> Maybe  a problem can occur if a customer sends out a large number of
> e-mails  and there are several bounces. But if this happens I assume
> that the addresses was not aquired "regulary" ;-)

I  wouldn't  say  that's an accurate assumption; site-specific factors
will  dictate what % of bounce traffic is commonplace. We have several
clients  that  receive  hundreds  of  bounces from 10,000+ mail blasts
every   month,   others  who  only  receive  legitimate  bounces  from
person-to-person  correspondence  and so would be more appropriate for
the flood detection concept.

Yet  this whole concept of NDRs from Joe Jobs tipping the balance of a
server's  operability  sounds  really  fishy  to  me.  We have servers
passing   hundreds  of  thousands  of  messages  per  day,  with  only
negligible  examples  of  such  traffic  actually  being submitted for
delivery. One difference? We reject unknown addresses at the envelope,
continuing  to follow best practices while preserving our users' right
to  their legitimate rejections as much as we all want to preserve our
users'  right to their legitimate messages. That's just one difference
between  our setups and others, but I'd like to harp on that one for a
bit.

Joe  Jobbers  want  to use as legitimate a return path as possible. If
they  use  a  real address at a real domain, messages will pass sender
address  verification  (SAV) at the recipient, giving them a major leg
up.  In  the  old  days,  using  a  fake  address at a real domain was
workable,  but  SAV has upped the ante, making a real (i.e. validated)
address  preferable.  At  the  same time, they're aware that using the
return  path  of  a  not just validated, but user-attended mailbox can
only  be  done  for  a  brief period of time, since attended mailboxes
being  flooded  with  bounces will inflame their attendees and in turn
their   attendees'   providers   (and   the   legal  issues  governing
impersonation  are  more  clear).  What's  their dream? Knowing that a
domain  accepts mail to any permutation you throw at it, regardless of
whether the mailboxes actually exist. And preferably a smallish domain
that won't track them down. This is the equivalent of a /dev/null drop
for  their  bounces--provided  they  use rotating return paths at that
domain, they can minimize the detectability of their Joe Jobs.

And  their  accomplice in those habits? Ta-da: the 'nobody' alias. And
that's  just  one  of  the  many problems with enabling 'nobody' on an
IMail server.

...not  only  does  'nobody'  aid spammers in getting through to their
targets.  When  accompanied  by  second-level  bounces,  it makes your
domain  complicit in the generation of Joe Job bounce traffic (see the
%  of  Joe Job bounces from AOL that could be avoided if they enforced
envelope  rejection  of  unknown  senders).  Or,  if  unaccompanied by
automated  bounces,  it  makes  you  jump  through ridiculous hoops to
provide  customer  service to legit remote and local users who deserve
to  know  their  mail  has  bounced. Since the only way to responsibly
(vis-a-vis  the humans who use your systems) use 'nobody' on a mailbox
server  is  to  hand-examine messages that are not otherwise caught by
your  anti-spam measures, and cursory examination is not sufficient to
determine legitimacy in all cases, you must either spend a ton of time
grepping your logs or generate bounces manually, both of which methods
add  totally  unnecessary  delays--even when your mail volume is small
enough to make them work.

...and  not only does 'nobody' unnecessarily complicate administrative
tasks.  It  also  increases your own chances of being suspected as the
origin  of  spam.  While  the  distinction between envelope sender and
source   IP   is  clear  to  experienced  mail  admins  and  anti-spam
blacklists, it's not clear to everyday users and part-time admins.

...and  not  only  does 'nobody' aid spammers directly and expose your
domain needlessly, it also aids them indirectly by helping to make SAV
impossible  to  trust  positively.  I'm  well aware that it's not just
IMail  shops that accept all messages at the MX; there are indeed huge
providers  that  do  the  same  thing (despite some *real* hardliners,
harder  even  than  me on this topic, who attempt to frame this to the
contrary).  But  the  huge  providers  have  good  reason,  as they're
performing  other  checks  at  the  envelope and fielding thousands of
messages per second, and address lookup is costly when your user count
is  truly  gigantic; and at least they generate bounces automatically,
rather than forcing hand-inspection. So I'll let them off the hook for
now. But the story is different for well-put-together IMail MX/mailbox
servers,  which  have no such excuse and whose admins should be trying
to  avoid  gorilla-like tactics. Why not cooperate with SAV and enable
others to 55x [EMAIL PROTECTED] Joe Jobs, instead of deliberately breaking it?

...and not only does 'nobody' aid spammers directly and indirectly and
expose  your  domain  needlessly, it also forces you to spool messages
that  will never, could never be delivered to humans. 'Nobody' aliases
receive  spam.  This  is  a matter of fact. CD-ROMs are sold with more
aggregate  mailboxes than could possibly be attended by the population
of  the  planet.  Like  most of our spam, it's likely to be flagged by
tests  and  filters and end up over the HOLD weight. But ask your disk
subsystem  if that's painless. This, to me, is the most crucial issue:
the  use  of  local  resources.  Sure,  maybe you don't care about the
effect  on remote servers or on the Net as a whole. But is your server
happier taking out the trash, or making the sender take it out?

...and not only does 'nobody' drain server resources for accounts that
have  never existed, it forces the acceptance of messages for accounts
that  have  been  terminated.  This  upends  the  very concept of user
pruning.  Hosting  a  ton  of  loss-leader  webmail  accounts  with an
accompanying  high turnover rate, and still using 'nobody'? Or spend a
few  hours  of  your  week  doing  adds/deletes/changes on a corporate
userbase? That giant sucking sound you hear is the sound of your drive
accepting  mail  for  users who have, in many different ways, left the
building.

...and  not  only  does  'nobody' tax your server with the unnecessary
acceptance  of  mail,  the  user  lookup  itself does not conserve any
resources  compared  with  lookup against a userbase without 'nobody.'
IMail  will  seek  the  user  in  either  case,  then fall back to the
'nobody' target, so you're not conserving ODBC traffic, local Registry
access, or any such resource.

...and,  finally,  'nobody'  aliases  have  never  been shown to offer
substantive   protection   of   server   resources   by   discouraging
dictionary-based  harvesting.  The  breadth  of  dictionary attacks on
particular  domains has much more to do with their publicly known user
counts  than  on the results of such attacks. It is true, though, that
they  can  hit  servers of any size. Yet the thinking that 'nobody' is
preventing  your sure shutdown or slowdown by dictionary attacks is at
odds  with  the fact that spammers' unlimited bandwidth is distributed
and  controlled,  and sending shots of as little as 30 RCPTs at a time
over  a  period  of  months  is not uncommon, with many, many rotating
source IPs. Thinking that you're wasting the spammer's time is absurd,
when the machines that are probing you may never see a human operator.
Consider   the  once-universally-celebrated  'connection  tarpitting,'
which  was defeated by the same logic (they've got bandwidth to waste,
you  don't). By spammers' own design, attacks aren't what they used to
be,  when  attempts  streamed  in  from the same IP for long enough to
blackhole  that  IP  or trash the server. Further, for a small domain,
the  pace of addresses being successfully dictionary-harvested is much
slower  than  (a)  the pace of new filter-avoidance techniques and (b)
the  addresses  gathered  through  other  means.  Again, a question of
priority:  the  attacks one thinks they're avoiding, as a lucky result
for  admins,  likely  wouldn't  have used enough resources to actually
threaten   the   stability  of  the  server,  the  negative  technical
consequences  are non-negligible, and the time you waste distracts you
from  a  better  fight.  With dictionary attacks, having procedures in
place  to  trace and block the source IPs at the border, figure out an
attack  threshold,  detect spamtrap recipients, and so on, is a better
use  of everybody's time. Concluding that not seeing prolonged attacks
on  a  few  servers  that have 'nobody' enabled means that 'nobody' is
essential  to  servers'  survival is not only unscientific but at odds
with  the  experience-based  practices  of  a  commanding  majority of
systems administrators and architects--in not only the distant past of
early  SMTP, but all the way through the current state of the protocol
(see P.S. for an additional comment.)

In sum, 'nobody' has a net negative effect on your resources and a net
negative  effect  on  the  rest  of  the Net. As a great man has said,
"Since  when  is  knowing  an  e-mail  address  sufficient to get spam
delivered?" :)

So  why  have I harped on 'nobody' when the original topic was Joe Job
bounces?  Because  what links them in the anti-spam fight is the waste
of  resources they cause *above and beyond* the resources used by spam
messages  to  and  from  real  people, both on servers you control and
servers  you don't. If you're complaining, even in part, about bounces
to  users  that your server knows to be nonexistent ("known unknowns,"
to  quote  a  famously frightening individual), don't accept the mail.
Complaining  about  those  messages  is like complaining that the post
office  keeps  delivering  junkmail  to your next-door neighbor, whose
mailbox  you  just  can't  keep  yourself  from  opening (sort of).

Of  course,  that  still  leaves you to deal with the Joe Jobs against
humans  (user-attended  mailboxes). But while managing *these* Joe Job
bounces  is  a  worthy  idea,  it  means  tilting  at the windmills of
hundreds  of different bounce formats and explanations. And the bounce
volume  you see from JJs should be a fraction of the volume you see of
spam  itself, so the relative rewards will be fewer and the risks much
greater.  If the bounces are indeed overpowering to a single accounts,
the  user's  probably  the  target  of  someone's  revenge  through  a
deliberate  DoS. In that case, what would be useful is the ability for
*the  user*  to turn off all bounces--with a radio button *completely*
under  their  control  at  all  times--for a period of time, with full
documentation of why, when, and the consequences; never mind trying to
select  out  what's  a  permanent bounce, a transient bounce, whatever
during  this period. This would be trivial to code within an IMail web
page,  and I will be adding it to our custom pages, in all likelihood.
All  the  same,  dropping  everything  during such an attack without a
second  look is unwise, as there may be legal remedies and will almost
certainly  be  filter-based  remedies  as  well  (search for IP source
[xx.xx.xx.xx] in the message body).

On   still   another  hand,  embracing  and  propagating  anti-forgery
technologies  like  SPF  allows  you  to take the offensive, and while
sender address forging is not spammers' only tactic, there's no reason
to  throw  in  the  towel  and decide that all you can do is go on the
defensive,  since  SPF  is  doomed to failure. The only people who can
doom  it  to failure are those that won't take the tiny steps to adopt
it--or  whatever  anti-forgery  tactic  gains consensus--preferring to
tackle  secondary  obstacles instead. If you fight forgery itself, the
resultant bounces are also fought, doubling the effects of your work.

--Sandy


P.S.  I'll  make  a case-study argument while I'm on the topic. So get
yourself into Microsoft-skeptic mode, if applicable. Good. Now realize
that  until  Exchange  TWO-THOUSAND-THREE,  MS  did not reject unknown
users  at the envelope. Now they do. So: did they know something other
mail  server  vendors  didn't  know for the past decade, then suddenly
forgot it this year? Did they bow to some backward-thinking bully like
me and reverse a long trend of innovation? Think about it.



------------------------------------
Sanford Whiteman, Chief Technologist
Broadleaf Systems, a division of
Cypress Integrated Systems, Inc.
e-mail: [EMAIL PROTECTED]

SpamAssassin plugs into Declude!
    http://www.mailmage.com/download/software/freeutils/SPAMC32/Release/

---
[This E-mail was scanned for viruses by Declude Virus (http://www.declude.com)]

---
This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  The archives can be found
at http://www.mail-archive.com.

Reply via email to