Spam Reduction Techniques Using greylisting and SpamAssassin.

Slides:



Advertisements
Similar presentations
IP Warming Overview and Implementation Using Eloqua.
Advertisements

© 2012 Eloqua, Inc. Confidential 1 Deliverability and IP Warming Overview and Implementation Using Eloqua.
Basic Communication on the Internet:
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Managing Incoming Chapter 3 Bit Literacy. Terminology client – program which retrieves s from a mail server, lets you read the mails,
Fighting spam: the thin grey line Alun Jones,
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
6 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Electronic Mail Electronic mail has revolutionized the way people communicate.
Deliverability How We Get You to the Inbox. +98 % Our Deliverability routinely ranks in the high 90s. There’s another way of saying this: We Get Your.
Dealing With Spam The kind, not the Food product.
Course 201 – Administration, Content Inspection and SSL VPN Filtering
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
Network Layer and Transport Layer.
IMF Mihály Andó IT-IS 6 November Mihály Andó 2 / 11 6 November 2006 What is IMF? ­ Intelligent Message Filter ­ provides server-side message filtering,
UC Irvine’s New Anti-Spam Measures Keith Chong Network & Support Programming Network & Academic Computing Services UC Irvine August 9, 2005 Keith Chong.
Sender policy framework. Note: is a good reference source for SPFhttp://
October 16, Community Conference Broadcast tool Marta Fornal de Seixas: Engaging Networks.
Broadcast service Core tools. Agenda 1.Introduction – tool and its main features 2.Setting up and sending a simple broadcast 3.Achieving.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Empirical Analysis of Denial of Service Attack Against SMTP Servers Boldizsár BENCSÁTH, Laboratory of Cryptography and System Security (CrySyS) Budapest.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Exchange deployment at CERN and new ideas for SPAM fighting Michel Christaller, Emmanuel Ormancey, Alberto Pace.
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
CT NIKHEF Nov Mail NIKHEF CT system support.
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray,
Update Unix Users Feb 2006 Kevin Hill. Update Spam Cop (We’ve been busted!) Greylisting- Next Generation Spam Fighting.
Visit for Marketing and Deliverability Tips, Tools, & Trainingwww. Delivered.com.
Antispam GARR Michele Michelotto Hepix Karlsruhe, 11 May 2005.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
GOT SPAM? Spam is the unsolicited or undesired bulk electronic messages. Spam usually contains pornography, viruses, phishing attacks, scams, trojans,
Sending Mark Kruger Coldfusionmuse.com Cfwebtools.com.
Combating Abuse Brian Nisbet NOC Manager HEAnet.
Final Lab - Spam Group 10: Scott Durr Stephen Thompson.
© Toronto Area Security Klatch 2007 A drop-in anti-spam solution A 15 minute speed talk by Paul Wouters.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Drupal Jumpstart Information Systems 337 Prof. Harry Plantinga.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
A Technical Approach to Minimizing Spam Mallory J. Paine.
1 Day 5 Additional Unix Commands. 2 Important vs. Not Often in Unix there are multiple ways to do something. –In this class, we will learn the important.
Outlook 2007 basics. Create an account An account must be created before sending/receiving . Follow these steps to create an account:
Silicon & Software Systems (S3)‏ Copyright © Silicon & Software Systems Limited Antispam protection IT Department 20/03/2008 Ondrej Valousek.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, and Ivan Osipkov. SIGCOMM, Presented.
Source pictures for document ”Thoughts about increasing spam annoyance” by License: This material may be distributed only subject.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
1 Information Systems 2/26/03 Tom Coppeto Mark Silis MIT Mail System Update 26 February 2003.
«Fly Carrier» agent software Optimization of data transmission over IP satellite networks.
Leveraging Delivery for Spam Mitigation.
Homework 04 Mail System. Computer Center, CS, NCTU 2 Architecture SMTP POP3/IMAP domain.tld Internet Users sub.domain.tld Mail Server.
SMTP Tapu Ahmed Jeremy Nunn. Basics Responsible for electronic mail delivery. Responsible for electronic mail delivery. Simple ASCII protocol that runs.
Sender policy framework. Note: is a good reference source for SPFhttp://
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
Role Of Network IDS in Network Perimeter Defense.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
554 Access Denied Fermilab’s Experiences with Spamcop.net Kevin Hill Ray Pasetes Jack Schmidt.
[1] Control Spam by the Use of Greylisting Torgny Hallenmark LDC - Computing Center Lund University, Sweden TERENA Networking.
ADDRESS INTERNATIONALIZATION ( EAI ) ICANN-55 Mar 06, 2016 TF-AIDN Member 35+ Min : 10- Min ( Q & A )
FNAL Central Systems Jack Schmidt, Al Lilianstrom, Ray Pasetes, and Kevin Hill (Fermi National Accelerator Laboratory) Introduction The FNAL .
Anti-Spam Updates Activity Coordination Meeting March 2006 Kevin Hill.
Deliverability and IP Warming
sender policy framework
Anti-Spam Managing Spam with Kerio Connect
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
This is the Sign In page for the Dashboard
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Presentation transcript:

Spam Reduction Techniques Using greylisting and SpamAssassin

The problem The vast majority of today is Spam Some current statistics indicate over 90% of Spam This matches my experience

Botnets Vast majority of Spam comes from Botnets compromised home PCs hundreds of thousands to millions, or even tens of millions of machines in a heard Controlled by the owner of the heard via a centralised command and control structure Typically don't have a “real” smtp server to actually send the

Spam Reduction with Greylisting and SpamAssassin Currently > 99% effective (closer to 99.8%)‏ In a recent week, only 11 out of 8,000 Spam messages made it through to the end user without being stopped or marked.

Spam statistics as of: 16/09/2007 Total spam: 5459 Total greylisted: 4457(90.8%)‏ Total s accepted (both spam and legitimate): 451 (9.2)% Total identified spam through to end users: 1002 (20.4%)‏ s greylist_delayed: 58 (1.2%), marked as spam 57 (96.6%), NOT marked as spam 2 (3.4%)‏ s via backup mx: 991 (20.2%), marked as spam 944 (95.2%), NOT marked as spam 48 (4.8%)‏ Effectiveness of Greylisting / SpamAssassin: 99.0%. 50 out of 4908 not marked as spam Spam statistics as of: 23/09/2007 Total spam: 5167 Total greylisted: 4928(90.8%)‏ Total s accepted (both spam and legitimate): 499 (9.2)% Total identified spam through to end users: 239 (4.4%)‏ s greylist_delayed: 99 (1.8%), marked as spam 98 (97.0%), NOT marked as spam 3 (3.0%)‏ s via backup mx: 151 (2.8%), marked as spam 138 (90.2%), NOT marked as spam 15 (9.8%)‏ Effectiveness of Greylisting / SpamAssassin: 99.7%. 18 out of 5427 not marked as spam Spam statistics as of: 30/09/2007 Total spam: 6216 Total greylisted: 5950(91.2%)‏ Total s accepted (both spam and legitimate): 573 (8.8)% Total identified spam through to end users: 266 (4.1%)‏ s greylist_delayed: 141 (2.2%), marked as spam 135 (95.1%), NOT marked as spam 7 (4.9%)‏ s via backup mx: 151 (2.3%), marked as spam 128 (84.2%), NOT marked as spam 24 (15.8%)‏ Effectiveness of Greylisting / SpamAssassin: 99.5%. 31 out of 6523 not marked as spam Spam statistics as of: 07/10/2007 Total spam: 7901 Total greylisted: 7712(93.0%)‏ Total s accepted (both spam and legitimate): 581 (7.0)% Total identified spam through to end users: 189 (2.3%)‏ s greylist_delayed: 135 (1.6%), marked as spam 134 (97.8%), NOT marked as spam 3 (2.2%)‏ s via backup mx: 62 (0.7%), marked as spam 55 (87.3%), NOT marked as spam 8 (12.7%)‏ Effectiveness of Greylisting / SpamAssassin: 99.8%. 11 out of 7901 not marked as spam Greylisting removes > 90% of incomming Spam SpamAssassin catches > 90% of received spam Total effectiveness > 99.5%

Components Logical layout

Greylisting Relies on Spammers not using a “proper” mail server. They just fire-and-forget Give a temporary failure to any “suspect” messages. Spammers will not retry, but a mail server will

Which messages to challenge Look at (all of):  From address  To Address  IP of sending machine If not seen before:  give temporary failure  record this “tuple” + time

If seen before:  check if it is now past a “start time” (time + time to go live)‏ time to live is typically a parameter passed to greylisting server. many recommend 60 minutes I use 60 seconds  OK – let through record the time  Not OK reject again Any subsequent communication is let straight through

Some delay first time someone new contacts you Small chance of non delivery of some messages.  non compliant mail servers  ISPs with rotary pool of mail servers may get continually greylisted  from web forms that doesn't go through a real mail server Potential issues

Risk minimisation Can have various white lists  add mail server details for all regular / potential contacts to a white list these s are coming from a real mail server, so we don't need to use this test on them. grep you mail server logs to determine who does conatct you. eg: egrep "client=.*mail.*|client=.*mx.*|client=.*smtp.*" /var/log/maillog* | awk '{print $7}' | awk -F = '{print $2}' | awk -F [ '{print $1}' | sort | uniq -u can use regex in these whitelists

Examples of server whitelist /^.*\.ebay\.com$/ /.*\. ebay\.com$/ /^.*\.mx\.bigpond\.com$/ /^.*\.dell\.com\.au$/ /^.*\.mailguard\.com\.au$/ /^mailout.*\.pacific\.net\.au$/ /^mail-out.*\.netspace\.net\.au$/ /^mx.*\.phx\.paypal\.com$/ /^smtp.*\.bis\.ap\.blackberry\.com$/ /^.*\.server-mail\.com$/ /^vscan.*\.westnet\.com\.au$/ /^ihug-mail\.icp-qv1-irony?\.iinet\.net\.au$/

Implementations Available for many popular mail servers including MS Exchange

SpamAssassin Categorises as either Spam or Ham (good stuff, not Spam), based on a number of tests Each test may add to the overall score for this If the total score exceeds a (configurable) limit, it is marked as Spam Highly configurable  personal limits, tests, scoring etc

Tests Tests to find words that look like viagra etc Is the sender in a RBL Does the sender match the SPF record  v=spf1 a mx mx:westnet.com.au include:westnet.com.au ~all Does the body look like spam The ratio of text to images Bayesian analysis of the content Many more tests see: for the full list

Spam / Ham folders can also set up folders containing Spam and Ham (non Spam) for SpamAssassin to learn from. As a large proportion of is actually spam (if you are not using greylisting), doing this may not be a good idea, as eventually the Bayesian filter gets poisoned and everything ends up looking like spam.

Implementations Available for many popular mail servers including MS Exchange  Exchange implementations tend to be commercial offerings

SMTP Conversation

Greet - Pause When the sender connects, delay the greeting If the sender tries to continue the conversation, before the appropriate response, the conversation is stopped by the smtp server. A “proper” smtp server will handle this, a Spam bot may just have a sequential script and fail this test. About 10% of Spam can be eliminated this way

Components (in my system)‏ Postfix mta (postfix ) postgrey greylisting server (v 1.30)  See also SpamAssassin (spamassassin el5.rf)