LWN: Comments on "SPF on vger" https://lwn.net/Articles/187736/ This is a special feed containing comments posted to the individual LWN article titled "SPF on vger". en-us Mon, 25 Aug 2025 19:28:26 +0000 Mon, 25 Aug 2025 19:28:26 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net SPF on vger https://lwn.net/Articles/189057/ https://lwn.net/Articles/189057/ neilbrown I think there is one potential usage of SPF that is very simple and<br> should cut down a fair bit of noise in SMTP-space with no real loss of<br> value.<br> <p> That is: if an incoming message doesn't get a clear SPF-PASS, then<br> don't every send an automatic reply to it. This means no<br> delivery-failure reports, and no vacation messages.<br> <p> I think it is much better that these don't get sent at all than that<br> they get sent to the wrong place.<br> <p> Providing you use the standard 'guess' for domains that don't publish<br> SPF, you still send most of the report that you need to. And if this<br> was widely adopted, it might even act as a gentle stick to encourage<br> more people to regularise the mail sending, and always send through<br> the right MTA...<br> <p> Sat, 24 Jun 2006 00:52:55 +0000 SPF and vger https://lwn.net/Articles/188934/ https://lwn.net/Articles/188934/ SDGathman SPF is not for everyone - that is why it is optional. However, it is a good fit for vger. The forwarding problems are caused by incorrect *checking* of SPF (neglecting to compile or check a list of non-SRS forwarders), and doesn't affect publishers unless the receiver is *really* braindead and, for example, checks SPF from behind their MX (a common first time user error).<br> <p> The proposed vger application involves publishing an SPF record. The only potential forwarding issue for publishers is web greeting card type sites that don't use their own domain for the return path. This is not a problem for vger.<br> <p> I have been publishing and checking SPF in production for 2 years. Most of the complaints from anti-SPF people are based on misunderstandings. For instance, the "forwarding problem" is a "doctor it hurts when I do this" problem. If you have no idea who you get forwarded mail from (even though you set them all up), then don't check SPF. Problem solved. <br> <p> SRS is actually not a good solution to handle forwarders. Simply listing the forwarders is much cleaner. Listing them is easier if the forwarders publish SPF - cause then you know their IPs automatically. SRS is useful as a BATV alternative that also handles relaying.<br> <p> The roaming sender problem is elegantly solved using SMTP AUTH - which has been widely available for at least 10 years.<br> <p> If you publish CSV, you might as well publish SPF for your HELO names and pick up SPF checkers as well (caveat, only if HELO name is distinct from MFROM domain - an SPF namespace collision wart).<br> <p> <p> Fri, 23 Jun 2006 03:24:58 +0000 SPF, joe jobs, and phishing https://lwn.net/Articles/188925/ https://lwn.net/Articles/188925/ kitterma How many of those solutions are accessible to someone who doesn't run their own dedicated mail server?<br> Thu, 22 Jun 2006 23:51:35 +0000 SPF, joe jobs, and phishing https://lwn.net/Articles/188924/ https://lwn.net/Articles/188924/ kitterma None of which are implementable by someone who isn't running their own mail server and using custom software. With SPF, with all it's flaws, any domain owner that can publish a TXT record in their DNS can gain some protection.<br> <p> SPF checking may be relatively rare, but in my experience it is enough that within a month of publishing a -all SPF record, bounce messages due to forged sending using my domains ended. There is enough SPF checking going on to provide deterrence. <br> <p> SPF is a horrible idea in theory. In practice, unless your user base sends to peope who do a lot of forwarding, it works pretty well for many domains. Eventually, it will be obsolete because something better will come along. In the meantime, it does the job for me and lots of others.<br> Thu, 22 Jun 2006 23:48:02 +0000 SPF on vger https://lwn.net/Articles/188843/ https://lwn.net/Articles/188843/ forthy <p>I agree that SPF is not a good idea, but I support it (not just lip service), for two purposes:</p> <ul><li>it gets me rid of all those "security updates from Microsoft" before my virus checker gets to see them (since microsoft.com has a SPF record).</li> <li>it adds up to the pain for using SMTP that it might help to overthrow it - especially when it is adopted.</li> </ul> <p>I view SPF not as a solution to a specific problem, but as a nail on the coffin of SMTP, and I'm ready to adopt the next nail if I can find one.</p> Thu, 22 Jun 2006 15:54:02 +0000 SPF, joe jobs, and phishing https://lwn.net/Articles/188044/ https://lwn.net/Articles/188044/ dwmw2 <P>You didn't actually read the <A HREF="http://david.woodhou.se/why-not-spf.html">why not SPF</A> page linked above, did you?</P> In particuar, I was thinking of <A HREF="http://mipassoc.org/batv">BATV</A>. Not only does it instantly stop the bounces to mail you didn't actually send, but it also allows others to detect fake mail. Try faking <TT>MAIL FROM:&lt;dwmw2@infradead.org&gt;</TT> to any site which bothers with sender verification callouts to avoid mail from invalid addresses (like sourceforge, amongst many others). <PRE> 550-Verification failed for &lt;dwmw2@infradead.org&gt; 550-Called: 2001:4bd0:203e::1 550-Sent: RCPT TO:&lt;dwmw2@infradead.org&gt; 550-Response: 550-This address never sends messages directly, and should not accept bounces. 550-550-Please see <A HREF="http://www.infradead.org/rpr.html">http://www.infradead.org/rpr.html</A> or contact 550-550 postmaster@infradead.org for further information. 550 Sender verify failed </PRE> Thu, 15 Jun 2006 21:32:41 +0000 SPF, joe jobs, and phishing https://lwn.net/Articles/188032/ https://lwn.net/Articles/188032/ rfunk Note that I mentioned bounces being only part of the problem with <br> joe-jobs. <br> Thu, 15 Jun 2006 19:35:35 +0000 SPF, joe jobs, and phishing https://lwn.net/Articles/188031/ https://lwn.net/Articles/188031/ dlang like what?<br> Thu, 15 Jun 2006 19:32:52 +0000 SPF, joe jobs, and phishing https://lwn.net/Articles/188017/ https://lwn.net/Articles/188017/ dwmw2 There are much better solutions to the problem of bounces to joe-jobs. Solutions which don't require wholesale changes to the way that email works.<br> Thu, 15 Jun 2006 18:13:20 +0000 SPF, joe jobs, and phishing https://lwn.net/Articles/187997/ https://lwn.net/Articles/187997/ rfunk I agree that SPF is a bad idea, or at least one that demonstrates <br> insufficient understanding of the way SMTP is used in the real world. <br> <br> However, i can tell you from firsthand experience that joe jobs are a <br> real problem, and I can certainly understand why the victims of them <br> would be tempted to use anything that claims to be a solution. Not only <br> are joe jobs a problem due to blowback bounces, but also because they <br> harm the reputation of the victim domain, leading the domain to land on <br> private blacklists with no recourse for getting off. <br> <br> Of course, anyone tempted to publish an SPF record as a solution to joe <br> jobs needs to realize that it's only a solution to the extent that people <br> check the SPF records, and considering the type of blowback I've been <br> seeing, many places are still doing little or no spam filtering in the <br> first place, let alone checking something as questionable as SPF. <br> <br> It's also worth noting that forged mail is not limited to phishing <br> attempts; I consider phishing to be a separate problem. <br> Thu, 15 Jun 2006 17:12:29 +0000 SPF: yes, ma'am https://lwn.net/Articles/187970/ https://lwn.net/Articles/187970/ iabervon It's not surprising that it can't distinguish spam from ham, because it wasn't designed to distinguish spam from ham, contains no support for doing that, and the specification states that it does not do that. It is intended exclusively to distinguish forgeries, and spam is relatively rarely forged. It isn't intended to provide any benefit to the recipient; it's intended to benefit the innocent third party whose address the forger is using.<br> <p> Of course, it's too soon to use it; the rest of the email system is still such that legitimate operations are standardly done by essentially forging email. At present, there is no standardized and reliable mechanism for a desktop MUA to submit email to the system in a way that authenticates the sender (as controlling the reception of email to the address). And there's the mess with transparent forwarding. (I think SMTP is essentially just a big mess, like a lot of its contemporary protocols, which were done before people had a good understanding of how to design application-layer network protocols effectively.)<br> Thu, 15 Jun 2006 16:53:04 +0000 SPF: it's NOT AT ALL about SPAMfiltering... https://lwn.net/Articles/187976/ https://lwn.net/Articles/187976/ zmi People keep believing that SPF is to filter SPAM. That's not the target. <br> SPF can *only* say if an e-mail is forged or not.<br> <p> If you setup in SPF that from lwn.net only host 1.1.1.1 is allowed to <br> send, and some server checks SPF and gets a mail from lwn.net from host <br> 2.2.2.2, then it can discard it as forged. That's it.<br> <p> The fact that SPAM very often sends with forged addresses is just a side <br> effect. There are other tools for SPAM.<br> Thu, 15 Jun 2006 16:42:51 +0000 SPAM == Unsolicited bulk email. It's simple https://lwn.net/Articles/187917/ https://lwn.net/Articles/187917/ dwheeler I completely disagree. Spam has a simple and clear meaning: "Unsolicited bulk email"; it's sometimes called "UBE" instead. "Bulk" perhaps is a little ambiguous, but if you're sending out more than 1000 copies of an email, and the receivers didn't request it (e.g., by joining a mailing list), you are a spammer sending spam. <p> Some spam has trojans, or other nasty stuff. It's a good idea to protect against other kinds of malicious email. But usually the malicious email is ALSO spam. If we could get rid of spam, we'd greatly reduce any other kind of problem as well on email. Thu, 15 Jun 2006 14:26:48 +0000 SPF on vger https://lwn.net/Articles/187907/ https://lwn.net/Articles/187907/ pizza First, don't use the term 'spam', as it's so ambiguious ("unwanted e-mail") as to have no real meaning. Please use a more specific term; you want to deal with trojans or phishing mails differently than the latest Victoria's Secret catalog. <br> <p> Oddly enough, the former two tend to rely heavily on forged SMTP envelopes, which is precisely what SPF is intended to deal with, and it accomplishes that fairly well. Does it break certian practices? Well, yes. But what its detractors fail to understand is that this is a trade-off that many, many willingly make, especially when it is their reputation and/or money on the line.<br> <p> Don't forget that these problems exist because of the deficencies of the original SMTP (and yes, DNS) systems.<br> <p> "Requiring most of the world to participate" is actually a feature of the Internet -- the network is dumb; the end-points are smart. But it also makes change very hard to implement.<br> <p> As such, the disruption from replacing the whole schebang will be far greater, even though everyone agrees that it's what really needs to be done. And that will certianly break many things that work now.<br> <p> Incidentally, is there an "official" use for TXT records? "Arbitrary Binary Data up to 255 characters" sounds like there isn't, and a domain owner choosing to use that "arbitrary data" for purposes of reducing forged mail being sent under their domain certianly sounds like an appropriate use.<br> <p> Using DNS TXT records is a cool idea because it doesn't require any new infrastructure, unlike, for example, using PGP signatures, which works well on an individual basis but otherwise scales terribly due to the necessity of establishing trust anonymously.<br> Thu, 15 Jun 2006 14:04:49 +0000 SPF on vger https://lwn.net/Articles/187906/ https://lwn.net/Articles/187906/ cate As the open relay. It took a lot of time to close the mail servers, but now I think all major mail servers will reject the mail from open relays.<br> Thu, 15 Jun 2006 13:34:33 +0000 SPF on vger https://lwn.net/Articles/187895/ https://lwn.net/Articles/187895/ job SPF is a bad idea, with a terrible implementation. I can not understand <br> why anybody would want it. It accomplishes nothing since users care about <br> mail headers, not smtp headers. It breaks forwarding. It is impossible to <br> implement for all domains who actually use their TXT records for <br> something. And it requires most of the world to participate in their <br> scheme before they it's effective doing nothing.<br> <p> All this to combat joe-jobs, which aren't a problem to anyone. Spam is <br> the problem. Which got many SPF proponents to start lying and talk about <br> it as a spam solution. That was dishonest. I know you want to see your <br> pet project adopted around the world, but sorry, it is a braindead idea.<br> <p> But don't take my word for it, read what Allman, Bernstein, Venema and <br> all the other e-mail luminaries who actually know this stuff wrote. No <br> one thought it was a good idea, and with very good reasons too.<br> Thu, 15 Jun 2006 12:51:02 +0000 SPF: yes, ma'am https://lwn.net/Articles/187886/ https://lwn.net/Articles/187886/ nim-nim Given the spam/ham ratio nowadays, *any* filter even a random filter will drop spam/forgeries.<br> <p> The question is not if it's capable of dropping bad messages, but if it can reasonably distingish spam from ham.<br> <p> So far the evidence in SPF doesn't.<br> Thu, 15 Jun 2006 11:50:16 +0000 SPF: yes, ma'am https://lwn.net/Articles/187867/ https://lwn.net/Articles/187867/ zmi SPF is great in helping identify if an incoming e-mail is forged or not. <br> Imagine a server connects to yours saying "I send mail from <br> Bill.Gates@microsoft.com to your x@y.z user". Until now, you had to <br> deliver those, trusting ALL servers on the bad-bad Internet. With SPF, you <br> can look @microsoft.com if it allows that specific server to send mail <br> from microsoft.com, and if not, you can just drop the connection.<br> <p> This way, lots of forged e-mails are prevented, resulting in fewer <br> problems (here on our servers, YMMV). I've had the problem once that <br> somebody sent in my name a bad e-mail to our customers - but since SPF <br> that problem is gone.<br> <p> The "only" downside is e-mail forwarding. I've had some itches, and it's <br> not really nice. SRS is too complicated. But until somebody gives me a <br> better/easier/nicer way to prevent forged e-mails, SPF is my protection of <br> choice. I'd recommend you turn on checks to SPF on your mailserver, and <br> see lots of forgeries being dropped.<br> <p> mfg zmi<br> Thu, 15 Jun 2006 10:11:46 +0000 SPF is dead. Long live CSV ! https://lwn.net/Articles/187833/ https://lwn.net/Articles/187833/ copsewood SPF is a good idea, but in my understanding a badly flawed implementation. This only protects the envelope Mail From (and maybe the HELO) header and (probably rightly) makes no attempt to protect the mail body From: . Trying to make the internal headers meaningful to the human mail recipient is Microsoft's take on this (Patented SenderID which they call SPF version 2) but this makes this concept even more complex and unworkable (as the XML SenderID format is too slow and unreliable in connection with DNS use). Mail authentication technologies which don't protect the body From: can still carry phishes which fool human mail recipients but which appear to authenticate at the MTA level. Technologies which do attempt to protect mail internal headers are more likely to break existing practice. For those wanting the complexity of full message as opposed to just envelope authentication, DomainKey signed mail makes more sense, but still has weaknesses in connection with misleading domain names. <p> Other than for helping with whitelisting known acceptable mail senders, which you will only be able to do for high volume senders you know and trust, SPF is little used in practice despite the very many domains which have published SPF records. Because of the forwarding problem mentioned in the article, SPF does not give clear enough automated filter choices for MTAs to know whether a domain that publishes a SPF record stating what its legitimate mail sending addresses are, should not appear on envelopes of email coming from elsewhere. <p> Having successfully implemented this, in my view <a href="http://mipassoc.org/csv/"> CSV http://mipassoc.org/csv/ </a> makes a lot more sense for a robust and straightforward MTA rejection-capable technology which ensures the domain of the MTA sending mail across administrative boundaries accepts responsibility for doing this. It solves many of the problems associated with SPF because CSV only concerns the domain in the HELO envelope header. <p> 1. Any domain owner capable of publishing DNS for their domain can state an origin IP address for any subdomain claimed in the HELO header. Suppose someone is sending mail directly to your MTA from a dynamic IP host. Currently you would have good reasons to reject this based on an dynamic IP DNSBL. The collateral damage from this penalises hobbyists running their own mail setups from any dynamic IPs and even static IPs which PTR to script-generated domain names. However, if the HELO domain publishes a CSV record for this IP address and has a good reputation, with CSV you can safely accept this mail. If the HELO domain: <ul> <li> a. doesn't have an acceptable reputation based on an RHS DNSBL or </li><li> b. corresponds to a PTR subdomain of the IP block owner who uses CSV to state that mail from this domain subtree should not carry their domain name on HELO envelopes, </li></ul> In either case your MTA can safely reject such messages. <p> 2. When it becomes possible to establish the domain responsible for directly sending or relaying a message, collaboration determining domain reputations for automated filtering decisions will become much more reliable than trying to do the same job based upon IP addresses. Currently only the IP address on a spam says anything reliable about its origin, and this is usually a compromised Windows zombie. Trying to reject or filter on this basis is analogous to determining the origin of a single sand particle on a moving beach. Thu, 15 Jun 2006 07:06:07 +0000 SPF on vger https://lwn.net/Articles/187834/ https://lwn.net/Articles/187834/ bangert <p> SPF is harmful. Adopt it.<br> <a href="http://homepages.tesco.net/J.deBoynePollard/FGA/smtp-spf-is-harmful.html">http://homepages.tesco.net/J.deBoynePollard/FGA/smtp-spf-...</a><br> Thu, 15 Jun 2006 06:44:05 +0000