Sender validation is the only spam solution I know of that has the potential to eliminate 100 percent of a company's spam. There are many ways to implement a sender validation solution in your company. Sender validation can be implemented as a service or a dedicated server. The dedicated server can be installed in your company's DMZ, local area network (LAN), or in a colocation facility. Each configuration has its advantages and disadvantages. Your email environment will dictate the best sender validation configuration for your company.
In this chapter, we'll take a look at the cost justification of a sender validation solution, the estimated startup and maintenance costs, and the implementation steps necessary to set up a sender validation solution as a service or dedicated server. In addition, I'll provide best practices to follow after the sender validation solution is up and running.
Ideally, a sender validation solution should be installed on a dedicated server for the best performance and stability. If you have more than 100 users in your company, you probably want to implement any server-based anti-spam solution on a dedicated server.
Remember that any anti-spam solution will increase the load on an existing server. Often mail servers are already heavily loaded, and installing an anti-spam solution on the server will just make the situation worse. By installing a sender validation solution on a dedicated server, you ensure compatibility with other SMTP mail servers and reduce the risk of having the sender validation software conflict with existing mail services, such as antivirus software.
Expect to pay $1000 to $3000 for a name brand (such as Hewlett-Packard and Dell) server capable of handling a server-based sender validation solution for more than 100 users. Make sure to budget the time and cost to install the operating system (OS) on the anti-spam server. In addition, make sure you have adequate backup capacity to backup this additional server, an available port on your Ethernet switch, and the physical room to hold the server.
Of course, you must factor in the cost of the sender validation software. Most vendors sell their software by the number of users. For larger installations, many vendors offer a quantity discount. You can contact the software vendor directly to get the best deal. Expect to pay $5 to $30 per user for a sender validation solution. This option is less expensive than a spam filtering service but more than a non-sender validation spam solution.
The software cost is typically a one-time purchase cost. However, some sender validation vendors require an annual license renewal. This fee usually includes free technical support and upgrades during the maintenance period. Expect to pay 15 to 25 percent of the purchase price for maintenance and upgrades.
Fortunately, a sender validation solution is one of the easiest IT projects to cost justify, especially if you have more than 100 email users in your company. The return on investment (ROI) is usually less than a year, and in some cases, as little as several weeks.
The biggest selling point of a sender validation solution is the time savings secured by the end users. Consider the following simple example: A company with 200 email users implements a sender validation solution that costs $8000. On average, each employee of the company is paid $25 per hour. After implementing the sender validation solution, each employee saves 10 minutes per day because the employees do not have to wade through junk mail, are not constantly interrupted by "ding—new message" every 15 minutes, and are less likely to accidentally delete valid email messages. Based on these assumptions, the company's savings per day is:
200 users × $25 per hour × (10 minutes/60 minutes) = $833.33 savings per day
If you take the total cost of $8000 for the sender validation implementation and divide it by $833.33, it takes roughly 10 days to pay for the sender validation solution. Let's assume that this company works 5 days per week. In this example, the company will have an ROI of 2 weeks! It is difficult to identify any IT project that has a shorter ROI period.
Based on this simple example, the short ROI period should cost justify any sender validation project. The elimination of undesirable spam messages (pornographic ads) should also reduce coworker tension, and reduce the likelihood of a lawsuit issued against the company. The ROI for a company implementing a sender validation spam solution can be as little as 2 weeks.
In addition to the increased user productivity, there are other benefits of a sender validation solution. Reduced storage on your internal mail server is one such benefit.
A sender validation solution will reduce the storage requirements on your mail server because the junk mail will never reach the server in the first place. Reducing the amount of mail on the server has the following benefits:
Although there are many benefits that enable an organization to easily cost-justify a sender validation solution implementation, to truly compare sender validation solutions, you must consider the ongoing administrative costs. The following list highlights these considerations:
However, after the sender validation product is in place, there is very little ongoing maintenance. The most important maintenance item on the sender validation server is the backup of the sender validation database. This database contains all of the company's "approved senders." As long as this database is backed up, you should be able to quickly recover from any hardware problem.
Most of the sender validation solutions include an integrated junk mail box or Web interface to manage their junk mail. The initial training on a sender validation solution should be minimal. An hour training session to explain how sender validation works and how a user manages junk email should be more than adequate. Some users might not require any training.
After the initial end-user training costs, ongoing training costs are minimal:
Figure 3.1 illustrates a typical sender validation service implementation.
Figure 3.1: Sender validation filtering service implementation.
The following sections walk you through the sender validation service implementation steps.
Decide on the service to use. Make sure users are comfortable with the user interface. Ideally, test the service with your company's email to make sure it is a good fit for the company. Carefully review the administrative capabilities of the sender validation service before selecting a solution. During the evaluation phase, some sender validation companies can only filter certain email accounts with any remaining accounts set to a bypass mode. This setup allows the company to try before they buy so that they can identify any issues that might arise during the trial phase.
Decide whether you want to move the entire company over to the sender validation solution all at once or roll out the sender validation service in phases. The larger the company, the more likely you'll use a phased approach.
Depending on the skill level of your users, it might be necessary to train your users on how to use the sender validation service. Ideally, the training should take place just before their mailboxes are cut over to the service so that they will retain as much of the training as possible before using the actual service.
Select an initial cut-over date—ideally, on a weekend. This selection should allow enough time for the MX record change to propagate over the Internet. Before you make the change, consider reducing the time to live (TTL) for your existing MX record so that the change will propagate faster throughout the Internet.
If the service allows an upload of pre-approved senders, I suggest using this feature to reduce the number of messages in quarantine. Alternatively, if the service has a "learning mode," you can redirect all outgoing messages to the sender validation service and have any sender addresses automatically added to the approved senders list before turning on the sender validation service. Some services require a module on your existing server to forward the email addresses to their server for the approved list. This learning strategy will work better if your company sends mail to a set number of users on a frequent basis. I strongly suggest employing either one of these methods to upload a pre-approved sender list; otherwise, each sender must be manually validated. Manual validation is one of the reasons why early sender validation solutions developed a bad reputation.
You must redirect your MX record to the sender validation service's servers. The sender validation service's servers will then redirect your email to your internal server. I suggest setting up a backup MX record to your ISP's mail server so that the ISP can hold your mail if the sender validation service goes down. You can set a backup MX record directly to your internal server; however, if the service does not respond in a timely manner, mail will be directly delivered to your mail server, bypassing the sender validation service. In addition, if a spammer figures out that the backup MX record points directly to your mail server, the spammer can use the backup MX record to completely bypass your sender validation service.
Expect some issues to arise when turning on the sender validation service. Some users will require help adding users to their approved senders lists, and senders might have difficulty completing the validation process. Prepare your users for a dramatic reduction in mail messages. Some users think their mail might be broken because they don't receive any messages in their Inboxes.
You might want to increase or decrease the quarantine period for your messages based on your company's requirements.
If you have more than 100 users, consider a sender validation server-based solution. Running an internal sender validation server inside the company is usually more cost effective than paying a recurring monthly or annual fee for a sender validation service. The following list highlights steps for a sender validation internal server implementation:
To do so, you will need to answer the following questions:
Answers to these questions should help you determine the correct sender validation solution for your company. In addition, make sure users are comfortable with the user interface. Carefully review the administration capabilities of the sender validation package before selecting a solution:
Ideally the vendor is familiar with your mail server, firewall, ISP, and MX record changes. The more familiar the vendor is with your network, the smoother the transition.
Decide whether you want to move the entire company over all at once or rollout the sender validation server in phases. The larger the company, the more likely you will use a phased approach.
Depending on the skill level of your user base, it might be necessary to train your users to use the sender validation software. Ideally, the training should take place just before their mailboxes are cut over to the service so that they will retain as much of the training as possible.
You can place the sender validation server behind the firewall, in the DMZ, in front of the firewall, or in a co-location facility. If your firewall has the capability, install the sender validation server in the DMZ. Doing so allows the sender validation server to become the "sacrificial lamb" in case the server is attacked by hackers. This setup increases security because there is no direct email communication with your internal email server and the Internet for incoming mail.
Based on the sender validation software recommendations, order the server hardware that will safely support your company's email load and number of users. Don't forget to include a provision to backup the server, either with a dedicated tape drive or existing backup resource. Make sure you have an open Ethernet port on your switch and the physical space to accommodate the server.
Install the OS according the to the sender validation solution vendor's recommendations. Some packages are sensitive to OS version and service pack levels. Install any critical security patches on the server to protect it from hackers. Make sure that the OS configuration matches the sender validation requirements.
Install the sender validation server software on the server. Be sure to follow any special requirements during the installation process. After you install the software, test the sender validation server to make sure it's not an open relay. You can use the testing tool at http://www.ordb.org/submit/ for verification. Performing the open relay test will ensure that the new sender validation solution is not entered into an open relay database.
Select an initial cutover date that is on a weekend. Doing so will give you more time to reconfigure your firewall and test the sender validation server implementation. It also gives you more time to restore the firewall and servers to their original configurations in case something goes wrong. Make sure that the cutover dates coincide with end-user training.
Use the pre-approved senders list feature to reduce the amount of messages in quarantine. Alternatively, if the service has a "learning mode," you can redirect all outgoing messages to the sender validation service and have any sender addresses automatically added to the approved senders list before activating the sender validation server. Some services require a module on your existing server to forward the email addresses to the server so that the addressed can be added to the approved list. This learning strategy will work better if your company sends mail to a set number of users on a frequent basis. Without a pre-approved senders list, each sender must be validated manually. Manual validation is one of the reasons why early sender validation solutions developed a bad reputation. Create the list well in advance of uploading it to the server so that you have enough time to ensure the list is complete and accurate.
Before making any changes to the firewall, make sure you have a good backup of the firewall configuration. Doing so will allow you to quickly restore your current mail configuration if issues arise during the implementation. Figure 3.2 illustrates a sender validation server implementation in the DMZ.
Figure 3.2: Sender validation dedicated server in the DMZ.
Create the following NAT rule on the firewall for the sender validation server (assume that the MX record points to 38.1.1.1 and the internal address of the sender validation server in the DMZ is 10.1.2.100):
Create the rules on the firewall for the sender validation server that Table 3.1 shows (assume the IP address of the internal mail server is 10.1.1.1).
Source | Destination | Port(s) | Port and Description |
Any from the WAN | Sender validation server in the DMZ (10.1.2.100) | 25 (SMTP) and 80 (Web) | Allow incoming mail and Web traffic (Web-based validation) to the sender validation server from the public Internet |
Sender validation server in the DMZ (10.1.2.100) | Internal mail server (10.1.1.1) on the LAN | 25 (SMTP) | Allow the sender validation server to send mail to the Internal mail server |
Any from the LAN | Sender validation server in the DMZ (10.1.2.100) | 80 (Web) | Allow users to manage their quarantined mail using a Web-based interface |
Internal mail server on the LAN (10.1.1.1) | Sender validation server in the DMZ (10.1.2.100) | 25 (SMTP) | Allow internal mail server to send mail to the sender validation server in the DMZ |
Sender validation server in the DMZ (10.1.2.100) | Any on the WAN | 25 (SMTP) 53 (DNS) 80 (Web) | Allow sender validation server to send out mail to the Internet |
Table 3.1: Rules on the firewall for the sender validation server.
These rules might vary depending on the type of firewall and the specific requirements of your sender validation server package. These rules assume that the outgoing mail is forwarded by the internal mail server to the sender validation server so that the sender validation server can inspect the outgoing addresses and add them automatically to the approved senders list. Figure 3.3 shows a sender validation server on the LAN.
Figure 3.3: Sender validation dedicated server on the LAN.
Create the following NAT rules on the firewall for the sender validation server (assume that the MX record points to 38.1.1.1 and the internal address of the sender validation server in the DMZ is 10.1.1.2):
Create the rules on the firewall for the sender validation server that Table 3.2 shows.
Source | Destination | Port(s) | Port and Description |
Any from the WAN | Sender validation server on the LAN (10.1.1.2) | 25 (SMTP) and 80 (Web) | Allow incoming mail and Web traffic (Web-based validation) to sender validation server from the public Internet |
Sender validation server on the LAN (10.1.1.2) | Any on the WAN | 25 (SMTP) 53 (DNS) 80 (Web) | Allow sender validation server to send out mail to the Internet. |
Table 3.2: Rules on the firewall for the sender validation server.
These rules might vary depending on the type of firewall and the specific requirements of your sender validation server package.
If the sender validation server is in a co-location facility, establish a VPN connection to the server. That way, all traffic will be encrypted between your internal mail server, LAN, and the sender validation server. Figure 3.4 shows a sender validation server in a co-location facility.
Figure 3.4: Sender validation dedicated server in a co-location facility.
Create a VPN between the co-location firewall and the company firewall. It might be necessary to change your MX record to point to the public IP address of the sender validation server. Make sure to add a Reverse (PTR) record for your sender validation server to avoid mail delivery problems with other mail servers. Some mail servers perform a reverse lookup from the receiving mail server as a way to combat spam. If an MX record change is necessary, make sure to allow enough time for the MX change to propagate throughout the Internet.
As with the previous configurations, these rules might vary depending on the type of firewall and the specific requirements of your sender validation server package.
Any of these firewall changes can cause serious disruption in service and/or security holes if they are not created properly. If you do not feel comfortable with these changes, budget some time to have the firewall vendor, sender validation server vendor, or a qualified consultant assist you in the sender validation server implementation. Make sure to get a good backup of any firewall configuration before you begin so that you can quickly restore the original configuration if necessary.
Depending on the sender validation software requirements, you might have to re-route your outgoing mail through the sender validation server—especially if you want to take advantage of any auto-learning features. Some sender validation servers require that a module is installed on the mail server to enable this functionality. Check the sender validation server documentation for any other mail server modifications.
Activate the sender validation server for the desired number of users. Unless the company is very small, I suggest a two-phase approach. Turn on the sender validation software for a select number of users, then fine-tune the system. Create a document to address any of the questions. Before you activate the sender validation software for the remaining users, distribute this document to your end users to reduce the number of Help desk calls. When you activate the remaining users, the system should be fine-tuned to your company's email environment.
Have someone send you mail from a test account to test the following scenarios. You can use the same test mail account by simply adding/removing the email address from your approved senders list:
Proper testing of the sender validation server will ensure a successful implementation.
You might want to increase or decrease the quarantine period for your messages based on your company's requirements.
Make sure to check the backup status of the server to ensure that the server and sender validation databases are properly backed up.
After installation is complete, there are some additional tasks to be done. If you use best practices for these tasks, you will enjoy a successful sender validation implementation:
Save the pre-sender validation firewall configuration in case you must bypass the sender validation server in the future.
Ideally the entire sender validation server should be backed up; however if you're short on backup space, the approved senders database is the most critical information on the sender validation server.
Some users might experience such a dramatic decrease in spam they may think their incoming mail is not working.
Typically a user's "mental filter" looking at quarantine is 10 times faster than looking through an Inbox filled with spam.
Performance of the sender validation server is critical to ensure that mail is delivered in a timely manner and that the validation process is working. Make sure that the sender validation server has adequate disk space, processing power, and memory. Identify any bottlenecks by using tools such as the Windows Server Performance Monitor, and address bottlenecks as necessary.
In addition, review the backup logs to ensure that the sender validation server is properly backed up.
eCommerce and other first-contact situations can lead to false-positives because the senders typically do not respond to these emails. Train users to pre-approve the sender as well as to manage their quarantine to manually add these types of first contact senders to the "approved list." Some sender validation vendors are working on enhanced features to automate this process in the future.
In rare instances, a user might get a spam message. Some sender validation solutions can track who or how a sender was validated. This feature is a good place to start when tracking down how a spammer was added to the approved senders list. Make sure that your internal mail server will only accept incoming mail from the sender validation server; otherwise, a spammer can bypass the sender validation server to deliver spam.
Some sender validation solutions might support installation directly on the mail server in the future. Of course, you must be running a mail server that is supported by the sender validation solution. This option is attractive for companies with fewer users, because such companies do not have to purchase a dedicated server in order to implement a sender validation solution.
Another development on the horizon is the coexistence of a sender validation solution with firewall or anti-virus software. This develop will eliminate the need for a dedicated server for the sender validation solution. However, installing any service on top of a firewall will make the firewall less secure. It is less fault tolerant because you will lose multiple services if the firewall fails. If your firewall is already heavily loaded, a dedicated server is still the best solution.
Finally, a sender validation lite solution might become available on the market. Such a solution simply verifies that an email address belongs to a valid user and domain. It does not require a response from the sender. Although this option requires less processing power, it is easier to get messages past the spam filter by simply spoofing the sender's address.