Email — Then, Now, and Later Eric Allman Thom O’Connor Sendmail, Inc.

Slides:



Advertisements
Similar presentations
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Advertisements

Introducing SysAid 5.1 New Features. 12/ 2 Content New Knowledgebase and FAQ abilities Improved Search Additional protocols Improved history and.
Authentication Approaches Phillip Hallam-Baker VeriSign Inc.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Improving Connections for the Mobile Worker Theron Dodson Ascendent Systems August 9.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
Page 1 of 29 Net-Scale Technologies, Inc. Network Based Personal Information and Messaging Services Urs Muller Beat Flepp
DomainKeys Identified Mail (DKIM): Introduction and Overview Eric Allman Chief Science Officer Sendmail, Inc.
PETs and ID Management Privacy & Security Workshop JC Cannon Privacy Strategist Corporate Privacy Group Microsoft Corporation.
Password?. Project CLASP: Common Login and Access rights across Services Plan
Lisa Farmer, Cedo Vicente, Eric Ahlm
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
FROM RICHARD RODRIGUES JOHN ANIMALU FELIX SHULMAN THE HONORARY MEMBERS OF THE INTERCONTINENTAL GROUP Information security in real business firewall security.
Chapter 7 HARDENING SERVERS.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Internet Messaging in 60 Minutes Terry Gray -University of Washington Policy Issues Mission Critical Messaging Goals Relevant Standards Standards Update.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Security Jonathan Calazan December 12, 2005.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
© Copyright MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005.
Guide to Operating System Security Chapter 10 Security.
Exchange deployment at CERN and new ideas for SPAM fighting Michel Christaller, Emmanuel Ormancey, Alberto Pace.
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Anti-Spam & Anti-Virus WiscMail Implementation University of Wisconsin - Madison CSG Workshop September 21, 2004.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Chapter 7: Using Windows Servers to Share Information.
IST346 – Servies Agenda  What is ?  Policies  The technical side of  Components  Protocols  architecture  Security.
Wireless and Security CSCI 5857: Encoding and Encryption.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
IT:Network:Applications.  How messaging servers work  Initial tips for success Exchange management  Server roles  Exchange Server Management  Message.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
Microsoft Exchange in the College of Engineering Jerry Ciolkosz Senior Systems Analyst Electronic and Computing Services October 16, 2003.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Module 6 Planning and Deploying Messaging Security.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
ACM 511 Introduction to Computer Networks. Computer Networks.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
Security Technology Clients and Mail Servers
1 Figure 9-6: Security Technology  Clients and Mail Servers (Figure 9-7) Mail server software: Sendmail on UNIX, Microsoft Exchange,
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
Security fundamentals Topic 9 Securing internet messaging.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Spam. Is spam a problem? Bandwidth hogging -> slower, costlier Discourages use of net ( , e-commerce) Productivity -> loss of time and money Receiver.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Secure Services Shared Hosted MS Exchange 2010.
Spam, viruses, and phishing plague inboxes Organizations have difficulty staying ahead of messaging threats Rising Vulnerabilities Regulatory compliance.
Chapter 7: Using Windows Servers
Internet Business Associate v2.0
S/MIME T ANANDHAN.
Virtual Private Network
Presentation transcript:

— Then, Now, and Later Eric Allman Thom O’Connor Sendmail, Inc.

A (Very) Brief History of springs from the ArpaNET as an afterthought — special form of file transfer Slow networks, low volume, limited audience (academic and research) Quickly became a “killer app” 1984: Internet appears, still limited audience April 30, 1995: The rules change — Internet is privatized; net becomes available to anyone with money for any purpose Some privately held backbones prior to this, but limited commercial use because of government rules becomes a critical part of the business infrastructure

Where Are We Right Now? Good (but could be better): timely, anywhere access, reasonable marginal cost, ability to file and store, searchable (sort of), can auto-handle, elements of privacy and reliability Not so good: spam and viruses are here to stay  When there’s money to be made, people will figure out how to make money  Think of spam as roaches: you can keep them under control but not eliminate them (Dave Crocker) Commercial entities want to use to supplant physical mail: bills, statements, ads, trade acknowledgements, etc. Traffic load keeps going up — this isn’t going to change even when we fix the spam problem

Pressures Placed on Today Summary: better control and access, more secure, reliable, and flexible Message filtering and filing capabilities on the server brought down to the end-user level (better control) Integration of wireless access with traditional methods of access (better access) Synchronization of data regardless of access method (more flexible) Message validity and classification (more secure, more reliable)

Better Control Message filtering and filing capabilities: First came anti-virus, content filtering, and anti-spam basics on a site-wide level Soon after, it was “Classes of Service”, with different groups of users with different needs Now it’s complete per-user control  SIEVE filtering and fileinto (RFC 3028)  SMS notification and forwarding  User-based classifications of what is valid and not valid (spam) Need to push per-user controls out to the perimeter

Better Access Everything going wireless and everyone going mobile (obvious) Security (and privacy) of information is a major challenge The basic protocols exist to provide the access, but not easily assembled — HTTP/HTTPS, IMAP/IMAPS, WAP, iMODE, RSS, WebDAV, and a mix of proprietary protocols (e.g., Blackberry) Users want all functions on all devices

More Secure Everyone talks the security talk, but not enough walk the security walk Some ISPs block or redirect outgoing port 25 Challenges: interoperability (PKI, certificate management), MUA (client) implementation differences, ease of use, corporate enforcement policy Being driven by legal and policy issues:  SEC, HIPPA, Sarbanes-Oxley Continued slow growth of STARTTLS and SMTPS, IMAPS, POPS, Public Key encryption (PGP & S/MIME), HTTPS Still need a trigger to kick-start wider usage of encryption in

More Reliable The clear need for authentication Sender domain authentication is the necessary precursor to the next big thing in Authentication introduces accountability, message identification, and prioritization Service providers will need to have their users authenticate before submitting mail (RFC 2476) [transitive accountability] The best authentication is one based on proven security techniques such as SMTP AUTH (RFC 2554)

What You Should Think About When Designing an System Today Scaling for the present and the future Regulatory compliance Reliability appropriate for your needs  E.g., redundancy if necessary (but expensive) Resilience against Denial of Service attacks Flexibility to do what you need Don’t get caught up in a single litmus test People are more expensive than silicon: move work from people to computers wherever possible

Predictions about the Future (2–3 years) Obvious:  Volume will continue to go up for quite some time  Spam will be better addressed, albeit not fixed Companies will separate their mail based on class and outsource a lot of it  Bill presentment, advertisements, newsletters, etc.  Personal exchange with customers, partners, and colleagues will be treated separately and differently Legal landscape will change: e-information will be held to stricter standards than paper Mail will move toward IM but not fully merge SMTP will morph, but there will be no serious contender for replacement

Spam Predictions (Next 2–3 Years) ePostage won’t succeed for several years:  User resistance  Vendor bickering  Pragmatic problems Authentication techniques will help dramatically, but will not solve the problem by themselves  Fraud will be directly addressed and reduced  Spammers will adapt to the extent they can, but they will be more exposed Accreditation/Reputation systems will gain a foothold, but not globally; value will be debatable Most pure content-filtering techniques will stumble because they just can’t keep up

Problems Without (Current) Solutions Enforcing encryption by the message recipient (“I don’t want to accept unencrypted mail from Travelocity”) Automated outgoing encryption (per domain and/or per recipient) [available on a limited basis] Better PKI — DNS use for key distribution may not scale well, especially to larger keys MUA support for new functionality — e.g., display authentication status [Microsoft is doing some]

Conclusions is not dead, far from it: expect more, much more — but don’t ignore serious challenges SMTP is not dead, but it will change to meet the demands (e.g., SUBMITTER extension) Authentication will be a major and important change, but won’t immediately do as much as we would like Spam will be dealt with, albeit not without cost to both legitimate senders and receivers  “Dealt with” doesn’t mean annihilation, just reducing it to a dull roar

Questions?