Re: several messages

"Chris Lewis" <clewis@nortel.com> Tue, 11 November 2008 22:17 UTC

Return-Path: <ietf-bounces@ietf.org>
X-Original-To: ietf-archive@megatron.ietf.org
Delivered-To: ietfarch-ietf-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C207A3A6935; Tue, 11 Nov 2008 14:17:59 -0800 (PST)
X-Original-To: ietf@core3.amsl.com
Delivered-To: ietf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2BDB33A6935; Tue, 11 Nov 2008 14:17:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.107
X-Spam-Level:
X-Spam-Status: No, score=-5.107 tagged_above=-999 required=5 tests=[AWL=0.200, BAYES_00=-2.599, MISSING_HEADERS=1.292, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id McywUwk4MeO0; Tue, 11 Nov 2008 14:17:57 -0800 (PST)
Received: from zcars04e.nortel.com (zcars04e.nortel.com [47.129.242.56]) by core3.amsl.com (Postfix) with ESMTP id E4EAF3A684F; Tue, 11 Nov 2008 14:17:56 -0800 (PST)
Received: from zrtphxs1.corp.nortel.com (zrtphxs1.corp.nortel.com [47.140.202.46]) by zcars04e.nortel.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id mABMEnL22100; Tue, 11 Nov 2008 22:14:49 GMT
Received: from zrtphx5h0.corp.nortel.com ([47.140.202.65]) by zrtphxs1.corp.nortel.com with Microsoft SMTPSVC(6.0.3790.3959); Tue, 11 Nov 2008 17:17:54 -0500
Received: from [47.130.66.198] (47.130.66.198) by zrtphx5h0.corp.nortel.com (47.140.202.65) with Microsoft SMTP Server (TLS) id 8.1.311.2; Tue, 11 Nov 2008 17:17:53 -0500
Message-ID: <491A048F.70107@nortel.com>
Date: Tue, 11 Nov 2008 17:17:51 -0500
From: Chris Lewis <clewis@nortel.com>
Organization: Nortel
User-Agent: Thunderbird 2.0.0.17 (Windows/20080914)
MIME-Version: 1.0
Subject: Re: several messages
References: <Pine.LNX.4.44.0811102352210.4124-100000@citation2.av8.net> <200811110600.BAA00033@Sparkle.Rodents-Montreal.ORG>
In-Reply-To: <200811110600.BAA00033@Sparkle.Rodents-Montreal.ORG>
X-OriginalArrivalTime: 11 Nov 2008 22:17:54.0235 (UTC) FILETIME=[57C230B0:01C9444B]
Cc: General Area Review Team <gen-art@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: ietf-bounces@ietf.org
Errors-To: ietf-bounces@ietf.org

der Mouse wrote:

>> But DNSBLs can't solve the problem when spam is sent via botnets.
> 
> That's actually true, but not for the reason you imply.  DNSBLs can't
> solve the problem _at all_; it's a social level problem and requires a
> social level solution.  Wnat DNSBLs do is mitigate the damage so that
> we have at least middling-usable email while solutions evolve at the
> social level.

I should also point out that that his original reason (BOTs re-DHCP'ing
themselves too quickly for DNSBLs to be effective) simply isn't borne
out by experience.

Many ISPs force DHCP IP-affinity significantly, and it's kinda hard for
most BOTs to force their cable modem/access router/whatever (which is
the real holder of the DHCP address) to refresh.  But beyond that, it's
our experience that most BOTs emit from the same IP for at least a day
or two, and it's entirely common to see the same IP emitting from the
same BOT for weeks and in some cases for 6 months or longer.  Often
multiple BOT types at the same time, emitting different campaigns. etc.

We are using technology that detects many BOTs (eg: Srizbi, Storm,
Cutwail etc) in real time - about 70% of all "infected PC" spam is
identifiable in our implementation.  The CBL is purported to target the
same sorts of things.  It's been our experience that if we had been
forced to rely on the CBL alone and not our real-time detection, we'd
"miss" at most 10% of the BOT spam (ignoring all other detection
methods), and usually closer to 2-3%.  That's an impressive success
rate, and disproves any notion that DNSBLs are inherently too slow for BOTs.

[Our sample size is on the order of 20M-50M emails per day.  So I don't
think we suffer from being too small to infer useful results from.]
_______________________________________________
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf