On Thu, 12 Nov 2020 12:34:25 +0100
Matus UHLAR - fantomas wrote:

> >On Wed, 11 Nov 2020 17:01:21 +0100
> >  
> >> On 11.11.20 15:41, RW wrote:  

> On 11.11.20 19:06, RW wrote:
> >These two cases share the same "authenticated" primary reputation:
> >
> >  Return-path: c...@example.com
> >  From: c...@example.com
> >
> >  Return-path: some...@somewhereelse.com
> >  From: c...@example.com
> >
> >The benefit of this could be substantial, particularly with
> >txrep_learn_bonus set. All you have to do is make sure the envelope
> >sender passes SPF.
> >
> >To be honest I haven't verified this, but the code looks
> >straightforward. $signedby gets set to the tag DKIMDOMAIN or falls
> >back to the fixed string 'spf' for an  SPF pass.  
> 
> sorry, I'm not into txrep much for now.
> 
> Does it mean, that txrep correctly compares Return-Path (or any
> header that is filled by envelope from), but incorrectly adds bonus
> to address in From: header?

When there's a valid DKIM signature TxRep identifies the main reputation
with a combination of "header from" and the signing domain. It doesn't
require DMARC style alignment, but that's not easily exploitable because
signing with a different domain creates a new reputation.

With SPF a pass is simply treated as having authenticated the "header
from" regardless of the "envelope from" that was used in SPF. This
allows an existing good reputation to be exploited easily - even
accidentally. 

An improvement would be to handle SPF like DKIM, using the envelope
domain like a signing domain. 




Reply via email to