On May 27, 2007, at 1:01 PM, SM wrote:

We don't know through which forwarders the mail will go through before reaching its final destination. This message, for example, could have gone through a forwarder to reach my mailbox.

As with any path registration scheme, paths must be known beforehand. The DOSP scheme scales to accommodate _any_ number of paths.

Administrators could ask users to volunteer this information, or administrators could establish a forwarding service as a last leg of forwarded messages. Those wanting this accommodation could be prone to a more spam when their account discovered, but the risk would only affect these users.

The scheme proposed by DOSP could be revised to exclude the left- most domain label in the hash to establish a type of shorthand. To limit which hosts associate as an SMTP client, SMTP clients must then be assigned a specific sub-domain.

For those domains where some hosts are not trusted, SMTP clients would be placed within a sub-domain, for example 'mxo'.

 host1.mxo.large-isp.com
 host2.mxo.large-isp.com

How does that prevent replay abuse? If some hosts are not trusted, mail from them should not be DKIM-signed.

The concern is regarding replay abuse where messages are signed by trusted SMTP clients. The recipients of these signed messages can not determine which SMTP clients the signer considers authorized (unless SPF were used).

Can you provide a specific example where DKIM signed mail from [EMAIL PROTECTED] to me is protected from abuse?

This domain currently does not use DKIM, but assume that it did. Their DOSP records would indicate their authorized SMTP clients for originating SMTP MAIL FROM, and DKIM signatures. These records could be checked for messages not specifically addressed the SMTP RCPT TO.

A message that is BCC to you can still be confirmed as authorized when received from an DOSP SMTP client. Unless bad-actors have specific knowledge of provisions accommodating forwarded messages, or access to the authorized SMTP clients, they would have no ability to avoid mitigations in place preventing abusive replay.

The concept is rather simple. The bad-actor is a normal user of mail- abuse.org and sends themselves messages to other accounts. Mail- abuse.org rate limits accounts and promptly disables accounts reported and confirmed as abusive.

When DKIM serves as a basis for acceptance, without replay abuse mitigation, the bad-actor is still able to continue sending these messages to anyone and everyone until signatures expire. They may have hundreds of such messages. If mail-abuse.org grants public access to their service, the bad-actor could re-enroll and continue this behavior non-stop. Replay abuse mitigation will become essential and prove disruptive to a large category of legitimate email use scenarios. The DKIM WG should consider specific mitigation strategies that can apply for these legitimate use scenarios or insist that DKIM must never be used as a basis for acceptance.

DKIM will still reduce false-positive detection of phishing attempts. Such filtering is not limited to specific email-addresses where reducing false positives is highly desirable. This use tends to limit the scenarios suitable for DKIM. It seems many desire that the DKIM domain be used as a basis for reputation, and there lies the problem.

-Doug
_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to