Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [APRICOT 2015]

APNIC
APNICAPNIC
Reporting Network Abuse and
APNIC Whois Database
Accuracy
Aftab A. Siddiqui
Introduction
• The APNIC Whois Database is a publicly
searchable database detailing address usage
within the Asia Pacific region. The results of
any search are provided purely for operational
purposes (such as finding the authoritative
contact for a troublesome machine)
Source: www.apnic.net[1]
Reporting Network Abuse
Use the APNIC Whois Database to obtain
network contacts
• You can use the APNIC Whois Database to
obtain the registration details of the IP
addresses APNIC has delegated. If the those IP
addresses have been further assigned to other
networks, you may also see the registration
details of these assignments.
Source: www.apnic.net[2]
Reporting Network Abuse
Contact The Network
• The admin-c, tech-c, and mnt-irt fields contain
details for the objects associated with the
contact details for the network administrators
responsible.
• You will find the person, role, and/or irt
objects listed in the results generated.
Source: www.apnic.net[2]
Reporting Network Abuse
• Currently many Operators, Investigator/Law
Enforcement Agencies, End-User and other
institutions are using whois database to fetch
contact details to identify and share abuse
cases and other security problems.
• Currently the growing amount of abuse
reports are sent to tech-c, admin-c or mnt-irt
contacts, as encouraged on the APNIC
website.[2]
Reporting Network Abuse
• Whois database data accuracy has been a big issue for
years now. There have been several approaches to get
better data accuracy within whois information all over
the world.
• There are two main reasons for data inaccuracy in
whois:
a) Wrong data is published to camouflage illegal actions.
b) b) Wrong data is published because object owners
forget to update the whois information as changes
occur within their organization (staff changes, etc.)
Source: prop-084 [3]
Reporting Network Abuse
• Currently the only mechanism available is to
report the invalid contact to APNIC.
• APNIC notify the member to update the
record.
Solution
• As per the ARIN Number Resource Policy Manual section
3.6.1:
– Annual Whois POC Validation:
During ARIN's annual Whois POC validation, an email will be sent
to every POC in the Whois database. Each POC will have a
maximum of 60 days to respond with an affirmative that their
Whois contact information is correct and complete.
Unresponsive POC email addresses shall be marked as such in the
database. If ARIN staff deems a POC to be completely and
permanently abandoned or otherwise illegitimate, the POC
record shall be marked invalid. ARIN will maintain, and make
readily available to the community, a current list of number
resources with no valid POC; this data will be subject to the
current bulk Whois policy.
Solution
• 4342 IRT Object exist out of 4714 members.
• 4164 members created IRT object via
MyAPNIC.
• During 2014 on average APNIC received
around 100 invalid contact reports.
Source: APNIC Secretariat
Solution
• In July 2010 similar to ARIN policy a proposal
(prop-084) “Frequent whois information
update request” was proposed by Tobias
Knecht (author of IRT-Object prop).
• In August 2011 the proposal was withdrawn
by the author as it did not reach consensus in
the policy-sig.
Solution?
• Is there any problem?
• Are we comfortable with Invalid object
Reporting only?
• What to do with contact reported as invalid?
• Is annual contact validation a solution?
• How the process will work?
• What will be the repercussion if I don’t
validate my contact on time?
Thank You
Links
1. http://www.apnic.net/apnic-info/whois_search/using-whois
2. http://www.apnic.net/apnic-info/whois_search/using-
whois/abuse-and-spamming/reporting-abuse-and-spam
3. http://www.apnic.net/__data/assets/file/0006/22857/prop-
084-v002.txt
1 of 13

Recommended

Agata overview by
Agata overviewAgata overview
Agata overviewUdi Levin
528 views17 slides
Issued patent 1 by
Issued patent 1Issued patent 1
Issued patent 1shakeel-mustafa
108 views1 slide
Improving APNIC Whois Data Quality by
Improving APNIC Whois Data QualityImproving APNIC Whois Data Quality
Improving APNIC Whois Data QualityAPNIC
429 views19 slides
Public Safety and Accuracy of IP Address WHOIS by
Public Safety and Accuracy of IP Address WHOISPublic Safety and Accuracy of IP Address WHOIS
Public Safety and Accuracy of IP Address WHOISAPNIC
455 views10 slides
LEA Workshop dated 09052013 by
LEA Workshop dated 09052013LEA Workshop dated 09052013
LEA Workshop dated 09052013APNIC
517 views78 slides
APNIC's role in stability and security - 4th APT Cybersecurity Forum by
APNIC's role in stability and security - 4th APT Cybersecurity ForumAPNIC's role in stability and security - 4th APT Cybersecurity Forum
APNIC's role in stability and security - 4th APT Cybersecurity ForumAPNIC
581 views40 slides

More Related Content

Similar to Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [APRICOT 2015]

PCTA Convention 2023: APNIC Introduction by
PCTA Convention 2023: APNIC IntroductionPCTA Convention 2023: APNIC Introduction
PCTA Convention 2023: APNIC IntroductionAPNIC
265 views22 slides
PCTA Convention 2023: APNIC Introduction by
PCTA Convention 2023: APNIC IntroductionPCTA Convention 2023: APNIC Introduction
PCTA Convention 2023: APNIC IntroductionAPNIC
265 views22 slides
UN INCB: RIRs and LEAs by
UN INCB: RIRs and LEAsUN INCB: RIRs and LEAs
UN INCB: RIRs and LEAsAPNIC
366 views33 slides
APNIC Member Services by
APNIC Member ServicesAPNIC Member Services
APNIC Member ServicesAPNIC
290 views27 slides
KHNOG 5: APNIC Services by
KHNOG 5: APNIC ServicesKHNOG 5: APNIC Services
KHNOG 5: APNIC ServicesAPNIC
416 views15 slides
Inaccuracy of IRT-Objects, by Aftab Siddiqui [APNIC 38 / Network Abuse BoF] by
Inaccuracy of IRT-Objects, by Aftab Siddiqui [APNIC 38 / Network Abuse BoF]Inaccuracy of IRT-Objects, by Aftab Siddiqui [APNIC 38 / Network Abuse BoF]
Inaccuracy of IRT-Objects, by Aftab Siddiqui [APNIC 38 / Network Abuse BoF]APNIC
335 views10 slides

Similar to Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [APRICOT 2015](20)

PCTA Convention 2023: APNIC Introduction by APNIC
PCTA Convention 2023: APNIC IntroductionPCTA Convention 2023: APNIC Introduction
PCTA Convention 2023: APNIC Introduction
APNIC265 views
PCTA Convention 2023: APNIC Introduction by APNIC
PCTA Convention 2023: APNIC IntroductionPCTA Convention 2023: APNIC Introduction
PCTA Convention 2023: APNIC Introduction
APNIC265 views
UN INCB: RIRs and LEAs by APNIC
UN INCB: RIRs and LEAsUN INCB: RIRs and LEAs
UN INCB: RIRs and LEAs
APNIC366 views
APNIC Member Services by APNIC
APNIC Member ServicesAPNIC Member Services
APNIC Member Services
APNIC290 views
KHNOG 5: APNIC Services by APNIC
KHNOG 5: APNIC ServicesKHNOG 5: APNIC Services
KHNOG 5: APNIC Services
APNIC416 views
Inaccuracy of IRT-Objects, by Aftab Siddiqui [APNIC 38 / Network Abuse BoF] by APNIC
Inaccuracy of IRT-Objects, by Aftab Siddiqui [APNIC 38 / Network Abuse BoF]Inaccuracy of IRT-Objects, by Aftab Siddiqui [APNIC 38 / Network Abuse BoF]
Inaccuracy of IRT-Objects, by Aftab Siddiqui [APNIC 38 / Network Abuse BoF]
APNIC335 views
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT by APNIC
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRTMMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
MMIX Peering Forum and MMNOG 2020: Securing your resources with RPKI and IRT
APNIC104 views
Whois Accuracy Status and its Challenges by APNIC
Whois Accuracy Status and its ChallengesWhois Accuracy Status and its Challenges
Whois Accuracy Status and its Challenges
APNIC95 views
PacNOG 24: APNIC Update by APNIC
PacNOG 24: APNIC UpdatePacNOG 24: APNIC Update
PacNOG 24: APNIC Update
APNIC236 views
APNIC Services Update by APNIC
APNIC Services UpdateAPNIC Services Update
APNIC Services Update
APNIC126 views
How APNIC can support law enforcement agencies in cybercrime investigtaion by APNIC
How APNIC can support law enforcement agencies in cybercrime investigtaionHow APNIC can support law enforcement agencies in cybercrime investigtaion
How APNIC can support law enforcement agencies in cybercrime investigtaion
APNIC2.9K views
Cybersecurity Opportunities Challenges APNIC by APNIC
Cybersecurity Opportunities Challenges APNICCybersecurity Opportunities Challenges APNIC
Cybersecurity Opportunities Challenges APNIC
APNIC1.6K views
APNIC's Resource Certification Service by APNIC
APNIC's Resource Certification ServiceAPNIC's Resource Certification Service
APNIC's Resource Certification Service
APNIC1.7K views
Understanding contact information in APNIC Whois by APNIC
Understanding contact information in APNIC WhoisUnderstanding contact information in APNIC Whois
Understanding contact information in APNIC Whois
APNIC117 views
Whois - Addressing the Asia Pacifc by APNIC
Whois - Addressing the Asia PacifcWhois - Addressing the Asia Pacifc
Whois - Addressing the Asia Pacifc
APNIC657 views
Law Enforcement engagement capacity building by APNIC
Law Enforcement engagement capacity buildingLaw Enforcement engagement capacity building
Law Enforcement engagement capacity building
APNIC717 views
Whois data quality & resource statistics by APNIC
Whois data quality & resource statisticsWhois data quality & resource statistics
Whois data quality & resource statistics
APNIC263 views
APNIC Whois Data Quality: Whose Responsibility? by APNIC
APNIC Whois Data Quality: Whose Responsibility?APNIC Whois Data Quality: Whose Responsibility?
APNIC Whois Data Quality: Whose Responsibility?
APNIC231 views

More from APNIC

IETF 118: Starlink Protocol Performance by
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol PerformanceAPNIC
422 views22 slides
HKNOG 12.0: RPKI Actions Required by HK Networks by
HKNOG 12.0: RPKI Actions Required by HK NetworksHKNOG 12.0: RPKI Actions Required by HK Networks
HKNOG 12.0: RPKI Actions Required by HK NetworksAPNIC
522 views26 slides
KHNOG 5: RPKI Status Update by
KHNOG 5: RPKI Status UpdateKHNOG 5: RPKI Status Update
KHNOG 5: RPKI Status UpdateAPNIC
403 views25 slides
PITA Strategy Forum 2023: Internet resilience by
PITA Strategy Forum 2023: Internet resiliencePITA Strategy Forum 2023: Internet resilience
PITA Strategy Forum 2023: Internet resilienceAPNIC
440 views7 slides
SANOG 40: DDoS in South Asia by
SANOG 40: DDoS in South AsiaSANOG 40: DDoS in South Asia
SANOG 40: DDoS in South AsiaAPNIC
352 views52 slides
SANOG 40: RPKI in South Asia by
SANOG 40: RPKI in South AsiaSANOG 40: RPKI in South Asia
SANOG 40: RPKI in South AsiaAPNIC
353 views16 slides

More from APNIC(20)

IETF 118: Starlink Protocol Performance by APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC422 views
HKNOG 12.0: RPKI Actions Required by HK Networks by APNIC
HKNOG 12.0: RPKI Actions Required by HK NetworksHKNOG 12.0: RPKI Actions Required by HK Networks
HKNOG 12.0: RPKI Actions Required by HK Networks
APNIC522 views
KHNOG 5: RPKI Status Update by APNIC
KHNOG 5: RPKI Status UpdateKHNOG 5: RPKI Status Update
KHNOG 5: RPKI Status Update
APNIC403 views
PITA Strategy Forum 2023: Internet resilience by APNIC
PITA Strategy Forum 2023: Internet resiliencePITA Strategy Forum 2023: Internet resilience
PITA Strategy Forum 2023: Internet resilience
APNIC440 views
SANOG 40: DDoS in South Asia by APNIC
SANOG 40: DDoS in South AsiaSANOG 40: DDoS in South Asia
SANOG 40: DDoS in South Asia
APNIC352 views
SANOG 40: RPKI in South Asia by APNIC
SANOG 40: RPKI in South AsiaSANOG 40: RPKI in South Asia
SANOG 40: RPKI in South Asia
APNIC353 views
RenasCON 2023: Learning from honeypots by APNIC
RenasCON 2023: Learning from honeypotsRenasCON 2023: Learning from honeypots
RenasCON 2023: Learning from honeypots
APNIC429 views
IGF 2023: DNS Privacy by APNIC
IGF 2023: DNS PrivacyIGF 2023: DNS Privacy
IGF 2023: DNS Privacy
APNIC434 views
MNSEC Conference 2023: Mining Bots by APNIC
MNSEC Conference 2023: Mining BotsMNSEC Conference 2023: Mining Bots
MNSEC Conference 2023: Mining Bots
APNIC428 views
VNIX-NOG 2023: IPv6 Deployment in government networks by APNIC
VNIX-NOG 2023: IPv6 Deployment in government networksVNIX-NOG 2023: IPv6 Deployment in government networks
VNIX-NOG 2023: IPv6 Deployment in government networks
APNIC433 views
VNIX-NOG 2023: State of RPKI in APAC - Cleaning up invalids by APNIC
VNIX-NOG 2023: State of RPKI in APAC - Cleaning up invalidsVNIX-NOG 2023: State of RPKI in APAC - Cleaning up invalids
VNIX-NOG 2023: State of RPKI in APAC - Cleaning up invalids
APNIC429 views
SGNOG 10: IPv6 Insights in South East Asia by APNIC
SGNOG 10: IPv6 Insights in South East AsiaSGNOG 10: IPv6 Insights in South East Asia
SGNOG 10: IPv6 Insights in South East Asia
APNIC416 views
mnNOG 5: Open source SD-WAN by APNIC
mnNOG 5: Open source SD-WANmnNOG 5: Open source SD-WAN
mnNOG 5: Open source SD-WAN
APNIC482 views
mnNOG 2023: State of IPv6 in Mongolia by APNIC
mnNOG 2023: State of IPv6 in MongoliamnNOG 2023: State of IPv6 in Mongolia
mnNOG 2023: State of IPv6 in Mongolia
APNIC933 views
mnNOG 2023: On GEOs, LEOs and Starlink by APNIC
mnNOG 2023: On GEOs, LEOs and StarlinkmnNOG 2023: On GEOs, LEOs and Starlink
mnNOG 2023: On GEOs, LEOs and Starlink
APNIC496 views
AusNOG 2023: RPKI and whois updates by APNIC
AusNOG 2023: RPKI and whois updatesAusNOG 2023: RPKI and whois updates
AusNOG 2023: RPKI and whois updates
APNIC566 views
AusNOG 2023: A quick look at QUIC by APNIC
AusNOG 2023: A quick look at QUICAusNOG 2023: A quick look at QUIC
AusNOG 2023: A quick look at QUIC
APNIC583 views
APrIGF 2023: Sustainability of Complementary Connectivity Initiatives by APNIC
APrIGF 2023: Sustainability of Complementary Connectivity InitiativesAPrIGF 2023: Sustainability of Complementary Connectivity Initiatives
APrIGF 2023: Sustainability of Complementary Connectivity Initiatives
APNIC607 views
APAN 56: APNIC Report by APNIC
APAN 56: APNIC Report APAN 56: APNIC Report
APAN 56: APNIC Report
APNIC293 views
2023 NCIT: Introduction to Intrusion Detection by APNIC
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
APNIC172 views

Recently uploaded

hamro digital logics.pptx by
hamro digital logics.pptxhamro digital logics.pptx
hamro digital logics.pptxtupeshghimire
10 views36 slides
ATPMOUSE_융합2조.pptx by
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptxkts120898
35 views70 slides
Affiliate Marketing by
Affiliate MarketingAffiliate Marketing
Affiliate MarketingNavin Dhanuka
18 views30 slides
The Dark Web : Hidden Services by
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
16 views24 slides
How to think like a threat actor for Kubernetes.pptx by
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptxLibbySchulze1
7 views33 slides
Marketing and Community Building in Web3 by
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
15 views64 slides

Recently uploaded(6)

ATPMOUSE_융합2조.pptx by kts120898
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptx
kts12089835 views
The Dark Web : Hidden Services by Anshu Singh
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh16 views
How to think like a threat actor for Kubernetes.pptx by LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze17 views
Marketing and Community Building in Web3 by Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast15 views

Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [APRICOT 2015]

  • 1. Reporting Network Abuse and APNIC Whois Database Accuracy Aftab A. Siddiqui
  • 2. Introduction • The APNIC Whois Database is a publicly searchable database detailing address usage within the Asia Pacific region. The results of any search are provided purely for operational purposes (such as finding the authoritative contact for a troublesome machine) Source: www.apnic.net[1]
  • 3. Reporting Network Abuse Use the APNIC Whois Database to obtain network contacts • You can use the APNIC Whois Database to obtain the registration details of the IP addresses APNIC has delegated. If the those IP addresses have been further assigned to other networks, you may also see the registration details of these assignments. Source: www.apnic.net[2]
  • 4. Reporting Network Abuse Contact The Network • The admin-c, tech-c, and mnt-irt fields contain details for the objects associated with the contact details for the network administrators responsible. • You will find the person, role, and/or irt objects listed in the results generated. Source: www.apnic.net[2]
  • 5. Reporting Network Abuse • Currently many Operators, Investigator/Law Enforcement Agencies, End-User and other institutions are using whois database to fetch contact details to identify and share abuse cases and other security problems. • Currently the growing amount of abuse reports are sent to tech-c, admin-c or mnt-irt contacts, as encouraged on the APNIC website.[2]
  • 6. Reporting Network Abuse • Whois database data accuracy has been a big issue for years now. There have been several approaches to get better data accuracy within whois information all over the world. • There are two main reasons for data inaccuracy in whois: a) Wrong data is published to camouflage illegal actions. b) b) Wrong data is published because object owners forget to update the whois information as changes occur within their organization (staff changes, etc.) Source: prop-084 [3]
  • 7. Reporting Network Abuse • Currently the only mechanism available is to report the invalid contact to APNIC. • APNIC notify the member to update the record.
  • 8. Solution • As per the ARIN Number Resource Policy Manual section 3.6.1: – Annual Whois POC Validation: During ARIN's annual Whois POC validation, an email will be sent to every POC in the Whois database. Each POC will have a maximum of 60 days to respond with an affirmative that their Whois contact information is correct and complete. Unresponsive POC email addresses shall be marked as such in the database. If ARIN staff deems a POC to be completely and permanently abandoned or otherwise illegitimate, the POC record shall be marked invalid. ARIN will maintain, and make readily available to the community, a current list of number resources with no valid POC; this data will be subject to the current bulk Whois policy.
  • 9. Solution • 4342 IRT Object exist out of 4714 members. • 4164 members created IRT object via MyAPNIC. • During 2014 on average APNIC received around 100 invalid contact reports. Source: APNIC Secretariat
  • 10. Solution • In July 2010 similar to ARIN policy a proposal (prop-084) “Frequent whois information update request” was proposed by Tobias Knecht (author of IRT-Object prop). • In August 2011 the proposal was withdrawn by the author as it did not reach consensus in the policy-sig.
  • 11. Solution? • Is there any problem? • Are we comfortable with Invalid object Reporting only? • What to do with contact reported as invalid? • Is annual contact validation a solution? • How the process will work? • What will be the repercussion if I don’t validate my contact on time?