[ale] Spam fighting strategies

Michael H. Warfield mhw at WittsEnd.com
Thu Oct 4 16:46:06 EDT 2007


On Thu, 2007-10-04 at 16:27 -0400, Jeff Lightner wrote:
> Thanks guys.
> 
> We actually implemented the DNS MX change yesterday because as you say
> it was trivial to do so.   We saw an immediate drop off.

> However, today we see it building up again since noon so we're looking
> into other options.   In case it helps anyone - One thing done today was
> to split our back end and front end so that the delay only affects
> inbound from the internet and not outbound to the internet.

	If you are using sendmail with greet_pause to do this, you can do this
in your access database like this:

GreetPause:localhost            0
GreetPause:130.205              0
GreetPause:66.23.227            0
GreetPause:IPv6:2001:4830:3000  0
GreetPause:wittsend.com         0
GreetPause:ibm.com              0
GreetPause:iss.net              0

	Just define the addresses or domains you want and the delay time (0 for
no delay).

> I've passed this information on to one of my coworkers who has been
> tasked with looking at putting the Sendmail/Linux server together.   

	Mike

> -----Original Message-----
> From: ale-bounces at ale.org [mailto:ale-bounces at ale.org] On Behalf Of
> Michael H. Warfield
> Sent: Thursday, October 04, 2007 3:14 PM
> To: transam at verysecurelinux.com; Atlanta Linux Enthusiasts
> Cc: mhw at WittsEnd.com
> Subject: Re: [ale] Spam fighting strategies
> 
> Hey Bob,
> 
> On Thu, 2007-10-04 at 14:50 -0400, Bob Toxen wrote:
> > On Wed, Oct 03, 2007 at 03:53:18PM -0400, Jeff Lightner wrote:
> > > The other night in the AUUG meeting it was mentioned  by one person
> that
> > > they had turned on a "read delay" in email (Postfix I think) and
> that
> > > this had eliminated about 80% of the spam because the bots would
> > > disconnect.   
> 
> > > Unfortunately I didn't have a chance to follow up then but mentioned
> it
> > > to our Exchange admin because they've been fighting an increase seen
> > > recently in connection attempts.  It sounds as if Exchange can't do
> this
> > > natively.
> 
> > > I'm wondering if anyone has done this on Postfix/Sendmail or some
> other
> > > OSS MTA and would be willing to provide details?   
> 
> > > My coworker found something called "Greeting Delay" that sounds like
> > > what I heard as "Read Delay" so it may be this but apparently that
> has a
> > > problem with people that do call back to check whether email is
> coming
> > > from a valid site.
> > Yes, the person mentioning "read delay" probably means the "Greeting
> > Delay" technique.  Yes, this is quite effective.  Most spammers will
> > assume that there is something wrong with the recipient, drop the
> > connection, and go on to the next as being more efficient.
> 
> 	I was that person and I mentioned Greet Delay (actually, it's
> "greet_pause" in the sendmail.mc configuration) in sendmail.
> 
> > Most spammers also blast their entire dialog and message, once the
> TCP/IP
> > connection is established, without bothering to follow the proper SMTP
> > protocol of waiting for a response to each phase before going on to
> > the next.  A spam filter technique is to detect such output before our
> > side sends its reply and then treating the email as spam (because it's
> > violating SMTP specifications.)
> 
> 	Actually, Greet Delay implements this as well.  While sendmail
> is
> waiting out the time period before it sends its banner, if data comes
> down the channel, it dumps the connection right then and there.  So you
> get both effects...  Some spammers give up and disconnect, and others
> force the data down the connection and get disconnected.
> 
> 	An extension to the "Greet Delay" is the tarpit option.  With a
> tarpit
> option, each command "EHLO, RCTP, FROM, etc" in smtp is delayed slowing
> down the initial handshake up to the DATA part.  I haven't tried this,
> and I don't believe it's in stock sendmail or postfix, but some people
> have claimed success.  I'm not sure if I would see much more success
> over the simple Delay Greet option.
> 
> 	I had not heard that there was a problem with people that do
> call back
> to check whether email is coming from a valid side or not but that's
> highly broken behavior since the outgoing mail server may be different
> from the incoming mail server and may, in fact, legitimately not
> reachable.  IAC, there is a whitelisting feature in Delay Greet and you
> can set those legitimate sites to not get a delay.  In fact, you want to
> do this for all your internal addresses, to avoid unduly delaying them.
> So, it's an easy fix for their broken behavior.
> 
> > These two techniques currently are being added to my SpamCracker(tm)
> > spam filter that I offer.  (It happily will work in front of Exchange
> > as well as any other mail server.)
> > 
> > > Also he found doing bogus MX records in DNS - the idea being you put
> > > your first and final MX records to dead IPs as most spam bots only
> check
> > > the first or final and not the intervening real ones.   Has anyone
> tried
> > > this and if so what results did you have?
> > This also is quite effective and trivial to implement with no loss of
> > legitimate email.
> 
> 	Yup, another technique I've used successfully.
> 
> > > Essentially we're looking at putting in a Linux server as if it were
> an
> > > SMTP gateway to the Exchange server which will continue to be the
> > > primary mail server for the company.   Any other ideas (other than
> > > getting rid of Exchange which won't happen) would be appreciated.
> > While those techniques will eliminate a substantial percentage of
> spam,
> > they will not solve the problem.  The solution requires a good spam
> > filter such as ours that has 12 additional filtering steps, including
> > a number of anti-spoofing steps and steps that detect senders trying
> > to evade spam filtering techinques.  It blocks about 97% of spam with
> > a very low false-positive rate.
> 
> 	Check out the latest version of MailScanner,
> www.mailscanner.info.  It
> includes techniques for watermarking outbound messages, bayesian
> filtering, CRM114, SpamAssassin, and, now, a dynamic list of phishing
> sites as well as hooks for a variety of AV products.  Drops in on
> Sendmail or Postfix with or without the above techniques.
> 
> > Bob Toxen
> > bob at verysecurelinux.com               [Please use for email to me]
> > http://www.verysecurelinux.com        [Network&Linux/Unix security
> consulting]
> > http://www.realworldlinuxsecurity.com [My book:"Real World Linux
> Security 2/e"]
> > Quality Linux & UNIX security and SysAdmin & software consulting since
> 1990.
> > Quality spam and virus filters.
> > 
> > "Microsoft: Unsafe at any clock speed!"
> >    -- Bob Toxen 10/03/2002
> 
> 	Mike
-- 
Michael H. Warfield (AI4NB) | (770) 985-6132 |  mhw at WittsEnd.com
   /\/\|=mhw=|\/\/          | (678) 463-0932 |  http://www.wittsend.com/mhw/
   NIC whois: MHW9          | An optimist believes we live in the best of all
 PGP Key: 0xDF1DD471        | possible worlds.  A pessimist is sure of it!

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 307 bytes
Desc: This is a digitally signed message part




More information about the Ale mailing list