Remote email access

Dave Crocker dhc2 at dcrocker.net
Fri Jan 31 01:46:37 UTC 2003


Folks,

The Ops community and the IETF Email community appear to have different
views about appropriate methods for email posting. The difference
frequently means that an effort to post a new message from a network
with a firewall, to a remote SMTP, is blocked by the outbound firewall.

Blocking outbound SMTP (port 25) is supported by the Ops community as a
spam-suppression mechanism. Ops support for this blockage appears to be
deeply and broadly held.

This note is *not* an effort to debate the Ops concern or the preference
for blocking outbound port 25. Rather, I would like to pursue a
discussion that simply resolves the disparity between the two
communities.

The goal is to obtain a coherent recommendation that is acceptable to
the Ops and the Email communities.

It would permit normal users to easily use their normal software and
achieve normal access to normal services. Whatever the current choices
are, they are inconsistently available and they frequently require
technically knowledgeable users and/or special cooperation by the user's
remote ISP.

My guess is that a brief IETF BCP document would suffice for describing
the recommended profile. For completeness, I suggest that the BCP cover
"Remote email access" for posting and retrieval, and that it recommend
the details that will permit private, authenticated access for all
standardized email services.

Some current choices:

Email standards provide for posting of email to the usual port 25 or to
port 773 for the newer "submit" service. (Submit is a clone of SMTP that
operates on a different port and is permitted to evolve independently of
SMTP, in order to tailor posting by originators, differently from
server-to-server email relaying.) There is also a de facto standard for
doing SMTP over SSL on port 465, although this collides with the IANA
assignment of that port to another service.

Standardized SMTP authentication uses the SMTP Auth command or the SASL
service within SMTP. It can also use the de fact "POP hack". All 3 of
these mechanisms are inline -- as part of the posting protocol -- so
that they work over whatever port is being used for posting.

Standardized privacy for SMTP uses SMTP over SSL or it uses SMTP with
SASL.  SASL can be used on any SMTP or Submit port.  SSL can only be
used on port 25 if the SMTP service is not available to other SMTP
servers for relaying (or, really, for last-hop SMTP delivery).

Some choices are easier for users.  Some are easier for service
providers.  Some are supported more broadly in current software.

We need to narrow down the recommended choices, preferably to one per
service.

Thoughts?

d/
--
 Dave <mailto:dhc2 at dcrocker.net>
 Brandenburg InternetWorking <http://www.brandenburg.com>
 t +1.408.246.8253; f +1.408.850.1850




More information about the NANOG mailing list