Jack Ryan wrote:
> > What exactly is a friendly?
>
> A sender of non-spam. Solicited. Alice says to Bob "please email
> me your phone number", and Bob e-mails Alice his phone number.
I don't expect to get "friendly" email directly (direct-to-mx to our
SMTP server) from machines connected to the internet on
dynamically-assigned IP addresses.
The VAST majority of IPv4 IP space is dynamically allocated, because the
vast majority of devices with internet connections are not servers.
> > Every /16 IPv4 net-block gets exactly ONE chance to send my company
> > an email.
>
> If you're basing this wholly on IP address, you're doing something
> incompetent. IPs change.
They change at a very slow rate. And the the odds that a netblock that
once sent me spam is now operating an smtp server from which I would
ever expect to get "friendly" mail is even more remote.
> many will reject all IPs that simply appear on someones
> blacklist of IPs that are dynamic, for example.
If the IP or IP-block in question _really_ is dynamic, then the ISP
should prohibit port-25 traffic from said IP or IP net-block from
reaching the internet beyond the ISP's gateway. It's just that simple.
Customers with dynamic IP's have no business running their own SMTP
server. For every such customer that really wants to AND has a legit
reason why he doesn't have a static IP, there are a million others that
don't know what an SMTP server is but are nonetheless running one the
form of a trojanized spambot.
> > If a new legit prospective customer can't send us mail because
> > of a pre-existing block - guess what. Our contact page includes
> > our phone number, and an alternate gmail contact address that
> > gets forwarded to us automatically.
>
> If it goes to that, you've already violated RFC 5321,
You should see the hundreds or thousands of "connection denied" entries
in my SMTP server's daily log entries from the god damn sewer pipe of
the precious IP's that you want to protect their ability to send spam.
> and done more damage than spam.
Oh, you fucking liberal asswipe.
I've damaged those poor spambots, I've hurt them because I've denied
them the ability to connect to my server.
Oh, I'm crying that I've damaged them so much.
> Offering other means isn't real relevant to the topic, and
and fuck you.
I'm describing the way that small companies that manage their own SMTP
server should operate. I'm going to publish the next version of my
super-excellent IP blocking list soon. Stay tuned.
> Many clients (quite rightly) don't have the patience to do extra work
> to give business. I get the impression you work in a country that's
> not very capitalistic.
Canada is far more capitalist than the USA has been for the past
decade. We're wiping your ass in all sorts of ways (economic, civil and
personal freedom, social, etc). The USA is a socialist basket case
now.
> It's also amusing that gmail is your e-mail backup, because
> google is even sloppier than your org. Google blocks IPs
> simply for being dynamic.
Good for them, because I dare you to give an example of getting legit
(friendly) mail direct-to-mx from a dynamic IP address.
Do you even know what direct-to-mx is?
> > Anyone offering residential internet connectivity (and connectivity
> > to any customer given a dynamic IP address) should block said
> > customer's ability to communicate (send packets) beyond the
> > ISP's network on port-25.
>
> This nonsense proves your misunderstanding about the client/supplier
> relationship. Getting a partial/nannied service is an *disservice*.
You are a complete dink.
Someone that is a customer of an ISP and has a single assigned IP
address (probably a dynamic IP) and uses a client like thunderbird,
outlook, etc to send mail, will simply tell their software to use
SMTP.their-ISP.com on port-25 to send mail. If their computer becomes
infected and part of a botnet, it won't be able to send spam
direct-to-mx (directly to the internet to the destination server)
because the ISP blocks port-25 to any destination other than
smtp.their-ISP.com.
If the customer wants to send mail through another SMTP server outside
of the ISP's network, then they use port 465 (or what-ever) and probably
use SSL and authentication.
Explain why what I've just described shouldn't be the way that things
work.
Explain why it would be some sort of hardship or handical for things to
work that way.
Explain if there is any lack of functionality at all for the ISP's
customers if things worked that way.
> It's *lack of service*. Would be comparable to an auto mechanic
> installing a governor or making an adjustment to slow down your
> car.
Clearly, you have zero understanding of the situation.
Anything leaving a dynamically-assigned IP address destined for port-25
on an external network (the cloud) is going to be spam, and shouldn't
even be allowed to reach the cloud in the first place.
> > As a class of users, that class has absolutely no business
> > sending direct-to-mx from their IP to the outside world on
> > port-25.
>
> Bullshit.
>
> An ISP has no business snooping on users email headers,
This is not snooping.
The ISP blocks (or should block) all packets that want to connect to
port 25 on an external IP (external to the ISP's network). No email
header-snooping. Anyone that wants their outgoing mail to be handled by
another server in the cloud simply connects to that server on another
port, like 465. Anyone that doesn't care how their outgoing mail is
handled would simply have their outgoing SMTP server pointed to their
ISP's outbound MTA or smart-host - on port 25, 465, etc. This is
standard stuff.
> and forcing them (needlessly) to trust the ISP to deliver the
> message,
Anyone who doesn't "trust" their ISP to deliver their message has
several options. If they have the technical means to operate their own
SMTP server, then there is no excuse for them not to have a static IP
address, where they can control and assign the rDNS lookup.
If they don't have a static IP, then they are fair game to have their
mail blocked by IP-based blacklists.
If they don't operate their own SMTP server, but instead want to use an
external server (yahoo, gmail, hotmail/live/etc) then they would use a
standard port like 465 (tell me which of those accepts connections on
port 25 anyways?)
> > As a corollory, the ISP must therefore provide an MTA or smart-host
> > operating on port-25 for said customers to send e-mail to the
> > outside world.
>
> By what authority? Oh, what a privilege to have a facility in
> place to nanny me, and view my mail traffic. No thanks.
What a crock. Port 25 offers no encryption, no privacy. You've failed
at your own argument.
Do you have an internet connection at home?
Does that connection have a dynamic or static IP?
When you compose and send mail from home, does your email client
directly connect to the recipient's mail server, or does it connect to
an intermediate SMTP server?
If intermediate server, is that server operated by you (located in your
home), or operated by your ISP, or is it somewhere else on the internet?
How exactly would you be harmed if your ISP blocked all OUT-BOUND
port-25 traffic at it's boundary with the internet?
If you connect to the interent via a single dynamically-assigned IP, you
have no business sending anything destined for port-25 on an external
network. There are PLENTY of options available to you in that case to
send mail with or without using your ISP's servers.
I dare you to give an example of anyone (home or soho) that connects to
the internet via a single dynamically-assigned IP that has a legit need
to send mail direct-to-mx (directly to the recipient's mail server)
OR
who can't (or don't) point their email client's outbound SMTP server to
their ISP's outbound MTA or (by using a port other than 25) to an
external smtp server (yahoo, gmail, hotmail, etc).
Don't be a coward. Give an example.
> If I'm the customer, I'll be the judge of what transport layer
> encryption is sufficient.
This has nothing to do with encryption.
My SMTP server receives mail for local accounts on port-25 (and ONLY
port-25) from any IP in the world that is not listed in it's blacklist.
To my knowledge, there is no encryption used when this mail is received.
Look.
I'm not the only one who feels that large ISP's should block port-25
out-bound at their network boundary.
Read this:
http://customer.comcast.com/help-and-support/internet/email-port-25-no-longer-supported/
=====================================
Introduction
Email is used for important communications and Comcast wants to ensure
that these communications are as secure and as private as possible. As
such, Comcast does not support port 25 for the transmission of email by
our residential Internet customers. Much of the current use of port 25
is by computers that have been infected by malware and are sending spam
without the knowledge of the users of those computers.
Why is Comcast Supporting Port 587?
The original/legacy email ports, 25 and 110, have been in use since the
inception of email and have limited or no security features. As a
result, port 25 has been used for the transmission of spam and malware
from infected computers for nearly a decade. Port 110 simply is not a
secure means of retrieving email. Port 995 provides SSL encryption when
downloading email.
It has been a long standing recommendation from M3AAWG, an international
community of anti-abuse professionals, and the Internet Engineering Task
Force (IETF), that port 25 be blocked. In an effort to provide our
customers with the greatest security when using email, Comcast
recommends the use of the industry-recommended port 587 with TLS/SSL
enabled. The recommendations from M3AAWG can be read here and you can
also view the IETF RFC 5068 and RFC 4409 (section 3.1, see below).
From RFC 4409:
3.1. Submission Identification
Port 587 is reserved for email message submission as specified in this
document. Messages received on this port are defined to be submissions.
The protocol used is ESMTP [SMTP-MTA, ESMTP], with additional
restrictions or allowances as specified here. Although most email
clients and servers can be configured to use port 587 instead of 25,
there are cases where this is not possible or convenient. A site may
choose to use port 25 for message submission by designating some hosts
to be MSAs and others to be MTAs.
What Makes These Settings More Secure?
Port 587 further improves security through the use of required
authentication and recommended TLS/SSL encryption.
Required Authentication
When sending and receiving email, it is required that you use your
Comcast ID and password. This helps to prevent infected computers and
other devices connected to the XFINITY services from being able to
freely transmit spam and malware.
SSL Encryption
Secure Sockets Layer (SSL) is a secure protocol for sending data safely
and encrypted over the Internet. With SSL encryption your user ID,
password, and email are secured from hackers and identity thieves when
sending or receiving email.
Other Bodies Opposed to the Use of Port 25
There are a number of other organizations that Comcast works with to
control the problem of spam on the Internet. One of the most notable of
these is Spamhaus, an organization that provides a number of lists
detailing IP addresses known to send a great deal of spam and a list of
IP addresses that should never send email at all. These lists as well as
others provided by similar organizations are used by nearly all of the
ISPs and mail receivers on the planet. All of the Comcast dynamic IP
address space is listed by Spamhaus as not to be used for the sending of
email. As such, any email sent by subscribers on the Comcast network
directly to other ISPs (not via the Comcast mail servers) is extremely
likely to be blocked by the receiving ISP.
The Federal Trade Commission, an organization that has taken legal
action against many spammers, also recommends that Port 25 should be
blocked by ISPs. The FTC’s recommendation is as follows:
“Block port 25 except for the outbound SMTP requirements of
authenticated users of mail servers designed for client traffic. Explore
implementing Authenticated SMTP on port 587 for clients who must operate
outgoing mail servers.”
The ITU also recommends blocking port 25 in their document named “ITU
Botnet Mitigation Toolkit”. This can be viewed here. While this document
is focused on the remediation of botted computers, blocking of port 25
is seen as an important step in mitigating the spam that is sent from
botted machines.