Network Working Group
Internet-Draft C. Kularski
Expires: June 2004 Highland School
of Technology
Category: Informational January 2004
Compound Procedures for SPAM Control
draft-kularski-spam-spamreduce-06.txt
Status of this Memo
This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Abstract
This document gives instructions for implementing a mail system that
will reduce the amount of SPAM received by the end users. The
instructions specify disposable and single-purpose mailboxes that
will allow for the source of SPAM to be easily identified.
Copyright Notice
Copyright (C) The Internet Society (2003). All Rights Reserved.
Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC-2119 [i].
KULARSKI Expires û March 2004 [Page 1]
Internet-Draft Compound SPAM Control Procedure January 2004
1. Introduction
The procedures outlined in this document require an SMTP
implementation that is capable of handling custom addressing
schemes required by this document. The SMTP service itself should
remain in compliance with all standards and specifications.
This document is NOT a guaranteed solution to SPAM, as of this
documentÆs creation no technology existed that would eliminate
SPAM completely. This document contains possible solutions that
can reduce SPAM, if you are creative with implementing the
solutions you will be more successful in reducing SPAM.
2. Address Structuring Considerations
The procedures in this document are easiest to implement using a
sub-domain for each user, such as "user.example.net". The sub-
domain SHOULD NOT be defined explicitly, it should be assigned as
a wildcard (*) Mail Exchanger RR. If you have a large number of
users it will be more efficient to use the dotted or hyphened
nomenclature specified in item 3.
3. To avoid DNS issues completely you can use a dotted (.) or
hyphenated naming structure before the "at" (@) symbol. The more
creative you are with the design of your address schema the fewer
SPAM messages your domain is likely to receive.
4. Email Addresses
There are three main classifications of email address which must
be defined.
Addresses for Automated and Non-Trusted Sources û This set of
addresses is defined by the user. There MUST be a way for the user
to easily change his/her list of available addresses quickly and
easily. The user will need the ability to add and delete addresses
from the list. The user will assign a unique address to each non-
trusted email source. If the source misuses the address, then the
address can be disposed of by deleting it from the list. Mail
received by these addresses should be deposited in the userÆs
primary mailbox. If a user needs an excessive amount of non-
trusted source address a wildcard address can be used for this
purpose (with the ability to kill abused addresses), but it is not
recommended.
Address for Personal Communication û The address for personal
communication is a single email address defined by either the user
or the administrator. This address will most likely be the one
used as the primary mailbox for the user. The user should give
this address only to human sources that are unlikely to spread the
address. This address is optional.
KULARSKI Expires - June 2004 [Page 2]
Internet-Draft Compound SPAM Control Procedure January 2004
Addresses for Common Services, Roles and Functions û Addresses
defined by RFC 2142[ii] should be directed to the mailbox of the
appropriate function on the primary domain (example:
abuse@user.example.net is delivered to abuse@example.net).
5. Considerations for Each Address Type
Each address type has its own special needs for them to be used to
their full potential and to allow the least amount of SPAM in.
Addresses for Automated and Non-Trusted Sources û These addresses
MUST be unique to each source. Mail for these addresses can be
filtered to add an additional level of SPAM elimination, but the
nature of these addresses will significantly reduce the amount of
SPAM received.
Address for Personal Communication û This address should be
protected in several ways. First, the address should not be widely
distributed and should NEVER be used for newsgroups, web pages or
any purpose where it will be publicly viewable. Additionally the
mailbox SHOULD use a whitelist (and blacklist) system to authorize
senders. Score-based SPAM detection systems can also be reliable
in "weeding out" SPAM from this box. Failing to adequately protect
this address will defeat the purpose of this document.
Addresses for Common Roles, Services and Functions û due to the
nature of these addresses they should not be extremely
restrictive, but due to the nature of SPAM attacks some protection
is advisable.
6. Possible Special Addresses
In addition to the addresses for non-trusted sources temporary
addresses that expire after a certain amount of time has elapsed
can be used for situations where SPAM is imminent, such as
newsgroup communication.
7. Address Examples
Sub-domain Non-trusted source û source@user.example.net
Dotted-user Non-trusted source û source.user@example.net
Hyphened-user Non-trusted source û source-user@example.net
Sub-domain Personal û user@user.example.net
Dotted (or Hyphened) Personal û user@example.net
Security Considerations
The information in this document introduces no Security Concerns.
References
KULARSKI Expires - June 2004 [Page 3]
Internet-Draft Compound SPAM Control Procedure January 2004
i Bradner, S., "Key words for use in RFCs to Indicate Requirement
Levels", BCP 14, RFC 2119, March 1997
ii Crocker, D., "Mailbox Names for Common Roles, Services and
Functions", RFC 2142, May 1997
Author's Addresses
Curtis M. Kularski
219 Best St
Bessemer City, NC 28016-9330
United States
Phone: +1 (704) 629-2498
Email: spamreducedraft@curtis.kularski.us
Full Copyright Statement
Copyright (C) The Internet Society (2003). All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be
followed, or as required to translate it into languages other than
English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assignees.
This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
KULARSKI Expires - June 2004 [Page 4]
Internet-Draft Compound SPAM Control Procedure January 2004
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
KULARSKI Expires - June 2004 [Page 5]