On Fri, Feb 10, 2023 at 2:31 PM Michael Thomas <m...@mtcc.com> wrote:

> On 2/10/23 2:10 PM, Evan Burke wrote:
>
> The M3AAWG BCP will cover recommended header signing/oversigning policies.
> I'll make sure that's shared here when it's published.
>
> Any idea when that might drop?
>

I'll roughly summarize the guidance here for now. The primary audience for
these recommendations is senders/signers with high volume shared signing
domains; these domains are prime targets for replay because of their good
reputation. Other approaches exist, but these are the ones that can
generally be implemented relatively quickly.

- Screen new accounts based on industry standard methods
- Scan outbound mail for spam-like content, and restrict or block sending
based on results. Pay closer attention to new accounts, or accounts that
are otherwise high-risk.
- Monitor for signs of replay via abuse reports and third party tools
- Oversign Date and Subject headers
- Set signature expiration via x=, with expiration on the order of 30
minutes to a few days, depending on details of your signing processes
- After implementing oversigning and signature expiration, rotate keys
- Consider signing mail from new or higher risk accounts differently -
perhaps using a shorter signature expiration or different signing domain

Implied here is that Date and Subject are signed in the first place, which
in practice is almost always the case. In a small (n=35) survey of my own
personal mail last year, 97% of sending platforms signed Subject, and 89%
signed Date.

Top two most effective techniques here, in terms of minimizing long-term
viability of replay, are 1) signature expiration, and 2) shorter expiration
for higher-risk accounts.
_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to