Identity Based Email Sender Authentication for Spam Mitigation Sufian Hameed (FAST-NUCES) Tobias Kloht (University of Goetingen) Xiaoming Fu (University.

Slides:



Advertisements
Similar presentations
Chapter 14 – Authentication Applications
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Lecture 23 Internet Authentication Applications
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
DomainKeys Identified Mail (DKIM): Introduction and Overview Eric Allman Chief Science Officer Sendmail, Inc.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
SMTP – Simple Mail Transfer Protocol
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Fawaz Alsaadi Fahad Alsolmai.  Secure information sharing across different organizations is an emerging issue for collaborative software development,
Security Jonathan Calazan December 12, 2005.
Sender policy framework. Note: is a good reference source for SPFhttp://
PRISM-PROOF Phillip Hallam-Baker Comodo Group Inc.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
 ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Review of Last Session Search Engine Optimisation (SEO) Search Engine Optimisation (SEO) You can fine-tune your site so that the search engines notice.
© 2007 Convio, Inc. Implementation of Yahoo DomainKeys Bill Pease, Chief Scientist Convio.
Electronic mail – protocol evolution. standards.
1 The Business Case for DomainKeys Identified Mail.
DKIM
03/09/05Oregon State University X-Sig: An Signing Extension for the Simple Mail Transport Protocol (SMTP) Robert Rose 03/09/05.
Wireless and Security CSCI 5857: Encoding and Encryption.
Masud Hasan Secue VS Hushmail Project 2.
IETF 66 EAI WG Testing Report TWNIC
Chapter 6: Packet Filtering
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
DNS-based Message-Transit Authentication Techniques D. Crocker Brandenburg InternetWorking D. Crocker Brandenburg InternetWorking.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Erik Kangas -
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
A Trust Overlay for Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg.
SMTP – Simple Mail Transfer Protocol
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Postfix Mail Server Postfix is used frequently and handle thousands of messages. compatible with sendmail at command level. high performance program easier-
1 Dr. David MacQuigg, President Open-mail.org Stopping Abuse – An Engineer’s Perspective University of Arizona ECE 596c August 2006.
Module 9: Fundamentals of Securing Network Communication.
SPF/Sender-ID DNS & DDoS Threats Operations Analysis and Research Center for the Internet Douglas Otis November 3, 2007
A Retrospective on Future Anti-Spam Standards Internet Society of China Beijing – September, 2004 Dave Crocker Brandenburg InternetWorking
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Accredited DomainKeys: A Service Architecture for Improved Validation Accredited DomainKeys: A Service Architecture for Improved Validation.
SPF/Sender-ID DNS & DDoS Threats Internet Security Operations and Intelligence II Douglas Otis
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
DIGITAL SIGNATURE.
X-ASVP Executive Overview eXtensible Anti-spam Verification Protocol X-ASVP Committee Technical Working Group July 25, 2007.
SMTP Tapu Ahmed Jeremy Nunn. Basics Responsible for electronic mail delivery. Responsible for electronic mail delivery. Simple ASCII protocol that runs.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Sender policy framework. Note: is a good reference source for SPFhttp://
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
Network Applications: DNS Y. Richard Yang 2/1/2016.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Sender Reputation in a Large Webmail Service by Bradley Taylor (2006) Presented by : Manoj Kumar & Harsha Vardhana.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
sender policy framework
Cryptography and Network Security
What Is DMARC Brian Reid Microsoft Office Servers and Services MVP
S/MIME T ANANDHAN.
Social Media And Global Computing Sending
Chapter 7 Network Applications
Slides Credit: Sogand Sadrhaghighi
Presentation transcript:

Identity Based Sender Authentication for Spam Mitigation Sufian Hameed (FAST-NUCES) Tobias Kloht (University of Goetingen) Xiaoming Fu (University of Goetingen)

Spam Spam Spam s is still an open problem largely outnumbering legitimate ones. In 2010, 89% of the s were spams (262 billion spam messages daily) [1]. Projections show that spam will incur a cost of $338 billion by 2013 [2]. Why Spam works Use exploited MTAs (i.e., botnets) and with forged From: addresses. 88.2% of the total spam are sent by botnets using forged addresses (Symantec 2010). No or marginal infrastructural cost. No ownership, spammer remains anonymous, hence no action legal action possible.

Limitations of SMTP The de facto standard for transmissions across the Internet is Simple Mail Transfer Protocol (SMTP). SMTP is continuously evolving, but when it was designed, in the early 1980s, there was no cause to consider security. The original SMTP specification did not include a facility for authentication of senders, making SMTP vulnerable to From address forgery. Modifying SMTP extensively, or replacing it completely, is not believed to be practical, due to the network effects of the huge installed base of SMTP.

Sender Authentication Industry Standards –AOL -- Sender Policy Framework (SPF) --- started in mid 2005 –Hotmail/MSN – SenderID --- started in 2006 –Yahoo – Domain Key Identified Mail (DKIM) --- started in 2006 Gmail.com Yahoo.com Internet Spammer From: From: Sender Authentication Enabled

Sender Policy Framework (SPF) SPF is an IP-based sender authentication Operates on SMTP Envelope Allows domain admins to publish IP(s) for their valid servers as SPF record The receiving side can query the DNS to validate the senders’ IP Most Adopted (60% of prominent domains)

Sender Policy Framework (SPF) Sample SPF –spf-a.hotmail.com text "v=spf1 ip4: /19 ip4: /14 ip4: /16 ip4: /15 ip4: /14 ip4: /16 ip4: /16 ip4: /24 ip4: /24 ip4: /24 ip4: /16 ip4: /24„ SPF validation results –Pass – the host is authorized by the domain to send its . –Fail – the domain forbids the host to send its . –Neutral – the domain owner explicitly states that they cannot or do not want to assert whether the IP is authorized or not. –None – no SPF record found or no checkable sender’s domain found.

Sender Policy Framework (SPF) Problems: SPF is also easily adopted by Spammers. 20% of Spamming domains already adopted SPF. 5% of legitimate messages can potentially fail SPF test. Message forwarding is also a limitation.

SenderID Heavily based on SPF, with only a few additions. Receiving MTA validates the Purported Responsible Address (PRA) i.e the From Address in the message header. Validation is not at the SMTP time Published record is almost identical to SPF, except –v=spf1 is replaced by spf2.0/mfrom, spf2.0/mfrom,pra or spf2.0/pra,mfrom OR spf2.0/pra

Domain Key Identified Mail (DKIM) Header Based Approach (don't work at SMTP time) Defines a domain level digital signature authentication MTAs sign all the outbound mail ( header, body, etc) Use Public key cryptography DNS are used as key server technology (public keys are publish on the DNS). Receiver query the DNS for public key to verify the signature

Domain Key Identified Mail (DKIM) * Via DKIM.org

Domain Key Identified Mail (DKIM) DKIM-Signature: a=rsa-sha1; q=dns; d=example.com; s=jun2005.eng; c=relaxed/simple; t= ; x= ; h=from:to:subject:date; b=dzdVyOfAKCdLXdJOc9G2q8LoXSlEniSb av+yuU4zGeeruD00lszZVoG4ZHRNiYzR Problems: Spam Transmission: signature can only be validated after the entire message content is received Prone to content munging (common problem with lists) Spammer can also adopt it to sign their messages

Example of SPF and DKIM

Required Improvements Sender Authentication at the SMTP time. Bind the identity of the domain owner to its domain and make it hard for the spammer to adopt.

iSATS: Identity based Sender Authentication for Spam Mitigation Crypto based sender authentication –Leverages Identity-based signature (IBS) under Identity-based cryptography (IBC) IBC saves the burden of PKI required for managing and distributing public keys Required establishment of Trusted Authority (TA) also called Public Key Generator (PKG) PKG issues Secret Key (SK) and System Parameters TA is responsible for verifying the identitiy of a domain before issuing the SK

Identity Based Encryption

Identity Based Signing

iSATS (Four Functional Steps) 1.Setup –Executed once in the beginning by TA/PKG. –Generated Master Key and System Parameters. 2. Identity Verification and Secret Key Extraction –iSATS is a closed system and domains are not added automatically. –TA verifies the identity of the domain. TA is envisioned to provide extended validation (organizational identity) for domain‘s identity. –TA issues system parameters and SK.

iSATS (Four Functional Steps) 3. Signature Generation 4. Signature Varification

Summary iSATS is a new sender authentication scheme based on Identity based cryptography. iSATS forms a closed system that provide reliable and easy ways to bind identity of a legitimate sender. It is hard for the spammer to adopt the system without getting noticed.

Prototype The basic prototype implementation includes: Server Implemention for TA –System setup –Extraction and distribution of SK iSATS based processing –Signature generation and verification The prototype utilized Cha-Cheon IBS scheme (pairing based cryptography) Mail Avenger (SMTP Daemon) Postfix (MTA)

Prototype Architecture

Evaluations Potential bottlenecks of iSATS are computionally expensive tasks like: –Signature Generation –Signature Verification –Extraction of SKs Analyzed the above key functionalities on systems with varying computational specs as follows Workstation: 2 GHz intel core2duo, 3 GB RAM Netbook: 1.6 GHz intel Atom, 1 GB RAM Virtual Machine: 2.4 GHz quad-core, 256 MB RAM

Performance of TA in SK Extraction

Performance of Processing with iSATS

Memory and CPU Usage

References