ietf-asrg
[Top] [All Lists]

Re: [Asrg] Iteration #3.

2010-02-06 11:55:51
Alessandro Vesely wrote:
On 05/Feb/10 20:10, Chris Lewis wrote:

-1. It is perfectly legal for an IMAP server to be at 127.0.0.1, but that doesn't produce an email address by the above rule.

If an installation configures that way, then they don't want abuse reports. If they do want them, they adjust how it's configured.

This argument is the opposite of what Derek said. That is, a convenience mailstore located on the recipient side of a message path may have no clue at all, and rely on its upstream servers for SPF/DKIM verifications, filtering, and reputation assessments.

This is not a problem. The mailstore owner either configures DNS to make it happen properly, or elects not to. Without necessarily having to involve the mailstore in the report flow.

And yet,

If we reset the discussion why do we maintain that reports have to be sent by SMTP/MSA? IMAP is better (see below).

You just did it again. This _forces_ technology dependence, requires that the mailstore implement abuse reporting mechanisms, and violates the whole idea of simplification so as to not dictate that any specific part of the mailflow other than the UA needs to know how to send an abuse report.

Spec #1 is _only_ how the UA finds out when TiS is enabled, and where to send SMTP'd reports (presumably ARFd). If you want to go back to IMAP, that undoes both resets and goes back to something that probably disenfranchises most installations from being able to do this.

-1. Even if I haven't got what DNSish thing you mean, if we discard the message path we cannot distinguish botnets from reliable servers. Inband authentication traces are the keystones for handling non-criminal spam.

All the message path information is in the ARF report, to be processed or not, as the abuse reporting service is designed. Including DKIM/SPF information etc. Well, yes, the body could be S/Mime'd or PGP encrypted, but the report probably has all it needs in the header anyway.

Your argument presupposes that the UA can distinguish such things. Usually it can't. Leave that to the report receiver.

Astute readers will notice that (1) is a trivially simple MUA hack, and
that (2) isn't necessary for many installations wanting TiS info (for
filter tuning) and don't forward them anywhere.

For filter training you also need "ham" type submissions,

Only if you're doing server-based Bayes and the abuse handling mechanism is separate from the inbound mail flow. You don't necessarily need user-end ham submissions if you can get at the mailflow.

which ARF is currently missing. In addition, you need to deliver uncertain messages, flagged as possible spam, e.g. in a "Junk" folder.

Although similar, the topic of how to properly synchronize server side filtering with client's Bayesian data is different from the idea of generalizing FBLs. My understanding is that this topic primarily concerns IMAP, since webmail and POP3 have no provisions for synchronizing contents.

It's in the ARF, so synchronization isn't necessary.
_______________________________________________
Asrg mailing list
Asrg(_at_)irtf(_dot_)org
http://www.irtf.org/mailman/listinfo/asrg