Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Spam Software The Internet

FairUCE - the Smart Email Proxy 333

Jestrzcap writes "This just posted on Freshmeat: FairUCE (which stands for 'Fair use of Unsolicited Commercial Email') is an SMTP proxy, running between multiple instances of Postfix, that verifies email by attempting to verify the sender through lookups (a user customized challenge/response). It claims to be able to 'stop a vast majority of spam' without the need for content filters, and 'virtually eliminates spoofed addresses, phishing, and even many viruses with a few cached DNS look-ups and a couple of if/then statements'."
This discussion has been archived. No new comments can be posted.

FairUCE - the Smart Email Proxy

Comments Filter:
  • by Matt Perry ( 793115 ) <perry.matt54@ya[ ].com ['hoo' in gap]> on Sunday December 05, 2004 @03:19AM (#11000273)
    FairUCE looks interesting but I'd be curious if it'd do a better job than milter-sender [milter.info]. About a year ago, before I installed milter-sender, I was receiving about 200-300 spams per day. Since installing milter-sender in March 2004 and adding the spamhaus SBL-XBL checks to sendmail, I've received (checking spam mbox) 1568 spam messages.
  • SBL-XBL is great. It blocks a lot of stuff. In the last serveral months I added the follow which have also helped:

    relays.ordb.org - http://www.ordb.org/ [ordb.org]
    combined.njabl.org - http://www.njabl.org/ [njabl.org]
    list.dsbl.org - http://dsbl.org [dsbl.org]

    I also added ClamAV [clamav.net] with the clamav-milter. That's eliminated all of the viruses that I used to get, although it does nothing for the virus warning messages I get from poorly administrated mail servers out there. Before I added ClamAV I was using the Virus Snaggers [spamless.us] procmail package which was great at catching a lot of that stuff.

    BTW, I use this procmail rule to catch all of the DSNs I get and stuff them in a mbox rather than having them clutter my inbox. I didn't write this and I forget who did. I think I got it from a post here on Slashdot sometime in the last year. To whoever wrote this, thanks.

    # This recipe catches most DSNs
    :0HB
    * -1^0
    * 1^0 ^FROM_MAILER
    * 1^0 ^Status: 4.2.0
    * 1^0 ^Status: 4.4.1
    * 1^0 ^Status: 4.4.2
    * 1^0 ^Status: 4.4.6
    * 1^0 ^Status: 4.4.7
    * 1^0 ^Status: 5.0.0
    * 1^0 ^Status: 5.1.1
    * 1^0 ^Status: 5.1.2
    * 1^0 ^Status: 5.1.6
    * 1^0 ^Status: 5.2.1
    * 1^0 ^Status: 5.2.2
    * 1^0 ^Status: 5.2.3
    * 1^0 ^Status: 5.3.5
    * 1^0 ^Status: 5.4.7
    * 1^0 ^Status: 5.5.0
    * 1^0 ^Status: 5.7.1
    * 1^0 ^554 5.0.0 Service unavailable .*
    * 1^0 ^Remote host said: 550.*User unknown
    * 1^0 ^Remote host said: 554.*doesn't have a yahoo.com account.*
    * 1^0 ^User.*not listed in public Name & Address Book
    * 1^0 ^Sorry, no mailbox here by that name.
    * 1^0 ^<.*>: Unkown user:
    * 1^0 ^User mailbox exceeds allowed size:
    * 1^0 ^.*No matches to nameserver query
    * 1^0 ^A message that you sent could not be delivered
    * 1^0 ^.*550 unknown user
    * 1^0 ^This is a permanent error; I've given up.
    * 1^0 ^The user(s) account is temporarily over quota.
    * 1^0 ^Receiver not found:.*
    * 1^0 ^Requested action not taken: mailbox unavailable.
    * 1^0 ^--AOL Postmaster
    * 1^0 ^I'm sorry to have to inform you that the message returned
    * 1^0 ^550 5.1.1 <.*>... User unknown
    * 1^0 ^550 <.*>\.\.\. User unknown
    * 1^0 ^Subject:.*failure notice
    * 1^0 ^did not reach the following recipient\(s\):
    * 1^0 ^The following recipient(s) could not be reached:
    * 1^0 ^.*550 Mailbox quota exceeded
    * 1^0 ^.*550 Access Denied
    * 1^0 ^550 5.0.0.*Can't create output
    * 1^0 ^.*There is no such addressee as
    * 1^0 ^Mail Delivery Failed... User unknown
    daemon-msgs
  • Re:Naive at best (Score:2, Informative)

    by farnz ( 625056 ) <slashdot&farnz,org,uk> on Sunday December 05, 2004 @05:23AM (#11000515) Homepage Journal
    Or get e-mail providers to support MSA, which is SMTP for mail being introduced to the network, and is supposed to run on port 587.
  • by Skapare ( 16644 ) on Sunday December 05, 2004 @05:23AM (#11000517) Homepage

    The reverse DNS for email is NOT for determining a match between the sender email address domain, and the server itself. All that needs to match is the hostname of the mail server itself, thus identifying who administers it (not necessarily who gets to use it). If the ISP administers the mail server, then the hostname in the PTR record of the appropriate in-addr.arpa zone will be a unique name in an ISP domain. The forward lookup then prevents forged PTR records by making sure the domain owner acknowledges that name belongs to that IP address.

    While most ISPs do have reverse DNS on their mail servers, when you focus on just the servers that spam houses run from, this changes over to most do not. But what would really happen if everyone blocked on lack of matching rDNS is that the spammers would adapt and use it. Then we'd know what domain they are using. But many of them are now registering bulk volumes of domain names (if you're making a million dollars a month abusing other people's networks, registering 100 randomly generated domains a month is just a tiny cost of business).

  • It gets better! (Score:3, Informative)

    by johannesg ( 664142 ) on Sunday December 05, 2004 @05:57AM (#11000575)
    Here in the Netherlands the government wants providers to keep a log of all mail (http, ftp, whatever) traffic that goes over their lines. The providers are complaining, but in the end they will simply raise prices to compensate. Effectively I will be paying to be spied upon. And in the case of email, I will be paying to receive spam and then store it for five or ten years.
  • Re:Naive at best (Score:5, Informative)

    by Antique Geekmeister ( 740220 ) on Sunday December 05, 2004 @08:09AM (#11000764)
    I'm sorry, you're wrong on a detail.

    There is no reason to have port 25 open outbound on anything but the ISP's authorized SMTP servers. None whatsoever iin this day and age, except the convenience of people who like to run their own mail servers. Unfortunately, with the massive number of zombied and badly run home SMTP servers, most outbound SMTP from ISP users that does not go directly to their ISP's SMTP server for delivery as mail from that ISP is in fact spam or email worms.

    So yes, it needs to be blocked outbound. You simply need to use SMTPAUTH on the road to get your email to your own ISP's SMTP server over port 587. Problem solved.
  • Re:So... (Score:3, Informative)

    by djmurdoch ( 306849 ) on Sunday December 05, 2004 @08:31AM (#11000799)
    According to the standard, the from field should have the email address the mail was sent from (in this case your uni addy).

    No, that's "Sender". From RFC 2822 [faqs.org]:

    The "From:" field specifies the author(s) of the message, that is, the mailbox(es) of the person(s) or system(s) responsible for the writing of the message. The "Sender:" field specifies the mailbox of the agent responsible for the actual transmission of the message.

  • There have been dozens of these wildly espoused challenge/response systems over the years. They don't work because users hate them, because vital automated systems such as bill payment and delivery verifications can't get past them.

    I've been using Challenge/Response for nearly 3 years. And I disagree with your critiques. Let's take this point by point:

    • Users hate them: There is a kernel of truth to this. Some users do hate them. Those users hate challenge/response so much that they instigate fights. They submit their IP addresses to RBLs for blacklisting. These are a very annoying, and vocal MINORITY. By far most users are agnostic. They deal with the challenge once and then they're done.
    • automated systems can't get past them: Again, there's a kernel of truth here. If you have badly configured your C/R you're going to be in trouble. But a properly configured C/R has absolutely no problems.

      I use TMDA [tmda.net]. I've got it configured so that any email I send to unknown addresses will be allowed to respond for 7 days. After that, they go into C/R. For my bill pay services, I give them a special address that allows them in forever, but that's tied to them so that I'll know if they ever hand it out to someone else.

    • they're almost always subverted: Really? In the last month I've had over 4000 pieces of email delivered to me from unknown addresses. Only 10 of those have been confirmed. Of the ones that were confirmed 2 of them were spam. This was easily remidied by removing those 2 addresses from my whitelist and adding them to my blacklist.
    • never will gain the acceptance of the user community enough to become effective: While C/R may never gain the acceptance of the user community, I don't think it's for the reasons that you cited. I think the reason is that it's too hard to set up correctly. But that being said, it doesn't need the acceptance of the user community to be effective. It works for me today whether or not you use it.

      Personally, I think it'd be better if the entire world started using C/R. It'd be better because then everyone would understand that sending email to an unknown party involves a formal introduction process. This would cut down on the number of people who get confused when they receive a challenge. But if this doesn't happen it's not that big a deal. The number of confused people is already small.

    IMHO, what you don't know about C/R is quite large.
  • by greenrd ( 47933 ) on Sunday December 05, 2004 @09:56AM (#11000954) Homepage
    Responsible blacklists will always perform a relay test on any host that is alleged to be an open relay. Therefore, if you are blacklisted by these blacklists, this means that you were either incompetent, hacked into, or possibly both.

    Similarly, responsible blacklists will demand credible evidence before listing a domain as a spam source.

    Could you name names, i.e. the blacklists that you have encountered that are not being responsible?

  • by Drakino ( 10965 ) on Sunday December 05, 2004 @02:41PM (#11002215) Journal
    I run a small web board, and already the e-mail address I use as the admin of that board gets flooded daily with crap like "I haven't actually received your message, click here to verify you are real". I finally got fed up with it and posted this response [empegbbs.com].

    If you implement these, remember you get e-mail from more then just friends you know. Lets see, last week alone, I got 5 messages from companies like Dell from working on issues with them, and none of them are in my address book.

    The proper solution is to ensure the outside world sees no difference unless it is spam. I never give my full address to a company, instead I use the postfix feature where anything after _ is ignored. Then I create a one letter alias for me to keep them short. If I get a lot of e-mail, it makes server side filtering into my IMap folders easy. And if one address gets hit by spam, I then block it on the server. It works well, and doesn't inconvenience the people e-mailing me.

    "Thank you or ringing my doorbell. I am currently home, but did not hear the doorbell. To properly ring it, please run around my house, braving the dogs in back, and use the doorbell located next to the cat door on the deck. Then I might care enough to see who you are and let you in."
  • by tylernt ( 581794 ) on Sunday December 05, 2004 @05:45PM (#11003291)
    "My solution was simply to pay for an account at an ISP where they aggressively filter spam."

    Yeah, but sometimes agressive spam filters accidentally filter legit mail. You may still be missing out on freelance opportunites thanks to your agressive spam filter.
  • Re:Problem though (Score:3, Informative)

    by mjh ( 57755 ) <mark@ho[ ]lan.com ['rnc' in gap]> on Sunday December 05, 2004 @06:47PM (#11003673) Homepage Journal
    how do users who challenge get through to users who need to respond if those users won't get the challenge until their challenge is met?

    By properly configuring the C/R system. [tmda.net]

  • by fyngyrz ( 762201 ) on Sunday December 05, 2004 @08:02PM (#11004039) Homepage Journal
    I'd be interested to know which blacklists are by domain, not by sending IP address

    Here [securitysage.com] you go.

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...