1 Dr. David MacQuigg Research Associate Autonomic Computing Laboratory Email System – The most important application of computer networks University of.

Slides:



Advertisements
Similar presentations
1 Eloqua Providing Industry-Leading Management Tools May 2009.
Advertisements

Eloqua Providing Industry-Leading Management Tools.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Securing Bruce Maggs. Separate Suites of Protocols Protocols for retrieving POP, IMAP, MAPI (Microsoft Exchange) Protocols for sending
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
Draft-lemonade-imap-submit-01.txt “Forward without Download” Allow IMAP client to include previously- received message (or parts) in or as new message.
How Will Authentication Reduce Global Spam? OECD Anti-Spam Task Force Pusan – September, 2004 Dave Crocker Brandenburg InternetWorking OECD Anti-Spam Task.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
DomainKeys Identified Mail (DKIM): Introduction and Overview Eric Allman Chief Science Officer Sendmail, Inc.
Exchange 2003 and SPAM Fighting Emmanuel Ormancey, Rafal Otto Internet Services Group Department of Information Technology CERN 3 June 2015.
1 Dr. David MacQuigg Research Associate Autonomic Computing Laboratory Autonomic Trust System – Verify Identity and Assess Reputation University of Arizona.
1 Dr. David MacQuigg, President Open-mail.org Registry of Public Senders™ –A Secure DNS Database University of Arizona ECE 596c – Cyber Security.
Sender policy framework. Note: is a good reference source for SPFhttp://
Chapter 30 Electronic Mail Representation & Transfer
Simple Mail Transfer Protocol (SMTP) Team: Zealous Team: Zealous Presented By: Vishal Parikh ( ) Vishal Parikh ( ) Ribhu Pathria( )
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Spam Sonia Jahid University of Illinois Fall 2007.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
SIMPLE MAIL TRANSFER PROTOCOL SECURITY Guided By Prof : Richard Sinn Bhavesh Jadav Mayur Mulani.
 ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
Electronic Mail (SMTP, POP, IMAP, MIME)
Identity Based Sender Authentication for Spam Mitigation Sufian Hameed (FAST-NUCES) Tobias Kloht (University of Goetingen) Xiaoming Fu (University.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
1 The Business Case for DomainKeys Identified Mail.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Intro to Computer Networks Bob Bradley The University of Tennessee at Martin.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Login Screen This is the Sign In page for the Dashboard New User Registration Enter Id and Password to sign In.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
Wireless and Security CSCI 5857: Encoding and Encryption.
FTP (File Transfer Protocol) & Telnet
DNS-based Message-Transit Authentication Techniques D. Crocker Brandenburg InternetWorking D. Crocker Brandenburg InternetWorking.
Prof. John A. Copeland fax Office: Klaus
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
Erik Kangas -
A Trust Overlay for Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg.
MASS / DKIM BOF IETF – Paris 4 Août 2005 dkim.org  mipassoc.org/mass IETF – Paris 4 Août 2005 dkim.org  mipassoc.org/mass MIPA.
1 Dr. David MacQuigg, President Open-mail.org Stopping Abuse – An Engineer’s Perspective University of Arizona ECE 596c August 2006.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
Data Communications and Networks Chapter 5 – Network Services DNS, DHCP, FTP and SMTP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
A Retrospective on Future Anti-Spam Standards Internet Society of China Beijing – September, 2004 Dave Crocker Brandenburg InternetWorking
Silicon & Software Systems (S3)‏ Copyright © Silicon & Software Systems Limited Antispam protection IT Department 20/03/2008 Ondrej Valousek.
SIMPLE MAIL TRANSFER PROTOCOL. Introduction Simple Mail Transfer Protocol is the standard protocol on the Internet and part of the TCP/IP protocol.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
SMTP Tapu Ahmed Jeremy Nunn. Basics Responsible for electronic mail delivery. Responsible for electronic mail delivery. Simple ASCII protocol that runs.
Security fundamentals Topic 9 Securing internet messaging.
Sender policy framework. Note: is a good reference source for SPFhttp://
SMTP - Simple Mail Transfer Protocol RFC 821
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
Role Of Network IDS in Network Perimeter Defense.
By Toby Reed.
Draft-lemonade-imap-submit-00.txt “Forward without Download” Allow IMAP client to include previously- received message (or parts) in or as new message.
Collecting Copyright Transfers and Disclosures via Editorial Manager™ -- Editorial Office Guide 2015.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Anti-Spam Updates Activity Coordination Meeting March 2006 Kevin Hill.
Understand Protection LESSON Security Fundamentals.
SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol
Choosing the Discovery Model Martin Forsberg
Architecture Competency Group
Slides Credit: Sogand Sadrhaghighi
Presentation transcript:

1 Dr. David MacQuigg Research Associate Autonomic Computing Laboratory System – The most important application of computer networks University of Arizona ECE December 2009

June 16, The “intractable” problems with –Spam & lost messages, $20B/year –Fraud and other serious crimes –Enabler for most malware –Threats to critical infrastructure Reasons for these problems –Ignorance –Identity fraud (can’t separate the good guys) –Investment in the status quo ($2B per year) Possible technical solutions –More of the same (IP blacklists, statistical filters) –Reputation-based systems

June 16, The problems with –Spam problem, $20B/year, “intractable” –Fraud and other serious crimes –Enabler for most malware –Threats to critical infrastructure Reasons for these problems –Ignorance (users and admins) –Identity fraud (can’t separate the good guys) –Investment in the status quo ($2B per year) Possible technical solutions –More of the same (IP blacklists, statistical filters) –Reputation-based systems

June 16, The problems with –Spam problem, $20B/year, “intractable” –Fraud and other serious crimes –Enabler for most malware –Threats to critical infrastructure Reasons for these problems –Ignorance –Identity fraud (can’t separate the good guys) –Investment in the status quo ($2B per year) Possible technical solutions –More of the same (IP blacklists, statistical filters) –Reputation-based systems

System detailed model wiki/Internet June 16, 20155

June 16, The Internet Today Our Domain Trusted Domains X ???

June 16, Textbook Model of the System Figure 9.1 Sequence of mail relays store and forward messages {Peterson & Davie, Computer Networks, 4 th ed.}

June 16, Real Mail Handling System P. Faltstrom, mail-flows-0.4, Jan 6, 2004,

June 16, D. Crocker, "Internet Mail Architecture", 2009, Function modules and the protocols used between them Relay-Level Model

June 16, Administrative-Level Model | ADMD1 | | ADMD2 | | ADMD3 | | ADMD4 | | | | | | | | | | | | | | | | | | Author | | | | | | Recipient | |. | | | | | | ^ | | V | | | | | |. | | Edge >|.Transit.+....>|-Edge >|..Consumer | | | | | | | | | Legend: === lines indicate primary (possibly indirect) transfers or roles... lines indicate supporting transfers or roles D. Crocker, "Internet Mail Architecture", 2009, Administrative Management Domains (ADMD)

June 16, The System ( a better textbook model ) |--- Sender's Network ---| |-- Recipient's Network -| / Author ==> MSA/Transmitter --> / --> Receiver/MDA ==> Recipient / Border

June 16, Shorthand Notation for System Models Simple Setup with four Actors |--- Sender's Network ---| |-- Recipient's Network -| / Author ==> MSA/Transmitter --> / --> Receiver/MDA ==> Recipient / Border Actors, Roles and Notation Actors include Users and Agents. Agents may play more than one role, but no role has more than one Actor. Typical roles include Transmitting, Receiving, Forwarding, and Delivery. A Border occurs when there is no prior relationship between Agents. --> Direction of mail flow (no statement as to relationship) ~~> Indirect relationship (e.g. both directly related to Recipient) ==> Direct relationship between Actors (e.g. a contract) A/B Roles A and B both played by the same Actor

June 16, Other Common Setups Simple Forwarding is quite common | Recipient's Network | / --> / --> Receiver/Forwarder ~~> MDA ==> Recipient / Border Chain Forwarding should be discouraged | Recipient's Network | / --> / --> Receiver ~~> Forwarder(s) ~~> MDA ==> Recipient / Border Open Forwarding must be banned / / |-- Recipient's Network -| --> / --> Forwarder --> / --> Receiver/MDA ==> Recipient / / Border Border

June 16, Roles and Responsibilities Author - Originate messages - Provide a password or other means of authentication MSA - Mail Submission Agent - Authenticate the Author - Manage Author accounts Transmitter - Spam Prevention - rate limits, content analysis, alerts - respond to spam reports - maintain reputation - Authentication - RFC compliance - IP authorization (SPF, SID, CSV,...) - signatures & key management (DKIM...) Receiver - Block DoS - Authenticate Sender - HELO, Return Address, Headers, Signature - reject forgeries - Assess reputation - whitelists - Filter spam - Add authentication headers - Manage Recipient accounts/options - whitelisting, blacklisting, filtering, blocking, forwarding - Process spam reports

June 16, Roles and Responsibilities (continued) Forwarder - Authenticate upstream Agent - Set up forwarding to downstream Agent - check RFC compliance - set up authentication records - submit forwarding request, wait for approval - Manage Recipient accounts - maintain database of forwarding addresses - suspend account when a message is rejected - communicate w Recipient re " " - Maintain reputation as a trusted Forwarder - certifications MDA - Mail Delivery Agent - Authenticate upstream Agent - Sort and store messages - Provide access for Recipients - POP3, IMAP, Webmail - Manage Recipient accounts/options - Relay spam reports to Receiver (or don't accept them) Recipient - Set up accounts with each Agent - Select options in each account - Report spam to Receiver

June 16, Secure Communications Secure communications may require any or all of: 1)authentication of the source (individual or organization identity) 2)verification of content (digital signature) 3)confidentiality of content (encryption) 4)originality (no duplicates) 5)timely delivery (no unexpected delays) 6)hidden communication (keeping an enemy unaware) Solving the problems of bulk abuse (spamming, phishing and other bulk mail scams) requires that we address items 1 and 4. To be useful in authentication, an identity must have three characteristics. It must be unique, verifiable, and suitable for accumulation of reputation.

June 16, Identities in an Session $ telnet open-mail.org open-mail.org ESMTP Sendmail /8.13.1; Wed, 30 Aug :36: HELO mailout1.phrednet.com 250 open-mail.org Hello ip068.subnet71.gci-net.com [ ], pleased to meet you MAIL FROM: Sender ok RCPT TO: Recipient ok DATA 354 Enter mail, end with "." on a line by itself From: Dave\r\nTo: Test Recipient\r\nSubject: SPAM SPAM SPAM\r\n\r\nThis is message 1 from our test script.\r\n.\r\n k7TKIBYb Message accepted for delivery QUIT open-mail.org closing connection RFC-5321 Helo Name Envelope Addresses: Return Address Recipient Addresses RFC-5322 Header Addresses: From Address Reply-To Address Network Owner Author ==> MSA/Transmitter --> / --> Receiver/MDA ==> Recipient

June 16, Authentication – The Challenge SMTP makes forgery easy Forger > / / Author ==> MSA/Transmitter --> / --> Receiver/MDA ==> Recipient / / / / Border / / / -- Secure Channel -- TCP makes IP addresses (relatively) secure The source address is real, but it may be only a zombie! DNS offers a (relatively) secure channel Domain owners can publish their transmitter addresses Or they can publish a public key Nothing else can be trusted

June 16, Authentication Summary IP-based Authentication (SPF, SenderID, CSV): Sender provides a list of authorized transmitter addresses via DNS. Can be very efficient (no data transfer) but may have a “forwarding problem” if the MDA thinks it is the Receiver. Signature-based Authentication (DKIM): Sender provides a Public Key via a DNS. Messages are signed with the related Private Key. Message content can be very secure, but an un-trusted Forwarder can replay it to millions. |--- Sender's Network ---| | Recipient's Network | / Author ==> MSA/Transmitter --> / --> Receiver/Forwarder ~~> MDA ==> Recipient / / / / Border / / / DNS

June 16, Analysis of SPF using our models Simple Forwarding | Recipient's Network | / MSA/Transmitter --> / --> Receiver/Forwarder ~~> MDA ==> Recipient / Border SPF correlates the Return Address to the Transmitter’s IP address. Forwarders are expected to re-write the Return Address. Very few forwarders are doing that. “Proselytizing” has failed. A misconfigured MDA sees the forwarded message as forgery. The message is quarantined, and possibly lost. Senders are avoiding the loss by publishing “neutral” SPF records. Forwarders will not change until senders demand it by publishing “enforceable” SPF records. Senders don’t care. SPF is stuck.

June 16, Reputation – the other half of trust Millions of legitimate senders are simply unknown Aggregation of data is essential Ground Up: Gossip Top Down: Proprietary Systems Both: Registry of Internet Transmitters Some legitimate senders are not qualified to operate a transmitter Make outsourcing the Transmitter role easy. Accountability is essential – no excuses.

June 16, Suggested Receiver Setup

June 16, So why isn’t it happening? Hurdles that proposed solutions have failed to avoid or overcome, in order of decreasing severity: 1)Required simultaneous upgrades in software or setup (Flag Day) 2)Required widespread adoption by Agents before any benefit is realized by Users 3)Required widespread adoption of one company's method or service (Microsoft patent) 4)Changes that cause a temporary degradation in service 5) Changes in current practices a) A well-established and standards-compliant practice. b) A widespread but non-standardized practice. ("Misuse" of Return Address) c) A widespread but non-compliant practice. (bad HELO name) d) An already unacceptable practice. (open relays) 6)Costs to senders a) Must pay a fee, install new software, or incur some administrative cost. b) Worry about lost messages c) Need to keep track of their transmitter addresses The real reason: Reversed incentives – more spam for everyone else = more money for us

June 16, Bibliography “ System”, - cluster of articles on how the system works, security, authentication methods, etc. "Internet Mail Architecture", D. Crocker, - best relay-level model, with references to all the relevant RFC standards. Computer Networks, Peterson & Davie, 4 th ed. – good on all relevant technologies except . TCP/IP Illustrated, vol. I, The Protocols, W. Richard Stevens, Very thorough, yet readable. Good illustrations. Pro DNS and BIND, Ron Aitchison, Apress – Very readable book on the Domain Name System. "CircleID", – a "Collaborative Intelligence Hub for the Internet's Core Infrastructure & Policies" – current articles by top industry experts. Project Links – current status of our Identity and Reputation Systemhttps:// – articles and notes from early development. A short list of the most useful books and articles on and its underlying technology.

June 16, Economics of Abuse $200B annual benefit of $20B cost of abuse 100M users x ($.25/day deleting spam + $100/yr lost s) $2B benefit to anti-spam industry 100 companies x $20M/yr $0.2B benefit to spammers 10K spammers x $20K/yr $0.02B cost of an effective authentication/reputation system 10M users x $2/yr 100K companies x $200/yr (90% internal, 10% external services)