Anti-Spam SMTP Implementation for anonymous Dial-In SwiNOG #5, 25.09.2002 Fredy Künzler, Init Seven AG.

Slides:



Advertisements
Similar presentations
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
Advertisements

IUT– Network Security Course 1 Network Security Firewalls.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Ipchains and Iptables Linux operating system natively supports packet-filtering rules: Kernel versions 2.2 and earlier support the ipchains command. Kernel.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Configuring IP ACLs.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
Lecture 25: Firewalls Introduce several types of firewalls
Transparent Caching The art of caching network traffic without requiring user / browser side configuration.
WXES2106 Network Technology Semester /2005 Chapter 10 Access Control Lists CCNA2: Module 11.
Standard, Extended and Named ACL.  In this lesson, you will learn: ◦ Purpose of ACLs  Its application to an enterprise network ◦ How ACLs are used to.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Access Lists Lists of conditions that control access.
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 SMTP Transport Configuration SMTP Configurations and Virtual Servers Customizing the SMTP Service.
Copyright © 2000, ZipLink Inc. Patent Pending 1 Mail Message Metering or, how to block outbound spam Robert D. Haskins.
ICND2 – OSPF – Mark Lab Reset for lab 4 Configure 2 loopback interfaces on both routers –RTR1 – 10.X.X.2/32 and 10.X.X.3/32 (area X) –RTR2 – 10.X.X.4/32.
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
NetFilter – IPtables Firewall –Series of rules to govern what Kind of access to allow on your system –Packet filtering –Drop or Accept packets NAT –Network.
The Linux Operating System Lecture 7: Tonga Institute of Higher Education.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
TCOM 515 Lecture 6.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
© 1999, Cisco Systems, Inc Chapter 10 Controlling Campus Device Access Chapter 11 Controlling Access to the Campus Network © 1999, Cisco Systems,
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
1 Routing. 2 Routing is the act of deciding how each individual datagram finds its way through the multiple different paths to its destination. Routing.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Greg Van Dyne December 4, Agenda Introduction Technical Overview Protocols Demonstration Future Trends References.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
Access Control List ACL. Access Control List ACL.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.

Delivery, Forwarding, and Routing of IP Packets
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Access-Lists Securing Your Router and Protecting Your Network.
ACLs ACLs are hard. Read, read, read. Practice, practice, practice ON TEST4.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Page 1 Access Lists Lecture 7 Hassan Shuja 04/25/2006.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 2 – 6 IP Access Lists 1.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Linux Security. Module 13 – Linux Security ♦ Overview Linux is more prone today to security loopholes and attacks, both inside and outside the network.
Networking Basics CCNA 1 Chapter 11.
Operating Systems Proj.. Background A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections.
Unit - III. Providing a Caching Proxy Server (1) A caching proxy server is software that stores (caches) frequently requested internet objects such as.
Chapter 3 Managing IP Traffic. Objectives Upon completion of this chapter you will be able to perform the following tasks: Configure IP standard access.
Tracking Rejected Traffic.  When creating Cisco router access lists, one of the greatest downfalls of the log keyword is that it only records matches.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network Troubleshooting CT NWT NameTP No. Gan Pei ShanTP Tan Ming FattTP Elamparithi A/L ThuraisamyTP Tan Ken SingTP
CONNECTING TO THE INTERNET
Introducing To Networking
NET323 D: Network Protocols
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Chapter 4: Access Control Lists (ACLs)
Digital Pacman: Firewall Edition
* Essential Network Security Book Slides.
Access Control Lists CCNA 2 v3 – Module 11
has many aspects that work together to give people almost instant communication from any computer on the internet to any other computer There.
NET323 D: Network Protocols
Firewalls By conventional definition, a firewall is a partition made
Delivery, Forwarding, and Routing of IP Packets
Presentation transcript:

Anti-Spam SMTP Implementation for anonymous Dial-In SwiNOG #5, Fredy Künzler, Init Seven AG

SPAM is a serious problem. Better fight it at it‘s origin.

Anonymous Dial-In:  Customer is not known  Customer can hide his identity (Rufnummerunterdrückung)  In case of abuse, effort for prevention is high and unpaid  Complaints: Spamcop etc.  In case of abuse, it’s only a reaction, and SPAM has already been distributed

How Spammer abuse anonymous Dial-in (1)  New strategy by Spammers, as the classical Spam delivery technique is not effective anymore (abusing an open SMTP relay). Open SMTP relay servers are disappearing more and more. Reason: M$ is delivering it’s SMTP servers with default «relay denied» these days.

How Spammer abuse anonymous Dial-in (2)  Spam-PC dials over ISDN (Channel Bundling, PPP Multilink)  Spam-PC runs it's own SMTP server. Mail delivery is being done directly to the respective MX server of the recipient. This technique is common by well known Swiss spammers as M.F. (Nachtsichtgeräte, overpriced digital cameras, Brockhaus software, GPS equipment etc.) and B.W.L. (Pfefferspray, Graphic gallery software etc.)  as the spamming SMTP server get's the dynamic IP of the provider, complaints will go to the providers abuse desk

Prevention (Solution #1) (1)  disallow SMTP traffic (Port 25) leaving own backbone  Implementation (let's assume provider has /19 and the dial range is /24): access-list 100 remark SMTP Block of Dial-in-Customers access-list 100 permit tcp eq smtp access-list 101 deny tcp any eq smtp access-list 101 permit ip any any interface FastEthernet 0/0 description connected to Internet (Upstream Provider) ip access-group 100 out

Prevention (Solution #1) (2) Advantage of Solution #1:  Spammer cannot do direct MX-Delivery Disadvantages of Solution #1:  User must use provider’s SMTP server, even if he has a GMX or another fre address  User asks support how to handle «relay denied» error messages  Spammer still can abuse providers’s SMTP server, as it must relay mail traffic from dial-in connections

Prevention (Solution #2) (1)  same as solution #1, but with protected SMTP server of the provider  Dial-Spam-Block is used for SMTP server protection  Dial-Spam-Block counts the number of recipients of mail delivery for each dynamically assigned IP address  Dial-Spam-Block stops relaying mail after limit of recipients has been reached in a certain time frame (default: 50 recipients per 30 minutes allowed)

Prevention (Solution #2) (2)  potential Spammer reaches limit within 1 minute and gets a «relay denied»  counter is reset if dial-in user logs off (radius server sends signal to Dial-Spam-Block)  Dial-Spam-Block currently works with Sendmail (writes into access.db, therefore no sendmail.cf quirk required) and Freeradius. Communication between the two servers is done over SSH.

Prevention (Solution #2) (3) Advantages of Solution #2:  Spammer cannot do direct MX-Delivery  SMTP Server of provider is protected Disadvantages of Solution #2:  User must use provider’s SMTP server, even if he has a GMX or another fre address  User asks support how to handle «relay denied» error messages

Prevention (Solution #2) (4) Dial-Spam-Block  Concept by Fredy Künzler, Init Seven AG (thanks to the Interconnection people)  Developed by Marco Steinacher, Init Seven AG  GPL (General Public License)  Runs since March 2002 without problems in the environment of Init Seven AG.  Available at dial-spam-block.sourceforge.net

Prevention (Solution #3) (1)  Redirect SMTP traffic from dial-in user to providers SMTP server. This will ease the configuration of SMTP client. Support must no longer handle «relay denied» questions, as any valid hostname (i.e. mail.bluewin.ch at Init Seven’s dial-in) works up to the limit of the dial-spam-block.

Prevention (Solution #3) (2)  Implementation (let’s assume provider has /19 and the dial range is /24, and the IP address of the SMTP server is ) access-list 102 remark SMTP Redirect to SMTP server from Dial-in-Customers access-list 102 permit tcp any eq smtp route-map SMTP-Redirect permit 10 match ip address 102 set ip next-hop interface FastEthernet 0/0 description connected to Internet (Upstream Provider) ip policy route-map SMTP-Redirect Note that the SMTP server must not be in the IP range of dial customers!

Prevention (Solution #3) (3)  Configuration of SMTP server: (requirement: kernel of SMTP server must support iptables) iptables -A PREROUTING --table nat --protocol tcp --source \ /24 --dport 25 -j DNAT --to (Init script for Linux available at

Prevention (Solution #3) (4) *) Protected with Dial-Spam-Block

Prevention (Solution #3) (5) Advantages of Solution #3:  Spammer cannot do direct MX-Delivery  SMTP Server of provider is protected  Support is no longer bothered by «relay denied» questions (Minor) Disadvantage of Solution #3:  'telnet host 25' no longer possible from dial-in range Solution #3 is operational since August 2002 in the environment of Init Seven AG

Further development (proposed solution #4)  Dial-Spam-Block is able to work as a «Teergrube». Instead of a hard limit as «relay denied after 50 recipients» the SMTP delivery could gradually slow down. For instance the first 20 recipients are delivered instantly, than wait 2 seconds for each address for the next 20 recipients, than wait 5 seconds etc. etc.

Links (1) SMTP-Redirect Implementation Dial-Spam-Block dial-spam-block.sourceforge.net Teergrube (English) (German)

Links (2) Freeradius Sendmail Iptables

Questions?

Thank you.