McAfee MAP-3300-SWG Product Guide - Page 96

Bounce Address Tag Validation, Benefits of using Bounce Address Tag Validation

Page 96 highlights

Overview of Email features Email Configuration Table 73 Option definitions (continued) Option When an email has been deferred and is being retried Definition • None - Takes no action. • Deny connection - Adds the sender to the Denied Connections list. • Deny connection and quarantine email - Adds the sender to the Denied Connections list, then forwards the email to a quarantine area. Default value is Deny connection and quarantine email. Response delay When a tarpit action was selected, specifies the delay in responding to this email. Default value is 5 seconds. This is often enough to deter an attack. Maximum number of recipients When a tarpit action was selected, specifies how many recipient addresses each email may have. Default value is 10. Applies a delay if there are too many recipient addresses in the email message. A directory harvesting attack ... Defines this type of attack. Default values are 5 failed recipients and 10% accepted recipients. Email that falls outside this specification is not considered to be an attack, so no action is taken. Bounce Address Tag Validation Use this page to combat backscatter - bounced email that was not originally sent from your organization. Email | Email Configuration | Receiving Email | Bounce Address Tag Validation If an Mail Transfer Agent (MTA) cannot deliver an email message, the MTA returns (or 'bounces') the message to the sender using a return address in the message. Unfortunately, spam email messages often have a forged (or spoofed) return address. The bounced email often goes to an innocent organization. This type of email is known as backscatter. During a spam attack, your organization might receive many such messages. Benefits of using Bounce Address Tag Validation Bounce Address Tag Validation (BATV) enables your organization to ignore any backscatter email message by checking whether your organization was its original sender. The appliance can attach a encrypted digital signature (or tag) to the SMTP MailFrom address on every outgoing email message. When a bounced email arrives, the appliance searches for the digital signature, and rejects any message that has no digital signature or has an invalid digital signature. Such a message cannot be a genuine, bounced email message. For more information about BATV, visit http://mipassoc.org/batv/draft-levine-batv-03.txt. If email is handled by several appliances - for example, one appliance handles outgoing email, while another appliance handles incoming email - all the appliances need information about the signature seeds and signature lifetime. To distribute the information between your appliances, use the import and export features in the interface. 96 McAfee Email and Web Security Appliances 5.6.0 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336

Table 73
Option definitions
(continued)
Option
Definition
When an email has been
deferred and is being
retried
None
— Takes no action.
Deny connection
— Adds the sender to the Denied Connections list.
Deny connection and quarantine email
— Adds the sender to the Denied Connections
list, then forwards the email to a quarantine area.
Default value is
Deny connection and quarantine email
.
Response delay
When a tarpit action was selected, specifies the delay in responding to this email.
Default value is 5 seconds. This is often enough to deter an attack.
Maximum number of
recipients
When a tarpit action was selected, specifies how many recipient addresses each
email may have. Default value is 10.
Applies a delay if there are too many recipient addresses in the email message.
A directory harvesting
attack ...
Defines this type of attack. Default values are 5 failed recipients and 10%
accepted recipients.
Email that falls outside this specification is not considered to be an attack, so
no action is taken.
Bounce Address Tag Validation
Use this page to combat backscatter — bounced email that was not originally sent from your
organization.
Email
|
Email Configuration
|
Receiving Email
|
Bounce Address Tag Validation
If an Mail Transfer Agent (MTA) cannot deliver an email message, the MTA returns (or 'bounces') the
message to the sender using a return address in the message. Unfortunately, spam email messages
often have a forged (or spoofed) return address. The bounced email often goes to an innocent
organization. This type of email is known as backscatter. During a spam attack, your organization
might receive many such messages.
Benefits of using Bounce Address Tag Validation
Bounce Address Tag Validation (BATV) enables your organization to ignore any backscatter email
message by checking whether your organization was its original sender. The appliance can attach a
encrypted digital signature (or
tag
) to the SMTP MailFrom address on every outgoing email message.
When a bounced email arrives, the appliance searches for the digital signature, and rejects any
message that has no digital signature or has an invalid digital signature. Such a message cannot be a
genuine, bounced email message.
For more information about BATV, visit
http://mipassoc.org/batv/draft-levine-batv-03.txt
.
If email is handled by several appliances — for example, one appliance handles outgoing email, while
another appliance handles incoming email — all the appliances need information about the signature
seeds and signature lifetime. To distribute the information between your appliances, use the import
and export features in the interface.
Overview of Email features
Email Configuration
96
McAfee Email and Web Security Appliances 5.6.0 Product Guide