ietf-asrg
[Top] [All Lists]

[Asrg] Forged Paths...

2003-07-08 18:17:36

One of the big issues when it comes to spam is tracing where the message has originated from. Of course, this is complicated when people forge headers to try to obfuscate the origin of the e-mail.

What I propose is this:

During each jump on the path that the e-mail takes to arrive to the sender, each interim mail server digitally signs the path.

So, typically, the path goes like this:

<Server1>,<Server2>,<Server3>,etc.

What I propose is:

<Server1/Signature1>, <Server2/ Signature2>, <Server3 / Signature3>, etc.

The signature would use the servers public / private keys and would be computed over the paths up to that point. Thus, if you were server 3, you would digitally sign the path for server1, Server2, Server3.

Then if someone wants (or more specifically their software), they could request the public keys of the servers along the transmission path and ensure that the mail message actually took the path that the Path: header claims it did.

Yes, I am aware that one RFC says that headers aren't supposed to get above 900 bytes or so in length. I think that this will need to change eventually anyway, we might as well start now. In this way, we can ensure that each message has an originated server that may be tracked down. (Or the message simply gets rejected.)

Of course, this may be easily extended by adding a <User> to the path so it may be tracked back to the originating server and user.

I doubt that this would break many mail servers and even if it does, given an adequate amount of advance notice, I doubt it would be a problem anyway.

-Art

--
Art Pollard
http://www.lextek.com/
Suppliers of High Performance Text Retrieval Engines.


_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg



<Prev in Thread] Current Thread [Next in Thread>