1 Dr. David MacQuigg, President Open-mail.org Stopping Email Abuse – An Engineer’s Perspective University of Arizona ECE 596c August 2006.

Slides:



Advertisements
Similar presentations
Eloqua Providing Industry-Leading Management Tools.
Advertisements

CCNA – Network Fundamentals
Communication Protocols II Ninth Meeting. TCP/IP family.
How Will Authentication Reduce Global Spam? OECD Anti-Spam Task Force Pusan – September, 2004 Dave Crocker Brandenburg InternetWorking OECD Anti-Spam Task.
Protocols and Troubleshooting Brandon Checketts.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
D. CrockerIntroduction to BATV 1 MIPA Bounce Address Tag Validation (BATV) “Was use of the bounce address authorized?” D. Crocker Brandenburg InternetWorking.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
DomainKeys Identified Mail (DKIM): Introduction and Overview Eric Allman Chief Science Officer Sendmail, Inc.
Exchange 2003 and SPAM Fighting Emmanuel Ormancey, Rafal Otto Internet Services Group Department of Information Technology CERN 3 June 2015.
SMTP – Simple Mail Transfer Protocol
1 Dr. David MacQuigg Research Associate Autonomic Computing Laboratory Autonomic Trust System – Verify Identity and Assess Reputation University of Arizona.
1 Dr. David MacQuigg Research Associate Autonomic Computing Laboratory System – The most important application of computer networks University of.
1 Dr. David MacQuigg, President Open-mail.org Registry of Public Senders™ –A Secure DNS Database University of Arizona ECE 596c – Cyber Security.
Sender policy framework. Note: is a good reference source for SPFhttp://
Simple Mail Transfer Protocol (SMTP) Team: Zealous Team: Zealous Presented By: Vishal Parikh ( ) Vishal Parikh ( ) Ribhu Pathria( )
1 Information Systems 7/1/03 Tom Coppeto MIT Mail System Security Issues 1 July 2003.
SMTP Simple Mail Transfer Protocol. Content I.What is SMTP? II.History of SMTP III.General Features IV.SMTP Commands V.SMTP Replies VI.A typical SMTP.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Spam Sonia Jahid University of Illinois Fall 2007.
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
SIMPLE MAIL TRANSFER PROTOCOL SECURITY Guided By Prof : Richard Sinn Bhavesh Jadav Mayur Mulani.
DomainKeys Identified Mail (DKIM) D. Crocker ~ bbiw.net dkim.org  Consortium spec Derived from Yahoo DomainKeys and Cisco Identified Internet Mail  IETF.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
Pilot project proposal: AffiL Affiliated domain names for trust Dave Crocker Brandenburg InternetWorking bbiw.net
Identity Based Sender Authentication for Spam Mitigation Sufian Hameed (FAST-NUCES) Tobias Kloht (University of Goetingen) Xiaoming Fu (University.
1 Introduction AfNOG CHIX 2011 Blantyre, Malawi By Evelyn NAMARA.
1 The Business Case for DomainKeys Identified Mail.
Mail Services.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
PRINCIPLES – DNS – ARCHITECTURES – SPAM
Intro to Computer Networks Bob Bradley The University of Tennessee at Martin.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Network Applications Outline Simple Mail Transfer Protocol
IST346 – Servies Agenda  What is ?  Policies  The technical side of  Components  Protocols  architecture  Security.
DNS-based Message-Transit Authentication Techniques D. Crocker Brandenburg InternetWorking D. Crocker Brandenburg InternetWorking.
Prof. John A. Copeland fax Office: Klaus
Erik Kangas -
Introduction to Internet Mail Abridged & Updated by Hervey Allen Noah Sematimba Based on Materials by Philip Hazel.
Electronic Mail. Familiar to most of us 4 What are the functions we expect? –Outgoing mail Compose send –compress –encrypt –Incoming Mail read forward.
Certified Server Validation (CSV) “ An MTA is talking to me directly. Are they OK?” D. Crocker Brandenburg InternetWorking mipassoc.org/csv 10/8/2015 6:36.
A Trust Overlay for Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg.
SMTP – Simple Mail Transfer Protocol
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
Data Communications and Networks Chapter 5 – Network Services DNS, DHCP, FTP and SMTP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
A Retrospective on Future Anti-Spam Standards Internet Society of China Beijing – September, 2004 Dave Crocker Brandenburg InternetWorking
Silicon & Software Systems (S3)‏ Copyright © Silicon & Software Systems Limited Antispam protection IT Department 20/03/2008 Ondrej Valousek.
Source pictures for document ”Thoughts about increasing spam annoyance” by License: This material may be distributed only subject.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
X-ASVP Executive Overview eXtensible Anti-spam Verification Protocol X-ASVP Committee Technical Working Group July 25, 2007.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
SMTP Tapu Ahmed Jeremy Nunn. Basics Responsible for electronic mail delivery. Responsible for electronic mail delivery. Simple ASCII protocol that runs.
Sender policy framework. Note: is a good reference source for SPFhttp://
SMTP - Simple Mail Transfer Protocol RFC 821
Chapter 16: Distributed Applications Business Data Communications, 4e.
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
Discussion of OCP/SMTP profile and some Use cases Presented by Abbie Barbir
Network Applications: DNS Y. Richard Yang 2/1/2016.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
concepts & protocols
SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol
Simple Mail Transfer Protocol (SMTP)
SMTP, POP3, IMAP.
Social Media And Global Computing Sending
Chapter 7 Network Applications
Slides Credit: Sogand Sadrhaghighi
Presentation transcript:

1 Dr. David MacQuigg, President Open-mail.org Stopping Abuse – An Engineer’s Perspective University of Arizona ECE 596c August 2006

October 16, How the System Works –Actors, Agents, Terminology – Identities, Authentication Methods Reputation/Accreditation Systems –Registry of Public Senders™ –Receiver Setup –Border Patrol™ MTA –Reputation Statistics Social Factors –Barriers to Adoption –Economics of Abuse

October 16, Simple Mail Transfer Actors include Users and Agents Users include Authors and Recipients Agents include Senders, Receivers and Forwarders Forwarders include: Recipient's Forwarders (most common) Sender's and Receiver’s Forwarders Open Relays (banned) Routers are Invisible to – We depend on them only to preserve IP source and destination addresses.

October 16, Forgery is the Critical Factor in Abuse Authentication stops forgery. IP-based Authentication (SPF, SenderID, CSV, PTR): Domain owner provides a list of authorized IP addresses. Fast, minimum mail-transfer overhead. Signature-based Authentication (DKIM): Domain owner provides a Public Key via a secure channel. Messages are signed with the related Private Key. End-to-end protocol allows arbitrary forwarding. High security.

October 16, Precise Terminology Border The Border is the only interface with no established trust relationship. "Mail Transfer Agent (MTA)" is a commonly-used term for a mail-handling program. A typical mailflow involves mutliple MTAs for each Agent. We will use "Agent" to mean an individual or organization, and "MTA" to mean a program or process. "Border MTAs" include "Transmitters" and "Receiving MTAs" or "receivers". Transmitters have a special role in limiting spam and abuse in outgoing mail, and in ensuring valid identities associated with that mail. Receiving MTAs have a special role in rejecting mail with forged identities. Other programs with special roles include the Sender's MSA (Mail Submission Agent), the Receiver's MDA (Mail Distribution Agent), and the User's MUA (Mail User Agent). Again, we will use the acronyms to avoid confusion over the word Agent.

October 16, Identities in an Session $ telnet open-mail.org open-mail.org ESMTP Sendmail /8.13.1; Wed, 30 Aug :36: HELO mailout1.phrednet.com 250 open-mail.org Hello ip068.subnet71.gci-net.com [ ], pleased to meet you MAIL FROM: Sender ok RCPT TO: Recipient ok DATA 354 Enter mail, end with "." on a line by itself From: Dave\r\nTo: Test Recipient\r\nSubject: SPAM SPAM SPAM\r\n\r\nThis is message 1 from our test script.\r\n.\r\n k7TKIBYb Message accepted for delivery QUIT open-mail.org closing connection RFC-2821 Helo Name Envelope Addresses: Return Address Recipient Addresses RFC-2822 Header Addresses: From Address Reply-To Address Network Owner

October 16, Registry of Public Senders™ ID Owner publishes: _auth.example.com. TXT "method=SPF,DK helo= " The Registry publishes: example.com.s-id.net. TXT "svc=X1:A,S2:A mth=SPF+5,DK+3 ip4= " The ID owner has complete control of the Registry record, except for data from the Rating Services, and the numbers showing how many DNS queries it took to run the method. Which authentication methods are used depends on what the Sender offers, and what the Receiver will accept. The Registry has no favorite method. HELO addresses can be checked without any authentication method.

October 16, Border Patrol™ MTA

October 16, Reputation Statistics Need real data !!

October 16, Barriers to Adoption Hurdles that anti-spam systems must avoid or overcome, in order of decreasing severity: 1)Required simultaneous upgrades in software or setup. (Flag Day) 2)Required widespread adoption by Agents before any benefit is realized by Recipients. (By June 30th, all senders will...) 3)Required widespread adoption of one company's method or service. (Microsoft patent) 4)Changes that cause a temporary degradation in service. (Turn off your spam filters and... ) 5)Changes in current practices. a) A well-established and standards-compliant practice. b) A widespread but non-standardized practice. ("Misuse" of Return Address) c) A widespread but non-compliant practice. (bad HELO name) d) An already unacceptable practice. (open relays) 6)Costs to senders. a) Loss of mail due to mistakes by others. (SPF "forwarding problem") b) Registration fees or administrative costs.

October 16, Economics of Abuse $200B annual benefit of $20B cost of abuse 100M users x ($.25/day deleting spam + $100/yr false rejects) $2B benefit to anti-spam industry 100 companies x $20M/yr $0.2B benefit to spammers 10K spammers x $20K/yr $0.02B cost of an effective authentication/reputation system 10M users x $2/yr 100K companies x $200/yr (90% internal, 10% external services)

October 16, Bibliography TCP/IP Illustrated, vol. I, The Protocols, W. Richard Stevens, Very thorough, yet readable. Good illustrations. "Internet Mail Architecture", D. Crocker, -arch-06 (work in progress) - a much more detailed description of the current system with references to the relevant RFC standards. -arch-06 Pro DNS and BIND, Ron Aitchison, – Excellent book on the Domain Name System and the most popular DNS server. "CircleID", – a "Collaborative Intelligence Hub for the Internet's Core Infrastructure & Policies" – current articles by top industry experts. Project Links – Current status of our project. – Articles and notes from early development. A short list of the most useful books and articles on the technology underlying .