Stephan Kubisch, Harald Widiger, Peter Danielis, Jens Schulz, Dirk Timmermann University of Rostock Institute of Applied Microelectronics and Computer Engineering Thomas Bahls, Daniel Duchow Nokia Siemens Networks Broadband Access Division Greifswald, Germany MIT 2008 Spam Conference, Cambridge, MA, USA, March Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks
Outline 1.Introduction & Motivation 2.The General IPclip Mechanism 3.Anti-Spam Framework using IPclip 1.Modifying the Header 2.A Typical Mail Flow 3.Requirements and Constraints 4.Advantages 4.Summary MIT 2008 Spam Conference, Cambridge, MA, USA, March
Complementing s with Location Information in Packet-switched IP Networks 1.Introduction & Motivation Lack of user trustworthiness in the mass-medium Internet Spam: Masses of unsolicited bulk s delivered by SMTP What can be done against spam? – Detect Trace Prevent Available anti-spam tools trigger on and header content Data can be forged: Spammers lie! Anti-spam examples – DomainKeys Identified Mail (DKIM) – Sender Policy Framework (SPF) – SpamAssassin – … and many more MIT 2008 Spam Conference, Cambridge, MA, USA, March
Complementing s with Location Information in Packet-switched IP Networks 1.Introduction & Motivation MIT 2008 Spam Conference, Cambridge, MA, USA, March SMTP and the Internet lack both TBW and TBA! How do we restore the user's belief in services? SMTP and the Internet lack both TBW and TBA! How do we restore the user's belief in services? Public Switched Telephone Network vs. Internet 4
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks Outline 1.Introduction & Motivation 2.The General IPclip Mechanism 3.Anti-Spam Framework using IPclip 1.Modifying the Header 2.A Typical Mail Flow 3.Requirements and Constraints 4.Advantages 4.Summary MIT 2008 Spam Conference, Cambridge, MA, USA, March
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks 2.The General IPclip Mechanism MIT 2008 Spam Conference, Cambridge, MA, USA, March IPclip = IP Calling Line Identification Presentation Location information (e.g., GPS) is added to each IP packet as IP option Location information in IP – Either by the user or by the access node of an access network IPclip is used to provide a useful degree of TBW in IP networks
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks 2.The General IPclip Mechanism MIT 2008 Spam Conference, Cambridge, MA, USA, March IP header can contain IP options IP options show a type-length-value structure Location information as value part of an IP option What kind of location information do we use?
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks 2.The General IPclip Mechanism Access node is the 1st trustworthy network element – User provided location information solely verified here – Access port + access node ID as complementary information MIT 2008 Spam Conference, Cambridge, MA, USA, March Access network most reasonable place for adding/verifying LI
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks 2.The General IPclip Mechanism MIT 2008 Spam Conference, Cambridge, MA, USA, March User provided LI trustworthy if within access node‘s subscriber catchment area (SCA) IPclip on access node sets flags in status field depending on LI‘s trustworthiness Access Node's SCA (normalized coords) Using IPclip for ensuring trustworthy location information (LI) in IP Status Field Removal Flag Peering Flag Source Flag Trustability Flag
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks 2.The General IPclip Mechanism MIT 2008 Spam Conference, Cambridge, MA, USA, March User provided LI trustworthy if within access node‘s subscriber catchment area Source / Trustability InterpretationStatus Flags User provided / untrusted User LI incorrect. 00 User provided / trusted User LI correct.01 Network provided / untrusted User LI incorrect and replaced. 10 Network provided / trusted No user LI. AN‘s LI added. 11 Access Node's SCA (normalized coords) Using IPclip for ensuring trustworthy location information (LI)
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks Outline 1.Introduction & Motivation 2.The General IPclip Mechanism 3.Anti-Spam Framework using IPclip 1.Modifying the Header 2.A Typical Mail Flow 3.Requirements and Constraints 4.Advantages 4.Summary MIT 2008 Spam Conference, Cambridge, MA, USA, March
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks 3.Anti-Spam Framework using IPclip IPclip adds location information on layer 3 as IP option Mail transfer agents (MTAs) terminate IP We need location information on application layer (SMTP) The first MTA copies location information in IP to header as location information in SMTP MIT 2008 Spam Conference, Cambridge, MA, USA, March How to use IPclip and location information for fighting spam?
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks 3.Anti-Spam Framework using IPclip MIT 2008 Spam Conference, Cambridge, MA, USA, March Typical mail flow between Alice & Bob (same provider network)
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks 3.Anti-Spam Framework using IPclip These 4 different possibilities regarding the existence of location information (LI) in IP and LI in SMTP represent our framework MIT 2008 Spam Conference, Cambridge, MA, USA, March LI in IPLI in SMTPInterpretation First MTA Insert LI in SMTP originates from different provider domain Not first MTA Forward Something went wrong Treat with special care 4 cases can be distinguished when an arrives at an MTA 2 5
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks 3.Anti-Spam Framework using IPclip MIT 2008 Spam Conference, Cambridge, MA, USA, March Typical mail flow between Alice & Bob (same provider network)
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks 3.Anti-Spam Framework using IPclip Fully IPclip-terminated domain, e.g., a self- contained provider network – IPclip is mandatory at all access nodes IPclip-capable IP stack in relevant network devices – MTAs must understand location information (LI) in IP – MTAs must copy LI in IP to header as LI in SMTP – Mail User Agents or anti-spam tools must understand LI in SMTP to take advantage of it MIT 2008 Spam Conference, Cambridge, MA, USA, March Requirements and constraints for IPclip in this use case
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks 3.Anti-Spam Framework using IPclip IPclip supports removal of location information (LI) in IP IPclip‘s status field contains removal flag (RF) – RF indicates removal of LI in SMTP at recipient‘s MTA – Source and trustability flag not removed Trigger for anti-spam mechanisms without revealing LI Use an encrypted format for LI MIT 2008 Spam Conference, Cambridge, MA, USA, March Privacy issues – revelation of sensitive user LI? Status Field Removal Flag (RF)Peering FlagSource FlagTrustability Flag
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks 3.Anti-Spam Framework using IPclip MIT 2008 Spam Conference, Cambridge, MA, USA, March Advantages Beneficial AspectExplanationBenefit 1. Tracing SpamTracing based on geographic location information More exact than WHOIS lookups of IP addresses 2. Classifying SpamStatus flags are additional, trustworthy triggers for anti- spam tools like SpamAssassin More reliable classification of spam
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks Outline 1.Introduction & Motivation 2.The General IPclip Mechanism 3.Anti-Spam Framework using IPclip 1.Modifying the Header 2.A Typical Mail Flow 3.Requirements and Constraints 4.Advantages 4.Summary MIT 2008 Spam Conference, Cambridge, MA, USA, March
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks 4.Summary MIT 2008 Spam Conference, Cambridge, MA, USA, March IPclip adds location information (LI, e.g., GPS) to each IP packet 1. More precise tracing of spam by means of LI 2. More reliable classification of spam by means of trustworthy status flags 2. More reliable classification of spam by means of trustworthy status flags Conceptual anti-spam framework using IPclip Benefits of the proposed approach IPclip guarantees LI’s trustworthiness (Trust-by-Wire) IPclip-capable MTAs copy LI in IP to header as LI in SMTP
Complementing s with Location Information in Packet-switched IP Networks Thank you! Any questions? MIT 2008 Spam Conference, Cambridge, MA, USA, March
Complementing s with Location Information in Packet-switched IP Networks 1.Introduction & Motivation Trust-by-Wire (TBW) Trusted interrelationship between a user and his/her geographic location Example: Given in Public Switched Telephone Network (PSTN) Trust-by-Authentication (TBA) Verification of user identity by means of safe information, e.g., passwords Example: Applied in the Internet MIT 2008 Spam Conference, Cambridge, MA, USA, March Trust models for garantueeing trustworthiness of a user 22
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks 3.Anti-Spam Framework using IPclip MIT 2008 Spam Conference, Cambridge, MA, USA, March Possibilities for an sender in adding location information
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks 3.Anti-Spam Framework using IPclip Yes, but forged LI in SMTP can be detected First MTA knows it is the first one – LI in SMTP options may not exist at the first MTA – LI in IP only exists at first MTA MIT 2008 Spam Conference, Cambridge, MA, USA, March Can location information (LI) in SMTP be forged?
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks MIT 2008 Spam Conference, Cambridge, MA, USA, March Mail flows between Alice, Bob & Peter (different provider nets) Status Field Removal FlagPeering FlagSource FlagTrustability Flag
Complementing s with Distinct, Geographic Location Information in Packet-switched IP Networks Comparison DKIM, SPF, IPclip MIT 2008 Spam Conference, Cambridge, MA, USA, March Why IPclip, differences/benefits compared to DKIM, SPF DKIMSPFIPclip Performance impact associated with scanning, encrypting and decrypting messages Internet domain owner must publish a complete list of every allowed network path Packet processing in wire speed No „forwarding problem“ No 100 % spam protection Another trigger for classifying/tracing spam