Knowledge

Challenge–response spam filtering

Source 📝

49:. It was originally designed in 1997 by Stan Weatherby, and was called Email Verification. In this reply, the purported sender is asked to perform some action to assure delivery of the original message, which would otherwise not be delivered. The action to perform typically takes relatively little effort to do once, but great effort to perform in large numbers. This effectively filters out spammers. Challenge–response systems only need to send challenges to unknown senders. Senders that have previously performed the challenging action, or who have previously been sent e-mail(s) to, would be automatically receive a challenge. 326:
solicited bulk email, as such senders do not usually check for challenges to their mail. However, if the bulk email in question was solicited, then the C/R user could be expected to have added it to the whitelist. If the bulk email was not solicited, then by definition it is spam, and is filtered by the C/R system.
282:
Disseminating an ordinary email address that is protected by a C/R system results in challenges to those who send mail to that address. Some C/R critics consider it rude to give people your email address, then require them (unless previously whitelisted, which might not always be possible) to answer
273:
In some cases, C/R systems can be tricked into becoming spam relays. To be useful, some part of the message under challenge is generally included in the challenge message. A spammer, knowing that they're sending to a C/R using system, could design their message so that their "spam payload" is in the
295:
Some C/R systems interact badly with mailing list software. If a person subscribed to a mailing list begins to use C/R software, posters to the mailing list may be confronted by challenge messages. Order confirmations, billing statements and delivery notices from online shopping systems are usually
286:
Advocates of C/R systems argue that the benefits by far outweigh the 'burden' of an incidental challenge, and that there will probably never be a final solution against spam without laying some kind of burden on the e-mail sender. They reason that the more widespread the use of C/R systems is, the
325:
Critics argue that typical users of C/R systems still need to review their challenged mail regularly, looking for non-bulk mail or solicited bulk email for which the sender has not responded to the challenge. This issue is particularly notable with newsletters, transactional messages, and other
257:
Though definitely an undesirable side-effect, this issue would be non-existent if people, whose email address was used as a forged address in spam, happen to run a C/R system themselves. In this case, one of the C/R users must implement some form of return address signing (such as
223:
Critics of C/R systems have raised several issues regarding their legitimacy and usefulness as an email defense. A number of these issues relate to all programs which auto-respond to e-mail, including mailing list managers, vacation programs and bounce messages from mail servers.
98:
A challenge requiring reading natural language instructions on how to reply, with the inclusion of a special string or pass-code in the reply. For example, converting a date string (such as 'Thu Jan 12 08:45:44 2012') into its corresponding timestamp (1326379544). Other
118:
Nowadays C/R systems are not used widely enough to make spammers bother to (automatically) respond to challenges. Therefore, C/R systems generally just rely on a simple challenge that would be made more complicated if spammers ever build such automated responders.
57:
C/R systems attempt to provide challenges that can be fulfilled easily for legitimate senders and non-easily for spammers. Two characteristics that differ between legitimate senders and spammers are exploited to achieve this goal:
374:, as well as the domain's reputation, to determine whether to accept, reject, challenge on reputation, or present the user with a set of whitelist/blacklist options. As of 2010, the project is listed as "retired" technology. 287:
more understood, accepted and appreciated they are. In an analogy with snail mail, the sender is prepared to pay for the stamp, in an analogy with phone calls, the caller is prepared to pay for the outgoing call.
236:
field) in the e-mail header, but can also use a forged, existing sender address (a valid, but an arbitrary person's address without this person's consent). The latter would become increasingly common if e.g.
241:
would become more popular to detect spam. C/R systems challenging a message with a forged sender address would send their challenge as a new message to the person whose address was forged. This would create
340:
Channel email – Just wants a reply, doesn't actually try to determine if the user is human (thus getting rid of the spammers that don't use legitimate emails and doesn't require costly processing).
246:, which would effectively shift the burden from the person who would have received the spam to the person whose address was forged and which may be treated the same as any other 274:
part of the message that the challenge message includes. In this case, the forged sender is the actual recipient of the spam, and the C/R system unwittingly is the relay.
299:
Advocates of C/R systems argue that, though it takes extra effort, solutions for these problems exist if the end-user behind the C/R system does these simple things:
254:. In addition, if the forged sender decided to validate the challenge, the C/R user would receive the spam anyway and the forged sender address would be whitelisted. 166:
mail that is sent within a pre–set length of time, to allow correspondence related to an online order, but which then expires to disallow future marketing e-mail.
95:, which can be loaded in an appropriate web browsing tool to respond to the challenge, so simply clicking on the link is sufficient to respond to the challenge. 307:
for many email groups, the new member won't know the group's address until after receipt of the "welcome" email, thus making this recommendation unworkable.
296:
sent via automated systems. Email challenges sent to such systems can be lost, and legitimate mail sent by these systems may not reach the C/R system user.
69:, while spammers usually forge a return address. This means that most spammers won't get the challenge, making them automatically fail any required action. 310:
Use 'tagged email addresses' for mailing lists or automated mailers like the above, that can be recognized and cleared automatically by the C/R system.
322:
C/R advocates claim that such systems have a lower rate of false positives than other systems for automatically filtering unsolicited bulk email.
313:
Manually inspect the message queue and overriding the C/R process in case where the C/R system holds an expected message from an automated mailer.
251: 80:
and have to perform challenging actions in large numbers, while legitimate senders have to perform it at most once for every new e-mail contact.
31: 517: 761: 736: 549: 114:" test in which the sender is required to view an image containing a word or phrase and respond with that word or phrase in text. 484: 335: 259: 183: 154: 716: 598: 502: 153:
header or the body of the message—any of which lets messages be accepted without being challenged. For example, the
756: 172:
Problems with sending challenges to forged email addresses can be reduced if the challenges are only sent when:
731: 628: 593: 45:) system is a type of that automatically sends a reply with a challenge to the (alleged) sender of an incoming 263: 207: 107: 65: 566: 542: 270:
became common, forged sender addresses would be recognized by these systems before reaching a C/R system.
106:
Systems can attempt to produce challenges for which auto response is very difficult, or even an unsolved
478: 371: 250:(UBE) by the receiving system, possibly leading to blacklisting of the mail server or even listing on a 238: 203: 771: 741: 708: 243: 149:, including allowing for the creation of “tagged” addresses or allow pass-codes placed in either the 103:
approaches include a simple problem, or answering a simple question about the text or the recipient.
746: 588: 190: 917: 363: 17: 84:
Listed below are examples of challenges that are or could be used to exploit these differences:
514: 472: 912: 726: 669: 535: 409: 867: 814: 391: 135: 879: 849: 583: 521: 351: 496: 434: 889: 859: 809: 751: 674: 664: 608: 146: 906: 824: 789: 689: 623: 527: 872: 829: 799: 649: 508: 834: 644: 395: 355: 139: 100: 804: 781: 654: 613: 575: 490: 359: 247: 455: 839: 819: 694: 367: 366:
look-ups. If a relationship could be found, FairUCE checked the recipient's
303:
Whitelist a mailing list address manually as soon as one subscribes to it.
884: 794: 679: 659: 558: 232:
Spammers can use a fake, non-existent address as sender address (in the
766: 684: 618: 111: 46: 262:) to ensure that the challenge goes through. Also, if systems like 844: 603: 197: 267: 211: 179:
the message is sent from an IP address with an associated domain
88:
Simply sending an (unmodified) reply to the challenging message.
531: 503:
John Levine: Challenge-response systems are as harmful as spam
347: 92: 515:
What You Need to Know About Challenge – Response Spam Filters
131:
Allow users to view and act on messages in the holding queue.
410:"Proper principles for Challenge/Response anti-spam systems" 398:: Recommendations for Automatic Responses to Electronic Mail 362:
of the client delivering the mail, using a series of cached
475:
A listing of challenge/response filtering service providers
346:("Fair use of Unsolicited Commercial Email"), developed by 291:
Interaction with mailing lists or other automated mailers
110:
problem. One example (also found in many websites) is a "
497:
Challenge-Response Anti-Spam Systems Considered Harmful
481:, Walt Mossberg of Wall Street Journal, March 22, 2007 134:
Comply with the requirements and recommendations of
858: 780: 707: 637: 574: 565: 233: 196:the originating IP address is not found on trusted 150: 157:system can create "tagged" addresses that permit: 30:This article is about e-mail. For other uses, see 145:Obey a detailed list of principles maintained by 435:"Challenge/Response systems considered harmful" 350:, tried to find a relationship connecting the 543: 491:Challenge-Response systems make matters worse 283:the challenge before they can send you mail. 202:the sender's email address has not failed an 8: 509:A Challenging Response to Challenge-Response 53:The challenge in challenge–response systems 571: 550: 536: 528: 428: 426: 228:Challenges sent to forged email addresses 384: 163:mail that contains a certain "keyword" 176:the message header is properly formed 7: 485:Why Challenge-Response is a Bad Idea 473:SpamHelp Challenge/Response Services 456:"Legacy Communities - IBM Community" 160:mail sent from a particular address 737:Distributed Checksum Clearinghouse 25: 722:Challenge–response spam filtering 559:Unsolicited digital communication 32:Challenge–response authentication 27:Method for detecting spam e-mails 18:Challenge-response spam filtering 91:A challenge that includes a web 479:When Spam Filters Aren't Enough 206:test, using techniques such as 123:Recommendations for C/R systems 1: 336:Tagged Message Delivery Agent 260:Bounce Address Tag Validation 127:C/R systems should ideally: 934: 757:Naive Bayes spam filtering 62:Legitimate senders have a 29: 732:Disposable email address 594:Directory harvest attack 189:the server has passed a 182:the server has passed a 108:artificial intelligence 248:Unsolicited Bulk Email 239:callback verification 204:e-mail authentication 742:Email authentication 589:Bulk email software 520:2007-01-05 at the 433:Schryver, Vernon. 244:e-mail backscatter 39:challenge–response 900: 899: 727:Context filtering 703: 702: 499:December 29, 2003 408:Templeton, Brad. 16:(Redirected from 925: 868:Advance-fee scam 815:Keyword stuffing 572: 552: 545: 538: 529: 460: 459: 452: 446: 445: 443: 441: 430: 421: 420: 418: 416: 405: 399: 389: 235: 152: 21: 933: 932: 928: 927: 926: 924: 923: 922: 903: 902: 901: 896: 880:Make Money Fast 854: 850:URL redirection 776: 699: 633: 584:Address munging 561: 556: 522:Wayback Machine 469: 464: 463: 454: 453: 449: 439: 437: 432: 431: 424: 414: 412: 407: 406: 402: 390: 386: 381: 352:envelope sender 332: 330:Implementations 320: 318:False positives 293: 280: 230: 221: 125: 55: 35: 28: 23: 22: 15: 12: 11: 5: 931: 929: 921: 920: 915: 905: 904: 898: 897: 895: 894: 893: 892: 882: 877: 876: 875: 864: 862: 860:Internet fraud 856: 855: 853: 852: 847: 842: 837: 832: 827: 822: 817: 812: 810:Google bombing 807: 802: 797: 792: 786: 784: 778: 777: 775: 774: 769: 764: 759: 754: 752:List poisoning 749: 744: 739: 734: 729: 724: 719: 713: 711: 705: 704: 701: 700: 698: 697: 692: 687: 682: 677: 672: 667: 662: 657: 652: 647: 641: 639: 635: 634: 632: 631: 626: 621: 616: 611: 609:Email spoofing 606: 601: 596: 591: 586: 580: 578: 569: 563: 562: 557: 555: 554: 547: 540: 532: 526: 525: 512: 506: 500: 494: 488: 482: 476: 468: 467:External links 465: 462: 461: 447: 422: 400: 383: 382: 380: 377: 376: 375: 341: 338: 331: 328: 319: 316: 315: 314: 311: 308: 292: 289: 279: 276: 229: 226: 220: 217: 216: 215: 200: 194: 187: 180: 177: 170: 169: 168: 167: 164: 161: 147:Brad Templeton 143: 132: 124: 121: 116: 115: 104: 96: 89: 82: 81: 72:Spammers send 70: 66:return address 54: 51: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 930: 919: 916: 914: 911: 910: 908: 891: 888: 887: 886: 883: 881: 878: 874: 871: 870: 869: 866: 865: 863: 861: 857: 851: 848: 846: 843: 841: 838: 836: 833: 831: 828: 826: 825:Referrer spam 823: 821: 818: 816: 813: 811: 808: 806: 803: 801: 798: 796: 793: 791: 788: 787: 785: 783: 779: 773: 770: 768: 765: 763: 760: 758: 755: 753: 750: 748: 745: 743: 740: 738: 735: 733: 730: 728: 725: 723: 720: 718: 715: 714: 712: 710: 706: 696: 693: 691: 690:Telemarketing 688: 686: 683: 681: 678: 676: 673: 671: 668: 666: 663: 661: 658: 656: 653: 651: 648: 646: 643: 642: 640: 636: 630: 627: 625: 624:Pink contract 622: 620: 617: 615: 612: 610: 607: 605: 602: 600: 597: 595: 592: 590: 587: 585: 582: 581: 579: 577: 573: 570: 568: 564: 560: 553: 548: 546: 541: 539: 534: 533: 530: 523: 519: 516: 513: 510: 507: 504: 501: 498: 495: 493:February 2006 492: 489: 486: 483: 480: 477: 474: 471: 470: 466: 457: 451: 448: 436: 429: 427: 423: 411: 404: 401: 397: 393: 388: 385: 378: 373: 369: 365: 361: 357: 353: 349: 345: 342: 339: 337: 334: 333: 329: 327: 323: 317: 312: 309: 306: 302: 301: 300: 297: 290: 288: 284: 278:Social issues 277: 275: 271: 269: 265: 261: 255: 253: 249: 245: 240: 227: 225: 218: 213: 209: 205: 201: 199: 195: 192: 188: 185: 181: 178: 175: 174: 173: 165: 162: 159: 158: 156: 148: 144: 141: 137: 133: 130: 129: 128: 122: 120: 113: 109: 105: 102: 97: 94: 90: 87: 86: 85: 79: 75: 71: 68: 67: 61: 60: 59: 52: 50: 48: 44: 40: 33: 19: 873:Lottery scam 830:Scraper site 800:Doorway page 721: 670:Mobile phone 650:Cold calling 450: 438:. Retrieved 413:. Retrieved 403: 387: 343: 324: 321: 304: 298: 294: 285: 281: 272: 256: 231: 222: 171: 126: 117: 83: 77: 73: 63: 56: 42: 38: 36: 835:Social spam 747:Greylisting 717:Client-side 645:Auto dialer 356:domain name 191:greylisting 184:greet pause 101:Turing Test 907:Categories 840:Spam blogs 805:Forum spam 782:Spamdexing 655:Flyposting 614:Image spam 576:Email spam 379:References 360:IP address 219:Criticisms 198:blacklists 78:quantities 918:Anti-spam 820:Link farm 790:Blog spam 709:Anti-spam 675:Newsgroup 665:Messaging 567:Protocols 487:July 2006 372:blacklist 368:whitelist 76:in large 913:Spamming 885:Phishing 795:Cloaking 772:Spamhaus 680:Robocall 660:Junk fax 518:Archived 511:May 2003 505:May 2003 358:and the 151:Subject: 767:SpamCop 685:Spambot 629:Spambot 619:Joe job 440:13 June 415:13 June 344:FairUCE 112:CAPTCHA 394:  138:  74:e-mail 64:valid 47:e-mail 890:Voice 845:Sping 762:SORBS 638:Other 604:DNSWL 599:DNSBL 305:Note: 252:DNSBL 234:From: 695:VoIP 524:2003 442:2014 417:2014 396:3834 370:and 268:DKIM 266:and 212:DKIM 210:and 193:test 186:test 155:TMDA 140:3834 41:(or 392:RFC 364:DNS 354:'s 348:IBM 264:SPF 208:SPF 136:RFC 93:URL 43:C/R 909:: 425:^ 37:A 551:e 544:t 537:v 458:. 444:. 419:. 214:. 142:. 34:. 20:)

Index

Challenge-response spam filtering
Challenge–response authentication
e-mail
return address
URL
Turing Test
artificial intelligence
CAPTCHA
RFC
3834
Brad Templeton
TMDA
greet pause
greylisting
blacklists
e-mail authentication
SPF
DKIM
callback verification
e-mail backscatter
Unsolicited Bulk Email
DNSBL
Bounce Address Tag Validation
SPF
DKIM
Tagged Message Delivery Agent
IBM
envelope sender
domain name
IP address

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.