On 2/10/23 1:48 PM, Wei Chuang wrote:


On Fri, Feb 10, 2023 at 1:29 PM Michael Thomas <m...@mtcc.com> wrote:


    On 2/10/23 10:23 AM, Wei Chuang wrote:
    Hi all,
    I've posted an updated version of the
    draft-chuang-dkim-replay-problem-01
    <https://datatracker.ietf.org/doc/draft-chuang-dkim-replay-problem/01/>
    draft.  It cleans up a lot from the -00 rough draft state so
    hopefully it's more clear.  It builds a case that spammers are
    exploiting DKIM through replay, identifies conflicting scenarios,
    and outlines a solution space.


    | taking advantage of the flexibility in DKIM to
    | selectively sign headers, the spammer may intentionally leave out
    | certain headers such as To:, and Subject: that can be added in later
    | without damaging the existing DKIM signature.

    I think this needs to be explained. It isn't obvious to me how
    they would manage to do that. The header fields signed are under
    control of the signer, not the original author. How do the
    attackers coax the provider's signer into not signing certain fields?

By leaving them out.  Many DKIM signers, having observed this vulnerability, have started oversigning headers to prevent that.

I think the draft should flesh this out a bit more. I mean, are they just doing a bcc without a To: address? Are there other mechanisms? Is that suspicious or is it a legit behavior? I don't think I've seen a message without a To: address (or at least a legit one).

(again, this will be important to inform possible BCP things, and in the case of To: and Subject: to possibly making them required to be signed in a protocol change. certainly that might be an interesting discussion)

Mike
_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to