Spam Solutions from an Expert 420
Mod N writes "SecurityFocus has posted a nice survey of anti-spam technologies by spam expert Neal Krawetz, in which he delves deeply into the specifics and pitfalls of the numerous proposed solutions. Krawetz makes it obvious that securing the email infrastructure is a very complex problem that many of the current (simple) solutions can't solve alone."
Proof? (Score:5, Interesting)
Excuse me, what? Where's the proof? That's quite a brave statement to be making considering i've never seen this cracked, ever.
I challenge someone to find an automated response to C/R. [si20.com]
I did hear of a theory [slashdot.org] where C/R was being cracked by taking the C/R image, posting to a porn session, and letting a seeing person do the work. However, i've yet to witness this in practice. Show me the automated response to C/R that exists beyond a blog theory, and i'll believe. Until them, i hardly consider it "marketing hype".
Re:Proof? (Score:5, Insightful)
There's one billion people in India... (Score:5, Funny)
Only kidding (I think).
Re:There's one billion people in India... (Score:2, Insightful)
At the moment spammers are already paying people to send emails from home, obviously it is profitable enough to pay someone to do the dirty job for you.
As a result, if recepients are less defensive against spams in a C/R system, those slipped spams might get a greater response rate. And this is good news to spammers, and they might very well be able to afford to outsource to deal with C/R.
Dueling Challenges (Score:4, Insightful)
What I take issue with is this paragraph from the article:
This is leaving out a key feature of any decent challenge system... When Bill tries to send an email to Charlie in the first place, Charlie's email address is automatically added to Bill's whitelist. So Charlie's challenge, showing his address as its source, flies straight to Bill's Inbox without a hitch. If Bill were so arrogant as to think he could send email to someone not on his whitelist, then he deserves not to have his email go through.Re:Dueling Challenges (Score:5, Insightful)
When the mail goes out, Bill's system would record the Message-ID (and probably the recipient, but that could screw up on forwarders if you try for a hard match on the two) and then allow Charlie's C/R because it matches the whitelist.
CR deadlock (Score:4, Interesting)
Re:CR deadlock (Score:3, Interesting)
When Bob gives Alice his e-mail address, he could put Alice on his whitelist immediately, or have given Alice a password that would automatically get her past the screening process on the first try. If Bob was really interested in getting Alice to go out with him again, he could have sent a request through through whatever common friend or dating service first introduce
Re:Dueling Challenges (Score:4, Insightful)
Now all I need to do is know or guess anything on your whitelist (or have some means to automatically add something to your whitelist;).
Methinks all a CR system would do is add hassle to legitimate traffic and give the spammers an even easier time of it.
Re:Dueling Challenges (Score:3, Interesting)
It's like phoning the phone company to report that your phone is out of order.
It's like a backup system that works perfectly as long as you don't need it.
The from-address is where the email claims to be from. It should be easily forgeable. If I am using someone else's computer to send a quick note, I should be a
Re:Dueling Challenges (Score:3, Interesting)
challenge-response handling being outsourced (Score:4, Interesting)
I had a chat with a Veep that was hired on to a company I used to work at. Very down to earth guy, very friendly. We got to talking about spams and semi-legitimate emailings to customers, etc.
He had one very interesting tidbit; stick with me for a sec here. Most companies outsource their semi-legit stuff because they get reported as spammers and whatnot, or it bogs down their email server/network, etc. No surprise there- however, the interesting tidbit is that the outsourcing companies turn around and outsource to Indian firms for handling the bounces. There's literally a room full of people in India, sitting there answering those challenge/responses and updating the client's customer email list(unlike spammers, it really is in their best interests to minimize failed deliveries). It sounds "expensive", but it's not, considering how few people use challenge/response systems. Further- a reasonably smart human can get familiar with all the various systems quickly(an hour or two, I'd guess, tops) and probably process close to a message every few seconds with a client program set up to do that limited functionality smoothly. Best part- if your client does several mailings, unless the recipient goes in and removes you, you're clear for future emailings.
Re:Proof? (Score:5, Insightful)
Why? Because from: is forgeable, and viruses use other people's real addresses constantly. Every day, one of my 40 spam emails is a C/R email from someone that I've never heard of. Am I going to click the link and authorize my email address? Fuck no. But I'll never be able to send email to that person. I realize that's a *tiny* incidental, but it's still broken by design.
If your C/R system includes a solicitation to purchase said C/R system, you're a fucking spammer. Fuck you.
Re: (Score:3, Insightful)
Oh, but the easiest defeat of C/R... (Score:3, Insightful)
What the spammers do is just download as many challenges as possible, solve them, and store the hashes in a database.
When the harvester goes out, it is likely to encounter many of the challenges a second time, and it already has the answer.
If it doesn't know it, it flags the spammer, who identifies it offline, adding it back in,
Re:Oh, but the easiest defeat of C/R... (Score:3, Insightful)
If this becomes a race between the "good guys" and the "bad guys", the bad guys have more incentive to get it right. Just like virus writers will buy anti-virus software, spammers will buy the C/R software. You don't attack your enemy's strengths, you attack his weaknesses, preferably ones he doesn't even know about.
Re:Proof? (Score:3, Informative)
Students at Berkeley have already beaten the C/R system setup by Yahoo! and with a selection of 191 different version of text obfuscation they were able to return a 92% success rate. In much more detailed images, with random background textures and overlaying text they were only able to achieve a 33% success rate but I am sure with time they would be able to do better.
In a paper [berkeley.edu] published by Greg Mori and Jitendra Malik they explain the method
Re:Proof? (Score:4, Interesting)
1) Get image. I followed your link and got given this image [duo-creative.com].
2) Pre-process. I loaded it into the GIMP and did Image->Mode->Greyscale, which yielded this image [duo-creative.com]. Then I did Layer->Colours->Threshold, which yielded this image [duo-creative.com].
3) Match characters. At this point, you have a monochrome image, in what appears to be a known font. The chars don't even appear to overlap, so a simple 1-for-1 match is achievable. Scan left-right, top-bottom until you see a 10x10 (or whatever) section with a black pixel. Scan down and right from that pixel until you see a character.
I don't have the time to code it up right now, but if someone wanted to pay me to do it, I'm pretty sure it's acheievable - not least because a whole bunch of the more difficult code is available for me to use under the GPL.
Re:Proof? (Score:3, Insightful)
Re:Proof? (Score:3, Interesting)
The point I was making is that, while noone has done it yet, there's no theoretical reason why it shouldn't be possible.
It's like saying "Oh, that mountain's to big, no one will ever climb it." -- If people are motivated enough, they can accomplish just about anything... and spammers seem clearly motivated.
Re:Proof? (Score:5, Funny)
I think you have a future in marketing.
Yes, of course... (Score:4, Insightful)
Naturally we may be inclined to believe that this grants us superiority to the computer. That, while stating some arbitrary facts taken from some textbook somewhere, a computer can never accomplish X objective.
Therein lies the fallacy. The computer does not identify that it is in an infinite loop, nor can it, because it is not given the benefit of looking at the actual code. If a compiler were designed to read into code for things like while(true) loops, which naturally could result in infinite loops, then already you would be cutting back on the instances of these problems.
Determining if there is an infinite loop requires a conscious understanding of the code itself, which is no trivial matter. It is not, however, something that could be deemed impossible.
As with all fields of science, there will be those who say "Well, I haven't seen it yet, so it will never happen"... but skeptics are everywhere, and the presence of skepticism is hardly a measure of credibility... rather, a measure of how pious certain peoples assumptions are.
Solutions are always found in math, and never in magic. Don't underestimate the computer, and more importantly, don't underestimate your own brain. You don't perceive things the way you do 'just because'... and that's what's so exciting.
Re:Proof? (Score:5, Insightful)
In the end i think it is inevitable that software will eventually break this system, but as soon as it does, there will be another system in place. . . .
Re:Proof? (Score:5, Interesting)
The best defenses involve several lines so that when the first gets beaten, another one tightens up against whatever the first line learned from its defeat...
Re:Proof? (Score:3, Interesting)
Then again, that becomes less reliable and more ambiguous. You could keep on pushing for more difficult to interpret puzzles, and the technology to interpret it can just push back. People will just end up getting annoyed by it.
Sooner or later that idea runs out of gas... it's only a temporary so
Re:Proof? (Score:3, Insightful)
Unfortunately, this is one area in which the spam gangs already have a leg up on the rest of us. Trojaned machines provide them with a distributed set of machines (and hence, distributed set of IPs) from wh
Re:Proof? (Score:3, Funny)
Re:What about typos? (Score:3, Informative)
Many spammers who are trying to beat a Bayes filter are either using misspellings of their most spammy words, or large lists of random dictionary words to try to lower their score. However, a coutermeasure to that would be to factor in the results of a spell che
Of course there is (Score:5, Informative)
So, just because a human can do it, doesn't mean a computer can. I don't know about any of these image schemes, I've never played with it. However if you make it sufficiently hard for it to recognise characters form background, and one character form another, it's screwed. Computers have trouble with fuzzy and incomplete information that humans are so good with.
Also remember it needs to be feasable to do in a reasonable time. Maybe you develop some whiz-bang image recog program that can take amazingly distorted text and figure it out. If it takes 5 minutes to process a box, it does you no good anyways, too much time to be worth it for this use.
Re:Of course there is (Score:4, Insightful)
Not really. Since spammers are now into the illegal business of commandeering people's computers using viruses and trojans, it would be an easy step to have them process distorted images and feed the results back to some web site.
It wouldn't even take that many computers to send a lot of spam out even at 5 minutes per. Say you want to send 1 million emails. 1,000,000 / 5 minutes = 138 days. If you have 138 computers, you can send out 1 million spams per day.
Nothing really works 100% (Score:2, Insightful)
Maybe whitelisting with custom mail headers to prove identity
Re:Nothing really works 100% (Score:3, Interesting)
Now, how do you handle the situation where spammers are generating thousands of keys? Well, the spammers are forced to waste some cpu time, but that's trival for them. They're also polluting key registries with their garbage - that's a big negative.
However, in terms of trustworthiness, the spammer probably h
Re:Nothing really works 100% (Score:3, Informative)
I created a C/R anti-spam system [scottonwriting.net] myself, but gave up on it and turned to Spambayes [sourceforge.net] for two main reasons:
1.) I was losing challenges in others' spam filters
2.) I would still get emails from whitelisted folks when they were infected with an email worm.
If you're interested, I blogged about my switch from
Re:Nothing really works 100% (Score:2, Informative)
Oh Well (Score:5, Funny)
Re:Oh Well (Score:5, Insightful)
The Chinese government will probably solve any internal spam problem pretty quickly.
I mean, if you start by shooting all convicted spammers, the profession tends to stop attracting replacement members.
Don't forget SMTP+AUTH (Score:5, Informative)
Good overview, all things considered. I would like to add to one of his conclusions (from part 1):
This conclusion is correct, but why is this considered a stopping point? Mail admins-- get off your collective butts and add encryption and authentication to your mail servers! The author also forgot to mention that server side certificates are not necessary for SMTP, SMTP+AUTH addresses this quite nicely.Note that such measures are not necessary for most users. Home users that use their ISP's mail server don't have to implement any of this, since the ISP can already account for the user. Let us not forget that "most users" do not have the e-mail needs that many Slashdot readers do. For those needing roaming access and multiple addresses, use IMAPS and SMTP+SSL+AUTH.
dont forget ... (Score:4, Interesting)
block return-icmp (8) in proto tcp from 24.76.0.0/14 to any port = 25
block return-icmp (3) in proto tcp from 81.208.64.0/18 to any port = 25
block return-icmp (4) in proto tcp from 163.121.163.0/22 to any port = 25
block return-icmp (4) in proto tcp from 82.77.83.0/24 to any port = 25
block return-icmp (4) in proto tcp from 61.247.224.0/19 to any port = 25
block return-icmp (4) in proto tcp from 217.132.0.0/17 to any port = 25
block return-icmp (4) in proto tcp from 62.103.204.32/27 to any port = 25
block return-icmp (4) in proto tcp from 210.111.224.0/17 to any port = 25
block return-icmp (4) in proto tcp from 144.135.0.0/8 to any port = 25
block return-icmp (4) in proto tcp from 195.166.224.0/18 to any port = 25
block return-icmp (4) in proto tcp from 61.228.0.0/8 to any port = 25
block return-icmp (4) in proto tcp from 207.144.229.0/24 to any port = 25
block return-icmp (4) in proto tcp from 193.252.22.160/28 to any port = 25
block return-icmp (4) in proto tcp from 200.0.0.0/8 to any port = 25
block return-icmp (4) in proto tcp from 209.202.192.0/18 to any port = 25
block return-icmp (4) in proto tcp from 83.32.0.0/8 to any port = 25
block return-icmp (4) in proto tcp from 68.38.64.0/8 to any port = 25
block return-icmp (4) in proto tcp from 219.240.0.0/10 to any port = 25
block return-icmp (4) in proto tcp from 195.57.218.0/25 to any port = 25
block return-icmp (4) in proto tcp from 129.79.245.98 to any port = 25
block return-icmp (4) in proto tcp from 24.150.0.0/19 to any port = 25
block return-icmp (4) in proto tcp from 24.205.28.0/21 to any port = 25
block return-icmp (4) in proto tcp from 220.116.0.0/8 to any port = 25
block return-icmp (4) in proto tcp from 200.128.0.0/9 to any port = 25
block return-icmp (4) in proto tcp from 212.81.64.0/17 to any port = 25
block return-icmp (4) in proto tcp from 32.10.58.0/19 to any port = 25
block return-icmp (4) in proto tcp from 210.183.110.0/20 to any port = 25
block return-icmp (4) in proto tcp from 134.196.0.0/16 to any port = 25
block return-icmp (4) in proto tcp from 24.60.88.0/23 to any port = 25
block return-icmp (3) in proto tcp from 24.190.8.0/24 to any port = 25
block return-icmp (2) in proto tcp from 24.98.77.0/23 to any port = 25
block return-icmp (2) in proto tcp from 24.173.29.0/23 to any port = 25
block return-icmp (2) in proto tcp from 205.206.176.0/23 to any port = 25
block return-icmp (2) in proto tcp from 172.128.0.0/10 to any port = 25
block return-icmp (2) in proto tcp from 200.171.99.0/24 to any port = 25
block return-icmp (2) in proto tcp from 200.171.97.0/22 to any port = 25
block return-icmp (2) in proto udp from 200.171.97.0/22 to any port = 25
block return-icmp (2) in proto tcp from 68.62.80.128/25 to any port = 25
block return-icmp (2) in proto udp from 68.62.80.128/25 to any port = 25
block return-icmp (2) in proto tcp from 218.76.0.0/17 to any port = 25
block return-icmp (2) in proto udp from 218.76.0.0/17 to any port = 25
Re:Don't forget SMTP+AUTH (Score:2)
TCP/IP is *flawed* in that it allows you to fake your IP address, but why hasn't more (all?) networks not allow for packets that fake outside of their subnet? Why don't mail servers authorize their users?
The net allows for anonymity only if you allow it. You can always check whom you're connect to at your link. If t
Re:Don't forget SMTP+AUTH (Score:3, Insightful)
mail is likewise not flawed; It is fairly hard to find an open relay these days; it is all-but-impossible to find one that doesn't put your IP address in the headers. That's your _REAL_ ip address. The one that ends up in RBL's so nobody accepts your mail any more.
The big flaw is home users; they keep getting pwn3d. And
Cut Your Junk Mail By 50% !!! (Score:5, Funny)
Re:Cut Your Junk Mail By 50% !!! (Score:5, Funny)
Solution: Stop Spam at the Source (Score:5, Insightful)
Why has spam grown to what it is today? It is an undeniably effective means of cheap marketing. What we need to do is come up with a way to stop this not on our end, but by looking at as a social problem or making it non-worthwhile to the spammers. If nobody ever responded to spam, spammer wouldn't bother.
Another partial solution (Score:3, Insightful)
2) Get media outlets to run them for free as public service ads.
Yes, I know this isn't a 100% solution. However, it is relatively low cost, and requires no new laws, software upgrades, or Internet standards.
Deterrents (Score:4, Insightful)
I don't know about anyone else, but I'm pretty sure I'm not alone in this. I have, at times, felt utterly enraged at all the spam flying about and further all of the innocent and naive people that are being abused by all of this.
I know if I feel violent internally, then surely there are those with less self-control out there who will eventually act on his or her rage... perhaps the parent of a child afflicted with porn spam?
I think if two or three spammers are attacked physically, it might give them pause. Frankly, I'm amazed it hasn't happened.
Re:Deterrents (Score:4, Insightful)
Re:Deterrents (Score:2, Interesting)
Re:Deterrents (Score:3, Informative)
I'm surprised you haven't heard about it either. Some senile twit that got defrauded by a Nigerian "409" scam email figured that all Nigerians were in on the scam, or something, and killed a Nigerian diplomat. [wired.com]
Obviously, not what you were talking about: it was fraud more than spam, and the spammer didn't suffer, but... that's certainly violence resulting from spam affliction. (Also, note from
Open Relays (Score:4, Interesting)
Re:Open Relays (Score:3, Informative)
The year 2000 called, they miss your opinions.
In other words, your data is so out of date as to be positively misleading.
Open relays are dead. Open proxies are so 2003.
All the cool kids are using virus distributed trojans these days, some of 'em proxies, some dedicated spamware.
Interview with a spammer (Score:4, Interesting)
Oddly enough the spammers name was "Fagin", as in the Oliver Twist villain, and he was born with that name.
Let's use the Patriot Act for the benefit of good (Score:5, Interesting)
white list / web of trust similar to PGP? (Score:3, Interesting)
1. Verify the identity of the sender, okay then, and the sender is then given the return request, and is notified that they will be allowed to send emails.
2. Deny the sender, and all their emails will be bounced back.
Yes, spoofing problems still exist, but this system could be expanded, and guess what, you only recieve email from people you want to, and the mail server acts at the first point of defense.
This would require more complex and smarter mail servers, but it would make the every day user's life so much more simple.
Good old fashioned riddles (Score:5, Interesting)
The form page records the IP address of the visitor along the with the question number they were given in a file named with the IP address. That number is never sent to the client. When they hit submit the file of their IP is opened, the question number is read in and the answer given by the user is compared to the stored answer. The file is then deleted and if the answer was correct the e-mail is sent. Otherwise it's not.
This forces my custom form to be used to be able to send the e-mails. And it's not possible to simply keep refreshing the submit page to keep sending the message.
And the challenge is in the form of old riddles and a couple new ones like "what's your favorite color?"
Things a bot would never get but that anyone who knows how to use Google can. Someone would have to program a custom bot with the answers in order to even attempt to spam. And even then since everything goes through my mail server nobody is going to sneak garbage past me for long and I know who your ISP is.
I also include a disclaimer with every e-mail. It'd be quite silly for me not to.
Ben
He's right, we're doomed (Score:3, Insightful)
This will never end (Score:4, Insightful)
Re:This will never end (Score:4, Insightful)
No other medium has this problem (not in my country anyway)
The only thing special about email is it uses a protocol that was designed with different goals to what is needed now (ie security) and switching is hard, so hard that instead we cop out and just bolt more shit onto SMTP.
A secure protocol with existing anti-spam technology in combination with legislation (which mostly exists already) is all that's required.
Hopefully Microsoft (Hotmail+Outlook+OE) will one day join Yahoo and a few others and together they'll have enough momentum to make the jump to a protocol designed for todays environment. Then SMTP email will go the way of usenet - ie you can still use it if you like, but most people won't have a clue what it is.
If the jump isn't made then email will become less and less useful until it is entirely replaced in our lives by a better (and spam free) communications medium. I'm guessing this will be instant messaging (we already use it more than email), and if I had to put money on the future I'd say the gradual death of email and its replacement by another medium is more likely than actually seeing people stop kicking a dead SMTP uphill and adopting a secure protocol.
Re:This will never end (Score:3, Insightful)
* The telephone does not have a spam problem.
I live in the US, and we *do*. Do you never get telemarketers?
My instant messanger does not have a spam problem (it used to but they fixed it).
IM systems do. The only reason that problems aren't worse than one might expect is that it's easier to pick up peple blasting out masses of messages because everything in centralized. Centralized systems have their own associated problems (easy monit
Fix SMTP! (Score:5, Interesting)
BTW, does anybody have a good figure on what percentage of all e-mail spam represents these days? I'm talking about *all* traffic, too, not just what ends up in peoples' Inboxes after all the filtering going on out there has done its job.
More details in Part 1 (Score:5, Informative)
Having experience, I can answer 1.2.1 (Score:5, Interesting)
-cr deadlock: This does not exist because when you e-mail someone in a challenge and response system, it automatically assumes they are friendly. So if they have a challenge and response system, it will make it into your inbox, because you e-mailed them first
-automated systems He is correct here. Personally I hate when friends submit my e-mail to third parties without my consent so I do not mind missing these e-mails. I have caught a few while searching my pending folder, and inform my friends I rather have them e-mail me directly.
-interpretation challenge I believe he is wrong here because of a fundamental issue. When dealing with spam filters, the onus of working out refinements is left to the spamee, to make sure they filter out all spam. If a spammer adds a new technique, they get around the filter. With challenge systems, you have a few methods waiting as backup. When a spammer finally figures out how to read your words through AI, you simply change the challenge system and they are back to square 1 in trying to figure out how to defeat. As long as you have a few methods waiting in the wings, the spammers can easily be defeated, and have huge amounts of work to do.
if you doubt this, write an AI system to defeat hotmails gifs. Now what if the next day instead of showing a word, they show you a picture of 3 fire trucks and 2 police cars and ask you how many police cars are in the picture, etc
Re:Having experience, I can answer 1.2.1 (Score:4, Interesting)
1. certs don't require a connection to the cert authority. You get their CA cert ahead of time and then trust certs signed by it.
2. Responsible CA's won't grant certs to spammers because people will stop trusting their certs
3. If spam does come in signed, then they are trackable and the backlash will quickly shut them down.
Re:Having experience, I can answer 1.2.1 (Score:3, Insightful)
Requiring certs would spell the end of anonymous mail, but spam has already done that, and the Beagle virus has shown another reason why everyone (ISPs in particular in this case) should digitally
I managed to appall a colleague today... (Score:5, Interesting)
I managed to appall the one from Berkeley by suggesting that the most practical solution was probably a moderate-size bomb.
B-)
But seriously:
In an arms race, weapons eventually defeat armor. Spam will continue until two real-world things are BOTH brought to bear on spammers:
- Economics
- Muscle
If a governmental solution applying both is not forthcoming soon, I predict that there WILL be vigilantism.
In fact we're already seeing it.
For instance: Subscribing the Detroit area spammer and his lawyer to enough real-world junkmail lists to bury his bills and other US Main correspondence in several daily truckloads of catalogues and other solicitations.
Soon to come: Retaliatory information-war software directed at DDoSer / spammer zombi-net machines. (As discussed in a recent Slashdot article [slashdot.org].)
Re:I managed to appall a colleague today... (Score:3, Insightful)
Basically, to get the spammer to stop spamming, stop people buying their product. It's legal, ethical and will stop spam in seconds. Instigate laws that outlaws spam as a method of selling products. Any company found trading via spam can be brought before a court. The beauty with that system is the company has to be reachable via the email somehow (otherwise
Re:I managed to appall a colleague today... (Score:3, Insightful)
I'd give even odds that if you try the "get back and them with the same strategy" you can just as easily end up on the receiving end of punishment by the authorities as them, probably sooner.
Newest anti spam technology (Score:3, Funny)
Of all the odd places to find anti-spam technology, was this killer solution in WalMart. Yep, it turns out they have a remarkable tool that convinces spammers to stop spamming! I was AMAZED. This tool usually only has to be applied once, and the affect lasts for years. It doesn't require updating or re-installation. I was also suprised to find these very same tools in other places, like sears, and even in a "sneaker" store. What is this tool you ask? An aluminem baseball bat. It seems sadly though that there is a law protecting spammers. I believe useing this AWESOME anti spam technology falls under something called assault There is hope that exceptions for spammers could be provided for in a constitutional amendment!
**note location of cheek**
AngryPeopleRule [angrypeoplerule.com]
Missing from the article? (Score:2, Interesting)
Maintenace the problem (Score:4, Interesting)
My ISP seems to have a so-called "Watch Dog" spam filter, where they actually hire people to read spams and filter them manually, that's probably the most effective way to filter spam, but I wonder if it is cost-effective though.
Do not call ... (Score:5, Interesting)
Re:Do not call ... (Score:2)
Most spams are already illegal, con games, selling prescription drugs etc. They are not scared of a little do not spam list. The do-not-call list stopped businesses that wanted to stay legit.
Instead, sign up for the do not spam list (I have an infinite number of email addresses so it may take me some time to do so) and you will just get more spam, I am pretty sure.
Re:Do not call ... (Score:3, Insightful)
* It's a lot easier to jack into the Internet than it is to get a phone line
* It's more expensive to perform telemarketing than cybermarketing; you have to pay people and you're not nearly as anonymous - there are costs in launching telemarketing efforts, whereas with spamming, all you have to do now is jack into a network or open proxy and unload your spam.
A spam do-not-e-mail list won't work, because at the present time, the spammers can hide much more effe
Re:Do not call ... (Score:3, Insightful)
SpamBayes (Score:2)
The many problems with challenge solutions and the like meen any hope of seamless introduction and integration into existing business processes is not likely, and seem to keep pointing us back to the inbox for our f
Reputations (Score:5, Interesting)
To a certain extent this is what we already do in real life. We 'judge a book by its cover' as a first pass (for example people will often walk past a beggar in the street completely ignoring them) and then include other factors. How polite they appear, where they are from, recommendations from friends etc
All other mechanisms suffer from a determined spammer being able to get around them as the article pointed out. Any mechanism that prevents some spammers makes things more lucrative for the rest.
Re:Reputations (Score:3, Interesting)
It basically attempts to classify IPs as primarily spam senders or not according to the ratio of spam/non spam they send.
The more signed up, the merrier, so feel free to check it out.
Re:Reputations (Score:5, Interesting)
I just devised a setup that might be interesting:
The idea is essentially to allow a collaboratively developed decentralized blacklist and whitelist to develop. Spammers will either submit the IPs they use to this list or not submit them; if they do submit them, then a "good" report from them will eventually be taken as a strong sign of spamminess. If they don't, then nothing happens, but presumably "trustworthy" blacklists would list them.
Thus, a user in Brazil, where they would be receiving lots of legit mail from Brazilian IPs would not find a blacklist that listed all of LACNIC to be a strong indicator of spamminess. The effects of blacklisters who maliciously put enemies into their blacklist would also be reduced, if not eliminated.
A suggested implementation detail on the blocking would be to make it random; that is to say that 100% of the mail with a 100% probability of being spam gets dropped, 99% of mail with a 99% probability gets dropped, 97% of mail with a 98% probability gets dropped, 94% of mail with a 97% probability gets dropped, 90% of mail with a 96% probability gets dropped, etc. according to this function:
This would allow for a degree of "retraining" in the event of false positives (since a /dev/null'd mail cannot be retrained from!).
What works for me (Score:3, Informative)
The tools are out there. If you use them, spam isn't nearly as much of an issue as the press makes it out to be.
*Well not everyone in the Real World anyway -- here on /. we all run our own boxes, right?
Public key cryptography. (Score:3, Insightful)
Someone, either me or the author of the article is on crack. I was under the impression that one does not have to have private key in order to validate the signature.
Lets assume that there are CRT records that store SSL certificate for clients allowed to send mail on the behalf of the domain.
Now somebody tell me, in which step one needs private key to verify certs?
Robert
Re:Public key cryptography. (Score:3, Insightful)
In case when mail server finds out that the session is signed with cert ``blessed'' by its own IN CRT, it could allow the messages send in this session to be relayed anywhere sender wants. It would have to have matching domain still, because server wouldn't have the means to deliver it otherwise.
I was trying to post something about this method to As
Re:Public key cryptography. (Score:3, Insightful)
No, and that's the beauty of it.
Domain's private key doesn't have to be stored anywhere on the net. On mailserver of this domain is another cert (private+public) signed with IN CRT for example.com. But the real private key signing all those certs is only on the terminal disconnected from the net entirelly, used for batch-signing of client certificates.
This way you cannot crack into the computer to steal private key because it isn't anywhere o
most effective (Score:5, Insightful)
The most effective spam solution at this time is RBL blacklisting. Bottom line.
When you take into account that the biggest problem of spamming is bandwidth consumption and network resources, there is NO better way than blacklisting spam sources and refusing to communicate with them.
Services like Spamcop's RBL really piss off the spammers. All client-side filtering is counterproductive and ultimately useless as you constantly have to update the systems to catch new efforts on the part of spammers to thwart the filters. At least with RBLs, the spammers' connections are immediately refused as soon as they're ID'd.
If you want to identify what is the most effective solutions, it's simple. Look at what pisses off the sleazebag spam community the most. That's relay blacklisting. They don't DDOS the moronic client-side filtering companies because the spammers know they're useless, and even if they're not, the spammers can't tell. What hurts them are when systems say, 'screw you spammer, (click)' and that's done via relay blacklisting.
Why are spammers increasingly changing mail relays and pursuing open proxies? Because of RBLs. Even AOL uses RBLs (including Spamcop). All the major ISPs look at the RBLs because they are THE most effective way of stopping spam. And they're the only way to actually shut down the spammers.
Forget client or server-side content-based filtering. They will NEVER work. RBLs are responsible for forcing spammers into corners of IP space, forcing them to deploy worms and viruses to infiltrate new IP space (which exposes them to more prosecution). RBLs ** WORK ** !
Re:most effective (Score:3, Informative)
I've also setup my own private RBL, any spam that makes it thru the public ones has the IP it originated from added with no hope of ever getting off it either since there is no contact info sent so spammers have no clue where the RBL is housed.
Just this morning I was forwarded the dynamic ranged from Shaw Cable here in Canada, we were getting hammered by the infected fools there
Re:most effective (Score:4, Insightful)
Shaw is a spam haven.
Comcast is a spam haven.
Virtually all IP space in Korea.
When you start doing IPLOOKUPs of the spammers you begin to see a pattern of which ISPs don't have their shit together.
Why did Comcast start cracking down on spammers? It was probably because admins like us stopped accepting mail from their business customers because they were embedded in the DSL IP space that spammers have compromised. Do you think Comcast gives a damn about spamming? No. But if you start making their IP space unuseable by legit companies, then their buttom line is hit.
Blacklisting WORKS. Unless you run your own mail server, your opinion doesn't matter. Run your own server, deal with these sleazebags every single day, bombarding your systems with their crap, then talk to me about BS client-side filtering.
Re:most effective (Score:4, Informative)
24.64.0.0/13
24.76.0.0/14
24.80.0.0/13
24.10
24.109.0.0/18
24.109.64.0/19
68.144.0.
Those ranges are safe to block, they have other ranges for the static business clients.
Of course another simply step the ISP can take is to block outgoing SMTP entirely for those ranges except to their own mail servers.
Re:most effective (Score:4, Informative)
We don't have that many clients using our mail server, but one noticed one day that mail to him to friends was bouncing. He reported this and we discovered that we were on SpamCop's RBL list.
I did a quick audit of the mail server, fearing we'd been highjacked, but found no evidence anywhere of spam going out.
Being generally sympathetic to RBLs I was eagre to get to the bottom of this, and cooporate with whatever needed to be done to prove our innocence.
But i found the SpamCop web site to be extremely frustrating to find any information. I found some references stating that to refute being listed you must reply to the email that SpamCop sent you: I searched and searched but we recieved no mail from spamcop.
As I spent a precious day trying to figure out what to do, as mysteriously as we'd been listed, our IP disappeared from spamcop's list.
To this day I don't know what happened; but have a somewhat more bitter taste in my mouth regarding the arbitrary power of RBLs.
(Though I still tend to more blame the system which blindly obeys a single RBL: I think SpamAssassin is more democratic in that it only assigns a probability, and an IP has to be on multiple block lists before it goes over a threshold. This gives spammers more lead time before they are blocked, but also prevents any single RBL from weilding absolute power... a sort of check-and-balance.)
SPF Anyone? (Score:4, Interesting)
One proposed solution I would love to see getting more attention is SPF ("Sender Policy Framework"), which allows each domain admin to specify their email sending policy using existing infrastructure.
See the SPF site [pobox.com] or read this month's Linux Journal [linuxjournal.com] to find out more.
Executive summary of SPF: Just use DNS to specify where mail from your domain may originate from. If everyone used this, we could have domain blacklists that actually work.
Do an "nslookup -type=txt psychogenic.com" to see an example entry. And if you manage any domains, please consider doing the same.
Current boycott of Microsoft email caller ID! (Score:3, Informative)
SPAMfighter works for me... (Score:3, Interesting)
Another one I recomment is Spambayes...but there's the problem with false positives. All the other ones I've tried are utter crap.
Best regards,
Alex Ionescu
Relsoft Technologies
An idea to make ISPs responsible (Score:3, Interesting)
This basically works only if the spamming ISP is from your country. Which is why blacklisting of foreign IPs is still necessary.
But for domestic ISPs who don't reign in spamming, someone should post the 800 numbers of ISPs that don't crack down on spamming. Put up a web site listing the 800 numbers of the ISPs that are top-ranked in harboring spammers. Most of them have 800 numbers.. if everyone calls these ISPs and complains, or at least takes up air time, it costs them money, and money seems to be the only thing that motivates these companies.
The spammers weak spot is the money he makes. (Score:5, Insightful)
There are two inevitable facts:
1) In order for spamming to be worth someone's effort, they have to somehow get money from people. If NOBODY replied to them, then spamming would stop overnight.
2) Something in the content of the Spam must be real - a reply address - a web site, a phone number or something. Block traffic to that location and the spammer gets no money and dies.
Hence, I think they may be vulnerable. Educating people not to reply to SPAM would help - it only takes a mere handful of people to respond to a SPAM to make it profitable - but if education could drop that handful to a mere one or two - then we could succeed in putting more spammers out of business simply by cutting their margins to the point where it wasn't worth the hassle.
Where are the TV adverts: "Replying to Spam is Bad!"....we know that the morons who reply to spam are suckers for advertising - they are as likely to believe a well targetted TV advert as a crappy email shot. If Spam is costing the ISP's as much as they say it does - then funding some TV ads might not be impossible.
What if we made it illegal to respond to an emailed advertisement that was not clearly labelled as such, that would help to deter people from responding. Such a law would be next to impossible to enforce - but we are trying to deter the gullible here - so it might not have to be enforcable - just very well advertised.
Since every SPAM has to either advertise a product that you can buy from somewhere - or direct you to a postal address, a phone number or a web site - then that route for getting money back to the spammer could be blocked.
The return route has to be genuine. There is no point in them sending you a fake phone number or faked web address. If the phone companies (who are often also ISP's - or have at least some cause to want to kill spam) were to block calls to and from phone numbers that were seen in Spam - then the reverse route for the money would be curtailed. Whilst you can afford to change the aparrent source of your spam and fake those addresses for each new mail shot, you can't change your phone number for every couple of dozen orders you take. Similar considerations apply to web sites and postal addresses.
If it was required for credit card companies not to transfer money to businesses that employed spammers to push their goods - then that would also help some.
It wouldn't take many people to deliberately reply to spammers - to lead them on into thinking you want their product - to send them fake cheques or bogus credit card numbers. If they only get a handful of positive responses per million spams - then it wouldn't take more than a few determined people per million (eg ISP employees) to clutter up the the spammer's cash collection mechanism to the point where it's too much hassle for him to sort out the real orders from the bogus ones.
I don't pretend to have all of the answers - but there seems to be far too little creative thinking along these lines.
Sorry Won't Work (Score:3, Insightful)
Any one of these "solutions" can be exploited to hurt legitimate business. Simply send out a spam campaign on behalf of XYZ company with legitimate credentials, and watch the chaos and disaster at the company as phone lines are cut, merchant accounts cancelled, etc.
Spammers have already done all sorts of illegal activity to continue their frauds, what's one more to cut the knees out on the competition, or the competition of their customers.
Re:The spammers weak spot is the money he makes. (Score:4, Insightful)
1. Most spammers use faked email address, they DO NOT suppose you to answer them. They want you to click the link, they want you to buy something, they want to install some spyware, adware or what-so-ever-ware on your computer!
I agree that the email address they give is likely to be faked - but my point is that in order to make money, SOMETHING in that post has to be real. If not the email address then the postal address, phone number, web site, etc.
2. Who can block the phone call to a certain number, who can block everyone's access to a certain website, and who can block a real physical position (address)?
The government could pass laws requiring phone companies, ISP's and the US mail to block traffic to people who have been logged as advertising illegally via email. It would require an efficient method to collect these addresses and automation to do the banning - but that's within the bounds of technical possibility.
A spammer can change his email address for every spam he sends - but he can't change his web site that often - and he certainly can't keep changing his phone number, physical address or bank account. I read somewhere that 90% of spam comes from just 600 people. It can't be that hard to block the money going back to those 600 people.
Spammers make profit in the hope that 0.000001% of the receivers would click the link, make a phone call, or write a snailmail to that address.
Yes - exactly. But if you can add a couple of zeroes to that 0.0000001% then it won't be worth their while. If every million email spamshot nets them 50 orders (a number I read somewhere as typical) - then they can make just a couple of bucks on each order and they have earned $100 for the time it took to type a single Spam and to run their system to send it. That's good money.
However, if you can get the numbers down to where they have to send several different mailshots to get even one order - then it starts to look like a pretty unprofitable business model and they'll stop doing it.
It seems that you don't understand how spamming works. This is a social problem, and cannot simply be "blocked".
I think I do understand how it works. I absolutely agree that blocking the spam isn't the answer - and that's my entire point. Removing the spammer's motive for sending the spam in the first place is the only answer IMHO.
What about a web of signed trust? (Score:3, Interesting)
You start with a central certificate authority. I know, I know, bottlenecks. But you only need them to issue keys to (or sign the keys of) about 100 (or 1000?) servers. The signing authority has to be central, but the *revocation* authority does not. That's the key here.
So those servers can sign the keys of 1000 servers of their own and so on.
So my mail server tries to send your server an email. Your server checks if my key is signed by someone who is signed by someone who is signed by the CA. It also checks against its nightly downloaded revocation list. If everything is good, the mail goes through. Very little processor time, and very little bandwidth.
Suppose someone issues a key to a dishonest server? Well, enough people issue complaints and the issuer's key gets revoked. Or some automatied spamassasin type thing that auto-revokes the key after enough spams get spotted. No more spam from them, and maybe next time the admins are more careful.
This totally eliminates (i think) the threat of zombie SMTP servers on DSL and open relays.
Then the ball is in the park of the ISPs and server hosters (those with their own email keys) to keep spammers out locally. SLL login for SMTP? sure. C/R for each email sent through them? Whatever. Send anything over their open relay? Not for long.
Sounds reasonable to me. It makes it easier for the end user I think, and minimizes spam.
Any suggestions?
Muerte
This totally eliminates zombie SMTP servers on cable lines spewing spam.
Is this really an expert view? (Score:3, Insightful)
When I took a look at the first of these two articles which examines end-user anti-spam solutions I had to wonder if the writer had actually tried any of the technology or was relying purely on hearsay. For example:
Spam senders and their bulk-mailing applications are not static -- they rapidly adapt around filters. For example, to counter word lists, spam senders randomize the spelling of words ("viagra", "V1agra", "\/iaagra"). Hash-busters (sequences of random characters that differ in each email) were created for bypassing hash filters. And the currently popular Bayesian filters are being bypassed by the inclusion of random words and sentences. Most spam filters are only effective for a few weeks at best
This is the view of someone who clearly has no experience at all with a high-quality Bayesian classifier like POPFile [sourceforge.net]. I've been using this program for almost a year and it most certainly has not been defeated by random words or spelling. Many of the tokens that trip email as being spam are actually unusual items in the headers or sales terminology. After a very brief training period POPFile has continued to provide me with excellent protection from spam and malicious email, with only a few false negatives to retrain on.
If that's not a good end-user anti-spam solution then I don't know what is.
Next gen SMTP (Score:3, Interesting)
From what I understand, rewritting SMTP to fix most (if not all) of the spam loopholes is no problem (Am I seriously glossing over some big details here?). The trouble is that people want a 100% effective, immediatly pluggable solution. If new email clients support both the old and new smtp protocols, and use the new one as a default, it will be just a matter of time before there's a critical mass of clients and ISPs that are using the new one.
Once this critical mass is reached, boom, everyone is required to use the new protocol, and any email that uses the old one is immediately dumped way upstream, before it can start hogging bandwidth everywhere.
I'm aware that if my idea is so great, how come it hasn't been implemented?? Feel free to pick holes....
Just how bad is it, really? (Score:3, Insightful)
I've tuned up a pretty good stack of procmail recipes, set my MTA to refuse unverifiable senders and obvious forgeries, subscribed to a couple of decent blacklists, and trimmed things down to a level I find tolerable. And thus I'm disinclined to do much more.
Through a bit of mental jiu-jitsu I've come to regard the remaining trickle as a moderately challenging puzzle provided to me for free, and a source of amusement first thing in the morning as I make the initial pass through my inbox to weed out the junk unread. I spend a few moments each week enjoying the logs that Exim and my procmail recipes write to show me what they've strained out. Once you push the S/N ratio high enough to get some work done, it's possible to turn the rest of the N into fun if you have the right attitude.
Oh, there are other things I'd like to do. If most people would crypto-sign their mail, I'd set up recipes to toss unsigned messages, and play around with hacking signature and CA blacklists into my filters to get rid of the more brazen attempts. I'd like to try out some recognizers that would be mighty hard to write as regular expressions. I'd like to tinker with external filters that rip out some of the common obfuscation techniques before procmail even sees the message. But for now I can live without these.
If you're thinking, "but it's costing my company money to deliver this junk," ask yourself how much it's costing your company to have you sitting around trying to find ways to remove the last little morsel of UCE when you could be crafting new competitive advantages for the firm, or at least dealing with the *other* stuff that gets in people's way and which is not actively working against you.
Forget challenges that require human input (Score:3, Interesting)
When the e-mail client is set up, it could generate a GPG key set to use for signing the e-mail.
The recipient's computer, if verification is required, could send a standardized e-mail back to the sender's computer asking for the sender's public GPG key. If and when it arrives, check the digital signature and either deliver the e-mail or
By caching the keys, you really wouldn't even have to have a white list. Or, more accurately, the white list would be by digital signature rather than the Reply-to or From address.
This could even be implemented on the server itself and with better results.
When adding the user, create a GPG key for that user on the server.
Require authorization for each incoming e-mail that is to be relayed. Digitally sign the e-mail with that key if it sender has not already done so on the client side.
The recipient's server or the recipient's client may then request the public key. If the public key used was the server's key used on behalf of the client, then return that. Otherwise, send the request on to the client for his public key.
Of course, this could be abused, but then the e-mail addresses have to be real and could then be used for blocking.
The traffic itself should be relatively small. The data portion of the request would just identify the public key desired based on what was used on the message (sender's key maintained by the server or the sender's key maintained by the client) and the data portion of the response would contain that id and the key.
For those who use multiple e-mail clients, allowing the server to handle the key would be preferable since the multiple clients would generally use different keys.
If the cached public key for that user failed, a request for the public key would be sent in case the public key had been changed. If the new key was different, the cached public key could be expired after a set period of time (in case there were any yet to be delivered e-mails from the old key around) and the new public key added to the cache.
You'd have the benefits of challenge-response systems without the users being annoyed.
One problem with challenge response systems is with mailing lists. With this method, there would be no problem since the mailing list's server would react to requests for the public key by providing it.
This would also take care of the automated e-mail case, say when you place an order and the sender sends an e-mail telling you the order has been fulfilled.
Re:Darth Vader (Score:4, Funny)
I find your lack of junk mail disturbing.
Re:Not for all, but a good start.. (Score:5, Insightful)
Spammers are now rotating IP space all over the place... they're also beginning to NOT forge header information, so what are you left with?
Recognizing rogue relays and blacklisting them, even if they have valid header information. Any improvement to SMTP protocol won't make a bit of difference.
Most mail servers and large ISPs are already employing additional methods of header-verification. It hasn't stopped spam.
RBLs ARE working. They're making spammers scramble for un-blacklisted IP space. That's why they're running overseas; that's why they're sending out worms and viruses. Lord help us if IPv6 gets introduced... we'll never be able to stop spam then.