Draft Policy ARIN-2019-5: Validation of Abuse-mailbox
ARIN
info at arin.net
Tue Mar 26 15:52:35 EDT 2019
On 21 March 2019, the ARIN Advisory Council (AC) accepted
"ARIN-prop-264: Validation of Abuse-mailbox" as a Draft Policy.
The Draft Policy text is below and can be found at:
https://www.arin.net/participate/policy/drafts/2019_5/
You are encouraged to discuss all Draft Policies on PPML. The AC will
evaluate the discussion in order to assess the conformance of this draft
policy with ARIN's Principles of Internet number resource policy as
stated in the Policy Development Process (PDP). Specifically, these
principles are:
* Enabling Fair and Impartial Number Resource Administration
* Technically Sound
* Supported by the Community
The PDP can be found at:
https://www.arin.net/participate/policy/pdp/
Draft Policies and Proposals under discussion can be found at:
https://www.arin.net/participate/policy/drafts/
Regards,
Sean Hopkins
Policy Analyst
American Registry for Internet Numbers (ARIN)
Draft Policy ARIN-2019-5: Validation of Abuse-mailbox
Problem Statement:
The current policy, “3.6. Annual Validation of ARIN’s Public Whois Point
of Contact Data” does not provide sufficient validation of the actual
availability of the abuse mailbox.
As a result, some resource-holders (LIRs and end-users) might not keep
this contact information up to date, or might use a non-responsive
mailbox, which could be full or not actively monitored, or even
responding only to ARIN emails.
In practice, this contact becomes ineffective to report abuse and
generally gives rise to security issues and costs for the victims.
Furthermore, POCs are verified only every year and provides a too much
relaxed response time (60 days).
Finally, the proposal is aiming to have a standard abuse-c/abuse-mailbox
as a pointer to the actual abuse POC, in order to facilitate tools
across regions.
This proposal aims to solve those issues and ensure the existence of a
proper abuse-c POC and the process for its utilisation.
a. Arguments Supporting the Proposal
The Internet community is based on collaboration. However, in many cases
this is not enough and we need to be able to contact those
resource-holders (LIRs or end-users) that may be experiencing a problem
in their networks and are unaware of the situation.
This proposal solves this problem by means of a simple, periodic
verification, and establishes the basic rules for performing such
verification and thus avoids unnecessary costs to third parties that
need to contact the persons responsible for solving the abuses of a
specific network.
The proposal guarantees that the cost of processing the abuse falls on
the resource-holder causing the abuse (or its customers, from whom they
receive financial compensation for the service), instead of falling on
the victim, as would be the case if they had to resort to a legal claim
in an extreme case, thus avoiding costs (investigation and in the
worst-case lawyers, solicitors, etc.) and saving time for both parties.
Having an equivalent policy in different regions, has the advantage of
improving overall response to abuse cases, reduces the cost for handling
them, and facilitates the work for all the people involved in the
operation of Internet.
b. Arguments Opposing the Proposal
ARIN members have to verify and update (if required) their abuse-c
objects periodically.
Policy Statement:
Proposed
1.0 Abuse Contact Information
The “abuse-c:” will reference a role object holding abuse contact
information. The positioning of the “abuse-c:” attributes will make use
of the hierarchical nature of the resource data to minimize the workload
on resource holders. Internet number resources need to have an
“abuse-c:” attribute. The “abuse-c:” will be mandatory for all aut-nums.
Due the hierarchical nature of IP address objects, at least every direct
allocated inetnum and inet6num needs to have an “abuse-c:”. Inherited
objects might have their own “abuse-c:” attribute or they will be
covered by the higher-level objects. The role objects used for abuse
contact information will be required to contain a single
“abuse-mailbox:” attribute which is intended for receiving automatic and
manual reports about abusive behavior originating in the resource
holders’ networks. The “abuse-mailbox:” attribute must be available in
an unrestricted way via whois, APIs and future techniques. ARIN will
validate the “abuse-mailbox:” attribute at least every six months, as
per the procedure stated in this policy. Where the attribute is deemed
incorrect, it will follow up in compliance with relevant ARIN policies
and procedures. As per current practice, other “e-mail:” attributes can
be included for any other purposes.
2.0 About the “abuse-mailbox”
Emails sent to “abuse-mailbox” must require manual intervention by the
recipient at some point, and may not be filtered, because in certain
cases this might prevent receiving abuse reports, for example in a spam
case where the abuse report could include the spam message itself or
URLs or content usually classified as spam. The “abuse-mailbox” may
initially send an automatic reply, for example assigning a ticket
number, applying classification procedures, requesting further
information, etc. However, it should not require that the abuse reporter
fills a form, as this will imply that each entity that needs to report
abuse cases (a task that is typically automated), would be forced to
develop a specific interface for each resource-holder in the world that
mandates filling forms, which is neither feasible nor logical, as it
would place the cost of processing the abuse on those who submit the
claim and are therefore victims of the abuse, instead of being paid for
by those whose clients cause the abuse (and from whom they obtain
income). By way of information, it is worth noting that it is reasonable
to expect that the abuse reporting procedure sends, with the initial
abuse report, the logs, a copy of the spam message (attaching an example
of the spam email or its full headers), or equivalent evidence
(depending on the abuse type). Likewise, it is reasonable to expect that
the initial auto-reply email could specify that the claim will not be
processed unless such evidence has been submitted, thus allowing the
sender an opportunity to repeat the submission and include relevant
evidence. This allows automatic reporting, for example, via fail2ban,
SpamCop or others, keeping costs at a minimum for both parties involved.
3.0 Objectives of “abuse-mailbox” validation
The procedure, which will be developed by the ARIN, must meet the
following objectives: 1. A simple process that guarantees its
functionality and allows the helpdesks that deal with abuse reports to
verify that validation requests actually come from the ARIN and not from
third parties (which might involve security risks), avoiding, for
example, a single “direct” URL for validation. 2. Avoid exclusively
automated processing. 3. Confirm that the person performing the
validation understands the procedure and the policy, that they regularly
monitor the “abuse-mailbox”, that measures are taken, and that the abuse
report receives a response. 4. Validation period of no longer than 15
days. 5. If validation fails, escalate to the LIR and set a new
validation period not to exceed 15 days. The “initial” and “escalation”
validation periods may be modified by the ARIN, if deemed appropriate,
informing the community about the motivation. For example, it could be
longer for the first validation, once this policy is implemented, and
shortened afterwards once the percentage of failures decreases, so the
quality of the contacts increases and consequently a decrease in the
average abuse response times could be expected. (By way of example, a
detailed procedure is included in this policy proposal under
“Comments/Example of the validation procedure”) 4.0 Validation of
“abuse-mailbox”
ARIN will validate compliance with the items above, both when the
“abuse-c:” and/or “abuse-mailbox:” attributes are created or updated, as
well as periodically, not less than once every six months, and whenever
ARIN sees fit. At the discretion of ARIN, in general or in specific
cases (for example, for confirmation in cases of escalation under 5.),
ARIN may use domains other than arin., and even modify the subject and
body of the message, in order to perform said validations more
effectively. Lack of compliance will initially lead to the blocking of
that account’s access to the invalid resources at ARIN Online, except
for the abuse-c/abuse-mailbox update and payments. The account blocking
will be released upon re-validation of the abuse-c/ abuse-mailbox,
triggered automatically by the update of the abuse-c/abuse-mailbox.
During the blocking of that account to the invalid resources, each time
is accessed, will show a warning message including this policy text, and
to continue it will be necessary to confirm by means of a check-box,
that the message has been read in full. ARIN will do a more exhaustive
follow-up, in accordance with the relevant ARIN policies, procedures or
contractual requirements. The frequency of the periodic validation could
be modified if ARIN deems this appropriate and informs the community of
its reasons. For example, a single validation could be done in the first
year, to facilitate adherence to the policy, and then the number of
annual validations could progressively increase, reaching even quarterly
ones, with the aim of improving the quality of the contacts.
5.0 Escalation to ARIN
To avoid fraudulent behavior (for example, an “abuse-mailbox” that only
replies to ARIN emails or to messages with a specific subject or
content), or failure to comply with the remaining aspects of this policy
(incorrect or lack of response to cases of abuse), a mailbox will be
available (for example, “escalation-abuse at arin.net”), to escalate such
situations. This would allow for a re-validation (according to section
4. above) and even intervention by ARIN and, where appropriate, the
application of the relevant policies, procedures or contractual
requirements.
Comments:
Timetable for implementation: Immediate
Anything Else
Situation in other regions:
A similar proposal has been accepted in APNIC (being implemented) and is
under discussion in the LACNIC and AFRINIC regions. It has also been
submitted to RIPE (still not published).
Example of the validation procedure.
1. ARIN initiates the validation automatically, sending TWO consecutive
emails to the “abuse-mailbox”.
2. These emails will be sent containing plain text only.
3. The first email will contain the URL where the validation is to be
performed (“validation.arin.net”) and may contain information about the
procedure, a brief summary of this policy, etc.
4. The second email will contain a unique alphanumeric validation code.
5. The person in charge of the “abuse-mailbox” must go to the URL and
paste the code received in the second email in the form.
6. This URL must be designed in such a way that it prevents the use of
an automated process (for example, “captcha”). In addition, it must
contain a text that confirms that the person performing the validation
understands the procedure and the policy, that they regularly monitor
the “abuse-mailbox”, that measures are taken to solve reported cases of
abuse, and that the abuse report receives a response, with a “checkbox”
that must be accepted in order to proceed.
7. The alphanumeric code will only be valid for a maximum of 15 working
days.
8. If the code is not entered within that time, the system will mark the
“abuse-c” as “temporarily invalid” and will alert ARIN staff so that
they can initiate a personalized follow-up with the LIR.
9. If no reply is received confirming that the situation has been
corrected, after an additional period of three business days, the
“abuse-c” will be permanently marked as “invalid”.
10. Once the issue has been resolved, the validation process will be
repeated automatically (items 1 to 7 above). If satisfactory, the
“abuse-c” will be marked as “valid”; otherwise it will be considered in
breach of the policy.
More information about the Info
mailing list