On Mon, 16 May 2005, Bill Taroli wrote:

> Matt Fretwell wrote:
> >plenty of legitimate MTA setups running on dynamic IP's. [...] What
> >really does amaze me though, is that these are generally the admins who
> >will turn around and say, 'Don't block (variable), you will lose too
> >much legitimate mail'. Where is the logic in that? They will allow a
> >crappily configured multinational corporation or ISP to connect, yet not
> >give dynamics the slightest chance to prove their reliability.
> >
> I don't think it's a matter of reliability... it's more an issue of 
> accountability and traceability. How can one trace back to a dynamically 
> IP'ed MTA when it's dynamic? DynDNS doesn't prove itself in the majority 
> of cases, or isn't even used. Some of these are even worse because the 
> mail is coming from a NAT'ed host from behind a dyn IP firewall, which 
> won't even allow return messages -- and I suspect this is extremely 
> common. Kind of like an inverse roach motel for email.
> 
> I don't disagree that there may well be many people running wholesome 
> MTAs on dynamic IP's that suffer for the rest. But it's that rest we're 
> all concerned with. I honestly wonder whether an authorization framework 
> such as SPF would be the salvation of such setups... permitting them to 
> prove themselves worthy without the need for static IP addresses.
> 
> But until that time comes, any host who appears to lie about it's 
> identity by giving a host name that doesn't match it's visible IP 
> address is getting the door slammed in it's face by my MTA.

Once upon a time, email was simple. It carried text.  Later people got
smart and started UUEncoding binary data into emails and other proggies
like shar (still text) were born to transfer data across email.  Since
then, email has blown up and we have lost much of the MTA standardization
which existed when during a younger Internet.  The encoding mechanisms
(base64, etc) are all RFC standards and MUA's follow them, but the MTA's
need to be setup a little bit stricter.  Requiring forward-and-back dns
lookups is a good idea if everyone would cooperate.  Back in the early
90's, most addresses would forward-and-back dns lookups and certainly all
MTA's or servers offering a real service (http/ftp/rdiff) did.

It seems that we have moved away from a consistent Internet with rules
which were followed as a courtesy to sysadmins.  We have now moved into a
much more liberal (broken?) Internet where we try to make anything go and
still have it function.  Remarkably, it does for the most part despite 
all the garbage that floats across the line (just tcpdump a cable line 
sometime and see whats there).  

For email transfer and MTA's alike, putting SPF in DNS to help
"authenticate" the source is a step in the right direction.  If SPF is a
good idea, and it is dns based, then so should forward-and-back lookups.  
If additional mail standardization can take place (again) then spam can be
reduced to a certain degree.  I much like Brian Read's idea of blocking
mail xfer from sites which are not authenticated (SASL) or who cannot give
a proper reverse lookup.  Every ISP we have worked with have been happy to
create or change a PTR entry in their dns, even if it took a lot of work
to get the ISP to do so (I even offered to do it for one isp and they
finally did it themself).

If we can standardize the set of rules and protocols required for an MTA
to accept an email, then spam will reduce.  Either that or we need to
build a better mousetrap. This is jut my $0.02.

Your thoughts?

-Eric


-- 
Eric Wheeler
Vice President
National Security Concepts, Inc.
PO Box 3567
Tualatin, OR 97062

http://www.nsci.us/
Voice: (503) 293-7656
Fax:   (503) 885-0770

_______________________________________________
http://lurker.clamav.net/list/clamav-users.html

Reply via email to