[afrinic-anti-spam-discuss] Deploying SPF
Graham Beneke
graham-ml at apolix.co.za
Sat Sep 29 11:06:42 SAST 2007
There were requests at the antispam BoF that we share our experinces and
best practices. Here are my comments on Sender Policy Framework.
In a nutshell - SPF is a system whereby a domain administrator is able
to define a list of the servers designated to send mail for the domain.
The reason that this is neccessary is that the original SMTP protocol
has no way of verifying the MAIL-FROM header that is transmitted during
the SMTP transaction.
There are two things that SPF is trying to mitigate:
The forgery or spoofing of mail from trusted domain names like banks and
government organisations.
And preventing spammers from diguising their mail as originating from
other domains.
The first issue is obviously very important in terms of phishing attacks
and other kinds of fraud. And SPF has been successful in preventing some
of the phishing scams that have occurred around the world.
In the second case - I am experiencing more and more spam runs where the
spammers are targetting one domain name as the forged source of the mail
and then sending out thousands of mail. Although this does not produce
spam directly there are often thousands of messages that fail to deliver
and all the "message delivery failure" messages then get sent to the
forged domain. This can cause thousands of emails to arrive at a mail
server in a matter of minutes. This is a concern for African operators
due to the costs of bandwidth and it can force mail servers into DoS.
There are two aspects of SPF:
The filtering of incoming mail. This requires patches or changes to the
configuration on many MTA's. On my MTA's SPF filtering currently
accounts for approximately 1% of the mail that is rejected by my server.
The SPF setup for the sending side of the process simply involves
writting one extra record into the DNS zone of each domain. This is a
relatively quick and simple process (taking less than an hour in
general) and produces huge benefits for the amount of effort required.
There are a number of large operators that have implemented SPF
(including gmail). Although there are also many servers that do not yet
filter based on SPF records, it has now reached a critical mass whereby
it is generally not viable for a spammer to spoof an SPF protected
domain. If a domain is being the subject of a spoofing attack and an SPF
record is implemented then the spoofing attacks very often subside in
less than 3 weeks.
It is important however to note that SPF is not specifically a spam
prevention technique. There are spammers who are now registering
'throw-away' domains that they publish SPF records for and then use
these as the source address for their messages. SPF does however close a
major loophole in the SMTP specification and prevents abuse of the mail
system.
More details can be found on the SPF website http://www.openspf.org
I'd be happy to respond to questions or comments on the list.
regards
Graham Beneke
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.afrinic.net/pipermail/anti-spam/attachments/20070929/2fcb4e8b/attachment-0001.htm
More information about the anti-spam
mailing list