On 13-Dec-06, at 1:15 PM, Marc Perkel wrote:

[EMAIL PROTECTED] wrote:
Sounds good,

I found this an interesting read about why SPF is ineffective:

http://en.hakin9.org/products/articleInfo/102


Excellent article.

SPF catches no spam - but does create false positives. It's less than useless. It's dangerous.

That article, at best, disseminates incomplete and outdated information and at worst, completely false statements.

"Why SPF is bad"

"SPF is supposed to protect against sender address forgery. It protects only the envelope sender address, not the From: header address. Mail User Agents such as Outlook Express display only the unprotected address. Therefore the users are still fooled and unprotected against joe-jobs, forgery, phishing and various scams."

SPF wasn't designed with MUA in mind. It was designed for use at the MTA level to block email before DATA. What's the use of accepting the email only to have the MUA query DNS to determine if it passes SPF checks. To that end there is nothing stopping the developers of MUAs from incorporating that functionality in the MUA and flagging messages based on SPF. The recipient does not need to see the 'envelope sender' address.

"SPF is supposed to protect against spam. A 2004 CipherTrust survey shows that more mail comes to SPF-protected servers from domains with SPF records, than from domains with no such records. Spammers have adopted SPF and are using it even more than legitimate sites to ensure spam delivery to mailbox."

Citing a study that is over two years old, that was published when the first stable draft of the SPF spec was only months old is hardly evidence of a greater trend in regard to the deployment of the protocol. In my own actual experience, after running an SPF aware mailer server for a year less than 1 in 100 000 emails have scored an SPF PASS and been spam.

"SPF breaks many Internet standards. It does not take into consideration pre-delivery forwarding (and a scheme called SRS adopted to counteract this is far from perfect). It is based on a vulnerable protocol (DNS), which makes it easy to spoof SPF records."

Email forwarding is not a standard, it is a feature; used by less than 0.01% of email users. As well the resulting bounce email informs the sender of the address that is being forwarded to so the sender merely has to resend the message. Yes the Internet is built on an fragile infrastructure that does not take into account the realities we face today. So we adapt! That is what SPF is all about, adapting to the realities of today. Also, the DNS protocol is not as vulnerable as the author makes it out to be, otherwise the Internet wouldn't be useable at all.

Listen, I can go on and on about that article but you get the point. It goes on to propose inappropriate uses for SPF and then uses that to justify why the protocol is flawed. It proposes scenarios that have no bases in fact and uses those to try and prove the ineffectiveness of the protocol. Just because someone writes an article, one lacking any real evidence and citing an ancient study, doesn't make it true.

--
Gino Cerullo

Pixel Point Studios
21 Chesham Drive
Toronto, ON  M3M 1W6

416-247-7740

This email address protect by SPF! Want to protect your domain's email from forgery? Visit openspf.org


Reply via email to