-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 IESG Chair Brian Carpenter,
as per the Internet Standards Process, section 6.5, and on behalf of the SPF project, I am filing a formal appeal on the IESG's approval on 2005-06-29[1] to publish the draft-lyon-senderid-core-01 I-D[3] as an Experimental RFC as-is. I believe that draft-lyon-senderid-core-01 conflicts in a significant aspect with draft-schlitt-spf-classic-02, on which the former depends, and which has also been approved by the IESG to be published as an Experimental RFC.[2] The conflicting part of the Sender-ID specification disrespects the substantial history the SPF specification has outside the IETF. Through its decision, the IESG also ignores SPF's deployed base.[3] And even if the IESG intends to run both of the specifications as an experiment before deciding any further on how to proceed with them, the publication of conflicting specifications is bound to disrupt these experiments. Please find the full appeal included below. Regards, Julian Mehnle. The Problem =========== draft-lyon-senderid-core-01, section 3.4 "Compatibility", says: [...] Sender ID implementations SHOULD interpret the version prefix "v=spf1" as equivalent to "spf2.0/mfrom,pra", provided no record starting with "spf2.0" exists. This means that the I-D recommends that "v=spf1" records be used for checking the PRA identity defined in draft-lyon-senderid-pra-01[5]. However, this is in direct conflict with draft-schlitt-spf-classic-02[6], section 2.4 "Checking Authorization", which says: [...] At least the "MAIL FROM" identity MUST be checked, but it is RECOMMENDED that the "HELO" identity also be checked beforehand. Without explicit approval of the domain owner, checking other identities against SPF version 1 records is NOT RECOMMENDED because there are cases that are known to give incorrect results. [...] "v=spf1" records have always been published by domain owners with only the MAIL FROM and HELO identities in mind. Checking them against other identities will most likely not only produce non-trivial amounts of false results, but also distort the results of any intended experiments. Proposed Remedy =============== Change the relevant part of draft-lyon-senderid-core-01, section 3.4 "Compatibility", to read: Sender ID implementations MUST interpret the version prefix "v=spf1" as equivalent to "spf2.0/mfrom", provided no record starting with "spf2.0" exists. In any case, draft-lyon-senderid-core should not be published until this conflict is resolved. Justification ============= On 2005-06-29, the IESG announced the decision to publish both the "SPF, version 1" <draft-schlitt-spf-classic-02> I-D and the "Sender-ID" <draft- lyon-senderid-core-01, draft-lyon-senderid-pra-01, draft-katz-submitter- 01> I-Ds as Experimental RFCs. The re-interpretation of SPFv1's "v=spf1" records by draft-lyon-senderid- core-01 to be equivalent to "spf2.0/mfrom,pra", and thus to be applicable for checking against the PRA identity defined in draft-lyon-senderid- pra-01, conflicts with the substantial history of SPF outside the IETF standards process. Ever since late 2003, SPF has been defined to apply only to the MAIL FROM and HELO identities.[7,8,9] It should be noted that at the time of the dissolution of the MARID working group in September 2004[10], there had been at least 650,000 domains with "v=spf1" policies published in the com/net/org TLDs alone.[11] It can be safely assumed that the vast majority of these policies was published based on draft-mengwong-spf.02.9.4[7], draft-mengwong-spf-00[8], or draft- mengwong-spf-01[9], and thus with only the MAIL FROM and HELO identities in mind. Even though the SPF specification has undergone quite some changes since late 2003, the focus has always been on maintaining backwards compatibility and protecting the meaning of existing sender policies. The different interpretation by the Sender ID specification however has significant implications of which many domain owners were not, and could not be, aware when they defined and published their "v=spf1" policies. The PRA and MAIL FROM / HELO identities are not generally interchangeable, and as a matter of fact there are prominent cases where they differ from each other: * Many mailing lists rewrite the MAIL FROM identity when distributing messages, but do not change the header (PRA) identities. And they are not required to do so by RFCs 2821 or 1123 or any other current IETF standards. * Many organizations with their own domains outsource their bulk message sending (newsletters, etc.) to ESPs, who use their own domain in the MAIL FROM identity and the organization's domain in the From: header, but do not add a Sender: header.[12] * If the MAIL FROM is empty ("MAIL FROM:<>"), the MAIL FROM identity, as defined by the SPF specification, falls back to HELO identity[5, section 2.2], while the PRA identity is usually unpredictable. The bottom line of all these cases is that even though it might be desirable in the long run to enforce congruence between the envelope and header identities, this is still far from reality. And the often atypical but otherwise perfectly standards compliant configurations in which "v=spf1" records have been deployed over the past 1.5 years should not be ignored just because the IESG chooses[13,1,2] to see SPF as a simple offshoot of the failed standardization attempt in the MARID working group. This view seems to have prevailed at the 60th IETF meeting in June 2004, too, where among other things MARID was discussed[14]: 3) draft-ietf-marid-protocol-00 [...] The room discussed the version identifier in the TXT record. Mark introduced the subject by explaining that most people today publish "v=SPF1" with the intention that receivers will be checking MAIL FROM and not PRA. Many participants expressed concern over the semantic meaning and suggested the version number would change. Marshall asked if anybody in the room had any serious objections to changing the version identifier; none were given. Andy directed Mark to send suggestions for the new version identifier to the list where this would be discussed. So when Mark Lentczner changed[15] the version identifier to "spf2.0" in draft-ietf-marid-protocol-01 in the aftermath[16,17] of IETF-60, there was clearly a consensus to avoid the use of "v=spf1" records for checking of PRA or other unexpected identities. It is also worth noting that at the time the MARID WG was closed, the then-current Sender ID specification draft-ietf-marid-protocol-03[18] did not include the re-use of "v=spf1" records for PRA checking. This was only introduced in the individual submission draft-lyon-senderid-core-00 [19] in October 2004. Also did Microsoft's record generation wizards generate only "v=spf2.0/pra" records until the end of October[20,21], when they began generating only "v=spf1" records. SPF and Sender ID are potentially complementary but generally separate. Not only should domain owners, who are the primary target audience of all domain-based sender authentication schemes, have a choice in which experiments they participate and in which they don't, but also should they be able to feel confident that the experiments in which they participate will not unnecessarily be tampered with. In any case, the practical impact of the semantic conflict is currently still a field of research, and even if the IETF intends to publish the Sender ID and SPF specifications as Experimental RFCs in order to gain more experience and reach community consensus in the future[1,2], then setting up conflicting experiments is certainly going to prove counter-productive. References: 1. http://www1.ietf.org/mail-archive/web/ietf-announce/current/msg01356.html 2. http://www1.ietf.org/mail-archive/web/ietf-announce/current/msg01357.html 3. http://article.gmane.org/gmane.mail.spam.spf.council/340 4. http://www.ietf.org/internet-drafts/draft-lyon-senderid-core-01.txt 5. http://www.ietf.org/internet-drafts/draft-lyon-senderid-pra-01.txt 6. http://www.ietf.org/internet-drafts/draft-schlitt-spf-classic-02.txt 7. http://spf.pobox.com/draft-mengwong-spf.02.9.4.txt 8. http://spf.pobox.com/draft-mengwong-spf-00.txt 9. http://spf.pobox.com/draft-mengwong-spf-01.txt 10. http://www.imc.org/ietf-mxcomp/mail-archive/msg05054.html 11. http://www.imc.org/ietf-mxcomp/mail-archive/msg05105.html 12. http://archives.listbox.com/[EMAIL PROTECTED]/200408/0122.html 13. http://article.gmane.org/gmane.mail.spam.spf.council/339 14. http://www.ietf.org/proceedings/04aug/116.htm#cmr 15. http://www.imc.org/ietf-mxcomp/mail-archive/msg03282.html 16. http://www.imc.org/ietf-mxcomp/mail-archive/msg03164.html 17. http://www.imc.org/ietf-mxcomp/mail-archive/msg03081.html 18. http://web.archive.org/web/20041115043332/http://www.ietf.org/internet-drafts/draft-ietf-marid-protocol-03.txt 19. http://web.archive.org/web/20041117011615/http://www.ietf.org/internet-drafts/draft-lyon-senderid-core-00.txt 20. http://archives.listbox.com/[EMAIL PROTECTED]/200409/0027.html 21. http://archives.listbox.com/[EMAIL PROTECTED]/200410/0001.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFDDPiHwL7PKlBZWjsRApnbAKDFRk3VaEiPrXv7ulF2atjbW85w1QCeJUnS kj3OjXsjR1KEQiFTUNK0Y1M= =x3Lt -----END PGP SIGNATURE----- _______________________________________________ Ietf mailing list Ietf@ietf.org https://www1.ietf.org/mailman/listinfo/ietf