On 8/22/22 12:17, Phil Stracchino wrote:
> On 8/22/22 11:50, Viktor Dukhovni wrote:
>> On Mon, Aug 22, 2022 at 05:35:54PM +0200, Patrick Proniewski wrote:
>>> But the "loophole" here is that blank sender/return-path is allowed
>>> (MAILER DAEMON), I could prohibit that, but with huge caveats.
>>
>> Best to ignore bad advice.  You may need a better antispam filter.  Ad
>> hoc rules for past (and plausibly never again) abuse are not likely to
>> be effective.  That said, no antispam filter is 100% effective.  Some
>> spam *will* get through no matter what you do.
> 
> If there was a method of spam filtering that was 100% effective, 
> *everyone* would be using it.  ...And the spammers would be working 
> night and day to figure out ways to circumvent it.
> 
> A lot of the problems in spam filtering is that the protocols we use for 
> email delivery were fundamentally designed in insecure, unauthenticated 
> ways, because they were created in a different, friendlier, arguably 
> more naïve world in which nobody imagined that anyone would abuse email 
> on a large scale.  Trying to bolt security and authentication onto 
> anything after the fact is always harder than designing in secure 
> authentication from the start.
> 
> The other side of that coin, though, is that we are in a lot better 
> place to do that secure authentication now, because our tools (hardware 
> and software) are so much better and more capable.  But that doesn't 
> mean it's not still a hard problem.

The correct solution to prevent email forgery is DNSSEC + DKIM +
DMARC with p=reject + some way to prevent DMARC from accepting based
on SPF alone.  In practice, lots of stuff is misconfigured.  I don’t
run a mail server, but if I did, I would be pretending that Google
had p=quarantine, even though it has p=none.  I would also be using
DNS over TLS to 8.8.8.8 with pinned CA certificates to get Google’s
DNS records, and refusing to send mail to Google unless a Google CA
signed the server’s TLS cert.
-- 
Sincerely,
Demi Marie Obenour (she/her/hers)

Attachment: OpenPGP_0xB288B55FFF9C22C1.asc
Description: OpenPGP public key

Attachment: OpenPGP_signature
Description: OpenPGP digital signature

Reply via email to