38 3 The e-mail delivery process and its susceptibility to spam
more, as many hosts get a dynamic IP address from their Internet provider,
it is impossible to determine the sending host after the TCP/IP connection
unless a log file stores the mapping between the hosts and the IP addresses.
With the increased use of Network Address Translation (NAT) may come a
need for additional information in log files. As long as there is a 1:1 map-
ping between the addresses inside the NAT and the addresses used outside it,
everything is alright, but if the NAT box also translates port addresses (to
combine many internal hosts into one external address) it will be necessary
to log not only the IP addresses of spam hosts but also the port addresses.
Otherwise, we will not be able to identify the individual host inside the NAT
[98]. It should be noted that even when the e-mail header contains no spoofed
data and the sending host can be identified this does not necessarily lead to
identification of the spammer because many spamming hosts are hijacked.
A consequence is that all header fields not inserted by the last trustable
MTA have to be regarded as possibly being spoofed. This includes any ma-
licious violation against the rule mentioned above, according to which an
Internet mail program must not change a Received entry that was previously
added to the message header. Furthermore, a corrupt MTA (and a corrupt
MUA likewise) can add Received entries indicating the involvement of MTAs
which did not actually participate in the e-mail delivery or it can delete regular
entries. Figure 3.6 shows part of a (spam) e-mail header with a forged FQDN.
The last trustable MTA is relay1.rwth-aachen.de, which accepted the e-mail
from an MTA client with IP address 202.83.175.98. This MTA pretended to
have winfinity.com as its FQDN. However, a manually performed DNS re-
verse lookup exposes the MTA as having the FQDN ntc.net.pk. Whether any
other MTA has been involved in the delivery is undetermined. Missing host
authentication and data integrity makes any tracing back to the sending host
difficult or even impossible.
SMTP does also not guard against spoofing of the sender’s e-mail address.
Spammers exploit this to make it harder to determine who the responsible
party is, and to make it harder to know whom to complain to. Spammers also
evade filters, either by pretending to be a sender on a recipient’s whitelist,
or by pretending not to be a sender on a recipient’s blacklist. The common
use of forged MAIL FROM in the envelope and From in the header puts
the blame on innocent persons, hosts, or organizations. In addition, there is
no inherent relationship between either “reverse” (from MAIL command) or
“forward” (from RCPT TO command) address in the SMTP envelope and
the addresses in the headers. As SMTP is not designed to validate any data,
this makes it difficult to trace spammers. While these issues address missing
authentication and missing data integrity SMTP also faces the problem of
missing data privacy.
Although SMTP allows the use of “message submission”, SMTP-AUTH
and some more security procedures like SMTP after POP, these extensions
are mostly restricted to the dialog between the user’s e-mail client and an
SMTP server (SMTP-AUTH is an exception to this). Their drawbacks and