On 01/24/2018 01:01 PM, Vincent Fox wrote:
SPF is designed for whitelisting, not blacklist.


Not true. We are supposed to reject email that doesn't pass SPF checks if the domain has told us to with "-all". That is a form of blacklisting controlled by the domain itself to protect it's own brand/reputation from spoofing. If you don't know what you are doing and create an SPF record with "-all", then that's your own fault. Google has started putting many of these emails with SPF_FAIL in their Spam folder which puts more importance to get your SPF record correct and complete.


Remember when "shields" appeared in mail

clients, and how fast that feature disappeared?

Far too many people clicking on phish that seemed

"authentic".  With the explosion of cheap domains

and registrars, there's really no snowshoe Black Hat

operation that can't comply.  Compliance is 99.9999%

in every phish I've investigated last year, the outlier

I can recall was a simple typo in 1 server in the

sender's network.


SPF is authorization not authentication. There is a difference and complete security requires both. You use SPF to tell the Internet authorized mail servers for your domain. That doesn't have a direct tie to spam but it does allow a level of whitelisting (I like to call it safelisting) for senders you trust.



SPF is a zombie legacy that someone should shoot in

the head.  Maybe then we could design something that

is useful for what we all desire, which is properly

authenticating senders.



If keep in mind that SPF is authorization and DKIM is authentication, you really need both. When a sender with DMARC p=reject aligns perfectly in both SPF and DKIM then all you know is that email is legit and not spoofed. It doesn't say anything about spam or ham in the content. If you whitelist trusted senders then you segment them out of the way which allows fine tuning on the rest of the mail flow.


------------------------------------------------------------------------
*From:* David Jones <djo...@ena.com>
*Sent:* Wednesday, January 24, 2018 6:12:19 AM
*To:* 'users@spamassassin.apache.org'
*Subject:* Penalty for no/bad SPF
Google Chrome and other browsers have been slowly penalizing sites not
using encryption to the point that soon they will be alerting users of
plain HTTP sites.  This along with letsencrypt.org has been moving the
HTTPS bar forward to improve web security and privacy.

I think it's time for the SA community to help move the bar forward with
SPF.  The problem is many sysadmins that don't understand SPF have been
implementing SPF incorrectly (thank you Microsoft Office 365) and
incompletely without understanding they are shooting themselves in the foot.

I decided about a month ago to start sending feedback emails to senders
with SPF PERMERR and SPF FAIL in an attempt to help them help themselves
improve _their_ mail delivery.  If you setup your SPF record like
Microsoft recommends with a "-all" and it's not completely covering all
legit sources of email, it's completely useless for any MTAs and mail
filters to take SPF_FAIL hits seriously.  We should have rejected the
email per that sending domain's own wishes but we all know they didn't
intend for us to really block it so what good is it?

What does everyone think about slowly increasing the score for SPF_NONE
and SPF_FAIL over time in the SA rulesets to force the awareness and
importance of proper SPF?  This may need to have an official
announcement of what the plans/timelines would be so we could get the
word out.

These days with DMARC reporting, it's not impossible to figure out a
good SPF record like it was 10 years ago.  The real problem with SMTP in
general is there is no reliable way to get feedback to mail admins
without sending confusing technical emails to regular users.

--
David Jones


--
David Jones

Reply via email to