FTC vs. Open Relays, round 2 255
mbrain writes "PC World is reporting on a new federal program run by the FTC to close relays and proxies that serve as spam gateways. It's called 'Operation Secure Your Server'. The FTC will publicize this program by... sending tens of thousands of emails." I think it's a continuation of this program.
How many can they find? (Score:5, Interesting)
I think this is mostly due to the trend of spammers attempting to "steal" domain registrations by doing thousands of WHOIS searches and contacting domain owners.
Re:How many can they find? (Score:3, Interesting)
Re:How many can they find? (Score:3, Interesting)
Re:How many can they find? (Score:2)
Malicious submissions (Score:2)
Re:How many can they find? (Score:2)
Oh man (Score:4, Funny)
you can (Score:3, Interesting)
Re: (Score:2)
I foresee some problems with this... (Score:5, Interesting)
The FTC can only suggest that the relays be closed. Until they have some form of enforcement, there is nothing preventing those with open relays from ignoring the emails (assuming this is the rare situation where the above does not apply).
This doesn't take into account that some of those relays may be there on purpose, as in ISPs possibly colluding with, and also possibly profiting from, spam.
Re:I foresee some problems with this... (Score:5, Insightful)
Not everyone, of course -- I agree that some relays are open on purpose, and some people will disregard any official notice short of a search warrant delivered by a squad of riot cops. But I think this can't hurt.
Re:I foresee some problems with this... (Score:5, Insightful)
Re:I foresee some problems with this... (Score:5, Insightful)
That high-pitched buzz you hear is an unmanned attack drone flying over to blow your server room to a pile of rubble.
(It scares me that that scenario isn't completely implausible.)
Re:I foresee some problems with this... (Score:2)
Re:I foresee some problems with this... (Score:5, Funny)
I can picture their email box now:
His Excellency, Minister Okufla BUSINESS OPPORTUNITY
Suzy Come see my naked webcam
Bill Gates Forward this message to receive $1000
Lotteries Administrator You're a winner
John Jones Credit Application Declined
FBI Your server is attracting the attention of our investigators
Yes sirree, they're going to be real sure to take that emailed warning seriously.
Re:I foresee some problems with this... (Score:2)
Re:I foresee some problems with this... (Score:2)
Re:I foresee some problems with this... (Score:2, Interesting)
We need a new, or better, or replacement for, the current protocols.
The whole internet experience is being ruined by the barrage of SPAM, adware, spyware, popups. Why the heck should we have to deal with this?
A brand new (Windows) computer is polluted all to hell within an hour of connecting to the net. T
Re:I foresee some problems with this... (Score:4, Interesting)
Just a minor nit. There probably still are ISP's that profit from so called pink contracts, but I don't see a spammer purposely running an open relay. Spammers are more interested in finding open relays and servers than running them. Operating an open relay serves no purpose to a spammer, and would likely draw attention. One of the reasons (aside from free bandwidth) of using an open relay is to hide your identity.
getting a letter from the FTC (Score:5, Insightful)
Actually, if I got a letter from the FTC I might well look into what it said. But if I got an email supposedly from the FTC, I would likely just ignore it without even opening it (after forwarding a copy to uce@ftc.gov).
Re:CAN-SPAM? (Score:4, Insightful)
It's only knowingly when you've been told by the spammer he'll be using your relay for spamming.
I don't think that applies for someone uninvolved warning you that it might be. You aren't aiding and abetting someone stealing your car when you ignore the "keep your car locked" signs at the parking lot, are you? (I really, really, really hope not, anyways.)
Re:CAN-SPAM? (Score:2)
The law also doesn't bar agents of a federal agency from informing your insuror if they come across an unlocked car in the course of their legal activities, any more than a private citizen is barred fro
Re:CAN-SPAM? (Score:2)
And even if the case can't be made that convincingly in court, the corporation simply needs to do what every plaintiff's goal is: to make defense so expensive and not worth the time and aggravation that the defendant simply settles and pays up.
Placing attachments on the houses and cars of the company's CEO tends to get their attention, also...
Re:CAN-SPAM? (Score:2)
Re:I foresee some problems with this... (Score:3, Interesting)
when all you have is a hammer, everything looks like a nail.
Shouldn't the FCC be handling this? (Score:2, Interesting)
Re:Shouldn't the FCC be handling this? (Score:3, Informative)
Oxymoronic (Score:4, Insightful)
Stop SPAM by sending thousands of emails? That's funny.
Re:Oxymoronic (Score:5, Funny)
How did that joke go? "Fighting for peace is like fscking for virginity"?
Re:Oxymoronic (Score:3, Insightful)
Re:Oxymoronic (Score:5, Funny)
I'm sure a lot of virgins run filesystem checks.
Re:Oxymoronic (Score:3, Interesting)
Fighting for peace is a PARADOX not an oxymoron.
PARADOX: a : a statement that is seemingly contradictory or opposed to common sense and yet is perhaps true.
Sometimes you really do have to fight to achieve peace. Sometimes you have to kill to save lives. For example, it's posssible that by dropping atomic bombs on Hiroshima and Nagasaki that more lives were saved overall because the Japanese were forced to caputulate immedately instead of fight a long dr
Re:Oxymoronic (Score:3, Insightful)
Paradoxically Oxymoronic (Score:2, Funny)
Sometimes you really do have to fight to achieve peace.
Never. Surrender is always an option, even if it means suicide. It might not be a good option, but it's there.
Fucking for virginity is an oxymoron because fucking will never achieve virginity
Nonsense, your parents fuck and about 9 months later you are born a virgin. fucking -> virginity.
Re:Oxymoronic (Score:2)
Well yes, but since the FTC is using IPs they have identified as being open relays, it's really no different to the script that many of people (myself included) are running to shut down IIS on a Code Red/Nimda server along with a pop-up message.
If, on the other hand, the FTC were sending emails to tens of thousands of mail servers simply because they were there... that's another thing.
(disclaimer: Yes I do see the funny side of it - it's wor
Re:Oxymoronic (Score:2, Funny)
hmmm (Score:2, Funny)
EFF? (Score:2)
Viruses, worms and scams might hender reception (Score:2, Insightful)
Create liability (Score:3, Insightful)
Re:Create liability (Score:2)
Well it could be worse ... (Score:5, Funny)
Problem... (Score:4, Interesting)
Though any such move would doubtlessly be controversial, I suggest writing a "white hat" virus what would:
1) Check if a machine was unpatched/0wned (Probably meaning "it could infect it in the first place")
2) Once loading itself, download and run anti-spyware/-adware/-spamware/-malware applications to clean up the computer
3) Contact and infect other hosts, but NOT at such a rate as to bring down networks.
I omitted suggesting that it download the latest patches, because (as is oft pointed out) one reason many people and organizations DON'T download the latest patches for Windows is that they often break other things.
Although, again, this would be extremely controversial, I am suprised at never having seen it suggested before.
Re:Problem... (Score:2)
Re:Problem... (Score:3, Insightful)
Re:Problem... (Score:3, Insightful)
Cleaning up the computer and closing off exposed services is just as likely to break things as downloading the latest patches is. And it doesn't teach the admin anything. The best solution for fixing the problem involves the admin learning about security.
Leave the machine alone, and hope the a
Re:Problem... (Score:2)
You don't need to trash a machine to make it unusable by spammers and DDoS kiddies. Just knock it off the net. Maybe disable and patch the network drivers with something that merely looks like a virus. The less clueful admin's will eventually learn that running anti-virus software is the only easy way to fix their machines and get them back on the net.
Re:Problem... (Score:4, Informative)
There have now been four or five generations of proxy-trojan backdoor worms, with features such as randomized port listening, making them next to impossible to detect until the spam begins.
Several dozen "zombie networks" already exist, along with hijacked netblocks of companies which went under during the "dot-bomb" in 2001.
In fact, there are places on the web where you can buy lists of exploited machines. As someone who investigates spam for a living, it's been nearly two years since I've seen spam through an open relay mailserver. Almost everything now comes from infected home PCs on cable or DSL lines.
This "white-hat" in particular disagrees with your use of the word "controversial" and suggests you substitute "liable to land one in prison for 10 years". Recommendations of "hacking the hackers" and "spamming the spammers" are sophmorish, unprofessional, and when implemented, tend to attract the attention of law enforcement onto your ass rather like sticking a lightning rod up it.Happily, spammers still don't know how to write a proper SMTP client. Most spamware only approximates a real SMTP transaction (usually well enough to work). Without going into detail (for obvious reasons), this can be detected.
See the Composite Block List [abuseat.org] as an example of the practical application of passive detection of spammer malware.
Here's a hint for those running their own mailservers: Spamware tends to time out very quickly. Add a short delay before your MTA presents an SMTP banner (oh, 30 seconds is fine). Most spamware will start behaving as if you don't even exist. The SMTP RFCs say clients should wait for the initial banner for five minutes before timing out .
There are a few places which set their timeouts ridiculously short, like Yahoo, and UUNet, and if you do a lot of business with them you'll need to whitelist. Otherwise, go to town.--Og
Code Green/Nachi revisited (Score:3, Informative)
Closing open relays is a great first step and I hope this program has some effect.
If spammers are driven to using trojaned home computers to send their junk then there will be much more pressure bought to bear on ISPs to do port 25 egre
Re:Problem... and legal solution (Score:2)
Though any such move would doubtlessly be controversial, I suggest writing a "white hat" vir
open relays today, licensed email tomorrow? (Score:4, Interesting)
Re:open relays today, licensed email tomorrow? (Score:2)
Yes.
KFG
Re:open relays today, licensed email tomorrow? (Score:2)
Traceability. If you use your own host to send spam, the recipient of the spam is more likely to be able to trace the spam back to you and complain to your provider (assuming you care). If you use somebody else's misconfigured server, the recipient of your spam may only be able to see that it came from some open relay belonging to an unknown third party.
agrivating solutions. (Score:2)
This has been done and it is not working. Significant design flaws in Microsoft's OS continue to defeat band-aids like this as the myDumb worm proves. Insuficient control of execution by the continued use of filename extentions and insuficient privilidge seperation make continued explotation a reality. E
Good news for ISPs (Score:5, Interesting)
"We expect you to take care of this; you're operating in violation of Federal Trade Commission policy" has a much nicer ring to it. One less likely to generate argument.
Re:Good news for ISPs (Score:2)
just firewall port 25 like everyone else (Score:2)
Every other ISP out there firewalls port 25, so they have to use your relay. If you have customers who need port 25 (but really you should have them relay on the other port through their other ISP then... I forget what, something in the 500 range) run a login script for them that turns this off in the firewall (not easy to do right, but you can do it).
Ideally your mail relay would log the email address of whoever was loged in (the one they signed up for, even if they use a different one), but that sound
Re:just firewall port 25 like everyone else (Score:2)
Yeah, that's nice in theory but the thing is I'm not serving $30/mo cable modem customers, I'm serving business customers whose payments start around $200/mo. Business customers expect business grade service which includes the ability to run their own servers.
Re:Good news for ISPs (Score:2)
Re:Good news for ISPs (Score:2)
The point is to stay in business when the majority of our competitors have gone bankrupt. It is true that once in a while you get a customer who costs you more than he pays and its just better for him to go away. The rest of the time a company that wants to stay in business actually has to provide a little thing called Customer Service -- that means pleasantly working with all the fools who get hacked or get viruses, not just locking them out of the system.
Re:Good news for ISPs (Score:2)
It is a hassle because even if the customers leave or are kicked off the network, they still have open relays, and are just going to sign up somewhere else and continue to be part of the problem. Getting them to fix it is a far better solution for everyone involved.
protocol (Score:2, Interesting)
This flys right around there with 'taxing every email' which would be an interesting debate indeed.
I've noticed that a bunch of mail servers out there are now doing creative mail filtering, making sure that the mx record corresponds to the actual relay that the mail is coming through. But not everyone has smtp auth over p
Open Relays (Score:2, Insightful)
A) Over-seas servers in countries that have abudant bandwidth and few laws governing their usage (ie India)
B) Hijacked machines here in the good ol' US of A that have become
Re:Open Relays (Score:3, Informative)
Zombies (Score:2)
the reason they can do that (Score:2)
What about the DEVELOPERS? (Score:4, Insightful)
I understand that many of you uber-users expect that every admin should know all the ins and outs of every server/program, but I'm afraid that's just not possible sometimes. Our Wireless ISP consisted of 3 technically-capable people. Between setting up people's connections, repairing relay sites (using both proprietary and OTS equipment), setting up servers, setting up routing, technical support, providing network content shaping, hosting/designing websites, setting up policy enforcement, documenting it all, securing the network, AND providing e-mail to boot, there's just not enough time to do everything and get it right the first time. BESIDES, what's so wrong about expecting things to work when you do a regular install?
Since when has default == basically broke?
-Grym
Re:What about the DEVELOPERS? [ot] (Score:2)
I dunno. When was Microsoft incorperated?
E-mail needs to be "closed" (Score:3, Interesting)
Any "secure" system needs a "root of trust", someone or something that is a trustworthy party from which all other relationships can be traced back to. Most things on the Internet don't have a central authority, and that's by design to prevent censorship. However, e-mail is one thing that we want censorship for... we want abusers of the system thrown out.
However, to reliably kick out abusers, there needs to be a central authority. In short, there needs to be some sort of approval body for e-mail servers to prove that they're trustworthy operators, so that any e-mail that passes through them is sure to not be spam, with reprocussions for the server operators who do let spam through their system. In short, a closed system, where membership for servers is by approval, and therefore those who operate e-mail services have to enforce limits on their customers.
Unfortunately, that's so incompatable with the e-mail system we have today... any dreams of creating a No-Spam-Allowed e-mail system can go sit between IPv6 and the Devorak keyboard design in the pile of ideas that look good on the drawing board but will never be put into widespread use.
Re:E-mail needs to be "closed" (Score:5, Informative)
NO. A central authority-based communications system is not going to accomplish much... it will, however, put the power of communications in the hands of few companies (probably monopolies)... it will let them charge fees... and it will ruin the versatility, adaptability, and reliability that we have because there is a great diversity of small hosts handling all their own email.
You want to stop spam? Grab spamprobe [sourceforge.net] or something and watch your spam disappear. You want a more efficient and scalable solution for a big organization? Install DCC [rhyolite.com] and be done with spam for your whole site. Seriously, spam is no longer a problem because both user-side and server-side tools with near perfect accuracy exist. If you're seeing spam, it's because your ISP isn't taking advantage of the filtering solutions that are available.
I'm not talking out of my ass... I've been keeping a close eye on mail and spam issues for the past decade. Spam is dead, so if spam still bothers you force your ISP to employ modern filtering. My university did, and the flood of spam dropped from 100/day to 0 in my account (they're using DCC). At home I employ spamprobe and again I see next to 0 spam.
Re:E-mail needs to be "closed" (Score:2)
Sounds Great! (Score:3, Insightful)
In short, there's nothing but practical issues keeping you from doing this right now. If you can overcome those issues, more power to you. If you want to keep me from running a mail server with well configured free software, go away.
Does anyone recall that MS Exchange patch... (Score:3, Interesting)
IIRC, even if you went to the trouble to ensure that it was *not* an open relay, the patch would change the settings and, voila, open relay.
China (Score:2, Interesting)
Very slippery slope (Score:2)
We already know, and admins already know (Score:3, Informative)
Please stop pointing out the FTC is US only (d'uh) (Score:5, Informative)
Proxy servers? (Score:2)
But, they say that spammers use open proxies too. Sure, you don't want to leave your proxy open for various reasons.. But, I didn't think spam was one of them. It's not like they're spamming through some webmail service or something. And, with the way the document is worded, mixing the MTA & proxy issues, it makes the doc less clear.
Reminds me of British police (Score:3, Funny)
Stop, or I'll yell, "Stop" again!
Re:Reminds me of British police (Score:3, Insightful)
Police work isn't TV (Score:2)
This isn't TV. Few real cops ever draw their gun in the line of duty. "Stop or I'll shoot" is for the movies, when a real officer shoots it is more than just a criminal running away, it is a criminal who has proven to be too dangerious to let run. Every cop I know tells me that if you run they will let you go. (With all the body armor and equipment they wear there is very little chance the cop can catch you). Much easer to get on the radio and get help, and/or make sure that when you are caught yo
Like malaria (Score:2)
Maybe sending out masses of junk email is the cure for spam. The chances of someone replying to a *genuine* spam is therefore reduced, so the spammers might stop trying.
They are behind the times. (Score:2)
I've been adding SpamAssassin rules to score heavily against email from *.client.comcast.net (one of the worst offenders, so I've called the rule RECEIVED_FROM_SPAMCAST), and score against anything received from with
FTC misses the point (Score:3, Interesting)
Why hasn't the government initiated a crackdown on the crime WITHIN the spam? Why is their such a willingness to accept that but be mad that someone is spamming about it? I sometimes wonder if most Americans (and I'm one as well) don't have some kind of built-in huckster or a total absence of ethics that they don't have a problem with the fact people are committing fraud.
If the government would bother following the money trail over some spam transactions, they'd not only get a much better idea what's "behind" spam (my theory is a fairly small number of people are responsible for a lot of it), as well as catch the same people comitting the same fraud, over and over, which becomes a possible RICO prosecution -- lots of jail time for anyone even tangentally involved. Which might actually do more to end spam by getting rid of its clients than some lame relay closing enterprise -- haven't they moved a lot of their operations to zombies and cracked proxies anyway?
Waste of time and effort... (Score:4, Interesting)
Hell, I just recently discovered that my RHL9 box has been somehow compromised. Don't ask me how, but those sendmail spam zombie processes weren't mine. And on this Win2k PC I run anti-virus, firewall, the works. Still, a few things slips through the cracks, at least for a time.
But see how, my Linux box if routed shouldn't get a domain. It would be @[IP] @???.bb.online.no (dns of that IP) or @[spammer-provided domain], not @aol.com. And even if I wanted to run a mailserver here on a residential DSL - it's reasonable to limit my delivery speed by hashcash or some such measure.
If I wanted to do mass mailings (opt-in, the good kind, they exist, remember?) there should be a whitelisting system. Some kind of cryptographic token or similar, as proof of the opt-in. But noone seem to be doing anything like that.
Damage control is the way to go. Running around chasing the latest compromising trojan and whatever is futile, at least to cure the problem, not just the symptoms.
Kjella
Comment removed (Score:5, Insightful)
Re:MOD PARENT DOWN AS "DIMWITTED" (Score:2, Informative)
In general, you aren't responsible for the traffic that goes through your server, as long as you can't be reasonably expected to know what's going through there. The courts will uphold this as it relates to mail servers. It's not the job of the relays t
Ethical status of open relays (Score:2)
No argument with your statement of the law.
If you run an open relay in this day and age, I think you can reasonably be expected to know that spammers will use it.
If the jury were made up of Slashdotters, I think a negligence suit against an open relay operator would succeed.
>The criminal is the spammer
Absolutely.
not all open relays are abuseable (Score:3, Interesting)
I am very sympathetic to the complaints of harming innocent third parties, and indeed I used to be very supportive of anti-spam efforts. But these days I find that the anti-spammers are doing just as much harm to innocent parties as the spammers themselves. Real time blacklists are some of the worst offenders, since many of them (e.g. SPEWS)
Re: (Score:2)
Re:MOD PARENT DOWN AS "DIMWITTED" (Score:2)
A point largely overlooked here. This doesn't seem to be any sort of heavy-handed enforcement action; it seems more an informational email sent with whatever credibility the FTC has (slim to none, in my opinion, but that's just me). I see it as more targetted at the ignorant than the malicious.
Unfortunately I doubt that the FTC will do any independent verification that open relays are in fact running at the t
Re: (Score:2)
Re:MOD PARENT DOWN AS "DIMWITTED" (Score:2)
ISPs are not common carriers [cisco.com].
The legal responsibility which an ISP assumes for carrying traffic is still very much a grey area, at least in the US.
Re: (Score:2)
Re:MOD PARENT DOWN AS "DIMWITTED" (Score:2)
Well, it's not exactly the direct death, but I can think of at least one case where spam killed [com.com].
Not that I agree with the anology or anything, but you did ask, and its the best I got.
Re:MOD PARENT DOWN AS "DIMWITTED" (Score:2)
Is that easier to grasp than the strange 'shotgun in a park' one?
Analogy still makes it bad (Score:2)
So when someone sets up shop in that unused attic/wing/crawlspace of yours and starts producing Methamph
Re:Hey, asshat.. (Score:2)
Re:HONESTLY, spam isn't a problem for me anymore (Score:3, Insightful)
Filtering at the client side just covers up the problem. You think you're helping, but you're actually just pulling the wool over your eyes.
I'm sure you're happy, but don't call it a solution. It doesn't scale.
Re:A small tax cut to anyone who closes their rela (Score:2)