On Mon 01/Oct/2018 11:23:15 +0200 Benoit Panizzon wrote: > > * Keep cache history from which IP an SMTP Authentication occurred.
I'm curious about this technique. Currently I block by IP and whitelist by domain, so I must be missing something in between :-) How long does that cache last? At what step do you look it up? How can you tell IP relocation from multiple domains hosted by the same IP, do you apply a fixed time lapse? Would you pass a message with a broken DKIM signature if the IP it came from usually authenticates for the same domain? DMARC specs don't seem to provide for occasional, sporadic DKIM failures, which we know do happen. There is not even a PolicyOverrideType for that... On Tue 02/Oct/2018 01:57:19 +0200 Brandon Long via mailop wrote: > > I can only speak to what Gmail prefers. I don't know how many other systems > work similarly to ours, but the logic is that if you rewrite the envelope > sender and then SPF auth that sender, you're basically attaching your domain > to the message, and you'll accrue reputation based on it. Obviously, that > is already happening to your IP, but you could imagine an IP:auth domain > reputation pair being able to separate the streams, logically. Right. It's easy if forwarded messages have a valid, possibly aligned DKIM signature. In general, there are multiple auth names for a single IP. Do they all get cached? For the author domain, the IP has to be saved even if auth methods failed to verify, in order to send DMARC reports. What about the rest? > Also, rewriting the sender opens you up to auth based privilege escalation, > the message that was forwarded now auths as the forwarding domain. ARC > helps there, though, since it allows you to see the inbound auth levels and > see where the escalation occurred. If ARC serves anything, that is it. ARC-sealing is one of the two things forwarders should do, IMHO. >> (Surprised how many weak SPF records are out there, wonder if they >> weakened it up because of SPF checks in forwarded email..) >> >> Kind of defeats the whole idea of SPF when the policy is weak. > > SPF was defeated the second it was proposed. Mail forwarding is not going > away. Because of the way SPF works, IP whitelisting is key. To honor reject-on-fail before receiving the body implies a thorough whitelisting. That is what SPF specs say. The other thing forwarders should do is to subscribe to as many white lists as they can, no? (Domains can also specify a public whitelist in their SPF record, although that might be a dubious practice.) Best Ale -- _______________________________________________ mailop mailing list mailop@mailop.org https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop