RFC2505 日本語訳

2505 Anti-Spam Recommendations for SMTP MTAs. G. Lindberg. February 1999. (Format: TXT=53597 bytes) (Also BCP0030) (Status: BEST CURRENT PRACTICE)
プログラムでの自動翻訳です。
英語原文

Network Working Group                                        G. Lindberg
Request for Comments: 2505             Chalmers University of Technology
BCP: 30                                                    February 1999
Category: Best Current Practice

コメントを求めるワーキンググループG.リンドバーグ要求をネットワークでつないでください: 2505年の技術BCPのチャーマーズ大学: 1999年2月30日のカテゴリ: 最も良い現在の習慣

                Anti-Spam Recommendations for SMTP MTAs

SMTP MTAsのための反スパム推薦

Status of this Memo

このMemoの状態

   This document specifies an Internet Best Current Practices for the
   Internet Community, and requests discussion and suggestions for
   improvements.  Distribution of this memo is unlimited.

このドキュメントはインターネット共同体、要求議論、および提案のためのインターネットBest Current Practicesを改良に指定します。 このメモの分配は無制限です。

Copyright Notice

版権情報

   Copyright (C) The Internet Society (1999).  All Rights Reserved.

Copyright(C)インターネット協会(1999)。 All rights reserved。

Abstract

要約

   This memo gives a number of implementation recommendations for SMTP,
   [1], MTAs (Mail Transfer Agents, e.g. sendmail, [8]) to make them
   more capable of reducing the impact of spam(*).

このメモはSMTPのために実現推薦を番号を打ちます、[1]、MTAs。(Transferエージェント、例えば、sendmail(彼らをスパム(*)の衝撃をより減少させることができるようにする[8]))に郵送してください。

   The intent is that these recommendations will help clean up the spam
   situation, if applied on enough SMTP MTAs on the Internet, and that
   they should be used as guidelines for the various MTA vendors. We are
   fully aware that this is not the final solution, but if these
   recommendations were included, and used, on all Internet SMTP MTAs,
   things would improve considerably and give time to design a more long
   term solution. The Future Work section suggests some ideas that may
   be part of such a long term solution. It might, though, very well be
   the case that the ultimate solution is social, political, or legal,
   rather than technical in nature.

意図はインターネットの十分なSMTP MTAsに適用されるとこれらの推薦が、スパム状況をきれいにするのを助けて、彼らが様々なMTA業者にガイドラインとして使用されるべきであるということです。 私たちがこれが最終的な解決でないことを百も承知していますが、これらの推薦が含まれていて、使用されるなら、すべてのインターネットSMTP MTAsでは、いろいろなことは、より長い用語ソリューションを設計する時間をかなり改良して、与えるでしょうに。 Future Work部はそのような長期解決策の一部であるかもしれないいくつかの考えを示します。 もっとも、根本的な解決が社会的であるか、政治上であるか、または現実に技術的であるというよりむしろ法的であることが、非常によく事実であるかもしれません。

   The implementor should be aware of the increased risk of denial of
   service attacks that several of the proposed methods might lead to.
   For example, increased number of queries to DNS servers and increased
   size of logfiles might both lead to overloaded systems and system
   crashes during an attack.

作成者はいくつかの提案された方法がつながるかもしれないサービス不能攻撃の増加するリスクを知っているべきです。 例えば、ログファイルのサーバと増加するサイズがともに通じるかもしれないDNSへの増加する数の質問が攻撃の間、システムとシステムクラッシュを積みすぎました。

   A brief summary of this memo is:

このメモの簡潔な概要は以下の通りです。

   o   Stop unauthorized mail relaying.
   o   Spammers then have to operate in the open; deal with them.
   o   Design a mail system that can handle spam.

o 次にリレーo Spammersが戸外で操作しなければならない権限のないメールを止めてください。 スパムを扱うことができるメールシステムをそれらによる. o Designまで取扱ってください。

Lindberg                 Best Current Practice                  [Page 1]

RFC 2505               Anti-Spam Recommendations           February 1999

推薦1999年2月の反スパムのリンドバーグ最も良い現在の習慣[1ページ]RFC2505

1. Introduction

1. 序論

   This memo is a Best Current Practice (BCP) RFC.  As such it should be
   used as a guideline for SMTP MTA implementors to make their products
   more capable of preventing/handling spam.  Despite this being its
   primary goal, an intended side effect is to suggest to the
   sysadmin/Postmaster community which "anti spam knobs" an SMTP MTA is
   expected to have.

このメモはBest Current Practice(BCP)RFCです。 そういうものとして、SMTP MTA作成者が彼らの製品をスパムを防ぐか、または、より扱うことができるようにするのにそれはガイドラインとして使用されるべきです。 この存在にもかかわらず、第一の目標、意図している副作用はSMTP MTAにはどの「反スパムノブ」があると予想されるかをsysadmin/郵便局長社会に示すことになっています。

   However, this memo is not generally intended as a description on how
   to operate an SMTP MTA - which "knobs" to turn and how to configure
   the options. If suggestions are provided, they will be clearly marked
   and they should be read as such.

しかしながら、一般に、このメモは記述としてどうSMTP MTAを操作するかに関して意図しません--ターンするどの「ノブ」とオプションを構成する方法。 提案を提供すると、明確にそれらをマークするでしょう、そして、そういうものとしてそれらを読むべきです。

1.1. Background

1.1. バックグラウンド

   Mass unsolicited electronic mail, often known as spam(*), has
   increased considerably during a short period of time and has become a
   serious threat to the Internet email community as a whole. Something
   needs to be done fairly quickly.

大規模求められていないスパム(*)としてしばしば知られている電子メールは、短期間の間、目に見えて増えていて、全体でインターネットメール共同体への重大な脅威になりました。 何かが、かなりすぐにする必要があります。

   The problem has several components:

問題には、数個のコンポーネントがあります:

   o   It is high volume, i.e. people get a lot of such mail in their
       mailboxes.

o それが高いボリュームである、すなわち、人々は彼らのメールボックスの中にそのような多くのメールを受け取ります。

   o   It is completely "blind", i.e. there is no correlation between
       the receivers' areas of interest and the actual mail sent out (at
       least if one assumes that not everybody on the Internet is
       interested in porno pictures and spam programs...).

o それは完全に「盲目であり」、すなわち、受信機の興味がある領域の間には、相関関係が全くなくて、実際のメールは出されました(少なくとも、人が、インターネットのみんながポルノの絵に興味を持っているというわけではないと仮定するかどうか、そして、スパムプログラム…)。

   o   It costs real money for the receivers. Since many receivers pay
       for the time to transfer the mailbox from the (dialup) ISP to
       their computer they in reality pay real money for this.

o それは受信機のための現金かかります。 多くの受信機が(ダイアルアップ)ISPからそれらのコンピュータまでメールボックスを移す時に支払われるので、それらはこの現金をほんとうは支払います。

   o   It costs real money for the ISPs. Assume one 10 Kbyte message
       sent to 10 000 users with their mailboxes at one ISP host; that
       means an unsolicited, unexpected, storage of 100 Mbytes.  State
       of the art disks, 4 Gbyte, can take 40 such message floods before
       they are filled. It is almost impossible to plan ahead for such
       "storms".

o それはISPのための現金かかります。 彼らのメールボックスが1人のISPホストにある状態で000人のユーザが1つ10のキロバイトメッセージで10に行ったと仮定してください。 それは100Mbytesの求められていなくて、予期していなかった格納を意味します。 それらがいっぱいにされる前に最先端のディスク(4ギガバイト)はそのような40回のメッセージ洪水を取ることができます。 先でそのような「嵐」の計画を立てるのはほとんど不可能です。

   o   Many of the senders of spam are dishonest, e.g. hide behind false
       return addresses, deliberately write messages to look like they
       were between two individuals so the spam recipient will think it
       was just misdelivered to them, say the message is "material you

o スパムの送付者の多くが不正直であり、例えば、虚偽の申告アドレスの後ろに隠れてください、そして、スパム受取人が、それがただ彼らにmisdeliveredされたと考えるように、故意に2人の個人の間には、それらがあったように見えるメッセージを書いてください、そして、メッセージが」であると言ってください。

Lindberg                 Best Current Practice                  [Page 2]

RFC 2505               Anti-Spam Recommendations           February 1999

推薦1999年2月の反スパムのリンドバーグ最も良い現在の習慣[2ページ]RFC2505

       requested" when you never asked for it, and generally do
       everything they can without regard to honesty or ethics, to try
       to get a few more people to look at their message.

あなたが決して自ら災難を招かないで、人々に彼らのメッセージをもう少し見させようとするように一般に彼らが関係なしでそうすることができるすべてを正直か倫理学にすると、「要求されます」。

       In fact some of the spam-programs take a pride in adding false
       info that will "make the ISPs scratch their heads".

事実上、いくつかのスパムプログラムが「ISPを頭をかかせる」誤ったインフォメーションを加える際に鼻にかけます。

       It is usually the case that people who send in protests (often
       according to the instructions in the mail) find their mail
       addresses added to more lists and sold to other parties.

通常、抗議(しばしばメールにおける指示によると)を送る人々が、より多くのリストに追加されて、相手に販売された自分達の郵便の宛先を見つけるのは、事実です。

   o   It is quite common practice to make use of third party hosts as
       relays to get the spam mail sent out to the receivers. This theft
       of service is illegal in most - if not all - countries (at least
       in the US spammers have been successfully sued).  However, with
       the original sender in the US, the (innocent) relay in Sweden and
       the list of receivers back in the US, the legal process of
       getting damages from the spammers becomes extremely difficult.

o 受信機への外に迷惑メールを送らせるのにリレーとして第三者ホストを利用するのは、全く一般的な習慣です。 このサービスの窃盗は大部分--そうでなければ、すべて--国で不法です(少なくとも米国のスパマーでは、首尾よく訴えられてください、そうした)。 しかしながら、米国の元の送り主、スウェーデンの(潔白)のリレー、および受信機のリストが米国にある状態で、スパマーから損害賠償を得る法的な過程は非常に難しくなります。

1.2. Scope

1.2. 範囲

   This memo has no intention of being the final solution to the spam
   problem.

このメモには、スパム問題の最終的な解決であるという意志が全くありません。

   If, however, enough Internet MTAs did implement enough of the rules
   described below (especially the Non-Relay rules), we would get the
   spammers out in the open, where they could be taken care of. Either
   pure legal actions would help, or we can block them technically using
   other rules described below (since the Non-Relay rules now make them
   appear openly, with their own hosts and domains, we can apply various
   access filters against them). In reality, a combination of legal and
   technical methods is likely to give the best result.

しかしながら、十分なインターネットMTAsが(特にNon-リレー規則)の下で説明された規則を十分実行するなら、私たちは戸外でスパマーを出すでしょうに。そこでは、彼らの世話をされることができました。 純粋な訴訟が助けるだろうか、または私たちは、以下で説明された他の規則を技術的に使用することでそれらを妨げることができます(それらが今Non-リレー規則でオープンに現れるので、それら自身のホストとドメインで、私たちはそれらに対して様々なアクセスフィルタを適用できます)。 ほんとうは、法的で技術的な方法の組み合わせは結果の負けを認めそうです。

   This way, the spam problem could be reduced enough to allow the
   Internet community to design and deploy a real and general solution.

この道、インターネットコミュニティが本当の、そして、一般的な解決策を設計して、配備するのを許容できるくらいスパム問題は減少できました。

   But, please note:

しかし、以下に注意してください。

       The Non-Relay rules are not in themselves enough to stop spam.
       Even if 99% of the SMTP MTAs implemented them from Day 1,
       spammers would still find the remaining 1% and use them. Or
       spammers would just switch gear and connect directly to each and
       every recipient host; that will be to a higher cost for the
       spammer, but is still quite likely.

Non-リレー規則が自分たちにスパムを止めることができるくらいにはありません。 SMTP MTAsの99%がデー1から彼らを実行したとしても、スパマーは、まだ残っている1%を見つけていて、彼らを使用するでしょうに。 または、スパマーは、ただ仕事を変えて、直接ありとあらゆる受取人ホストに接するでしょう。 それは、スパマーには、より高い費用にはありますが、まだかなりありそうです。

   Even though IPv6 deployment may be near, the spam problem is here
   already and thus this memo restricts itself to the current IPv4.

IPv6展開は近いかもしれませんが、スパム問題がここに既にあります、そして、その結果、このメモはそれ自体を現在のIPv4に制限します。

Lindberg                 Best Current Practice                  [Page 3]

RFC 2505               Anti-Spam Recommendations           February 1999

推薦1999年2月の反スパムのリンドバーグ最も良い現在の習慣[3ページ]RFC2505

1.3. Terminology

1.3. 用語

   Throughout this memo we will use the terminology of RFC2119, [4]:

このメモ中では、私たちはRFC2119、[4]の用語を使用するつもりです:

   o   "MUST"

o "MUST"

       This word or the adjective "REQUIRED" means that the item is an
       absolute requirement.

「必要である」というこの単語か形容詞が、項目が絶対条件であることを意味します。

   o   "SHOULD"

o "SHOULD"

       This word or the adjective "RECOMMENDED" means that there may
       exist valid reasons in particular circumstances to ignore this
       item, but the full implications should be understood and the case
       carefully weighed before choosing a different course.

この単語か形容詞がこの項目を無視する特定の事情の正当な理由を存在するかもしれない手段に「推薦しました」が、完全な含意は、理解されていて異なったコースを選ぶ前に慎重に熟慮されたケースであるべきです。

   o   "MAY"

o 「5月」

       This word or the adjective "OPTIONAL" means that this item is
       truly optional. One vendor may choose to include the item because
       a particular marketplace requires it or because it enhances the
       product, for example; another vendor may omit the same item.

「任意である」というこの単語か形容詞が、本当に、この項目が任意であることを意味します。 特定の市場がそれを必要とするか、または例えば製品を高めるので、1つの業者が、項目を含んでいるのを選ぶかもしれません。 別の業者は同じ項目を省略するかもしれません。

1.4. Using DNS information

1.4. DNS情報を使用します。

   In the memo we sometimes use the term "host name" or "domain name"
   which should be interpreted as a Fully Qualified Domain Name, FQDN.
   By this we mean the name returned from the DNS in response to a PTR
   query (.IN-ADDR.ARPA), i.e. when an IP address is translated to a
   name, or we mean a name with a DNS A or MX record associated to it
   RFC1034, [5], and RFC1035, [6].

メモでは、私たちは時々「ホスト名」か「ドメイン名」というFully Qualified Domain Name(FQDN)として解釈されるべきである用語を使用します。 これで、私たちは、名前がPTR質問(.IN-ADDR.ARPA)に対応してDNSから戻ったと言っています、すなわち、IPアドレスが名前に翻訳されるか、または私たちが、DNS AかMX記録の名前がRFC1034、[5]、およびRFC1035をそれに関連づけたと言っていると、[6]。

   When we suggest use of FQDNs rather than IP addresses this is because
   FQDNs are intuitively much easier to use. However, all such usage
   depends heavily on DNS and .IN-ADDR.ARPA (PTR) information. Since it
   is fairly easy to forge that, either by false cache information
   injected in DNS servers or spammers running their own DNS with false
   information in them, host and domain names must be used with care,
   e.g. verified so that the translation address->name corresponds to
   name->address. With Secure DNS, RFC2065, [7], things will improve,
   since spoofing of .IN-ADDR.ARPA will no longer be possible.

私たちがIPアドレスよりむしろFQDNsの使用を勧めるときこれはFQDNsは直観的にはるかに使用しやすいからです。 しかしながら、そのようなすべての用法が大いにDNSと.IN-ADDR.ARPA(PTR)情報によります。 以来、>を記述している翻訳名が>を命名しているアドレスに対応するように確かめられて、どちらか偽情報が彼らにある状態でそれら自身のDNSを走らせながらDNSサーバかスパマーで注入された誤ったキャッシュ情報で慎重にホストとドメイン名を使用しなければならないのは例えばかなり鍛造しやすいです。 [7] .IN-ADDR.ARPAのスプーフィングがもう可能にならないので、Secure DNS、RFC2065と共に、いろいろなことは向上するでしょう。

   One of the recommendations is about verifying "MAIL From:" (envelope
   originator) domains with the DNS (assure that appropriate DNS
   information exists for the domain). When making use of this
   capability there are a few things to consider:

推薦の1つは「メールFrom:」について確かめることに関するものです。 (封筒創始者) DNS(適切なDNS情報がドメインに存在することを保証する)があるドメイン。 この能力を利用するとき、考えるいくつかのものがあります:

Lindberg                 Best Current Practice                  [Page 4]

RFC 2505               Anti-Spam Recommendations           February 1999

推薦1999年2月の反スパムのリンドバーグ最も良い現在の習慣[4ページ]RFC2505

   (1) One must not forget the increased amount of DNS queries which
       might result in problems for the DNS server itself to cope with
       the load.  This itself can result in a denial of service attack
       against the DNS server just by sending email to a site.

(1) DNSサーバ自体が負荷を切り抜けるように問題に結果として生じるかもしれない増加する量のDNS質問を忘れてはいけません。 これ自体は、メールをサイトに送るだけでDNSサーバに対するサービス不能攻撃をもたらすことができます。

   (2) It should be noted that with negative caching in the DNS, forged
       DNS responses can be used to mount denial of service attacks.
       For example, if a site is known to implement a FQDN validity
       check on addresses in SMTP "MAIL From:" commands, an attacker may
       be able to use negative DNS responses to effectively block
       acceptance of mail from one or more origins. Because of this, one
       should carefully check the DNS server in use, e.g. how it
       verifies that incoming responses correspond to outstanding
       queries, to minimize the risk for such attacks.

(2) DNSでの否定的キャッシュと共に、サービス不能攻撃を仕掛けるのに偽造DNS応答を使用できることに注意されるべきです。 例えば、サイトがSMTPのアドレスでFQDNバリディティチェックを実行するのが知られているなら「From:を郵送してください」 コマンド、攻撃者は事実上、1つ以上の起源からのメールの承認を妨げるのに否定的DNS応答を使用できるかもしれません。 これのために、丹念に例えば、それが、入って来る応答がそのような攻撃のために危険を最小にするために傑出している質問に対応することをどう確かめるかという使用でのDNSサーバをチェックするべきです。

   (3) For early versions of spam software FQDN checks provide quite
       some relief, since that software generates mail with completely
       bogus "MAIL From:" that will never get into the system if
       verified with the DNS. This is in active use at many
       installations today and it does reduce spam.

(3) スパムソフトウェアFQDNチェックの早めのバージョンに、かなりの救援を提供してください、そのソフトウェアが完全ににせの「メールFrom:」でメールを作るので DNSと共に確かめられると、それはシステムに決して入らないでしょう。 今日、多くのインストールにはこれが能動的使用であります、そして、それはスパムを減少させます。

   On the other hand, sites with weak DNS connectivity may find their
   legitimate mail having problems reaching destinations due to DNS
   timeouts when the receivers verify their "MAIL From:". However, since
   DNS information is handled asynchronously and is cached even though
   the initial requester has given up, chances are high that the
   necessary information is there at a later attempt.

他方では、弱いDNSの接続性があるサイトによって、彼らの正統のメールにはDNSタイムアウトのため、受信機がそれらの「メールFrom:」について確かめるとき、目的地に達することにおける問題があるのがわかるかもしれません。 しかしながら、DNS情報が非同期に扱われて、初期のリクエスタがあきらめましたが、キャッシュされるので、後の試みには必要事項がそこにあるという可能性は高いです。

   For later versions of spam software, a check of "MAIL From:" is much
   less likely to help, since spam software evolves too and will start
   using existing mail addresses (whether or not that is legal is beyond
   the scope of this memo). But, at least the Internet will benefit from
   the side effect that this test stops typos and misconfigured UAs.

スパムソフトウェアの後のバージョン、「メールFrom:」のチェックのために スパムソフトウェアがまた、発展するので非常により助けそうになくて、既存の郵便の宛先(それが法的であるかどうかがこのメモの範囲を超えている)を使用し始めるでしょう。 しかし、意志がこれがテストする副作用のおかげでインターネット少なくとも得するのが誤植とmisconfigured UAsを止めます。

1.5. Where to block spam, in SMTP, in RFC822 or in the UA

1.5. どこで、SMTP、RFC822またはUAでスパムを妨げますか。

   Our basic assumption is that refuse/accept is handled at the SMTP
   layer and that an MTA that decides to refuse a message should do so
   while still in the SMTP dialogue. First, this means that we do not
   have to store a copy of a message we later decide to refuse and
   second, our responsibility for that message is low or none - since we
   have not yet read it in, we leave it to the sender to handle the
   error.

私たちの基本仮定は/が受け入れる廃物がSMTP層で扱われて、メッセージを拒否すると決めるMTAがまだSMTP対話にはある間そうするはずであるということです。 まず最初に、私たちがそうしていないので私たちが、後で拒否すると決めて、2番目に、そのメッセージへの私たちの責任が低いというメッセージかなにものコピーを格納するために持っているのではなく、それを読むこの手段であり、私たちは、誤りを扱うように送付者に任せます。

Lindberg                 Best Current Practice                  [Page 5]

RFC 2505               Anti-Spam Recommendations           February 1999

推薦1999年2月の反スパムのリンドバーグ最も良い現在の習慣[5ページ]RFC2505

1.6. SMTP Return Codes

1.6. SMTP復帰コード

   SMTP has several classes of Return Codes, see [1] for a discussion:

SMTPには、Return Codesの数人のクラスがあって、議論のための[1]を見てください:

   o   5xx
       is a Permanent Negative Completion reply (Fatal Error) and
       results in the mail transfer being terminated and the mail
       returned to sender.

o 終えられて、5xxは郵便為替でPermanent Negative Completion回答(致命的なError)と結果です、そして、メールは送り主に返送しました。

   o   4xx
       is a Transient Negative Completion reply (Temporary Error) and
       results in the mail transfer being put back on queue again and a
       new attempt being made later.

o 4xxはTransient Negative Completion回答(一時的なError)と、郵便為替における再び待ち行列に戻される結果と後でされる新しい試みです。

   o   2xx
       is a Positive Completion reply and indicates that the MTA now has
       taken responsibility for the delivery of the mail.

o 2xxは、Positive Completion回答であり、MTAが現在メールの配送への責任を取ったのを示します。

   When making use of the options/"knobs" described in this memo there
   are a few things to consider:

このメモで説明されたオプション/「ノブ」を利用するとき、考えるいくつかのものがあります:

   For some events, like "Denied - you're on the spammer's list", 5xx
   may be the correct Return Code, since it terminates the session at
   once and we are done with it (assuming that the spammer plays by the
   SMTP rules, which he may decide not to do - in fact he can put the
   mail back on queue or turn to some other host, regardless of Return
   Code). However, a 5xx mistake in a configuration may cause legitimate
   mail to bounce, which may be quite unfortunate.

いくつかの出来事に関しては、「否定されました--あなたはスパマーのリストにいます」のように5xxは正しいReturn Codeであるかもしれません、それがすぐに、セッションを終えて、それで私たちをするので(スパマーがSMTPでプレーすると彼が、決めるかもしれない仮定しないのを統治されます--事実上、彼は、メールを待ち行列に戻すか、またはある他のホストに頼ることができます、Return Codeにかかわらず)。 しかしながら、構成における5xx誤りは正統のメールを弾みに引き起こすかもしれません。(それは、かなり不幸であるかもしれません)。

   Therefore, we suggest 4xx as the Return Code for most cases. Since
   that is a non fatal error, the mail gets re-queued at the sender and
   we have at least some time to discover and correct configuration
   errors, rather than have mail bounce (typically this is when we
   refuse to Relay for domains that we actually should accept since we
   are on their MX list).

したがって、私たちはほとんどのケースのためのReturn Codeとして4xxを勧めます。 私たちには、それが非致命的な誤りであるので、メールが送付者に再列に並ばせられて、発見する少なくともいくらかの時間と正しい構成誤りがメールが戻って来させるよりむしろあります(これは通常、私たちがそれらのMXリストにいるので実際に受け入れるべきであるドメインのためにRelayに拒否する時です)。

   A 4xx response also makes the spammer's host re-queue the mail and if
   it really is his own host who gets to do this it is probably a good
   thing - fill up his disks with his own spam. If, on the other hand,
   he is using someone else as Relay Host, all the spam mail being
   queued is a fairly strong evidence that something bad is going on and
   should cause attention at that Relay Host.

本当にこれをし始める彼自身のホストであるなら、それはたぶん良いものです--また、4xx応答はスパマーのホスト再待ち行列をメールにします、そして、彼自身のスパムがある彼のディスクへの中詰め。 他方では、彼がRelay Hostとして他の誰かを使用しているなら、列に並ばせられるすべての迷惑メールが先へ進んでいて、その何か悪いものがそのRelay Hostで注意を引き起こすべきであるというかなり強い証拠です。

   However, 4xx Temporary Errors may have unexpected interaction with
   MX-records. If the receiving domain has several MX records and the
   lowest preference MX-host refuses to receive mail with a "451"
   Response Code, the sending host may choose to - and often will - use
   the next host on the MX list.

しかしながら、4xx Temporary Errorsには、MX-記録との予期していなかった相互作用があるかもしれません。 しばしばウィル--受信ドメインにはいくつかのMX記録があって、最も低い好みのMX-ホストが、「451」応答コードでメールを受け取るのを拒否するなら、送付ホストは、拒否します、そして、Mxリストで次期ホストを使用してください。

Lindberg                 Best Current Practice                  [Page 6]

RFC 2505               Anti-Spam Recommendations           February 1999

推薦1999年2月の反スパムのリンドバーグ最も良い現在の習慣[6ページ]RFC2505

   If that next MX host does not have the same refuse-list, it will of
   course accept the mail, only to find that the final host still
   refuses to receive that piece of mail ("MAIL From:"). Our intent was
   to make the offending mail stay at the offending sender's host and
   fill up his mqueue disk, but it all ended up at our friend, the next
   lowest preference MX-host.

MXホストに同じ廃物リストがそんなに次にないと、それはもちろんメールを受け入れるでしょうが、終宿主が、そのメール(「メールFrom:」)を受け取るのをまだ拒否しているのがわかります。 私たちの意図が怒っているメールを怒っている送付者のホストに残らせて、彼のmqueueディスクを満たすことでしたが、それはすべて、私たちの友人、次期最も低い好みのMX-ホストで終わりました。

   Finally, it has been suggested that one may use a 2xx Return Code but
   nevertheless decide not to forward or receive the spam mail; typical
   alternatives are to store it elsewhere (e.g. /dev/null). This clearly
   violates the intent of RFC821 and should not be done without careful
   consideration - instead of blindly dropping the mail one could re-
   queue it and manually (or automagically) inspect whether it is spam
   or legitimate mail and whether it should be dropped or forwarded.

最終的に、2xx Return Codeを使用しますが、それにもかかわらず、迷惑メールを転送もしませんし、受け取りもしないと決めるかもしれないことが提案されました。 典型的な代替手段はほかの場所(例えば、/dev/ヌル)にそれを格納することです。 それをそれがスパムか正統のメールであり、低下するべきであるか、または進めるべきであることにかかわらず、これは、明確にRFC821の意図に違反して、盲目的に1つが再列に並ばせることができたメールを止めることの代わりに熟慮なしでして、手動で点検されるべきではありません(または、automagicallyします)。

1.7. Mailing Lists

1.7. メーリングリスト

   An MTA that also has the ability to handle mailing lists and expand
   that to a number of recipients, needs to be able to authorize senders
   and protect its lists from spam. The mechanisms for this may be very
   different from those for ordinary mail and ordinary users and are not
   covered in this memo.

また、メーリングリストを扱って、広がる多くの受取人にスパムから送付者に権限を与えて、リストを保護できる必要がある能力はあるMTA。 これのためのメカニズムは、それらと普通郵便と一般ユーザにとって非常に異なるかもしれなくて、このメモでカバーされていません。

2. Recommendations

2. 推薦

   Here we first give a brief list of recommendations, followed by a
   more thorough discussion of each of them. We will also give
   recommendations on things NOT to do, things that may seem natural in
   the spam fight (and might even work so far) but that might wreak
   havoc on Internet mail and thus may cause more damage than good.

ここに、私たちは最初に、それぞれのそれらの、より徹底的な議論があとに続いた推薦の簡潔なリストを与えます。 また、私たちはインターネットが郵送して、その結果利益より多くの損害をもたらすかもしれないするNOTにもかかわらず、スパム戦い(そして、今までのところ、働きさえするかもしれない)で自然に見えるかもしれない事態にもかかわらず、それが大破壊を加えるかもしれないものの上で推薦を与えるつもりです。

   1)  MUST be able to restrict unauthorized use as Mail Relay.

1) メールRelayとして無断使用を制限できなければならなくなってください。

   2)  MUST be able to provide "Received:" lines with enough
       information to make it possible to trace the mail path, despite
       spammers use forged host names in HELO statements etc.

2) 「受け取ったこと」を提供できなければなりません。 メール経路をたどるのを可能にすることができるくらいの情報がある線、スパマー使用にもかかわらず、偽造ホストはHELOで声明をなどと命名します。

   3)  MUST be able to provide local log information that makes it
       possible to trace the event afterwards.

3) その後出来事をたどるのを可能にするローカルのログ情報は提供できなければならなくなってください。

   4)  SHOULD be able to log all occurrences of anti-relay/anti-spam
       actions.

4) SHOULD、反反リレー/スパム動作のすべての発生を登録できてください。

   5)  SHOULD be able to refuse mail from a host or a group of hosts.

5) SHOULD、ホストかホストのグループからメールを拒否できてください。

   6a) MUST NOT refuse "MAIL From: <>".

6a) 廃物は「From:を郵送してはいけませんか?」 「<>。」

   6b) MUST NOT refuse "MAIL From: <user@my.local.dom.ain>".

6b) 廃物は「From:を郵送してはいけませんか?」 「<ユーザ@my.local.dom.ain>。」

Lindberg                 Best Current Practice                  [Page 7]

RFC 2505               Anti-Spam Recommendations           February 1999

推薦1999年2月の反スパムのリンドバーグ最も良い現在の習慣[7ページ]RFC2505

   7a) SHOULD be able to refuse mail from a specific "MAIL From:"
       user, <foo@domain.example>.

7a) SHOULD、特定の「メールFrom:」からメールを拒否できてください。 ユーザ、 <foo@domain.example 、gt。

   7b) SHOULD be able to refuse mail from an entire "MAIL From:"  domain
       <.*@domain.example>.

7b) SHOULD、全体の「メールFrom:」からメールを拒否できてください。 domain <.*@domain.example 、gt。

   8)  SHOULD be able to limit ("Rate Control") mail flow.

8) SHOULD、(「速度制御」)メール流動を制限できてください。

   9)  SHOULD be able to verify "MAIL From:" domain (using DNS or
       other means).

9) SHOULD、「メールFrom:」について確かめることができてください。 ドメイン(DNSを使用するか、他の手段)。

   10) SHOULD be able to verify <local-part> in outgoing mail.

10) SHOULD、送信するメールで<の地方のパート>について確かめることができてください。

   11) SHOULD be able to control SMTP VRFY and EXPN.

11) SHOULD、SMTP VRFYとEXPNを制御できてください。

   12) SHOULD be able to control SMTP ETRN.

12) SHOULD、SMTP ETRNを制御できてください。

   13) MUST be able to configure to provide different Return Codes
       for different rules (e.g. 451 Temp Fail vs 550 Fatal Error).

13) 異なった規則(例えば、451Temp Fail対550Fatal Error)に異なったReturn Codesを提供するのを構成できなければならなくなってください。

   The discussion below often ends up with a need to do various forms of
   pattern matching on domain/host names and IP addresses/subnets.  It
   is RECOMMENDED that the data/template for doing so may be supplied
   outside of the MTA, e.g. that the pattern matching rules be included
   in the MTA but that the actual patterns may be in an external file.
   It is also RECOMMENDED that the pattern matching rules (external
   file) may contain regular expressions, to give maximum flexibility.

議論はしばしば下でドメイン/ホスト名とIPアドレス/サブネットで様々な形式のパターン・マッチングをする必要性で終わります。 そうするためのデータ/テンプレートをMTAの外に供給するかもしれませんが、例えば、パターン・マッチング規則がMTAに含まれていますが、実際のパターンが外部のファイルにあるかもしれないのは、RECOMMENDEDです。 また、パターン・マッチング規則(外部のファイル)が最大の柔軟性を与えるために正規表現を含むかもしれないのは、RECOMMENDEDです。

   Of course string matching on domain/host names MUST NOT be case
   sensitive. Since <local-part> may be case sensitive it may be natural
   to keep that here. However, since <sPAmMeR@domain.example> and
   <spammer@domain.example> is most probably the same user and since the
   string compares are used to refuse his messages, we suggest that
   <local-part> comparisons be case insensitive too.

もちろん、ドメイン/ホスト名におけるストリングマッチングは大文字と小文字を区別しているはずがありません。 <の地方のパート>が大文字と小文字を区別しているかもしれないので、ここにそれを保つのは当然であるかもしれません。 そして、しかしながら、 since <sPAmMeR@domain.example 、gt;、lt;、 spammer@domain.example 、gt;、最もたぶん同じユーザであり、ストリング以来比較する、彼のメッセージを拒否するのにおいて使用されていて、私たちは、また、<の地方の部分>比較も大文字と小文字を区別しないと示唆します。

   The interpretation that should apply to all these recommendations is
   flexibility - regardless of how well we design anti-spam rules today,
   spammers will find ways around them and a well designed MTA should be
   flexible enough to meet those new threats.

私たちが今日反スパム規則をどれくらいよく設計するかにかかわらずこれらのすべての推薦に適用されるべきである解釈は柔軟性です、そして、スパマーはそれらの周りで方法を見つけるでしょう、そして、よく設計されたMTAはそれらの新しい脅威を満たすほどフレキシブルであるべきです。

2.1. Restricting unauthorized Mail Relay usage

2.1. 権限のないメールRelay用法を制限します。

   Unauthorized usage of a host as Mail Relay means theft of the relay's
   resources and puts the relay owner's reputation at risk. It also
   makes it impossible to filter out or block spam without at the same
   time blocking legitimate mail.

メールRelayとしてのホストの権限のない使用法は、リレーのリソースの窃盗を意味して、リレー所有者の危険な評判を置きます。 また、それで、同時に正統のメールを妨げないでスパムを無視するか、または妨げるのが不可能になります。

   Therefore, the MTA MUST be able to control/refuse such Relay usage.

したがって、MTA MUST、そのようなRelay用法を制御するか、または拒否できてください。

Lindberg                 Best Current Practice                  [Page 8]

RFC 2505               Anti-Spam Recommendations           February 1999

推薦1999年2月の反スパムのリンドバーグ最も良い現在の習慣[8ページ]RFC2505

   In an SMTP session we have 4 elements, each with a varying degree of
   trust:

SMTPセッションのときに、私たちには、それぞれ異なった度の信用がある4つの要素があります:

   1)  "HELO Hostname"           Easily and often forged.
   2)  "MAIL From:"              Easily and often forged.
   3)  "RCPT To:"                Correct, or at least intended.
   4)  SMTP_Caller (host)        IP.src addr OK, FQDN may be OK.

1) "HELO Hostname"Easilyでしばしば偽造しています。 2) 「メールFrom:」 簡単に、そしてしばしば偽造しています。 3) 「RCPT To:」 正しいか、または少なくとも意図しています。 4) SMTP_訪問者(ホスト) IP.src addr OK、FQDNはOKであるかもしれません。

   Since 1) and 2) are so easily and often forged, we cannot depend on
   them at all to authorize usage of our host as Mail Relay.

1と)2が)あまりに簡単に、そしてしばしば鍛造されるので、私たちはメールRelayとして私たちのホストの使用法を認可するためにそれらを全く当てにすることができません。

   Instead, the MTA MUST be able to authorize Mail Relay usage based on
   a combination of:

代わりにMTA MUST、以下の組み合わせに基づくメールRelay用法は認可できてください。

   o   "RCPT To:" address (domain).
   o   SMTP_Caller FQDN hostname.
   o   SMTP_Caller IP address.

o 「RCPT To:」 (ドメイン) o SMTP_Caller FQDNホスト名o SMTP_Caller IPアドレスを記述してください。

   The suggested algorithm is:

提案されたアルゴリズムは以下の通りです。

   a)  If "RCPT To:" is one of "our" domains, local or a domain that
       we accept to forward to (alternate MX), then accept to Relay.

a) 「RCPT To:」です。 1つが私たちが(交互のMX)に送って、次に、Relayに受け入れるために受け入れる「our」のドメイン、ローカルまたはドメインがありますか?

   b)  If SMTP_Caller is authorized, either its IP.src or its FQDN
       (depending on if you trust the DNS), then accept to Relay.

b) SMTP_Callerが認可されているか、そして、IP.srcかそのFQDN、(あなたがDNSを信じるならよる、)、その時、Relayに受け入れてください。

   c)  Else refuse to Relay.

c) Relayへのほかの廃物。

   When doing a) you have to make sure all kinds of SMTP source routing
   (both the official [@a,@b:u@c], the '%' hack and uucp-style '!' path)
   is either removed completely before the test, or at least is
   taken into account.

すべての種類のSMTPソースルーティング(職員[@b: @a、 u@c ]、'%'ハッキングとuucp-スタイル'!'経路の両方)をあなたが確実に作らなければならないa)にするのが、いつかが、テストの完全に前に取り外すか、または少なくとも考慮に入れられます。

   A site implementing this requirement must also be aware that they
   might block correctly addressed messages, especially such originating
   or terminating in a gateway to a different mail system than SMTP.
   Before implementing such a policy, a careful inventory should be done
   to make sure all routing algorithms used, either by other mail
   systems or ad-hoc, are known. Each one of such systems must be taken
   care of on a case-by-case basis.

また、この要件を実行するサイトも彼らがSMTPより異なったメールシステムへのゲートウェイの正しく記述されたメッセージ、特にそのような由来または終わりを妨げるかもしれないのを意識しているに違いありません。 そのような政策を実施する前に、ルーティング・アルゴリズムが使用したすべてが他のメールシステムか臨時のどちらかに知られているのを確実にするために慎重な目録をするべきです。 ケースバイケースでそのようなシステムのそれぞれの世話をしなければなりません。

   Examples of such mail systems, and their addressing schemes are X.400
   with an address of the type:

そのようなものに関する例はシステムを郵送します、そして、それらのアドレシング計画はタイプのアドレスがあるX.400です:

       "/c=us/admd= /prmd=xyz/dd.rfc-822=user(a)final/"@x400-gateway

「/cが私たちと等しい、/admdが/prmd=xyz/dd.rfc-822=user(a)final/と等しい、」 @x400ゲートウェイ

   Another example involves DECnet MAIL-11, which can have addresses in
   the form:

別の例はDECnetメール-11を伴います:(11はフォームにアドレスを持つことができます)。

Lindberg                 Best Current Practice                  [Page 9]

RFC 2505               Anti-Spam Recommendations           February 1999

推薦1999年2月の反スパムのリンドバーグ最も良い現在の習慣[9ページ]RFC2505

       "gateway::smtp%\"user@final\""@mail-11-gateway

「ゲートウェイ:、:、」「smtp%\、「 user@final \、」 」 @mail11ゲートウェイ

   In all cases the configuration MUST support wild cards for FQDNs and
   classful IP addresses and SHOULD support "address/mask" for classless
   IP addresses, e.g. domain.example and *.domain.example; 10.11.*.*,
   192.168.1.*, 192.168.2.*, 10.0.0.0/13, 192.168.1.0/23.

すべての場合では、構成はIPアドレスとSHOULDサポートが階級のないIPアドレス、例えば、domain.exampleのために「記述するか、またはマスクをかける」FQDNsとclassfulのためのワイルドカードと*.domain.exampleを支えなければなりません。 10.11.*.*, 192.168.1.*, 192.168.2.*, 10.0.0.0/13, 192.168.1.0/23.

   The configuration SHOULD allow for the decision/template data to be
   supplied by an external source, e.g. text file or dbm database. The
   decision/template SHOULD be allowed to contain regular expressions.

構成SHOULDは決定/テンプレートのために外部電源、例えば、テキストファイルによって提供されるデータかdbmデータベースを許容します。 決定/テンプレートSHOULD、正規表現は含まされてください。

2.2. Received: lines

2.2. 受け取られている: 線

   The MTA MUST prepend a "Received:" line in the mail (as described in
   RFC822, [2], and required in RFC1123, [3]). This "Received:" line
   MUST contain enough information to make it possible to trace the mail
   path back to the sender. We have two cases:

MTA MUST prependは「受け取りました」です。 メールに立ち並んでください。(RFC822、[2]で説明されて、RFC1123、[3])で必要であるように。 「受け取りました」この。 線はメール経路を送付者にたどって戻すのを可能にすることができるくらいの情報を含まなければなりません。 私たちには、2つのケースがあります:

2.2.1. Direct MTA-to-MTA connections

2.2.1. MTAからMTAとのダイレクト接続

   Internet mail was designed such that the sending host connects
   directly to the recipient as described by MX records (there may be
   several MX hosts on a priority list). To assure traceability back to
   the sending host (which may be a firewall/gateway, as described
   later) each MTA along the path, including the final MTA, MUST prepend
   a "Received:" line. For such a "Received:" line we have:

インターネット・メールは、送付ホストがMX記録によって説明されるように直接受取人に接する(数人のMXホストが優先権リストにいるかもしれない)ように、設計されました。 送付ホスト(後で説明されるようにファイアウォール/ゲートウェイであるかもしれない)への追随性後部を保証するために、最終的なMTAを含む経路に沿った各MTAは「受け取ったこと」をprependしなければなりません。 立ち並んでください。 「受け取るのであった」ためにそのような 私たちが持っている線:

   It MUST contain:

それは以下を含まなければなりません。

   o   The IP address of the caller.

o 訪問者のIPアドレス。

   o   The 'date-time' as described in RFC822, [2], pp 18.

o RFC822、[2]、pp18で説明される'日付-時間'。

   It SHOULD contain:

それ、SHOULDは以下を含んでいます。

   o   The FQDN corresponding to the callers IP address.

o 訪問者IPアドレスに対応するFQDN。

   o   The argument given in the "HELO" statement.

o "HELO"という声明で与えられた議論。

   o   Authentication information, if an authenticated connection
       was used for the transmission / submission.

o 認証情報認証された接続がトランスミッション/服従に使用されたなら。

   It is suggested that most other "Received:" fields described in
   RFC822 be included in the "Received:" lines.

それは示されます。ほとんどのもう一方「受け取りました」その。 含まれていて、「受け取ったところ」でRFC822で説明された分野 線。

   Basically, any information that can help tracing the message can and
   should be added to the "Received:" line. It is true even when the
   initial submission is non-SMTP, for example submission via a web-based

基本的に、メッセージをたどるのを助けることができるどんな情報も、加えることができて、「受け取ったこと」に加えられるべきです。 立ち並んでください。 初期の服従が非SMTP、例えば、aを通したウェブベースの服従でさえあるときに、それは本当です。

Lindberg                 Best Current Practice                 [Page 10]

RFC 2505               Anti-Spam Recommendations           February 1999

推薦1999年2月の反スパムのリンドバーグ最も良い現在の習慣[10ページ]RFC2505

   mail client where http is used between the web client and server, a
   "Received:" line can be used to identify that connection stating what
   IP-address was used when connecting to the http server where the mail
   was created.

httpがウェブクライアントの間でどこで使用されるか、そして、サーバ、「受け取ったこと」をクライアントに郵送してください。 メールが作成されたhttpサーバに接続するとき、どんなIP-アドレスが使用されたかを述べるその接続を特定するのに線を使用できます。

   These recommendations are deliberately stronger than RFC1123, [3],
   and are there to assure that mail sent directly from a spammer's host
   to a recipient can be traced with enough accuracy; a typical example
   is when a spammer uses a dialup account and the ISP needs to have his
   IP address at the 'date-time' to be able to take action against him.

これらの推薦は、故意にRFC1123、[3]より強く、十分な精度で直接スパマーのホストから受取人に送られたメールはたどることができることを保証するために、そこにあります。 典型的な例はスパマーがダイアルアップアカウントを使用する時です、そして、ISPは彼にとって行動を起こすことができる'日付-時間'のときに彼のIPアドレスを必要とします。

2.2.2. Firewall/gateway type devices

2.2.2. ファイアウォール/ゲートウェイタイプ装置

   Organizations with a policy of hiding their internal network structure
   must still be allowed and able to do so. They usually make their
   internal MTAs prepend "Received:" lines with a very limited amount of
   information, or prepend none at all. Then they send out the mail
   through some kind of firewall/gateway device, which may even remove
   all the internal MTAs' "Received:" lines before it prepends its own
   "Received:" line (as required in RFC1123, [3]).

それらの内部のネットワーク構造を隠す方針がある組織は、まだ許容されていてそうすることができなければなりません。 通常、彼らはそれらの内部のMTAs prepend「受け取ったこと」を作ります。 非常に限られた情報量、またはprependについて皆無な線。 そして、彼らはある種のファイアウォール/ゲートウェイ装置を通してメールを出します。装置はすべての内部のMTAs「受け取ったこと」を取り除きさえするかもしれません。 それの前の線はそれ自身の「受け取るのであったこと」をprependsします。 線、(必要に応じて、RFC1123、[3])で。

   By doing so they take on the full responsibility to trace spammers
   that send from inside their organization or they accept to be held
   responsible for those spammers' activities. It is REQUIRED that the
   information provided in their outgoing mail is sufficient for them to
   perform any necessary traces.

By doing so they take on the full responsibility to trace spammers that send from inside their organization or they accept to be held responsible for those spammers' activities. It is REQUIRED that the information provided in their outgoing mail is sufficient for them to perform any necessary traces.

   In the case of incoming mail to an organization, the "Received:"
   lines MUST be kept intact to make sure that users receiving mail on
   the inside can give information needed to trace incoming messages to
   their origin.

In the case of incoming mail to an organization, the "Received:" lines MUST be kept intact to make sure that users receiving mail on the inside can give information needed to trace incoming messages to their origin.

   Generally, a gateway SHOULD NOT change or delete "Received:" lines
   unless it is a security requirement to do so. Changing the content
   of existing "Received:" lines to make sure they "make sense" when
   passing a mail gateway of some kind most often destroys and deletes
   information needed to make a message traceable. Care must be taken to
   preserve the information in "Received:" lines, either in the message
   itself, the mail that the receiver gets, or if that is impossible, in
   logfiles.

Generally, a gateway SHOULD NOT change or delete "Received:" lines unless it is a security requirement to do so. Changing the content of existing "Received:" lines to make sure they "make sense" when passing a mail gateway of some kind most often destroys and deletes information needed to make a message traceable. Care must be taken to preserve the information in "Received:" lines, either in the message itself, the mail that the receiver gets, or if that is impossible, in logfiles.

2.3. Event logs

2.3. Event logs

   The MTA MUST be able to provide enough local log information to make
   it possible to trace the event. This includes most of the information
   put into the "Received:" lines; see above.

The MTA MUST be able to provide enough local log information to make it possible to trace the event. This includes most of the information put into the "Received:" lines; see above.

Lindberg                 Best Current Practice                 [Page 11]

RFC 2505               Anti-Spam Recommendations           February 1999

Lindberg Best Current Practice [Page 11] RFC 2505 Anti-Spam Recommendations February 1999

2.4. Log anti-relay/anti-spam actions

2.4. Log anti-relay/anti-spam actions

   The MTA SHOULD be able to log all anti-relay/anti-spam actions. The
   log entries SHOULD contain at least:

The MTA SHOULD be able to log all anti-relay/anti-spam actions. The log entries SHOULD contain at least:

   o   Time information.

o Time information.

   o   Refusal information, i.e. why the request was refused ("Mail
       From", "Relaying Denied", "Spam User", "Spam Host", etc).

o Refusal information, i.e. why the request was refused ("Mail From", "Relaying Denied", "Spam User", "Spam Host", etc).

   o   "RCPT To:" addresses (domains).
       (If the connection was disallowed at an earlier stage, e.g.
       by checking the SMTP_Caller IP address, the "RCPT To:"
       address is unknown and therefore cannot be logged).

o "RCPT To:" addresses (domains). (If the connection was disallowed at an earlier stage, e.g. by checking the SMTP_Caller IP address, the "RCPT To:" address is unknown and therefore cannot be logged).

   o   Offending host's IP address.

o Offending host's IP address.

   o   Offending host's FQDN hostname.

o Offending host's FQDN hostname.

   o   Other relevant information (e.g. given during the SMTP
       dialogue, before we decided to refuse the request).

o Other relevant information (e.g. given during the SMTP dialogue, before we decided to refuse the request).

   It should be noted that by logging more events, especially denied
   email, one opens the possibility for denial of service attacks, for
   example by filling logs by having a very large amount of "RCPT To:"
   commands. An implementation that implements increased logging
   according to this description must be aware of the fact that the size
   of the logfiles increases, especially during attacks.

It should be noted that by logging more events, especially denied email, one opens the possibility for denial of service attacks, for example by filling logs by having a very large amount of "RCPT To:" commands. An implementation that implements increased logging according to this description must be aware of the fact that the size of the logfiles increases, especially during attacks.

2.5. Refuse mail based on SMTP_Caller address

2.5. Refuse mail based on SMTP_Caller address

   The MTA SHOULD be able to accept or refuse mail from a specific host
   or from a group of hosts. Here we mean the IP.src address or the FQDN
   that its .IN-ADDR.ARPA resolves to (depending on whether you trust
   the DNS). This functionality could be implemented at a firewall, but
   since the MTA should be able to "defend itself" we recommend it be able
   to as well.

The MTA SHOULD be able to accept or refuse mail from a specific host or from a group of hosts. Here we mean the IP.src address or the FQDN that its .IN-ADDR.ARPA resolves to (depending on whether you trust the DNS). This functionality could be implemented at a firewall, but since the MTA should be able to "defend itself" we recommend it be able to as well.

   It is RECOMMENDED that the MTA be able to decide based on FQDN hostnames
   (host.domain.example), on wild card domain names (*.domain.example),
   on individual IP addresses (10.11.12.13) or on IP addresses with a
   prefix length (10.0.0.0/8, 192.168.1.0/24).

It is RECOMMENDED that the MTA be able to decide based on FQDN hostnames (host.domain.example), on wild card domain names (*.domain.example), on individual IP addresses (10.11.12.13) or on IP addresses with a prefix length (10.0.0.0/8, 192.168.1.0/24).

   It is also RECOMMENDED that these decision rules can be combined to
   form a flexible list of accept/refuse/accept/refuse, e.g:

It is also RECOMMENDED that these decision rules can be combined to form a flexible list of accept/refuse/accept/refuse, e.g:

Lindberg                 Best Current Practice                 [Page 12]

RFC 2505               Anti-Spam Recommendations           February 1999

Lindberg Best Current Practice [Page 12] RFC 2505 Anti-Spam Recommendations February 1999

       accept   host.domain.example
       refuse   *.domain.example
       accept   10.11.12.13
       accept   192.168.1.0/24
       refuse   10.0.0.0/8

accept host.domain.example refuse *.domain.example accept 10.11.12.13 accept 192.168.1.0/24 refuse 10.0.0.0/8

   The list is searched until first match and the accept/refuse action
   is based on that.

The list is searched until first match and the accept/refuse action is based on that.

   IP-address/length is RECOMMENDED. However, implementations with wild
   cards, e.g. 10.11.12.* (classful networks on byte boundaries only)
   are of course much better than those without.

IP-address/length is RECOMMENDED. However, implementations with wild cards, e.g. 10.11.12.* (classful networks on byte boundaries only) are of course much better than those without.

   To improve filtering even more, the MTA MAY provide complete regular
   expressions to be used for hostnames; possibly also for IP addresses.

To improve filtering even more, the MTA MAY provide complete regular expressions to be used for hostnames; possibly also for IP addresses.

2.6. "MAIL From: <>" and "MAIL From: <user@my.local.dom.ain>"

2.6. "MAIL From: <>" and "MAIL From: <user@my.local.dom.ain>"

   Although the fight against spammers is important it must never be
   done in a way that violates existing email standards. Since spammers
   often forge "MAIL From:" addresses it is tempting to put general
   restrictions on that, especially for some "obvious" addresses. This
   may, however, wreak more havoc to the mail community than spam does.

Although the fight against spammers is important it must never be done in a way that violates existing email standards. Since spammers often forge "MAIL From:" addresses it is tempting to put general restrictions on that, especially for some "obvious" addresses. This may, however, wreak more havoc to the mail community than spam does.

   When there is a need to refuse mail from a particular host or site
   our recommendation is to use other methods mentioned in this memo,
   e.g. refuse mail based on SMTP_Caller address (or name), regardless
   of what "MAIL From:" was used.

When there is a need to refuse mail from a particular host or site our recommendation is to use other methods mentioned in this memo, e.g. refuse mail based on SMTP_Caller address (or name), regardless of what "MAIL From:" was used.

2.6.1. "MAIL From: <>"

2.6.1. "MAIL From: <>"

   The MTA MUST NOT refuse to receive "MAIL From: <>".

The MTA MUST NOT refuse to receive "MAIL From: <>".

   The "MAIL From: <>" address is used in error messages from the mail
   system itself, e.g. when a legitimate mail relay is used and forwards
   an error message back to the user. Refusing to receive such mail
   means that users may not be notified of errors in their outgong mail,
   e.g.  "User unknown", which will no doubt wreak more havoc to the
   mail community than spam does.

The "MAIL From: <>" address is used in error messages from the mail system itself, e.g. when a legitimate mail relay is used and forwards an error message back to the user. Refusing to receive such mail means that users may not be notified of errors in their outgong mail, e.g. "User unknown", which will no doubt wreak more havoc to the mail community than spam does.

   The most common case of such legitimate "MAIL From: <>" is to one
   recipient, i.e. an error message returned to one single individual.
   Since spammers have used "MAIL From: <>" to send to many recipients,
   it is tempting to either reject such mail completely or to reject all
   but the first recipient. However, there are legitimate causes for an
   error mail to go to multiple recipients, e.g. a list with several
   list owners, all located at the same remote site, and thus the MTA
   MUST NOT refuse "MAIL From: <>" even in this case.

The most common case of such legitimate "MAIL From: <>" is to one recipient, i.e. an error message returned to one single individual. Since spammers have used "MAIL From: <>" to send to many recipients, it is tempting to either reject such mail completely or to reject all but the first recipient. However, there are legitimate causes for an error mail to go to multiple recipients, e.g. a list with several list owners, all located at the same remote site, and thus the MTA MUST NOT refuse "MAIL From: <>" even in this case.

Lindberg                 Best Current Practice                 [Page 13]

RFC 2505               Anti-Spam Recommendations           February 1999

Lindberg Best Current Practice [Page 13] RFC 2505 Anti-Spam Recommendations February 1999

   However, the MTA MAY throttle down the TCP connection ("read()"
   frequency) if there are more than one "RCPT To:" and that way slow
   down spammers using "MAIL From: <>".

However, the MTA MAY throttle down the TCP connection ("read()" frequency) if there are more than one "RCPT To:" and that way slow down spammers using "MAIL From: <>".

2.6.2. "MAIL From: <user@my.local.dom.ain>"

2.6.2. "MAIL From: <user@my.local.dom.ain>"

   The MTA MUST NOT refuse "MAIL From: <user@my.local.dom.ain>".

The MTA MUST NOT refuse "MAIL From: <user@my.local.dom.ain>".

   By "my.local.dom.ain" we mean the domain name(s) that are treated as
   local and result in local delivery. At first thought it may seem like
   noone else will need to use "MAIL From: <user@my.local.dom.ain>" and
   that restrictions on who may use that would reduce the risk of fraud
   and thus reduce spam. While this may be true in the (very) short
   term, it also does away with at least two legitimate usages:

By "my.local.dom.ain" we mean the domain name(s) that are treated as local and result in local delivery. At first thought it may seem like noone else will need to use "MAIL From: <user@my.local.dom.ain>" and that restrictions on who may use that would reduce the risk of fraud and thus reduce spam. While this may be true in the (very) short term, it also does away with at least two legitimate usages:

   o   Aliases (.forward files).
       <user1@my.local.dom.ain> sends to <user2@external.example> and
       that mail gets forwarded back to <user2@my.local.dom.ain>, e.g.
       since <user2> has moved to my.local.dom.ain and has a .forward
       file at external.example.

o Aliases (.forward files). <user1@my.local.dom.ain> sends to <user2@external.example> and that mail gets forwarded back to <user2@my.local.dom.ain>, e.g. since <user2> has moved to my.local.dom.ain and has a .forward file at external.example.

   o   Mailing lists.
       RFC1123, [3], gives a clear requirement that "MAIL From:" for
       mail from a mailing list should reflect the owner of the list,
       rather than the individual sender. Because of this fact, and the
       fact that the owner of the list might not be in the same domain
       as the list (list host) itself, mail may arrive to the list
       owner's domain (mail host) from a foreign domain (from a host
       serving a foreign domain) with the list owner's local domain in
       the "Mail From:" command.

o Mailing lists. RFC1123, [3], gives a clear requirement that "MAIL From:" for mail from a mailing list should reflect the owner of the list, rather than the individual sender. Because of this fact, and the fact that the owner of the list might not be in the same domain as the list (list host) itself, mail may arrive to the list owner's domain (mail host) from a foreign domain (from a host serving a foreign domain) with the list owner's local domain in the "Mail From:" command.

   If "MAIL From: <user@my.local.dom.ain>" is rejected, both these cases
   will result in failure to deliver legitimate mail.

If "MAIL From: <user@my.local.dom.ain>" is rejected, both these cases will result in failure to deliver legitimate mail.

2.7. Refuse based on "MAIL From:"

2.7. Refuse based on "MAIL From:"

   The MTA SHOULD be able to refuse to receive mail from a specific
   "MAIL From:" user (foo@domain.example) or from an entire "MAIL From:"
   domain (domain.example). In general these kinds of rules are easily
   overcome by the spammers changing "MAIL From:" every so often, but
   the ability to block a certain user or a certain domain is quite
   helpful while an attack has just been discovered and is ongoing.

The MTA SHOULD be able to refuse to receive mail from a specific "MAIL From:" user (foo@domain.example) or from an entire "MAIL From:" domain (domain.example). In general these kinds of rules are easily overcome by the spammers changing "MAIL From:" every so often, but the ability to block a certain user or a certain domain is quite helpful while an attack has just been discovered and is ongoing.

   Please note that

Please note that

       "MAIL From: <>"
   and
       "MAIL From: <user@my.local.dom.ain>"

"MAIL From: <>" and "MAIL From: <user@my.local.dom.ain>"

Lindberg                 Best Current Practice                 [Page 14]

RFC 2505               Anti-Spam Recommendations           February 1999

Lindberg Best Current Practice [Page 14] RFC 2505 Anti-Spam Recommendations February 1999

   MUST NOT be refused (see above), except when other policies block the
   connection, for example when the SMTP_Caller IP address of the peer
   belongs to a network which is deliberately refused.

MUST NOT be refused (see above), except when other policies block the connection, for example when the SMTP_Caller IP address of the peer belongs to a network which is deliberately refused.

2.8. Rate Control

2.8. Rate Control

   The MTA SHOULD provide tools for the mail host to control the rate
   with which mail is sent or received. The idea is twofold:

The MTA SHOULD provide tools for the mail host to control the rate with which mail is sent or received. The idea is twofold:

   1)  If we happen to have an legitimate mail user with an existing
       legitimate account and this user sends out spam, we may want to
       reduce the speed with which he sends it out. This is not without
       controversy and must be used with extreme care, but it may
       protect the rest of the Internet from him.

1) If we happen to have an legitimate mail user with an existing legitimate account and this user sends out spam, we may want to reduce the speed with which he sends it out. This is not without controversy and must be used with extreme care, but it may protect the rest of the Internet from him.

   2)  If we are under a spam attack it may help us considerably just
       being able to slow down the incoming mail rate for that
       particular user/host.

2) If we are under a spam attack it may help us considerably just being able to slow down the incoming mail rate for that particular user/host.

   For sending mail, this has to be done by throttling the TCP
   connection to set the acceptable output data rate, e.g. reduce the
   "write()" frequency.

For sending mail, this has to be done by throttling the TCP connection to set the acceptable output data rate, e.g. reduce the "write()" frequency.

   For receiving mail, we could use basically the same technique, e.g.
   reduce the "read()" frequency, or we could signal with a 4xx Return
   Code that we cannot receive. It is RECOMMENDED that the decision to
   take such action be based on "MAIL From:" user, "MAIL From:" domain,
   SMTP_Caller (name/address), "RCPT TO:", or a combination of all
   these.

For receiving mail, we could use basically the same technique, e.g. reduce the "read()" frequency, or we could signal with a 4xx Return Code that we cannot receive. It is RECOMMENDED that the decision to take such action be based on "MAIL From:" user, "MAIL From:" domain, SMTP_Caller (name/address), "RCPT TO:", or a combination of all these.

2.9. Verify "MAIL From:"

2.9. Verify "MAIL From:"

   The MTA SHOULD be able to perform a simple "sanity check" of the
   "MAIL From:" domain and refuse to receive mail if that domain is
   nonexistent (i.e. does not resolve to having an MX or an A record).
   If the DNS error is temporary, TempFail, the MTA MUST return a 4xx
   Return Code (Temporary Error). If the DNS error is an Authoritative
   NXdomain (host/domain unknown) the MTA SHOULD still return a 4xx
   Return Code (since this may just be primary and secondary DNS not
   being in sync) but it MAY allow for an 5xx Return Code (as configured
   by the sysadmin).

The MTA SHOULD be able to perform a simple "sanity check" of the "MAIL From:" domain and refuse to receive mail if that domain is nonexistent (i.e. does not resolve to having an MX or an A record). If the DNS error is temporary, TempFail, the MTA MUST return a 4xx Return Code (Temporary Error). If the DNS error is an Authoritative NXdomain (host/domain unknown) the MTA SHOULD still return a 4xx Return Code (since this may just be primary and secondary DNS not being in sync) but it MAY allow for an 5xx Return Code (as configured by the sysadmin).

2.10. Verify <local-part>

2.10. Verify <local-part>

   The MTA SHOULD allow outgoing mail to have its <local-part> verified
   so that the sender name is a real user or an existing alias. This is
   basically to protect the rest of the Internet from various "typos"

The MTA SHOULD allow outgoing mail to have its <local-part> verified so that the sender name is a real user or an existing alias. This is basically to protect the rest of the Internet from various "typos"

Lindberg                 Best Current Practice                 [Page 15]

RFC 2505               Anti-Spam Recommendations           February 1999

Lindberg Best Current Practice [Page 15] RFC 2505 Anti-Spam Recommendations February 1999

       MAIL From: <fo0bar@domain.example>

MAIL From: <fo0bar@domain.example>

   and/or malicious users

and/or malicious users

       MAIL From: <I.am.unknown.to.you.he.he@domain.example>

MAIL From: <I.am.unknown.to.you.he.he@domain.example>

   As always this can be overcome by spammers really wanting to do so,
   but with more strict rules for relaying it becomes harder and harder.
   In fact, catching "typos" at the initial (and official) mail relay is
   in itself enough motivation for this recommendation.

As always this can be overcome by spammers really wanting to do so, but with more strict rules for relaying it becomes harder and harder. In fact, catching "typos" at the initial (and official) mail relay is in itself enough motivation for this recommendation.

2.11. SMTP VRFY and EXPN

2.11. SMTP VRFY and EXPN

   Both SMTP VRFY and EXPN provide means for a potential spammer to test
   whether the addresses on his list are valid (VRFY) and even get more
   addresses (EXPN). Therefore, the MTA SHOULD control who is is allowed
   to issue these commands. This may be "on/off" or it may use access
   lists similar to those mentioned previously.

Both SMTP VRFY and EXPN provide means for a potential spammer to test whether the addresses on his list are valid (VRFY) and even get more addresses (EXPN). Therefore, the MTA SHOULD control who is is allowed to issue these commands. This may be "on/off" or it may use access lists similar to those mentioned previously.

   Note that the "VRFY" command is required according to RFC821, [1].
   The response can, though, be "252 Argument not checked" to represent
   "off" or blocked via an access list. This should be the default.

Note that the "VRFY" command is required according to RFC821, [1]. The response can, though, be "252 Argument not checked" to represent "off" or blocked via an access list. This should be the default.

   Default for the "EXPN" command should be "off".

Default for the "EXPN" command should be "off".

2.12. SMTP ETRN

2.12. SMTP ETRN

   SMTP ETRN means that the MTA will re-run its mail queue, which may be
   quite costly and open for Denial of Service attacks. Therefore, the
   MTA SHOULD control who is is allowed to issue the ETRN command.  This
   may be "on/off" or it may use access lists similar to those mentioned
   previously. Default should be "off".

SMTP ETRN means that the MTA will re-run its mail queue, which may be quite costly and open for Denial of Service attacks. Therefore, the MTA SHOULD control who is is allowed to issue the ETRN command. This may be "on/off" or it may use access lists similar to those mentioned previously. Default should be "off".

2.13. Return Codes

2.13. Return Codes

   The primary issue here is flexibility - it is simply not possible to
   define in a document how to make tradeoffs between returning 5xx and
   make legitimate mail fail at once due to a configuration mistake and
   returning 4xx and be able to catch such configuration mistakes via
   log file inspection.

The primary issue here is flexibility - it is simply not possible to define in a document how to make tradeoffs between returning 5xx and make legitimate mail fail at once due to a configuration mistake and returning 4xx and be able to catch such configuration mistakes via log file inspection.

   Therefore, the MTA MUST be configurable to provide "Success" (2xx),
   "Temporary Failure" (4xx) or "Permanent Failure" (5xx) for different
   rules or policies. The exact return codes, other than the first digit
   (2, 4 or 5) should, however, not be configurable.  This is because of
   the ease of configuring the software in the wrong way, and the fact

Therefore, the MTA MUST be configurable to provide "Success" (2xx), "Temporary Failure" (4xx) or "Permanent Failure" (5xx) for different rules or policies. The exact return codes, other than the first digit (2, 4 or 5) should, however, not be configurable. This is because of the ease of configuring the software in the wrong way, and the fact

Lindberg                 Best Current Practice                 [Page 16]

RFC 2505               Anti-Spam Recommendations           February 1999

Lindberg Best Current Practice [Page 16] RFC 2505 Anti-Spam Recommendations February 1999

   that the selection of exactly what error code to use is very subtle
   and that many software implementations do check more than the first
   digit (2, 4 or 5) in the return code.

that the selection of exactly what error code to use is very subtle and that many software implementations do check more than the first digit (2, 4 or 5) in the return code.

   However, when the response is the result of a DNS lookup and the DNS
   system returned TempFail, a temporary error, the MTA MUST reflect
   this and provide a 4xx return code. If the DNS response is an
   Authoritative NXdomain (host or domain unknown) the MTA MAY reflect
   this by a 5xx Return Code.

However, when the response is the result of a DNS lookup and the DNS system returned TempFail, a temporary error, the MTA MUST reflect this and provide a 4xx return code. If the DNS response is an Authoritative NXdomain (host or domain unknown) the MTA MAY reflect this by a 5xx Return Code.

   Please refer to the previous discussion on SMTP Return Codes for
   additional information.

Please refer to the previous discussion on SMTP Return Codes for additional information.

2.13.1. The importance of flexibility - an example

2.13.1. The importance of flexibility - an example

   At Chalmers University of Technology our DNS contains

At Chalmers University of Technology our DNS contains

       cdg.chalmers.se.  IN  MX    0   mail.cdg.chalmers.se.
                         IN  MX  100   mail.chalmers.se.

cdg.chalmers.se. IN MX 0 mail.cdg.chalmers.se. IN MX 100 mail.chalmers.se.

   and similarly for most subdomains, i.e. a second host to store mail
   to each subdomain, should their mail host be down. This means that
   mail.chalmers.se must be prepared to act as Mail Relay for the
   subdomains ("RCPT To:") it serves and that those subdomains' mail
   hosts have to accept SMTP connections from mail.chalmers.se. Late
   versions of spam software make use of this fact by always using
   mail.chalmers.se to get their mail delivered to our subdomains and by
   doing so they still get Mail Relaying done for them and they prevent
   recipient hosts from refusing SMTP connections based on the sending
   host's FQDN or IP-address.

and similarly for most subdomains, i.e. a second host to store mail to each subdomain, should their mail host be down. This means that mail.chalmers.se must be prepared to act as Mail Relay for the subdomains ("RCPT To:") it serves and that those subdomains' mail hosts have to accept SMTP connections from mail.chalmers.se. Late versions of spam software make use of this fact by always using mail.chalmers.se to get their mail delivered to our subdomains and by doing so they still get Mail Relaying done for them and they prevent recipient hosts from refusing SMTP connections based on the sending host's FQDN or IP-address.

   As long as we keep our design with a secondary MX host we cannot
   really have mail.chalmers.se refuse Mail Relay, at least not with a
   5xx return code. However, it has been fairly straight forward to
   identify the hosts/domains/networks that make use of this possibility
   and refuse to act as Mail Relay for them them - and only them - and
   do so with a 4xx return code. Legitimate mail from them may be
   delayed if the final recipient host is down but will eventually be
   delivered when it gets up again (4xx Return Code) and this is no
   worse then if we changed our MX design. Spam now faces a "Denied"
   response and have to connect to each and every one of the recipients,
   who may decide to refuse the SMTP connection.

As long as we keep our design with a secondary MX host we cannot really have mail.chalmers.se refuse Mail Relay, at least not with a 5xx return code. However, it has been fairly straight forward to identify the hosts/domains/networks that make use of this possibility and refuse to act as Mail Relay for them them - and only them - and do so with a 4xx return code. Legitimate mail from them may be delayed if the final recipient host is down but will eventually be delivered when it gets up again (4xx Return Code) and this is no worse then if we changed our MX design. Spam now faces a "Denied" response and have to connect to each and every one of the recipients, who may decide to refuse the SMTP connection.

   The bottom line is that this is made possible because of 1) enough
   flexibility in the Relay Authorization code and 2) enough flexibility
   in assigning Return Codes - an MTA with a 5xx Return Code carved in
   stone would have made this absolutely impossible.

The bottom line is that this is made possible because of 1) enough flexibility in the Relay Authorization code and 2) enough flexibility in assigning Return Codes - an MTA with a 5xx Return Code carved in stone would have made this absolutely impossible.

Lindberg                 Best Current Practice                 [Page 17]

RFC 2505               Anti-Spam Recommendations           February 1999

Lindberg Best Current Practice [Page 17] RFC 2505 Anti-Spam Recommendations February 1999

3. Future work

3. Future work

3.1. Impact on SMTP UAs and end users

3.1. Impact on SMTP UAs and end users

   Even though this memo is about MTAs and recommendations for them,
   some of what is done here also impacts UAs (User Agents, the
   "ordinary mail programs").

Even though this memo is about MTAs and recommendations for them, some of what is done here also impacts UAs (User Agents, the "ordinary mail programs").

   A UA does two things:

A UA does two things:

   1)  Reads mail from a mailbox and prints on the screen.
       This typically uses a protocol like POP, IMAP or NFS.

1) Reads mail from a mailbox and prints on the screen. This typically uses a protocol like POP, IMAP or NFS.

   2)  Reads text from the keyboard and hands that over to the mailbox
       MTA for delivery as a piece of mail. This typically uses the SMTP
       protocol, i.e. the same protocol that is used between MTAs.

2) Reads text from the keyboard and hands that over to the mailbox MTA for delivery as a piece of mail. This typically uses the SMTP protocol, i.e. the same protocol that is used between MTAs.

   When MTAs now start to implement various anti-relay filters as
   described above, a UA on a portable laptop host may get a response
   like "Relaying Denied" just because it happens to use IP addresses
   within an unknown range or that resolve to unknown FQDNs.

When MTAs now start to implement various anti-relay filters as described above, a UA on a portable laptop host may get a response like "Relaying Denied" just because it happens to use IP addresses within an unknown range or that resolve to unknown FQDNs.

   The typical victim of this "Relaying Denied" response is a salesman
   carrying a laptop on a business trip, or even an IETF delegate at a
   meeting hotel. The salesman will probably dial his nearest ISP and
   will get an IP address from that dialup pool; the IETF delegate will
   use an IP address from the terminal room. In both cases their laptop
   mail program (the UA; e.g. pine, Netscape, Eudora) will try to send
   out mail via their home MTA, e.g. SMTP-SERVER=mail.home.example, but
   unless mail.home.example has been updated to accept that (temporary)
   IP address it will respond "Relaying Denied" and refuse.

The typical victim of this "Relaying Denied" response is a salesman carrying a laptop on a business trip, or even an IETF delegate at a meeting hotel. The salesman will probably dial his nearest ISP and will get an IP address from that dialup pool; the IETF delegate will use an IP address from the terminal room. In both cases their laptop mail program (the UA; e.g. pine, Netscape, Eudora) will try to send out mail via their home MTA, e.g. SMTP-SERVER=mail.home.example, but unless mail.home.example has been updated to accept that (temporary) IP address it will respond "Relaying Denied" and refuse.

   To get around this problem we could simply add the terminal room's or
   the dialup pool's IP network to the list of accepted networks at
   mail.home.example. This does open up some minimal risk of spammers
   using that host as their Mail Relay: If they use the same ISP's
   dialup pool and they configure to use mail.home.example at the same
   time as our salesman is on his trip, then the spammers will be
   authorized to relay their spam through mail.home.example. However,
   this is not extremely likely and as long as we do not open up for the
   entire world all the time and we keep the log files under close
   observation and we stop relaying at once we find we're being used,
   this solution is probably good enough.

To get around this problem we could simply add the terminal room's or the dialup pool's IP network to the list of accepted networks at mail.home.example. This does open up some minimal risk of spammers using that host as their Mail Relay: If they use the same ISP's dialup pool and they configure to use mail.home.example at the same time as our salesman is on his trip, then the spammers will be authorized to relay their spam through mail.home.example. However, this is not extremely likely and as long as we do not open up for the entire world all the time and we keep the log files under close observation and we stop relaying at once we find we're being used, this solution is probably good enough.

   Another way around is that our salesman uses a Mail Relay provided by
   the current dialup ISP, if that service exists. To do so he has to
   modify SMTP-SERVER= in his UA, which may or may not be reasonable.

Another way around is that our salesman uses a Mail Relay provided by the current dialup ISP, if that service exists. To do so he has to modify SMTP-SERVER= in his UA, which may or may not be reasonable.

Lindberg                 Best Current Practice                 [Page 18]

RFC 2505               Anti-Spam Recommendations           February 1999

Lindberg Best Current Practice [Page 18] RFC 2505 Anti-Spam Recommendations February 1999

   The correct way to handle this situation, though, is by some other
   mail-sending protocol between the UA and the MTA.

The correct way to handle this situation, though, is by some other mail-sending protocol between the UA and the MTA.

   Although a separate submission protocol does not exist, a profile of
   SMTP for this, the "Message Submission" specification, [9], has
   recently been defined.

Although a separate submission protocol does not exist, a profile of SMTP for this, the "Message Submission" specification, [9], has recently been defined.

   Or, we could note that when the SMTP Authentication work, [10], is
   all in place, it will allow for Authenticated SMTP to serve as The
   Protocol between the UAs and the home MTA (whether that should be
   considered a new protocol or "the same old SMTP" is irrelevant here).

Or, we could note that when the SMTP Authentication work, [10], is all in place, it will allow for Authenticated SMTP to serve as The Protocol between the UAs and the home MTA (whether that should be considered a new protocol or "the same old SMTP" is irrelevant here).

   This adds one item to the suggested Relay algorithm in section 2.1:

This adds one item to the suggested Relay algorithm in section 2.1:

   +   If "SMTP Authenticated" then accept to Relay.

+ If "SMTP Authenticated" then accept to Relay.

3.2. Personal anti-spam filters

3.2. Personal anti-spam filters

   Since all users are individuals, there is little hope that any
   central anti-spam action will suit them all - in fact people can and
   do argue about Freedom of Speech infringement if some central set of
   anti-spam rules is enforced without the users' approval. (One could
   of course also argue whether spam really adds anything to anyone, but
   that must be up to each individual user to decide, rather than being
   centrally decided).

Since all users are individuals, there is little hope that any central anti-spam action will suit them all - in fact people can and do argue about Freedom of Speech infringement if some central set of anti-spam rules is enforced without the users' approval. (One could of course also argue whether spam really adds anything to anyone, but that must be up to each individual user to decide, rather than being centrally decided).

   Therefore the only reasonable extension is to allow for personal
   anti-spam filters, i.e. anti-spam filters like the ones described
   earlier in this memo, but available and configurable on a per user
   basis. Since most users will not have a strong opinion (except that
   they want to avoid spam) the mail system should provide a system
   default and give each user the ability to override or modify that.
   In a UNIX based environment one could have something like

Therefore the only reasonable extension is to allow for personal anti-spam filters, i.e. anti-spam filters like the ones described earlier in this memo, but available and configurable on a per user basis. Since most users will not have a strong opinion (except that they want to avoid spam) the mail system should provide a system default and give each user the ability to override or modify that. In a UNIX based environment one could have something like

       /etc/mail/rc.spam
       ~/.spamrc

/etc/mail/rc.spam ~/.spamrc

   and rules on how the latter can interfere with the former.

and rules on how the latter can interfere with the former.

   All of this opens up quite a number of unresolved issues, e.g.
   whether each user himself really should be allowed to decide on SMTP
   Return Codes (and how it should be described so he understands enough
   of the implications) and how existing mail systems will deal with
   different per user responses, especially how they will deal with a
   mix of 5xx and 4xx codes:

All of this opens up quite a number of unresolved issues, e.g. whether each user himself really should be allowed to decide on SMTP Return Codes (and how it should be described so he understands enough of the implications) and how existing mail systems will deal with different per user responses, especially how they will deal with a mix of 5xx and 4xx codes:

       C  MAIL From: <usr@spam.example>
       S  250 <usr@spam.example>... Sender ok

C MAIL From: <usr@spam.example> S 250 <usr@spam.example>... Sender ok

Lindberg                 Best Current Practice                 [Page 19]

RFC 2505               Anti-Spam Recommendations           February 1999

Lindberg Best Current Practice [Page 19] RFC 2505 Anti-Spam Recommendations February 1999

       C  RCPT To: <usr@domain.example>
       S  250 <usr@domain.example>... Recipient ok
       C  RCPT To: <foo@domain.example>
       S  451 <foo@domain.example>... Denied due to spam list
       C  RCPT To: <bar@domain.example>
       S  550 <bar@domain.example>... Denied due to spam list

C RCPT To: <usr@domain.example> S 250 <usr@domain.example>... Recipient ok C RCPT To: <foo@domain.example> S 451 <foo@domain.example>... Denied due to spam list C RCPT To: <bar@domain.example> S 550 <bar@domain.example>... Denied due to spam list

   Of course one could decide on either "250 OK" or "550 Denied" with no
   other alternatives for the individual user, but this too has to be
   explained enough that an ordinary user understands the implications
   of "Refuse 'MAIL From: <.*@spam.example>'" and that it can do away
   with, or block out, mail he actually wanted.

Of course one could decide on either "250 OK" or "550 Denied" with no other alternatives for the individual user, but this too has to be explained enough that an ordinary user understands the implications of "Refuse 'MAIL From: <.*@spam.example>'" and that it can do away with, or block out, mail he actually wanted.

3.3. SMTP Authentication

3.3. SMTP Authentication

   SMTP Authentication, [10], has already been mentioned as a method to
   authorize Mail Relaying, but of course there is much more to it than
   that. When that infrastructure and functionality is all in place,
   spammers will have a much harder time forging addresses and hiding.

SMTP Authentication, [10], has already been mentioned as a method to authorize Mail Relaying, but of course there is much more to it than that. When that infrastructure and functionality is all in place, spammers will have a much harder time forging addresses and hiding.

3.4. Spam and NATs

3.4. Spam and NATs

   With the increased use of Network Address Translators (NATs) may come
   a need for additional information in log files. As long as there is a
   1:1 mapping between the addresses inside the NAT and the addresses
   used outside it everything is OK, but if the NAT box also translates
   port numbers (to combine many internal hosts into one external
   address) we will need to log not only the IP addresses of spam hosts
   but also the port numbers. Otherwise we will not be able to identify
   the individual host inside the NAT.

With the increased use of Network Address Translators (NATs) may come a need for additional information in log files. As long as there is a 1:1 mapping between the addresses inside the NAT and the addresses used outside it everything is OK, but if the NAT box also translates port numbers (to combine many internal hosts into one external address) we will need to log not only the IP addresses of spam hosts but also the port numbers. Otherwise we will not be able to identify the individual host inside the NAT.

4. Security Considerations

4. Security Considerations

   The grassfire-like increase of spam raises several security issues
   which, in fact, puts the entire Internet mail community at risk:

The grassfire-like increase of spam raises several security issues which, in fact, puts the entire Internet mail community at risk:

   o   People may fail to find important mail in their flooded
       mailboxes. Or, they may delete it while cleaning up.

o People may fail to find important mail in their flooded mailboxes. Or, they may delete it while cleaning up.

   o   ISPs get overloaded mailbox hosts and filled disk. Cleaning up
       and helping customers requires a lot of human resources.  In
       fact, ISP mail servers have crashed by too much mail.

o ISPs get overloaded mailbox hosts and filled disk. Cleaning up and helping customers requires a lot of human resources. In fact, ISP mail servers have crashed by too much mail.

   o   While disks are unaccessible, either due to being filled or due
       to "mail quota", important mail may be delayed or lost.  Normally
       this would not happen without notice, but if both the sender and

o While disks are unaccessible, either due to being filled or due to "mail quota", important mail may be delayed or lost. Normally this would not happen without notice, but if both the sender and

Lindberg                 Best Current Practice                 [Page 20]

RFC 2505               Anti-Spam Recommendations           February 1999

Lindberg Best Current Practice [Page 20] RFC 2505 Anti-Spam Recommendations February 1999

       receiver hosts have their disk flooded, the mail being returned
       may also fail, i.e. the email service may become less trustworthy
       than before.

receiver hosts have their disk flooded, the mail being returned may also fail, i.e. the email service may become less trustworthy than before.

   o   Hosts used as unauthorized Mail Relays become overloaded.
       Besides the technical implications, this too requires a lot of
       human resources, cleaning up mail queues and taking care of
       furious external users that were spammed through the Relay.

o Hosts used as unauthorized Mail Relays become overloaded. Besides the technical implications, this too requires a lot of human resources, cleaning up mail queues and taking care of furious external users that were spammed through the Relay.

   o   The fight against spammers includes blocking their hosts (which
       is described in this memo). However, there is a great risk that
       Mail Relay hosts may be blocked too, even though they are also
       victims. In the long run, this may cause Internet mail service to
       deteriorate.

o The fight against spammers includes blocking their hosts (which is described in this memo). However, there is a great risk that Mail Relay hosts may be blocked too, even though they are also victims. In the long run, this may cause Internet mail service to deteriorate.

   o   The common use of forged "MAIL From:" and "From:" addresses puts
       the blame on innocent persons/hosts/organizations. This is bad
       for reputations and may affect business relations.

o The common use of forged "MAIL From:" and "From:" addresses puts the blame on innocent persons/hosts/organizations. This is bad for reputations and may affect business relations.

   Several of the methods described in this document increases the load
   on several support systems to the email system itself. Those support
   systems can be DNS, logging, databases with lists of local users,
   authentication mechanisms and others. Implementing the methods
   described in this document will, because of that, increase the risk
   of a denial of service attack against the support system by sending
   spam to a site. Logging facilities must for example be able to handle
   more logging (what happens when the logfiles fills the disk?).  DNS
   servers and authentication mechanisms must be able to stand the load
   of more lookups etc.

本書では説明されたいくつかの方法が数個のサポート・システムの上でメールシステム自体に負荷を増加させます。 それらのサポート・システムはDNS、伐採、地元のユーザ、認証機構、および他のもののリストがあるデータベースであるかもしれません。 それのために、本書では説明された方法を実行すると、サービス不能攻撃の危険は、スパムをサイトに送ることによって、サポート・システムに対して増加するでしょう。 例えば、伐採施設は、より多くの伐採を扱うことができなければなりません(ログファイルであるときに、何が起こるかがディスクをいっぱいにしていますか?)。 DNSサーバと認証機構は、より多くのルックアップなどの負荷に耐えることができなければなりません。

   The functionality of the support systems during high load should be
   carefully studied before implementing the methods described in this
   document.

本書では説明された方法を実行する前に、高い負荷の間のサポート・システムの機能性は慎重に研究されるべきです。

   The mail system should be carefully studied, e.g. how it behaves when
   one or more of the support systems needed for a specific method
   fails. A mail server MUST NOT respond with "Permanent Failure" (5xx)
   if there is a temporary problem with one of its support systems.

メールシステムは慎重に研究されるべきです、例えば、特定の方法に必要であるサポート・システムの1つ以上が失敗すると、それがどう反応するか。 サポート・システムの1つに関する一時的な問題があれば、メールサーバは「永久的な失敗」(5xx)で反応してはいけません。

5. Acknowledgements

5. 承認

   This memo is the result of discussions in an ad hoc group of Swedish
   ISPs and Universities. Without any hope on mentioning everyone we
   simply give the domain names here: algonet.se, global-ip.net, pi.se,
   swip.net, telia.net, udac.se; chalmers.se, sunet.se, umu.se, and
   uu.se.

このメモはスウェーデンのISPと大学の専門家班で、議論の結果です。 皆について言及するときの少しも望みがなければ、私たちはドメイン名をここに単に与えます: algonet.se、グローバルなip.net、pi.se、swip.net、telia.net、udac.se。 chalmers.se、sunet.se、umu.se、およびuu.se。

Lindberg                 Best Current Practice                 [Page 21]

RFC 2505               Anti-Spam Recommendations           February 1999

推薦1999年2月の反スパムのリンドバーグ最も良い現在の習慣[21ページ]RFC2505

   We want to acknowledge valuable input and suggestions from Andras
   Salamon, John Myers, Bob Flandrena, Dave Presotto, Dave Kristol,
   Donald Eastlake, Ned Freed, Keith Moore and Paul Hoffman.

Andras Salamon、ジョン・マイアーズ、ボブFlandrena、デーヴPresotto、デーヴ・クリストル、ドナルド・イーストレーク、ネッド・フリード、キース・ムーア、およびポール・ホフマンから貴重な入力と提案を承諾したいと思います。

   Finally many thanks to Harald Alvestrand and Patrik Faltstrom, both
   for useful comments and for their support and guidance through the
   IETF process.

IETFの過程で最終的にハラルドAlvestrandとパトリクFaltstromと、そして、彼らの役に立つコメントとサポートと指導をありがとうございます。

6. References

6. 参照

   [1] Postel, J., "Simple Mail Transfer Protocol", STD 10, RFC 821,
       August 1982.

[1] ポステル、J.、「簡単なメール転送プロトコル」、STD10、RFC821、1982年8月。

   [2] Crocker, D., "Standard for the format of ARPA Internet text
       messages", STD 11, RFC 822, August 1982.

[2] クロッカー、D.、「ARPAインターネット・テキスト・メッセージの形式の規格」、STD11、RFC822、1982年8月。

   [3] Braden, R., "Requirements for Internet hosts - application and
       support", STD 3, RFC 1123, October 1989.

[3] ブレーデンと、R.と、「インターネット・ホスト--アプリケーションのための要件とサポート」、STD3、RFC1123、10月1989日

   [4] Bradner, S., "Key words for use in RFCs to Indicate Requirement
       Level", BCP 14, RFC 2119, March 1997.

[4] ブラドナー、S.、「Indicate Requirement LevelへのRFCsにおける使用のためのキーワード」、BCP14、RFC2119、1997年3月。

   [5] Mockapetris, P., "Domain Names - Concepts and Facilities", STD
       13, RFC 1034, November 1987.

[5]Mockapetris、P.、「ドメイン名--、概念と施設、」、STD13、RFC1034、11月1987日

   [6] Mockapetris, P., "Domain Names - Implementation and
       Specifications", STD 13, RFC 1035, November 1987.

[6]Mockapetris、P.、「ドメイン名--、実現と仕様、」、STD13、RFC1035、11月1987日

   [7] Eastlake, D. and C. Kaufman, "Domain Name System Security
       Extensions", RFC 2065, January 1997.

[7] イーストレークとD.とC.コーフマン、「ドメインネームシステムセキュリティ拡大」、RFC2065、1997年1月。

   [8] sendmail Home Page. http://www.sendmail.org

[8]sendmailホームページ http://www.sendmail.org

   [9] Gellens, R. and J. Klensin "Message Submission", RFC 2476,
       September 1998.

[9]GellensとR.とJ.Klensin「メッセージ提案」、RFC2476、1998年9月。

   [10] Myers, J., "SMTP Service Extension for Authentication", Work in
       Progress.

[10] マイアーズ、J.、「認証のためのSMTPサービス拡張子」が進行中で働いています。

   *   Spam (R) (capitalized) is a registered trademark of a meat
       product made by Hormel. Use of the term spam (uncapitalized) in
       the Internet community comes from a Monty Python sketch and is
       almost Internet folklore. The term spam is usually pejorative,
       however this is not in any way intended to describe the Hormel
       product.

* スパム(R)(大文字で書かれます)はホーメルによって作られた肉製品の登録商標です。 インターネットコミュニティにおけるばらまくという用語の使用(「非-大文字で書」いた)は、モンティ・パイソンスケッチから来て、ほとんどインターネット伝説です。 通常、ばらまくという用語が軽蔑語である、しかしながら、何らかの方法で、これがホーメル製品について説明することを意図しません。

Lindberg                 Best Current Practice                 [Page 22]

RFC 2505               Anti-Spam Recommendations           February 1999

推薦1999年2月の反スパムのリンドバーグ最も良い現在の習慣[22ページ]RFC2505

Editor's Address

エディタのアドレス

   Gunnar Lindberg
   Computer Communications Group
   Chalmers University of Technology
   SE-412 96 Gothenburg, SWEDEN,

グナーリンドバーグコンピュータコミュニケーションは技術SE-412 96イェーテボリ(スウェーデン)のチャーマーズ大学を分類します。

   Phone: +46 31 772 5913
   FAX:   +46 31 772 5922
   EMail: lindberg@cdg.chalmers.se

以下に電話をしてください。 +46 31 772 5913Fax: +46 31 772 5922はメールされます: lindberg@cdg.chalmers.se

Lindberg                 Best Current Practice                 [Page 23]

RFC 2505               Anti-Spam Recommendations           February 1999

推薦1999年2月の反スパムのリンドバーグ最も良い現在の習慣[23ページ]RFC2505

Full Copyright Statement

完全な著作権宣言文

   Copyright (C) The Internet Society (1999).  All Rights Reserved.

Copyright(C)インターネット協会(1999)。 All rights reserved。

   This document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph are
   included on all such copies and derivative works.  However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be
   followed, or as required to translate it into languages other than
   English.

それに関するこのドキュメントと翻訳は、コピーして、それが批評するか、またはそうでなければわかる他のもの、および派生している作品に提供するか、または準備されているかもしれなくて、コピーされて、発行されて、全体か一部広げられた実現を助けるかもしれません、どんな種類の制限なしでも、上の版権情報とこのパラグラフがそのようなすべてのコピーと派生している作品の上に含まれていれば。 しかしながら、このドキュメント自体は何らかの方法で変更されないかもしれません、インターネット協会か他のインターネット組織の版権情報か参照を取り除くのなどように、それを英語以外の言語に翻訳するのが著作権のための手順がインターネットStandardsの過程で定義したどのケースに従わなければならないか、必要に応じてさもなければ、インターネット標準を開発する目的に必要であるのを除いて。

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assigns.

上に承諾された限られた許容は、永久であり、インターネット協会、後継者または案配によって取り消されないでしょう。

   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

このドキュメントとそして、「そのままで」という基礎とインターネットの振興発展を目的とする組織に、インターネット・エンジニアリング・タスク・フォースが速達の、または、暗示しているすべての保証を放棄するかどうかというここにことであり、他を含んでいて、含まれて、情報の使用がここに侵害しないどんな保証も少しもまっすぐになるという情報か市場性か特定目的への適合性のどんな黙示的な保証。

Lindberg                 Best Current Practice                 [Page 24]

リンドバーグBest現在の習慣[24ページ]

一覧

 RFC 1〜100  RFC 1401〜1500  RFC 2801〜2900  RFC 4201〜4300 
 RFC 101〜200  RFC 1501〜1600  RFC 2901〜3000  RFC 4301〜4400 
 RFC 201〜300  RFC 1601〜1700  RFC 3001〜3100  RFC 4401〜4500 
 RFC 301〜400  RFC 1701〜1800  RFC 3101〜3200  RFC 4501〜4600 
 RFC 401〜500  RFC 1801〜1900  RFC 3201〜3300  RFC 4601〜4700 
 RFC 501〜600  RFC 1901〜2000  RFC 3301〜3400  RFC 4701〜4800 
 RFC 601〜700  RFC 2001〜2100  RFC 3401〜3500  RFC 4801〜4900 
 RFC 701〜800  RFC 2101〜2200  RFC 3501〜3600  RFC 4901〜5000 
 RFC 801〜900  RFC 2201〜2300  RFC 3601〜3700  RFC 5001〜5100 
 RFC 901〜1000  RFC 2301〜2400  RFC 3701〜3800  RFC 5101〜5200 
 RFC 1001〜1100  RFC 2401〜2500  RFC 3801〜3900  RFC 5201〜5300 
 RFC 1101〜1200  RFC 2501〜2600  RFC 3901〜4000  RFC 5301〜5400 
 RFC 1201〜1300  RFC 2601〜2700  RFC 4001〜4100  RFC 5401〜5500 
 RFC 1301〜1400  RFC 2701〜2800  RFC 4101〜4200 

スポンサーリンク

border-top-color 上ボーダーの色を指定する

ホームページ製作・web系アプリ系の製作案件募集中です。

上に戻る