For the replay resistance part of the question, I think it would make sense to 
wait and see how the DKIM working group addresses the problem for DKIM 
generally and then assess how their solution impacts ARC and how it addresses 
the issue for ARC.

I think the question of spamminess is orthogonal to the authentication 
questions that ARC attempts to answer.  It's subjective, so I don't think it 
can really play into ARC.

Additionally, if the intermediary thinks a message is bad (spam), then the 
solution is to not send the message onward and try to make it someone else's 
problem.

Scott K

On March 14, 2023 2:49:30 PM UTC, Wei Chuang 
<weihaw=40google....@dmarc.ietf.org> wrote:
>Hi all,
>We've been making use of ARC to help with forwarded mail.  One thing we've
>noticed is differences for when some forwarders generate the ARC headers.
>Another concern is that we've seen spammers attempt to manipulate ARC
>headers.
>1) ARC could benefit from more refinement of interop such as when to
>generate ARC headers e.g. if the message appears spammy? and how should the
>ARC-Authentication-Results be reported if there is a local policy
>override?  Would it be helpful to clarify this with a BCP?
>2) Considerations on what to do about ARC header spoofing and replay.  I
>have an I-D
>https://datatracker.ietf.org/doc/draft-chuang-replay-resistant-arc/ that
>outlines some ideas on mitigating that (particularly the "SeRCi" idea) as
>one starting point.  (In case it matters I should point out the DARA idea
>in the draft is more oriented towards DKIM).
>-Wei

_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to