Let me clarify it. 

From a deterministic protocol standpoint,  depending only on base signing 
analysis has no payoff, i.e. no filtering is legitimately possible with high 
confidence and zero/low false positive.  

What is left is non-deterministic, heuristic, classification Bayesian scoring,  
learning,  "fuzzy, neural net, expert system" and similar AI-like logic 
methods, including SA like methods.  Sure, you can learn from weighting 
indeterminate results.  But it's not deterministic, not 1 nor 0, but in 
between. Not yes/no, but maybe. 

I agree this method were always possible, and expected it in order to deal with 
these unknowns "in-between" results, the ones that result from relaxed or no 
policies.  The only real issue with this method is that it's not shareable.  It 
could not be a network persistent and consistent protocol method unless there 
was a centralized repository concept/service everyone can check with similar 
results.  If a site depends on such a method, then the sites that do no sign up 
for this central reputation lookup service will become targets.   It has long 
been shown that bad guys do target "weaker" sites especially when it's well 
known a common reputation method doesn't exist in practice for everyone to use. 
 The DNS-based author domain defined policy is the only common approach we have 
now. 

--
Hector Santos
http://www.santronics.com

> On Jun 19, 2014, at 2:45 PM, "Murray S. Kucherawy" <superu...@gmail.com> 
> wrote:
> 
>> On Thu, Jun 19, 2014 at 11:15 AM, Hector Santos <hsan...@isdg.net> wrote:
>> While DKIM-BASE tried to clean up this separation of the author domain 
>> policy, it could not because of all the past existing ADSP or SSP references 
>> in the many DKIM related RFCs, see RFC6376, section 1.1.   But conceptually, 
>> it didn't matter what you called it.  It was an author domain signing policy 
>> protocol and today, it's called DMARC.   DKIM has no payoff with just base 
>> signing analysis . It was separated but with all the intentions of sticking 
>> secondary author policy and signer trust layers on it before a payoff was 
>> realized.
> 
> There are reputation systems -- I built one, and I know others exist -- that 
> use DKIM as the identifier on which reputation is built, and they've been 
> effective in experimental environments at identifying what's good and what's 
> outside of "good".
> 
> The difference here is between active and passive determination of what's 
> good and what's not good.  If you want active, I agree that DKIM by itself 
> isn't enough.  But I disagree, with evidence, that DKIM "has no payoff with 
> just base signing analysis".
> 
> If that's not convincing enough, consider that IP reputation has been largely 
> successful, and the input to such systems is a verified identifier, which is 
> the same class of output DKIM provides.
> 
> -MSK
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to