Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Spam Microsoft

MS and Sendmail work together on Spam Solution 471

fudgefactor7 writes "Powerhouse software vendor Microsoft and the venerable Sendmail, have formed an alliance to launch a sender authentication plug-in which is hoped will combat email fraud and spam. The plug-in lets organisations verify a message's source before accepting it by automatically checking to see if an email came from where it claims it did. Could this be a sign of the beginning of the end of spam?" Update: 02/26 08:01 GMT by S : Though Microsoft and Sendmail are both working on solutions, there's no official alliance in place between the companies.
This discussion has been archived. No new comments can be posted.

MS and Sendmail work together on Spam Solution

Comments Filter:
  • by BWJones ( 18351 ) * on Tuesday February 24, 2004 @11:23AM (#8373485) Homepage Journal
    "Powerhouse software vendor Microsoft and the venerable Sendmail, have formed an alliance to launch a sender authentication plug-in which is hoped will combat email fraud and spam. The plug-in lets organisations verify a message's source before accepting it by automatically checking to see if an email came from where it claims it did. Could this be a sign of the beginning of the end of spam?"

    Wow......this really sounds like it was written by a marketing director. A Slashdotter could have just as easily interpreted this as "The 800 lb gorilla of the software industry, Microsoft has coerced the long suffering Sendmail to provide Microsoft with a software patch that fixes security holes inherent in Microsoft products that allow for email fraud and spam to run rampant. Another side benefit is that Microsoft can exert their market dominance to further entrench the Microsoft monopoly by refusing email not conforming to Microsoft "standards".

    Laugh, it's intended to be funny. :-)

    • by Pocket PC Addict ( 747016 ) on Tuesday February 24, 2004 @11:29AM (#8373574) Homepage
      I say there needs to be a class-action suit against Pfizer. If Viagra were never invented, Spam would be nearly non-existant ;) But seriously, do you think Pfizer hates the fact that their product is spammed to a billion people a day? I think not.
      • Re:Perspective.... (Score:3, Informative)

        by AndroidCat ( 229562 )
        There are now other real products (not the v14gra sold by spammers) like Cialis. Oddly enough, they seem to be aiming advertising at the hard of hearing. [canoe.ca] Haven't seen any spam for it .. yet.
        • That's hilarious! the slashdot quote is "A penny saved kills your career in government" and the link to the blog talks about a guy getting arrested for stealing 1 cent's worth of electricity at a train station. how ironic.
      • Re:Perspective.... (Score:4, Insightful)

        by thomasdelbert ( 44463 ) <thomasdelbert@yahoo.com> on Tuesday February 24, 2004 @01:34PM (#8375037)
        Do you really trust a spammer to send you the real goods? Counterfeit drugs are rampant, and unless you purchased the drug from a reputable (liscenced) pharmacy, it is unlikely you are getting the real deal, especially on something expensive, hotly demanded, and potentially embarassing to sue about.

        Pfizer suffers from this due to a possibility of a counterfeit drug causing harm, making Pfizer a target of an inadvertant lawsuit, the cost of which being huge amounts of negative publicity. Imagine: Pfizer getting sued - big headline on front page - everybody's talking about it. The drug turning out to be counterfeit - tiny headline near back page three months later - nobody notices. The fact that it came from a spammer - doesn't even get reported.
    • by wideBlueSkies ( 618979 ) on Tuesday February 24, 2004 @11:34AM (#8373636) Journal
      It says nothing about Sendmail and MSFT working together. Only that they're working on their own solutions to the same problem.

      While it's nice to see this type of work being done, the headline is misleading.

      wbs.
      • by arivanov ( 12034 ) on Tuesday February 24, 2004 @12:48PM (#8374496) Homepage

        Microsoft - well... dunno... hard to say anything... Some of their ietf work has been brilliant. It is the implementation (and the marketing in command of it) that has been horrible.

        Sendmail - no fscking thanks. Their track record in inventing features and suddenly introducing them without at least informing the internet community at large is not anything to shout about. Basically in order to deal with the sender-address-must-resolve and the antispam parts of their rulesets you usually need 4 apirins and 200ml of vodka. That along with 24 hours of sleep gives you a chance of recovering your sanity after getting it to work after the upgrade forced by the next inevitable Sendmail Security FuBAR(TM). Note - it is a chance. Some people never recover. In other words there is a reason for the upside down bat to be the sendmail logo. That is the way a sysadmin looks like after dealing with it. No matter how much I dislike some of Exim sillies I would stick with it.

        • by Tassach ( 137772 ) on Tuesday February 24, 2004 @03:02PM (#8376169)
          Say somthing nice about Microsoft and get modded down, even if it's the truth. Say something bad about an open source program and get modded down, even if it's the truth. Just because you disagree with an opinion doesn't make it a troll. A fact which contridicts your prejudices is not flamebait. Save the downmods for penis birds and hot grits. If you disagree with a poster, reply instead of moderating and give your reasons.

          Face it: by any rational standard, sendmail sucks. /etc/sendmail.cf is so obfuscated that makes the Windows registry look simple by comparison. It's track record for security is as bad as anything coming out of Redmond, and has a similar track record for releasing patches which break more than they fix. Fortunately for mail administrators who aren't masochists, there is Postfix. Now if only some of the major Linux distros *cough*redhat*cough* would use postfix as their default MTA, life would be better.

          The parent poster is also correct in that Microsoft has made important contributions to ITEF and other open standards boards. They do occasionally manage to do the right thing, even if it's because the engineers managed to sneak it out the back door when the marketroids weren't watching.

    • Re:Perspective.... (Score:5, Informative)

      by CatPieMan ( 460995 ) on Tuesday February 24, 2004 @12:07PM (#8374038)
      If you look on the sendmail site, it says that they are also working with yahoo on domain keys. It looks like sendmail is going to create their own compatible version of everyone's anti-spam solution

      source, http://www.sendmail.com/sender_auth.shtml

      -CPM
    • by Anonymous Coward on Tuesday February 24, 2004 @12:26PM (#8374257)
      ever seen in email from your sendmail MTA where in the header it say "FORGED". usually on spam email. You know you can block on that in sendmail without any add-ons... The problem is that the majority of the internet servers must then go out and update their DNS records for MX and reverse, for this to actually work.
      PS: I actually turned this on one time to get rid of spam, blocking a whole bunch of legit email in the process. Ooops. hello internet just enforce the tools that you already posses.. nuff said.
      --jboss
  • Which version (Score:3, Interesting)

    by Anonymous Coward on Tuesday February 24, 2004 @11:23AM (#8373488)
    Will it be in the free version of sendmail too or only in the commercial buy-version?
  • by Anonymous Coward on Tuesday February 24, 2004 @11:23AM (#8373489)
    They were looking for something with more vulnerabilities than Windows! Seriously, who uses sendmail? I thought we all started using Qmail or other alternatives?
    • sendmailupdate.microsoft.com ?

      Just think about the combination of sendmail with patches from Microsoft, spammers will be able to just email 31337 in the subject line to gain root.
    • by supersmike ( 563905 ) on Tuesday February 24, 2004 @11:56AM (#8373894)
      Seriously, who uses sendmail?

      Apparently, 60% of the world does.

    • by caseih ( 160668 ) on Tuesday February 24, 2004 @12:17PM (#8374158)
      Although the parent post was moderated as "funny," I think the question is a serious one. I use sendmail exlusively because it is the only mail server that supports the powerful milter API and allows me to use mimedefang, which cannot work with any other mail server. Mimedefang can drive antivirus software and spam filter, not to mention sanitizing of html email and so forth, is a very powerful piece of software.

      For many people postfix or exim work very well, and should be used over sendmail. But in a larger environment, sendmail is the standard. Qmail, well, I've never liked it.
  • by SatanicPuppy ( 611928 ) <Satanicpuppy.gmail@com> on Tuesday February 24, 2004 @11:24AM (#8373496) Journal
    Just adding a tag or a plugin wouldn't seem like it would help all that much...Email is such an open format that anything you add, can be copied and added by spammers too.

    Just my opinion.
    • by Soko ( 17987 ) on Tuesday February 24, 2004 @11:33AM (#8373625) Homepage
      Odd couple?

      I don't [cert.org] think [cert.org] they're that [cert.org] different [cert.org]. Sounds like a match made in security hell.

      Soko
    • by Moeses ( 19324 ) on Tuesday February 24, 2004 @11:40AM (#8373710)
      Eh? The point is that the receiving server will verify with the sending server that the email is really coming from where it says it is. SPAM usually lies about where it is coming from and the servers using this plug in will reject such mail.

      If the SPAM isn't lieing about where it's coming from then it's easy to block all SPAM from a web server, notify the offending servers admin if possible, get the spammers accounts revoked, etc.

      I don't know, am I missing something? The problem isn't that this won't help, the hurdle is getting the modification to the protocal accepted and used widely.

      • by GigsVT ( 208848 ) on Tuesday February 24, 2004 @11:59AM (#8373940) Journal
        Well what about what lots of people do, send email through their ISPs web server, and use the email address of where they get mail, which may not be their ISP?

        I do this all the time, I send mail through whatever SMTP server for the ISP I'm currently connected to, but my email address is always the same, and the email domain is my hosting provider, which is not my ISP.

        They better not fuck things up for people that don't always use their ISPs email address, or have more than one ISP.
        • by Tony Hoyle ( 11698 ) <tmh@nodomain.org> on Tuesday February 24, 2004 @12:28PM (#8374292) Homepage
          This has been rehashed a million times...

          Basically forging email addresses is going to have to stop, just like using open relays had to stop years ago. SMTP AUTH has been around for years & every mailserver supports it.

  • Good job Microsoft! (Score:5, Interesting)

    by DarkHelmet ( 120004 ) * <mark&seventhcycle,net> on Tuesday February 24, 2004 @11:24AM (#8373498) Homepage

    I posted an idea similar to this on slashdot here [slashdot.org], which would essentially involve sendmail digitally signing messages that it sends and then having receiving mail servers verify it. I think most of the people who read the idea misinterpreted it as forcing us to get digital certs through verisign, which was NOT what I was implying.

    See, now this is a much better idea than "email postage" and "computationally expensive" sending of email. This way, the accountability falls down to individual email addresses, and domains for sending UCE.

    It's FAR easier to track emails and their likelyhood of sending spam than the actual messages themselves (after all, buyviagra@biggerpenis.org is most likely sending you spam).

    This, combined with a spam filter could do the trick.

    Congratulations Microsoft for actually partnering with somebody who matters is this whole affair. I'm hoping the other companies like Yahoo and AOL follow suit with this strategy, and a solution becomes standardized.

    • by meta-monkey ( 321000 ) * on Tuesday February 24, 2004 @11:28AM (#8373558) Journal
      (after all, buyviagra@biggerpenis.org is most likely sending you spam).

      Hey, that's *my* email address!
    • by Espectr0 ( 577637 ) on Tuesday February 24, 2004 @11:30AM (#8373581) Journal
      I'm hoping the other companies like Yahoo and AOL follow suit with this strategy, and a solution becomes standardized

      You didn't read the article, did you? Go RTFA

      "Microsoft is one of several companies who are also working to combat spam with a "caller ID" system. Yahoo's DomainKeys is another one."
    • by *weasel ( 174362 )
      Wasn't AOL essentially setting up the same service [slashdot.org]? A sender-verification utility that recipient servers could utilize to ensure messages which claim aol.com as the originating domain are legit?

      I'd much prefer an IETF standard, and some cooperation with the big freemail/isps (yahoo, comcast, earthlink, etc) - but if MS+sendmail gets the ball rolling I'll take what I can get.

      Of course all this really does is make black/white listing effective again. Now we can go back to primarily arguing the ethics and
    • by ZoneGray ( 168419 ) on Tuesday February 24, 2004 @11:50AM (#8373833) Homepage
      Yeah, I see some actual hope that something like this would be effective. Perhaps if the servers simply exchanged certs, for example. Requiring a cert to run a mail server is NOT a heavy burden, and you could always accept unsigned messages if you wanted to. It raises some tech issues, and current SSL certs wouldn't work exactly. But a system of verifying the sending server and tying it to an identifiable individual or company would help a lot. Even the barrier of having it cost $50 or so to get a server cert would be enough to stop a lot of spammers.

      Even better, such a solution is implemented at the server level, it's transparent to users, and it's backwards compatible (you could still configure your server to accept unsigned mail, or just filter it more aggressively), making gradual implementation a possibility. So there's a good chance it could catch on if major ISP's were to adopt it.

      I confess to not having thought through all the details, but something along these lines is probably going to be the answer. Makes a lot more sense than any of the "pay per message" proposals, that's just Libertarians Gone Wild.
      • by Piquan ( 49943 ) on Tuesday February 24, 2004 @11:57AM (#8373923)

        Requiring a cert to run a mail server is NOT a heavy burden,

        Personally, I don't think it's even necessary. I doubt that spammers will start doing man-in-the-middle attacks or DNS manipulation (not because they're morally above it, but because of the technical expertese, legal exposure, and risk of being caught and traced). So just make up a cert and stick it in a DNS record for your domain. No PKI needed => no payment to get your cert.

      • by jjshoe ( 410772 )
        a) I am not paying an extra $50 just to send email from my home server for a certificate.

        b) $50 a server for a spammer is like the average joe forking out money for a tootsie roll. Assume $50 gets him 12 hours of spamming before he gets the cert yanked. Lets assume he sends one email per second and receives a dollar for every email responded to. That's 43,200 emails a day and we will further assume only 5 percent get responded to. That's $2,160 for 12 hours of spamming gross, $21,110 net. I must be missing
    • by dachshund ( 300733 )
      This is a very old idea. Not that you should be ashamed for thinking it up. There are similar solutions for almost every vulnerable Internet protocol (DNS, BPG, etc.) People don't implement them because they have high cryptographic overhead and require major infrastructure changes (including the addition of a PKI.)

      Incidentally, a better solution might use Identity Based Encryption [stanford.edu]. Still has many of the same problems, but it's a tiny bit more elegant.

    • by MyFourthAccount ( 719363 ) on Tuesday February 24, 2004 @12:04PM (#8373995)
      Sorry, but your solution is NOT the solution.

      (after all, buyviagra@biggerpenis.org is most likely sending you spam).

      That statement would have made sense in 2002 perhaps, but today a _very_ large portion of email is sent through hijacked machines.

      It's just as easy for the hijacking spammer to sign the outgoing email on the hijacked machine.

      Consider it similar to a telemarketer that goes from house to house to find unlocked doors. When the door is open, he goes in and makes the phone call from the phone in the residence. The caller ID is not going to identify the phone call as a telemarketer call.

      In the real world this would be absurd, but unfortunately there's tons of machines out there with SMTP backdoors.
    • by 0x0d0a ( 568518 ) on Tuesday February 24, 2004 @12:26PM (#8374268) Journal
      If you're right, that Microsoft's system involves cryptographic signatures on a per-email-address-level, and the protocol is open, I am deeply impressed. Microsoft would be from a technical standoint far ahead of the SPF crowd (who are pushing an ugly, nasty-side-effect hack if I've ever seen one).

      Microsoft may actually produce something that benefits the community as a whole. Seems incredible, but...wow, if we owe having a *good* email infrastructure to Microsoft, the world will be standing on its head.

      Anyone have a link to a good technical description of Microsoft's proposed system?
  • Submitter didnt RTFA (Score:5, Informative)

    by j0keralpha ( 713423 ) * on Tuesday February 24, 2004 @11:24AM (#8373501)
    Microsoft is one of several companies who are also working to combat spam with a "caller ID" system. Yahoo's DomainKeys is another one.
    MS is a footnote. Aside from headline, the article mentions nothing about an 'alliance' or even Sendmail and MS working together.
  • by stanmann ( 602645 ) on Tuesday February 24, 2004 @11:24AM (#8373505) Journal
    Isn't this one of the signs of the apocolypse?
    • We have Microsoft being involved in an open source project, but we still need three more horsemen of the apocalypse

      1) Ashcroft announcing "Maybe taking away people's freedom isn't the way to protect it"

      2) Linus Trovolds accepting a position at Microsoft "Screw this hippie OSS shit" he was quoted as saying

      3) France wins a war (without American help and without being led by a non-frenchman)

      • by Haeleth ( 414428 ) on Tuesday February 24, 2004 @12:17PM (#8374152) Journal
        3) France wins a war (without American help and without being led by a non-frenchman)

        Even if you don't count the French Revolution, doesn't the Norman Conquest count? French invade Britain, French win, Britain ruled by Frenchmen for several hundred years. I'm pretty sure William of Normandy was French, and I'm pretty sure the Americans didn't intervene in that one.
        • by The Spie ( 206914 ) on Tuesday February 24, 2004 @01:39PM (#8375101) Homepage
          Actually, William the Bastard was a Viking with family origins in the Norwegian-ruled Orkneys. William's great-great-great-great-grandfather was Ragnald, first earl of Orkney, and William was a direct male descendant of Ragnald through Ragnald's son Rolf, first Duke of Normandy. They ended up marrying into the families of the Capetian dynasty of France and into the family of Aquitaine as well, but they weren't really French, any more so than the British royal family is truly British (I think it'll be only when Wills gets the throne that someone with a majority of UK blood will be reigning, for the first time since Queen Anne; the Windsors are primarily German with injections of Danish royal blood courtesy of Queen Alexandra and Prince Philip).

          The Normans were regarded even in their day as Vikings with a veneer of French civilization. They were regarded as the equivalent of 17th and 18th Century Russians, who, due to their rather unsanitary personal habits, were regarded by courts in Europe to be "baptized bears".

          So, in the final wash, it was Yet Another Viking Invasion Of England, albeit this one more successful than the others because the family stuck around for a while (until Richard III, in fact).
  • qmail (Score:3, Interesting)

    by millahtime ( 710421 ) on Tuesday February 24, 2004 @11:24AM (#8373508) Homepage Journal
    So, is qmail getting in on this solution????
    • Re:qmail (Score:4, Informative)

      by rsidd ( 6328 ) on Tuesday February 24, 2004 @11:29AM (#8373579)
      DJB hasn't updated qmail since 1997 and it looks doubtful he ever will. However, I'm sure third-party patches will be available if the idea catches on in any significant way.
  • See also.. (Score:5, Informative)

    by Karamchand ( 607798 ) on Tuesday February 24, 2004 @11:25AM (#8373512)
  • by lewp ( 95638 ) on Tuesday February 24, 2004 @11:25AM (#8373514) Journal
    First your cf syntax, now working with Microsoft?! What did we ever do to you?! Truly, a sysadmin's worst enemy.
  • by Doesn't_Comment_Code ( 692510 ) on Tuesday February 24, 2004 @11:25AM (#8373518)
    This isn't going to fix it.

    A crap load of junk mail comes from insecure personal computers that were hijacked. If these computers send their junk mail, and this system tracks them, it will send the "A-OK" because the mail came from where it said it did.

    This will help, no doubt. But fix the problem? No.
    • by Kenja ( 541830 ) on Tuesday February 24, 2004 @11:30AM (#8373590)
      Most if not all Spam sent this way claims to be comming from some place other then the computer that sent it. If you get a message claiming to e from Microsoft and its source is some DSL IP range in the UK, this filter will chuck it. If you are only getting spam from known sources then you dont realy have a spam problem.
    • by renelicious ( 450403 ) on Tuesday February 24, 2004 @11:34AM (#8373633)
      You have a good point, but THIS combined with other solutions could make a difference. Yes most of the PCs sending Spam won't be stopped by this, except that they don't have proper MX/PTR records. So if we use this with some DNS filtering to only accept mail from "real" mail servers, this could take out a large chunk of spam.

      • by iko ( 32092 )
        You will of course not that there is NO requirement for a mailserver to have an MX record, an A record is sufficient. Not that I've checked, but I suspect filtering mailserver without an MX will result in lots of collateral damage.
  • by Squeebee ( 719115 ) <squeebee AT gmail DOT com> on Tuesday February 24, 2004 @11:26AM (#8373531)
    but it will need widespread acceptance to really work

    And therein lies the problem. No vendor, no matter how well placed, should just run off and try to implement a solution. Why? Because odds are good it will not take off. Everyone involved needs to agree on a solution THEN implement it.
    • A Phased approach (Score:5, Informative)

      by FreeUser ( 11483 ) on Tuesday February 24, 2004 @12:04PM (#8374008)
      And therein lies the problem. No vendor, no matter how well placed, should just run off and try to implement a solution. Why? Because odds are good it will not take off. Everyone involved needs to agree on a solution THEN implement it.

      As with any change to infrastructure, the conversion is likely best done in a phased approach.

      Step 1: Impliment authentication, but don't block messages from unauthenticated servers.

      Step 2: Adjust existing SPAM filters to weigh mail from unauthenticated servers as having x % (where x is initially some relatively low number) greater liklihood of being SPAM than messages from authenticated servers.

      Step 3: Increase x gradually over time. At the end of some period (say, one year), x appraoches 90%, effectively blocking most mail not on whitelists from unauthenticated servers. Leave x at this high value for some time (say another year)

      Step 4: stop accepting mail from anauthenticated servers completely.

      End of SPAM? Probably not (as SPAM mailers can authenticate themselves, and Microsoft WORMS and Viruses can hijack legitimate mail servers which authenticate themselves and send SPAM anyway) but it is a start.
  • by Vihai ( 668734 ) on Tuesday February 24, 2004 @11:26AM (#8373535) Homepage
    Could this be a sign of the beginning of the end of spam?

    Dunno... but it could be the beginning of the end of sendmail. Not that it would be a bad thing...

    There's much better [postfix.org] software [spamassassin.org] out there.
    • Re:End of what? (Score:5, Insightful)

      by OneFix at Work ( 684397 ) on Tuesday February 24, 2004 @11:47AM (#8373806)
      Well, lets see...spamassassin works with sendmail, so I don't get your point there...I don't think they are looking to replace the functionality of spamassassin, they are taking care of the problem in a different way...

      And, as far as postfix being better than sendmail...sendmail has a bad rap because it has been around the longest...

      Yes, some older versions of sendmail had security problems. Yes, sendmail has some feature bloat...

      But, sendmail is the MTA of choice for UNIX distributions...sendmail is probably one of the most configurable of all MTAs (that also makes it one of the most difficult to configure)...mainly because of its past, sendmail is good in a different way than MTAs like postfix...
  • Eh? (Score:5, Funny)

    by Realistic_Dragon ( 655151 ) on Tuesday February 24, 2004 @11:27AM (#8373546) Homepage
    Microsoft working with a Free Software group to produce a standard that will be freely available?

    Sounds more like the end of the world than the end of spam to me!
  • by painehope ( 580569 ) on Tuesday February 24, 2004 @11:28AM (#8373565)
    nowhere in the fscking article does it say anything about MS and Sendmail working together.

    It tells of Sendmail launching a plugin for sendmail, and then :
    "Microsoft is one of several companies who are also working to combat spam with a "caller ID" system."

    Does anyone RTFA anymore? Am I alone in this? Is god really a abnormally large crustacean living on the moons of Jupiter?
  • by cK-Gunslinger ( 443452 ) on Tuesday February 24, 2004 @11:28AM (#8373567) Journal
    Could this be a sign of the beginning of the end of spam?"
    Allow me to rephrase that:
    Could this be a sign of the beginning of even smarter & trickier spammers?"
    • NANAE Rule #3: Spammers are stupid.

      Spammers will pay smarter and trickier blackhats to write more insidious trojans and viruses, but that's about the limit.
    • Beginning of the end of the internet, more like. Predictably Microsoft's "solution" to spam will only work for users on Microsoft systems running Internet Explorer. pine on Linux? I don't think that's gonna run an ActiveX control somehow...

      When ISPs block everyone not running "spamproofed" clients, Billy's dream of 100% market share isn't far away. Reject this nonsense and support the original intent of the designers and engineers who built the net - end to end communications using platform agnostic stand

  • by Anonymous Coward on Tuesday February 24, 2004 @11:29AM (#8373568)
    MS put a signature in all emails from outlook, and sendmail blocks everything with that signature?
  • by AtariAmarok ( 451306 ) on Tuesday February 24, 2004 @11:31AM (#8373602)
    Could this be a sign of the beginning of the end of spam?"

    Yes, just like computers have made the era of office paper end (I enjoy my paperless office, do you?), and how Bill Clinton in 1995 ended the era of big government.
  • Sooo.... (Score:4, Interesting)

    by Sentosus ( 751729 ) on Tuesday February 24, 2004 @11:31AM (#8373603)
    Will my email server I run perfectly responsibly just for my family be able to function without paying Microsoft for the plugin? Afterall, it is not rocket science to code your own SMTP server with Visual Basic.... This will work for the controllable sources, but what about foreign servers and the rest of the World?
  • by Elendil ( 11919 ) on Tuesday February 24, 2004 @11:32AM (#8373609)
    With the combined stellar security records of MS and sendmail, guess how secure the new software would be.
  • by pc-0x90 ( 547757 ) on Tuesday February 24, 2004 @11:32AM (#8373613)
    That screams safe and secure to me. Then, maybe we could set it up with BIND.. and the computer would be safe..

    until you plug it in..

    (Flamebait to induce conversation.. calm down)
  • by Hadji ( 74589 ) on Tuesday February 24, 2004 @11:33AM (#8373624)
    and I've just written an email tracking program . . .
  • A better article (Score:5, Insightful)

    by PetoskeyGuy ( 648788 ) on Tuesday February 24, 2004 @11:38AM (#8373685)
    This Inforworld Article [infoworld.com] is much better then the one posted and mentions how this new Microsoft Idea is very similar to the existing SPF, except that with Microsft's version, the whole message is sent and downloaded before it's rejected.
  • back in the day (Score:5, Interesting)

    by cluge ( 114877 ) on Tuesday February 24, 2004 @11:40AM (#8373717) Homepage

    Spammers used to buy a T1's worth of phone lines and then dial in to several different ISP's all at once and use THEIR mail server to send spam. With the advent of easily hacked broadband connections, this isn't required anymore. I can see it popping back up pretty quickly. While the idea is OK, spammers are adaptable. The ONLY way to make spammers stop, is to make them feel pain and this solution doesn't provide nearly enough pain.

    For instance, I ws joe jobbed, I recieved about 2300 bounced messages advertising various web sites. For every bounced message I forwarded a 900k graphic that said "Do not use my return address in your spam campaign, it is illegal". Since I recieved another bounced spam before I had finished responding to these kind people, I decided perhaps another avenue of communication was approriate. I posted an order on each of the three websites I found advertised 2300 times (PERL w/LWP). Since I was unable to get a response via e-mail, I figured that I would get a response via an order form. I posted 2300 times(one for each boucne) with my contact information and a request to not use my e-mail in the shipping information box.

    What happened?

    1. one of the mail servers stopped responding all together. It didn't come back up for more than a week (qmail queue default lifetime anyone?)

    2. During the post to these web sites (ALL on hacked machines running open proxy servers) the web site went down and stopped responding. I guess the concurrency of 2300 was a bad idea.

    It appears that my e-mail address is no longer being used, although their websites finally recovered about 8 hours later. These web sites no longer accept orders from my IP address. No imagine if only 1/2 the people that recieved a spam did what I did? Think of the number of bogus orders that have to be sorted to simply get to a legitimate one? Think of the amount of traffic going INTO comcast and RR to these hacked machines (waving flag over here, over here LOOK LOOK security@rr.com!). Of course this would take time, and we alreayd have precious little of this. If enough people took the time, we would also have precious little spam. The cost would be too high.

    AngryPeopleRule

  • by theonlyholle ( 720311 ) on Tuesday February 24, 2004 @11:42AM (#8373739) Homepage
    There's something at least very similar to that already available as a milter. milter-sender [snert.com] does an email callback to the mx of the domain the email claims to be from and verifies that the address exists. Unlike some of the other solutions available, it doesn't expect the sender to send another mail to verify he's a genuine sender, but accepts the email if the mx doesn't fail to the "RCPT TO" command (exceptions requiring a "full callback" can be configured for mxs that only find out they don't know the recipient after the DATA command has been sent).
  • by AngryTech ( 569057 ) on Tuesday February 24, 2004 @11:46AM (#8373793)
    As a public service I am providing my sendmail.cf file as a configuration example.

    HReceived: $?sfrom $s $.$?_($?s$|from $.$_)
    HDate:@@_$_$?sfrom^*$%#%!*(()^&^&*#$##
    $%@$#%&&_%#__&^#$%_#$%%___*(__Y_JY_*_*(_#$%#_
    #@$@@#sonofa@#$%@@#@#$#

    I know it just looks like line noise but this is a working config!
  • by Anonymous Coward on Tuesday February 24, 2004 @11:53AM (#8373855)
    Your post advocates a

    (x) technical ( ) legislative ( ) market-based ( ) vigilante

    approach to fighting spam. Your idea will not work. Here is why it won't work. (One or more of the following may apply to your particular idea, and it may have other flaws which used to vary from state to state before a bad federal law was passed.)

    ( ) Spammers can easily use it to harvest email addresses
    ( ) Mailing lists and other legitimate email uses would be affected
    ( ) No one will be able to find the guy or collect the money
    (x) It is defenseless against brute force attacks
    ( ) It will stop spam for two weeks and then we'll be stuck with it
    ( ) Users of email will not put up with it
    ( ) Microsoft will not put up with it
    ( ) The police will not put up with it
    (x) Requires too much cooperation from spammers
    (x) Requires immediate total cooperation from everybody at once
    (x) Many email users cannot afford to lose business or alienate potential employers
    ( ) Spammers don't care about invalid addresses in their lists
    ( ) Anyone could anonymously destroy anyone else's career or business

    Specifically, your plan fails to account for

    ( ) Laws expressly prohibiting it
    ( ) Lack of centrally controlling authority for email
    (x) Open relays in foreign countries
    ( ) Ease of searching tiny alphanumeric address space of all email addresses
    ( ) Asshats
    ( ) Jurisdictional problems
    ( ) Unpopularity of weird new taxes
    ( ) Public reluctance to accept weird new forms of money
    (x) Huge existing software investment in SMTP
    ( ) Susceptibility of protocols other than SMTP to attack
    ( ) Willingness of users to install OS patches received by email
    (x) Armies of worm riddled broadband-connected Windows boxes
    ( ) Eternal arms race involved in all filtering approaches
    ( ) Extreme profitability of spam
    ( ) Joe jobs and/or identity theft
    ( ) Technically illiterate politicians
    ( ) Extreme stupidity on the part of people who do business with spammers
    (x) Dishonesty on the part of spammers themselves
    (x) Bandwidth costs that are unaffected by client filtering
    ( ) Outlook

    and the following philosophical objections may also apply:

    ( ) Ideas similar to yours are easy to come up with, yet none have ever been shown practical
    ( ) Any scheme based on opt-out is unacceptable
    ( ) SMTP headers should not be the subject of legislation
    ( ) Blacklists suck
    ( ) Whitelists suck
    ( ) We should be able to talk about Viagra without being censored
    ( ) Countermeasures should not involve wire fraud or credit card fraud
    ( ) Countermeasures should not involve sabotage of public networks
    (x) Countermeasures must work if phased in gradually
    ( ) Sending email should be free
    ( ) Why should we have to trust you and your servers?
    ( ) Incompatiblity with open source or open source licenses
    ( ) Feel-good measures do nothing to solve the problem
    ( ) Temporary/one-time email addresses are cumbersome
    ( ) I don't want the government reading my email
    ( ) Killing them that way is not slow and painful enough

    Furthermore, this is what I think about you:

    (x) Sorry dude, but I don't think it would work.
    ( ) This is a stupid idea, and you're a stupid person for suggesting it.
    ( ) Nice try, assh0le! I'm going to find out where you live and burn your house down!

  • by hta ( 7593 ) on Tuesday February 24, 2004 @11:53AM (#8373859) Homepage Journal
    Microsoft is pushing a solution called "Caller ID", which involves putting (wince) XML documents into the DNS telling you how to check the (argh) From: header.
    A lot of other people are pushing a solution called SPF, which involves putting text "code snippets" into the DNS telling you how to check the MAIL FROM: envelope return address.
    This topic will be discussed at the IETF next week in Seoul, Korea. Hot topic!
    • I hope the IETF is smart enough to not support any solution that would make it impossible for me as a regular joe-home user to run my own mailserver. If some other server wants to talk to mine and ask "did you send me this?" that's great, but if some other server decides to /dev/null a message from me because my IP doesn't backward resolve to the domain claimed when sending, then that's bad.

      I'm actually a bit scared that this 'anti-spam' crusade will end with an even bigger wall between "users who should

  • by azdio ( 185000 ) <azdio@m e . c om> on Tuesday February 24, 2004 @11:55AM (#8373882)
    http://www.sendmail.com/sender_auth.shtml
  • DoS attack anyone? (Score:5, Insightful)

    by DjMd ( 541962 ) on Tuesday February 24, 2004 @11:56AM (#8373897) Journal
    The plug-in lets organisations verify a message's source before accepting it by automatically checking to see if an email came from where it claims it did.

    Doesn't this just sound like a great way to create a DoS style attack?
    I: Flood many servers with email supposedly from server X
    II: All servers attempt to contact server X
    III: Server X crashes/is overwhelmed with requests, stops responding
    IV: Some of the orginal servers might get hung trying to clear email from Server X, now no longer responding...
    I admit that IV seems avoidable, but I-III don't seem like a big strech based off of prior MS security exploits...
  • by GoMMiX ( 748510 ) on Tuesday February 24, 2004 @11:58AM (#8373926)
    Now my little server can do advanced reverse lookups on the over 90,000 spam messages it handles per month.

    I'm thinking not...

    How about making all spam a crime and holding the companies who finance it liable. Then giving consumers the power to sue for damages.

    I'm not an ISP, under CAN-SPAM I can't do ANYTHING about the over NINETY THOUSAND spam messages sent to my server per month.

    Needless to say, my poor little PII-400 linux box gags and chokes during spuratic 'floods' of spam through each day.

    I must say, though, any efforts to thwart spam are good in my opinion. However, the problem will _never_ be solved until the companies PAYING for spam are held financially and/or criminally liable for their actions.

    After all, if you PAY someone to commit murder for you -- does that make you any less guilty?

    No.
  • by Gothmolly ( 148874 ) on Tuesday February 24, 2004 @12:01PM (#8373956)
    MS and Sendmail are probably responsible for 90% of the spam out there, with default open relay policies, cryptic documentation, and (in MS' case) a corporate culture and influence which means that only chimps and other simian life forms become Exchange admins. Flame all you want, this is from direct experience.

    At an old job as a firewall engineer, I had to tell the Exchange Admin for a major medical insurance provider HOW to set up our AV server as their relay. I found it on Google faster than she could fumble through her documentation. At another site, I had to battle an NT/Exchange admin who, after moving the Exchange server to an internal network, wondered why he no longer could receive mail.

    MS and Sendmail owe everyone on the Internet countless hours of lost time due to idiotic softawre config problems, its about time that they came up with a solution.
  • by nlinecomputers ( 602059 ) on Tuesday February 24, 2004 @12:04PM (#8373996)
    Sendmail is one of the vendors working on Sender Permited From or Sender Policy Framwork is it not? spf.pobox.com [pobox.com] I have no clue, nor did the article, on what Microsoft might be doing.

    SPF is basicly a reverse DNS lookup on SMTP servers if I understand it correctly. Basicly under the plan to send mail you have to have a registered SMTP server in DNS so that your mail can be traced back to the sending SMTP server. No SPF records then your mail is most likely spam and can be discarded at the client or even at the POP server. Heck I suppose even SMTP servers could refuse to forward such mail. Will not eliminate all spam but it would halt the span-in-can email virus like SoBig that makes every Winblows box into instant spam machine. It would also stop spoofed email that causes so much headache.

    Very needed plan IMHO.
  • by interactive_civilian ( 205158 ) <mamoru&gmail,com> on Tuesday February 24, 2004 @12:06PM (#8374023) Homepage Journal
    I read the article, but it seemed a little light on details...What exactly do they mean by checking to see if an email comes from where it claims? Do they mean that if the Domain Name or IP that the mail is sent from doesn't match the domain in your return address, the mail will be rejected?

    If so, this will bother me to no end. I currently have two main email addresses, one using Cluemail [cluemail.com] and one using MyRealBox [myrealbox.com]. I check both of these addresses using IMAP with MacOS X's Mail.app. However, since MyRealBox is an experimental server and is not always up and since the free accounts on ClueMail don't have SMPT access, I am using my own machine running QMail to send my emails. Obviously my IP and whatever domain gets assigned to it from So-Net (yay Fiber Optic connection to the apartment!!) do NOT match either of my mail addresses.

    So, will something like this spam solution break my set-up?

    Disclaimer: I am somewhat clueless about all of this. I only know enough to have been able to set my machine up securely so it is not nor can/will not be a source of spam. So, I appreciate any information. Cheers. :)

  • by BetaJim ( 140649 ) on Tuesday February 24, 2004 @12:09PM (#8374058)
    is to reject messages where the outside envelope (not certain of the correct term) address(es) doesn't match any addresses in the To:, CC:, or BCC: fields on the inside.

    A large portion of the spam I receive doesn't have my address in the To: field. Why doesn't mailer software look for this kind of mail? Am I missing something?

  • by WindBourne ( 631190 ) on Tuesday February 24, 2004 @12:12PM (#8374098) Journal
    I still have my system up, but I am denied at places becuase I am on Comcast Cable. Yet, I have never had an open relay, nor been cracked. I find it obnoxious that I have issues sending simply due to location rather than an inability to have a secured system.
    • by Skapare ( 16644 ) on Tuesday February 24, 2004 @12:44PM (#8374449) Homepage

      The issue you face is one of "identity distinction". By being on Comcast Cable, you appear to be one of the unwashed masses. Whether your system is secure or not isn't known, and isn't practical to find out (trying to actually crack your machine to see if one can get in, to refuse mail if the crack succeeds, has certain legal risks).

      You can distinguish yourself by making your email address known and others can whitelist it. Of course that's only good up to the point that spammers start to joe-job you using that address (which may not be for quite a while). Another way (which won't work with Comcast because they are so clueless, but could work with some other ISPs) is to get static IP and arrange for reverse DNS to identify your domain name. Some (I do, for example) block Comcast based on the domain name (easier to manage than a bunch of IP address ranges), which means if your IP didn't have comcast.net on it, it might get through. And if you do have a static IP, you could just ask for that one to be whitelisted.

      There are also message content ways to distinguish yourself, such as cryptographically signing your message. But the problem here is that mail servers have to accept all mail first to see that signature. That breaks the ability to refuse during the SMTP RCPT command; refusing at the DATA command not only means wasting the bandwidth always on every message, but also the inability to let users separately whitelist, or means sending bounces to unverified addresses (bad). If they would redesign SMTP to provide the crypto signature during the SMTP session, that would help a lot.

      Probably the best solution is to subscribe to a mail submission service (e.g. someone who has a colocated mail server and takes your mail only via authenticated SMTP or MSA). Then the fact that you're on Comcast is hidden deeper in messy RFC headers.

  • by tacocat ( 527354 ) <tallison1&twmi,rr,com> on Tuesday February 24, 2004 @12:18PM (#8374171)

    I know I'm blowing my karma points on this one, but I believe it's justified and realistic.

    No business partnership or alliance of any signficance has existed with Microsoft that resulted in a mutually beneficial conclusion. To put it another way, it's like trying to make a deal with the devil.

    I don't expect that sendmail will be summarily destroyed as such. But I ernestly and honestly believe that the final outcome of this venture will only result in Micorosoft obtaining an absolute choke hold on email.

    To expect anything less is niave and ignorant. There is no past performance which disputes this claim. Even considering legal judgements, Microsoft will not hesitate to make "all your email belong to us".

    I apologize if I come off sounding like one of the slashdot anto-microsoft zealots, or some conspiracy theorist. But think it through.

    Microsoft develops a means by which all email must be reverse authenticated as to the sender. Believe me, they will patent it and everything that looks like it before the night is over. This sounds great, but then all they do is just modify the email servers to require that this proprietary reverse authentication take place or you can't send any email.

    The fact that they are working with sendmail, the company and not the OS project, allows them to license this technology to a Unix platform. This allows them a foothold onto the majority of email servers, which are Unix based, and to establish the means by which they have complete ownership of all email transactions. And it will be a matter of time before sendmail.com has to turn over their assets to pay the licensing fees, but then maybe Microsoft doesn't want them able to pay the fees.

    Yeah, Spam sucks. But get a clue! Spam filters account for 99+% of all the spam out there. I would rather have my 1 spam a week out of 600 then to have Microsoft telling me I have to pay royalties to send email. There is nothing cool or encouraging about this.

    And the real problem here isn't the spam, or the cost of sending spam, they haven't done anything to reduce either one of these. The problem is the adolescent pimple-butts who really think that herbal viagra will give them a 36" schlong that lasts all month long. Do you really want that? It's hard to pee standing on your head!

  • Comment removed (Score:4, Interesting)

    by account_deleted ( 4530225 ) on Tuesday February 24, 2004 @12:27PM (#8374273)
    Comment removed based on user account deletion
    • Re:wont stop spam (Score:4, Interesting)

      by salimma ( 115327 ) * on Tuesday February 24, 2004 @12:36PM (#8374366) Homepage Journal
      what good is that when the spammer lives in a country that has no laws against spam?

      It would be much easier to accurately blacklist [netsonic.fi] them, really. Currently some poor people get erroneously blacklisted by mail admins because spammers spoof their e-mail addresses.

      Ironically for Yahoo's involvement in blocking spam, I was recently forced to switch my mailing list subscriptions from my Yahoo account because Yahoo's servers are considered insecure and some mail servers tag Yahoo mails as possible spams...

  • Big 3 Spam Solutions (Score:5, Informative)

    by jgardn ( 539054 ) <jgardn@alumni.washington.edu> on Tuesday February 24, 2004 @12:43PM (#8374442) Homepage Journal
    There are currently 3 solutions competing on the internet. Only one actually works right now as we speak.

    (1) Caller ID is Microsoft's big proposal. Domain owners put XML in the TXT records in their domain. Receiving email systems can determine if a message is valid only after seeing all of the headers.

    (2) SPF (http://spf.pobox.com/) is already implemented and is already blocking joe-jobs and phishing schemes. It relies only on the envelope FROM and the owners of the domain publishing a short TXT record. Currently, aol.com and many more domains (around 6,000?) publish SPF records. Implementations for filtering based on SPF exist in perl, python, C, and for Exim, postfix, qmail and sendmail.

    There is a small problem in forwarding email properly, but that is being resolved with SRS (same website).

    (3) DomainKeys (Yahoo!'s solution) is still being researched and is looking more and more like S/MIME or PGP but for an entire domain. The domain owners would publish the public key via DNS (probably a TXT record as well) and receving mail servers can verify that the message is indeed from said domain. There are some severe limitations: If someone gets your domain private key, you are screwed. It's also subject to a replay attack. The attacker would send a valid email to themselves through a server using domain keys, and then replay that message to the rest of the internet.

    Both SPF and Caller ID can't work around DNS poisoning or IP spoofing. But they both limit the number of machines that are allowed to send email for a domain.

    It is important that if you own a domain, that you publish SPF records - even if it is only "v=spf1 !all" or "I don't send any email for this domain". SPF, if it is going to be adopted, is going to be adopted at an exponential rate.

    Caller ID is mostly Microsoft's response to the rapid success of SPF. They want to own the solution to spam, and they want to take credit for cleaning up your email box, even though their idea is really other people's ideas + XML. The protocol is heavy, burdensome, and subject to the whims of the XML interpreters out there right now. Plus, it is a huge proposal that is detailed and complicated, ripe for incompatibilities that could force users of Sendmail, Exim, Postfix, or Qmail to "upgrade" to Exchange.
  • by macdaddy ( 38372 ) on Tuesday February 24, 2004 @01:09PM (#8374758) Homepage Journal
    "Could this be a sign of the beginning of the end of spam?"

    Certainly not. I do however predict it will be the beginning of the end of email. This is a perfect way to segment the email systems from one another; those that utilize this plugin and those that are discriminated against for not using this plugin. I for one will not use something that isn't a damned standard. You don't have to be an evil genius to recognize the evils of introducing non-standard requirements into such a critical system. It's just plain nuts.

  • by Medievalist ( 16032 ) on Tuesday February 24, 2004 @01:12PM (#8374791)
    Oh, I thought this was a reference to the ident protocol, already supported by sendmail, which would solve the problem in exactly the same way if firewall admins were willing to open up their AUTH ports and run identd daemons.

    Nah, this is an elaboration of the same thing but on the email port instead.

    Slap a few new buzzwords on it as it goes through the door, of course... PKI! WMD! Cryptographic keys! 40% more trunk room! Compassionately Conservative (Less liberal than the leading brand)! Microsoft Windows Compatible!

    Now it's sure to sell. Won't stink up the room as bad as old dead identd I hope.
  • by josepha48 ( 13953 ) on Tuesday February 24, 2004 @01:28PM (#8374965) Journal
    .. netscape or Real.com?

    Usually when MS forms an alliance with someone for any reason they want to put them out of business somehow, but not sure if that would happen in this case. Isn't sendmail GPL or BSD licensed?

  • I've said it before, but it bears repeating here:
    1. Message Arrives
    2. Message sender and recipient(s) checked against known Windows licensees. If a sender or recipient is not a licensee, message is bounced.
    3. Message headers are examined for mail client. If mail client is not a Micro$oft client, message is bounced.
    4. Message body vetted for disparaging comments about Micro$oft using new "IntelliDiss" technology. If disparaging comments (or intentional derogatory misspellings of company name) are found, message is bounced and forwarded to Micro$oft legal.
    5. Micro$oft pays off Senator Disney (or one of their other stooges in the House or Senate) to sponsor a bill banning the traditional SMTP protocol in favor of MSMTP. Bill passes by a wide margin in both Republican-controlled houses of congress and is signed into law by pResident George W. Bush, who proclaims "You're either with Micro$oft, or you're with the terra-ists." Any remaining SMTP user is secretly arrested and sent to camp X-Ray.

"What man has done, man can aspire to do." -- Jerry Pournelle, about space flight

Working...