On Sep 21, 2006, at 9:47 AM, Michael Thomas wrote:

Jim Fenton wrote:

I don't understand this. Many people routinely do reverse DNS lookups on the IP address from which messages are received, SPF checks (which can be several lookups), and so forth. Why the sensitivity to additional, potentially well-cached lookups?

There is a far greater likelihood the transactions in question are _not_ cacheable.

When there is a high level of UDP traffic, especially when highly distributed transactions load a common server, high packet loss rates may result. The average domain offers two DNS. When each message is expected to generate a load on servers that have never indicated an expectation of even seeing this traffic, it should also not be surprising that this load may not be well handled. The retry period for a lost packet is 5 seconds, followed by 10 and then 20 etc. The number of resulting simultaneous connections may subsequently limit the MTA's ability to accept additional connections, for a type of DoS.

Keep in mind SPF remains experimental, where even that status needs to be questioned, as it also represents a serious security concern as well.

I think that the interesting meta issue here is that DKIM verification does not require this; SSP requires this. I hope that there isn't confusion about that because the two really are severable.

When an email-address's domains policy is checked only in response to a retained email-address then there is never a need to hunt for a policy. This assumption of any required search is premised upon a mode of protection that is highly flawed when look-alike attacks are considered. Address-books and trusted-lists can leverage the information made available with DKIM. For this mode of operation, policy may simply provide a means to associate different domains.

There's a lot of question how much "teeth" these requirements on the verifier have. We used the stronger wording to encourage "compliant" implementations to do SSP, because a lot of the reason for publishing SSP goes away if it is going to be ignored. But I expect that it will be up to the individual customer's choice, just as it's possible to turn certain classes of checks on and off in SpamAssassin.

Again, we need to separate out the two protocols. We have to have MUST requirements for the SSP protocol, but there isn't a MUST USE SSP requirement for any given DKIM verifier.

As indicated with the use of the address-book or trusted domain list, there is NO NEED for any SSP must. Do you want this to become a legal requirement? No protection scheme should mandate highly questionable and potentially dangerous network activity.

-Doug


_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to