On Tue, 15 Dec 2015, Paul Stead wrote:


On 14/12/15 20:32, John Hardin wrote:
 All:

 Any objection to promoting __CT_ENCRYPTED and ENCRYPTED_MESSAGE out of
 the sandbox to permanent rules, and giving ENCRYPTED_MESSAGE a
 negative (nice) score (say, -1)?

 I think that's fairly safe to do, as I doubt a spammer would impose
 the overhead of decryption on their victims, and I'm not sure exactly
 how well sandbox+masscheck works for "nice" rules.


 header     __CT_ENCRYPTED              Content-Type =~
/^multipart\/(?:x-)?(?:pgp-)?encrypted|application\/(?:x-)?pkcs7-mime/

What's to stop the spammer using a very short public key? The overhead
for the victim would be minimal

Does this header distinguish between "signed" and "encrypted"? If it does not, then I can see your objection as signature verification alone, absent actual encryption of the contents, would probably be transparent to the user.

Otherwise: the crypto key size doesn't matter. It would still cause the recipient to have to decrypt the spam before they could see it. I'm more focused on user interaction load than system load. If the user has to enter a password to see the spam, it's much less likely they will see the spam.

--
 John Hardin KA7OHZ                    http://www.impsec.org/~jhardin/
 [email protected]    FALaholic #11174     pgpk -a [email protected]
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
  ...to announce there must be no criticism of the President or to
  stand by the President right or wrong is not only unpatriotic and
  servile, but is morally treasonous to the American public.
                                          -- Theodore Roosevelt, 1918
-----------------------------------------------------------------------
 Today: Bill of Rights day

Reply via email to