Complaining About Spam
You can affect the expenses side of a spammer’s balance sheet, too. If you complain to the spammer’s internet service provider (ISP), they will lose their connection and might have to pay a fine (depending on the ISP’s acceptable usage policy). Since spammers know and fear such reports, they try to hide. That’s why finding the right ISP isn’t always easy. However, there are tools like SpamCop that simplify reporting spam correctly to the accurate address.
Determining the Source of Spam
How does SpamCop find the right ISP to complain to? It takes a close look at the spam message’s header lines. These headers contain information about the path an email took. SpamCop follows the path until the point from which the spammer sent the email. From this point, also know as an IP address, it can derive the spammer’s ISP and send the report to this ISP’s abuse department. Let’s take a closer look at how this works.
Email Header and Body
Every email message consists of two parts, the body and the header. The header is like the email envelope containing the sender’s address, the recipient, the subject, and other information. The body has the text and the attachments. Some header information usually displayed by your email program includes:
From: The sender’s name and email address. To: The recipient’s name and email address. Date: The date when the message was sent. Subject: The subject line.
Header Forging
The actual delivery of emails doesn’t depend on any of these headers. They are just convenient. Usually, the From line, for example, will be sent to the sender’s address so you know who the message is from and can reply quickly. Spammers want to make sure you cannot reply easily, and certainly don’t want you to know who they are. That’s why they insert fictitious email addresses in the From lines of their junk messages.
Received Lines
The From line is useless in determining the real source of an email. You don’t need to rely on it. The headers of every email message also contain Received lines. Email programs do not usually display these, but they can be beneficial in tracing spam.
Parsing Received Header Lines
Just like a postal letter will go through several post offices on its way from sender to recipient, an email message is processed and forwarded by several mail servers. Imagine every post office putting a unique stamp on each letter. The stamp would say exactly when the mail was received, where it came from, and where it was forwarded to by the post office. If you got the letter, you could determine the exact path taken by the letter. This is precisely what happens with email.
Received Lines for Tracing
As a mail server processes a message, it adds a particular line to the message’s header. The Received line contains the server name and IP address of the machine the server received the message from, and the name of the mail server. The Received line is always at the top of the message header. To reconstruct an email’s journey from sender to a recipient, start at the topmost Received line and go down to the last one, which is where the email originated.
Received Line Forging
Spammers know that people apply this procedure to uncover their whereabouts. They might insert forged Received lines that point to somebody else sending the message to fool the intended recipient. Since every mail server will always put its Received line at the top, the spammers’ forged headers can only be at the bottom of the Received line chain. This is why you should start your analysis at the top and not just derive the point where an email originated from the first Received line (at the bottom).
How to Tell a Forged Received Header Line
The forged Received lines inserted by spammers look like all the other Received lines (unless they make an obvious mistake). By itself, you can’t tell a forged Received line from a genuine one, which is where one distinct feature of Received lines comes into play. Every server notes who it is and where it got the message from (in IP address form). Compare what a server claims to be with what the server one notch up in the chain says it is. If the two don’t match, the earlier is a forged Received line. In this case, the email’s origin is what the server placed immediately after the forged Received says.
Example Spam Analyzed and Traced
Now that we know the theoretical underpinning, let’s analyze a junk email to identify its origin in real life. We’ve just received an exemplary piece of spam that we can use for exercise. Here are the header lines: Can you tell the IP address where the email originated?
Sender and Subject
First, look at the forged From line. The spammer wants to make it look like the message came from a Yahoo! Mail account. With the Reply-To line, this From address aims to direct all bouncing messages and angry replies to a non-existing Yahoo! Mail account. Next, the Subject is a curious accumulation of random characters. It is barely legible and designed to fool spam filters (every message gets a slightly different set of random characters). Still, it is also quite skillfully crafted to get the message across despite this.
The Received Lines
Finally, the Received lines. Let’s begin with the oldest, Received: from [235.16.47.37] by 38.118.132.100 id ; Sun, 16 Nov 2003 13:38:22 -0600. There are no hostnames in it, but two IP addresses: 38.118.132.100 claims to have received the message from 235.16.47.37. If this is correct, 235.16.47.37 is where the email originated, and we’d find out which ISP this IP address belongs to, then send an abuse report to them. Let’s see if the next (and in this case last) server in the chain confirms the first Received line’s claims: Received: from unknown (HELO 38.118.142.100) (62.105.106.207) by mail1.infinology.com with SMTP; 16 Nov 2003 19:50:37 -0000. Since mail1.infinology.com is the last server in the chain and indeed “our” server, we know that we can trust it. It has received the message from an “unknown” host claiming to have the IP address 38.118.132.100 (using the SMTP HELO command). So far, this is in line with what the previous Received line said. Now let’s see where our mail server did get the message from. To find out, look at the IP address in brackets immediately before by mail1.infinology.com. This is the IP address the connection was established from, and it is not 38.118.132.100. No, 62.105.106.207 is where this piece of junk mail was sent from. With this information, you can now identify the spammer’s ISP and report the unsolicited email to them to kick the spammer off the net.