On Dec 7, 2006, at 11:33 AM, Damon wrote:

By doing so, the ESP says "I, ESP am the entity sending this email on behalf of my client, List (identified in the RFC 2822 from header) and as such an identity that is associated with that email and can be held accountable."

So if a spammer invades a third party (ESP, ISP, ASP, ISP->ASP) I have a conundrum... how do I distrust gmail or AOL?? Sure, I could flip the switch but realistically, who is going to do that? Which is why I don't want my 'as a sender' email signed by the service. Their sig isn't worth the bits used to inject it- especially not compared to my wholesome image.

Some type of associative method MUST be available with the SMTP client as a ssp-requirement. Otherwise, NO signature offered by a large provider can be safely "white-listed". The IP address of the SMTP client will continue to be the dominate basis for acceptance. The ESP SHOULD be interested in receiving feedback based upon the DKIM signature, but that only happens when they use _their_ signature. This therefore REQUIRES a means to associate email- address domains in various headers with that of the signing-domain, a ssp-requirement.

ESPs would love to avoid responsibility, but ... you can't.

But you can't really block them either can you :)

When ESPs use customer's private keys, establishing a basis for "white-listing" becomes more difficult and makes abuse reporting more difficult. Associating the signing domain with email-addresses in various header MUST be an ssp-requirement to permit the signing- domain to represent the transmitting entity.

A bulk sender SHOULD sign with _their_ domain and have their customer's associate their email-addresses with their domain. To protect providers from "white-listing" replay abuse of their domain, a means to associate the SMTP client with the signing-domain becomes an ssp-requirement. A means to associate the From header email- address with that of a different signing-domain becomes an ssp- requirement.


Hence the traditional "pass through" argument.

But, that "approach" allows ESPs to avoid responsibility for the abuse coming from their network when for example the client imports and mails to a "bad list."

But I can't 'force' the issue by distrusting the ESP's sig... when who we REALLY want to trust is 'The' sender

Annotation of "recognized" email-addresses "associated" with the signing-domain offers strong protection from spoofing. Associating the signing-domain with the SMTP client provides strong protection from "white-listing" abuse.

One really wants to be able to trust something. As it currently stands, by allowing any bad actor an ability to replay any message from a "white-listed" domain prevents trust from ever being established. Trust MUST be protected as an ssp-requirement. Trust requires an ability to associate the SMTP client, the MailFrom, and other email-address domains within other headers with that of the signing-domain. DKIM MUST be able to protect trust that might be established from abuse. These associations as an ssp-requirement provides this protection.

-Doug
_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to