Email Protection
Email Protection
Introduction
This white paper provides an introduction to the subject of how to protect enterprises
that are connected to the Internet from junk email. The format of the paper is that an
authorisation issue is outlined and then the relevant. Mailer facilities are
described.
We will use the following scenario to help explain the authorisation issues. An
organisation called "Acme Inc" operates a message switch with an Internet host name
mailer.acme.com . A message switch is a software application that performs the transfer
and delivery of email messages.
Acme receives email from a number of organisations connected to its Internet Service
Provider - bigisp. These organisations include beta.com, pots.co.uk, and
spam.com (!). Note from the diagram above, that their messages are routed to Acme via
a remote mail host called gate.bigisp.net in the bigisp.net domain.
Acme both sends and receives messages via bigisp.net . However, we will focus on
the authorisation issues in the receiving mode. When the message switch at
gate .bigisp .net connects to mailer.acme.com to pass over messages, there are three
possible courses of action that the Acme message switch may take:
Refuse to accept messages from gate.bigisp.net (e.g. because the message
switch doesn’t know how to deliver them or they fail authorisation)
Deliver messages to the corporate network if they are addressed to local (i.e.
Acme) users
Relay messages addressed to non-local (i.e. non-Acme) users on to the appropriate
Internet domain
1 Althoughthe paper focuses on Internet mail, many of the issues and solutions apply equally well to
X.400 mail.
The initial authorisation decision to accept, deliver or relay messages arriving at the
Acme message switch is almost always based on the identity of the connecting
message switch. Nevertheless, authorisation decisions may actually be based on a
wider set of criteria including:
• Connecting message switch identity and
• Sending user identity
• Message Content
We will look at each of these criteria in turn starting with connecting message switch
identity. However, during the connecting message switch section we will
take time out to consider the issues surrounding the rejection of email.
Domain Authorisation
It is possible and useful to have a trust policy based on the domain in which the
message originated. For example, to reject messages coming from the spam.com
domain irrespective of the domain of the connecting message switch bigisp.com.
This authorisation should be capable of being performed independently of the
connecting message switch identity check or combined with it. For example, the
combined approach allows the following type of check:
Accept only if the domain of the originating message matches that of the connecting
message switch.
Note that this is very useful in circumstances where there are known spam problems
with a given domain. However, it is not sensible to employ this rule as the default case
because much legitimate email will not have a match between the remote message
switch and domain name. For example many Internet service providers have a central
message switch which relays email messages for all their customers domains.
Domain authorisation is a useful technique but it does suffer from the drawback that it
is possible to forge the domain information as this is contained within the message
header in the ’From’ field. However, at the moment, this still traps a majority of spam
attempts.
The default rule setting could be changed to reverse the accept-all-but policy to a
reject-all-but policy. Note that rejection can be with Delivery Report (DR) notification
or without. The constraints field allows the administrator to only allow messages from
a domain associated in some way with the connecting message switch host.
For example, the first exception line in the table allows only the connecting message
switch mailhost.beta.com to pass on messages that originate in the beta.com
domain. This enforces the policy that the originating user must be part of the beta.com
domain. For example, this stops other domains from using the beta.com domain to
relay messages to Acme on their behalf - i.e. masquerading behind a legitimate domain
(spammers frequently use any available unprotected Internet message switch for
relaying).
The next diagram shows how the Domain authorisation policy can be set. An additional
option allows relaying of external domain messages (this topic is discussed later). The
local option identifies an intra-company (i.e. Acme) domain.
A subtle point here is that the domain policy allows an additional restriction on
spammers. If a spammer forges their address domain to be
beta.com(e.g.fred@beta.com) and relays the message to Acme via other domains than
beta.com (to escape detection) then the Acme message switch will reject the message
because the constraint only allows the connecting message switch to be in beta.com.
Note that this is a different rule to the similar looking one in the previous diagram. The
Domain rule will be invoked for messages coming in from all connecting message
switches, not just the mailhost.beta.com message switch.Mailer also provides the
facility to define Groups. Groups allow sets of users, domains and routes to be associated
with a specific authorisation policy. Thus Mailer can be simultaneously executing
different authorisation policies on behalf of different groups. The Domain Authorisation
Policy diagram illustrates a simple example of Groups via the pre-defined group "local".
This feature will be used in the discussion of User Authorisation.
User Authorisation
Often, as an aid to spam control, an enterprise may wish to impose on the email
network the same kinds of administrative control that have been devised for paper
systems. For example, restrictions on who may send to whom (i.e. mirroring the
organisational hierarchy), or sign-off routing (i.e. so that outgoing email has to be sent
by authorised individuals).
Even if only simple versions of these kinds of activities are contemplated, it is
necessary to be able to set authorisation on a per user basis. Permissions will typically
relate to who may communicate with whom (e.g. ability to send internal email only as
opposed to internal and external email authorisation) and by what route. These kinds of
authorisation usually require that the administrator has the ability to define groups with
differing communication attributes and assign users appropriately.
In addition to the above, it may be necessary to associate authorisation processes with
the kinds of messages that individual users may send (see content authorisation later).
Note that the context of local is defined by the domain(s) marked local in the Domain
Authorisation diagram. If the Domain Authorisation and the User Authorisation
configurations conflict, the User Authorisation will override Domain Authorisation.
This is designed to allow exceptions to domain policies for specific users. For example,
to allow communication with friend@spam.com and thereby override the blanket
domain ban on spam.com.
Relaying
In the introduction, we identified relaying as the third of the possible actions that the
Acme message switch might take, along with rejecting and delivering. There are two
situations in which relaying might occur:
• Enterprise Gatewaying / Border Management
• Cooperative Message Transfer
Enterprise Gatewaying
It is usual for the Enterprise Intranet to be shielded from the Internet by both network
protocol firewalls and application gateways. Mail gateways act as relays for mail to and
from the internal systems. This allows, as we have discussed, common authorisation
policies to be established at the network boundary of the Enterprise.
This makes for much easier administration than ensuring that all the Intranet
departmental message switch hosts have the same policy. It also allows message
headers to be rewritten such that a consistent mail domain address format is propagated
beyond the intranet and indeed that the internal structure of the intranet is not revealed
to the outside world (reducing further the potential security loopholes). An additional
use for relaying is when gatewaying between different network technologies (e.g. X.25
to TCP/IP) and/or different messaging formats (e.g. Internet to X.400). Needless to say,
Mailer makes an excellent firewall or gateway as well as being capable of
being deployed as a general message switch.
Security Loopholes
Make sure the following common host and TCP/IP services security loopholes are
closed, especially on UNIX systems:
1. Insufficient data backup
2. Weak password policies
3. Absence of host-based alert systems such as COPS and TRIPWIRE
4. Unpatched host operating systems and applications
5. Vulnerable TCP/IP services, especially simple mail transfer protocol, network
information service, network file system, and FTP
Size
It is usual to be able to define the maximum size of a message. This is useful in
situations such as (i) a message may be routed over a chargeable link and messages of
tens of megabytes need to be stopped, or (ii) the remote message switch or its attached
network is not able to cope with messages that contain large attachments and the result
will be that users are denied service.
Security Attributes
It is now possible to transmit messages that are digitally ‘signed’ as an integrity check
- i.e. as a means of notifying the receiver that the message has been changed or
corrupted. In addition, certain kinds of secure messages can carry a security label in the
message header that the message switch can use to decide whether the receiver has
sufficient authorisation for the message to be delivered to him/her.
Content Screening
The most common type of content screening involves the scanning of the message and
its attachments for viruses. These either cause the message to be rejected or the
message switch substitutes the offending message part for a default message part (e.g.
"virus found here").
In addition, it is often required to detect specified types of information content. For
example, an enterprise may wish to check outgoing (or incoming) messages for
commercially sensitive or offensive words and reject or edit the message accordingly.
Although these techniques provide protection again casual offenses, it maybe difficult
to cater for the determined (ab) user who may use private, non-sensitive code words.
New developments within the understanding of the ideas within a document has
enabled to provide the ability to route email messages based upon the ideas
within a message. This technology moves beyond simple keyword matches to full
content understanding.
Header Screening
There are ongoing developments regarding the addition of specific fields within the
heading of messages, which identify the type of the message. An example would be to
identify unsolicited bulk email (UBE, also known as spam). Thus, message switches
can screen messages based upon the presence (or not) of certain information within the
heading.