SPAM Prevention Using DNS Solutions: Implementing Reverse Domain Name Services (RDNS) and Planning For SPF Classic
SPAM Prevention Using DNS Solutions: Implementing Reverse Domain Name Services (RDNS) and Planning For SPF Classic
Overview
SPAM prevention is the primary reason that rDNS and SPF Classic will
become de jure within approximately 1-2 years (IETF ratified)
Overview Continued
Future additional solutions for SPAM prevention are Yahoos
DomainKeys, Sender Verification and perhaps Microsofts
Puzzle Solution (unlikely)
Sender ID has been rejected by the IETF as a proposed
standard (de jure) due to inclusion of patented technology by
Microsoft and Microsoft has modified it and resubmitted. It may
or may not make it through this time depending on the
dependencies the working committee see on the patented or
protected intellectual property
Blacklists
SpamCop
MAPS
ORDB
SPAMhaus
Spews
SURBL
Mail-abuse
DSBL
DNSBL
DNSRBL
Client filters
Audiotrieve InBoxer
Cloudmark SpamNet
Lyris MailShield
McAfee SpamKiller
Aladdin SpamCatcher
Sunbelt IHateSpam
SpamBayes (open source)
Spam Bully
MailFrontier Matador
Cloudmark Spamnet
Hardware Appliances
Subscription Services
Barracuda 300
BorderWare MXtreme
CypherTrust IronMail
IronPort C60
Mail Foundry
Sendio ICE Box
Tumbleweed
Brightmail
Commtouch
Greenview Data
Katharion
Postini
PUREmail
What to do now?
SMTP mail gateway filters (hardware or software)
Consider a commercial service (depends on the amount and
type of traffic you except to see for your environment)
Software e-mail client filters (Small business accounts)
Blacklists / Whitelists (Enterprise and Service Providers)
rDNS (anyone running an MTA that sends traffic to the Internet)
SPF Classic (anyone running an MTA that sends traffic to the
Internet)
DomainKeys (Service Providers)
What is rDNS?
rDNS is an acronym for reverse DNS
It is a method of name resolution in which an IP address is
resolved into a domain name
It is the opposite of the typical resolution method of DNS which
resolves domain names into IP addresses
It utilizes the existing DNS infrastructure by using a special
reserved domain name: in-addr.arpa.
IP addresses are more specific left to right and domain names
are more specific right to left, therefore the rDNS IP listings are
reversed
Example: 63.251.192.20 would have a reverse entry of
20.192.251.63.in-addr.arpa.
SPF Classic is used to identify mail servers that are explicitly permitted
to send mail for a particular domain (think outgoing)
Domain owners identify permitted sending mail servers in DNS using
TXT records
SMTP receivers verify the envelope sender address against the DNS
information and can distinguish legitimate mail servers before any
message data is transmitted
It is backward compatible with MTAs that are not patched with SPF
filters or libraries (well, actually the old MTA just ignore it if that is
considered backward compatible!)
Remember MX records publish which IPs are to receive mail
(incoming) destined for your domain, SPF records says which IPs are
allowed to send mail (outgoing) on behalf of your domain
Meng Wong created SPF Classic. It used to be called Sender Permitted From
and was changed to Sender Policy Framework
SPF v1 (Classic) designates specific SMTP servers as being authorized to send
for a FQDN
Uses the TXT fields in DNS to publish relevant information
Each sub-domain must be configured specifically
SPF will become de jure within approximately 1-2 years most popular filters
are flagging this already
Most MTAs support SPF Classic or have plug-ins available
Backward compatible with existing technology
It breaks e-mail forwarding! You'll have to switch from forwarding, where the
envelope sender is preserved, to remailing, where the envelope sender is
changed your MTA will have to support this
DomainKeys
A Yahoo! submitted draft rfc
http://www.ietf.org/internet-drafts/draft-delany-domainkeysbase-00.txt
Basically public/private keys for authenticating client mail and the
servers along the path
Acts as a chain of custody from the source client machine to the
destination client machine
Will require a major re-write of all MTAs to work 5 to 10 years if at
all?
Backward compatible with existing technology
Google and Yahoo have already deployed!
Has promise to be a great standard if adoption is quick enough
Puzzle Solution
Microsoft proposal
Assumed for small businesses that cannot afford certificate
services
Sending mail server has to perform time consuming calculation for
each mail sent
Assumes spammers cannot afford the computational costs to send
out large bulk mailings or the cost of the bulk certificate services
Will require a major re-write of all MTAs to work 5 to 10 years if at
all?
Backward compatible with existing technology
Solution has serious shortcomings
Microsoft has little published on this solution
Large Zombie Farms controlling clients with legit relay access (Think
large University or poorly managed corporate environments)
Potential exploits that could turn large peer-to-peer networks into relays
Internet
3
Internal SMTP servers
forwarding e-mail to
public ISP SMTP servers
ISP B
1
Worker sends e-mail
to colleague
You will have to contact your ISP to request rDNS delegation do this
via e-mail so you have a written trail of correspondence
You will likely have to talk to several departments to figure out who can
actually do this for you, first contact your account manager
Typically, the DNS group handles the sub-delegation but not always
sometimes it is the networking group
You will need to be patient but firm inform them that you need it for
Anti-SPAM reasons for your mail server, to be RFC 2505 compliant
RFC 2317 describes standard methods for rDNS sub /24 delegation
formats, there is also the DeGroot hack from the book "DNS & Bind"
both work fine
$ORIGIN 106.94.64.in-addr.arpa.
; zone delegation of 64.94.106.40/29
;
40-47.
IN
NS
40-47.
IN
NS
;
40.
IN
CNAME
41.
IN
CNAME
42.
IN
CNAME
43.
IN
CNAME
44.
IN
CNAME
45.
IN
CNAME
46.
IN
CNAME
47.
IN
CNAME
ns1.j2global.com.
ns2.j2global.com.
40.40-47.106.94.64.in-addr.arpa.
41.40-47.106.94.64.in-addr.arpa.
42.40-47.106.94.64.in-addr.arpa.
43.40-47.106.94.64.in-addr.arpa.
44.40-47.106.94.64.in-addr.arpa.
45.40-47.106.94.64.in-addr.arpa.
46.40-47.106.94.64.in-addr.arpa.
47.40-47.106.94.64.in-addr.arpa.
$ORIGIN 40-47.106.94.64.in-addr.arpa.
; zone delegation of 64.94.106.40/29
;
@
IN
NS
@
IN
NS
;
@
IN
TXT
;
40
IN
PTR
41
IN
PTR
42
IN
PTR
43
IN
PTR
44
IN
PTR
45
IN
PTR
46
IN
PTR
47
IN
PTR
ns1.j2global.com.
ns2.j2global.com.
"j2 Global Communications, Inc."
64.94.106.40.efax.com.
64.94.106.41.efax.com.
64.94.106.42.efax.com.
64.94.106.43.efax.com.
64.94.106.44.efax.com.
64.94.106.45.efax.com.
64.94.106.46.efax.com.
64.94.106.47.efax.com.
Internet
ISP B
3
Internal SMTP servers
forwarding e-mail to
public ISP SMTP servers
MX: mx1.ispA.net
1
Worker sends e-mail
to colleague
ns1.example.com.
ns2.example.com.
mx1.example.com.
mx2.example.com.
1.1.1.1
2.2.2.2
"v=spf1 a mx -all"
"v=spf1 a -all"
"v=spf1 a -all"
Resource Links
rDNS:
http://www.ietf.org/rfc/rfc2317.txt
http://www.ietf.org/rfc/rfc2505.txt
http://www.arin.net/registration/lame_delegations/index.html
http://kbase.menandmice.com/view.html?rec=31
http://www.microsoft.com/windows2000/techinfo/reskit/enus/default.asp?url=/windows2000/techinfo/reskit/en-us/cnet/cncf_imp_dewg.asp
http://dedicated.pacbell.net/custcare/dns_worksheet.html
DNS tools:
http://www.dnsstuff.com/
http://us.mirror.menandmice.com/cgi-bin/DoDig
http://network-tools.com/
http://www.squish.net/dnscheck/
http://www.dns.net/dnsrd/tools.html
http://www.dnsreport.com/
http://www.samspade.org/t/
General references:
http://www.spamanatomy.com/
http://www.declude.com/Articles.asp?ID=97
Resource Links
SPF:
http://spf.pobox.com/howworks.html
http://spf.pobox.com/rfcs.html
http://spf.pobox.com/wizard.html
http://www.ietf.org/internet-drafts/draft-mengwong-spf-01.txt
http://www.dnsstuff.com/pages/spf.htm
Yahoo! DomainKeys:
http://antispam.yahoo.com/domainkeys
http://www.ietf.org/internet-drafts/draft-delany-domainkeys-base-00.txt
http://boycott-email-caller-id.org/
aol.com.
300 IN
TXT "v=spf1 ip4:152.163.225.0/24 ip4:205.188.139.0/24
ip4:205.188.144.0/24 ip4:205.188.156.0/23 ip4:205.188.159.0/24 ip4:64.12.136.0/23 ip4:64.12.138.0/24
ptr:mx.aol.com ?all
aol.com.
300 IN
TXT "spf2.0/pra ip4:152.163.225.0/24 ip4:205.188.139.0/24
ip4:205.188.144.0/24 ip4:205.188.156.0/23 ip4:205.188.159.0/24 ip4:64.12.136.0/23 ip4:64.12.138.0/24
ptr:mx.aol.com ?all
cisco.com.
86400 IN
earthlink.net.
?all
1800
efax.com.
86400 IN
google.com.
hotmail.com.
3600 IN
TXT "v=spf1 include:spf-a.hotmail.com include:spf-b.hotmail.com
include:spf-c.hotmail.com include:spf-d.hotmail.com ~all
microsoft.com.
msn.com.
900 IN
TXT "v=spf1 include:spf-a.hotmail.com include:spf-b.hotmail.com
include:spf-c.hotmail.com include:spf-d.hotmail.com ~all
netzero.net.
symantec.com.
?all
300
3600
600
TXT
IN
TXT
IN
IN
IN
"v=spf1 ptr"
"v=spf1 ip4:207.217.120.0/23 ip4:207.69.200.0/24 ip4:209.86.89.0/24
TXT
TXT
TXT
TXT
18000 IN
"v=spf1 mx redirect=_spf.microsoft.com"
TXT
About Ed Horley
When he is not playing on network gear you can find him out on the lacrosse
field as an Umpire for Women's Lacrosse. He is currently married to his
wonderful wife Krys and has two children, Briana and Aisha. He lives and works
in Walnut Creek, CA.
Contact Info
Ed Horley