spf-discuss
[Top] [All Lists]

Re: Email ID Declaration - Summary of Objections

2005-05-23 16:42:50
At 05:30 PM 5/23/2005 -0400, Mark Shewmaker wrote:
On Mon, May 23, 2005 at 11:53:40AM -0700, David MacQuigg wrote:
> At 01:05 PM 5/23/2005 -0400, Mark Shewmaker wrote:
>
> >So again, how *exactly* does an ID claim from an untrusted party help me
> >accomplish my listed goals?
>
> What you have listed as goals, the authentication of specific identities, I
> regard not as goals, but as means to accomplish a goal.

No, those really are my goals.

If you're fixating on the fact that I'm mentioning spf in my goals, then
I can reword:

For the reject-if-forgery goals (the first three of my six listed goals),
I want to:

1.  Reject because of the EHLO argument if it's forged according
    to the helo domain owner's rules.

2.  Reject because of the MAIL FROM argument if it's forged according
    to the MAIL FROM domain owner's rules.

3.  Reject because of the PRA argument if it's forged according
    to the PRA domain owner's rules.

How does your ID proposal get me reliable knowledge of the exact
definitions of forgery from these three separate parties for these three
separate arguments without use of an additional reputation server that
says I can trust the ID domain's hearsay claim about these other domains?

If the declared ID authenticates, then we have our responsible party. We don't need the other identities, unless the ID owner expects them to be checked.

You keep saying that the ID declaration is hearsay. I don't understand what you mean by that word. To me, it means information which is passed on, rather than provided first-hand. The declared ID is always first-hand information. The MAIL FROM and header information is passed on by forwarders. The domain in control of the sending MTA puts its own ID in the SMTP session. There is no excuse for using someone else's ID, even when forwarding on behalf of some other domain.

I'm not sure I fully understand your objection, but if you can put it in a short, clear statement, I will include it in my summary. Here is my attempt to summarize.

Objection: As a receiver, I may want to run some authentication methods that are not listed in the record provided by the owner of the declared ID. Having a declared ID won't help me do that.

Response: It would most likely be a waste of time to look for authentication records for methods that the declared ID doesn't list. If an acceptable method is not listed, the mail should be rejected. Note: What constitutes an acceptable method is up to the receiver, but it could well depend on the ID's reputation. You might insist on rigorous checks for B-rated domains, and just a quick check for A-rated domains. The assumption is that an A-rated domain knows what it is doing, and any failure of their approved quick check would lower their reputation.


> I would state the goal as "authenticating an offered identity, using
> whatever method is offered by that identity and is acceptable to me".
> This is a goal all methods can share.

Sorry, that's way too vague for me.

In any event, "an" makes it sound as if there's just one thing to
authenticate, which is clearly insane.

The record for a declared ID may specify, by the list of methods, what identities are to be checked. Those identities can be different than the declared ID, the declared ID is still responsible.

--
Dave
************************************************************     *
* David MacQuigg, PhD     email: david_macquigg at yahoo.com     *  *
* IC Design Engineer            phone:  USA 520-721-4583      *  *  *
* Analog Design Methodologies                                 *  *  *
*                                 9320 East Mikelyn Lane       * * *
* VRS Consulting, P.C.            Tucson, Arizona 85710          *
************************************************************     *