apnic abuse procedures network abuse bof. types of abuse reported spam hacking viruses...
DESCRIPTION
Abuse report statistics Recorded 30 Jul – 29 Aug spam reports 168 abuse reports –Does not include reports made to automated mailboxes: pieces of spam to andTRANSCRIPT
![Page 1: APNIC abuse procedures Network abuse BOF. Types of abuse reported Spam Hacking Viruses Identity/credit card fraud Threats and stalking](https://reader036.vdocuments.mx/reader036/viewer/2022081808/5a4d1b597f8b9ab0599aa95d/html5/thumbnails/1.jpg)
APNIC abuse procedures
Network abuse BOF
![Page 2: APNIC abuse procedures Network abuse BOF. Types of abuse reported Spam Hacking Viruses Identity/credit card fraud Threats and stalking](https://reader036.vdocuments.mx/reader036/viewer/2022081808/5a4d1b597f8b9ab0599aa95d/html5/thumbnails/2.jpg)
Types of abuse reported
• Spam• Hacking• Viruses• Identity/credit card fraud• Threats and stalking
![Page 3: APNIC abuse procedures Network abuse BOF. Types of abuse reported Spam Hacking Viruses Identity/credit card fraud Threats and stalking](https://reader036.vdocuments.mx/reader036/viewer/2022081808/5a4d1b597f8b9ab0599aa95d/html5/thumbnails/3.jpg)
Abuse report statistics
Recorded 30 Jul – 29 Aug 2002• 423 spam reports• 168 abuse reports
– Does not include reports made to automated mailboxes:
[email protected] [email protected] [email protected]@apnic.net
• 1361 pieces of spam to [email protected] and [email protected]
![Page 4: APNIC abuse procedures Network abuse BOF. Types of abuse reported Spam Hacking Viruses Identity/credit card fraud Threats and stalking](https://reader036.vdocuments.mx/reader036/viewer/2022081808/5a4d1b597f8b9ab0599aa95d/html5/thumbnails/4.jpg)
Responding to abuse reports
• Explain APNIC is not the source• Point the requestor to the APNIC network
abuse FAQhttp://www.apnic.net/info/faq/abuse/
• If contact details are incorrect, forward report to APNIC Hostmasters
• If requestor misunderstands APNIC’s role, explain the role of RIRs
• Continued reports lead to requestor being notified their emails will not be answered in future
![Page 5: APNIC abuse procedures Network abuse BOF. Types of abuse reported Spam Hacking Viruses Identity/credit card fraud Threats and stalking](https://reader036.vdocuments.mx/reader036/viewer/2022081808/5a4d1b597f8b9ab0599aa95d/html5/thumbnails/5.jpg)
Reasons people contact APNIC
• ARIN whois database– Not aware of other whois databases– Automated software points to ARIN
• Reverse DNS lookups– Many AP networks don’t register reverse
domains. • Only high level APNIC reverse domain
appears
![Page 6: APNIC abuse procedures Network abuse BOF. Types of abuse reported Spam Hacking Viruses Identity/credit card fraud Threats and stalking](https://reader036.vdocuments.mx/reader036/viewer/2022081808/5a4d1b597f8b9ab0599aa95d/html5/thumbnails/6.jpg)
Reasons people contact APNIC
• APNIC Whois Database– Misread search results
• Source and changed attributes– No response from tech-c, admin-c– Invalid network contacts
• Legacy AUNIC, ARIN records• Networks no longer APNIC members• Customer assignments not up to date
• Misunderstand the role of the RIRs– Believe RIRs provide connectivity
![Page 7: APNIC abuse procedures Network abuse BOF. Types of abuse reported Spam Hacking Viruses Identity/credit card fraud Threats and stalking](https://reader036.vdocuments.mx/reader036/viewer/2022081808/5a4d1b597f8b9ab0599aa95d/html5/thumbnails/7.jpg)
What can APNIC do?• Educate
– Standard replies – Abuse FAQ– Training– Public discussions
• Maintain the database– Integrity of contact details
• Promote role objects and email accounts– Enhanced Whois interface and help– Input for future Whois development
![Page 8: APNIC abuse procedures Network abuse BOF. Types of abuse reported Spam Hacking Viruses Identity/credit card fraud Threats and stalking](https://reader036.vdocuments.mx/reader036/viewer/2022081808/5a4d1b597f8b9ab0599aa95d/html5/thumbnails/8.jpg)
What can’t APNIC do?
• Police networks– No legal power to do this– No practical way to do this– Inappropriate behaviour for RIR
• RIRs are responsible for how networks manage their addresses
• RIRs are not responsible for behaviour of those networks
![Page 9: APNIC abuse procedures Network abuse BOF. Types of abuse reported Spam Hacking Viruses Identity/credit card fraud Threats and stalking](https://reader036.vdocuments.mx/reader036/viewer/2022081808/5a4d1b597f8b9ab0599aa95d/html5/thumbnails/9.jpg)
Directions for the future
APNIC proposal for streamlined abuse handling to be presented later in this BOF
![Page 10: APNIC abuse procedures Network abuse BOF. Types of abuse reported Spam Hacking Viruses Identity/credit card fraud Threats and stalking](https://reader036.vdocuments.mx/reader036/viewer/2022081808/5a4d1b597f8b9ab0599aa95d/html5/thumbnails/10.jpg)
Questions?