Welcome!

Linux Authors: Pat Romanski, Carmen Gonzalez, Elizabeth White, Jnan Dash, Yeshim Deniz

Related Topics: Linux

Linux: Article

Spam and the Linux Desktop

Dealing with unsolicited commercial e-mail as a Linux desktop user

It's a fact of life for most of us: we all receive e-mail solicitations to "Make Money Fast" or for a "Mail Order Drugstore" or offensive or adult content that makes us blush, especially when a colleague is looking over our shoulder. Spam, a slang term for Unsolicited Commercial E-mail (UCE), has reached epidemic proportions. It clogs our inboxes and saps our productivity. I have a long history with spam - in a former career I was a "net abuse cop" for a large ISP.

In those days spammers (the accepted slang term for bulk mailers sending UCE) spent their time harvesting message headers from Usenet newsgroups and sending solicitations to those who had posted on topics ranging from computers to religion. Soon enough the spammers improved or, more accurately, became more insidious in their tactics to get their unwelcome messages into your inbox. That's why this month's installment of Dr. Migration is dedicated to spam and the Linux desktop.

SPAM Prevention Strategies

Dealing with spam is not only a Linux problem, it affects users of Macs, Windows, and Unix workstations as well as cell phone users who utilize e-mail to SMS (short messaging service) text messaging. Everyday spammers are scheming to fill our e-mail boxes with various solicitations for a cadre of products. That's why you should take as many precautions as you can to prevent junk e-mail. Many of these precautions are platform independent and are ways to improve your life on the Internet.

Protect Your E-mail Address

It may sound like an obvious precaution but many people don't guard their e-mail address with the same vigilance they protect their phone number or their address. Once you share your e-mail address, you trust that the person or organization will only utilize it for the prescribed use. Be sure to read the fine print in their offers or you may unknowingly agree to be on a mailing list.

My point is, when giving out your e-mail, you should verify that it won't be shared or find out what exactly the prescribed use is. My strategy is that when I do share my address with a source that I know little about, I use my secondary e-mail address. This is a second e-mail address that has little value to me if it becomes overwhelmed since I simply change it. I then check this e-mail address only when I feel I might be receiving information that I requested regarding a product or service. Then my daily work and personal e-mail boxes aren't subject to the abuse that this address often receives. I think many of us do this already, but those who don't and suffer from an inordinate amount of junk mail may want to start the practice.

HTML E-Mail: Don't Download Images from the Server

When you receive an HTML e-mail, besides the obvious message, bulk e-mailers often use a register bit that is usually a small transparent image that, when you view the message, loads and then alerts them that you have read that e-mail. This helps them understand which of their messages successfully reaches an end user and qualifies that e-mail address as a target for further advertisements. One way to prevent this is to not download images from the server. Three popular e-mail clients for the Linux desktop - Kmail, Thunderbird, and Evolution - enable you to turn off the accessing of Internet resources from the body of the e-mail, defeating this information-gathering campaign.

E-Mail Attachments: Be Aware of Worms and Viruses

One of the things that we are all very cognizant of (or should be) from the perspective of a Windows desktop is the risk of viruses. It's not uncommon to see news stories describing the damage caused by the latest Windows virus, and these viruses cause millions of dollars of damage. However, just because you are running a Linux desktop doesn't mean you should be lax in your approach to e-mail attachments and their hidden payloads. The fact is that a Linux virus doesn't get near the bang for the buck as a Windows virus because the Linux desktop user is in the minority. Authors of these malicious programs receive less notoriety by propagating their viruses on the Linux desktop simply because their target is substantially smaller. Also, if you are running a Linux desktop, you may just be an unwitting carrier of viruses. Since you'd be impervious to a virus that exploits VB script or ActiveX you may simply be passing it on to a colleague who reads mail on a Windows PC. So do take precautions when forwarding on the latest joke, or any document for that matter.

Alternative Office Advantage: Word Versus OpenOffice

In earlier versions of Microsoft Word, viruses prevailed by exploiting the macro language (WordBasic) and then causing global changes to the desktop. Later versions of Word ask if you would like to enable macros or not. However, being quick on the draw and clicking through these warnings as many people still do may cause problems.

If you are still using a Windows desktop, consider using OpenOffice on Windows as your primary word processor. The reason is that when you receive an attachment that you think might be suspect, you could open it in a program that is less likely to be exploited. OpenOffice has a macro language but it differs from the one that Word uses. This difference would insulate you from that type of attack. The problem is that over time the increased popularity of these alternative office suites will probably result in targeted attacks from unscrupulous programmers. In the near term, reading the Microsoft Office documents that you receive from unfamiliar sources or even those that you know in OpenOffice may be a good preventative measure.

Server-Side Spam Filtering

E-mail servers are often thought of as electronic post offices that simply route mail to individual users, no questions asked. However, e-mail servers can also incorporate other protective measures like virus scanning and spam filtering to protect you, the end user, from malicious or time-sapping e-mail that you never care to see. Applying a preventative measure at the server saves users from having to deal with spam and viruses on an individual basis. You may want to work with your mail administrator to incorporate some simple rules to remove some of your junk e-mail. One tactic is to verify that the mail server sending you e-mail has a valid DNS entry. Much of today's UCE comes from illegitimate sources, not from a credible mail server that ISPs or businesses use. Most system administrators will have some additional ideas on what the common tactics are for avoiding this mail.

My best advice for dealing with spam is that if the e-mail never gets to your inbox, it can't sap your time dealing with it. Also, qualifying the mail as potentially suspect upon arrival to your e-mail box can be helpful as well. One of the most effective measures I have taken is to flag potential spam and then filter that out of my inbox for further review. I accomplish the server-side filtering through SpamAssassin, a popular open source project.

SpamAssassin

(http://spamassassin.apache.org/)

Probably the most popular open source application for server-side spam filtering is SpamAssassin. It allows you to filter e-mail and make decisions on the server or as a mail agent running locally that qualifies e-mail before it reaches your inbox. SpamAssassin uses a number of tactics to identify spam. These tactics include:

  • Header analysis: Tries to identify the mail headers of a message for information that might indicate the e-mail message is suspect.
  • Text analysis: Works much the same way as header analysis. SpamAssassin identifies patterns that may indicate a message is spam.
  • Blacklists: Many community organizations provide lists of known spammers and e-mail domains that have been known to send spam. These blacklists can be used by SpamAssassin to filter UCE offenders qualified by a volunteer network.
  • "Learning" rules: SpamAssassin also has the ability to "learn" what might be spam and to use the probability of what might be spam to classify it as such.
I use SpamAssassin for my corporate e-mail server. Based on some training it sends e-mail to me with the designa-tion of "[Spam]" in the subject line preceding the original subject so I can filter those messages to a local folder and scan to make sure they are all junk mail and not important. The reason I do this rather than just deleting [Spam]-labeled subjects is to avoid what is known as a "false positive," which means based on my criteria it seems that the e-mail is spam but in fact it's a legitimate e-mail. I very seldom find an error in the logic but, as in most automated systems, there is some fallibility, especially if you try to be overly aggressive in your filtering.

Challenge Base Response

As anyone who has ever sent an e-mail to my LinuxWorld address knows, you'll receive a polite but pointed message that asks you to explain why you want to contact me. This service is provided by my ISP (Earthlink's Spamblocker); all e-mail sent to me is first filtered by Brightmail (www.brightmail.com), a spam-filtering service that forwards all suspected spam to my server-side spam folder. Then anything that it's unsure of goes into my suspect queue and waits for my intervention before it's downloaded. Those who send e-mails that arrive in my "suspect queue" receive a request for more information. While initially this prospect horrified me as being incredibly unfriendly, I have rarely if ever received a complaint. It's an unfortunate necessity of using e-mail these days. It also is another way you can keep junk mail from reaching your desktop.

Linux E-Mail Clients

One of the must-have features in e-mail clients these days is the ability at some level to have a spam filter or at least the ability to add filters to handle spam in a more efficient fashion. The most common e-mail clients for the Linux desktop are all able to filter and in some cases include anti-spam facilities. The following round up is a short primer on how to deal with spam with three common Linux e-mail clients.

Thunderbird

(www.mozilla.org/products/thunderbird/)

Thunderbird is an extension of the Mozilla project (www.mozilla.org) offering a robust e-mail client packed with features and capabilities that rival any commercial application. Also, Thunderbird is available for Windows, Mac OS X, and Linux, so if you are still considering the move to Linux you can try out Thunderbird today on your non-Linux desktop, and then still be able to use the same client when you move to Linux.

Thunderbird is probably the most advanced of any Linux e-mail client in its spam-filtering abilities. Thunderbird has junk mail controls that are very effective in detecting and acting on unsolicited e-mail. Spam can then be detected and deleted or stored in a folder for later review in the event of a false positive. Also, Thunderbird has a way to "whitelist" e-mail so you can be assured that e-mails from a certain address never get "wrongly imprisoned" by your spam filters. One innovative feature in Thunderbird is the option to use adaptive filters that can analyze incoming messages and flag those likely to be junk e-mail (see Figure 1).

Evolution

(www.novell.com/products/evolution/)

Novell's Evolution e-mail client is one of the most popular e-mail and PIMs (Personal Information Managers) for Linux. While there are no specific filters in Evolution there are many ways to prevent spam from clogging your Evolution inbox. Most definitely you should choose not to allow the loading of images from the network as referenced earlier. In Evolution, under the Evolution Settings -> Mail Preferences -> HTML Mail you should check "never load images off the Net" or "load images if sender is in address book" (see Figure 2).

Just because Evolution doesn't include a spam filtering system doesn't mean you're out of luck. Actually Evolution has a powerful filtering system that can access spam filters outside the program. Many Linux users have been successful in allowing Ximian to access bogofilter (www.bogofilter.sourceforge.net) via a wrapper script and then using bogofilter for a statistical process known as the Bayesian technique to make decisions on what is and is not spam. Also, the same SpamAssassin that I highlighted for server use could be used on your Linux desktop in conjunction with Evolution and the mail filters in Evolution.

KMail

(http://kmail.kde.org)

KMail, which is part of the KDE desktop, is also a popular Linux e-mail client and while there is no anti-spam features included in the current release, the next version of KMail will add an "Antispam Wizard," which if you have the capability now I'm sure your e-mail will never be without it again (see Figure 3).

Web-Based E-Mail Clients

Since you may be migrating to Linux gradually, you may still be working between two operating systems. So downloading and storing mail in one system versus another may not be in your best interest while you're in transition, or maybe you've decided to store your e-mail on a server that has scheduled backups. This approach is very advantageous because you can access your e-mail from almost any Web browser on numerous platforms. Also, it's a step in the direction of centrally managed applications and data that, I believe, improves the potential success of desktop PC users on most any platform. Also, by keeping data on the server rather than on disparate desktop PCs, you can have it managed consistently across an organization, applying spam filtering and virus checking on the server rather than at each individual user's desk. This approach is usually more efficient than each user doing it on an individual basis.

That's why solutions that offer server-side management and storage like IMAP (Internet Message Access Protocol) are valuable, because they allow you to access messages as if they were local but require a network connection to do so. There are a number of solutions for doing this. If you have a POP or IMAP server you can use a number of popular "free" Web interfaces including Squirrel Mail (www.squirrelmail.org/), Neomail (http://sourceforge.net/projects/neomail/), or the full-featured Horde Project (www.horde.org). The bottom line is that reducing the complexity of the PC desktop makes it easier to choose which platform you want to use, avoids vendor lock-in, and improves your ability to choose how you will accomplish your desktop computing goals.

Summary

No matter what your platform or your e-mail client preference, spam is a fact of life. Hopefully you're already using some of my prescribed methods to reduce your spam burden. If not, you might have something to think about when you finish this article. My best advice for dealing with spam: prevent it from entering your inbox in the first place. Deal with it at the server level, where you can provide an enterprise-wide blanket of protection from spam and viruses, then be vigilant on your desktop to keep malicious programs out of your workspace.

Additional Resources

  • http://spam.abuse.net
  • http://spamcop.net
  • www.cauce.org

    SIDEBAR

    SCALIX: Server-Based E-Mail and Calendaring

    Scalix, an enterprise messaging company, headquartered in San Mateo, CA, believes that Linux is the ideal platform to build messaging solutions based on the openness and security of the platform. However, they also recognize that users migrating from Windows to Linux are going to encounter differences between the two platforms; their solution is to provide a robust Web-based interface. They also provide a Web client, Scalix Web Access, that is more robust than many Web-based e-mail clients and allows you to work in the three-pane type of environment your current mail solution uses rather than in a single Web page.

    This next-generation Web interface including calendaring is a viable alternative to traditional e-mail clients. In addition, Scalix includes hooks for easy integration of third-party spam filtering additions.

  • More Stories By Mark R. Hinkle

    Mark Hinkle is the Senior Director, Open Soure Solutions at Citrix. He also is along-time open source expert and advocate. He is a co-founder of both the Open Source Management Consortium and the Desktop Linux Consortium. He has served as Editor-in-Chief for both LinuxWorld Magazine and Enterprise Open Source Magazine. Hinkle is also the author of the book, "Windows to Linux Business Desktop Migration" (Thomson, 2006). His blog on open source, technology, and new media can be found at http://www.socializedsoftware.com.

    Comments (1) View Comments

    Share your thoughts on this story.

    Add your comment
    You must be signed in to add a comment. Sign-in | Register

    In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


    Most Recent Comments
    Dan Jacobson 10/19/04 03:36:18 PM EDT

    Well, who's going to send you email if they have to pass a quiz or you keep changing your address.
    http://jidanni.org/comp/spam/index_en.html

    @ThingsExpo Stories
    The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
    Technology is enabling a new approach to collecting and using data. This approach, commonly referred to as the "Internet of Things" (IoT), enables businesses to use real-time data from all sorts of things including machines, devices and sensors to make better decisions, improve customer service, and lower the risk in the creation of new revenue opportunities. In his General Session at Internet of @ThingsExpo, Dave Wagstaff, Vice President and Chief Architect at BSQUARE Corporation, discuss the real benefits to focus on, how to understand the requirements of a successful solution, the flow of ...
    "People are a lot more knowledgeable about APIs now. There are two types of people who work with APIs - IT people who want to use APIs for something internal and the product managers who want to do something outside APIs for people to connect to them," explained Roberto Medrano, Executive Vice President at SOA Software, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
    We’re no longer looking to the future for the IoT wave. It’s no longer a distant dream but a reality that has arrived. It’s now time to make sure the industry is in alignment to meet the IoT growing pains – cooperate and collaborate as well as innovate. In his session at @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, will examine the key ingredients to IoT success and identify solutions to challenges the industry is facing. The deep industry expertise behind this presentation will provide attendees with a leading edge view of rapidly emerging IoT oppor...
    In this Women in Technology Power Panel at 15th Cloud Expo, moderated by Anne Plese, Senior Consultant, Cloud Product Marketing at Verizon Enterprise, Esmeralda Swartz, CMO at MetraTech; Evelyn de Souza, Data Privacy and Compliance Strategy Leader at Cisco Systems; Seema Jethani, Director of Product Management at Basho Technologies; Victoria Livschitz, CEO of Qubell Inc.; Anne Hungate, Senior Director of Software Quality at DIRECTV, discussed what path they took to find their spot within the technology industry and how do they see opportunities for other women in their area of expertise.
    DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential.
    The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, data security and privacy.
    Wearable devices have come of age. The primary applications of wearables so far have been "the Quantified Self" or the tracking of one's fitness and health status. We propose the evolution of wearables into social and emotional communication devices. Our BE(tm) sensor uses light to visualize the skin conductance response. Our sensors are very inexpensive and can be massively distributed to audiences or groups of any size, in order to gauge reactions to performances, video, or any kind of presentation. In her session at @ThingsExpo, Jocelyn Scheirer, CEO & Founder of Bionolux, will discuss ho...
    The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
    Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective storage designed to handle the massive surge in back-end data in a world where timely analytics is e...

    ARMONK, N.Y., Nov. 20, 2014 /PRNewswire/ --  IBM (NYSE: IBM) today announced that it is bringing a greater level of control, security and flexibility to cloud-based application development and delivery with a single-tenant version of Bluemix, IBM's platform-as-a-service. The new platform enables developers to build ap...

    Building low-cost wearable devices can enhance the quality of our lives. In his session at Internet of @ThingsExpo, Sai Yamanoor, Embedded Software Engineer at Altschool, provided an example of putting together a small keychain within a $50 budget that educates the user about the air quality in their surroundings. He also provided examples such as building a wearable device that provides transit or recreational information. He then reviewed the resources available to build wearable devices at home including open source hardware, the raw materials required and the options available to power s...
    The Internet of Things promises to transform businesses (and lives), but navigating the business and technical path to success can be difficult to understand. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, demonstrated how to approach creating broadly successful connected customer solutions using real world business transformation studies including New England BioLabs and more.
    Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use cases.
    Enthusiasm for the Internet of Things has reached an all-time high. In 2013 alone, venture capitalists spent more than $1 billion dollars investing in the IoT space. With "smart" appliances and devices, IoT covers wearable smart devices, cloud services to hardware companies. Nest, a Google company, detects temperatures inside homes and automatically adjusts it by tracking its user's habit. These technologies are quickly developing and with it come challenges such as bridging infrastructure gaps, abiding by privacy concerns and making the concept a reality. These challenges can't be addressed w...
    The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DNS lookup loading complex sites necessitates hundreds of DNS queries. In addition, as more internet-enabled ‘Things' get connected, people will rely on DNS to name and find their fridges, toasters and toilets. According to a recent IDG Research Services Survey this rate of traffic will only grow. What's driving t...
    The Internet of Things is a misnomer. That implies that everything is on the Internet, and that simply should not be - especially for things that are blurring the line between medical devices that stimulate like a pacemaker and quantified self-sensors like a pedometer or pulse tracker. The mesh of things that we manage must be segmented into zones of trust for sensing data, transmitting data, receiving command and control administrative changes, and peer-to-peer mesh messaging. In his session at @ThingsExpo, Ryan Bagnulo, Solution Architect / Software Engineer at SOA Software, focused on desi...
    "For over 25 years we have been working with a lot of enterprise customers and we have seen how companies create applications. And now that we have moved to cloud computing, mobile, social and the Internet of Things, we see that the market needs a new way of creating applications," stated Jesse Shiah, CEO, President and Co-Founder of AgilePoint Inc., in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
    The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series data. By focusing on enterprise applications and the data center, he will use OpenTSDB as an example t...
    The industrial software market has treated data with the mentality of “collect everything now, worry about how to use it later.” We now find ourselves buried in data, with the pervasive connectivity of the (Industrial) Internet of Things only piling on more numbers. There’s too much data and not enough information. In his session at @ThingsExpo, Bob Gates, Global Marketing Director, GE’s Intelligent Platforms business, to discuss how realizing the power of IoT, software developers are now focused on understanding how industrial data can create intelligence for industrial operations. Imagine ...