Prof. Dr. P. Heinzmann

Computer Associates, IT Security Trends,
Report 2004/05 für Medienschaffende
18. November 2004, SWX Swiss Exchange, Zürich
SPAM
Prof. Dr. P. Heinzmann
cnlab Information Technology Research AG &
HSR Hochschule für Technik Rapperswil
[email protected], www.cnlab.ch
Referenzen:
•Mike Spykerman, “Typical spam characteristics - How to effectively block spam
and junk mail”, White Paper, Red Earth Software.
•E-Mail Spamming countermeasures: http://ciac.llnl.gov/ciac/bulletins/i005c.shtml
•Howto gegen Schweizer SPAM: http://spam.trash.net/
•Michael Heuberger, “Spamming – Spamming the Internet”, Hochschule
Rapperswil, I-Seminar, SS 2001.
•Matthias Rambold, “Wie wird SPAM bekämpft?”, Hochschule Rapperswil, ISeminar, WS 2001/02.
•Adrian Ruoss, Christian Höhn, „SPAM – Distributed Content Checking …
Honeypots“, Hochschule Rapperswil, Studienarbeit Abt. Informatik, WS2004/05.
1
2
Outline
• Wer macht das Geschäft mit SPAM?
• Wie finde ich die Spammer?
(E-Mail Details)
• Wie wehrt man sich gegen SPAM?
(SPAM Abwehrmassnahmen)
18.11.2004
3
3
Wie werde ich Millionär?
Schon vor 40 Jahren waren in Schweizer Zeitungen Inserate für Anleitungen
„Wie werde ich Millionär?“ nach Einsendung einiger Franken erhältlich.
Die lapidare Antwort bzw. Anleitung lautete „machen Sie‘s wie ich“!
4
http://www.spamhaus.org/rokso/index.lasso
• 200 known „Spam Operations“ (500-600 professional
spammers) responsible for 90% of your spam
– operate 'offshore' using servers in Asia and South America
• spammer
– listed in ROKSO if terminated by a minimum of 3 consecutive ISPs for
AUP violations
– spammers IP addresses are automatically sent to Spamhaus Block List
• ROSLO assists
– ISP Abuse Desks
– Law Enforcement Agencies (with special, sensitive information version)
18.11.2004
5
•The Register Of Known Spam Operations (ROKSO) database collates information and evidence
on the known spammers and spam gangs, to assist ISP Abuse Desks and Law Enforcement
Agencies.
•90% of spam received by Internet users in North America and Europe can be traced via redirects,
hosting locations of web sites, domains and aliases, to a hard-core group of around 200 known
spam operations. These spam operations consist of an estimated 500-600 professional spammers
loosely grouped into gangs ("spam gangs"), the vast majority of whom are operating illegally.
•Many of these spam operations pretend to operate 'offshore' using servers in Asia and South
America to disguise the origin. Those who don't pretend to be 'offshore' pretend to be small ISPs
themselves, claiming to their providers the spam is being sent not by them but by their nonexistent 'customers'. Some set up as fake networks, pirate or fraudulently obtain large IP
allocations from ARIN/RIPE and use routing tricks to simulate a network, fooling real ISPs into
supplying them connectivity. When caught, almost all use the age old tactic of lying to each ISP
long enough to buy a few weeks more of spamming and when terminated simply move on to the
next ISP already set up and waiting.
•ROKSO is a "3 Strikes" register: To be listed in ROKSO a spammer must first be terminated by
a minimum of 3 consecutive ISPs for Access User Policy (AUP) violations. IP addresses under
the control of ROKSO-listed spammers are automatically and preemptively listed in the
Spamhaus Block List (SBL).
•For Law Enforcement Agencies there is a special version of this ROKSO database which gives
access to records with information, logs and evidence too sensitive to publish here.
http://www.spamhaus.org/rokso/index.lasso
5
CREATIVE MARKETING ZONE
Alain Ralsky (SPAM King)
• Aliases: Jeff Kramer, Additional Benefits , Creative
Marketing Zone Inc , Sam Smith, William Window, ...
• 1997: couple of mailing lists, making $6,000 a week
• 2001: Creative Marketing Zone, Inc., Nevada
• 2002: 250 million valid addresses
–
–
–
–
–
0.25% response rate
0.75% of mails opened (hidden notification code)
89 Million people have opt-out (between 1997 and 2002)
up to $22,000, for single mailing to entire database
stealth spam (Romanian program), detect computers that are
online and then flash them a pop-up ad
• 2004: Hundreds of domains: aboutchpecha.com, ...
18.11.2004
6
Some statements from Alain Ralsky (Mike Wendland: Spam king lives large off others' e-mail troubles,
November 22, 2002 http://www.freep.com/money/tech/mwend22_20021122.htm
and http://www.spamhaus.org/rokso/listing.lasso?-op=cn&spammer=Alan%20Ralsky):
•"I've gone overseas," he said. "I now send most of my mail from other countries. And that's a shame. I pay a
fortune to providers to do this, and I'd much rather have it go to American companies. But I have to stay in
business, and if I have to go out of the country, then so be it."
•The computers in Ralsky's basement control 190 e-mail servers -- 110 located in Southfield, 50 in Dallas
and 30 more in Canada, China, Russia and India. Each computer, he said, is capable of sending out 650,000
messages every hour -- more than a billion a day -- routed through overseas Internet companies Ralsky said
are eager to sell him bandwidth.
•"I'll never quit," said the 57-year-old master of spam. "I like what I do. This is the greatest business in the
world." It's made him a millionaire, he said, seated in the wood-paneled first floor library of his new house.
"In fact," he added, "this wing was probably paid for by an e-mail I sent out for a couple of years promoting
a weight-loss plan."
•In 1997 he bought a couple of mailing lists from advertising brokers and, with the help of the computers,
launched a new career that soon was making him $6,000 a week.
•Ralsky said he includes a link on each e-mail he sends that lets the recipient opt out of any future mailings.
He said 89 million people have done just that over the past five years, and he keeps a list of them that grows
by about 1,000 every day. That list is constantly run against his master list of 250 million valid addresses.
•The response rate is the key to the whole operation, said Ralsky. These days, it's about one-quarter of 1
percent.
•Ralsky makes his money by charging the companies that hire him to send bulk e-mail a commission on
sales. He sometimes charges just a flat fee, up to $22,000, for a single mailing to his entire database.
•Ralsky has other ways to monitor the success of his campaigns. Buried in every e-mail he sends is a hidden
code that sends back a message every time the e-mail is opened. About three-quarters of 1 percent of all the
messages are opened by their recipients, he said. The rest are deleted.
•Ralsky, meanwhile, is looking at new technology. Recently he's been talking to two computer programmers
in Romania who have developed what could be called stealth spam. It is intricate computer software, said
Ralsky, that can detect computers that are online and then be programmed to flash them a pop-up ad, much
like the kind that display whenever a particular Web site is opened. "This is even better," he said. "You don't
have to be on a Web site at all. You can just have your computer on, connected to the Internet, reading e-mail
or just idling and, bam, this program detects your presence and up pops the message on your screen, past
firewalls, past anti-spam programs, past anything.
6
SPAM ... Mass Mailing Angebote auf
eBay
18.11.2004
7
SPAM Mass Mailing Angebote sind beispielsweise auf eBay zu finden. Gelegentlich
findet man dort auch „SPAM bot“ Angebote.
7
Type of Spam Categories
(% of total Spam)
Other; 3%
Spiritual; 4%
Leisure; 6%
Products; 25%
Internet; 7%
Health; 7%
Scams; 9%
Financial; 20%
Adult; 19%
2003: http://www.spam-filter-review.toptenreviews.com/spam-statistics.html
18.11.2004
8
The 2003 statistics were derived from a number of different reputable sources
including: Google, Brightmail, Jupiter Research, eMarketer, Gartner, MailShell,
Harris Interactive, and Ferris Research.
•Worst of the Spam - Sporn - How well does the email filter support the blocking
of sporn or spammed pornography? Does it allow you to block all pornography
and/or adult themes? Does it allow you to view quarantined email without
viewing any of the pornographic i?
•As much as 8% of all e-mail is pornographic in nature, what we at Spam Filter
Review call “Sporn” or spammed pornography.
http://www.spam-filter-review.toptenreviews.com/spam-statistics.html
8
"419" Scam (Advance Fee Scam)
http://www.joewein.de/sw/419scam.htm
• Nigeria or West African Scam
–
–
–
–
large sum of money sitting in a bank account
making payments through you to us
At some point, the victim is asked to pay up front an Advance Fee of some sort
http://home.rica.net/alphae/419coal/
• Fake Lottery Scam (Elgordo Lottery Madrid, Microsoft Email Lottery)
– you have therefore been approved for a lump sum pay out of US$ 500,000.00
– To file for your claim, please contact …
• Ghana Gold Scam
– prepared to provide quantities of up to 400 kilograms of 22.karat alluvial gold
monthly
– offer the quantity of gold required to the Buyer [or their representative] upon their
arrival here in Accra
– kindly contact me at the numbers listed above
18.11.2004
9
The so-called "419" scam (aka "Nigeria scam" or "West African" scam) is a type
of fraud named after an article of the Nigerian legal code under which it is
prosecuted. Most "normal" spam uses bogus sender addresses. For 419 spam
existing mailboxes at legitimate mail providers are used. When such mailboxes
get cancelled for abuse, often similarly names mailboxes are created at the same
provider. Most 419 scams originate from about a dozen freemailer domains
(netscape.net, yahoo.com/yahoo.*, tiscali.co.uk, libero.it, telstra.com,
bigpond.com, indiatimes.com, 123.com (Chile), zwallet.com, fsmail.net,
hotmail.com, etc., see addresses by domain). A small minority uses throw-away
domains registered via MSN (see example), Rediffmail, XO/Concentric,
Yahoo/Geocities or other webhosters (ns.sign-on-africa1.net) as the sender
instead of a freemailer service, particularly for fake companies and fake banks
(e.g. firstcapitalft.com).
http://home.rica.net/alphae/419coal/
http://www.joewein.de/sw/419scam.htm
9
Nigeria
http://www.lagosestores.com/419/index.htm
18.11.2004
10
Portal mit Scams and Frauds Beispielen (Nigeria Mail): When fraud, 419 or
scams come up anywhere on the internet Nigeria will be mentioned even when
the particular fraud, 419 or scam has nothing to do with Nigeria. This image that
we have cut for ourselves through our actions and inactions isn't the best and that
image we must change through our collective effort if we must be accorded our
due respect
http://portal.pensys.com/index.cfm?sector=news&page=topic&topic=Scams%20
and%20Frauds
http://www.lagosestores.com/419/index.htm
10
Info Grabber
•
•
•
•
Personal Information (Addresses)
Credit Card Information
Banking Information (Phishing)
Spyware / Trojan Installation
– Keyboard logger
– Bots (Zombies)
18.11.2004
11
11
Cheap Rolex?
18.11.2004
12
Lockvogelangebote für Rolex-Uhren, Windows Software, Wettbewerbe, …
Gefälschte Bestellung, mit falscher MC Nummer und Junk e-Mail am 17.11.04
abgeschickt:
•Keine Verschlüsselung
•Falsche Kreditkartennummer nicht detektiert
•Keine E-Mail-Bestätigung für die Bestellung
… wahrscheinlich geht es nur darum, Kreditkarten- und Personen Informatinen
zu sammeln.
http://www.onlinereplicastore.com/checkout.php
12
Phishing
Real site
3. Spoofed Web Site
1. Spoof E-Mail (Spam)
2. Camouflaged
Hyperlink
Fake Pop-Up
<A HREF=www.stealmyinfo.com>www.yourbank.com/myaccount</A>
Ref. Gartner Group, Cannes 2004
Phishing is a spam-based scam that has grown in popularity. Phishing is not a "cyberattack," such as
propagating malicious code. It is a social-engineering attack, in which attackers (or "phishers") trick users
into doing something that will harm them or their companies.
The phisher sends an e-mail message that looks like it comes from a legitimate source — for example, an
online merchant. In many cases, the message states that there is a problem with the user's account and
requests that the user confirm the merchant's information by entering sensitive account information (such as
a credit card number, address, user name and password) into the phisher's Web site, which resembles the
merchant's site. Using this information, the phisher can steal access to the account or perpetrate identity
fraud. In addition, phishing could provide attackers with access to an organization's internal systems, but it is
used for identity theft in most cases.
13
Botnet Providing
• networks of zombie PCs used
– anonymous relays for spam
– to launch denial of service attacks on websites
– to steal confidential information about a PC's owner
• More than 30‘000 PCs per day are being taken over
to spread spam and viruses (bot nets peak of new
recruits was 75‘000 in one day)
• 4‘496 Windows viruses were detected in the first six
months of 2004
• October 5, 2004, Spy Act
18.11.2004
14
The 75’000 new recruits per day peak in 2004 is due to a “battle” between the
MyDoom and Bagle virus teams.
October 5, 2004, the U.S. House of Representatives passed a bill to criminalize
the act of altering PC configurations (Spy Act ), taking control and downloading
software onto a PC without the owner's consent: By a 399-1 vote, House
members approved legislation prohibiting "taking control" of a computer,
surreptitiously modifying a Web browser's home page, or disabling antivirus
software without proper authorization.
The Spy Act would also create a complicated set of rules governing software
capable of transmitting information across the Internet. It would give the Federal
Trade Commission authority to police violations of the law and to levy fines of
up to $3 million in the most pernicious cases.
14
Sendmails Corp
• offers members $5 for downloading and
installing the company's VirtualMDA (mail
delivery agent) software
• pay an additional $1 for every hour of
computing time that the VirtualMDA software
spends blasting out e-mails on behalf of
Sendmails and its clients
18.11.2004
15
http://www.wired.com/news/business/0,1367,63146,00.html
After downloading and analyzing the VirtualMDA software last week, Jones said
he concluded that Sendmails' "primary reason for doing that service is so their
clients' IP addresses don't get blocked by all the spam lists. Instead, all these
cable-modem users who install the software get banned."
VirtualMDA was developed as a result of marketing companies not being able to
get e-mail delivered," said Haberstroh. "We were sequestered by a rather large
Fortune 1000 company to create an e-mail deployment service that would
basically get their e-mail delivered to the recipients whose addresses they were
paying for." VirtualMDA was developed as a result of marketing companies not
being able to get e-mail delivered," said Haberstroh. "We were sequestered by a
rather large Fortune 1000 company to create an e-mail deployment service that
would basically get their e-mail delivered to the recipients whose addresses they
were paying for."
Haberstroh, VirtualMDA, Sendmails and its parent company, Atriks, have not
managed to keep themselves off the Spamhaus Register of Known Spam
Operations. Run by a British nonprofit, the online directory contains hundreds of
records of suspected spammers.
15
Beagle_J Mass Mailing Worm
Attachment
Backdoor
SMTP /
HTTP
File
Sys.
18.11.2004
16
•Beagle_J is a mass-mailing worm that opens a backdoor on TCP port 2745 and
uses its own SMTP engine to spread through email.
•Sends the attacker the port on which the backdoor listens, as well as the IP
address.
•Attempts to spread through file-sharing networks, such as Kazaa and iMesh, by
dropping itself into the folders that contain "shar" in their names.
16
IP-Adressen von infizierten Rechnern
verkaufen
•
•
•
•
21.02.2004: C’t Redaktion kauft bei Virenverbreitern ein
Trojaner auf tausenden Rechnern installiert (Virus "Randex" )
Nimmt per Chat-Protokoll IRC Kontakt zu seinem "Master" auf.
empfängt Befehle wie etwa,
– nach CD-Keys von Spielen suchen
– vom infizierten System aus SYN-Flood-Attacken starten
– weitere Software nachladen (z.B. zur Weiterleitung von Spam)
• verbreitet sich über den Windows-Verzeichnisdienst
insbesondere in Sub-Netzen weiter
18.11.2004
17
Ferngesteuerte Spam-Armeen, Nachgewiesen: Virenschreiber liefern SpamInfrastruktur, c't 5/04, S. 18.
URL dieses Artikels:
http://www.heise.de/newsticker/meldung/44869
Links in diesem Artikel:
[1] http://vil.nai.com/vil/content/v_100401.htm
[2] http://www.heise.de/security/artikel/43066
[3] http://www.socks.permeo.com/TechnicalResources/ProtocolDocuments.asp
[4] http://www.heise.de/newsticker/meldung/44849
[5] http://www.ctmagazin.de
[6] http://www.heise.de/english/newsticker/news/44879
[7] http://www.groklaw.net/article.php?story=20040221051056136
17
E-Mail an cnlab.ch
Mail
3%
unerkannte
SPAM
3%
erkannte
SPAM
53%
Falsche
Empfänger
30%
Viren
11%
Juni 2003
18.11.2004
18
18
Mail auf dem Setziertisch
19
Electronic Mail (e-mail)
Internet
[email protected]
Mail Client
Server 1
Server 3
[email protected]
Router
Router
Send Server
Host 1
Router
Router
Receive Server
Send Server
Host 1
bbb.ch
Host 1
aaa.com
Router
Relay Server
18.11.2004
20
An open mail relay occurs when a mail server processes a mail message
where neither the sender nor the recipient is a local user. In this example,
both the sender and the recipient are outside the local domain (or rather,
the local IP range, for the technically inclined). The mail server is an
entirely unrelated third party to this transaction. The message really has
no business passing through this server.
The legitimate use of a mail relay is threatened by influx of spam email
originating from a third party, the spammer. Abuse occurs when massive
amounts of mail are relayed through an otherwise unrelated server. Most
such abusive sessions are initiated by junk emailers - the so-called
spammers - attempting to covertly distribute their unwanted messages all
over the Internet. In the past, third party mail relaying was a useful tool.
These days, thanks to the spammers, open mail relays pose a significant
threat to the usefulness of email.
ORDB.org is the Open Relay Database. ORDB.org is a non-profit
organisation which stores a IP-addresses of verified open SMTP relays.
These relays are, or are likely to be, used as conduits for sending
unsolicited bulk email, also known as spam. By accessing this list, system
administrators are allowed to choose to accept or deny email exchange
with servers at these addresses.
20
Typical E-Mail Server Setup
Interner Mailserver
(Exchange Server)
Externer Mail Gateway
Exchange
(port 25)
McAffee
WebShield
(port 2525)
qmail
queue
Spamassassin
SMTPD
(port 2225)
Antivir Mailgate
(port 25)
SMTP
Group
Shield
Outlook
Client
Junkmail
VirusScan
18.11.2004
21
•Antivir Mailgate macht Relay Check und Virencheck (Mails mit Viren werden gelöscht)
•Spamassassin kennzeichnet Mails, welche als Spam klassiert werden
•Zweiter VirenScanner (McAffee) detektiert Viren, welche von Antivir nicht gefunden
wurden (z.B. aufgrund unterschiedlich aktueller Virensignatur-Files)
•GroupShield untersucht Exchange Store bzw. bereits empfangen Mails (welche
beispielsweise angekommen sind, bevor die Virensignaturen bekannt waren)
Es wäre durchaus sinnvoll, Spam- und Virenchecking auch für ausgehende Mails zu
machen:
•Spam-Filter Training mit „guten Mails“
•Alarmierung bei „echten Mails“, welche als SPAM detektiert würden
•Interne Spammer detektieren
•Verhindern, dass Viren nach aussen gesendet werden
21
Mail message format RFC 822: standard
for text message format
• SMTP-Envelope
(written by servers)
Envelope
– RCPT To:
– Mail From:
• header lines
–
–
–
–
To:
From:
Subject:
…
• body
– the “message”, ASCII
characters only
DATA
header
blank
line
body
18.11.2004
22
Die Header-Informationen werden beim normalen e-Mail Client vom ClientProgramm an den SMTP Prozess übergeben. D.h. beim Versand einer
normalen E-Mail werden die Adressen, die im Mailprogramm des
Absenders in die Felder "To:" und "CC:" eingetragen wurden,
nicht nur zur Generierung dieser beiden Headerzeilen benutzt,
sondern auch beim SMTP-Dialog als "RCPT TO:" und „Mail
From:“ auf den Umschlag übertragen.
Die Envelope enthält die für die Zustellung einer E-Mail
relevanten Informationen, welche vor allem durch die MailServer interpretiert werden. Dem Client interessieren die
Envelope-Informationen in der Regel nicht. Allerdings werden
manchmal gewisse Daten aus der Envelope in den Header
übertragen.
http://sites.inka.de/ancalagon/faq/headerfaq.php3#Section_2.1
22
Mail header additions by involved
SMTP servers
• Each SMTP recipient adds his Domain Name (with IP
Address) and a „Time Stamp“ to the Mail Header
sky.itr.ch
(SMTP/POP Server)
mail.iprolink.ch
(SMTP Server)
tslzgp157.iprolink.ch
(Mail Client/SMTP)
18.11.2004
23
These “stamps” are placed on the envelope of the mail by each SMTP server. The
SMTP/ESMTP IDs as well as the time stamp have local significance only (i.e. it
is just the local time of the corresponding server).
[see also http://www.stopspam.org/email/headers/headers.html]
23
Return-Path: <[email protected]>
Received: from mx3.gmx.example ([email protected] [195.63.104.129])
by ancalagon.rhein-neckar.de (8.8.5/8.8.5) with SMTP id SAA25291
for <[email protected]>; Thu, 16 Sep 1998 17:36:20 +0200 (MET DST)
Received: (qmail 1935 invoked by alias); 16 Sep 1998 15:36:06 -0000
Delivered-To: GMX delivery to [email protected]
Received: (qmail 27698 invoked by uid 0); 16 Sep 1998 15:36:02 -0000
Received: from pbox.rz.rwth-aachen.example (137.226.144.252)
by mx3.gmx.example with SMTP; 16 Sep 1998 15:36:02 -0000
Received: from post.rwth-aachen..example (slip-vertech.dialup.RWTH-Aachen.EXAMPLE [134.130.73.8])
by pbox.rz.rwth-aachen.example (8.9.1/8.9.0) with ESMTP id RAA28830
for <[email protected]>; Wed, 16 Sep 1998 17:35:59 +0200
Message-ID: <[email protected]>
Date: Wed, 16 Sep 1998 17:33:35 +0200
From: Heinz-Gustav Hinz <[email protected]>
Organization: RWTH Aachen
X-Mailer: Mozilla 4.05 [de] (Win95; I)
To: Karl-Heinz Schmitt <[email protected]>
MIME-Version: 1.0 | Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable
Subject: Re: Hallo Nachbar!
References: <[email protected]>
Reply-To: [email protected]
X-Resent-By: Global Message Exchange <[email protected]>
X-Resent-For: [email protected] | X-Resent-To: [email protected]
18.11.2004
24
•Die Return-Path Zeile sollte, wenn sie existiert, ganz am Anfang
der E-Mail stehen. Sie enthält den Envelope-From (also die
Absenderangabe aus dem SMTP-Umschlag). Diese kann
allerdings bei SMTP beliebig angegeben werden.
•Die "eigentlichen" Zustellvermerke sind die "Received:"Headerzeilen, die jeweils vor dem Weiterschicken einer E-Mail
vom Mailserver vorne angefügt werden.
•Die oberste "Received:"- Zeile wurde vom eigenen Mailserver
(bzw. dem des Providers) erzeugt. Eine "Received:"-Zeile gibt
immer an, wer die Mail von wem empfangen hat.
•Gewisse Received-Zeilen können je nach verwendetem MailServer sehr speziell aussehen (vgl. Received: (qmail ...) und
Delivered-To: GMS ..., bei welchen es sich um eine Spezialität
des GMX-Mailers handelt.
•Die Message-ID ist eine eindeutige Kennung der E-Mail
(vergleichbar einer Seriennummer). Sie sollte aus einer
unverwechselbaren Zeichenfolge vor dem "@" (meistens Datum
und Benutzerkennung in einer kodierten Form) und einem
Rechnernamen hinter dem "@" bestehen. Häufig wird die
Message-ID bereits vom Mailprogramm des Absenders erzeugt;
ansonsten tragen die meisten Mailserver sie nach, soweit sie
fehlt.
•Alle
mit
"X-"
beginnenden
Headerzeilen
sind
nicht
standardisiert und können von verschiedenen Programmen (oder
auch Benutzern) beliebig eingefügt werden.
24
Anzeigen von Header Informationen
• Outlook Express 4, 5, & 6 (Windows)
– While viewing the message, click the File menu, then click Properties. On the
Details tab, you will need to right click, choose select all (this should highlight all
the text). Then right click again, and choose copy. You must then paste the
headers into the forwarded message (click the Edit menu, then choose Paste)
• Microsoft Outlook 98 & 2000 (Windows)
– Double click the message to open it in a new window. Go to the View menu and
choose Options. Copy the text in the Internet Headers window by right clicking
and choosing Select All, then right clicking again and choosing Copy. Then paste
the headers when you forward the message (click the Edit menu and choose
Paste).
• Netscape Mail & News (Win, Linux & Mac)
– Click the Options menu, choose Show Headers, then select All. (Note: Some
older versions of Netscape may not be able to show the complete headers)
18.11.2004
25
The header information is like the envelope around an email telling the senders
address, the time it was sent, and where it was sent from. Email header
information is includes the "To" and "From" data about an email. More
importantly, it also contains a lot of other information about the source of and
email. Knowing how to get to the header is important if you ever want more
information about where the email came from. Many email programs hide much
of the header information because most of the time you don't need it. This tutorial
will teach you how to read and view the full header of emails in different email
programs. What the header information "means" is beyond the scope of this
tutorial.
Most spam these days is sent with a fake return address. To figure out where the
spam really came from the following web form is a tool to let you find out which
provider an IP address is assigned to: http://www.joewein.de/sw/spamhowto.htm
25
SPAM / Massmail
Detektion und Filterung
26
SPAM Abwehrmassnahmen
• Technisch
–
–
–
–
–
Sending Mailserver
Receiving Mailserver
Client
SPAM-Filter Service Betreiber
Mailbox Betreiber
• Organisatorisch, Verhalten
– Anwender
• Einsatz seiner Mail-Adresse
• Reaktion auf SPAM-Mails
– Gesellschaft
• Rechtslage
• Wirtschaftslage
• Kostenfolgen
18.11.2004
27
27
Technische SPAM Abwehrmassnahmen
• Akzeptiere nur
Mails von lokalen
Clients (no relaying)
• Client
Authentication
• Verzögerungstaktik
(Teergrube)
Internet
Sendender
Server Router
Router
Router
Router
Router
Blacklist
Spammer
Empfangender
Server
230.60.6.6
152.96.123.11
80.123.122.5
...
• Filtering
(Sender,
Inhalt, Tag)
bbb.ch
• Ablehnung von Mails
(Blacklists)
• Nachfragen beim Sender
(SPF, Greylisting)
• Filtering (Sender, Inhalt,
Anzahl gleiche Mails / DCC)
18.11.2004
28
Avoid e-Mail grabbing
•Identify and abort dictionary attack
•Identify and abort address-harvasting attack (e-mail tag handling)
Boundary Defense
•“Nonaccept” a message (simply decline to accept it, rather than receiving it at all)
•Disable relaying, verify, expand
Header Analysis (Reading email headers by www.stopspam.org:
http://www.stopspam.org/email/headers/headers.html )
•Validity of the sender (using “reverse lookup”)
•Consistency between the sender and the from fields
•Tactics used by known spammers that are highly unlikely to be found in normal messages
Content Analysis
•A set of rules to search for known spammer tactics
•A set of rules to search for known chain letters, hoaxes and urban legends
•The ability to look for words and phrases in a targeted “words list” (for example, porn, financial
services)
•The ability to do contextual analysis
•The ability to “tune” the product for the environment
Sensing or Reporting
•put e-mail accounts in all the places spammers love to harvest addresses (SPAM Honeypot)
•create consortia or user groups to develop and share anti-spam rules
Blacklist and White Lists
•create a white list of domains that are always allowed to receive e-mail, no matter what the
content is
URL-Blacklist
28
Sender Authentication Initiatives
Initiative
Initiator
How It Works
Domain Keys
Yahoo!
Public key infrastructure
(PKI) and DNS
Caller ID
Microsoft
XML records stored
in DNS
Meng
Wong
(Pobox)
Concise
text records
stored in
DNS
Sender
Policy
Framework
(SPF)
Sender
ID
Source: Gartner Group, Cannes 2004
There are four sender authentication initiatives:
• Domain keys: Uses PKI and DNS. A domain owner generates a public and private key pair, makes the
public one available via DNS, and configures that domain's outbound mail servers to sign messages with
the private key. Inbound mail servers would then need to check that signature against the public key. This
initiative is at the early draft stage.
• Caller ID: Uses XML records stored in DNS, which list the IP address ranges that send e-mails legitimately
from a particular domain. This initiative is at a relatively early stage. Caller ID for E-Mail is the third major e-mail
authentication specification to emerge, after SPF (Sender Permitted From) and Yahoo Domain Keys. These multiple
specifications will impede adoption, as will the need to introduce new intra-enterprise practices and technology upgrades. The
various e-mail authentication initiatives will accelerate the spread of domain-to-domain authentication among early technology
adopters and regulated industries.
• SPF: Uses concise text records stored in DNS. It can designate which servers are sending from a domain
legitimately by using IP address ranges, or established mail exchange (MX) records. Inbound mail servers
that are configured to parse SPF return one of several possible responses, and system administrators can
decide what to do with the result.
• Sender ID: The convergence of Microsoft's Caller ID for E-Mail proposal and Meng Wong's SPF. Microsoft
has submitted this to the IETF.
SPF is the only initiative that has been adopted. A significant number of domains publish SPF records,
including AOL. It has been injected into the open source "wild," which means its growth is viral. The
number of open-source mail servers that support SPF is increasing, and it is being adopted into antispam
software.
29
Sender Policy Framework (SPF)
• SPF records are TXT records in DNS
• mail server, or anti-spam filter, that supports SPF
checking does a DNS text query for the address
supplied in the SMTP (Simple MailTransfer Protocol)
“MAIL FROM” command. Response may by
–
–
–
–
–
–
No published SPF records
Pass
Fail
Sender cannot be confirmed as legitimate or illegitimate
Lookup error
The check is neutral or incomplete, which should be treated as
if there was no SPF record
18.11.2004
30
A domain’s SPF records indicate which servers are allowed to send e-mail on
behalf of that domain — that is, which servers can send e-mail purporting to be
from an e-mail address at that domain. SPF records can be constructed loosely to
indicate that “these particular servers are definitely legitimate, but mail from
other servers may or may not be legitimate,” or they can specify that all servers
can legitimately send e-mail from that domain.
Publishes where correct mail from <domain> should originate – MARID closed
sept 04 because of Microsoft license violations
- Switch nutzt SPF nicht weiter
30
Receive Server Actions (Black lists)
http://mail-abuse.org/rbl
Relay Blocking
List (RBL)
230.60.6.6
52.5.33.5
Mail Abuse
prevention
List (MAPS)
230.60.6.6
212.14.4.76
http://mail-abuse.org/rbl/
http://mail-abuse.org/dul/
Relay Mailserver
Mailserver des Empfängers
124.12.50.2
!
Internet
Internet
230.60.6.6
Spammer
212.14.4.76
18.11.2004
ISP des Spammers
212.14.4.10
Empfänger
124.12.50.24
31
Verschiedene Blacklists enthalten Adressen und Namen von Rechnern, welche
sich nicht „be a good Netizen“ konform verhalten. Solche Listen sind
beispielsweise:
ISPs, Server und Rechner, über welche SPAM verschickt wird und die trotz
Warnung nichts dagegen unternehmen, sollen bekannt gemacht werden.
•Mail Abuse Prevention System (MAPS) http://mail-abuse.org Listen
•RBL (Realtime Blackhole List) http://mail-abuse.org/rbl/
•DUL (Dial-up User List) http://mail-abuse.org/dul/
Server, welche beliebig als Relay bzw. Sende-Server verwendet werden können
•Open Relay Behaviour modification System (ORBS)
http://www.orbs.org (tracking SMTP servers that have been confirmed to
permit third-party relay)
•MAPSSM Relay Spam Stopper (RSSSM): queryable DNS-based
database of spam-relaying mail servers, Sites are added to the RSSSM
because they are insecure ("open relay") email servers that have
transmitted spam to our users
31
Example Server Side Blocking:
Spamhaus Block List ("SBL")
• set mail server's anti-spam
DNSBL feature (sometimes
called "Blacklist DNS Servers"
or "RBL servers") to query
either of the DNS zones:
– sbl.spamhaus.org
– spamhaus.relays.osirusoft.com
• February 2003: SBL protects
approximately 110 million
users
• ROKSO: Register of known
SPAM Operations
18.11.2004
32
The SBL is a free DNS-based database of IP addresses of spam sources (spammers, spam gangs
and spam support services) queriable in realtime by mail systems throughout the Internet for the
purpose of refusing Unsolicited Bulk Email (spam).
The SBL database is updated 24/7 by an international team (US, UK, NL, I), distributed by 16
SBL zone mirrors based in Belgium, Denmark, Germany, Greece, Italy, Netherlands, South
Africa, UK and USA, and supplies direct hourly SBL feeds to many of the Internet's major
service providers, corporations, universities, government and military networks.
The SBL is used by numerous U.S. and European backbones/tier-1 providers and ISPs, a number
of U.S. and European government and military networks, and a number of large free email
providers. Most large SBL subscribers, universities and corporations (including major banks,
aerospace, electronics and computer manufacturers) have direct hourly SBL feeds and thousands
of mail relays throughout the Internet subscribe to sbl.spamhaus.org in normal DNS-Query mode.
At February 2003 we estimated these to be serving approximately 75 million users. In addition to
these, a mirror of the SBL is also incorporated in the relays.osirusoft.com DNSBL which itself
has an estimated coverage of 35 million mailboxes, meaning the SBL currently protects
approximately 110 million users.
ROKSO is a register of known spam operations (spammers and spam gangs) that have been
thrown off Internet Service Providers 3 times or more. These are the 180+ known determined
spammers, many with criminal records for fraud and theft, responsible for over 90% of American
and European spam. ROKSO collates information and evidence on each spam operation to assist
ISP Abuse Desks, researchers and Blocklist maintainers.
[http://www.spamhaus.org/SBL/sbl-faqs.lasso]
See also: http://spamcop.net/bl.shtml
32
Collaborative spam identification
databases (NetworkTests)
• Razor database http://razor.sourceforge.net
– allow Unix clients to work out of the same database used by
the commercial customers of the Cloudmark system
• Pyzor http://pyzor.sourceforge.net
– free database and software system, written by Frank Tobin.
• Distributed Checksum Clearinghouse (DCC)
http://www.rhyolite.com/anti-spam/dcc/
– thousands of clients, more than 200 servers
– counting checksums related to more than 130 million mail
messages per day
– If messages with a specific checksum are sent to more than a
given number of
18.11.2004
33
The idea of the DCC is that if mail recipients could compare the mail they
receive, they could recognize unsolicited bulk mail. A DCC server totals reports
of checksums of messages from clients and answers queries about the total counts
for checksums of mail messages. A DCC client reports the checksums for a mail
message to a server and is told the total number of recipients of mail with each
checksum. If one of the totals is higher than a threshold set by the client and
according to local whitelists the message is unsolicited, the DCC client can log,
discard, or reject the message.
Razor mach fixe Checksumme – sobald mindestens ein Buchstabe anders ist,
erhält man eine andere Checksumme.
DCC: Fuzzy-Prüfsumme über Body und gewisse Adressfelder, ähnliche Mails
haben gleiche Prüfsumme
33
Distributed Checksum Clearinghouse
(DCC) - Performance
Quelle: www.dcc-servers.net
18.11.2004
34
34
Greylisting
• Greylisting Triplet
– IP address of the host attempting the delivery
– envelope sender address
– envelope recipient address
• Refuse delivery of mails with unknown triplet (Send
failure code to the originating server)
– Temporary failure Error code 451
– Triplet blocking expiration time is 1 hour
– Expiration time of the triplet record is 4 hours
• Store new Graylisting Triplet
18.11.2004
35
Ref: Evan Harris, The Next Step in the Spam Control War: Greylisting, Revised: 2003-08-21
Greylisting got it's name because it is kind of a cross between black- and white-listing, with
mostly automatic maintenance. A key element of the Greylisting method is this automatic
maintenance.
The Greylisting method is very simple. It only looks at three pieces of information (which we will
refer to as a "triplet" from now on) about any particular mail delivery attempt:
•
The IP address of the host attempting the delivery
•
The envelope sender address
•
The envelope recipient address
From this, we now have a unique triplet for identifying a mail "relationship". With this data, we
simply follow a basic rule, which is:
•
If we have never seen this triplet before, then refuse this delivery and any others that may
come within a certain period of time with a temporary failure.
Since SMTP is considered an unreliable transport, the possibility of temporary failures is built
into the core spec (see RFC 821). As such, any well behaved message transfer agent (MTA)
should attempt retries if given an appropriate temporary failure code for a delivery attempt
(see below for discussion of issues concerning non-conforming MTAs). Greylisting is said to
block 95% of SPAM!
Problems, to be discussed
•
Delay (Temporary failure Error code 451, Triplet blocking expiration time is 1 hour,
Expiration time of the triplet record is 4 hours)
-
Mails in database e.g. ebay change sender id for each resend
-
Spammer will introduce a simple queuing scheme
35
Distributed Approach:
Cloudmark SpamNet http://www.cloudmark.com
• Freeware
• Spam blocked based on votes of users
(SpamNet community):
– Members report SPAM-addresses to SpamNet
– integrity of user-reported spam messages checked in Truth
Evaluation System (based on volume of spam reported, report
accuracy and relevance)
• March 17, 2003 (Oct 17, 2002):
– 315’021 (131’898) SpamFighters
– 14’417’098 (5’028’395) Emails processed today
– 3’305’893 (1’721’074) Spam caught today
18.11.2004
36
Users who detect a spam message in their mailbox can submit a signature of this
mail to Cloudmark SpamNet. (The system generates a secure fingerprint or
signature of each message.) This unique, but indistinguishable, fingerprint can
now be securely shared with all the other SpamNet users to identify the same
spam message in their email. This system permits everyone to contribute to the
fight against spam and ensures that all email remains private.
To ensure that you never lose email, no messages are ever deleted or blocked. If a
message is identified as a known spam message, it is simply tagged as spam and
moved to your Spam box. This process allows you to verify that all the messages
in the Spam box are really spam.
The SpamNet system has been running smoothly for over a year. During that
time, thousands of users have endorsed the system's effectiveness by processing
millions of email a day through SpamNet. The proven system will immediately
cut your spam dramatically, but you can also choose to turn the spam checking
off at anytime. The Cloudmark SpamNet Outlook add-in won't interfere with
your email if you choose to discontinue using the service.
36
Perspektive Datenschutz
Ab April 2005
nehmen 80% der
Schweizer nur
noch E-Mails von
Bekannten entgegen.
18.11.2004
37
Vielleicht ist die Spamproblematik auch ein Grund, elektronische Signaturen
einzusetzen, um verschiedene Mail-Klassen zu ermöglichen. Beispielsweise
•Mails von authentisierten Absendern kommen in eine spezielle Mailbox
•Mails von nicht authentisierten Absendern, welche nicht als SPAM
gekennzeichnet sind kommen in eine andere Mailbox
•Als SPAM gekennzeichnete Mails werden eventuell direkt gelöscht
37