RMX method validity and alternatives (was Re: [Asrg] Declaration to the world)
2003-03-07 04:45:52
Chris Lewis a écrit:
Pierre BRUA wrote:
http://www.monkeys.com/anti-spam/filtering/additions.html
Read a little further. It only works reliabily enough to be worthwhile
for a very limited number of very large domains.
That's what it has been used for by monkeys.com, since they (of course)
cannot take the time to implement rdns data for everyone.
Even if this was RFC'd
into some sort of DNS convention or extension, it's trivially bypassed
by the spammer choosing envelope senders that don't participate in the
convention.
And such envelope sender domain owners, knowing it has been abused by
spammers, would likely implement rdns records sooner or later, or being
listed in blacklists of domains abused by spammers _and_ do not apply
the rdns rfc.
If a domain is abused by spammers, it means for the domain owner
millions of dns queries to verify that the domain really exist, bounce
messages from everywhere, complaints, and so on. It doesn't get
unnoticed and has quite a high network/server load cost anyway.
I know people whose domain has been abused like that and I can assure
you they have spent a lot of time clearing the mess.
They tried to locate the spammer and intent legal actions, but the
spammers have already disappeared at that time.
Given that, for example, huge chunks of the internet don't
have [r]DNS at all, it's pretty clear it'd never become widespread
enough to be long-term useful.
Open relays were quite widespread at a time, now there's only around
250k of it, compared to the millions of mail servers, and most are
referenced in anti-spam blacklist databases.
You can check some statistics at http://www.ordb.org/statistics/
RMX may follow the same evolution, we will know if we try it.
In other words, anything that relies on a significant fraction of the
non-spammers to do something is doomed to failure.
For getting mail, non-spammers have to do a lot of things, and they have
no way not to do it and get working domains, namely :
- Get a domain name and pay for it.
- Get DNS servers that manage their domains
- Get MX records associated to the domain name
- Get the mail server listed on the MX records to be there and receive
emails for the domain from the internet
- create the mail accounts
- maintain valid contacts for domain renewal
Do you feel that optionnaly maintaining an added RMX record would be too
much ? For most domains it would be set to the MX and/or the network of
the ISP customer.
Yes, the technique can be useful sometimes in specific situations. But
not well enough to enshrine into long-term standards, and useless the
day after publication.
At least, it will stop domain names from being abused by spammers in
From headers. Spammers could today DDoS most mail servers on the
internet with such a method, and noone seems to care.
If you talk to aol, hotmail or yahoo support and marketing teams about
how bad their company is viewed by internet users due to forged from
headers ("I receive plenty of spam from aol and hotmail"), and how much
bounce/network overload they get related to spammers forgeries, you
would see it would be a significant improvement already.
Spammers could always use reply-to for domains they have no
authorization for, but that would matter quite less.
There's a similar heuristic, which is probably more effective in
blocking spam - that is, for selected domains, _insist_ that the
argument to HELO matches the peer's rDNS domain name in some fashion.
The fact that it currently stop some spam is a side-effect, like if you
say : I don't accept mail from people who have few mail server
configuration skills (bad hostname) and/or who are on a network managed
by someone with low network skills (bad or no rdns records).
If you prefer that point of view, this is almost equivalent to a
blacklisting of the IP adresses listed on
http://www.rfc-ignorant.org/how_to_ip.php
This heuristic is also in no way related to the server authority to send
mail from a certain domain.
But again, while it's currently useful for some specific sites (eg: AOL,
Hotmail/MSN, Yahoo), it's too easily bypassable and compliance will
never be widespread enough to enshrine into public standards.
This is an interesting point. If I understand you well, you say that
spammers will choose domain names that have no rmx records to spam. Like
when they use open relays.
This give a choice to the recipient.
For example, I can use to implement a email validity confirmation
request (like tmda.net) for only domains who do not implement rmx
records or are not blacklisted due to their spamming activity.
This suppress the burden of confirmation for correct domains.
I think (but I understand it may not be your choice) that we are not
defining a tool that will be perfect or 100% efficient, but one that
give us quite more control of what we (as mailbox users) choose to receive.
Pierre
--
PARALLINE /// Parallelism & GNU/Linux
///
71,av des Vosges Phone:+33 388 141 740
F-67000 STRASBOURG Fax:+33 388 141 741 http://www.paralline.com
_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg
|
|