Re: [Asrg] Re: RMX Records

Vernon Schryver <vjs@calcite.rhyolite.com> Wed, 05 March 2003 00:09 UTC

Received: from www1.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA16428 for <asrg-archive@odin.ietf.org>; Tue, 4 Mar 2003 19:09:14 -0500 (EST)
Received: (from mailnull@localhost) by www1.ietf.org (8.11.6/8.11.6) id h250JvM27089 for asrg-archive@odin.ietf.org; Tue, 4 Mar 2003 19:19:57 -0500
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h250Jv527086 for <asrg-web-archive@optimus.ietf.org>; Tue, 4 Mar 2003 19:19:57 -0500
Received: from www1.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA16407; Tue, 4 Mar 2003 19:08:43 -0500 (EST)
Received: from www1.ietf.org (localhost.localdomain [127.0.0.1]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h250J0527040; Tue, 4 Mar 2003 19:19:00 -0500
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h250IC526999 for <asrg@optimus.ietf.org>; Tue, 4 Mar 2003 19:18:12 -0500
Received: from calcite.rhyolite.com (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA16333 for <Asrg@ietf.org>; Tue, 4 Mar 2003 19:06:57 -0500 (EST)
Received: (from vjs@localhost) by calcite.rhyolite.com (8.12.8/8.12.8) id h2508xuN010080 for Asrg@ietf.org env-from <vjs>; Tue, 4 Mar 2003 17:08:59 -0700 (MST)
From: Vernon Schryver <vjs@calcite.rhyolite.com>
Message-Id: <200303050008.h2508xuN010080@calcite.rhyolite.com>
To: Asrg@ietf.org
Subject: Re: [Asrg] Re: RMX Records
References: <20030304233418.GA17958@danisch.de>
Sender: asrg-admin@ietf.org
Errors-To: asrg-admin@ietf.org
X-BeenThere: asrg@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/asrg>, <mailto:asrg-request@ietf.org?subject=unsubscribe>
List-Id: Anti-Spam Research Group - IRTF <asrg.ietf.org>
List-Post: <mailto:asrg@ietf.org>
List-Help: <mailto:asrg-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/asrg>, <mailto:asrg-request@ietf.org?subject=subscribe>
List-Archive: <https://www1.ietf.org/pipermail/asrg/>
Date: Tue, 04 Mar 2003 17:08:59 -0700

> Received: from sklave3.rackland.de (sklave3.rackland.de [213.133.101.23])
> 	by calcite.rhyolite.com (8.12.8/8.12.8) with ESMTP id h24NZ8im005746
> 	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=FAIL)
> 	for <vjs@calcite.rhyolite.com> env-from <hadmut@danisch.de>;
> 	Tue, 4 Mar 2003 16:35:10 -0700 (MST)
> Received: from sodom (uucp@localhost)
> 	by sklave3.rackland.de (8.12.8/8.12.8/Debian-1) with BSMTP id h24NZ7i3024946;
> 	Wed, 5 Mar 2003 00:35:07 +0100
> Received: from sodom.home.danisch.de (localhost [127.0.0.1])
> 	by sodom.home.danisch.de (8.12.8/8.12.8/Debian-1) with ESMTP id h24NYIuB018298
> 	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO);
> 	Wed, 5 Mar 2003 00:34:18 +0100
> Received: (from hadmut@localhost)
> 	by sodom.home.danisch.de (8.12.8/8.12.8/Debian-1) id h24NYI2q018296;
> 	Wed, 5 Mar 2003 00:34:18 +0100
> From: Hadmut Danisch <hadmut@danisch.de>

> ...
> Insecurity and forgeability have never ever been a design goal
> of SMTP. That's a disadvantage, but not a design goal.

That is wrong if asked and answered honestly.  Of course "insecurity"
and "forgeability" have not been design goals, but "receiving mail
from strangers" has been a goal.

Authentication is not magic pixie dust that can be sprinkled over a
protocol.  Authenticating strangers is nonsense.  A stranger is someone
you don't know, including don't know he is not a bank robber, spammer,
your long lost uncle, or all three.

Contrary to your implicit claim, sending from one IP address with a
different return IP address has always been a design goal.  Sending
from one domain name with a return address in another domain has always
been an explicit design goal at least as far as the Reply-To header
is concerned.  That the Sender header exists, suggests that differing
SMTP client reverse DNS domaon name and Mail_From values has been a
goal.  For at least 15 years allowing such mismatches have been a
practical requirement.  

Requiring that the reverse DNS domain name matches the Mail_From domain
name is as wrong aad silly as it would be to requirer that when you
send a picture postcard while on vacation you use your current hotel
as your return address.  Neither requirement would reduce fraud, spam,
or anything else that is bad.

There are reasons why large ISPs would like to impose such a requirement.
The instant messaging battle between AOL and Microsoft demonstrates
why they would like it and why reasonable people oppose it.

Whether sklave3.rackland.de authenticates mail from sodom.home.danisch.de
with a Mail_from value of hadmut@danisch.de tells no one outside
whether you are a spammer.  On the other hand, if you were a spammer,
it would be trivial to finger you by contacting the operators of
213.133.101.23 or if necessary 213.133.96.29, 213.133.96.65, or
212.114.147.1.

Since both sklave3.rackland.de and calcite.rhyolite.com are running
SMTP-TLS, your mail could have been authenticated, if only my system
had a certificate.  But that certificate would not tell me or my
system anything that I don't already know or would need to know about
whether your mail is spam.

If mail.rackland.de also runs SMTP-TLS and if you check its logs, you
will probably find that some spammers are also using SMTP-TLS.



>          That's a disadvantage, but not a design goal. 

That authentication is nonsense when receiving mail from strangers
is an unavoidable disadvantage of the design goal of receiving mail
from strangers.

>                                                        It has also 
> never been a design goal of telnet to make plaintext passwords
> available to eavesdroppers.

That's irrelevant noise.

> We cannot fix any security hole as long as we insist on still
> fulfilling a so called "design goal" which states insecurity.

Stated honestly, that is true.  Indeed, we cannot fix security
holes that are implicit in the design goals without changing
the design goals.

If your design goals imply a protocol that authenticates senders, then
use SMTP-AUTH, STMP-TLS, SMIME, PGP, or others.  They are all widely
available and work fine.  However, they are also useless and irrelevant
for a general mail protocol among strangers.


> Keep in mind the SMTP as we know it was designed more than 20 years
> ago (Jon Postels RFC 821 dates from August 1982). In 1982 and before, 
> there were almost no security considerations in context of internet
> protocols, especially for e-mail. The security business developed in
> the 90's. Plain SMTP is one of the last dinosaurs of the pre-security 
> era still alive. 
>
> Security didn't play any role in the design of SMTP. Even if it did,
> after more than 20 years of progress in internet protocols and
> security, such an age-old design goal would require some revision. 
>
> So that so called "design goal" is neither existing nor really relevant.

That is various quite wrong and entirely irrelevant. 


Vernon Schryver    vjs@rhyolite.com
_______________________________________________
Asrg mailing list
Asrg@ietf.org
https://www1.ietf.org/mailman/listinfo/asrg