On Tue, Jul 13, 2021 at 06:32:17PM -0400, Viktor Dukhovni 
<postfix-us...@dukhovni.org> wrote:

> Valid DKIM signatures can make it easier to apply greater scrutiny to
> messages that lack a positive reputation, without incurring an excessive
> false positive rate.  But you still need some real evidence that a
> message is likely junk before it is rejected.  Mere DKIM "failure" isn't
> such evidence.
> 
> -- 
>     Viktor.

And mere DKIM "success" on its own isn't much evidence
of anything either. The other day, I received a
surprisingly competent phishing email. All of the
sender/reply addresses in the email itself were
no-re...@amazon.ca but the DKIM header had:

  d=rks-cryptomining.com

I assume it was validly signed with
rks-cryptomining.com's key. But that has nothing to do
with the sender email address as seen by the recipient.
Not very reassuring.

DMARC is supposed to solve that by requiring that the
DKIM domain actually matches the sender email address
domain. Neither DKIM nor SPF actually do that on their
own. DKIM is only concerned with the DKIM domain (I
think), and SPF is only concerned with the envelope
sender domain. Neither say anything about the From:
header which the recipient sees. Even if they did, many
recipients probably only see the comment in the From:
header, not the address itself. I don't know if DMARC
tries to help with that.

Note: I might be wrong about some of the above (haven't
read the RFCs yet!) but it's what I've read elsewhere.
Corrections are always welcome.

I'm beginning to think that DKIM headers might be
getting added just to improve spam detection scores.
Perhaps I'm getting too cynical. :-)

amazon.ca's DMARC policy only asks for a report when
both DKIM and SPF fail. So maybe they wouldn't even get
a report for such emails (not sure, I have to read the
RFC). I strongly expect that it would constitute a
DMARC+DKIM failure, even if it's a DKIM success.

cheers,
raf

Reply via email to