On 3/22/23 4:00 PM, Emanuel Schorsch wrote:


On Wed, Mar 22, 2023 at 11:29 AM Murray S. Kucherawy <superu...@gmail.com> wrote:

    On Sun, Mar 19, 2023 at 11:04 PM Emanuel Schorsch
    <emschorsch=40google....@dmarc.ietf.org> wrote:

        In my mind, there are two important things I would like to see
        achieved:

        1) Distinguish indirect from direct flows (encode in some way
        which server / mailingList the original DKIM message was
        intended to come from). This is needed for domains that aren't
        easily identifiable as direct flows (SPF isn't aligned by DKIM
        in the direct case).


    Wasn't ARC meant to solve this?  What have the results been?


ARC has the same challenge that DKIM has when it comes to replay. How do I know if this is direct mail or indirect mail? Which set of IPs should I expect the direct mail to be sent from? ARC allows forwarders to record/preserve authentication status but the same valid ARC headers can be sent millions of times from all kinds of different servers.

Note that DKIM has been able to sign auth-res from the very beginning. Which is why ARC getting inserted into discussions like this is both frustrating and just muddies the waters.



        2) Give more info to identify benign indirect flows (E.g.
        "forwarded on behalf of"). This is helpful for recognizing a
        recipient's desired indirect flows.


    I'm pretty sure this is easily spoofed.  So is any sort of tagging
    or header field manipulation mechanism.  The spammer just needs to
    make its mail look sufficiently like something you consider
    legitimate, and they're in.

That is why it would be nice to see a solution less trivially spoofable than existing forwarding headers (e.g. X-Forwarded-For). If, for example, forwarded-for is recorded in the ARC header, then you can restrict yourself to trusting a specific pair of "forwarded-for" and ARC sealer, which is much more trustworthy than the header alone.

But, even an easily spoofable header is still useful. Easily spoofable means that it doesn't provide much protection against phishing, but it does make it substantially harder to scale for spam. Most people will have a limited set of sources which they receive indirect mail for, and those will vary widely between people. So if spammers, for the Forwarded-For header, need to get the right value per recipient it makes automating to a huge scale much more difficult.

But the spammer can also resign a message to make it look like an indirect flow along with whatever headers you insert. In the end this all boils down to how much you trust the domain sending you the message. For the domain the spammer controls, you'd hope they have a neutral to bad reputation. For legit mailing list providers, you'd hope they would get a positive reputation over time. None of this has anything to do with the problem that ARC purports to solve.

Mike
_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to