29
Fri, Nov
0 New Articles

Understanding TEOS: Taking the Sting out of Spam

Commentary
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

A couple of weeks ago, I wrote in this column that the problems of spam cannot be resolved without addressing the underlying security issues of SMTP and POP3 protocols. A number of readers agreed, but they wondered what could possibly be done to fix those security holes.

Meanwhile, the furor over email spam--unsolicited commercial email--continues to inflame the public, culminating this month with a meeting of the Federal Trade Commission (FTC) in Washington specifically devoted to the problem. At that meeting, ePrivacy Group, a privately held company based in Philadelphia, presented a white paper on a new standard called Trusted Email Open Standard (TEOS) that is receiving a lot of positive attention by lawmakers and technologists.

The white paper, entitled "Trusted Email Open Standard: A Comprehensive Policy and Technology Proposal for Email Reform" examines the social, economic, and technological conditions that are fueling the current proliferation of email spam on the Internet and offers a technical standard--along with best practices in implementation--to Simple Mail Transport Protocol (SMTP) to eliminate the problem.

What Is TEOS?

But what exactly is TEOS, and how does it change the way email might be sent? Will it remedy the problem of email spam? How might it be implemented--and by whom--over the next couple of years? Finally, what impact will TEOS have over your email infrastructure, and what might the costs be to implement the standard after it has reached maturity?

TEOS is a proposed standard that describes best practices for the implementation of SMTP, an automated mechanism for enforcing those standards, and an oversight board to maintain and distribute rules governing email transmissions. Its primary focus is to provide security in the transmission and the receipt of email communications.

ePrivacy Group divides the requirements for TEOS into three increasing levels of security:

  • Sender Identity Level 1 provides a standard minimum accountability to vouchsafe the identity of the sender.
  • Sender Identity Level 2 identifies the sender, identifies the message type, asserts a relationship with the recipient, and provides a standardized opt-out methodology.
  • Sender Identity Level 3 identifies the sender and the message type, identifies the relationship with the recipient, provides trusted means of opting out, delivers a security certificate, envisions an oversight authority, and provides a dispute resolution mechanism.

Each level envisioned in the open standard is scaled to the requirements of email security to address the issue of spam, while also providing optional features (called "optional assertions") designed for custom and future potential requirements.

Noteworthy Features

There are three noteworthy features of this proposed standard. The first is that it addresses the issue of spam from a functional perspective and has scaled its response to the needs of all the users of email. For instance, at the base tier or Level 1, the proposal provides a means of ensuring that the sender's identity from a particular domain is, in fact, not bogus.

It also provides various "optional assertions" to allow the recipient to classify email received. For example, advertisements would be so marked, communications from a government agency would be verifiable through the certificate, and business-to-business communications could be identified.

How does it accomplish this?

TEOS sees identity verification, through the use of identification certificates, as an absolute base-level requirement and then proposes to build upon that security. Levels 2 and 3 provide reinforced security layers--with other optional assertions--to create an infrastructure of communications to meet a whole spectrum of requirements for private, business, and government security communications.

This approach transcends the current public uproar about "garbage communication" and positions TEOS as a real, comprehensive solution to a whole array of security issues that have yet to be addressed in email. It is not a "one size fits all" or "quick fix" solution; instead, it tries to be a measured, engineered security implementation designed to resolve current and potential abuses of email security.

An Additive Approach

The second noteworthy feature of this standard is its applicability to the current implementations of SMTP. The TEOS proposal understands the basic dilemma of today's Internet email infrastructure: How can email be cured of spam without killing the "killer app" of the Internet?

In fact, it is the simplicity of SMTP that has earned email the moniker of the killer app. Creating an email communication is simple: External files can be attached and transmitted, workflow systems can be built around the messages (e.g., Lotus Notes/Domino databases), and nearly every operating system in the world can make use of it. As a result, SMTP has become a sacred cow, and no one dares to impugn or exchange this workhorse of data transmission protocols.

However, the security of the current SMTP standard is spectacularly porous. It is a protocol designed to allow data to be exchanged between senders, servers, and recipients. As such, it is the barest envelope describing a transmission of data between two or more machines. This makes SMPT extremely versatile but also exceptionally susceptible to abuse by spammers.

So how does TEOS replace SMTP? It doesn't!

TEOS addresses SMTP by enhancing it with its own external mechanisms, engines, and standards. It also makes use of existing mechanisms--such as filters, IP blacklists (filter exclude lists), and address white lists (filter bypass lists)--that are currently being deployed in the fight against spam. The TEOS proposal will certainly add complexity to the SMTP network of servers and senders, but it's designed to work with the current SMTP, providing a structure of security that is, generally, self-maintaining.

Imbedding Security into the SMTP Network

TEOS envisions an external sender-side identity verification engine or "trusted email sending engine" (TESE) program that would package the sender's identity, bind that identity with the domain from whence the message was derived, and encrypt a certificate before the message is transmitted. This TESE program would sit on the sender's machine as an add-in module to the current email application that the sender uses.

The identification certificate that was created would be transmitted with the message itself through the Internet to a gateway (potentially a router) where a counterpart engine, called a "trusted email receiver engine" (TERE) would verify the certificate, including any optional "assertions."

Existing receiver-side server filter mechanisms, including blacklists and white lists, would further parse the messages that were passing through the gateway. All this would occur before any message was actually placed into the receiver's mailbox.

Once in the in-box, the recipient's own filter mechanisms could come into play, further classifying and triaging the messages received. If required, feedback mechanisms could be implemented to better inform the gateway's TERE engine of the receiver's email filtering system.

Building a Real SMTP Community

The concept of identity certificates is not new, of course: They've been used successfully in a variety of non-SMTP mail environments for years, such as Lotus Notes or Microsoft Mail. The implementation of engines such as the TESE and TERE are, in essence, an implementation of principles onto the SMTP structure.

However, the TEOS proposal goes further still.

One of the primary problems with SMTP spam today is that the authority to eradicate it is dispersed: SMTP was a grassroots protocol that was developed by consensus by hundreds of thousands of SMTP administrators on local servers. This protocol then spread to ISPs without any solid mechanism for monitoring and control.

Spam itself was first seen as a localized problem that individual ISPs and SMTP administrators attempted to tackle. As a result, ISP blacklists, which often contained erroneous information, were sporadically implemented by individuals, creating virtual blackouts of domains and often pulling down innocent senders in the process.

TEOS addresses this problem of community head on.

At the higher security levels (Levels 2 and 3) TEOS envisions automatic mechanisms by which users can securely opt-in to lists and transparently communicate through the structure to resolve spam-related issues.

For instance, TEOS proposes an automatic arbitration mechanism by which falsified identities or abusing spammers can be pinpointed and their identity certificates invalidated--potentially at the router intersection where the message enters the SMTP network itself.

This arbitration mechanism would then automatically promulgate the offender's identity throughout the SMTP network to all the TERE modules, shutting the offender out before the messages can penetrate the network through other entry points.

Conversely, individuals whose identification certificates were erroneously added to a TERE blacklist (as sometimes happens now with ISP router blacklists) would have a central entity to resolve disputes, enabling them to clear their offense so that they might be allowed back onto SMTP TEOS networks.

This same central authentication entity or "oversight board" would add new message "assertion" classifications for each level of security as they became standard on the SMTP TEOS network. With this kind of mechanism, created and maintained through the community of ISPs on the oversight board, the monitoring and control of the overall system could finally become automated, standardized, extensible, and highly functional.

Can TEOS Work?

As a beginning, ePrivacy Group's TEOS proposal holds some real promise: It addresses the issue of spam with a realistic solution that recognizes the limitations and the power of the SMTP email legacy, while simultaneously addressing the need for an Internet community-based centralized solution. It is not the first serious proposal for a solution to spam, but it may be the most realistic that is currently available to us.

Its "additive" approach to technology, instead of a "scrap and rebuild" approach that many other organizations have previously proposed, will resonate well with network administrators who have already made substantial investments toward eliminating spam.

It is not itself a technology, but a blueprint for an open standard that could act as a framework for future solutions.

It's nonproprietary, so different organizations with differing email infrastructures on differing platforms can implement at will. At the same time, it is comprehensive, realistic, measured, and extensible. It holds the promise of preserving the powerful capabilities of SMTP without placing an undue burden upon administrators and users.

Limitations of Scope

However, if TEOS is adopted by ISPs to address spam, it will be ultimately unfortunate. Why? Because TEOS is a real-life kludge, patching yet another piece of fabric over the holes in the ancient technology of SMTP.

SMTP was a protocol built of expediency: It needed to be small, simple, and versatile in order for Internet email to be generally adopted by such a wide audience. But it's already an old technology, and its limitations stretch far beyond the abuse of spam and current public uproar over unsolicited email.

Besides its lack of security, SMTP's message data structure is bulky, readily intercepted by hackers, and highly susceptible to carrying viruses in the form of email attachments.

It's unfortunate that spam has drawn so much attention to the problems of the protocol, because it has created such a strong public and political demand to simply "fix it."

Yet, at the same time we are addressing spam, we could also be addressing technologies of data compression, XML-like syntaxes, beefed-up content security, and real workflow functionality that could greatly automate so many more functions of electronic correspondence. Such an investment would further the functionality of email, for the good of the entire Internet community.

Nonetheless, ePrivacy Group is owed a debt of thanks for starting the ball rolling with TEOS. Their insight and their expertise in this field make "Trusted Email Open Standard: A Comprehensive Policy and Technology Proposal for Email Reform" a "must read" for anyone who is seriously concerned with the problems of spam on the Internet.

TEOS may yet take the sting of spam out of the sound of "You've Got Mail" and preserve the killer app that we all have come to rely so heavily upon.

Thomas M. Stockwell is the Editor in Chief of MC Press, LLC. He has written extensively about program development, project management, IT management, and IT consulting and has been a frequent contributor to many midrange periodicals. He has authored numerous white papers for iSeries solutions providers. His most recent consulting assignments have been as a Senior Industry Analyst working with IBM on the iSeries, on the mid-market, and specifically on WebSphere brand positioning. He welcomes your comments about this or other articles and can be reached at This email address is being protected from spambots. You need JavaScript enabled to view it..

Thomas Stockwell

Thomas M. Stockwell is an independent IT analyst and writer. He is the former Editor in Chief of MC Press Online and Midrange Computing magazine and has over 20 years of experience as a programmer, systems engineer, IT director, industry analyst, author, speaker, consultant, and editor.  

 

Tom works from his home in the Napa Valley in California. He can be reached at ITincendiary.com.

 

 

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: