On 11/28/2022 2:40 AM, Laura Atkins wrote:

On 27 Nov 2022, at 18:48, Dave Crocker <d...@dcrocker.net> wrote:
On 11/26/2022 5:38 PM, Jim Fenton wrote:
Not Safe: It’s not safe because it breaks Barry’s use case above, and others have pointed out MUA usage of the signature.
DKIM signature survival after delivery is not a goal for DKIM. If you feel otherwise, you are seeking an expansion of DKIM's purpose.
This is actually the first I’ve heard this asserted. Do you have some history to back this up?

Please see the later postings that discussed this.


By way of example, open SMTP relays were deemed unacceptable. And they still are.  Broadly speaking, having receivers remove the DKIM signature is a version of the same design thinking.

Or perhaps you think open relays are ok, since, after all, attackers can easily circumvent this?
This seems unreasonably snarky and a personal attack.

The suggestion is for a small, simple, easily-adopted mechanism that closes off some venues from facilitating this form of abuse.

Rather than consider it in those terms, it has engendered surprisingly vehement and problematic criticisms.  This gets frustrating.

The comparison to open relays is, IMO, appropriate.  Consider the kinds of arguments against this proposal being applied to the suggestion to close open relays.  One would wish for less heat and more thoughtful deliberation.



We should move onto better ideas.
Or, we might have thoughtful discussion, that engages carefully with the substance, before discarding suggestions.

I’m not sure why you have settled on stripping the DKIM header as the solution, but it’s not going to be. It’s not even going to slow the folks using DKIM replay down (hint: most of the evidence I’ve seen shows that the attackers are ALREADY using their own MTAs to receive the emails). Multiple people have explained why this isn’t a solution. There’s no point in wasting time on a discussion. Let’s move on to something that will actually address the problem.

I have not settled on the proposal as 'the' solution.  I was clear about this.  That you read otherwise demonstrates the problem with how the proposal is being dismissed out of hand.

The other is the certitude of its uselessness.  cf, open relays.



[1] I’m not sure where or why this myth that “spammers won’t pay for anything”

Since no one said any such thing, I don't know where the myth it has been said came from.


and “a small incremental cost is sufficient to stop spammers from a particular technique” came from.

I thought spammers varied in skills and dedication and that simple mechanisms that blocked lazy spammers was generally viewed as being useful.  Apparently that has changed, and now all spammers are highly skilled, dedicated and well-funded?



I’ve been on the phone with spam gangs who are spending tens of thousands a month on infrastructure and running custom code and doing BGP tricks to avoid port25 blocking and a whole host of other things that cost money, time and other resources.

Probably a good thing, then, that there was no suggestion this proposal would stop all replay spammers.


d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
mast:@dcrocker@mastodon.social

_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to