First off, I'm just killing time in the middle of the night while waiting for some work to complete on a planned upgrade...

Anyway, I do understand these sender validation schemes, but they are a bad idea in today's world due to the much larger threat of dictionary attacks. I receive about 25 connections for every good E-mail that my system passes, and the bulk of that extra traffic are from dictionary attacks which I don't drop connections until 3 for 3 bad attempts or 5 out of 6, and there is tarpitting after each bad address, so the volume of bad addresses that we receive to good addresses is just simply enormous even when throttled greatly. If this traffic was going straight to IMail, my system wouldn't likely survive. So it makes sense to have protections in place for abuse like this. On my system, after 5 connections that get dropped due to passing our bad address limit, or who only attempt bad addresses, they are then blocked for either 5 or 30 minutes (I forget which off hand). With IMail 2006's dictionary attack prevention, once you trigger it, the IP is blocked until it is removed manually from the ACL.

I still can't recall exactly what Verizon was doing that was causing an issue, but I am certain that we were not doing anything unexpected. Their server decided to automatically block Marc's domain on every message, and without even trying to authenticate against our gateway as was evidenced by their time stamp. So this was more than just validating just one address at a time, they were writing off an entire domain due to their SAV system failing on multiple occasions for whatever reason. I do believe that the issue was that we may have greylisted them and returned a 450, and they never retried and they just decided that that was as good as a bad address or something. The only way off of their blacklist was to request whitelisting.

Again, I might have some of the facts wrong as I don't have a full record of the resolution in my E-mail, but I distinctly remember being perplexed from a technical standpoint by their decision to do whatever they were doing because I knew that it would have issues far and wide (like blacklisting domains when they are themselves blocked or greylisted for trying to validate bad addresses).

I'm sure that they are tickled pink by the massive spam reductions like most people are when they don't know how to or fail to do the legwork necessary to show a full picture including the FP's that such a system creates. They do have a false positive issue and it is their fault.

I however think that SAV could be used in a weighted system...so long as you weighted it low and didn't test using an IP that you cared about having blacklisted for even a short period of time. If you were to selectively target the use of SAV for things that are known to forge, that might make it more palatable to me. It is a very weak tool though in comparison to greylisting, and they are both primarily built for the same thing, i.e. zombie spam.

Matt




Sanford Whiteman wrote:
After  they do this on 5 different connection in 5 minutes, their IP
gets automatically blocked by my gateway for clear abuse --

Well,  it's  the  way  SAV works (I'm not saying you shouldn't enforce
your  policy,  but  don't  be surprised that it has this obvious false
positive, since SAV has been around for quite a while).

and  then  I might end up blocking all of the E-mail that might come
from this particular IP.

This  is  the  way  SAV  works,  always  has.  That's  why people have
different  context-  or  domain-sensitive  thresholds  for  dictionary
attacks, or they just slow down recipient validation for overly active
IPs  using  a backoff algorithm rather than blackholing completely, or
they  build  systems  that are capable of massive recipient validation
"attacks"  without blinking. Etc. There are also variations in the way
SAV  is  deployed  that  can  render  it quite harmless unless *other*
notable suspect behavior (like rampant fraudulent use of a domain) was
going on as well.

Now  for  the other way that they might do it. If they are trying to
avoid  such  systems  because this technology makes them look like a
dictionary  attacker  themselves,  they might try connecting back to
the same IP that was connecting to them.

Oh,   c'mon.  That's  preposterous.  No  one  could  think  that  that
constitutes  sender  address  validation.  If  someone did (utterly in
error)  implement  such  a system in production, the deluge of dropped
mail would force them to flip the system off inside of a day.

One way or another, this is a bad practice.

There is no such practice as the second one you describe.

As  for  the  first practice, it's called Sender Address Verification,
SAV.  It's  in  wide use by Len Conrad, who might chime in to champion
its use in a weighted or otherwise intelligent system (i.e., like when
you  employ greylisting only when other suspicious characteristics are
observed).  SAV  is  often  set  to only call out to frequently forged
domains,  which  means  that  a domain that is not commonly Joe-Jobbed
will  not  see  any probes; on the flip side, large legitimate domains
that are well-known to be intolerant of SAV are usually excluded.

Still,   when   you   *are*   massively  Joe-Jobbed,  as  was  Katie's
centric.net,  even  a  smallish  domain  can  suddenly get promoted to
"frequently  forged,"  and thus receive probes that its infrastructure
may not be able to handle. There are two sides to this: on the obvious
bad  side, you may end up rejecting mail due to characterizing a flood
of  probes  as  a  dictionary attack to save your systems; on the good
side,  this  makes  you  acutely  aware that your domain is being used
fraudulently, which is useful information.

I  have  no  great  allegiance  to  SAV myself, but IMO any anti-abuse
tactic  that  can  specifically  defuse  domain  misuse  should not be
knee-jerk  dismissed. I prefer to build my systems to accept a massive
amount  of  RCPT  TOs,  rather than (a) deal with backscatter from the
spam  that's needlessly bounced, let alone (b) deal with the confusion
when  high-profile spam is sent from just barely nonexistent addresses
at    a    client's    domain    (think    [EMAIL PROTECTED]    vs.
[EMAIL PROTECTED]). But sometimes you can't do the former, so SAV can
obviously  be adversarial in those cases. And SAV has no direct effect
on  spam  sent  from  extant  addresses (though in largely theoretical
concert  with  VERP-style  outgoing  envelope  tagging,  it  certainly
could).

--Sandy


------------------------------------
Sanford Whiteman, Chief Technologist
Broadleaf Systems, a division of
Cypress Integrated Systems, Inc.
e-mail: [EMAIL PROTECTED]

SpamAssassin plugs into Declude!
  http://www.imprimia.com/products/software/freeutils/SPAMC32/download/release/

Defuse Dictionary Attacks: Turn Exchange or IMail mailboxes into IMail Aliases!
  
http://www.imprimia.com/products/software/freeutils/exchange2aliases/download/release/
  
http://www.imprimia.com/products/software/freeutils/ldap2aliases/download/release/

To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/


Reply via email to