Get that spammer!

A tool for tracking down junk e-mailers, junk news posters and their internet service providers.

Keywords: net abuse, junk email, spam, emp, excessive multi posting, velveeta, ecp, excessive cross posting, ube, unsolicited bulk email, udp, usenet death penalty, aup, acceptable use policy, tos, terms of service, t&c, terms & conditions
Original: http://kryten.eng.monash.edu.au/gspam.html
Feedback: Julian.Byrne@eng.monash.edu.au (NO JUNK EMAIL)

Introduction, Tools, ISP's, Links, Instructions, Suggestions, Why?, How to advertise, Complaint, Articles


Tools

Do on 
Fast tools page, Other web TRACEROUTE's, Other WHOIS servers, DIG list hosts in domain & RFC's
<Home>

Internet Service Providers - Does Your Acceptable Use Policy:

A good AUP saves you time and aggravation. For details see an informative article by Chris Lewis.
For examples see Concentric's, MCI's and others.

Other things an ISP can do

<Home>

Links

<Home>

Instructions

    Step one is to look at all the headers of the message. News/email readers normally show only a subset of the available headers to avoid screen clutter. Select the option that makes the hidden headers visible. In Netscape select Options/Show all headers, in MSWIN Pegasus press ^H, in Pine press H, in VM press t and in NewsExpress select File/ Options/ Compose/ Include Headers. Other news/email readers have similar options.

    Important headers are:

    All contain a network host name that may give you a clue as to who the spammer is. However, any or all of them may be faked. It is common for spammers to send email from a throwaway account at one site and solicit replies at other sites, so you may need to track down two or more network locations. Make a list of all host names mentioned in the headers and in the body of the message. These are the parts to the right of the @ sign in email addresses, between // and / in web links, in the last Received: header and at the right end of the Path: between !'s.

    Path: gives the list of hosts a news item passed through, from the poster's site at the right end to get to your site at the left end. One or more entries on the right end may be faked so you may need to cooperate with others to track down which host in the Path: list the message was injected at.

    Like the Path: header Received: headers are a list of sites the message passed through in reverse order but with only one host name per header. Again, the bottom entries (earlier timewise) in the Received: list may be faked. It is also possible for spammers to relay email via a third party so that the Received: header before your site's Received: headers may be a victim too. They're slack though as they should've configured their mail servers not to relay third party email. Some spammers also pretend to be innocent relay sites by forging additional Received: headers and lying in response to complaints; complain to the so-called `relay' site's ISP if you suspect this is the case.

    Since intermediate sites always prepend headers then those higher in the list are much less likely to be forged than those further down. See how to interpret Received: headers for more information.

    Even with normal, non-faked operation not all hosts or network routers a message passes through are recorded in the Path: or Received: headers. Use TRACEROUTE (described below) to get a more complete list.

    Host names usually have machine name and domain name parts. For example kryten.eng.monash.edu.au has a machine name of kryten and domain name of eng.monash.edu.au (engineering faculty, monash university, education sector, australia) with larger domains monash.edu.au, edu.au and au. Look at your list of host names and see if you can add some local domain names to the list by stripping machine names from host names. This is a trial and error procedure and may not always give a valid result.

    Some of the host/domain names you've discovered may actually be a numerical network IP address eg. kryten's is 130.194.140.2. Use DIG ipaddress->hostname to find a host name given an IP address and use DIG hostname->ipaddress to find an IP address given a host name. Add any new host/domain names discovered to your list. IP addresses can have zero, one or several host names. Host names can have zero, one or several IP addresses.

    Some hosts and domains designate one or more hosts to handle any email directed to them. Use DIG hostname->mailexchanger to find out if there are any such hosts.

    DIG queries domain name servers for information about the host/domain names you've found. It gives a mess of information, most of which you can ignore. You're not normally interested in addresses associated with the site where DIG was run (in this case ?.monash.edu.au and 130.194.?.?) and you're also not interested in the NS and other records of the name servers that supplied the information, just the info related to the host/domain you queried. This is in the ;; ANSWERS: section and is the A internet IP address records, the MX mail exchanger records and the PTR pointer to host name records. If they don't exist then the ;; ANSWERS: section will be empty or non-existent. The ;; AUTHORITY RECORDS: and ;; ADDITIONAL RECORDS: sections tell you what domain name server[s] are responsible for the part of the domain name system (DNS) you have queried.

    Any email sent to the queried host/domain will initially go via one of the hosts given by the MX records if they exist, otherwise it will go to the host given by the A record. If there are no MX and no A records then email will normally bounce. The MX and A host names may be in completely different domains. Add any new domains to your list.

    If an IP address has no corresponding hostname the SOA `start of authority' record can be used to see which hosts/domains are responsible for that part of the net. Internic.net is responsible for unallocated addresses so if you get this it usually means the queried IP address is faked or in error. If there is no SOA record try doing a DIG ipaddress->hostname on another IP address which is in the same subnet as the one you're interested in ie. vary the last number from 1 to 254. eg. For 130.194.140.37 you might try 130.194.140.66. Some machines are configured by accident or by design to not reveal who is responsible for them. Alternatively, look for the owner of the subnet by stripping off one or more right elements (eg. 130.194.140.2 -> 130.194.140 -> 130.194 -> 130).

    Use WHOIS to find the administrative and technical contacts for the hosts/domains/ip address ranges you've discovered. This will give more contact information including email addresses. If there is more than one WHOIS entry for the domain you've entered you'll get a list of abbreviated entries. To get full information use an entry's key as a query string (eg. mci.net gives keys MCI8-HST and MCI2-DOM). Add the host/domain names of the email addresses to your list. You may need to strip off one more left elements of each domain before you get a domain that WHOIS knows about (eg. eng.monash.edu.au -> monash.edu.au -> edu.au -> au). Similarly, you may need to strip off one or more right elements of each IP address range before you get an IP address range that WHOIS knows about (eg. 130.194.140.2 -> 130.194.140 -> 130.194 -> 130). WHOIS also knows about company names and some user names. This WHOIS covers US non-military domains only. For other domains see other WHOIS servers.

    Use TRACEROUTE to get a list of sites handling messages between this web server host and each of the host/domain's. This can take several minutes. Ideally it should be from your mail host but this should do. Alternatively, if you're running MSWindows 95 it comes with a TRACEROUTE; run TRACERT in an MSDOS window. The last entry in the TRACEROUTE results list should be the host/domain you're querying. The next-to-last should be the Internet Service Provider (ISP) for your queried host/domain. The next-to-last for that ISP is their ISP and so on. More than one host at the end of the list may be owned by the spammer and so you need to use some judgement as to whether, when you send email to one of the hosts, you're talking to the spammer or their ISP. Add the hosts at the end of the list together with their domains to your host/domain list. This TRACEROUTE will have trouble if the test link is heavily loaded (likely during Australian working hours). If so you could try other web TRACEROUTE's.

    It is possible but rare for a spammer to forge the response to a TRACEROUTE so that sites later in the list may be deceptive. If you suspect this is the case you will need to complain to all the upstream ISP's as only they can determine where the forgery starts.

    Use a web search engine to look for references to the domain names you've found. Look for `domain' and `www.domain' Virtually all ISP's have web sites like this and you can use the web pages to get some idea of whether it's actually the spammer or the ISP, together with the size, contact addresses and the email/news policy of the ISP. In addition if it's a .net domain try a .com domain and vice-versa; many companies use both. Be careful though as there are also many completely unrelated companies using domain names differing only in the .net and .com ending. You can check by looking at the WHOIS contact information and the IP addresses.

    You can also use a general web search engine to find out other information about the spammer.

    You should now have a list of hosts and domains with a fair idea of the spammer's addresses and their ISP's addresses. Send an email to the spammer's ISP (this may or may not have the same domain name as the spammer themselves) using the abuse@ address and a copy to the spammer themselves. Be polite. You want results don't you? In the message include a copy of the spam with full headers, detail the reasons why you find the spam unacceptable, tell them about the Net Abuse FAQ and the Advertising FAQ and request that they not do it again. A sample is appended but use your own words if you can so that they know this is you saying it and not some form letter. If abuse@ bounces send the message to admin@, root@ or postmaster@ and additionally ask them to configure an abuse@ address which forwards to their person responsible for handling net abuse. If the email addresses aren't working you could try a fax gateway or check out the email search FAQ.

    Large ISP's will generally not reply to you because they're too busy but if they receive enough complaints (and with full on spammers they usually do) it is likely the spammer will be dealt with. Most ISP's are good net citizens because it's in their own interest to maintain a good reputation. If you see the spam again send another message but this time post a copy of the spam with full headers to the news.admin.net-abuse.sightings newsgroup and let the experts have a go. You may also want to email the ISP of the ISP. You should read the news.admin.net-abuse.* newsgroups for week or two to get a feel for how spammers operate and are dealt with. Be warned that these newsgroups include plenty of argumentative and intentionally deceptive and disruptive posts from spam supporters in addition to posts from people trying to reduce spam.

Thats it! Look at the links list and articles list for further information on handling net abuse.

If the above procedure doesn't handle junk email/usenet postings to your satisfaction you may want to set up a filter to delete email/news items at your site before you see them. Not terribly effective generally unless you're willing to bounce every unauthorised address but it works for some persistent spammers. For reading news items look for a feature called kill-files. Not all news readers have them though. For reading email look at the filtering features your email program possesses or get an email filtering program which deletes email items before the email reader program sees them. Talk to your system administrator or ISP too; they may have some ideas specific to your site.

A final warning: Any message on the internet which doesn't use strong encryption/authentication techniques like PGP can be completely fake. Occasionally enemies on the net attack each other by tricking a third party into doing their dirty work for them. Treat any address you get with suspicion until proven otherwise.

<Home>

Suggestions

<Home>

Why the fuss?

Nobody wants to open their email in the morning and find one personal message, two bills and a thousand pieces of unsolicited junk. Or to open their favourite news group and find ten relevant items and a thousand spams.

When any of tens of thousands of small businesses and other special interest groups can send tens of thousands of email messages or news postings per day for peanuts, when they need to do it because their competitor is already doing so and when they are allowed to do it the above scenarios are only a matter of time.

There are already reports of individuals in the US receiving more than one hundred unsolicited junk email messages per day. Some useful alt.* newsgroups have become completely unreadable because of hundreds of irrelevant crossposted news items per day.

The drop in cost effectiveness with increased advertising is lower on the net. The marginal cost of running an email address grabbing and spamming program overnight while a net account would otherwise be idle is almost nil. Posting a duplicate news item to multiple newsgroups is trivial. A business can afford to waste hundreds of thousands of people's time for only minor profit to themselves and still come out ahead. Only if there are other constraints (eg. an ISP volume charging or terminating their access) will this one-sided tradeoff change.

If you post news items infrequently, your email address isn't on a publicly accessible web page and you don't often web surf commercial sites you may only have received a few junk email messages. Don't be fooled. Hundred thousand email address lists are already in wide circulation and when your email address gets on one as the result of web surfing the wrong site, paying a bill or making a sales query you will find it very hard to get off.

Incidently, if you want to do mass unsolicited junk email think about this: Most junk emailers only do it once. Creating thousands of angry instant enemies isn't a smart way to run a business. Unprofitable too.

<Home>

How to advertise

If you want to do a broadcast do it using the broadcast protocol provided: news. If you want to do a point to point message use the point to point protocol provided: email. Anything else is abuse of other people's net resources. If you want to do a broadcast address it correctly with the facilities provided: newsgroups and subject headings. Again, anything else is abuse of net resources. Unnecessary repetition is also an abuse of net resources.

So, the appropriate place for a commercial message is a single on topic post with a meaningful subject heading in one of the biz.marketplace.*, comp.newprod (moderated) or clari.biz.products newsgroups. For obvious reasons people rarely read these. This is the balance between commercial advertisers and other people's rights though.

So you're left with web pages and news signature advertising. The former is okay because only those people interested in a topic will go looking for them and other people's net resources are not unnecessarily wasted. The later is okay because you will have contributed something back to other newsgroup participants with the posting itself, paying for the general reduction in utility of the news caused by your small signature ad. If not then it is also abuse of net resources.

Note: I'm using the term net resources in the more general sense of not only bandwidth and disk space but also of the general utility to the people participating. The general utility of the net and it's facilities is reduced by every off topic post, useless email message or deceptive web page. Incrementally each loss is small but the total loss is massive and that is why so many people are willing to spend time fighting this scourge.

The best way to advertise on the net is to give away value so that people will want to visit you and also to pay for your use of other people's net resources. You can create value in small ways by competitions, games, prizes and freebies. The expected return on these things to the participants is usually terrible though. It's better to create value in a larger way by sponsoring `good works'. The advertisers on the search engines, NetScape and Id software have all done very well using this approach. On a smaller scale sponsoring a useful FAQ, piece of software, moderated news group, community service web site, entertainment web site or industry service web site are good approaches. If this is done in an innovative way it can be a very effective. Like everything else in life though remember that you don't get something for nothing; make sure it really is a useful/interesting resource and not just a deceptive advertising ploy likely to turn off a very advertising aware population. Once you have a useful resource you can legitimately announce it in the relevant newsgroups and in non-net advertising and build up a client base via sponsor advertising in the resource. Everybody wins. This is the right way.

Net marketing links.
<Home>

Complaint example

From: Julian.Byrne@eng.monash.edu.au (NO JUNK EMAIL)
To: xxx
Subject: UBE COMPLAINT
Date: Wed, 15 Oct 97 09:46:45 AEST

Could you please deal with the appended unsolicited bulk email (UBE).
Thanks. Keep in mind that:

- Spammers steal at least $1000 from the net community every time they spam.
  (1c/recipient, 100000 recipients, other costs ignored)

- Theft doesn't scale.  The numbers show that any solution that legitimizes
  opt out can't work.  (tagging, making forgery illegal, `remove lists' etc.)
  <http://kryten.eng.monash.edu.au/articles/ube_numbers.txt>

- Already the news system is 70% spam+cancels and the email system is
  40% spam+complaints.

- Spam will always be junk because there is no financial incentive to target.
  The whole point is big numbers, small response, others pay.

- Property rights outweigh free speech rights.  Several US judges have said so.
  <http://kryten.eng.monash.edu.au/articles/free_speech_judgements.txt>

- It's not inevitable.  When was the last time you saw a door-to-door
  salesman or junk fax?  Support the Smith amendment: <http://www.cauce.org/>

- Politicians act on the votes, whether informed or uninformed.  Make sure
  your customers, colleagues and the press are informed.

- The only technical solution likely to work long term is a whitelist.
  <http://kryten.eng.monash.edu.au/articles/why_filtering_wont_work_long_term.txt>

- Are you being forged?  Don't allow the spammer to give your company a bad
  name and to waste your time with the resulting complaints.
  <http://www.jmls.edu/cyber/cases/spam.html>

- Being relayed through? Configure your mail servers to stop relaying.
  <http://kryten.eng.monash.edu.au/stop_relay.html>

Many thanks for all your efforts,

Julian Byrne <Julian.Byrne@eng.monash.edu.au> (NO JUNK EMAIL)

Anti-spam tips: http://kryten.eng.monash.edu.au/gspam.html

------- start of forwarded message (RFC 934 encapsulation) -------
...
<Home>

Julian.Byrne@eng.monash.edu.au (NO JUNK EMAIL)Last modified: Tue Aug 11 17:31:32 AEST 1998 
Copyright © 1997 Julian Byrne [Monash University Disclaimer]