1 The Business Case for DomainKeys Identified Mail.

Slides:



Advertisements
Similar presentations
1 Eloqua Providing Industry-Leading Management Tools May 2009.
Advertisements

Eloqua Providing Industry-Leading Management Tools.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Deliverability How We Get You to the Inbox. +98 % Our Deliverability routinely ranks in the high 90s. There’s another way of saying this: We Get Your.
Breaking Trust On The Internet
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
Basics. 2 Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services –Acquiring an account.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
DomainKeys Identified Mail (DKIM): Introduction and Overview Eric Allman Chief Science Officer Sendmail, Inc.
Lisa Farmer, Cedo Vicente, Eric Ahlm
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 Enhancing Address Privacy on Anti-SPAM by Dou Wang and Ying Chen School of Computer Science University of Windsor October 2007.
Phishing – Read Behind The Lines Veljko Pejović
Security Jonathan Calazan December 12, 2005.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Spam Sonia Jahid University of Illinois Fall 2007.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Anti-Spam & Anti-Virus WiscMail Implementation University of Wisconsin - Madison CSG Workshop September 21, 2004.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Visit for Marketing and Deliverability Tips, Tools, & Trainingwww. Delivered.com.
How Companies Fight Spamming by Sonya Tormaschy & Marc Eggert E-Commerce: Tuesday & Thursdays; 1:30 – 2:45.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Should there be a law that forbids people from sending to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang.
Security Issues: Phishing, Pharming, and Spam
Copyright ©1997 NetDox, Inc. All Rights Reserved. CONFIDENTIAL 1 DATE HERE Julie Grace - NetDox, Inc. Emerging Internet Commerce.
Identity Based Sender Authentication for Spam Mitigation Sufian Hameed (FAST-NUCES) Tobias Kloht (University of Goetingen) Xiaoming Fu (University.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
© 2007 Convio, Inc. Implementation of Yahoo DomainKeys Bill Pease, Chief Scientist Convio.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
DKIM
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Masud Hasan Secue VS Hushmail Project 2.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Norman Protection Powerful and flexible Protection Gateway.
A Trust Overlay for Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg.
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
Deliverability Making it to the inbox
SpamIQ Free spam analysis and data mining tool. Objective: Provide ISPs and network operators good analysis tools to analyze and understand spam traffic.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
Security fundamentals Topic 9 Securing internet messaging.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
By Toby Reed.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Fighting Spam in an Exchange Environment Tzahi Kolber IT Supervisor - Polycom Israel.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Unit 3 Section 6.4: Internet Security
Learn how to protect yourself against common attacks
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
Misc. Security Items.
Information Security Session October 24, 2005
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Slides Credit: Sogand Sadrhaghighi
How We Fight Against Scam
Presentation transcript:

1 The Business Case for DomainKeys Identified Mail

2 Fighting Spam & Abuse Requires a Multi-Faceted Approach DomainKeys Identified Mail is part of a multi-faceted approach to protect consumers against spam and phishing scams. Industry collaboration efforts Cisco, Sendmail, PGP, AOL, IBM, and others worked together to submit DKIM to IETF Legislation and litigation Yahoo! has filed several lawsuits against spammer Increasing consumer awareness Consumer information available at and Enhanced technologies Content filters, virus protection, sender reputation and accreditation

3 The State of – Market Situation Worldwide market = 465 million monthly users (comScore Media Metrix, 12/2005) The original design of makes forgery and spoofing easy for spammers The most egregious abuse = phishing and online identity theft

4 The Proliferation of Phishing Attacks Gartner Study: Increased Phishing and Online Attacks Cause Dip in Consumer Confidence (survey of 5,000 adults, 6/05) 2.42 million US adults report losing money due to phishing attacks In 2004 and 2005, 11 million phishing recipients clicked on the links (or about 15 percent this year and 19 percent last year) More than 80 percent of online consumers say that their concerns about online attacks have affected their trust in from companies or individuals they don’t know personally. Forrester Study: Phishing Spreads Among Consumers (9/05) 14,000 phishing attacks were reported to the Anti-Phishing Working Group from April to Sept 2005 According to the APWG, the number of unique key logging Web sites increased 125% from April to Sept % of phishing attacks target the financial services industry

5 Why Yahoo! Mail is Involved Yahoo! Mail is the largest Web mail provider in the US and in the world –231 million monthly unique users worldwide (comScore MediaMetrix, 12/06) Yahoo! provides for: –SBC/AT&T –Verizon –British Telecom –Rogers Cable –Bell South –100,000s of small business and personal domains

6 Sender Reputation Based on IP Address Numerous headaches with IP reputation (pre-domain authentication) –Maintenance – Senders forget to communicate (or even realize) IP address changes ISPs end up relying on end user reports – Service Providers and shared IP addresses –Forwarding 80% of forwards traffic is spam  Poor reputation Extremely hard to distinguish legitimate wanted forwarded mail from forgeries ISP are between rock and a hard place – protect user from phishing and other forgeries or yield false positives Marketers send TONS of mail that gets legitimately forwarded: (Yahoo!, EarthLink, Comcast, Juno, Mail.com, SBC, …) –Users don’t know or care about IP addresses –Marketers don’t care about IP addresses

7 Sender Reputation Based on Domains DomainKeys was developed to solve these issues –Low maintenance for sender and ISP –Many domains can share the same IP address without sharing the same reputation –Survives forwarding –Users know about domains –Company’s domain is (or should be) a prime brand attribute to marketers

8 Key Benefits of DomainKeys ISP can measure the correct reputation ISP can help you protect your brand Reduce sender reputation maintenance Protect users from forgery

9 Implementation Costs CPU Cost: –Sendmail study shows 8-16% mail server software CPU increase –Several major ISPs and senders have not needed to add additional hardware Several royalty free software implementations available ESPs are beginning to implement DNS – infrequent updates required

10 Implementation Costs: Licensing Patent license designed to allow freedom to operate, while protecting the industry –Royalty free –Sub-licensable –Perpetual unless you sue Yahoo! or other implementer over DomainKeys –No registration required GPL (GNU General Public License)

11 Signing and verifying using DomainKeys Expect to begin using DKIM as specification stabilizes Showing positive verification results to users Skipping some antispam filters –Especially forgery detection –Filters that get fooled by forwarding most often –Not guaranteed inbox delivery! Working on providing complaint feedback loops for signed mail Continued integration into sender reputation systems How Yahoo! is using DomainKeys

12 How it works – Sending Servers Set up: The domain owner (typically the team running the systems within a company or service provider) generates a public/private key pair to use for signing all outgoing messages (multiple key pairs are allowed). The public key is published in DNS, and the private key is made available to their DomainKey-enabled outbound servers. This is step "A" in the diagram to the right. Signing: When each is sent by an authorized end-user within the domain, the DomainKey-enabled system automatically uses the stored private key to generate a digital signature of the message. This signature is then pre-pended as a header to the , and the is sent on to the target recipient's mail server. This is step "B" in the diagram to the right.

13 How it works – Receiving Servers Preparing: The DomainKeys-enabled receiving system extracts the signature and claimed From: domain from the headers and fetches the public key from DNS for the claimed From: domain. This is step "C" in the diagram to the right. Verifying: The public key from DNS is then used by the receiving mail system to verify that the signature was generated by the matching private key. This proves that the was truly sent by, and with the permission of, the claimed sending From: domain and that its headers and content weren't altered during transfer. Delivering: The receiving system applies local policies based on the results of the signature test. If the domain is verified and other anti-spam tests don't catch it, the can be delivered to the user's inbox. If the signature fails to verify, or there isn't one, the can be dropped, flagged, or quarantined. This is step "D" in the diagram on the right.

14 Domains from which Yahoo! has received a DomainKeys signed

15 More information and specification: Tools for deployment