Difference between revisions of "Callbacks"

From ASRG
Jump to navigationJump to search
m (callout -> callback)
 
Line 7: Line 7:
 
|where=MTA
 
|where=MTA
 
}}
 
}}
 +
 +
''(Also known as Callouts)''
  
 
During an SMTP transaction, following MAIL FROM and at least one RCPT TO from the client, the SMTP server opens a connection to the host name in the MAIL FROM address and uses the RCPT TO value in a MAIL FROM commands, and the MAIL FROM value in a RCPT TO command, in an attempt to see if the client system is an SMTP server and accepts mail for that address.
 
During an SMTP transaction, following MAIL FROM and at least one RCPT TO from the client, the SMTP server opens a connection to the host name in the MAIL FROM address and uses the RCPT TO value in a MAIL FROM commands, and the MAIL FROM value in a RCPT TO command, in an attempt to see if the client system is an SMTP server and accepts mail for that address.
  
 
This is a deceptively attractive approach, since it appears to validate the client system as a proper server.  However, it quickly runs into numerous problems.  The most severe is that if both systems try this, they both deadlock and mail cannot be exchanged.
 
This is a deceptively attractive approach, since it appears to validate the client system as a proper server.  However, it quickly runs into numerous problems.  The most severe is that if both systems try this, they both deadlock and mail cannot be exchanged.
The usual way to avoid this is to do the callout as a fake bounce with a <> null sender address.
+
The usual way to avoid this is to do the callback as a fake bounce with a <> null sender address.
  
The most obvious problem is that it doesn't work to verify addresses. There's lots of reasons why the naively implemented checks that callouts use can succeed for a non-existent address or fail for a good address. Some mail systems accept all addresses at the RCPT TO, and reject the bad ones at the DATA command, giving the callout system the mistaken impression that bad addresses are good. Conversely, systems that implement techniques against spam blowback (bounces from spam forging their addresses) can often reject callouts because they look just like blowback, giving the callout system the mistaken impression that good addresses are bad.
+
The most obvious problem is that it doesn't work to verify addresses. There's lots of reasons why the naively implemented checks that callbacks use can succeed for a non-existent address or fail for a good address. Some mail systems accept all addresses at the RCPT TO, and reject the bad ones at the DATA command, giving the callback system the mistaken impression that bad addresses are good. Conversely, systems that implement techniques against spam blowback (bounces from spam forging their addresses) can often reject callbacks because they look just like blowback, giving the callback system the mistaken impression that good addresses are bad.
  
 
Even when it works, address verification is not an effective spam filter. These days most spam uses other people's real addresses taken from the spam target lists, so all you're verifying is that they stole someone's address.
 
Even when it works, address verification is not an effective spam filter. These days most spam uses other people's real addresses taken from the spam target lists, so all you're verifying is that they stole someone's address.
  
Callouts are abusive. Since upwards of 90% of mail is spam with forged addresses, 90% of your callouts are to people who never sent you mail or otherwise bothered you.
+
Callbacks are abusive. Since upwards of 90% of mail is spam with forged addresses, 90% of your callbacks are to people who never sent you mail or otherwise bothered you.
  
Callouts are likely to get you blacklisted, since the behavior of callouts is indistinguishable from spammers trying to to do bulk listwashing of bad addresses.
+
Callbacks are likely to get you blacklisted, since the behavior of callbacks is indistinguishable from spammers trying to to do bulk listwashing of bad addresses.
  
Callouts are discredited. Every large ISP that used to do callouts, most notably Verizon, found it was counterproductive and stopped.
+
Callbacks are discredited. Every large ISP that used to do callbacks, most notably Verizon, found it was counterproductive and stopped.

Latest revision as of 14:57, 12 August 2008

Anti-spam technique: Callbacks
Date of first use: early 2000s
Effectiveness: Low
Popularity: Low
Difficulty of implementation: Low
Where implemented: MTA
Harm: High


(Also known as Callouts)

During an SMTP transaction, following MAIL FROM and at least one RCPT TO from the client, the SMTP server opens a connection to the host name in the MAIL FROM address and uses the RCPT TO value in a MAIL FROM commands, and the MAIL FROM value in a RCPT TO command, in an attempt to see if the client system is an SMTP server and accepts mail for that address.

This is a deceptively attractive approach, since it appears to validate the client system as a proper server. However, it quickly runs into numerous problems. The most severe is that if both systems try this, they both deadlock and mail cannot be exchanged. The usual way to avoid this is to do the callback as a fake bounce with a <> null sender address.

The most obvious problem is that it doesn't work to verify addresses. There's lots of reasons why the naively implemented checks that callbacks use can succeed for a non-existent address or fail for a good address. Some mail systems accept all addresses at the RCPT TO, and reject the bad ones at the DATA command, giving the callback system the mistaken impression that bad addresses are good. Conversely, systems that implement techniques against spam blowback (bounces from spam forging their addresses) can often reject callbacks because they look just like blowback, giving the callback system the mistaken impression that good addresses are bad.

Even when it works, address verification is not an effective spam filter. These days most spam uses other people's real addresses taken from the spam target lists, so all you're verifying is that they stole someone's address.

Callbacks are abusive. Since upwards of 90% of mail is spam with forged addresses, 90% of your callbacks are to people who never sent you mail or otherwise bothered you.

Callbacks are likely to get you blacklisted, since the behavior of callbacks is indistinguishable from spammers trying to to do bulk listwashing of bad addresses.

Callbacks are discredited. Every large ISP that used to do callbacks, most notably Verizon, found it was counterproductive and stopped.