Re: [Asrg] How do we do something about spam?
2007-02-09 23:50:03
[blocking executable attachments]
And that is really rather easy... you simply block any
HTML or attachments (and particularly EXECUTABLE
attachments) that isn't coming from a sender that is
known
and trusted by the recipient TO SEND THEM EXECUTABLE
CONTENT.
Pray tell, how am _I_ to block the executable content
from some dialup
luser on level3's machine? All _I_ can do is block his
emissions from
_my_ machine.
What one does is to block incoming messages based on a
fine-grained whitelist, and with a default for
non-whitelisted senders which is at least "safe" (no
attachments, no HTML, less than some maxmium size).
Instead of a gross no-nogo whitelist, the whitelist would
list which features would be expected (and allowed) in
E-mails from familiar and trusted senders. After that
initial triage, the remaining E-mails would still be
checked by a SpamAssassin-type content filter (which could
actually do a quite respectable job, given that
text-as-image, embedded links, scripting, and most all the
other classic spammer tricks would be simply ineffective.
Note that MOST users (probably 98-99%) will not
whitelist
ANYBODY to send them executable content in E-mails...!
Are you considering .jpg to be executable?
No, although that could be its own whitelist/permissions
category. I wouldn't allow ANY image types for
non-whitelisted senders, mainly because that allows
spammers to send "text as image" to avoid content
scanning.
The other way that botnets are recruited are by people
visiting infectious Web sites, but that is a problem for
a
different list.
But the *spam* emitted by those machines _is_ a problem
for this list.
Absolutely. But if we put measures into effect to make
one very unlikely to ever get their machine infected via
an incoming E-mail, then we can hugely reduce spambot
recruitment.
[next comment]
Subject: [Asrg] please disregard message from me sent to
asrg list by accident
My apologies. Can't go trusting
"autocomplete" to always do the
right thing. I wonder if the fellow who is working on
per-correspondent statistical
profiles will incorporate flagging for confirmation of
outbounds as
well that do not
match what is normally sent _to_ a peer: that feature
might have helped in this
case.
While outbound spam detection might be useful at an ISP
it's not likely to make a big dent in spam, simply because
spammers either avoid the ISP's restricted mail servers or
because they don't use a traditional ISP at all. Also
note that some "customers" represent a large array of
subusers (say, a Starbuck's). One can't reasonably expect
those E-mail messages to resemble each other...!
[next comment]
[...at the risk of giving spammers new idea, what if]
there is a
stealth virus that watches who you send executable
attachments to and
every once in a while attaches itself to one of those
emails by
infecting the application that you are already sending?
The fact is that very few folks, Internet-wise, ever send
legitimate executable files as attachments to anybody.
And few people will ever whitelist ANYBODY to send them
executable attachments (or similarly dangerous ActiveX or
scripting etc). Those people (and they are a sizeable
majoirty of the folks on the net, I believe) will
basically NEVER get any E-mail viruses or worms.
Those who DO expect to get E-mail messages containing
executables from their correspondents are probably also
savvy enough (most of them, at least) to not be taken in
by bogus messages pretending to be something they are not.
Now, it is certainly possible that a rogue program COULD
corrupt a (say) compilation, so an in-theory-clean program
was in fact infected BEFORE SENDING.
But again, we've still put a MAJOR crimp in virus/worm
distribution, and if we do that well enough the spammers
will give up on that venue (much like they've mostly given
up on boot sector viruses on floppies).
Note that MOST users (probably 98-99%) will not
whitelist ANYBODY
to send them executable content in E-mails...!
From a quick survey, I would say that 90% of the
participants on
this list don't even consider it a possibility that a
silly windows
virus in an email attachment could infect their machine.
Sure, if you're running a (say) Alpha processor or some
such, or for that matter if you're using an IBM mainframe
for your E-mails, then a Windows virus isn't going to do
much to you.
On the other hand, most of the participants on this list
are a whole lot more savvy anyhow than the folks who are
most likely to get their machines infected.
That's why it's not at all adequate to build defenses into
(say) Exchange; they need to be in Outlook and Outlook
Express (for example) so that the great unwashed masses
will have (and use) those defenses.
Most of the
rest would be adequately protected. Some though may
actively seek the
viruses so they can disassemble them. But then, this
isn't a typical
user population.
And those who wish to receive them for such research
purposes could simply ignore the warnings and enable them.
Again, they probably aren't the problem areas for zombie
recruitment.
A substantial portion of the net user population are
actively
exchanging executable files.
Sure, and some people don't use condoms, either. That
doesn't mean that we should do anything to enable or
promote that sort of unsafe behavior.
I even get the occasional
executable
file from my dad forwarded through a long chain of
friends. He
complains sometimes about not being able to open them at
home but
forwards them to his office where they will run.
Obviously that's evidence of malfeasance by his office's
system admins.
When I get such a "long list of forwards" of executables,
I generally look at who sent it to me, see if it looks
like they INTENDED to send it (or was it a hostile alien
bot from their machine which sent it?), etc etc. And even
then, I tend to put it in my "zoo" (critter quarantine)
folder, for several months and then may eventually check
it out if nothing has indicated a problem with the file
based on other, less cautious recipients.
The other way that botnets are recruited are by people
visiting
infectious Web sites, but that is a problem for a
different list.
There are lots of other vectors for passing malicious
code to
machines willing to suck it in.
Perhaps, but in any case OUR task here is dealing with
E-mail. Our charter is not "the infinitely robust
operating system". Not that that's a bad thing, but it's
not really our problem HERE, at the moment.
But I don't believe in blocking legitimate activity to
stop a few
criminals that also use that activity.
The point is that you're not "blocking" ANYTHING that the
recipient wants to receive. That's because the recipient
can whitelist anybody they like to send them any kind of
content they like. It only just says that (probably
bogus) mail from unknown/untrusted senders will be
quarantined and probably never released.
If an ISP can
block executable
attachments in the "hope" of preventing a users machine
from getting
infected
I don't propose that the filtering be done by the ISP,
although the principle certainly doesn't preclude the
filtering from being done at the ISP, but (again) under
the specific direction (perhaps the default one) set by
the individual recipient.
then they can just as easily unplug that users
machine from
the net IF it gets infected and starts abusing the net.
The problem is that even an infected machine might still
need to send occasional, legitimate E-mail messages. They
also might need access to the Net to locate and download
disinfection software, etc.
Disconnecting a computer from the Net is not a good
solution, IMHO.
If an ISP
wants to be proactive they could supply anti-virus tools
like a Linux
installer for their customers.
Many of the bigger ISPs DO provide antispam software, but
antispam software (with few exceptions) only identifies
and blocks KNOWN exploits. Most viruses are at their most
dangerous and prolific BEFORE they are recognized by ANY
antispam program. The nice thing about what I propose is
that most folks would simply never receive an E-mail virus
ever again, even if they didn't update their viruses
defenses for many years. No more daily/weekly/monthly
updates of virus signatures.
[next comment]
...a FAR better solution (rather
than
attempting to block spam AFTER the botnets are
recruited)
is to block the virus/worm code-containing E-mail
messages
BEFORE they infect those computers.
Ideally. On the other hand, that option is often not in
our hands.
I believe it is probably desirable to implement such a
filter at the RECIPIENT, either at the recipient's ISP, or
at the recipient's machine itself. ISPs can recommend
solutions.
And that is really rather easy... you simply block any
HTML or attachments (and particularly EXECUTABLE
attachments) that isn't coming from a sender that is
known
and trusted by the recipient TO SEND THEM EXECUTABLE
CONTENT.
Recipients are very often not in a position to make that
judgement.
And by default, executable attachments would be disabled
from delivery to most users. They could re-enable that
(or other dangerous stuff) but only after being warned
about the hazards, and why they should not do so unless
they know EXACTLY what they are doing and WHY they are
doing it, etc.
Also, how many of those trojans spread via browser
exploits, spyware, or
other similar techniques?
Some, surely. But our charter HERE isn't really "Web
browser safety", that's really an issue for another group.
Meanwhile, I still believe that eliminating E-mail as a
vector for virus/worm distribution will ENORMOUSLY help
both the virus/worm problem, AND the spam problem.
The email exploit vector is
mostly focussing
on getting people to visit websites rather than actual
distribution of
exploit code.
Sometimes yes, sometimes no. Increasingly, Web browsers
are being configured out-of-the-box to not run executable
content without checking with the user, first. (And that
process could probably be improved further).
Now the idea of suing people who allow their hosts to
stay infected is
one I like. A few headline making cases and we *might*
have results.
I don't think that suing other victims is ultimately a
very good solution to the problem.
[next comment]
simple... I know that a lot of y'all have this fixation
on
IP-based solutions, ...
The reason people have a fixation on IP-based, or
signature-based
identification mechanisms is simple.
Without a guarantee of 'identity', you can't whitelist
someone.
Well, you certainly can't whitelist them on the basis of
IP address; I might send E-mails during my vacation from
a cruise ship Internet cafe or from a post office Internet
E-mail center above a post office in Beijing. What
matters more isn't the IP address, it's whether I send
E-mail that still looks like what I send to a specific
recipient.
And I don't even think it really matters all that much
whether we have a "guarantee of identity" anyhow, although
it might be nice (if it's possible without major
inconvenience).
You'll
end up adding a whitelist entry which viruses will forge
mail from in
order to get to your inbox.
Viruses on some other machine will probably not know what
YOUR whitelist permissions are based on. And individual
recipients are likely to have different whitelist
permissions anyhow. The result is a twisty and narrow
path which is difficult for a virus or worm to navigate
through.
I'm not saying that it's impossible that viruses won't
suddenly be more specific about whose From: addresses they
forge (say, Borland or Symantec or someone that 'more'
users might otherwise trust to send them executable
attachment). But most viruses won't know WHICH recipients
are set up to receive THAT sort of content from THAT
E-mail address.
A whitelist is simply an end-user accredited reputation
service. Like
all reputation mechanisms, it makes no sense if the
entity being queried
for can not be proven to be the same as the one being
vouched for.
I disagree that "it makes no sense". I don't believe that
it HAS to be 100.0000% perfect. I think it basically has
to be good enough that spammers and worm authors decide
their time is better invested doing something else.
[next comment]
There should be a generalized rule to not automatically
process
information from unknown sources. Processing includes
fetching images,
running scripts, validating digital signatures, and
verifying IP address
authorization (especially when this might require
hundreds of
transactions).
I think that's one reasonable interpretation. Things
which COULD be dangerous, or which are commonly used to
avoid antispam content scanning, ought to simply be
considered "a priori" evidence of hostile intent if it
hasn't been negotiated and cleared with the individual
recipient in advance.
Such a rule will not expose internal
handling and
minimizes risks associated with DDoS attacks.
Yes.
Only when a _trusted_ source has been verified, should
the message be
annotated. A recipient's address book could be one
method of
determining a trusted domain where out-of-band
verification techniques
can be employed.
I don't think it's probably necessary (or even desirable)
to use more elaborate "verification techniques". I might
be visiting a friend and need to send one of MY E-mail
messages from HIS machine. That shouldn't cause any
grief, really.
A means to correlate DKIM domains with that of a
verified SMTP client
could permit DKIM serving as a basis of acceptance.
I believe that vanity or personal domains should be able
to be used from inhabitual locations. That's why I
believe these sorts of 'verified SMTP client' stuff is
misguided. (It's neither necessary nor suffient to
determine 'spamminess").
[next comment]
The reason people have a fixation on IP-based, or
signature-based
identification mechanisms is simple.
There is an old adage among programmers... "Software
should be as simple as posssible, BUT NO SIMPLER!!!"
[next comment]
Put another way, zombie botnets are the enabling
technology of spam
(phishing, etc.)
Easier said than done I realize, but it's inherently
illegal to create
and operate zombie botnets, and I don't mean just in the
US, most
anywhere on the planet.
[snip]
It's as if I could make this message appear in 100
million mailboxes
in the next few hours, despite many efforts to the
contrary.
I couldn't. You couldn't.
It takes a zombie botnet.
There are other issues, but I'm focusing on this one as
the most
egregious and, I hope, easiest to agree on in terms of
contribution to
the problem and legal/moral unambiguity.
I agree... it is much harder to get the spam problem under
control simply because of spambot recruitment.
And I don't think it's all that hard to take a BIG bite
out of that.
[next comment]
By making spam illegal, the act of transmitting a high
volume of
unsolicited messages would then clearly serve as
evidence of crime.
Right, but probably not on the part of the OWNER of that
infected machine. He is probably just another innocent
victim himself.
This would place accountability onto the provider. The
efforts
behind SPF and DKIM are aimed at passing blame to a
hapless
customer. Thousand of domains might share an SPF
authorized server
which is likely to have only a few IP addresses.
An example would be a domain provider like Domain Direct
or GoDaddy. But as a customer of EACH of those, I still
could be traveling and need to send a message (using MY
domain name) from a cruise ship Internet cafe or post
office E-mail kiosk. I have NO control over which SMTP
server processes my message.
Making spam illegal would make networks many orders of
magnitude safer.
CAN-SPAM has done REMARKABLY little to cut down on
spamming.
I think a far better solution is simply to allow the
recipient to efficiently refuse mail they don't want, or
don't trust.
Make a law that requires
providers sign all
public messages with their own keys. There should even
be laws that
prohibit signing with a customer's key.
So what about mailing lists, such as Yahoogroups?
Customers can
reference
specific keys used on their behalf instead. There
should be laws
against the use of highly danger authorization schemes,
such as SPF/
Sender-ID.
I think SPF is a very poor solution.
Poisoning or destroying DNS is easily
accomplish with
this loathsome technology. A technology also aimed at
side stepping
accountability.
I don't like SPF either.
There is no other way we know of to send out on the
order of one
billion emails per day for a cost which even approaches
the
expected value of those messages and would so
successfully evade
already commonplace blocking and filtering methods.
Does anyone disagree with that?
Enforcement must make any spam illegal AND hold
providers
accountable.
I don't think "providers" have all that much control.
To ensure enforcement, allow anyone
damaged to seek
legal relief.
Talk about encouraging rampant lawsuits. (What happens
when the spammers THEMSELVES sue as if they are the
injured party...??!)
There are few providers that want to consider their
accountability as
part of the cost of doing business. No one can afford
to clean up
the mess being made.
The way that spam will ultimately be controlled is by
making it hard enough that it's more trouble than it's
worth.
Content or intent do not need to be considered. The
volume and lack
of solicitation provides key differences.
I'll provide a counter-example.
A manufacturer does not "solicit" customer service E-mails
(well, at least not from specific, known consumers). They
still need to be able to receive e-mails (at least of
"limited" types) from previously unknown-to-them senders.
The lack of
solicitation
allows for rather easy methods of enforcement. One
grows weary
logging trespasses that can only be considered privately
as bad.
I think legal means are ultimately problematical because
of the indeterminate jurisdictions involved. What's more,
the problem can be solved adequately without lawyers and
courts.
Those making these private assessments remain exposed to
civil
proceeding as a result. Spam must be illegal to stop
it.
I disagree.
Among other things, it is VERY difficult to prove in a
court of law WHO caused the spam to be sent.
People will stop sending spam when it ceases to be
worthwhile.
[next comment]
Providers must control access, block abusers, and be
held accountable
when they fail to do so. When someone spams, they must
be blocked.
So you block Aunt Matilda because her machine got
infected. Now what?
Sending volumes of unsolicited messages is rather easy
to detect,
How do you know (and prove) that they are unsolicited?
where
miscreants can be blocked quickly. When this traffic is
from customers
using compromised systems, then each problematic
customer's outbound
messages must be blocked.
I don't think that must be done. I believe my approach
allows them to continue to send legitimate mail, and
allows an effective triage of legitimate from illegitimate
mail.
Of course, the next concern might be malware placed in
websites, even
things like Wikipedia might contain malware. There must
be efforts made
to ensure blogs are properly defanged as well.
Agreed, but that is a separate issue than OUR charter
HERE.
I am concerned about E-MAIL as a vector.
[next comment]
Make spam illegal and hold providers accountable
instead.
Who do you sue? How do you prove who caused the spam to
be sent? What court has jurisdiction? Who has to pay the
lawyers involved?
Gordon Peterson
http://personal.terabites.com
1977-2007 Thirty year anniversary of local area
networking
_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- Re: [Asrg] How do we do something about spam?,
gep2 <=
|
|
|