Identifications dealing with Bulk Unsolicited Messages (BUMs)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The IP address of the SMTP client can be found within an ASN to uncover
a network provider.  Helos might verify, which may then also identify a
domain used by a network provider's customer.  Of course the host names
within the reverse PTR may also verify as well.  Identifying the network
provider is perhaps the most reliable, as an IP address represents a
basic element of message interchange and routing.

Bulk Unsolicited Messages (BUMs) can cause great harm.  BUMs represent a
great preponderance of message volume, and place a growing burden on
recipients.  These messages can also directly infect systems and offer
links that might then exploit thousands of flaws existing in browsers.
The United State's CAN-SPAM act of 2003 permits BUMs as long as the
recipients can find valid headers and a link contained within the
message.  Without BUMs being universally illegal, only network
provider's enforcement of AUPs prohibiting this activity protects the
Internet.

About 2% of email sources send BUMs that represent more than 80% of the
volume.  Once even more network providers decide to profit from revenues
obtained carrying BUMs, then very rapidly the Internet is likely to
suffer a breakdown created by unrestrained greed.  Rejecting messages
from abusive sources as quickly as possible is not likely to keep pace
with the rising levels of BUMs and their changing strategies.

Rather than applying pressure on network providers to enforce protective
AUPs prohibiting BUMs, some believe identifying individuals sending
messages will allow a greater portion of BUMs to be blocked.  The
concept of using domain identification techniques has already been
countered with domain tasting at a daily churn of as much as 5% of
existing domains.  SPF, Sender-ID, and DKIM offers domain identifiers
that can point to a network provider's customer's customer.

Thomas Nast created a cartoon that captures the situation rather well.
http://www.spartacus.schoolnet.co.uk/USAnast3.jpg

Efforts failing to identify those actually transmitting messages are
disheartening, as these methods overlook significant risks imposed by
the redirection tactics.  This tactics also assume someone else will
deal with the BUM problem.  The more removed from who is transmitting
the message, the less likely any enforcements efforts will be effective
in the milli-second Blitz Kreig being waged.

SPF/Sender-ID uses a DNS based script language that allows the
local-part of an email address to modify a tremendous number of DNS
transactions generated from one cached record.  SPF actually allows DDoS
to be generated by BUMs free for the attacker, and nearly impossible to
trace.

DKIM started out as a good idea, but lacks a means to identify who is
transmitting the message.  Limitations imposed by DKIM require
email-address domain owners to submit private keys to their
email-providers.  Don't worry about the replay problem, as some claim
Sender-ID has that covered.  Both of these schemes require acceptance of
the entire message, which preclude any relief from a BUM onslaught.

Organizations created by providers with a goal to offer solutions have
instead decided to ignore risks and offer solutions unlikely to even
prevent spoofing, let alone make a dent in the BUM problem.  Australia's
Spam Act of 2003 makes it illegal to send even one unsolicited
commercial email to Australia.  The maximum daily penalty is $1.1
million for companies and $220,000 for individuals or anyone knowingly
involved.  At least the Aussies appear to grok the severity of the
problem.

-Doug


_______________________________________________

Ietf@xxxxxxxx
https://www1.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]