On Nov 21, 2006, at 7:49 PM, Hector Santos wrote:

Douglas Otis wrote:

It remains conjecture an authorization scheme provides a measurable reduction in the success rate. As bad actor are able to authorize their own messages in various forms, an authorization scheme may increase the success rate of phishing attempts. Recipients are not protected by such a highly flawed scheme.

I don't understand why you make it so difficult.

If I say "all may mail is signed" and that expectation is defined based on a standard SSP protocol established, then a RECEIVER and the original DOMAIN owner should be as happy as a pig in mud when fraudulent MAIL is arriving without signatures.

This presumes bad actors are blocked by an easily defeated scheme. Guidance offered by SPF suggests the numbers blocked is less than 3%. In addition, blocking is not as black and white as you suggest. What happens when someone sends a message to a mailing list?

Bad actors easily create messages that appear official and blessed by their authorization record. The recipient is still in the muck sorting through fraud while attempting to uncover a bad actor's many tricks. With EAI, there are now two email-address published per From entity. Which email-addresses is checked? What part of the email- address is displayed, if any? An authorization scheme alone benefits bad actors.

The first thing that we will be getting rid of is the legacy malicious exploiters of domains who are not going to following anything or would care for anyway.

Are you talking about including policies for the Mail From as well?

But sure, bad actors can participate in the DKIM/SSP process and in my view, that is great if we can get them to ADAPT in a positive way - our way.

The recipient is still lost attempting to decide which messages are valid. Look-alike and cousin domain ploys are not defeated. Without evidence there is any value validating the DKIM signature, it should not be done. Here domain association techniques can play a greater role than would any authorization scheme. If there is any authorization scheme added, it would be practical in only a very small portion of domains sending messages. Hardly worth the overhead.

That is where the additional layers come into play, such as REPUTATION if that is what the receiver wants to use to further give credence to a DKIM-ready message.

Without a means to prevent positive reputations (white-listing) from being abused, positive reputation use is highly prone. Anti-replay protections require some means to associate DKIM signing with the SMTP client. SPF does not offer a safe method for this association. As the envelope is not included within the DKIM signature, unsolicited messages can not accrue against the signing domain. It would be a bad outcome when messages are rejected because envelopes do not match message headers.

The goal is to eliminate the obvious and that obvious comes in detecting the invalid conditions and if a DOMAIN exposes a policy implying invalid conditions were not expected, then all the receiver needs to junk or do something with that message and the receiver and original domain would be protected. We don't need an MUA to get an involved.

In an ideal world, perhaps. Limiting this effort to only authorization is the wrong choice. While the MTA might be able to block 2.5% of non-compliant messages, the success rate of phishing will hit a new high, and the integrity of email delivery will hit a new low. DKIM requires the MUA to annotate messages. The DKIM signature is not visible _by design_. There is no assurance what the recipient sees in a non-DKIM aware MUA. This must change, and efforts must focus upon message annotations. Once the recipient has an MUA that compares signed messages against their address-book, there is _absolutely_ no need for an authorization scheme, the sizable overhead, and the many delivery problems with incumbent support calls.

Why not allow the MUA to safely apply annotations based upon a recipient's out-of-band knowledge of the sender. What annotations can be applied based upon an email-address domain authorizing their own messages? None. When authorization is the only goal, then practical, safe, and reasonable has been completely missed.

-Doug

_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to