ietf-asrg
[Top] [All Lists]

Re: [Asrg] draft-irtf-asrg-criteria is missing Outbound MTA definition.

2009-06-29 14:54:48

On Jun 29, 2009, at 1:12 AM, Ian Eiloart wrote:
--On 26 June 2009 11:37:21 -0700 Douglas Otis <dotis(_at_)mail-abuse(_dot_)org> wrote:

This draft fails to include a definition that encompasses a crucial and safe point of control essential for effective spam mitigation. The missing definition is that of the Outbound MTA, the entity granting access and facilitating public SMTP exchanges to other domains. Email-Arch's definition tends to understate the role with: Outbound MTA, an MTA that relays messages to other ADMDs.

Defining an "outbound MTA" would be useful, I guess.

See:
http://www.killerbees.co.uk/draft-irtf-asrg-criteria-00.html#anchor9

A definition for spam sources should acknowledge RFC 5321 Sender is not the _only_ identifier that might be used to manage spam. It may even prove impractical or unsafe to attempt to check where a message may have been created and initially entered, as Section 1.3.1 definition for Sender seems to imply.

This Sender definition runs afoul of several SMTP concepts. The RFC 5321 Sender does not define persons, automated-systems, or groups that create or enter messages. The Mail command defines an error notification path (reverse-path) and not a person, automated-system, or group responsible for having created or entered the message. In fact, the error notification path might be NULL in some cases. This can not be referring to the EHLO command, since this would be the SMTP client, and not not a person, automated-system, or group responsible for having created or entered the message. By even using the word "Sender" and implying this identifies a person, automated-system, or group responsible for having created or entered the message confuses RFC 5321 identifiers with those of RFC 5322. One might assume that redefinition of RFC 5321 is the underlying intent of this draft.

Rather than misusing the term "Sender", perhaps the term "RFC 5321 Originating Identifiers" would be better. A list of Originating Identifiers could include those expressed by either RFC 5321 MAIL or EHLO commands.

Omission and erroneous definition may have a tendency to preclude other options. While no one likes to find the outbound MTA they are using has been blocked for policy reasons, it is often possible to rectify this by obtaining access to a different outbound MTA. When the domain used in an email-address is blocked for policy reasons, rectification may require abandonment of the email-address domain instead. There are no perfect solutions. Policy based upon the EHLO command, rather than the Mail command, may provide more efficacious, practical, and scalable solutions than policies based upon the MAIL command. This draft should not preclude the use of the EHLO identity, nor misconstrue MAIL command assertions.

What level?

The paper isn't discussing particular proposals, but you seem to be saying that it should. It's discussing certain desirable properties of proposals. Perhaps you're looking for more detail, or something closer to an actual solution.

The draft should drop its current definition of Sender. Spam does not just originate from purported RFC 5321 Senders, nor is it safe to assume that an MTA authorization referenced by an RFC 5321 Sender asserts where a message was initially created and entered. Authorization does not provide this property.

If you want to say that a desirable proposal would be scalable, then that's fine. If you want to say that SPF doesn't scale for a particular reason, then that's outside the scope of this proposal.

Stronger statements along the lines of scaling might be helpful. It seems increasing potential DNS transactions by an order of magnitude or more has not been given adequate consideration in some anti-spam efforts. :^(

-Doug



_______________________________________________
Asrg mailing list
Asrg(_at_)irtf(_dot_)org
http://www.irtf.org/mailman/listinfo/asrg

<Prev in Thread] Current Thread [Next in Thread>