Re: spoofing email addresses

2004-05-27 Thread Paul Vixie
  In fact, there isn't any sane way to detect inconsistent header
  information without external hints - this is the reason why there's the
  SPF proposal, the Yahoo domain-keys proposal, and Microsoft's proposal.
 
 And MARID.

and don't forget HREF=http://sa.vix.com/~vixie/mailfrom.txt;MAIL-FROM/A.
-- 
Paul Vixie

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-27 Thread Valdis . Kletnieks
On Wed, 26 May 2004 15:00:00 MDT, Vernon Schryver [EMAIL PROTECTED]  said:
 I don't see any of those proposals and their competitors as sane.

Oh, I wasn't addressing whether the proposals were workable, merely listing
proposals motivated by the fact that verifying the legitimacy of a sending
machine is difficult.

As you correctly note below, the proposals aren't even a workable solution to
the real problem (I've yet to see a proposal that works if the spammers start
utilizing zombie machines that snarf the already-stored credentials of the user
to send mail)

 Some of them, such as SPF, do not even meet their own design goals
 as stated informally by their advocates.  Others such as domain-keys
 do not seem to do anything that is not already done by SMTP-TLS, despite
 the goals in the I-D that seem to be closer to S/MIME.  None of them
 have much to do with spam, but only with a currently popular mode of
 attack used by spammers.  None have any hope of affecting even that
 particular attack mode for years, because none can have any significant
 effect until deployed on most SMTP clients.  Many seem to be based on
 insufficient familiarity with the nature of SMTP (e.g. SPF's incredible
 source-routing scheme) and the urge to Do Something Now regardless of
 actual results.

Do you realize how *difficult* it is to create a workable anti-spam scheme that
doesn't run afoul of at least one line item of your you-might-be checklist? :)
(Thanks for writing it, BTW - I've decided it's the canonical answer to the
question Why is stopping spam so hard?)



pgpZqY6aaLdid.pgp
Description: PGP signature
___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-27 Thread Iljitsch van Beijnum
On 27-mei-04, at 16:56, [EMAIL PROTECTED] wrote:
the proposals aren't even a workable solution to
the real problem (I've yet to see a proposal that works if the 
spammers start
utilizing zombie machines that snarf the already-stored credentials of 
the user
to send mail)
It amazes me how many people are eager to declare defeat on the spam 
problem.

Regardless of anything else, having authenticated mail allows 
whitelisting. If credentials are compromised they're simply removed 
from the whitelist. This should work well for all non-huge whitelists.

There is also the possibility of blacklisting known bad credentials. 
Yes, spammers can steal credentials, but this is several orders of 
magnitude more difficult than just generating a random from address as 
can be done today. The question is whether spammers can obtain new 
credentials (stolen or otherwise) faster than others can blacklist 
them. For user-based credentials this could very well be the case 
(although I'm not conceding to that), but for MTA-based credentials it 
should be possible to rate limit the obtaining of a new identity such 
that spammers can no longer reach critical mass. (I.e., wait a week 
before you can use an MTA with a certain address, then spam an hour 
before you're blacklisted reduces the amount of spam that can be sent 
from an address by a factor 169.)

The people who claim that something can't be done shouldn't get in the 
way of the people doing it.

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-27 Thread Mr. James W. Laferriere
Hello Paul ,

On Wed, 26 May 2004, Paul Vixie wrote:
   In fact, there isn't any sane way to detect inconsistent header
   information without external hints - this is the reason why there's the
   SPF proposal, the Yahoo domain-keys proposal, and Microsoft's proposal.
  And MARID.

 and don't forget HREF=http://sa.vix.com/~vixie/mailfrom.txt;MAIL-FROM/A.
I do not see a draft in the ietf process anyplace .  Was this
ever submitted ?  I do notice that several of the other
proposal's make mention of this work ,  But in none of them do
they mention it as a draft or other ietf work .  Any plans to
submit it as a draft .  Tia ,  JimL
-- 
   +--+
   | James   W.   Laferriere | SystemTechniques | Give me VMS |
   | NetworkEngineer | 3542 Broken Yoke Dr. |  Give me Linux  |
   | [EMAIL PROTECTED] | Billings , MT. 59105 |   only  on  AXP |
   +--+

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-27 Thread Valdis . Kletnieks
On Thu, 27 May 2004 18:23:17 +0200, Iljitsch van Beijnum said:
 There is also the possibility of blacklisting known bad credentials.

Anybody who's had to get themselves out of 3,000 private blacklists, and
anybody who's had to fight with places that were blackholing the 69/8 address
space, knows that private blacklists are a bad idea.

And nobody seems to want to trust anybody to run a public blacklist to
everybody's satisfaction.  Consider that we as an industry haven't even figured
out how to pick an organization to supervise the DNS to everybody's
satisfaction.  Think about ICANN and how many TLD's should there be? and
Verisign's Site Finder.  Add in Matt Blaze's adage about A CA can protect
you from anybody they're not accepting money from, and the various
jurisdictional issues.  Then ask yourself if we're in any position to let
*anybody* decide You can't send/receive email.

(Notice, I haven't said it's impossible - I said that we as a community don't
know how to do it.  There's a big and very important distinction there...)

 Yes, spammers can steal credentials, but this is several orders of 
 magnitude more difficult than just generating a random from address as 
 can be done today. The question is whether spammers can obtain new 
 credentials (stolen or otherwise) faster than others can blacklist 
 them. For user-based credentials this could very well be the case 
 (although I'm not conceding to that), but for MTA-based credentials it
 should be possible to rate limit the obtaining of a new identity such 
 that spammers can no longer reach critical mass. (I.e., wait a week 
 before you can use an MTA with a certain address, then spam an hour 
 before you're blacklisted reduces the amount of spam that can be sent 
 from an address by a factor 169.)

There's two problems with this:

1) Waiting a week probably isn't a sellable to the user community.  If you
don't believe me, consider how fast people bailed their domain registrations
away from a registrar that had a reputation of taking a week to do anything,
and going to registrars that promised setup times measured in hours.

2) The assumption that you can catch, verify, and deploy a blacklist for a
spammer in an hour is highly suspect, for several reasons:

(a) it means that the *effective* TTL of a DNS MX entry is much lower than an
hour (as everybody will have to re-fetch at least 2-3 times an hour to verify
they're not blacklisted - a once-an-hour update means that on the *average*
there will be a 30 minute delay, and up to 59 minutes at worst case).  Notice
how few software products that use X.509 certs actually implement CRL's
*correctly*...

(b) Under an hour deployment almost certainly implies an automated process to
blacklist..  That has denial of service written all over it

Again, I haven't said it's *impossible* - merely that we've not seen a concrete
proposal that actually has the right scaling and uptake characteristics...

 The people who claim that something can't be done shouldn't get in the 
 way of the people doing it.

I didn't say it *cant* be done.  I said there were known problems that any
successful solution would have to address.

Solving the spam problem is like solving global warming - neither is a problem
that demonstrably *cant* be done, but both are problems that we don't know how
to solve and which don't have anybody actively solving the problem in a production
mode (the fact that both are still perceived as a problem is proof that neither is
actually being solved).



pgpangt26HJPm.pgp
Description: PGP signature
___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-27 Thread Vernon Schryver
 From: [EMAIL PROTECTED]

  The people who claim that something can't be done shouldn't get in the 
  way of the people doing it.

 I didn't say it *cant* be done.  I said there were known problems that any
 successful solution would have to address.

Another response is to point out that all of the sender validating
systems are today only proposals that can be seen as getting in the
way of effective tactics.  The talkers trying to get in the way of the
doers are, as usual, those who endless prescribe spam solutions that
they themselves have not thought out, not to mention documented, tested,
or deployed.

The vast majority of the spam that sender validating systems might
block after they have been installed in most SMTP clients 5 or 10 years
from now is rejected today at any organization that really cares about
spam using any of various tactics including DNS blacklists (e.g. the
CBL or the so called dynamic IP lists) and greylisting.
Essentially all of the spam that any sender validating system might
someday block after large outfits like Comcast have installed validating
code on their SMTP clients and servers would be blocked today at the
source if those same outfits would block port 25 for all types of IP
service except the one that draft-klensin-ip-service-terms-01.txt calls
Full Internet Connectivity.  That is because current spam that
would be blocked by sender validating comes trojan proxies.

The current state of the art in spam defenses reject more than 99%
of spam with less than 1% false positives (or variations of those
numbers such as 95% and 0.1%).  No one who is actually do anything
about spam is content with those numbers or confident that new
tactics will not be needed, but please don't tell the experts who
don't know the difference betwee an SMTP rejection and a bounce, lest
they be encouraged to tell us some more what we really should be doing.

As usual, the usual suspects who might someday get around to reading
an RFC, any RFC, tell us that The Final Ultimate Solution to the Spam
Problem is just around the corner.  Their Finual Ultimate Solution is
waiting for the obstructionists to get out of the way of those who
will realsoonnow write the FUSSP RFC.  Of course, the usual suspects
can't be bothered to come down from Mt. Olympus to write a I-D or
learn the relationship between I-Ds and RFCs.  They don't care about
the differences among documenting, testing, or deploying, or the chasm
between practice and sidewalk superintendent theory.


Probably the best response is to send people to the MADID mailing list.
I've often said that the IETF is well served by working groups that do
no more than absorb the energies of standards committee goers.


Vernon Schryver[EMAIL PROTECTED]

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: spoofing email addresses

2004-05-27 Thread Iljitsch van Beijnum
On 27-mei-04, at 20:51, Vernon Schryver wrote:
The vast majority of the spam that sender validating systems might
block after they have been installed in most SMTP clients 5 or 10 years
from now is rejected today at any organization that really cares about
spam using any of various tactics including DNS blacklists (e.g. the
CBL or the so called dynamic IP lists) and greylisting.
I'd say back this up but then we're once again having one of these 
unproductive spam discussions. Why don't we all do this on our personal 
favorite anti-spam list and revist the issue here only when there is a 
pertinent draft in last call?

One last remark:
block port 25
This is evil for several reasons:
1. blocking ports reduces the functionality of the internet
2. doing work per-packet rather than per-session is inefficient 
(especially considering that only a small fraction of all packets is 
email to begin with)
3. requiring others to clean up their act rather than do something 
yourself is ineffective

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


RFC 3778 on The application/pdf Media Type

2004-05-27 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 3778

Title:  The application/pdf Media Type
Author(s):  E. Taft, J. Pravetz, S. Zilles, L. Masinter
Status: Informational
Date:   May 2004
Mailbox:[EMAIL PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED], [EMAIL PROTECTED]
Pages:  14
Characters: 29891
Updates/Obsoletes/SeeAlso:None

I-D Tag:draft-zilles-pdf-03.txt

URL:ftp://ftp.rfc-editor.org/in-notes/rfc3778.txt


PDF, the 'Portable Document Format', is a general document
representation language that has been in use for document exchange on
the Internet since 1993.  This document provides an overview of the
PDF format, explains the mechanisms for digital signatures and
encryption within PDF files, and updates the media type registration
of 'application/pdf'.

This memo provides information for the Internet community.  It does
not specify an Internet standard of any kind.  Distribution of this
memo is unlimited.

This announcement is sent to the IETF list and the RFC-DIST list.
Requests to be added to or deleted from the IETF distribution list
should be sent to [EMAIL PROTECTED]  Requests to be
added to or deleted from the RFC-DIST distribution list should
be sent to [EMAIL PROTECTED]

Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
an EMAIL message to [EMAIL PROTECTED] with the message body 
help: ways_to_get_rfcs.  For example:

To: [EMAIL PROTECTED]
Subject: getting rfcs

help: ways_to_get_rfcs

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.echo 
Submissions for Requests for Comments should be sent to
[EMAIL PROTECTED]  Please consult RFC 2223, Instructions to RFC
Authors, for further information.


Joyce K. Reynolds and Sandy Ginoza
USC/Information Sciences Institute

...

Below is the data which will enable a MIME compliant Mail Reader 
implementation to automatically retrieve the ASCII version
of the RFCs.
ftp://ftp.isi.edu/in-notes/rfc3778.txt

___
IETF-Announce mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf-announce