Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 4 Jan 2003 15:26:41 -0800
From:      David Schultz <dschultz@uclink.berkeley.edu>
To:        Terry Lambert <tlambert2@mindspring.com>
Cc:        Dave Hayes <dave@jetcafe.org>, dever@getaclue.net, freebsd-chat@FreeBSD.ORG
Subject:   Re: Bystander shot by a spam filter.
Message-ID:  <20030104232641.GA587@HAL9000.homeunix.com>
In-Reply-To: <3E1637C6.42ADF04A@mindspring.com>
References:  <200212302207.gBUM74175262@hokkshideh2.jetcafe.org> <20021230235954.GB2072@HAL9000.homeunix.com> <3E10FD38.87438C83@mindspring.com> <20030103095508.GA10237@HAL9000.homeunix.com> <3E15E208.18128D71@mindspring.com> <20030103214648.GE10237@HAL9000.homeunix.com> <3E1637C6.42ADF04A@mindspring.com>

next in thread | previous in thread | raw e-mail | index | archive | help

Thus spake Terry Lambert <tlambert2@mindspring.com>:
> David Schultz wrote:
> > A DNS-based solution doesn't save you from IP spoofing
> 
> You are safe from "IP spoofing", because any such attacks would
> result in the SYN-ACK going back to the spoofed system, rather
> than to the system that was spoofing the IP.  Therefore a TCP
> connection would never be established, and it's not a problem.

Right, you need to be able to sniff at least one packet in order
to initiate or hijack a connection this way.  I guess we'd better
throw away the last remaining hubs out there and replace them with
switches.  Oops, ARP is insecure.

> > and other routing-based attacks.
> 
> Everyone turns off source routing.  It's not on, and if it's on on
> your routers, expect people to refuse to peer with you.

I'm not referring to source routing.  Say you're an unscrupulous
ISP and want to send SPAM, and your recipients peer with you.  You
advertise to your targets that you have a really great route to
microsoft.com, and thereby masquerade as microsoft.com.  Now maybe
BGP 4 has a mechanism to fix that, and maybe the attack is a bit
far-fetched if you're trying to send millions of messages, but my
point is that one shouldn't base the integrity of email on the
integrity of a network that isn't secure.

Another problem one might want to solve is that any user with a
shell account on a system can spoof any other user on the system.
If one of those trolls had an account on the freebsd.org cluster,
for example, you'd never be able to determine who is the *real*
Matt Dillon.  ;-)  Hence, per-user public keys.

> > Also, in your system the people running the network write
> > the policy, not the people receiving the mail.

Apologies to Cliff for the grammar of this sentence.  :-O

> > Will the ISPs
> > in Taiwan implement a policy that I can agree with, or do I
> > have to blackhole all of Taiwan?
[...]
> If you dislike your ISP's policy, then take your patronage to a
> different ISP, if you choose to rely on renting time on an ISP's
> mail server, instead of running your own.
[...]
> > You still need an authority in the system, perhaps to sign
> > personal keys.
> 
> Not personal keys, domain keys.

The problem is that the ISP sending mail to my ISP gets to dictate
part of the policy.  I can say, ``I trust this ISP'' or ``I don't
trust this ISP'', but I can't say ``I trust certain users on this
ISP''.  Many people, particularly in southeast Asia, become
victims when their ISP gets blackholed for tolerating SPAM.  We
can begin to address this problem if we can cryptographically
identify individual users on each system.  (As I mentioned
earlier, any sort of trust authority in the system would have to
be wary of potential abuses, such as creating lots of bogus user
accounts for the purpose of sending SPAM.  Perhaps this issue
could be addressed by having a nominal registration fee, but the
problem is orthogonal to the present discussion.)

> In any case, I hope it's pretty clear that this type of thing is
> completely workable, no problem, and support copetition, and
> personal choice in relaxation of criteria, at least to the
> terminal mail server, at which point the connection and envelope
> information is implicitly destroyed, as the mail leaves the SMTP
> transport.

Yes, either your scheme or mine would be easy enough to implement.
The fact that we disagree about some of the details is minor.  PGP
already has most of the required functionality, although if I were
to do it, I wouldn't do it in the same way as PGP.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-chat" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030104232641.GA587>