1 / 10

Mail Abuse

AfriNIC 11 November 2009. Mail Abuse. S. Moonesamy Eland Systems sm+afrinic@elandsys.com. 1. How do we stop spam. No instant solution. Social problem. AfriNIC 11 - Mail Abuse. 2. How we read an email message depends on the context.

tommy
Download Presentation

Mail Abuse

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. AfriNIC 11 November 2009 Mail Abuse S. Moonesamy Eland Systems sm+afrinic@elandsys.com 1

  2. How do we stop spam No instant solution Social problem AfriNIC 11 - Mail Abuse 2

  3. How we read an email message depends on the context If I send an email to all the people attending this meeting, is it spam? If If I send a personal email to each of you, is it spam? If a person I do not know read these slides on a web site and sends me an invitation to join a social network, is it spam? AfriNIC 11 - Mail Abuse 3

  4. Senders Is your network sending out spam? Can you identify the computer sending out spam? AfriNIC 11 - Mail Abuse 4

  5. What makes a good sender Accurate information in WHOIS to identify the point of contact Accurate information in AfriNIC Whois database if the IP address block has been delegated to your organisation Forward and reverse DNS match Correct hostname (FQDN) for the SMTP EHLO AfriNIC 11 - Mail Abuse 5

  6. What makes a good sender Respond to abuse complaints My email is important. Why do you block me? Opt-In v/s Opt-Out AfriNIC 11 - Mail Abuse 6

  7. Receivers Spam Backscatter Too many SMTP connections AfriNIC 11 - Mail Abuse 7

  8. Mail abuse Unsolicited commercial mail (UCE) Malware Phishing AfriNIC 11 - Mail Abuse 8

  9. Antispam Techniques DNS Blacklist (DNSBL) Reverse DNS checks Greylisting RFC compliance Content filtering Callback verification Challenge/response systems AfriNIC 11 - Mail Abuse 9

  10. Mail Abuse Thank you AfriNIC 11 - Mail Abuse 10

More Related