One document matched: draft-crocker-marid-smtp-validate-01.txt
Differences from draft-crocker-marid-smtp-validate-00.txt
MARID D. Crocker
Internet-Draft Brandenburg InternetWorking
Expires: December 13, 2004 J. Leslie
JLC.net
D. Otis
Mail Abuse Prevention System
June 14, 2004
Client SMTP Validation (CSV)
draft-crocker-marid-smtp-validate-01
Status of this Memo
By submitting this Internet-Draft, I certify that any applicable
patent or other IPR claims of which I am aware have been disclosed,
and any of which I become aware will be disclosed, in accordance with
RFC 3668.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as
Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on December 13, 2004.
Copyright Notice
Copyright (C) The Internet Society (2004). All Rights Reserved.
Abstract
Internet mail relies on exchanges between systems that have made no
prior arrangement with each other. For reasons of history and
expediency, the current service provides a level of accountability
for participating hosts that is no longer adequate. This makes it
impossible to vet MTAs or find recourse when their operation causes
problems. Client SMTP Validation (CSV) provides an economical
Crocker, et al. Expires December 13, 2004 [Page 1]
Internet-Draft Mail-CSV June 2004
service that permits an SMTP server to decide whether messages sent
by the client SMTP are likely to be well-behaved, or at least to
decide whether the client is sufficiently accountable for its
actions. CSV provides a small, simple and useful improvement to
Internet mail service accountability. It builds upon the existing
practise of service providers that accredit the networks from which
sending systems are connecting.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.1 Identification . . . . . . . . . . . . . . . . . . . . . . 5
2.2 Authentication . . . . . . . . . . . . . . . . . . . . . . 5
2.3 Authorization . . . . . . . . . . . . . . . . . . . . . . 6
2.4 Accreditation . . . . . . . . . . . . . . . . . . . . . . 6
3. Client SMTP Validation Procedures . . . . . . . . . . . . . . 6
3.1 Identification . . . . . . . . . . . . . . . . . . . . . . 7
3.2 Authentication . . . . . . . . . . . . . . . . . . . . . . 7
3.3 Authorization . . . . . . . . . . . . . . . . . . . . . . 7
3.4 Accreditation . . . . . . . . . . . . . . . . . . . . . . 7
4. Security Considerations . . . . . . . . . . . . . . . . . . . 8
5. References . . . . . . . . . . . . . . . . . . . . . . . . . . 8
5.1 References - Normative . . . . . . . . . . . . . . . . . . . 8
5.2 References - Informative . . . . . . . . . . . . . . . . . . 9
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 9
A. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 10
B. Preventing SMTP-level Joe-Jobs of Well-Known Names . . . . . . 10
Intellectual Property and Copyright Statements . . . . . . . . 12
Crocker, et al. Expires December 13, 2004 [Page 2]
Internet-Draft Mail-CSV June 2004
1. Introduction
Internet mail suffers from the operation of hosts acting as mail
transfer agents (MTA) without any meaningful cross-net
accountability. This makes it impossible to vet MTAs or find
recourse when their operations cause problems. Many of these hosts
have been compromised and have been turned into unwilling
participants in large networks of hostile MTAs that send spam and
worms, and contribute to denial of service attacks.
When a server MTA receives a connection, it must decide whether to
accept the message traffic that is being sent to it, trusting that
its delivery will not be problematic to the operation of the provider
or their users. How can it do this, when operating in the open
Internet? Client SMTP Validation (CSV) defines a service that permits
the receiving SMTP server to decide whether messages sent by the
sending SMTP client are likely to be well-behaved, or at least to
decide whether the client is sufficiently accountable for its
actions.
The process of deciding on this trust of the client requires
performing a series of conceptually discrete steps:
Identification: What is the "name" of the client to be trusted? How
is it referenced?
CSV uses the domain name supplied by a client in the SMTP HELO/
EHLO.
Authentication: Is the client MTA legitimately associated with that
name? Can we prove that the client is who it purports to be?
CSV documents a range of existing techniques that are appropriate
for use with CSV.
Authorization: Is the sending SMTP client permitted to act as a
client MTA? Has a separate authority given it permission to
perform this service?
CSV specifies a DNS-based record that states whether an associated
host has permission to operate as a client MTA.
Accreditation: What is the trust that is to be extended to the entity
that authorized the client MTA? Does the server MTA have a basis
for deciding that the entity providing authorization for the
client MTA can, itself, be trusted to make valid authorizations?
CSV discusses existing techniques for accrediting authorizing
systems. It also defines a DNS record that permits such systems
to announce the accreditation services in which they are listed.
It defines another DNS record that permits accreditation services
to publish their assessments of client MTAs.
Crocker, et al. Expires December 13, 2004 [Page 3]
Internet-Draft Mail-CSV June 2004
A proposal or its implementation well might combine these steps.
However it is important to consider them independently, in order to
ensure that the proposal specifies that they are performed in a valid
manner, or at least that the constraints of the proposal are clear
for each of these conceptual functions. This specification
distinguishes each of these logical steps and defines their operation
separately. It is based on validation of the EHLO domain name. The
proposed mechanism is small, simple and useful. In particular it
permits detecting machines that are prohibited from acting as Client
MTAs and those that are permitted. The mechanism is designed to be
useful between peer MTAs and only requires use of well-established
mechanisms.
Address-based Authentication Currently, service providers often
maintain lists of remote networks that are known to be trustworthy
or untrustworthy as sending SMTP clients. Typically, these lists
are based on the use of IP Addresses of the clients. The IP
Addresses serve as identifiers. The list specifies positive or
negative authorization, and the source of the list is an
organization the service provider deems worthy to assess other
sites.
When used in this way, IP Addresses are authenticated by relying
on their use in the IP routing infrastructure. Packets are routed
to the specified IP Address, over the open Internet. A repeated
exchange using that IP Address is therefore presumed to be an
interaction with the host legitimately associated with that IP
Address.
Increased topological, transfer and access complexities on the
Internet are making IP Addresses increasingly problematic for use
as identifiers. Instead they are viewed as appropriate only for
the most transient task of delivering individual packets.
CSV builds upon this popular model. Besides the considerable benefit
of having operational practice, the model can be extremely efficient.
It permits the service provider to assess the source of an entire
message stream, rather than having to evaluate each message. Also,
CSV makes its assessment before messages cross the Internet, thereby
saving bandwidth and reducing the impact of a distributed denial of
service attack.
CSV verifies that a host is authorized to act as an SMTP client and
that the client is likely to be operated acceptably. CSV enhances
current practice with:
o Identification by persistent domain name rather than transient IP
Address
Crocker, et al. Expires December 13, 2004 [Page 4]
Internet-Draft Mail-CSV June 2004
o Alternative authentication techniques
o Explicit listing of client service authorization
o A standardized method of referencing accreditation services
o A standardized method of querying an accreditation service
Terminology: Terminology conforms to [ID-email-arch].
Discussion: The venue for discussing this proposal is the
<http://ietf.org/html.charters/marid-charter.html>.
NOTE: The current draft makes reference to quite a few underlying
services that need citations (ed.)
2. Requirements
2.1 Identification
The means of identifying a remote host or service requires uniqueness
and is aided by persistence. The identifier must not be ambiguous
and its use is made far more efficient if it is stable over time.
The two usual choices are IP Addresses and Domain Names.
An IP Address typically refers to a single host and can change
relatively frequently, as the host's connection to the Internet
changes. IP Addresses are reported by the Internet infrastructure
and for simple security requirements, transactional use of an IP
Address through the Internet's routing fabric is taken as validation
of the Address. Domain Names are longer-lived but require new
administrative effort. They can be used to refer to multiple hosts
simultaneously. The administrator of a Domain Name may list any IP
Address they wish to associate with the name, independent of the
administrator and the Domain Name having a valid relationship to that
Address. Therefore, authentication of a domain name's reference to a
particular IP Address requires an explicit authentication step.
2.2 Authentication
If the sending SMTP client of an connection can be authenticated,
then it is possible to develop an accountability mechanism based on
that authentication. MUA-MSA exchanges have a substantial number of
useful authentication mechanisms available. These are often very
strong, and involve significant prior arrangement. The same holds
true for MDA-MUA exchanges, and often for MSA-MTA and MTA-MDA
exchanges, such as within an organizations local network.
Crocker, et al. Expires December 13, 2004 [Page 5]
Internet-Draft Mail-CSV June 2004
What is missing is a useful means of authenticating MTA-MTA exchanges
over the open Internet. Prior arrangement between such a pair of
MTAs is antithetical to the history and operation of Internet mail.
Spontaneous communications are at the core of Internet design and
operation. So the challenge is to develop an authentication
mechanism that permits the necessary amount of accountability,
without imposing undue overhead or restrictions.
2.3 Authorization
Internet operation has typically required no public mechanism for
restricting or permitting particular hosts to operate clients or
servers for particular services on behalf of particular domains. The
DNS MX record states where to route mail that is destined for a
specific domain; this implies a degree of authorization for the host
referenced in the MX. However the record is really for routing and
there is no equivalent means of specifying prohibition of other hosts
that might act as intermediaries. Similarly there is no means for
checking the authorization of World Wide Web servers, DNS
servers,telnet clients or other Internet applications.
What is missing is an open, interoperable means by which a trusted
agency can announce its authorization of a particular host to operate
a particular service.
2.4 Accreditation
In non-Internet environments the basis for deciding that an
authorizing agency is, itself, to be trusted, is highly varied and
often is not well-understood. It is expected that this portion of an
Internet mail validation service will therefore need to support be a
variety of accreditation service styles.
What is needed is a means of announcing performance of accreditation
and a means of querying a service to obtain information about the
host it is accrediting.
3. Client SMTP Validation Procedures
CSV defines a mechanism for session-time, domain-based validation of
a peer, sending SMTP client MTA. It is useful across the open
Internet, between MTAs that have made no prior arrangement with each
other. Validation establishes that the operation of the MTA is
authorized by an accredited administrator of the declared domain
name.
The validation requirements are modest, because the system does not
seek to provide long-term vetting of the client host, nor does it
Crocker, et al. Expires December 13, 2004 [Page 6]
Internet-Draft Mail-CSV June 2004
assess the actual content being exchanged. Techniques that would be
wholly inadequate for classic, strong authentication and validation
can be entirely sufficient for CSV's needs.
3.1 Identification
The sending SMTP client host is identified by a Domain Name, supplied
by that host as the first parameter to an opening SMTP HELO or EHLO.
The domain name serves as a unique, topologically-independent,
persistent identifier that is registered in the Domain Name Service.
Hence, parametric values associated with the domain can be obtained
through a DNS query.
For CSV, a sending SMTP client places the domain name into the
<Domain> field specified for a SMTP HELO or EHLO [RFC2821]. The
domain name is any name under which they are claiming authorization
to act as a sending SMTP client. A receiving SMTP server will
extract this name and use it as the identification for the client
claiming authorization.
3.2 Authentication
There is no single, common means of authenticating a host's use of a
domain name. CSV participants SHOULD use one of the techniques
described in Host Name Authentication (HNA) [ID-Marid-CSVHNA]. It
describes techniques that are widely used and acceptable for the
purposes of CSV.
The document highlights the range of techniques and the differences
in their administrative overhead and strength of authentication.
However other techniques can be equally valid.
3.3 Authorization
The purpose of authorization, in CSV, is to establish that an
accountable authority has given permission for the sending SMTP
client host to operate in that role.
CSV participants SHOULD use the method defined in Client SMTP
Authentication (CSA) [ID-Marid-CSVCSA]. It specifies a DNS record
that is associated with the domain name offered by the sending SMTP
client host.
3.4 Accreditation
The utility of any service like CSV is entirely dependent upon the
relevance, reliability and accuracy of the service that accredits the
authorizing agent. It is expected that there will be numerous
Crocker, et al. Expires December 13, 2004 [Page 7]
Internet-Draft Mail-CSV June 2004
services that provide accreditation. CSV is intended to support use
of any service that gains credibility among operators of SMTP
servers.
An initial set of capabilities for specifying CSV-related
accreditation services is specified in Domain Name Accreditation
[ID-Marid-CSVDNA]. CSV participants SHOULD use the methods defined
there.
4. Security Considerations
This entire proposal pertains to security, namely authentication and
authorization of peer MTAs.
The proposal relies on the integrity and authenticity of DNS data.
5. References
5.1 References - Normative
[ID-Marid-CSVCSA]
Otis, D., Crocker, D. and J. Leslie, "sending SMTP client
Authentication (CSA)", June 2004.
[ID-Marid-CSVDNA]
Leslie, J., Crocker, D. and D. Otis, "Domain Name
Accreditation (DNA)", June 2004.
[ID-Marid-CSVHNA]
Crocker, D., Otis, D. and J. Leslie, "Host Name
Authentication (HNA)", June 2004.
[RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791, September
1981.
[RFC0821] Postel, J., "Simple Mail Transfer Protocol", STD 10, RFC
821, August 1982.
[RFC0822] Crocker, D., "Standard for the format of ARPA Internet
text messages", STD 11, RFC 822, August 1982.
[RFC1035] Mockapetris, P., "Domain names - implementation and
specification", STD 13, RFC 1035, November 1987.
[RFC1122] Braden, R., "Requirements for Internet Hosts -
Communication Layers", STD 3, RFC 1122, October 1989.
[RFC2782] Gulbrandsen, A., Vixie, P. and L. Esibov, "A DNS RR for
Crocker, et al. Expires December 13, 2004 [Page 8]
Internet-Draft Mail-CSV June 2004
specifying the location of services (DNS SRV)", RFC 2782,
February 2000.
[RFC2821] Klensin, J., "Simple Mail Transfer Protocol", RFC 2821,
April 2001.
[RFC2822] Resnick, P., "Internet Message Format", RFC 2822, April
2001.
5.2 References - Informative
[ID-brand-drip]
Brand, R. and L. Sherzer, "Designated Relays Inquiry
Protocol (DRIP)", draft-brand-drip-02 (work in progress),
October 2003.
[ID-email-arch]
Crocker, D., "Internet Mail Architecture", May 2004.
Authors' Addresses
Dave Crocker
Brandenburg InternetWorking
675 Spruce Drive
Sunnyvale, CA 94086
USA
Phone: +1.408.246.8253
EMail: dcrocker@brandenburg.com
John Leslie
JLC.net
10 Souhegan Street
Milford, NH 03055
USA
Phone: +1.603.673.6132
EMail: john@jlc.net
Crocker, et al. Expires December 13, 2004 [Page 9]
Internet-Draft Mail-CSV June 2004
Douglas Otis
Mail Abuse Prevention System
1737 North First Street, Suite 680
San Jose, CA 94043
USA
Phone: +1.408.453.6277
EMail: dotis@mail-abuse.org
Appendix A. Acknowledgements
This proposal is similar to DRIP [ID-brand-drip], however it uses a
different DNS [RFC1035] record.
Appendix B. Preventing SMTP-level Joe-Jobs of Well-Known Names
CSV permits using alternative functional components. This can result
in significant variations of administration and use. Some of these
can require extended effort to configure and use. However some very
simple scenarios can be quite useful.
For example, domain names of well-known services are often used
fraudulently in email, known as joe-jobs. If the well-known service
sends all of its email from its own network, then it can use CSV to
register all authorized sending SMTP clients and list all others
sources of email under its domain name as invalid.
Such a use requires the following:
1. Domain name owner lists a wildcard for its "root" domain name,
with a CSV record saying that client SMTP sending is prohibited.
2. Domain name owner lists the specific host domain names, with
appropriate CSV records to list the hosts as permitted to send
mail.
3. Domain name owner's client SMTP sending hosts include their
domain names in SMTP HELO/EHLO commands.
4. Receiving SMTP servers uses a small, locaol whitelist, to perform
accreditation of the domain administration for the well-known
service.
CSV will ensure that any mail-sending client that uses the well-known
name in the SMTP HELO/EHLO command must do so validly.
It is possible to detect fraudulent use that is not announced in the
SMTP HELO/EHLO. To accomplish this the receiver MAY consult the CSV
Crocker, et al. Expires December 13, 2004 [Page 10]
Internet-Draft Mail-CSV June 2004
information at a later stage of processing. For example:
1. In the message, record the IP Address of the sending SMTP client.
2. Upon detecting that the From field that has a domain name
associated with a well-known service, perform a CSV check using
that domain name and the recorded IP Address.
If the Joe-job scheme is based on the direct content, rather than the
From field, a deeper and stronger validation technique will be
necessary, based on content-signing
Crocker, et al. Expires December 13, 2004 [Page 11]
Internet-Draft Mail-CSV June 2004
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2004). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Crocker, et al. Expires December 13, 2004 [Page 12]
| PAFTECH AB 2003-2026 | 2026-04-23 05:44:58 |