Re: [Asrg] Re: Asrg] My take on e-postage
2004-04-26 05:15:27
First things first. The resource being consumed/abused is the
recipient's inbox.
While not the ONLY one, I'll agree that that's the one which is the
biggest
problem and the most annoying from the perspective of typical users.
Agreed.
I've specifically mentioned HTML and attachments, but a similar
control might be
that a recipient might want to limit the ability of non-whitelisted
senders to
(say) drop messages bigger than a certain SIZE into their Inbox, too.
If
someone is going to be gone on a cruise for a week or two...
I don't think that recipients really give even a half-hoot about
stamps. What
they have is a limited resource (Inbox, and their time!), and they
typically
want to restrict WHO has access to it, or (if they're a newcomer) how
much space
they can use until the recipient has decided whether or not to grant
them more.
That's also an interesting way of looking at the problem, but it can
already be handled without extra standards. Perhaps someone could
write something to hook into procmail, and/or write a BCP.
In a recipient-driven scheme, senders still have to be able to buy
stamps, but they will be able to choose their stamp vendor, rather
than being limited to their ISP.
Stamps are stupid and cumbersome. I agree with those who point out
that the
purpose is to limit sending rate and volume, and that there must be
easier and
less complicated/expensive/disadvantageous ways to do that.
Without attaching *some* new piece of information to the mail itself,
the only even partial solution I can see is rate-limiting by the
sender's ISP. Which isn't happening, in general. Only a few ISPs -
the most savvy and network-oriented (as opposed to revenue-oriented) -
seem to have any mechanism to detect and deal with zombies.
There's always going to be a zombie-PC problem, to some extent at
least.
Thanks for also pointing that out. That is in fact the KEY problem,
at least using present-day spammer approaches.
Hold onto that thought.
Why did spammers start using zombies? Because we got good at
blacklisting by IP address.
Why did we blacklist by IP address, rather than whitelist by e-mail
address? Because we didn't have any strong authentication method that
was widely used - and we still don't.
There's NOTHING inherently more secure about the Mac, other than the
fact that
it's a distinctly second-string system in terms of frequency and
therefore
hackers haven't focused their attention on it. If everyone were
running Macs,
or everyone were running Linux, then hackers would be writing Mac or
Linux worms
instead, and they'd be comparably successful.
Note that (just recently) a multi-university "distributed
supercomputer cluster"
of *nix-based boxes was penetrated by hackers, much to the chagrin of
the
associated administrators. And THAT was a system which DID have savvy,
highly-intelligent-and-qualified admins AND expensive,
professional-grade
systems and "serious" OSes.
The difference is that the cluster was hacked by a determined,
"professional" cracker in an isolated incident. The Wintel zombies are
being compromised by what we used to call "script kiddies" using
mass-market exploits, via vulnerabilities that were either known (and
were patched) long before, or social engineering coupled with poor OS
design.
While the Mac and Linux are not perfect, they do lack many of the
fundamental design flaws that make Windows such a soft target. Linux
MUAs are largely incapable of creating an executable file on their own,
and have to be deliberately coaxed into expanding a tarball in such a
way. Apple Mail isn't quite as mistrustful, but it's generally clear
to a Mac user what is an executable and what isn't.
A problem is that zombies can't merely be used as a relay, they can
also be used to leech any stamp account the victim uses for their own
e-mail.
Absolutely. And that's why _all_ of these modified-DNS, SMTP-auth,
SPF,
certificate, E-postage, and similar such systems are ALL simply
non-starters.
NONE of them solve the problem, because zombie enlistment will enroll
legitimate
(trusted, legitimate) systems to serve spammers.
Then how do you propose to get rid of the zombies? I thought we just
agreed they were always going to be a problem.
If the resource being leeched is controlled by a third party, however,
it's easier to monitor and take action on suspicious behaviour. This
is why e-postage can be helpful - as I mentioned immediately
afterwards, the compromised account will quickly run dry.
However, the compromised stamp account will quickly either become
empty or run up a monstrous bill on the victim's credit card (the
former situation is obviously preferable, and I'd hope that consumer
stamp accounts were set up that way).
Either way, there's going to have to be a procedure (probably
involving per$onnel) to deal with that $ituation when it (frequently)
develop$.
Of course. Education is vital! Perhaps, to save personnel costs, ISPs
(especially those who are also stamp vendors) will start throwing in
antivirus software, easy-to-use personal firewalls, and even (wow!) day
classes for net-newbies.
Taking the "Harry Hardass" approach ("well, that's just too frickin'
bad, maybe you'll learn next time to not let your system get
infected!") will end up eventually driving a lot of people offline
that *need* to be online. This kind of thing will eventually become a
NIGHTMARE, and a costly one to boot. I really don't see it as a
practical solution.
ISPs that take that kind of attitude probably deserve to lose
customers. The *right* approach is to offer advice on how to clean up
and secure their machine, and how to avoid future infections. It's not
really all that hard, and they could even print a leaflet about it with
step-by-step instructions.
After that, the zombie can still spew mail all over the place, but it
will be unstamped. The empty account (or huge bill) also serves as a
wake-up call to the victim, to get their machine cleaned and secured.
Fine, but again, meanwhile, you're going to have lots and lots of
spam. And for every spambot zombie that you clean up, the spammer
will create two new ones.
Unstamped spam isn't going to get into the inboxes of participating
recipients - that's the whole point. Once woken up, the victim might
be one less person to get re-infected in the future, so perhaps the
endless supply of zombies will get less plentiful in the future. At
the moment, there's little or no feedback to victims, so they don't
learn anything.
The interesting thing is that a stamp can also act as proof of where
the mail was sent from, and/or who by, because there's a money trail
(if nothing else) to follow, and each stamp is unique.
Again, I think this is one of those "it seems like a step in the right
direction" things, like SPF, that ultimately doesn't really answer the
spam problem in a meaningful way.
...but it's not actually a *bad* thing, is it?
This probably won't tell you who the spammer is, but it can help for
whitelisting...
Well, you know, I don't think that you really HAVE to do that for
useful
whitelisting. It's sorta like the metal grills in the door windows of
microwave
ovens... if the holes are small enough, the microwaves simply don't
escape even
though there are millions of holes.
Uh-huh...
forgery detection,
Forgery detection sounds fine, and I suppose that you could even just
build your
OWN statistical table based on IP addresses that you've seen in the
headers of
valid E-mails coming from whitelisted senders, but again that fails
dramatically
when the "valid" non-forged sender gets infected and starts sending
spams with
valid return addresses.
But in that case, you know who's sending it, so you can block them
temporarily and help them fix it.
I think that one can forego trying to detect forgeries, actually, as
long as you have a good way to detect spams based on their CONTENT.
But we don't. If we did, we'd be able to stop spam, NOW, just by
slapping one of these perfect filters on the front of our inbox.
Here's some news: we already do use content filters - everything from
Bayes through distributed bulk detectors to phrase matching. It helps,
but it is absolutely nowhere near perfect.
...and for notifying victims. And it doesn't require the victim's
ISP to lift a finger, unless they also happen to be the stamp vendor.
E-postage is cumbersome, costly, and very labor-intensive to deal with
the problems that would inevitably result from it.
Some of the proposed schemes undoubtedly are. Have you read the
discussion I've been having with "der Mouse" over the past day or so?
I think we've hashed out something a lot more scalable than most,
though I won't pretend it's finished. Many schemes and objections seem
to assume, for example, that stamps have to be anonymous like e-coins -
which makes them unreasonably hard to verify.
There are alternative schemes which can operate alongside e-postage
to eliminate the monetary cost for most normal purposes. A
combination of a proof-of-work stamp (such as hashcash) and a
proof-of-identity signature would also serve a useful rate-limiting
purpose. Again, it's up to the recipient to decide how strong a
guarantee he requires before a mail can land in his inbox.
The problem, again, is that both "proof of work" and "proof of
identity" are... JUST like E-postage... subject to being
subverted/stolen by spammers. The army of spammer zombies out there
have a collective computing power FAR greater than that of ALL the
legitimate E-mail publishers. So that scheme simply doesn't work.
Take a look at the numbers I worked out, with commentary, in the
discussion with "der Mouse". The gist of it is that while zombies can
indeed be turned into hashcash factories, they will still be limited to
a tiny fraction of what they'd normally be capable of if they were just
limited by bandwidth. So it improves the situation dramatically when
compared to the status quo.
And that's while keeping the bit count low enough to run on Aunt
Tillie's prehistoric Mac IIcx. If we forget about the IIcx and
concentrate on Pentium-class customers, the rate limit gets even
tighter.
And likewise, "identified" systems can be taken over by zombies. So
neither of these schemes work. Period.
If an identification is compromised, a few spams will get through to
particular recipients who have it on their whitelist, but the
recipients will know exactly who needs to be told about it, and can
remove the appropriate whitelist entries until it gets fixed. Without
the whitelist, the identification becomes moot, as the filter will fall
back on other schemes.
(At the moment, most recipients' barriers to entry are exceptionally
low, even with today's content filters, because there's no practical,
universal way to detect forged mail.)
Detecting "forged" mail, while arguably nice to know, only tells you
whether mail is (probably) forged. It doesn't tell you EITHER that
the mail is, or that it is not, spam.
Do I want forged mail in my inbox? No, because whoever sent it can't
be trusted to even say who he is. End of discussion.
[...] Likewise, they in general don't know who the intended recipient
might have whitelisted, so they don't know either which machines
they'd need to infect (or what From addresses they'd have to
counterfeit) in order to get their spam through to that specific
recipient.
Stop. Think. How do mass-mailing worms usually find machines to
infect? They scan the latest victim's address book. Then they send
infected mail using every combination of addresses they can think of
from that list. Chances are good, a lot of these people know each
other and maybe even trust each other to send attachments once in a
while. Add just a tiny bit of social engineering, and you have a fresh
zombie.
The same logic applies to spam. Chances are, a lot of people in the
address book will be in each others' whitelists.
And the biggest problem confounding most antispam approaches, the
spambot zombie, is virtually eliminated as a threat (at least for
E-mail transmission) by my approach's default of not allowing
executable attachments from non-whitelisted (TO SEND EXECUTABLES!)
senders. Again, note that typical users will normally not whitelist
ANYBODY AT ALL to send them executable attachments!
Executable attachments are old news. Every ISP with a clue already
blocks them. The new threat is ZIP archives! Even better, they're
polymorphic, password-encrypted ZIP archives that are hard to scan with
antivirus programs! Tell me, how do these fit into your brilliant
scheme? Don't forget that these ZIP archives are often apparently
coming from people the recipient trusts, and probably has in their
whitelist...
--------------------------------------------------------------
from: Jonathan "Chromatix" Morton
mail: chromi(_at_)chromatix(_dot_)demon(_dot_)co(_dot_)uk
website: http://www.chromatix.uklinux.net/
tagline: The key to knowledge is not to rely on people to teach you it.
_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg
|
|