On Fri, 5 May 2017 17:45:37 +0000
David Jones wrote:

> From: RW <rwmailli...@googlemail.com>
>     
> >On Fri, 5 May 2017 14:51:32 +0000
> >David Jones wrote:  
> 
> >> >I know. I do not want to validate the envelope from with DKIM. I
> >> >just want to know if the mail was DKIM-VALID signed by the DOMAIN
> >> >used in the envelopefrom.    
> >>   
> >> >So the only thing I want with the envelop from is to extract the
> >> >domain and test if the mail was DKIM signed (and valid) by that
> >> >domain.    
> >>   
> >> >This tells me the envelope from is not some random spoofed
> >> >address, but actually controlled by someone who handled the
> >> >e-mail before it arrived at our mta.    
> >> 
> >> This actually would be a very useful rule/logic to add to SA:
> >>  
> >> https://blog.returnpath.com/why-passing-and-aligning-both-spf-and-dkim-is-key-to-email-deliverability/
> >>   
> 
> >So what would be the point in running a separate DKIM test against
> >the envelope if you are looking for alignment.  
> 
> I don't think this would be a separate DKIM test necessarily.  It
> should be a combination of SPF_PASS + DKIM_VALID_AU + the
> envelope-from matches the DKIM-signed domain.  This is basically
> perfect DMARC alignment where the domain has "p=reject" and DMARC
> would pass meaning the domain was not spoofed.
> 
> >> When both align, it should be a very good candidate for
> >> whitelist_auth based on the sender domain reputation.  
> 
> >If it passes DKIM and the domain has a good reputation then what
> >difference would alignment make.  
> 
> Proper security in any context checks both authorization and
> authentication. This is SPF and DKIM respectively in the email
> filtering context.  Spammers can get control of a compromised account
> and send a valid DKIM-signed email through that email server that
> would pass SPF with an envelope-from of example.com and DKIM
> signature of example.net (or some domain they had DNS control of like
> paypa1.com).  If it passed DKIM_VALID_AU then the visible From:
> address in the recipient's mail client would show example.net or
> paypa1.com.
> 
> Would I trust example.com or example.net in the above scenario?  Which
> would be added to whitelist_auth?  The authorized email was from
> example.com but the authenticated email was from example.net.  The
> DMARC standard says that either SPF or DKIM has to pass for a DMARC
> pass based on that link above.  The point of that link is to align
> both for best delivery results.
> 
> I am just saying that it would be nice if SA had a rule that hit when
> both matched which is perfect DMARC alignment.  Today I am able to
> get close to this using OpenDMARC to add headers then with custom
> rules to add DMARC_NONE, DMARC_PASS, or DMARC_FAIL.  I think I would
> have to write a simple SA plugin to compare the envelope-from with
> the DKIM signature domain to see if they matched then I could use a
> meta rule to glue all of this together.
> 
> Dave

Reply via email to