdamL.

alynch () sprawl net
http://sprawl.net

---

From: "William K. Walker" <wkwalker () nvdi com>
To: <declan () well com>
Subject: RE: Email a RoadRunner address, get scanned by their security  system

Declan,

It looks like RoadRunner is not the only ISP doing "REACTIVE testing of IP
addresses which connect to its inbound SMTP gateways." According to the
folks who run my hosting service, "a lot of the larger ISP's are moving to
the same method as RR."

Bill Walker
NVDi

---

From: "Thomas Junker" <tjunker () tjunker com>
To: declan () well com
Date: Fri, 14 Mar 2003 16:49:50 -0600
MIME-Version: 1.0
Subject: Re: FC: Email a RoadRunner address, get scanned by their security system
Reply-to: Thomas Junker <tjunker () tjunker com>

On 14 Mar 2003 at 15:25, Declan McCullagh wrote:

> Date: Fri, 14 Mar 2003 15:22:24 -0500
> Subject: RoadRunner Automated Portscans
> From: Gunnar Hellekson <gunnar () onepeople org>
> To: declan () well com
>
> After sending an email to a friend at a RoadRunner address, I see this in
> my web access log:
>
> 24.30.199.228 - - [13/Mar/2003:15:11:25 -0500] "CONNECT security.rr.com:25
> HTTP/1.0" 404 535 "" ""
>
> Basically, RoadRunner tried to spam themselves using my server.  I mailed
> abuse () rr com about this, and received a canned response, enclosed.  It's a
> humble response, but woefully inadequate.  Have anti-spam measures come to
> this?..

Hi Declan,

If Road Runner had even a fragment of a clue they would be directing
their attention to the epidemic of virus and worm probes that
originate within their own networks.  My Web server, on a fixed IP
in a Road Runner net, is probed and attacked hundreds, thousands of
times each day.  I took to extracting the offending IP addresses,
almost all of which are "nearby" in the 24.x.x.x tree, and adding
them to the "deny" section in my Web config.  I gave up on that
after building about 30 pages of deny entries, 22 lines per page,
four IP addresses per line.  I began doing this after noticing that
the offending hosts do *not* disappear -- they continue to probe and
attack for month after month.  Nimda may be old news in the world
generally, but it's very much a huge and current problem within Road
Runner.

It seems obvious to me that Road Runner does nothing about this type
of net pollution because they collect monthly fees from the clueless
whose PCs have become infected.

Compared to the volume of virus and worm traffic within their own
network and the nasty effects on unsuspecting new subscribers when
they connect to this infested network, the lame anti-spam scanning
they are doing of mail servers that send lone messages to their
subscribers seems not only misplaced but moronic.

Oh yes:  they also probe mail servers operating within the Road
Runner networks.  They have repeatedly probed mine, even though I
have no large list traffic going out, send no spam, and mostly send
only individual, hand-composed, normal email.  I do, however,
receive spam from the outside world at the rate of 5-10 or more per
hour.  I'll be content if Road Runner does *nothing* about inbound
spam because I don't believe any ISP on the planet can accurately
filter inbound spam without also tossing legitimate traffic.  Lost
business email that is silently deleted is entirely intolerable.
Business email that is bounced is not much better, but at least
someone in the loop will notice that the messages weren't delivered.

The stupidity that generally infects modern corporate business is
exceeded only by the utter brain death characteristic of many ISPs
and business Website operators.  The single most effective policy
that could bring Web problems to the attention of managers and
executives who presently never see them would be to have email sent
to "webmaster" go not to the Webmaster but to someone several levels
higher in management *above* the Webmaster.  As it is, notifications
of Web stupidities that should result in immediate firing of the
Webmaster go *to* the Webmaster.  Duhhhhh!

ISPs could be made to work reliably if they could find a way to
route the paychecks or air supply (or both) of their operational
staffs sequentially through *all* their servers.  "If you want to
get your paychecks, KEEP THE #@$)(&* SERVERS UP!"  Personally I like
the air supply approach lot better.  The email server goes down and
Joe, the email "system engineer" feels his air supply begin to
ratchet down while a voice says, "Warning!  You have approximately
10 minutes left until losing consciousness...    9 minutes...   8
minutes..."

There is *no* sense of "mission critical" in much of today's
Internet staff.  It's weird that the coining of that term more or
less coincided with the evaporation of any comprehension of critical
and/or 24 x 7 operations.

Road Runner (at least in my area) occasionally makes network changes
that require that I power cycle my cable modem.  Excuuuuuuse me?  I
have so-called "Business Class" service.  I run servers.  I am
sometimes out of town.  Like most people, I occasionally sleep.
Last I checked, this was the 21st Century.  Why would I *ever* have
to power cycle my cable modem to get it to hook up again with the
upstream equipment?  The answer seems to be:  because cable Internet
is provided by -- surprise, surprise -- *cable* *TV* companies,
traditionally the lowest form of life on the planet that bases a
business on hi-tech equipment.  They were as dumb as rocks when they
gave us only TV, and they seem to be as dumb as rocks giving us
Internet.

More than once I've had IBM's e-commerce error out before I could
find the information I needed or complete a purchase.  This from the
people who hold themselves up as the world's experts in e-commerce.

Many Webmasters the world over are so stupid that they ignore the
design concepts of the WWW (and Tim Berners Lee's admonitions) and
recklessly revise and change URLs, breaking links in other Websites
and in search engine databases -- links that presumably would have
brought visitors to their Websites.

Others actually *remove* information from the WWW in this day and
age when storage is almost dirt cheap and *so* cheap that
individuals can in many cases mount more online storage than would
be required to contain *all* the information that many large
corporations could ever find to publish even if they were so
inclined.  As a private individual it costs me about $0.0000066 for
the storage required to publish a page of standard text (4.6KB) on
the WWW. That's 66 100-thousandths of a penny, or about 152,000
pages per dollar of storage.  It is well within the means of anyone
who can afford a home theater system or a second car to publish
*hundreds* of *millions* of pages of information.  It's utterly
incongruous for a corporation to take down technical or retired
product information "because we can't afford the disk space" or
"because it's too expensive to maintain."

The general principal of the WWW is that information should go up
and never be taken down, and that URLs should be stable and
persistent over the long term to give value to links.  Duhhh!

I have never found an ISP that could keep its servers running.  In
my experience many who offer dialup don't even know when they have
dead lines or dead modems.  Some have been so poorly configured that
a dead line or modem can catch and block *all* incoming calls until
multiple concurrent calls jump past it to another port.  Mail and
Web and news servers often go up and down like yo-yos while the
"network status" Web page or phone message claims that "All systems
are functioning normally." Perhaps what is really at issue here is
their definition of "normally."  Perhaps "functioning normally"
means "down" to them.

Road Runner and various intermediate points in networks I regularly
use seem to think it's OK to take down routers or links for minutes
at a time.  They also proliferate levels within their own nets as if
they were the only nets on the planet.  Many times I have
encountered situtations in which the standard 30-hop limit is
exceeded because one or another of the players between two points
has 10 or 15 levels of routing just in its own network.  One route I
am forced to use between two nearby cities goes exceeds 30 hops from
time to time, seemingly according to someone rolling some dice.

I've noticed a peculiar confluence of outages in the 0200-0400
period, as if network operators fail to comprehend that it's a 24-
hour planet and Internet.

Road Runner (in my area -- all the Road Runners seem to be
different, using different equipment and different policies) seems
to use some kind of load balancing for their DNS farms.  The result
is that my browser pauses in the "Looking up..." phase on host names
I've accessed within seconds or minutes that SHOULD BE CACHED but
are obviously not.  I've only been able to overcome this by adding
entries to my hosts file for the places I visit heavily.  Of course
this leaves it to *me* to maintain those hosts entries as current.

If the Internet ever melts down, it won't be a consequence of high
traffic levels -- it will be a consequence of reaching a critical
mass of stupidity.

Regards,

Thomas Junker
tjunker () tjunker com

---

Date: Fri, 14 Mar 2003 15:28:29 -0800
From: Brandon Long <blong () fiction net>
To: Declan McCullagh <declan () well com>
Subject: Re: FC: Email a RoadRunner address, get scanned by their security system
Message-ID: <20030314152829.E25167@pulp>
Reply-To: blong () fiction net


A quick scan of my own web logs shows the following people have scanned
my server in the same way:
security.rr.com
before-reporting-as-abuse-please-see-www.njabl.org
67.41.194.17
67.128.51.14

So, two validity checks and two spammers.  The spammers actually hit
more machines, and they usually used the name maila.microsoft.com.

I imagine that if that much spam mail is actually going through open
proxies, then yes it is effective.  I would think this is less intrusive
that services which scan random machines for relaying tests, since
you are actually actively sending them mail.  This reminds me of the
IDENT protocol, which various services (including some of the original
web servers) would use to "reverse lookup" information about someone
connecting to their server.  Many servers today are probably still doing
this reverse lookup... is this different?  Some servers today are set up
such that if your reverse and forward DNS names don't match, they won't
accept mail or a connection from you.  Depending on who's hosting your
DNS, that might come back to you too.  The difference is one of
expectation, I imagine.

Brandon
--
 "They that can give up essential liberty to obtain a little temporary
  safety deserve neither liberty nor safety." -- Benjamin Franklin
                                           http://www.fiction.net/blong/


---

Date: Fri, 14 Mar 2003 21:37:38 -0500
To: declan () well com
From: Stephen Cobb <scobb () cobb com>
Subject: Re: FC: Email a RoadRunner address, get scanned by their
  security system
In-Reply-To: <5.1.1.6.0.20030314152453.02ca9008 () mail well com>
Mime-Version: 1.0
Content-Type: multipart/mixed; x-avg-checked=avg-ok-1A4D56C;

Declan

A sad state of affairs indeed, but I can perhaps shed some light on RoadRunner's motives for this extreme approach. The rr.com domain cropped up last year when I was researching spam issues for my book, "Privacy for Business: Web Sites and Email." Even as I was investigating some fairly pernicious spam that was abusing rr.com, my wife was finding that her relatives in central Florida could not send email to her, because RoadRunner was their ISP. In other words, RoadRunner was getting black-holed in a big way because one of their servers was being abused by a spammer.

A lot of people would say tighter security in the server farm is a better approach than this high-risk response, but I fear that we will only see more of this type of reaction until something is fundamental is done to change email technology for the better.

Stephen Cobb
www.privacyforbusiness.com

---

Date: 15 Mar 2003 01:31:31 -0500
Message-ID: <Pine.BSI.4.40.0303141603150.8281-100000 () tom iecc com>
From: "John R Levine" <johnl () iecc com>
To: "Declan McCullagh" <declan () well com>
Subject: Re: FC: Email a RoadRunner address, get scanned by their security
 system
X-UIDL: df810f5cde0269e3e22b17f2f0306cca

ISPs from AOL on down have been relay testing mail servers for years.
For some reason Road Runner gets the most hassle about it, but what they
are doing is utterly common and quite effective as a way of blocking spam.

Most legitimate mail comes from a relatively small set of familiar mail
servers.  When you get mail from a host you've never gotten mail from
before, more likely than not it's an open relay or compromised proxy
sending spam.  On today's Internet filled with worms, viruses, and spam,
testing a hitherto unseen host is a a perfectly reasonable response.

A small ISP down the road from me has a very simple test scheme that sends
a single message to each newly seen sending host, addressed to a pair of
mailboxes on his system and on mine, which will only be delivered if the
host is an open relay.  We get deliveries about every two minutes all day
and all night from open relays we haven't seen before and that aren't on
any of the blocking lists we use.  It's nuts, but these days, it's life.

Regards,
John Levine, johnl () iecc com, Primary Perpetrator of "The Internet for Dummies",
Information Superhighwayman wanna-be, http://iecc.com/johnl, Sewer Commissioner
"More Wiener schnitzel, please", said Tom, revealingly.

---

Date: Sat, 15 Mar 2003 01:34:51 -0500
From: "Timothy M. Lyons" <lyons () digitalvoodoo org>
Reply-To: lyons () digitalvoodoo org
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.3b) Gecko/20030210
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: declan () well com

Declan,

In my opinion, RoadRunners actions are completely benign and should not be considered intrusive. If you are not running an open relay then there really is no problem. If you are then it will be caught and (hopefully) submitted to multiple RBL's for further confirmation testing and possible blacklisting. The test is non-intrusive and should not be creating any undue stress on the mailserver.

Another RBL that performs a similar service is njabl.org. Using the queries sent to their system from participating mailservers, they then test those remote hosts to determine open relay status. we use their RBL in conjunction with others and participate in the above service.

However, we did take the time to add a notice that displays when a remote host connects to our or a client mailserver that states our policy (below) - something RoadRunner has neglected to do.

220-mail.xxxx.xxx ESMTP server ready at Sat, 15 Mar 2003 01:17:50 -0500.
220-
220-  NO UNSOLICITED OR UNCONSENTED TO COMMERCIAL EMAIL IS WANTED
220-  OR WELCOME HERE AND IS SUBJECT TO THE TERMS SHOWN AT:
220-          http://www.xxxx.xxx/xxx_xxxxxx.htm
220-
220-              RBL Testing and Publishing Notice
220-
220- ----------------- NOTICE - and - TERMS OF USE -----------------
220-
220-  We reserve the right to test all offerings and intermediate
220-  relay hosts used by you for Open Relay and related status,
220-  and to report for public publishing the results of our tests.
220-
220-  All content offered to this mailserver is done without any
220-  further expectation of privacy by you, and you grant to us
220-  full rights of republication at our sole discretion.
220-
220-  We also infer irrevocable explicit consent to our test of
220-  those hosts, once you have further used our resources.
220-
220-  Do not accept these polices?  Okay -- Disconnect.
220-
220-  Type quit to disconnect NOW, and send paper mail
220-  to our domain mailing address if you disagree with any of
220-  these terms and reporting.
220- ---------------------------------------------------------------
220-  Revised 2003-03-11
220- ---------------------------------------------------------------
220

Regards,
--Tim

---

From: "Adam Goldberg" <adam_g () yahoo com>
To: <declan () well com>
Subject: RE: Email a RoadRunner address, get scanned by their security system
Date: Sat, 15 Mar 2003 09:34:59 -0500


Declan,

I'm afraid I don't understand this complaint.  The response explains it
reasonably well: for each IP address that sends email into roadrunner, once
a week they check the sending SMTP to see if it is an open relay.

How do you automatically avoid receiving mail from open relays?  Check each
sender to see IF they are an open relay.

Adam

Adam Goldberg
adam_g () yahoo com



---

doing -bs
Date: Sat, 15 Mar 2003 11:44:13 -0500 (EST)
From: John Jasen <jjasen () realityfailure org>
X-X-Sender: jjasen@bushido

They scan your mail port, ftp I believe, and several well-known proxy
ports.

I love how they scan you for emailing a rr.com address, but if you check
your firewall or system logs, you'll discover smb attacks, mssql probes,
and a whole host of other baddies ...

--
-- John E. Jasen (jjasen () realityfailure org)
-- User Error #2361: Please insert coffee and try again.

---


X-Sender: poosld () pop-server ec rr com
X-Mailer: QUALCOMM Windows Eudora Light Version 3.0.6 (32)
Date: Sat, 15 Mar 2003 11:52:23 -0500
To: declan () well com
From: Larry Poos <poosld () ec rr com>
Subject: Re: FC: Email a RoadRunner address, get scanned by their
  security  system
Cc: gunnar () onepeople org
In-Reply-To: <5.1.1.6.0.20030314152453.02ca9008 () mail well com>

The internet is not private, secure or friendly, The government
wants to read your email and track where you surf, Crooks want your
private and personal data, Marketers want your spending and personal
habits profile, Financial and Insurance companies want your asset
and medical information for risk profiling.

I find that in the 57,000+ probes my firewalls have logged since
1/1/2003 413 have IP numbers related to RR and only 20 have been
from the RR security IP number. The single largest prober to my
system by far are computers from atl.client2.attbi.com with over
1280 probes in the same time period.

As to the privacy issue, RR is doing no more than you calling back a
number with caller ID that left a message on your answering machine
(non-issue to me). If that bothers you use web type email or an
anonymous remailer to hide your originating IP number (and take your
chances on the mail getting through).

As to the anti-spam measures question; Yes they have come to this,
with spam sucking up massive amounts of network resources and
manpower in an attempt to control it. I personnaly feel that
blocking relays and proxy servers will eventually kill the spam
industry but only if all the ISPs do it and do it using the same
rules.

As to your right to poke and prod computers. Do so at your own risk,
port scanning has been around for a long time, though not (to my
knowledge) illegal in itself, high levels of port scanning tends to
whiz-off network administrators. The firewalls will log your probes,
excessive probing (based on individual network paramaters) will
trigger DOS investigations on many networks.

What is so obnoxious with the opt out policy? They tell you plain
and simply if you connect to us we will probe you. If you don't want
us to probe you have two choices, ask us not to probe you, but you
must be the designated contact for your IP address (in your case
Cedant Web Hosting) or don't connect to us, to me this is a straight
forward policy. At least they have a policy (I have not been able to
find one for attbi.com). Probe me and I reserve the right to probe
back and I d0n't have an opt-out policy either.

Larry D. Poos
[System Consultant]
LTAD Enterprises





-------------------------------------------------------------------------
POLITECH -- Declan McCullagh's politics and technology mailing list
You may redistribute this message freely if you include this notice.
To subscribe to Politech: http://www.politechbot.com/info/subscribe.html
This message is archived at http://www.politechbot.com/
Like Politech? Make a donation here: http://www.politechbot.com/donate/
-------------------------------------------------------------------------
Declan McCullagh's photographs are at http://www.mccullagh.org/
-------------------------------------------------------------------------


Current thread: