TOC 
Internet Engineering Task Force Turner, Ed.
Internet-Draftgovirtual.com.au
Intended status: InformationalSeptember 28, 2008
Expires: April 1, 2009 


Spam reduction using messageid.
draft-turner-antispam-using-messageid-01

Status of this Memo

By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”

The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.

The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.

This Internet-Draft will expire on April 1, 2009.

Abstract

This draft suggests a technique of spam reduction by extending the SMTP service to include a 'Did You Send' query protocol.



Table of Contents

1.  Changes from version 00
2.  Introduction
3.  A basic Did You Send protocol description.
4.  Processing requirements.
5.  Message ID header.
6.  Uptake scenario.
7.  Major advantages.
8.  Techniques for avoidance.
9.  Denial of service risk.
10.  Potential reduction of spam.
11.  Configure options.
12.  Implementation suggestions
13.  Protocol suggestion
14.  Security Considerations
15.  IANA considerations
16.  Normative References
§  Author's Address
§  Intellectual Property and Copyright Statements




 TOC 

1.  Changes from version 00

A rudimentary suggestion of a protocol is introduced.

Reference is made to RFC2392 (Levinson, E., “Content-ID and Message-ID Uniform Resource Locators,” August 1998.) [RFC2392].



 TOC 

2.  Introduction

Spam has grown from being:

This document suggests a technique for reducing spam dispersion. Some estimates put spam traffic at astonishing levels. Reports are available which speak in terms of 50% of email traffic. Clearly there is much to be saved with reducing this traffic.



 TOC 

3.  A basic Did You Send protocol description.

A fundamental question in confirming the origins of an object is to ask if it was sent by the sender. Current smtp sessions are in the main, send and move on the next task. There are of course, many tests made by the receiving agent as to the validity of the email. Though in search of a basic confirmation exchange, it could be found that a mechanism is already half in place. In the form of the MessageID header of every email. If the sending agent stores the MessageID data for a length of time, then the receiving agent was to query the originating agent on this field, confirmation of the send could be confirmed or denied.



 TOC 

4.  Processing requirements.

It may have been impossible for earlier agent implementations to do this due to the storage and processing requirements percieved. The cost of these is now greatly reduced. Calculations would show it to be cheaper than the cost of current spam volumes. Additionally, product such as SQLite have not been available until recently.



 TOC 

5.  Message ID header.

The MessageID [RFC2392] (Levinson, E., “Content-ID and Message-ID Uniform Resource Locators,” August 1998.) is a header field generated by a sending smtp [RFC2821] (Klensin, J., “Simple Mail Transfer Protocol,” April 2001.) server. Although Message-ID generation does need to be globally unique, there is an Internet Draft which suggests this possibility: draft-ietf-usefor-message-id-01.txt It is generally generated to be locally unique. It usually uses the FQDN as a suffix, though as there has been no reason to use the uniqueness across domains, non-FQDN use has not been questioned.



 TOC 

6.  Uptake scenario.

To ensure a reasonable path to implementation, conforming agents could be given a bypass filter. This would reduce load on filters, reducing load on servers.



 TOC 

7.  Major advantages.



 TOC 

8.  Techniques for avoidance.

Spammers will require a registered domain with a DYS enabled server. Reverse tracking is therefore possible. Confirmation the spam was sent is implied. In countries where spam is illegal, this may be useful as evidence. In other countries, the sending smtp server is visible and block able.



 TOC 

9.  Denial of service risk.



 TOC 

10.  Potential reduction of spam.

This is a function of co-operating smtp agents. If all agents used this protocol, then 'spam' as we know it would be greatly reduced.



 TOC 

11.  Configure options.

The sending agent has options on storage period of sent ID's. Subsequent handling of receipts could flag or delete the sent.ID. The sending agent could flag the sent.ID with the time of receipt.



 TOC 

12.  Implementation suggestions

There is an obvious need to track back through the 'Received:' path entries to the public facing smtp server issueing the email. To shorten the seaching operation it is suggested that a prefix be added to the entry of the public facing server, such as 'dys.publicfacing.server.com'. This facilitates the need of backtracking, firewall requirements, redirection and any need to seperate the dys function. This also facilitates the testing options leading to integration.



 TOC 

13.  Protocol suggestion

The dys protocol is suggested to be an extension[RFC1869] (Klensin, J., Freed, N., Rose, M., Stefferud, E., and D. Crocker, “SMTP Service Extensions,” November 1995.) of the SMTP protocol. Firstly, the ability to recognise any 'not available' signal is suggested.

The server is reached via the prefix 'dys', though it is not configured as such:

(smtp exhange).... 'DYS' sent , reply= '502 Error, command not implemented'

= backoff to regular spam checks

(smtp exhange).... 'DYS' sent , reply= '502 Error, server busy'

= backoff for configured period

(smtp exhange).... 'DYS' sent , reply= '502 Redirect, an.otherserver.com'

= backoff and retry at an.otherserver.com

The server is reached and provides dys.(ESMTP probe).

(smtp exhange).... 'DYS' sent , reply= '250-DYS' (in exchange).

The server is reached and queried in one operation.

(smtp exhange).... 'DYS 40F655CA30A781488E7BADFECFDA05690769F40B@mail.acorp.com'

The 'dys server' makes a lookup request and replies.

Answer: NRF = 'No Record Found'.

Answer: DSRR = 'Did Send Receipt Received'. (Did Send, but already marked as received).

Answer: RF = 'Record Found'.



 TOC 

14.  Security Considerations

See section entitled: Denial of service risk.



 TOC 

15.  IANA considerations

This document has no actions for IANA.



 TOC 

16. Normative References

[RFC1869] Klensin, J., Freed, N., Rose, M., Stefferud, E., and D. Crocker, “SMTP Service Extensions,” STD 10, RFC 1869, November 1995 (TXT).
[RFC2392] Levinson, E., “Content-ID and Message-ID Uniform Resource Locators,” RFC 2392, August 1998 (TXT, HTML, XML).
[RFC2821] Klensin, J., “Simple Mail Transfer Protocol,” RFC 2821, April 2001 (TXT).


 TOC 

Author's Address

  Mark Turner (editor)
  govirtual.com.au
  PO Box 20272
  NSW, 2002
  Australia
Phone: 
Email:  markturner@govirtual.com.au


 TOC 

Full Copyright Statement

Intellectual Property