On Wed, Feb 15, 2023 at 2:21 PM Michael Thomas <m...@mtcc.com> wrote:

>
> There's also the question of whether "x=" is properly enforced.  RFC 6376
> says verifiers "MAY" choose to enforce it.  I think I asked about this at a
> conference recently and was told that it's not universally supported by
> implementations.
>
> Others have said that the enforcement is pretty good. But I have no way to
> evaluate if that's true.
>

I don't think we're saying different things.  I remember the point of the
answer I got in that session being that most, but not all, implementations
check or enforce signature expiration.  But that means if "x=" is the
solution we land on, we have to accept that a possibly-significant part of
the ecosystem won't be able to use that solution.

Then again, anything new we roll out is going to take a while to become
universal anyway.

> Going the route of some kind of duplicate signature detection alleviates
> the risk of that approach, but also sort of inverts it: If you assume each
> signature will only appear once, there's a window during which the first
> signature works, and then a second window during which duplicates will be
> blocked, but then that process recycles when the cache expires.  That could
> mean replays work if I just out-wait your cache.  You also introduce the
> risk of false positives, where a legitimate message tries to arrive in
> separate envelopes with the same signature, and all but the first one get
> blocked.
>
> I would imagine that the cache should be valid for a small x= expiry.
> That's really a tuning problem on the sending domain.
>
Possibly.  I get the impression that a good chunk of the industry would
like something more from us than "you have to tune this" (i.e., something
laying out specific values), but maybe we can't do anything beyond general
advice because there are too many other variables at play.  RFC 6647
avoided laying out specific values for greylisting, for example.

> There are *tons* of external dependencies on the filtering MTA. I really
> can't imagine that this would be the straw that breaks the camel's back.
>

Depends (as I think Scott said) on the size and resources available to the
operator, and how much they're a target of this attack.  We've generally
shied away in the past from solutions of the form "you have to be at least
this tall to play".

-MSK
_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to