Proposals Offer Small Steps to Stop Spam

Three leading proposals offer systemic e-mail changes to cope with spam. And while none of the changes would completely eliminate this global scourge, one would make an excellent first step.
As I said in this space last week, spam has grown to dominate legitimate e-mail to such an extent that leaders of the computer industry might actually be forced to make significant changes to the worldwide e-mail system as early as this year.

There's no agreement as yet on what the new standard will be, however.

I examined the three leading proposals that offer systemic e-mail changes. My findings? None of the changes would eliminate spam completely. But one of them would make an excellent first step.

A Problem That's Grown Worse Year After Year

A basic flaw that has haunted e-mail since its very beginnings is that it's trivially easy for anyone to make any e-mail message look like it came from any e-mail address.

Spammers use this fact to falsify the From lines of their unsolicited bulk e-mails. This means you can't simply block a few "bad" addresses to filter out spam.

In addition, computer users are suffering from a new wave of "phishing" e-mails. These messages falsely claim to come from financial institutions and instruct innocent people to "re-enter" their credit-card numbers and passwords — at look-alike sites that are controlled by criminals.

Each of the proposed e-mail fixes would require better identification of who the "sender" of an e-mail message is.

The Contenders for a Systemic E-Mail Fix

The following three proposals, in order from least to most effective, represent various ways to alter the sender-recipient relationship:

SPF. Sender Policy Framework is currently an "Internet-draft" that's being considered by international standards bodies. It would require the owners of domain names to publish the IP addresses of their outbound mail servers. Any message from, say, PayPal.com that didn't come from one of PayPal's published IP addresses would be assumed by any receiving server to be a fake that should be discarded.

SPF would still allow forgery, however. Malicious hackers could set up a new domain name at a new, temporary IP address. E-mail messages with a From line saying, for example, "PayPal.com" would pass right through an SPF test. All the hackers would have to do is set the unseen Bounce address of the messages to their own IP address, which they'd abandon as soon as it had done its job.

"That is correct," responded Meng Weng Wong, a chief proponent of SPF and the founder of Pobox.com, when I asked him about this. "SPF solves part of the puzzle. The scenario you describe needs to be solved using other technologies, such as Yahoo's DomainKeys or Caller ID."

Caller ID for E-Mail. The so-called Caller ID scheme is the brainchild of Microsoft Corp. Its proposal would examine the domain name in the visible From address of an e-mail message. This domain would be queried to see if it held an "E-Mail Policy Document." This document, a file up to 2048 bytes in length, would be written in XML format and would, like SPF, specify a list of legitimate IP addresses for outgoing mail.

Caller ID, however, would demand changes to the installed software of most portable devices that send mail from outside a corporate network. It would also require updates for mailing list services, forwarding services, e-greeting sites, outsourced e-mail providers, and users of personal domain names who send their e-mail through a separate ISP account. This would certainly slow the adoption of the scheme.

DomainKeys. Yahoo.com, one of the world's largest e-mail services, is the chief advocate of DomainKeys. This proposal envisions that legitimate e-mail senders will digitally sign their outgoing messages. The signature would ensure that no one could modify the From line or the body of a message in transit without the receiving e-mail software detecting the tampering.

The owner of a domain name would post a "public key," which would be checked by any mail server that received a message purporting to be from that domain. If the key lined up with the signature of the message, the receiver would be assured that the mail, in fact, did originate from a sender at that entity.

To implement the RSA-style encryption required by DomainKeys, bulk e-mail senders would have to install a new signing module and corporate mail servers would optionally have to begin checking incoming e-mail for validity. Consumer ISPs, such as Verizon and Qwest, would sign all outgoing mail and check all incoming mail on behalf of their legitimate subscribers, so end users wouldn't have to understand any technical details.

Calculating a digital signature for an entire e-mail message consumes a lot of processing power. So mass senders could calculate just a 128-bit "hash," which is easy.

What These Standards Would and Would Not Do

"The first question to ask about all three of them is what problem they're trying to solve," says John Levine, the co-chair of the Antispam Research Group, a committee of the Internet Research Task Force of the IAB. "It's not 'spam,' for any normal definition of spam."

That's true. The new schemes would merely make it more likely that an e-mail message with a certain domain name in its address, such as Qwest.net, would actually have some connection to someone at that domain name. This wouldn't end spam — but it would make the sources of it much easier to track and therefore filter out.

This alone would help to identify at least 65% of spam. This is the percentage that Spamhaus.org, a major antispam service, says is now being sent from PCs infected with "Trojan horse" programs that relay unsolicited bulk e-mail for spammers.

"The spam [from Qwest subscribers] will all say it's coming from Qwest.net, which is something," Levine agrees.

Signing All Mail As a Much-Needed Step

If positive identification of senders is to be the first step in stopping spam, many computer experts feel that digital signatures, such as those required by the DomainKeys proposal, are the way to go.

"The one [proposal] I like the best, but that will probably take the longest to implement, is DomainKeys," says Eric Allman, the CTO of Sendmail.com, a provider of e-mail software to 70% of the Fortune 1000. Signed-mail proposals, he feels, best lend themselves to "reputation services" that can say which senders are spammers and which are legitimate businesses.

As a result, Sendmail is working with Yahoo to test the DomainKeys spec, but the company has also endorsed Microsoft's Caller ID plan.

Even if DomainKeys is adopted, a great deal of spam will continue because some spammers are perfectly happy to identify themselves. Many well-known corporations have been caught spamming — they call it "communicating our advantages to potential customers" — and only negative reactions from recipients limit the flow.

Conclusion

Until the U.S. and other countries ban spam as a theft of services, as the European Union did last year, sender-identification plans such as DomainKeys look promising. At the least, they'll help you sort bulk mail broadcasters into the "good guys" and the "bad guys."






0 Comments (click to add your comment)
Comment and Contribute

 


(Maximum characters: 1200). You have characters left.