Sambar Server Documentation
|
User Whitelist Spam Filter
Pro Server Only |
User Whitelist Spam Filter Important! This functionalit is currently under development and will be introduced in the 5.2 release cycle. There are two types of filtering: positive and negative. Negative filtering can provide an effective "first pass" at eliminating SPAM, but is not as powerful positive filtering. Below is an outline of each technique and where/when each technique is most appropriate.
Negative FiltersNegative filters are used to detect spam and then to delete it or move it to a folder for later deletion. Common negative filters include rules for blocking mail with "free" or "cash" in the subject line and rules to block mail from known spammers. Maintaining a "blacklist" containing e-mail addresses, domains, and profiles of message headers and message body text of percieved spam messages requires a huge number of filters and a great deal of CPU time processing for incoming message. The other problem with this approach is that spammer's intrusion techniques are evolving as fast as the prevention techniques are, so the battle is never ending. The chance of "false positives" is also significantly higher with this approach.When negative filtering is implemented, a third-party solution such as BrightMail or the MAPS Realtime Blackhole List is typically used. These organizations typically have a large number of individuals dedicated to maintaining their lists.
For most systems, negative filters are not a practical solution for
fighting spam. On the other hand, negative filters are effective at
blocking known virus attacks. It is very common for mail system
administrators to block all email with attachments that are typically used
to carry viruses: .vbs, .exe .bat, .com, .pif, .shs, .scr, .vbe, .ocx.
See the SPAM filtering overview for how to enable
the SMTP "negative" filters.
Positive FiltersPositive filtering is simple and powerful -- you filter out the email addresses you want to keep, and send everything else into a folder for mass deletion. Basically, you construct and maintain a whitelist and then apply the filter to email when the sender address matches anything in the list. The whitelist can be "seeded" with the email addresses found in the user's existing mailbox and address book, and can be automatically supplemented with recipients of outgoing mail messages sent by the user.
Mail that does not match the whitelist goes into a 'spam' folder.
Users can periodically scan this folder and if any worthwhile messages
appear in there they can add the address to their positive filter list.
The rest gets deleted. The positive filter method is occasionally defeated
by spammers who forge addresses that belong to regular correspondents
(see limits to filtering. below).
Performance RequirementsThe performance requirements of a positive filtering implementation can be fairly significant. A typical user might have a whitelist that is comprised of several hundred correspondents (after using the system for a prolonged period). The CPU cycles needed to filter each incoming mail message against a user's whitelist can be considerable resulting in additional mail server hardware. Yahoo currently limits users to 100 entries in their list of addresses to block; this facility, though a form of negative filtering, operates similarly to the whitelist filtering proposed here and seems adequate for "casual" e-mail users. Any system planning to introduce a whitelist solution would need to accomodate at least 100 entries to be effective; 300 or more entries would be desirable to meet the needs of more active users.The Limits of FilteringRegretably, the release of the Klez virus in early 2002 has harkened the advent of more sophisticated address forgery. Spammers routinely send mail where the sender's address is from someone in the recipient's domain. Custom address forgery is the next step in spam evolution. In this way spam and internet worms/viruses are showing convergent evolution, both using the same technical and social engineering techniques to bypass filters and security systems and to then be activated by a human being (spam seeks to be read, worms to be activated). The whitelist solution outlined in this document do not block these more sophisticated techniques. |
© 2002 Sambar Technologies. All rights reserved. Terms of Use.