Source pictures for document ”Thoughts about increasing spam annoyance” by License: This material may be distributed only subject.

Slides:



Advertisements
Similar presentations
1 Eloqua Providing Industry-Leading Management Tools May 2009.
Advertisements

Eloqua Providing Industry-Leading Management Tools.
Basic Communication on the Internet:
Fighting spam: the thin grey line Alun Jones,
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Surrey Public Library Electronic Classrooms Essentials.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Methods for Stopping Spam James Lick
Course 201 – Administration, Content Inspection and SSL VPN Filtering
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Exchange 2003 and SPAM Fighting Emmanuel Ormancey, Rafal Otto Internet Services Group Department of Information Technology CERN 3 June 2015.
Preventing Spam: Today and Tomorrow Zane Bonny Vilaphong Phasiname The Spamsters!
Spam May CS239. Taxonomy (UBE)  Advertisement  Phishing Webpage  Content  Links From: Thrifty Health-Insurance Mailed-By: noticeoption.comReply-To:
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Sender policy framework. Note: is a good reference source for SPFhttp://
Office 365 SMTP Relay June Relay Method Send to rcpts in domain Relay to Internet via O365 Configuration Requirements Requires Authentication.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
Spam Reduction Techniques Using greylisting and SpamAssassin.
CT NIKHEF Nov Mail NIKHEF CT system support.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
1 RedIRIS Reputation Block List September RedIRIS Reputation Block ListPágina 2 RedIRIS and mail services At the beginning, RedIRIS was directly.
Visit for Marketing and Deliverability Tips, Tools, & Trainingwww. Delivered.com.
Antispam GARR Michele Michelotto Hepix Karlsruhe, 11 May 2005.
1 SMTP Transport Configuration SMTP Configurations and Virtual Servers Customizing the SMTP Service.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
Review of Last Session Search Engine Optimisation (SEO) Search Engine Optimisation (SEO) You can fine-tune your site so that the search engines notice.
GOT SPAM? Spam is the unsolicited or undesired bulk electronic messages. Spam usually contains pornography, viruses, phishing attacks, scams, trojans,
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
1 Introduction AfNOG CHIX 2011 Blantyre, Malawi By Evelyn NAMARA.
Combating Abuse Brian Nisbet NOC Manager HEAnet.
Mail Services.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Login Screen This is the Sign In page for the Dashboard New User Registration Enter Id and Password to sign In.
CSIE 1 Filtering mail Speaker: Chung yu Wu Adviser: Quincy Wu Date: 2005/12/07.
© Toronto Area Security Klatch 2007 A drop-in anti-spam solution A 15 minute speed talk by Paul Wouters.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Module 6 Planning and Deploying Messaging Security.
Introduction to Internet Mail Abridged & Updated by Hervey Allen Noah Sematimba Based on Materials by Philip Hazel.
Filtering spam at the ISP Patrick J Okui Ayitey Bulley (Liberal Borrowing from Brian Candler)
Module 5 Managing Message Transport. Module Overview Overview of Message Transport Configuring Message Transport.
SpamAssassin An Introduction PacNOG I Workshop June 20, 2005 Nadi, Fiji Hervey Allen.
Spam from an ISP perspective Simon Lyall, Ihug Uniforum NZ NetForum Conference July 2003.
Silicon & Software Systems (S3)‏ Copyright © Silicon & Software Systems Limited Antispam protection IT Department 20/03/2008 Ondrej Valousek.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
GATEWAY WITH PER-USER SPAM BLOCKING AND VIRUS SCANNING Greg Woods National Center for Atmospheric Research Scientific Computing Division Boulder,
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
SMTP Tapu Ahmed Jeremy Nunn. Basics Responsible for electronic mail delivery. Responsible for electronic mail delivery. Simple ASCII protocol that runs.
Created by Ed, VE7ED.  For a Winlink user to receive a message, the sender's address must be listed in the recipient's whitelist (the accept list)
Sender policy framework. Note: is a good reference source for SPFhttp://
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
X-ASVP Technical Overview eXtensible Anti-spam Verification Protocol X-ASVP Committee Technical Working Group July 22, 2007.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
[1] Control Spam by the Use of Greylisting Torgny Hallenmark LDC - Computing Center Lund University, Sweden TERENA Networking.
Fighting Spam in an Exchange Environment Tzahi Kolber IT Supervisor - Polycom Israel.
sender policy framework
Anti-Spam Managing Spam with Kerio Connect
SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol
Networking CS 3470, Section 1 Sarah Diesburg
What is it? Why do I keep getting from Barracuda? SPAM.
Social Media And Global Computing Sending
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
This is the Sign In page for the Dashboard
Management Suite v2.0 DoubleCheck Manager Management Suite v2.0.
Unit – 4 Chap - 2 Mail Delivery System
Slides Credit: Sogand Sadrhaghighi
Presentation transcript:

Source pictures for document ”Thoughts about increasing spam annoyance” by License: This material may be distributed only subject to the terms and conditions set forth in GNU General Public License v2 or later; or, at your option, distributed under the terms of GNU Free Documentation License version 1.2 or later (GNU FDL).

How address harvesting works A program collecting items from various sources Mail addresses are collected and later used as a false SMTP MAIL FROM: identification to send Unsolicited Bulk (forged addresses in mail messages) Mailing lists Usenet newsgroups Saved addresses WWW pages

Challenge-Response based authentication Send challenge Bar sends his first mail to Foo Add foo to whitelist Respond to challenge Accept challenge Add bar to whitelist Bar and Foo exchange messages (Passwords/Catchpas no longer needed) A C B There are serious problems in the C- R system at points A, B and C

How viruses/spam should not be treated mail sent in the name of Bar (forged address) to Foo MAIL FROM: 1) Message is rejected and returned in full 2) Or notification is sent: ”Your message contained virus or spam and it was not delivered” But this person never sent that message. His mailbox is being filled with false notifications Scanner found that ncoming message is spam or carrying a worm mailbox

Challenge-Response system causing Joe-Job See also RFC 2821 A challenge is sent to: SMTP connection Bar’s C-R system falsely concludes that is the sender ”Joe-Job” Multitude of challenges sent to wrong address More users running C-R systems TO.COMFROM.COM Spammer’s messages which all use forged addresses 220 mailserver.from.com ESMTP MAIL FROM: 250 ok RCPT TO: 250 ok DATA 354 ok Buy our product, and visit URL mailserver.from.com ESMTP MAIL FROM: 250 ok RCPT TO: 250 ok DATA 354 ok Buy our product, and visit URL... (2) (1)

IP How SPF helps to prevent forgeries SPF result: ”No, mail did not come through our Mail Exchanger (MX)” SPF check: consult DNS TXT record Is this message coming from IP authorized to send mail? Host located at some ISP’s address space *.* TO.COM FROM.COM 220 mailserver.to.com ESMTP mailserver.to.com ESMTP (1) (3) SMTP 5xx reject: message is returned to sender due to SPF result: ”you did not use from.com to send mail.” (4) Spammer sends message pretending to come from SMTP connection (2) TXT ”v=spf1 ip4: /24” DNS configuration includes record:

220 mailserver.to.com ESMTP MAIL FROM: 250 ok RCPT TO: 250 ok DATA 354 ok Buy our product, and visit URL mailserver.to.com ESMTP MAIL FROM: 250 ok RCPT TO: 250 ok DATA 354 ok Buy our product, and visit URL... IP x.x.x.x How MTA level UBE prevention works - Is this mail coming from correct location (SPF) - Is this IP in block lists? - Has this ”DATA” seen before as spam? (1)(3) (4) - SPF check - IP block lists (DNSBL) - Known bad domains - Razor2, Pyzor, DCC spam collection checks... SMTP connection TO.COM Access control lists (ACL) or Content filters (2) ?? Virus scanners (Clamv) Spam checkers (Spamassassin) A B (5) (6) External process Other Programs

Procmail with battery of statistical tools Procmail’s rules cannot reliably identify content, so external statistical (Bayesian) programs are called in chain to determine if message is Unsolicited Bulk (*.rc modules interface to statistical programs) MTA (Exim) LDA (Procmail) to deliver mail to user foo # ~/.procmailrc SHELL = /bin/bash... # Detect spam INCLUDERC = bayes1.rc INCLUDERC = bayes2.rc... # was message spam? :0 * ERROR ?? [a-z] spam.mbox # ~/.procmailrc SHELL = /bin/bash... # Detect spam INCLUDERC = bayes1.rc INCLUDERC = bayes2.rc... # was message spam? :0 * ERROR ?? [a-z] spam.mbox bogofilterSpamprobe Bmf Spamoracle Ifile... incoming mail message Host A Host B UBE?

Tools See RFC 2821 SMTP connection A ”robot” program making a collection of addresses TO.COM Spammer injects messages: All use forged address 220 mailserver.target.net ESMTP MAIL FROM: 250 ok RCPT TO: 250 ok DATA 354 ok Buy our product, and visit URL mailserver.target.net ESMTP MAIL FROM: 250 ok RCPT TO: 250 ok DATA 354 ok Buy our product, and visit URL... RFC Libraries