> http://www.infoworld.com/article/04/08/31/HNspammerstudy_1.html 

> Did you read the end of the article? SPF prevents forgery, not spam.
It's 
> still valuable even if spammers use it.

Maybe I'm missing something obvious, but how does this differ from
maintaining valid forward and reverse DNS entries?

Let's assume I want to forge an email as coming from
maila.microsoft.com. I create a Postfix system and give it that name,
but I'm - of course - using a non-MS IP address (10.1.1.1, for
argument's sake.) I try to connect to your system, and you note the IP
address. You go to my ISP's reverse DNS records (which, not so
coincidentally, happens to be under my control as well) and verify that
I have a PTR correlating 10.1.1.1 to maila.microsoft.com. Then, you go
to the DNS records of microsoft.com (which I do NOT have access to
control) and see that according to Microsoft mail1.microsoft.com is
actually 131.107.3.125. You note the discrepency and - BAM! - you reject
my connection.

So here's where I don't understand the point of SPF. With the existing
system it is impossible to fully forge my identity as being
maila.microsoft.com; thus, if we use the DNS system as it was designed
we can eliminate emails from forged SMTP servers. Then, once that's in
place, we can then easily identify and blacklist those servers that are
PROPERLY set up with forward and reverse DNS records but still send out
spam. Without ANY additional designs or systems in place we've
eliminated virtually all intentionally forged emails and have a flexible
system that can rely on existing technology (e.g., SURBL, Razor) to
scale going forward. The only risks we're left with are individuals
using legitimate systems (AOL, Earthlink) to spam, and those can be shut
down easily by their administrators (which is still a risk with SPF...)

Like I said, maybe I just don't understand the proposed system or I'm
missing something obvious... GA

Reply via email to