mail abuse
play

Mail Abuse S. Moonesamy Eland Systems sm+afrinic@elandsys.com 1 - PowerPoint PPT Presentation

AfriN AfriNIC 11 IC 11 No Novemb ember er 200 2009 Mail Abuse S. Moonesamy Eland Systems sm+afrinic@elandsys.com 1 How do we stop spam No instant solution Social problem AfriNIC 11 - Mail Abuse 2 How we read an email message


  1. AfriN AfriNIC 11 IC 11 No Novemb ember er 200 2009 Mail Abuse S. Moonesamy Eland Systems sm+afrinic@elandsys.com 1

  2. How do we stop spam No instant solution Social problem AfriNIC 11 - Mail Abuse 2

  3. How we read an email message depends on the context If I send an email to all the people attending this meeting, is it spam? If If I send a personal email to each of you, is it spam? If a person I do not know read these slides on a web site and sends me an invitation to join a social network, is it spam? AfriNIC 11 - Mail Abuse 3

  4. Senders Is your network sending out spam? Can you identify the computer sending out spam? AfriNIC 11 - Mail Abuse 4

  5. What makes a good sender Accurate information in WHOIS to identify the point of contact Accurate information in AfriNIC Whois database if the IP address block has been delegated to your organisation Forward and reverse DNS match Correct hostname (FQDN) for the SMTP EHLO AfriNIC 11 - Mail Abuse 5

  6. What makes a good sender Respond to abuse complaints My email is important. Why do you block me? Opt-In v/s Opt-Out AfriNIC 11 - Mail Abuse 6

  7. Receivers Spam Backscatter Too many SMTP connections AfriNIC 11 - Mail Abuse 7

  8. Mail abuse Unsolicited commercial mail (UCE) Malware Phishing AfriNIC 11 - Mail Abuse 8

  9. Antispam Techniques DNS Blacklist (DNSBL) Reverse DNS checks Greylisting RFC compliance Content filtering Callback verification Challenge/response systems AfriNIC 11 - Mail Abuse 9

  10. Mail Abuse Thank hank you ou AfriNIC 11 - Mail Abuse 10

Recommend


More recommend