
We are using Suse 9.0 Professional. I am getting email that is claiming to be from my domain and the Posfix logs confirm it is from an outside IP. After searching the logs, I figured out where the connection initiated, and then the regular smtp traffic proceeded with the spoofed email address (user@mydomain.com) to my real users email address realusers@mydomain.com). The unique identifiers helped me correspond the traffic. There were two other email sessions that based on their unique identifier did not have the full smtp process. For example, this is all that is entered in the logs for the unique process. I usually see a connect and disconnect process before and after this and the random character user does not exisit! BTW, this is a mail gateway for Exchange. Any ideas?? Jul 20 11:54:59 gateway postfix/smtp[10247]: 649E6AD30: to=<user1@mydomain.com>, relay=10.0.0.5[10.0.0.5], delay=14, status=sent (250 2.6.0 <hxdgpusiesezuvbkmcc@mydomain.org> Queued mail for delivery) Jul 20 11:55:10 gateway postfix/smtp[10247]: 8BFB2AD43: to=<user2@mydomain.com>, relay=10.0.0.5[10.0.0.5], delay=25, status=sent (250 2.6.0 <oityeuiuogzvyivawrs@mydomain.com> Queued mail for delivery) Thanks, Eric -- ______________________________________________________________________ Eric Kahklen, MS 530 4th Ave. W. Seattle, WA

On Jul 21, Eric Kahklen <eric@kahklen.com> wrote:
We are using Suse 9.0 Professional. I am getting email that is claiming to be from my domain and the Posfix logs confirm it is from an outside IP. I would suggest to use SPF (http://spf.pobox.com). This way you can restrict the IP's that are allowed to send mails that end with your domain.
Markus -- __________________ /"\ Markus Gaugusch \ / ASCII Ribbon Campaign markus(at)gaugusch.at X Against HTML Mail / \

Thanks!! would you set up SPF with the domainname (domain.com) or the MX hostname (mail.domain.com) and any other back up hosts??? Would this information be placed with the ISP who manages our DNS? Eric Markus Gaugusch wrote:
On Jul 21, Eric Kahklen <eric@kahklen.com> wrote:
We are using Suse 9.0 Professional. I am getting email that is claiming to be from my domain and the Posfix logs confirm it is from an outside IP.
I would suggest to use SPF (http://spf.pobox.com). This way you can restrict the IP's that are allowed to send mails that end with your domain.
Markus
-- ______________________________________________________________________ Eric Kahklen, MS 530 4th Ave. W. Seattle, WA

Quoting Markus Gaugusch <markus@gaugusch.at>:
I would suggest to use SPF (http://spf.pobox.com). This way you can restrict the IP's that are allowed to send mails that end with your domain.
Unfortunately, SPF breaks forwarding. For instance, if I host my web site at a hosting provider and have the e-mails sent to it forwarded to my cable modem account, SPF will block them. There is no way around this without the hosting provider changing their e-mail setup. I previously announced my mail server with SPF until my customers started complaining that they couldn't send mail to such people. As an ISP, there was nothing I could do about it, short of removing the SPF entries from my DNS. SPF is not a viable solution.

suse@rio.vg schrieb:
Quoting Markus Gaugusch <markus@gaugusch.at>:
I would suggest to use SPF (http://spf.pobox.com). This way you can
SPF is not a viable solution.
Full ack ;-) SPF causes tons of trouble and no real benefit. Dirk TRIA IT-consulting GmbH Joseph-Wild-Stra?e 20 81829 Munchen Germany Tel: +49 (89) 92907-0 Fax: +49 (89) 92907-100 http://www.tria.de -------------------------------------------------------- working hard | for your success -------------------------------------------------------- Registergericht Munchen HRB 113466 USt.-IdNr. DE 180017238 Steuer-Nr. 802/40600 Geschaftsfuhrer: Hubertus Wagenhauser -------------------------------------------------------- Nachricht von: dirk.schreiner@tria.de Nachricht an: suse-security@suse.com # Dateianhange: 0 Die Mitteilung dieser E-Mail ist vertraulich und nur fur den oben genannten Empfanger bestimmt. Wenn Sie nicht der vorgesehene Empfanger dieser E-Mail oder mit der Aushandigung an ihn betraut sind, weisen wir darauf hin, da? jede Form der Kenntnisnahme, Veroffentlichung, Vervielfaltigung sowie Weitergabe des Inhalts untersagt ist. Wir bitten Sie uns in diesem Fall umgehend zu unterrichten. Vielen Dank The information contained in this E-Mail is privileged and confidental intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient or competent to deliver it to the intended recipient, you are hereby notified that any dissemination, distribution or copying of this E-Mail is strictly prohibited. If you have received this E-Mail in error, please notify us immediately. Thank you

On Wednesday 21 July 2004 20:54, Dirk Schreiner wrote:
SPF causes tons of trouble and no real benefit.
SPF works for me and for about 20.000 registered domains that publish SPF records at the moment (http://spf.pobox.com/adoption.html). Yes, checking SPF records on inbound e-mail breaks forwarding, but there are ways around this. Remailing instead of forwarding is one of them. If your hosting provider doesn't support this, go to one that does or exclude their mailservers from SPF checks. There is a whole lot of difference between publishing a SPF record and checking for SPF on inbound mail. Publishing a SPF record doesn't necessarily break things. You should either have all your domain users use your servers for outbound mail (SASL can be used for that) or be lenient in the fallback (publish ?all or ~all as last parameter). Regards, Arjen

Quoting Arjen de Korte <suse+security@de-korte.org>:
On Wednesday 21 July 2004 20:54, Dirk Schreiner wrote:
SPF causes tons of trouble and no real benefit.
SPF works for me and for about 20.000 registered domains that publish SPF records at the moment (http://spf.pobox.com/adoption.html). Yes, checking SPF records on inbound e-mail breaks forwarding, but there are ways around this. Remailing instead of forwarding is one of them. If your hosting provider doesn't support this, go to one that does or exclude their mailservers from SPF checks.
There is a whole lot of difference between publishing a SPF record and checking for SPF on inbound mail. Publishing a SPF record doesn't necessarily break things. You should either have all your domain users use your servers for outbound mail (SASL can be used for that) or be lenient in the fallback (publish ?all or ~all as last parameter).
This is patently wrong. I set up my servers to publish SPF, but not check it for incoming mail. My customers attempted to e-mail people who used domain hosting sites that did not specifically modify their software for SPF. My customer's e-mail did not reach their recipients. The whole problem is that the breakage is not at the publishing domain nor the recipient, but at the middle man. The "ways around" all involve convincing the middle man to change their software. As the originating ISP of the e-mail, there is nothing I can do. I'd like to see you try to explain this problem to someone who can barely operate Outlook Express. You know what happens? I get blamed. The recipient says "I can get e-mail from other people!" (because most domains don't publish SPF), the middle man says "It's not my responsibility" (Try explaining the whole SPF thing to a hosting company on a different continent), and my customer blames me.

On Wednesday 21 July 2004 21:44, suse@rio.vg wrote:
I set up my servers to publish SPF, but not check it for incoming mail. My customers attempted to e-mail people who used domain hosting sites that did not specifically modify their software for SPF. My customer's e-mail did not reach their recipients.
Then the recipients obviously use an ISP that does check SPF records *and* they use forwarding. In that case they have a problem with their ISP. You could have prevented their problems by publishing ?all in your SPF records and the e-mail should get through, even when they use forwarding. As an example, AOL and Amazon for instance do this, precisely to prevent the problems you're picturing.
The whole problem is that the breakage is not at the publishing domain nor the recipient, but at the middle man.
No, it is the ISP of the recipient in combination with the forwarding of e-mail. If the ISP decides to check for SPF records but the customer wants to forward e-mail from their vanity domain to this ISP there is a problem. The ISP should allow their customers to switch off the SPF checking for them or the recipient should ask their hosting providers to switch from forwarding to remailing.
The "ways around" all involve convincing the middle man to change their software.
Not at all. You can decide to end your SPF record with ?all and there will be no such problem, since the SPF neutral will allow the e-mail through.
As the originating ISP of the e-mail, there is nothing I can do.
See above. Publish ?all and you'll be fine. Domains checking SPF properly will pick up that the e-mail came from a legitimate client and people using forwarding will still be able to recieve their mail. Regards, Arjen

Quoting Arjen de Korte <suse+security@de-korte.org>:
Then the recipients obviously use an ISP that does check SPF records *and* they use forwarding. In that case they have a problem with their ISP. You could have prevented their problems by publishing ?all in your SPF records and the e-mail should get through, even when they use forwarding. As an example, AOL and Amazon for instance do this, precisely to prevent the problems you're picturing.
Please explain the difference between the "all" record and not publishing SPF records period? If everyone sticks "all" in their SPF records, we have precisely the same situation we do now. Basically, SPF is just a "feel good" lark. In order to prevent it from breaking current e-mail, you have to break SPF. Then the SPF people say "Wowie! Look at all the people using SPF!" except that the biggest and probably most of the others use the "all" tag that says "everyone is considered trusted!" What's the point in publishing SPF if you publish that the entire internet is considered trusted for your domain? Oh, and I'm not "picturing" it. It actually happened to me. I was a big proponent of the idea of SPF until my customers started complaining.

On Wednesday 21 July 2004 12:40 pm, suse@rio.vg wrote:
Basically, SPF is just a "feel good" lark. In order to prevent it from breaking current e-mail, you have to break SPF. Then the SPF people say "Wowie! Look at all the people using SPF!" except that the biggest and probably most of the others use the "all" tag that says "everyone is considered trusted!" What's the point in publishing SPF if you publish that the entire internet is considered trusted for your domain?
So the emperor has no clothes, is what you are basically saying? ;-) -- _____________________________________ John Andersen

On Wednesday 21 July 2004 22:40, suse@rio.vg wrote:
Please explain the difference between the "all" record and not publishing SPF records period? If everyone sticks "all" in their SPF records, we have precisely the same situation we do now.
In a few years time, the '?all' will become obsolete and '-all' will be all that you want at the end of your SPF record. Or risk that people will forge mail from your domain.
Basically, SPF is just a "feel good" lark.
I diagree. It's a reasonable way to deal with the ever increasing number of forgeries, either from spammers or virusses. It has it's drawbacks, but these can be relatively solved without having to redesign the e-mail system that is in use today. If we don't start doing something now, the present e-mail system will collapse. SPF is one of the ways to deal with that and although not perfect, will provide the least impact to end users when both ISPs and hosting companies implement it. Other schemes like Domain Keys will give even better protection, but will likely not be adopted on a large scale, since it requires to many changes for the end users. The 'beauty' of SPF is that it can be implemented by the people who supposedly know what they are doing (ISP's and hosting companies).
In order to prevent it from breaking current e-mail, you have to break SPF.
Publishing '?all' at the end of your SPF record doesn't break it. If you designate legitimate senders, they will pass however.
Then the SPF people say "Wowie! Look at all the people using SPF!" except that the biggest and probably most of the others use the "all" tag that says "everyone is considered trusted!"
I suggest you first read up on SPF before you're making a fool of yourself more than you already did. Only when receiving a SPF 'pass', e-mail is considered legitimate, SPF 'softfail' and 'neutral' will still be accepted, but is not considered to be legitimate. Only in case of SPF 'fail' a message should be bounced.
What's the point in publishing SPF if you publish that the entire internet is considered trusted for your domain?
SPF 'neutral' is NOT considered trusted. And by the time that most hosting providers will have switched to remailing instead of forwarding (I know, this will take time) 'neutral' and 'softfail' will be almost equivalent to 'fail' for Bayesian filters, as spammers and virusses will only be able to get through by using domains which default to 'neutral' or 'softfail'.
Oh, and I'm not "picturing" it. It actually happened to me. I was a big proponent of the idea of SPF until my customers started complaining.
You must have published a '-all' at the end of your SPF record and failed to oversee the consequenses of doing this. Regards, Arjen

Quoting Arjen de Korte <suse+security@de-korte.org>:
In a few years time, the '?all' will become obsolete and '-all' will be all that you want at the end of your SPF record. Or risk that people will forge mail from your domain.
[...]
Publishing '?all' at the end of your SPF record doesn't break it. If you designate legitimate senders, they will pass however.
[...]
I suggest you first read up on SPF before you're making a fool of yourself more than you already did. Only when receiving a SPF 'pass', e-mail is considered legitimate, SPF 'softfail' and 'neutral' will still be accepted, but is not considered to be legitimate. Only in case of SPF 'fail' a message should be bounced.
[...]
SPF 'neutral' is NOT considered trusted. And by the time that most hosting providers will have switched to remailing instead of forwarding (I know, this will take time) 'neutral' and 'softfail' will be almost equivalent to 'fail' for Bayesian filters, as spammers and virusses will only be able to get through by using domains which default to 'neutral' or 'softfail'.
Oh, and I'm not "picturing" it. It actually happened to me. I was a big proponent of the idea of SPF until my customers started complaining.
You must have published a '-all' at the end of your SPF record and failed to oversee the consequenses of doing this.
You seem to be on some sort of holy crusade in regards to SPF. I'm not. Personally, I'm in favor of just about anything that will reduce spam without angering my customers. There are far too many people on these holy crusades. Other people talk about the purity of SMTP and not mixing up layers. Personally, I don't care. I just want it to work. I didn't have "?all" in my SPF records because http://spf.pobox.com mentioned NOTHING about that being away to avoid problems with forwarding. Maybe somewhere in the mailing list, but not in the main docs and not in the FAQ. You may have time to go crawling through mailing lists for your pet crusade, but I don't. You mention "softfail", "neutral", and "passed", but they're all the same. In each case, the mail is delivered. Setting "?all" means that anyone can spoof my domain and it will be delivered. What's the difference between that and what we have now? Since the large providers use "?all", SPF is at best a placebo, at worst it breaks legitimate messages. The docs say, "Do the above lines describe all the hosts that send mail from your domain? Then use '-all'". All the mail for my domain comes out of a single network that was specified. I guess you consider someone a fool if they follow the documentation without reading three thousand e-mails off the mailing list. When I heard about SPF, it sounded like a good idea, so I decided to post my mail network as the only trusted network for my domain, figuring that it couldn't cause any harm and might help some other people out. I decided that later, after SPF had matured, that I would look into using it to block e-mail on our own servers. Unfortunately, the first step didn't work out. I'm just a sysadmin. I don't have a cause. I just want things to work. I would love SPF to work. But I don't have time to spend weeks on your pet crusade. I don't understand why SPF blockers don't simply check ALL of the received headers and "pass" if the proper mail server is anywhere in the chain. It's a simple and obvious fix for the problem of forwarding without forcing anyone to change their mail servers...

/ 2004-07-22 10:37:12 -0400 \ suse@rio.vg:
I don't understand why SPF blockers don't simply check ALL of the received headers and "pass" if the proper mail server is anywhere in the chain. It's a simple and obvious fix for the problem of forwarding without forcing anyone to change their mail servers...
and then I just insert a matching Received: header even before I SMTP it out... doh. :-/

suse@rio.vg writes:
I don't understand why SPF blockers don't simply check ALL of the received headers and "pass" if the proper mail server is anywhere in the chain. It's a simple and obvious fix for the problem of forwarding without forcing anyone to change their mail servers...
"For every complex problem there is an answer that is clear, simple, and wrong." -- H. L. Mencken 1) You don't have the Received: headers until the SMTP handshake is completed and the data is transferred. At that point in the protocol, there is no way to reject the mail; the receiving MTA has taken responsibility for it. 2) Any Received: header other than the first (i.e. the last one generated) could be forged. You need to walk back through the headers and identify, at each step, whether you trust the "received by" host to correctly identify the "sent from" host. This is a nontrivial task. -- Alan Hadsell If brute force doesn't work, you aren't using enough.

Quoting Alan Hadsell <ahadsell@MtDiablo.com>:
suse@rio.vg writes:
I don't understand why SPF blockers don't simply check ALL of the received headers and "pass" if the proper mail server is anywhere in the chain. It's a simple and obvious fix for the problem of forwarding without forcing anyone to change their mail servers...
"For every complex problem there is an answer that is clear, simple, and wrong." -- H. L. Mencken
1) You don't have the Received: headers until the SMTP handshake is completed and the data is transferred. At that point in the protocol, there is no way to reject the mail; the receiving MTA has taken responsibility for it.
2) Any Received: header other than the first (i.e. the last one generated) could be forged. You need to walk back through the headers and identify, at each step, whether you trust the "received by" host to correctly identify the "sent from" host. This is a nontrivial task.
And for every complex problem there are a dozen solutions that create more problems than they solve. 1) Why is it necessary to block before data is received? SpamAssassin and DSPAM don't. In fact, I much prefer systems that do not block at the SMTP. If I receive the e-mail and mark it as spam, it can be checked later. If it's blocked at the SMTP, there is no recourse. 2) I could also create subdomains on the fly, generate SPF entries, and spam past SPF to my heart's content. Until SMTP is completely replaced, there are always ways around things. The Spammers are clever. Spam is like AIDS, there is no silver bullet solution, but a cocktail of solutions will keep it at bay. Strict domain checking, Blocklists, and DSPAM have been doing a pretty good job for me, even though my e-mail addresses are plastered all over the web. The trick is to make certain that each step in the cocktail doesn't block legitimate e-mail. An SPF-style system that checked received headers would be a great addition. It's one more hoop for the spammers with very little cost on my end. Currently, SPF creates a blockage that is exceedingly difficult to remove. Trying to convince a hosting site to change it's e-mail system isn't trivial. People get REALLY upset when their e-mail doesn't work, so companies are very wary of making any changes that could potentially cause problems. I've noticed a correlation between proponents of SPF and people that never have to actually deal with customers. If I ran some internal corporate network, SPF would look an awful lot better. When you have a captive audience, it's much easier to deal with complaints.

On Thursday 22 July 2004 18:01, suse@rio.vg wrote:
Quoting Alan Hadsell <ahadsell@MtDiablo.com>:
suse@rio.vg writes:
And for every complex problem there are a dozen solutions that create more problems than they solve.
1) Why is it necessary to block before data is received? SpamAssassin and DSPAM don't. In fact, I much prefer systems that do not block at the SMTP. If I receive the e-mail and mark it as spam, it can be checked later. If it's blocked at the SMTP, there is no recourse.
2) I could also create subdomains on the fly, generate SPF entries, and spam past SPF to my heart's content. Until SMTP is completely replaced, there are always ways around things. The Spammers are clever.
I agree with you about SPF's problems, but I don't think spammers can make subdomains on the fly for my domain. This is not how DNS works. Only I can do that, if I have access to my own DNS zone.
Currently, SPF creates a blockage that is exceedingly difficult to remove. Trying to convince a hosting site to change it's e-mail system isn't trivial. People get REALLY upset when their e-mail doesn't work, so companies are very wary of making any changes that could potentially cause problems.
Again, I do agree with you for the most part, but this expectation of email that "always works" is SO 3 years ago. Nowadays, people are just lucky to notice they have a few non-spam messages buried with the rest, just one second before pressing the <<delete>> key. Spammmers, spamassassin, viruskillers and (network- or otherwise)blacklists have taken care of that.
I've noticed a correlation between proponents of SPF and people that never have to actually deal with customers. If I ran some internal corporate network, SPF would look an awful lot better. When you have a captive audience, it's much easier to deal with complaints.
Sure, but still. I've dealt with numerous issues, from easynet blacklisting "yeah, because your mailserver IP is in a dialup pool" to mailservers that stubbornly reject mail from an IP that has no valid reverse PTR record. And you try to convince your big colo hosting company to set those PTR records straight. I've been there, and that wasn't one of the the lesser hosting companies either... way too often, this shit is just beyond your control. Maarten -- Yes of course I'm sure it's the red cable. I guarante[^%!/+)F#0c|'NO CARRIER

Hi, maarten van den Berg schrieb:
On Thursday 22 July 2004 18:01, suse@rio.vg wrote:
Quoting Alan Hadsell <ahadsell@MtDiablo.com>:
suse@rio.vg writes:
And for every complex problem there are a dozen solutions that create more problems than they solve.
1) Why is it necessary to block before data is received? SpamAssassin and DSPAM don't. In fact, I much prefer systems that do not block at the SMTP.
-----8<---------
I agree with you about SPF's problems, but I don't think spammers can make subdomains on the fly for my domain. This is not how DNS works. Only I can do that, if I have access to my own DNS zone.
read ;-))) http://www.securityfocus.com/guest/17905 http://ketil.froyn.name/poison.html http://cr.yp.to/djbdns/bugtraq/19991114052453-12962-qmail@cr-yp-to Dirk TRIA IT-consulting GmbH Joseph-Wild-Stra?e 20 81829 Munchen Germany Tel: +49 (89) 92907-0 Fax: +49 (89) 92907-100 http://www.tria.de -------------------------------------------------------- working hard | for your success -------------------------------------------------------- Registergericht Munchen HRB 113466 USt.-IdNr. DE 180017238 Steuer-Nr. 802/40600 Geschaftsfuhrer: Hubertus Wagenhauser -------------------------------------------------------- Nachricht von: dirk.schreiner@tria.de Nachricht an: suse-security@suse.com # Dateianhange: 0 Die Mitteilung dieser E-Mail ist vertraulich und nur fur den oben genannten Empfanger bestimmt. Wenn Sie nicht der vorgesehene Empfanger dieser E-Mail oder mit der Aushandigung an ihn betraut sind, weisen wir darauf hin, da? jede Form der Kenntnisnahme, Veroffentlichung, Vervielfaltigung sowie Weitergabe des Inhalts untersagt ist. Wir bitten Sie uns in diesem Fall umgehend zu unterrichten. Vielen Dank The information contained in this E-Mail is privileged and confidental intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient or competent to deliver it to the intended recipient, you are hereby notified that any dissemination, distribution or copying of this E-Mail is strictly prohibited. If you have received this E-Mail in error, please notify us immediately. Thank you

On Thursday 22 July 2004 21:28, Dirk Schreiner wrote:
Hi,
maarten van den Berg schrieb:
I agree with you about SPF's problems, but I don't think spammers can make subdomains on the fly for my domain. This is not how DNS works. Only I can do that, if I have access to my own DNS zone.
read ;-)))
Thanks, real interesting read ! I already knew of cache poisoning, but I somewhat underestimated its chances of success I guess. Not that I am vulnerable, according to that test, but it is always good to be informed.
http://www.securityfocus.com/guest/17905 http://ketil.froyn.name/poison.html http://cr.yp.to/djbdns/bugtraq/19991114052453-12962-qmail@cr-yp-to
Dirk
<snip huge sig> Maarten -- Yes of course I'm sure it's the red cable. I guarante[^%!/+)F#0c|'NO CARRIER

On Jul 21, Dirk Schreiner <dirk.schreiner@tria.de> wrote:
suse@rio.vg schrieb:
Quoting Markus Gaugusch <markus@gaugusch.at>:
I would suggest to use SPF (http://spf.pobox.com). This way you can
SPF is not a viable solution.
Full ack ;-)
SPF causes tons of trouble and no real benefit.
I've been using it for more than a month now and i haven't had a single problem. It may be a problem for larger setups with users that are distributed through the net. But most private domain owners and smaller companies should be just fine with it. Yes, it breaks forwarding. But facing the amount of spam, the number of mails that bounce because of incorrect (old-style) forwarding should be neglegible. If anyone here finds a better solution, without breaking anything in the existing system - you are welcome to tell us. I think that SPF is the best we can get without breaking too much of existing SMTP. SPF goes a logical way - the domain owner does not only tell which machines receive his mail (MX), but also which machines are allowed to send mails with his domain. Markus -- __________________ /"\ Markus Gaugusch \ / ASCII Ribbon Campaign markus(at)gaugusch.at X Against HTML Mail / \

Hi, Markus Gaugusch schrieb:
On Jul 21, Dirk Schreiner <dirk.schreiner@tria.de> wrote:
Full ack ;-)
SPF causes tons of trouble and no real benefit.
I've been using it for more than a month now and i haven't had a single problem. It may be a problem for larger setups with users that are
Oh, not those using SPF get the problem. They just loose customers, not being able to contact them ;-))
distributed through the net. But most private domain owners and smaller companies should be just fine with it.
Oh yes, just paying some more money, they are fine. :.-(( Just ask the customers of t-online. And this is why _big_ providers like AOL support SPF. Less traffic, and more money from the User.
Yes, it breaks forwarding. But facing the amount of spam, the number of mails that bounce because of incorrect (old-style) forwarding should be neglegible.
If anyone here finds a better solution, without breaking anything in the existing system - you are welcome to tell us. I think that SPF is the best we can get without breaking too much of existing SMTP.
SPF goes a logical way - the domain owner does not only tell which machines receive his mail (MX), but also which machines are allowed to send mails with his domain.
Hey, if this is logical, then we should go one layer down, and verify the IP-Address using the Mac-Address saved in the DNS-System. (Oh, could cause Problems with ATM, SCNR) Or we should force any person, sending a Postcard, to use the registerd postbox. (Maybe this fights paper spam ;-)) Traveling persons are forced to fax home, where the fax is printed onto the postcard and then thrown into the registered postbox. (Have fun at your next vacation.) As you are writing, SPF _is_ breaking existing SMTP. (IMHO in many way`s, not only if one is forwarding.) SMTP is a routing protocol, and as any routing Protocol it has to use a routing table to find the target. The routing tables are saved in DNS as this was the easiest way to do this. But as you can use NAT for IP there are similar ways to do so with SMTP, and as you can use asymetric routing with IP, you can do so with SMTP. SMTP (as the name says) is the transport layer for Mail communication, and as UDP in the OSI-Layer 4, it is just DATAGRAM based and _not_ reliable! (Hey, we should use SNMP to make UDP reliable. SCNR) So, if anyone wants to verify if the _person_ is allowed sending the mail, the check has to be done at higher Level. It can easily be done by using Key Servers (Announced by the DNS _key.domain.com) and signing the Mail-Header, that is seen by the user. So neither POP, IMAP, EXCHANGE, nor SMTP are broken. Check is done by Client, or Company Gateway. Signing is done by client or Company Gateway. This is easy, reliable, but maybe patented. I don`t know. Dirk
Markus
TRIA IT-consulting GmbH Joseph-Wild-Stra?e 20 81829 Munchen Germany Tel: +49 (89) 92907-0 Fax: +49 (89) 92907-100 http://www.tria.de -------------------------------------------------------- working hard | for your success -------------------------------------------------------- Registergericht Munchen HRB 113466 USt.-IdNr. DE 180017238 Steuer-Nr. 802/40600 Geschaftsfuhrer: Hubertus Wagenhauser -------------------------------------------------------- Nachricht von: dirk.schreiner@tria.de Nachricht an: suse-security@suse.com # Dateianhange: 0 Die Mitteilung dieser E-Mail ist vertraulich und nur fur den oben genannten Empfanger bestimmt. Wenn Sie nicht der vorgesehene Empfanger dieser E-Mail oder mit der Aushandigung an ihn betraut sind, weisen wir darauf hin, da? jede Form der Kenntnisnahme, Veroffentlichung, Vervielfaltigung sowie Weitergabe des Inhalts untersagt ist. Wir bitten Sie uns in diesem Fall umgehend zu unterrichten. Vielen Dank The information contained in this E-Mail is privileged and confidental intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient or competent to deliver it to the intended recipient, you are hereby notified that any dissemination, distribution or copying of this E-Mail is strictly prohibited. If you have received this E-Mail in error, please notify us immediately. Thank you

Hi, Markus Gaugusch schrieb:
Yes, it breaks forwarding. But facing the amount of spam, the number of mails that bounce because of incorrect (old-style) forwarding should be neglegible.
incorrect (old-style)? Could you please post the RFC with the "new-style". Dirk Going sleeping. BTW: if anybody is not amused about that long signature. I cannot go around this because company GW is doing that. And using my host`s SMTP-Server is not possible due to people checking Reverse-Lookup and doing SPF. :-/ TRIA IT-consulting GmbH Joseph-Wild-Stra?e 20 81829 Munchen Germany Tel: +49 (89) 92907-0 Fax: +49 (89) 92907-100 http://www.tria.de -------------------------------------------------------- working hard | for your success -------------------------------------------------------- Registergericht Munchen HRB 113466 USt.-IdNr. DE 180017238 Steuer-Nr. 802/40600 Geschaftsfuhrer: Hubertus Wagenhauser -------------------------------------------------------- Nachricht von: dirk.schreiner@tria.de Nachricht an: suse-security@suse.com # Dateianhange: 0 Die Mitteilung dieser E-Mail ist vertraulich und nur fur den oben genannten Empfanger bestimmt. Wenn Sie nicht der vorgesehene Empfanger dieser E-Mail oder mit der Aushandigung an ihn betraut sind, weisen wir darauf hin, da? jede Form der Kenntnisnahme, Veroffentlichung, Vervielfaltigung sowie Weitergabe des Inhalts untersagt ist. Wir bitten Sie uns in diesem Fall umgehend zu unterrichten. Vielen Dank The information contained in this E-Mail is privileged and confidental intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient or competent to deliver it to the intended recipient, you are hereby notified that any dissemination, distribution or copying of this E-Mail is strictly prohibited. If you have received this E-Mail in error, please notify us immediately. Thank you

On Jul 21, Dirk Schreiner <dirk.schreiner@tria.de> wrote:
Markus Gaugusch schrieb:
Yes, it breaks forwarding. But facing the amount of spam, the number of mails that bounce because of incorrect (old-style) forwarding should be neglegible. incorrect (old-style)? Could you please post the RFC with the "new-style".
SPF suggests remailing instead of forwarding. I'm pretty sure that this does not bother any RFC. The old method may not be incorrect, but it is just incompatible with SPF. Sorry for the wrong wording. Your suggestion with signatures are also nice, but I think that 1 million administrators are easier to convince to perform infrastructure upgrades, than billions of (mostly stupid) users. I don't think that SPF is so bad, and I haven't heard of any other problems than forwarding. Digital signatures, though, are something that probably not even everyone on suse-security has tried. And I don't want to see the next MS Outlook version with integrated signatures that will break like everything else they make. Infrastructure security should be done by administrators, not by end users. Although there are still too many stupid admins out there :( And yes, I know, that the forwarding problem doesn't hit me, but the innocent receiver who forwards mail from my account to his SPF-protected domain via a non-SPF aware host in the middle. But if that case happens, I could either send mails to him directly, or try to convince the "middle" host owner to do something against the sky-raising amounts of spam and do remailing instead of forwarding.
Dirk Going sleeping.
BTW: if anybody is not amused about that long signature. I cannot go around this because company GW is doing that. And using my host`s SMTP-Server is not possible due to people checking Reverse-Lookup and doing SPF. :-/
You could at least use sigdashes ("-- ", the trailing blank is important!) to make users of good mail clients not-so-annoyed :) Markus -- __________________ /"\ Markus Gaugusch \ / ASCII Ribbon Campaign markus(at)gaugusch.at X Against HTML Mail / \

Eric Kahklen wrote:
Any ideas??
Configure Postfix to relay mail only for authenticated users. The TLS/SASL sections of <http://www.postfix.org/docs.html> should be helpful for you. -- Mit freundlichen Grüßen / Yours sincerely Dipl. Inform. Ralph Seichter HORUS-IT Ahornweg 10 D-57635 Oberirsen Tel +49 2686 987880 Fax +49 2686 987889 http://horus-it.de/

Quoting myself:
[...]
Oops! This was meant to be sent as a reply to a different message on a different mailing list. I probably should not use two mail clients at the same time. :-) Sorry folks! -- Mit freundlichen Grüßen / Yours sincerely Dipl. Inform. Ralph Seichter HORUS-IT Ahornweg 10 D-57635 Oberirsen Tel +49 2686 987880 Fax +49 2686 987889 http://horus-it.de/
participants (12)
-
Alan Hadsell
-
Andrew Edunov
-
Arjen de Korte
-
Dirk Schreiner
-
Eric Kahklen
-
John Andersen
-
Lars Ellenberg
-
maarten van den Berg
-
Markus Gaugusch
-
Ralph Seichter
-
Roman Drahtmueller
-
suse@rio.vg