|
||||
Computing Service | |
University of Cambridge > Computing Service > Electronic mail |
The Central Email Scanner
IntroductionThe majority of email in Cambridge (including email entering,
leaving, and within the University) passes through a central relay
known as The email scanner is only a first line of defence. You should still run a virus scanner on your computer because there are ways of getting infected other than via email. You can get anti-virus software from the Computing Service. Serious users may also benefit from running their own spam filter, since a personalized filter can be more closely tuned to the kinds of email you receive. See FAQ E32 for information about the SpamBayes Outlook Plugin which can do this. The Mac OS X Mail application comes with this feature built-in. Anti-spam measuresThere are no clear technical criteria for identifying spam. This is partly because no-one can agree on exactly what spam is. One way of characterizing it is the phrase "Unsolicited Bulk Email": this highlights the aspect of it that involves abuse of the network infrastructure, and there are technical measures that tackle it at that level. Another way of characterizing it is "Anything I Don't Like": this highlights the frequently offensive content of spam, and again it can be tackled using these features. Because of this lack of clarity the email scanner uses a mixture of techniques to reduce the amount of spam that users have to deal with: DNS blacklistsFirstly, we use DNS blacklists to identify the IP addresses of computers on the Internet that we will not accept email from. There are a number of reasons that an IP address may be blacklisted: the computer may be misconfigured in such a way as to make it open to abuse by spammers; the address may be listed by its owner as one that should never send email; or the address may be allocated to an organization that is known to send spam. There are a number of different DNS blacklists with varying
policies about listing IP addresses, some of which are more aggressive
than others. When rejecting email, the Computing Service only uses DNS
blacklists that have a good reputation for not gratuitously listing
legitimate IP addresses. Even so there is the occasional communication
problem caused by the blacklists, in which case you can contact
At the moment Sender blacklistFor a number of years the Computing Service has maintained a blacklist of email addresses and domains. Messages from these addresses are not accepted. This blacklist is also used by some other institutions in the University that have their own email systems. This blacklist is no longer very effective. It is now common for spammers to forge email so that it appears to come from an innocent third party, or to use addresses for very short periods of time so that by the time an address is blacklisted it is already too late. Therefore we are now discouraging this kind of filtering (including the similar BLOCK filtering option on Hermes). To suggest changes to the sender blacklist, contact
SpamAssassinSpamAssassin is a system that performs a large number of tests on a message to decide if it is spam. These tests look at the content of the message, various technical details in its headers, and query databases on the Internet. Many of the tests identify features of the message that are common in spam and some of them identify non-spam features. Each test has an associated score which is positive for spam and negative for non-spam. The scores of all the tests that succeed are added together to produce an aggregate score for the message as a whole. The higher the score the more likely it is to be spam. Although SpamAssassin is reasonably effective it cannot identify
spam or legitimate email 100% accurately. Therefore The Computing Service only makes basic changes to the SpamAssassin configuration to tailor it to our local needs; for example, we have added some tests to recognize Cambridge email addresses to compensate for the fact that by default SpamAssassin thinks they are spammy. We do not make more extensive changes to the tests because that would be duplicating the work of the SpamAssassin developers and it would make it harder to keep the software up-to-date. For this reason we are not generally interested in individual messages that score unexpectedly high or low and are erroneously classified as spam or not, since there is little we can do about them. For more information, see
the SpamAssassin FAQ.
If you receive a legitimate message that was classified as spam,
perhaps you set your filtering threshold too low; see also
the FAQ.
If you receive some spam that was classified as legitimate email,
perhaps you set your filtering threshold too high; see also
the FAQ.
Though it is a chore to have to go through your spam mailbox every few
days to delete messages, SpamAssassin isn't perfect so you would risk
losing real email if high-scoring messages were deleted unseen; see also
the FAQ.
Note that only email arriving at Anti-virus measuresViruses and emailUnlike spam, there are clear technical criteria for identifying viruses, since viruses target computers rather than people. This means that it is possible for us to filter out infected email centrally with less risk of losing legitimate email. The scanner filters email using commercial virus scanning software, and as a further level of protection it also filters attachments based on the name and type of the file they contain. This extra protection helps when there are delays getting a virus database update from the vendor, and it reduces the ways in which malicious email can trick users. The details of the policy implemented by the virus filter are
largely determined by the way the scanner works and by weaknesses in
Internet email. The scanner looks at a message after it has been
accepted by The most common and troublesome kind of viruses that the scanner aims to stop are "worms" that target weaknesses in Microsoft Outlook etc. and propagate automatically via email. These worms are never attached to legitimate email so it makes no sense to deliver their messages after disinfection. Therefore the Computing Service maintains a list of known email worms which the virus filter discards without informing either the (forged) sender or the recipient. Anti-virus policy
The first two cases above should be rare if you and your correspondents keep your anti-virus software up-to-date, though they may also be caused by a new worm that hasn't yet been put on the delete list. If the message is legitimate (which a human can decide in a way that software cannot) then the recipient should inform the sender that they have a virus problem. If you want to send a message containing a dangerous file, you can
avoid the file type and name restrictions by putting it in a
See below for more information about the
way the filter alters messages. There is another page with more
general information about email
attachments. If the filtering is causing you problems, please
contact the Computing Service help desk,
How the scanner alters emailScanner headersThe email scanner adds some headers to each message that passes through, containing some information about what the scanner found. You can see them by viewing the full headers of the message. If a message is scanned more than once (e.g. because it has been re-sent) then it will have more than one set of scanner headers. Each of the headers starts The The The X-Cam-SpamDetails: scanned, SpamAssassin (score=5.2, DEAR_SOMETHING 2.60, URGENT_BIZ 0.15, US_DOLLARS 1.54, US_DOLLARS_3 0.85)The text in the brackets includes the overall score assigned to the message by SpamAssassin, and the list of tests that the message matched with the score for each test. If the message has a spam score greater than one, a fourth header
is added. The Bodies and attachmentsWhen the anti-virus filter alters an email it does the following things:
We do not keep the original attachment for a number of reasons, as
follows. If it contains a virus it is too dangerous to keep. If it had
a dangerous file name or file type, the original sender should still
have a copy and can re-send it in a The advisory text in the replacement attachment includes a link to a web page which explains more about what the recipient should do about the filtered message. There are a few different versions depending on why the message was filtered: for disinfected viruses, for deleted viruses, and for dangerous file names and file types. Coverage of the scannerVarious institutions in the University run their own email systems
independently of the Computing Service. Many of them "hub"
through You can find out if a message has been scanned by viewing its
full headers. If the
In general, all messages sent to domains managed by the Computing
Service will be scanned; this includes If you have an institution email address such as
If you are a Computer Officer and you want to change the scanning
arrangements for your institution's email domain, please contact
|