Spam blocking methods and experiences



Similar documents
Exim4U. Server Solution For Unix And Linux Systems

eprism Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

escan Anti-Spam White Paper

Do you need to... Do you need to...

An Overview of Spam Blocking Techniques

Collateral Damage. Consequences of Spam and Virus Filtering for the System. Peter Eisentraut 22C3. credativ GmbH.

How To Stop Spam From Being A Problem

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

Software Engineering 4C03 SPAM

CipherMail Gateway Quick Setup Guide

A D M I N I S T R A T O R V 1. 0

Anti Spam Best Practices

Configuring Your Gateman Server

Evaluation of Anti-spam Method Combining Bayesian Filtering and Strong Challenge and Response

one million mails a day: open source software to deal with it Charly Kühnast Municipal Datacenter for the Lower Rhine Area Moers, Germany

Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development

Effective Open-Source Spam Filtering

ETH Zürich - Mail Filtering Service

Fighting against Spam-Mail

Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server.

Spam, Spam and More Spam. Spammers: Cost to send

The Open Source Stack: One approach to spam filtering

AntiSpam QuickStart Guide

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam .

Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to this document, please check

Technical responses to spam November 2003

White Paper X-Spam for Exchange Server

Configuring MDaemon for Centralized Spam Blocking and Filtering

Spam DNA Filtering System

Barracuda Spam Firewall User s Guide

Fighting Spam with open source software

Understanding Junk filtering & Anti-Spam controls

The Network Box Anti-Spam Solution

How to Stop Spam s and Bounces

ContentCatcher. Voyant Strategies. Best Practice for Gateway Security and Enterprise-class Spam Filtering

Enhanced Spam Defence

Comprehensive Filtering. Whitepaper

Content Scanning with Exim 4

Anti-SPAM Solutions as a Component of Digital Communications Management

. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002

policyd-weight and some unorthodox approaches to eliminating spam

MDaemon configuration recommendations for dealing with spam related issues

1 Accessing accounts on the Axxess Mail Server

Security. Help Documentation

Marketing 201. How a SPAM Filter Works. Craig Stouffer Pinpointe On-Demand cstouffer@pinpointe.com (408) x125

How To Protect Your From Spam On A Barracuda Spam And Virus Firewall

How To Ensure Your Is Delivered

MailFoundry Users Manual. MailFoundry User Manual Revision: MF Copyright 2005, Solinus Inc. All Rights Reserved

Spamfilter Relay Mailserver

Cloud Firewall. 1. Introduction. a. What is Spam?

Anti-Spam White Paper

Introduction. SonicWALL Security

Fighting Spam: Tools, Tips, and Techniques

Anti-Spam Service User s Guide Advanced Internet Technologies, Inc. December 3, 2004

A White Paper. VerticalResponse, Delivery and You A Handy Guide. VerticalResponse,Inc nd Street, Suite 700 San Francisco, CA 94107

EFFECTIVE SPAM FILTERING WITH MDAEMON

USAGE GUIDE ADAM INTERNET SPAM FILTER MANAGER

Aloaha Mail and Archive

SPAM: 101 Cause and Effect

Training Guide eprism Security Appliance 4.0

Technical Information

Avira Managed Security (AMES) User Guide

ECE Mail System Overview. Pablo J. Rebollo ECE Network Operations Center

Analysis of massive backscatter of spam

SpamPanel Level Manual Version 1 Last update: March 21, 2014 SpamPanel

Ciphermail Gateway Administration Guide

Some fitting of naive Bayesian spam filtering for Japanese environment

Solutions IT Ltd Virus and Antispam filtering solutions

Best Practices: How To Improve Your Survey Invitations and Deliverability Rate

MailScanner Tips for NOCO Hosting Clients

Reputation Metrics Troubleshooter. Share it!

s and anti-spam Page 1

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper

Advanced Settings. Help Documentation

Intercept Anti-Spam Quick Start Guide

white paper Glossary of Spam Terms The jargon of the spam industry

SCORECARD MARKETING. Find Out How Much You Are Really Getting Out of Your Marketing

IP Addresses in Clients

How To Run A Realtime Blackhole List (Rbl) In Hkong Kong Ken Kong

Spam Filtering Methods for Filtering

Alon Altman. Haifa Linux Club

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007

ORF ENTERPRISE EDITION 1. Getting the Most Out of ORF

PineApp Anti IP Blacklisting

A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior

6-Part Lunch Learning Series

How To Make Sure You Receive New Penn s

BARRACUDA. N e t w o r k s SPAM FIREWALL 600

IceWarp Unified Communications. AntiSpam Reference. Version 10.4

Adaptive Filtering of SPAM

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling

security

FortiMail Filtering Course 221-v2.0. Course Overview. Course Objectives

FortiMail Filtering Course 221-v2.2 Course Overview

Handling Unsolicited Commercial (UCE) or spam using Microsoft Outlook at Staffordshire University

Articles Fighting SPAM in Lotus Domino

MailMarshal SMTP Anti-Spam Configuration

GFI Product Manual. Administration and Configuration Manual

WHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering through Your Web Application

Transcription:

Spam blocking methods and experiences Linuxdays Luxembourg 2003 christian mock <christian.mock@vibe.at> http://www.tahina.priv.at/~cm/talks/spamblocking.{sxi,pdf} version 1.3

contents how spam is sent different methods for blocking spam reject during SMTP dialogue RBLs and local blacklists SpamAssassin experiences with various techniques percentages of hits on my mail system methods to use and methods to avoid

first things first: risk analysis a.k.a. "know that you will be losing mail, and why" know your user's requirements test (e.g. by tagging) before you block monitor effectiveness block on hard criteria, tag on fuzzy do you want to block spam or LART luser admins?

how spam is sent direct (spammer -> recipient MX): ISPs will mostly terminate spammer's account immediately that means spammers need to hide their tracks to keep their accounts forged headers intended to cause confusion sender address mostly fake or stolen that means filtering on sender address makes little sense

open relays, open proxies send mails to some unrelated server, let that one do the work and it's admins handle the trouble lately, open proxy abuse is on the increase HTTP proxies support "CONNECT" (to tunnel SSL connections) CONNECT smtpserver:25 HTTP/1.0 leaves no trace of spammer's IP address in mail headers

and it gets even more stealthy viruses/worms and IE exploits (e.g. in spam "unsubscribe" pages) install backdoor on broadband-connected PCs spammers use those "zombies" to send spam DDoS anti-spam sites run nameservers + web-redirectors for the spamvertized sites the involved zombies change every 5 minutes

rejecting during the SMTP dialogue (all percentages are % of rejected RCPTs, Oct 2003) technical criteria: HELO sender must give HELO (0%) check HELO parameter syntax (2%) don't accept HELO with own hostname/ip address (7.7%) don't accept "localhost"/"localhost.localdomain" (0.6%)

rejecting during the SMTP dialogue SMTP pipelining: only when negotiated (0%, used to be more) sender domain must exist (7.6%) check header/body for asian charset declarations (0.6%) don't accept for unknown local users (7.8%) catchall domains are dangerous: dictionary attacks don't relay (0.4%)

local blacklists can be based on sender domain, client hostname's domain, client IP address block countries by IP space (extreme measure) china (4.6%) korea (3.5%) taiwan (1.1%) hongkong (0.5%) block some ISPs by client host's domain (5.8%, 6 ISPs)

RBLs ("Real-Time Blackhole Lists") work via DNS, e.g. for 209.88.103.4: 4.103.88.209.proxies.relays.monkeys.com IN A 127.0.0.2 IN TXT "BLOCKED: See http://www.monkeys.com/upl/ listed-ip-0.cgi?ip=209.88.103.4"

RBL types based on different criteria: open relays: relays.ordb.org, relays.visi.com open proxies: opm.blitzed.org fed from spamtraps, by country, operator's preferences,... quality assessment may be difficult you depend on an EXTERNAL source osirusoft RBL closed down due to DDoS and blacklisted all IPs

SPEWS taking attitude re-adjustment to a new level anonymous, communication via NANAE newsgroup lists IP ranges of known spammers "intentional collateral damage": expands listings (shortens netmasks) if ISP doesn't react listed ISP's users are supposed to pressure ISP to kick spammers

RBLs at work list.dsbl.org (19.4%) cbl.abuseat.org (11.5%) SPEWS (7.9%) opm.blitzed.org (7.4%) relays.visi.com (5.0%) sbl.spamhaus.org (4.4%) blackholes.easynet.nl (2.5%) relays.ordb.org (0.4%)

more RBL info List of Lists: http://www.declude.com/junkmail/support/ip4r.htm quantitative comparison: http://www.sdsc.edu/~jeff/spam/blacklists_compared.html intro to blacklists http://www.scconsult.com/bill/dnsblhelp.html

RBL tools online-checkers for lotsa RBLs: http://rbls.org/ http://openrbl.org/ build-your-own tool http://spfilter.openrbl.org/

content analysis best way to detect spam, IMHO mail must be received in full can check different properties based on a combination of properties, better decisions on spamminess are possible

bayesian filters gets trained on samples of spam and non-spam computes probability of single words in spam/non-spam checks mail and calculates "spamminess" probability based on words in mail needs continuous training on user-specific material, but is very effective

bayesian filters idea and first paper by Paul Graham http://www.paulgraham.com/spam.html standalone: bogofilter http://sourceforge.net/projects/bogofilter SpamAssassin >2.50 ASSP Anti-Spam-SMTP-Proxy http://assp.sourceforge.net/ and more...

Razor, pyzor, DCC principle: users report spam to a database, others query that DB "fuzzy checksumming" methods run over mail body, checksum is reported and queried razor2 implements "reputation scheme" for spam reporters

SpamAssassin http://www.spamassassin.org/ perl, open source, Unix/Windows gives a score (positive/negative) per property sum of scores > threshold: spam detected more than 800 tests very configurable and extendable supports Razor, Razor2, DCC, pyzor

SpamAssassin SpamAssassin checks: header inconsistencies Received: header lookup in RBLs characters sets used language (heuristic detection) text fragments MIME structure (syntax, HTML without text/plain,...)

what to do with detected spam? /dev/null?? nobody can notice false positives tag, and store into "junk" folder?? who's got the time to regularily read it? mail gets lost anyways generate bounce?? with all the faked sender addresses... reject during SMTP spam gets dropped, but sender will notice on "honest" false positives

my setup mail server based on postfix serving about 20 users and 10 mailing lists running a combination of all techniques mentioned few false positives monitoring still needed whitelisting is also essential about 1-5 spams in my inbox daily, ATM

negative experiences some RBLs ORBS did arbitrarily list people they didn't like dial-up RBLs give lots of false positives beware of RBLs closing down on short notice! clueless postmasters a customer's mail-partner was listed as open relay, long fixed, but never bothered remove

negative experiences filtering for hostname without domain in HELO filtering on client IP without reverse DNS filtering Received: headers against RBLs and dropping mail setups must be adapted to mail system user's requirements

statistics Period: Oct 5 - Nov 4, 2003 Non-Spam mails: 2578 Rejects vs non-spam: RBLs, SPEWS 249% SpamAssassin 142% RCPT checks 33% HELO checks 44% Sender Domain 32% Country BLs 41% ISP BLs 25%

done. thanks for your patience questions? <christian.mock@vibe.at> http://www.tahina.priv.at/~cm/talks/spamblocking.{sxi,pdf}