Re: spoofing email addresses

2004-06-03 Thread JFC (Jefsey) Morfin
Bravo! At last. Spam is a clutter of our way to use TCP/IP and SMTP in which criminal and cyberwarfare actions develop. I was interested talking about vulnerability to internet with the Chair of a Banking Association Committee on Security to hear him calling spam saturation bombing. Solution

Re: spoofing email addresses

2004-06-02 Thread Andrew Newton
On May 28, 2004, at 2:42 PM, Paul Vixie wrote: If there's a more blatant example of rubber stamping in the history of IETF, then I hope a better historian than I can share the archives with me. If there's a more blatant example of mischaracterization in the history of IETF -andy

Re: spoofing email addresses

2004-06-02 Thread Vernon Schryver
From: Andrew Newton [EMAIL PROTECTED] To: Paul Vixie [EMAIL PROTECTED] If there's a more blatant example of rubber stamping in the history of IETF, then I hope a better historian than I can share the archives with me. If there's a more blatant example of mischaracterization in the

Re: spoofing email addresses

2004-06-02 Thread Hallam-Baker, Phillip
As the AD who sponsored this work, I have to disagree. ... The recent interim meeting resulted in an agreement to work on a converged spec taking ideas from SPF and Caller-ID. Why? These are latecomers to the field. Or is it because of this:

Re: spoofing email addresses

2004-06-01 Thread Paul Vixie
As the AD who sponsored this work, I have to disagree. ... The recent interim meeting resulted in an agreement to work on a converged spec taking ideas from SPF and Caller-ID. Why? These are latecomers to the field. Or is it because of this:

Re: spoofing email addresses

2004-06-01 Thread Paul Vixie
[EMAIL PROTECTED] (Vernon Schryver) writes: ... If your ISP is incompetent at configuring an SMTP server, then whose fault is it that you continue to buy bad service? Why don't you treat your incompetent locl provider of Client only, non-public address or Client only, public address as a

Re: spoofing email addresses

2004-06-01 Thread Paul Vixie
Open letter. [EMAIL PROTECTED] (Nathaniel Borenstein) writes: ... However, you are right that my current laptop configuration is one of many that won't work when Caller-ID or SPF records come into use for the domain guppylake.com. At that point, obviously, I will change my laptop's

Re: spoofing email addresses

2004-06-01 Thread Ted Hardie
At 6:42 PM + 05/28/2004, Paul Vixie wrote: As the AD who sponsored this work, I have to disagree. ... The recent interim meeting resulted in an agreement to work on a converged spec taking ideas from SPF and Caller-ID. Why? These are latecomers to the field. Or is it because of this:

Re: spoofing email addresses

2004-06-01 Thread Dean Anderson
Sigh. None of these proposals will work, and none really even deserve much attention, since this subject and all sorts of related proposals have been discussed __AT_LENGTH__ before. ** I have already demonstrated (or rather, pointed out that others have already discovered this) to near

Re: spoofing email addresses

2004-05-31 Thread Michael Thomas
Perry E. Metzger writes: I think the easy solution is just to block port 25 You can stop right there. The rest is so much wishful thinking. Mike unless someone asks for it to be opened. Average users have no idea what port 25 does or even what TCP is, so they won't

Re: spoofing email addresses

2004-05-31 Thread Mark Smith
On Sun, 30 May 2004 23:20:49 -0600 (MDT) Vernon Schryver [EMAIL PROTECTED] wrote: From: Mark Smith [EMAIL PROTECTED] Yes, spam filtering can be quite effective. Not using spam filtering ... I don't like the chances of false positives or negatives. Today either you filter spam,

Re: spoofing email addresses

2004-05-31 Thread Nathaniel Borenstein
On May 30, 2004, at 8:26 PM, Vernon Schryver wrote: I don't mind in the least if Mr. Borenstein has changed his mind but does not wish to say so. To the best of my knowledge I haven't changed my mind about anything, but I'm done with this argument. Anyone who chooses to re-read the thread will

Re: spoofing email addresses

2004-05-31 Thread Iljitsch van Beijnum
Can this thread die, please? On 31-mei-04, at 7:20, Vernon Schryver wrote: Yes, spam filtering can be quite effective. Not using spam filtering ... I don't like the chances of false positives or negatives. [...] My various layers of filters averaged 521 spam/day for the last 40 days. And how

Re: spoofing email addresses

2004-05-30 Thread Måns Nilsson
--On Thursday, May 27, 2004 12:51:49 -0600 Vernon Schryver [EMAIL PROTECTED] wrote: block port 25 for all types of IP service except the one that draft-klensin-ip-service-terms-01.txt calls Full Internet Connectivity. (agreeing with Iljitsch on this snippet) I have a *very* hard time

Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
From: =?ISO-8859-1?Q?M=E5ns_Nilsson?= [EMAIL PROTECTED] block port 25 for all types of IP service except the one that draft-klensin-ip-service-terms-01.txt calls Full Internet Connectivity. I have a *very* hard time seeing an IETF document (or discussion on the list) coming even close

Re: spoofing email addresses

2004-05-30 Thread Nathaniel Borenstein
This would be a very interesting philosophical argument if in fact what we were discussing was something that could take a significant bite out of spam. In the absence of such an ability, however, the real question is whether user accounts should be crippled in the name of spam fighting when

Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
From: Nathaniel Borenstein [EMAIL PROTECTED] This would be a very interesting philosophical argument if in fact what we were discussing was something that could take a significant bite out of spam. In the absence of such an ability, however, the real question is whether user accounts

Re: spoofing email addresses

2004-05-30 Thread Nathaniel Borenstein
On May 30, 2004, at 10:45 AM, Vernon Schryver wrote: Mr. Borenstein and others like him expect the rest of us to subsidize their $30/month connectivity by dealing with the network abuse of his fellow customers, because they find $30/month comfortable. Just for the record, I spend plenty more than

Re: spoofing email addresses

2004-05-30 Thread Mark Smith
On Sun, 30 May 2004 08:45:41 -0600 (MDT) Vernon Schryver [EMAIL PROTECTED] wrote: From: Nathaniel Borenstein [EMAIL PROTECTED] snip As Mr. Borenstein knows, a substantial fraction and probably most spam is current sent using $30/month consumer accounts. The spam that is not sent using

Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
Received: from mail.optistreams.net (206-169-2-196.gen.twtelecom.net [206.169.2.196]) by calcite.rhyolite.com (8.12.11/8.12.11) with ESMTP id i4UG8bio077225 for [EMAIL PROTECTED] env-from [EMAIL PROTECTED]; Sun, 30 May 2004 10:08:38 -0600 (MDT) From: Nathaniel Borenstein

Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
From: Mark Smith [EMAIL PROTECTED] people to monitor and deal with their abusive customers. That is why many of the providers of those $30/month accounts submit their own IP address blocks to various dynamic backlists or block port 25 themselves. Do you have more information or

Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
From: Nathaniel Borenstein [EMAIL PROTECTED] Please stop this random speculating. The ISP that was blocked is not my current ISP (I moved last fall), so none of this is relevant. So what ISP was blocked? Why do I suspect you are being disingenuous and that it was a $30/month account?

Re: spoofing email addresses

2004-05-30 Thread Nathaniel Borenstein
On May 30, 2004, at 2:27 PM, Vernon Schryver wrote: So what ISP was blocked? What are you, the ISP police? Not that it's any of your business, it was X0 DSL and I paid just under $100/month and hosted my server at home; it was blacklisted as part of a larger block of IP addresses beyond my

Re: spoofing email addresses

2004-05-30 Thread Perry E. Metzger
Nathaniel Borenstein [EMAIL PROTECTED] writes: This would be a very interesting philosophical argument if in fact what we were discussing was something that could take a significant bite out of spam. In the absence of such an ability, however, the real question is whether user accounts

Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
From: Nathaniel Borenstein [EMAIL PROTECTED] On May 30, 2004, at 2:27 PM, Vernon Schryver wrote: So what ISP was blocked? What are you, the ISP police? Not that it's any of your business, it was X0 DSL Your repeated, unprovoked public complaints about the blocking that affected you

Re: spoofing email addresses

2004-05-30 Thread Nathaniel Borenstein
This is a remarkably reasonable proposal, and I would have no objection to it (just a fear that ISPs might make it unnecessarily hard to get it opened, but they tend to make everything hard). Heck, I might not even mind paying an extra dollar or two per month to have it open. As long as

Re: spoofing email addresses

2004-05-30 Thread Vernon Schryver
From: Nathaniel Borenstein [EMAIL PROTECTED] This is a remarkably reasonable proposal, and I would have no objection to it (just a fear that ISPs might make it unnecessarily hard to get it opened, but they tend to make everything hard). Heck, I might not even mind paying an extra dollar

Re: spoofing email addresses

2004-05-30 Thread Mark Smith
On Sun, 30 May 2004 11:04:32 -0600 (MDT) Vernon Schryver [EMAIL PROTECTED] wrote: From: Mark Smith [EMAIL PROTECTED] people to monitor and deal with their abusive customers. That is why many of the providers of those $30/month accounts submit their own IP address blocks to various

Re: spoofing email addresses

2004-05-30 Thread Mark Smith
On Sun, 30 May 2004 17:16:42 -0400 Perry E. Metzger [EMAIL PROTECTED] wrote: Nathaniel Borenstein [EMAIL PROTECTED] writes: This would be a very interesting philosophical argument if in fact what we were discussing was something that could take a significant bite out of spam. In the

Re: spoofing email addresses

2004-05-28 Thread Paul Vixie
... HREF=http://sa.vix.com/~vixie/mailfrom.txt;MAIL-FROM/A. I do not see a draft in the ietf process anyplace . Was this ever submitted ? I do notice that several of the other proposal's make mention of this work , But in none of them do they mention it as a

Re: spoofing email addresses

2004-05-28 Thread John Stracke
Iljitsch van Beijnum wrote: On 27-mei-04, at 16:56, [EMAIL PROTECTED] wrote: (I've yet to see a proposal that works if the spammers start utilizing zombie machines that snarf the already-stored credentials of the user to send mail) The question is whether spammers can obtain new credentials

Re: spoofing email addresses

2004-05-28 Thread Vernon Schryver
From: John Stracke [EMAIL PROTECTED] (I've yet to see a proposal that works if the spammers start utilizing zombie machines that snarf the already-stored credentials of the user to send mail) The question is whether spammers can obtain new credentials (stolen or otherwise)

Re: spoofing email addresses

2004-05-28 Thread william(at)elan.net
Paul, MARID was formed to merge Microsoft Caller-ID with SPF and so far has been successfully used by Microsoft to bully us to submit to their own proposal or else ... There are better ways to implement mail-from (i.e. as from Paul's draft which is basicly still the basis for MARID) which

RE: spoofing email addresses

2004-05-28 Thread Christian Huitema
1. block port 25 to external IP addresses for all of your customers except those with what draft-klensin-ip-service-terms-01.txt calls Full Internet Connectivity. ... and receive a flood of complaints because 10% of your users are using a mail service provided by someone else than

Re: spoofing email addresses

2004-05-28 Thread Ted Hardie
At 9:17 PM + 05/27/2004, Paul Vixie wrote: MARID is basically a layer 9 exercise, uninterested in engineering as such. it was formed to merge two ill considered ideas, one from yahoo and one from microsoft, in a way that would cause either no loss of face, or equal loss of face, for those two

RE: spoofing email addresses

2004-05-28 Thread Vernon Schryver
From: Christian Huitema [EMAIL PROTECTED] 1. block port 25 to external IP addresses for all of your customers except those with what draft-klensin-ip-service-terms-01.txt calls Full Internet Connectivity. ... and receive a flood of complaints because 10% of your users are

Re: spoofing email addresses

2004-05-28 Thread Iljitsch van Beijnum
On 28-mei-04, at 15:06, John Stracke wrote: (I've yet to see a proposal that works if the spammers start utilizing zombie machines that snarf the already-stored credentials of the user to send mail) The question is whether spammers can obtain new credentials (stolen or otherwise) faster

Re: spoofing email addresses

2004-05-27 Thread Paul Vixie
In fact, there isn't any sane way to detect inconsistent header information without external hints - this is the reason why there's the SPF proposal, the Yahoo domain-keys proposal, and Microsoft's proposal. And MARID. and don't forget

Re: spoofing email addresses

2004-05-27 Thread Valdis . Kletnieks
On Wed, 26 May 2004 15:00:00 MDT, Vernon Schryver [EMAIL PROTECTED] said: I don't see any of those proposals and their competitors as sane. Oh, I wasn't addressing whether the proposals were workable, merely listing proposals motivated by the fact that verifying the legitimacy of a sending

Re: spoofing email addresses

2004-05-27 Thread Iljitsch van Beijnum
On 27-mei-04, at 16:56, [EMAIL PROTECTED] wrote: the proposals aren't even a workable solution to the real problem (I've yet to see a proposal that works if the spammers start utilizing zombie machines that snarf the already-stored credentials of the user to send mail) It amazes me how many

Re: spoofing email addresses

2004-05-27 Thread Mr. James W. Laferriere
Hello Paul , On Wed, 26 May 2004, Paul Vixie wrote: In fact, there isn't any sane way to detect inconsistent header information without external hints - this is the reason why there's the SPF proposal, the Yahoo domain-keys proposal, and Microsoft's proposal. And MARID. and

Re: spoofing email addresses

2004-05-27 Thread Valdis . Kletnieks
On Thu, 27 May 2004 18:23:17 +0200, Iljitsch van Beijnum said: There is also the possibility of blacklisting known bad credentials. Anybody who's had to get themselves out of 3,000 private blacklists, and anybody who's had to fight with places that were blackholing the 69/8 address space, knows

Re: spoofing email addresses

2004-05-27 Thread Vernon Schryver
From: [EMAIL PROTECTED] The people who claim that something can't be done shouldn't get in the way of the people doing it. I didn't say it *cant* be done. I said there were known problems that any successful solution would have to address. Another response is to point out that all of

Re: spoofing email addresses

2004-05-27 Thread Iljitsch van Beijnum
On 27-mei-04, at 20:51, Vernon Schryver wrote: The vast majority of the spam that sender validating systems might block after they have been installed in most SMTP clients 5 or 10 years from now is rejected today at any organization that really cares about spam using any of various tactics

Re: spoofing email addresses

2004-05-26 Thread Andrew Newton
On May 24, 2004, at 1:49 PM, [EMAIL PROTECTED] wrote: In fact, there isn't any sane way to detect inconsistent header information without external hints - this is the reason why there's the SPF proposal, the Yahoo domain-keys proposal, and Microsoft's proposal. And MARID. -andy

Re: spoofing email addresses

2004-05-26 Thread Vernon Schryver
From: Andrew Newton [EMAIL PROTECTED] On May 24, 2004, at 1:49 PM, [EMAIL PROTECTED] wrote: In fact, there isn't any sane way to detect inconsistent header information without external hints - this is the reason why there's the SPF proposal, the Yahoo domain-keys proposal, and

spoofing email addresses

2004-05-24 Thread Christian de Larrinaga
Since Thursday (last) I've been receiving hundreds of bounces from spam filters and mail servers for email messages I've not sent at [EMAIL PROTECTED] I can see from those bounces where the header info of the orginal message is included that somebody has been using my address to disguise the

Re: spoofing email addresses

2004-05-24 Thread Valdis . Kletnieks
On Mon, 24 May 2004 10:18:28 BST, Christian de Larrinaga [EMAIL PROTECTED] said: I'm hoping that spam filters will detect the inconsistent header information and not blacklist me at [EMAIL PROTECTED] but I'm not hopeful. In fact, there isn't any sane way to detect inconsistent header

Re: spoofing email addresses

2004-05-24 Thread Randy Presuhn
Hi - From: Christian de Larrinaga [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Monday, May 24, 2004 2:18 AM Subject: spoofing email addresses Since Thursday (last) I've been receiving hundreds of bounces from spam filters and mail servers for email messages I've not sent at [EMAIL

Re: spoofing email addresses

2004-05-24 Thread Nathaniel Borenstein
On May 24, 2004, at 5:18 AM, Christian de Larrinaga wrote: Incidentally does anybody run a retribution service? Boy, do I hope this question is a joke. But if I were running some of the blacklisting services, I would worry that someone might get serious about revenge. If I were a less placid