Conversation:
Notices
-
@mk @rozzin you miss the point. A spam domain can have a strong SPF record. But if bank.com published a strong SPF record, it would be easy to identify email from bank.com
- Joshua Judson Rosen repeated this.
-
@boneidol no, sorry, but you miss my point. SPF only validates the *sender* address (that's what's on the *envelope*) by looking if the sending mail server is authorized to send mail for the domain the sender address belongs to. This check is done before the mail content is processed. A spammer could easily set up a domain and a sending server authorized to send mail from…
-
@boneidol, I'd rather bank on #DKIM. Or #PGP. Or S/MIME.
-
@boneidol, we need to get past the idea that !crypto's too complicated & too slow for everyday use. It works better than the alternatives.
-
@boneidol @rozzin it seems you miss my point, too - see http://oracle.skilledtests.com/notice/886285
-
I should set DKIM up on some domains.
-
@mk, I'm pretty sure you and I are in agreement about SPF vs. DKIM/PGP/SMIME: all of that latter group operate on the message, not the envelope, and verify the origin in a user-compatible way regardless of the delivery path.
-
@mk, you're actually being too nice to #SPF: it doesn't even verify the envelope sender beyond the last hop in the delivery path. It (sort of, sometimes...) `facilitates' traceability... but depends on `everyone else' doing work: the people who want to benefit from SPF need SRS all allong both their inbound and outbound delivery paths, and the people who'd need to implement SRS aren't the ones who benefit from SPF.
-
@rozzin that sounds like the evolution of spam origin analysis: first, all Received: headers were checked; but then it was seen that those could actually be spoofed, too - *except* for the origin machine of the last hop. Looks like SPF picked up on that 'wisdom' and doesn't bother itself with what could be fake anyway. But thanks, I hadn't realized that about SPF (though …
-
@mk, I think the idea is, if #SPF ever achieved #saturation (100% deployment), the list of "Received" headers would become trustworthy
-
@boneidol and if you outsource email, it's possible other clients of the same provider can pass your SPF too