|
Yep... except I don't believe IMail comes default
with a way to enforce any password requirements, though _javascript_ validation
could be added pretty easily to webmail.
If 1000 accounts are used to send 1000 messages
each, the spammer still gets a million out, though, for that matter, if
they sent 10 through 100,000 hacked accounts would we ever notice?
Maybe we wouldn't even care from an outgoing perspective, just in dealing
with the spam on the receiving end.
But you're right, defined limits with monitoring
and notifications.
Darin.
----- Original Message -----
Sent: Wednesday, November 16, 2005 8:52 PM
Subject: Re: [Declude.JunkMail] OT: another SOBERing
though
Darin,
I would pretty much skip over #1 except for some
obvious things like not allowing the username to be the password, and having a
minimum length of 4 or more characters. I think that hackers of this type
can get the passwords pretty much no matter how hard they are to unencode in
brute force fashion (which is what strong passwords are designed for).
Companies like IMail need to also stop using default passwords because they
represent a significant vulnerability.
As far as #2 goes, this is
definitely what needs to be done. Just like port 587 support is now
becoming common among mail servers, abuse detection (volume monitoring) will
also likely become common within the next two to three years. For the time
being though, even services like Yahoo and Hotmail which are commonly abused,
lack sufficient mechanisms to detect hacked and abused accounts. Once you
limit the number of messages that a single account can sent to less than 1,000 a
day, they are next to useless for a spammer due to the volume that they
require. Even if you aren't worried about your AUTH being hacked there is
plenty of reason for concern among ISP's since it is not that uncommon for a
customer to just assume that they can bulk mail from your
server.
Matt
Darin Cox wrote:
So the upshot of this is we need to
1. Figure out a way to enforce strong passwords
for mail users
and
2. Monitor traffic for individual user accounts
on an intra-day basis, perhaps even have a means of detecting sharp increases
in traffic from a particular account and alerting an admin to
investigate. We do review a daily report the following morning of
traffic by domain, but don't have anything in place to monitor by
account, or to alert on an intra-day basis.
Something to look into...
Darin.
-----
Original Message -----
Sent: Wednesday, November 16, 2005 6:18 PM
Subject: Re: [Declude.JunkMail] OT: another SOBERing
though
Hmm, who would have thunk?
Subject: Re: [Declude.JunkMail] SPF Success Date 12/24/2004
9:24 AM http://www.mail-archive.com/[email protected]/msg22584.html IMO,
the best way to stop forging is to stop zombie spammers. The way to do
this is FIRST implement port 587 as AUTH-only, and then widely block port
25. This means that mail clients would exclusively use AUTH on private
networks and connect to their mail server on port 587 where only AUTHed
connections would be allowed. Then only servers would share non-AUTH
E-mail on port 25. The only reason why blocking port 25 is not very
common currently is because it is severely limiting to customers and would
cause support issues for the ISP. If you first did the migration to
port 587 AUTH-only connections, which would take several years to accomplish
in good order, ISP's could move forward with port 25 blocking and cause many
fewer issues as far as support and their clients were
concerned.
Basically what I am saying is that forging isn't the
issue, it's spam zombies, and to go after it as a forging issue is to miss
the point. The big caveat here is that spammers will turn to hacking
AUTH in much larger numbers, and E-mail server software should also widely
implement a 'hijack' detection mechanism in order to help stem the
abuse. I have already noted much more hacking going on, first with
Earthlink's properties, and now with Prodigy as well. I have little
faith that these things will happen in the proper order or with the
expedience necessary unfortunately, especially because of what I consider to
be a distraction focused on forging coming from the likes of SPF, Microsoft
and Yahoo. I feel that the big players are missing the point, and they
are the ones that heavily influence E-mail client and server software which
is where the changes first need to be implemented.
Subject: Re:
[Declude.JunkMail] Question on SPF Setup. Was under You **May** etc
**May** etc Date 6/30/2004 12:33 PM http://www.mail-archive.com/[email protected]/msg19684.html What
I do think would work much better in the near term would be for every mail
server to support and require SMTP AUTH through port 587 as proposed, and
then have every ISP out there block port 25 which would be used exclusively
for non-AUTH'ed E-mail between systems. That would cut the zombie
problem down dramatically without interrupting service, but this will
probably take 5 years or more to widely implement. I think this would
have a much larger effect than SPF in terms of blocking forging E-mail, the
majority of which comes from PC's attached to these residential ISP's
presently. AUTH hacking, or even server hacking however will become
much more predominant when the bar is raised in this manner, but there
should be many fewer machines to track.
While this is
certainly a bit of me patting myself on my back, it is also a reminder to all
that the worst is yet to come and for the most part people are totally
unprepared for this sort of thing. So what's next? Maybe Geocities
spam sent through hacked Yahoo accounts??? Oh wait, that's already
happening.
Matt
Colbeck, Andrew wrote:
So, we've seen the recent SOBER variants used their own SMTP engine to
propagate as well as a predefined list of usernames and passwords at
ISPs to send themselves.
We've also seen that keeping viruses and spam out of our mailboxes is
easier when we can identify the sender as a zombie, and that it is
harder when the junk is coming from a valid ISP and/or user at an ISP.
http://www.viruslist.com/en/weblog?done=vlpolls_resp155596558
Well, Kaspersky is reporting that the latest SOBER is also stealing (at
least) Outlook usernames and passwords from infectees.
Therefore, we can reasonably expect more junk coming from AUTH'ed
senders.
Andrew.
---
This E-mail came from the Declude.JunkMail mailing list. To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail". The archives can be found
at http://www.mail-archive.com.
|