Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Spam The Internet

Spam Solutions from an Expert 420

Mod N writes "SecurityFocus has posted a nice survey of anti-spam technologies by spam expert Neal Krawetz, in which he delves deeply into the specifics and pitfalls of the numerous proposed solutions. Krawetz makes it obvious that securing the email infrastructure is a very complex problem that many of the current (simple) solutions can't solve alone."
This discussion has been archived. No new comments can be posted.

Spam Solutions from an Expert

Comments Filter:
  • Proof? (Score:5, Interesting)

    by monstroyer ( 748389 ) * <devnull@slashdot.org> on Thursday March 11, 2004 @11:02PM (#8539210) Homepage Journal
    The marketing myth emphasizes two misconceptions: (1) a human must perform the challenge, and (2) these problems are too complex for automated solutions. In truth, most spam senders ignore these CR systems because they do not account for a large recipient base, not because the challenge is difficult. Many spam senders use valid email addresses for their scams or for validating mailing lists. When CR systems begin to interfere with spam operations, spammers will automate the responses to these challenges.

    Excuse me, what? Where's the proof? That's quite a brave statement to be making considering i've never seen this cracked, ever.

    I challenge someone to find an automated response to C/R. [si20.com]

    I did hear of a theory [slashdot.org] where C/R was being cracked by taking the C/R image, posting to a porn session, and letting a seeing person do the work. However, i've yet to witness this in practice. Show me the automated response to C/R that exists beyond a blog theory, and i'll believe. Until them, i hardly consider it "marketing hype".

    • Re:Proof? (Score:5, Insightful)

      by LostCluster ( 625375 ) * on Thursday March 11, 2004 @11:13PM (#8539290)
      That's like saying a all theoretical attacks is not worth securing against somebody's fallen victim to it. Sure, there's some way-out ideas that can be dismissed that way, but this one seems so simple I'm pretty sure somebody who runs both spam and a porn site could pull it off...
    • by 3770 ( 560838 ) on Thursday March 11, 2004 @11:16PM (#8539309) Homepage
      that the challenge/response could be outsourced to.

      Only kidding (I think).
      • This might be a joke now, but it may well happen in the future if we're really into this C/R thing.

        At the moment spammers are already paying people to send emails from home, obviously it is profitable enough to pay someone to do the dirty job for you.

        As a result, if recepients are less defensive against spams in a C/R system, those slipped spams might get a greater response rate. And this is good news to spammers, and they might very well be able to afford to outsource to deal with C/R.
    • Dueling Challenges (Score:4, Insightful)

      by The Monster ( 227884 ) on Thursday March 11, 2004 @11:48PM (#8539519) Homepage
      I just copied that challenge into IrfanView and had it reduce the number of colors to 2. It came out quite readable, which suggests that OCR would be able to take it from there nicely. I bet someone could throw together some Script Fu for the GIMP to convert those pictures to text with a reasonable accuracy rate. Bear in mind that the technique doesn't have to be anywhere near 100% accurate to be worth the effort for the spammer, who already has a business model based on a fraction of a percent of his emails actually generating a response.

      What I take issue with is this paragraph from the article:

      CR deadlock. Alice tells Bill to email her friend Charlie. Bill sends an email to Charlie. Charlie's CR system intercepts the email and sends a challenge to Bill. Unfortunately, Bill's CR system intercepts Charlie's challenge and issues its own challenge. Since neither user actually receives the challenge, neither user will receive the email. And since the emails are unsolicited and unexpected, neither user knows to look for the pending challenge. In essence, if two people both use CR systems, then they will not be able to communicate with each other.
      This is leaving out a key feature of any decent challenge system... When Bill tries to send an email to Charlie in the first place, Charlie's email address is automatically added to Bill's whitelist. So Charlie's challenge, showing his address as its source, flies straight to Bill's Inbox without a hitch. If Bill were so arrogant as to think he could send email to someone not on his whitelist, then he deserves not to have his email go through.
      • by RollingThunder ( 88952 ) on Friday March 12, 2004 @12:31AM (#8539809)
        Not so much that it would come from Charlie, but that the C/R would have an In-Reply-To that referenced the unique Message-ID of Bill's mail.

        When the mail goes out, Bill's system would record the Message-ID (and probably the recipient, but that could screw up on forwarders if you try for a hard match on the two) and then allow Charlie's C/R because it matches the whitelist.
      • CR deadlock (Score:4, Interesting)

        by Skim123 ( 3322 ) on Friday March 12, 2004 @12:54AM (#8539996) Homepage
        Another deadlock case, which happened too many times in my experiences with C/R:

        • Alice sends a message to Bob. Alice is not in Bob's whitelist, so Bob's C/R anti-spam system sends a challenge to Alice.
        • Alice doesn't use C/R, but rather a filter. Her filter, unfortunately, marks Bob's challenge as spam. Since Alice is only a computer novice, she does not know how to check his Junk Email folder, and therefore never receives Bob's challenge, hence Bob never gets Alice's email. Alice, who is blissfully ignorant of the "behind-the-scenes" happenings, thinks Bob just is trying to ignore her. So she sends another email, which is, of course, not received by Bob. And she sends another. Still, no response from Bob. Alice takes it personally and decides if she does ever hear from Bob again she won't be going on a second date with him no matter what.
        • Re:CR deadlock (Score:3, Interesting)

          by LostCluster ( 625375 ) *
          Such a deadlock is avoidable either Alice and Bob are both smart enough to see it coming and value the communication enough to head it off.

          When Bob gives Alice his e-mail address, he could put Alice on his whitelist immediately, or have given Alice a password that would automatically get her past the screening process on the first try. If Bob was really interested in getting Alice to go out with him again, he could have sent a request through through whatever common friend or dating service first introduce
      • by Tony-A ( 29931 ) on Friday March 12, 2004 @01:26AM (#8540224)
        Charlie's email address is automatically added to Bill's whitelist. So Charlie's challenge, showing his address as its source, flies straight to Bill's Inbox without a hitch.

        Now all I need to do is know or guess anything on your whitelist (or have some means to automatically add something to your whitelist;).

        Methinks all a CR system would do is add hassle to legitimate traffic and give the spammers an even easier time of it.
    • by SuperBanana ( 662181 ) on Friday March 12, 2004 @12:10AM (#8539662)
      I did hear of a theory where C/R was being cracked by taking the C/R image, posting to a porn session, and letting a seeing person do the work.

      I had a chat with a Veep that was hired on to a company I used to work at. Very down to earth guy, very friendly. We got to talking about spams and semi-legitimate emailings to customers, etc.

      He had one very interesting tidbit; stick with me for a sec here. Most companies outsource their semi-legit stuff because they get reported as spammers and whatnot, or it bogs down their email server/network, etc. No surprise there- however, the interesting tidbit is that the outsourcing companies turn around and outsource to Indian firms for handling the bounces. There's literally a room full of people in India, sitting there answering those challenge/responses and updating the client's customer email list(unlike spammers, it really is in their best interests to minimize failed deliveries). It sounds "expensive", but it's not, considering how few people use challenge/response systems. Further- a reasonably smart human can get familiar with all the various systems quickly(an hour or two, I'd guess, tops) and probably process close to a message every few seconds with a client program set up to do that limited functionality smoothly. Best part- if your client does several mailings, unless the recipient goes in and removes you, you're clear for future emailings.

    • Re:Proof? (Score:5, Insightful)

      by Elwood P Dowd ( 16933 ) <judgmentalist@gmail.com> on Friday March 12, 2004 @12:16AM (#8539696) Journal
      Challenge / response systems are broken anyway, even if spammers can't break it.

      Why? Because from: is forgeable, and viruses use other people's real addresses constantly. Every day, one of my 40 spam emails is a C/R email from someone that I've never heard of. Am I going to click the link and authorize my email address? Fuck no. But I'll never be able to send email to that person. I realize that's a *tiny* incidental, but it's still broken by design.

      If your C/R system includes a solicitation to purchase said C/R system, you're a fucking spammer. Fuck you.
    • Re: (Score:3, Insightful)

      Comment removed based on user account deletion
    • most C/R engines use a constant suite of pictures and words because the pictures are too time consuming to create on the fly... so the signup page might take too long to load.

      What the spammers do is just download as many challenges as possible, solve them, and store the hashes in a database.

      When the harvester goes out, it is likely to encounter many of the challenges a second time, and it already has the answer. :-)

      If it doesn't know it, it flags the spammer, who identifies it offline, adding it back in,
      • Good one that.

        If this becomes a race between the "good guys" and the "bad guys", the bad guys have more incentive to get it right. Just like virus writers will buy anti-virus software, spammers will buy the C/R software. You don't attack your enemy's strengths, you attack his weaknesses, preferably ones he doesn't even know about.
    • Re:Proof? (Score:3, Informative)

      by Saltcreek ( 754470 )
      I challenge someone to find an automated response to C/R.

      Students at Berkeley have already beaten the C/R system setup by Yahoo! and with a selection of 191 different version of text obfuscation they were able to return a 92% success rate. In much more detailed images, with random background textures and overlaying text they were only able to achieve a 33% success rate but I am sure with time they would be able to do better.

      In a paper [berkeley.edu] published by Greg Mori and Jitendra Malik they explain the method
    • Re:Proof? (Score:4, Interesting)

      by chrisbtoo ( 41029 ) on Friday March 12, 2004 @07:08AM (#8541707) Journal
      Well, this is by no means a proof, but maybe a method.

      1) Get image. I followed your link and got given this image [duo-creative.com].

      2) Pre-process. I loaded it into the GIMP and did Image->Mode->Greyscale, which yielded this image [duo-creative.com]. Then I did Layer->Colours->Threshold, which yielded this image [duo-creative.com].

      3) Match characters. At this point, you have a monochrome image, in what appears to be a known font. The chars don't even appear to overlap, so a simple 1-for-1 match is achievable. Scan left-right, top-bottom until you see a 10x10 (or whatever) section with a black pixel. Scan down and right from that pixel until you see a character.

      I don't have the time to code it up right now, but if someone wanted to pay me to do it, I'm pretty sure it's acheievable - not least because a whole bunch of the more difficult code is available for me to use under the GPL.
  • There is no anti spam technology that actually works. Not even whitelisting, because those viruses fake email addresses.

    Maybe whitelisting with custom mail headers to prove identity
    • Well, to prove identity you could cryptographically sign mails. When the recipient gets the signed mail, they do a key lookup and verify that the signed mail was signed with the correct private key.

      Now, how do you handle the situation where spammers are generating thousands of keys? Well, the spammers are forced to waste some cpu time, but that's trival for them. They're also polluting key registries with their garbage - that's a big negative.

      However, in terms of trustworthiness, the spammer probably h
      • What happens when someone on your whitelist opens an attachment that automatically sends email from their account, signing it? Now you have a spam that has been legitamately sent from your friend's account.

        I created a C/R anti-spam system [scottonwriting.net] myself, but gave up on it and turned to Spambayes [sourceforge.net] for two main reasons:

        1.) I was losing challenges in others' spam filters
        2.) I would still get emails from whitelisted folks when they were infected with an email worm.

        If you're interested, I blogged about my switch from
  • Oh Well (Score:5, Funny)

    by dirkdidit ( 550955 ) on Thursday March 11, 2004 @11:07PM (#8539243) Homepage
    With the way the Chinese government keeps making their own versions of everything, maybe they'll have their own version of the Internet. That shoud alleviate a good deal of the spam right there, given that their Internet will probably be incompatible with ours.
  • by RT Alec ( 608475 ) * <alecNO@SPAMslashdot.chuckle.com> on Thursday March 11, 2004 @11:07PM (#8539246) Homepage Journal

    Good overview, all things considered. I would like to add to one of his conclusions (from part 1):

    IMAP can be used with SSL and supports secure authentication, but not all servers support this. SMTP also supports SSL or TLS but again, many organization's servers do not support this or use only server-side certificates.
    This conclusion is correct, but why is this considered a stopping point? Mail admins-- get off your collective butts and add encryption and authentication to your mail servers! The author also forgot to mention that server side certificates are not necessary for SMTP, SMTP+AUTH addresses this quite nicely.

    Note that such measures are not necessary for most users. Home users that use their ISP's mail server don't have to implement any of this, since the ISP can already account for the user. Let us not forget that "most users" do not have the e-mail needs that many Slashdot readers do. For those needing roaming access and multiple addresses, use IMAPS and SMTP+SSL+AUTH.

    • dont forget ... (Score:4, Interesting)

      by segment ( 695309 ) <sil@po l i t r i x .org> on Thursday March 11, 2004 @11:24PM (#8539361) Homepage Journal
      I don't bother getting too deep into downloading too many 'new improved!...' filters. I block entire damn countries/netblocks. Besides I don't know anyone in korea, brazil, china, nor any other one of the massive spamming countries. I configure postfix to filter out a lot and the minute I receive one spammed message, I always whois -h whois.apnic/arin/ripe/lacnic offender and block their entire range. I also have spam assassin running and I have to admit I get about maybe... maybe... 4 spams a week not kidding. Again though this is my personal machine.

      block return-icmp (8) in proto tcp from 24.76.0.0/14 to any port = 25
      block return-icmp (3) in proto tcp from 81.208.64.0/18 to any port = 25
      block return-icmp (4) in proto tcp from 163.121.163.0/22 to any port = 25
      block return-icmp (4) in proto tcp from 82.77.83.0/24 to any port = 25
      block return-icmp (4) in proto tcp from 61.247.224.0/19 to any port = 25
      block return-icmp (4) in proto tcp from 217.132.0.0/17 to any port = 25
      block return-icmp (4) in proto tcp from 62.103.204.32/27 to any port = 25
      block return-icmp (4) in proto tcp from 210.111.224.0/17 to any port = 25
      block return-icmp (4) in proto tcp from 144.135.0.0/8 to any port = 25
      block return-icmp (4) in proto tcp from 195.166.224.0/18 to any port = 25
      block return-icmp (4) in proto tcp from 61.228.0.0/8 to any port = 25
      block return-icmp (4) in proto tcp from 207.144.229.0/24 to any port = 25
      block return-icmp (4) in proto tcp from 193.252.22.160/28 to any port = 25
      block return-icmp (4) in proto tcp from 200.0.0.0/8 to any port = 25
      block return-icmp (4) in proto tcp from 209.202.192.0/18 to any port = 25
      block return-icmp (4) in proto tcp from 83.32.0.0/8 to any port = 25
      block return-icmp (4) in proto tcp from 68.38.64.0/8 to any port = 25
      block return-icmp (4) in proto tcp from 219.240.0.0/10 to any port = 25
      block return-icmp (4) in proto tcp from 195.57.218.0/25 to any port = 25
      block return-icmp (4) in proto tcp from 129.79.245.98 to any port = 25
      block return-icmp (4) in proto tcp from 24.150.0.0/19 to any port = 25
      block return-icmp (4) in proto tcp from 24.205.28.0/21 to any port = 25
      block return-icmp (4) in proto tcp from 220.116.0.0/8 to any port = 25
      block return-icmp (4) in proto tcp from 200.128.0.0/9 to any port = 25
      block return-icmp (4) in proto tcp from 212.81.64.0/17 to any port = 25
      block return-icmp (4) in proto tcp from 32.10.58.0/19 to any port = 25
      block return-icmp (4) in proto tcp from 210.183.110.0/20 to any port = 25
      block return-icmp (4) in proto tcp from 134.196.0.0/16 to any port = 25
      block return-icmp (4) in proto tcp from 24.60.88.0/23 to any port = 25
      block return-icmp (3) in proto tcp from 24.190.8.0/24 to any port = 25
      block return-icmp (2) in proto tcp from 24.98.77.0/23 to any port = 25
      block return-icmp (2) in proto tcp from 24.173.29.0/23 to any port = 25
      block return-icmp (2) in proto tcp from 205.206.176.0/23 to any port = 25
      block return-icmp (2) in proto tcp from 172.128.0.0/10 to any port = 25
      block return-icmp (2) in proto tcp from 200.171.99.0/24 to any port = 25
      block return-icmp (2) in proto tcp from 200.171.97.0/22 to any port = 25
      block return-icmp (2) in proto udp from 200.171.97.0/22 to any port = 25
      block return-icmp (2) in proto tcp from 68.62.80.128/25 to any port = 25
      block return-icmp (2) in proto udp from 68.62.80.128/25 to any port = 25
      block return-icmp (2) in proto tcp from 218.76.0.0/17 to any port = 25
      block return-icmp (2) in proto udp from 218.76.0.0/17 to any port = 25
    • I know I'm ignorant on this topic, but I don't see how spam has spread to such a problem without acceptance from ISPs and systems/network administrators for companies that provide bandwidth.

      TCP/IP is *flawed* in that it allows you to fake your IP address, but why hasn't more (all?) networks not allow for packets that fake outside of their subnet? Why don't mail servers authorize their users?

      The net allows for anonymity only if you allow it. You can always check whom you're connect to at your link. If t
      • TCP is NOT flawed. Sure you can spoof a packet or two, but (assuming reasonably strong sequence numbers) you can't fake a whole connection unless you are actually getting the reply packets.

        mail is likewise not flawed; It is fairly hard to find an open relay these days; it is all-but-impossible to find one that doesn't put your IP address in the headers. That's your _REAL_ ip address. The one that ends up in RBL's so nobody accepts your mail any more.

        The big flaw is home users; they keep getting pwn3d. And
  • by Snagle ( 644973 ) on Thursday March 11, 2004 @11:08PM (#8539255)
    Just buy porn in magazine format instead of registering for it online :)
  • by ElliotLee ( 713376 ) on Thursday March 11, 2004 @11:09PM (#8539259) Homepage Journal
    According to the article, there is no good lasting solution to spam. Indeed, there isn't, but we need to consider more the reason behind the spamming.

    Why has spam grown to what it is today? It is an undeniably effective means of cheap marketing. What we need to do is come up with a way to stop this not on our end, but by looking at as a social problem or making it non-worthwhile to the spammers. If nobody ever responded to spam, spammer wouldn't bother.

    • 1) Tap the Slashdot and creative communities to produce a series of anti-spam TV/radio/print ads on the theme of "Spammers are Scammers." Smear all spammers as scam artists who sell fake merchandise and steal credit cards, and their customers as stupid losers.
      2) Get media outlets to run them for free as public service ads.

      Yes, I know this isn't a 100% solution. However, it is relatively low cost, and requires no new laws, software upgrades, or Internet standards.
  • Deterrents (Score:4, Insightful)

    by erroneus ( 253617 ) on Thursday March 11, 2004 @11:11PM (#8539269) Homepage
    At this point in the game, I am honestly surprised that we haven't heard of violence resulting from spam affliction.

    I don't know about anyone else, but I'm pretty sure I'm not alone in this. I have, at times, felt utterly enraged at all the spam flying about and further all of the innocent and naive people that are being abused by all of this.

    I know if I feel violent internally, then surely there are those with less self-control out there who will eventually act on his or her rage... perhaps the parent of a child afflicted with porn spam?

    I think if two or three spammers are attacked physically, it might give them pause. Frankly, I'm amazed it hasn't happened.
    • Re:Deterrents (Score:4, Insightful)

      by LostCluster ( 625375 ) * on Thursday March 11, 2004 @11:16PM (#8539306)
      Of course, the worst spammers make it impossible for the average user to ever identify the true source. I guess you are just giving them another reason why they need to do that.
    • Re:Deterrents (Score:2, Interesting)

      by AndroidCat ( 229562 )
      Type "two dead spammers" into Google. You might even get a link back to Slashdot where it was covered. (Stock spammers likely killed by their business .. partners.)
    • Re:Deterrents (Score:3, Informative)

      At this point in the game, I am honestly surprised that we haven't heard of violence resulting from spam affliction.

      I'm surprised you haven't heard about it either. Some senile twit that got defrauded by a Nigerian "409" scam email figured that all Nigerians were in on the scam, or something, and killed a Nigerian diplomat. [wired.com]

      Obviously, not what you were talking about: it was fraud more than spam, and the spammer didn't suffer, but... that's certainly violence resulting from spam affliction. (Also, note from

  • Open Relays (Score:4, Interesting)

    by QuePasaCalabaza ( 692645 ) on Thursday March 11, 2004 @11:12PM (#8539277)
    The truth is 90% of spam comes from open relays, that is SMTP servers that can be tricked (a bit like lying to a 5 year old) into accepting and sending out massive ammounts of mail. Simply blocking open relays using The Open Relay Database at http://www.ordb.org/ or other open relay checking utility will save you lots of time if you run your own mailserver. When we can bascially negate the usefulness of open relays to spammers, they will then have to rely on their own bandwidth for the most part providing they cannot comprimise other "closed" relays.
    • Re:Open Relays (Score:3, Informative)

      by SSpade ( 549608 )

      The year 2000 called, they miss your opinions.

      In other words, your data is so out of date as to be positively misleading.

      Open relays are dead. Open proxies are so 2003.

      All the cool kids are using virus distributed trojans these days, some of 'em proxies, some dedicated spamware.

    • by dbIII ( 701233 ) on Friday March 12, 2004 @12:24AM (#8539756)
      The truth is 90% of spam comes from open relays, that is SMTP servers that can be tricked
      A couple of years ago I didn't have a job - and a government sponsored job database came up with a listing for a job using computers in the "adult" industry. I went along to an the job interview, and found the job would have been setting up a dozen modems on a linux box and writing a program to scan for open relays (he'd apparently paid US$10,000 for a list). All income would have been undeclared, and some dodgy accounting involving payroll in the name of tourists would have gone on. Some background checks on the employer turned up a few interesting things as well as birthplace, education, home address etc. It looked like a may have had a choice between becoming a spammer and never getting paid for it, or losing my unemployment benefits (the consequence of turning down a job offer in my country). Another, actual legitimate job came up for a dying dot-com, so I never had to argue with beuracrats as to why I had turned down a job.

      Oddly enough the spammers name was "Fagin", as in the Oliver Twist villain, and he was born with that name.

  • by mao che minh ( 611166 ) on Thursday March 11, 2004 @11:12PM (#8539282) Journal
    I am in full support of using the broad-powered, freedom crushing Patriot Act in apprehending and imprisoning spammers. We might as well get some good out of it.
  • by newdamage ( 753043 ) on Thursday March 11, 2004 @11:15PM (#8539302) Homepage Journal
    A nice fool proof system, while a bit of a hassle, would effectly remove spam. PGP uses a white list of sorts, that only allows people to send you encrypted messages that have your public key. This in a sense could be done with email. Someone wants to send you an email, and has your email address. They send the small request to your mail server (1-2 KB in size) with their name, email address, and name of their mail server. The mail server holds this information and notifies you that a new sender is awaiting access. You then:

    1. Verify the identity of the sender, okay then, and the sender is then given the return request, and is notified that they will be allowed to send emails.

    2. Deny the sender, and all their emails will be bounced back.

    Yes, spoofing problems still exist, but this system could be expanded, and guess what, you only recieve email from people you want to, and the mail server acts at the first point of defense.

    This would require more complex and smarter mail servers, but it would make the every day user's life so much more simple.
  • by KalvinB ( 205500 ) on Thursday March 11, 2004 @11:17PM (#8539314) Homepage
    My free anonymous (as in they can only be traced back to a common e-mail account on my server) e-mailer uses a simple quiz to keep spammers out.

    The form page records the IP address of the visitor along the with the question number they were given in a file named with the IP address. That number is never sent to the client. When they hit submit the file of their IP is opened, the question number is read in and the answer given by the user is compared to the stored answer. The file is then deleted and if the answer was correct the e-mail is sent. Otherwise it's not.

    This forces my custom form to be used to be able to send the e-mails. And it's not possible to simply keep refreshing the submit page to keep sending the message.

    And the challenge is in the form of old riddles and a couple new ones like "what's your favorite color?"

    Things a bot would never get but that anyone who knows how to use Google can. Someone would have to program a custom bot with the answers in order to even attempt to spam. And even then since everything goes through my mail server nobody is going to sneak garbage past me for long and I know who your ISP is.

    I also include a disclaimer with every e-mail. It'd be quite silly for me not to.

    Ben
  • by Zork the Almighty ( 599344 ) on Thursday March 11, 2004 @11:17PM (#8539317) Journal
    I think the author of the article is correct. Having a system whereby anybody can communicate at virtually zero cost without unsolicited commercial messages are mutually exclusive goals. I think that for most people, a simple whitelist is good enough, along with the understanding that there is a small chance that email between new contacts will be blown away.
  • by superpulpsicle ( 533373 ) on Thursday March 11, 2004 @11:17PM (#8539319)
    SPAM is like popups. The one day you find a solution to stop it, the next day they find a new solution to send it. It's a never ending cycle get used to it.
    • by The Cookie Monster ( 129545 ) on Friday March 12, 2004 @12:26AM (#8539768)
      No it's not.
      No other medium has this problem (not in my country anyway)
      • The telephone does not have a spam problem.
      • My instant messanger does not have a spam problem (it used to but they fixed it).
      • SMS does not have a spam problem.
      • My postal mailbox does not have a spam problem - "No circulars".
      • The fax does not have a spam problem.
      email is the only communications medium that has a spam problem, you are suggesting there is something magical about email that makes email and spam a law of nature.

      The only thing special about email is it uses a protocol that was designed with different goals to what is needed now (ie security) and switching is hard, so hard that instead we cop out and just bolt more shit onto SMTP.

      A secure protocol with existing anti-spam technology in combination with legislation (which mostly exists already) is all that's required.

      Hopefully Microsoft (Hotmail+Outlook+OE) will one day join Yahoo and a few others and together they'll have enough momentum to make the jump to a protocol designed for todays environment. Then SMTP email will go the way of usenet - ie you can still use it if you like, but most people won't have a clue what it is.

      If the jump isn't made then email will become less and less useful until it is entirely replaced in our lives by a better (and spam free) communications medium. I'm guessing this will be instant messaging (we already use it more than email), and if I had to put money on the future I'd say the gradual death of email and its replacement by another medium is more likely than actually seeing people stop kicking a dead SMTP uphill and adopting a secure protocol.
      • by 0x0d0a ( 568518 )
        No other medium has this problem (not in my country anyway)

        * The telephone does not have a spam problem.


        I live in the US, and we *do*. Do you never get telemarketers?

        My instant messanger does not have a spam problem (it used to but they fixed it).

        IM systems do. The only reason that problems aren't worse than one might expect is that it's easier to pick up peple blasting out masses of messages because everything in centralized. Centralized systems have their own associated problems (easy monit
  • Fix SMTP! (Score:5, Interesting)

    by schnarff ( 557058 ) <alex&schnarff,com> on Thursday March 11, 2004 @11:18PM (#8539328) Homepage Journal
    Well, at the risk of sounding like a broken record, SMTP itself is the problem -- it's badly broken, security-wise, and needs to be fixed. It's going to be painful to move to a new mail standard, or to change SMTP so that it's not broken, but that's what needs to happen to stop spam. Thankfully, our friends the Russian Mafia and the ever-growing number of Windows zombie machines are making spam levels so great that, sometime soon, spam will represent such a large percentage of e-mail traffic that fixing SMTP will be necessary, not just something mail admins like myself wish for.

    BTW, does anybody have a good figure on what percentage of all e-mail spam represents these days? I'm talking about *all* traffic, too, not just what ends up in peoples' Inboxes after all the filtering going on out there has done its job.
  • by fembots ( 753724 ) on Thursday March 11, 2004 @11:19PM (#8539335) Homepage
    The linked article is part 2, Part 1 [securityfocus.com] is here.
  • by snakecoder ( 235259 ) on Thursday March 11, 2004 @11:21PM (#8539342)
    I am not recommending mailblocks, I belive there is a sourceforge project called TMDA which does the same thing. Having said that, my experience comes from using mailblocks:

    -cr deadlock: This does not exist because when you e-mail someone in a challenge and response system, it automatically assumes they are friendly. So if they have a challenge and response system, it will make it into your inbox, because you e-mailed them first

    -automated systems He is correct here. Personally I hate when friends submit my e-mail to third parties without my consent so I do not mind missing these e-mails. I have caught a few while searching my pending folder, and inform my friends I rather have them e-mail me directly.

    -interpretation challenge I believe he is wrong here because of a fundamental issue. When dealing with spam filters, the onus of working out refinements is left to the spamee, to make sure they filter out all spam. If a spammer adds a new technique, they get around the filter. With challenge systems, you have a few methods waiting as backup. When a spammer finally figures out how to read your words through AI, you simply change the challenge system and they are back to square 1 in trying to figure out how to defeat. As long as you have a few methods waiting in the wings, the spammers can easily be defeated, and have huge amounts of work to do.
    if you doubt this, write an AI system to defeat hotmails gifs. Now what if the next day instead of showing a word, they show you a picture of 3 fire trucks and 2 police cars and ask you how many police cars are in the picture, etc ...

    • by vanyel ( 28049 ) * on Thursday March 11, 2004 @11:44PM (#8539494) Journal
      He's also wrong about using certificates:

      1. certs don't require a connection to the cert authority. You get their CA cert ahead of time and then trust certs signed by it.

      2. Responsible CA's won't grant certs to spammers because people will stop trusting their certs

      3. If spam does come in signed, then they are trackable and the backlash will quickly shut them down.
  • by Ungrounded Lightning ( 62228 ) on Thursday March 11, 2004 @11:21PM (#8539344) Journal
    Was out to lunch with three colleagues today and the subject of anti-spam measures came up.

    I managed to appall the one from Berkeley by suggesting that the most practical solution was probably a moderate-size bomb.

    B-)

    But seriously:

    In an arms race, weapons eventually defeat armor. Spam will continue until two real-world things are BOTH brought to bear on spammers:

    - Economics
    - Muscle

    If a governmental solution applying both is not forthcoming soon, I predict that there WILL be vigilantism.

    In fact we're already seeing it.

    For instance: Subscribing the Detroit area spammer and his lawyer to enough real-world junkmail lists to bury his bills and other US Main correspondence in several daily truckloads of catalogues and other solicitations.

    Soon to come: Retaliatory information-war software directed at DDoSer / spammer zombi-net machines. (As discussed in a recent Slashdot article [slashdot.org].)
    • Muscle never solved any argument - it just stopped one side from arguing. The only way to win an argument is to win the other person to your side.

      Basically, to get the spammer to stop spamming, stop people buying their product. It's legal, ethical and will stop spam in seconds. Instigate laws that outlaws spam as a method of selling products. Any company found trading via spam can be brought before a court. The beauty with that system is the company has to be reachable via the email somehow (otherwise

  • by cluge ( 114877 ) on Thursday March 11, 2004 @11:23PM (#8539354) Homepage
    **note location of tongue**
    Of all the odd places to find anti-spam technology, was this killer solution in WalMart. Yep, it turns out they have a remarkable tool that convinces spammers to stop spamming! I was AMAZED. This tool usually only has to be applied once, and the affect lasts for years. It doesn't require updating or re-installation. I was also suprised to find these very same tools in other places, like sears, and even in a "sneaker" store. What is this tool you ask? An aluminem baseball bat. It seems sadly though that there is a law protecting spammers. I believe useing this AWESOME anti spam technology falls under something called assault There is hope that exceptions for spammers could be provided for in a constitutional amendment!
    **note location of cheek**

    AngryPeopleRule [angrypeoplerule.com]
  • by Anonymous Coward
    One "solution" which seems to be missing from this article is the "verify each stage" solution. You know, close down all open relays and implement a C-R system between the mail client and the server (password authenticaton to send?) and perhaps between servers too (a public-key challenge before transfers between servers, e-mail transferred in bulk after said challenge for speed reasons). The idea being not so much to make spam disappear, but to make all e-mail clearly and easily traceable so that no spamm
  • by powerpuffgirls ( 758362 ) on Thursday March 11, 2004 @11:32PM (#8539413)
    As stated in the article's summary, the main problem with most spam-filter is the need for constant maintenance. We need a solution that requires ZERO maintenance by the joe-users, and yet cost-effective enough to implement.

    My ISP seems to have a so-called "Watch Dog" spam filter, where they actually hire people to read spams and filter them manually, that's probably the most effective way to filter spam, but I wonder if it is cost-effective though.
  • Do not call ... (Score:5, Interesting)

    by Ephboy ( 761440 ) on Thursday March 11, 2004 @11:35PM (#8539434)
    Prior to this October, telemarketing calls were a national scourge. Amazingly, since we signed up for the Do-Not-Call list, we've only received 2 illegal calls. I'm rather surprised, in fact, at the relatively uniform acquiescing to this law. While spam, coming from all corners of the earth and is more anonymous, will be harder to enforce, some law with real teeth may be a good start.
    • A do not spam list would just be a big list for spammers to use as a source for who to mail. You can't hide the list with hashes.

      Most spams are already illegal, con games, selling prescription drugs etc. They are not scared of a little do not spam list. The do-not-call list stopped businesses that wanted to stay legit.

      Instead, sign up for the do not spam list (I have an infinite number of email addresses so it may take me some time to do so) and you will just get more spam, I am pretty sure.
    • Re:Do not call ... (Score:3, Insightful)

      by mabu ( 178417 )
      There are a few problems with your comparison:

      * It's a lot easier to jack into the Internet than it is to get a phone line

      * It's more expensive to perform telemarketing than cybermarketing; you have to pay people and you're not nearly as anonymous - there are costs in launching telemarketing efforts, whereas with spamming, all you have to do now is jack into a network or open proxy and unload your spam.

      A spam do-not-e-mail list won't work, because at the present time, the spammers can hide much more effe
    • Re:Do not call ... (Score:3, Insightful)

      by dave420 ( 699308 )
      The problem is, it's expensive to call from outside the US, and easily traced. Those two problems alone means it's next-to-impossible for a company to make illegal telemarketing calls to the states. As soon as they did, the complaints reaching the telco would make them track down the telemarketers, and at least stop routing their calls. The cost of international calling also means the percentage of callers who purchase their products has to be highter, meaning slimmer profit margins. That must be a very
  • I've been using SpamBayes for about 4 months now, plugged into my outlook (Don't ask) with a very high degree of success... It seems to me that if email is to remain a free(as in beer) and open part of internet infrastructure, and in fact our lives, that in-box solutions are the only way to go.

    The many problems with challenge solutions and the like meen any hope of seamless introduction and integration into existing business processes is not likely, and seem to keep pointing us back to the inbox for our f
  • Reputations (Score:5, Interesting)

    by grotgrot ( 451123 ) on Thursday March 11, 2004 @11:44PM (#8539490)
    The only thing that will work in the end is some sort of distributed reputation management system. To a certain extent that is what RBLs do, except they are on or off. SpamAssassin does offer shades of grey to the RBLs (differening weights to each one).

    To a certain extent this is what we already do in real life. We 'judge a book by its cover' as a first pass (for example people will often walk past a beggar in the street completely ignoring them) and then include other factors. How polite they appear, where they are from, recommendations from friends etc

    All other mechanisms suffer from a determined spammer being able to get around them as the article pointed out. Any mechanism that prevents some spammers makes things more lucrative for the rest.
    • Re:Reputations (Score:3, Interesting)

      by chriskenrick ( 89693 )
      Have you checked out WPBL, as linked in my sig?

      It basically attempts to classify IPs as primarily spam senders or not according to the ratio of spam/non spam they send.

      The more signed up, the merrier, so feel free to check it out.
    • Re:Reputations (Score:5, Interesting)

      by leviramsey ( 248057 ) * on Friday March 12, 2004 @01:27AM (#8540237) Journal

      I just devised a setup that might be interesting:

      • Users (sysadmins) of the blacklist submit two lists of IPs, good (non-spammers) or bad (spammers).
      • When a server receives a mail, it checks with the list to see on which lists the IP appears as good and on which it appears as bad.
      • The user marks the mail as ham or as spam. A Bayesian algorithm then determines which lists are trustworthy for marking spam hosts.
      • Filters could then /dev/null mail based on this bayesian score

      The idea is essentially to allow a collaboratively developed decentralized blacklist and whitelist to develop. Spammers will either submit the IPs they use to this list or not submit them; if they do submit them, then a "good" report from them will eventually be taken as a strong sign of spamminess. If they don't, then nothing happens, but presumably "trustworthy" blacklists would list them.

      Thus, a user in Brazil, where they would be receiving lots of legit mail from Brazilian IPs would not find a blacklist that listed all of LACNIC to be a strong indicator of spamminess. The effects of blacklisters who maliciously put enemies into their blacklist would also be reduced, if not eliminated.

      A suggested implementation detail on the blocking would be to make it random; that is to say that 100% of the mail with a 100% probability of being spam gets dropped, 99% of mail with a 99% probability gets dropped, 97% of mail with a 98% probability gets dropped, 94% of mail with a 97% probability gets dropped, 90% of mail with a 96% probability gets dropped, etc. according to this function:

      d(p) = d(p+1)*p/100, where d(100) = 100, and 73<=p<=100

      This would allow for a degree of "retraining" in the event of false positives (since a /dev/null'd mail cannot be retrained from!).

  • What works for me (Score:3, Informative)

    by gregwbrooks ( 512319 ) * <gregb AT west-third DOT net> on Thursday March 11, 2004 @11:48PM (#8539517)
    I know not everyone can run their own mail server*, but here's what has reduced my inbox spam to about 1 miss out of every 400-500 messages:
    • I run SpamAssassin and ClamAV on my server and check all inbound mail against a series of RBL lists; and
    • All mail POP'd into my Outlook (yeah, I gotta use it - no flames!) gets checked using the free-and-excellent SpamBayes.
    Works in the bakcground with damn-near zero false positives, and doesn't require Microsoft-pushed e-mail postage, changes in the e-mail RFCs or anything else.

    The tools are out there. If you use them, spam isn't nearly as much of an issue as the press makes it out to be.

    *Well not everyone in the Real World anyway -- here on /. we all run our own boxes, right?


  • by Gadzinka ( 256729 ) <rrw@hell.pl> on Thursday March 11, 2004 @11:51PM (#8539541) Journal
    When using certificates, such as X.509 or TLS, some type of certificate authority must be available. Unfortunately, if the certificates are stored in DNS then the private keys must be available for validation. (And if a spammer has access to the private keys, then they can generate valid public keys.)

    Someone, either me or the author of the article is on crack. I was under the impression that one does not have to have private key in order to validate the signature.

    Lets assume that there are CRT records that store SSL certificate for clients allowed to send mail on the behalf of the domain.
    example.com. IN CRT "Certificate goes here"
    1. Client connects via SMTP-TLS session signed with Client Certificate.

    2. Client sends SMTP command:
      MAIL From: <example@example.com>
    3. Server checks CRT record for sender domain and looks if Client Certificate that signed the session is signed with this domain's certificate.

    4. If not, than reject the offer with:
      550 You don't have valid CERT for sending as @example.com
      end everybody's happy.


    Now somebody tell me, in which step one needs private key to verify certs?

    Robert
  • most effective (Score:5, Insightful)

    by mabu ( 178417 ) on Thursday March 11, 2004 @11:54PM (#8539557)
    Make no mistake...

    The most effective spam solution at this time is RBL blacklisting. Bottom line.

    When you take into account that the biggest problem of spamming is bandwidth consumption and network resources, there is NO better way than blacklisting spam sources and refusing to communicate with them.

    Services like Spamcop's RBL really piss off the spammers. All client-side filtering is counterproductive and ultimately useless as you constantly have to update the systems to catch new efforts on the part of spammers to thwart the filters. At least with RBLs, the spammers' connections are immediately refused as soon as they're ID'd.

    If you want to identify what is the most effective solutions, it's simple. Look at what pisses off the sleazebag spam community the most. That's relay blacklisting. They don't DDOS the moronic client-side filtering companies because the spammers know they're useless, and even if they're not, the spammers can't tell. What hurts them are when systems say, 'screw you spammer, (click)' and that's done via relay blacklisting.

    Why are spammers increasingly changing mail relays and pursuing open proxies? Because of RBLs. Even AOL uses RBLs (including Spamcop). All the major ISPs look at the RBLs because they are THE most effective way of stopping spam. And they're the only way to actually shut down the spammers.

    Forget client or server-side content-based filtering. They will NEVER work. RBLs are responsible for forcing spammers into corners of IP space, forcing them to deploy worms and viruses to infiltrate new IP space (which exposes them to more prosecution). RBLs ** WORK ** !
    • Re:most effective (Score:3, Informative)

      by Tripster ( 23407 )
      You are so right, I use a few on all my servers and they work, cbl.abuseat.org works wonders at cutting down on the trojan spam.

      I've also setup my own private RBL, any spam that makes it thru the public ones has the IP it originated from added with no hope of ever getting off it either since there is no contact info sent so spammers have no clue where the RBL is housed.

      Just this morning I was forwarded the dynamic ranged from Shaw Cable here in Canada, we were getting hammered by the infected fools there
      • Re:most effective (Score:4, Insightful)

        by mabu ( 178417 ) on Friday March 12, 2004 @12:39AM (#8539895)
        Amen.

        Shaw is a spam haven.

        Comcast is a spam haven.

        Virtually all IP space in Korea.

        When you start doing IPLOOKUPs of the spammers you begin to see a pattern of which ISPs don't have their shit together.

        Why did Comcast start cracking down on spammers? It was probably because admins like us stopped accepting mail from their business customers because they were embedded in the DSL IP space that spammers have compromised. Do you think Comcast gives a damn about spamming? No. But if you start making their IP space unuseable by legit companies, then their buttom line is hit.

        Blacklisting WORKS. Unless you run your own mail server, your opinion doesn't matter. Run your own server, deal with these sleazebags every single day, bombarding your systems with their crap, then talk to me about BS client-side filtering.
        • Re:most effective (Score:4, Informative)

          by Tripster ( 23407 ) on Friday March 12, 2004 @12:54AM (#8539995) Homepage
          Here ya go, this will help you keep out Shaw's residential customers ...

          24.64.0.0/13
          24.76.0.0/14
          24.80.0.0/13
          24.108 .0.0/16
          24.109.0.0/18
          24.109.64.0/19
          68.144.0.0 /13

          Those ranges are safe to block, they have other ranges for the static business clients.

          Of course another simply step the ISP can take is to block outgoing SMTP entirely for those ranges except to their own mail servers.
    • Re:most effective (Score:4, Informative)

      by Ragica ( 552891 ) on Friday March 12, 2004 @05:57AM (#8541471) Homepage
      Some would say RBLs work "too well". They have a fairly consistant history of accidentally abusing innocent parties. Is it the price to be paid for the overall protection? Depends on your point of view.

      We don't have that many clients using our mail server, but one noticed one day that mail to him to friends was bouncing. He reported this and we discovered that we were on SpamCop's RBL list.

      I did a quick audit of the mail server, fearing we'd been highjacked, but found no evidence anywhere of spam going out.

      Being generally sympathetic to RBLs I was eagre to get to the bottom of this, and cooporate with whatever needed to be done to prove our innocence.

      But i found the SpamCop web site to be extremely frustrating to find any information. I found some references stating that to refute being listed you must reply to the email that SpamCop sent you: I searched and searched but we recieved no mail from spamcop.

      As I spent a precious day trying to figure out what to do, as mysteriously as we'd been listed, our IP disappeared from spamcop's list.

      To this day I don't know what happened; but have a somewhat more bitter taste in my mouth regarding the arbitrary power of RBLs.

      (Though I still tend to more blame the system which blindly obeys a single RBL: I think SpamAssassin is more democratic in that it only assigns a probability, and an IP has to be on multiple block lists before it goes over a threshold. This gives spammers more lead time before they are blocked, but also prevents any single RBL from weilding absolute power... a sort of check-and-balance.)

  • SPF Anyone? (Score:4, Interesting)

    by ignoramus ( 544216 ) on Friday March 12, 2004 @12:06AM (#8539634) Homepage

    One proposed solution I would love to see getting more attention is SPF ("Sender Policy Framework"), which allows each domain admin to specify their email sending policy using existing infrastructure.

    See the SPF site [pobox.com] or read this month's Linux Journal [linuxjournal.com] to find out more.

    Executive summary of SPF: Just use DNS to specify where mail from your domain may originate from. If everyone used this, we could have domain blacklists that actually work.

    Do an "nslookup -type=txt psychogenic.com" to see an example entry. And if you manage any domains, please consider doing the same.

  • by Rayban ( 13436 ) on Friday March 12, 2004 @12:19AM (#8539722) Homepage
    A related note- the current Microsoft anti-spam solution, Email Caller ID [boycott-em...ler-id.org] is currently being boycotted.

  • by Alex_Ionescu ( 199153 ) on Friday March 12, 2004 @12:35AM (#8539856) Homepage
    The big problem with mail filters, as the article mentions, is that they need to be updated when new spam technologies appear... and there's also a lot of false positives... I gave SPAMfighter a try (from www.spamfighter.com) and although it was a bit worse at finding spam (At first), I never got any false positives. The way it works is that the "filters" are actually some kind of hash that users submit whenever they block or unblock an email (it analyses the whole content I think, not just the text). So if a new type of spam technique appears, the users will just block it. And unlike many other client-side plugins, it actually works on Outlook Express.

    Another one I recomment is Spambayes...but there's the problem with false positives. All the other ones I've tried are utter crap.

    Best regards,
    Alex Ionescu
    Relsoft Technologies
  • by mabu ( 178417 ) on Friday March 12, 2004 @12:48AM (#8539960)
    I have an interesting idea to force ISPs to crack down on spamming customers...

    This basically works only if the spamming ISP is from your country. Which is why blacklisting of foreign IPs is still necessary.

    But for domestic ISPs who don't reign in spamming, someone should post the 800 numbers of ISPs that don't crack down on spamming. Put up a web site listing the 800 numbers of the ISPs that are top-ranked in harboring spammers. Most of them have 800 numbers.. if everyone calls these ISPs and complains, or at least takes up air time, it costs them money, and money seems to be the only thing that motivates these companies.

  • by sbaker ( 47485 ) on Friday March 12, 2004 @01:08AM (#8540100) Homepage
    I think we are attacking Spam from the wrong direction. Attempting to stem the flood of incoming spam is tough - everything about the identity of the incoming spam can be faked. However, we could alternatively attempt to prevent the replies going back the other way.

    There are two inevitable facts:

    1) In order for spamming to be worth someone's effort, they have to somehow get money from people. If NOBODY replied to them, then spamming would stop overnight.

    2) Something in the content of the Spam must be real - a reply address - a web site, a phone number or something. Block traffic to that location and the spammer gets no money and dies.

    Hence, I think they may be vulnerable. Educating people not to reply to SPAM would help - it only takes a mere handful of people to respond to a SPAM to make it profitable - but if education could drop that handful to a mere one or two - then we could succeed in putting more spammers out of business simply by cutting their margins to the point where it wasn't worth the hassle.

    Where are the TV adverts: "Replying to Spam is Bad!"....we know that the morons who reply to spam are suckers for advertising - they are as likely to believe a well targetted TV advert as a crappy email shot. If Spam is costing the ISP's as much as they say it does - then funding some TV ads might not be impossible.

    What if we made it illegal to respond to an emailed advertisement that was not clearly labelled as such, that would help to deter people from responding. Such a law would be next to impossible to enforce - but we are trying to deter the gullible here - so it might not have to be enforcable - just very well advertised.

    Since every SPAM has to either advertise a product that you can buy from somewhere - or direct you to a postal address, a phone number or a web site - then that route for getting money back to the spammer could be blocked.

    The return route has to be genuine. There is no point in them sending you a fake phone number or faked web address. If the phone companies (who are often also ISP's - or have at least some cause to want to kill spam) were to block calls to and from phone numbers that were seen in Spam - then the reverse route for the money would be curtailed. Whilst you can afford to change the aparrent source of your spam and fake those addresses for each new mail shot, you can't change your phone number for every couple of dozen orders you take. Similar considerations apply to web sites and postal addresses.

    If it was required for credit card companies not to transfer money to businesses that employed spammers to push their goods - then that would also help some.

    It wouldn't take many people to deliberately reply to spammers - to lead them on into thinking you want their product - to send them fake cheques or bogus credit card numbers. If they only get a handful of positive responses per million spams - then it wouldn't take more than a few determined people per million (eg ISP employees) to clutter up the the spammer's cash collection mechanism to the point where it's too much hassle for him to sort out the real orders from the bogus ones.

    I don't pretend to have all of the answers - but there seems to be far too little creative thinking along these lines.
    • Sorry Won't Work (Score:3, Insightful)

      by Battle_Ratt ( 524562 )
      Two words, Joe job.

      Any one of these "solutions" can be exploited to hurt legitimate business. Simply send out a spam campaign on behalf of XYZ company with legitimate credentials, and watch the chaos and disaster at the company as phone lines are cut, merchant accounts cancelled, etc.

      Spammers have already done all sorts of illegal activity to continue their frauds, what's one more to cut the knees out on the competition, or the competition of their customers.
  • by Muerte23 ( 178626 ) on Friday March 12, 2004 @03:04AM (#8540747) Journal
    So what about this:

    You start with a central certificate authority. I know, I know, bottlenecks. But you only need them to issue keys to (or sign the keys of) about 100 (or 1000?) servers. The signing authority has to be central, but the *revocation* authority does not. That's the key here.

    So those servers can sign the keys of 1000 servers of their own and so on.

    So my mail server tries to send your server an email. Your server checks if my key is signed by someone who is signed by someone who is signed by the CA. It also checks against its nightly downloaded revocation list. If everything is good, the mail goes through. Very little processor time, and very little bandwidth.

    Suppose someone issues a key to a dishonest server? Well, enough people issue complaints and the issuer's key gets revoked. Or some automatied spamassasin type thing that auto-revokes the key after enough spams get spotted. No more spam from them, and maybe next time the admins are more careful.

    This totally eliminates (i think) the threat of zombie SMTP servers on DSL and open relays.

    Then the ball is in the park of the ISPs and server hosters (those with their own email keys) to keep spammers out locally. SLL login for SMTP? sure. C/R for each email sent through them? Whatever. Send anything over their open relay? Not for long.

    Sounds reasonable to me. It makes it easier for the end user I think, and minimizes spam.

    Any suggestions?

    Muerte
    This totally eliminates zombie SMTP servers on cable lines spewing spam.
  • by Tamor ( 604545 ) on Friday March 12, 2004 @04:50AM (#8541186)

    When I took a look at the first of these two articles which examines end-user anti-spam solutions I had to wonder if the writer had actually tried any of the technology or was relying purely on hearsay. For example:

    Spam senders and their bulk-mailing applications are not static -- they rapidly adapt around filters. For example, to counter word lists, spam senders randomize the spelling of words ("viagra", "V1agra", "\/iaagra"). Hash-busters (sequences of random characters that differ in each email) were created for bypassing hash filters. And the currently popular Bayesian filters are being bypassed by the inclusion of random words and sentences. Most spam filters are only effective for a few weeks at best

    This is the view of someone who clearly has no experience at all with a high-quality Bayesian classifier like POPFile [sourceforge.net]. I've been using this program for almost a year and it most certainly has not been defeated by random words or spelling. Many of the tokens that trip email as being spam are actually unusual items in the headers or sales terminology. After a very brief training period POPFile has continued to provide me with excellent protection from spam and malicious email, with only a few false negatives to retrain on.

    If that's not a good end-user anti-spam solution then I don't know what is.

  • Next gen SMTP (Score:3, Interesting)

    by bakreule ( 95098 ) <<moc.oohay> <ta> <neluerkb>> on Friday March 12, 2004 @05:16AM (#8541257) Homepage
    Maybe I'm missing something, but the article never seems to mention anything about changing the SMTP spec itself. It talks about how it's flawed, but then summarizes new ideas to add on top of SMTP (crypto, C/R, etc). It doesn't ever suggest CHANGING the underlying protocol. History, with IPv6, is showing that the industry doesn't change without being prodded. I don't think this would be the case, however, with any new versions of SMTP.

    From what I understand, rewritting SMTP to fix most (if not all) of the spam loopholes is no problem (Am I seriously glossing over some big details here?). The trouble is that people want a 100% effective, immediatly pluggable solution. If new email clients support both the old and new smtp protocols, and use the new one as a default, it will be just a matter of time before there's a critical mass of clients and ISPs that are using the new one.

    Once this critical mass is reached, boom, everyone is required to use the new protocol, and any email that uses the old one is immediately dumped way upstream, before it can start hogging bandwidth everywhere.

    I'm aware that if my idea is so great, how come it hasn't been implemented?? Feel free to pick holes....

  • by mwood ( 25379 ) on Friday March 12, 2004 @10:25AM (#8542722)
    Because a 100% UCE-free Internet is going to be darned expensive and rather less usable. At what level of filtration does the next incremental improvement begin to cost more than simply being satisfied with what you've accomplished?

    I've tuned up a pretty good stack of procmail recipes, set my MTA to refuse unverifiable senders and obvious forgeries, subscribed to a couple of decent blacklists, and trimmed things down to a level I find tolerable. And thus I'm disinclined to do much more.

    Through a bit of mental jiu-jitsu I've come to regard the remaining trickle as a moderately challenging puzzle provided to me for free, and a source of amusement first thing in the morning as I make the initial pass through my inbox to weed out the junk unread. I spend a few moments each week enjoying the logs that Exim and my procmail recipes write to show me what they've strained out. Once you push the S/N ratio high enough to get some work done, it's possible to turn the rest of the N into fun if you have the right attitude.

    Oh, there are other things I'd like to do. If most people would crypto-sign their mail, I'd set up recipes to toss unsigned messages, and play around with hacking signature and CA blacklists into my filters to get rid of the more brazen attempts. I'd like to try out some recognizers that would be mighty hard to write as regular expressions. I'd like to tinker with external filters that rip out some of the common obfuscation techniques before procmail even sees the message. But for now I can live without these.

    If you're thinking, "but it's costing my company money to deliver this junk," ask yourself how much it's costing your company to have you sitting around trying to find ways to remove the last little morsel of UCE when you could be crafting new competitive advantages for the firm, or at least dealing with the *other* stuff that gets in people's way and which is not actively working against you.
  • by eric76 ( 679787 ) on Friday March 12, 2004 @12:19PM (#8543688)
    What I'd rather see is every e-mail transmitted be digitally signed.

    When the e-mail client is set up, it could generate a GPG key set to use for signing the e-mail.

    The recipient's computer, if verification is required, could send a standardized e-mail back to the sender's computer asking for the sender's public GPG key. If and when it arrives, check the digital signature and either deliver the e-mail or /dev/null it.

    By caching the keys, you really wouldn't even have to have a white list. Or, more accurately, the white list would be by digital signature rather than the Reply-to or From address.

    This could even be implemented on the server itself and with better results.

    When adding the user, create a GPG key for that user on the server.

    Require authorization for each incoming e-mail that is to be relayed. Digitally sign the e-mail with that key if it sender has not already done so on the client side.

    The recipient's server or the recipient's client may then request the public key. If the public key used was the server's key used on behalf of the client, then return that. Otherwise, send the request on to the client for his public key.

    Of course, this could be abused, but then the e-mail addresses have to be real and could then be used for blocking.

    The traffic itself should be relatively small. The data portion of the request would just identify the public key desired based on what was used on the message (sender's key maintained by the server or the sender's key maintained by the client) and the data portion of the response would contain that id and the key.

    For those who use multiple e-mail clients, allowing the server to handle the key would be preferable since the multiple clients would generally use different keys.

    If the cached public key for that user failed, a request for the public key would be sent in case the public key had been changed. If the new key was different, the cached public key could be expired after a set period of time (in case there were any yet to be delivered e-mails from the old key around) and the new public key added to the cache.

    You'd have the benefits of challenge-response systems without the users being annoyed.

    One problem with challenge response systems is with mailing lists. With this method, there would be no problem since the mailing list's server would react to requests for the public key by providing it.

    This would also take care of the automated e-mail case, say when you place an order and the sender sends an e-mail telling you the order has been fulfilled.

"What man has done, man can aspire to do." -- Jerry Pournelle, about space flight

Working...