Switch to Better Email-Technology

Total Page:16

File Type:pdf, Size:1020Kb

Switch to Better Email-Technology SWITCH TO BETTER EMAIL-TECHNOLOGY TUXGUARD GmbH © 2020 Table of Contents Installation • Installation 10 • System Requirements 10 • OS 10 • Hardware 10 • Network 11 • Preparing the installation 11 • Webmaster Installation 11 • Worker Installation (on web host) 11 • Worker Installation (remote) 11 • Web/Database master setup 12 • Worker 12 Domains • Domains 13 • Add new domain 13 • Next Hop 13 • Recipient Verfcation 14 Mail Rules • Mail Rules 15 • Adding Mail Rules 15 • Lookup Order 17 • Connect 17 • Host connected over IPv6 17 • Host connected over IPv4 17 • IP address has a rDNS entry that can be forward confrmed (FCrDNS) 18 • HELO 18 • From 19 • To 19 • Body 20 • Subkeys 20 • ACL 20 • Pattern Lists 21 • TLS 22 • Concurrent Connection Limits 22 • Connection Rate Limits 22 • Greylist TTL 23 • Null Sender Rate Limits 23 • Message Rate Limits 24 • Message Size Limits 24 • Relay 25 • Blind Carbon Copy 25 • No List Traffic 25 Reporting • Reporting 27 • Logs 27 • Log Search 27 • Cluster 28 • License 28 Administration • Administration 30 • Resellers 30 • Hierarchies 30 • Domain Aliases 30 • Add a new Reseller 31 • Companies 31 • Add a new Company 31 • Users 31 • Add a new User 32 Confguration Mail Core 34 • Mail Core Confguration 34 • Listen on ports 34 • Other ports 34 • Administrative Contacts 34 • Maximum Message Size 34 • SMTP Greeting 34 • Inactivity Timeout 35 • HAProxy Hosts 35 • TLS Private Key 35 • TLS Public Key 35 Pre-Data 36 • Pre-DATA Checks 36 • Early Talkers 36 • Delay 36 • DNS Lists 36 • Use FSL DNS Lists 36 • DNS Blacklists 36 • DNS Whitelists 37 • Domain Blacklists 37 • URI Blacklists 37 • rDNS 38 • Require rDNS 38 • Reject generic rDNS 38 • Reject invalid rDNS domains 38 • EHLO/HELO 38 • Require valid hostname 39 • Reject hosts that send mismatched HELO 39 • Reject bare IP addresses 39 • Reject mismatched IP literals 39 • Reject dynamic 39 • Bounce Messages 39 • Single recipient only 40 • Enable backscatterer DNSBL list 40 • Reject all 40 • Sender Policy Framework (SPF) 41 • Enabled 41 • Sender Authentication 41 • Skip rDNS/HELO rejections 41 • Greylisting 41 • Time 42 • Fail TTL 42 • Pass TTL 42 • Miscellaneous 42 • Single domain per session 42 Clickwhitelisting 43 • Click Whitelisting 43 • Enabled 43 • Secret 43 • Private Key 43 • Public Key 43 • Initial TTL 43 • Whitelist TTL 44 Outbound/Relaying 45 • Address Book 45 • Enabled 45 Post-Data 46 • Post-DATA Checks 46 • Watermarking 46 • Enabled 46 • Secret 46 • Expiry Time 46 • Reject Bounces without watermark 46 • Bounce Messages 47 • Check each received hop with SPF 47 • DSPAM 47 • Training 48 • Enabled 49 • Host 49 • Server Password 49 • Training Level 49 • Reject Level 49 • Enable Auto Training 49 • Auto Training Level 50 • SpamAssassin 50 • Enabled 50 • Host 50 • Reject Score 50 • Relay Reject Score 51 • MessageSniffer 51 • Enabled 51 • License ID 52 • Authentication 52 • Miscellaneous/Experimental 52 • Reject unreplyable messages 52 • Non-Latin character limit 52 Antivirus 54 • Anti-Virus 54 • ClamAV 54 • Enabled 54 • Hosts 54 • Reject Broken Executables 54 • Reject Encrypted Archives 54 • Enable PUA Signatures 55 • Packed 55 • PwTool 55 • NetTool 55 • P2P 55 • IRC 55 • RAT 55 • Tool 55 • Spy 56 • Server 56 • Script 56 • Enable DLP Signatures 56 • Reject OLE2 Macros 56 • Enable Google SafeBrowsing Signatures 56 • Enable Phishing Signatures 56 • Enable UNOFFICIAL Signatures 56 • Exclude List 56 • AVG AntiVirus 57 • Enabled 57 • ESET Mail Security 57 • Enabled 57 Attachments 58 • Filename Rules 58 • Archive Filename Rules 58 • Archive File Extensions 58 • Maximum Archive Depth 58 • MIME-Type Rules 59 Alerts 60 • Alerts From 60 • Alerts To 60 HAProxy 61 • Example HAProxy Confguration 61 Shared Cache 62 • Secret 62 • Port 62 • Unicast Hosts 62 • Multicast IP 62 • Multicast TTL 62 Mail Server 63 • Mail Server Confguration 63 • Microsoft Exchange 2003 63 • Microsoft Exchange 2007 63 • Microsoft Exchange 2010 63 • Microsoft Exchange 2013/2016 64 • Office 365 64 • Google Apps 66 • Zimbra 66 Reports 68 • User Reports 68 • Admin Reports 68 Miscellaneous Hostname 70 • Changing Hostnames/ IP addresses 70 • Change IP Address 70 • Standalone TUXMAIL Server 70 • Master node 70 • Worker/Slave node 70 • Changing the Hostname 71 Data Import 73 • Backup File Import 73 DMX Migration 74 • Migrating from DefenderMX 74 • Exporting DMX Data 74 • Import DMX Data during Installation 74 10 Installation Installation System Requirements TUXMAIL can be installed on a single server, but it is highly recommended to have at least two systems for redundancy and a dedicated server that runs the web interface (and databases) for best performance. If you are sending a lot of outbound or relay traffic for a lot of domains and other SMTP servers (e.g. using TUXMAIL for SMTP AUTH or as a smart host), then it is highly recommended that you dedicate one or more servers to outbound traffic only and not to mix it with the inbound service. This is to prevent inbound and outbound services adversely affecting each other should there be any abnormal traffic levels. OS A minimal installation of Redhat Enterprise Linux 7 (https://access.redhat.com/products/red- hat-enterprise-linux) or CentOS 7 (https://www.centos.org) with all updates applied is required. Hardware The recommended system specifcation is: • Intel Xeon CPU with minimum 2 cores or better • min. 8GB RAM for the Web/Database master (due to the ElasticSearch (https:// www.elastic.co/elasticsearch/) requirements) • 2GB RAM per Core for additional Workers • min. 32 GB HDD In case of running both Web master and a Worker instance on the same host 16GB RAM are recommended. A minimal Red Hat Enterprise Linux or CentOS installation with TUXMAIL uses around 3GB disk space, but a minimum of 32GB, all on one large partition, is recommended for a small system since the system uses space for logging, temporary fles, etc.. The database role will take approximately 5GB of disk space per million SMTP transactions logged. TUXGUARD GmbH © 2020 11 Installation Network We recommend to ensure the following: • installation on machines at network edge within DMZ without any ‘helpers’ or ALG (Application Level Gateways) enabled on frewall (such as Cisco SMTP/ESMTP inspection, PIX fxup protocol or any other form of SMTP Proxy) • application must speak directly to the host originating the message and see its external IP (the only exception to this being if a HAProxy is used for SMTP traffic) Preparing the installation Before starting the installation verify that • firewalld is enabled and running • the system hostname is set-up correctly (if not, run the command: hostnamectl set- hostname <hostname>) • a static IP address is set • at least 2GB swap space is available • all ports are open between the Web/Database master host and each worker host (the installer will correctly re-confgure and secure frewalld during its fnal step) • the root user on each worker host must be able to ssh to the Web/Database master host using a userid that can sudo to root. • the hosts all have an active internet connection Webmaster Installation 1) download the TUXMAIL YUM repository fle 2) copy the .repo fle into the /etc/yum.repos.d/ directory on the webmaster host 3) run yum clean all and yum install tuxmail-web Worker Installation (on web host) In order to install a worker on the same host as the webmaster, simply run yum install tuxmail-worker tuxmail-worker-sync on the webmaster host. Worker Installation (remote) In order to install a worker on a remote host: 1) ensure a working ssh-connection to your webhost 2) run ssh root@<your-web-host> "tux_add_cluster_node `hostname` "|bash TUXGUARD GmbH © 2020 12 Installation Web/Database master setup After the Web/Database master has been installed successfully, the following steps are needed to complete setup: 1) Navigate to https://your-web-master-host-ip (or the appropriate DNS entry) using a browser (we recommend using the latest version of Firefox or Chrome) 2) Accept SSL exception 3) Optional step: import a backup fle (more Information here (/misc/data_import.md)) 4) Import your license file by either uploading the .json or copy-pasting its contents into the appropriate text feld 5) Create an initial Superadmin user by flling out the form You can now login using the created initial credentials. Once you’re done with your TUXMAIL setup, you should remove any hosts from your MX records that do not run TUXMAIL (e.g. backup MXs) as they will adversely affect fltering performance. Alternatively you can stop the SMTP services on any of these hosts and only start them in a DR scenario. Worker During worker installation, the following steps are being performed automatically: • copy the SSH key from the master Web/Databese host, enables passwordless access to any of the cluster nodes • allows access through the frewall to the host • copies the tuxmail.repo fle to the host • starts the installation of ‘tuxmail-worker’ automatically which automatically creates a replica of the master node Installation may take a few minutes to complete as virus and spam definitions are downloaded for the frst time to ensure everything is completely up-to-date. Once the installation is complete, your system is ready to scan emails. TUXGUARD GmbH © 2020 13 Domains Domains Here you configure the Domains that you want to handle inbound mail for. Any inbound mail to recipients not in the domains listed here will be rejected by TUXMAIL. The domains are displayed in alphabetical order and show the next hop, disabled checkbox and the creation date, last update and the options to edit or delete the domain. Add new domain Enter the domain name in the input box provided. The disabled checkbox allows the administrator to disable reception of mail for a domain temporarily. This will defer all recipients to the domain, which means that any mail will be queued on the sending system, it is likely that the senders will get a warning that their message is queued after 4 hours and the mail will eventually be bounced back to them as undeliverable after 5 days (these are the RFC defaults).
Recommended publications
  • Prospects, Leads, and Subscribers
    PAGE 2 YOU SHOULD READ THIS eBOOK IF: You are looking for ideas on finding leads. Spider Trainers can help You are looking for ideas on converting leads to Marketing automation has been shown to increase subscribers. qualified leads for businesses by as much as 451%. As You want to improve your deliverability. experts in drip and nurture marketing, Spider Trainers You want to better maintain your lists. is chosen by companies to amplify lead and demand generation while setting standards for design, You want to minimize your list attrition. development, and deployment. Our publications are designed to help you get started, and while we may be guilty of giving too much information, we know that the empowered and informed client is the successful client. We hope this white paper does that for you. We look forward to learning more about your needs. Please contact us at 651 702 3793 or [email protected] . ©2013 SPIDER TRAINERS PAGE 3 TAble Of cOnTenTS HOW TO cAPTure SubScriberS ...............................2 HOW TO uSe PAiD PrOGrAMS TO GAin Tipping point ..................................................................2 SubScriberS ...........................................................29 create e mail lists ...........................................................3 buy lists .........................................................................29 Pop-up forms .........................................................4 rent lists ........................................................................31 negative consent
    [Show full text]
  • DMARC — Defeating E-Mail Abuse
    CERT-EU Security Whitepaper 17-001 DMARC — Defeating E-Mail Abuse Christos Koutroumpas ver. 1.3 February 9, 2017 TLP: WHITE 1 Preface E-mail is one of the most valuable and broadly used means of communication and most orga- nizations strongly depend on it. The Simple Mail Transport Protocol (SMTP) – the Internet’s underlying email protocol – was adopted in the eighties and is still in use after 35 years. When it was designed, the need for security was not so obvious, and therefore security was not incor- porated in the design of this protocol. As a result, the protocol is susceptible to a wide range of attacks. Spear-phishing campaigns in particular can be more successful by spoofing (altering) the originator e-mail address to imper- sonate a trusted or trustworthy organization or person. This can lead to luring the recipient into giving away credentials or infecting his/her computer by executing malware delivered through the e-mail. While raising user awareness on how to avoid e-mail fraud is recommended, the Verizon Data Breach Investigations Report indicates that more needs to be done. The DBIR report reveals that 30% of all phishing e-mail messages were opened by the recipients and with 12% clicked on the content and executed malicious code. The median time for the first user of a phishing campaign to open the malicious email is 1 minute, 40 seconds. The median time to the first click on the attachment was 3 minutes, 45 seconds. These statistics highlight the risk for an organization on the receiving end of spear-phishing e-mails.
    [Show full text]
  • Delivering Results to the Inbox Sailthru’S 2020 Playbook on Deliverability, Why It’S Imperative and How It Drives Business Results Introduction to Deliverability
    Delivering Results to the Inbox Sailthru’s 2020 Playbook on Deliverability, Why It’s Imperative and How It Drives Business Results Introduction to Deliverability Every day, people receive more than 293 billion Deliverability is the unsung hero of email marketing, emails, a staggering number that only represents ultimately ensuring a company’s emails reach their the tip of the iceberg. Why? The actual number intended recipients. It’s determined by a host of of emails sent is closer to 5.9 quadrillion, with the factors, including the engagement of your subscribers overwhelming majority blocked outright or delivered and the quality of your lists. All together, these factors to the spam folder. result in your sender reputation score, which is used to determine how the ISPs treat your email stream. Something many people don’t realize is that to the Deliverability is also a background player, so far in the major Internet Service Providers (ISPs) — Gmail, shadows that many people don’t think about it, until Yahoo!, Hotmail, Comcast and AOL — “spam” there’s a major issue. doesn’t refer to marketing messages people may find annoying, but rather malicious email filled with That’s why Sailthru’s deliverability team created this scams and viruses. In order to protect their networks guide. Read on to learn more about how deliverability and their customers, the ISPs cast a wide net. If a works on the back-end and how it impacts revenue, message is deemed to be spam by the ISP’s filters, it’s your sender reputation and how to maintain a good dead on arrival, never to see the light of the inbox, as one, and best practices for list management, email protecting users’ inboxes is the top priority of any ISP.
    [Show full text]
  • Presentations Made by Senders
    SES ���� ��� � �� � � � � � � � ������������� DomainKeys ��������� SPF ��������������������� ���������� ����������������� ������������������������������������������������ Contents Introduction 3 Deployment: For Email Receivers 6 Audience 3 Two Sides of the Coin 6 How to Read this White Paper 3 Recording Trusted Senders Who Passed Authentication 6 A Vision for Spam-Free Email 4 Whitelisting Incoming Forwarders 6 The Problem of Abuse 4 What To Do About Forgeries 6 The Underlying Concept 4 Deployment: For ISPs and Enterprises 7 Drivers; or, Who’s Buying It 4 Complementary considerations for ISPs 7 Vision Walkthrough 5 Deployment: For MTA vendors 8 About Sender Authentication 8 Which specification? 8 An Example 8 Conformance testing 8 History 8 Perform SRS and prepend headers when forwarding 8 How IP-based Authentication Works 9 Add ESMTP support for Submitter 8 The SPF record 9 Record authentication and policy results in the headers 8 How SPF Classic Works 9 Join the developers mailing list 8 How Sender ID works 9 Deployment: For MUA vendors 9 How Cryptographic Techniques Work 0 Displaying Authentication-Results 9 Using Multiple Approaches Automatic switching to port 587 9 Reputation Systems Deployment: For ESPs 20 Deployment: For Email Senders 2 Don’t look like a phisher! 20 First, prepare. 2 Delegation 20 Audit Your Outbound Mailstreams 2 Publish Appropriately 20 Construct the record 2 Deployment: For Spammers 2 Think briefly about PRA and Mail-From contexts. 3 Two Types of Spammers 2 Test the record, part 3 Publish SPF and sign with DomainKeys. 2 Put the record in DNS 3 Stop forging random domains. 2 Test the record, part 2 4 Buy your own domains. 2 Keep Track of Violations 4 Reuse an expired domain.
    [Show full text]
  • Combatting Spam Using Mimedefang, Spamassassin and Perl
    Combating Spam Using SpamAssassin, MIMEDefang and Perl Copyright 2003 David F. Skoll Roaring Penguin Software Inc. (Booth #23) Administrivia Please turn off or silence cell phones, pagers, Blackberry devices, etc... After the tutorial, please be sure to fill out an evaluation form and return it to the USENIX folks. 2 Overview After this tutorial, you will: Understand how central mail filtering works. Know how to use MIMEDefang to filter mail. Be able to integrate SpamAssassin into your mail filter. Know how to implement mail filtering policies with MIMEDefang and Perl. Know how to fight common spammer tactics. 3 Outline Introduction to Mail Filtering Sendmail's Milter API MIMEDefang Introduction, Architecture Writing MIMEDefang Filters SpamAssassin Integration Advanced Filter Writing Fighting Common Spammer Tactics Advanced Topics Policy Suggestions 4 Assumptions I assume that you: Are familiar with Sendmail configuration. You don't need to be a sendmail.cf guru, but should know the basics. Are familiar with Perl. Again, you don't need to be able to write an AI program in a Perl one- liner, but should be able to read simple Perl scripts. Are running the latest version of Sendmail 8.12 on a modern UNIX or UNIX-like system. 5 Why Filter Mail? The old reason: to stop viruses. The new reason: to stop spam and inappropriate content. Blocking viruses is easy. Block .exe and similar files, and test against signature databases. Blocking spam is hard, but becoming increasingly important. Organizations can even face lawsuits over inappropriate content. 6 Mail filtering is required for many reasons. In addition to the reasons given on the slide, you might need to filter outgoing mail as well to prevent virus propagation, dissemination of sensitive information, etc.
    [Show full text]
  • Account Administrator's Guide
    ePrism Email Security Account Administrator’s Guide - V10.4 4225 Executive Sq, Ste 1600 Give us a call: Send us an email: For more info, visit us at: La Jolla, CA 92037-1487 1-800-782-3762 [email protected] www.edgewave.com © 2001—2016 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners. The Email Security software and its documentation are copyrighted materials. Law prohibits making unauthorized copies. No part of this software or documentation may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into another language without prior permission of EdgeWave. 10.4 Contents Chapter 1 Overview 1 Overview of Services 1 Email Filtering (EMF) 2 Archive 3 Continuity 3 Encryption 4 Data Loss Protection (DLP) 4 Personal Health Information 4 Personal Financial Information 5 Document Conventions 6 Other Conventions 6 Supported Browsers 7 Reporting Spam to EdgeWave 7 Contacting Us 7 Additional Resources 7 Chapter 2 Portal Overview 8 Navigation Tree 9 Work Area 10 Navigation Icons 10 Getting Started 11 Logging into the portal for the first time 11 Logging into the portal after registration 12 Changing Your Personal Information 12 Configuring Accounts 12 Chapter 3 EdgeWave Administrator
    [Show full text]
  • Set up Mail Server Documentation 1.0
    Set Up Mail Server Documentation 1.0 Nosy 2014 01 23 Contents 1 1 1.1......................................................1 1.2......................................................2 2 11 3 13 3.1...................................................... 13 3.2...................................................... 13 3.3...................................................... 13 4 15 5 17 5.1...................................................... 17 5.2...................................................... 17 5.3...................................................... 17 5.4...................................................... 18 6 19 6.1...................................................... 19 6.2...................................................... 28 6.3...................................................... 32 6.4 Webmail................................................. 36 6.5...................................................... 37 6.6...................................................... 38 7 39 7.1...................................................... 39 7.2 SQL.................................................... 41 8 43 8.1...................................................... 43 8.2 strategy.................................................. 43 8.3...................................................... 44 8.4...................................................... 45 8.5...................................................... 45 8.6 Telnet................................................... 46 8.7 Can postfix receive?..........................................
    [Show full text]
  • Asian Anti-Spam Guide 1
    Asian Anti-Spam Guide 1 © MediaBUZZ Pte Ltd January 2009 Asian Anti-SpamHighlights Guide 2 • Combating the latest inbound threat: Spam and dark traffic, Pg. 13 • Secure Email Policy Best Practices, Pg. 17 • The Continuous Hurdle of Spam, Pg. 29 • Asian Anti Spam Acts, Pg. 42 Contents: • Email Spam: A Rising Tide 4 • What everyone should know about spam and privacy 7 • Scary Email Issues of 2008 12 • Combating the latest inbound threat: Spam and dark 13 • Proofpoint survey viewed spam as an increasing threat 16 • Secure Email Policy Best Practices 17 • Filtering Out Spam and Scams 24 • The Resurgence of Spam 26 • 2008 Q1 Security Threat landscape 27 • The Continuous Hurdle of Spam 29 • Spam Filters are Adaptive 30 • Liberating the inbox: How to make email safe and pro- 31 ductive again • Guarantee a clear opportunity to opt out 33 • The Great Balancing Act: Juggling Collaboration and 34 Authentication in Government IT Networks • The Not So Secret Cost of Spam 35 • How to Avoid Spam 36 • How to ensure your e-mails are not classified as spam 37 • Blue Coat’s Top Security Trends for 2008 38 • The Underground Economy 40 • Losing Email is No Longer Inevitable 42 • Localized malware gains ground 44 • Cyber-crime shows no signs of abating 45 MEDIABUZZ PTE LTD • Asian Anti-Spam Acts 47 ASIAN ANTI-SPAM GUIDE © MediaBUZZ Pte Ltd January 2009 Asian Anti-SpamHighlights Guide 3 • Frost & Sullivan: Do not underestimate spam, Pg. 65 • Unifying email security is key, Pg. 71 • The many threats of network security, Pg. 76 • The UTM story, Pg.
    [Show full text]
  • Taxonomy of Email Reputation Systems (Invited Paper)
    Taxonomy of Email Reputation Systems (Invited Paper) Dmitri Alperovitch, Paul Judge, and Sven Krasser Secure Computing Corporation 4800 North Point Pkwy Suite 400 Alpharetta, GA 30022 678-969-9399 {dalperovitch, pjudge, skrasser}@securecomputing.com Abstract strong incentive for people to act maliciously without paying reputational consequences [1]. While this Today a common goal in the area of email security problem can be solved by disallowing anonymity on is to provide protection from a wide variety of threats the Internet, email reputation systems are able to by being more predictive instead of reactive and to address this problem in a much more practical fashion. identify legitimate messages in addition to illegitimate By assigning a reputation to every email entity, messages. There has been previous work in the area of reputation systems can influence agents to operate email reputation systems that can accomplish these responsibly for fear of getting a bad reputation and broader goals by collecting, analyzing, and being unable to correspond with others [2]. distributing email entities' past behavior The goal of an email reputation system is to monitor characteristics. In this paper, we provide taxonomy activity and assign a reputation to an entity based on its that examines the required properties of email past behavior. The reputation value should be able to reputation systems, identifies the range of approaches, denote different levels of trustworthiness on the and surveys previous work. spectrum from good to bad. In 2000, Resnick et al. described Internet reputation system as having three 1. Introduction required properties [3]: • Entities are long lived, As spam volumes have continued to increase with • feedback about current interactions is high rates, comprising 90% of all email by the end of captured and distributed, and 2006 as determined by Secure Computing Research, • past feedback guides buyer decisions.
    [Show full text]
  • Email Sender Authentication Development and Deployment
    EMAIL SENDER AUTHENTICATION DEVELOPMENT AND DEPLOYMENT (PROJECT CHEESEPLATE) Volume I Technical and Management Proposal pobox.com IC Group, Inc. [email protected] v1.01 20041217 Full Proposal Control Number EB8A Email Sender Authentication OFFICIAL TRANSMITTAL LETTER IC Group, Inc., a New York State corporation, doing business as pobox.com, respectfully submits a proposal in response to solicitation BAA04-17 for Cyber Security Research and Development. It is submitted under Category 3, Technical Topic Area 7, Technologies to Defend Against Identity Theft, for consideration as a Type II Prototype Technology. Solicitation Title: BAA 04-17 Topic Title: Technologies to Defend Against Identity Theft Type Title: Type II (Prototype Technologies) Full Proposal Control Number: EB8A Proposal Title: Email Sender Authentication A companion proposal, Reputation System Clearinghouse (1RGT), is also being submitted under the same category and type. We request that these two proposals be read together. This proposal should be read first. This proposal was authored by Meng Weng Wong, Founder and Chief Technology Officer for Special Projects. He can be contacted at [email protected]. Meng Weng Wong IC Group, Inc. 1100 Vine St Ste C8 Philadelphia, PA 19107 December 15th 2004 EIN: 113236046 Central Contractor Registration: 3EKUCT Email Sender Authentication 2 EXECUTIVE SUMMARY Pobox.com aims to fight phishing by adding sender authentication “Phishing” is a class of high-tech scam that functionality to the Internet email system. First we will build a library uses fraudulent e-mail to deceive consum- ers into visiting fake replicas of familiar to implement a useful set of recently devised anti-forgery specifica- Web sites and disclosing their credit card tions, including ip-based approaches such as SPF and crypto-based numbers, bank account information, Social approaches such as DomainKeys.
    [Show full text]
  • How to Make Sure Your Emails Land in Your Prospects' Inboxes
    How to Make Sure Your Emails Land in Your Prospects’ Inboxes How to Make Sure Your Emails Land in Your Prospects’ Inboxes | 1 Table of Contents Why Aren’t My Emails Getting Through? 3 Authentication 5 Permissions 7 Reputation 9 Sender Reputation 9 Cleanliness & Monitoring 10 List Source 10 New Domain Address Warming 11 Review Bounces 14 Monitoring Blacklists 15 Follow the Rules - CAN-SPAM, CASL, GDPR & CCPA 16 Engagement 17 Know Your Audience - Relevance, Frequency & Content Review 17 Unsubscribe Links 18 Conclusion 19 How to Make Sure Your Emails Land in Your Prospects’ Inboxes | 2 Why would my emails never make it to their destination? As we move further into the era of technology, email has become the primary source of professional communication. As a result, bad actors are doing whatever it takes to get you to view their emails. How many members of the Nigerian royal family have contacted you to transfer their fortune to your bank account? In response to more frequent attempts to phish, hack, and send spam, Internet Service Providers (ISPs) are doing everything they can to protect their customers from potentially unsolicited email, ! including blocking bulk email sends from new domains and internet protocol (IP) addresses. It’s important to remember that ISPs are always looking to protect their users (and investors). Because you’re sending emails to reach out to your prospects, these new measures have a direct impact on your ability to have your legitimate emails delivered to the inbox. How to Make Sure Your Emails Land in Your Prospects’ Inboxes | 3 Ultimately it is the practices of your company, and your engagement strategy, that determines whether or not your messages get through.
    [Show full text]
  • WHITE PAPER Email Deliverability Review
    WHITE PAPER Email DELIVeraBility REView dmawe are the White Paper Email Deliverability Review Published by Deliverability Hub of the Email Marketing Council Sponsored by 1 COPYRIGHT: THE DIRECT MARKETING ASSOCIATION (UK) LTD 2012 WHITE PAPER Email DELIVeraBility REView Contents About this document ...............................................................................................................................3 About the authors ...................................................................................................................................4 Sponsor’s perspective .............................................................................................................................5 Executive summary .................................................................................................................................6 1. Major factors that impact on deliverability ..............................................................................................7 1.1 Sender reputation .............................................................................................................................7 1.2 Spam filtering ...................................................................................................................................7 1.3 Blacklist operators ............................................................................................................................8 1.4 Smart Inboxes ..................................................................................................................................9
    [Show full text]