1 Information Systems 2/26/03 Tom Coppeto Mark Silis MIT Mail System Update 26 February 2003.

Slides:



Advertisements
Similar presentations
Anti-SPAM experience at LAL Michel Jouvin LAL / IN2P3
Advertisements

Basic Communication on the Internet:
University of Leeds Academic Services How to use ISS filtering service to remove spam with Outlook Qin Li ISS Service Coordinator
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Dealing With Spam The kind, not the Food product.
Are You Spamming Your Clients? June 17, Introductions  Doug Ladendorf Manager of Marketing Databases & CRM Mayer Brown LLP  1,600 Attorneys 
Draft-lemonade-imap-submit-01.txt “Forward without Download” Allow IMAP client to include previously- received message (or parts) in or as new message.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
Lesson 7: Business, , & Personal Information Management
Staff Computer Training Exchange 2003: More User Friendly Vicki Hecht Cherry Delaney ITaP Luncheon October 14, 2003.
Filtering Managing Unwanted Mail. Managing unwanted spam mail : Server Side Filtering Spam filtering at Monash comes in two forms. Server Side.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Series DATA MANAGEMENT. 1 Why ? Alarm/Status Notification –Remote unattended sites »Pumping stations –Pharmaceutical/Plant maintenance.
Chapter 30 Electronic Mail Representation & Transfer
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
1 Information Systems 7/1/03 Tom Coppeto MIT Mail System Security Issues 1 July 2003.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
Spam Reduction Techniques Using greylisting and SpamAssassin.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
Mail Server Fitri Setyorini. Content SMTP POP3 How mail server works IMAP.
CT NIKHEF Nov Mail NIKHEF CT system support.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Computer Concepts 2014 Chapter 7 The Web and .
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Microsoft Office 2003 – Outlook 2003 features Bradley Witham Technical Services Supervisor ITS.
SMTP, POP3, IMAP.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Lecturer: Maxim Podlesny Sep CSE 473 File Transfer and Electronic in Internet.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Login Screen This is the Sign In page for the Dashboard New User Registration Enter Id and Password to sign In.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
IT:Network:Applications.  How messaging servers work  Initial tips for success Exchange management  Server roles  Exchange Server Management  Message.
Chapter 6: Packet Filtering
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
Zimbra 8 Tips & Tricks Enterprise Applications Information Technology Services April 2014.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Overview Managing a DHCP Database Monitoring DHCP
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
«Fly Carrier» agent software Optimization of data transmission over IP satellite networks.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
Draft-lemonade-imap-submit-00.txt “Forward without Download” Allow IMAP client to include previously- received message (or parts) in or as new message.
Ch 2. Application Layer Myungchul Kim
554 Access Denied Fermilab’s Experiences with Spamcop.net Kevin Hill Ray Pasetes Jack Schmidt.
Spam Wrangling on UC Berkeley's CalMail. Spam detection CalMail uses Sophos PureMessage, running on CommuniGate Pro's front-end servers PureMessage.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
FNAL Central Systems Jack Schmidt, Al Lilianstrom, Ray Pasetes, and Kevin Hill (Fermi National Accelerator Laboratory) Introduction The FNAL .
Anti-Spam Updates Activity Coordination Meeting March 2006 Kevin Hill.
Mail OLC Training. Sendmail Sendmail is the Mail Transfer Agent (MTA) that’s the most common these days. Local or daemon (listen) mode Eventually, it’s.
TMG Client Protection 6NPS – Session 7.
Internet Business Associate v2.0
draft-lemonade-imap-submit-01.txt “Forward without Download”
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
CHAPTER 2 Application Layer.
IIS.
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
This is the Sign In page for the Dashboard
Presentation transcript:

1 Information Systems 2/26/03 Tom Coppeto Mark Silis MIT Mail System Update 26 February 2003

2 Information Systems 2/26/03 Tom Coppeto Mark Silis Agenda Introduction to the mail system New Features Ongoing Work

3 Information Systems 2/26/03 Tom Coppeto Mark Silis The Mail System Mailhub Internet MIT Users DMZ (MX mit.edu) Outgoing Post Office Other MIT Mailers

4 Information Systems 2/26/03 Tom Coppeto Mark Silis The Outgoing Mailers The first hop in all originating mail –A relay dedicated to application response sender addressing –Catches some mail anomalies –Will be the place where future tightening occurs Outgoing Internet MIT Mail System MIT Users

5 Information Systems 2/26/03 Tom Coppeto Mark Silis The mit.edu (DMZ) Mailers Provides queuing for external deliveries to keep the internal queues small The place outside mailers beat up Contains an alias database (users & lists) of 132,496 entries DMZ Internet MIT Mail System MIT Users

6 Information Systems 2/26/03 Tom Coppeto Mark Silis The Mail Hub The core of the mail system Creates a 3-tier system that optimizes for local traffic and better insulates the system from Internet anomalies Also contains an aliases database

7 Information Systems 2/26/03 Tom Coppeto Mark Silis The Post Offices Provides storage Accepts deliveries from the mailhub and dmz Supports pop/krb4, imap/krb4 and imap/ssl This has been the focal point of the recent upgrades

8 Information Systems 2/26/03 Tom Coppeto Mark Silis Post Office Upgrade quotas 250MB max message size 25MB new software –Spam management –Auto response

9 Information Systems 2/26/03 Tom Coppeto Mark Silis About Spam No one likes it There’s no way to exactly know if a message is or is not wanted We can offer some heuristics that allow you to decide what to do We will not intentionally delete messages on your behalf This requires processing the content of messages which is new and very expensive to do centrally With the software and hardware available today, we believe we can pull this off

10 Information Systems 2/26/03 Tom Coppeto Mark Silis Spam Management New functionality added to post offices Comprised of: –spam scoring –spam filtering client side server side –automatic expunging of server side spam folders

11 Information Systems 2/26/03 Tom Coppeto Mark Silis Spam Scoring header & body analysis – scores may be positive or negative –the higher the score, the more likely it is spam –more specifically, the more tests it failed –this is inexact score of 7.5 required to flag the message as spam –user configurable

12 Information Systems 2/26/03 Tom Coppeto Mark Silis Spam Scoring header Subject includes "viagra" header Subject contains "Your Bills" or similar 0.7 header Missing Date: header 1.37 body Yahoo! Groups message header From: address is in the user's white-list -100 body HTML has a low ratio of text to image area 1.101

13 Information Systems 2/26/03 Tom Coppeto Mark Silis To: From: "James D. Bruce" Subject: important: please read X-Spam-Score: 9.5 X-Spam-Level: ********* (9.5) X-Spam-Flag: YES X-Scanned-By: MIMEDefang 2.28 Spam Scoring (2)

14 Information Systems 2/26/03 Tom Coppeto Mark Silis Spam Scoring (3) –set scoring threshold –allow lists specify list of From: addresses that you never want to be flagged as spam –deny lists specify list of From: addresses that you always want to be flagged as spam

15 Information Systems 2/26/03 Tom Coppeto Mark Silis Spam Filtering - Client Side client side filtering –set up your client to filter on the X- Spam-Flag field –set up your client to filter on the X- Spam-Level field (requires no threshold configuration) see

16 Information Systems 2/26/03 Tom Coppeto Mark Silis Spam Filtering - Server Side You may elect to have messages flagged as spam filed to a separate IMAP folder Must be using IMAP to see the messages sent to this folder This folder counts as quota You can also elect to have this folder expunged after 14 days

17 Information Systems 2/26/03 Tom Coppeto Mark Silis Spamscreen Web Page

18 Information Systems 2/26/03 Tom Coppeto Mark Silis Spamscreen Web Page (2)

19 Information Systems 2/26/03 Tom Coppeto Mark Silis Spamscreen Web Page (3)

20 Information Systems 2/26/03 Tom Coppeto Mark Silis Automatic Response Delivery automatic replies upon delivery Challenges are technical –Don’t melt down mail system (will it happen? probably) and cultural –Not everyone thinks this is a feature (spam filtering to the rescue!)

21 Information Systems 2/26/03 Tom Coppeto Mark Silis Automatic Response

22 Information Systems 2/26/03 Tom Coppeto Mark Silis SMTP Authentication MIT mail relays abused by spammers Outgoing is a quasi-open relay Need to further tighten outgoing to stop this The answer is SMTP authentication Only authorized users should be allowed to originate mail sent through the mail system

23 Information Systems 2/26/03 Tom Coppeto Mark Silis Problems Under Full Load Deliveries outbound from spam filtering too inefficient under load (fixed) The new cyrus software dependent on a single process (some workarounds) The database cache size too small (fixed) Some messages may bypass scoring in the event of a process failure or the need to handle a backlog (we just need to get better at managing this)

24 Information Systems 2/26/03 Tom Coppeto Mark Silis Statistics

25 Information Systems 2/26/03 Tom Coppeto Mark Silis Statistics (2)

26 Information Systems 2/26/03 Tom Coppeto Mark Silis Summary of Changes Post office components upgraded Quotas increased to 250MB Max message size increased to 25MB Spam scoring Optional spam re-filing Auto responder Web based controls of spam and auto response

27 Information Systems 2/26/03 Tom Coppeto Mark Silis Stabilize the system Rollout spam and responder functionality Solidify recommended clients Upgrade the hardware/software on the outgoing, mailhub and dmz mailers Enable SMTP authentication on outgoing mailers Simplify the system by centralizing the spam scoring Look at new features Next Steps