On 3/10/23 11:21 AM, Emanuel Schorsch wrote:
On Fri, Feb 17, 2023 at 11:11 AM Michael Thomas <m...@mtcc.com> wrote:


    I've said in multiple threads that the current problem both in the
    charter and the problem draft are far too vague for us to address.
    Here are some from me at least:

     1. Who are the victims? Just bulk senders? Are the bulk senders
        signing using their domain?

We've seen a variety of victims: bulk senders, trusted brands, EDUs etc.
Can you elaborate on the trusted brands? Are they signed using the company's domain keys? If so, is it because they've been hacked or some other mechanism?

     1. Does the To domain spammers use remain more or less static, or
        do they mutate at a high rate?

We (Gmail) saw spammers frequently duplicate the To headers so they could personalize them per recipient. RFC 5322 (duplicate header rejection) and oversigning is effective against this.

I think this should just be table stakes for rejecting mail that has this characteristic regardless of the normative language of the DKIM spec.


     1. Do receivers collect and use reputation information on mailing
        lists and other indirect flows that resign their messages?

The challenge with this is the long tail of mailing lists and indirect flows, not all of which indicate their indirectness in an obvious way.


But if you can develop reputation for the sending domain, can't you develop reputation on a resigning domain? Also: somebody pointed out a lot of bulk senders use their own domain rather the From: domain. Isn't that essentially the same problem as mailing lists?


Mike
_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to