ietf-asrg
[Top] [All Lists]

Re: [Asrg] How about we do something about spam?

2007-01-31 10:41:24
On Wed, 31 Jan 2007 11:05:21 -0500
 David Maxwell <david(_at_)crlf(_dot_)net> wrote:
On Tue, Jan 30, 2007 at 10:07:51PM -0600, gep2(_at_)terabites(_dot_)com wrote:
[problem of botnets as spam originators]
The solution to the problem is actually AMAZINGLY simple... I know that a lot of y'all have this fixation on IP-based solutions, but a FAR better solution (rather than attempting to block spam AFTER the botnets are recruited) is to block the virus/worm code-containing E-mail messages BEFORE they infect those computers.

And that is really rather easy... you simply block any HTML or attachments (and particularly EXECUTABLE attachments) that isn't coming from a sender that is known and trusted by the recipient TO SEND THEM EXECUTABLE CONTENT.

Note that MOST users (probably 98-99%) will not whitelist ANYBODY to send them executable content in E-mails...!

The reason people have a fixation on IP-based, or signature-based
identification mechanisms is simple.

Without a guarantee of 'identity', you can't whitelist someone. You'll end up adding a whitelist entry which viruses will forge mail from in
order to get to your inbox.

Well, it IS likely that desperate spammers would try to forge mail to seem like it comes from widely-trusted senders who recipients are likely to have some kind of whitelist entries for.

On the other hand, that still limits spammers and viruses in terms of WHAT they can send, and encourages legitimate senders to not send types of content which are likely to be misused for malicious purposes by forgers.

A whitelist is simply an end-user accredited reputation service.

If it were a simple go/no-go whitelist, yes. The fact of it being a fine-grained whitelist is a horse of a different color, because it also creates a narrow sender-specific keyway through which mail from THAT SPECIFIC sender must fit in order to be accepted.

Like
all reputation mechanisms, it makes no sense if the entity being queried for can not be proven to be the same as the one being vouched for.

While that's a valid point, I'll also point out that once an E-mail has gone through an intermediary MTA, (in fact, even BEFORE then) it's hard to be 100% sure where it originally came from in IP address terms, either. Spammers OFTEN forge counterfeit, bogus Received: headers too.

So what's to prevent them from forging a Received: header with a trusted-sender IP address?

The bottom line is that the best way to decide that an E-mail is legitimate or not is by examining THE TOTALITY of the information available, and that goes well beyond the information in the headers. It includes relating the CONTENT of the mail to what the recipient expects from that sender.

If someone got, for example, an e-mail that claimed to be from me but which was all in chinese characters, they would probably quickly conclude that my return address was forged.

The fact remains that putting so much effort behind IP-address-based solutions will NEVER yield as good a solution as a solution which includes message content analysis ("SpamAssassin" or similar), ALONG WITH fine-grained, sender-specific rules which robustly deny spammers nearly all the tricks that they use to evade content analysis filtering.

And the OTHER major thing we need to do is to come up with a set of "best practice" guidelines (probably based on the "fine grained whitelist" and suitable default rules like I've proposed here) which basically eliminate E-mail as a recruitment mechanism for zombie spambot armies. Forcing spammers to directly use their own machines for spamming would put a MAJOR crimp in their operations, and help make virtually all the other anti-spamming approaches to be a lot more effective.

I honestly don't understand why we're even still arguing about this. It's obvious that it makes for a HUGE improvement, and obvious that it can be implemented without having to re-engineer the whole E-mail system or the whole Internet.

The biggest area of discussion is that it would (admittedly) be nicer to truncate the unwanted E-mail earlier in the distribution chain. But that's not critical, at least from the end-user position.

More to the point is that if we DO implement this at the end-user position, nearly everywhere, spammers simply will give up trying to send E-mail that they KNOW will get through in only such tiny numbers that it simply isn't worth the effort anymore.

At THAT point it doesn't matter where we truncate the flow, because the only people still trying are those who are simply trying to play with the infrastructure of the Net, and:

  1)  there isn't any money to be made doing that;

2) it's about as satisfying as trying to argue with a vending machine that stole your money.

So it probably isn't NECESSARY to stop the transit earlier in distribution, if it WILL be stopped SOMEWHERE enroute (even at the end).

At least we can offer relief to the great majority of Internet users, and reduce the remaining problem (if there still is one) to something that ISPs and backbone operators can deal with.

BTW, that's another reason for my proposal that we limit the maximum size of non-whitelisted E-mails, too... so hopefully the bandwidth used by such residual spam messages will become smaller, as a percentage of total backbone traffic, as legitimate higher-volume traffic (video webcams, high-quality streaming audio, video streaming, etc) become dominant. Hopefully it will also help discourage the spammers possibly shifting to bulkier types of messages which clog inboxes and the limited bandwidth of dialup users. Gordon Peterson
http://personal.terabites.com
1977-2007 Thirty year anniversary of local area networking

_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg