thanks.  highly appreciate your time.  to save
space i'll skip parts where i fully agree
with/happily-learned.

(e.g. loop detection; good reminder, i wasn't
thinking about it.  plus didn't know of acronyms
DSN, MDNs, etc; nice keywords for further
googing).

‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Friday, August 21, 2020 8:59 PM, Grant Taylor 
<gtay...@gentoo.tnetconsulting.net> wrote:

> On 8/20/20 7:39 PM, Caveman Al Toraboran wrote:
>
> >      1. receipt by final mail server (mandatory).
> >
>
> You're missing the point that each and every single server along the
> path between the original submission server and the final destination
> server is on the hook for delivery of the message -or- notification of
> it's failure back to the purported sender address. So "final mail
> server" is not sufficient.

i was thinking (and still) if such relay-by-relay
delivery increases probability of error by a
factor of n (n = number of relays in the middle).
e.g. probability of accidental silent mail loss is
if one, or more, accidentally said "yes got it!"
but actually didn't.  i.e.:

    Pr(silent loss) =

        sum_{k=1}^n
            {n choose k}
            * Pr(mistake)**k
            * Pr(no mistake)**{n-k}

    n  = number of relays in the middle.
    *  = mult.
    ** = exponent.

i wonder if it would be better if only the entry
relay aims at the confirmation from the terminal
server?  this way we won't need to assume that
relays in the middle are honouring their guarantees,
hence the probability above would be smaller since
k is limited up to 2 despite n's growth.


> Of course, there are servers that go against the RFC "MUST" directives
> and either don't safely commit messages to disk /before/ saying
> "Okay..." and / or don't deliver failure messages.

care to point part of the rfc that defines "safe"
commit to disk?  e.g. how far does the rfc expect
us to go?  should we execute `sync`'s equivalent
to ensure that data is actually written on disk
and is not in operating system's file system write
buffer?


> Signing will be of somewhat limited value as it will quite likely be
> subject to the same problem that DMARC / ARC suffer from now. Mail
> servers can sign what they receive. But in doing so, they alter what is
> sent to include their signature. As such, the data that the next server
> receives is different. The real problem is working backwards. Down
> stream servers don't have a reliable way to undo what upstream servers
> have done to be able to get back to the original message to validate
> signatures.

onion signatures?  e.g. message is wrapped around
several layers of signatures for every relay in
the path?


> > this way we can have group-level rules.
>
> I'm not quite sure what you mean by group-level rules in this context.

e.g. whitelisting, tagging, spam filtration,
prioritizing, etc, based on entities that
onion-signed the message.


Reply via email to