Michael Scheidell wrote:
-----Original Message-----
From: Daryl C. W. O'Shea [mailto:[EMAIL PROTECTED]

You find me a large scale installation that is actually checking, and rejecting on, SPF records before DATA and isn't frequently rejecting mail their users want and I'll buy you lunch.

You find me a large scale installation that is rejecting SPAM and isn't
frequently rejecting mail their users want and I'll buy dinner.

Luckily I'm on my way home for dinner now.

In my mind there's a huge difference between rejecting mail based on the behaviour and actions of the sender than there is rejecting mail based on actions of the recipient (choosing to forward their mail).

The only way I can see that they'd be the same is if you fault the sender for publishing SPF records.


Lets face it: SMTP is broken, but the fixes are just compromises between
allowing spam, viruses, phishing and email.
Any changes to SMTP will break legitimate email.

You wonder what happens if you enforce all the RFC's on email?
How many large installations use 'localhost.localdomain' as the FQDN for
their outbound helo?
(send an email to [EMAIL PROTECTED] and see the headers!)

How many large installations doesn't use ANY fqdn for RDNS, and the PTR
and A records don't match?
How many large installations don't have abuse@ or postmaster@ records?

http://www.rfc-ignorant.org/tools/lookup.php?domain=hotmail.com
http://www.rfc-ignorant.org/tools/lookup.php?domain=gmail.com
http://www.rfc-ignorant.org/tools/lookup.php?domain=yahoo.com
(with a bad whois record, can't they lose their yahoo.com domain :-)?

Even if you enforce existing RFC's, you will drop email 'users want'.

All actions of the sender, not the recipient.


For 12 years, people have been arguing about how to fix it.
If someone wants to advertise spf records, and wants to use ?all, or
~all if they are timid, more power to them.

The record itself is not the issue. It's what action the recipient system takes based on the record.


host -t txt microsoft.com
microsoft.com descriptive text "v=spf1 mx include:_spf-a.microsoft.com
include:_spf-b.microsoft.com include:_spf-c.microsoft.com ~all"

host -t txt hotmail.com
hotmail.com descriptive text "v=spf1 include:spf-a.hotmail.com
include:spf-b.hotmail.com include:spf-c.hotmail.com
include:spf-d.hotmail.com ~all"

OK, citing Microsoft's records wouldn't be my first choice when arguing in favour of SPF.

For starters, they're basically saying we're not sure where our mail comes from... last time I counted their records covered over 11 million hosts. So everyone arguing about "security of email" can't seriously consider this a good example.

Second, while they publish SPF compatible records, they treat other people's records more like PRA and even when they treat them as SPF they'll tell you that they don't even fully support SPF mechanisms.


host -t txt _spf.google.com
_spf.google.com descriptive text "v=spf1 ip4:216.239.56.0/23
ip4:64.233.160.0/19 ip4:66.249.80.0/20 ip4:72.14.192.0/18 ?all"

I have no idea what your point is here.


If a bank decides that forwarding email send to clients is a bad idea,
and wants to publish -all records, that's fine also.

Why should that be up to the bank and not their customer. If their control over security needs to be that far reaching they should coat their ATM cards in something that prevents me from writing the PIN number on it with a permanent marker. There's a far better chance of my account being compromised that way then due to me forwarding mail from one system I, or someone I trust, control to another.

Besides, even if the bank should have a say over whether you should be able to forward mail, what happens when your forwarder implements SRS. Oh no, the bank no longer has a say, they've lost the control they apparently should have.

I guess it's a good thing that SRS is essentially vapourware.


If an ISP wants to trigger additional tests for email that softfails, or
block at smtp session email that hardfails, then all they are doing is
taking the suggestions of the sending domain.

I still maintain that blocking based on the actions of the end-user recipient isn't the right thing to do when it comes to sender authentication schemes.


 host -t txt chase.com
chase.com descriptive text "v=spf1 ip4:170.148.48.0/24
ip4:159.53.36.0/24 ip4:159.53.46.0/24 ip4:159.53.110.0/24 -all"

Hey, I recognize chase.com. They're the bank that goes out of their way to make their email look like phishing mail.


Anyway... I'm sure the SpamAssassin user's list is getting bored now.


Daryl

Reply via email to