Re: [Asrg] Summary/outline of why the junk button idea is pre-failed

"BOBOTEK, ALEX (ATTLABS)" <AB3778@att.com> Tue, 02 March 2010 22:12 UTC

Return-Path: <AB3778@att.com>
X-Original-To: asrg@core3.amsl.com
Delivered-To: asrg@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 214B728C0EE for <asrg@core3.amsl.com>; Tue, 2 Mar 2010 14:12:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.443
X-Spam-Level:
X-Spam-Status: No, score=-106.443 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, SUBJECT_FUZZY_TION=0.156, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1L58hu-DoNtE for <asrg@core3.amsl.com>; Tue, 2 Mar 2010 14:12:14 -0800 (PST)
Received: from mail120.messagelabs.com (mail120.messagelabs.com [216.82.250.83]) by core3.amsl.com (Postfix) with ESMTP id C6F7628C1F9 for <asrg@irtf.org>; Tue, 2 Mar 2010 14:12:02 -0800 (PST)
X-VirusChecked: Checked
X-Env-Sender: AB3778@att.com
X-Msg-Ref: server-8.tower-120.messagelabs.com!1267567920!42310401!1
X-StarScan-Version: 6.2.4; banners=-,-,-
X-Originating-IP: [144.160.112.25]
Received: (qmail 21381 invoked from network); 2 Mar 2010 22:12:01 -0000
Received: from sbcsmtp3.sbc.com (HELO tlph064.enaf.dadc.sbc.com) (144.160.112.25) by server-8.tower-120.messagelabs.com with DHE-RSA-AES256-SHA encrypted SMTP; 2 Mar 2010 22:12:01 -0000
Received: from enaf.dadc.sbc.com (localhost.localdomain [127.0.0.1]) by tlph064.enaf.dadc.sbc.com (8.14.3/8.14.3) with ESMTP id o22MC0jb029636 for <asrg@irtf.org>; Tue, 2 Mar 2010 16:12:00 -0600
Received: from td03xsmtp006.US.Cingular.Net (td03xspare19-new.us.cingular.net [135.179.64.43] (may be forged)) by tlph064.enaf.dadc.sbc.com (8.14.3/8.14.3) with ESMTP id o22MBuPw029527 for <asrg@irtf.org>; Tue, 2 Mar 2010 16:11:56 -0600
Received: from bd01xsmtp004.US.Cingular.Net ([135.163.18.45]) by td03xsmtp006.US.Cingular.Net with Microsoft SMTPSVC(6.0.3790.3959); Tue, 2 Mar 2010 16:11:56 -0600
Received: from BD01MSXMB015.US.Cingular.Net ([135.214.26.11]) by bd01xsmtp004.US.Cingular.Net with Microsoft SMTPSVC(6.0.3790.3959); Tue, 2 Mar 2010 14:11:52 -0800
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable
Date: Tue, 02 Mar 2010 14:12:35 -0800
Message-ID: <BF533A28DBE487489EAB3411C5412CBE1032EE5B@BD01MSXMB015.US.Cingular.Net>
In-Reply-To: <4B8D3FD1.8090403@nortel.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [Asrg] Summary/outline of why the junk button idea is pre-failed
Thread-Index: Acq6J4H9CD7oXIm3QSWxYzwIBlsL4AACOw6w
References: <20100302131810.GA22938@gsp.org> <4B8D3FD1.8090403@nortel.com>
From: "BOBOTEK, ALEX (ATTLABS)" <AB3778@att.com>
To: Anti-Spam Research Group - IRTF <asrg@irtf.org>
X-OriginalArrivalTime: 02 Mar 2010 22:11:52.0702 (UTC) FILETIME=[5CE5A1E0:01CABA55]
Subject: Re: [Asrg] Summary/outline of why the junk button idea is pre-failed
X-BeenThere: asrg@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: Anti-Spam Research Group - IRTF <asrg@irtf.org>
List-Id: Anti-Spam Research Group - IRTF <asrg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/asrg>, <mailto:asrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/asrg>
List-Post: <mailto:asrg@irtf.org>
List-Help: <mailto:asrg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/asrg>, <mailto:asrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Mar 2010 22:12:18 -0000

+1

In the real world, there is so much positive experience with spam
reporting.  Vipul's Razor (report-based spam filter) evolved into a
commercial filter now used by most major US-based ISPs.  Sure there are
problems that need to be dealt with (e.g., unsubscribe, gaming, random
human errors), but rather effective solutions (including but not limited
to those involving reporter reputation, low-pass filters, and a "Not
Spam" button) have been found.  

In OMA (SpamRep abuse-reporting standards activity), the accepted wisdom
is that the reporting protocols should be standardized, but that the
backend processing (interpreting the reports) and report destination
shouldn't (parenthetically, mechanisms for specifying destination and
authorizing forwarding may be within the scope of the OMA standards).  

Is there not enough of a plurality convinced of

* the benefits of reporting and
* the benefit of interoperability resulting from standardizing reporting

to proceed with standardizing abuse reporting?  


Regards,

Alex

-----Original Message-----
From: asrg-bounces@irtf.org [mailto:asrg-bounces@irtf.org] On Behalf Of
Chris Lewis
Sent: Tuesday, March 02, 2010 8:42 AM
To: asrg@irtf.org
Subject: Re: [Asrg] Summary/outline of why the junk button idea is
pre-failed

On 3/2/2010 8:18 AM, Rich Kulawiec wrote:

I'm going to try to keep this brief, and at the same time avoid 
nitpickery.  I've put a point-by-point non-nitpickery response after 
"----", but, you can avoid reading that entirely and stick directly to:

It's not as if the industry doesn't lack ample experience with TiS 
buttons.  If TiS is as bad as you say, would anybody that matters still 
be using it?

Verizon abandoned SAV.  Did AOL, Gmail, MSN, Yahoo abandon TiS?  Nope.

I'm going to take a huge leap in suggesting that those guys are pretty 
smart, and if they still like them after a few bazillion man-years 
accumulated experience, they're probably right, and it is useful.

Especially when it agrees with my experience ;-)

You can stop reading now if you wish.
------------------------------------------------------------
> 1. User incompetence
>
>          Users have spent the last quarter-century conclusively
proving
>          that they cannot reliably discern spam from non-spam.

This flies directly opposite to my experience, and the experience of 
vastly larger environments than you or I.  They must know something, 
doncha think?

Certainly there are, er, lots of stupidities, but statistically, they 
still are a small fraction, and using statistical methods they can be 
ignored.

> 2. User time

>          Based on both these incredibly over-optimistic assumptions,
we can
>          then calculate how much end-user time will be spent
performing
>          this classification task and hitting the button.

You're assuming that this "classification task" is something that the 
end-user isn't doing already.  They already are.  At worst, we're adding

a button press.

This argument is only relevant if the TiS button is to be used _instead_

of filtering/if the TiS button isn't allowed to affect filtering in any 
way.  Nothing could be further from the truth.  It is an adjunct to 
filtering, where the time is only spent on the email the filters 
_missed_, with a goal of _both_ refining the filters yet further (to 
reduce the miss rate) as well as pushing the spam fight back to the 
originators (to stop the spam being sent at all).  Both are necessary, 
and both will _reduce_ the total amount of end-user time spent.

> 3. User exposure

>          It is certain that in the process of trying to perform
classification
>          tasks, they'll click on links "just to see what's there".

They're already doing this now.  A TiS button won't make it any worse.

> 4. User influence on security policy
>
>          Anti-spam defenses are similar to firewall rules: they
control
>          site security.  End-users should not be permitted to override
>          or otherwise modify firewall settings

Strawman argument:

This presumes that the site administrator allows this to happen, and 
secondly, that filter decisions directly follow _every_ TiS button hit. 
  They don't need to, and I don't know of any filtering environment that

does.

> 5. Duplicates existing functionality
>
>          All competently-run sites support the RFC 2142-stipulated
>          "abuse" role address and have appropriately experienced,
>          trained, qualified and diligent staff reading every message
>          sent there.

First, this reverses the role of "abuse".  Abuse is for abuse 
_originating_ at the site, which is of no help for abuse _received_ at 
the site.  Secondly, existing abuse implementations just about always 
fail in this regard because a humungous chunk of the population doesn't 
have mail readers capable of constructing adequate abuse reports (eg: 
missing headers).  We could, if we wished to, simply piggyback on 
RFC2142 (and email to abuse, losing the ability to triage the reports), 
but the standardization effort is still of value to provide actionable 
reports.  Because most of them aren't now.

>          It's trivially easy for any user to forward
>          questionable mail traffic (with full headers of course)

Aye, there's the rub - it's _not_ trivially easy now.  There's no 
standard of what abuse forwards look like, and in the majority of cases,

there are _no_ full headers.  Forwarding full headers in outlook isn't 
trivial nor easy, and half the time _still_ get mucked up when the user 
tries to do it right thru no fault of their own (thank your favourite 
software manufacturer for that).

The very best of the forwarding mechanisms are inconsistent and 
difficult to process.  The worst of them are totally unuseable, and 
unfortunately the most numerous.  It needs a standard format, at least, 
if it's to be done at all.

> 6. Free useful intelligence for spammers
>
>          It's great when your enemy hands you useful information.

This presumes, of course, that spam reports go to spammers.

Please explain to me how my TiS button leaks information to spammers.

> 7. Creating more Internet mail traffic is a bad move

This asserts a model of not reporting spam, and thereby limiting 
yourself to JHD at a server (or worse, user) level.

This is a step backwards that we must not take.  We have to move the 
fight back up the chain.

> 8. Report-as-spam button repurposed as weapon
>
>          We've already seen how spammers have repurposed any number of
>          ill-conceived anti-spam concepts (e.g., SAV) as weapons.

Please explain how spammers use SAV as a weapon.  They're not, because 
they can't and/or it doesn't have ROI versus simpler things they already

have at their disposal.

Sure, a spammer could use Verizon SAV to, say, DOS my mail servers.  But

it's is trivially easy to defend against.  Now, instead, the spammer 
gets their botnet to DDOS me directly.  That's a lot harder to stop, and

simpler for them to implement.

Yes, of course there are examples of anti-spam mechanisms repurposed as 
weapons.  Eg: the late unlamented BlueFrog.

But at this stage of the game, presuming that the nebulous spec we're 
talking about is of necessity reusable as a weapon is absurd.  We can't 
say that until we know what "it" is.

All of the big/high value targets have TiS buttons now.  Many spammers 
_only_ spam/care about the big boys.  Please explain how spammers are 
using TiS buttons as a weapon against the big boys.  They aren't.

> 9. The zombie problem

By that argument, the war is lost, all the machines are pwned anyway, 
_nothing_ is useable or trustworthy, and the Internet should turn off 
the lights.

We're not at that state (yet), so the argument doesn't hold.

I should point out, by way of demonstration, that if the argument is 
true, then port 25 blocking doesn't work.  All the bots would be using 
the user's SMTP server, and port 25 blocking wouldn't help.  Right?

Wrong.  Port 25 blocking does work.
_______________________________________________
Asrg mailing list
Asrg@irtf.org
http://www.irtf.org/mailman/listinfo/asrg