Folks,

There appears to be no perfect way to distinguish a Replay attack from a legitimate re-posting by an Alias or even a Mailing list (that preserves the original DKIM signature.)

The only 'signal' that is valid, also is ambiguous.  The signal is that the rfc5321.Mail command has an address that is not in any of the rfc5322 address fields.   The ambiguity, of course, is that that's also true for Alias.

I'm wondering about designing some assistance by the author's platform and the Aliasing platform, to flag what they've done.

Imagine adding a header field like "Separate-Envelope:", possibly listing the domain name of the site putting the flag there, and having them add a DKIM signature to cover it and the rest of the message.

This could also be done by a spammer doing Replay, of course. But the point is that this added mechanism now creates a noise-free basis for evaluating this class of traffic associated with that signed domain.

It's not that the receiving filter could not detect the disparity between envelope and content addresses. It's that the receiver is getting a flag from whomever did it.

If, for example, the domain name is of the originating service, then it's clearly not Replay.

If it is from an Aliasing site, the receiver can quickly build up a reputation for that site, to aid in determining replay or not.

Thoughts?

d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
mast:@dcrocker@mastodon.social

_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to