ietf-asrg
[Top] [All Lists]

Re: [Asrg] What are the IPs that sends mail for a domain?

2009-06-22 02:34:37

On Jun 20, 2009, at 12:20 PM, Alessandro Vesely wrote:

Douglas Otis wrote:
SMTP is heavily abused, and soon IPv6 is about to become a necessity. To remain practical, connectivity must be based upon _immediate_ and _stable_ evidence of legitimate email operation, and not upon any number of authorization transactions. Each additional transaction to support an authorization scheme will be multiplied by the typical number of attempts made by abusive senders. This means providers need to exclude problematic users, and not become a task pushed toward recipients. Such pushing is not practical and often leads to unfortunate mistakes.

What do you mean by "problematic users"? Providers of residential cables, WiMAX, and similar connections could block or redirect port 25, just like most universities and companies do. They used to do it, as long as they provided mailboxes as a bonus and ISP and ESP were synonyms. Submission port 587 is not yet universally employed, and some customer may not accept to be unable to reach their favorite server's ports 25 or 465. "Blocking port 25 except for a set of servers used for submission" is not something that can be easily defined and maintained by ISPs, IMHO.

Each recipient will likely attempt to accept either none or some amount of public email based upon normal profiles. To remain on the safe size typical profiling, this requires the output issued by bad actors be mitigated in some fashion. This might be done by using rate limiting combined with disabling accounts faster than bad actors can re-subscribe. Funny how little anti-spam efforts concentrate on account setup. Things like Open-ID might help in this area, for example.

OTOH, sender identification by domain could also be a way to attribute responsibility. Strictly speaking, it is not necessary to use a domain in order to send as an SMTP client. However, in practice one needs an email address to do any legitimate use of SMTP, and hence a domain is required.

Technically speaking, a domain is not required for SMTP. CSV was to offer a DNS record type that explicitly declared a host as being an outbound MTA. This would not in itself prevent abuse, but would help to determine which compromised systems might be sending email and resolving which domain is administrating the MTA.

SPF does not work well at resolving a domain that should be held accountable for a few reasons-

a) risks high and impractical transaction overheads at attempts to indirectly reference the customers of a provider.

 b) may not qualify any specific IP address for a positive result.

c) Mail From or PRA references do not resolve which domain administered the MTA or actually sent the message.

d) holds customers of a provider accountable for the provider's stewardship without any solid evidence of their involvement.

Schemes that pass accountability onto what might be feckless domain owners are inherently evil.

I disagree, _provided_ accountability is actually passed on.

+1

There should be greater concern accountability is correctly applied.

The fact that a trusting and naive user had their domain authorize a provider just to have their email accepted, does not mean other messages emitted might not be mistaken as also belonging to that user's domain. Should providers check for SPF or Sender-ID compliance? How many SLA include this requirement? When the "passing-on" is based upon receptions at spam traps, acceptance reliance based on "authorization" is likely to downgrade acceptance of the domain, especially when A-R headers exclude the IP address of the provider. Will providers really care the wrong entity had been blamed?

You can never know whether that domain's owners are really so foolish to trust a criminal provider, rather than participating accessories. Assuming their bad faith, one should downgrade acceptance of their domain.

Who said providers need to be criminal for naive users to be harmed by SPF? A recipient may check PRAs, where providers may check Mail- Froms. Once a user's domain reputation is damaged due to receiver error, how can reputations be restored and then protected? When asked in the past, those customers are advised to obtain their own IP address.

What you appear to be thinking of is not accountability but mere identification (albeit moderately strong identification).
Moderately strong? Without knowing the IP address of the provider, it would be extremely foolish to conclude any level of identification assurance, especially "moderately strong".

IMHO, the domain registrants (resulting from whois records) provide an identification that is comparable in strength, but finer in granularity.


It is wrong to hold someone accountable for authorizing a provider once authorization becomes a requisite for acceptance. Users are thereby extorted into assuming risks well beyond their control.

Instead, providers should be held accountable by requiring CSV records with a limited number of EHLO host names over time.

This approach better defends receiving MTAs from abuse with lower overhead, and better controls DNS related exploits that threaten the entire Internet.

-Doug





_______________________________________________
Asrg mailing list
Asrg(_at_)irtf(_dot_)org
http://www.irtf.org/mailman/listinfo/asrg

<Prev in Thread] Current Thread [Next in Thread>