On Mon, Aug 7, 2023, at 10:24 PM, Murray S. Kucherawy wrote:
> On Mon, Aug 7, 2023 at 7:43 PM Jesse Thompson <[email protected]> wrote:
>> __
>> Similar to what Emmanuel is saying about detecting SPF/DKIM zone 
>> misalignment, the solution to DKIM replay is for receivers to maintain some 
>> state and feed it into bespoke replay detection algorithms. If all receivers 
>> can maintain this kind of state, then there's nothing senders need to do, I 
>> suppose? Given that *normally* all of the messages we emit have unique 
>> message-ids, receivers can just limit the amount of duplicative message-ids 
>> they accept from us. Assuming they know the situations in which message-ids 
>> would not be unique. That's another thing that maybe needs to be 
>> communicated somehow as "this is normal in this situation".
> 
> Isn't this a derivative of the "Count DKIM signatures" approach identified in 
> the current problem statement document?  If so, do you have any comments on 
> the points against such an approach?

Yes, it is derivative. But I don't see why the solution needs to describe 
exactly how a receiver must fingerprint a mail stream. Presumably they 
can/will/do use all of the available information to get the most fidelity. 

The larger issue is how senders communicate to receivers how to correctly 
interpret the different signals. Receivers can choose whether to trust what the 
sender is communicating, and incorporate into their disposition.

Chained DKIM would use a domain as the key for receivers to index and look up 
this information, without having to invent a new header to be signed (which 
would then involve another internal policy lookup to see if they trust the 
signing domain, so why not just use the signing domain as the key).

DNSxL is a proven workable lookup mechanism, is it not?


> Since you specifically mention Message-IDs, does anyone have data on how 
> often that header field is included in signatures?  If it's not, then 
> rotating Message-IDs at random defeats such an approach and drives up the 
> receiver's operational cost to boot.

Can't speak for everyone. All I can say is that we sign message-ids and we use 
message-ids as the username part of the return path to ensure message-level 
attribution of such events. Our interest is to maximize visibility on bounces 
and other kinds of feedback to ensure customers adhere to deliverability best 
practices.

Jesse
_______________________________________________
Ietf-dkim mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to