Sender policy framework. Note: is a good reference source for SPFhttp://www.openspf.org/

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

TLS and ITIS 3110.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Methods for Stopping Spam James Lick
Course 201 – Administration, Content Inspection and SSL VPN Filtering
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
DNSOP WG IETF-67 SPF/Sender-ID DNS & Internet Threat Douglas Otis
Domain Name System. DNS is a client/server protocol which provides Name to IP Address Resolution.
Exchange 2003 and SPAM Fighting Emmanuel Ormancey, Rafal Otto Internet Services Group Department of Information Technology CERN 3 June 2015.
Microsoft Ignite /16/2017 1:30 PM
Preventing Spam: Today and Tomorrow Zane Bonny Vilaphong Phasiname The Spamsters!
Domain Name System: DNS
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
DNS-centric PKI Sean Turner Russ Housley Tim Polk.
Intro to Computer Networks DNS (Domain Name System) Bob Bradley The University of Tennessee at Martin.
Broadcast service Core tools. Agenda 1.Introduction – tool and its main features 2.Setting up and sending a simple broadcast 3.Achieving.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Spam Reduction Techniques Using greylisting and SpamAssassin.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
Understanding Networks Charles Zangla. Network Models Before I can explain how connections are made from across the country, I would like to provide you.
1 SMTP Transport Configuration SMTP Configurations and Virtual Servers Customizing the SMTP Service.
Review of Last Session Search Engine Optimisation (SEO) Search Engine Optimisation (SEO) You can fine-tune your site so that the search engines notice.
Electronic Mail (SMTP, POP, IMAP, MIME)
Identity Based Sender Authentication for Spam Mitigation Sufian Hameed (FAST-NUCES) Tobias Kloht (University of Goetingen) Xiaoming Fu (University.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
Sending Mark Kruger Coldfusionmuse.com Cfwebtools.com.
© 2007 Convio, Inc. HOW TO: Best Practices for Sending to Organizations Confidential for use by American Cancer Society and Convio – Copyright ©
CISCO NETWORKING ACADEMY Chabot College ELEC Application Layer Puzzles.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Final Lab - Spam Group 10: Scott Durr Stephen Thompson.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 6: Name Resolution.
Erik Kangas -
Advanced Mail. Greylisting mail/postgrey /usr/local/etc/postfix/postgrey_whitelist_clients /usr/local/etc/postfix/postgrey_whitelist_recipients.
Deploying a Web Application Presented By: Muhammad Naveed Date:
Postfix Mail Server Postfix is used frequently and handle thousands of messages. compatible with sendmail at command level. high performance program easier-
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
Policies by FQDN WatchGuard Training.
SPF/Sender-ID DNS & DDoS Threats Operations Analysis and Research Center for the Internet Douglas Otis November 3, 2007
Silicon & Software Systems (S3)‏ Copyright © Silicon & Software Systems Limited Antispam protection IT Department 20/03/2008 Ondrej Valousek.
SPF/Sender-ID DNS & DDoS Threats Internet Security Operations and Intelligence II Douglas Otis
Source pictures for document ”Thoughts about increasing spam annoyance” by License: This material may be distributed only subject.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
SMTP Tapu Ahmed Jeremy Nunn. Basics Responsible for electronic mail delivery. Responsible for electronic mail delivery. Simple ASCII protocol that runs.
CSI 3125, Preliminaries, page 1 Networking. CSI 3125, Preliminaries, page 2 Networking A network represents interconnection of computers that is capable.
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
Sender policy framework. Note: is a good reference source for SPFhttp://
4343 X2 – Outline The Domain Name System The Web.
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
Advanced Mail. Computer Center, CS, NCTU 2 Introduction  SPAM vs. non-SPAM Mail sent by spammer vs. non-spammer  Problem of SPAM mail Over 99% of s.
Problems with ? This set of slides are intended to be a self help guide to help you identify where a problem may exist with . sometimes.
Discussion of OCP/SMTP profile and some Use cases Presented by Abbie Barbir
554 Access Denied Fermilab’s Experiences with Spamcop.net Kevin Hill Ray Pasetes Jack Schmidt.
[1] Control Spam by the Use of Greylisting Torgny Hallenmark LDC - Computing Center Lund University, Sweden TERENA Networking.
Fighting Spam in an Exchange Environment Tzahi Kolber IT Supervisor - Polycom Israel.
Sender Reputation in a Large Webmail Service by Bradley Taylor (2006) Presented by : Manoj Kumar & Harsha Vardhana.
sender policy framework
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
Understand Names Resolution
Sender ID: An Overview for Registrars ICANN Vancouver December 1, 2005
Networking Applications
Everything You need to know
Domain-based Authentication, Reporting, and Conformance
COMPUTER NETWORKS PRESENTATION
Your Winlink “Whitelist”
Slides Credit: Sogand Sadrhaghighi
Presentation transcript:

sender policy framework

Note: is a good reference source for SPFhttp://

 Domains use public records (DNS) to direct requests for different services (web, , etc.) to the machines that perform those services ◦ All domains already publish (MX) records to tell the world what machines receive mail for the domain  SPF works by domains publishing "reverse MX" records to tell the world what machines send mail from the domain ◦ When receiving a message from a domain  Recipient can check those records to make sure mail is coming from where it should be coming from  With SPF, those "reverse MX" records are easy to publish: ◦ One line in DNS is all it takes

 Spammer forges a hotmail.com address ◦ Tries to spam you ◦ They connect from somewhere other than Hotmail  When the message is sent, you see: ◦ MAIL FROM:  Don't have to take his word for it  Ask Hotmail if the IP address comes from their network  (In this example) Hotmail publishes an SPF record ◦ That record tells you (your computer) how to find out if the sending machine is allowed to send mail from Hotmail  If Hotmail says they recognize the sending machine ◦ It passes  You can assume the sender is who they say they are ◦ If the message fails SPF tests  It's a forgery ◦ That's how you can tell it's probably a spammer.

 Client validation system  Verifies envelope sender is permitted to send mail on behalf of the domain ◦ In practice, only verifies IP address  Aims to prevent rogue mail servers  SPF provides no information about the contents of an

 SPF is stored in DNS  An SPF record type is available ◦ Its use is not widespread  Using a TXT record is more common

 An SPF record designates permitted and rejected sender(s) for a domain  Mail from a non-permitted sender may be safely rejected

 SPF evaluation performed on two pieces of information ◦ Client address ◦ Client IP address  Client is retrieved or derived from ◦ Envelope sender (MAIL FROM) ◦ HELO/EHLO host name

 Evaluation is always performed on envelope sender  Evaluation should be performed twice if envelope sender and HELO domains differ ◦ The RFC is unclear on how to merge the results of the evaluations ◦ Likely that the ‘best’ outcome is accepted

 Always start with ‘v=spf1’  Read left-to right  Evaluation stops when a mechanism is matched  Last element of a SPF record should always be an ‘all’ or a ‘redirect’  If no mechanisms are matched, the result returned is ‘Neutral’

gmail.com. 300 IN TXT "v=spf1 redirect=_spf.google.com" _spf.google.com. 107 IN TXT "v=spf1 ip4: /19 ip4: /19 ip4: /20 ip4: /18 ip4: /17 ip4: /20 ip4: /16 ip4: /20 ip4: /20 ip4: /16 ?all” hotmail.com IN TXT "v=spf1 include:spf-a.hotmail.com include:spf-b.hotmail.com include:spf-c.hotmail.com include:spf- d.hotmail.com ~all“

 ALL ◦ Matches anything  A ◦ Matches if client IP matches one of the IP addresses of the named domain ◦ Performs DNS lookup on named domain  Looks for A record if client IP is IPv4  AAAA if client IP is IPv6

 IP4, IP6 ◦ Matches if client IP is in the named netblock ◦ Variants for IPv4 and IPv6 ◦ Netblock must in CIDR format  e.g /24

 MX ◦ Matches if client IP is one of the servers in the MX records of the named domain  PTR ◦ Matches if PTR record for client IP exists and maps to a host in the named domain

 EXISTS ◦ Matches if the named domain exists ◦ Can be used to emulate DNS blacklists ◦ e.g.  ‘v=spf1 -exists:%{ir}.zen.spamhaus.org’

 INCLUDE ◦ Matches if the result of the referenced policy was PASS ◦ Name is poorly chosen

 “+” Pass ◦ Client is permitted to send mail for the domain ◦ Pass is implied if the qualifier is omitted  “–” Fail ◦ Client is not authorized to send mail for the domain

 “~” SoftFail ◦ Client should not send mail for the domain ◦ Mail should not be blocked solely on a SoftFail ◦ Result can be used by spam filtering software  “?” Neutral ◦ No assertion on if client is authorized ◦ Must be treated same as if there were no SPF record

 SPF modifiers ◦ Provide additional information ◦ Do not directly affect the evaluation of SPF records

 redirect ◦ Redirect to a different SPF record ◦ Replaces result of this SPF record ◦ Should always be last element of a SPF record

 exp ◦ Provides an explanation of why SPF validation failed to the client ◦ The TXT record is looked up at named domain and its contents is used as the explanation ◦ SPF macros can be used to make the explanation more informative

 A number of macros are available in SPF records  Macros are expanded during SPF evaluation ◦ s = client address ◦ l = local part of client address ◦ o = domain of client address

 d = client domain name  i = client IP address  v is ◦ "in-addr" - if client IP is IPv4 ◦ "ip6" - if client IP is IPv6  Used to construct PTR addresses  e.g.  %{ir}.%{v}.arpa

 r - reverse macro, splitting on ‘.’ by default ◦ e.g.  %{ir} will reverse an IP address  number of delimited components to keep  e.g. ◦ if d is ‘ ◦ %{d2} is ‘example.com’

 Allows you to specify a delimiter to be replaced with periods ◦ Available delimiters are in the set .-+,/_= ◦ e.g.  if l is ‘jwatso8+foo ’  %{l+} is ‘jwatso8.foo’

gmail.com. 300 IN TXT "v=spf1 redirect=_spf.google.com" _spf.google.com. 107 IN TXT "v=spf1 ip4: /19 ip4: /19 ip4: /20 ip4: /18 ip4: /17 ip4: /20 ip4: /16 ip4: /20 ip4: /20 ip4: /16 ?all” hotmail.com IN TXT "v=spf1 include:spf-a.hotmail.com include:spf-b.hotmail.com include:spf-c.hotmail.com include:spf-d.hotmail.com ~all“

 SMTP servers should add a ‘Received-SPF’ header to any where a SPF record was checked  The Received-SPF header should contain the result of the SPF check

Received-SPF: Pass (mybox.example.org: domain of designates as permitted sender) receiver=mybox.example.org; client-ip= ; envelope-from= ; helo=foo.example.com; Received-SPF: Fail (mybox.example.org: domain of does not designate as permitted sender) identity=mailfrom; client-ip= ; envelope-from= ;

 Only works if everyone uses it  Only prevents mail from unauthorized hosts ◦ Even then only if servers check it  Does not verify the sender, only their domain  Does not verify the contents of a message  SPAM can (and will) still find a way