Silicon & Software Systems (S3)‏ Copyright © 2007-2008 Silicon & Software Systems Limited Antispam protection IT Department 20/03/2008 Ondrej Valousek.

Slides:



Advertisements
Similar presentations
Staying in Sync with Cloud 2 Device Messaging. About Me Chris Risner Twitter: chrisrisner.
Advertisements

Basic Communication on the Internet:
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
ARP Cache Poisoning How the outdated Address Resolution Protocol can be easily abused to carry out a Man In The Middle attack across an entire network.
Fighting spam: the thin grey line Alun Jones,
Protocols and Troubleshooting Brandon Checketts.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
Firewall Configuration Strategies
Exchange 2003 and SPAM Fighting Emmanuel Ormancey, Rafal Otto Internet Services Group Department of Information Technology CERN 3 June 2015.
UC Irvine’s New Anti-Spam Measures Keith Chong Network & Support Programming Network & Academic Computing Services UC Irvine August 9, 2005 Keith Chong.
1 Enhancing Address Privacy on Anti-SPAM by Dou Wang and Ying Chen School of Computer Science University of Windsor October 2007.
TCP/IP Lecture Extra. TCP/IP Developed by DARPA (Defense Advanced Research Projects) TCP is a connection-oriented transport protocol that sends data as.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Sender policy framework. Note: is a good reference source for SPFhttp://
Series DATA MANAGEMENT. 1 Why ? Alarm/Status Notification –Remote unattended sites »Pumping stations –Pharmaceutical/Plant maintenance.
Simple Mail Transfer Protocol (SMTP) Team: Zealous Team: Zealous Presented By: Vishal Parikh ( ) Vishal Parikh ( ) Ribhu Pathria( )
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.
Office 365 SMTP Relay June Relay Method Send to rcpts in domain Relay to Internet via O365 Configuration Requirements Requires Authentication.
SMTP Simple Mail Transfer Protocol. Content I.What is SMTP? II.History of SMTP III.General Features IV.SMTP Commands V.SMTP Replies VI.A typical SMTP.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Spam Sonia Jahid University of Illinois Fall 2007.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
Spam Reduction Techniques Using greylisting and SpamAssassin.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
Message Trace Office 365 May 2013.
Update Unix Users Feb 2006 Kevin Hill. Update Spam Cop (We’ve been busted!) Greylisting- Next Generation Spam Fighting.
1 SMTP Transport Configuration SMTP Configurations and Virtual Servers Customizing the SMTP Service.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
Applicability Statement v1.1 Feedback: DirectTrust May 5, 2015.
1 Introduction AfNOG CHIX 2011 Blantyre, Malawi By Evelyn NAMARA.
Combating Abuse Brian Nisbet NOC Manager HEAnet.
© 2007 Convio, Inc. HOW TO: Best Practices for Sending to Organizations Confidential for use by American Cancer Society and Convio – Copyright ©
CSIE 1 Filtering mail Speaker: Chung yu Wu Adviser: Quincy Wu Date: 2005/12/07.
IT:Network:Applications.  How messaging servers work  Initial tips for success Exchange management  Server roles  Exchange Server Management  Message.
© Toronto Area Security Klatch 2007 A drop-in anti-spam solution A 15 minute speed talk by Paul Wouters.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
An Anti-Spam Method with SMTP Session Abort Nariyoshi YAMAI 1 Kiyohiko OKAYAMA 1 Takumi SEIKE 1 Keita KAWANO 1 Motonori NAKAMURA 2 Shin MARUYAMA 3 1 Okayama.
TCP/IP Yang Wang Professor: M.ANVARI.
Huda AL_Omairl - Network 71 Protocols and Network Software.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
Postfix Mail Server Postfix is used frequently and handle thousands of messages. compatible with sendmail at command level. high performance program easier-
Content Control Stewart Duncan Technical Manager.
Dylan Bayliff. Contents: 1- Sending s & Using etiquette 2- Staying safe and Accessing 3- Open s 4- Replying to s 5- Setting up contacts.
1 Dr. David MacQuigg, President Open-mail.org Stopping Abuse – An Engineer’s Perspective University of Arizona ECE 596c August 2006.
1 Electronic Messaging Module - Electronic Messaging ♦ Overview Electronic messaging helps you exchange messages with other computer users anywhere in.
Data Communications and Networks Chapter 5 – Network Services DNS, DHCP, FTP and SMTP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Copyright Fujitsu & Savvion © 2000 ebXML Reliability Messaging A Proof of Concept Implementation Fujitsu Savvion Author: Jacques Durand
SpamAssassin An Introduction PacNOG I Workshop June 20, 2005 Nadi, Fiji Hervey Allen.
SIMPLE MAIL TRANSFER PROTOCOL. Introduction Simple Mail Transfer Protocol is the standard protocol on the Internet and part of the TCP/IP protocol.
Source pictures for document ”Thoughts about increasing spam annoyance” by License: This material may be distributed only subject.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
SMTP Tapu Ahmed Jeremy Nunn. Basics Responsible for electronic mail delivery. Responsible for electronic mail delivery. Simple ASCII protocol that runs.
1 DMPT: Controlling Spam Through Message Delivery Differentiation Zhenhai Duan, Kartik Gopalan Florida State University Yingfei Dong University of Hawaii.
Sender policy framework. Note: is a good reference source for SPFhttp://
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
554 Access Denied Fermilab’s Experiences with Spamcop.net Kevin Hill Ray Pasetes Jack Schmidt.
[1] Control Spam by the Use of Greylisting Torgny Hallenmark LDC - Computing Center Lund University, Sweden TERENA Networking.
FNAL Central Systems Jack Schmidt, Al Lilianstrom, Ray Pasetes, and Kevin Hill (Fermi National Accelerator Laboratory) Introduction The FNAL .
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Anti-Spam Updates Activity Coordination Meeting March 2006 Kevin Hill.
sender policy framework
Anti-Spam Managing Spam with Kerio Connect
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
This is the Sign In page for the Dashboard
Slides Credit: Sogand Sadrhaghighi
Presentation transcript:

Silicon & Software Systems (S3)‏ Copyright © Silicon & Software Systems Limited Antispam protection IT Department 20/03/2008 Ondrej Valousek

Copyright © Silicon & Software Systems Limited Slide 2 S3 Antispam protection Main Engine based on Greylisting technique –What it does? It works by temporarily rejecting incoming messages –Where it works? It is installed on S3 main gateway –How it works? It does NOT do any processing of the message body It tells us whether the sender party IS a RFC-compliant MTA, not if the sender is a spammer –Which software is used? Open-source milter which is communication with the existing sendmail MTA – –Many big providers and universities are using this package –Part of many well known linux distributions

Copyright © Silicon & Software Systems Limited Slide 3 How Greylisting works?

Copyright © Silicon & Software Systems Limited Slide 4 Explanation What is the „triplet“? –It is an delivery attempt identified by The IP address of the host attempting the delivery The envelope sender address The envelope recipient address Quick explanation If we have never seen this triplet before, then refuse this delivery and any others that may come within a certain period of time (DELAY constant) with a temporary failure If the triplet comes again after DELAY time period, the mail is accepted and so are all subsequent mails What are the constants employed in Greylisting? –D (Delay)‏ An initial delay enforced to deliver any new triplets –A (Autowhitelist expiration time)‏ Already Auto-Whitelisted triplets are removed from the database after this time –T (Timeout)‏ Any new triplet must be re-sent before this time

Copyright © Silicon & Software Systems Limited Slide 5 How our filter works? S3 Filter is based on the classic greylisting, but with some enhancements –The Autowhitelist database only contains IP addresses, not the whole triplets –SPF and TLS checks allow bypassing the Greylisting engine

Copyright © Silicon & Software Systems Limited Slide 6 Disadvantages Legitimate rejection in case of: –The sender is not willing to resend SMTP is considered an unreliable transport, the possibility of temporary failures is built into the core spec (see RFC 2821)‏ As such, any well behaved message transfer agent (MTA) should attempt retries if given an appropriate temporary failure code for a delivery attempt –The sender is using mail farm ( is resent from a different IP)‏ Big providers employing mailing farms use SPF Gmail is a good example –A SPF-signed sender is using forwarding SPF breaks mail-forwarding -> forwarders should use SRS (just like pobox.com)‏ Can cause unpredictable delays in delivery –RFC2821: The sender MUST delay retrying to particular destination after one attempt has failed. In general, the retry interval SHOULD be at least 30 minutes Can be quite memory demanding –The whole database is kept in memory for speed

Copyright © Silicon & Software Systems Limited Slide 7 Advantages Manageability: –No quarantine to maintain and check Given the volume of spam, it is nearly impossible to maintain it! –No “training” necessary –Simple to set up and understand all the consequences Functionality –Greylisting causes delays A delayed spam message is more likely to be caught by other (following) anti-spam methods –Long-lasting high efficiency Many antispam methods need to be regularly reviewed to cope with new spammer's techniques –No message is lost Message can be refused (SPF fail) or Sender did not want to resend it Either case, no message can be silently lost/deleted

Copyright © Silicon & Software Systems Limited Slide 8 Configuration # some sendmail macros we will use later on... sm_macro "tls_ok" "{verify}" "OK" sm_macro "tls_no" "{verify}" "NO" sm_macro "client_forged" "{client_resolve}" "FORGED" sm_macro "client_unresolved" "{client_resolve}" "FAIL" # And here is the access list racl whitelist list "my network" # Reject SPF hardfails racl blacklist spf fail msg "Rejected (SPF check failed), look at # Heavy-greylist those with too open SPF record (like +all)‏ racl greylist spf self delay 30m autowhite 7d # Whitelist SPF-compliant senders racl whitelist spf pass # Heavy-greylist those with possibly forged dns name racl greylist sm_macro "client_forged" delay 15m autowhite 7d racl greylist sm_macro "client_unresolved" delay 15m autowhite 14d # Heavy-greylist those with invalid HELO (does not contain a dot "." -> not a FQDN)‏ acl greylist not helo /\./ delay 15m autowhite 14d # Heavy-greylist SPF softfails (consider: reject them at once)‏ racl greylist spf softfail delay 30m autowhite 7d # Whitelist STARTTLS compliant senders – spammers can not usually do TLS racl whitelist sm_macro "tls_ok" racl whitelist sm_macro "tls_no" # Default rule racl greylist default delay 7m autowhite 30d

Copyright © Silicon & Software Systems Limited Slide 9 Statistics ( )‏ Conclusion –Nearly 91% of all delivery attempts has been blocked Is anyone missing any legitimate message? –Only 18% of s that passed greylisting, were delayed: 44% of delayed messages were re-sent within 20 minutes after the first attempt 94% of delayed messages were re-sent within 1 hour after the first attempt

Copyright © Silicon & Software Systems Limited Thank You