16 September 2004 Source: http://www.access.gpo.gov/su_docs/aces/fr-cont.html ----------------------------------------------------------------------- [Federal Register: September 15, 2004 (Volume 69, Number 178)] [Notices] [Page 55632-55636] From the Federal Register Online via GPO Access [wais.access.gpo.gov] [DOCID:fr15se04-52] ======================================================================= ----------------------------------------------------------------------- FEDERAL TRADE COMMISSION Email Authentication Summit AGENCIES: The Federal Trade Commission (``FTC'' or the ``Commission'') and the National Institute of Standards and Technology (``NIST''), United States Department of Commerce. ACTION: Notice announcing email authentication summit, request for comments, and solicitation of requests to participate. ----------------------------------------------------------------------- DATES: The Email Authentication Summit will be held on November 9-10, 2004, from 8:30 a.m. to 5:30 p.m. at the Federal Trade Commission, Satellite [[Page 55633]] Building, 601 New Jersey Ave., NW., Washington, DC 20001. The event is open to the public, and there is no fee for attendance. Pre- registration is not required. Comments: Written comments should be submitted on or before September 30, 2004. For further information, please see the ``Request for Comments'' section of this Notice. Participants: Written Requests to Participate in the Email Authentication Summit must be filed by September 30, 2004. For further information, please see the ``Requests to Participate'' section of this Notice. Parties submitting Requests to Participate will be notified by October 15, 2004, if they have been selected. ADDRESSES: Written comments should be identified as ``Email Authentication Summit-Comments,'' and written requests to participate in the Email Authentication Summit should be identified as ``Email Authentication Summit-Request to Participate.'' Written Comments and Requests to Participate should be submitted to: Secretary, Federal Trade Commission, Room 159-H (Annex V), 600 Pennsylvania Ave., NW., Washington, DC 20580. If submitting in paper form, parties must submit an original and three copies of each document. The FTC requests that any comment filed in paper form be sent by courier or overnight service, since U.S. postal mail in the Washington area and at the Commission is subject to delay due to heightened security precautions. In the alternative, parties may email Comments and Requests to Participate to authenticationsummit@ftc.gov. To ensure that the Commission considers an electronic comment, you must file it with the FTC at this email address. For further requirements concerning the filing of Comments and Requests to Participate, please see the Request for Comments and Requests to Participate sections of this Notice. FOR FURTHER INFORMATION CONTACT: Sana D. Coleman, Attorney, (202) 326- 2249. A detailed agenda and additional information on the Email Authentication Summit will be posted on the FTC's Website, http://www.ftc.gov , by November 7, 2004. SUPPLEMENTARY INFORMATION: Section A. Introduction In the Commission's June 15, 2004 National Do Not Email Registry Report to Congress, the Commission explained that significant security, enforcement, practical, and technical challenges rendered a registry an ineffective solution to the spam problem.\1\ The Report, however, identified domain-level authentication as a promising technological development that would enable Internet Service Providers (``ISPs'') and other domain holders to better filter spam, and that would provide law enforcement with a potent tool for locating and identifying spammers. The Report concluded that the Commission could play an active role in spurring the market's development, testing, evaluation, and deployment of domain-level authentication systems. As a first step, the Report explained that the Commission, with other relevant government agencies, would host an Email Authentication Summit in the Fall of 2004. This Federal Register Notice explains that the Commission and the Department of Commerce's National Institute of Standards and Technology (``NIST'') will be hosting the Summit on November 9-10, 2004, asks for comments on a number of issues concerning email authentication standards, and solicits requests to participate in the Summit. --------------------------------------------------------------------------- \1\ ``National Do Not Email Registry, A Report to Congress,'' by the Federal Trade Commission, June 2004. The Report is posted online at http://www.ftc.gov/reports/dneregistry/report.pdf. --------------------------------------------------------------------------- Section B. Background The Simple Mail Transfer Protocol (``SMTP''), the Internet protocol for the email system, allows information to travel freely with relative anonymity and ease. SMTP facilitates the proliferation of spam by making it possible and cost-efficient for illegitimate marketers to send spam to billions of email accounts worldwide, while allowing them to hide their identities and the origins of their email messages. Spammers use many techniques to hide, including ``spoofing,'' open relays, open proxies, and ``zombie drones,'' including ``zombie nets.'' First, spammers use spoofing to falsify header information and hide their identities. This technique disguises an email to make it appear to come from an address other than the one from which it actually comes. A spammer can falsify portions of the header or the entire header. The SMTP system facilitates this practice because it does not require accurate routing information except for the intended recipient of the email. By failing to require accurate sender identification, SMTP allows spammers to send email without accountability, often disguised as personal email. A spammer can send out millions of spoofed messages, but any bounced messages--messages returned as undeliverable--or complaints stemming from the spoofed emails will only go to the person whose address was spoofed. The spammer never has to deal with them. As a result, an innocent email user's inbox may become flooded with undeliverable messages and angry, reactive email, and the innocent user's Internet service may be shut off due to the volume of complaints. Second, many spammers use open relays to disguise the origin of their email. A computer must be connected to a mail server to send or receive mail. When someone sends an email message using an email server that is ``secure,'' the mail server's software checks to make sure that the sender's computer and email account are authorized to use that server. If this authorization is in order, then the server sends the email. If the computer and email account are not listed as authorized, the server refuses to accept and send the email message. On the other hand, if a mail server is not secure, i.e., some of its settings allow it to stay open, it will forward email even though the sender is not an authorized user of that server. An open server is called an open relay because it will accept and transfer email on behalf of any user anywhere. Spammers who use open relays effectively bypass the email servers to which their computers are connected. Once the spam passes through an open relay, a routing header from that server is added to the email. Thus, the email will appear as if it originated from the relay mail server. This allows spammers to obscure their tracks, making it difficult to trace the path their message takes from sender to recipient. Third, many spammers use ``open proxies.'' They began doing this after ISPs and other mail server operators realized the negative impact of open relays and made efforts to identify and close them. Most organizations have multiple computers on their networks, but have a smaller number of proxy servers that are the only machines on the network that directly interact with the Internet. This system provides more efficient web browsing for the users within that organization and secures the organization's network against unauthorized Internet users from outside the organization. If the proxy is not configured properly, it is considered to be ``open,'' and may allow an unauthorized Internet user to connect through it to other hosts (computers that control communications in a network or administer databases) on the Internet. Fourth, the most recent escalation in this cat-and-mouse game involves the exploitation of millions of home [[Page 55634]] computers, using malicious viruses, worms, or ``Trojans.'' These infections, often sent via spam, turn any computer into an open or compromised proxy called ``zombie drones.'' When large collections of zombie drones are under centralized command, they are called ``zombie nets.'' Once a computer is infected with one of these programs, a spammer can remotely hijack and send spam from that computer. Spammers target home computers with high speed Internet connections, such as DSL or cable modem lines, that are poorly secured. Spam sent via zombie drones will appear to originate (and actually will originate) from these infected computers. This practice is all the more pernicious because users often do not know that their home computers are infected. The outgoing spam does not show up in their outbox. Once an ISP realizes spam is coming from one of its customer's machines, the ISP must shut off the customer's Internet service even though the customer had no knowledge that the spammer was using his or her machine. Obfuscatory techniques such as spoofing, open relays, open proxies, and zombie drones make it more difficult for ISPs to locate spammers. When ISPs and domain holders implement technologies designed to stop one exploitative technique, spammers quickly adapt, finding new methods to avoid detection. If the cloak of anonymity were removed, however, spammers could not operate with impunity. ISPs and domain holders could filter spam more effectively, and the government and ISPs could more effectively identify and prosecute spammers who violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (the ``CAN-SPAM Act''), 15 U.S.C. 7708, or other statutes.\2\ --------------------------------------------------------------------------- \2\ SMTP, its abuse by spammers, and the benefits of domain- level authentication are discussed in detail in the Commission's June 2004 National Do Not Email Registry Report to Congress, available at http://www.ftc.gov/reports/dneregistry/report.pdf. --------------------------------------------------------------------------- To remove this cloak of anonymity, ISPs and others involved with the email system have proposed domain-level authentication systems-- systems that would enable a receiving mail server to verify that an email message actually came from the sender's purported domain. In other words, if a message claimed to be from abc@ftc.gov, the private market authentication proposals would authenticate that the message came from the domain ``ftc.gov,'' but would not authenticate that the message came from the particular email address ``abc'' at this domain. There are two well-publicized private market authentication proposals, ``Sender ID'' and ``DomainKeys.'' Sender ID, a combination of an earlier proposed authentication standard called SPF (``sender policy framework'') and Microsoft's ``Caller ID for Email,'' would require senders of email to list the IP addresses from which they send email in the domain name system (the ``DNS system''). Receiving servers would compare the IP addresses listed in a message's header with those listed in the DNS system to determine if the message was coming from an authenticated IP address. DomainKeys uses public key/private key cryptography to authenticate email messages. A domain that sends email would create a public/private key pair and post the public key in the DNS system. For each message, the sending domain would generate a digital signature by applying the private key algorithm to the entire message. The sending domain would then add the digital signature in the message's header. The receiving mail server would then use the public key to verify that the digital signature was generated by the matching private key. While Sender ID and DomainKeys are the best known of the proposed authentication standards, other participants in the email system have proposed or intend to propose other domain-level authentication standards. For example, this Fall, the Internet Engineering Task Force, the Internet's standards setting body, is expected to forward an SPF- modeled authentication standard to one of its internal committees, the Internet Engineering Steering Group, which will decide whether to accept any such SPF-based model as a proposed or experimental standard or send it back for revision. To encourage the development, testing, evaluation and implementation of domain-level authentication systems, the Commission will conduct a two-day Email Authentication Summit. This Summit will be co-sponsored with NIST. The Summit will be held on November 9-10, 2004 in Washington, DC. The purpose of the Summit is to facilitate a discussion among technologists from ISPs, businesses and individuals who operate their own mail servers, computer scientists, and other interested parties regarding technological challenges of the various authentication proposals, the ability of small ISPs and domain holders to participate in the authentication systems, the costs associated with the various proposals, the international implications associated with the proposals, and other issues that impact the time frame for and viability and effectiveness of wide-scale adoption of domain-level authentication systems for email. Section C. Request for Comments Parties who wish to submit written comments addressing the Email Authentication Summit must do so by September 30, 2004. Written comments may be filed in either paper or electronic form. Written comments should refer to ``Email Authentication Summit--Comments, (Matter Number P044411)'' to facilitate the organization of comments. A comment filed in paper form should include this reference both in the text and on the envelope, and the original and three copies should be mailed or delivered to the following address: Federal Trade Commission/ Office of the Secretary, Room 159-H (Annex V), 600 Pennsylvania Avenue, NW., Washington, DC 20580. If the comment contains any material for which confidential treatment is requested, it must be filed in paper (rather than electronic) form, and the first page of the document must be clearly labeled ``Confidential.'' The FTC is requesting that any comment filed in paper form be sent by courier or overnight service, if possible, because U.S. postal mail in the Washington area and at the Commission is subject to delay due to heightened security precautions. Comments filed in electronic form (except comments containing any confidential material) should be sent to the following email box: authenticationsummit@ftc.gov. Written comments may address the issues identified below and any other issues in connection with the adoption and implementation of any of the proposed authentication standards. 1. Whether any of the proposed authentication standards (either alone or in conjunction with other existing technologies) would result in a significant decrease in the amount of spam received by consumers. 2. Whether any of the proposed authentication standards would require modification of the current Internet protocols and whether any such modification would be technologically and practically feasible. 3. Whether any of the proposed authentication standards would function with the software and hardware currently used by senders and recipients of email and operators of sending and receiving email servers. If not, what additional software or hardware would the sender and recipient need, how much it would cost, whether it would be required or optional, and where it would be obtained. [[Page 55635]] 4. How operators of receiving email servers are likely to handle un-authenticated messages. 5. Whether any of the proposed authentication standards could result in email being incorrectly labeled as authenticated or unauthenticated (false negatives and false positives), and the steps that could be taken to limit such occurrences. 6. Whether the authentication standards are mutually exclusive or interoperable. Whether any of the proposed authentication standards would integrate with any other standards. For example, if Mail Server A is using standard X, will it accept email easily from Mail Server B that is using standard Y? 7. Whether any of the proposed authentication standards would have to be an open standard (i.e., a standard with specifications that are public). 8. Whether any of the proposed authentication standards are proprietary and/or patented. 9. Whether any of the proposed authentication standards would require the use of goods or services protected by intellectual property laws. 10. How any of the proposed authentication standards would treat email forwarding services. 11. Whether any of the proposed authentication standards would have any implications for mobile users (e.g., users who may be using a laptop computer, an email-enabled mobile phone, or other devices, and who legitimately send email from email addresses that are not administratively connected with their home domain). 12. Whether any of the proposed authentication standards would have any implications for roving users (i.e., users who are obliged to use a third-party submission service when unable to connect to their own submission service). 13. Whether any of the proposed authentication standards would affect the use of mailing lists. 14. Whether any of the proposed authentication standards would have any implications for outsourced email services. 15. Whether any of the proposed authentication standards would have an impact on multiple apparent responsible identities (e.g., in cases where users send email using their Internet Service Provider's SMTP network but have their primary email account elsewhere). 16. Whether any of the proposed authentication standards would have an impact on web-generated email. 17. Whether the proposed authentication standards are scalable. Whether the standards are computationally difficult such that scaling over a certain limit becomes technologically impractical. Whether the standards are monetarily expensive due to hardware and resource issues so that scaling over a certain limit becomes impractical. 18. Identify any costs that would arise as a result of implementing any of the proposed authentication standards, and identify who most likely would bear these costs (e.g., large ISPs, small ISPs, consumers, or email marketers). 19. Whether ISPs that do not participate in an authentication regime would face any challenges providing email services. If so, what types of challenges these ISPs would face and whether these challenges would in any way prevent them from continuing to be able to provide email services. 20. Whether an Internet-wide authentication system could be adopted within a reasonable amount of time. Description of industry and standard-setting efforts, whether there is an implementation schedule in place and, if so, the time frames of the implementation schedule. 21. Whether any of the authentication standards would delay current email transmission times, burden current computer mechanisms, or otherwise adversely affect the ease of email use by consumers. 22. Whether any of the proposed authentication standards would impact the ability of consumers to engage in anonymous political speech. 23. Whether any safeguards are necessary to ensure that the adoption of an industry-wide authentication standard does not run afoul of the antitrust laws. 24. Whether a spammer or hacker could compromise any of the proposed authentication standards by using, for example, zombie drones, spoofing of originating IP addresses, misuse of public/private key cryptography, or other means. 25. Whether any of the proposed authentication systems would prevent ``phishing,'' a form of online identity theft. 26. Whether the operators of small ISPs and business owners would have the technical capacity to use any of the proposed authentication standards. Whether any of the authentication standards could be reasonably implemented by smaller ISPs. 27. Whether any of the proposed authentication standards would have cross-border implications. 28. Whether any of the proposed authentication standards would require an international civil cryptographic standard or other internationally adopted standard and, if so, the implications of this requirement. 29. Description of how the Email Authentication Summit can support industry or standard-setting efforts. 30. Assuming a domain-level authentication system is established in the near term, future measures that the private market should develop and implement in order to combat spam. Section D. Requests To Participate Parties who wish to participate in the Email Authentication Summit must notify the FTC and NIST in writing of their interest by September 30, 2004 either by mail to the Secretary of the FTC or by email to authenticationsummit@ftc.gov. The Request to Participate must include a statement setting forth the requesting party's expertise in or knowledge of any or all of the issues identified in the Request for Comments section of this Notice and their contact information, including a telephone number, facsimile number, and email address (if available), to enable the FTC to notify them if they are selected. Requests to participate as a panelist should be captioned ``Email Authentication Summit--Request to Participate, (Matter Number P044411), and should be filed in the same manner as prescribed for written comments in the ``Request for Comments'' section. For requests filed in paper form, an original and three copies of each document should be provided. Panelists will be notified on or before October 15, 2004, whether they have been selected. Using the following criteria, the FTC and NIST staff will select a limited number of participants: 1. The party submitted a complete Request to Participate by September 30, 2004. 2. The party has expertise in or knowledge of some or all of the issues that are the focus of the Summit. 3. The party's participation would promote the representation of a balance of interests at the Summit. If it is necessary to limit the number of participants, parties who request to participate but are not selected may be afforded an opportunity, if at all possible, to present statements during a limited time period. The time allotted for these statements will be based on the amount of time necessary for discussion of the issues by the selected parties and on the number of persons wishing to make statements. [[Page 55636]] Section E. Availability of Comments and Requests To Participate as Panelists The FTC Act and other laws the Commission administers permit the collection of public comments and requests to participate as panelists, to consider and use in this proceeding as appropriate. All timely and responsive public comments and requests to participate, whether filed in paper or electronic form, will be considered by the Commission, and will be available to the public on the FTC website, to the extent practicable, at http://www.ftc.gov. As a matter of discretion, the FTC makes every effort to remove home contact information for individuals from the public comments and requests to participate it receives before placing those comments on the FTC website. More information, including routine uses permitted by the Privacy Act, may be found in the FTC's privacy policy, at http://www.ftc.gov/ftc/privacy.htm. By direction of the Commission. Donald S. Clark, Secretary. [FR Doc. 04-20839 Filed 9-14-04; 8:45 am] BILLING CODE 6750-01-P