On Sat, Jul 22, 2006 at 09:10:12AM -0700, Marc Perkel wrote: > Martin A. Brooks wrote: >> Marc Perkel wrote: >>> When I get to the point where I need security I will implement it. >> That, for me, is sufficient nails in the coffin for your project. > I'm looking for people who want to find ways to make it work, not people > who are looking for ways to make it not work.
Marc, What Martin is saying, and it's something I agree with, is that many of the worst bits of security design and attempts to patch things up have come from not considering the security and trust implications right from the beginning. SMTP, for some, is a case in point; they say "we have to totally redesign SMTP from the ground up to make it ``secure''", I'm sure you've heard that being said. In some ways, the situation we are in (wrt spammers, joe-jobs etc) is because the designers of SMTP *didn't* think about the possibility of abuse, although more probably, they weren't thinking about abuse in the context of deployment at the scale to which it has been deployed. If you are saying "I'll bolt on this security-thing later", then you're fundamentally misunderstanding the security design point of view, and I'm inclined to agree with Martin in his assessment here. For any black or white or any other colour list, there is an element of wanting to know how they are doing their DoS resistance, any time one has got big, they have been hit by major attacks from the spammers they are blocking. ORBS gave up, some years ago, after too many of these attacks, and when they did, decided to list everything in order to get people to stop using their lists. This was obviously pretty broken behaviour for anyone trusting them. One of the questions that for me, you've failed to answer, is: What happens when someone lists one of your "partner" server operators, does that change their rating? And another, that comes to mind because I live in a country with stronger Data Protection laws: If I'm feeding information about every message (spam/ham) and source to you (which I presumably need to do in order to make your statistics useful), and you obviously know the destination, because it's your peer host, then suddenly you have some quite powerful mail-flow information, too, which could come under some of the otherwise dreadful RIPA in this country at least. Sorry to not be entirely supportive of your ideas, but constructive criticism, which is what I hope some of this is, is what will help you produce a better idea next time. "Those who do not learn from history are doomed to repeat it" as a corollary to some implementations of "thinking outside the box". Cheers MBM -- Matthew Byng-Maddick <[EMAIL PROTECTED]> http://colondot.net/ (Please use this address to reply) -- ## List details at http://www.exim.org/mailman/listinfo/exim-users ## Exim details at http://www.exim.org/ ## Please use the Wiki with this list - http://www.exim.org/eximwiki/
