On 12/11/22 1:55 PM, Murray S. Kucherawy wrote:
On Sun, Dec 11, 2022 at 1:41 PM Michael Thomas <[email protected]> wrote:


    No, I mean that the if number of RCPT-TO's is large, it's
    suspicious. Even if they do individual SMTP transactions it will
    have the same (signed) Message-Id so that's not evadeable either
    in theory.

In the transaction where the signature is applied, there's only one envelope recipient.  When I'm executing the attack, I could do one envelope per recipient if I'm worried about being detected that way.

If Message-ID isn't covered by the header hash, it can be unique per envelope.
The spammer doesn't control what the signer signs, of course.

There was a suggestion that the "bh=" could be required to be unique per MX to avoid replays, but that becomes a potentially gigantic hash table, so now there's a resource problem imposed on the receiver/verifier.  Even if you key it on Message-ID, you have the same resource problem.

I dunno, how common is Bcc'ing in real life? I imagine the percentage of users knowing about it is pretty low. So it would likely be from other things like marketing campaigns which are certainly common, but also often is not distinguishable from spam. I don't have any insight into what good spam filters do, but large RCPT-TO lists seem like they are a good reason to cast doubt a priori. Given that legit messaging often ends up in my spam box, it seems plausible they are using it as a signal.

But I want to return to my previous point of whether reputation is even quantifiable, and whether somebody has actually gone out and researched it. We can say that this is a problem in theory, but do we have any data to back it up? I kinda think that should be table stakes before talking about rechartering.

Mike
_______________________________________________
Ietf-dkim mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to