Re: [spfbis] Local macros strike again, was Suggestion...

Scott Kitterman <spf2@kitterman.com> Wed, 18 January 2012 15:05 UTC

Return-Path: <spf2@kitterman.com>
X-Original-To: spfbis@ietfa.amsl.com
Delivered-To: spfbis@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48BD621F8707 for <spfbis@ietfa.amsl.com>; Wed, 18 Jan 2012 07:05:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.6
X-Spam-Level:
X-Spam-Status: No, score=-1.6 tagged_above=-999 required=5 tests=[AWL=-0.860, BAYES_20=-0.74]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ScmNfdzbp08F for <spfbis@ietfa.amsl.com>; Wed, 18 Jan 2012 07:05:07 -0800 (PST)
Received: from mailout02.controlledmail.com (mailout02.controlledmail.com [72.81.252.18]) by ietfa.amsl.com (Postfix) with ESMTP id 4DDEF21F86FC for <spfbis@ietf.org>; Wed, 18 Jan 2012 07:05:07 -0800 (PST)
Received: from mailout02.controlledmail.com (localhost [127.0.0.1]) by mailout02.controlledmail.com (Postfix) with ESMTP id 6274420E40A4; Wed, 18 Jan 2012 10:05:06 -0500 (EST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=2007-00; t=1326899106; bh=tNYuNbxUnPlZp1ig7MhgokEiPpJWaXFkr8jECIqa3/k=; h=From:To:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Transfer-Encoding:Content-Type; b=eupLE9XUUooxUdGzzZ1vifLOkR5XSK9Mh0FkUM0MBXM+QxUlDIv/H6WE94CrMsTP9 rXl+iPs+MKhfT+yTP+hZt/oSiNmyzvxPylf+vpLvhxGy6iRYOphTFMx+kGARIpubya cVTC+C975YUkrrC9FnGku6MENDVtUkt8Oxg+oeCM=
Received: from scott-latitude-e6320.localnet (static-72-81-252-21.bltmmd.fios.verizon.net [72.81.252.21]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout02.controlledmail.com (Postfix) with ESMTPSA id 4901420E4081; Wed, 18 Jan 2012 10:05:06 -0500 (EST)
From: Scott Kitterman <spf2@kitterman.com>
To: spfbis@ietf.org
Date: Wed, 18 Jan 2012 10:05:05 -0500
Message-ID: <60329510.PUQKVUEzYr@scott-latitude-e6320>
User-Agent: KMail/4.7.3 (Linux/3.0.0-14-generic-pae; KDE/4.7.4; i686; ; )
In-Reply-To: <4F16A2FB.3070709@isdg.net>
References: <F5833273385BB34F99288B3648C4F06F19C6C15673@EXCH-C2.corp.cloudmark.com> <4F1190BB.9080202@mail-abuse.org> <4F16A2FB.3070709@isdg.net>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"
X-AV-Checked: ClamAV using ClamSMTP
Subject: Re: [spfbis] Local macros strike again, was Suggestion...
X-BeenThere: spfbis@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: SPFbis discussion list <spfbis.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spfbis>, <mailto:spfbis-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/spfbis>
List-Post: <mailto:spfbis@ietf.org>
List-Help: <mailto:spfbis-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spfbis>, <mailto:spfbis-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Jan 2012 15:05:08 -0000

On Wednesday, January 18, 2012 05:46:19 AM Hector Santos wrote:
> Douglas Otis wrote:
> > On 1/13/12 5:42 PM, Hector Santos wrote:
> >>  Douglas Otis wrote:
> >> > Dear Hector,
> >> > 
> >> > This was simply explaining the impact caused by a change Wayne
> >> > Schlitt made to host name limits in his SPF library. He restricted
> >> > the number of host names resolved to 5. This caused a problem for
> >> > t-online.de who never published SPF records but were subjected to
> >> > "default" SPF records such as "a mx/24" and that had 8 hosts in
> >> > their MX RRset, for example. :^(
> >>  
> >>  Doug,
> >>  
> >>  Since I'm not familiar with the idea of a "default" SPF record, I
> >>  don't quite understand why a receiver would applied a "SPF default"
> >>  to a domain that did make any SPF explicit declaration. Why would
> >>  you
> >>  not expect to see problems with this? If this part of the
> >>  specification?
> > 
> > Dear Hector,
> > 
> > AFAIK, t-online.de never published SPF records.  Some implementers
> > leveraged SPF built-in functions to make "best guesses" about domains
> > lacking SPF records.  This tactic is found in many SPF implementations
> > as it will be for years.
> 
> Who?
> 
> This must be completed isolated.
> 
> I have a hard time understanding why would any system screw around
> with a guessing game  of "SPF default record" with completely not
> possibility for actual accuracy and yet, expect there would not be
> problem or rather begin to use this as some basis that something is
> broken about SPF!  I don't get it Doug. This would is already random.
> I see no way to presume there is a default SPF record without falling
> into trouble.
> 
> Now, if it was fundamentally the case that Senders *always* used an
> machine among the Receiveer network of MX host IP addresses, then I
> can see some default rules.  Sure.  But that is not reality. There is
> no requirement that a Sender machine must be part of any RECEIVER (MX)
> network.  This applies closer to smaller systems but not with larger
> network systems and not even with smaller systems.
> 
> I just don't see why you think this has any value.

The SPF "Best Guess" approach was supported early in SPF development 
(2003/2004) as a method to help bootstrap the protocol.  At the time, it was 
clearly described as something that was only even potentially useful for 
making positive assertions.  If someone based SPF rejections on a Best Guess 
record they were very mistaken.  I don't doubt this happened, but I don't 
think it's fundamentally an issue with the SPF protocol.  

The most that 4408bis might want to deal with the practice is to explicitly 
tell people not to make up SPF records for senders.

This, BTW, has nothing to do with local macros.

Also, a bit further up in the mail, the information about Wayne Schlitt's 
libspf2 is a bit misleading.  The limit of 5 pre-dated RFC 4408.  The current 
version of libspf2 uses the RFC 4408 limit of 10, so this notion that one of 
the editors of RFC 4408 had to use different limits in their implementation is 
not correct.

Scott K