At 08:50 AM 1/26/2010, OrionWorks - Steven Vincent Johnson wrote:
http://blogs.msdn.com/tzink/archive/2010/01/25/spam-is-solved-we-can-all-go-home-now.aspx

http://tinyurl.com/ylj42d5

I would love some comments on this article.

Okay, here goes!

The article describes an interesting technique that can be used to identify some spam, but does not even begin to address the overall problem, for this technique only works to identify spam after spam has been already identified by some other means, with, quite likely, a substantial delay. Then filters can be advised and used to tag spam for rejection, but the spam traffic is unimpeded.

It should be realized that even if spam traffic never gets to users, being rejected at the server level, it still adds a great burden to mail server load. It is still a serious problem, impacting ISPs directly and thus users indirectly, for we pay all the costs of most ISPs.

We also pay another cost, even if we don't see spam, we pay the cost of rejected legitimate mail, which is so high, particularly when one is in businss using email, as I am, that I do not allow my personal spam filter to automatically reject mail, it merely tags it and categorizes it for my review. In practice, there is so much spam that I do rely on IP blacklist filtering, when I've been away and the queue of mail to be rejected is large, but I still have a log of rejected mails with 20 lines from each mail, after a mail is deleted, and I can restore these mails and, at least, respond and ask for it to be resent. I do not allow my mail server provided to reject mail at all, except when a major attack occurs, such as one time when it looks like some spambot got stuck and I was getting 100 spams per minute.

To me, there is a generic solution to this and many other problems: organization of those most directly affected, and all those interested in the problem. Among those affected, there is a small number who will actively fight spam, and these efforts should be coordinated to be efficient. However, the general membership of such an organization can be advised to install a particular kind of spam filter, that the organization would provide.

It would need money to do its central work, but the membership that would be benefited could be so large that collecting modest donations for this would be trivial. How much would you pay to substantially kill the spam problem, without doing harm to legitimate mail? How much would ISPs be willing to pay for something that made their job much easier by offloading analysis of spam to a trustworthy organization of users. Including their users.

The key organizational problem is "trustworthy." Spam filtering can quickly and easily become a tool for information control, and there are signs that some anti-spam organizations have been co-opted by those with particular agendas, such as by spammers whose goal is to block competitor's spam while passing their own.

How would a voluntary association of mail users address spam? Well, that's a problem for the users themselves to address, gathering and vetting expert opinion, and the details of the organizational structure that would make this so efficient that a mail user could join and be effective with practically no more investment than raising a finger. I won't detail the process for right now, but trust me. It can be made incorruptible; those who attempt to corrupt it end up with a mouthful of hair. The structure is cellular, fractal, and probably bulletproof against any danger except massive governmental-level censorship and repression. If we have come to that point, we have much more serious problems than spam.

Spammers have been known to successfully attack anti-spam solutions that implemented part of what I imagine the organization would do, and they were able to accomplish shutting these solutions down because the solutions were centralized, operated by a private company, depending on a single ISP, and turning a botnet to attack this company was trivial for a serious spammer. The ISP, facing massive DOS attack, booted the company in order to protect the rest of its subscribers.

But the association I'm talking about would itself use distributed process and would not be vulnerable to attack by botnets; they would be able to shut down particular nodes, but, in the process, revealing themselves and their assets. Which can then be addressed directly.

It's obvious that detection of a spam bot, as quickly as possible, and rapid notification of the ISP for the corrupted computer, with rapid shutdown of most internet access for that computer (everything outgoing, basically, though filtering could become more sophisticated: everything outgoing except for the ISP's own support, so that the blocked user can inquire by email and get immediate advice on bot removal and prevention of reinfection).

So how to detect spam as quickly as possible? Well, users themselves identify spam and delete it. If they are using a spam filtering program like Mailwasher, as I do, I train the filter to recognize spam by pushing a button for it. There is even a feature in the program, First Alert, that will transmit this to a server, but First Alert wasn't working for a while and I don't know if they ever fixed it. In any case, consisder that whenever a user tags a mail as spam, the mail itself and the tagging are transmitted, as permitted by the user, to one of a large set of servers for further analysis. A single report would do practically nothing. Multiple reports would escalate the "case" and it's possible that some fully automated processes start up, such as processes that would call up special notice in user programs requesting confirmation that a mail is spam or legitimate. Where the system produces contradictory information, volunteers would confirm spam, this would be the first human intervention, and the system would be set up to make it easy and efficient.

As a distributed system, appeals process would exist, rising to ever-increasing levels of trust in the organization. False spam reports would impeach the trustworthiness of the reporter, deprecating the reliability of that reporter.

Now, when spam is conclusively identified, which means multiple confirmed reports of spam mail justifying serious action, two actions would occur: the originating IP and other clear identifying characteristics of the mail would go onto a blacklist, which ISPs could use to reject mail before it is transferred to the server, during the negotiation of a connection. The rejection message provides information on appeals as a URL. Innocent mailers who do get caught this far will appeal, but the appeals process, while designed to be efficient, will also more deeply identify the sender. An appeal should be quick, easy, and conclusive! I've been blocked, many times, by false identification, and it was not at all easy. And that is part of the damage that spam does.

And when an ISP for the originating IP is unresponsive, there is the "internet death penalty," which isn't really a death penalty and it can be implemented in a do-no-harm reversible manner. The IP gets cut off from the internet, relay companies refuse the connections. This is after plenty of warning. If an ISP is being abused to send spam, then the ISP *must* stop it or the ISP itself is abusing the internet. The process described would provide full evidence, easily accessible in detail to trusted administrators in the organizational network, and fully accessible to the source ISP (since they could see it themselves in their logs and archives).

Very dangerous, obviously, which is why the structure of the organization which does this is crucial.

But it would kill spam, quickly. Remember, spammers send massive amounts of mail. With a large sample of users running the provided program(s), I'd expect identifications to start coming in within minutes, and escalate to the spam-filtering level within a few more minutes at most, and complaint process to ISPs would take little more time. Within a few minutes, spammers accustomed to being able to mail 100 mails per minute from a spambot would lose the resource well within the first 1000 mails, and the spambot would be identified and shut down. If the spammer throttles back, the overall yield of spams/spambot would decline, and losses of ISP accounts would be rapid, with loss of money associated with that.

Spambot detection would also be provided by the organization, and if the user is running a certain program routinely, there would be a record transmitted of where the spambot was installed from, with follow-up from the organization to shut down the hackers who do this. I've followed up on hacks to my web site, and filed complaints, and have seen action from domain service providers and hacker ISPs, but it was entirely too much work, the tasks should be semiautomated and made efficient. The only way I see to do this is with a collective organization of users.

Companies, however, would be engaged to provide services to the organization, because there would be -- and should be -- money to be made in effectively fighting spam, and the workman is worthy of his meat.

It would all start with an organization of internet users, not as a spam-fighting organization. If it starts as a spam-fighting organization, the spammers will quickly identify it and attack it, and if it is small enough, they can succeed in shutting it down. So, if you see a proposal to organize internet users, understand that all the possible usefulness of this might not be spelled out and featured.... If the spammers start to attack organization of internet users, per se, well, that would attract some serious attention, eh? I don't think they would dare.


Reply via email to