150 likes | 280 Views
Introduction. Slicing Spam with Occam’s Razor. Chris Fleizach , Geoffrey M. Voelker , Stefan Savage University of California, San Diego. We all know spam is a blight on the Internet Billions of spam messages sent everyday
E N D
Introduction Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University of California, San Diego
We all know spam is a blight on the Internet • Billions of spam messages sent everyday • Millions of PCs have been harvested, sold and employed to send spam • Many existing anti-spam techniques: Why another one? • Existing solutions are complex and/or don’t impose a burden on spammers • There are billions of messages still being sent by many bots • Occam is an email authentication protocol that is: • Simple to deploy and administer • Forces senders to expose online resources • Designed to decrease the utility of spam bots Introduction Motivation
Mail authentication aims to verify that the purported sender is the actual sender • Eliminates the ability to spoof a domain in an email message • We have studied authentication from the simplest angle possible: • Asking the sender. • For this reason, we refer to the protocol as the Occam protocol Occam’s Razor Occam’s Goals
The Occam Protocol The Occam Protocol Servers can keep logs for some time after they have been contacted in case of a failure on the other end If a receiver does not get a response immediately, they can back off and rate limit, continuing to try to contact the server until a timeout
Ease of Administration • DKIM and SPF require administrators to insert keys into DNS • Easy for knowledgeable admins, hard for many small domain owners • Occam is just a software upgrade Slicing Spam Advantages
Enhanced culpability • Occam authenticates the sender of a message much like SPF and DKIM • However, DKIM requires an expensive cryptographic operation on the receiving side • Occam forces the burden of authentication onto the sender of the message • A spammer can easily insert a SPF rule that allows all IP addresses to send email • Occam makes it harder to use a botnet to send spam Slicing Spam Advantages
Real-time Validation • SPF and DKIM allow for caching of authentication data • Result is that senders need not be online while being authenticated • Occam requires that the authentication “work” be performed online and in a timely fashion • The spammer is forced to expose higher value, online resources, which can then be blacklisted Slicing Spam Advantages
Anti-phishing Capabilities • An unexpected side-effect of Occam is that if any spammer tries to spoof a domain, the actual server has a method to determine who was being phished • The ability to notify customers being phished or take other actions can be a boon to popular phishing targets Slicing Spam Advantages
Put the bots to work • Spammers could try to use their bots to respond to the Occam protocol, but… • Occam uses MX record, meaning bots • Must have existing domain name with a MX record • Or be assigned a domain name or sub-domain • Bots must also be able to respond to incoming queries on low ports • Result: • Bots (and possibly botnet structure) are exposed, leading to blacklisting • Occam ensures using bots to send spam is difficult Slicing Spam The Spammer Response
Centralization • Spammers could try to centralize the Occam reply, rather than distributing load • Spammers must keep track of Message-Ids and To fields • Need a server that can handle millions of queries • Exposes this higher value server to blacklisting • Spam campaign can be derailed if only one domain was used Slicing Spam The Spammer Response
Using Occam as a DDoS Reflector • Internet malcreants could use Occam to cause other domains to surreptiouslyDoS a server. • However, Occam does not enable DDoS amplification • Indeed, the Occam protocol is a low-overhead protocol, meaning other DDoS methods would be significantly more effective and attractive Slicing Spam The Spammer Response
Mobile Mailers • Some users send mail from hosts intermittently connected to the Internet and allow other servers to handle incoming mail • Occam would effectively end this practice. • However, we believe this flexibility in SMTP is abused more by spammers than used by legitimate mailers Slicing Spam Disadvantages
We have developed a prototype implementation integrated with Sendmail. • Initial testing shows similar overhead to SPF (effectively very little) • Larger sites would roll their own solution • Naive solution: Centralize logging systems • A better solution: Use the domain name of the sending server in the Occam header. • Allow the sending servers to respond to queries. • No centralization needed. Implementation Implementation
Conclusion Questions and Answers