Skip to main content

SPF DoS Exploitation
draft-otis-spf-dos-exploit-01

Document Type Expired Internet-Draft (individual)
Expired & archived
Author Douglas Otis
Last updated 2006-06-27
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document describes an email induced Denial of Service threat from SPF script used to evaluate the association of a source domain- name with the sending-system. The SPF script attempts to establish the domain-name association through the construction of an extensive IP address list of all sending-systems. Expectations of an association have become problematic, as message handling might be negatively affected without an apparent domain-name relationship discovered between the sending-system and either the message envelope or the message itself.

Authors

Douglas Otis

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)