The End of the NDR
Opinion: SMTP e-mail errors these days are much more often malicious than informative. We actually have to protect ourselves from them.Im a paying subscriber to several of DynDNSs e-mail services. Today I got a newsletter from them announcing that they will stop generating local NDRs (non-delivery reports) from their services. NDRs, also known as bounce messages, are error messages from mail relay servers back to the message sender saying that the message cannot be delivered.
It has become common for spammers to forge originating e-mail addresses and to then send large spam runs against different servers. When this happens, DynDNS sometimes receives these messages, which cannot be delivered, or worse, get bounced back to the original forged sender, who now gets the spam in his or her inbox (aka, spam blow back)... We simply feel that this is not the right thing to do.In one sense this is boring, dog-bites-man stuff. Everyone knows that NDRs are trouble. It wasnt always this way. Back in the early days when Al Gore invented the Internet, message delivery was far less reliable than it is now. The systems and connections between them were unreliable. Often a connection would be taken offline because, for example, someone needed that phone line to call Mom.
For this reason the standards that defined e-mail on the Internet (RFC 821/822, 2821/2822), created a requirement that a relay server must send a NDR if it experienced a problem delivering a message to a destination.
If an SMTP server has accepted the task of relaying the mail and later finds that the destination is incorrect or that the mail cannot be delivered for some other reason, then it MUST construct an "undeliverable mail" notification message and send it to the originator of the undeliverable mail (as indicated by the reverse-path).Emphasis is original to the RFC. You MUST send the NDR. But DynDNS wont be doing it anymore, and good for them. They shouldnt, because these days "the originator of the undeliverable mail (as indicated by the reverse-path)" is almost certainly some innocent third party who did not send the e-mail. (Johannes Ullrich of the ISC basically agrees.) One upshot of this is that DynDNS will not be RFC-compliant, and this they clearly dont like. It bothers them a lot more than it bothers me. Look at where standards have got us with e-mail. Just because theyre "standards" doesnt mean we shouldnt protect ourselves from the consequences of their design flaws. NDRs have other nefarious uses. Many services stopped sending NDRs years ago because of DHAs (Directory Harvest Attacks), where a spammer attempts to construct a list of accurate addresses in a domain by using a dictionary of names and sending test messages to all of those names in the domain (firstname.lastname@example.org, email@example.com, etc.). If the spammer gets an NDR back, he knows its not a real address. If he doesnt get an NDR, its a real address. The downside to turning off NDRs is that customers and other outsiders may get the impression youre ignoring them when in fact they just typed the wrong name. But leave them on and you guarantee that eventually someone can create a highly accurate copy of your directory. They can use this not only for spamming but for targeted attacks that need to look credible, like an e-mail that needs to look like it came from the CFO. BATV is one way to address "blowback" and other bounce message abuse. Click here to read more. There are actually good. RFC-compliant ways to address bounce abuse. BATV (Bounce Address Tag Validation) is one way to block any bounces that didnt actually come from the users who purportedly sent them. Sadly, BATV has to be implemented in the MTA (mail transfer agent), which DynDNS doesnt generally control, so it wouldnt work for them. (Would it? Doesnt seem to me like it would.) When even good citizens like DynDNS start going non-compliant in order to do the right thing, its time for the standards people to get off their duffs and do their jobs. The RFC is broken. NDRs are hardly the only thing wrong with SMTP, but once its right to ignore the RFC things can only get worse. Security Center Editor Larry Seltzer has worked in and written about the computer industry since 1983. Check out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers blog Cheap Hack