Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security The Internet

Replacing SMTP? 539

dousette asks: "In reading over one of the RFC's governing the SMTP protocol, and other RFC's as well, it's interesting to note that you see some big names and big companies from time to time. With all the loopholes in the current SMTP specification, is it possible for the Slashdot collective to come up with another one? Would it stand a chance in making it into a standard, or do they just listen to Cisco, AT&T, etc? I realize that a lot of people have a lot of ideas how things should be done (and they haven't been shy about posting them to Slashdot), but has anyone tried to write the RFC for a replacement protocol? As a side note (where I won't be shy about posting how things should be done), if there were a replacement trusted protocol, one could have mail received via that protocol bypass spam filtering, id checking, or whatever checks might be in place (saving processor cycles, etc). The regular checks could still be done on other mail received via the 'older' SMTP protocol. If more and more ISP's make use of this, SMTP could be gradually phased out... or if you are one for a sudden cut-over, just cut to the new one at the same time as the IPv6 upgrade!"
This discussion has been archived. No new comments can be posted.

Replacing SMTP?

Comments Filter:
  • by mkozlows ( 21830 ) <mlk@klio.org> on Monday August 04, 2003 @06:47PM (#6610390) Homepage
    No, the "Slashdot collective" has no realistic chance of replacing SMTP. But then, neither does Cisco or Microsoft or Sun. Not with umpteen trillion SMTP servers out there, all of which would need to be replaced en masse.
  • by Cosmos_7 ( 128549 ) on Monday August 04, 2003 @06:48PM (#6610402)
    SMTP certainly isn't perfect, but I'm not sure what improvements need to made to the protocol. Mail *should* be open and unrestricted. While I realize many people have issues with the current system (such as spam), I think most of these should be corrected at the server or client level rather than at the protocol.
  • slashdot (Score:5, Insightful)

    by Anonymous Coward on Monday August 04, 2003 @06:49PM (#6610420)
    is it possible for the Slashdot collective to come up with another one?

    Not a chance. The slashdot collective taken as a whole, is a very stupid group of people. Even the few intelligent people wouldn't be able to get anything useful done because they'd be shouted down by the teaming masses of idiots.

    We hate Sony's recording arm, but we'll sell our souls to them for the next cool gadget. We hate MS, but 90% of us use windows on our main home machine. No to mention all the idiots who use words like boxen.
  • by letxa2000 ( 215841 ) on Monday August 04, 2003 @06:51PM (#6610436)
    Maybe ISP's should charge users for each outbound SMTP connection they make? I'd happily pay 10 cents per email I sent if it would reduce the amount of SPAM I received. It would only cost me a couple of bucks a month too at the rate that I send email ...

    I wish people would stop inviting rate increases or new charges as an answer to spam. It's not the answer. It might be inexpensive for you, but many of us DO send a lot of email and it'd get expensive really quick. You'd get rid of a lot of good and valid email communication along with the spam.

    I'm even opposed to the "pay a dime, but I'll give it back if I wanted to hear from you" approach. Those of us running a mailing list would run the risk of having some idiot sign-up a bunch of accounts only to have that person say "No, I didn't want that" and collect the money.

    I believe we need a trusted protocol. This might be as simple as having all emails PGP signed and everything else being sent to the bit-bucket (if you want to be aggressive) or only passed through to the user if the unsigned message had an extremely low spam score.

    But if everyone were to use Bayesian I swear we wouldn't even have to propose a new protocol, talk about new legislation, etc.

    *SIGH*

  • by dspyder ( 563303 ) on Monday August 04, 2003 @06:51PM (#6610440)
    SMTP is so deep-rooted and pervasive already it will be a long, hard change to implement. Every little cellphone that comes with a mail-client. Every router that has smtp alerting. Every application that uses it for various tasks... they would all have to be updated!

    Doesn't mean it shouldn't be done, but don't be fooled into thinking it's just a "propose a new spec, step 2?, profit" type of deal....

    --D
  • by edrugtrader ( 442064 ) on Monday August 04, 2003 @06:53PM (#6610459) Homepage
    YOU CAN'T RUN A PAY BY THE EMAIL SYSTEM UNLESS THERE IS *1* EMAIL SERVER (or network of servers run by the same entity) FOR THE WORLD.

    you don't realize that IM is a form of email? you are just sending packets of text... the second someone charges for SMTP, i'll just run my own. you could just charge the end users for data transfered instead of flat monthly fee, but most wouldn't go for that.
  • by leerpm ( 570963 ) on Monday August 04, 2003 @06:56PM (#6610489)
    I agree, any solution to spam that relies on replacing the SMTP protocol is bound to fail for this reason. The current issues with IPv6 migration should prove to everyone that the strategy of rip-out and replace does not work. I think what needs to be explored are added backwards-compatitable extensions to the protocol. Perhaps adding a few commands for whereby some sort of public key exchange is involved.
  • by gid ( 5195 ) on Monday August 04, 2003 @07:01PM (#6610532) Homepage
    Hrm, never seen that before, im2000 has some good idea for simplifiying things, but it seems like it would just be unreliable and unfeasible.

    With the current system, an smtp server can go down, and no one would notice because no one was received their email yet, but with im2000, if the sending machine goes down, then no one can read their mail from there. This would create a lot of unknowns, "why can't I read my email?". Also what about people that don't have a full on connection, you don't want to require those people to be connected just to read their mail. Sure you can queue it for downloading offline somehow, but that's going to be much slower than normal because you have to connect to say 30 different servers where your email is hosted.

    Also there's the case of somesmallcompany.com sending out a mailer/advertisement to millions of people, because the email is hosted on their machine, their connection/server might become overwhelmed, causing heaches for everyone wanting to read their mail. "Why does my mail load so slow?"

    It's a nice try, but it'll never work.

    Another thing, what happens when the message is done being read? Is it deleted on the sender's machine? If so, then how will the user remember that they sent the email to check if it's been read. If not, when will the message get deleted? Obviously it can't stay there forever.

    The great thing about the current system, is that you just send and forget. If it bounces, you get a new email message saying hey, something went wrong. But with im2000, if the message hasn't been read yet, WHY? Did the user just not check their mail yet? Is there connection/routing problem where they suddenly occurred after the hosting server sent the notification, etc.

  • Answer: No. (Score:1, Insightful)

    by Anonymous Coward on Monday August 04, 2003 @07:02PM (#6610536)
    What a lame question.

    Can we, as a community, do that? No. Why not? Because it's really, really hard.

    The IETF, as a community, is not dumb or lazy. (Some of us individuals are.) Many contributors to the IETF read Slashdot, as a matter of fact. But the reason spam is a problem is not that SMTP is flawed; it's because Internet email is successful. It's successful because it ignores the problems of authentication and authorization and just lets anyone send mail to anyone else.

    Would a new protocol (or an SMTP extension) fix the problem? Of course not. Spam happens because you typically want people you don't know, with whom you don't have a relationship, to be able to send email. It's easy to solve the spam problem: it's a trivial special case of either a public key system, general text classification algorithms, or micropayments. We've been waiting for each of these for decades, but I'll leave it up to you as to which one you want to solve first.

    The ideas mentioned for a "trusted" protocol do not require a new protocol. SMTP, perhaps with extensions, can be used to handle the vague ideas in this story.
  • SMTP over TLS (Score:5, Insightful)

    by NearlyHeadless ( 110901 ) on Monday August 04, 2003 @07:03PM (#6610548)
    There is already a protocol that can ensure the identity of the sending SMTP server: RFC2487: SMTP Service Extension for Secure SMTP over TLS [faqs.org]. With the right certificate policy you could make sure that all spammers could be tracked down. I have suggested that people transition to SMTP over TLS and use a challenge-response system (such as TMDA [tmda.net]) for backward compatibility.

    Working out the details of an appropriate certificate policy is not trivial, though.

  • by Malach ( 25852 ) on Monday August 04, 2003 @07:04PM (#6610552) Homepage
    Technological fix to a social problem.

    It's simple. Don't bother.

    The problem will remain, it will just shift tactics. By 'fixing' SMTP you're not addressing the problem, you're addressing a symptom of the problem.

    Anything we do on the technology side to fix this problem will ultimately do nothing.

    That's not to say that SMTP can't be improved on... but improving on it purely to 'stop spam' is a waste.

  • Actually, I've been working on a broader based piece of infrastructure than a new mail protocol, but the first problem I intend to attack is mail.

    RFC 822 is fine for messages, but the transport needs a big upgrade. Also, envelope senders and receivers are non-verifiable, and therefor broken. One day, spammers are going to start using mailing lists and message boards to construct a profile of people you talk to, and send you mail that appears to come from them, thereby making whitelists useless.

    The basic premise of my general transport is that all messages are addressed to a public key and come from a public key. All messages are signed by their supposed source ID, and most messages are encrypted to the destination ID.

    A public key ID plays a similar role to an IP address in an IP packet. There will be distributed databases that hold (signed) mappings between public key IDs and their locations using other networking mechanisms.

    I'm trying to design this protocol and its implementation so its easy to encapsulate it in almost anything. My first connection to an outside protocol will be IMAP/SMTP.

    It's far from being ready for even a public alpha yet, but I do have preliminary code for creating certain kinds of messages at https://svn.generalpresence.com:5131/repos/trunk/C ++/pract_crypto/ [generalpresence.com]. I'm borrowing heavily from Bruce Shcneier and Niels Ferguson's latest book, Practical Cryptography. The initial implementation is in a mix of Python and C++. It requires Swig and the GMP library. I haven't designed the implementation itself to be in the least robust against attacks by someone who has root on your machine.

    I am calling the protocol 'CAKE' for now. CAKE stands for Key Addressed Crypto Encapsulation. It is a layered protocol, since I intend it to be layered on top of any other protocol you can think of. :-)

    One intention of mine is to publish a hash collision problem along with information mapping a public key to a mailbox. First time senders will have to solve the hash collision problem to avoid having the mail thrown away. I'm planning on simply wrapping an RFC 822 message in a CAKE shell.

  • by cant_get_a_good_nick ( 172131 ) on Monday August 04, 2003 @07:06PM (#6610569)
    It doesn't make it slow to send spam, makes it slow to send bulk email, of which SPAM is the best known and most annoying subset. Mailing lists are also a subset.

    Most examples of "takes a second or two" are very processor dependent. You'd then also have the problem of running code on another machine, DOS attacks, all that fun.
  • by aardvarkjoe ( 156801 ) on Monday August 04, 2003 @07:18PM (#6610665)
    The problem with this is that it makes it impossible to use an older system in order to send e-mail -- anything difficult enough to cause an appreciable delay for a new system will take intolerably long on a low-end pentium or 486. There's no reason why e-mailing someone should require a new machine.

    It might work to allow the reciever to have a whitelist of addresses -- so that you only have to do the work if you are sending to someone you don't know. Still, I sure wouldn't want to have to let my computer crunch numbers for five minutes just to send an email to someone I had never contacted before.

    However, as far as I can tell, this is really no different than the pay-per-email solution, but less straightforward.
  • by mrsam ( 12205 ) on Monday August 04, 2003 @07:19PM (#6610679) Homepage
    D. J. Bernstein, the author of the supremely reliable and secure qmail mail server, wrote a proposal for a new Internet mail system a couple of years ago.

    The key words there are "a couple of years ago." Yes, a few years ago he published that web page. And you know what happened as a result of that?

    Absolutely nothing.

    Why?

    Because it makes no sense whatsoever.

    Bernstein came up with a lot of stuff over the years which did make sense, and which did take off, and became accepted. This isn't one of them.

    So what if the mail's contents are now stored on the sender's system? How's that going to prevent a spammer from keeping a copy of the spam stashed somewhere, and then spamming a few hundred million mailboxes with a link to the spam. So, what have we accomplished here?

    The problem with spam is not where the bits and bytes that make up the spam are physically stored. The traditional definition of spam is "unsolicited junk E-mail". Jiggering the bits around, and saving them in a different directory, or on a different server, will not magically turn unsolicited junk into solicited E-mail.
  • by Anonymous Coward on Monday August 04, 2003 @07:24PM (#6610699)
    I agree that the ability to communicate anonymously is a very important freedom to preserve, but I don't think that it would hurt anything for email to require an identity. The place where it is important for anonymity to be preserved is public forums. That is where political disadents will want to post their writing.

    In peer-to-peer comunication (which is what email is best for) privacy is really what is important, and privacy and authentication can go hand in hand.

    Can anyone think of some good examples of where both privacy and anonymity are required at the same time.
  • by jc42 ( 318812 ) on Monday August 04, 2003 @07:24PM (#6610703) Homepage Journal
    Well, I think those "loopholes" are all the zillions of features that people want, but they aren't good enough software designers to realize that the features belong in the layer above SMTP.

    In particular, lack of authentication is a strength of SMTP, just as it is with IP. It means, for example, that I can implement my own authentication (or plug in PGP or whatever), and don't have to use the mail-transfer layer's after it turns out to have a serious hole that lets the spammers and con-men through.

    Protocols that try to do everything for you have the inherent problem that, when a serious problem arises, you have to put up with it until the idiots at the vendor decide to solve it.

    SMTP is simple enough that even a relatively incompetent programmer can do it correctly. You can type it yourself via a telnet connection.

    And adding features in the higher layers is easy.

  • Why replace it? (Score:3, Insightful)

    by silas_moeckel ( 234313 ) <silas.dsminc-corp@com> on Monday August 04, 2003 @07:25PM (#6610705) Homepage
    SMTP works for it's intended purpose lets extend it to SMTPv3 (I think it's been extended once allready) So here is a general brainstorming.

    If you exent it two servers with the extensions will send mail in the new more secured format.

    Frst things first keep it friendly you should be able to do everything via telnet because it jsut makes testing easy.

    So what do you need a little bit on how to get into this new mode once your connected to port 25.

    The server must offer what encryption methods it allows as a list more perfered methods first. Unencrypted should be an option all senders and receivers MUST allow it as encryption is nice but CPU heavy and you can allays depreciate enencrypted senders.

    There should be a DNS entry for the sending mail servier in the domain that the from address and the reply to address originate (some new DNS field well it's a nice big distributed DB with cache so why not?) This needs more work and it sorta outside of scope.

    If the sender domain is part of the servers domain of responcibility the server must use the from and replyto addresses to authenticate the user(s) passwords via CHAP, Kerebros etc this MUST be done after the encrypted state is up and can NOT allow unencrypted passwords and perferable uses a CHAP like system where the password is never on the wire.

    The receiving server must include all options specified by the sending server as message headers.

    The server MUST only accept mail that is destined to it's domains or source from one of it's domains if accompinied with valid credentials.

    A server to server intermediary authentication may be implemented.

    OK thats no where near completed but it's a start.
  • by Bryan Ischo ( 893 ) * on Monday August 04, 2003 @07:29PM (#6610743) Homepage
    That is a very good point. Making spamming costly will not stop all spammers. Those with a legitimate business will still spam because there will still be enough legitimate customers out there who buy based on their spamming.

    But making spam costly will indeed stop the majority of spam that is sent today, which is useless, annoying stuff that far less than 1/100 of 1 percent of people actually make a purchase based on.

    That is the kind of spam that I really want to stop, and I think that making spamming cost money will have the desired effect.

    In my mind I see a smooth graph of how much it costs to send junk email versus how many companies will send junk email. Right now we are at the end of the scale where the cost to send spam is almost nothing, and so the number of "companies" that will send out spam is HUGE, and not-concidentally the content of that spam is very poor.

    We need to work our way to the end of the scale where spam costs real money to send, and only a moderate number of legitimate businesses then find sending spam worthwhile. And the kind of spam which is sent is then would be less annoying (to me anyway) as well. Spam would be more like advertising of actual products than make-money-rich schemes based on trying to sell snake oil.
  • by smiff ( 578693 ) on Monday August 04, 2003 @07:29PM (#6610744)
    I believe we need a trusted protocol. This might be as simple as having all emails PGP signed and everything else being sent to the bit-bucket

    That's not the answer either. Microsoft, Yahoo, et al have been lobbying for this approach, and for good reason. They want to function as the certificate authority (CA). They want to determine who can or cannot send email. They can use that power to literally sell the ability to send spam. They can also use that ability to censor their opponents.

    Microsoft also wants a new patented standard that can't be legally implement with open source software.

  • by puck71 ( 223721 ) on Monday August 04, 2003 @07:29PM (#6610748) Journal
    There is a key difference, in that IPv6 affects the hardware of every net-connected computer (not to mention router, hub, switch, etc) in the world (I believe), whereas changing the mail protocol should involve minimal hardware changes, but admittedly extensive software changes. It's easier and cheaper to change software than hardware.
  • by Tumbleweed ( 3706 ) on Monday August 04, 2003 @07:31PM (#6610760)
    > In that case, who would define "correct" addresses, the ISP? And how would they be defined? I have at least 1-2 email accounts that I retrieve mail from with POP3, but send outgoing mail with the same domain through my ISPs mail server because there is currently no other way. I own (or, more correctly, lease) the domains myself, so no one can legally tell me tell me that I can't send email using those domains. The fact that I send outgoing mail through my ISPs mail server happens to be a necessary evil.

    ---

    Aye, there's the rub. I do the same thing, what with having about 5 domains and various e-mail addresses for each.

    There needs to be:

    1) A way of verifying if you're allowed to use said mail server. Easy. Simple login/password over encrypted connection - technology already in place.
    2) A way of verifying what e-mail addresses & domains are allowed on outgoing e-mails from said mail sever. That would be new, but should be easy to develop.
    3) A way of destination server contacting the originating server and verifying the e-mail it received is from an authorized and stated e-mail account. That would be new, too, and would be a bit more complicated, but still fairly simple.
    4) While you're at it, you might as well encrypt the whole frigging process. The saying, "E-mail is not like a letter; it's like a postcard." should be obsolete. It should be like a letter written in a language only the sender and receiver can understand. By default. Every time. The technology is around, but needs to be standardized and integrated and something the user never has to set up or think about. I loved a recent commercial that said that something was really private, "as secret as your e-mail password." Yikes. People _really_ don't understand e-mail technology.

    Also, a way to have a mail server respond to a confirmation request only by servers it's sent mail to recently would be a good thing - that would cut down on trying to scan a server with a dictionary attack to get valid e-mail addresses to spam to.

    The problem is not that these are difficult technical challenges - they're not, and the technologies exist in fairly decent form already. The problem is getting this done in a standard and accepted way and out into the field for everyone to use. _That's_ gonna be a real bitch.
  • by Bryan Ischo ( 893 ) * on Monday August 04, 2003 @07:37PM (#6610802) Homepage
    As one of the posters in this thread pointed out, it would go a long way towards helping establish accountability on the part of spammers. If you have to be accessible in order for "recipients" of your mail to be able to read the mail, then I suppose you'd have to be pretty easy to track down and also sue under the current anti-spam laws.

    Anyway, it's just an idea. I think that the whole question of "should we come up with a new mail protocol" is kind of misguided because obviously the hard problems here are not technical, they're in dealing with the huge momentum built up around the current mail technologies. It seems to me that we already have all the technology that we need to solve this problem, it's more a matter of enforcement by ISPs. I was just posting the link because it was relevent.

    If you're the same Mr. Sam that made Courier, then thanks ... I've been using it on my server for years and really love it. I'd be particularly interested in hearing what your ideas are about the ways that we can solve the spam problem, given that you are the author of a complete modern mail system.
  • by davburns ( 49244 ) <davburns+slashdo ... m ['mai' in gap]> on Monday August 04, 2003 @07:42PM (#6610826) Journal
    SMTP has some problems (HELO / EHLO for "advanced" features, etc) but it still solves the basic problem of letting anyone on the internet append a message to my mailspool. If you want a new protocol to implement a "more secure" version of that, you'll have to define a security policy which is "more secure" than "anyone may append."

    The simplest such policy is a whitelist -- but this means you can't just give your email address to a friend, and expect her to be able to send you mail. It means that if your friends change email addresses, they can't just send you email saying "This is my new address -- my old ISP stinks!"

    A more complex policy might include some public key infrastrucure, where a user needs to have a valid key to sign their messages, in order to send mail. This brings up "who do you trust" in terms of who can sign message-signing keys, but more importaintly, who is going to have more trouble with this, a spammer that wants 100 throw-away accounts with keys per week, or someone's Mom who just wants to type a message and click "send?"

    I think that it will be little use in trying to come up with a protocol solution to spam, without first defining what security policy you need to enforce. Once you do that, you can design exactly what you need to make your new policy work. (You might even find that SMTP is not at fault -- you might just need a layer above that transport to secure your mailbox.)

  • by B.D.Mills ( 18626 ) on Monday August 04, 2003 @07:59PM (#6610953)
    There's not a lot wrong with SMTP. The trouble is that SMTP is always implemented so it delivers mail as fast as possible. And that's the problem.

    Judicious teergrubing (intentional slowing of responses; teergrube is German for tarpit) can alleviate many problems.

    For example, let's examine the Rumplestiltskin attack (a form of dictionary attack to guess e-mail addresses). The trouble here is that most mail servers send back their "No such account" response immediately, so an attacker can try about 5-15 addresses a second. If the mail server was programmed to wait 5 seconds before sending back the response, then the Rumplestiltskin attack would be slowed down by about 50 times. Even better would be to make the delay longer and longer for repeated attempts from the same IP. This way, a normal user with a couple of dud e-mail addresses is not harmed much, but the Rumplestiltskin attack eventually gets bogged down in the tarpit. We have a 3 second delay at the login prompt if we enter the wrong password, so why not a delay at the mail server for incorrect e-mail addresses?

    Another way to slow the spam is to teergrube *all* e-mail connections so all email takes a few minutes to send. Legitimate users aren't harmed much by this, but spammers are hurt a lot. Spammers rely on speed to send all their e-mail, and if we slow them down we can hurt them.

    Then there's the question of what happens if a spammer sends another RCPT or other similar packet before receiving the response from the first? SMTP can legally drop the connection because such command buffering may be "unsupported". So the spammer must be teergrubed or must experience a *lot* of dropped connections.

    There's no need to replace SMTP yet. Instead, we use the tools we have in a slightly different way, and the spammer can be inconvenienced a lot.

    For more information on teergrubing, go here [iks-jena.de].
  • by Anonymous Coward on Monday August 04, 2003 @08:11PM (#6611025)
    Actually, IM2000 has zero effect on the bandwidth requirements of SPAM ... a 1Kb message with 1000 recipients is 1000 Kb of bandwidth for the sender's ISP, no matter how you slice it, because it must be cloned by the sender's server *before* it is passed on to its various destinations.

    Nor does IM2000 impose a lot of storage requirements on the spammer's ISP, since that 1Kb message, even with 100,000 recipients, is still stored by that ISP as a single 1Kb message. It is only duplicated when picked up by the recipient. So the storage space required for a mass mailing is reduced to such a miniscule level, that it really doesn't significantly impact the spammer's own ISP to accept this duty.

    In fact, the only way in which I can think of that IM2000 makes things tougher on spammers, is that when their ISPs are notified of their shady activity, the ISPs can terminate their accounts and nip all of their pending spam in the bud before all of the recipients have picked them up. Whereas with SMTP you can't close the barn door after the horses have left, with IM2000 you possibly could. But this is not that important an advantage. By the time enough users have complained for the ISP to actually take this action, the overwhelming majority of recipients will have already checked their mail.

    So the verdict: IM2000 is essentially spam-neutral. But it is very ISP-friendly (in terms of storage not bandwidth) because as I mentioned in an earlier post it delays the cloning of an email for all its recipients until the moment each one retrieves it ... thereby erasing the need for *any* ISP to store thousands of copies of an identical message. As we get more and more mailings stuffed with media, this could become very important.

    TO RECAP: IM2000 does lift the storage burden of all that spam from the recipient's ISP. But only a very tiny percentage of that burden is shifted to the sender's ISP. The rest evapourates due to the advantages of the new paradigm.
  • by Czmyt ( 689032 ) <steve@czmyt.com> on Monday August 04, 2003 @08:17PM (#6611054) Homepage
    I believe in Baysian filtering, but it requires accepting and processing the entire message. As spam gets to be a greater and greater percentage of all e-mail, it's going to take more processing power to process it unless it's categorized quickly. It would be nice if any future solution did not require you to accept the entire message up-front.
  • by MemRaven ( 39601 ) <kirkNO@SPAMkirkwylie.com> on Monday August 04, 2003 @08:24PM (#6611099)
    Oh, come on now. You're being just a little bit crazy/paranoid/Slashdotty here.

    First of all, they're applying a common practice used elsewhere (i.e. the use of PKI and trust metrics to control authentication and non-repudiation) to email. It's not like they've invented the special Microsoft Email System which is radically different from everything that's happened before.

    Second of all, PGP and its web of trust are designed explicitly to avoid CA issues like you're describing. If the system is based on X509V3 certs and your web MUA controls your trusted roots, then yeah, they'd be in charge of what you'd be able to see (but presumably you'd have the ability to at least specify that you trust particular certificates).

    Third of all, even if they then "sell the ability to send spam," it'd be pretty easy to tell that they've done it, tell who sent the spam, and take your business elsewhere! The whole point of authenticated, non-repudiatable email is that you actually CAN determine WHO sent the email in the first place, so that you can then track said person down and tell them (politely of course) not to do that anymore. Spam becomes much less of an issue if everybody has to legitimately say who sent every email.

    So stop trying to bring about some type of scare tactic about what is probably the only real way to combat spam anyway.

  • by mrsam ( 12205 ) on Monday August 04, 2003 @08:28PM (#6611123) Homepage
    The key to solving the spam problem is to attack the definition of spam: "unsolicited junk E-mail." All that's needed -- really -- is a simple convention that may be used to designate whether a given E-mail message was solicited by its recipient, or not. That's it.

    For example, you see one of your own message IDs in the References: header of an incoming message. That tells you that it's a solicited response to one of your own messages. Unless you're a troll, presumably each one of your messages merits a response from an interested party. Additionally, by the virtue of sending the original message you've implicitly solicited appropriate replies.

    Now, I don't think anyone needs to keep track of every message they send. This is just a conceptual example of identifying solicited versus unsolicited E-mail. Once a method for doing so can be worked out, and put in widespread use, the spam problem will be gone.
  • by letxa2000 ( 215841 ) on Monday August 04, 2003 @08:29PM (#6611131)
    Also, to those people saying Bayesian filtering is so great, this doesn't solve my problems. To filter a message on content means I have to accept the damned thing first, and I don't know about anyone else but my inbound traffic costs me money.

    Sure, but for most of us the *time* involved in dealing with spam is a greater cost than the bandwidth involved in receiving it. Bayesian does a great job at solving the "waste of time" problem. And, as I said, if everyone used it I believe spam would disappear quite quickly because the response rate would fall too low for even spammers to have an interest.

    Blacklisting servers and not accepting connections from them (and accepting the collateral damage) is the only practical option I have.

    In the case of a few a spamhauses, sure. But as an effective spam-fighting measure that's a useless approach. You (or someone) has to keep up to date with the latest servers to blacklist (and then whitelist them when they become clean), or you have to deal with an annoying level of false positives that you don't even see. Sure, you can say that that's the price of users dealing with an ISP that is spam-tolerant. But some of us want to do business with those users even if they chose their ISP poorly--or if they don't have any local choice of ISP.

  • by Anonymous Coward on Monday August 04, 2003 @08:35PM (#6611180)
    Second of all, PGP and its web of trust are designed explicitly to avoid CA issues like you're describing.

    Can you explain how the web of trust will stop people from generating thousands of phoney identities (with the assistance of random helpful people; the same people who keep spreading email viruses)? Can you explain how this same system will allow anyone to send email to anyone else?

  • Clear as mud. (Score:4, Insightful)

    by HiggsBison ( 678319 ) on Monday August 04, 2003 @08:43PM (#6611234)
    I think locking down SMTP servers and requiring verified & correct return addresses would go a long way toward curbing spam.

    A combination of white lists/black lists, and Baysian filtering...

    Stop yer bitchin', people, and implement the technologies that are already out there and work great.

    This doesn't sound like a general solution for J. Random Homeowner.

    It sounds alot like "Well, shoot! Quit yer bitchin' an just put in some tuned ports and performance cam! Hell, my grandmother could do that!"

  • by letxa2000 ( 215841 ) on Monday August 04, 2003 @08:45PM (#6611240)
    Most do a very good job, but the problem is they don't work perfectly. For those of us who use email for work, *one* missed email can cause a lot of trouble and, occasionally, risk of job loss.

    I don't risk job loss (since I'm self-employed), but I do risk missed contracts. I use Bayesian. I've had an occasional false positive, mostly during the first couple months when I was building my corpus.

    BUT: I'm currently receiving about 140 spams per day. Do you really think I'm going to do any better than Bayesian regarding false positives when I'm mass-deleting 140 messages? I think not. I'm almost positive I'm going to incorrectly delete more good messages than Bayesian's false positive rate when I'm dealing with such a huge number of emails manually.

    Plus if your Bayesian system is half-decent you should be able to adjust its sensitivity. On mine 0-49% is almost always good email and 50%-99% is almost always spam. When I look for false positives I look for anything unusually low, such as 65% or so. If you want, just adjust your threshold to 65%. I've never had a valid email with a Bayesian score of, say, 90%.

  • by Muggins the Mad ( 27719 ) on Monday August 04, 2003 @09:38PM (#6611652)

    The problem is spammers can write their own software to give them the ability to store 1 email and billions of aliases to that one email used for spamming.


    It's not so much the storage, it's the bandwidth that costs, I think.

    Sure, they can store one email and send out millions of notifications from "different" addresses.

    But as soon as people start reading it, those networks are going to start getting really busy.

    A self-slashdotting type effect.

    - Muggins the Mad
  • by Czmyt ( 689032 ) <steve@czmyt.com> on Monday August 04, 2003 @10:40PM (#6612110) Homepage
    I think the spam situation is going to get so bad that everyone is going to have to move to a system where messages are cryptographically signed in order to vouch for their authenticity, and where being whitelisted will be important in order to bypass the otherwise stringent checks required. I think that the sender should basically send a signed copy of the headers of the message, and that would allow the e-mail system to decide if it will accept the message or not. When signatures appear on your whitelist, you can pass the messages right through to the recipient. I think the headers should include the overall size of the message, so that administrators can limit messages based on their size: maybe they want to accept messages from untrusted sources only if they're less than 2K in size, for example. I think the new e-mail protocol should have an option to ask for payment by having the sender perform an operation whose results can be checked easily but that requires a certain number of GFLOPS to complete: maybe some sender is not known to you, but you're willing to accept up to 8K from them if their Pentium-class computer spends 15 seconds calculating some problem.
  • by billstewart ( 78916 ) on Monday August 04, 2003 @10:52PM (#6612179) Journal
    You're not correct. If the payment is charged by the email recipient, and the email recipient is willing to reject email that doesn't have attached payments (not universally true...), then ANYBODY can start pay-by-email system Right Now, and it'll protect them from unwanted email, just as anybody can implement "reply-to-my-turing-test-response" right now without anybody else being in control. Centralized systems are only needed if you want to force senders to pay non-economics-based amounts to somebody other than the recipient of the email.

    Implementing it on a recipient-controlled basis is not only politically correct anarcho-capitalism (as opposed to central-planner-based and doomed to failure), it matches the main problem with spam, which is that it wastes the recipient's time, and only the recipient knows what that time is worth., and the recipient of the mail is the one who gets the money, not some middleman whose time isn't being wasted. If I dislike spam more than you do and am more willing to reject mail from people who might have interesting things to say, I can charge more money to read email than you do. Yes, email-provider ISPs also have higher workloads because ~50% of email is spam, but that's a much smaller amount of money per recipient than the wasted time, and they can charge the users accordingly.

    Of course, if the recipient of the email gets paid for receiving the email, there's an obvious product for spammers to sell "Get paid receiving email" ;-)

  • by wirelessbuzzers ( 552513 ) on Monday August 04, 2003 @10:57PM (#6612196)
    A combination of white lists/black lists, and Baysian filtering stops so close to 100% of spam that it's really silly for anyone to be bitching about spam these days. I don't GET any spam anymore - 0. Not 0.001%, 0 - the integer 0, as in none.

    Have you done the power-curve analysis on that? My mother works at a law firm, and they once tried to install a spam filter. It was state-of-the-art, with Bayesian filtering, and white/black lists, and additional whitefilters on top. It blocked most (not all) of their spam. But it also blocked some tiny fraction of legitimate messages.

    Even if you have the (extremely impressive) power curves of Paul Graham's Plan for Spam -- and that was on a very well-trained Bayesian filter written by a coding genious -- it is Not Good Enough when missing a legit email could get you sued for millions. Either you risk blocking legit email, or else you have to wade through a pile of spam bigger than that legit email... either way, another protocol would be nice.
  • by dsfox ( 2694 ) on Monday August 04, 2003 @11:24PM (#6612333) Homepage
    The people who design a new mail protocol should, at the very least, all know the current one backwards and forwards.
  • by thrillseeker ( 518224 ) on Monday August 04, 2003 @11:27PM (#6612352)
    Even if you have the (extremely impressive) power curves of Paul Graham's Plan for Spam -- and that was on a very well-trained Bayesian filter written by a coding genious -- it is Not Good Enough when missing a legit email could get you sued for millions.

    Email is not a guaranteed service - no one is ever going to be sued for millions for not receiving an email. Things that *must* be delivered will continue to be put into a hard copy format and delivered by courier with a signature required.

  • by Deven ( 13090 ) <deven@ties.org> on Tuesday August 05, 2003 @12:19AM (#6612619) Homepage
    A combination of white lists/black lists, and Baysian filtering stops so close to 100% of spam that it's really silly for anyone to be bitching about spam these days. I don't GET any spam anymore - 0. Not 0.001%, 0 - the integer 0, as in none. If I ever get another piece of spam, then I'll change my email address
    [...]
    Stop yer bitchin', people, and implement the technologies that are already out there and work great. Plus use yer freakin' brains for a change, and don't spew out your real e-mail address to everybody who asks for it.

    Don't make claims that the current technologies are "so close to 100%" if you're not willing to put your money where your mouth is. Post your email address far and wide, then see if you still don't get any spam. Otherwise, don't get up on your high horse and tell people they shouldn't worry about spam.

    Security through obscurity sucks. We need a better solution for spam.
  • by 1u3hr ( 530656 ) on Tuesday August 05, 2003 @03:21AM (#6613312)
    it is Not Good Enough when missing a legit email could get you sued for millions.

    Email can fail to arrive, or be read, for any number of reasons. It passes through several servers, each of which could fail and lose mail. Same for snail mail -- you require assurance/proof snail mail was delivered, you use registered mail, and get a receipt. There are few if any circumstances you could claim in court someone was liable for not receiving an email that you had sent and not verified had been received.

    If something is in the "millions" category, you fly there and do it in person.

  • by aardvarkjoe ( 156801 ) on Tuesday August 05, 2003 @12:17PM (#6615906)
    So why not just stick with the whitelist, and not worry about the 'pay for mail' part?

    You've never wanted to e-mail somebody who doesn't know you personally?

"Engineering without management is art." -- Jeff Johnson

Working...