On Sat 19/Apr/2025 18:51:38 +0200 Allen Robinson wrote:
On Sat, Apr 19, 2025, 9:02 a.m. Alessandro Vesely <[email protected]> wrote:
[...]
* I base64 decoded this MIME part.
* I inserted bytes N-M
* I trimmed the text "foobar" starting at byte N
* I base64 encoded the MIME part


I would prefer to use a class of "good" transformations, such as the subject, footer, mimeify, add-part and mime-wrap of draft-kucherawy-dkim-transform, and one "complex" transformation to be defined on a byte-by-byte basis.


[...]
If verifiers can't judge how acceptable a change is, change tracking will be relegated to forensic analysis. That means we won't be able to distinguish mailing lists from spammers and replayers, and we won't have solved anything.

I disagree, or maybe I'm working with a different idea of what forensic analysis means. Doing content filtering at SMTP transaction time based on the results of authentication checks is certainly possible without the authentication mechanism being able to decide whether the content is malicious or not.


"Malicious" is a misnomer here. The characteristic of the "good" transformations above is that they are attributable to a typical mailing list transformation; that is, non-invasive and respectful of the original content. If the verifier can determine this, it can override dmarc=fail.

If the transformation is a complete replacement of the body, a dmarc=fail deserves to be rejected, according to policy.


For a DKIM2 message with modifications, evaluating the delivered message is probably sufficient as a first pass, potentially with some metadata about the modifications (location, edit distance). In the event that the first pass has some suspicion of being unacceptable, unwinding the modifications and doing further checks may be necessary to apply checks based on finer-grained reputation.

What's being solved is not that changes can be classified, but that changes can be verifiably attributed to the domain performing them.


In practice, what should I do in such a scenario when I receive a message From: [email protected] whose author domain signature is not verified because the message has been modified, considering that google.com has p=reject?

1) I accept because I trust the verified signature of ietf.org,

2) I undo the changes made by ietf.org, check that the original signature then verifies and pass the message because I trust that the changes made by ietf.org are acceptable, or

3) as in (2) but, instead of trusting, I implement an AI visual engine to determine whether the final appearance is still consistent with the original message.

IMHO, (1) and (2) are not that different, since they both require trusting the forwarder. This can already be done with DKIM1 or ARC, and experience shows that ietf.org needs to munge From:.

As for (3), I don't know how to find the right software, and even if I did, my oldish server wouldn't be powerful enough to run it. So, in any case, ietf.org would continue to modify From:.


Best
Ale
--







_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to