Global-Scale Anti-Spam Testing in Your Own Back Yard
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Técnicas E Ferramentas De Código Aberto Para Combate Ao Spam
UNIVERSIDADE DE CAXIAS DO SUL DEPARTAMENTO DE INFORMATICA´ CURSO DE BACHARELADO EM CIENCIAˆ DA COMPUTAC¸ AO˜ T´ecnicase Ferramentas de C´odigo Aberto Para Combate ao Spam por JERONIMO CLEBERSON ZUCCO Projeto de Diploma¸c˜ao Prof. Ms. Edgar Athayde Meneghetti Orientador Caxias do Sul, julho de 2005. 2 “I’m doing a (free) operating system (just a hobby, won’t be big and professional like gnu) for 386(486) AT clones.” — Linus Benedict Torvalds, when he launched Linux 3 Agradecimentos Agrade¸coa minha fam´ılia,minha m˜aeRosa e minha irm˜aFabiana, que tanto insistiram e incentivaram para a minha conclus˜aodo curso. Agrade¸cotamb´emao meu falecido pai, por ter me dado condi¸c˜oesde estudo que me trouxeram at´eaqui. A Elisˆangela,pelo seu afeto e carinho, al´emde sua compreens˜aoquando tive que ficar afastado para a realiza¸c˜aodo trabalho. Ao meu orientador Edgar Meneghetti, que sempre demonstrou confian¸cana minha capacidade e me ajudou em algumas decis˜oescruciais para realiza¸c˜aodo trabalho. Agrade¸cotamb´emao meu amigo Delcino Picinin pela sua grande ajuda no caminho das pedras do mundo LATEX. Aos professores do Departamento de Inform´aticada UCS, em especial Ricardo Dornelles, Vanius Gava, Andr´eMartinotto, Heitor Strogulsky e Alex Pellin, pelos ensinamentos e apoio sempre quando precisei. Ao amigo Fernando Reginatto, que me ajudou na corre¸c˜aodo trabalho. Aos meus colegas de trabalho e amigos, que de uma forma ou outra me ajudaram e fazem parte da minha vida. Agrade¸cotamb´em`atodos os desenvolvedores de software livre, que com prazer realizam o seu trabalho e compartilham o seu conhecimento, dando oportunidade `a pessoas como eu de encontrar a sua voca¸c˜ao. -
Firewalling with Openbsd's PF Packet Filter
Firewalling with OpenBSD’s PF packet filter Peter N. M. Hansteen [email protected] Copyright © 2005 - 2012 Peter N. M. Hansteen This document is © Copyright 2005 - 2012, Peter N. M. Hansteen. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The document is a ’work in progress’, based on a manuscript prepared for a lecture at the BLUG (see http://www.blug.linux.no/) meeting of January 27th, 2005. Along the way it has spawned several conference tutorials as well as The Book of PF (http://nostarch.com/pf2.htm) (second edition, No Starch Press November 2010), which expands on all topics mentioned in this document presents several topics that are only hinted at here. -
The Book of PF Is the PETER N.M
With a foreword by BUILDBUILD THETHE BOB BECK, NETWORKNETWORK YOUYOU Director of NEEDNEED WITHWITH PFPF the OpenBSD Foundation THETHE BOOKBOOK THE BOOK OF PF OF THE BOOK THE BOOK OF PF OF THE BOOK OpenBSD’s stateful packet filter, PF, offers an amazing • Use PF to create a wireless access point, and lock it OFOF PFPF feature set and support across the major BSD platforms. down tight with authpf and special access restrictions A NO-NONSENSE GUIDE TO THE Like most firewall software though, unlocking PF’s full • Maximize availability by using redirection rules for potential takes a good teacher. OPENBSD FIREWALL load balancing and CARP for failover Peter N.M. Hansteen’s PF website and conference • Use tables for proactive defense against would-be tutorials have helped thousands of users build the attackers and spammers networks they need using PF. The Book of PF is the PETER N.M. HANSTEEN product of Hansteen’s knowledge and experience, • Set up queues and traffic shaping with ALTQ, so your teaching good practices as well as bare facts and network stays responsive software options. Throughout the book, Hansteen • Master your logs with monitoring and visualization, emphasizes the importance of staying in control by because you can never be too paranoid having a written network specification, using macros to make rule sets more readable, and performing rigid The Book of PF is written for BSD enthusiasts and network testing when loading in new rules. admins at any level of expertise. With more and more services placing high demands on bandwidth and Today’s system administrators face increasing challenges increasing hostility coming from the Internet at large, you in the quest for network quality, and The Book of PF can can never be too skilled with PF. -
The Silent Network: Denying the Spam and Malware Chatter
The silent network Denying the spam and malware chatter using free tools Peter N. M. Hansteen [email protected] According to statements by a certain proprietary software marketer, the spam and malware problem should have been solved by now. That company isn’t even close, but in the free software world we are getting there fast and having fun at the same time. This paper offers an overview of principles and tools with real life examples and data, and covers the almost-parallel evolution of malware and spam and effective counter-measures. We present recent empirical data interspersed with examples of practical approaches to ensuring a productive, malware and spam free environment for your colleagues and yourself, using free tools. The evolution of content scanning is described and contrasted with other methods based on miscreants’ (and their robot helpers’) behavior, concluding with a discussing of recent advances in greylisting and greytrapping with an emphasis on those methods’ relatively modest resource demands. Copyright © 2006-2007 by Peter N. M. Hansteen This document is Copyright © 2006-2007 Peter N. M. Hansteen. All rights reserved. Paper presented at the BSDCan conference in Ottawa, Ontario, Canada on May 18, 2007. Table of Contents Malware, virus, spam - some definitions ..........................................................................1 A history of malware .............................................................................................................2 The first virus: the Elk Cloner .........................................................................................2 -
Personenverzeichnis
Personenverzeichnis Adelstein, T. 1101 Comer, D. E. 1102 Aho, A. V. 33 Conner-Sax, K. 1103 Albitz, P. 1103 Cooper, M. 46 Alkalay, A. 177 Cutler, E. 1102 Allaert, D. 422 Czyborra, R. 177 Almesberger, W. 477 Anderson, G. 30 Dalheimer, M. K. 1100, 1102 Andreasson, O. 764 Dalheimer, T. 1102 Anvin, H. P. 493 Dawson, T. 237, 1102, 1103 Arcomano, R. 308 Delorie, D. J. 451 Aubepin, F. 1100 Deutz, R. 1103 Aznar, G. 418, 797 Dietz, H. 895 Diffie, B. W. 270 Bach, M. J. 1100 Drake, J. 741 Bacon, J. 1101 Badach, A. 1103 Ebersbach, A. 1103 Barrett, D. J. 1104 Emery, V. 578 Barth, W. 1101 Ewing, L. 9, 10 Bauer, F. L. 586, 1104 Bautts, T. 1102 Fawcett, T. 496 Bayes, T. 817 Fenzi, K. 899 Bic, L. 1099 Frisch, Æ. 1101 Bigelow, C. 189 Bishop, A. M. 574 Garfinkel, S. 1100, 1104 Blaze, M. 582 Garrels, M. 46, 59, 1100 Bolsky, M. I. 1100 Ghosh, S. 304 Bourne, S. R. 33, 46, 1100 Goerzen, J. 290 Bovet, D. P. 679, 1100 Gortmaker, P. 722 Bradley, D. J. 36 Grägert, S. 1103 Brouwer, A. 387 Graham, P. 817 Brown, M. A. 238 Guérard, J.-P. 290 Burgiss, H. 223 Gulbins, J. 1100 Burrows, D. 644 Hahn, H. 1103 Buytaert, K. 890 Haible, B. 177 Cameron, J. 883, 1101 Hall, E. 1103 Card, R. 565 Hammers, C. 456, 900 Cesati, M. 679, 1100 Hards, B. 589 Christenson, N. 404 Hassell, J. 1101 Chuvakin, A. 867 Hattenhauer, R. 1100 Claus, V. 1099 Hazel, P. 802 1106 PERSONENVERZEICHNIS Heinlein, P. -
Hosting BSD L Cloud Computing L Open BSD, Netbsd and Freebsd As File Sharing Servers - Part2
Editor in Chief: Olga Kartseva Dear Readers! [email protected] Contributing: BSD is already becoming international magazine. People Jan Stedehouder, Rob Somerville, Marko Milenovic, Petr all over the world have an access to our magazine and Topiarz, Paul McMath, Eric Vintimilla, Matthias Pfeifer, Theodore Tereshchenko, Mikel King, Machtelt Garrels, Jesse Smith download it. We are happy that our work is so appreciated and BSD magazine popularity is growing!. Special thanks to: Marko Milenovic, Worth Bishop and Mike Bybee Art Director: First of all I wanted to thank you for you letters of Agnieszka Marchocka support, they mean really a lot to us and help constantly DTP: to improve! All our authors worked hard to make their Ireneusz Pogroszewski articles interesting and useful. I really hope you will like this issue as much as the previous. Senior Consultant/Publisher: Paweł Marciniak [email protected] This month topic is “BSD as a desktop”. Why this National Sales Manager: Ewa Łozowicka topic? [email protected] We thought that some of you still might have doubts Marketing Director: Ewa Łozowicka on choosing OS, so this issue surely will help you to [email protected] learn more about BSD as a desktop and help to make a decision. Executive Ad Consultant: Karolina Lesińska [email protected] But those of you who already use BSD should not Advertising Sales: close the magazine after reading my previous statement, Olga Kartseva because you could loose a lot. =) [email protected] Publisher : Software Press Sp. z o.o. SK Please feel free to contact us, we are open to critics, ul. -
Firewall Builder 5 User's Guide Firewall Builder 5 User's Guide $Id$ Copyright © 2003-2011 Netcitadel, LLC
Firewall Builder 5 User's Guide Firewall Builder 5 User's Guide $Id$ Copyright © 2003-2011 NetCitadel, LLC The information in this manual is subject to change without notice and should not be construed as a commitment by NetCitadel LLC. NetCitadel LLC assumes no responsibility or liability for any errors or inaccuracies that may appear in this manual. 1. Introduction ................................................................................................................... 1 1.1. Introducing Firewall Builder ................................................................................... 1 1.2. Overview of Firewall Builder Features ..................................................................... 1 2. Installing Firewall Builder ................................................................................................ 4 2.1. RPM-Based Distributions (Red Hat, Fedora, OpenSUSE, and Others) ............................. 4 2.2. Ubuntu Installation ............................................................................................... 4 2.3. Installing FreeBSD and OpenBSD Ports ................................................................... 5 2.4. Windows Installation ............................................................................................ 5 2.5. Mac OS X Installation .......................................................................................... 5 2.6. Compiling from Source ......................................................................................... 5 3. Definitions -
The Book of Pf
THE BOOK OF PF A No-Nonsense Guide to the OpenBSD Firewall by Peter N.M. Hansteen ® San Francisco THE BOOK OF PF. Copyright © 2008 by Peter N.M. Hansteen. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed on recycled paper in the United States of America 11 10 09 08 07 1 2 3 4 5 6 7 8 9 ISBN-10: 1-59327-165-4 ISBN-13: 978-1-59327-165-7 Publisher: William Pollock Production Editor: Megan Dunchak Cover and Interior Design: Octopod Studios Developmental Editor: Adam Wright Technical Reviewer: Henning Brauer Copyeditor: Linda Recktenwald Compositor: Riley Hoffman Proofreader: Alina Kirsanova Indexers: Karin Arrigoni and Peter N.M. Hansteen For information on book distributors or translations, please contact No Starch Press, Inc. directly: No Starch Press, Inc. 555 De Haro Street, Suite 250, San Francisco, CA 94107 phone: 415.863.9900; fax: 415.863.9950; [email protected]; www.nostarch.com Library of Congress Cataloging-in-Publication Data Hansteen, Peter N. M. The book of PF : a no-nonsense guide to the OpenBSD firewall / Peter N.M. Hansteen. p. cm. Includes index. ISBN-13: 978-1-59327-165-7 ISBN-10: 1-59327-165-4 1. OpenBSD (Electronic resource) 2. TCP/IP (Computer network protocol) 3. Firewalls (Computer security) I. Title. TK5105.585.H385 2008 005.8--dc22 2007042929 No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. -
Diplomarbeit Penetrating Bayesian Spam Filters Using Redundancy in Natural Language
Die approbierte Originalversion dieser Diplom-/Masterarbeit ist an der Hauptbibliothek der Technischen Universität Wien aufgestellt (http://www.ub.tuwien.ac.at). The approved original version of this diploma or master thesis is available at the main library of the Vienna University of Technology (http://www.ub.tuwien.ac.at/englweb/). Diplomarbeit Penetrating Bayesian Spam Filters Using Redundancy in Natural Language Ausgefuhrt¨ am Institut fur¨ Rechnergestutzte¨ Automation Arbeitsgruppe Automatisierungssysteme der Technischen Universitat¨ Wien unter der Anleitung von Ao.Univ.Prof. Dipl.-Ing. Dr.techn. Wolfgang Kastner und Privatdozent Dipl.-Ing. Dr.techn. Christopher Krugel¨ und Privatdozent Dipl.-Ing. Dr.techn. Engin Kirda als verantwortlich mitwirkenden Universitatsassistenten¨ durch Gunther¨ Bayler Am Wiesenweg 17 2403 Scharndorf 16. Oktober 2007 ii Abstract Today’s attacks against Bayesian spam filters attempt to keep the content of spam emails visible to humans, but obscured to filters, or they attempt to fool the filters with additional good words appended to the spam. Another conceivable approach is to substitute suspicious words in spam emails with innocent words to make them appear as legitimate emails (i.e., ham emails). A precondition for the success of such an attack is that Bayesian spam filters of different users assign similar spam probabilities to similar tokens. In this thesis, it is examined whether this precondition is met; afterwards, the effectivity of a substitution attack is measured by creating a test set of spam messages -
Filtres Anti-Virus/Anti-SPAM Pour Sendmail
Filtres Anti-virus/Anti-SPAM pour Sendmail Matthieu Herrb 27 mars 2003 Geret Strasbourg { 28/03/2003 Introduction Geret Strasbourg { 28/03/2003 1 L'internet qui n'est plus ce qu'il ´etait... Cons´equences pour la messagerie : { virus, vers,. { spam, pollupostage,. Les solutions au niveau utilisateur(s) ne sont pas suffisantes. = filtrage au niveau du transport ) Geret Strasbourg { 28/03/2003 2 Anti-virus Approches : { par signature : ce que font les anti-virus traditionnels Probl`emes : < fen^etre de vuln´erabilit´e > entre l'apparition d'un nouveau virus et la mise `a jour des anti-virus. fausses alertes de plus en plus nombreuses (statistiquement in´evitable). co^ut des solutions les plus performantes { plus simple : bloquer l'ex´ecution des contenus potentiellement dangereux. capable de bloquer de nouveaux vers/virus pas de faux positifs (par d´efinition). probl`emes : liste exhaustive des types MIME ex´ecutables ? comment ´echanger des ex´ecutables l´egitimes ? Geret Strasbourg { 28/03/2003 3 Sur les contenus ex´ecutables Probl`eme beaucoup plus vaste que la messagerie C'est une technologie en plein boum : web services, mises `a jour automatiques d'OS ou de logiciels, . Probl`eme de s´ecurit´e majeur : vecteurs de diffusion de virus/chevaux de troie id´eal (plus besoin de d´ebordement de buffer pour ex´ecuter du code malicieux Les < bacs `a sable > (Java, .NET, . .) n'arrivent pas `a^etre imperm´eables La signature num´erique des contenus ex´ecutables est mal partie Palladium / TCPA / Liberty Alliance ? ? Geret Strasbourg { 28/03/2003 4 Retour `ala messagerie - le spam SPAM = Messages ´electroniques non sollicit´es. -
Book of PF : a No-Nonsense Guide to the Openbsd Firewall (3Rd Edition)
EDITION3RD BUILD A Covers OpenBSD 5.6, MORE SECURE FreeBSD 10.x, and NETWORK EDITION NETWORK 3RD NetBSD 6.x WITH PF THETHE BOOKBOOK THE BOOK OF PF OF THE BOOK THE BOOK OF PF OF THE BOOK OFOF PFPF OpenBSD’s stateful packet filter, PF, is the heart of • Build adaptive firewalls to proactively defend against A GUIDE TO THE the OpenBSD firewall. With more and more services attackers and spammers NO-NONSENSE placing high demands on bandwidth and an increas- OPENBSD FIREWALL • Harness OpenBSD’s latest traffic-shaping system ingly hostile Internet environment, no sysadmin can to keep your network responsive, and convert your afford to be without PF expertise. existing ALTQ configurations to the new system The third edition of The Book of PF covers the most • Stay in control of your traffic with monitoring and up-to-date developments in PF, including new content PETER N.M. HANSTEEN visualization tools (including NetFlow) on IPv6, dual stack configurations, the “queues and priorities” traffic-shaping system, NAT and redirection, The Book of PF is the essential guide to building a secure wireless networking, spam fighting, failover provision- network with PF. With a little effort and this book, you’ll ing, logging, and more. be well prepared to unlock PF’s full potential. You’ll also learn how to: ABOUT THE AUTHOR • Create rule sets for all kinds of network traffic, whether Peter N.M. Hansteen is a consultant, writer, and crossing a simple LAN, hiding behind NAT, traversing sysadmin based in Bergen, Norway. A longtime DMZs, or spanning bridges or wider networks Freenix advocate, Hansteen is a frequent lecturer on OpenBSD and FreeBSD topics, an occasional • Set up wireless networks with access points, and contributor to BSD Magazine, and the author of an lock them down using authpf and special access often-slashdotted blog (http://bsdly.blogspot.com/ ).