On 2/10/23 9:23 PM, Murray S. Kucherawy wrote:
On Fri, Feb 10, 2023 at 8:09 PM Michael Thomas <m...@mtcc.com> wrote:

    I've always thought that the likelihood of a protocol level
    solution for
    this issue is pretty close to zero if not zero. The various proposed
    solutions in the problem draft haven't given me any reason to
    dissuade
    me of that notion.

    That said, I think that we might be able to catalog some clues that
    something is suspicious which taken with many other clues can be
    used to
    by a receiver to make an ultimate decision of spamminess. A good
    example
    is the unsigned To: and Subject: lines. Even if it's strictly
    allowed by
    the spec, that doesn't mean it's not suspect. It could be really
    useful
    to collect this clues as input signals to a larger preponderance of
    evidence.


Authentication-Results already noted the idea that a signature, even a valid one, might still be considered not acceptable to the verifier and reported differently for one reason or another.  An unsigned Subject was the classic example.

Dealing with this in A-R nicely removes it from being dealt with at the protocol level, where I would argue this sort of logic doesn't belong.

It's never been especially clear to me whether deployments do their filtering up front, ie at the MX, or farther down the line. There are certainly advantages to do it right at the MX with less burden on using AR to signal all of what the filters consider the interesting bits that standard A-R might not support. But there may be good architectural reasons to postpone the filtering to later in the pipeline even if means that you're holding the spam longer before discarding it.

But regardless of A-R just cataloging what those interesting bits might be could be useful in documenting how they can be used to detect replay spam. Also: I think there is more to it than whether the signature verifies, per say. The signature actually verifies, but it's the scrutiny that matters. Saying it doesn't verify essentially decouples from any reputation of the domain. But that is hardly the only way to look at it. Saying it verifies, but has problems is another way to view it. For wetware investigators an A-R that did that could be really confusing.

Mike
_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to