Handling unwanted . What are the main sources of junk ?

Similar documents
Introduction to Antispam Practices

S a p m a m a n a d n d H a H m 성균관대학교 최형기

Introduction This paper will discuss the best practices for stopping the maximum amount of SPAM arriving in a user's inbox. It will outline simple

to Stay Out of the Spam Folder

Ethical Hacking and. Version 6. Spamming

Managing Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials.

SMTP Scanner Creation

Deliverability Terms

GFI product comparison: GFI MailEssentials vs. McAfee Security for Servers

GFI product comparison: GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.5

GFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall

Franzes Francisco Manila IBM Domino Server Crash and Messaging

Error Codes have 3 Digits

GFI product comparison: GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange

Spam, Security and SORBS v2.0

A quick guide to... Permission: Single or Double Opt-in?

CAMELOT Configuration Overview Step-by-Step

anti-spam techniques beyond Bayesian filters

Symantec Hosted Mail Security Console and Spam Quarantine User s Guide

Mail Assure Quick Start Guide

WITH INTEGRITY

FRISK Software International F-Prot AVES Managed Security Service

Hit the Ground Spam(fight)ing

Security with FailSafe

COSC 301 Network Management. Lecture 14: Electronic Mail

Mail Assure. Quick Start Guide

MPEG Frame Types intrapicture predicted picture bidirectional predicted picture. I frames reference frames

Objectives CINS/F1-01

Untitled Page. Help Documentation

Introduction. Logging in. WebMail User Guide

MailCleaner Extended FAQ

Security Protection

Introduction to Internet Mail. Philip Hazel. University of Cambridge Computing Service. Mail agents

Vendor: Cisco. Exam Code: Exam Name: ESFE Cisco Security Field Engineer Specialist. Version: Demo

Malware, , Database Security

Image Spam. Introduction. Project description:

GFI Product Comparison. GFI MailEssentials vs Sophos PureMessage

MX Control Console. Administrative User Manual

Using Centralized Security Reporting

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Mail agents. Introduction to Internet Mail. Message format (1) Message format (2)

AccessMail Users Manual for NJMLS members Rev 6

Understanding the Pipeline

I G H T T H E A G A I N S T S P A M. ww w.atmail.com. Copyright 2015 atmail pty ltd. All rights reserved. 1

Dataprise Managed Anti-Spam Console

Web Mail and e-scout Instructions

MailCleaner Extended FAQ

Comodo Dome Antispam Software Version 6.0

s and Anti-spam

Protecting Linux Systems

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual

Extract of Summary and Key details of Symantec.cloud Health check Report

Introduction. Logging in. WebQuarantine User Guide

Spam and Ham 성균관대학교 최형기

Aloaha FindMail.

Cyber Security Guide for NHSmail

FortiGuard Antispam. Frequently Asked Questions. High Performance Multi-Threat Security Solutions

Account Customer Portal Manual

Admin Guide Boundary Defense for Anti-Virus & Anti-Spam

Fortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified Security Professional

Appliance Installation Guide

SPF (Sender Policy Framework)

Technical description

New Technology Briefing

Building a Scalable, Service-Centric Sender Policy Framework (SPF) System

MxVault Questions and Answers

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO

CPSC156a: The Internet Co-Evolution of Technology and Society

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

Anti-Virus. Anti-Virus Scanning Overview. This chapter contains the following sections:

Anti-Spam. Overview of Anti-Spam Scanning

JANET NETWORKSHOP 37 Cambridge, 1 st April 2009

Cisco Download Full Version :

ESFE Cisco Security Field Engineer Specialist

Use and Abuse of Anti-Spam White/Black Lists

Trustwave SEG Cloud BEC Fraud Detection Basics

Anti-Spoofing. Inbound SPF Settings

Security Gap Analysis: Aggregrated Results

Anti-Spam. Overview of Anti-Spam Scanning

Step 2 - Deploy Advanced Security for Exchange Server

CSN09101 Networked Services. Module Leader: Dr Gordon Russell Lecturers: G. Russell

3.5 SECURITY. How can you reduce the risk of getting a virus?

SpamCheetah manual. By implementing protection against botnets we can ignore mails originating from known Bogons and other sources of spam.

Open Mic: IBM SmartCloud Notes Mail Hygiene. Robert Newell SmartCloud Notes Support July, 20 th 2016

An electronic mailing list is a way to distribute information to many Internet users using . It is a list of names and addresses, similar to a

On the Surface. Security Datasheet. Security Datasheet

SECTION 5 USING STUDENT

Comodo Dome Antispam Software Version 6.0

Choic Anti-Spam Quick Start Guide

Gateways. Kevin Chege

Electronic Mail

HOSTING SERVICES AGREEMENT

Computer aided mail filtering using SVM

Version 5.2. SurfControl Filter for SMTP Administrator s Guide

Creating Threat Prevention Connection Rules

Reference Guide. McAfee Security for Microsoft Exchange 8.6.0

Smart elab volume 3, anno 2014 Networking. Setup of a clustered antispam and antivirus service based on Mailcleaner suite

SPAM UNDERSTANDING & AVOIDING

Deployment Guides. Help Documentation

Advanced Filtering. Tobias Eggendorfer

Transcription:

Handling unwanted email Philip Hazel Almost entirely based on a presentation by Brian Candler What are the main sources of junk email? Spam Unsolicited, bulk email Often fraudulent penis enlargement, lottery scams, close relatives of African presidents, etc. Low response rate => high volume sent Viruses, Trojan horses Infected machine sends out mails without the owner s knowledge Malicious bounces These are called collateral spam or Joe-jobs Junk mail is sent with forged MAIL FROM Accepted by some intermediate MTA, but later it bounces Bounces go to innocent third party 1

What are the costs? Important messages can be accidentally discarded The more junk, the higher the risk Wasted time Deleting junk Setting up and maintaining filters Checking discarded mail for false positives Wasted bandwidth and disk space Especially for users on modems Viruses and spam attachments can be large Annoyance, offence, even fraud There are no easy answers! 2

Where can you filter? At the end-user hosts Each client has full control and customization Distributes the processing cost Client must still download each message On the ISP s mail server Easier for users Sometimes can be rejected before receiving the body Saves disk space on the server Hard to make flexible for users to customize The Joe-job problem Don t accept a message and then bounce it later If its sender is forged, we are creating a Joe-job Much better to reject at RCPT TO or DATA stages A real MTA sender will create a bounce Spamware will ignore the rejection For content filtering, we have to reject at DATA time If there are multiple recipients, that rejects it for all This makes individual opt-in/opt-out difficult What about accepting and just discarding junk? Risky because of false positives If a real message is rejected by mistake, nobody knows 3

Legal problems with filtering Some customers may be upset that you are making value judgements on their mail, or looking at the contents Make sure your customer contract allows you to do this Or allow individual customers to opt in or opt out of filtering Filtering is never 100% correct, so make sure you are not liable for cases where the filter makes the wrong decision Viruses in email The volume of virus mail is now huge It is amazing how innocent some users are Cambridge University rejects 80% of the email it is offered See http://canvas.csi.cam.ac.uk/stats/ppsw/index.html That excludes spam, which is tagged, not rejected Like spam, current viruses have forged senders and headers Naive implementation blocks all executable extensions Can block some legitimate messages Some viruses come in.zip files The only sure test is to use a virus scanner Commercial solutions are expensive, may charge per-user Free solutions such as clamav are pretty good New viruses are being written all the time Frequent updating of the signatures is important clamav can do this automatically 4

Spam: identifying by source IP address As soon as the sending host connects, you know the IP address You can check the IP address against blacklists in real time Blacklists of IP ranges assigned to known spammers Blacklists of IP addresses of open relays or open proxies Blacklists of IP addresses that have sent spam recently There are some public blacklists in the DNS Using DNS black lists Advantages Easy to configure DNS lookups are relatively quick and cheap Somebody else maintains the list Mail is rejected before the body has been sent Disadvantages Will not catch all spam Not effective against viruses or collateral spam The lists come and go (legal threats from spammers) 5

Some are not free e.g. mail-abuse.org Which blacklists to use? Some are not good Policies are too draconian; you lose mail you want Someone else s policy may not be good for you Try these: sbl.spamhaus.org (known spammers) relays.ordb.org (open relays) bl.spamcop.net (dynamic spam sources) Spam: identifying by content Spammers are sad and predictable A human can recognize spam very easily But it s harder to do it automatically Look for phrases that typically occur in spam Look for phrases type typically do not occur in spam This helps reduce false positives The ratio of the two indicates the likelihood of spam... and how sure we are 6

Disadvantages of content filtering Spammers use many tricks to disguise their spam MIME base64 encoding, HTML mails, breaking up words, misspelling, etc... It is an arms race As filters evolve, spammers change what they do Computationally expensive Liable to false positives Unless rules are customized for each user, but this is hard to do for a server-side solution Whitelists Accept mail only from people we already know Effective at blocking spam and some viruses Start-up problem (see next slide) Actually, spammers could forge messages so that they appear to come from people we already know For now, they don t seem to be collecting information about who we associate with But viruses and Trojans often use local address books 7

Handling mail from people not on the whitelist By password: e.g. a magic word in the Subject: header By content filter: e.g. a low spam score By challenge-reponse system Put mail in a hold queue and send back a message If the sender responds, they are whitelisted Challenge-response systems are not recommended Adds to the collateral spam problem Interacts badly with mailing lists Some people get very annoyed Difficult to deploy in a scalable way Disadvantages of whitelists Difficult/annoying for people to contact for the first time Difficult for a server-side solution Each user needs a separate list and a way to edit it Automatically whitelisting addresses we send TO isn t easy Filtering at the MAIL FROM stage is getting harder Envelope sender may differ from From: in headers It could even be different for every message someone sends Whitelists do not help with collateral spam (joe-jobs) 8

Handling unwanted bounce messages All bounces have an empty envelope sender MAIL FROM:<> Not any use for filtering Joe-job bounces are genuine MTA bounce messages...but for messages that we did not send Content filtering to identify a bounce does not help Discarding all bounces is not an option Many users mistype email addresses Mailboxes are often down or over quota The bounce is the only way the user learns of a problem Sites the block all bounces are broken There is a DNS black list that records them dsn.rfc-ignorant.org Associating bounces with messages we sent Bounce messages are not standardised in a way that allows this Only thing you can rely on is that bounces go to MAIL FROM One solution is to rewrite MAIL FROM MAIL FROM:<user=ac7546dc@example.com> Change the magic value every day or so Check that incoming bounces quote a recent value If spammers collect the address, it is not valid for long Or use a cryptographic cookie (very hard to guess) Work is being done to refine these ideas This is not a spam solution; it s a Joe-job solution...though it does kill spam sent with MAIL FROM:<> 9

Disadvantages of rewriting MAIL FROM Interacts badly with mailing list software and whitelists...if they look at MAIL FROM rather than the From: header This could be lessened if there were an agreed standard Several proposals are being discussed Your users must send outgoing email through your MTA Otherwise the rewriting won t happen and bounces will be lost Generates long local parts RFC2821 requires only 64 characters Another possibility is to rewrite the domain instead This gives you up to 255 characters But now there are DNS implications People are trying to find solutions BATV (Bounce Address Tag Validation) A scheme for adding tags to local parts CSA (Client SMTP Authorization) DNS lists which machines are permitted to send email SPF (Sender Policy Framework) Sender-ID is Microsoft s version of SPF DNS lists which hosts may use which envelope senders Completely breaks email forwarding Claims that it will kill all spam are exaggerations SRS (Sender Rewriting Scheme) An attempt to patch up SPF, but not problem-free Domainkeys (Yahoo!) or Identified Internet Mail (Cisco) Digitally sign messages with a per-domain private key The signature is placed in a header 10

No proposal is problem free Some of these solutions have licence/patent issues Some SPF discussion references: http://david.woodhou.se/why-not-spf.html http://bradknowles.typepad.com/considered_harmful/ 2004/05/spf.html http://homepages.tesco.net./~j.deboynepollard/fga/ smtp-spf-is-harmful.html And for a bit of light relief: http://www.rhyolite.com/anti-spam/you-might-be.html Many options: what should you do? Use DNS blacklists Surprisingly effective Very easy to implement Low maintenance Consider implementing virus scanning and content filtering Opt-in users agree to let you do this Just tagging spam lets the user decide what to do Think about the resource costs These services are expensive to scale and manage Opt-in users pay extra? Advise users about client-side spam filters Bayesian filters and whitelists are more easily handled there Find those that work well with your client s software 11

Consider outsourcing There are companies that will handle the whole thing Example: www.messagelabs.co.uk Point your MX at their servers They filter for spam and viruses They forward only clean mail to your servers No investment in hardware, software, management, or maintenance May be more cost-effective for small organizations 12