Mail Avenger. David Mazières New York University



Similar documents
Advanced Settings. Help Documentation

CipherMail Gateway Quick Setup Guide

Collateral Damage. Consequences of Spam and Virus Filtering for the System. Peter Eisentraut 22C3. credativ GmbH.

POP3 Connector for Exchange - Configuration

A Modular Architecture Using Open Source Components

SMTP Servers. Determine if an message should be sent to another machine and automatically send it to that machine using SMTP.

Mail system components. Electronic Mail MRA MUA MSA MAA. David Byers

Table of Contents. Electronic mail. History of (2) History of (1) history. Basic concepts. Aka (or according to Knuth)

Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011

FortiMail Filtering Course 221-v2.0. Course Overview. Course Objectives

English Translation of SecurityGateway for Exchange/SMTP Servers

Internet Security [1] VU Engin Kirda

Celframe - Easy Linux - Lesson 8 - Server

Enhanced Spam Defence

Exim4U. Server Solution For Unix And Linux Systems

Guardian Digital Secure Mail Suite Quick Start Guide

SESA Securing with Cisco Security Appliance Parts 1 and 2

ECE Mail System Overview. Pablo J. Rebollo ECE Network Operations Center

Mail agents. Introduction to Internet Mail. Message format (2) Authenticating senders

EMB. Basics. Goals of this lab: Prerequisites: LXB, NET, DNS

How To Block Ndr Spam

. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Avira Managed Security AMES FAQ.

How to Build an Effective Mail Server Defense

Configuring Security for SMTP Traffic

Anti-spam filtering techniques

A D M I N I S T R A T O R V 1. 0

QMAIL & SMTP: A Secure Application for an Unsecure Protocol. Orr Dunkelman. orrd@vipe.technion.ac.il. January 27, 2004 SMTP and QMAIL Slide 1

Introduction of the S25R anti-spam system

Frequently Asked Questions for New Electric Mail Administrators 1 Domain Setup/Administration

XGENPLUS SECURITY FEATURES...

Understanding SMTP authentication and securing your IBM Lotus Domino 8 server from spam

Simple Mail Transfer Protocol

FortiMail Filtering Course 221-v2.2 Course Overview

Microsoft Exchange 2003

SPAMfighter SMTP Anti Spam Server

Filtering Mail with Milter. David F. Skoll Roaring Penguin Software Inc.

Basic Exchange Setup Guide

Introduction. Friday, June 21, 2002

How To Write An On A Linux Computer (No Mail) (No ) (For Ahem) (Or Ahem, For Ahem). (For An ) Or Ahem.Org) (Ahem) Or An

SonicWALL Security Quick Start Guide. Version 4.6

Serial Deployment Quick Start Guide

Postfix Configuration and Administration

Marketing Glossary of Terms

AXIGEN Mail Server. Quick Installation and Configuration Guide. Product version: 6.1 Document version: 1.0

Articles Fighting SPAM in Lotus Domino

SPAM ARREST WORKS! Quick Start Enterprise Administrators. Take Control of Your Inbox. Protecting mailboxes since 2001

Basic Exchange Setup Guide

Security. Help Documentation

Libra Esva. Whitepaper. Glossary. How Really Works. Security Virtual Appliance. May, It's So Simple...or Is It?

Gateways Using MDaemon 6.0

Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development

security

one million mails a day: open source software to deal with it Charly Kühnast Municipal Datacenter for the Lower Rhine Area Moers, Germany

Eiteasy s Enterprise Filter

Mail Services. Easy-to-manage Internet mail solutions featuring best-in-class open source technologies. Features

Postfix: Status Quo current development an overview

Implementing MDaemon as an Security Gateway to Exchange Server

OCS Training Workshop LAB14. Setup

Administrator Quick Start Guide

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Postfix. by Rod Roark

Configuring MailArchiva with Insight Server

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007

Core Protection Suite

Math SMTP Server Configuration

Network Services. SMTP, Internet Message Format. Johann Oberleitner SS 2006

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

smtp-user-enum User Documentation

1 Accessing accounts on the Axxess Mail Server

Configuration Information

Migration Quick Reference Guide for Administrators

Fundamentals of the Internet 2009/ Explain meaning the following networking terminologies:

CS 164 Winter 2009 Term Project Writing an SMTP server and an SMTP client (Receiver-SMTP and Sender-SMTP) Due & Demo Date (Friday, March 13th)

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam .

Configuration Guide for Exchange 2003, 2007 and 2010

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc.

Reputation Metrics Troubleshooter. Share it!

Volume SYNAMETRICS TECHNOLOGIES. A Division of IndusSoft Technologies, Inc. DeltaCopy User s Guide

F-Secure Internet Gatekeeper

Lesson Plans Configuring Exchange Server 2007

Service Launch Guide (US Customer) SEG Filtering

ETH Zürich - Mail Filtering Service

Deployment Guide. For the latest version of this document please go to:

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002

ScavengerEXA. An open source program To fight spam at the source. Thomas Mangin Exa Networks UKNOF /02/13

IP Addresses in Clients

Antispam Security Best Practices

Fast, flexible & efficient delivery software

Configure a Mail Server

Resolving problems with SMTP Security Server and CVP operating in Check Point NG

Kerio Connect. Step-by-Step. Kerio Technologies

Release Notes. for Kerio Connect 8.0.0

OpenSMTPD : We deliver!

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008

Installing GFI MailEssentials

CSE/ISE 311: Systems Administra5on Administra5on

Transcription:

Mail Avenger David Mazières New York University

Early design goals for email Work over weakly connected networks - E.g., early Internet, UUCP, etc. - Move mail closer to recipient whenever you can... - Because sender might not be available later on Provide reliable transmission and delivery: - When the receiver-smtp accepts a piece of mail... it is accepting responsibility for delivering or relaying the message. It must take this responsibility seriously... If there is a delivery failure after acceptance of a message, the receiver-smtp MUST formulate and mail a notification message. RFC 2821

Architectural consequences Any random host can send email - Dynamic/temporary IP address or NAT is just fine - No authentication, as any host may relay for any other - Don t even need your own domain name; just forge it Only well-established servers can receive mail - Need permanent domain name & listening TCP port - Anyone can identify the server for a recipient address Servers must treat received mail as precious Surprise: Senders are abusing the system

Stop the Insanity!

Revisiting email s design goals Should email be reliable? - Yes! People still count on reliable email delivery - Yet reliability is often a casualty of spam filtering - Even if stock filters happen to work on your mail... Most people can safely delete e-mail with subject lines like small dick, anal-to-mouth action, or lesbian-animal sex. Not me. I have to open those because they could be legit... questions that touch on those distressing topics. Dan Savage, advice columnist Should we accommodate weakly-connected, ephemeral clients? - No! Not unless they re your, authenticated clients

Principles Never accept email until you re sure the sender can receive a bounce. Never perform spam filtering after accepting responsibility for a message from a client. - Corollary: Filter at your organization s outermost mail relay Different mailboxes need different mail acceptance policies. Individual users should be able to have multiple mailboxes with different policies. Make it easy to implement these new policies. - Give users all possible information about incoming mail

Mail Avenger Email transmitted using SMTP protocol - MAIL FROM client specifies sender address - RCPT TO client specifies recipient - DATA client sends body of mail message Idea: Put recipients in control of SMTP responses - Allow RCPT or DATA to succeed, fail, or return temporary error based on recipient s policy Give users extension addresses - I.e., userdm sets policy fordm+anything@mailavenger.org - Can break policy into multiple files, just like qmail MTA Easy to implement new policies - Policy specification is just a shell script

Avenger architecture client spambot client avenger SMTP MTA daemon ~user/.avenger/ util util util util avenger delivery agent mbox maildir SMTP daemon (asmtpd) enforces users policies Delivery agent (avenger.local) handles extensions Useful utilities for use in policy shell scripts Uses existing MTA (sendmail, qmail, postfix,... )

asmtpd checks Check bounce addresses with DNS SPF records - Can quickly reject forged mail from SPF-enabled domains Check bounce addresses with SMTP servers - Use SMTP callbacks - Start to send bounce, but stop after RCPT (no DATA) - If sender s server returns temporary/permanent error, do the same Collect network-level information about client - SYN fingerprint usually identifies client OS - network route identifies BGP-hijacked address space Collect info on client s SMTP implementation - E.g., eager pipelining, invalid POST command,...

Avenger scripts Policy scripts in user home directories - dm@host.tld = ~dm/.avenger/rcpt - dm+ext@host.tld = ~dm/.avenger/rcpt+ext - Alsorcpt+default catch all Environment variables contain client information Script augmented with shell functions - accept RCPT command succeeds immediately - reject RCPT command fails immediately - defer RCPT fails w. temporary error - bodytest specify script to run on DATA - Or fall through to default, or redirect to other user

Example: Preventing Joe Jobs Problem: Viruses forge your email address - You get tons of unwanted bounce messages Solution: Reject bounces to your main address - macutil utility generates temporary cookies - setenv MACUTIL SENDER dm+bounce+*@host.tld - Send mail withmacutil --sendmail (sendmail wrapper) ~/.avenger/rcpt: test -z "$SENDER" && reject "no bounces, please" ~/.avenger/rcpt+bounce+default: macutil --check "$SUFFIX" \ reject "<$RECIPIENT>.. user unknown"

Example: List-specific addresses Want to subscribe to mailing lists at NYU & MIT - But don t want your address passed on to others Use SPF as a policy language to check client - To reduce latency SPF and DNS requests are asynchronous - setvars command waits for them to complete fordm+list@host.tld, use~/.avenger/rcpt+list: spf EDU_OK ptr:nyu.edu ptr:mit.edu mx:cs.nyu.edu/24 setvars test "$EDU_OK" = pass && accept test "$EDU_OK" = error && defer "Temp. DNS error" reject "Address for NYU/MIT clients only"

Other Examples Greylist mail from Windows machines match -q "*Windows*" "$CLIENT_SYNOS" && greylist Run spamassassin during SMTP session errcheck bodytest edinplace spamassassin -e 100

Conclusions Filter spam before assuming responsibility for messages Don t accept mail if sender won t accept bounce - Easy to originate TCP connections with viruses - Harder to set up domain and mail server to accept bounces - SPF adoption can prevent forgery... - and SMTP callbacks can encourage SPF adoption Different recipients need different policies - Individual users may even need multiple addresses Implementing policies is easy with Mail Avenger

Download it! Mail Avenger is free software. http://www.mailavenger.org/