Re: email and spam (was: Re: namedroppers, continued)

2003-01-17 Thread Bob Braden

Another thought on the spam problem and Frequently Proposed Solutions
in general: as a community we have become obsessed with ephemeral
information.  That is, we all sit in front of our terminals, read our
email, (re-)invent new ideas, and spew them instantly across the world;
these ideas are lost and forgotten in a week.

The web does go some limited way towards creating archival information
-- ideas that remain and can be used to inform later idea -- but it
does not go far enough.  Ultimately, the only way we can avoid
regurgitating the same ideas over and over is to invest some of our
effort in converting ephemeral information into truly archival
information.  This is a shift with some analogy to the shift of
civilization that resulted from replacing conversations around the
campfire with written words on tablets and in books.  Creating
competant and useful archival material is hard intellectual work,
harder than sitting in front of our terminals, reading our email,
(re-)inventing ... etc., but I believe it is the only real path
to progress.

In the Internet community, the RFC series of docuemnts has been
perpetuated as an archival document series for this purpose.

Bob Braden






Re: email and spam (was: Re: namedroppers, continued)

2003-01-17 Thread Vernon Schryver
 From: Bob Braden [EMAIL PROTECTED]

 ...
 Another thought on the spam problem and Frequently Proposed Solutions
 in general: as a community we have become obsessed with ephemeral
 information.  That is, we all sit in front of our terminals, read our
 email, (re-)invent new ideas, and spew them instantly across the world;
 these ideas are lost and forgotten in a week.

 The web does go some limited way towards creating archival information
 -- ideas that remain and can be used to inform later idea -- but it
 does not go far enough.  Ultimately, the only way we can avoid
 regurgitating the same ideas over and over is to invest some of our
 effort in converting ephemeral information into truly archival
 information. ...

Archiving is useless unless people consult those archives.  Those who
continually re-invent (non-)solutions for spam will not be detered by
archives any more than IPv8 advocates are bothered by the difficulties
some people claim to see in representing more than 4,294,967,296 things
with 32 bits.

For example, those who think that authentication could stop spam won't
change their minds because someone writes something more.  If written
words mattered, they'd know about RFC 2554, RFC 2487, RFC 2645, and
RFC 2476 instead of insisting that SMTP should be replaced with a mail
protocol that authenticates senders.

The stream of non-solutions to spam not only ignores the existing
literature, but also ignores itself.  If the people pumping out the
stuff would pause and look just little at other proposals, they'd
notice their wonderful new idea flying by.  That's the crux of the
anti-spam excitement.  We're watching a dot-com boomlet of hopes and
dreams to get rich or at least famous by Finally Stopping All Spam.
As with b-to-b, b-to-c, disintermediation, CMR, multi-media, and the
other SuperHypeWay crazes, people are rushing to market regardless of
history, archives, or any other consideration.


Vernon Schryver[EMAIL PROTECTED]




Re: email and spam (was: Re: namedroppers, continued)

2003-01-16 Thread John C Klensin


--On Wednesday, 15 January, 2003 18:17 -0800 Dave Crocker
[EMAIL PROTECTED] wrote:

 John,
 
 Before someone makes suggestions about the magic bullet that
 will solve spam problems, they should at least familiarize
 themselves with the rather interesting range of startup
 company approaches to handling the problem.  Everything
 ranging from keyword filtering by a commercial version of
 spamassassin, to patenting a haiku.
 
 And they should become familiar with the public policy and
 politics debates on the topic.
 
 This is a multifaceted problem, including the minor fact that
 people's definition of spam is highly variable.  At this
 stage it appears clear that no single magic bullet is possible
 and that we should start viewing spam the way we view roaches.
 We don't like them.  They are bad.  We do a range of things to
 get rid of them.  It all helps.  But we do not eliminate them.
 We simply reduce them to a tolerable level.

Is there some part of this with which you assume I disagree?

 john







Re: email and spam (was: Re: namedroppers, continued)

2003-01-16 Thread jfcm
Dave, John,
at least in the case of spamming, it seems there is an agreement on the 
interest of cataloging the internet engineering frequently proposed 
solutions, to get a complet picture of the various existing and dropped 
propositions. This might both help not to repeat the same propositions and, 
may be, to discover usefull variations or, anyway, to help the thinking.

I understand that the difficulties would be:

- this could be perceived as a way to laugh at propositions. This is not 
the idea, and it can be adressed in having the author registering himself 
his suggestion, with a field reserved to quote the corresponding drafts 
and/or resulting RFC(s). It would help to quote references in drafts.

- this has neither to be verbose nor too terse. I would suggest a character 
limit and a link to a position page or a site (case of a commercial 
proposition) of the author.

- this should help debates. The author should be able to update his text 
and links.

- one needs the resources and staff. I am ready with anyone interested to 
start working on this if it may help. I made registered iefps.org by 
world@wide to that end (so we may freely discuss it). May be could ut be 
understood as internet engineering first proposed suggestions to make it 
some kind of historical repository (showing this is a positive service). 
Also a way to pay our common due to the initial good idea's proposers (like 
for the Cluster or the Catenet issues?). To do that we could think of a 
ticket system, the author may register and update further on (but not 
delete to keep it serious). It would ask for some classifications or 
keywords permitting to sort them by themes?

jfc


On 03:17 16/01/03, Dave Crocker said:
John,
Before someone makes suggestions about the magic bullet that will solve
spam problems, they should at least familiarize themselves with the
rather interesting range of startup company approaches to handling the
problem.  Everything ranging from keyword filtering by a commercial
version of spamassassin, to patenting a haiku.

And they should become familiar with the public policy and politics
debates on the topic.

This is a multifaceted problem, including the minor fact that people's
definition of spam is highly variable.  At this stage it appears clear
that no single magic bullet is possible and that we should start viewing
spam the way we view roaches.  We don't like them.  They are bad.  We do
a range of things to get rid of them.  It all helps.  But we do not
eliminate them.  We simply reduce them to a tolerable level.

d/

Tuesday, January 7, 2003, 3:22:06 PM, you wrote:
John Almost all of the measures you have suggested have serious
John side-effects or critical prerequisites.  In the last analysis,
John most of us would rather put up with a little spam than pay the
John prices involved.  Others are sufficiently fed up with spam that
John they are willing to consider some very radical changes to how we
John use email.  But, regardless of how that comes out, the decisions
John have been fairly explicit: people have thought of your
John suggestions, and others, and their impact, and have made fairly
John explicit decisions about preferences.  My comment about X.400 of
John a few weeks ago was intended to address those issues, but
John apparently made a reference too far in the past, or too subtle,
John for some of the people who have been participating in the
John discussion.


d/
--
 Dave mailto:[EMAIL PROTECTED]
 Brandenburg InternetWorking http://www.brandenburg.com
 t +1.408.246.8253; f +1.408.850.1850






---
Incoming mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.427 / Virus Database: 240 - Release Date: 06/12/02



Re: email and spam (was: Re: namedroppers, continued)

2003-01-15 Thread Dave Crocker
John,

Before someone makes suggestions about the magic bullet that will solve
spam problems, they should at least familiarize themselves with the
rather interesting range of startup company approaches to handling the
problem.  Everything ranging from keyword filtering by a commercial
version of spamassassin, to patenting a haiku.

And they should become familiar with the public policy and politics
debates on the topic.

This is a multifaceted problem, including the minor fact that people's
definition of spam is highly variable.  At this stage it appears clear
that no single magic bullet is possible and that we should start viewing
spam the way we view roaches.  We don't like them.  They are bad.  We do
a range of things to get rid of them.  It all helps.  But we do not
eliminate them.  We simply reduce them to a tolerable level.

d/

Tuesday, January 7, 2003, 3:22:06 PM, you wrote:
John Almost all of the measures you have suggested have serious
John side-effects or critical prerequisites.  In the last analysis,
John most of us would rather put up with a little spam than pay the
John prices involved.  Others are sufficiently fed up with spam that
John they are willing to consider some very radical changes to how we
John use email.  But, regardless of how that comes out, the decisions
John have been fairly explicit: people have thought of your
John suggestions, and others, and their impact, and have made fairly
John explicit decisions about preferences.  My comment about X.400 of
John a few weeks ago was intended to address those issues, but
John apparently made a reference too far in the past, or too subtle,
John for some of the people who have been participating in the
John discussion.


d/
-- 
 Dave mailto:[EMAIL PROTECTED]
 Brandenburg InternetWorking http://www.brandenburg.com
 t +1.408.246.8253; f +1.408.850.1850





Re: email and spam (was: Re: namedroppers, continued)

2003-01-14 Thread Dave Crocker
Folks,

Monday, January 13, 2003, 1:47:57 PM, you wrote:
   *  Could we not think of an FPS (frequently proposed
 solutions)

John Absolutely.  But such a hypothetical author would have to be
John very motivated.

Would there be some benefit in taking the first step of simply listing FPSs,
without doing their detailed documentation?



d/
-- 
 Dave mailto:[EMAIL PROTECTED]
 Brandenburg InternetWorking http://www.brandenburg.com
 t +1.408.246.8253; f +1.408.850.1850





Re: email and spam (was: Re: namedroppers, continued)

2003-01-13 Thread John C Klensin
--On Tuesday, 07 January, 2003 13:33 -0500 Doug
[EMAIL PROTECTED] wrote:

 Doug has rediscovered the idea of closing open mail relays to
 prevent
 unauthorised use by outsiders sending to outsiders. This was
 a big thing in the early 90s when email became popular.
 
 This may seem to be a bit basic for some of the people who
 have worked on this problem for years. My intention was not to
 prove that I had the latest and greatest solution to the spam
 problem. It was to get the ball rolling in an open discussion
 forum and present my ideas on the topic in the hopes that
 someone who knew more than me on the topic would as well.
...

Ok, Doug.  Let me take a shot at simultaneously explaining the
problem here and  why your suggested solutions are getting such
resistance.  Perhaps a different approach may succeed where
Lloyd's didn't (not his fault, I'm sure).

Almost all of the measures you have suggested have serious
side-effects or critical prerequisites.  In the last analysis,
most of us would rather put up with a little spam than pay the
prices involved.  Others are sufficiently fed up with spam that
they are willing to consider some very radical changes to how we
use email.  But, regardless of how that comes out, the decisions
have been fairly explicit: people have thought of your
suggestions, and others, and their impact, and have made fairly
explicit decisions about preferences.  My comment about X.400 of
a few weeks ago was intended to address those issues, but
apparently made a reference too far in the past, or too subtle,
for some of the people who have been participating in the
discussion.

The people who have been through it are reluctant to start the
discussion again because the dead horse has been kicked into an
unrecognizable pulp. There has been a good deal of discussion,
in many archives, that it would be good for you to read.  If you
then come up with a _new_ idea that doesn't revisit the old
problems, many of us would be enthused about listening.  It is
only the old and discredited proposals that are met with
intolerance.

Let me take a closely-related pair of examples from your note.
As I understand it, you would like ISPs (really email providers)
to take responsibility for authenticating their customers.  And
you would like IP addresses shown in mail header traces to be
reliable.  Ok.  Those two things turn out to be much more about
trust relationships than they are about protocols: one can make
major changes to protocols without changing the trust
relationships at all, and can accomplish those things without
any changes in the protocols.  But, assuming that you aren't
willing to trust anyone who can operate a mail-sending protocol,
there are only a few ways that you can trust the source and
origins of email.  

For example, we could, as a society, start licensing email
providers, require each licensed provider to accept mail only
from other licensed providers and from users they can
authenticate (with severe penalties for violating those rules).
That would make folks who would like to go back to business
models in which they charge for every item of mail very happy.
It would make many of the rest of us unhappy.  But it would
work... and, while some protocol enhancements might make it
easier to support, nothing is really required beyond SMTP as it
exists today.

Similarly, you could decide to work with an email mailbox
provider who would refuse to accept mail from any site with
which it didn't have an agreement about user authentication and
traffic and which, were relaying permitted, would insist that
any site from which it accepted a relayed message impose the
same requirements on its users.  With some prototype agreement
forms, this could be a way to build up a trust web similar to
the licensing one, using a web of bilateral agreements rather
than governmental action.  

But either of those approaches would result in less legitimate
mail getting through.  For instance, I run my own mail servers
and, as far as I know, can authenticate anyone who originates
mail here.  But I have neither the resources nor the inclination
to participate in a large collection of bilateral contractual
agreements, nor to start applying for licenses.

The issues with those bad IP addresses are similar.  Most are
spoofed.  You can trust the information in Received headers only
as far back as the last mail host you trust to report
information accurately.  If there is a spammer deliberately
deciding to deceive you, anything earlier is likely to be trash,
not because the wrong information is in the Whois tables, but
because the data in the Received fields is being made up (either
at random or in the hope of pinning the spam on someone else).
And, again, formalizing  the trust relationships through
contracts or licenses would help a great deal, and might be the
only solution, but those options carry a high price in terms of
generally accessibility and usability of email.

regards,
john

p.s.

 Asking 

Re: email and spam (was: Re: namedroppers, continued)

2003-01-13 Thread jfcm
Dear John,
I am afraid that at this stage (e-mail + 40 or so years) telling someone to 
read the archives has no meaning. And telling him to post if he has a 
_new_idea either.

Could we not think of an FPS (frequently proposed solutions) where each 
defeated solutions would be listed and quickly discussed. There would be 
two good reasons:

1. to provide a true list of what has been proposed. It would save time to 
all and provide a good negative check list for those with an idea. At least 
it would be new to the FPS: it would be added or used.

2. very often the roots of the true solution is something which has been 
half thought and overlooked. Or something triggered in someone's mind by 
another idea.

jfc

PS. From what you quote, you seem to consider that SPAM=spoofing? Are there 
statistics and trends about that?



On 00:22 08/01/03, John C Klensin said:

--On Tuesday, 07 January, 2003 13:33 -0500 Doug
[EMAIL PROTECTED] wrote:

 Doug has rediscovered the idea of closing open mail relays to
 prevent
 unauthorised use by outsiders sending to outsiders. This was
 a big thing in the early 90s when email became popular.

 This may seem to be a bit basic for some of the people who
 have worked on this problem for years. My intention was not to
 prove that I had the latest and greatest solution to the spam
 problem. It was to get the ball rolling in an open discussion
 forum and present my ideas on the topic in the hopes that
 someone who knew more than me on the topic would as well.
...

Ok, Doug.  Let me take a shot at simultaneously explaining the
problem here and  why your suggested solutions are getting such
resistance.  Perhaps a different approach may succeed where
Lloyd's didn't (not his fault, I'm sure).

Almost all of the measures you have suggested have serious
side-effects or critical prerequisites.  In the last analysis,
most of us would rather put up with a little spam than pay the
prices involved.  Others are sufficiently fed up with spam that
they are willing to consider some very radical changes to how we
use email.  But, regardless of how that comes out, the decisions
have been fairly explicit: people have thought of your
suggestions, and others, and their impact, and have made fairly
explicit decisions about preferences.  My comment about X.400 of
a few weeks ago was intended to address those issues, but
apparently made a reference too far in the past, or too subtle,
for some of the people who have been participating in the
discussion.

The people who have been through it are reluctant to start the
discussion again because the dead horse has been kicked into an
unrecognizable pulp. There has been a good deal of discussion,
in many archives, that it would be good for you to read.  If you
then come up with a _new_ idea that doesn't revisit the old
problems, many of us would be enthused about listening.  It is
only the old and discredited proposals that are met with
intolerance.

Let me take a closely-related pair of examples from your note.
As I understand it, you would like ISPs (really email providers)
to take responsibility for authenticating their customers.  And
you would like IP addresses shown in mail header traces to be
reliable.  Ok.  Those two things turn out to be much more about
trust relationships than they are about protocols: one can make
major changes to protocols without changing the trust
relationships at all, and can accomplish those things without
any changes in the protocols.  But, assuming that you aren't
willing to trust anyone who can operate a mail-sending protocol,
there are only a few ways that you can trust the source and
origins of email.

For example, we could, as a society, start licensing email
providers, require each licensed provider to accept mail only
from other licensed providers and from users they can
authenticate (with severe penalties for violating those rules).
That would make folks who would like to go back to business
models in which they charge for every item of mail very happy.
It would make many of the rest of us unhappy.  But it would
work... and, while some protocol enhancements might make it
easier to support, nothing is really required beyond SMTP as it
exists today.

Similarly, you could decide to work with an email mailbox
provider who would refuse to accept mail from any site with
which it didn't have an agreement about user authentication and
traffic and which, were relaying permitted, would insist that
any site from which it accepted a relayed message impose the
same requirements on its users.  With some prototype agreement
forms, this could be a way to build up a trust web similar to
the licensing one, using a web of bilateral agreements rather
than governmental action.

But either of those approaches would result in less legitimate
mail getting through.  For instance, I run my own mail servers
and, as far as I know, can authenticate anyone who originates
mail here.  But I have neither the resources nor the inclination
to 

Re: email and spam (was: Re: namedroppers, continued)

2003-01-13 Thread John C Klensin
--On Monday, 13 January, 2003 17:23 +0100 jfcm [EMAIL PROTECTED]
wrote:

 Dear John,
 I am afraid that at this stage (e-mail + 40 or so years)
 telling someone to read the archives has no meaning. And
 telling him to post if he has a _new_idea either.

You are entitled to your opinion.  I was only trying to suggest
that people who come to the IETF list, and propose the same old,
failed, ideas as if they had just received a relevation from on
high are likely to get some resistance... and to explain that
resistance.

 Could we not think of an FPS (frequently proposed solutions)
 where each defeated solutions would be listed and quickly
 discussed. There would be two good reasons:
 
 1. to provide a true list of what has been proposed. It would
 save time to all and provide a good negative check list for
 those with an idea. At least it would be new to the FPS: it
 would be added or used.
 
 2. very often the roots of the true solution is something
 which has been half thought and overlooked. Or something
 triggered in someone's mind by another idea.

Variations on this idea have been proposed to the IESG and IAB
several times, and have not gone anywhere.  I'll leave
explanations as to why to someone else, but  at a minimum, there
has been a shortage of volunteers to maintain a dumb ideas
archive (I know, that isn't quite what you said) and a shortage
of entities willing to shield such volunteers from liability.

 PS. From what you quote, you seem to consider that
 SPAM=spoofing? Are there statistics and trends about that?

There is certainly non-spoofed spam, including the many
materials that claim one has subscribed to an opt-in list or and
others that claim they are conformant to some law which never
passed.  I don't have any statistics that go beyond the
anecdotal.  But, if you look at the mass e-mailing software
packages that are frequently advertised (not exclusively by
spam), most of very proud of their capabilities to hide actual
message origins and to use the facilities of others as relaying
in supposedly-undetectable ways.  Similarly, as Doug and others
have observed, spam often comes with headers that are
sufficiently spoofed to make addresses and other data useless.
I assume --but cannot prove-- that all of these symptoms are
indications that spammers know that messages that use consistent
and accurate origin information are easily filtered out and
discarded and that most ISPs have terms and conditions of
service that prohibits using their facilities to spam.

regards,
 john





Re: email and spam (was: Re: namedroppers, continued)

2003-01-13 Thread Bob Braden

  *  Could we not think of an FPS (frequently proposed solutions)
  *  where each defeated solutions would be listed and quickly
  *  discussed. There would be two good reasons:
  *  
  *  1. to provide a true list of what has been proposed. It would
  *  save time to all and provide a good negative check list for
  *  those with an idea. At least it would be new to the FPS: it
  *  would be added or used.
  *  
  *  2. very often the roots of the true solution is something
  *  which has been half thought and overlooked. Or something
  *  triggered in someone's mind by another idea.
  * 
  * Variations on this idea have been proposed to the IESG and IAB
  * several times, and have not gone anywhere.  I'll leave
  * explanations as to why to someone else, but  at a minimum, there
  * has been a shortage of volunteers to maintain a dumb ideas
  * archive (I know, that isn't quite what you said) and a shortage
  * of entities willing to shield such volunteers from liability.

John,

True.  However, a useful, and perhaps feasible, approach would be for
a person knowledgable about the problem area to write an
Informational review RFC about it.  Such an RFC would review the
problem, the suggested solutions, and their up/downsides.  Such a
document would not have to be complete to be very useful; a snapshot at
a particular time would be a big step forward.

Bob Braden




Re: email and spam (was: Re: namedroppers, continued)

2003-01-13 Thread John C Klensin
--On Monday, 13 January, 2003 20:51 + Bob Braden
[EMAIL PROTECTED] wrote:

 
   *  Could we not think of an FPS (frequently proposed
 solutions)   *  where each defeated solutions would be
 listed and quickly   *  discussed. There would be two good
 reasons:
   *  
   *  1. to provide a true list of what has been proposed. It
 would   *  save time to all and provide a good negative
 check list for   *  those with an idea. At least it would be
 new to the FPS: it   *  would be added or used.
   *  
   *  2. very often the roots of the true solution is
 something   *  which has been half thought and overlooked.
 Or something   *  triggered in someone's mind by another
 idea.
   * 
   * Variations on this idea have been proposed to the IESG
 and IAB   * several times, and have not gone anywhere.  I'll
 leave   * explanations as to why to someone else, but  at a
 minimum, there   * has been a shortage of volunteers to
 maintain a dumb ideas   * archive (I know, that isn't quite
 what you said) and a shortage   * of entities willing to
 shield such volunteers from liability.
 
 John,
 
 True.  However, a useful, and perhaps feasible, approach would
 be for a person knowledgable about the problem area to write an
 Informational review RFC about it.  Such an RFC would review
 the problem, the suggested solutions, and their up/downsides.
 Such a document would not have to be complete to be very
 useful; a snapshot at a particular time would be a big step
 forward.

Bob,

Absolutely.  But such a hypothetical author would have to be
very motivated.  Posting of an I-D would almost certainly
produce a large amount of mail.  Some would be sympathetic,
others would make useful suggestions, still others would want to
debate particular points based on more or less realistic
perceptions about how the world works, the morals of spamming.
Then the document would go to the IESG and RFC Editor.  While I
agree with your observation that completeness would not be
needed for utility, previous experience predicts that IESG
members would nit-pick the document, or just stall, until all of
the points that any IESG member considered important were
covered, and covered in a way compatible with that IESG member's
views.  If views on the IESG conflicted, the document could
easily be help up forever, and I note that there is no appeal
against IESG delay or failure to take an action.  Then, again
based on experience, the odds seem high that the RFC Editor
would delay it, requesting editorial and formatting changes that
are not covered in any written style manual, not responding to
questions about those requests for weeks or months at a time,
and so on.   

The combination of these processes could easily lead to a delay
of six to nine months or longer between the time the author
thought he or had a finished document and the time of
publication, by which time the document might well be obsolete
(producing more abuse for the author). 

So, while I agree that such a document would be useful, I would
imagine that someone would need to be either extremely motivated
or quite naive about how IETF and the publication process
functions to try writing it.  It is, unfortunately, much easier
to ignore repetitions of unworkable ideas and possibly to try to
briefly explain the problems with them.

regards,
john





Re: email and spam (was: Re: namedroppers, continued)

2003-01-13 Thread jfcm
On 21:06 13/01/03, John C Klensin said:

--On Monday, 13 January, 2003 17:23 +0100 jfcm [EMAIL PROTECTED]
wrote:
 Dear John,
 I am afraid that at this stage (e-mail + 40 or so years)
 telling someone to read the archives has no meaning. And
 telling him to post if he has a _new_idea either.

You are entitled to your opinion.  I was only trying to suggest
that people who come to the IETF list, and propose the same old,
failed, ideas as if they had just received a relevation from on
high are likely to get some resistance... and to explain that
resistance.


I know and I agree. My point is 40 years of reading is somewhat long and 
uncertain.

 Could we not think of an FPS (frequently proposed solutions)
 where each defeated solutions would be listed and quickly
 discussed. There would be two good reasons:

 1. to provide a true list of what has been proposed. It would
 save time to all and provide a good negative check list for
 those with an idea. At least it would be new to the FPS: it
 would be added or used.

 2. very often the roots of the true solution is something
 which has been half thought and overlooked. Or something
 triggered in someone's mind by another idea.

Variations on this idea have been proposed to the IESG and IAB
several times, and have not gone anywhere.  I'll leave
explanations as to why to someone else, but  at a minimum, there
has been a shortage of volunteers to maintain a dumb ideas
archive (I know, that isn't quite what you said) and a shortage
of entities willing to shield such volunteers from liability.


h. Let take it another way. Would it help if we set-up
a place where each proposition could be registered in a few lines
by the proposer or dead ends documented by old-timers?

Instead of flaming proposers, they could just advise them to
register their propositions first. The flaming would still be here
but the register would be built.

As to know if it would be a dumb or a too brillant ideas archive :-)
jfc










Re: namedroppers, continued

2003-01-07 Thread Melinda Shore
In that environment, anybody can get around what you're
proposing by setting up their own first hop mail server.
Or n hop mail server, for that matter.

Melinda




Re: namedroppers, continued

2003-01-07 Thread Valdis . Kletnieks
On Mon, 06 Jan 2003 18:08:44 EST, Doug said:
 You can tell the difference between 1, 2, and 3 because they all have
 a different DNS/IP footprint.

They do? Are you sure of this?  I'll give you a hint - if you're outside
the two /16's of our network, and you get an inbound SMTP connection from us,
looking up the PTR to get the hostname will almost certainly *NOT* have
the string 'mail' in it.

And the inbound and outbound mail servers at ietf.org are called 'odin' and
'ran', respectively..  Not much info there.

And last I heard, about 30% of the PTR space is broken beyond use due to
cluenessness on the ISP's part, so you can't get a DNS name you can trust.

So what DNS/IP footprint were you planning to use?

 You can send email directly to the IETF mail server?

Yes, sometimes multiple times an hour if I'm in a verbose mood...

   Do you have an
 account on that server?

Nope, no account there. Don't need one, works fine..

 I myself use a SMTP server to send out my email. It goes from my email
 client to the SMTP server I happen to be using and it then gets
 relayed through the network until it reaches the destination email
 server.

OK.. to be *very* pedantic, I use an SMTP server as well.  My MUA (Mail
User Agent) exmh hands the mail to the SMTP server I happen to be using,
and the SMTP server relays mail everyplace.  It just happens that my preferred
SMTP server happens to be already running on my laptop

 I am not suggesting that the destination email server should ask for
 authentication for every email it receives before it relays it on to
 another mail server or a client. I am saying that the originating
 server should ask for it before accepting it and relaying it on to the
 network.

Aha.  I see now.  What you *want* is what all properly run mail servers
*ALREADY* do.  It's amazingly useful for tracking down users that are being
silly and need a slap upside the head to clear the kloo blockage.  What
it's NOT useful for is stopping the determined spammer who doesn't use
your mail server to inject the mail into the net

The reason it doesn't stop spam is because you're missing an important
point - you seem to think that if the sending server validates the user,
we won't have spam..

 authenticate with the server. This in effect means that you cannot use
 a different return/reply address (or a fake return/reply address) that

Hmm.. so the mail I'm replying to wouldn't work, because I got it from the IETF server
but it has your From: address on it - therefore the IETF server must be
lying about who it is and who the sender is.

Actually, that's not quite true - there's usually 
 cannot be traced back to your account on the originating server by the
 recipient or an IP/DNS footprint that cannot be traced back to your
 machine or a point on your network by the recipient. This is to force
 the person sending the email to be accountable for the email sent.

OK.. and this is *forcing* it *how*?

Think carefully here - the receiving end is trusting what the sender
sends.

 and account status on that server. The server would then tag
 information onto the email that would identify the machine on which
 the email client that sent the email resides (not the information of
 an unsecured proxy). In addition, the originating server should tag
 information that identifies the account (on the originating
 server/network) that the client used to send the email and force the
 originating client to provide a valid reply address that is associated
 with the account to the recipient of the email.

And of *COURSE*, not even a SPAMMER would be so unrighteous as to forge
a this mail was approved header.

This mail has a 'X-Verified-Sender-Address:' header that identifies
the originating address.  Take a look at it, and tell me if you feel any
better about having verified the origin.  And remember that since I control
my machine, I can make a similar change to any *OTHER* header (From:, Sender:,
X-Authenticated:, or whatever).

And the spammer controls his server

/Valdis




msg09916/pgp0.pgp
Description: PGP signature


Re: namedroppers, continued

2003-01-07 Thread jfcm
At 13:05 07/01/03, Lloyd Wood wrote:

Doug has rediscovered the idea of closing open mail relays to prevent
unauthorised use by outsiders sending to outsiders. This was a big
thing in the early 90s when email became popular.

Doug has also come up with the idea of adding the IP address of the
originating client machine (not necessarily using SMTP) in a header
so that an attempt can be made to identify it - e.g. Hotmail has done
that for years.

missing mail admin experience, I think.


This remarks shows that the problem is around for more than ten years and 
that no one found a satisfactory solution in using the present system. 
Would this feed back from real world not be enough for us to understand its 
'cybernetic' (true meaning) lesson : the current mail system model is 
inadequate.

Question now is : do we have to investigate a new one? or can an 
architectural change/addition may elegantly address the case? probably a 
mix of both due to the existing e-mail system use. ie a new e-mail system 
with a retro-compatibility with the current one. Or would it also be a new 
TCP/IP design, compatible with the old one? Or/and a new IPv6 compatible 
with the old one?

May be Dick Clarke will tell us next week how much he wants to invest into 
such a Nextnet?
jfc







Re: namedroppers, continued

2003-01-07 Thread Doug
Hello Mr. Wood,

- Original Message -
From: Lloyd Wood [EMAIL PROTECTED]
To: Doug [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Tuesday, January 07, 2003 7:05 AM
Subject: Re: namedroppers, continued


 Doug has rediscovered the idea of closing open mail relays to
prevent
 unauthorised use by outsiders sending to outsiders. This was a big
 thing in the early 90s when email became popular.

This may seem to be a bit basic for some of the people who have worked
on this problem for years. My intention was not to prove that I had
the latest and greatest solution to the spam problem. It was to get
the ball rolling in an open discussion forum and present my ideas on
the topic in the hopes that someone who knew more than me on the topic
would as well.


 Doug has also come up with the idea of adding the IP address of the
 originating client machine (not necessarily using SMTP) in a header
 so that an attempt can be made to identify it - e.g. Hotmail has
done
 that for years.

After examining the headers of many of the spam advertisments I get
and trying to contact the administrator of the network it came from I
find that it is usually futile because the network doesn't exist and
the IP information is incorrect. I also find that most use false
sender and reply address information (in an attempt to keep recipiants
from filtering them). This makes it hard (at least for me) to do
anything about them. I have experimented with filters for subject
wording but this unfortunately hits on some of my wanted email as
well. This reduces my ability to to block them on the receiving end.
Even if I could it doesn't help the net congestion they cause or do
anything about the processing time it is using across the net. These
things leads me to propose that a more global solution needs to be
implemented. The problem here is that when you bring this up for
discussion in a professional environment like this one people don't
want to discuss it. Instead they consider it a problem that has no
solution and just want to forget about it.


 L.

 missing mail admin experience, I think.

Very true. I have never administered anything other than my http and
ftp servers. I have thought of turning on the mailserver but I do not
know enough about administering it yet and I really have no need for
it. I certainly hope that nobody thought I actually ran my own mail
server because I was not my intention to pretend that I did.

It is nice to see someone with more knowledge and/or experience on the
topic than me taking the time to think (and talk) about it.

Thanks for the input,
Doug
Asking questions, presenting possible solutions, and learning from
mistakes is how we get solutions.
---snipped previous for sake of size--





Re: namedroppers, continued

2003-01-07 Thread Valdis . Kletnieks
On Tue, 07 Jan 2003 13:33:28 EST, Doug said:

 After examining the headers of many of the spam advertisments I get
 and trying to contact the administrator of the network it came from I
 find that it is usually futile because the network doesn't exist and
 the IP information is incorrect. I also find that most use false
 sender and reply address information (in an attempt to keep recipiants
 from filtering them). This makes it hard (at least for me) to do
 anything about them.

The trick here is to remember that except for the relative few spammers that
are advocating a religious/political/philosophical viewpoint (a la Uncertainty
Principle is Untenable!), the spammers *WANT* you to be able to contact them
via *some* means - they can't extract money (their usual goal) from you if
you can't get back to them.

Moreover, it has to be relatively simple to find - it has to be simple enough
that even a victim who doesn't have enough kloo to stop to wonder why the
confidential and private Nigerian scam arrived via spammage can figure out
how to get aboard

-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg09919/pgp0.pgp
Description: PGP signature


Re: namedroppers, continued

2003-01-07 Thread Dr. Jeffrey Race
On Tue, 07 Jan 2003 15:26:55 -0500, [EMAIL PROTECTED] wrote:
The trick here is to remember that except for the relative few spammers that
are advocating a religious/political/philosophical viewpoint (a la Uncertainty
Principle is Untenable!), the spammers *WANT* you to be able to contact them
via *some* means - they can't extract money


See www.camblab.com/nugget/extermin.htm

If the contact data are invalid, report to RIR or to ICANN.  They
are obliged to correct the data.

Jeffrey Race





Re: namedroppers, continued

2003-01-07 Thread Daniel Pelstring
Doug,

This topic comes up quite often.  It has been discussed at length many
times.  Do not take criticism of your ideas too harshly, it is just that
most people here have seen these same solutions proposed by many people over
many years.  It gets a bit old and, patience gets a bit short.  A very quick
summary of the solutions proposed during these discussions is as follows:

A) Anybody can send mail to anybody (what we currently have.)

B) Mail servers check that the sender is authorized to send mail to the
users of its system.

C) Sending mail requires some sort of computationally expensive to compute,
easy to check, data to be sent along with messages (probably based on sender
address, receiver address and message)

Unfortunately, B requires that there be some way to authenticate users
of other systems.  The only way that has been thought of to do this is to
have some central authority to do this.  While it is certainly possible,
this is thought to be a bad idea for many reasons, the most prominent of
which is the potential for abuse.  Lacking a central authority, this can be
done on mail servers already, with no need to involve the IETF (an example
would be whilelists.).

Unfortuantely, C would have to be computable in a reasonable amount of
time in order not to be a major headache.  This means that the spammers
large cluster of powerful computers would still be able to send many
messages.  It would also wreak havoc with mailing lists.  It would also
become easier to compute as time goes on, due to the ever progressing nature
of computers.  This does not even take into account that we would be
creating a standard with the sole purpose of inefficiency, which probably
makes most engineers wince and, although that may not seem like such a
horrible idea right now, this standard could survive far into the future,
with implications yet to be known (keep in mind the scale on which these
standards will be implemented.)  If another solution is implemented in the
future, this may come back to bite us.

At the moment, it seems the IETF consensus (notice the *seem* here, this
is my personal opinion taken from reading the discourse on these lists) is
that the best solution is A.  At some point another solution may hold the
majority favor, but that time is not now.

Of course, it is possible that there is a solution that has not been
thought of, in which case it is a bad idea to discourage people from
thinking about it.  Know, however, that this list contains many extremely
arrogant (many of them justifiably so) experts in their chosen field, who
dislike their time being wasted.  I encourage you, if you have further
ideas, to do the required research to see if it would work before sending a
message and, be very thorough.  Also know that if you choose to get into a
flame war with people on this list, that some them have likely been doing
this for decades and, are probably much better at it than you are.  It is
likely to do nothing but frustrate you.  If you have another idea and, have
questions about how to check that it is at least feasable, I would be happy
to point you in the right direction.

-Daniel Pelstring


- Original Message -
From: Doug [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Cc: Lloyd Wood [EMAIL PROTECTED]
Sent: Tuesday, January 07, 2003 1:33 PM
Subject: Re: namedroppers, continued


 Hello Mr. Wood,

 - Original Message -
 From: Lloyd Wood [EMAIL PROTECTED]
 To: Doug [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
 Sent: Tuesday, January 07, 2003 7:05 AM
 Subject: Re: namedroppers, continued


  Doug has rediscovered the idea of closing open mail relays to
 prevent
  unauthorised use by outsiders sending to outsiders. This was a big
  thing in the early 90s when email became popular.

 This may seem to be a bit basic for some of the people who have worked
 on this problem for years. My intention was not to prove that I had
 the latest and greatest solution to the spam problem. It was to get
 the ball rolling in an open discussion forum and present my ideas on
 the topic in the hopes that someone who knew more than me on the topic
 would as well.

 
  Doug has also come up with the idea of adding the IP address of the
  originating client machine (not necessarily using SMTP) in a header
  so that an attempt can be made to identify it - e.g. Hotmail has
 done
  that for years.

 After examining the headers of many of the spam advertisments I get
 and trying to contact the administrator of the network it came from I
 find that it is usually futile because the network doesn't exist and
 the IP information is incorrect. I also find that most use false
 sender and reply address information (in an attempt to keep recipiants
 from filtering them). This makes it hard (at least for me) to do
 anything about them. I have experimented with filters for subject
 wording but this unfortunately hits on some of my wanted email as
 well. This reduces my ability

Re: namedroppers, continued

2003-01-06 Thread Harald Tveit Alvestrand


--On mandag, januar 06, 2003 02:01:27 -0500 Doug [EMAIL PROTECTED] 
wrote:

Your proposal would fix the problem, but end up tossing a large quantity
of babies out with the bathwater.  The problem is that for the case of
a mailing list, you have *4* (at least) things to keep track of:


There are many comercial email servers that require the people sending
email with their server to log into the server using a valid username and
pass before
doing so. I doubt they are losing any valid emails. All it does is to keep
unauthorized users from using the server without a valid password. The
reason
to require that the sender address in the outgoing email matches the email
address refrenced in the account is to keep people from sending spam from
these email servers and using fraudulant return and/or sender address.
I fail to see how this throws out any babies. perhaps I am missing
something.


wellthink about how mail from someone who is not an user of that system 
(like me) can send mail there

how does your system tell the difference between a remote mail server and a 
malicious user?

Harald




Re: namedroppers, continued

2003-01-06 Thread Valdis . Kletnieks
On Mon, 06 Jan 2003 02:01:27 EST, Doug said:

 There are many comercial email servers that require the people sending email
 with their server to log into the server using a valid username and pass
 before
 doing so. I doubt they are losing any valid emails. All it does is to keep
 unauthorized users from using the server without a valid password. The
 reason
 to require that the sender address in the outgoing email matches the email
 address refrenced in the account is to keep people from sending spam from
 these email servers and using fraudulant return and/or sender address.
 I fail to see how this throws out any babies. perhaps I am missing
 something.

What you're missing is that I can configure *MY* server so it will only:

1) Accept mail *TO* a local recipient.
2) Allow relaying of mail to a *remote* recipient after doing some sort of
authentication that it's one of my users.

And in fact, the last I heard, open relays were only 1% or so of the total
mailservers out there - so the above is already the usual state of affairs.

Note there's no requirement that *inbound* mail be authenticated, which is
the basic source of the spam problem.  Your mail server will probably
accept mail for your userid from anyplace without authentication.

Now let's say you *do* start requiring authentication for inbound mail.
Let's consider this piece of mail, which is being sent to both you and
the IETF list...

1) What userid/password does the IETF mailserver use to authenticate
itself to your mail server?  Remember in your answer to note that forcing
users to manually update a whitelist of mailing lists they are on is
a helpdesk nightmare, and hard to scale - our main mailserver has some
80K mailboxes/aliases on it, and I'm on a lot of lists.  However, just
because *I* am on a list hosted at some site doesn't mean that any other
users on my mail server wants to accept mail from that site.  However,
even if you decide *that* cost is toleralble, there's still:

2) What userid/password does my laptop use to authenticate itself to your
mail server?  And note that you can't just say my laptop has to send it to
my mail server - because then you need to get the userid/password pair to
my mail server.  Remember that your answer has to scale to 40 million .coms,
and that it has to work on a sender/recipient pair basis (otherwise, it's
like inviting a vampyre in - if they can get one person at your server to
OK the mail, then they can commence spamming all your users).  Note that
answers like the reply to this message to prove you're not a spammer
schemes are *NOT* a long-term solution - if any of those packages becomes
widespread enough to actually impact the spam problem, the spammers will
have a little Perl program scanning the bounces and canning the yes I'm
not a spammer responses.



-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg09901/pgp0.pgp
Description: PGP signature


Re: namedroppers, continued

2003-01-06 Thread Doug
I believe the answer to your first question is you would send mail
using
your own mail server not someone else's. Although...I do see unique
issues
involved in people using mail servers that are not part of their
network
(hotmail, yahoo...) to send email if they try to authenticate you as
part of
their network before allowing you to send email. I believe the
solution to
that problem is that those commercial mail servers (free or premium)
would
not be able to authenticate you as part of their network before
allowing you
to send your email. They would then require clients logging into those
accounts (with valid user names and passwords) to send email from a
valid IP
address with no unsecured proxy services running on them (much like
many IRC
servers are doing) and transmit this IP information along with the
email
being sent. This would allow for pinpoint identification of the
sender's
using IP addresses MAC addresses and time stamped logs for the
specific
purposes of taking legal action against these network abuses.

Your second question is a bit harder for me to answer. I believe (I
may be
incorrect) that there is already a difference between a receiving mail
server's transaction with a sending or relaying mail server and a mail
client. I would never claim that it is impossible for a malicious user
to do
anything (I know better). On the other hand if we can achieve
authentication
before sending email and it becomes a requirement of the system then
it
should make the actions of a malicious user stand out in the logs of
the
server allowing for tracking, blocking, and prosecution of those users
for
the unauthorized access and (mis)use of private network resources. My
solution does NOT have a way of completely stopping spam from being
sent but
perhaps in conjunction with other actions it can stop a majority of
spam
from being sent. Additionally, my solution makes it easier for end
users and
administrators to track the actions of spammers and find their virtual
locations. I would further suggest that once this information is
gathered
and verified with the spammers ISP subpoenas, court orders, cease and
desist
orders, fines under existing laws, and criminal prosecution could do
the
rest.

I am not claiming that this will eliminate spam on it's own. I am
claiming
that it will make it harder for the offending parties to get away with
sending spam in a manner that is not compliant with TOS agreements and
the
law. This solution would require a concerted effort by the
administration
comunity as a whole and I think that is where the problem truely is.

- Original Message -
From: Harald Tveit Alvestrand [EMAIL PROTECTED]
To: Doug [EMAIL PROTECTED]; [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Monday, January 06, 2003 10:00 AM
Subject: Re: namedroppers, continued




 --On mandag, januar 06, 2003 02:01:27 -0500 Doug
[EMAIL PROTECTED]
 wrote:

  Your proposal would fix the problem, but end up tossing a large
quantity
  of babies out with the bathwater.  The problem is that for the
case of
  a mailing list, you have *4* (at least) things to keep track of:
 
  There are many comercial email servers that require the people
sending
  email with their server to log into the server using a valid
username
and
  pass before
  doing so. I doubt they are losing any valid emails. All it does is
to
keep
  unauthorized users from using the server without a valid password.
The
  reason
  to require that the sender address in the outgoing email matches
the
email
  address refrenced in the account is to keep people from sending
spam
from
  these email servers and using fraudulant return and/or sender
address.
  I fail to see how this throws out any babies. perhaps I am missing
  something.

 wellthink about how mail from someone who is not an user of that
system
 (like me) can send mail there

 how does your system tell the difference between a remote mail
server and
a
 malicious user?

  Harald






Re: namedroppers, continued

2003-01-06 Thread Valdis . Kletnieks
On Mon, 06 Jan 2003 14:38:09 EST, Doug [EMAIL PROTECTED]  said:
 I believe the answer to your first question is you would send mail
 using
 your own mail server not someone else's. Although...I do see unique
 issues
 involved in people using mail servers that are not part of their
 network
 (hotmail, yahoo...) to send email if they try to authenticate you as
 part of
 their network before allowing you to send email.
You're still missing the point.

How do you tell the difference between:

1) The IETF mail server sending for the IETF list.
2) The large SUN box across the hall that's the main vt.edu mail server.
3) My laptop.

Currently, my laptop will send directly to the destination.  The problem is
that although it would be trivial to change it so that it uses the central
Virginia Tech mail hub, that doesn't fix your problem - there's still no
authenticator for the vt.edu mail server at your mail server either

Oh, and don't even suggest chasing MX records - the MX for vt.edu points
at one set of boxes, but you will almost certainly *NOT* get a connection
from them, as our outbound servers are at different addresses.  And no, we
won't change this unless you first manage to get hotmail.com and aol.com
to not use different inbound and outbound addresses first, as they do the
same thing for the same reasons.
-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg09908/pgp0.pgp
Description: PGP signature


Re: namedroppers, continued

2003-01-06 Thread Doug
I am apparently missing something here but I am going to give it a
shot anyway.

You can tell the difference between 1, 2, and 3 because they all have
a different DNS/IP footprint.

You can send email directly to the IETF mail server? Do you have an
account on that server?

I myself use a SMTP server to send out my email. It goes from my email
client to the SMTP server I happen to be using and it then gets
relayed through the network until it reaches the destination email
server.

The validation I have been referring to would take place between the
mail client and the originating server. The entire point would be to
verify the identity of the person sending the email or at least the
account it is being sent from.

I am not suggesting that the destination email server should ask for
authentication for every email it receives before it relays it on to
another mail server or a client. I am saying that the originating
server should ask for it before accepting it and relaying it on to the
network.

The originating server would then be able to assure correct header
information by not allowing an email to be sent unless the outgoing
email was tagged with the proper DNS/IP footprint (not that of an
unsecured proxy server or a spoofed IP) and a return/reply address
that is associated with the account that the client used to
authenticate with the server. This in effect means that you cannot use
a different return/reply address (or a fake return/reply address) that
cannot be traced back to your account on the originating server by the
recipient or an IP/DNS footprint that cannot be traced back to your
machine or a point on your network by the recipient. This is to force
the person sending the email to be accountable for the email sent.

I am not suggesting that the recipient or even the relaying server
should be allowed to connect back to the originating mail server or
the client that sent the email. That would create security risks for
networks hosting mail servers and clients sending the email.

I am suggesting that before someone drops an email onto an originating
mail server that the server should take what I consider to be
reasonable steps to authenticate the user and confirm their identity
and account status on that server. The server would then tag
information onto the email that would identify the machine on which
the email client that sent the email resides (not the information of
an unsecured proxy). In addition, the originating server should tag
information that identifies the account (on the originating
server/network) that the client used to send the email and force the
originating client to provide a valid reply address that is associated
with the account to the recipient of the email.

I am not suggest that originating servers should be tagging the exact
virtual location of an inbound or outbound server to anything or
changing MX records to reflect the correct virtual location to the
outside world. In fact, if this is not done it helps keep those
outbound email servers hidden from the outside world and helps keep
malicious users from finding them and exploiting them in some way to
send their email without authorization. I do feel that I should be
able to identify the actual network on which that server resides so I
can contact someone there to help track down someone who is sending
spam.

Does the above clear up any confusion? Is there anything I am missing
here? If so please tell me what because I would welcome the
opportunity to learn something new. There may very well be big gaps in
this plan I am just unaware of what they are so I welcome the
opportunity to learn that you or anyone may pointing them out would
bring.

Doug
[EMAIL PROTECTED]
704-721-0212

P.S. As a side note if anyone thinks this is not a proper forum for
exchanging ideas about this please do tell me. It is not my goal here
to disrupt anything. I am just trying to exchange some ideas with a
large body of professionals in the hopes of learning something and
hopefully contributing something helpful. I would also like to invite
the moderators of this forum to contribute what they think of this
line of discussion. If they think it is unproductive I would be more
than willing to drop it and never breath another word about anything
unless it falls into any guidelines they would like to set forth.
Please, anyone, do feel free to respond with anything you feel would
be helpful constructive or apropriate on this subject.



- Original Message -
From: [EMAIL PROTECTED]
To: Doug [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Monday, January 06, 2003 3:36 PM
Subject: Re: namedroppers, continued

 I believe the answer to your first question is you would send mail
 using
your own mail server not someone else's. Although...I do see unique
 issues
 involved in people using mail servers that are not part of their
 network
 (hotmail, yahoo...) to send email if they try to authenticate you
as
 part of
 their network before allowing you to send

Re: namedroppers, continued

2003-01-05 Thread Doug

Hello everyone,

It seems to me if the mail server administrators would make the decision to
require people that send emails from their servers to log into a valid
account on that server and use the same valid account on the server as a
return address it would negate the ability of a large percentage of the
spamers to send the spam anon. This would allow easier filtering of many of
the offending messages by domain. Additionally, the sending account field
and the reply to field should be equal and clients should be required to use
an email address that is associated with the account used to log into the
server in the first place. This will need to be implemented in the beginning
by administrators who run software capable of it, and it would be
implemented later as part of the email client and/or server software using
new software releases, patches, and individual customizations of existing
software. I know that there are many people who will scream and gnash their
teeth at this suggestion as it will force them to identify themselves to
anon mailing lists but I think it would be an acceptable compromise if we
could eliminate a major portion of the spam clogging our inboxes. Clients
need to be identified by ISP based email servers using their DNS and IP
address footprints and clients attempting to send email with improper
footprints should be disregarded (making it very difficult to send email
from the server if you truly are not a valid subscriber to the service, much
like many of the current news servers do). Then to deal with the anonymous
email servers out there (hotmail, yahoo, etc...) the operators of those
services should require clients logging into those accounts to send email
from a valid IP address with no unsecured proxy services running on them
(much like many IRC servers are doing) and transmit this IP information
along with the email being sent. This would allow for pinpoint
identification of the senders of spam using IP addresses MAC addresses and
time stamped logs for the specific purposes of taking legal action against
these network abuses. I know it will be argued that this will require
cooperation between ISPs and that some systems are already implementing
these measures but if all administrators as a single body insist that
everyone adhere to these rules or be excluded from sending email to clients
of their services and enforced this through IP block and domain blocking the
stragglers would be forced to adhere to these rules. Further, if a body such
as the IETF stood behind this and perhaps drafted specifications for
administrators, and software developers to follow when making new
clients/servers and updating existing clients/servers it would hold added
weight in the market place. The extra cost associated with such actions
could be offset by saved resources, and additional revenues made as a result
of higher subscription rates justified by superior spam filtering techniques
and a greater number of subscribers to the service due to better service
quality. I would also like to suggest that the California law that requires
all unsolicited emails be appended with adv: in the subject line be expanded
to a federal law and additionally require emails that are solicited by
signing up for a service include exact information about who the sender
bought your email address from in the email.

These are just some ideas I have had on eliminating spam and should in no
way be considered a flame against anyone. I know there is no way that this
will stop all unsolicited email from being sent or received. I just thought
they might help to get some people rolling on a solution and that it would
be better than complaining about it. After all doesn't a global solution
make more sense than venting about what should be done to keep it out of
this mailing list.

Thank you for your time and attention,

Douglas Huyler
[EMAIL PROTECTED]
704-721-0212

P.S. I am sorry this email comes so long after the original post was made
but I don't read the list very often and after reading this thread from the
begining to December 6th I thought I would reply. If someone else has
brought these things up after this point I am sorry, but I haven't caught up
with the list yet.


- Original Message -
From: Fred Baker [EMAIL PROTECTED]
To: Hallam-Baker, Phillip [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Friday, December 06, 2002 4:41 PM
Subject: RE: namedroppers, continued


 At 08:28 AM 12/2/2002 -0800, Hallam-Baker, Phillip wrote:
 The only way to resolve this issue properly would be to require every
 submission to an IETF mailing list to be cryptographically signed (PGP
 or S/MIME), to require the subscribers to register their signing key and
 to then filter the mail sent out on the list so that only signed mail
 gets through.

 I would be in favor of that, personally, as long as we can ensure that the
 appropriate signature facility (be it RSA, PGP, or whatever) is freely

Re: namedroppers, continued (flamed in less than an hour. figure s)

2003-01-05 Thread Valdis . Kletnieks
On Mon, 06 Jan 2003 15:46:08 +1200, Franck Martin said:
 Some people on the IETF as being technos lack people skills, that's why they
 work with computers...

I usually explain it as We're talking here about a collection of people who
are paid vast sums of money for their ability to carry on productive
conversations with inanimate objects.

It's usually easy to see the need for the cutting of slack at that point. ;)

 If your ego can pass that, you will be admitted to the IETF confrerie and be
 able to do the same to newbies...

Can anybody provide the original citation for the statement (similar to):

The flame you are complaining about did not cast any aspersion on your
parentage or dietary preferences, and as such was mild by IETF standards?
-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg09883/pgp0.pgp
Description: PGP signature


Re: namedroppers, continued

2003-01-05 Thread Valdis . Kletnieks
On Sun, 05 Jan 2003 19:04:41 EST, Doug said:

 It seems to me if the mail server administrators would make the decision to
 require people that send emails from their servers to log into a valid

Your proposal would fix the problem, but end up tossing a large quantity
of babies out with the bathwater.  The problem is that for the case of
a mailing list, you have *4* (at least) things to keep track of:

1) The RFC821 recipient address.  For your copy of this posting, it's your
email address.

2) The RFC821 sender address.  It should be available in the Return-Path:
header in most well-behaved mail systems as you look at your mail.

3) The RFC822 From: address.

4) The RFC822 To: address.

Another problem is that I am (fortunately) still receiving more mail
each day that counts as legitimate unsolicited (problem reports about
our servers, people who have seen my name and are looking for technical
advice, etc) than I do actual spam.

It's not as easy as it looks... :)

/Valdis



msg09885/pgp0.pgp
Description: PGP signature


Re: namedroppers, continued

2003-01-05 Thread Doug

- Original Message -
From: [EMAIL PROTECTED]
To: Doug [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Monday, January 06, 2003 1:23 AM
Subject: Re: namedroppers, continued


 It seems to me if the mail server administrators would make the decision
to
 require people that send emails from their servers to log into a valid

Your proposal would fix the problem, but end up tossing a large quantity
of babies out with the bathwater.  The problem is that for the case of
a mailing list, you have *4* (at least) things to keep track of:

There are many comercial email servers that require the people sending email
with their server to log into the server using a valid username and pass
before
doing so. I doubt they are losing any valid emails. All it does is to keep
unauthorized users from using the server without a valid password. The
reason
to require that the sender address in the outgoing email matches the email
address refrenced in the account is to keep people from sending spam from
these email servers and using fraudulant return and/or sender address.
I fail to see how this throws out any babies. perhaps I am missing
something.


1) The RFC821 recipient address.  For your copy of this posting, it's your
email address.

2) The RFC821 sender address.  It should be available in the Return-Path:
header in most well-behaved mail systems as you look at your mail.

3) The RFC822 From: address.

4) The RFC822 To: address.

I know what the recipient address, sender address, from address, and to
address in headers look like. The problem is that many spammers use false
information here and change it on a regular basis. This makes it impossible
to block their email at the client end. My proposal is very basically to
make
it mandatory to put valid information in these fields in order to be able to
send the email.

Another problem is that I am (fortunately) still receiving more mail
each day that counts as legitimate unsolicited (problem reports about
our servers, people who have seen my name and are looking for technical
advice, etc) than I do actual spam.

I also never intended for servers to be using filters on unsolicited emails
just
because they are unsolicited. My intention was to suggest that people who
were sending unwanted and unsolicited comercial email should be blocked.
I suggested that servers that refused to cooperate with the rest of the spam
hating world could be blocked just in case but, this may be a bit harsh.
In addition the steps I mentioned would allow for the person receiving these
emails to gather information to allow them to easily take legal action
against the
spammers that still managed to get through. IE if everyone is forced to use
valid
information in the headers to be able to send the email without using some
exploit on the server then it should be easy to track them down. If of
course
they are forced to use exploits to send their anon spam then the admins of
the
system would eventually find this and take action to block them and/or
prosecute them. Perhaps you could be scanning header information as well on
the receiving server (not the client or the sending server) to allow you to
check
for nonsense return addresses like [EMAIL PROTECTED] or fraudulant source DNS
and IP information. Another thing that could be checked for is wether the
sending account matches the reply to address.

It's not as easy as it looks... :)

Oh no I never said it was easy and I also never said I knew it all. I am
just
making a suggestion as to a possible solution to the problem.

:)
Doug

/Valdis

P.S. I do seriously want to know how this would stop valid email users from
getting/sending their email.






RE: namedroppers, continued

2002-12-10 Thread Gray, Eric
Dave,

It's not all that unclear either.  The really nasty spammers
use anonymity in at least two ways: to avoid filtering and to avoid
being billed for wasting our time, storage capacity, bandwidth and 
other resources.  Taking anonymity away from these people would be
the long overdue end of their free lunch on everyone else's tab.

On top of that, some spammers are actually breaking the law.
Gotten any South African my late  died and left me  ...
mail lately?  Those people belong in jail...

Eric W. Gray
Systems Architect
Celox Networks, Inc.
[EMAIL PROTECTED]
508 305 7214


 ...
 
 The general idea behind pursuing simple authentication presumes that the
 really nasty spammers would not want to be identified.  It's not clear how
 valid this presumption really would be.
 
 d/
 --
  Dave Crocker  mailto:[EMAIL PROTECTED]
  TribalWise http://www.tribalwise.com
  t +1.408.246.8253; f +1.408.850.1850




Re: namedroppers, continued

2002-12-10 Thread Bill Sommerfeld
 I checked 39USC and 39CFR955 I guess the postal service maintains a list if
 you want to not receive mailing for sexually oriented materials,
 sweepstakes, and pandering solicitations. But that's about it. As far as the
 USPS goes.

I have not yet tried filing a form 1500, but, if you believe the folks
at junkbusters.com [1] [2], and page 13 of Postal Bulletin 21977 [3],
it's clear that the courts have ruled that porn is in the eye of the
beholder.

  Postmasters may not refuse to accept a Form 1500 because the
   advertisement in question does not appear to be sexually
   oriented. Only the addressee may make that determination.

- Bill

[1] http://www.junkbusters.com/self.html#prohibit
[2] http://www.junkbusters.com/dmlaws.html
[3] http://www.usps.com/cpim/ftp/bulletin/1998/pb21977.pdf




Re: namedroppers, continued

2002-12-10 Thread Valdis . Kletnieks
On Tue, 10 Dec 2002 08:57:59 EST, Gray, Eric said:

   On top of that, some spammers are actually breaking the law.
 Gotten any South African my late  died and left me  ...
 mail lately?  Those people belong in jail...

Or this:

http://ars.userfriendly.org/cartoons/?id=20021209

(OK, so it's a REALLY bad pun ;)



msg09754/pgp0.pgp
Description: PGP signature


Re: namedroppers, continued

2002-12-10 Thread Theodore Ts'o

For those of you who are in the Boston area, the following
presentation might be of interest, given recent discussions about
methods of compating SPAM.  It is hosted by the MIT Laboratory for
Computer Science's Applied Security Reading Group.

- Ted


ASRG TALK - in NE43-941 at 400 p.m. this THURS

Open to the Public

Date:THURSDAY, DEC 12th
Time:4:00 p.m. - 5:00 p.m.
Place:   NE43-941, 200 Tech Square
Speaker: Cynthia Dwork, Microsoft Research, Silicon Valley Campus
Title:   Fighting Spam May Be Easier Than You Think

Abstract:

In CRYPTO'92 Dwork and Naor proposed the following simple technique
for combating spam:

If I don't know you, and you want your e-mail to appear in my
inbox, then you must attach to your message an easily verified
proof of computational effort, just for me and just for this
message.

If the proof of effort requires, say, 10 seconds to compute, then the
economics of sending spam are radically altered, as a single machine
can send only 8,000 messages per day.

The recent proliferation of spam has lead to a renewed interest in
these ideas.  This talk surveys recent work on both the choice of
functions that can be used to yield easily verifiable proofs of
computational effort, and architectures for implementing the proof of
effort approach.  Filtering and/or forcing senders to pay in other
currencies, such as human attention and money, will be covered as time
permits.

Hosted by the Applied Security Reading Group
http://pdos.lcs.mit.edu/asrg/




RE: namedroppers, continued

2002-12-09 Thread Dean Anderson
Every domain would have to have a public key that the public could find.
Then every mailserver would have to check every message.

And spammers could still send spam, because they are authorized to send
email from some ISP, using that ISP's domain, and that ISP mailserver will
sign their email.

Spam isn't a security problem that can be solved technically.

Spam is the exact same problem as when Randy Bush harrasses someone by
abusing his privileges as administrator. There isn't a technical solution,
other than removing the privileges. Then the new administrator could abuse
the privileges, if they were so inclined.  There isn't a technical way to
give someone privileges that they can't abuse, if so inclined.

--Dean

On Fri, 6 Dec 2002, Fred Baker wrote:

 [ post by non-subscriber.  with the massive amount of spam, it is easy to miss
   and therefore delete posts by non-subscribers.  if you wish to regularly
   post from an address that is not subscribed to this mailing list, send a
   message to listname[EMAIL PROTECTED] and ask to have the alternate
   address added to the list of addresses from which submissions are
   automatically accepted. ]

 At 08:28 AM 12/2/2002 -0800, Hallam-Baker, Phillip wrote:
 The only way to resolve this issue properly would be to require every
 submission to an IETF mailing list to be cryptographically signed (PGP
 or S/MIME), to require the subscribers to register their signing key and
 to then filter the mail sent out on the list so that only signed mail
 gets through.

 I would be in favor of that, personally, as long as we can ensure that the
 appropriate signature facility (be it RSA, PGP, or whatever) is freely
 available to all who need to use it. The issue here is not us corporate
 types who have a business reason to buy the software, it is the students
 who often lack the funds. The big issue would be the procedures for posting
 one's key to the appropriate place - what is to stop a spammer from posting
 a key and sending the spam anyway? I'm not proposing a mechanism, but
 someone who is good at such things might well find it of value.

 It doesn't address the off topic issue. As you say, that could be left to
 a working group chair equiped with formal procedures developed by consensus
 within the work group or adopted by the working group from a more general
 place (ie, the IETF could suggest a procedure, and the WG could adopt it if
 it didn't feel another procedure would be better).

 I have had a private exchange, over the past few days, with someone who
 wished that the IETF would please document some good spam-elimination
 procedure, so that it could be used world-wide to completely eliminate
 spam. I think that boils down to provide a global PKI in this solution,
 and presumes that spammers are incapable of using one. That might be a
 great research topic. Too bad nobody has ever thought of it before; we
 could really use the outcome of that research. (OK, so it's a lame attempt
 at humor...)

 I think it was Steve Bellovin that suggested a procedure for reducing the
 utility of spoofing source addresses in emails; if not, it was me and I
 happened to suggest something his favorite algorithm fit into, by having a
 host in each mail domain (mailid.example.com) be able to assert that its
 domain had or had not sent an email within a given recent  time period
 whose MD5 hash, when divided by vector of prime numbers resulted in
 vector of remainders. I could write that up in an internet draft if folks
 think it makes sense. That would be a more global procedure that didn't
 require a PKI and only addressed spoofed addresses.



 --
 to unsubscribe send a message to [EMAIL PROTECTED] with
 the word 'unsubscribe' in a single line as the message text body.
 archive: http://ops.ietf.org/lists/namedroppers/





RE: namedroppers, continued

2002-12-09 Thread Dean Anderson
And how much before Randy was moderator?

I'm on other large, subscriber-restricted, public lists, where this isn't
a significant problem.

--Dean

On Fri, 6 Dec 2002, Hallam-Baker, Phillip wrote:


  How much spam is going to namedroppers?

 Well none since Randy Bush and a bunch of others turned
 on the moderator bit.

 The problem here is that having Randy Bush moderate is
 not a scalable solution to the problems of Spam in general.


   Phill







RE: namedroppers, continued

2002-12-09 Thread John C Klensin


--On Friday, 06 December, 2002 16:22 -0700 Vernon Schryver
[EMAIL PROTECTED] wrote:


From: Marc Schneiders [EMAIL PROTECTED]



...
It might be easier to write a new protocol to succeed email,
instant messaging, mobile phones (something useful in itself)
with built-in abuse control from the start.


That's another stupid crackpot spam solution that just won't
go away.

You cannot have abuse control built into a protocol that
allows strangers to send each other mail.  Any mail protocol
that lets you receive mail from a stranger must also let the
stranger send the same message to you and to 30,000,000 of
your closest friends.  On the other hand, if you want to only
accept mail from people who are not strangers, you can use any
of the many official and ad hoc SMTP extensions to ensure you
only receive mail from them.

If your computer system, mail protocol, or whatever knows that
a stranger is not a spammer, then the stranger is not really a
stranger.


Actually, Vernon, there is a well-known, established
implementation of this approach.  It depends on no one being
able to deliver mail to anyone else except through a network of
trusted intermediaries, who are interconnected with bilateral
agreements.  Each of those intermediaries is essentially
required to authenticate any user sending a message, which they
naturally tend to do because the system strongly assumes a
per-message and per-recipient charging model with settlements
between the originating and receiving intermediary systems.

If spammers tried to use it, they would rapidly become
discouraged, first of all because the per-message charging would
destroy their free to us, steal resources from others business
model and second because the accounting and authentication
machinery that is essential to the business models of the
intermediary system vendors (let's call them ADMDs for short)
would make tracking them down fairly easy.  And, of course, the
bilateral agreements would make it fairly easy to isolate and
punish an ADMD who didn't control its spammers or pay it
settlement bills.

I suppose I can leave the name of this high-quality,
significantly overengineered, widely-deployed system as an
exercise.

Been there, wasted a lot of time, energy, and resources, gave up.

   john




RE: namedroppers, continued

2002-12-09 Thread Hallam-Baker, Phillip
Don't discount the unexloited features already supported in the deployed
base.

In particular most mail servers support inline SSL connection upgrades,
or can be upgraded to do so with minimal hassle.

Another instance in which a self signed cert is possibly sufficient
authentication - although when you consider the security you get from
upgrading the connection to SSL the price of the cert is kinda de
minimis but I'll play along with the rulling IETF assumption of millions
for hardware, not a cent for software.


Phill

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
 Sent: Friday, December 06, 2002 3:59 PM
 To: Marc Schneiders
 Cc: Fred Baker; Hallam-Baker, Phillip; [EMAIL PROTECTED]; [EMAIL PROTECTED]
 Subject: RE: namedroppers, continued


 I'v been saying about need for more radical change in mail
 protocol for
 years now on mailing lists. I'd rather work on smtp itself, but some
 people who were involved in original protocol do not want any serious
 changes to what they'v done, though its clear that abuse and
 other holes
 with current system is creating too many problems.

 In any case, by next ietf meeting in san francisco, I'll
 bring complete
 proposal for new protocol and might even try some practical
 tests. I do still
 believe that smtp can be saved, but not without more complex
 authentication
 system during delivery of email and that can't be done with current
 protocol design or current available extension process.

 Also were there any discussions or more complete discription of this
 algorithm for checking if host had sent an email and if so is this
 available on website or archive to read more about? If answer
 is yes, can
 somebody send me url or approximate date of discussions so I
 could lookup
 in archives.

 And am I correct here in understanding what was proposed is that smtp
 conversation id be such that receiving mail server could verify with
 sender (callback?) that it deed indeed initiate the email. If
 so I do not
 quite understand how MD5 helps there, plus I see quite a few
 problems with
 creating some special mx-like record in dns just for verification. If
 this is indeed what was proposed its better to go with paul vixie's
 proposal of mailfrom dns record -
http://www.vix.com/~vixie/mailfrom.txt or
http://www.ietf.org/internet-drafts/draft-church-dns-mail-sender-02.txt

On Fri, 6 Dec 2002, Marc Schneiders wrote:

 On Fri, 6 Dec 2002, at 13:41 [=GMT-0800], Fred Baker wrote:

  I think it was Steve Bellovin that suggested a procedure for
reducing the
  utility of spoofing source addresses in emails; if not, it was me
and I
  happened to suggest something his favorite algorithm fit into, by
having a
  host in each mail domain (mailid.example.com) be able to assert that
its
  domain had or had not sent an email within a given recent  time
period
  whose MD5 hash, when divided by vector of prime numbers resulted
in
  vector of remainders. I could write that up in an internet draft
if folks
  think it makes sense. That would be a more global procedure that
didn't
  require a PKI and only addressed spoofed addresses.

 Spammers would be the first to set up your mailid host. They will have
 had years of experience to find holes in the system before you've
 convinced everyone to adopt or accept the mailid.

 It might be easier to write a new protocol to succeed email, instant
 messaging, mobile phones (something useful in itself) with built-in
 abuse control from the start.





smime.p7s
Description: application/pkcs7-signature


Re: namedroppers, continued

2002-12-09 Thread Stephen Sprunk
Vernon Schryver wrote:
 It's been years since it was possible to be amused by the number of
 people who assume that spammers are more ignorant and less competent
 than they are, and so propose spam solutions predicated on spammers
 being unable to register as many names, keys, identities, or whatever
 as needed or as many as everybody else can.

The problem I've seen repeatedly, including in an off-list discussion I'm
having about this topic, is people confusing authentication with
authorization.

Even if you can authenticate every sender of every piece of email, that
gains us virtually nothing -- not to mention it's a reasonably well-solved
problem, e.g. PGP, S/MIME.  As Vernon notes, spammers can create authentic
credentials just as easily as anyone else.

The devil is in determining what senders are authorized once we've
authenticated them.  My fear is the only effective solution may turn out to
be closed lists with permission grants, such as the IM services introduced
to keep spammers out.  That will greatly reduce the utility of email.

S




Re: namedroppers, continued

2002-12-09 Thread Stephen Sprunk
Paul Vixie wrote:
 - many ISPs won't let you forward or submit mail through someone
   else's SMTP server, even if you have permission to do so.  so you
   can't forward your mail through your home ISP's mail server to
   allow the mail from check to work.

 in that case you'd be wise to not insert a MAIL-FROM MX for your
 domain.

The vast majority of users do not have the ability to make that decision.

The curious thing is that it is in an ISP's best interests _not_ to
implement this draft, since doing so will likely mark nomadic users' email
as suspect and potentially lose a customer.  Most companies only support the
public good to the extent it doesn't cost them any revenue.

S




RE: namedroppers, continued

2002-12-09 Thread Dean Anderson
This seems clever, however, it will also take significant computational
effort to verify the computational effort was actually done. Even if a
class of functions are found that are easier to verify than to compute,
they will no doubt still take up a significant fraction of time.

Also, all outgoing messages would need this computation, since a
mailserver does not know who it has sent mail to in the past, and whether
they are still in receipt of the verification.  So then you would only be
able to send 8000 messages a day, too.

Clearly, that doesn't scale very well.

It seems unlikely that this would change the percentage of spam, since it
would merely reduce the total amount of mail sent.

I haven't observed a recent proliferation of spam, however. Spam seems to
be level.

--Dean

On Fri, 6 Dec 2002, Ayyasamy, Senthilkumar  (UMKC-Student) wrote:
 this is the work all about (yesterday's seminar in a MIT group)

  If I don't know you, and you want your e-mail to appear in my
   inbox, then you must attach to your message an easily verified
  proof of computational effort, just for me and just for this
  message.

 If the proof of effort requires, say, 10 seconds to compute, then the
 economics of sending spam are radically altered, as a single machine
 can send only 8,000 messages per day.

 The recent proliferation of spam has lead to a renewed interest in
 these ideas.  This  work is about both the choice of
 functions that can be used to yield easily verifiable proofs of
 computational effort, and architectures for implementing the proof of
 effort approach.  Filtering and/or forcing senders to pay in other
 currencies, such as human attention and money, will be covered as time
 permits


 for more details http://research.microsoft.com/research/sv/PennyBlack



 --
 to unsubscribe send a message to [EMAIL PROTECTED] with
 the word 'unsubscribe' in a single line as the message text body.
 archive: http://ops.ietf.org/lists/namedroppers/





Re: namedroppers, continued

2002-12-09 Thread Dean Anderson
This doesn't adequately describe backup relays.  If uunet is providing an
alternate relay service, then all or any of uunet's relays might be
providing that service. So it would have to be able to recursively look up
uunets mail-from mx's, and the mail-from mx's of any subdomains listed by
uunet.  This process might contain loops.

Additionally, the mail forwarding behavior is highly undesirable.  A large
mail site does not want to have to manually configure essentially the
whole of the internet as possible multi-stage mail relays so that its
users can forward mail from other servers to their mailbox. Indeed, even a
relatively small site would not want to do that.

However, even this approach won't stop spam, since a spammer will still be
able to use their ISP's mailservers, with a stolen, or disposable account.
There are plenty of KLEZ viruses out there, and plenty of stolen
passwords. And it won't have any effect at all on spam from real
commercial operators like Exactis who don't forge the from addresses.

Essentially, I'm convinced after years of interaction with some radical
anti-spammers that most of the non-commercial spam (and quite a lot of the
forged-address spam) is sent by anti-spammers trying to essentially
terrorize their way to some kind of technical solution that they think
exists. However, no such solution exists.  If there were such a solution,
we could prevent all kinds of evils, like government corruption,
embezzlement, misuse of all kinds of property.  But there is no substitute
for honesty and responsibility. If someone has possession of a privilege,
(however that privilege was obtained--it may have been stolen), and they
are so inclined to abuse that privilege, the only way to stop them is to
remove the privilege.

--Dean

On Sat, 7 Dec 2002, Paul Vixie wrote:

 it's difficult to imagine a mailing list for which this thread is on-topic.

  I think it was Steve Bellovin that suggested a procedure for reducing the
  utility of spoofing source addresses in emails; if not, it was me and I
  happened to suggest something his favorite algorithm fit into, by having a
  host in each mail domain (mailid.example.com) be able to assert that its
  domain had or had not sent an email within a given recent  time period
  whose MD5 hash, when divided by vector of prime numbers resulted in
  vector of remainders. I could write that up in an internet draft if folks
  think it makes sense. That would be a more global procedure that didn't
  require a PKI and only addressed spoofed addresses. --

 here was my attempt at this, which i didn't really know where to go next with:







IndependentPaul Vixie (Ed.)
Request for Comments:  Category: Experimental
June 6, 2002

 Repudiating MAIL FROM

Status of this Memo

   This memo describes an experimental procedure for handling received
   e-mail.  It does not specify an Internet standard of any kind.
   Distribution of this memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2002).  All Rights Reserved.

Abstract

   At the time of this writing, more than half of all e-mail received by
   the author has a forged return address, due to the total absence of
   address authentication in SMTP (see [RFC2821]).  We present a simple
   and backward compatible method whereby cooperating e-mail senders and
   receivers can detect forged source/return addresses in e-mail.

1 - Introduction and Overview

1.1. Internet e-mail return addresses are nonrepudiable by design of the
relevant transport protocols (see [RFC2821]).  Simply put, there is no
cause for ANY confidence in the proposition this e-mail came from where
it says it came from.

1.2. Irresponsible actors who wish to transmit unwanted bulk e-mail
routinely use this designed-in lack of source/return authenticity to
hide their point of origin, which usually involves forging a valid
return address belonging to some highly visible and popular ISP (for
example, HOTMAIL.COM).

1.3. Recipients who wish to reject unwanted bulk e-mail containing
forged source/return addresses are prevented from doing so since the
addresses, as presented, are nonrepudiable by design.  Simply put, there
would be too many false positives, and too much valid e-mail rejected,
if one were to program an e-mail relay to reject all e-mail claiming to
be from HOTMAIL.COM since, statistically, most e-mail claiming to be
from HOTMAIL.COM is actually from somewhere else.  HOTMAIL.COM, in this
example, is a victim of forgery.



Vixie Experimental  [Page 1]

RFC   Repudiating MAIL FROM May 26, 2002


1.4. What's needed is a way to guaranty that each received e-mail
message did in fact come from some mail server 

RE: namedroppers, continued

2002-12-09 Thread Ketil Froyn
On Fri, 6 Dec 2002, Ayyasamy, Senthilkumarwrote:

 If the proof of effort requires, say, 10 seconds to compute, then the
 economics of sending spam are radically altered, as a single machine
 can send only 8,000 messages per day.

Wouldn't something like this cause problems for (large/free) email
providers?  They would probably need a lot of extra hardware to do all
this computation. And until something like this is included in the
standard, the receiver must accept mail from senders that don't implement
this yet.

I personally like the idea behind qconfirm (http://smarden.org/qconfirm/)
and TMDA (http://tmda.net/). If I receive an email that I do not recognize
or otherwise find to be authentic, a mail is sent back to the sender,
requesting that they send a verification mail to a unique secret address.
When a mail is received at this secret address, the original mail is
delivered to me, and the secret address is removed. For a spammer, it is
too expensive to receive and reply to all these mails.

Ketil




Re: namedroppers, continued

2002-12-09 Thread Dean Anderson
To make them do all the work, and you do little to verify, you need a lot
of things done independently, so that a random sample can be selected that
is much smaller than the work they had to do. This will get bulky.  The
less they send, the larger the fraction of work you have to do in relation
to theirs.  And of course, you have to do the same amount of work on your
outgoing messages as they do.

The result is that it costs you much more than it costs the spammer.
(since you have to do the work for both sending and receiving, and the
spammer only has to do the work for sending.

This would not result in a reduction of spam, as a percent of total mail.
If everyone used this, it might (at best or worst) reduce the total mail
sent, since the billions of legitimate messages sent each day would
require significantly more work to send.

Further, it would open one up to a denial of service type attack where
garbage is sent, and you have to do the work to check the (invalid)
signature, thereby wasting your cpu resources.

Essentially, this shoots oneself in the foot. Or perhaps the CPU.

--Dean

On Sat, 7 Dec 2002, Steven M. Bellovin wrote:

 In message [EMAIL PROTECTED], Dean An
 derson writes:
 This seems clever, however, it will also take significant computational
 effort to verify the computational effort was actually done. Even if a
 class of functions are found that are easier to verify than to compute,
 they will no doubt still take up a significant fraction of time.

 In fact, that's the easy part.  You could demand that the sender
 compute 1,000,000 HMACs of the text, the envelope, the time of day, and
 a counter.  The verifier could check 100 randomly-chosen ones -- if any
 fail, there's a forgery.  (Well, you probably wouldn't want those
 values, since 1,000,000 HMACs would be a lot of data to transmit.  But
 you get the general idea.)

   --Steve Bellovin, http://www.research.att.com/~smb (me)
   http://www.wilyhacker.com (Firewalls book)



 --
 to unsubscribe send a message to [EMAIL PROTECTED] with
 the word 'unsubscribe' in a single line as the message text body.
 archive: http://ops.ietf.org/lists/namedroppers/





RE: namedroppers, continued

2002-12-09 Thread Dean Anderson
On Sun, 8 Dec 2002, Lloyd Wood wrote:
 Sender pays is good. The penny black stamp effectively introduced a
 flat-rate tax on sending letters, rather than a variable-rate tax on
 receiving them, effectively turning mail into a common good available
 to all society.

You assume this really means the spammer pays [more]. But that isn't the
case.  This is based on the myth that somehow the receiver pays the entire
cost of a spam message. This isn't true, and never was true. The sender is
already paying, whether they are spammer or mailing list operator, or
regular end user.  The fact is that email is so cheap that it costs almost
nothing per message to send and receive.  It gets cheaper every day, as
disks and bandwidth get cheaper and cheaper. The receiver doesn't pay any
more than the sender pays. Real commercial spam happens because the cost
of sending spam is less than the cost of sending letters or postcards.

If you artificially made email expensive, it would be expensive for list
operators and regular people as well. You mentioned a rate of one cent per
message.  That would not be enough to deter spam. A rate of ten cents per
message would still be cheaper than postal mail, and so spammers would
still exist.  Much non-commmercial spam is sent by KLEZ or Nimda viruses.
This sort of abuse would not be affected whatsoever.  Note that KLEZ
infections are already illegal.

Think how much it would cost to send out namedroppers, (and the entire
bulk of IETF standards related email) if each message to each recipient
cost, say $0.10.  Or even one cent per message per recipient.  This
proposal would essentially wipe out many if not most mailing list
operators, and most ISPs.

I made a proposal back in 1997 that would not eliminate spam, but would
keep it out of your mailbox. My proposal was rejected because radicals
demanded a complete ban on spam. In 1998, there was an opportunity to get
anti-spam legislation passed.  Unreasonable anti-spam radicals passed up
that opportunity when they insisted on unrealistic demands, and
exaggerated and factually wrong assertions about the cost of spam.  They
assumed they could shout down any opposition, as they shouted down more
reasonable proposals.  They were understandably and easily crushed by the
Direct Marketing Association (DMA).  You can still see my proposal at
http://www.av8.com/H.4581/better.html This proposal would have been
difficult for the DMA to challenge since they already accept these
restrictions on postal mail.  You have the radical anti-spam leadership to
thank for your spam, and the fact that you don't have a universal opt-out
list.

The anti-spam effort was for all practical purposes completely crushed
when Exactis successfully sued MAPS and demonstrated that blacklists are
subject to the Sherman Anti Trust Act and that blacklists weren't
protected by the First Amendment.  I told Vixie this would happen in 1997.
He assured me that anti-spammers could win by technical means. If it
wasn't clear that he was wrong in 1997, (and it seemed pretty obvious even
then), it is now painfully obvious that Vixie and the rest were very
wrong.

It is really time for new, reasonable, anti-spam leadership, not artifical
changes to the cost of email, or schemes to try to make sending mail more
expensive for the senders, and certainly not gyrations in the sending of
namedroppers.

Thanks to the ineptitude, lack of foresight, irrationality, and general
unreasonableness of the anti-spam leadership, spam is here to stay. It is
just a matter of degrees of how bad it will be.  I note there is some
legislation before the house and senate (HR 1017) on spam control, that
reportedly isn't opposed by the DMA. However, these only control
fraudulent spam.  HR 1017 proposes extensions of 18 USC 1030, which makes
it a fraudulent spam a crime, but the FBI probably won't bring charges for
small violations. There is no provision for a civil action.

Another bill (S.630) would require each spammer to maintain an opt-out
list.  You would have to contact each spammer, and have your email address
added to their list, one by one. There would be thousands of spammers to
contact.

Note that my proposal would had a single opt-out list (the Post Office
already maintains such a list for postal junk mail), and my proposal
probably could have been passed into law in 1998.

--Dean




Re: namedroppers, continued

2002-12-09 Thread Vernon Schryver
 From: Stephen Sprunk [EMAIL PROTECTED]

 ...
 The problem I've seen repeatedly, including in an off-list discussion I'm
 having about this topic, is people confusing authentication with
 authorization.
 ...

Yes, that's a good way of putting the problem, but only for those able
and willing to see the differences among authorization, authentication,
confidentiality, non-repudiation, and so forth.

It's sad that weak as dishwater authentication as authorization (and
everything else) snake oil sells so well, as witnessed by Verisign's
PKI and Microsoft's ActiveX.


   ...My fear is the only effective solution may turn out to
 be closed lists with permission grants, such as the IM services introduced
 to keep spammers out.  That will greatly reduce the utility of email.

That has already happened about as much as it is going to happen or
could happen, as witnessed by the IETF lists.  The variations in
effectiveness and mechanisms among the IETF lists are minor details.
The notion of limiting submissions to known authors was once very
controversial here, but it's now accepted as necessary and desirable.
I don't see any reduction in  utility as a result.

Individual mailboxes differ.  Because people value its utility, personal
addresses will continue to accept mail from strangers who might be
sending the same message to 100,000 others.  Various technical and
administrative defenses will limit spam.

Except for those few of us who are obsessed with spam, filters that
are sufficent and require little effort will be used.  Popular choices
will be what people can do for themselves such as private and DNS white-
and blacklists, SpamAssassin, Brightmail, Postinni, Cloudmark/Razor, and
the DCC.  (Do for themselves includes hiring a competent ISP.)  Filters
that require joint actions by the sender and receiver, including the
computing-cost and authenticating DNS RR proposals, will never be popular.
Because they won't be popular, installations that start to use them will
switch to sufficient equivalents such as simple white-listing.  Sufficient
existing protocols are never vulnerable to slightly better replacements.

Joint action is an enormous barrier.  It is a cost that is justified
only in special cases.  That is why we are not routinely using PGP or
S-MIME for our private mail.  That's also why I see many more SMTP-TLS
connections to my SMTP server than I expected (many including from
spammers), and why almost none of them are authenticated.  To use
SMTP-TLS you need only install and configure a current SMTP server.
To use authenticated SMTP-TLS, you must use PKI or exchange keys.


Vernon Schryver[EMAIL PROTECTED]




Re: namedroppers, continued

2002-12-09 Thread Valdis . Kletnieks
On Mon, 09 Dec 2002 11:52:26 CST, Stephen Sprunk [EMAIL PROTECTED]  said:

 The problem I've seen repeatedly, including in an off-list discussion I'm
 having about this topic, is people confusing authentication with
 authorization.

Authentication:  Yes, you seem to be Jeffrey Dahlmer.
Authorization:   You say you'd like to borrow a steak knife?

Usually clears up the confusion in all but the most sluggish mind.. ;)

However, authorization usually implies authentication beforehand.
Does anybody  have a reference on an authorization scheme that
doesn't imply any authentication?
-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg09712/pgp0.pgp
Description: PGP signature


Re: namedroppers, continued

2002-12-09 Thread Stephen Sprunk
Thus spake [EMAIL PROTECTED]
 Authentication:  Yes, you seem to be Jeffrey Dahlmer.
 Authorization:   You say you'd like to borrow a steak knife?

 Usually clears up the confusion in all but the most sluggish mind.. ;)

That's a very clear example, thanks.

 However, authorization usually implies authentication beforehand.
 Does anybody  have a reference on an authorization scheme that
 doesn't imply any authentication?

In a sense:  the IETF lists (and most others) use a null authentication
method, i.e. you trust whatever is in the message.  After that (null) step,
we apply weak authorization, i.e. whether the sender is on the approved
list.

I've seen lots of proposals to improve the former-- hardly difficult -- but
none for the latter.  Perhaps using precise terminology will help focus
efforts in the right area.

S




Re: namedroppers, continued

2002-12-09 Thread Edward Lewis
At 16:53 -0500 12/9/02, [EMAIL PROTECTED] wrote:

However, authorization usually implies authentication beforehand.
Does anybody  have a reference on an authorization scheme that
doesn't imply any authentication?


World readable files.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis  +1-703-227-9854
ARIN Research Engineer




Re: namedroppers, continued

2002-12-09 Thread Bill Cunningham
I haven't personally tried myself to opt out. But I've read they have the
form. If they told you they don't have a form to sort out junk mail for you
I'd say they were full out it. I'd call the Postmaster General's office.

- Original Message -
From: Stephen Sprunk [EMAIL PROTECTED]
To: Bill Cunningham [EMAIL PROTECTED]
Sent: Monday, December 09, 2002 12:56 PM
Subject: Re: namedroppers, continued


 Can you tell me where to get this form?  When I spoke to the USPS, they
said
 they're legally obligated to deliver all junk mail addressed to me,
 regardless of whether I want it.

 Now, the DMA (not the USPS) does have an opt-out list you can join, but
 unfortunately that only drops about half the junk mail I get -- many local
 mailers don't join the DMA because of cost.

 S


 Bill Cunningham wrote:
  How about passing a law that makes eveyone install a BIOS patch to
  block out spam. ;-)
 
  On the serious side Vernon has a point. Even with snail mail you
  can go to the post office and the USPS will provide you with a form
  to fill out and they will not put advertisements into your mail. If
  ISPs would only do the same. As of yet, if all else fails, deleting a
  email box is easier and more effective than taking a ballbat to a
  snail mail box.
 
  --Bill
  - Original Message -
  From: Vernon Schryver [EMAIL PROTECTED]
  To: [EMAIL PROTECTED]
  Sent: Monday, December 09, 2002 12:09 AM
  Subject: Re: namedroppers, continued
 
 
  From: [EMAIL PROTECTED]
 
  ...
  The bootstrap problem will exist no matter what scheme we decide on.
 
  There are many spam solutions that do not have the bootstrapping
  problem.  Examples include effective laws and honest intent and
  action by ISPs.  Before saying those are hopeless, please note that
  the many bootstrap-limited proposals don't have proven prospects.
 
  The point I was addressing was that there's been two major classes
  of scheme proposed ...
 
  However, the partitions created by each scheme are quite
  complementary, ...
 
  Your observation of how those two solutions fit together is
  interesting...or would be if they did not suffer from other problems.
 
 
  ...
  Moore's law causes a bunch of problems for the computing idea. ...
 
  It may not be as big of a problem as we think.  Rough
  back-of-envelope calculations now:  Let's say we assume a function
  X designed to take 10 seconds of CPU on my laptop (which has a
  1.6Gz P-4 in it) to limit it to 8K messages/day.
 
  http://www.intel.com/home/desktop/pentium4/ suggests state of the
  commodity art is about twice that, which lets a spammer send 16K
  msgs/day. Moore's law is still a treadmill that you don't want to
  fight.
 
Now, this same function will take around 2 minutes on
  a 133mz processor and be restricted to 800 mails/day. ...
 
  I would put the lower limit at around 48 MHz on 80486s, or ~8 times
  slower than a 133 MHz Pentium.  Such machines go back less than 10
  years. Would you expect your conservative correspondents to spend 15
  minutes to send you a message, or would you just white-list them?
  Once you start white-listing, it's hard to have much enthusiasm for
  more fancier solutions.
 
 
  Now how many people are still using a 133 system to do that much
  outbound mail themselves (and *NOT* just relaying all outbound mail
  to a smarthost)?
 
  I think recent FreeBSD and sendmail would still work fine at 48 MHz,
  although you probably want to stuff the thing to the gills with 64
  MByte of RAM, or more if it can take it.  There are many computing
  tasks that don't need 3 GHZ and 3 GByte.
 
  Aren't busy smarthosts significantly busier than 80K msgs/day?
  From my old experience, that was true even when they were running
  at less than 50 MHz and with perhaps 100 MByte.
 
  Besides, no matter what inmates of glass houses and big ISPs would
  have you think, SMTP is a peer-to-peer protocol.  A major damage spam
  is doing is helping government commissars and ISP salescritters
  convince people that the ancient Compuserve/AOL/Prodigy/whatever
  dumb-terminal- connected-to-central-servers is the only way to do
  public networking and computing.
 
 
  And
  even *MORE* to the point, what are the chances that a system that
  old will be upgraded software-wise to support a scheme, even if it
  takes zero additional CPU? ...
 
  Would you whitelist it for the next 10 years?  If there are very
  few, white-listing works.  If not, you've got that bootstrapping
  problem, and you've invited the white-listing camel into your tent.
 
 
  Vernon Schryver[EMAIL PROTECTED]

  |  | Stephen Sprunk, K5SSS, CCIE #3723
 :|::|:Network Design Consultant
:|||:  :|||:   Cisco Advanced Services
 .:|||:..:|||:.Richardson, Texas, USA





Re: namedroppers, continued

2002-12-09 Thread Matt Crawford
 Does anybody  have a reference on an authorization scheme that
 doesn't imply any authentication?

You will deliver the satchel to the one who presents the matching
half of this hundred-euro note.




Re: namedroppers, continued

2002-12-09 Thread Valdis . Kletnieks
On Mon, 09 Dec 2002 17:47:58 EST, Edward Lewis said:

 Does anybody  have a reference on an authorization scheme that
 doesn't imply any authentication?
 
 World readable files.

We know how to do that already ;)

I was thinking more along the lines of a zero-knowledge proof or
something like that - a scheme where you can prove you're authorized to
do something(*) without having to prove who you are first.

(*) and explicitly ruling out the 'null check, everybody is allowed' case ;)

/Valdis




msg09723/pgp0.pgp
Description: PGP signature


Re: namedroppers, continued

2002-12-09 Thread John C Klensin


--On Monday, 09 December, 2002 16:17 -0600 Stephen Sprunk
[EMAIL PROTECTED] wrote:

 Thus spake [EMAIL PROTECTED]
 Authentication:  Yes, you seem to be Jeffrey Dahlmer.
 Authorization:   You say you'd like to borrow a steak knife?
 
 Usually clears up the confusion in all but the most sluggish
 mind.. ;)
 
 That's a very clear example, thanks.
 
 However, authorization usually implies authentication
 beforehand. Does anybody  have a reference on an
 authorization scheme that doesn't imply any authentication?
 
 In a sense:  the IETF lists (and most others) use a null
 authentication method, i.e. you trust whatever is in the
 message.  After that (null) step, we apply weak authorization,
 i.e. whether the sender is on the approved list.

Actually, it is a very common situation:

Think about almost any case in which possession of a token
authorizes one to do something, but no identification/
authentication is implied.  For what is perhaps one of the older
examples, can you go to a store where you are not known, in some
part of your country where you are not frequently present, and
buy something.  Of course you can: you pass an authorization
token, typically called cash across the counter and get some
merchandise in return.  The quantity of tokens you possess and
their value even determines the extent of your authorization.

Credit card companies often draw an analogy to that situation,
which is one of the reasons they have stayed far out of the
_public_ part of the PKI business: they don't really care who
you are, or who uses the credit card, as long as the bill gets
paid.  Anything they do or require that involves authentication
has to do with the the bill will get paid without protest
property, not your identity.

 john




Re: namedroppers, continued

2002-12-09 Thread Ofer Inbar
[EMAIL PROTECTED] wrote:
 Does anybody  have a reference on an authorization scheme that
 doesn't imply any authentication?

From:-line based email filters.

  --  Cos (Ofer Inbar)  --  [EMAIL PROTECTED] http://cos.polyamory.org/
  --  WBRS (100.1 FM)   --  [EMAIL PROTECTED] http://www.wbrs.org/
   OSI is a beautiful dream, and TCP/IP is living it!
 -- Einar Stefferud [EMAIL PROTECTED], IETF mailing list, 12 May 1992




Re: namedroppers, continued

2002-12-09 Thread Dave Crocker
Stephen,


Monday, December 9, 2002, 9:52:26 AM, you wrote:
Stephen The devil is in determining what senders are authorized once we've
Stephen authenticated them.

The concept of being authorized to send someone mail has good logic, but
goes against established human communication practises for mail and
telephone.  (Filtering is common to both, but is different from
authorization.)

Some time ago, Mike O'Dell put forward the idea of accountable, in the
sense of being able to reach back to the sender, to hold them accountable
for their actions.

The general idea behind pursuing simple authentication presumes that the
really nasty spammers would not want to be identified.  It's not clear how
valid this presumption really would be.

d/
-- 
 Dave Crocker  mailto:[EMAIL PROTECTED]
 TribalWise http://www.tribalwise.com
 t +1.408.246.8253; f +1.408.850.1850




Re: namedroppers, continued

2002-12-09 Thread Michael Froomkin - U.Miami School of Law
Blinded coins a la digicash
http://www.law.miami.edu/~froomkin/articles/oceanno.htm#xtocid583124

On Mon, 9 Dec 2002 [EMAIL PROTECTED] wrote:

 On Mon, 09 Dec 2002 17:47:58 EST, Edward Lewis said:
 
  Does anybody  have a reference on an authorization scheme that
  doesn't imply any authentication?
  
  World readable files.
 
 We know how to do that already ;)
 
 I was thinking more along the lines of a zero-knowledge proof or
 something like that - a scheme where you can prove you're authorized to
 do something(*) without having to prove who you are first.
 
 (*) and explicitly ruling out the 'null check, everybody is allowed' case ;)
 
 /Valdis
 
 

-- 
Please visit http://www.icannwatch.org
A. Michael Froomkin   |Professor of Law|   [EMAIL PROTECTED]
U. Miami School of Law, P.O. Box 248087, Coral Gables, FL 33124 USA
+1 (305) 284-4285  |  +1 (305) 284-6506 (fax)  |  http://www.law.tm
--It's warm here.--




Re: namedroppers, continued

2002-12-09 Thread John C Klensin


--On Monday, 09 December, 2002 17:49 -0500 Bill Cunningham
[EMAIL PROTECTED] wrote:

 I haven't personally tried myself to opt out. But I've read
 they have the form. If they told you they don't have a form to
 sort out junk mail for you I'd say they were full out it. I'd
 call the Postmaster General's office.

Bill,

For the US Post Office, they don't have the form.  In another
context, I've been over this with the Postal Inspection Service.
They have two other forms and models, one of which is probably
getting confused with this.

(1) You can decline to receive the particular form of junk mail
that is addressed to occupant, boxholder, or similar generic
terms.  For that, there is a form.

(2) You can also decide that particular types of materials,
identifed by specific description (nearly impossible in most
cases) or source is obscene.  Once you do that, and perform the
relevant rituals, it becomes illegal for identified sources to
send the stuff to you.  In general, you can't get the post
office to open all of your mail and do content filtering to be
sure it doesn't meet your criteria for obscenity.   And you
probably wouldn't want to, since that would require authorizing
them to open and read all of your mail.  But it can be an
effective way to prevent a particular sender for sending you
specific kinds of materials, since the penalties for sending
obscene materials through the mails are quite severe.

If it is addressed to you, by name and matching address, they
are, as Stephen indicated, legally required to deliver it
(unless it falls under the prohibitions of (2) above).  So,
oddly, you can opt out of untargeted mailings, but not out of
targeted ones.

john 





Re: namedroppers, continued

2002-12-09 Thread Bill Cunningham

- Original Message -
From: John C Klensin [EMAIL PROTECTED]
To: Bill Cunningham [EMAIL PROTECTED]
Cc: Stephen Sprunk [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Monday, December 09, 2002 9:16 PM
Subject: Re: namedroppers, continued




 --On Monday, 09 December, 2002 17:49 -0500 Bill Cunningham
 [EMAIL PROTECTED] wrote:

  I haven't personally tried myself to opt out. But I've read
  they have the form. If they told you they don't have a form to
  sort out junk mail for you I'd say they were full out it. I'd
  call the Postmaster General's office.

 Bill,

 For the US Post Office, they don't have the form.  In another
 context, I've been over this with the Postal Inspection Service.
 They have two other forms and models, one of which is probably
 getting confused with this.

 (1) You can decline to receive the particular form of junk mail
 that is addressed to occupant, boxholder, or similar generic
 terms.  For that, there is a form.

 (2) You can also decide that particular types of materials,
 identifed by specific description (nearly impossible in most
 cases) or source is obscene.  Once you do that, and perform the
 relevant rituals, it becomes illegal for identified sources to
 send the stuff to you.  In general, you can't get the post
 office to open all of your mail and do content filtering to be
 sure it doesn't meet your criteria for obscenity.   And you
 probably wouldn't want to, since that would require authorizing
 them to open and read all of your mail.  But it can be an
 effective way to prevent a particular sender for sending you
 specific kinds of materials, since the penalties for sending
 obscene materials through the mails are quite severe.

 If it is addressed to you, by name and matching address, they
 are, as Stephen indicated, legally required to deliver it
 (unless it falls under the prohibitions of (2) above).  So,
 oddly, you can opt out of untargeted mailings, but not out of
 targeted ones.

 john

I checked 39USC and 39CFR955 I guess the postal service maintains a list if
you want to not receive mailing for sexually oriented materials,
sweepstakes, and pandering solicitations. But that's about it. As far as the
USPS goes.





Re: namedroppers, continued

2002-12-08 Thread Valdis . Kletnieks
On Fri, 06 Dec 2002 16:48:46 CST, Ayyasamy, Senthilkumar (UMKC-Student) said:

 If the proof of effort requires, say, 10 seconds to compute, then the
 economics of sending spam are radically altered, as a single machine
 can send only 8,000 messages per day.

Those of us who run mail servers that are currently resource-constrained
while doing 8K msgs/hour worry anytime we hear that sort of idea.
On the other hand, I wouldn't mind taking a 10-second hit every time *I*
send a message.

Possibly what is needed is a hybrid approach:

1) If you're a big mail server, you can probably prevail on your DNS
admins to list you in whatever DNS-based verification system (in our entire
2 /16s of address space, there are less than 10 boxes that would have a major
resource issue, but would benefit froma DNS-based solution.

2) If you're not listed in the DNS, you have to do a compute-intensive proof.

What would people think of that idea?
-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg09679/pgp0.pgp
Description: PGP signature


Re: namedroppers, continued

2002-12-08 Thread Vernon Schryver
 From: [EMAIL PROTECTED]

 ...
 Possibly what is needed is a hybrid approach:

 1) If you're a big mail server, you can probably prevail on your DNS
 admins to list you in whatever DNS-based verification system (in our entire
 2 /16s of address space, there are less than 10 boxes that would have a major
 resource issue, but would benefit froma DNS-based solution.

 2) If you're not listed in the DNS, you have to do a compute-intensive proof.

 What would people think of that idea?

Is the goal to block spam?  If so, what do you do about third case of
senders that don't participate with either #1 or #2?  For the first
years, most of the 10,000,000s of legitimate SMTP clients (sending
mail servers) will do neither #1 or #2, because their operators will
not have heard about it.  You will have to configure your receiving
mail servers to require #1 or #2 only in exceptional cases.  When the
operators of the other 10,000,000s of servers finally hear about the
new regime, they'll generally to not get around to installing either
sort of proof of virtue, because their mail is working without it and
they have real problems to worry about, from installing the latest
security patches to thinking about considering IPv6.  Even people who
turn on requirements for #1 or #2 for incoming mail to reduce spam
will often delay supporting it on outgoing mail, because no one
competent likes to break things that are working.

In other words, such tactics might work for the exceptional cases of
biggest, otherwise hopeless sources of (not really) forged spam such
as Hotmail as a sort of half-blacklisting, but I can't see it working
in general.


Moore's law causes a bunch of problems for the computing idea.  There
is at at least a factor of 100 in CPU speeds of current hosts.  How
do you ensure that the fastest commodity CPU that a spammer might use
is forced to slow down more than the limit already imposed by network
bottlenecks without making old systems useless?


Vernon Schryver[EMAIL PROTECTED]




Re: namedroppers, continued

2002-12-08 Thread Bill Cunningham

- Original Message -
From: Lloyd Wood [EMAIL PROTECTED]
To: Ayyasamy, Senthilkumar (UMKC-Student) [EMAIL PROTECTED]
Cc: Fred Baker [EMAIL PROTECTED]; Hallam-Baker, Phillip
[EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Sunday, December 08, 2002 5:29 PM
Subject: RE: namedroppers, continued


 On Fri, 6 Dec 2002, Ayyasamy, Senthilkumar  (UMKC-Student) wrote:

   If I don't know you, and you want your e-mail to appear in my
inbox, then you must attach to your message an easily verified
   proof of computational effort, just for me and just for this
   message.
 
  If the proof of effort requires, say, 10 seconds to compute, then
  the economics of sending spam are radically altered, as a single
  machine can send only 8,000 messages per day.

 tracking moore's law could be a problem.

  The recent proliferation of spam has lead to a renewed interest in
  these ideas.  This work is about both the choice of functions that
  can be used to yield easily verifiable proofs of computational
  effort, and architectures for implementing the proof of effort
  approach.  Filtering and/or forcing senders to pay in other
  currencies, such as human attention and money, will be covered as
  time permits

 Sender pays is good. The penny black stamp effectively introduced a
 flat-rate tax on sending letters, rather than a variable-rate tax on
 receiving them, effectively turning mail into a common good available
 to all society.

Lloyd, in the US we pay .37 to mail a first-class letter. I don't know how
many pence you pay in the UK but we still have spam bulk rate unwanted
solicitations. Forcing the sender to pay doesn't solve a spam problem. I
don't see how in could. It would force everyone to have to pay a price.


 The government also undercut private messaging operators and
 effectively put them out of business, but could use money earned
 towards other services for society (having simplified and saved on its
 operational costs along the way).

 So, computing as a social good - you want to send an email to someone
 you're unknown to, you've got to provide proof that you're
 participating in SETI@home, searching for big primes, in a distributed
 crypto challenge, working on processing public GIS information,
 autocomparing versions of typed ascii out-of-copyright texts (or raw
 CD rips?) for accuracy, processing gene data or archived NASA tapes or
 otherwise doing good things -- guess this would make each computing
 charity (give us your spare cycles) the ticket server or PKI manager,
 although you might want to try distributing that too.

  for more details
  http://research.microsoft.com/research/sv/PennyBlack

 I don't see any discussion there of the computation as a social good,
 or computational functions as utility functions. Microsoft, eh?

 http://www.glassinesurfer.com/f/gsrowlandhill.shtml
 -- and here's the obligatory mention of Jeremy Bentham.

 L.

 http://www.ee.surrey.ac.uk/Personal/L.Wood/[EMAIL PROTECTED]






Re: namedroppers, continued

2002-12-08 Thread Vernon Schryver
 From: [EMAIL PROTECTED]

 ...
 The bootstrap problem will exist no matter what scheme we decide on.

There are many spam solutions that do not have the bootstrapping
problem.  Examples include effective laws and honest intent and action
by ISPs.  Before saying those are hopeless, please note that the many
bootstrap-limited proposals don't have proven prospects.

 The point I was addressing was that there's been two major classes of
 scheme proposed ...

 However, the partitions created by each scheme are quite complementary,
 ...

Your observation of how those two solutions fit together is
interesting...or would be if they did not suffer from other problems.


 ...
  Moore's law causes a bunch of problems for the computing idea. ...

 It may not be as big of a problem as we think.  Rough back-of-envelope
 calculations now:  Let's say we assume a function X designed to take 10
 seconds of CPU on my laptop (which has a 1.6Gz P-4 in it) to limit it to 8K
 messages/day.

http://www.intel.com/home/desktop/pentium4/ suggests state of the commodity
art is about twice that, which lets a spammer send 16K msgs/day. 
Moore's law is still a treadmill that you don't want to fight.

   Now, this same function will take around 2 minutes on a 133mz
 processor and be restricted to 800 mails/day. ...

I would put the lower limit at around 48 MHz on 80486s, or ~8 times
slower than a 133 MHz Pentium.  Such machines go back less than 10 years. 
Would you expect your conservative correspondents to spend 15 minutes
to send you a message, or would you just white-list them? 
Once you start white-listing, it's hard to have much enthusiasm for
more fancier solutions.


 Now how many people are still using a 133 system to do that much outbound mail
 themselves (and *NOT* just relaying all outbound mail to a smarthost)?

I think recent FreeBSD and sendmail would still work fine at 48 MHz,
although you probably want to stuff the thing to the gills with 64 MByte
of RAM, or more if it can take it.  There are many computing tasks that 
don't need 3 GHZ and 3 GByte.

Aren't busy smarthosts significantly busier than 80K msgs/day?
From my old experience, that was true even when they were running
at less than 50 MHz and with perhaps 100 MByte.

Besides, no matter what inmates of glass houses and big ISPs would
have you think, SMTP is a peer-to-peer protocol.  A major damage spam
is doing is helping government commissars and ISP salescritters convince
people that the ancient Compuserve/AOL/Prodigy/whatever dumb-terminal-
connected-to-central-servers is the only way to do public networking
and computing.

  And
 even *MORE* to the point, what are the chances that a system that old will be
 upgraded software-wise to support a scheme, even if it takes zero additional
 CPU? ...

Would you whitelist it for the next 10 years?  If there are very
few, white-listing works.  If not, you've got that bootstrapping problem,
and you've invited the white-listing camel into your tent.


Vernon Schryver[EMAIL PROTECTED]




Re: namedroppers, continued

2002-12-08 Thread Bill Cunningham
How about passing a law that makes eveyone install a BIOS patch to block out
spam. ;-)

On the serious side Vernon has a point. Even with snail mail you can go
to the post office and the USPS will provide you with a form to fill out and
they will not put advertisements into your mail. If ISPs would only do the
same. As of yet, if all else fails, deleting a email box is easier and more
effective than taking a ballbat to a snail mail box.

--Bill
- Original Message -
From: Vernon Schryver [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Monday, December 09, 2002 12:09 AM
Subject: Re: namedroppers, continued


  From: [EMAIL PROTECTED]

  ...
  The bootstrap problem will exist no matter what scheme we decide on.

 There are many spam solutions that do not have the bootstrapping
 problem.  Examples include effective laws and honest intent and action
 by ISPs.  Before saying those are hopeless, please note that the many
 bootstrap-limited proposals don't have proven prospects.

  The point I was addressing was that there's been two major classes of
  scheme proposed ...

  However, the partitions created by each scheme are quite complementary,
  ...

 Your observation of how those two solutions fit together is
 interesting...or would be if they did not suffer from other problems.


  ...
   Moore's law causes a bunch of problems for the computing idea. ...

  It may not be as big of a problem as we think.  Rough back-of-envelope
  calculations now:  Let's say we assume a function X designed to take 10
  seconds of CPU on my laptop (which has a 1.6Gz P-4 in it) to limit it to
8K
  messages/day.

 http://www.intel.com/home/desktop/pentium4/ suggests state of the
commodity
 art is about twice that, which lets a spammer send 16K msgs/day.
 Moore's law is still a treadmill that you don't want to fight.

Now, this same function will take around 2 minutes on a
133mz
  processor and be restricted to 800 mails/day. ...

 I would put the lower limit at around 48 MHz on 80486s, or ~8 times
 slower than a 133 MHz Pentium.  Such machines go back less than 10 years.
 Would you expect your conservative correspondents to spend 15 minutes
 to send you a message, or would you just white-list them?
 Once you start white-listing, it's hard to have much enthusiasm for
 more fancier solutions.


  Now how many people are still using a 133 system to do that much
outbound mail
  themselves (and *NOT* just relaying all outbound mail to a smarthost)?

 I think recent FreeBSD and sendmail would still work fine at 48 MHz,
 although you probably want to stuff the thing to the gills with 64 MByte
 of RAM, or more if it can take it.  There are many computing tasks that
 don't need 3 GHZ and 3 GByte.

 Aren't busy smarthosts significantly busier than 80K msgs/day?
 From my old experience, that was true even when they were running
 at less than 50 MHz and with perhaps 100 MByte.

 Besides, no matter what inmates of glass houses and big ISPs would
 have you think, SMTP is a peer-to-peer protocol.  A major damage spam
 is doing is helping government commissars and ISP salescritters convince
 people that the ancient Compuserve/AOL/Prodigy/whatever dumb-terminal-
 connected-to-central-servers is the only way to do public networking
 and computing.


And
  even *MORE* to the point, what are the chances that a system that old
will be
  upgraded software-wise to support a scheme, even if it takes zero
additional
  CPU? ...

 Would you whitelist it for the next 10 years?  If there are very
 few, white-listing works.  If not, you've got that bootstrapping problem,
 and you've invited the white-listing camel into your tent.


 Vernon Schryver[EMAIL PROTECTED]





Re: namedroppers, continued

2002-12-08 Thread Valdis . Kletnieks
On Mon, 09 Dec 2002 03:14:43 GMT, Lloyd Wood said:

 The act of subscribing to a list indicates that you know the list, and
 you're less likely to reject mail from people you don't know that
 comes or also comes via the list, since you're interested in reading
 that list -- unless the list is a simple exploder with no filtering
 mechanisms itself, in which case, subscribers pester each other
 (rather than the list) for computational proofs until the list
 implements spam filtering.

Let's look at some of the headers of the message I'm replying to:

Received: from fan.cc.vt.edu [198.82.161.8] by localhost with POP3 
(fetchmail-5.9.0)for valdis@localhost (single-drop); Sun, 08 Dec 2002 22:41:03 
-0500 (EST)

This is where my laptop picked up my mail via POP3.  My laptop can be aware of
the fact that I'm subscribed to IETF.  However, this is too late to make the
check effectively - it's already hit our central mail server.

Received: from steiner.cc.vt.edu ([10.1.1.14])  by gkar.cc.vt.edu (Sun Internet Mail 
Server sims.3.5.2001.05.04.11.50.p10)  with ESMTP id [EMAIL PROTECTED]; 
Sun,  8 Dec 2002 22:43:06 -0500 (EST)
Received: from loki.ietf.org (loki.ietf.org [132.151.1.177])  by steiner.cc.vt.edu 
(Mirapoint Messaging Server MOS 3.2.1-GA)  with ESMTP id ATX04442; Sun, 08 Dec 2002 
22:42:56 -0500 (EST)

Unfortunately, steiner is the machine which *should* be doing the filtering
(in fact, it's one of our front-end virus scanners).  But there's no good way
for it to know what I'm subscribed to - and a good case can be made that often
the mail server should *not* know what I'm subscribed to (for privacy reasons).

You *could* sell me on a concept where I tell the mail server accept any mail
that presents a token that hashes to this, where I provide a test that
doesn't provide any information regarding the sender.

Why?  Because I don't trust my government to resist the temptation. (Nor do I
trust any OTHER national goverment, for that matter).
-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg09687/pgp0.pgp
Description: PGP signature


Re: namedroppers, continued

2002-12-08 Thread Valdis . Kletnieks
On Mon, 09 Dec 2002 00:47:45 EST, Bill Cunningham [EMAIL PROTECTED]  said:
 How about passing a law that makes eveyone install a BIOS patch to block out
 spam. ;-)

There exist systems that don't have a BIOS. ;)

(Making this reply mostly because there's been serious DRM proposals
that have this same exact problem).



msg09688/pgp0.pgp
Description: PGP signature


Re: namedroppers, continued

2002-12-07 Thread Paul Vixie
[EMAIL PROTECTED] (Keith Moore) writes:

  I've had a look at vixies proposal and it's a good one.  I certainly would
  welcome something like the mailfrom dns record.
 
 actually I'd call it a nonstarter in its current form.  given that
 
 - mail from is used for nondelivery reports and other notifications;
   users need to make sure it gets set to an address that they'll read

that problem doesn't change.  all the mailfrom draft says is that you
need to be coming from a designated server to be able to set MAIL FROM.

 - nomadic users have valid reasons to post from random places on the net 
   (including multiple ISPs) and keep the same mail from address.

then, i'm sorry that i'm such a poor writer.  i tried to cover this case:

   3.3. Roaming hosts such as laptop computers will probably not be able to
   be listed in the MAIL-FROM MX RR for their return address domain name,
   and may be forced to use an intermediary for outbound e-mail.  STARTTLS
   or an SSL/SSH tunnel back home may become a necessary first hop for
   mobile e-mail.

 - many ISPs won't let you forward or submit mail through someone else's 
   SMTP server, even if you have permission to do so.  so you can't 
   forward your mail through your home ISP's mail server to allow the
   mail from check to work.

in that case you'd be wise to not insert a MAIL-FROM MX for your domain.
-- 
Paul Vixie




Re: namedroppers, continued

2002-12-07 Thread Paul Vixie
[EMAIL PROTECTED] writes:

  actually I'd call it a nonstarter in its current form.
 
 I would have to agree.
 ...
 In addition to these valid concerns I'd add that various sorts of
 autoforwarding exist that don't change the MAIL FROM. These would also
 tend to break if such a scheme were implemented.

i apologize for being such a poor writer.  what the draft actually says is:

   3.2. Transport-level e-mail forwarding must be more explicit under this
   specification.  For example if [EMAIL PROTECTED]'s account has a
   .forward file pointing at [EMAIL PROTECTED], then e-mail sent to the
   former will be received by the latter, but with no change in the payload
   of SMTP MAIL FROM.  Thus, ISC's inbound relays would have to be
   configured to implicitly add NETBSD's outbound mail relays as
   multistage inbound relays.  This could scale poorly and may add
   pressure toward transport remailing (with a new envelope) rather than
   transport forwarding (reusing the old envelope.)

 I'm also concerned about the management aspects of having lists of
 authorized multistage relays and all that implies.

then you probably would not want to insert a MAIL-FROM MX in your domain.

 Perhaps the real problem here isn't the use of MAIL FROM but rather the
 assumption that binding ipsource to the MAIL FROM domain is a useful
 validation check. A specific ipsource is just not a property a legitimate
 user of a given domain can be expected to have. Although I am reluctant
 to suggest anything involving public key crypto, another approach would
 be to put a public key in the MAIL-FROM DNS record and add a new header
 field containing a signature covering the message's MAIL FROM and the
 current date.

i love that plan.  we all know that ip source addresses make poor passwords.
however, it has to be an envelope thing, not a header thing, since it's hop
by hop.  perhaps MAIL FROM:$address $sig as an ESMTP thing?
-- 
Paul Vixie




Re: namedroppers, continued

2002-12-07 Thread Keith Moore
  - nomadic users have valid reasons to post from random places on the net
(including multiple ISPs) and keep the same mail from address.
 
 then, i'm sorry that i'm such a poor writer.  i tried to cover this case:
 
3.3. Roaming hosts such as laptop computers will probably not be able to
be listed in the MAIL-FROM MX RR for their return address domain name,
and may be forced to use an intermediary for outbound e-mail.  STARTTLS
or an SSL/SSH tunnel back home may become a necessary first hop for
mobile e-mail.
 
  - many ISPs won't let you forward or submit mail through someone else's
SMTP server, even if you have permission to do so.  so you can't
forward your mail through your home ISP's mail server to allow the
mail from check to work.
 
 in that case you'd be wise to not insert a MAIL-FROM MX for your domain.

what this seems to require is to have different sets of domains for 
use in MAIL FROM addresses - those for which source verification can
be expected and those for which it cannot.  there are some current
domains which are naturally and exclusively in the former category - 
say hotmail.com; but most domains are probably not exclusively in 
either category.  so it would require establishment of new domains and 
reconfiguration of systems to use those domains to be effective - along 
with the educational effort that this entails.  and it would still
leave a significant portion of mail without a way to identify its source.

Keith




Re: namedroppers, continued

2002-12-07 Thread Paul Vixie
   - many ISPs won't let you forward or submit mail through someone else's
 SMTP server, even if you have permission to do so.  so you can't
 forward your mail through your home ISP's mail server to allow the
 mail from check to work.
  
  in that case you'd be wise to not insert a MAIL-FROM MX for your domain.
 
 what this seems to require is to have different sets of domains for 
 use in MAIL FROM addresses - those for which source verification can
 be expected and those for which it cannot.

yes.

 there are some current domains which are naturally and exclusively in
 the former category - say hotmail.com; but most domains are probably
 not exclusively in either category.

yes.

 so it would require establishment of new domains and reconfiguration
 of systems to use those domains to be effective - along with the
 educational effort that this entails.

i think most of the reconfiguration effort would be around existing domains.

 and it would still leave a significant portion of mail without a way
 to identify its source.

so far, working toward a single solution that covers all cases and is easy
(low cost) for spam victims and infrastructure owners to take part in, has
not worked.  what you see in the mailfrom draft is just a point solution.

i am reminded by this thread that the most powerful force on the internet
continues to be a single voice saying that something cannot be done.




Re: namedroppers, continued

2002-12-07 Thread Steven M. Bellovin
In message [EMAIL PROTECTED], Dean An
derson writes:
This seems clever, however, it will also take significant computational
effort to verify the computational effort was actually done. Even if a
class of functions are found that are easier to verify than to compute,
they will no doubt still take up a significant fraction of time.

In fact, that's the easy part.  You could demand that the sender 
compute 1,000,000 HMACs of the text, the envelope, the time of day, and 
a counter.  The verifier could check 100 randomly-chosen ones -- if any 
fail, there's a forgery.  (Well, you probably wouldn't want those 
values, since 1,000,000 HMACs would be a lot of data to transmit.  But 
you get the general idea.)

--Steve Bellovin, http://www.research.att.com/~smb (me)
http://www.wilyhacker.com (Firewalls book)





Re: namedroppers, continued

2002-12-07 Thread Keith Moore
 i am reminded by this thread that the most powerful force on the internet
 continues to be a single voice saying that something cannot be done.

well, I've certainly seen it happen.  (though I think the most
powerful force on the internet is large numbers of voices insisting
that something be done whether or not it makes sense - not that this
is what is happening here.)

I don't want to discourage you from developing the mail from dns idea 
further, but neither do I think it will help the spam problem much.
my biggest concern is that it will be used as an excuse to constrain
where people can send mail from, and at a time when ill-conceived spam 
countermeasures are already a serious operational problem and probably
the most significant cause of failure to deliver legitimate mail.

Keith




RE: namedroppers, continued

2002-12-06 Thread Hallam-Baker, Phillip
One of the main reasons why anti-spam measures are failing is that the
spam-artists are fraudulently hijacking people's email addresses so as
to bypass anti-spam filters.

My reading of the open enrollement policy is that anyone can contribute.

I don't think that a secondary manual filter by which the first post to
the list by an individual was only forwarded after moderation would
breach that principle - but it would be one heck of a lot less work for
the chairs than having to moderate every message.

I certainly do not consider it an imposition on those who want to
pontificate on Internet protocols to require them to actualy eat the
company dog food and sign their messages with either PGP or S/MIME.

I am not pushing a corporate interest here, a self signed certificate
would be fine. I think that one of the problems for the PKI world is
that the perfect has been the enemy of the good. OK you can argue that
it would not exactly hurt VRSN if more people started to use security
routinely, I don't think that would hurt the IETF either.


Phill


 -Original Message-
 From: Aaron Swartz [mailto:[EMAIL PROTECTED]]
 Sent: Monday, December 02, 2002 10:43 AM
 To: Hallam-Baker, Phillip
 Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED]
 Subject: Re: namedroppers, continued


 Hallam-Baker, Phillip wrote:
  The only way to resolve this issue properly would be to
 require every
  submission to an IETF mailing list to be cryptographically signed
  [and] to require the subscribers to register their signing key

 And how do we prevent spammers from registering their signing key? Are
 you suggesting that we change the IETF's open enrollment policy?

 --
 Aaron Swartz [http://www.aaronsw.com]




smime.p7s
Description: application/pkcs7-signature


Re: namedroppers, continued

2002-12-06 Thread Randy Bush
 From: D. J. Bernstein [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED]
 Subject: namedroppers, continued
 ...
 Okay, Bush: Put [EMAIL PROTECTED] on the list of addresses from which
 submissions are automatically accepted.

sorry bernstein.  as your message also was addressed to lists to
which i subscribe, the copy to namedroppers-owner was deleted
locally due to dupe message-id: detection.  erik and harald pointed
it out, and rob just forwarded a copy to me.  so i have done the
addition.

thanks, as approving all your postings was becoming a pain in the
butt.

randy




RE: namedroppers, continued

2002-12-06 Thread Dean Anderson
How much spam is going to namedroppers?

I haven't seen any. So, don't you think this has gone a little of the deep
end?

--Dean

On Fri, 6 Dec 2002, Hallam-Baker, Phillip wrote:

 One of the main reasons why anti-spam measures are failing is that the
 spam-artists are fraudulently hijacking people's email addresses so as
 to bypass anti-spam filters.





RE: namedroppers, continued

2002-12-06 Thread Randy Presuhn
Hi -

 Message-Id: [EMAIL PROTECTED]
 Date: Fri, 06 Dec 2002 13:41:52 -0800
 To: Hallam-Baker, Phillip [EMAIL PROTECTED]
 From: Fred Baker [EMAIL PROTECTED]
 Subject: RE: namedroppers, continued
 Cc: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED]
 In-Reply-To: [EMAIL PROTECTED]
  .com
...
 I would be in favor of that, personally, as long as we can ensure that the 
 appropriate signature facility (be it RSA, PGP, or whatever) is freely 
 available to all who need to use it. The issue here is not us corporate 
 types who have a business reason to buy the software, it is the students 
 who often lack the funds. The big issue would be the procedures for posting 
 one's key to the appropriate place - what is to stop a spammer from posting 
 a key and sending the spam anyway? I'm not proposing a mechanism, but 
 someone who is good at such things might well find it of value.
...

At least for now, the stuff with forged addresses aimed at
the IETF lists I handle can be stopped simply by blocking
multipart/alternative, multipart/mixed, and text/html.
Is this generally true, or am I working with a particularly
old-fashioned subscriber base?

On non-IETF lists I manage, I've had to permit these types, and
resort to finer-grained (read costlier) spam-blocking measures.

 --
 Randy Presuhn  BMC Software, Inc.  SJC-1.3141
 --
 My opinions and BMC's are independent variables.
 --




RE: namedroppers, continued

2002-12-06 Thread Fred Baker
At 08:28 AM 12/2/2002 -0800, Hallam-Baker, Phillip wrote:

The only way to resolve this issue properly would be to require every
submission to an IETF mailing list to be cryptographically signed (PGP
or S/MIME), to require the subscribers to register their signing key and
to then filter the mail sent out on the list so that only signed mail
gets through.


I would be in favor of that, personally, as long as we can ensure that the 
appropriate signature facility (be it RSA, PGP, or whatever) is freely 
available to all who need to use it. The issue here is not us corporate 
types who have a business reason to buy the software, it is the students 
who often lack the funds. The big issue would be the procedures for posting 
one's key to the appropriate place - what is to stop a spammer from posting 
a key and sending the spam anyway? I'm not proposing a mechanism, but 
someone who is good at such things might well find it of value.

It doesn't address the off topic issue. As you say, that could be left to 
a working group chair equiped with formal procedures developed by consensus 
within the work group or adopted by the working group from a more general 
place (ie, the IETF could suggest a procedure, and the WG could adopt it if 
it didn't feel another procedure would be better).

I have had a private exchange, over the past few days, with someone who 
wished that the IETF would please document some good spam-elimination 
procedure, so that it could be used world-wide to completely eliminate 
spam. I think that boils down to provide a global PKI in this solution, 
and presumes that spammers are incapable of using one. That might be a 
great research topic. Too bad nobody has ever thought of it before; we 
could really use the outcome of that research. (OK, so it's a lame attempt 
at humor...)

I think it was Steve Bellovin that suggested a procedure for reducing the 
utility of spoofing source addresses in emails; if not, it was me and I 
happened to suggest something his favorite algorithm fit into, by having a 
host in each mail domain (mailid.example.com) be able to assert that its 
domain had or had not sent an email within a given recent  time period 
whose MD5 hash, when divided by vector of prime numbers resulted in 
vector of remainders. I could write that up in an internet draft if folks 
think it makes sense. That would be a more global procedure that didn't 
require a PKI and only addressed spoofed addresses. 



Re: namedroppers, continued

2002-12-06 Thread Steven M. Bellovin
In message [EMAIL PROTECTED], Fred Bake
r writes:
At 08:28 AM 12/2/2002 -0800, Hallam-Baker, Phillip wrote:
The only way to resolve this issue properly would be to require every
submission to an IETF mailing list to be cryptographically signed (PGP
or S/MIME), to require the subscribers to register their signing key and
to then filter the mail sent out on the list so that only signed mail
gets through.

I would be in favor of that, personally, as long as we can ensure that the 
appropriate signature facility (be it RSA, PGP, or whatever) is freely 
available to all who need to use it. The issue here is not us corporate 
types who have a business reason to buy the software, it is the students 
who often lack the funds. The big issue would be the procedures for posting 
one's key to the appropriate place - what is to stop a spammer from posting 
a key and sending the spam anyway? I'm not proposing a mechanism, but 
someone who is good at such things might well find it of value.

Well, it's also the availability of the right signature facility in the 
myriad email clients people use.

I think it was Steve Bellovin that suggested a procedure for reducing the 
utility of spoofing source addresses in emails; if not, it was me and I 
happened to suggest something his favorite algorithm fit into, by having a 
host in each mail domain (mailid.example.com) be able to assert that its 
domain had or had not sent an email within a given recent  time period 
whose MD5 hash, when divided by vector of prime numbers resulted in 
vector of remainders. I could write that up in an internet draft if folks 
think it makes sense. That would be a more global procedure that didn't 
require a PKI and only addressed spoofed addresses. 

Wasn't me...

--Steve Bellovin, http://www.research.att.com/~smb (me)
http://www.wilyhacker.com (Firewalls book)





RE: namedroppers, continued

2002-12-06 Thread Marc Schneiders
On Fri, 6 Dec 2002, at 13:41 [=GMT-0800], Fred Baker wrote:

 I think it was Steve Bellovin that suggested a procedure for reducing the
 utility of spoofing source addresses in emails; if not, it was me and I
 happened to suggest something his favorite algorithm fit into, by having a
 host in each mail domain (mailid.example.com) be able to assert that its
 domain had or had not sent an email within a given recent  time period
 whose MD5 hash, when divided by vector of prime numbers resulted in
 vector of remainders. I could write that up in an internet draft if folks
 think it makes sense. That would be a more global procedure that didn't
 require a PKI and only addressed spoofed addresses.

Spammers would be the first to set up your mailid host. They will have
had years of experience to find holes in the system before you've
convinced everyone to adopt or accept the mailid.

It might be easier to write a new protocol to succeed email, instant
messaging, mobile phones (something useful in itself) with built-in
abuse control from the start.




RE: namedroppers, continued

2002-12-06 Thread Ayyasamy, Senthilkumar (UMKC-Student)
 Too bad nobody has ever thought of it 
 before; we  could really use the outcome 
 of that research
while researchers has not thought about global
PKI, their are research which focus on spam 
elimination.

this is the work all about (yesterday's seminar in a MIT group)

 If I don't know you, and you want your e-mail to appear in my
  inbox, then you must attach to your message an easily verified
 proof of computational effort, just for me and just for this
 message.

If the proof of effort requires, say, 10 seconds to compute, then the
economics of sending spam are radically altered, as a single machine
can send only 8,000 messages per day.

The recent proliferation of spam has lead to a renewed interest in
these ideas.  This  work is about both the choice of
functions that can be used to yield easily verifiable proofs of
computational effort, and architectures for implementing the proof of
effort approach.  Filtering and/or forcing senders to pay in other
currencies, such as human attention and money, will be covered as time
permits


for more details http://research.microsoft.com/research/sv/PennyBlack




RE: namedroppers, continued

2002-12-06 Thread Vernon Schryver
 From: Fred Baker [EMAIL PROTECTED]

   ... I think that boils down to provide a global PKI in this solution, 
 and presumes that spammers are incapable of using one. That might be a 
 great research topic. Too bad nobody has ever thought of it before; we 
 could really use the outcome of that research. (OK, so it's a lame attempt 
 at humor...)

It's been years since it was possible to be amused by the number of
people who assume that spammers are more ignorant and less competent
than they are, and so propose spam solutions predicated on spammers
being unable to register as many names, keys, identities, or whatever
as needed or as many as everybody else can.

 ...
 host in each mail domain (mailid.example.com) be able to assert that its 
 domain had or had not sent an email within a given recent  time period 
 whose MD5 hash, when divided by vector of prime numbers resulted in 
 vector of remainders. I could write that up in an internet draft if folks 
 think it makes sense. That would be a more global procedure that didn't 
 require a PKI and only addressed spoofed addresses. 

That's not a powerful solution, because it assumes the existence of
a central mail authenticator for every domain that might send mail.
As long as most SMTP clients don't have such authenticators, the
spammers would simply avoid the few that do, just as they already
avoid providers that break the financial kneecaps of spammers.

As far as I can tell, the familiar claim that most spam carrying
surprising header or envelope From adddresses is forged is mostly wrong.
The claim seems to be based in large part on the knowingly misleading
descriptions of the situation by free mail providers.  The free providers
claim that almost all spam implicating them is forged. If you read
the fine print in their announcements of terminated accounts, responses
to spam reports, and related messages, you'll discover that free provider
spam is forged in the same sense your picture postcards would be if
you were evicted from your home while travelling.

That suggests that such authenticator servers would help reduce spam
using free provider drop-boxes.  However, a better solution that does
not involve the rest of the network subsidizing the advertising agencies
that are the free providers is to reject all mail apparently from free
providers.  Doing extra processing that is made necessary only because
the free providers cannot be bothered enforce sufficiently painful
terms and conditions on their users is a subsidy.  The free providers
could stop spammers from using their services if they would launch
lawyers, require bonds (e.g. creditcard numbers), or any of many
other things, but anything would cost them money.


Vernon Schryver[EMAIL PROTECTED]




RE: namedroppers, continued

2002-12-06 Thread Vernon Schryver
 From: Marc Schneiders [EMAIL PROTECTED]

 ...
 It might be easier to write a new protocol to succeed email, instant
 messaging, mobile phones (something useful in itself) with built-in
 abuse control from the start.

That's another stupid crackpot spam solution that just won't go away.

You cannot have abuse control built into a protocol that allows
strangers to send each other mail.  Any mail protocol that lets you
receive mail from a stranger must also let the stranger send the same
message to you and to 30,000,000 of your closest friends.  On the
other hand, if you want to only accept mail from people who are not
strangers, you can use any of the many official and ad hoc SMTP
extensions to ensure you only receive mail from them.

If your computer system, mail protocol, or whatever knows that a
stranger is not a spammer, then the stranger is not really a stranger.


Vernon Schryver[EMAIL PROTECTED]




Re: namedroppers, continued

2002-12-06 Thread Valdis . Kletnieks
On Fri, 06 Dec 2002 14:34:14 PST, Hallam-Baker, Phillip said:

 The problem here is that having Randy Bush moderate is
 not a scalable solution to the problems of Spam in general.

We could clone him, but that's probably not scalable either



msg09660/pgp0.pgp
Description: PGP signature


RE: namedroppers, continued

2002-12-06 Thread william
I'v been saying about need for more radical change in mail protocol for
years now on mailing lists. I'd rather work on smtp itself, but some 
people who were involved in original protocol do not want any serious 
changes to what they'v done, though its clear that abuse and other holes 
with current system is creating too many problems.

In any case, by next ietf meeting in san francisco, I'll bring complete
proposal for new protocol and might even try some practical tests. I do still 
believe that smtp can be saved, but not without more complex authentication
system during delivery of email and that can't be done with current 
protocol design or current available extension process. 

Also were there any discussions or more complete discription of this 
algorithm for checking if host had sent an email and if so is this 
available on website or archive to read more about? If answer is yes, can 
somebody send me url or approximate date of discussions so I could lookup 
in archives. 

And am I correct here in understanding what was proposed is that smtp 
conversation id be such that receiving mail server could verify with 
sender (callback?) that it deed indeed initiate the email. If so I do not 
quite understand how MD5 helps there, plus I see quite a few problems with 
creating some special mx-like record in dns just for verification. If 
this is indeed what was proposed its better to go with paul vixie's 
proposal of mailfrom dns record - http://www.vix.com/~vixie/mailfrom.txt or
http://www.ietf.org/internet-drafts/draft-church-dns-mail-sender-02.txt

On Fri, 6 Dec 2002, Marc Schneiders wrote:

 On Fri, 6 Dec 2002, at 13:41 [=GMT-0800], Fred Baker wrote:
 
  I think it was Steve Bellovin that suggested a procedure for reducing the
  utility of spoofing source addresses in emails; if not, it was me and I
  happened to suggest something his favorite algorithm fit into, by having a
  host in each mail domain (mailid.example.com) be able to assert that its
  domain had or had not sent an email within a given recent  time period
  whose MD5 hash, when divided by vector of prime numbers resulted in
  vector of remainders. I could write that up in an internet draft if folks
  think it makes sense. That would be a more global procedure that didn't
  require a PKI and only addressed spoofed addresses.
 
 Spammers would be the first to set up your mailid host. They will have
 had years of experience to find holes in the system before you've
 convinced everyone to adopt or accept the mailid.
 
 It might be easier to write a new protocol to succeed email, instant
 messaging, mobile phones (something useful in itself) with built-in
 abuse control from the start.






RE: namedroppers, continued

2002-12-06 Thread william
This is note quite right. While its impossible to built open system that 
would prevent all abuse, you can first of all built system that would 
provide good verification of who sender is and you can do a lot to make it 
difficult to send thousands of same emails or at least make it easy to 
identify who is doing it and give tools for sysadmins to monitor and 
prevent such activity.

On Fri, 6 Dec 2002, Vernon Schryver wrote:

  From: Marc Schneiders [EMAIL PROTECTED]
 
  ...
  It might be easier to write a new protocol to succeed email, instant
  messaging, mobile phones (something useful in itself) with built-in
  abuse control from the start.
 
 That's another stupid crackpot spam solution that just won't go away.
 
 You cannot have abuse control built into a protocol that allows
 strangers to send each other mail.  Any mail protocol that lets you
 receive mail from a stranger must also let the stranger send the same
 message to you and to 30,000,000 of your closest friends.  On the
 other hand, if you want to only accept mail from people who are not
 strangers, you can use any of the many official and ad hoc SMTP
 extensions to ensure you only receive mail from them.
 
 If your computer system, mail protocol, or whatever knows that a
 stranger is not a spammer, then the stranger is not really a stranger.
 
 
 Vernon Schryver[EMAIL PROTECTED]





RE: namedroppers, continued

2002-12-06 Thread Joe Baptista

On Fri, 6 Dec 2002 [EMAIL PROTECTED] wrote:

 proposal of mailfrom dns record - http://www.vix.com/~vixie/mailfrom.txt or

I've had a look at vixies proposal and it's a good one.  I certainly would
welcome something like the mailfrom dns record.

regards
joe baptista




Re: namedroppers, continued

2002-12-06 Thread Paul Vixie
it's difficult to imagine a mailing list for which this thread is on-topic.

 I think it was Steve Bellovin that suggested a procedure for reducing the
 utility of spoofing source addresses in emails; if not, it was me and I
 happened to suggest something his favorite algorithm fit into, by having a
 host in each mail domain (mailid.example.com) be able to assert that its
 domain had or had not sent an email within a given recent  time period
 whose MD5 hash, when divided by vector of prime numbers resulted in
 vector of remainders. I could write that up in an internet draft if folks
 think it makes sense. That would be a more global procedure that didn't
 require a PKI and only addressed spoofed addresses. --

here was my attempt at this, which i didn't really know where to go next with:







   IndependentPaul Vixie (Ed.)
   Request for Comments:  Category: Experimental
   June 6, 2002

Repudiating MAIL FROM

   Status of this Memo

  This memo describes an experimental procedure for handling received
  e-mail.  It does not specify an Internet standard of any kind.
  Distribution of this memo is unlimited.

   Copyright Notice

  Copyright (C) The Internet Society (2002).  All Rights Reserved.

   Abstract

  At the time of this writing, more than half of all e-mail received by
  the author has a forged return address, due to the total absence of
  address authentication in SMTP (see [RFC2821]).  We present a simple
  and backward compatible method whereby cooperating e-mail senders and
  receivers can detect forged source/return addresses in e-mail.

   1 - Introduction and Overview

   1.1. Internet e-mail return addresses are nonrepudiable by design of the
   relevant transport protocols (see [RFC2821]).  Simply put, there is no
   cause for ANY confidence in the proposition this e-mail came from where
   it says it came from.

   1.2. Irresponsible actors who wish to transmit unwanted bulk e-mail
   routinely use this designed-in lack of source/return authenticity to
   hide their point of origin, which usually involves forging a valid
   return address belonging to some highly visible and popular ISP (for
   example, HOTMAIL.COM).

   1.3. Recipients who wish to reject unwanted bulk e-mail containing
   forged source/return addresses are prevented from doing so since the
   addresses, as presented, are nonrepudiable by design.  Simply put, there
   would be too many false positives, and too much valid e-mail rejected,
   if one were to program an e-mail relay to reject all e-mail claiming to
   be from HOTMAIL.COM since, statistically, most e-mail claiming to be
   from HOTMAIL.COM is actually from somewhere else.  HOTMAIL.COM, in this
   example, is a victim of forgery.



   Vixie Experimental  [Page 1]

   RFC   Repudiating MAIL FROM May 26, 2002


   1.4. What's needed is a way to guaranty that each received e-mail
   message did in fact come from some mail server or relay which can
   rightfully originate or relay messages from the purported source/return
   address.

   1.5. Approaches of the form use PGP and use SSL are not scalable in
   the short term since they depend on end-to-end action and there are just
   too many endpoints.  An effective solution has to be applicable to mail
   relay, not just final delivery.

   1.6. Valid (wanted) e-mail must not be rejected by side effect or
   partial adoption of this proposal.  Source/return authenticity must be a
   confidence effector, as in we can be sure that this did not come from
   where it claims and simple uncertainty must remain in effect otherwise.

   2 - Behaviour

   2.1. Domain owners who wish their mail source/return information to be
   repudiable will enter stylized MX RR's into their DNS data, whose owner
   name is MAIL-FROM, whose priority is zero, and whose servername
   registers an outbound (border) relay for the domain.  For example, to
   tell the rest of the Internet who they should believe when they receive
   mail claiming to be from [EMAIL PROTECTED], the following DNS MX RR's should
   be entered:

  $ORIGIN isc.org.
  MAIL-FROM MX 0 rc
MX 0 rc1

   In this example, hosts RC.ISC.ORG, and RC1.ISC.ORG are given as
   appropriate places to originate mail from @ISC.ORG.  Note that this
   differs from the normal inbound MX RRset for this example domain:

  $ORIGIN isc.org.
  @ MX 0 rc
MX 0 isrv4

   So, the inbound mail server set partially overlaps with, but differs
   from, the example outbound mail server set.  This is quite common in the
   Internet, and is the reason why the normal inbound mail server set
   described by a domain's apex MX RRset cannot be used for repudiation
   purposes.






   Vixie Experimental  [Page 2]


Re: namedroppers, continued

2002-12-06 Thread ned . freed
   proposal of mailfrom dns record - http://www.vix.com/~vixie/mailfrom.txt or
 
  I've had a look at vixies proposal and it's a good one.  I certainly would
  welcome something like the mailfrom dns record.

 actually I'd call it a nonstarter in its current form.

I would have to agree.

  given that

 - mail from is used for nondelivery reports and other notifications;
   users need to make sure it gets set to an address that they'll read

 - nomadic users have valid reasons to post from random places on the net
   (including multiple ISPs) and keep the same mail from address.

 - many ISPs won't let you forward or submit mail through someone else's
   SMTP server, even if you have permission to do so.  so you can't
   forward your mail through your home ISP's mail server to allow the
   mail from check to work.

In addition to these valid concerns I'd add that various sorts of
autoforwarding exist that don't change the MAIL FROM. These would also tend to
break if such a scheme were implemented.

I'm also concerned about the management aspects of having lists of authorized
multistage relays and all that implies.

 trying to reuse any of the existing return addresses in email as a
 spam identifier just won't fly.  a separate identifier might work.

But there's also a problem with NOT using the MAIL FROM -- one of the things
that's being counted on here is that mailing list expanders will (optionally)
check the MAIL FROM against this new DNS record, but then change it
unconditionally to an address associated with the list expander rather than
with the originator.

 (actually Sender is the closest thing to what is needed here,
 unfortunately it's routinely munged by mailing lists)

To the extent that sender is munged by mailing lists to refer to the 
list expander it would actually be a feature here, not a bug. But just
as you cannot count on it being left alone, you also cannot count on it
being changed.

Perhaps the real problem here isn't the use of MAIL FROM but rather the
assumption that binding ipsource to the MAIL FROM domain is a useful 
validation check. A specific ipsource is just not a property a legitimate user
of a given domain can be expected to have. Although I am reluctant to suggest
anything involving public key crypto, another approach would be to put a
public key in the MAIL-FROM DNS record and add a new header field containing a
signature covering the message's  MAIL FROM and the current date.

Ned




RE: namedroppers, continued

2002-12-04 Thread Hallam-Baker, Phillip

 OK.. Almost plausible.  However note that currently, the PGP
 web-of-trust
 covers only a small percentage of the subscribers to the IETF
 list, and
 there's no *really* good PKI for S/MIME yet (hint - we don't
 seem to even
 understand how to apply 'basicConstraints', so if you think
 we're going to
 have working CRLs anytime soon, please share the name and
 address of your
 pharmaceutical supplier.. ;)

OCSP scales fine for revocation checking. We can use the same
platform that currently serves 6 billion DNS queries a day.

I don't have a pharmaceutical supplier at hand, however I can
provide you with the name of a company that has a nice line
in herbal viagra if you are interested.


 I propose to you that using a Thawte free S/MIME cert proves
 approximately
 zero - a spammer can just get one for each run (and remember
 that no matter
 how much a spammer tries to hid their identity, they *still*
 have to provide
 a working way to reach them (via smtp or http or whatever) or
 they don't get
 any feedback)

If the spammer wants to perform custom operations for each
constituency they want to spam.

I don't think they do, they have to be able to spam millions
of people at a time or the response rate is simply too low.
Reported response rates are in the thousandths of a percent,
so spamming the entire IETF gets less than a tenth of a customer.


Phill



smime.p7s
Description: application/pkcs7-signature


RE: namedroppers, continued

2002-12-04 Thread Hallam-Baker, Phillip

 The fact that OCSP scales fine for revocation checking
 doesn't mean that
 you have a system that scales fine for the *TOTAL PROCESS*.

Stop blustering, you clearly did not know the difference between
a CRL and OCSP and certainly have no real world experience of
operating PKI on which to base your broad assertions.


 Also, there's the added issue that the DNS cuts down on
 traffic by way of
 caching.

The ATLAS cluster that runs the core DNS (.com, .net, .org) is
supporting six billion queries a day. The caching in the secondary
servers goes some way to reduce load but not as much as many think.


 Unfortunately, that's the LAST thing you want a CRL
 to be doing
 (in particular, negative caching is an extreme no-no).

No it is not. If you knew what a CRL is you would know that
they are issued on a periodic basis and that caching is
therefore exactly what Windows or any other sensible O/S
does with a CRL.

You appear to be confusing CRLs with OCSP. Try reading the OCSP
spec, I wrote the original section on caching responses.


Phill



smime.p7s
Description: application/pkcs7-signature


Re: namedroppers, continued

2002-12-04 Thread Valdis . Kletnieks
On Tue, 03 Dec 2002 08:21:22 PST, you said:

 Stop blustering, you clearly did not know the difference between
 a CRL and OCSP and certainly have no real world experience of
 operating PKI on which to base your broad assertions.

I said total process.  The process failure described in the CERT
advisory didn't care if it was a CRL, OCSP, a X.509 certificate, or
a piece of paper scotch-taped to one end of a tin-cans-and-string link
that says Don't use unless your name is Fred.

I admit I don't do any PKI per se.  What I *do* have is over 2 decades
of making a good living at cleaning up the mess when people misconfigure
things.  So I'm reading RFC2560 and see this in section 5:

A denial of service vulnerability is evident with respect to a flood
   of queries. The production of a cryptographic signature significantly
   affects response generation cycle time, thereby exacerbating the
   situation. Unsigned error responses open up the protocol to another
   denial of service attack, where the attacker sends false error
   responses.

and I combine that with the research out of CAIDA I cited earlier that showed
98% of DNS queries to a root nameserver being broken, and my experience
tells me that This Is A Train Wreck Waiting To Happen.

The only mitigating factor here is that section 2.5 allows the precomputing
of a response and associated signature.

 You appear to be confusing CRLs with OCSP. Try reading the OCSP
 spec, I wrote the original section on caching responses.

Hmm... I've checked RFC2560, and didn't find anything significant about caching
other than beware HTTP proxies with broken caching (or did you mean the
precomputation of responses in section 2.5)?  Also, is there a spec for a DNS
RR to supplement the serviceLocator extension of 2560 section 4.4.6?  That
would also help to minimize and distribute the load (as the OCSP RR could be
lumped in with the other DNS RR's for DNSSEC processing - handing back the OCSP
info in an additional info field then saves you another resource hit when an
OCSP query gets made.
-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg09608/pgp0.pgp
Description: PGP signature


RE: namedroppers, continued

2002-12-02 Thread Hallam-Baker, Phillip
This whole discussion should be taken to the
YWKTIEDNWWFALNORIBNLTICSADEWSIFOSTFSTNOML working group. (yes we know
that internet email does not work well for a large number of reasons,
including but not limited to, incorrect code, spam and dare we say it
failure of smtp to fully support the needs of mailing lists).

The only way to resolve this issue properly would be to require every
submission to an IETF mailing list to be cryptographically signed (PGP
or S/MIME), to require the subscribers to register their signing key and
to then filter the mail sent out on the list so that only signed mail
gets through.

While this would require a moderate degree of work on the part of the
list users it would eliminate the need for moderator action. Problem
posters could be dealt with by means of  a formal process.

Thawte still provides free S/MIME certificates, however for the purposes
of this proposal it would suffice to use a self signed certificate.

SPAM is becomming a serious problem - as Bersnteins own rather offensive
spam protection measures atest. The only way to resolve that problem in
the long run is to start authenticating the good signal at source. The
strategy of attempting to isolate the bad signal from the good is
failling progressively as the spam companies employ counter measures.

The relevance of this to DNS is that the ability to authenticate an SRV
record provides an imense amount of leverage in automating this process.
For example I can have some form of information service set up linked to
the DNS that tells people that I sign every one of my emails without
exception and that any unsigned mail message can be rejected.

SPAM is a security problem. If we don't fix it the signal to noise ratio
will fall way below acceptable levels for many users.

Phill


 -Original Message-
 From: Pekka Savola [mailto:[EMAIL PROTECTED]]
 Sent: Saturday, November 30, 2002 8:00 AM
 To: D. J. Bernstein
 Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED]
 Subject: Re: namedroppers, continued


 [ post by non-subscriber.  with the massive amount of spam,
 it is easy to miss
   and therefore delete posts by non-subscribers.  if you wish
 to regularly
   post from an address that is not subscribed to this mailing
 list, send a
   message to listname[EMAIL PROTECTED] and ask to have
 the alternate
   address added to the list of addresses from which submissions are
   automatically accepted. ]

 On 29 Nov 2002, D. J. Bernstein wrote:
  Keith claims that allowing ``contributions from outsiders'' requires
  delay and manual review. That claim is absurd. Immediately
 bounce the
  message to the ``outsider,'' with instructions explaining
 how to have
  the message sent to subscribers; end of problem.

 No, it's not 'end of problem'.

 If I cross-post a reply to some message with was cross-posted
 to a list
 I'm subscribed at and a list I'm not, in the general case I
 do *not* want
 to subscribe to the other list to be able to send my
 cross-post reply to
 both.

 Waiting for moderator approval is just fine for me, much better than
 requiring to subscribe or do something else.

 It's not black and white.

 --
 Pekka Savola Tell me of difficulties surmounted,
 Netcore Oy   not those you stumble over and fall
 Systems. Networks. Security.  -- Robert Jordan: A Crown of Swords




 --
 to unsubscribe send a message to
 [EMAIL PROTECTED] with
 the word 'unsubscribe' in a single line as the message text body.
 archive: http://ops.ietf.org/lists/namedroppers/




smime.p7s
Description: application/pkcs7-signature


Re: namedroppers, continued

2002-12-02 Thread Aaron Swartz
Hallam-Baker, Phillip wrote:

The only way to resolve this issue properly would be to require every
submission to an IETF mailing list to be cryptographically signed
[and] to require the subscribers to register their signing key


And how do we prevent spammers from registering their signing key? Are
you suggesting that we change the IETF's open enrollment policy?

--
Aaron Swartz [http://www.aaronsw.com]




RE: namedroppers, continued

2002-12-02 Thread Hallam-Baker, Phillip
First off, the problem of SPAM is one of the perfect being the enemy of
the good. If we can cut the spam by 95% then that is a pretty useful
achievement.

So, no I don't think that the folk selling feather luggage, herbal
viagra, p0rn etc are likely to go to that length in great numbers,
unless that is the Internet as a whole adopts the same type of measure
following our lead.


However I have thought ahead to the issues of scale here, let us imagine
that a large number of groups use the same scheme, that email agents
that filter based on signatures are available and widely used.

First, consider the effect of a minor authentication requirement on
certificate issue, the ability to read email sent to the address
specified in the certificate. Using that technique we could eliminate
spams with bogus addresses which itself would be a major advance. The
amount of spam that comes through with a valid email address is
vanishingly small.

Second consider that if the whole internet follows our lead and starts
to use cryptography routinely there are a lot of additional steps that
then become possible that are not practical until most people have a
public key and there is a means of discovering that via a DNS linkage.

Third one of the things we could do in an extended enrollment process
would be to get participants to agree to the following set of terms:

1) Thou shalt not SPAM.
2) Thou shalt permit your messages to be posted in the archives.
3) Thou shalt provide timely notice of any intellectual property
claims.
4) Thou shalt not take the name of the chair in vain unless she
deserves it.
5) etc.

Then we could sue the b*#*@#ds if they spammed after that. People have
been looking for a test case for digital signatures for ages, so don't
worry about the cost.


A side benefit of this is that it would cause a lot of people to start
using secure email and thus start to create some critical mass for email
security.

What we need is for someone to take Majordomo or the like and merge in
some sort of filter to check S/MIME and PGP signatures. Then find a
group that wanted to serve as a guinea pig (S/MIME or PKIX perhaps?).

Alternatively we should perhaps form a group 'Deployment of secure
email' which could apply this rubric.


Phill


 -Original Message-
 From: Aaron Swartz [mailto:[EMAIL PROTECTED]]
 Sent: Monday, December 02, 2002 1:43 PM
 To: Hallam-Baker, Phillip
 Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED]
 Subject: Re: namedroppers, continued


 Hallam-Baker, Phillip wrote:
  The only way to resolve this issue properly would be to
 require every
  submission to an IETF mailing list to be cryptographically signed
  [and] to require the subscribers to register their signing key

 And how do we prevent spammers from registering their signing
 key? Are
 you suggesting that we change the IETF's open enrollment policy?

 --
 Aaron Swartz [http://www.aaronsw.com]




smime.p7s
Description: application/pkcs7-signature


Re: namedroppers, continued

2002-12-02 Thread Valdis . Kletnieks
On Mon, 02 Dec 2002 08:28:57 PST, Hallam-Baker, Phillip said:

 The only way to resolve this issue properly would be to require every
 submission to an IETF mailing list to be cryptographically signed (PGP
 or S/MIME), to require the subscribers to register their signing key and
 to then filter the mail sent out on the list so that only signed mail
 gets through.

OK.. Almost plausible.  However note that currently, the PGP web-of-trust
covers only a small percentage of the subscribers to the IETF list, and
there's no *really* good PKI for S/MIME yet (hint - we don't seem to even
understand how to apply 'basicConstraints', so if you think we're going to
have working CRLs anytime soon, please share the name and address of your
pharmaceutical supplier.. ;)

 Thawte still provides free S/MIME certificates, however for the purposes
 of this proposal it would suffice to use a self signed certificate.

Unfortunately, although a self-signed cert works really nicely for some
purposes (for instance, it's quite sufficient to get an SSL tunnel started
so passive snooping doesn't work), it's inadequate here.

The problem is that there's no good way to tell my self-signed cert from
Dan Bernstein's self-signed cert from J. Slimy Spammer's self-signed cert.
I'd be interested in knowing what quality of a self-signed cert would
denote that the poster was possessed of the Non-Spammer Nature.

I propose to you that using a Thawte free S/MIME cert proves approximately
zero - a spammer can just get one for each run (and remember that no matter
how much a spammer tries to hid their identity, they *still* have to provide
a working way to reach them (via smtp or http or whatever) or they don't get
any feedback)

/Valdis



msg09571/pgp0.pgp
Description: PGP signature


Re: namedroppers, continued

2002-12-02 Thread Valdis . Kletnieks
On Mon, 02 Dec 2002 11:12:36 PST, Hallam-Baker, Phillip said:

 First, consider the effect of a minor authentication requirement on
 certificate issue, the ability to read email sent to the address
 specified in the certificate. Using that technique we could eliminate
 spams with bogus addresses which itself would be a major advance. The
 amount of spam that comes through with a valid email address is
 vanishingly small.

You don't need a cert for this - a simple OK this magic cookie confirmation
scheme (as supported by almost all mailing-list management software) is enough.

 Then we could sue the b*#*@#ds if they spammed after that. People have
 been looking for a test case for digital signatures for ages, so don't
 worry about the cost.

People have been looking for somebody ELSE to be the test case for ages.
The EFF is in the business of raising money to fight legal battles. The
IETF isn't.  You might want to ask the IESG if they have the budget for
this - and remember that quite often, there *isnt* case law about some
interesting point because one party or the other decides it's easier and
cheaper to just settle rather than take it to court.
-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg09572/pgp0.pgp
Description: PGP signature


Re: namedroppers, continued

2002-12-02 Thread Valdis . Kletnieks
On Mon, 02 Dec 2002 14:33:16 PST, Hallam-Baker, Phillip said:

 If the spammer wants to perform custom operations for each 
 constituency they want to spam. 

No - you need a single custom cert/identity for each spamming run of several
million.  Unless you were *really* intending to cross-check the 3,000
spams they dropped on the IETF lists against the ones they sent to
yahoo.com's mailers, and the ones to AOL, and the ones to MSN, etc etc..

The worst part is that they would then present the *same* credentials to
the main IETF list and all the working groups.  This ends up leveraging one
of the strong points of digital signatures - if a signature is well known
because it's seen widely, it gets taken more seriously.  And there's no really
good way to tune this - I'm sure I post more to IETF lists than most spammers
do, so you can't even say if they post more than X/day they're spammers

 I don't think they do, they have to be able to spam millions 
 of people at a time or the response rate is simply too low.
 Reported response rates are in the thousandths of a percent,
 so spamming the entire IETF gets less than a tenth of a customer.

But they got a tenth of a customer for *ONE* piece of outbound mail.
Which is an extraordinary response rate.
-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg09577/pgp0.pgp
Description: PGP signature


Re: namedroppers, continued

2002-12-02 Thread Valdis . Kletnieks
On Mon, 02 Dec 2002 14:33:16 PST, Hallam-Baker, Phillip said:

 OCSP scales fine for revocation checking. We can use the same
 platform that currently serves 6 billion DNS queries a day.

The fact that OCSP scales fine for revocation checking doesn't mean that
you have a system that scales fine for the *TOTAL PROCESS*.  Remember - the
tough part isn't checking the list - the tough part is getting entries
*INTO* the list in a secure manner.  Go back and re-read the issue at
http://www.cert.org/advisories/CA-2001-04.html and ask yourself if a CRL
would have been handled any differently.  Remember - it was a *process*
failure, not a software failure.

The DNS may answer 6 billion DNS queries a day.  But I can name some DNS
registrars that would take *MONTHS* to correctly transfer a domain. (The
continuing refrain for *years* on NANOG: Has *anybody* ever gotten PGP auth to
work with these bozos?)

Also, there's the added issue that the DNS cuts down on traffic by way of
caching.  Unfortunately, that's the LAST thing you want a CRL to be doing
(in particular, negative caching is an extreme no-no). You can tell the ISP's
DNS server to cache the SOA and NS entries for amazon.com.  You can't tell
the ISP's OCSP server to cache the fact that there aren't any CRLs for
the SSL cert that www.amazon.com uses.

/Valdis



msg09578/pgp0.pgp
Description: PGP signature


Re: namedroppers, continued

2002-11-30 Thread Pekka Savola
On 29 Nov 2002, D. J. Bernstein wrote:
 Keith claims that allowing ``contributions from outsiders'' requires
 delay and manual review. That claim is absurd. Immediately bounce the
 message to the ``outsider,'' with instructions explaining how to have
 the message sent to subscribers; end of problem.

No, it's not 'end of problem'.

If I cross-post a reply to some message with was cross-posted to a list
I'm subscribed at and a list I'm not, in the general case I do *not* want
to subscribe to the other list to be able to send my cross-post reply to
both.

Waiting for moderator approval is just fine for me, much better than
requiring to subscribe or do something else.

It's not black and white.

-- 
Pekka Savola Tell me of difficulties surmounted,
Netcore Oy   not those you stumble over and fall
Systems. Networks. Security.  -- Robert Jordan: A Crown of Swords




Re: namedroppers, continued

2002-11-29 Thread Doug Royer


D. J. Bernstein wrote:

Bush stuck the following note into the top of my latest message to
namedroppers:
...
You're perfectly aware
that many senders don't read messages to the list.

...

Yet - you must be reading the list or you would not have seen it.

Please cry elsewhere.

--

 Doug Royer |   http://INET-Consulting.com
 ---|-
 [EMAIL PROTECTED] | Office: (208)612-INET
 http://Royer.com/People/Doug   |Fax: (866)594-8574
|   Cell: (208)520-4044

We Do Standards - You Need Standards



smime.p7s
Description: S/MIME Cryptographic Signature


Re: namedroppers, continued

2002-11-29 Thread D. J. Bernstein
Keith claims that allowing ``contributions from outsiders'' requires
delay and manual review. That claim is absurd. Immediately bounce the
message to the ``outsider,'' with instructions explaining how to have
the message sent to subscribers; end of problem.

---D. J. Bernstein, Associate Professor, Department of Mathematics,
Statistics, and Computer Science, University of Illinois at Chicago




RE: namedroppers, continued

2002-11-29 Thread Bill Strahm
Silly question,

But you DO know what it will take to get your message to be immediately
seen by the list, you just aren't willing to do it... 

I believe the problem is in your court, easily solved and it is not time
to move on to something that might be slightly productive

Bill

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of D.
J. Bernstein
Sent: Friday, November 29, 2002 3:22 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: namedroppers, continued


Keith claims that allowing ``contributions from outsiders'' requires
delay and manual review. That claim is absurd. Immediately bounce the
message to the ``outsider,'' with instructions explaining how to have
the message sent to subscribers; end of problem.

---D. J. Bernstein, Associate Professor, Department of Mathematics,
Statistics, and Computer Science, University of Illinois at Chicago






Re: namedroppers, continued

2002-11-29 Thread Keith Moore
 Keith claims that allowing ``contributions from outsiders'' requires
 delay and manual review. That claim is absurd. Immediately bounce the
 message to the ``outsider,'' with instructions explaining how to have
 the message sent to subscribers; end of problem.

Well, as long as the method for getting the message to the subscribers
(a) is simple and not onerous, and 
(b) cannot be automated
then I'd probably agree that this is an acceptable solution.

I've seen lists for which the way that this was accomplished -
subscribing or getting on the acceptable posters list - involved 
several email round-trips to get the address of the list bot,
get the help file, send a command, get back a cookie, send back
the cookie, find out that the list bot won't accept subscribe
requests and/or cookies from a different address than that for
which the subscription is requested, etc.  Basically it amounted
to a considerable barrier to posting by outsiders.

These days, with a web interface, that level of complexity is
no longer necessary.

But if you make the process automatable spammers _will_ game it.

Keith




  1   2   >