19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

E-mail bombs<br />

Chapter 13: Communication and Messaging Systems<br />

E-mail bombs attack by creating denial of service (DoS) conditions against<br />

your e-mail software and even your network and Internet connection by<br />

taking up a large amount of bandwidth and, sometimes, requiring large<br />

amounts of storage space. E-mail bombs can crash a server and provide<br />

unauthorized administrator access.<br />

Attachments<br />

An attacker can create an attachment-overload attack by sending hundreds<br />

or thousands of e-mails with very large attachments to one or more recipients<br />

on your network.<br />

Attacks using e-mail attachments<br />

Attachment attacks have a couple of goals:<br />

✓ The whole e-mail server might be targeted for a complete interruption<br />

of service with these failures:<br />

• Storage overload: Multiple large messages can quickly fill the total<br />

storage capacity of an e-mail server. If the messages aren’t automatically<br />

deleted by the server or manually deleted by individual<br />

user accounts, the server will be unable to receive new messages.<br />

This can create a serious DoS problem for your e-mail system,<br />

either crashing it or requiring you to take your system offline to<br />

clean up the junk that has accumulated. A 100MB file attachment<br />

sent ten times to 100 users can take 100GB of storage space. Yikes!<br />

• Bandwidth blocking: An attacker can crash your e-mail service or<br />

bring it to a crawl by filling the incoming Internet connection with<br />

junk. Even if your system automatically identifies and discards<br />

obvious attachment attacks, the bogus messages eat resources<br />

and delay processing of valid messages.<br />

✓ An attack on a single e-mail address can have serious consequences if<br />

the address is for an important user or group.<br />

Countermeasures against e-mail attachment attacks<br />

These countermeasures can help prevent attachment-overload attacks:<br />

✓ Limit the size of either e-mails or e-mail attachments. Check for this<br />

option in your e-mail server’s configuration settings (such as those provided<br />

in Novell GroupWise and Microsoft Exchange), your e-mail content<br />

filtering system, and even at the e-mail client level.<br />

253

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!