RE: yahoo to use public key technology for anti-spam

2003-12-09 Thread Carl Ellison
I'm not connecting to an open relay.  When I pay for service at the local
internet café, part of what I get for my money is time on their SMTP server.
..ditto when I pay for cable modem, as I am doing right now.  My cable modem
provider is cablespeed.com and SMTP server is mail.cablespeed.com.  As far
as I know, it's available only to its legit subscribers. However, at the end
of the month, I'll be signed up with a different cable modem provider. That
relationship will last a couple of months, and then I'll be with a different
one.  Each of these is legit. None is an open relay. But, I don't want to
send change-of-address notes out to all my friends every time I change - so
I receive through (and identify myself via) a remailer at acm.org.

 - Carl


+--+
|Carl M. Ellison [EMAIL PROTECTED]  http://theworld.com/~cme |
|PGP: 75C5 1814 C3E3 AAA7 3F31  47B9 73F1 7E3C 96E7 2B71   |
+---Officer, arrest that man. He's whistling a copyrighted song.---+ 

> -Original Message-
> From: Anton Stiglic [mailto:[EMAIL PROTECTED] 
> Sent: Sunday, December 07, 2003 2:11 PM
> To: Carl Ellison; 'Will Rodger'; 'Steve Bellovin'; 
> [EMAIL PROTECTED]
> Subject: Re: yahoo to use public key technology for anti-spam
> 
> 
> - Original Message - 
> From: "Carl Ellison" <[EMAIL PROTECTED]>
> To: "'Will Rodger'" <[EMAIL PROTECTED]>; "'Steve Bellovin'"
> <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
> Sent: Sunday, December 07, 2003 8:44 AM
> Subject: RE: yahoo to use public key technology for anti-spam
> 
> 
> > I, for one, hate the idea.  My From address should be 
> [EMAIL PROTECTED]  That's
> > my remailer where I receive all my incoming e-mail.  
> However, my outgoing
> > SMTP server depends on which cable modem provider or hot 
> spot I happen to
> be
> > at the moment.  It would be that SMTP machine that signs my 
> outgoing mail,
> > not acm.org who never sees my outgoing mail.
> 
> But you should be sending mails via *your* SMTP server, and should be
> connecting to that SMTP server using SSL and authentication.  
> Open relays
> encourage spam.  People shouldn't be relaying mail via just 
> any SMTP server.
> 
> --Anton
> 
> 

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: yahoo to use public key technology for anti-spam

2003-12-09 Thread Ed Gerck
Dan,

Using your own SMTP from a dynamic IP (cable, DSL and modem access, for
example) fails because of (the brain-dead) black-listing of dynamic IP blocks to
prevent spam -- see
http://dynablock.easynet.nl  and
http://www.pan-am.ca/pdl/

Also, as seems to be the norm now, most viruses come with a primitive
SMTP engine built into them -- which, again, taints dynamic IPs (since
many home machines are inflected).

Cheers,
Ed Gerck

Dan Geer wrote:

> I'm actually experimenting with sending mail directly,
> per this little hack[1], which does have separate paths
> for incoming and outgoing, but does not rely on the local
> hotspot/whatever.
>
> --dan

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: yahoo to use public key technology for anti-spam

2003-12-09 Thread Sidney Markowitz
[EMAIL PROTECTED] wrote:
Does anybody know what has become of the low-tech,
no-cryptography-needed RMX DNS record entry proposal?
A google search for "rmx dns" without quotes brings up as its first hit 
the Internet Draft at IETF which is dated October 2003. The subsequent 
hits show lots of discussion about it.

You might also be interested in http://spf.pobox.com which seems to be a 
similar proposal that extends the MX record rather than define a new rmx 
record.

To bring it back to the cryptography topic of this list, the draft 
proposal for rmx brings up a problem with crypto solutions that I did 
not see mentioned here yet. I'll just quote the relevant paragraph from 
the Draft rather than summarize it. Note that the draft states that it 
specifies only non-cryptographic mechanisms but still allows use of 
cryptography.

[begin quote]
2.4.  Shortcomings of cryptographical approaches
 At a first glance, the problem of sender address forgery might
 appear to be solvable with cryptographic methods such as challenge
 response authentications or digital signatures. A deeper analysis
 shows that only a small, closed user group could be covered with
 cryptographical methods. Any method used to stop spam forgery must
 be suitable to detect forgery not only for a small number of
 particular addresses, but for all addresses on the world. An
 attacker does not need to know the secrets belonging to a
 particular address. It is sufficient to be able to forge any
 address and thus to know any secret key. Since there are several
 hundreds of millions of users, there will always be a large amount
 of compromised keys, thus spoiling any common cryptographic method.
 Furthermore, cryptography has proven to be far too complicated and
 error prone to be commonly administered and reliably implemented.
 Many e-mail and DNS administrators do not have the knowledge
 required to deal with cryptographic mechanisms. Many legislations
 do not allow the general deployment of cryptography and a directory
 service with public keys. For these reasons, cryptography is
 applicable only to a small and closed group of users, but not to
 all participants of the e-mail service.
[end quote]
 -- sidney

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: yahoo to use public key technology for anti-spam

2003-12-09 Thread John R. Levine
>Does anybody know what has become of the low-tech,
>no-cryptography-needed RMX DNS record entry proposal?

Versions of it are bouncing around in the IETF anti-spam research
group.  The one with the most traction appears to be Meng-Weng Wong's
SPF which is rather too complex for my taste.

Regards,
John Levine, [EMAIL PROTECTED], Taughannock Networks, Trumansburg NY
http://www.taugh.com

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: yahoo to use public key technology for anti-spam

2003-12-09 Thread Anton Stiglic

- Original Message - 
From: "Steven M. Bellovin" <[EMAIL PROTECTED]>

> I use a variety of email addresses, for various reasons.  I have my 
> usual work account, some university accounts, a few personal accounts, 
> one I reserve for EBay use, etc.  I also use several different SMTP 
> servers to send my email.  I *always* have a secure tunnel set up; in 
> fact, Postfix on my laptop is hard-wired to send to port 20025 on 
> 127.0.0.1.  Of course, where that ends up will vary, but it's not in a 
> one-to-one correspondence with the sending address I use.  The Yahoo 
> scheme would apparently require that each email I send be routed via 
> the domain owner's SMTP server.  

So I`m guessing you have all your emails forwarded to one mail account
and fetch them all from there, and when you reply or send a new email
you just use one of your SMTP servers, which doesn't necessarily 
correspond to the incoming (POP or IMAP or whatever) server you
received the mail from.  
Is that correct?
In that case I guess it becomes problematic.
If you just receive your mail from one incoming server I don't see a
problem of having your mail be sent via the SMTP on same machine
where your incoming mail server resides. 

If the signature just certified that the mail was relayed via an SMTP
server where the user authenticated himself I think that would be a 
good idea (SMTP server that necessarily on the same machine than
the incoming mail server).  Than at least you would know that the 
email you received was send by someone who authenticated himself 
to some SMTP server, and not just someone that sent the email via 
an open relay.

If you want something better it seems that it requires the sender to 
have possession of his private signature key and sign the emails 
he sends, but that's not a user-friendly solution and I think we all
agree that it won't work in practice (not transparent enough...)

--Anton

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: yahoo to use public key technology for anti-spam

2003-12-09 Thread Carsten Kuckuk
Zefram,

Z> It seems to still exist -- draft-danisch-dns-rr-smtp-03 is dated 2003-10
Z> -- though it should have been abandoned long ago in favour of similar but
Z> superior proposals.  draft-fecyk-dmp (formerly draft-fecyk-dsprotocol),
Z> which has almost identical capabilities, is also still in active
Z> development.  There's also a more flexible version of the idea, which
Z> I skimmed through when it was announced and now can't recall the name of.

Thank you for this pointer. DMP indeed seems to be better than RMX.

Carsten

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: yahoo to use public key technology for anti-spam

2003-12-09 Thread Zefram
[EMAIL PROTECTED] wrote:
>Does anybody know what has become of the low-tech,
>no-cryptography-needed RMX DNS record entry proposal?

It seems to still exist -- draft-danisch-dns-rr-smtp-03 is dated 2003-10
-- though it should have been abandoned long ago in favour of similar but
superior proposals.  draft-fecyk-dmp (formerly draft-fecyk-dsprotocol),
which has almost identical capabilities, is also still in active
development.  There's also a more flexible version of the idea, which
I skimmed through when it was announced and now can't recall the name of.

-zefram

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: yahoo to use public key technology for anti-spam

2003-12-08 Thread ck
Does anybody know what has become of the low-tech,
no-cryptography-needed RMX DNS record entry proposal?



-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: yahoo to use public key technology for anti-spam

2003-12-08 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, Dan Geer writes:
>
>>   So, in capsule: this proposal assumes that you use the same machine for
>>   outgoing and incoming e-mail.
>
>I'm actually experimenting with sending mail directly,
>per this little hack[1], which does have separate paths
>for incoming and outgoing, but does not rely on the local
>hotspot/whatever.
>
I used to do that, but I had to give up -- too often, my laptop 
happened to be in someone's blacklist range.  Right now, for example, 
it's in Comcast's IP addr space, and some people regard that as a spam 
source.

But we're wandering off-topic.

Btw -- I've been told that Yahoo has not yet disclosed technical details 
publicly.

--Steve Bellovin, http://www.research.att.com/~smb


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: yahoo to use public key technology for anti-spam

2003-12-07 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, bear writes:
>

>>But you should be sending mails via *your* SMTP server, and should be
>>connecting to that SMTP server using SSL and authentication.  Open relays
>>encourage spam.  People shouldn't be relaying mail via just any SMTP server.
>
>This is generally how I work it.  I sit down at any hotspot and I
>get network connectivity.  But all the hotspot is ever going to see
>of my browsing, email, and anything else I like to keep private is
>SSH packets to my home machine, or encrypted X packets running
>between the X server on my laptop and X clients on my home machine.
>
>A bit of lag is acceptable. Sending private mail via untrusted
>SMTP servers is not.

That isn't Carl's point.  He may very well be using a trustworthy SMTP 
server, via a secure tunnel.  The issue is whether he has to use a 
server owned by the owner of his return address.  

I use a variety of email addresses, for various reasons.  I have my 
usual work account, some university accounts, a few personal accounts, 
one I reserve for EBay use, etc.  I also use several different SMTP 
servers to send my email.  I *always* have a secure tunnel set up; in 
fact, Postfix on my laptop is hard-wired to send to port 20025 on 
127.0.0.1.  Of course, where that ends up will vary, but it's not in a 
one-to-one correspondence with the sending address I use.  The Yahoo 
scheme would apparently require that each email I send be routed via 
the domain owner's SMTP server.  

--Steve Bellovin, http://www.research.att.com/~smb


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: yahoo to use public key technology for anti-spam

2003-12-07 Thread Sidney Markowitz
[EMAIL PROTECTED] wrote:
To avoid replay attacks one needs to
sign a string that is tied to a
specific message or time period
I agree. Even time period and message content aren't good enough: Let's 
say that the outgoing SMTP mailer at example.com is trusted. Spammer 
gets an account at example.com, sends themselves one message, then 
immediately copies the signature into forged headers for their spam that 
is sent out through whatever open relays or compromised machines they 
are using. The only way that the mail can be trusted is if it is being 
received directly from the example.com SMTP server. If there is any 
relaying, there is nothing that remains true and constant to sign.

But that is the situation we have today: My ISP's server can choose to 
refuse to accept connections from servers that are on a blacklist of 
open relays and spammers, and can, in theory, have a list of known good 
servers who authenticate their clients. If all the new header does is 
verify the sending mail server, that is done just as well by verifying 
the ip address at the time of connection.

 -- sidney

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: yahoo to use public key technology for anti-spam

2003-12-07 Thread Kevin T. Neely
Through the biting wind of a Cleveland Winter, I saw Anton Stiglic write:

But you should be sending mails via *your* SMTP server, and should be
connecting to that SMTP server using SSL and authentication.  Open relays
encourage spam.  People shouldn't be relaying mail via just any SMTP server.
Yes, that's true for home or personal use, but in a large organization, mail is likely to go through multiple SMTP servers before it reaches the server which hosts the user's mailbox.  
At my previous company, a piece of mail destined for a foreign address saw at least two and sometimes three SMTP servers on the way out; an inbound message from the outside saw at least three.  Each of these servers will need to write to the message headers.

Then there are the situations where you are at a company or university or something and they have locked down the outbound policies and it is impossible to initiate an outbound SMTP connection on port 25 or 465.  In those situations, one *must* use the local SMTP server, even if it's not the ideal one.

K

--
In Vino Veritas
ICQ: 14047557
http://userguide.mozdev.org
http://kevin.astroturfgarden.com
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: yahoo to use public key technology for anti-spam

2003-12-07 Thread Dan Geer

>   So, in capsule: this proposal assumes that you use the same machine for
>   outgoing and incoming e-mail.

I'm actually experimenting with sending mail directly,
per this little hack[1], which does have separate paths
for incoming and outgoing, but does not rely on the local
hotspot/whatever.

--dan

[1] http://www.reitter-it-media.de/software/osxpostfix.html

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: yahoo to use public key technology for anti-spam

2003-12-07 Thread Sidney Markowitz
Carl Ellison wrote:
So, in capsule: this proposal assumes that you use
the same machine for outgoing and incoming e-mail.
No, it implies a service that your outgoing mail server makes available 
that has you authenticate to it in some way and then signs your mail in 
some way.

The article doesn't make clear exactly how it would work. The signature 
might just certify that the mail really was sent through the mail server 
that the headers claim was used. That would allow you to use any email 
address that you want, such as your acm.org address, and the signature 
certifies that you authenticated yourself with the SMTP server.

My ISP recently switched to using TLS SMTP/Auth for access to their SMTP 
server from outside their network for their customers. It would be easy 
and useful for them to stamp mail that I send to show that it really was 
sent through their SMTP server and that they know who I am.

This might not be exactly the same as what Yahoo! is talking about: They 
might be thinking only about mail with a yahoo.com From address being 
sent through a yahoo.com server and being signed with a key associated 
with the yahoo.com domain. But if the signature is taken to authenticate 
the domain of the SMTP server in the initial Received header, then it is 
possible to maintain lists of servers of ISPs who are trusted to 
authenticate users of their SMTP servers and to have anti-spam policies, 
and blacklists of servers that are spam sources. The From address would 
be irrelevant.

 -- sidney

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: yahoo to use public key technology for anti-spam

2003-12-07 Thread bear


On Sun, 7 Dec 2003, Anton Stiglic wrote:

>
>- Original Message -
>From: "Carl Ellison" <[EMAIL PROTECTED]>
>To: "'Will Rodger'" <[EMAIL PROTECTED]>; "'Steve Bellovin'"
><[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
>Sent: Sunday, December 07, 2003 8:44 AM
>Subject: RE: yahoo to use public key technology for anti-spam
>
>
>> I, for one, hate the idea.  My From address should be [EMAIL PROTECTED]  That's
>> my remailer where I receive all my incoming e-mail.  However, my outgoing
>> SMTP server depends on which cable modem provider or hot spot I happen to
>be
>> at the moment.  It would be that SMTP machine that signs my outgoing mail,
>> not acm.org who never sees my outgoing mail.
>
>But you should be sending mails via *your* SMTP server, and should be
>connecting to that SMTP server using SSL and authentication.  Open relays
>encourage spam.  People shouldn't be relaying mail via just any SMTP server.

This is generally how I work it.  I sit down at any hotspot and I
get network connectivity.  But all the hotspot is ever going to see
of my browsing, email, and anything else I like to keep private is
SSH packets to my home machine, or encrypted X packets running
between the X server on my laptop and X clients on my home machine.

A bit of lag is acceptable. Sending private mail via untrusted
SMTP servers is not.

Bear

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: yahoo to use public key technology for anti-spam

2003-12-07 Thread Victor . Duchovni
On Sun, 7 Dec 2003, Anton Stiglic wrote:

> But you should be sending mails via *your* SMTP server, and should be
> connecting to that SMTP server using SSL and authentication.  Open relays
> encourage spam.  People shouldn't be relaying mail via just any SMTP server.
>

This is misguided, but we should not start that flame-war here.

-- 
Viktor.

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: yahoo to use public key technology for anti-spam

2003-12-07 Thread Anton Stiglic

- Original Message - 
From: "Carl Ellison" <[EMAIL PROTECTED]>
To: "'Will Rodger'" <[EMAIL PROTECTED]>; "'Steve Bellovin'"
<[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Sunday, December 07, 2003 8:44 AM
Subject: RE: yahoo to use public key technology for anti-spam


> I, for one, hate the idea.  My From address should be [EMAIL PROTECTED]  That's
> my remailer where I receive all my incoming e-mail.  However, my outgoing
> SMTP server depends on which cable modem provider or hot spot I happen to
be
> at the moment.  It would be that SMTP machine that signs my outgoing mail,
> not acm.org who never sees my outgoing mail.

But you should be sending mails via *your* SMTP server, and should be
connecting to that SMTP server using SSL and authentication.  Open relays
encourage spam.  People shouldn't be relaying mail via just any SMTP server.

--Anton



-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: yahoo to use public key technology for anti-spam

2003-12-07 Thread Victor . Duchovni
On Sat, 6 Dec 2003, Will Rodger wrote:

>   Steve Bellovin wrote:
> >http://edition.cnn.com/2003/TECH/internet/12/05/spam.yahoo.reut/
>
>
> Does anyone have details? How much overhead would this entail?
>

To avoid replay attacks one needs to sign a string that is tied to a
specific message or time period and is invariant under forwarding through
various relays and gateways. The header and envelope sender and recipients
are often subject to rewriting, the Message-Id can be cloned. What exactly
would they have the sender domain sign.

I am skeptical that such a proposal can acquire any traction. Also curious
to see the details...

-- 
Viktor.

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


RE: yahoo to use public key technology for anti-spam

2003-12-07 Thread Carl Ellison
I, for one, hate the idea.  My From address should be [EMAIL PROTECTED]  That's
my remailer where I receive all my incoming e-mail.  However, my outgoing
SMTP server depends on which cable modem provider or hot spot I happen to be
at the moment.  It would be that SMTP machine that signs my outgoing mail,
not acm.org who never sees my outgoing mail.

So, in capsule: this proposal assumes that you use the same machine for
outgoing and incoming e-mail.


+--+
|Carl M. Ellison [EMAIL PROTECTED]  http://theworld.com/~cme |
|PGP: 75C5 1814 C3E3 AAA7 3F31  47B9 73F1 7E3C 96E7 2B71   |
+---Officer, arrest that man. He's whistling a copyrighted song.---+ 

> -Original Message-
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of Will Rodger
> Sent: Saturday, December 06, 2003 7:01 PM
> To: Steve Bellovin; [EMAIL PROTECTED]
> Subject: Re: yahoo to use public key technology for anti-spam
> 
>   Steve Bellovin wrote:
> >http://edition.cnn.com/2003/TECH/internet/12/05/spam.yahoo.reut/
> 
> 
> Does anyone have details? How much overhead would this entail?
> 
> And how, btw, should we feel about having to sign every 
> message from our 
> very own vanity domains?
> 
> Will Rodger
> 
> -
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to 
> [EMAIL PROTECTED]
> 

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: yahoo to use public key technology for anti-spam

2003-12-06 Thread Will Rodger
 Steve Bellovin wrote:
http://edition.cnn.com/2003/TECH/internet/12/05/spam.yahoo.reut/


Does anyone have details? How much overhead would this entail?

And how, btw, should we feel about having to sign every message from our 
very own vanity domains?

Will Rodger

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]