Fred Stluka on 6 Sep 2018 11:49:21 -0700


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] Linux tip: Log IP addresses, not hostnames, for use by fail2ban...


Rich,

I imagine they have email-approved netblocks they coordinate with the
reputation services, and ones that are blacklisted.  They don't let
servers use the reputable netblocks without a lot of control, because
they lose all their business if those blocks get a bad reputation.

Yes, AWS has separate blocks of "elastic" IP addresses, vs regular
"dynamic" IP addresses.  They work to protect the reputation of
the elastic addresses, and they set strict limits on the number of
outgoing emails from a dynamic address.

Elastic IP addresses are their solution to giving your server a stable
IP address w/o actually assigning you a static IP.  While a static IP
is typically assigned to a specific server, an elastic IP is assigned to
an AWS account, and you as the account owner, can dynamically
assign it to any of your servers as you like.  So, when you spin up a
new server to replace an old one, you don't have to mess with DNS
entries and propagation delays.  You just flip your elastic IP address
over to the new server.  See my 2009 tip on this topic for details:
- http://bristle.com/Tips/CloudComputing.htm#aws_set_elastic_ip_address

Do similar reputation services exist for services other than email?
The problem is that you probably do want to accept ssh from dynamic
blocks/etc, which is usually the first thing that spam filters go
after.
Good question!  For email, there is:
- SPF -- Sender Policy Framework, where domain owner can create a
   DNS record that lists which IP addresses are authorized to send
   email "from" the domain.  So email can't be sent from unauthorized
   IP addresses.
- DKIM -- DomainKeys Identified Mail, where each email contains
   digital signatures of the headers and body that recipient mail servers
   can decrypt and validate via a public key stored in a DNS record set
   up by the domain owner.  So, email can't be altered in transit.
- DMARC -- Domain-based Message Authentication, Reporting &
  Conformance, where the domain owner can create a DNS record to
  specify what recipient mail servers should do this messages that fail
  SPF and DKIM checks, and how to report them to the domain owner.
- RBLs -- Real-Time Blacklists, where reputations of IP addresses
  and domain names are accumulated, and blacklists managed in
  real-time, so recipient mail servers can block them.
- Spam buttons in most email clients, to allow mail users to ding
   the reputations of domains and IP addresses in the RBLs.
- etc.

Are there similar tools for other IP connections?  Or just email?

--Fred
------------------------------------------------------------------------
Fred Stluka -- Bristle Software, Inc. -- http://bristle.com
#DontBeATrump -- Make America Honorable Again!
------------------------------------------------------------------------

On 9/6/18 12:39 PM, Rich Freeman wrote:
On Thu, Sep 6, 2018 at 12:08 PM Ron Guilmet <ronpguilmet@gmail.com> wrote:
When it comes to an email server they are very protective. For example,
I can't setup an email server, and have it running tonight. I have to
fill out all kinds of forms showing how I intend to handle spam, and it
has to be approved before they will lift the smtp restrictions that
every EC2 instance comes with.
...
Is there a way to get IPs that are not involved in email spam penalized?
This is already a solved problem, and this is WHY they are so
protective about outgoing email.  Their SES service (mail forwarding)
is likewise very protected.  If Amazon didn't tow the line they'd end
up spam reputation lists and then half the planet would be bouncing
their mail, including all the major ISPs/etc.

I imagine they have email-approved netblocks they coordinate with the
reputation services, and ones that are blacklisted.  They don't let
servers use the reputable netblocks without a lot of control, because
they lose all their business if those blocks get a bad reputation.

The reputation services are all third-party, and tend to be run by
folks with more of rsk's mindset.  If you get on the bad side of them,
you're basically done.  No appeals to ICANN or whatever, they have no
official standing, but everybody uses them.  Your only appeal is to go
to every ISP and work out a side deal to whitelist traffic.  Amazon
probably could do that, but wouldn't want to, largely since those ISPs
would just put the same conditions on them anyway.

Do similar reputation services exist for services other than email?
The problem is that you probably do want to accept ssh from dynamic
blocks/etc, which is usually the first thing that spam filters go
after.


___________________________________________________________________________
Philadelphia Linux Users Group         --        http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug