On Sun, Dec 11, 2022 at 1:11 PM Michael Thomas <[email protected]> wrote:

>
>
> As for resolution: the first obvious one is to not send spam in the first
>> place. That is the root of the problem. The second is that Bcc's can be
>> treated with more suspicion. Neither of these needs the working group to do
>> anything.
>>
>
> I think this is easier said than done.  In the example I gave, "don't send
> spam in the first place" reduces to "make sure your users are 100%
> trustworthy or that your outbound spam filters are 100% accurate", which
> strikes me as an impossible bar to meet.
>
> I'm going to assume that the attackers will need to iterate to find a
> piece of mail that passes their filters. That is signal right there that
> abuse is likely. Perhaps an exponential backoff could be employed when
> outbound spam is detected. Sort of like a 4xx "try later".
>
That's easy to evade: Come from a rotating pool of IP addresses, using a
new free account each time.

> But the BCC aspect is interesting too. Don't providers already view things
> with massive rcpt-to (bcc's) suspiciously?
>
That's easy to evade: Send a spam message to yourself only.  That has the
signature.  Now capture that from your inbox and replay it from a different
server to any number of recipients, using any number of envelopes, to your
heart's content.  Won't pass SPF, but it passes DKIM.  If the receiver
values DKIM more, or only cares if one passes, you win.

-MSK
_______________________________________________
Ietf-dkim mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to