A Retrospective on Future Anti-Spam Standards Internet Society of China Beijing – September, 2004 Dave Crocker Brandenburg InternetWorking <http://brandenburg.com/current.html>

Slides:



Advertisements
Similar presentations
Fighting Abuse with Trust: Enhancing the paradigm Dave Crocker Trusted Domain Project (trusteddomain.org) Brandenburg InternetWorking (bbiw.net) FCC ~
Advertisements

1 Mailing list software in the war against spam May 2005 Serge Aumont serge.aumont cru.fr.
IP Warming Overview and Implementation Using Eloqua.
Reputation Discussion Panels: Seeking a Common Understanding Dave Crocker Brandenburg Internet Working bbiw.net MAAWG / S.F Dave Crocker Brandenburg.
Introduction to the Anti-Spam Research Group (ASRG) Presented by Yakov Shafranovich, ASRG Co-chair NIST Spam Technology Workshop Gaithersburg, Maryland,
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
How Will Authentication Reduce Global Spam? OECD Anti-Spam Task Force Pusan – September, 2004 Dave Crocker Brandenburg InternetWorking OECD Anti-Spam Task.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
D. CrockerIntroduction to BATV 1 MIPA Bounce Address Tag Validation (BATV) “Was use of the bounce address authorized?” D. Crocker Brandenburg InternetWorking.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
DomainKeys Identified Mail (DKIM): Introduction and Overview Eric Allman Chief Science Officer Sendmail, Inc.
System Aspects of Spam Control Architecture and Operations Issues IBM Academy 6 Apr 2005 Dave Crocker Brandenburg InternetWorking IBM.
1 Dr. David MacQuigg Research Associate Autonomic Computing Laboratory Autonomic Trust System – Verify Identity and Assess Reputation University of Arizona.
1 Dr. David MacQuigg Research Associate Autonomic Computing Laboratory System – The most important application of computer networks University of.
1 Dr. David MacQuigg, President Open-mail.org Registry of Public Senders™ –A Secure DNS Database University of Arizona ECE 596c – Cyber Security.
Sender policy framework. Note: is a good reference source for SPFhttp://
© Copyright MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005.
Office 365 SMTP Relay June Relay Method Send to rcpts in domain Relay to Internet via O365 Configuration Requirements Requires Authentication.
Best Internet Permission Marketing is the way to make advertising work again!
1 Fighting Spam at AOL: Lessons Learned and Issues Raised Carl Hutzler Director of Anti-Spam Operations America Online, Inc. 12/9/2005.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Spam Sonia Jahid University of Illinois Fall 2007.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
DomainKeys Identified Mail (DKIM) D. Crocker ~ bbiw.net dkim.org  Consortium spec Derived from Yahoo DomainKeys and Cisco Identified Internet Mail  IETF.
DomainKeys Identified Mail (DKIM) D. Crocker Brandenburg InternetWorking mipassoc.org/mass  Derived from Yahoo DomainKeys and Cisco.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
Pilot project proposal: AffiL Affiliated domain names for trust Dave Crocker Brandenburg InternetWorking bbiw.net
Identity Based Sender Authentication for Spam Mitigation Sufian Hameed (FAST-NUCES) Tobias Kloht (University of Goetingen) Xiaoming Fu (University.
Electronic mail – protocol evolution. standards.
1 The Business Case for DomainKeys Identified Mail.
Login Screen This is the Sign In page for the Dashboard New User Registration Enter Id and Password to sign In.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
IST346 – Servies Agenda  What is ?  Policies  The technical side of  Components  Protocols  architecture  Security.
Taking Common Action Against Spam Internet Society of China Beijing – 2004 Dave Crocker Brandenburg InternetWorking
Webmail. Agenda Why use webmail? Why use webmail? What is webmail What is webmail – basic » system MDA MDA MTA MTA MUA MUA »Protocol SMTP SMTP.
CSIE 1 Filtering mail Speaker: Chung yu Wu Adviser: Quincy Wu Date: 2005/12/07.
DNS-based Message-Transit Authentication Techniques D. Crocker Brandenburg InternetWorking D. Crocker Brandenburg InternetWorking.
Authentications INBOX Authentication Panel San Jose, CA – 2004 Dave Crocker Brandenburg InternetWorking INBOX Authentication Panel San Jose, CA –
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Certified Server Validation (CSV) “ An MTA is talking to me directly. Are they OK?” D. Crocker Brandenburg InternetWorking mipassoc.org/csv 10/8/2015 6:36.
A Trust Overlay for Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg.
OPES SMTP Use Cases OPES WG at 62 th IETF in Minneapolis OPES WG 62 th IETF, Minneapolis, MN, USA OPES SMTP Use Cases draft-ietf-opes-smtp-use-cases-00.txt.
Message Authentication Signature Standards (MASS) BOF Jim Fenton Nathaniel Borenstein.
Bounce Address Tag Validation (BATV) D. Crocker IETF J. Levine San Diego Sam Silberman 2004 Tony Finch MASS BOF D. Crocker IETF J. Levine San Diego Sam.
1 Dr. David MacQuigg, President Open-mail.org Stopping Abuse – An Engineer’s Perspective University of Arizona ECE 596c August 2006.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
Spam: Ready, Fire, Aim! APCAUCE / APRICOT Kuala Lumpur – 2004 Dave Crocker Brandenburg InternetWorking APCAUCE / APRICOT Kuala Lumpur – 2004 Dave Crocker.
Module 7: Managing Message Transport. Overview Introduction to Message Transport Implementing Message Transport.
Deliverability Making it to the inbox
Silicon & Software Systems (S3)‏ Copyright © Silicon & Software Systems Limited Antispam protection IT Department 20/03/2008 Ondrej Valousek.
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
The Success Failure INBOX Accountability Panel San Jose, CA – 2004 Dave Crocker Brandenburg InternetWorking INBOX Accountability Panel San Jose,
SMTP Tapu Ahmed Jeremy Nunn. Basics Responsible for electronic mail delivery. Responsible for electronic mail delivery. Simple ASCII protocol that runs.
Spam. Is spam a problem? Bandwidth hogging -> slower, costlier Discourages use of net ( , e-commerce) Productivity -> loss of time and money Receiver.
Sender policy framework. Note: is a good reference source for SPFhttp://
I SPCon 2003 – Evaluating Spam Control SolutionsBrandendenburg.com / 1 Points of Control UA = User Agent MTA = Message Transfer Agent o =originator.
Proposal for DKIM Pilot Project: Making Authentication Useful Dave Crocker Brandenburg InternetWorking Dave Crocker Brandenburg InternetWorking.
Discussion of OCP/SMTP profile and some Use cases Presented by Abbie Barbir
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
PHP Scripts Mall provided Advanced SMTP Server, it is very fast and deliver s multiple recipients. Using Our SMTP Server you can send 1,00,000.
The Acceptable Use of Technology
SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol
Fix Yahoo Mail Box Error 550 Call for Help
By Ian Foster, Jon Larson, Max Masich, Alex C
This is the Sign In page for the Dashboard
Chapter 7 Network Applications
 Zone in name space  DNS IN THE INTERNET  Generic domains :There are fourteen generic domains, each specifying an organization type.
Presentation transcript:

A Retrospective on Future Anti-Spam Standards Internet Society of China Beijing – September, 2004 Dave Crocker Brandenburg InternetWorking < Internet Society of China Beijing – September, 2004 Dave Crocker Brandenburg InternetWorking <

2 2 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,Saeptember 2004 Retrospective on the Future  Spam is complex, confusing and emotional  Imagine that time has passed  What changes will be important?   Will it still be easy to reach everyone?  Will it be cumbersome, with fragmented communities?  Spam  Legitimate business will behave acceptably (mostly)  Rogue (criminal) spammers will be worse than today  Spam is complex, confusing and emotional  Imagine that time has passed  What changes will be important?   Will it still be easy to reach everyone?  Will it be cumbersome, with fragmented communities?  Spam  Legitimate business will behave acceptably (mostly)  Rogue (criminal) spammers will be worse than today

3 3 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,Saeptember 2004 Security Functions TermFunction Identification Who does this purport to be? Authentication Is it really them? Authorization What are they allowed to do? Accreditation What do I think of the agency giving them that permission?

4 4 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,Saeptember 2004 What Will Be Standard?  Accountability (Author & Operator)  Authentication  Authorization  Reputation  Filtering  Format of rules  Accountability (Author & Operator)  Authentication  Authorization  Reputation  Filtering  Format of rules  Reporting & monitoring  Immediate problems  Aggregate statistics  Enforcement (Contracts and laws are standards)  Terminology  Acceptable behavior

5 5 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,Saeptember Path(s) Today! MUA MSAMTA MDA MUA MTA Peer MTA MTA MDA MUA Mail Agents MUA = User MSA = Submission MTA= Transfer MDA= Delivery

6 6 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,Saeptember 2004 SPF and Sender-ID: Author Path Registration oMUAMSA MTA 1 MTA 4 MDArMUA MTA 3 MTA 2 Peer MTA Assigns Sender & MailFrom Did MSA authorize MTA 1 to send this message ? Did MSA authorize MTA 2 to send this message ? Did MSA authorize MTA 3 to send this message ? 1.Authority and Accreditation of MSA and MSA domain administrators 2.MSA must pre- register and trust each MTA in path

7 7 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,Saeptember 2004 My Personal Favorites  Validate content  DomainKeys  Public key signature of the message  Validate operator  CSV  Operator validates MTA  [Validate MailFrom]  [BATV]  Validate content  DomainKeys  Public key signature of the message  Validate operator  CSV  Operator validates MTA  [Validate MailFrom]  [BATV]  Reputation  CSA & DNA (CSV)  Reporting  No candidates, yet  Enforcement  We are still learning

8 8 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,Saeptember 2004 Client SMTP Validation: Assess Peer MTA MUAMSAMTA MTAMDAMUA MTA MTA Peer MTA Does a domain's operator authorize this MTA to be sending ? Do independent accreditation services consider that domain's policies and practices sufficient for controlling abuse?

9 9 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,Saeptember 2004 CSV Functions TermFunctions Identification Client SMTP HELO domain name Authentication Domain name lists IP Address Authorization Name is authorized to be MTA Accreditation  Name may point to accreditors  Accreditors may list domains

10 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,Saeptember 2004 How to Choose the Future  Look at each choice  Who must adopt it? When?  How much effort is need to administer it?  How much does it change ?  Look at each choice  Who must adopt it? When?  How much effort is need to administer it?  How much does it change ? Xie Xie