You've Got Spam: AOL Blocks 1/2 Trillion Spam 472
yohaas writes "Yahoo! News is reporting that AOL blocked more than 500 billion spam messages for its users in 2003. That comes to 40 messages a day per user. The company regularly blocks 75-80% of all incoming mail as spam! The article also lists the top 10 spam phrases for the year, including such come-ons as: 'Viagra online', 'Online pharmacy', 'Get out of debt' and 'Get bigger'."
Imagine. (Score:5, Interesting)
Of course, the idea is repeatedly turned down for its utter lack of pragmatism.
But damn, 500 billion spams, and that's only to AOL.
Just imagine.
The instant clogging of mail-servers around the world and subsequent technological disruption might actually get the general computer-using public to take more of an interest in the fact that around 200 gangs of people are effectively raping and pillaging the Internet right under their eyes.
But then again, what can one do when faced with the Tragedy of the Commons?
Yep, the number doesn't surprise me either (Score:5, Interesting)
Re:It would be WAY too easy . . . (Score:2, Interesting)
My own score (Score:4, Interesting)
Hmmm (Score:2, Interesting)
All those 1000 hour free CDs being put to use in the wrong hands...
Only Spam? (Score:5, Interesting)
How do you people get so much spam? (Score:2, Interesting)
Re:including a gajillion non-spam (Score:3, Interesting)
Re:They also block real mail (Score:5, Interesting)
Anyway, from what I read on the net my hosting provider's experience with AOL's blocking of incoming SMTP connections is not out of the ordinary, many, maybe hundreds, of "little guys" have had the same experience. Makes me want to know the false positive rate for their spam blocking -- I'm willing to bet that AOL themselves don't even know the answer to that one.
Stopping spam. (Score:5, Interesting)
Note: I did some thinking earlier on spam, and I figured I would post this the next time slashdot does a story on spam... You can find a link to this at:
http://sillygoth.com/journal/21669 [sillygoth.com]
This is my writing... I just want some feedback on it from the slashdot crowd.
Okay...
One of the things that I've been tired of recently is dealing with lots and lots of spam in my inbox. I've become even more tired of hearing about how there's a lack of solutions for dealing with it. It's one of the things that slashdot has been endlessly parading about.
To me, the primarily problem with spam is that emails are too easily spoofable. Solve this, and spam will become *much* more managable.
So, what technology is there right now that deals with certifying legitimacy?
Digital Certificates!
When you go to a site that's protected with https, the owners of the site usually have to get a certificate from a trusted source (Verisign, Thawte, etc) signifying that the site is legitimate (so that you don't end up giving credit card information to someone fronting for that company).
You actually *can* get a digital certificate for your email, but it costs money. Plus, to make something like that mandatory, each user would have to set up a certificate individually. Evil.
Why not move authentication to the domain itself? When accounts are setup on a user's machine, create an RSA public / private key per account. Simple enough.
When a user sends an email, force this user to relay the email through the mail server rather than directly from his/her computer. Force the user to authenticate their email / password to send the message. Some servers already force this, I believe.
When the user authenticates him/herself, encode a confirmation id using some elements of the email (first xx characters of message, subject, date, etc) using the RSA private key and attach it to the message.
Here's what should change with the receiving server... When a mail server receives the message, the mail server should initiate a separate connection that looks up the domain's MX server, and communicates with it.
This MX server should then provide the RSA public key for the account listed. The public key will then be used to decrypt the stamp that the MX server included with the message. If the stamp is legitimate, deliver the message to the inbox.
If a stamp is not legitimate, or there's no stamp, simply don't deliver the message. Simple enough.
This method has its series of strengths:
There would be absolutely no point in spammers taking over people's machines with viruses in order to send email if email must be sent through a qualified mail server. It's possible that worms could be written to auto-send messages through these relays, but at least then the mail server could detect it and shut the person out.
If mail sent is authenticated from a domain, people would then have the option to blacklist domains that aren't responsible for keeping tabs on its users.
Mail *will* come from where it says it's coming from. If not from the exact user on the domain, it'll come from that particular machine.
Of course, there are possible weaknesses to this strategy too.
If the mail server is hacked, hackers would be able to still send mail from it using the private key. Fortunately, they would only be able to send from email addresses listed under domains they own.
Spam software like SpamCop / Spamassassin / etc would be able to keep tabs on servers that exhibit hacked behavior, and temporarily blacklist these servers until resolved.
This doesn't necessarily stop users with legitimate email addresses from sending spam. Someone with a legitimate email address can still be spammed.
But at least when you block their email address or domain, it'll be a real email address, and a real domain name.
This method is not 100% in eliminating spam. But it's a damn good start.
Re:How to stop SPAM at the source (Score:5, Interesting)
Whitelisting makes sense--trusting certain mailservers more and not bothering with intense heuristics on mail coming from them. But blacklisting anyone you don't know makes none. The Internet is too vast to really implement something like this without huge costs and huge losses; I think solutions like this likely do far more to Balkanize the Internet than to protect it.
The solution mentioned in a previous Slashdot article a few days ago of making SMTP servers run a small computation per e-mail makes much more sense. This allows you to impose restrictions on non-whitelisted servers without completly ignoring them, either.
But when you talk about the anonymity preferred by the spammers, you ignore the fact that they are, in fact, selling a product. Forget the spammers. Track down their clients, the ones paying for the ads. Problem solved.
Re:Short of going to war with China (Score:1, Interesting)
(no, i'm not just flinging sterotypes, i lived in china for a year.)
Just run through a spell check (Score:3, Interesting)
Re:It would be WAY too easy . . . (Score:1, Interesting)
Imagine (Score:5, Interesting)
Or anonymous e-mail. That's where this "signed" e-mail crap is going.
Imagine every message you send being tracible right back to you.
But hey, what's the trashing of rights in the name of convienience.
If you can send e-mails without being traced, so can spammers.
If spammers can't send e-mails without being traced, neither can you.
"Spammers are most afraid of being tracked and identified. "
Yeah, and nobody has a legitimate reason to not want to be traced.
I spent all of 2 hours modifying RinetD to do proper logging in between senders and my mail server. I spent another 3 hours writting a simple program to parse that log pulling out who a message is from, who it's going to, the subject line and what links it contains and the domains of those links.
Any entry "to" entry that isn't one of my e-mail addresses is deleted. The remaining are then examined for spam domains by looking at the froms and subject lines and the domains themselves.
A short list:
If expression both matches "*imgehost.com*" Delete ""
If expression both matches "*mydailyoffer.com*" Delete ""
If expression both matches "*topofferz.net*" Delete ""
If expression both matches "*adweawen.biz*" Delete ""
If expression both matches "*divineprice.com*" Delete ""
If expression both matches "*stamps.com*" Delete ""
And poof, no more ads from those companies and nobody's right to privacy is infringed. If they happen to have multiple domains for the same campaign I'll catch them as they come.
I will not support a means to subvert my right to privacy over some stupid ads.
How much are your rights worth to you? Not much apparently.
Terrorists blow up buildings and we get the patriot act. "terrorists" flood inboxes and you demand tracable e-mail.
Get bent.
Ben
Re:You've got spam??!? (Score:5, Interesting)
oh no, spam! screw privacy! (Score:3, Interesting)
Yeah, you can get those in your BIOS and media files and anywhere else. "Trusted Computing" EVIL. "Trusted E-Mail" GOOD.
What is wrong with you people?
You know what I do to block spam?
I filter out links contained in e-mails and block the COMPANIES.
I don't care how forged the header is. If the e-mail contains a link to spam domain it doesn't get through.
Nobody's right to privacy is infringed and it's 100% effective and 100% accurate. Nobody is going to be sending a legtimate e-mail with a link to and/or an image from www.topofferz.com or with an affiliate link to click-com
I'm not going to regurgitate the whole system I use here, you can find it talked about in older posts of mine and it will be posted on my site this weekend along with all the source code for the programs I use to automate some of the process.
I can't believe how quick and eager people are to burry their rights over nothing more than ADVERTISMENTS.
Ben
Re:You've got spam??!? (Score:2, Interesting)
Re:You've got spam??!? (Score:3, Interesting)
I run my own mail server, not blocked (Score:3, Interesting)
To get around the port 25 block I run my mail server on an alternate port for myself and then use RinetD on port 25 which fowards to the mail server. My e-mail going out is none of my ISP's business. The server that actually sends the mail is hosted by another ISP. Which doesn't break any clauses since I'm not running a server on my home system.
I've had people using AOL signup for subscriptions since I started back when I was running out of house. But then I had a business connection.
Residential connections tend to have clauses about not being allowed to run servers. My home ISP doens't block port 80 but I'm still not allowed to run an HTTP server.
If AOL is blocking residential accounts that are allowed to run mail servers then you have a case. However, if you're violating your TOS then too bad. Get a business connection like you're supposed to.
Blocking non static IPs is a good thing. If you're seriously trying to run a mail server then you need a static IP. So pay for it.
Ben
Re:Outbound (Score:1, Interesting)
Time to grow up (Score:3, Interesting)
Whatever happened now? SMTP started out pretty open. Obviously things got out of control. So, fix it already. A group of ISPs can gang up and require all SMTP users to sign up with their username/password, which is already supported by all e-mail clients. Limit each user to 1000 e-mails a day (allowing for rather large mailing lists, but still 1000 times too low to make spam attractive for the subscription price). Then only accept e-mail from cooperating hosts over SSL pipes with a correct certificate. Prepend BORK: to the subject lines from other domains so that users can filter them to another mailbox.
If yahoo participates, I can always ask people to sign up for a free account if they really want to reach me. Smaller ISPs will jump on the chance to de-bork their e-mails and make customers happier. Once enough of them do, bigger ISPs will have an incentive as well. Problem solved!
Re:You've got spam??!? (Score:3, Interesting)
Yes, but the ratio of false positives to false negatives is tunable.
You know enough about spam blocks to know that there are shitloads of keywords they're looking for
It has little to do with keywords. The things that catch most people is broad block lists.
Re:You've got spam??!? (Score:5, Interesting)
Our mail server has somehow erroneously been blacklisted and so we have added about 100 emails of that "Spam" to that half a trillion. I'm sure we're not alone.
The blacklists aren't infallible and get messed up and tend to be very slow to respond to errors or worse just don't bother (or even worse demand money to be removed in one noteable case).
What the article should say is that AOL blocked half a trillion emails, god knows how many of them were legit emails or how many really were spam...
Re:I hate aol's blocking! (Score:5, Interesting)
Call, stay on hold 45 minutes, and you get "white listed" for 30 days and they ask you to setup a special email to send you spam complaints to if that IP becomes a problem again in the future. Sounds good right? I mean we host nearly 13,000 web sites for over 6000 customers, we DO get some spam sent through us once in a while (open formmail.php is the worst) and we handle it the second it's noticed.
HOWEVER we have YET to recieve ONE, and I mean that as in a SINGLE complaint from AOL for ANY of our ips. Yet 7 times now we've been blocked. Luckily it hasn't happened in a few weeks.
Do you know how annoying it is when 13,000 web sites become unable to talk to aol? Jesus christ.
Here's the funny part, often times it's only 1 or 2 of the (best I can tell) 4 main MX servers blocking us, so much for keeping those in sync.
I applaud them for trying to curb the incoming spam but goddamnit make it POSSIBLE to work with and if you block someone TELL THEM WHY and maybe a little warning please! If I'm notified of a problem I'll GLADLY nuke the spammers ass, or if it's just an open script, we can help the customer secure it, but if we're not informed what can we do? At least spamcop sends us emails with headers of the spam so we can take care of it.
So I gotta wonder how many of that half trillion is REALLY spam and how much is erroneous blocking.
Weird definition of SPAM (Score:3, Interesting)
If they really want to get a handle on spam, fwd:fwd:fwd Urban folklore... they should really block *@aol.com.
Re:You've got spam??!? (Score:2, Interesting)
The same thing started happening to me in the last couple months. My provider checked, and they're not hijacking the use of the mail server, they're just forging headers so it appears the mail is coming from my domain (They all pretend to be from some username@mydomain.com). There isn't any obvious solution. I've gotten about a hundred "bounces" in three months. I don't think this is the criteria AOL uses to block an email server, otherwise I assume I would stop getting the bounce messages. I can and do send emails to people on AOL.
I hate having my domain name associated with V*I*A*G*R*A (the bounced messages are almost all online medication related, though with forged headers, I assume they're all just scams to get people to send their credit card numbers), but I doubt anyone receiving those messages pays much attention to the originating mail domain, even a forged one. I hate to say it, but I think email is broken beyond repair, and someone needs to create a replacement system.
Re: Blocking outbound e-mail (Score:3, Interesting)
What might work, but would require resources would be to setup some sort of profile system which only allows selective port 25 filtering. (This will be an expensive idea, with some invasion of privacy.)
For every customer, start a list of the SMTP servers that they contact, and only allow them to contact up to 10 different SMTP servers. If a customer hits their limit due to trojan'd machine or virus-infection, the damage will be (somewhat) limited. Customers should be able to reset their list once every 24 hours, but they can only reset 3 times before a CS rep has to do it.
Not a pretty solution, but a possible next step.
But is it all "spam"? (Score:3, Interesting)
Still, it's a nice attention grabbing figure to help raise public awareness of the issue, and I have zero issues with that.
Hi, We're AOL and we blacklist first... (Score:2, Interesting)
I wonder if these statistics include all the valid email messages that have been blocked by AOL's over zelous blacklisting of servers. I work for one ISP who's mail servers have been getting blacklisted on and off for the past 2 weeks and have a friend that does web hosting and his mail servers got blacklisted. Neither were put on AOL's black list because of spam comming from the servers