spf-discuss
[Top] [All Lists]

Re: [spf-discuss] (SOLVED) SPF blocking e-mails coming from an E-card service server

2007-05-01 03:26:09
Already here it is almost impossible to guess the proper ecard ID, as it
has 16 chars scrambled random number and letters.

No guessing necessary.  You have generated a proper ID.

Yes, this way you can bomb an e-mail adress that you enter yourself as a fake sender, but again this would be only for a few e-mails, before our service would block your next ecards due to the IP based number limitation. Thus, any automated bombing isn't possible, which is really the worst think. Yet a personnal bombing of a few emails is possible, but wouldn't offend the victim so much. Seen from that point of view, this system is not more dangerous than a mailing list service which sends confirmation messages to anyone who is just asking for, even if the address is a wrong one. If this is blamable, then you must also blame all other mailing list subscription systems for providing the same flaw, and even probably in an automated manner, and yet nobody never complains about this neither, so this is why we should lower this 'problem' potential to my opinion.


On top of this, the received bouncing email is checked against any
recipient e-mail address which is in it. It must match the recipient that
the corresponding ecard sender has put. This makes NO chances at all to use
this script as a forwarder to bomb an e-mail address, unless someone can
prove it to me, and Alex didn't. If these two conditions are not met, the
e-mail is not returned and it is just dropped down.

Did I claim your service could be used to bomb an email address in
the way you just described?  I think I didn't.

I was triying to know, but you were not willing to "clean my mess", so it was difficult to know, but it seemed to. I asked you to clarify but you didn't want. You said that there would be more work to do to. This is true for the way people are allowed to send an ecard, but not as for the script itself, this was probably a bit confusing.


However, as stated by Stuart, this 'bombing' capability is exactly the same
than the proposal of Alex to put cookies, because even with all this
system, any attempt to subscribe _will_ generate an e-mail back, and I
believe even that most of those systems do not limit the number of attempts
per IP address, check for spamlists, unlike our system at edenpics.com!
Therefore, our system is probably even more reliable than Alex's
suggestion, and at least as good as his.

Each attempt to subscribe would result in one message generated by
your site, and the message would/should contain a brief statement
like
"someone at 192.0.2.1 requested that email address user(_at_)example(_dot_)org
is subscribed to our service.  Please acknowledge that you want to
... etc. yada yada".

This is one thing you probably didn't get right: an e-mail is still sent with your solution, and therefore you can still bomb an e-mail address your way almost as it would be with my system, except that you would have less returns than I would if several addresses are wrong. However this last problem could also be solved by marking each wrong email address and then return only one bounce email to the user with all failures. I think that it is not necessary as for now, but could be something to improve if really needed.



Ecards can be sent to more than one email address.  Each address could
result in a bounce.  One card sent, multiple bounces.

Yes, this is true, please see the last comment.

3. We have plenty of other tests before sending each e-card, almost 10
checks! We test that the sender's IP address is not part of two spam
blacklists before each sending. We have the number of ecard limited by IP.
We have a minimum time delay check between each sent ecard, and several
other things..

And I was not saying you weren't "a good guy".  I just expressed my
feeling about a fundamental way of thinking related to SPF:
Sender address forgery should be banned.

This is interesting, because the SPF technical web page with the best practices suggests to do exactly the way I did, so I am surprised that you say it is fundamental to SPF that the sender address forgery is banned. Please read again this page which encourages to do so, yet by specifying exactly what server DID the forgery, so that we can return to them in case of address errors or problems:
http://www.openspf.org/Best_Practices/Webgenerated

This is probably where we conflict: I think to have done things as suggested on this page, but you seem to be blaming me for having done things this way, generally speaking. Of course I could understand your point of view, but in this case it should be discussed further with other SPF people.


I still say your site makes it easy, not hard, to generate backscatter.
That doesn't mean that you aren't doing much good work.  It just means
that there's still more work to do.  And that is what I said earlier.

Yes, I can agree with it, yet the more work to do is, I think you agree, only for the way people are allowed to send an ecard, and not for the script I provided. This is what I would like to emphasis. The way people allow others to send an e-card is not covered in the SPF best practices, so we should speak about this in another context, and rise up more discussions. I am trying to separate what is related to the script which first seemed to be blamable, and the way we accept people to send ecards and I think it is important to make the difference.



4. We have never had any problem reported in 5 months of work, and I don't
believe that we should be put on a spamlist, unlike suggested by Alex to
all the others on this list

?!?!?!?  When ? Where ?

04.28:
"I can, using your ecard service, send bounces to anyone.  If you think
this is appropriate, then please think again. I, and I hope others, will report such bounces to spamcop."

Reporting the service bounces to spamcop does certainly push them to mark my server as a spammer box. Maybe it was not your intent to say this, but it can really be interpreted like 'I wish your server is placed as a spam server'. And again, I think you would be right if you could automate this bombing, yet you could only do several bounces and would be limited, and this makes the whole difference.


You feel offended by my remark, that's clear.  Please put your emotions
aside and *read* my message.  Do not read inbetween the lines, as that
is just whitespace.

Please do not put words in my mouth again.  I have done nothing bad, and
I have certainly not done the things you claim I did.

I asked you for constructiveness, and you answered harsh. It's sad you cannot recognise it. If some things I said were not right about your claim, then I believe that the precisions I asked you for would have avoided to be mislead, if it is really the case. Anyway, thanks for trying to warn about a potential problem there might be with mail forgery and yet this is maybe something to talk more about with the community instead of with me, even if I know it was just a suggestion at first.

Daniel


-------------------------------------------
-----------------------------------------------------------------------
Sender Policy Framework: http://www.openspf.org/
Archives at http://archives.listbox.com/spf-discuss/current/
To unsubscribe, change your address, or temporarily deactivate your
subscription,
please go to http://v2.listbox.com/member/?list_id=735
Powered by Listbox: http://www.listbox.com