ietf
[Top] [All Lists]

Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-10 17:30:06
At 06:07 PM 1/10/2004, Daniel Pelstring wrote...
       The administrator doing the blocking would be in the clear, since
they are authorized to access this computer (and are in fact authorized to
change this information, even if you disagree with the change.)

The law prohibits "intentionally cause[ing] damage without authorization, to a 
protected computer." The MX is not the "protected computer" in the discussion 
at hand. The "protected computer" is the computer of the email addressee. The 
MX is merely an intermediary.

By the logic you present, one could argue that no violation (of this law) would 
be present for hacking a backbone router and inserting a filter which dropped 
all incoming packets bound for any next hop, since that router would not be 
"damaged" under the definition given by 18 U.S.C. 1030, the "damage" only 
occurring external to that router. 

 The
provider of a blocking list would not have accessed this computer at all,
since they did not make the change.  The desires of the intended recipient
do not matter at all under this law, as they do not own the computer on
which the change was made.

The change interferes with the delivery of email to a "protected computer," 
i.e. the computer of the person to whom the email is sent. The ISP's mail 
exchanger is simply an intermediary. 

The RBL and DUL are quite clearly (and openly) designed and intended to be used 
to implement denial of service. Doing so with the explicit authorization of the 
email recipient would be legal. 

Using MAPS RBL and/or DUL is an act which "knowingly causes the transmission of 
a program, information, code, or command, and as a result of such conduct, 
intentionally causes damage ['impairment to the integrity or availability of 
data, a program, a system, or information'] without authorization, to a 
protected computer," a violation of 18 U.S.C. 1030. The "protected system" is 
the email addressee's, not the ISP's. If a recipient is not receiving desired 
email due to ISP use of the MAPS system, the ISP is guilty of unlawful denial 
of service. Not only the ISP, but also MAPS, is guilty of knowingly and 
intentionally damaging a protected computer.

A person may authorize, indeed ask, that spam be blocked upstream. With such 
authorization, an ISP is clearly free to block spam email. As I have already 
pointed out, it is irrational to claim that a addressee has authorized that 
_desired_ email be dropped. I have encountered exactly that situation due to 
use of the MAPS DUL. 

The MAPS system does not, and cannot, distinguish between spam email and 
legitimate, addressee desired email. It is a brute force system which throws 
the baby out with the bathwater.




<Prev in Thread] Current Thread [Next in Thread>