[Rwp] Why the From: field is set to the list itself

Chris Belle cb1963 at sbcglobal.net
Thu Feb 5 12:32:52 EST 2015


Thanks for the primer 'grin'.

On 2/5/2015 6:52 AM, Jayson Smith via RWP wrote:
> Hi,
>
> I know about the From: field of list messages being set to the list 
> itself. This is yet another thing legitimate list owners have had to 
> do in the ongoing fight against spam. I'll explain why, but hold on to 
> your hats, this is going to get pretty technical.
>
> First, some terms you need to know before we get started. Many of you 
> probably already know some of these, but just so everybody is on 
> common ground, here we go.
>
> Internet Protocol address or IP address: This refers to a specific 
> point on the Internet. It's sort of like a telephone number computers 
> use to contact each other. An example is 96.126.127.231.
>
> Domain name: This is the human-friendly representation of a computer's 
> address on the Internet. Examples are Google.com, whitehouse.gov, and 
> barbershop.org. Most if not all Internet users use these every day 
> without even thinking about it.
>
> Domain Name System or DNS: This is sort of like a phone book for 
> computers. A computer can contact DNS and say, "I have a user who 
> wants to go to google.com, what's their IP address?" DNS then returns 
> the IP address or a response saying there's no such domain name. The 
> computer then contacts the IP address directly. This goes on behind 
> the scenes, and the user is not involved. Additionally, domain owners 
> can publish other types of records in their DNS, which we're about to 
> see.
>
> Sender Policy Framework or SPF: A record published by a domain owner 
> in DNS, specifying which IP addresses are permitted to send mail from 
> that domain. Mail servers can check incoming mail against such a list 
> as part of their determination of whether any given message is spam. 
> For example, my domain, bluegrasspals.com, specifies in its SPF record 
> that 96.126.127.231 is the only server allowed to send mail on its 
> behalf. If a message comes in somewhere claiming to be from 
> bluegrasspals.com, the receiving mail server can check the SPF record, 
> and if the sending IP address isn't on that list, the from: line is 
> probably forged, which means the message is more likely to be spam.
>
> DomainKeys Identified Mail or DKIM: Another method of message 
> authentication. In this system, a domain owner who wishes to send mail 
> generates a pair of cryptographic keys, one public, the other private. 
> They publish the public key in their DNS record, and keep the private 
> key on their server. After that, they attach a cryptographic signature 
> to the headers of every message they send from that domain, based on 
> that private key. Mail receivers can then check that signature against 
> the public key stored in DNS, and if the signature checks out, this 
> tells the receiving system two things. First, that the domain claiming 
> to send the message actually sent it, since presumably only servers 
> under the control of the domain owner have the private key needed to 
> generate signatures. Second, that the message has not been modified in 
> any way since it was signed. This is yet another way to estimate the 
> likelihood of a message being spam.
>
> Domain-based Message Authentication, Reporting and Conformance or 
> DMARC: Finally! The reason for this entire discussion! DMARC is a 
> system whereby domain owners can publish a policy in their DNS 
> records, specifying how compliant receiving systems are to handle mail 
> claiming to originate from their servers, but which fails SPF or DKIM 
> checking. The available actions are to ignore the problem, quarantine 
> such mail, or outright reject such mail.
>
> And now we come to the problem for list owners. Certain large ISP's in 
> particular, Yahoo! being one of them, have published DMARC records in 
> their DNS which instruct receiving mail systems to reject mail 
> claiming to come from those domains, but which doesn't pass SPF or 
> DKIM checks. An example might help.
>
> You have a Yahoo! account. You send a message to my mailing list that 
> lets the From: field of its outgoing messages go through unmodified. 
> My server receives the message, processes it, and sends it to all my 
> list members. So off the message goes on its way, but then it hits a 
> provider which uses DMARC as a way to authenticate messages.
>
> Okay, we have a message claiming to come from Yahoo! Let's check to 
> see if it's legitimate. Does the sending IP address appear on Yahoo's 
> SPF record? Um, let's see. Wait, no, it doesn't! Okay, what about 
> DKIM, is that valid? Checking, looking... Nope, that's not valid 
> either! Now, does Yahoo! tell us to do anything special when this 
> happens? Let me see...here it is, yes, I should reject this message!
>
> And it tells my server, "Sorry, but I'm not going to accept this 
> message from you because you're probably a spammer trying to forge 
> Yahoo! addresses."
>
> For clarification, the reason the DKIM check didn't pass is that, 
> while Yahoo! almost certainly signed the message when it was 
> originally sent, my mailing list software messed with it in the 
> process of getting it ready to send to the list, so the signature was 
> no longer valid.
>
> The solution to this problem is to set the From: address of outgoing 
> list messages to the address of the list itself, which is safe. When 
> this happens, any authentication policies put in place by the original 
> sender of the message never come into play, since my server is no 
> longer seen as trying to forge those addresses.
>
> Unfortunately, Mailman, the mailing list software I use, requires a 
> list to either allow the From: field to go through intact, or change 
> it to the list address, for all list posts. You can't isolate specific 
> problem domains, it's either all or nothing. Another option I 
> considered was putting the sender's Email address in the list footer, 
> so people could write privately if desired, but guess which bit of 
> text Mailman does *not* allow as a substitution? That's right, the 
> sending address!
>
> I could turn this feature off on a trial basis and just see how it 
> works, but this would probably cause some mail to start bouncing. What 
> do you guys think?
>
> Sorry this has been so long, but I felt it necessary to insure 
> everyone had the proper background knowledge to understand the 
> problem, and the solution.
>
> Jayson
>
> _______________________________________________
> RWP mailing list
> RWP at bluegrasspals.com
> http://bluegrasspals.com/mailman/listinfo/rwp
>



More information about the Rwp mailing list