Hi,

On Fri, Feb 20, 2015 at 12:08 PM, Anne P. Mitchell, Esq.
<amitch...@isipp.com> wrote:
> All,
>
> We have a rather strange situation (well, strange to me, at least).
>
> We have an email reputation accreditation applicant, who otherwise looks 
> clean, however there is a very strange and somewhat concerning domain being 
> pointed to one of the applicant's IP addresses  Let's call the domain 
> example.com, and the IP address 127.0.0.1, for these purposes.
>
> Applicant is assigned 127.0.0.1.  the rDNS correctly goes to their own domain.
>
> However, example.com (which in reality is a concerning domain name) claims 
> 127.0.0.1 as their A record.

I don't think having an A record in the DNS is really a "claim". Let's
say I want to send mail to company.example.com but I don't like them
so much so I set up companySUCKS.foo.example.com pointing at their
mail server either through an A record or a CNAME... Then, I believe,
inside my mail, the mail could appear to be to
per...@companysucks.foo.example.com if it wasn't blocked by some
security mechanism. Perhaps this is protected speech or, with a few
changes, a parody or something.

See Section 4.1.3 "You Can't Control What Names Point At You" in my
RFC http://tools.ietf.org/html/rfc3675

A somewhat similar thing is in Section 4.1.4.1 of that RFC where I was
on social mailing list with an innocuous name and someone had long set
up a forwarder so that if you sent email to
cat-torturers@other.example (real left hand side, obviously not the
real right hand side). It would get sent to the social mailing list
and the that address would appear in the "to:" line inside the mail.
For that particular crowd, most people thought this was pretty funny,
but it is the same sort of thing.

> Of course, example.com is registered privately, and their DNS provider is one 
> who is...umm... "known to provide dns for domains seen in spam."
>
> As I see it, the applicant's options are:
>
> a) just not worry about it and keep an eye on it
>
> b) publish a really tight spf record on it, so if they are somehow 
> compromised, email appearing to come from example.com and 127.0.0.1 should be 
> denied
>
> c) not use the IP address at all (it's part of a substantially larger block)
>
> d) two or more of the above.
>
> Thoughts?  What would you do?

If it isn't actually causing a problem, a) seems viable but you could
certainly do b) or c) or both if you feel like it.

Anyway, I'm not a lawyer... :-)

Donald
=============================
 Donald E. Eastlake 3rd   +1-508-333-2270 (cell)
 155 Beaver Street, Milford, MA 01757 USA
 d3e...@gmail.com

> Thanks!
>
> Anne
>
> Anne P. Mitchell, Esq.
> CEO/President
> ISIPP SuretyMail Email Reputation, Accreditation & Certification
> Your mail system + SuretyMail accreditation = delivered to their inbox!
> http://www.SuretyMail.com/
> http://www.SuretyMail.eu/
>
> Author: Section 6 of the Federal CAN-SPAM Act of 2003
> Member, California Bar Cyberspace Law Committee
> Ret. Professor of Law, Lincoln Law School of San Jose
> 303-731-2121 | amitch...@isipp.com | @AnnePMitchell | Facebook/AnnePMitchell
>
>
>

Reply via email to