Collateral Damage. Consequences of Spam and Virus Filtering for the E-Mail System. Peter Eisentraut 22C3. credativ GmbH.



Similar documents
eprism Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

. Daniel Zappala. CS 460 Computer Networking Brigham Young University

How To Protect Your From Spam On A Barracuda Spam And Virus Firewall

Spam, Spam and More Spam. Spammers: Cost to send

Comprehensive Filtering. Whitepaper

Anti Spam Best Practices

security

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007

XGENPLUS SECURITY FEATURES...

FortiMail Filtering Course 221-v2.0. Course Overview. Course Objectives

Marketing Glossary of Terms

Intercept Anti-Spam Quick Start Guide

Content Scanning with Exim 4

Antispam Security Best Practices

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam .

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

Mail Avenger. David Mazières New York University

Enhanced Spam Defence

s and anti-spam Page 1

MDaemon configuration recommendations for dealing with spam related issues

Greylisting has been around since 2003 when Evan Harris wrote the original whitepaper on it as a spam filtering mechanism.

Migration Project Plan for Cisco Cloud Security

Solutions IT Ltd Virus and Antispam filtering solutions

Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011

IronPort Authentication

Configuring Your Gateman Server

Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development

Exim4U. Server Solution For Unix And Linux Systems

FortiMail Filtering Course 221-v2.2 Course Overview

An Overview of Spam Blocking Techniques

Eiteasy s Enterprise Filter

Do you need to... Do you need to...

Panda Cloud Protection

Effective Open-Source Spam Filtering

GRAYWALL. Introduction. Installing Graywall. Graylist Mercury/32 daemon Version 1.0.0

CipherMail Gateway Quick Setup Guide

Introduction. How does filtering work? What is the Quarantine? What is an End User Digest?

SPAM FILTER Service Data Sheet

The Leading Security Suites

Configuring Security for SMTP Traffic

Avira Managed Security AMES FAQ.

eprism Security Appliance 6.0 Release Notes What's New in 6.0

Comprehensive Filtering: Barracuda Spam Firewall Safeguards Legitimate

Guardian Digital Secure Mail Suite Quick Start Guide

How To Ensure Your Is Delivered

Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2

Feature Comparison Guide

Blackbaud Communication Services Overview of Delivery and FAQs

Mail agents. Introduction to Internet Mail. Message format (2) Authenticating senders

one million mails a day: open source software to deal with it Charly Kühnast Municipal Datacenter for the Lower Rhine Area Moers, Germany

DST . Product FAQs. Thank you for using our products. DST UK

BARRACUDA. N e t w o r k s SPAM FIREWALL 600

Symantec Hosted Mail Security Getting Started Guide

English Translation of SecurityGateway for Exchange/SMTP Servers

Serial Deployment Quick Start Guide

Technical Note. FORTIMAIL Configuration For Enterprise Deployment. Rev 2.1

Avira Managed Security (AMES) User Guide

Service Launch Guide (US Customer) SEG Filtering

Services Deployment. Administrator Guide

Quick Start Policy Patrol Spam Filter 5

Advanced Settings. Help Documentation

Anti-spam filtering techniques

A D M I N I S T R A T O R V 1. 0

Analysis of massive backscatter of spam

Mail Service Reference

Articles Fighting SPAM in Lotus Domino

AntiSpam QuickStart Guide

Security. Help Documentation

10 Ways to Improve B2B Deliverability:

1 Accessing accounts on the Axxess Mail Server

Reputation Metrics Troubleshooter. Share it!

A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior

Barracuda Spam Firewall

Microsoft Exchange 2003

Web. Anti- Spam. Disk. Mail DNS. Server. Backup

Marketing Do s and Don ts A Sprint Mail Whitepaper

SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel

Quick Start Policy Patrol Mail Security 10

PineApp Anti IP Blacklisting

Fighting Spam: Tools, Tips, and Techniques

Introduction Configuration & Spam Detection WinWare Webmail Accounts Account Notes Definitions...

Libra Esva. Whitepaper. Glossary. How Really Works. Security Virtual Appliance. May, It's So Simple...or Is It?

The What, Why, and How of Authentication

Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the beast. Microsoft's online safety strategy

POP3 Connector for Exchange - Configuration

The Network Box Anti-Spam Solution

Celframe - Easy Linux - Lesson 8 - Server

Solution Brief FortiMail for Service Providers. Nathalie Rivat

Transcription:

Consequences of Spam and Virus Filtering for the E-Mail System 22C3

Introduction 12 years of spam... 24 years of SMTP... Things have changed: SMTP is no longer enough. Spam filters, virus filters are part of the system But they are not standardized, verified, or predictable. Getting e-mail through is a challenge.

Filtering Techniques Examples of questionale defense mechanisms: DNS blackhole lists Bounce messages Greylisting SPF Blocking port 25 Challenge/response systems Inventing your own

DNS Blackhole Lists: Concept Publish list of problem hosts via DNS Every mail server can query the lists First DNSBL MAPS did manual inspections Current DNSBLs are mostly automatic

DNS Blackhole Lists: Discussion Indiscriminate treatment of temporary problems Large ISPs often blocked Useless against dial-up accounts Low correlation with spam occurrence DNS is insecure Only usable as part of scoring system (SpamAssassin)

Bounce Messages: Concept Original concept: 1. Host A sends message to host B. 2. Host B checks the message. 3. Host B accepts or rejects the message. Problem: Checking took too long, host A timed out. New concept: 1. Host A sends message to host B. 2. Host B accepts the message. 3. Host B checks the message and sends rejection message to the sender. How to find the sender?

Bounce Messages: Discussion Junk e-mail fakes sender addresses. Rejection messages go to innocent users. Users now reject rejection messages. Alternatives: discard messages, quarantine Better: fix MTA time-outs, spam filter performance, go back to original concept

Greylisting: Concept Mail server sends temporary error on first contact Normal client tries again Spamming software, zombies doesn t try again Extremely effective Spammers could react easily, but don t... (?)

Greylisting: Discussion Full of configuration pitfalls: Poorly implemented software Sender-side server pools Recipient-side load balancing Broken MTAs that don t retry Mailing list software with variable sender addresses Time-critical e-mails (ebay) Multistage relays Very hard to get right with diverse user populations

SPF: Concept Sender Policy Framework: Domain owner publishes SPF record via DNS, identifying valid outgoing mail servers Mail recipient checks SPF records, rejects mail from invalid mail servers SPF checks envelope sender, Sender ID checks sender address in mail content

SPF: Discussion Does not stop spam, spammers just use a different domain Spammers can publish their own SPF records SPF does not stop phishing, the envelope address is hidden from the user (Sender ID is better) Does prevent certain kinds of e-mail forgery Breaks forwarding ISPs can control users mail routes DNS is insecure Don t use it!

Blocking Port 25: Concept Most junk e-mail is sent by zombies Hard to track (DNSBL) Spammers just switch to the next set of zombies Solution: block outgoing port 25 on dial-up accounts Users are forced to go through ISP s mail server Dial-up PCs no longer attractive targets for installing zombieware

Blocking Port 25: Discussion Problems: Users want to use other e-mail accounts than the one provided by their ISP Workaround: ISP allows all customers to route through ISP s mail server Users cannot use their own mail server Use your own mail server software ISP s mail server is misconfigured (or blacklisted) Privacy Incompatible with SPF!

Challenge/Response Systems: Concept 1. Receiving mail server intercepts message, sends challenge 2. Original sender must manually answer the challenge 3. Receiving mail server checks response, delivers original message

Challenge/Response Systems: Discussion Major annoyance! Sender addresses are faked, innocent users get challenge messages. Users of CR systems get blacklisted. Spam can fake already authenticated sender addresses. Two users of CR can never talk to each other. CR systems would require (exploitable) loopholes in e-mail filters. Facilitates phishing CR transaction tracking violates privacy. Loses e-mail, quite useless against spam

Being Smarter Than Everyone Else Running a local DNSBL Running a local Pyzor server Forgetting the MX backup Random RFC purity checking Changing your e-mail address regularly... Don t invent your own filters.

Legal Issues: Privacy Bayesian filter word databases Insecure greylisting databases Distributed e-mail counting Challenge/response transaction records SPF + blocking port 25 forcing e-mail routes Everything controlled at ISP s mail server, not by user!

Legal Issues: Database Building Everyone is building databases: Spam filter manufacturers Industry associations (eco, Wettbewerbszentrale) Governments (FTC) to be shared internationally impossible to control

Legal Issues: Recourse Spam filtering not allowed without user s consent ISPs must inform users, or Users must activate the filters Most users don t care

Conclusion E-mail has become unreliable. Users accept it as such. Spammers and virus writers are to blame. But inappropriate junk mail filters as well. Check each filter technique thoroughly. Check what your ISP is doing.