1 / 4

Email Points of Control

This article discusses the evaluation of spam control solutions, including the adoption effort, balance among participants, and the impact on adopters and others. It also explores the types of spam, accountability issues, control mechanisms, and the importance of careful implementation.

Télécharger la présentation

Email Points of Control

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MTAo MTAr UAo UAr Email Points of Control Accountability Filtering Enforcement UA = User Agent MTA = Message Transfer Agent o = originator i = intermediate r = recipient Filtering MTAi1 MTAi2 DNS ISPCon 2003 – Evaluating Spam Control Solutions Brandendenburg.com / 1

  2. Adoption Effort to adopt proposal Effort for ongoing use Balance among participants Threshold to benefit Operations impact on Adopters of proposal Others Internet scaling – What if… Use by everyone Much bigger Internet Robustness How easily circumvented System metrics Cost Efficiency Reliability Impact Amount of Net affected Amount of spam affected Test scenarios Personal post/Reply Mailing List Inter-Enterprise Evaluating Proposals ISPCon 2003 – Evaluating Spam Control Solutions Brandendenburg.com / 2

  3. Types of Spam Accountable Legitimate businesses Aggressive marketing Absence of formal rules Rogue Actively avoid accountability Find a “safe haven” Not always seeking money Types of Control Legal Terminology Boundaries Whitelist Validate sender Validate sending policy Blacklist Arms race False positives Cascading Control ISPCon 2003 – Evaluating Spam Control Solutions Brandendenburg.com / 3

  4. Be Careful What You Ask For • Changes to complex systems always have unintended, negative consequences • We must attack spam, but we must attack it carefully • Attacking superficial spam characteristics invites an arms race • Constantly “improving” tools, but constantly failing to reach a stable level of effectiveness • Adequate solutions for one constituency might be inappropriate for another • Look at their communications styles ISPCon 2003 – Evaluating Spam Control Solutions Brandendenburg.com / 4

More Related