Oh, dear. Somebody is WRONG on the Internet!

You're talking past each other.

Still, the current "standard" e-mail protocols were never meant to be
either reliable or secure, and their is a very good reason for that. People
may not be as reliable as machines in executing protocols, but they cannot
be 100% reliable, and only people can certify things.

2014/10/15 1:04 "Tanstaafl" <tansta...@libertytrek.org>:
>
> On 10/14/2014 11:17 AM, Jerry Stuckle <jstuc...@attglobal.net> wrote:
> > On 10/14/2014 8:05 AM, Tanstaafl wrote:
> >> If you think I'm kidding, please by all means go make these silly
> >> statements on the postfix list and I'll just sit and watch the fun.
>
> > You don't read very well.  This has nothing to do with emails to a valid
> > address.  A large amount of that spam goes to invalid addresses.  I see
> > them go through the logs regularly.
>
> I read fine. The 'silly statements' reference was about your suggestion
> that it is in any way shape or form 'ok' to *accept* mail to invalid
> recipients then send it to dev/null.
>
> >>> To bounce all of those invalid addresses not only would further
> >>> increase the amount of junk on the internet,
>
> >> That is pure and absolute nonsense. The vast majority of spam comes
from
> >> botnets, and *rejecting* garbage from these results in ZERO additional
> >> smtp traffic.
>
> > Wrong.  Rejecting garbage sends a message back to the originator,
>
> No, it doesn't. It closes the connection with a response code.
>
> The system that had opened the connection and was attempting to send the
> email is the one responsible for 'sending a message back to the
originator'.
>
> Well, *if* the system talking to your server is the originating server,
> that is.
>
> If, on the other hand, there were relays involvbed, then it would simply
> relay the response code back down the chain until it got to the
> originating server.
>
> This is very simple to validate. I suggest you do so before compounding
> your error in public.
>
> > increasing the traffic.  Simply dropping them, as I do, does not.
>
> Given an identical mail transaction, with an email with a size of 1MB:
>
> If I reject the mail at the RCPT-TO stage, then I only accepted a few
> bytes of traffic before terminating the connection with an SMTP response
> (error) code. The connecting machine then decides whether to pass the
> response back or not (again, a few bytes at most).
>
> If you *accept* the mail, then you accepted the entire 1MB of traffic.
>
> So, who is responsible for more traffic in such a case?
>
> >>> but by not replying, servers tell the spammers what are valid email
> >>> addresses.
>
> >> More nonsense. Security through obscurity *never* works, and only, in
> >> this case totally breaks SMTP.
>
> > Wrong on two counts.  First of all, the false notion "Security through
> > obscurity *never* works".  This has nothing to do with security.
>
> You said you were concerned about telling spammers valid emails. Why are
> you concerned about that if not from a security perspective?
>
> > And BTW, that statement is also wrong - why do you think people are
> > encouraged to use obscure passwords if it doesn't work? But that's
> > another subject.
>
> Lol! Not even in the same ballpark, Jerry. Passwords, by their very
> nature, are intended to be difficult/impossible to 'guess'.
>
> To suggest that this is even in the same universe as 'security through
> obscurity' is ludicrous.
>
> > On the second count - please point out exactly which RFC I am violating
> > that "breaks SMTP".
>
> You don't necessarily need to explictly violate any give RFC to 'break
> SMTP', Jerry.
>
> Breaking recipient validation defacto breaks SMTP. It tells the sending
> server that everything is OK, when it isn't. It allows someone who
>
> >>> Finally, as for "...undermine confidence in the reliability of the
> >>> Internet's mail systems..." - it hasn't been reliable since spammers
> >>> virtually took over the email.  And even when emails were rejected, it
> >>> still was no indication the recipient got the message.
> >>
> >> Of course it wasn't, but it was certainly a positive indication that
the
> >> recipient did *not* receive it (as long as the sending server is
> >> properly configured).
>
> > And why should I care if a bot finds out the message has not been
received?
>
> No one should. What I do care about is if the President of NBC typos an
> email address to our President when sending an important email, I want
> him to know the email didn't make it.
>
> >>> BTW - by definition, any messages to any of the domains I manage
without
> >>> a valid email address are "seriously fraudulent or otherwise
inappropriate".
> >>>
> >> Really?
> >
> > Yes
> >
> >> So when the President/CEO of XYZ Corporation, who does business with a
> >> customer whose domain happens to be managed by you, accidentally typos
> >> an email address, you consider that a 'seriously fraudulent or
otherwise
> >> inappropriate' email?
>
> > Yes.
>
> Please explain what is *Seriously Fraudulent* or *otherwise
> inappropriate* about a typo in the recipient address of an otherwise
> perfectly legitimate email, Jerry.
>
> > Just like a misaddressed letter at the post office. It will not
> > necessarily be returned.
>
> While not a perfect analogy (big difference between totally automated
> systems and systems that have imperfect humans (postoffice workers) in
> the mix), it is still generally wrong.
>
> I have had more than one letter/package returned because it was
> misaddressed in my lifetime - but of course, this does require that you
> actually put a valid return address on it. But I guess maybe you are
> against that too?
>
> >> You must not have any real commercial customers, because I would
imagine
> >> you would be a prime target for lawsuits for losing emails like this,
as
> >> it would only be a matter of time before it was something important
sent
> >> by someone important to someone else important.
>
> > I have enough, and there are no valid emails lost.
>
> And you know this because you check every single email that you 'drop'
> to make sure it wasn't a legitimate email with a typo in the recipient
> address?
>
> You have lost all credibility with me Jerry.
>
> >> That said, I do have an email template I send to our users regularly
> >> explaining why/how email should never be considered 100% reliable, and
> >> if they ever send an email that has money riding on it being received,
> >> they should follow it up with a phone call to make sure it actually was
> >> received. I guess people like you are one of the reasons I have that
> >> template and need to send it out on occasion.
>
> > Ah, so even you admit email is not reliable.
>
> Of course... mostly due to people who mis-configure servers, either
> accidentally, through ignorance, or even intentionally (like you are
> advocating).
>
> > If it were, why would you encourage your people to follow up with a
> > phone call? After all, if they didn't get a reject message, the email
> > MUST have gone through.
>
> Again - because:
>
>  a) mistakes happen, and
>  b) because of people like *you*...
>
>
> --
> To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact
listmas...@lists.debian.org
> Archive: https://lists.debian.org/543d494f.7060...@libertytrek.org
>

Reply via email to