Hi John, On the general issue, as the late Brian Kantor said, RFCs serve us best when they document existing practice. This is entirely in accord with the “running code” part of our mantra: if network needs dictate that the RFC not be followed to the letter, then so be it. I would actually like that we are demonstrating this point and reenforcing that our standards are voluntary, but for the fact that I don’t think the standard was substantially violated. That’s my second point. If one looks at RFC 5321, there are three reasons to think that really the standard does not prohibit the behavior being described. First, the text in 4.1.4 doesn’t actually prohibit the rejecting literals. Here is what is said: If the EHLO command is not acceptable to the SMTP server, 501, 500, 502, or 550 failure replies MUST be returned as appropriate. At this point in the transaction, it may not be readily apparent that the EHLO indeed is unacceptable. That’s because the server may need to gather more information, such as the recipient, in order to check against SPF records or other inputs delivered later to make a decision. An SMTP server MAY verify that the domain name argument in the EHLO command actually corresponds to the IP address of the client. However, if the verification fails, the server MUST NOT refuse to accept a message on that basis. That “MUST NOT” conflicts with the most important principle we have to go with in order to defend against spam and malware, as clearly stated in Section 7.9: It is a well-established principle that an SMTP server may refuse to accept mail for any operational or technical reason that makes sense to the site providing the server. And so the server chose to reject a message. I would add that an erratum should be filed to resolve this conflict. Finally, we cannot CANNOT CANNOT micromanage secretariat and mailing list operations on the IETF list. This does NOT impact open participation, when anyone can get free email service on any number of platforms that work just fine with the IETF. That this message didn’t meet the extremely low barrier of setting up a PTR record when > 99% of SMTP client connections are best classed as attacks. That THAT isn’t recognized as THE problem the IETF should work on with regard to email is disturbing. Eliot
|
Attachment:
signature.asc
Description: Message signed with OpenPGP