ISPs take responsibility

Posted by   Virus Bulletin on   Jun 23, 2004

The six major ISPs of the Anti-Spam Technical Alliance say spam cannot be stopped unless they take action.

Six major Internet Service Providers have put forward a joint proposal aimed at reducing spam and say that spam cannot be stopped unless they take responsibility for the problem.

Under the guise of the Anti-Spam Technical Alliance, AOL, Microsoft, EarthLink, Yahoo!, Comcast and BT joined forces to develop the proposal, which recommends that zombie machines - infected customer computers that are being used by spammers to send out spam - should be isolated and taken offline until their machines have been cleaned up.

The Alliance puts the onus on Internet companies to ensure that their equipment has been properly secured so spammers cannot route their messages through them in order to evade filters.

It also recommends that all ISPs should run spam filters on outbound mail and prevent their customers from sending out more than 500 messages per day, or 100 per hour. Any suspicious accounts should be suspended immediately.

The members of the Alliance agree that sender authentication is the single thing that would have the biggest impact on the volume of spam - so far, however, they have not been in agreement over the technology.

Both AOL and EarthLink have backed the Sender Policy Framework (SPF - formerly Sender Permitted From) protocol, while Microsoft has recently agreed to merge its Caller ID proposal with SPF to create the new Sender ID.

Yahoo!, meanwhile, backs the DomainKeys approach.

As well as revealing its ISP best practice proposals, the Alliance announced yesterday that the four major players have agreed to give limited support to test each other's preferred sender authentication technologies.

Posted on 23 June 2004 by Virus Bulletin




Latest posts:

VB2019 conference programme announced

VB is excited to reveal the details of an interesting and diverse programme for VB2019, the 29th Virus Bulletin International Conference, which takes place 2-4 October in London, UK.

VB2018 paper: Under the hood - the automotive challenge

Car hacking has become a hot subject in recent years, and at VB2018 in Montreal, Argus Cyber Security's Inbar Raz presented a paper that provides an introduction to the subject, looking at the complex problem, examples of car hacks, and the…

VB2018 paper and video: Android app deobfuscation using static-dynamic cooperation

Static analysis and dynamic analysis each have their shortcomings as methods for analysing potentially malicious files. Today, we publish a VB2018 paper by Check Point researchers Yoni Moses and Yaniv Mordekhay, in which they describe a method that…

VB2019 call for papers closes this weekend

The call for papers for VB2019 closes on 17 March, and while we've already received many great submissions, we still want more!

Registration open for VB2019 ─ book your ticket now!

Registration for VB2019, the 29th Virus Bulletin International Conference, is now open, with an early bird rate available until 1 July.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.