Ian Eiloart wrote:
> I think the reason that backscatter isn't subject to any RFC is that
> the real problem is the lack of authentication and accountability for
> return-paths in the original messages. Bouncing would be fine if you
> know that the email really came from the owner of the return-path.
>
> That's what SPF and DKIM are intended to help with. There's friction in
> their adoption because certain features of email (notably mail
> forwarding, but also some others) have no regard for these features.

So far, so good.

> Until no email service provider accepts message submissions outside of
> their own domains, all email providers offer message submission on port
> 587, all message submissions are autheticated, and mail forwarders
> accept responsibility for the email that they forward, it's not safe to
> bounce email.

This, however, is simply untrue.  Of course what you said is desirable, 
but SPF can help with safely bouncing e-mail _today_.  SPF may sometimes 
give an unexpected "Fail" result due to alias-style forwarding or other 
problematic cases, but when it gives a "Pass" result, it is always safe, 
i.e., the return path can be assumed to be authentic and bounces may be 
sent.

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
Mailman-Developers mailing list
Mailman-Developers@python.org
http://mail.python.org/mailman/listinfo/mailman-developers
Mailman FAQ: http://www.python.org/cgi-bin/faqw-mm.py
Searchable Archives: 
http://www.mail-archive.com/mailman-developers%40python.org/
Unsubscribe: 
http://mail.python.org/mailman/options/mailman-developers/archive%40jab.org

Security Policy: 
http://www.python.org/cgi-bin/faqw-mm.py?req=show&file=faq01.027.htp

Reply via email to