On Sep 19, 2006, at 3:00 PM, Frank Ellermann wrote:

RFC4408 enables various DDoS and DNS poisoning attacks as previously described.

That's about as relevevant as the mail arriving with 25 DKIM signatures (one valid), after you got a million you'd figure out how to disable DKIM verification temporarily.

With DKIM, it should be normal to limit transactions per signing domain. This would be especially true when done in conjunction with annotations. With RFC4406-8, validating a set of identities may not provide any attack indication. A victim domain may not be related to the recipient or even the identity being validated or seen in any log. The associated amplification potential can involve any number of identities. This gets more extreme when receivers decide RFC4408 can also include a DKIM scope. Even now, the potential for this problem dwarfs amplifications available with open recursive reflected attacks done in conjunction with EDNS0, and this also defeats normal precautions found with BCP38!

based upon just the "fail" as commonly required to avoid delivery issues, less than 3% of spam is blocked.

Not too shabby. The idea is to get this to almost 0%, because no bad actor tries it anymore.

There are still a number of "pass" results as well? For example, Bell Canada records ends with "+all". It seems that when no spam is blocked by SPF, while also placing DNS in extreme peril, the reason for employing this mechanism has been greatly diminished. A DKIM/ Mail-From policy association should provide the desired DSN protections without imposing these risks. This is one reason why DKIM policy should consider records for the 2821.Mail_From and perhaps even 2821.EHLO to remove any need for RFC4408. Name paths are far safer than IP address path definitions. Heck, the PRA could still be used for that matter.

You probably also get a few "pass", for those you don't need to worry about DSNs, they're desired. The 90% in between are not worse as before. And as others said, any scheme is futile if receivers don't like it, they must get something for their effort. It's sad that DKIM and SSP don't fit into the SIQ concept (or rather I don't see how), that could be a killer application.

Safe MUA annotation of retained email-addresses preventing even look- alike spoofing and safe DSN protections seems to be a possible answer.

violating proprietary algorithms

That was the other beast, SID and 2822. For the PRA part I'd still say that 2822 is prior art. Given a 2822 header minus Return-Path it's "obvious": Noting that in RFC 4407 was an excellent idea, but it's neither proprietary nor experimental. Unless ignoring the Return-Path is the "experiment"... :-)

By adding a parameter such as m=<any-email-address> to DKIM, there would never be a need to employ priority algorithms, as the signature could always make this selection explicit.

-Doug


_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to