Justin Mason wrote:

> > That should not be a problem - if the message is re-signed, and the
> > resigner inserts his own Sender header field as it is supposed to do,
> > outer DK and DKIM signatures will succeed and the rule will not fire
>
> yeah -- in a perfect world, maybe ;)

How does one move a mountain? Stone by stone.


> > Checking the last 12 hours of the log, I found two false positives,
> > one was a yahoo user with a regular yahoo account, who posted
> > directly through his home ISP's mailer (not through yahoo),
> > but provided his yahoo From address. ...
>
> The former is pretty common, fwiw.

All solutions (including SPF) seem to go in the direction that
the roaming poster will need to submit his mail through the
provider/service/domain whose domain name is used in his
sending address. SASL and TLS are common now, most popular
mail readers support it, and most MTAs. People will need
to adjust, to avoid their mail being treated as second-class.
Until then, giving such second-class mail small number of
positive score points is not too bad - well intended mail still
passes with no trouble.

> >   # give some incentive for people to start signing their mail:
> >   score DKIM_VERIFIED -1.5
> >   score DK_VERIFIED   -1.0
> > SpamAssassin has some merit and influence on the population,
> > so it may just as well be setting some trends.
> > If spamers start signing their mail, so much the better.
>
> I'd prefer not to do this without some kind of DKIM reputation service up
> and running, so that we don't give bonuses to spammers who sign their
> mails.  In our experience, spammers will quickly exploit any SpamAssassin
> bonuses available, and this would be pretty easy.

Give a little - gain a lot!  If they start signing their mail with
a valid signature corresponding to a sending domain, that is perfect:
they get 1.5 points of a bonus, we get the assurance that whoever
placed a domain name in From header field actually owns (or ownz)
that domain.

So how can a spammer validly sign a message:

- by owning a legitimate permanent domain, such as genuine commercial
  bulk mailers do, not trying to hide it - good, they get 1.5 bonus points,
  we may blacklist them if we want;

- by using a public mail service such as Yahoo - good, they get 1.5
  bonus points, there may be increased interest of spammers on legitimate
  Yahoo accounts, Yahoo gets more pressure from other legitimate users
  since its reputation is at stake, they take action to minimize
  misuse of their accounts - we all win (except for spammers);

- by stealing a private key from legitimate domain - not likely,
  and easy to fix by switching to a new key;

- by using throw-away domains, like being discussed on this ML not
  that long ago. Countermeasures are already being build, RBL lists
  of few-days old domains. And registrats may get bored with the scheme
  and actually do something about it.

- by using zombies sending through legitimate company's mailer
  with a legitimate sender address of that company - the company's
  reputation is at stake, and if it goes on for a long time, we may
  add few positive score points for such domains (RBL) or just
  blacklist them.

Is there another way? For now I'd stick with "Give a little - gain a lot!"

  Mark

Reply via email to