Re: [spfbis] Updated charter - final review

Douglas Otis <dotis@mail-abuse.org> Fri, 03 February 2012 00:31 UTC

Return-Path: <dotis@mail-abuse.org>
X-Original-To: spfbis@ietfa.amsl.com
Delivered-To: spfbis@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9DF0321F869F for <spfbis@ietfa.amsl.com>; Thu, 2 Feb 2012 16:31:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.347
X-Spam-Level:
X-Spam-Status: No, score=-102.347 tagged_above=-999 required=5 tests=[AWL=0.252, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XJV27L+8rl2T for <spfbis@ietfa.amsl.com>; Thu, 2 Feb 2012 16:31:29 -0800 (PST)
Received: from mailserv.mail-abuse.org (mailserv.mail-abuse.org [150.70.98.118]) by ietfa.amsl.com (Postfix) with ESMTP id 6B8F521F869D for <spfbis@ietf.org>; Thu, 2 Feb 2012 16:31:29 -0800 (PST)
Received: from US-DOUGO-MAC.local (SJDCLUXGATEWAY2.sdi.trendnet.org [10.31.37.9]) by mailserv.mail-abuse.org (Postfix) with ESMTPSA id 0A973174019F for <spfbis@ietf.org>; Fri, 3 Feb 2012 00:31:29 +0000 (UTC)
Message-ID: <4F2B2AE0.7050905@mail-abuse.org>
Date: Thu, 02 Feb 2012 16:31:28 -0800
From: Douglas Otis <dotis@mail-abuse.org>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:9.0) Gecko/20111222 Thunderbird/9.0.1
MIME-Version: 1.0
To: spfbis@ietf.org
References: <4F28DBB7.5070101@qualcomm.com> <4F29E395.3020100@mail-abuse.org> <5905d04c-42eb-42f0-b580-1fb654cfe5af@email.android.com> <4F2A11E7.10409@mail-abuse.org> <f775e7ec-6c68-4d41-ac5d-9c2b8dd13965@email.android.com> <4F2AED29.3010902@mail-abuse.org> <4F2B00B6.7030009@isdg.net>
In-Reply-To: <4F2B00B6.7030009@isdg.net>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Subject: Re: [spfbis] Updated charter - final review
X-BeenThere: spfbis@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: SPFbis discussion list <spfbis.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spfbis>, <mailto:spfbis-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/spfbis>
List-Post: <mailto:spfbis@ietf.org>
List-Help: <mailto:spfbis-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spfbis>, <mailto:spfbis-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Feb 2012 00:31:30 -0000

On 2/2/12 1:31 PM, Hector Santos wrote:
>  Douglas Otis wrote:
> > Fortunately, a majority of large providers do not use SPF for
> > message acceptance because they do not wish to deal with complaints
> > arising from assumptions the SMTP Mail From parameter fully
> > describes the path of a message in conjunction with SPF records
> > ending in "-all".
>
>  Did you ever consider they were not candidates to use SPF?
>
>  I always viewed SPF benefited private user domains, companies, of any
>  size, institutions, etc, where there is less to no unknown variables
>  in their networking.
>
>  But I think that is all depends on your definition for "Large
>  Providers." FaceBook.com and gmail.com can be viewed as "very large"
>  Email Providers. Facebook.com, I presume has a very large pool of
>  outbound senders and it has a well defined network with a -ALL final
>  result.
>
>  On the other hand, gmail.com with its ?ALL is a major overhead and
>  resource "waster" - its completely useless for gmail.com to use
>  UNKNOWN condition. Nothing good comes from it:
>
>  MATCH - IP is on the GMAIL Network - Whoopie! NO MATCH - IP is not
>  on the GMAIL NETWORK
>
>  In both cases, abuse can and still occurs but with the latter, its
>  where major abuse would be with bad guys using gmail.com with a
>  wasteful record, and worse, it is always two lookups for what is most
>  likely a wasteful yield.
>
>  At least with Facebook.com, there is a measurable yield. Its
>  protecting itself from any foreign abuse.
>
>  Recently, I got a smile when I saw my old employer Mobil Oil (now as
>  Exxon Mobil) corporate domain has a HARD FAIL SPF Record!
>
>  Processes with hard failure detection mechanism is where the maximum
>  benefit is found. A PASS or anything else still generally requires
>  even more filter checks and even if you couple it with reputation or
>  scoring, it is still not deterministic unlike a hard fail.
>
>  Any system operation, large or small, that can not establish a well
>  defined network was never really a candidate for SPF - I think we
>  always knew that.

Dear Hector,

Many providers of email services run on thin margins threatened by 
answering support calls caused by erroneous assumptions, such as whether 
an email alias is used to arrive at a recipient's mailbox.  The Mail 
 From parameter indicates where Delivery Status Notifications are to be 
sent, and nothing more can be assumed.  At most, SPF Pass indicates the 
last hop was authorized, however authorization does not authenticate the 
originating domain.  Refusing messages based upon SPF HARD FAIL is also 
likely to demand expensive exceptions for these refusals.

Regards,
Douglas Otis