7
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Network Abuse: The APNIC Network Abuse: The APNIC perspective perspective Network Abuse BOF Network Abuse BOF APNIC 12 APNIC 12 th th Open Policy Open Policy Meeting Meeting Taipei, TW, 30 August Taipei, TW, 30 August 2001 2001

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Network Abuse: The APNIC perspective Network Abuse BOF APNIC 12 th Open Policy Meeting

Embed Size (px)

Citation preview

Page 1: A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Network Abuse: The APNIC perspective Network Abuse BOF APNIC 12 th Open Policy Meeting

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E

Network Abuse: The APNIC Network Abuse: The APNIC perspectiveperspective

Network Abuse BOFNetwork Abuse BOF

APNIC 12APNIC 12thth Open Policy Meeting Open Policy Meeting

Taipei, TW, 30 August 2001Taipei, TW, 30 August 2001

Page 2: A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Network Abuse: The APNIC perspective Network Abuse BOF APNIC 12 th Open Policy Meeting

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E

IntroductionIntroduction

What sorts of abuse are we talking about?What sorts of abuse are we talking about? SpammingSpamming HackingHacking VirusesViruses

Many blur the line between spam and hackingMany blur the line between spam and hacking

Related problem for APNICRelated problem for APNIC Complaints about spamming, hacking, and Complaints about spamming, hacking, and

viruses (and credit card fraud, and stalking, viruses (and credit card fraud, and stalking, and other “illegal” activities)and other “illegal” activities)

Page 3: A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Network Abuse: The APNIC perspective Network Abuse BOF APNIC 12 th Open Policy Meeting

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E

Level of impactLevel of impact

Snapshot of impactSnapshot of impactTwo week periodTwo week periodOf 2357 tickets in total, more than 1000 were abuse Of 2357 tickets in total, more than 1000 were abuse

relatedrelatedTracked request queues onlyTracked request queues onlyNot including personal Not including personal

mailboxes and mailboxes and non-tracked accountsnon-tracked accounts

Approx 1-3 staff- Approx 1-3 staff- hours per dayhours per day

Snapshot of abuse-related tickets

Hacking (and other abuse) complaints

15%

Spam complaints

44%

Actual spam41%

Page 4: A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Network Abuse: The APNIC perspective Network Abuse BOF APNIC 12 th Open Policy Meeting

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E

Why does APNIC get complaints?Why does APNIC get complaints?

What is Whois?What is Whois? Technical troubleshooting resourceTechnical troubleshooting resource

Who are Whois users?Who are Whois users? Used to be technical peopleUsed to be technical people Now it can be anyone on the InternetNow it can be anyone on the Internet Software tools have introduced Whois to the Software tools have introduced Whois to the

broader communitybroader communityThis is the source of the greatest confusion and This is the source of the greatest confusion and

misplaced complaintsmisplaced complaints

Page 5: A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Network Abuse: The APNIC perspective Network Abuse BOF APNIC 12 th Open Policy Meeting

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E

APNIC’s roleAPNIC’s role

APNIC can be responsible for:APNIC can be responsible for: Quality of registrationQuality of registration

Integrity of contact detailsIntegrity of contact details Input for future development of WhoisInput for future development of WhoisEnhanced Whois interfaceEnhanced Whois interface

EducationEducationTrainingTrainingFAQsFAQsStandard repliesStandard repliesPublic discussionsPublic discussions

Page 6: A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Network Abuse: The APNIC perspective Network Abuse BOF APNIC 12 th Open Policy Meeting

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E

APNIC’s roleAPNIC’s role

APNIC cannot be responsible for:APNIC cannot be responsible for: Policing behaviourPolicing behaviour

No legal power to do itNo legal power to do itNo practical ability to do itNo practical ability to do itAnd it would not be appropriate anywayAnd it would not be appropriate anyway

Registries are responsible for how their constituents Registries are responsible for how their constituents manage their addressingmanage their addressing

Registries are Registries are notnot responsible for conduct or content responsible for conduct or content within networkswithin networks

Page 7: A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Network Abuse: The APNIC perspective Network Abuse BOF APNIC 12 th Open Policy Meeting

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E

A shared problemA shared problem

Misunderstanding of the regional split of Misunderstanding of the regional split of Whois biases the perception others have of Whois biases the perception others have of this regionthis region

Common view is that “Asia” is where Common view is that “Asia” is where spammers and hackers thrivespammers and hackers thrive

Increasingly frequent requests for information Increasingly frequent requests for information to allow wide-scale filteringto allow wide-scale filtering

APNIC seeks advice on strategies and APNIC seeks advice on strategies and actions…actions…