ietf-asrg
[Top] [All Lists]

Re: [Asrg] Re: Yet another attempt to fix forwarding

2008-01-30 18:59:25

On Jan 30, 2008, at 3:15 PM, Frank Ellermann wrote:

Douglas Otis wrote:

these records may also be applied against the Purported Responsible Addresses

Receivers can also apply them to the Message-ID and use the results as entropy source for /dev/random, but apart from a NOT RECOMMENDED statement in RFC 4408 this is unrelated to SPF.

It's also unrelated to "forwarding" (see subject), and how RFC 821 made sure that "forwarders" must take the responsibility for their actions (= by adding their host to the reverse path).

SPF advocates decided _not_ to adopt the revised record format that specifies scope. Scope clarifies applicability without a separately published declaration specific to Sender-ID. Most don't, as Sender-ID declares separate publication to be unnecessary. Concerns seemed focused upon how adoption of revised records would be perceived, and whether Sender-ID might then assert a leadership role. As it is now, Sender-ID declares older SPF versions to be a valid a means to indirectly authorize providers based upon the PRA, SPF recommendations not withstanding.

The difference between the provider and the provider's customer is extremely important.

Not for the reverse path, this was just a route to a mailbox of the "sender", a sender(_at_)host mailbox for MAIL FROM this host.

This still represents requirements for the provider's customers which might extend to the PRA, your assurances not withstanding.

When access depends upon an identity's indirect declaration of their authorized providers by way of address, privacy protection is clearly reduced.

The envelope sender address is used for non-delivery reports, FWIW it can be postmaster(_at_)host or postmaster+crypto(_at_)host or crypto(_at_)host, this has nothing to do with "privacy protection". If somebody can't receive mail he has no business to send mail, that's as it always was, and if you want real anonymity this needs considerably more effort than using a forged envelope sender (or 2822 PRA) address.

SPF records will never be revised to include scope, obsolete dangerous macros, or segregate IPv4 or IPv6 record sets. Restrictions based upon the PRA and MAIL FROM are being done in lieu of requirements based upon a provider's stewardship. Well managed MTA should permit their customer's latitude in the choice of addresses. Call back validation represents a similar menace. SPF specifically sets out to restrict choice. Restrictions placed upon customers are better at diverting complaints than controlling abuse.

When access depends upon an identity's declaration of authorized providers, the means for making this declaration resolves to the provider's customer, and not the provider.

Nobody is forced to declare which IPs they consider as permitted or forbidden for mails sent by them.

This depends upon acceptance requirements.

And if they do you can still use "your" 2822-From address where it pleases you as far as SPF is concerned. This won't work for PRA or SSP, but that's not my problem while talking about SPF and SMTP.

This remains a problem that SPF failed to confront, your efforts to sweep this under the rug not withstanding.

There are perhaps a few hundred thousand major providers, and yet there are millions of individual's email domains in use.

Yes, they can combine providers as they see fit in their policy, or never care about it if they have no problems with backscatter.

This assumes SPF records are used in an innocuous manner.

EHLO validation is yet another optional "feature" of SPF

Nope, it's RECOMMENDED, not "optional".

Okay, but would there be a need to recommend something that is required? SPF's sizeable overhead and dubious results doesn't help in this case either.

Does SPF really threaten your commercial "anti-spam" interests so much ? *Brilliant*

Actually, SPF threatens all services and is not specific to "anti- spam". DDoS remains a real concern imperilled by poorly considered protocols (SPF should not have been published, even as experimental without significant changes IMHO).

Making a difference is not impossible, and there is an effective means that affords greater freedom. Hold providers accountable. Require SMTP clients to confirm their domain's authorization. This removes questions related to which individual is sending the message. There is S/MIME and OpenPGP when identifying an individual is important.

Exchanging DKIM keys with providers represents another bad practice. Authorizations should be done by name, not address or key exchange. In addition, authorizations should not depend upon the identity used by the individual sending the message. With respect to DKIM, the i= parameter should be allowed to be opaque or anything at all, even when a provider asserts "ALL" or "STRICT" signing policies. Controlling abuse in an effective manner is the best way to eliminate a need for commercial anti-spam efforts. There are better things to do, after all. : )

-Doug










_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg