Skip to main content

You're viewing an archived page. It is no longer being updated.

RIPE 68 Anti-Abuse Working Group Minutes

Anti-Abuse Working Group Minutes – RIPE 68

Date: Thursday, 15 May 2014, 14:00-15:30

Working Group Chairs: Brian Nisbet, Tobias Knecht

Scribe: Fatemah Mafi

Status: Draft

A. Administrative Matters

Brian welcomed the participants to the Working Group session and introduced himself and Tobias as co-chairs. and thanked the RIPE NCC for providing support in the form of chat monitor, scribe and stenographers.

The minutes from RIPE 67 and RIPE 66 were approved and there were no additions to the agenda.

B. Update

Brian asked the room if there was anything pertaining "abuse-c:" that needed to be raised. As nobody spoke up, Brian stated that it could be covered later on if needed.

Brian mentioned that he had circulated some text for the working group charter. He noted that there had been some discussion but was happy to keep any discussion on the list. He invited the room to make any comments there and then if needed.

There were no comments.

Brian urged the participants to read the charter on the mailing list.

C. Policies

Brian stated that there were no open policies at the moment.

D1. Interactions With Other Working Groups

Regarding interactions with other working groups on policy, Brian noted that he and Tobias had agreed with Nigel Titley and Wilfried Wober, the Database Working Group Chairs, that he and Tobias would work on the data verification policy. He mentioned that he and Tobias would not have time for this soon, and therefore urged participants that, should they want to take on the task, they were welcome.

D2. Proof of identity discussions – RIPE Policy Proposal 2007-01

There was some discussion about the level of proof of identity that the RIPE NCC should expect.

Athina Fragkouli, RIPE NCC, stated that this was also discussed in the Address Policy Working Group and there were not many concerns about how the RIPE NCC handles proof of identity. She added that the RIPE NCC is always open to changing procedures.

Brian asked the room whether the RIPE NCC are doing enough, too little, or to much regarding proof of identity. He asked if there should be more trust.

Jim Reid, unaffiliated, felt that things should be left as they are. He expressed that he thought it was bad to collect personal data unless there is a strong need for the data. However, he can appreciate the RIPE NCC's point and can see how it's useful in some cases, such as for law enforcement and other aspects of anti-abuse.

Brian agreed that it's okay for the RIPE NCC to continue as it is.

D3. RIPE NCC Government/LEA Interactions Update

-Marco Hogewoning, RIPE NCC

The presentation is available online:
https://ripe68.ripe.net/presentations/387-AA-LEA-Update-MH1_AG.pdf

Alexander Isavnin, NetLine, asked if it was possible for a Dutch membership organisation to join closed meetings and not reveal what was discussed.

Marco responded that he thought it was possible.

Alexander stated that the community wants to know what happens at these meetings and urged for no secrecy. He wanted to know the name, rank, and position of those attending these meetings with law enforcement.

Marco stressed that these meetings are with law enforcement agencies (LEAs), not with the intelligence community.

Alexander responded that name, rank and position will support that the attendees are not from the intelligence community.

Marco responded that the RIPE NCC is looking at a way to improve the reporting but needs to work with LEAs about the information that can be published. He added that it may be possible to publish attendee lists and or give more information about the attendees, however, it's important that the trust level is maintained between the LEAs and the RIPE NCC.

Alexander responded that he wants European interaction to be more clear.

Jochem De Ruig, RIPE NCC, stated that Brian Nisbet is invited to these meetings so that he can provide input from the community's perspective.

Brian added that he has been asked by someone from the National Crime Agency (NCA) to remove their name from a public agenda as their friends and family did not know with whom they were employed. Brian felt that there would not be much cooperation if a full list of attendees was to be published.

Malcolm Hutty, LINX, added that it's about balance and satisfying all parties reasonably. With some advance planning, he feels that basic information could be disclosed and some transparency added. He added that it would be best to avoid mentioning whether anything operational was discussed (or not). He also noted that some individuals would probably need their names kept secret and off lists, and therefore it may make sense to ask them if the name of their organisation could be published.

Brian agreed that he fully advocates transparency and agreed with the need for balance.

Jim Reid agreed with Malcolm, and urged for more forward planning. He also added that he felt it would be wrong to disclose the name, rank and identity of everybody attending a meeting because that, in itself, could disclose operational details.

Marco concluded that that he will take this back to law enforcement and work with them on future events to achieve better reporting.

E1. "Anti-Abuse: The View from the Messaging World"

-Jerome Cudelou, M3AAWG

The presentation is available online:
https://ripe68.ripe.net/presentations/373-M3AAWG.pdf

Brian asked whether there are any more areas of mutual engagement that could be touched upon.

Jerome responded that it would be best to become members of M3AAWG.

Brian asked whether non-members of M3AAWG could contribute to M3AAWG's documentation.

Jerome responded that he didn't think it was easy to do and that it is better to become a member.

Rüdiger Volk, Deutsche Telekom, asked if there were documents that would explain what is expected of an abuse contact.

Jerome responded that the document is under discussion.

Vincent Schonau, abuseix and co-chair of the Training Committee at M3AAWG, further clarified that there is the Abuse Desk Best Practises document that is now a few years old. He added that the Abuse Desk Special Interest Group has revived the document and would work on it in upcoming meetings.

Alex de Joode, LeaseWeb, stated that LeaseWeb is not a member of M3AAWG but are participating in the Hosting Special Interest Group (SIG) and the Abuse SIG so participation is possible without becoming a member.

Brian asked Alex what the procedure was for participation.

Alex responded that he had sent a message to Gerry Upton and received a free invitation.

Samaneh Tajalizadehkhoob, Delft University of Technology, asked if M3AAWG cooperate with research institutions. She mentioned that Delft University of Technology are working on banking malware and mobile malware, and asked if M3AAWG share data with them.

Jerome responded that they do share data with research institutions.

Vincent noted that M3AAWG has a very open policy about inviting people to come to the European meetings and the emerging groups such as the Hosting SIG. He directed interested parties to Gerry, Jerome or himself for an invitation.

Brian asked an open question to RIPE NCC members in the room whether there had been any interaction with M3AAWG since RIPE 45 in Barcelona.

Jochem de Ruig, RIPE NCC, responded that the RIPE NCC would try to come to Brussels and that the RIPE NCC did find the meeting useful for engagement with the community.

E2: Impact of abuse-c

-Bengt Gördén, Resilans

The presentation is available online:
https://ripe68.ripe.net/presentations/383-impact_abuse-c.pdf

Ruediger asked whether the message to the abuse-c at Spamhaus was successful.

Bengt replied that it was not, and asked if there were questions about that.

Ruediger continued, adding that Spamhaus is bullying people on the Internet and that a joke he had heard is that it may be possible to send a claim of copyright or trademark infringement with the name Spamhaus and send it to .org.

Bengt added that it would work.

Ruediger added that the Internet community needs to make sure that things are balanced out, thanking Bengt for his presentation.

Erik Bais, ATB Internet, added that they had been in the same situation with Spamhaus and it had been well-documented.

Bengt responded that he had read about it.

Erik continued that they had disclosed fully about their interactions with Spamhaus, who had behaved brazenly in return, finding the situation amusing and even blogging about it on their website. Erik added that Spamhaus do not care and that they have been invited to the RIPE Anti-Abuse Working Group sessions, to have a panel and discuss the proper policies, but had refused the invitation.

Brian added that that the relations between the Working Group and Spamhaus were not as good as they would like, and redirected the discussion back to “abuse-c:”.

Erik stated that they transferred some of their address blocks and even after six months they still receive emails to their abuse mailbox regarding blocks that they don't own anymore. He called for people to use the RIPE Database and asked how it is possible to make people update their information.

Bengt replied that he feels the community needs to work on this issue collectively, but not necessarily in a way that results in any legislation or policy.

Erik added that it's good to remember that Spamhaus does not block mail and there is always a need for well-managed block lists.

Peter Koch, DENIC, asked Bengt about his slides as they seemed somewhat contradictory to him, as they looked more like a “suffering story” rather than a success story and he did not understand why it was being used as an example, as Bengt's “I told you so.”

Bengt responded that maybe it is time that they give up on optimising the “abuse-c:” for an audience that cannot be educated.

Brian invited Tobias Knecht, his fellow chair of the Anti-Abuse Working Group to comment on similar policies in other regions.

Tobias stated that the policy about “abuse-c:” was brought into APNIC in a different way, as well as at AFRINIC. While the implementations were different, the end result was the same - that there is an abuse contact in the Whois Database, a single space.

Bengt noted that he had tried to get an abuse contact for Spamhaus and it hadn't worked.

Alex Le Heux, Kobo Inc, added that they had similar experiences with many of those blacklists. He stated that Spamhaus regularly attends M3AAWG and advised those who wanted to meet with them, to go to the Brussels meeting. He invited those with similar experiences to come to the meeting so that some sort of best practises for blacklists can be set up.

Brian confirmed that a best practises document that has come out of M3AAWG already exists.

E3: Abuse-c: Next Steps for “abuse-c:”

-Denis Walker and Christian Teuschel, RIPE NCC

The presentation is available online:
https://ripe68.ripe.net/presentations/162-aa_wg.pdf

Brian noted that time was running short, and some discussion may need to be directed to the mailing list.

Ruediger asked if it was explained anywhere how ORGANISATION objects should be used.

Denis responded that it was one of the big problems with the RIPE Database.

Ruediger noted that there is no documentation and explanation of the data model that the RIPE NCC says that the community should be following.

Denis replied, saying that no business rules were built into the software to enforce any of this, and agreeing that there are no guidelines.

Ruediger argued that, if there is a data architecture that should be followed, it should be documented and agreed upon. He called for a document that explains what the architecture is.

Brian asked whether this discussion would be something better suited to the Database Working Group.

Peter thanked Denis and Christian for their hard work. He noted that the RIPE Policy Development Process allows early and often objections and he believes that they are at risk of going completely overboard in a variety of aspects. He stated that he thinks that the model is in the wrong direction, and he is opposed to “salami tactics”. His interpretation of one of the slides is that there is an ORG object and the addresses hang off it, and he cannot find any document that describes it that way. The database model with which he is familiar is one built around the objects you ask for, and the information attached to the objects, in other objects. He called for changes to the model. He added that if this were moved to the Database Working Group, that would only partly help as the changes proposed from the Anti-Abuse Working Group may not be compatible with the Database Working Group point of view.

Brian clarified that, if there were issues with the architecture and business rules and documentation, then it would be more appropriate for the Database Working Group to work with the RIPE NCC to get that written.

Peter stated that it may be time to reconfirm the mission of the RIPE Database, adding that it should not become a “compliance stick” for Local Internet Registries or resource holders.

Christian asked Peter what he had meant by “salami tactic” regarding the validation.

Peter clarified that having a mailbox does not mean that mail is delivered or read. The next slice of salami is to validate, so that mail can be expected to be deliverable. He envisioned that, three months later, it won't only be deliverable, but there would be a reply.

Christian replied that this is what they had proposed, improving the data quality.

Peter added that caution would need to be taken when regarding data quality as it is a topic for the admin-c and the resource holder. He believes that the data should be correct because that is the core mission.

Via remote participation, Gilles Massen asked if, as the existing IRT objects are becoming more invisible, would it be possible to reference an IRT from the “abuse-c:” or at least add the useful IRT features like BGP keys to the “abuse-c:”. He stated that he would like to see relaxed constraints like a copyright-abuse-mailbox: NULL for signalling that one should not expect a reply to those sorts of messages. He also asked that IRT objects not be touched without prior discussion in the Working Group.

Denis responded that the RIPE NCC understands that the IRT object is not very popular and that they have been asked to propose to the community as to how the IRT could be made more useful. He will provide feedback to the Working Group for further review.

Piotr Strzyżewski, Silesian University of Technology, referred to Bengt's presentation, noting that some of these corporations don't care about the "abuse-c:" and therefore it wouldn't be useful to establish another point of contact for them. He sarcastically added that he “loves" the idea of national responsibility (with the opposite being his true feelings on the matter). However, he does feel that there should be some policy regarding validation.

Christian responded that he thinks validation and extending the ROLE object should go through the RIPE Policy Development Process.

Brian stated that he thinks it must go through that process.

Christian continued, stating that extending the ROLE object is something that has come from the community. While he acknowledges that some countries have more than one national CSIRT, the implementation needs to be clear and the list of contact details for all of them should be provided. He added that the RIPE NCC is trying to work with them, in the case that the “abuse-c:” fails.

Brian asked about the origin of the request from the community.

Christian replied that it hadn't come from the mailing list, and had come from a meeting of the computer security community.

Kaveh Ranjbar, RIPE NCC, added that the provision of a proper abuse contact was a recurring point in the RIPE NCC Survey 2013's results and therefore the RIPE NCC had started to attend security conferences.

Ruediger asked Christian if the CSIRTS were happy about getting the reports, or if they were unhappy.

Christian replied that they were happy.

Ruediger expressed doubt and surprise that they would be happy to be “flooded” by copyright abuse reports. He called for guidelines and information as to what kind of report people should be sending to abuse contact, and how people should be responding to these reports.

Denis added that, if Ruediger wants the RIPE NCC to provide these guidelines, then the community should provide the text.

Ruediger agreed with Denis that this is a task for the Working Group.

Brian added that he was surprised that the CSIRTS were happy, and noted that many countries don't have a CSIRT. He added that he would put out a call for volunteers to help work on the guidelines.

Ruediger added that, without guidelines, doing validation beyond mechanics is meaningless.

E4: Introduction to Contact Databases for Abuse Handling

-Aaron Kaplan, nic.at

Aaron explained how they do contact lookups at csirt.at, a national CSIRT for Austria. He noted that a national CSIRT is usually just a router for abuse contact information and that there are different approaches in different countries. Aaron asked those involved with the RIPE Database to have IRT objects, “abuse-c”, etc. as specific and up-to-date as possible as it will help those sending information to national CSIRTS for lookups.

Brian asked where the information about Aaron's presentation would be available and if he could publish it to the list.

Aaron added that it is a document on Github.

Brian asked if he could email the list with the URL.

Aaron replied that it is part of a document that Christian Teuschel and Mirjam Keuhne, RIPE NCC, and Wilfried Woeber started. It is connected to a GitHub project called GitHub.com/CERTtools that is a contact cache/contact database for national CSIRTs so that they can build on the process.

Brian added that it might be good to discuss this in more depth at a future RIPE Meeting.

Aaron stated again that the CSIRT is just acting as a router, passing copyrights through, and the copyrights end up with network owners under their policies. However, he noted that the routing process can be optimised.

There were no further questions or comments.

Brian thanked Aaron for his presentation and invited the room to contribute agenda items for RIPE 69 in London. He thanked the scribe, speakers, stenographers and participants before closing the session.