Effective Open-Source Spam Filtering



Similar documents
FortiMail Filtering Course 221-v2.0. Course Overview. Course Objectives

eprism Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

FortiMail Filtering Course 221-v2.2 Course Overview

Collateral Damage. Consequences of Spam and Virus Filtering for the System. Peter Eisentraut 22C3. credativ GmbH.

MDaemon configuration recommendations for dealing with spam related issues

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

Antispam Security Best Practices

English Translation of SecurityGateway for Exchange/SMTP Servers

Do you need to... Do you need to...

Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2

An Overview of Spam Blocking Techniques

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

Anti Spam Best Practices

Avira Managed Security (AMES) User Guide

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007

Security. Help Documentation

Fighting Spam with open source software

Comprehensive Anti-Spam Service

Exim4U. Server Solution For Unix And Linux Systems

Intercept Anti-Spam Quick Start Guide

Content Scanning with Exim 4

Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to this document, please check

Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development

Mod 08: Exchange Online FOPE

Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server.

Spamfilter Relay Mailserver

Technical Note. FORTIMAIL Configuration For Enterprise Deployment. Rev 2.1

Fighting Spam in an ISP Environment:

SESA Securing with Cisco Security Appliance Parts 1 and 2

How To Filter From A Spam Filter

Precis Overview - The Threat

Comprehensive Filtering. Whitepaper

Solution Brief FortiMail for Service Providers. Nathalie Rivat

The Network Box Anti-Spam Solution

eprism Security Appliance 6.0 Release Notes What's New in 6.0

Greylisting has been around since 2003 when Evan Harris wrote the original whitepaper on it as a spam filtering mechanism.

Administrator Manual v3.0

Implementing MDaemon as an Security Gateway to Exchange Server

Barracuda Spam Firewall User s Guide

Whose IP Is It Anyways: Tales of IP Reputation Failures

EMB. Basics. Goals of this lab: Prerequisites: LXB, NET, DNS

FortiMail Filtering. Course 221 (for FortiMail v5.0) Course Overview

STPIC/Admin/002/ / Date: Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

Avira Managed Security (AMES) User Guide

MDaemon Vs. Microsoft Exchange Server 2013 Standard

The Open Source Stack: One approach to spam filtering

Trend Micro Hosted Security Stop Spam. Save Time.

IBM Express Managed Security Services for Security. Anti-Spam Administrator s Guide. Version 5.32

FortiMail Filtering. Course for FortiMail v4.0. Course Overview

Migration Project Plan for Cisco Cloud Security

Barracuda Spam Firewall Administrator s Guide

ExchangeDefender. Understanding the tool that can save and secure your business

Enhanced Spam Defence

ETH Zürich - Mail Filtering Service

1 Accessing accounts on the Axxess Mail Server

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper

Eiteasy s Enterprise Filter

FortiMail Filtering. Course 221 (for FortiMail v4.2) Course Overview

GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall

Release Notes. for Kerio Connect 8.0.0

Configuring MDaemon for Centralized Spam Blocking and Filtering

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Training Guide eprism Security Appliance 4.0

ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY SurfControl Filter.

BARRACUDA. N e t w o r k s SPAM FIREWALL 600

A D M I N I S T R A T O R V 1. 0

Visendo Suite a reliable solution for SMBs

XGENPLUS SECURITY FEATURES...

Solutions IT Ltd Virus and Antispam filtering solutions

SpamPanel Level Manual Version 1 Last update: March 21, 2014 SpamPanel

How To Protect Your From Spam On A Barracuda Spam And Virus Firewall

FILTERING FAQ

Panda Cloud Protection

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam .

Quick Start Policy Patrol Mail Security 10

Serial Deployment Quick Start Guide

one million mails a day: open source software to deal with it Charly Kühnast Municipal Datacenter for the Lower Rhine Area Moers, Germany

ContentCatcher. Voyant Strategies. Best Practice for Gateway Security and Enterprise-class Spam Filtering

How To Set Up A Barcuda Server On A Pc Or Mac Or Mac (For Free) With A Webmail Server (For A Limited Time) With An Ipad Or Ipad (For An Ipa) With The Ip

SPAM FILTER Service Data Sheet

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008

security

AntiSpam QuickStart Guide

Transcription:

Effective Open-Source Spam Filtering For Enterprise Chris Lewis Thomas Choi October 2008

Agenda Introduction Background Something New - Rationale The Open-Source Project Basic Requirements Components IntegrationI t ti Test/Performance Advanced d Techniques

Introduction/Authors Chris Lewis Senior Security Analyst/Anti-Spam, Nortel Senior Technical Advisor, MAAWG Member, Canadian Federal Anti-Spam Task Force Thomas Choi Nortel Ph.D Student, Carleton University

Background Spam became a problem in 1994/1995 Initially in Usenet Clearly would transition to Email Commenced Email Anti-Spam program in 1997 Extremely customized Lyris Mailshield implementation VB2004 Corporate Spam Fighting: 5 years of success and lessons Learned : by Chris Lewis and John Morris don't forget those lessons!

Something New - Rationale Lyris Mailshield ld has stood us in good stead But, getting a little elderly, higher volumes, difficult to extend with newer techniques Review of many other vendor offerings: All missing one or more of critical features Integrated poorly with existing infrastructure Not, or poorly extensible/configurable Not as effective as current solution

Rationale... Continued Needed open architecture/modular/easy extension Low capital/license cost (free obviously best!) Use standard components to minimize development costs Use existing basic low-medium size server class hardware Focus on 3 rd party/popular filtering methodologies, simple ad-hoc filtering capabilities, plus with our own secret sauce. Avoid training (software OR people) requirements

The Open Source Project Basic Requirements Functional Specification Component Selection Integration Back end Testing

Basic Requirements - Filter Support multiple recipient domains Configurable per-domain handling Per-domain filter enable Configurable archiving/quarantine/disposition (pass,filter, trap) Output routing Full logging NEVER bounce or silent blackhole l (except trap) Plugin architecture each technique an independent module

Basic Filter Requirements... Continued Fault tolerant (eg: failover) rd Support 3 party facilities, eg: DNSBL (IP blacklists) SURBL/URIBL (URI blacklists) informational lookups (eg: ASN) Content Scoring filter Anti-virus Arbitrary ad-hoc string filters anywhere/on anything Direct/real-time feedback to filtering

Basic Not filter Requirements Full end-user quarantine view/forward End-user (recipient) notification (if desired) Full logs in database/arbitrary queries (Almost) fully automated false positive handling (forward, filter tune, notification/explanation) Operational and Management metrics Postfacto analysis and automated filter tuning

Components, Filter, Open-Source Core SMTP listening engine/agent: Qpsmtpd (Hansen, Sergeant et. al.). 100% Perl implementation (really!) Async (event driven) mode Very high performance 20M+/day small servers Entirely flexible by plugin interface Actively supported & robust Has many sample plugins SpamAssassin (popular scoring addon filter). (Perl) ClamAV (*ix-based) anti-virus signature-based engine Nearly two dozen ad-hoc filtering plugins, few more than a dozen lines. The libraries and utilities to make the above work (eg: ParaDNS)

Components, Filter, Glue A spam filter is more than just a filter, needs: Start/stop/reboot/monitoring Log & quarantine handling and transfer Extended filtering heuristic processes (for things that take too long for real-time) Install/deployment and filtering control

Components, Backend PostgreSQL database Apache (admin and user interface) Interface to corporate user databases (push to filters) Admin (research, false positive, configuration, deployment) interface CGIs User interfaces (configuration and quarantine) Quarantine management Rsync log, quarantine, configuration, software transfer

Internet t Integration DMZ SPAM PostgreSQL SPAM Database Apache QPSMTPD Non-Spam Rejection Notices Plugins SpamAssassin ClamAV Mail servers Users Config False Positive Reports 3 rd Party BL DNSBL CORWAN

Test/Performance Spamtrap operating 9 months Performance heavily depends on early pruning Cheap tests first Prune filtering subsequent to block decision Expensive (body scans, SpamAssassin, ClamAV) tests last Volumes: typical 7m/server (50-100/sec), mostly spamtrap Deployment in progress

Advanced Techniques State of Affairs Hide! Banner delays Bot fingerprinting DNSBLs (local and/or otherwise) DNSBL infrastructure Bounces & BATV Ones we've omitted and why

State of Affairs Underground economy (spam, phish, spyware, CC, mules) increasing Some LE believe larger than International Drug trade BOTS responsible for 80%+ of all spam. Most getting good at stopping BOTs (<1% deliverability) => BOTs shifting to reputation theft (relay through legit MTAs) State of Anti-Virus: disaster. (new BOT caught by AV 23% of the time by battery of 35 AV tools, only increases to 50% by 30 days) Inadequate AV => can t find BOT, let alone remediate proven infections.

Hide! Make it difficult for BOTs to email you. BOTs not full MTAs, high volume/throughput requirements. Primary MX refuse connections (Google for nolisting ) Tertiary MX always retry Dumb bots try once (primary or tertiary), get refusal or retry, and give up. Real MTAs do right thing. As much as 50% of BOT spam simply vanishes. Loss of metrics.

Banner Delays Most BOTs impatient, and won t retry 20-40 second banner delays => BOTs give up in disgust Some legit MTAs equally impatient, may need to whitelist some.

BOT Fingerprinting Most BOTs have fingerprints in the headers and SMTP protocol that can be caught by pattern matching. Some mutate, some don t. Srizbi > 50% of all spam. Feed source IP of detections ti back into local l DNSBL.

DNSBL (DNS Blacklist) Hundreds of 3 rd party DNSBLs (IP based, domain based, URIBL filtering etc) A handful are both reliable and effective. There are DNSBLs effective to 70-80%+ of all spam & virus propagation attempts.

DNSBL Merge High volume receivers may impose undue loading on 3 rd party DNSBL infrastructure. Occasional erratic delays (including DDOS on DNSBL) => Host them locally We use rbldnsd very high performance DNS server designed for high-performance serving of DNSBL zones. We combine multiple 3 rd party zones (plus ones we create ourselves) into a single zone. Each DNSBL source distinguishable by return code, multiple DNSBL results scored. But most hits at threshold.

Filtering/Bounces & BATV Accepting then bouncing email with forged from => bounce storms (aka backscatter/blowback) => evil Simple blackholing also evil Aim is inline reject, with remediation information. Support costs of receiving end of blowback often exceed spam BATV (Bounce Address Tag Validation) see http://mipassoc.org/batv/ When sending email, encode bounce address (MAIL FROM) When receiving bounce, reject email not encoded)

Omitted Techniques & Why Greylisting (force retry of new senders ). Increasing reports of BOTs doing retry. Doesn t prevent spam-by-reputation-hijacking Bayesian needs training, in many cases defeated Checksumming (Razor/DCC et. al.) Detects bulk, not spam per-se Problemmatic when outsourcing user-contact (eg: HR) Needs whitelisting BOT hash busting getting better