Hi all,
it seems to me that the signature based approach towards
retraining, as it is implemented in DSPAM, might be vulnerable to
a certain kind of attack described below and I'd like to discuss
with you whether this actually poses a problem in reality and
whether any thing should or, indeed, can be done about it.
Consider this situation: An ISP is running DSPAM on its mail
system. Customer C has received an email on his DSPAM protected
account and, for some sensible reason, feels like forwarding that
email to recipient R. Assuming that R is actually a mailing list
possibly archived on the web, many people have access to that
forwarded email which, unless somebody has deliberately taken
precautionary steps against it, will still contain the DSPAM
signature. Depending on the nature of the mailing list C might
even feel inclined to forward several emails to R so a
sufficiently eager person of bad humor or intentions might collect
a certain amount of signature data and use it to mess up C's DSPAM
database. The situation might get even worse if the ISP has
actually set up group training and several of its customers are
unwittingly spreading their signatures in public places.
Especially when the uid is stored in those signatures and the ISP
has set up global addresses for retraining, perhaps even systems
like spamcop could be abused by someone to gather signature data
and launch an attack against that ISP.
In a perfect world, I'm sure, the users MUA would take care of
whether to remove the signature before forwarding or not; but
then, there would hardly be any spam in a perfect world, I
suppose. Anyway, the question I have in mind is: can the ISP do
anything about it apart from asking all customers to do some
potentially tricky configuration or even switch to "a better" MUA?
I can think of two possibilities:
1. The ISP runs some daemon that searches for DSPAM signatures in
outgoing emails and obscures them in some way.
2. The ISP runs a similar daemon as above but instead of changing
the content of the outgoing message, further retraining using
any signature found in the message is disabled.
The first approach is technically difficult, in case of digitally
signed messages impractical and at least in some countries
generally illegal. The second approach looks more appealing, I
think. Even if customer C forwards a message somewhere and decides
afterwords that she wants to retrain that message, the ISP might
still offer a web interface or another authentication mechanism to
retrain a message based on a disabled (not erased from the
database) signature. Still, all this requires yet another daemon
(or mode of the DSPAM daemon) to process all emails entering the
system on an authenticated channel, i.e., sent by customers' MUAs.
I'm not quite sure whether this scenario should be considered a
bit far fetched and not worth the effort of implementing the
proposed solution. That's why I'm asking you to share your
opinion on the matter. Perhaps there is a flaw in my reasoning
after all.
Regards,
Elias
- [dspam-users] [RFC] Signature leakage and its consequences Elias Oltmanns
-