On 13/11/22 03:05, Wei Chuang wrote:

On Fri, Nov 11, 2022 at 11:17 PM Roland Turner <[email protected]> wrote:


     1. Unless one or more of the larger receivers (a) has a useful
        tool to help with this problem, and (b) is willing to share
        operational experience, then we risk creating yet another
        lengthy, academic exercise (remember ADSP?). I'd suggest that
        this might be enough reason by itself not to proceed.

See the dispatch slides here <https://datatracker.ietf.org/meeting/115/materials/slides-115-dispatch-dkim-replay-problem-and-possible-solutions> for operational experience and impact for at least Gmail and Fastmail (the presenters).  See the introduction.

Thanks, but that deck appears to contain no information about operational experience or impact for either organisation, it merely describes the attack and surveys the proposed improvements to defences. Also, while Bron's role at Fastmail is clear, your own involvement with Google's receiving of email is not: are you in fact part of Google's email abuse control function?

(I do not wish to belittle you, however the difference between involvement by someone who has spent years of their life solving this problem for real at scale and involvement by an interested engineer who merely happens to work for the same organisation is immense. Most of the fruitless debate on this problem over the last 20 years has been by people who are not responsible for defending large numbers of mailboxes pursuing merely plausible theories.)


Gmail saw DKIM replay ramp up in late 2021 and early 2022 but the impact has been reduced recently perhaps due to the mitigations the industry has put in place.

Right. What I'm suggesting is that undertaking work in an IETF WG is not wise if the people implementing those mitigations are not actively involved.


That said, the problem in the specification still remains.

That's not enough reason to charter work on it in an IETF WG. There has to be some reasonable chance of the work improving the situation. Without direct involvement by practitioners at the decision-making end of message transfer, I'd suggest that this is most unlikely.


I am not aware of any tools to help with the problem, hence the request to Dispatch to do this work.

I'd suggest that that, by itself, may be enough reason *not* to proceed.


 I (and the authors of the other drafts) believe that DKIM replay can be detected via some of the characteristics that the spammers exploit (see concepts I posted earlier around Nov 11, 2022, 2:18 PM) but the current email authentication protocols don't look for that.

As the discussion is currently about whether to undertake the work I've resisted critiquing the proposals directly, but as part of establishing whether there's a "there" there, I'd point out that all but one of those things is either redundant (vs. say ARC), unacceptably harmful (we use DKIM *in the first place* to facilitate forwarding outside of the domain-registrant/sender's control), or both. The exception is a standardised mechanism to allow a sender/signer to indicate the [approximate] number of intended recipients, with which receivers might make fact-based decisions about when to recognise an instance of this particular attack, but without the active involvement of large receivers this is still academic, just as SPF -all, DomainKeys o=~, and ADSP discardable were.

Perhaps a different tack: if you're not part of Google's email abuse control function, are you able to recruit people who are?

- Roland

_______________________________________________
Ietf-dkim mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to