ietf-asrg
[Top] [All Lists]

Re: [Asrg] pre-rfc thought balloon: ESMTP DATA-CALLBACK (was ESMTP DATAFIRST)

2006-06-06 11:39:43

On Jun 6, 2006, at 9:13 AM, william(at)elan.net wrote:
On Tue, 6 Jun 2006, Douglas Otis wrote:
On Tue, 2006-06-06 at 00:26 -0700, william(at)elan.net wrote:

It is not about malware - there are actually ways to get rid of it that are fairly effective even now (most malware is easy to identify based
on common signatures).

But the filtering for the malware depends upon the DKIM signing domain.

Its not about DKIM or other signature scheme, you can identify malware right now quite effectively with existing tools and signatures I meant are not crypto but virus pattern recognition signatures (which only need to be tested against .exe and similar attachments). I'm also fairly certain 99.999...% of email users have learned enough directly or through friends to not open email attachments that need to be executed. We'd have to wait for some research measurements, but I'd not be surprised if virus infection rate through email is significantly on decline.

When the data is stored at the sender, no intermediary is able to "filter" this information based upon signatures. Many of today's viruses are also polymorphic and change rapidly. Client side filtering and precautions are required using this mode of delivery, placing a greater onus on the signing domain and the recipient. Parents still expect that their child will not damage their computer. Parental controls will need to limit access to specific trusted domains. DKIM verification clearly identifies who is being trusted. Business communications still place message security as a high priority which can also use the trust model.


The reputation of the DKIM signing domain must be good before attempting to access the data section. The other benefit of this approach is it will not require any DSNs. There is no need to bounce a message that is never transferred.

Yes and that is the main point of im2000 - don't get what you dont want.

With crypto signatures the overhead to calculate hash is actually a lot smaller then that required to do RSA, so in reality the crypto effort itself would be almost the same. But anything that can be done with non-crypto session authentication is going to have less overhead where as cryptographic public-key signatures offer most advantages when two end-nodes are not directly talking to each other.

Using the existing email infrastructure has several advantages. A transition to a store at the signing domain is appealing, but using SMTP for notification is not point to point. A few milliseconds per message signature checks does not appear to be an impediment.


The reality is that im2000 is generally alot better approach for email
infrastructure where you do not expect that every email would be
delivered.... The advantages are that it can offer:
  1. More effective per-ip and per-domain filters which are similar
     to current URI filters but here URL is that of data store.
     SPF-like verification based on URL location starts to work
     with no forwarding problems for multiple identities.

This is not a secure scheme.  SPF "like" verification has a rather

SPF-like includes CSV is you prefer to hear that. And this has nothing to do about your opinion on possible dns overhead with SPF which has not shown up to be a problem, in fact this does not directly has to do with SPF either. The scheme I mention verifies not the incoming server connection but location of the message store based on store address (for which in fact RMX or CSV would be better as far as their design but the reality is that people will use SPF anyway including for this). Very low overhead, effective and no forwarding side-effects.

When this is a transition using SMTP for notification, leveraging off of a suitable authentication scheme remains an important consideration. While SPF advocates often ignore possible packet amplification exploits, major networks have been brought to their knees by an DDoS exploit running at about 60x amplification. As it is now, SPF could easily achieve 300x while also thwarting ongoing efforts aimed at preventing the current exploit of the day. As more applications attempt to utilize SPF, this figure gets even more frightening. : 0

Of course, a URL could be required to use a host name which would exceed the protections of an SPF IP address authorization scheme, but without the serious risks. Within the underlying transfer protocol, simply require the use of host names. : )


  2. Zombies are no longer as effective as its necessary for such
     systems to be able to receive incoming connections and not
     only establish outgoing connections (as these systems must
     also be accessible through DNS).

Zombies have no difficulty establishing their own (highly transitory)
DNS infrastructure.  That too offers little protection.

You're missing the point. Go work for ISP and you'll know that its a lot easier to filter incoming ports end-users then it is to filter outgoing traffic for those users (a lot more complaints for the later).

There is still the issue of notification. Subsequent to sending the notification, obtaining the message body is the means to reach past firewall protections.


Necessity for DNS infrastructure is secondary and serves as extra barrier for spammers to overcome which BTW makes identifying zombies easier as you only need to monitor certain domains on regular basis (i.e. every 10 minutes for those "transitory" domains).

Agreed, which is why SPF is such a bad idea. SPF never assures the controlling domain is identified, making this scheme worse than worthless in many cases. A reputation check should be made prior to accessing the message content, and when verifying the DKIM signature.


  4. Better multi-party delivery that is done on per-site basis
     (this is related to current thread - on per-site common emails
     to multiple recipients can have shared referenced body part(s)
     and those can be retrieved by the site once and can be reused).

The concept in mind was to leverage efforts being made by the T10 group
on object storage to encompass the entire message body.
http://www.lustre.org/

That is OT to email infrastructure design and in any case no such complexity is going to be there for most who use email.

When attempting to provide supporting infrastructure, these types of object storage systems removes a major amount of the required development. The number of messages and maintenance overhead overwhelm a traditional file system or database. Why not take advantage of existing tools? When distribution of such a messaging system is not queue based, the alternative must be considered when done at a massive scale. Object storage has been engineered to address many of these issues, such as preventing replicate storage base upon content, handing automated archival and removal, etc.

In most cases the bandwidth saved would be rather small for a fairly
high amount of complexity.

Its the other way around actually especially as far as attachments go.

But an attachment would not be part of the display selection as you suggested. The attachment could simply be a MIME extension as suggested.


  6. Other advanced security choices available once communication
     between end-site and sender is possible...

Security would be part of any scheme.  DKIM is a good starting point.

Encumbered, oversimplified and limited by design - a lot worth then
it would have been, have it been a full IETF design effect like MASS
was supposed to provide for (which is how IETF usually operates,
i.e. designing protocol in open basis at WG). It is only now being
fixed and those fixes can not fully change some of the limitations
deliberately put in the WG charter.

Cheer up. You have good ideas. There is something to be said for a simplified approach however.

-Doug


_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg

<Prev in Thread] Current Thread [Next in Thread>