Tim Legant writes:

>> Any suggestions for what this header should be called?
>
> Well, how about trying to keep even the idea of how these apps work > out of the 
>picture.  Maybe something like  
>
>    X-Preferred-Address

Ooh!  I like this one.

Jason R. Mastaler writes:

> Here's one potential problem/objection to this. It took me a bit to
> recall why I hadn't already added such a mechanism. 
>
> This would allow me to add arbitrary addresses to another user's
> whitelist. 

Yes, that is an odd bit of sabotage.

What I'm going to suggest will sound odd, but I'll explain later on 
in this post why I'd like to see us implement this.  I've wanted this 
sort of mechanism for the second part thing (auto-confirming) which 
I'll explain in a moment.

I'd like to have a configurable address comparing function where we 
can specify closeness.  The configuration might be something like 
this:

0 - No two (even identical) addresses are considered a match.

1 - Only identical addresses are considered a match.

2 - To be considered matching, addresses must have identical domains
    and the first part of the addresses (up to the first punctuation
    mark) must match.  i.e. [EMAIL PROTECTED] and
    [EMAIL PROTECTED] would match.

3 - To be considered matching, addresses must have identical domains.

4 - To be considered matching, the last two parts of address domains
    must match.  i.e. [EMAIL PROTECTED] and [EMAIL PROTECTED]
    would match.

5 - Any two addresses are considered matching.

If we had a compare function like that, then the user could configure 
how close the X-Preferred-Address would have to be to the reply-to 
address before we would use it.  Otherwise we'd simply use the reply-
to address.

Jason R. Mastaler writes:

>> Should I elaborate on part two of that original post (i.e. a safe
>> method for doing auto-confirms between TMDA users), or would that 
be of
>> interest? 
>
> Sure, go for it.

Since this thread originated on another forum, I'm going to recap 
before explaining.  Feel free to skip ahead.

===

[EMAIL PROTECTED] writes to [EMAIL PROTECTED] for the first time.  The email is sent as
[EMAIL PROTECTED] but it includes an "X-Preferred-Address [EMAIL PROTECTED]" header.

[EMAIL PROTECTED]'s TMDA sends a confirmation to [EMAIL PROTECTED] which will be 
received by user [EMAIL PROTECTED]

[EMAIL PROTECTED] replies to the confirmation, and user [EMAIL PROTECTED]'s TMDA will release 
the original message.  TMDA then adds [EMAIL PROTECTED] to its confirmed list 
instead of [EMAIL PROTECTED]  Any further mail will be allowed even if it 
comes from [EMAIL PROTECTED] because [EMAIL PROTECTED]'s TMDA is using the X-Preferred-
Address header when it does a filter search.

===

Part two allows [EMAIL PROTECTED]'s TMDA to automatically add (if user [EMAIL PROTECTED] has 
configured TMDA to do so) [EMAIL PROTECTED] to his/er confirmed list when TMDA 
receives the confirmation request above.

Because I'm not sure of the terminology you guys use, I'm going to 
define one-way function F such that N=F(M,crypt_key) if we generate a 
valid address in the form [EMAIL PROTECTED]  Likewise, if we receive 
mail addressed to [EMAIL PROTECTED], we can verify whether it is 
authentic by testing to see if N==F(M,crypt_key).

Now to accomplish part two, user [EMAIL PROTECTED]'s TMDA not only includes a X-
Preferred-Address header, it also includes an X-Authentication 
header.  This new header would be along the lines of:

X-Authentication [EMAIL PROTECTED],N

Where N=F([EMAIL PROTECTED],crypt_key).

When [EMAIL PROTECTED] receives the initial message from [EMAIL PROTECTED], it sees the 
X-Authentication header and includes the header verbatim in its 
confirmation request.

[EMAIL PROTECTED]'s TMDA receives the confirmation request and sees the X-
Authentication header which it tests.  N==F([EMAIL PROTECTED],crypt_key) so we 
now know that [EMAIL PROTECTED]'s TMDA is really replying to a message we sent. 
Our crypt_key is never given out, so although this header could have 
been data-mined from other emails, it could not be forged.

At this point, [EMAIL PROTECTED]'s TMDA compares the email address in the X-
Authentication header and the X-Preferred-Address header.  These two 
addresses are probably the same, but they do not have to be.  We then 
use the comparison function I described above to determine if the 
addresses match.  The user can be as picky or as lenient about 
matches as s/he pleases.  If the match succeeds, the X-Preferred-
Address is added to [EMAIL PROTECTED]'s confirmed list.

Whew!  I know that was rather long-winded, so I thank you for hearing 
me out (and possibly drawing little diagrams to make sure I'm not on 
crack!).

Feedback is welcome,

Gre7g.

=================================================================
Gre7g Luterman   [EMAIL PROTECTED]  http://www.templeofluna.com/
Stay informed: http://www.templeofluna.com/keeper/mailinglist.htm
                      Into each wound, a little salt must fall...
_________________________________________________
tmda-workers mailing list ([EMAIL PROTECTED])
http://tmda.net/lists/listinfo/tmda-workers

Reply via email to