On 1/5/2023 11:03 AM, Wei Chuang wrote:


    1. The motivation for the current effort has been exploitation of
    re-posting to exploit a DKIM reputation.

    2. Are there any other kinds of replay scenarios that are an issue
    now?
    I suspect there aren't.


While not exactly ARC replay, we've seen recently that spammers are exploring munging the ARC headers.  One campaign had them swapping a complete ARC header set into another message.  In another they added an incomplete set.  Consequently we're worried about the spammers exploiting ARC vulnerabilities.

There are some possibilities this suggests.

1. We could seek to explore and counter-act all (or a wide range) of replay scenarios, independent of their type or actual presence.  That is, both replays that are present in the wild and replays that are merely deemed possible, no matter how or why they do or might occur.

2. We could focus only on the know replay efforts so far, independent of type or degree of threat.

3. We could focus only on known, significant replay efforts.

4. and so on...

Of these, only 4 ensures focused, pragmatic efforts, where there is actual pressure to find a remedy sooner rather than later.

The others seem more like research topics.

d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
mast:@[email protected]
_______________________________________________
Ietf-dkim mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to