Download presentation
Presentation is loading. Please wait.
1
Methods for Stopping Spam James Lick jlick@drivel.com
2
The Problem AOL blocks 780,000,000 spams each day (Feb 2003) I am sent ~900 spams each day (Jan 2003)
3
Methods for Stopping Spam ● Security ● Policy Enforcement ● Blocking ● Filtering ● Avoidance
4
Disclaimer No method will block all spam Every method will sometimes block real mail Spammers always get more aggressive These tools are just a sample Combining tactics works best Blocking/Filtering hides extent of problem
5
Security ● Make sure you aren't part of the problem ● Check infrastructure and customers: – Open relays – Open proxies – Use of latest security patches ● A lot of spam is sent through security holes ● Notify authorities for extreme cases
6
Policy Enforcement ● Have a reasonable AUP ● Have users agree to it (legal contract) ● Enforce it! – This is a contract, lack of spam law is no excuse – Don't give second chances too easily ● Respond to complaints
7
Policy Enforcement (cont) ● If you get a reputation of soft on spam: – You will get more spamming customers! – Your mail will be blocked more and more – You lose customers – You go out of business ● The earlier you address problems, the easier it is to solve ● Policy enforcement is an ongoing responsibility
8
Blocking ● Bad sender address ● Spam Source lists ● Open Relay lists ● Open Proxy lists ● Dialup/Dynamic IP lists ● Other ● Local blocks
9
Bad sender ● Most spam is sent with forged sender ● Look up sender domain – Reject message if it doesn't exist – Defer message if lookup fails ● Supported by most mail servers ● Default in modern sendmail ● You can also check sending hostname, but this is not reliable as spam sign
10
Spam Source lists ● Lists IP addresses which belong to spammers ● MAPS RBL (www.mail-abuse.org) ● Spamhaus BL (www.spamhaus.org) ● Sometimes widens block to whole networks, but usually in extreme cases
11
Open Relay lists ● Blocks mail from old servers which allow anyone to send mail through them ● MAPS RSS (www.mail-abuse.org) ● ORDB (www.ordb.org) ● Can block real mail from insecure sites ● Sometimes listings are based on old information
12
Open Proxy lists ● Blocks mail from insecure open proxies ● OPM (www.blitzed.org/opm/) ● Usually doesn't block any real mail ● Most lists incomplete – finding open proxies is hard
13
Dialup/Dynamic IP lists ● Blocks direct mail from dialups and dynamic IP addresses ● Be sure to whitelist your own customers! ● Dynamic clients should use ISP mail server to send mail ● SMTP MSP can be used to send mail remotely safely ● Usually does not block real mail
14
Dialup/Dynamic IP lists (cont) ● MAPS DUL (www.mail-abuse.org) ● PDL (www.pan-am.ca/pdl/) ● Dynablock (basic.wirehub.nl/dynablocker.html)
15
Other ● As spammers get more aggressive, anti-spammers get more aggressive in blocking ● Blocking is often done by: – Any IP sending any spam ever – Countries/regions perceived as soft on spam – Networks perceived as soft on spam – Faulty methods of identifying spam – Other forms of 'spite' listings
16
Other (cont) ● Most of these methods are not used widely ● As spam problem gets worse, these methods may become more widespread. ● Before using a blocking service – Make sure their policies match your expectation – Make sure it is reputable – Test it out first
17
Local blocks ● Setup your own local blocks (access_db, local dnsbl) ● Requires diligence and upkeep ● Do it only if you can devote resources to it every day! ● Better yet, get involved with contributing to public blocking lists
18
Filtering ● Analyze content, not where it came from – Pattern matching – Bulk detection
19
Pattern Matching ● Spams have common 'spam signs' – Common types of header forgery – Common disclaimers – Common wording of sales pitch – Garbage strings, header style, etc. ● Filters can detect and score based on how many spam signs are in a message
20
Spam Assassin (www.spamassassin.org) ● Has a set of rules, each with a score ● If a message scores over a threshold, marked as spam ● Can also use bulk detection, blocking lists ● Uses a lot more CPU – Can scale to large mail loads by using a cluster of cheap servers running SA's spamd ● Can be run on a client system too
21
Spam Assassin 2.50 ● Just out! ● Adds Bayesian filtering ● Bayesian filtering statistically analyzes what content shows up in spam more often than real mail ● For best results, needs training on what is and isn't spam ● SA 2.50 auto-trains based on SA scoring
22
Bulk Detection ● Razor (razor.sourceforge.net) aka SpamNet (www.cloudmark.com) ● DCC (www.rhyolite.com/anti-spam/dcc) ● Reliably detects messages sent in bulk ● Razor designed to detect unsolicited bulk ● Not perfect, sometimes blocks large mailing lists (recently Crypto-Gram)
23
Avoidance ● Try not to expose email addresses – Don't publish user directories – Give users help and tools to do filtering ● Advise users – Use spam filtering software (in addition to ISP) – Don't give out email address freely – Use disposable email addresses – Change email addresses periodically
24
Q&A Questions Answers Discussion
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.