Jonas, do you have any performance and/or efficacy stats for your
URLRedirect plugin?

After months of near silence, I'm seeing an interesting (albeit
low volume) shortener campaign, that's picking up volume AND
effectiveness.

Only one of my 40-ish domains was getting these, then this week two
other domains started getting a trickle.  They make up about 5.6%
of the post-Spamhaus volume for the main victim, and (currently)
much less than 1% for the two new victims.

They're mostly targeting BitLy, and they're getting MUCH better at
thwarting BitLy's detection (for a short period, it was near 100%
catch rate, now it's down to almost zero).  The volume is low
enough that I've been batch HTTP-HEADing them, a few times each
day.

They're not doing anything stunningly innovative, and they "should"
be fairly obvious (both algorithmically and to the (experienced)
naked eye), but the volume must be small enough that they're
sneaking under the radar.

I've been killing these partly by giving BitLy/et-al a fairly hefty
score, UNLESS the sender uses the correct RealName in the To
header, or they've already got a generous skip rule.

That's brute force, and terribly inelegant.

The FP rate hasn't been "too" bad, and I'm of the opinion that a
URL shortener is an admission by the sender that the content is low
priority, and all but begs to be delayed and salvaged by our FP
pipeline.

Still, I'd like to find a more elegant way to handle these, partly
so I can be even more aggressive.

My main concern with doing real-time HTTP HEADs is performance.

Jonas, I've been thinking that if you embedded the SA spam score in
the HTTP request's Agent, that would provide BitLy/et-al with
extremely useful data, which should improve their detection rate
(if they choose to use the extra data).

You could also include the recipient's domain, which may help them
to correlate data.  In the campaigns I've looked at, the patterns
are fairly obvious, as long as you look at _JUST_ the data for that
domain's spam (granted, I'm in a small domain environment, and that
really wouldn't be relevant for a big ISP's data, however that's
easy to separate at the shorteners' end).

Does anyone have a contact at BitLy?  They seem to be on the ball,
and serious.  They could well embrace cooperation. :)

I'm also wondering about using UDP to send a quick real-time,
no-response-needed message (instead of a high overhead HTTP
request), then (mostly) auto-quarantine, and later in a separate,
batch queue, do a proper HTTP Head.  Anything that's clean after a
certain amount of time, could be automatically re-injected back
into the main queue.  That would allow pooling of requests, and
shift the load from the main email gateway.

The UDP part would be pointless without cooperation from the
shortener services.  If they do embrace it, they can use the UDP
data to more quickly identify most bad links, and have that all
ready for when we send out HTTP requests.

Ideally, if a pilot program proved successful, some of the
shorteners might be willing to host a proper DNS blocklist, which
would improve performance for everybody. :)

The commercial shorteners COULD even use a blocklist under their
control (i.e. preferred white/pass-listing) as a selling point for
their (future?) paying customers, and/or as an incentive for their
link creators to opt-in to a more rigorous creation channel
(i.e. still keep the no-brainer, Pakled-friendly channel, but also
have a channel for adults (in the original sense of that word) who
are willing to perform some level of verification).


I've also seeing a very pernicious Digg campaign, all being sent
via Hotmail.  In some ways, that's more effective than the
mainstream shorteners, since it appears Digg does not check any
blocklists. :(

These services are just too dang tempting a target, so I expect
these campaigns to continue.


More fevered ramblings from one of your mostly harmless Iowa Geeks,
        - "Chip"


Reply via email to