Re: [Asrg] Adding a spam button to MUAs

ram <ram@netcore.co.in> Tue, 02 February 2010 06:00 UTC

Return-Path: <ram@netcore.co.in>
X-Original-To: asrg@core3.amsl.com
Delivered-To: asrg@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 39A313A6A72 for <asrg@core3.amsl.com>; Mon, 1 Feb 2010 22:00:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.442
X-Spam-Level:
X-Spam-Status: No, score=-2.442 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, SUBJECT_FUZZY_TION=0.156]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0+z7e0a604zy for <asrg@core3.amsl.com>; Mon, 1 Feb 2010 22:00:37 -0800 (PST)
Received: from relay.exacttouch.com (sweepmail10.exacttouch.com [202.162.254.10]) by core3.amsl.com (Postfix) with ESMTP id E75433A6A60 for <asrg@irtf.org>; Mon, 1 Feb 2010 22:00:36 -0800 (PST)
Received: from darkstar.netcore.co.in (unknown [59.163.11.66]) by relay.exacttouch.com (Postfix) with ESMTP id AC885D080FE for <asrg@irtf.org>; Tue, 2 Feb 2010 11:31:11 +0530 (IST)
Received: from [192.168.2.105] (unknown [192.168.2.105]) by darkstar.netcore.co.in (Postfix) with ESMTP id 51F9C668250; Tue, 2 Feb 2010 11:31:09 +0530 (IST)
From: ram <ram@netcore.co.in>
To: Anti-Spam Research Group - IRTF <asrg@irtf.org>
In-Reply-To: <4B67ADC2.4080204@nortel.com>
References: <20100201145903.30670.qmail@simone.iecc.com> <3741B85B916D847C703F2724@lewes.staff.uscs.susx.ac.uk> <A50C736E-EE14-4213-B99D-DD58C669FDAC@blighty.com> <100201092326.ZM5487@torch.brasslantern.com> <4B67ADC2.4080204@nortel.com>
Content-Type: multipart/alternative; boundary="=-49qRaIhsnrI3bQl3DhhQ"
Date: Tue, 02 Feb 2010 11:31:08 +0530
Message-Id: <1265090468.19504.22.camel@darkstar.netcore.co.in>
Mime-Version: 1.0
X-Mailer: Evolution 2.12.3 (2.12.3-4.fc8)
X-Mailman-Approved-At: Tue, 02 Feb 2010 12:57:17 -0800
Subject: Re: [Asrg] Adding a spam button to MUAs
X-BeenThere: asrg@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: Anti-Spam Research Group - IRTF <asrg@irtf.org>
List-Id: Anti-Spam Research Group - IRTF <asrg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/asrg>, <mailto:asrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/asrg>
List-Post: <mailto:asrg@irtf.org>
List-Help: <mailto:asrg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/asrg>, <mailto:asrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Feb 2010 06:00:38 -0000

On Mon, 2010-02-01 at 23:44 -0500, Chris Lewis wrote:

> Bart Schaefer wrote:
> > On Feb 1,  9:11am, Steve Atkins wrote:
> > }
> > } On Feb 1, 2010, at 8:57 AM, Ian Eiloart wrote:
> > } 
> > } > Does ARF allow richer expression than ANNOTATE?
> > } 
> > } Probably - it's basically a container format.
> > } 
> > } More importantly, perhaps, it would be easy to roll out on existing
> > } installations with a trivial configuration change, rather than
> > } requiring functionality in the mailstore that may not be there.
> 
> > Anything that's going to be added as metadata to the message header
> > needs to be carefully specified so that a client that understands the
> > format can reside behind a server that does not.  E.g., depending on
> > where this metadata is added, one option might be to require a DKIM
> > signature to cover it.
> 
> Consider the following off-the-cuff implementation possibility:
> 
> A header that has:
> 
> Name of server (or administrative unit (domain)) inserting the header.
> What to send in report:
> 	ARF copy, or forward or selected header[s] or?
> How to send report:
>          email (including address), or some other protocol and
>          destination.
> 


I think thinking of a non-mail protocol to send abuse reports is an
excellent idea. 
Sending ARF's via email need not be the only option.  Why not use the
header 

eg X-Abuse-to: <http://mailserver.isp.com/cgi-bin/fbl>
<mailto:feedbackloop@isp.com>
Obvioulsy the MUA must verify if the mail is authenticated , DKIM seems
a good way to do this. 

Sending abuse reports via http (POST?) should be standardized. 
If http is not available ( possibly some corporates block http access )
then you can fallback to email. 
The MUA must also have proper time outs so as to cut-off malicious fbl
urls