Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
The Internet Security Spam Your Rights Online

Yahoo Submits DomainKeys Draft To IETF 350

NetWizard writes "According to a mailing list post at the IETF, Yahoo's website and a Wired News story, Yahoo has made the DomainKeys draft public and submitted to the IETF." Russ Nelson explains "Basically, your MTA uses RSA-SHA1 to sign the headers and body of your email and inserts that signature before sending the email. The recipient MTA looks up $selector._domainkey.$domain in the DNS, gets your public key, verifies it, and inserts a notice. There's also a SourceForge project for a DomainKeys library." An anonymous reader asks "It seems to me that it doesn't offer anything more than the Sender Policy Framework by pobox.com, other than doing relay-based signing of the messages to provide the sender verification. SPF has already grown to over 14,000 domains so far and only requires an addition to your DNS to support (from the sending side). Verifying messages on the receiving MTA is as simple as doing a DNS lookup, most MTAs can support SPF now, the code is available and well tested. What advantages to people see in Domainkeys over SPF that are actually useful, and what standard should people implement?"
This discussion has been archived. No new comments can be posted.

Yahoo Submits DomainKeys Draft To IETF

Comments Filter:
  • To understand... (Score:5, Interesting)

    by Mz6 ( 741941 ) * on Wednesday May 19, 2004 @10:08AM (#9194903) Journal
    OK... It seems that SPF would have a little easier setup, only requires setup on one side. While DomainKeys would have more of an upfront cost to get it working and setup costs on both sides. However, pobox.com has theirs software up an working while Yahoo only has a working document to offer proof of concept. I would like to see Yahoo's example up and running and see how it would compare once out in the wild.
  • by Random Web Developer ( 776291 ) on Wednesday May 19, 2004 @10:09AM (#9194908) Homepage
    Email needs to get a few new features like gpg or this to fight spam, viruses and spoofing pranks.

    And it better be an open solution not a proprietary one.

    The only way I can see something like this happening though is if a few major backers get behind the same thing and most mta's/clients (depending on what the agreed upon implementation is) start supporting it.
  • Patent Licensing (Score:2, Interesting)

    by Anonymous Coward on Wednesday May 19, 2004 @10:09AM (#9194912)
    Can anyone see if it has a harmful patent license like Microsoft's Caller-ID?
    There's more info on why CID's patent license is harmful at the boycott caller id for email [boycall-em...ler-id.org] site.
  • by Anonymous Coward on Wednesday May 19, 2004 @10:10AM (#9194931)
    SPF breaks forwarding. Domainkeys doesn't. That alone is a serious enough problem that I can't implement SPF.
  • Re:Patent Licensing (Score:2, Interesting)

    by Mz6 ( 741941 ) * on Wednesday May 19, 2004 @10:14AM (#9194963) Journal
    Good info.. However it mihgt be nice to post the actual address without the misspellings. boycott caller id for email [boycott-em...ler-id.org] site.
  • Re:Expensive... (Score:4, Interesting)

    by Anonymous Coward on Wednesday May 19, 2004 @10:17AM (#9194982)
    Even better, because then spam won't be possible if it's computationally intensive.
  • by eric76 ( 679787 ) on Wednesday May 19, 2004 @10:36AM (#9195129)
    I think it is far superior to SPF.

    You have a known e-mail server that can vouch for each e-mail that it sends on behalf of it's customers. It is far tighter than SPF.

    The one problem with domainkeys (based on my understanding of it) is that it just verifies that the e-mail came from the domain. It doesn't verify that the sender is the real sender.

    What I'd prefer is for the e-mail servers to generate a separate PGP or GPG key for each user for signing the e-mail and signing only those e-mail sent by an authenticated user on the machine.

    And instead of providing the key by DNS, extend SMTP to handle a key request.

    When your server received an e-mail, say from joeblow@example.com, it would check the signature. If the public key for that sender wasn't cached, it would connect to the host the e-mail would come from if it is legitimate and request the key for that user.

    It could also be done via mail. Send a request to joeblow-publickey@example.com and the sender would automagically reply with the public key for joeblow@example.com.

    And it would be possible for a user to provide his public key to the server for it to use. That way, he could sign his own message instead of the e-mail machine.
  • Re:PGP? (Score:3, Interesting)

    by eric76 ( 679787 ) on Wednesday May 19, 2004 @10:41AM (#9195174)
    Why not have the e-mail server generate a PGP or GPG key to sign e-mail for authenitcated users who don't sign their own e-mail.

    The purpose would be to prove to the recipient that the e-mail came from someone who authenticated themselves as the person listed as the sender. You couldn't use it for non-repudiation purposes.
  • by FattMattP ( 86246 ) on Wednesday May 19, 2004 @10:49AM (#9195228) Homepage
    Can you explain why you feel SPF is broken? Is it because of forwarding? From your own post it appears domainkeys is broken because you can't add headers without re-signing the message. I don't see the difference. No anti-forgery effort is going to be compatible with how how email works today. Something is going to have to change for improvements to happen.

    Not trolling here. I just want you to back up your "broken SPF" statement.

  • by notsoclever ( 748131 ) on Wednesday May 19, 2004 @10:51AM (#9195235) Journal
    SPF seems to be an IP-address-based whitelist mechanism. Which means that every possible host which might be serving as an MTA needs to be listed in my whitelist. That's all well and good for a home or office user, but what about when you travel and you're stuck sending mail from, say, the hotel's port 25-filtered network which requires that you use their SMTP server? And what happens when someone just uses that SPF record to see which systems will relay email for my domain and then just uses that server to send out lots of spam which looks like it originates from me, and then even worse is "proven" to be authentic?

    smtpauth isn't always an option, and most DNS hosting providers don't make it terribly convenient to keep on adding and removing temporary TXT records as necessary, nor would a company's IT department be terribly happy about needing to do the same for corporate travellers.

    What needs to happen instead is a domain having a public key registry (probably provided via NAPTR records; just do a NAPTR query on, for example, username.example.com and then get either NXDOMAIN or the public signature) and then signed messages. Of course, the fun thing then is the limit of the size of an NAPTR record, so it'd have to be a pretty small key. For this purpose I don't think it's necessary to have more than a 128-bit key or so, though, especially since discarding keys is so trivial (just set a TTL of 30 on the records and use dynamic DNS updates or whatever).

  • advantage over SPF (Score:3, Interesting)

    by theonlyholle ( 720311 ) on Wednesday May 19, 2004 @11:00AM (#9195335) Homepage
    I think the main advantage over SPF is that this approach doesn't break forwarding as horribly as SPF does. Yes, you can do envelope rewriting for forwarded messages, but Yahoo's approach doesn't require that *all* the servers along the way support it.
  • by m.h.2 ( 617891 ) on Wednesday May 19, 2004 @11:00AM (#9195342) Journal
    "And it better be an open solution not a proprietary one."

    Unfortunately, the only way a solution is going to be widely accepted enough to be useful is if, like you say, "a few major backers get behind the same thing..." and this most likely will not happen if the solution is not proprietary so that said backer(s) can make some solid $$ from it. The real problem with this is if the public has no input and is not allowed to scrutinize it, we'll likely see a plethora of holes for years after, essentially leaving us where we are right now. At this point, I'm just about ready to throw my hands up and start hoping for a whole new means of communication rather than wait for email to be fixed.
  • by Russ Nelson ( 33911 ) <slashdot@russnelson.com> on Wednesday May 19, 2004 @11:09AM (#9195419) Homepage
    Yes, you will need the ability to publish TXT records. SPF, EMail Caller ID, FreeS/WAN, and DomainKeys all require TXT records, so you won't be the only person beating up your DNS service to get the ability to publish them.

    No, DomainKeys does not require reverse DNS.
    -russ
  • by Mr 44 ( 180750 ) on Wednesday May 19, 2004 @11:10AM (#9195428)
    Looks like yahoo requires you not to sue them also: "licensee agrees not to assert against Yahoo..."

    I don't see how that could be objectionable...

    And the points on http://boycott-email-caller-id.org/ are nonsensical.
    • It conflicts with existing, open projects with the same goal.
      So What? I think its great that there are multiple proposals out for the same goal, may the best one win. Or is there going to be a boycott-photoshop.org since Adobe is writing software that conflicts with GIMP?
    • It is patent-license encumbered.
      Doesn't look to "encumbered" to me. Its free for anybody to use, even in GPL code, as long as you pass along the license agreement. Or wait, would that be considered "Viral licensing" like the GPL itself? :)
    • It is not the de-facto standard
      WTF? Its not the standard - in other words, they are trying to innovate! We wouldn't want someone come up with a new way of doing things. Were these people around in 1994 saying "who needs HTTP/HTML, gopher/archie/wais is the de-facto standard".
      Also, SPF is quite far from being "the standard". It might have 10,000 hosts, but how many users send mail through those hosts? Face it, until aol/yahoo/hotmail pick something, it wont be the standard.
    • It is not an RFC
      Read this article [emailbattles.com] which points out that boycott-email-caller-id.org is biased, and wrong. That article links to this msg from microsoft [imc.org] where they say they are working on submitting it.
    • It is more verbose
      I'm no expert on either of these formats, but it appears that hotmail is sending back a lot more data (unique IP addresses). Thats more a server-config issue for hotmail.com vs aol.com than any comment on the protocol. Obviously XML has more overhead, but this example is contrived. A real apples-to-apples comparison would be returning the exact same data in each format...
    • This site is not affiliated with any anti-spam solution. How dare they even claim that? The site is so obviously shilling for SPF its rediculous.
  • by duncanthrax ( 149400 ) on Wednesday May 19, 2004 @11:13AM (#9195459) Homepage
    Yes, the forwarding is my main gripe with SPF. The proposed workaround is ugly at best.

    The other main problem is SPFs misunderstanding of the role of the envelope sender. It is nothing more than a return address for bounces. It does not securely identify the sender or his domain.

    But then, I admit it is unfair to compare SPF with Domainkeys. They do completely different things on a different "level". You could say that Domainkeys is closer to the user, because they can choose to trust email with their user agents. I think this is the better path to take.

  • SPF/DK is wortless (Score:3, Interesting)

    by apavel ( 544053 ) on Wednesday May 19, 2004 @11:23AM (#9195555) Journal
    It is known that most spam-sending machines is trojaned computers on broadband networks with clueless owners.

    I think the only way this problem can be solved by ISPs with firewal between Internet and end-users. And may be sell unfirewalled connection to power users.

    With SPF/DK spammers will just register bogus domains ($30 and may be even less for single domain in .com with possible endless subdomains), configure SPF/DK DNS records and send spam.

    As always, sorry for my bad english, I hope you understod me :-)
  • by Just Some Guy ( 3352 ) <kirk+slashdot@strauser.com> on Wednesday May 19, 2004 @11:27AM (#9195588) Homepage Journal
    I admin several FreeBSD mailservers. I've added SPF records to the DNS for all of my domains, but I'd like to start using it to tag incoming email. Unfortunately, I'm not having much luck finding Sendmail milters (or other plugins) that 1) aren't written in Perl and seem to require half of CPAN, or 2) don't require much patching of Sendmail itself.

    Are there any lightweight milters that would work under FreeBSD that I could use to start using SPF on production systems? While I certainly won't be filtering out unknown mail at this time, I'd like to start inserting result headers to see how accurate it is in the real world.

  • by ahg ( 134088 ) on Wednesday May 19, 2004 @11:39AM (#9195693)
    I find the broken forwarding to be the biggest problem with SPF. -- Their solution SRS, rewriting the Envelope addresses so that the middleman then handles all the bounces seem like a definite kludge. (You can read about it here [pobox.com]

    As someone who provides hosting for small companies and usually uses /etc/mail/virtusertable to forward mail for customer domains, I don't want my setup/setup tools broken by having to implement a more complex mechanism and in turn have a higher server load handling bounced messages when a client's mail box is filled.

    While I haven't read the DomainKeys proposal, it has occurred to me before that a variation on SPF with encryption could be implemented without having to extend the ESMTP protocol. TTBOMK (To the Best of My Knowledge) ESMTP allows you to send parameters following the "MAIL FROM" command and these parameters would be preserved as part of the message envelope when forwarding. It would seem to me that an PGP/GPG, private key, encrypted string sent as a parameter would allow updated MTAs to verify the original source by decrypting the string with the orignating servers published public key. How does one publish their public key? Simple, use the TXT record in DNS (similiar to SPF's use of DNS). At the same time, this shouldn't in anyway break compatability with receiving SMTP servers that don't recognise the new parameter.

    While I haven't RTFA, this has been on my mind for a while, as a "better than SPF" solution and I'm sharing it here. How do you think it stacks up to SPF/DomainKeys?
  • by Mazzie ( 672533 ) on Wednesday May 19, 2004 @11:54AM (#9195818)
    Why can't someone develop a standard and software to make e-mail communication similar to how instant messaging works?

    With ICQ I have amazing control over who can communicate with me. I'm sure it would not be as effective for business users that need their email to be public, but IMO it would be 100% better than the current situation.

    Worst case you could have a "public" e-mail address with loose restrictions and a "private" e-mail address with tight restrictions so you wouldn't have to dig through 100 viagra spams to find that important business communication from a trusted pool of associates.
  • by ajs ( 35943 ) <{ajs} {at} {ajs.com}> on Wednesday May 19, 2004 @12:17PM (#9195984) Homepage Journal
    SPF/SRS have serious problems including the inability to hop through more that 1-2 relays before the from address becomes a problematic amount of data (multiple cryptographic hashes).

    SPF is about overloading existing slots in RFC2822 and DNS in order to cram authentication data into the protocols. The link above cites an alternative that is about replacing the existing protocols with brand new ones.

    Both are, IMHO, poor solutions and DomainKeys might just be the correctl long-term solution.

    Personally, I was working on a proposal for a way to use existing headers [ajs.com] by adding a slightly out-of-band channel for authenticating mail, but if DomainKeys beats me to it, sounds fine to me.
  • by ajs ( 35943 ) <{ajs} {at} {ajs.com}> on Wednesday May 19, 2004 @12:24PM (#9196033) Homepage Journal
    While you are correct, SPF is the wrong solution [tesco.net]. Like AOL's "we only accept mail from corporate entities" policy, SPF's solution throws out a good chunk of the baby along with 80% of the bath-water.

    The road toward reliable, authentication of mail is long, and we've only just started... hopefully our few first missteps will be corrected as we go.
  • by Dark Coder ( 66759 ) on Wednesday May 19, 2004 @12:26PM (#9196063)
    The primary reason for DomainKeys HUGE advantage over SPF is prevent Spammer from fishing for a valid username (for more spamming).

    With the SPF, spammer (and other evil deities) can perform trial and error DNS (starting with a basic dictionary then rolling odometer attack) for a successful username with brute-force.

    With DomainKeys, you must compute the SHA1-MD5 and even then, you may or may not get a valid username.

    I prefer SPF as a short-term protection whereas DomainKeys is the more correct solution.
  • by 4of12 ( 97621 ) on Wednesday May 19, 2004 @12:26PM (#9196065) Homepage Journal

    I'm hard pressed to come up with a situation in which this would be a real problem. Anyone?
    From: joesrealname@bigcorp.com
    To: janereporter@nyt.com
    Reply-To: joesfakename@yahoo.com
    --
    Big Corp has been paying large sums of money to politician X to get those big contracts. Here's a scanned memo showing this abuse. If anyone asks, leave my name out of it.
    Joe Whistleblower could lose his job if his "real identity" has to be exposed.
  • by mengwong ( 444067 ) on Wednesday May 19, 2004 @12:28PM (#9196100)
    Hi.

    SRS is a pain in the butt, and the comments in this thread agree.

    I have been mulling over alternative ways to solve the forwarding problem.

    Would people like SPF better if we replaced SRS with a less onerous workaround?

    If so, and if the workaround is agreeable, I think the last remaining technical hurdle goes away; all that is left to do is get buy-in from all the major industry players. I can try to do that next week.

    cheers
    meng
  • by iwadasn ( 742362 ) on Wednesday May 19, 2004 @12:41PM (#9196241)
    What we need is so simple, DNS security. The root servers have private keys which are well known. They hold public keys for the tld servers. When you look up your tld server, get the public key too. Tld servers hold public keys for lower DNS servers, etc... recursive system, etc... This has several advantages.

    1) No more public key madness. Everyone's public keys are part of the DNS system if you have a domain name. Simple, easy. Everything can be ssl with the press of a button, no need to setup keys.

    2) Now require that the sender of email signs the email with the appropriate (as determined by DNS) key.

    Simple, easy, problem solved. No more email spoofing, no more certificate BS. WHen you get a domain name, you register your public key (for free, presumably) and you're done.

    So you might ask, why hasn't this been done before? The answer has something to do with the fact that Verisign controls the TLD servers, and makes a killing off of selling Certs. So if this caught on, no need to pay for certs, and that's bad for Verisign, so they'll torpedo any such proposal.

    This idea has been around for a long time, perhaps it should finally be implemented this time.

  • by iamcf13 ( 736250 ) on Wednesday May 19, 2004 @01:10PM (#9196487) Homepage Journal
    1. Route all outgoing port 25 traffic through the sender's ISP mailserver NO MATTER WHAT.

    2. If 1. is not done then use:
    a. POP-BEFORE-SMTP to curtail unauthorized mailserver use. This is the simplest authentication scheme to use.

    b. Otherwise only allow connections to bonafide mailservers. All other connections are refused (no more proxy access).

    3. The recipient mailserver REFUSES to act as a 3rd party relay to relay email messages for the other two parties. The sender mailserver should look up the recipient's mailserver and directly talk to it instead.

    4. The controversial step would be to employ spam filtering at the SMTP/DATA phase of the email transmission. Once the sender mailserver sends the recipient mailserver the email message, it is scanned for 'spamminess' and, if deemed spam, is rejected with a '421 try again' code to disconnect and slow down spammers or outright reject the message with a '570 THIS IS SPAM!' code and wait for the sender mailserver to disconnect. I wouldn't advise this as a rouge mailserver spewing spam could simply keep the connection open and tie up the recipient mailserver's resources.
  • Domain Keys principle weakness is in a replay attack. Here's how to do it.

    A spammer sends a single email from his Yahoo! account to himself. He takes the sent message, encrypted with domain key, and then sends this message billions of times to servers across the planet. Since the message is encrypted with Yahoo!'s domain key, it is apparently authorized by Yahoo!.

    Domain Keys without SPF won't work, because SPF says which servers are allowed to send email, while domain keys just says an email was signed by a particular key. If Yahoo! had SPF records as well as domain key records, the spammer would have to infiltrate a valid Yahoo! mail server to send the mail.
  • by CustomDesigned ( 250089 ) <stuart@gathman.org> on Wednesday May 19, 2004 @02:17PM (#9197063) Homepage Journal
    You don't need to currently because AOL doesn't check SPF. (They only publish it.) Should they decide to begin checking SPF, then hopefully they are competent enough to do it correctly - so you still don't need to. If not, then their incompetence in handling email will likely lose some mail - SPF is not required for incompetence to have that effect.

    In general, forwarders are selected by the email recipient and handling them correctly when implementing SPF is the responsibility of the email recipient. It is easy for the recipient to "punt" as a first step to implementing SPF and simply add Received-SPF headers without actually rejecting anything. The Received-SPF headers are remarkably effective at aiding content filters to do their job.

HELP!!!! I'm being held prisoner in /usr/games/lib!

Working...