D. CrockerIntroduction to BATV 1 MIPA Bounce Address Tag Validation (BATV) “Was use of the bounce address authorized?” D. Crocker Brandenburg InternetWorking.

Slides:



Advertisements
Similar presentations
1 Mailing list software in the war against spam May 2005 Serge Aumont serge.aumont cru.fr.
Advertisements

Reputation Discussion Panels: Seeking a Common Understanding Dave Crocker Brandenburg Internet Working bbiw.net MAAWG / S.F Dave Crocker Brandenburg.
Draft-lemonade-imap-submit-01.txt “Forward without Download” Allow IMAP client to include previously- received message (or parts) in or as new message.
How Will Authentication Reduce Global Spam? OECD Anti-Spam Task Force Pusan – September, 2004 Dave Crocker Brandenburg InternetWorking OECD Anti-Spam Task.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
DNSOP WG IETF-67 SPF/Sender-ID DNS & Internet Threat Douglas Otis
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
Security Jonathan Calazan December 12, 2005.
Sender policy framework. Note: is a good reference source for SPFhttp://
Architecture of SMTP, POP, IMAP, MIME.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
SIMPLE MAIL TRANSFER PROTOCOL SECURITY Guided By Prof : Richard Sinn Bhavesh Jadav Mayur Mulani.
COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.
Understanding Forgery Properties of Spam Delivery Paths Fernando Sanchez, Zhenhai Duan Florida State University Yingfei Dong University of Hawaii.
DomainKeys Identified Mail (DKIM) D. Crocker ~ bbiw.net dkim.org  Consortium spec Derived from Yahoo DomainKeys and Cisco Identified Internet Mail  IETF.
DomainKeys Identified Mail (DKIM) D. Crocker Brandenburg InternetWorking mipassoc.org/mass  Derived from Yahoo DomainKeys and Cisco.
Identity Based Sender Authentication for Spam Mitigation Sufian Hameed (FAST-NUCES) Tobias Kloht (University of Goetingen) Xiaoming Fu (University.
© 2007 Convio, Inc. Implementation of Yahoo DomainKeys Bill Pease, Chief Scientist Convio.
1 Introduction AfNOG CHIX 2011 Blantyre, Malawi By Evelyn NAMARA.
Electronic mail – protocol evolution. standards.
NZNOG ’07 ‘Dealing with Joe Jobs’ or how to cope with spam backscatter attacks Simon Howard.
DKIM
03/09/05Oregon State University X-Sig: An Signing Extension for the Simple Mail Transport Protocol (SMTP) Robert Rose 03/09/05.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
DNS-based Message-Transit Authentication Techniques D. Crocker Brandenburg InternetWorking D. Crocker Brandenburg InternetWorking.
Prof. John A. Copeland fax Office: Klaus
Defending DKIM IETF 65 Threats and Strategies Douglas Otis
Authentications INBOX Authentication Panel San Jose, CA – 2004 Dave Crocker Brandenburg InternetWorking INBOX Authentication Panel San Jose, CA –
Certified Server Validation (CSV) “ An MTA is talking to me directly. Are they OK?” D. Crocker Brandenburg InternetWorking mipassoc.org/csv 10/8/2015 6:36.
A Trust Overlay for Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg.
Mail Service Mail Service using Postfix Campus-Booster ID : **XXXXX
Message Authentication Signature Standards (MASS) BOF Jim Fenton Nathaniel Borenstein.
MASS / DKIM BOF IETF – Paris 4 Août 2005 dkim.org  mipassoc.org/mass IETF – Paris 4 Août 2005 dkim.org  mipassoc.org/mass MIPA.
Bounce Address Tag Validation (BATV) D. Crocker IETF J. Levine San Diego Sam Silberman 2004 Tony Finch MASS BOF D. Crocker IETF J. Levine San Diego Sam.
1 Dr. David MacQuigg, President Open-mail.org Stopping Abuse – An Engineer’s Perspective University of Arizona ECE 596c August 2006.
1 Electronic Mail Security Outline Pretty good privacy S/MIME Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
SPF/Sender-ID DNS & DDoS Threats Operations Analysis and Research Center for the Internet Douglas Otis November 3, 2007
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
A Retrospective on Future Anti-Spam Standards Internet Society of China Beijing – September, 2004 Dave Crocker Brandenburg InternetWorking
COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
SMTP Tapu Ahmed Jeremy Nunn. Basics Responsible for electronic mail delivery. Responsible for electronic mail delivery. Simple ASCII protocol that runs.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Sender policy framework. Note: is a good reference source for SPFhttp://
SMTP - Simple Mail Transfer Protocol RFC 821
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
Fall 2006CS 395: Computer Security1 Key Management.
Draft-lemonade-imap-submit-00.txt “Forward without Download” Allow IMAP client to include previously- received message (or parts) in or as new message.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
sender policy framework
SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol
Electronic mail security
Unit 3 Section 6.4: Internet Security
An Application with Active Spoof Monitoring and Control
Social Media And Global Computing Sending
Overview What is Spoofing Types of Spoofing
Unit – 4 Chap - 2 Mail Delivery System
 Zone in name space  DNS IN THE INTERNET  Generic domains :There are fourteen generic domains, each specifying an organization type.
Slides Credit: Sogand Sadrhaghighi
Presentation transcript:

D. CrockerIntroduction to BATV 1 MIPA Bounce Address Tag Validation (BATV) “Was use of the bounce address authorized?” D. Crocker Brandenburg InternetWorking mipassoc.org/batv 03/08/05 13:13 D. Crocker Brandenburg InternetWorking mipassoc.org/batv 03/08/05 13:13 MIPA

D. CrockerIntroduction to BATV 2 MIPA Basic Roles Envelope – Mail-From Content – Return-Path Return address (bounces) Content – Received header Receiving Relay Sending Relay Submitter into transfer service Originator (author)Who Content – From/Resent-From Envelope – HELO / EHLO Content – Received header Content – Sender/Resent-Sender Specified in

D. CrockerIntroduction to BATV 3 MIPA Bounce Addresses Abuse  Redirecting flood of bounces  Spam sends to many invalid addresses, thereby causing masses of bounces.  Spammers specify stray bounce addresses – like yours -- just to get the traffic off the sending service  Backdoor trojan  Bounce message, itself, might contain dangerous content  Denial of service  The flood of messages can cripple the bounce receiving site  Redirecting flood of bounces  Spam sends to many invalid addresses, thereby causing masses of bounces.  Spammers specify stray bounce addresses – like yours -- just to get the traffic off the sending service  Backdoor trojan  Bounce message, itself, might contain dangerous content  Denial of service  The flood of messages can cripple the bounce receiving site

D. CrockerIntroduction to BATV 4 MIPA Evaluation Venues MTA MDA MTA MSA BounceReceipt BounceGenerationBounceGeneration MDA MTA Sign MailFrom Intermediate Relay

D. CrockerIntroduction to BATV 5 MIPA Bounce Address Validation Goals  Bounce recipient delivery agent  Should I deliver this bounce?  Bounce originator  Should I create this bounce?  And by the way…  If the bounce address is invalid, the entire message is probably invalid  If we can detect forged mail, we do not need to worry about its bounce address  Bounce recipient delivery agent  Should I deliver this bounce?  Bounce originator  Should I create this bounce?  And by the way…  If the bounce address is invalid, the entire message is probably invalid  If we can detect forged mail, we do not need to worry about its bounce address

D. CrockerIntroduction to BATV 6 MIPA BATVBATV  Sign envelope Mail-From address  Protect against simple bounce address forgery  Possibly protect against unauthorized re-use of signature  Submission Agent adds sig to bounce address MAIL FROM  sig-scheme=/sig-data MAIL FROM sig-scheme= mailbox  Multiple signature schemes Symmetric Symmetric – can only be validated by signer’s admin Public Public – can be validated by relays on original path  Sign envelope Mail-From address  Protect against simple bounce address forgery  Possibly protect against unauthorized re-use of signature  Submission Agent adds sig to bounce address MAIL FROM  sig-scheme=/sig-data MAIL FROM sig-scheme= mailbox  Multiple signature schemes Symmetric Symmetric – can only be validated by signer’s admin Public Public – can be validated by relays on original path

D. CrockerIntroduction to BATV 7 MIPA A Symmetric BATV Signature  Originating site uses any signing scheme  BATV spec provides a simple version  prvs=/tag-val prvs= joe-user tag-val =Encryption of (day address will expire, original )  Originating site uses any signing scheme  BATV spec provides a simple version  prvs=/tag-val prvs= joe-user tag-val =Encryption of (day address will expire, original )

D. CrockerIntroduction to BATV 8 MIPA Public BATV Signature  Same style as for symmetric key approach  Except that originating site uses symmetric key and the evaluating site must obtain the public key  Public key distribution is the core difficulty  Therefore, piggyback the effort on an existing message encryption effort, like DomainKeys and Identified Internet Mail  Unfortunately, no existing public key-based message signing effort has widespread support… yet  Same style as for symmetric key approach  Except that originating site uses symmetric key and the evaluating site must obtain the public key  Public key distribution is the core difficulty  Therefore, piggyback the effort on an existing message encryption effort, like DomainKeys and Identified Internet Mail  Unfortunately, no existing public key-based message signing effort has widespread support… yet

D. CrockerIntroduction to BATV 9 MIPA StatusStatus  Several rounds of specification and open comment  Now recruiting field experience  Plan to pursue IETF standardization  Several rounds of specification and open comment  Now recruiting field experience  Plan to pursue IETF standardization

D. CrockerIntroduction to BATV 10 MIPA To follow-up…  Mailing listhttp://mipassoc.org/mailman/listinfo/ietf-clear  BATV specificationhttp://ietf.org/internet-drafts/…  Bounce Address Tag Validation (BATV) draft-levine-mass-batv-00.txt  Internet mail architecturehttp://bbiw.net/current.html#  draft-crocker- -arch-03.txt  Mailing listhttp://mipassoc.org/mailman/listinfo/ietf-clear  BATV specificationhttp://ietf.org/internet-drafts/…  Bounce Address Tag Validation (BATV) draft-levine-mass-batv-00.txt  Internet mail architecturehttp://bbiw.net/current.html#  draft-crocker- -arch-03.txt