> On 12 Feb 2023, at 20:48, Wei Chuang <weihaw=40google....@dmarc.ietf.org> 
> wrote:
> 
> 
> 
> On Sun, Feb 12, 2023 at 12:16 PM Dave Crocker <d...@dcrocker.net 
> <mailto:d...@dcrocker.net>> wrote:
> Folks,
> 
> There appears to be no perfect way to distinguish a Replay attack from a 
> legitimate re-posting by an Alias or even a Mailing list (that preserves 
> the original DKIM signature.)
> 
> The only 'signal' that is valid, also is ambiguous.  The signal is that 
> the rfc5321.Mail command has an address that is not in any of the 
> rfc5322 address fields.   The ambiguity, of course, is that that's also 
> true for Alias.
> 
> I'm wondering about designing some assistance by the author's platform 
> and the Aliasing platform, to flag what they've done.
> 
> Imagine adding a header field like "Separate-Envelope:", possibly 
> listing the domain name of the site putting the flag there, and having 
> them add a DKIM signature to cover it and the rest of the message.
> 
> This could also be done by a spammer doing Replay, of course. But the 
> point is that this added mechanism now creates a noise-free basis for 
> evaluating this class of traffic associated with that signed domain.
> 
> Agreed that reputation systems can play a role when the spammer decides to 
> participate. 

One thing I’ve been telling folks is that a DKIM d= isn’t a reputation. The d= 
is a strong identity. That identity can be used to hang a reputation on - where 
the reputation is based on all the mail containing that identity. 

I think it might be helpful if we shifted the discussion from DKIM is a 
reputation to DKIM is an identity. That reframes the question as:

How do we improve the DKIM protocol so that we can minimize the ability of an 
unauthorized 3rd party to misappropriate the identity of the signer?

laura 



> 
> It's not that the receiving filter could not detect the disparity 
> between envelope and content addresses. It's that the receiver is 
> getting a flag from whomever did it.
> 
> If, for example, the domain name is of the originating service, then 
> it's clearly not Replay.
> 
> If it is from an Aliasing site, the receiver can quickly build up a 
> reputation for that site, to aid in determining replay or not.
> 
> Thoughts?
> 
> In this model, let's consider the Receiver's actions.  
> 1. Say the spammer doesn't want to participate in creating a 
> Separate-Envelope, how would a receiver detect this as Replay?  Is the idea 
> that Separate-Envelope identifies the Alias or Mailing-lIst?  Is the 
> verification process that the Receiver notices that the header is missing?
> 2. You've noted what happens when the spammer participates in generating 
> Separate-Envelope
> 3. A non-spammer should have a Separate-Envelope, which will validate.
>  
> FWIW a different approach but overlaps this idea is that a sender identifies 
> the domain they intend to send to.  The receiving system verifies that they 
> are the intended recipient domain.  I think John Levine has a draft about 
> this.  I have a draft that expands some of that idea further.
> 
> -Wei
>  
> 
> d/
> 
> -- 
> Dave Crocker
> Brandenburg InternetWorking
> bbiw.net <http://bbiw.net/>
> mast:@dcrocker@mastodon.social
> 
> _______________________________________________
> Ietf-dkim mailing list
> Ietf-dkim@ietf.org <mailto:Ietf-dkim@ietf.org>
> https://www.ietf.org/mailman/listinfo/ietf-dkim 
> <https://www.ietf.org/mailman/listinfo/ietf-dkim>
> _______________________________________________
> Ietf-dkim mailing list
> Ietf-dkim@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf-dkim

-- 
The Delivery Experts

Laura Atkins
Word to the Wise
la...@wordtothewise.com         

Email Delivery Blog: http://wordtothewise.com/blog      






_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to