On Wed, Feb 15, 2023 at 5:39 AM Scott Kitterman <ietf-d...@kitterman.com>
wrote:

> Any reputation based solution does have down scale limits.  Small mail
> sources
> (such as your random Nebraska forwarder) generally will have no reputation
> vice a negative one and so wouldn't get penalized in a scheme like the one
> I
> suggested.  This does, however, highlight where the performance challenge
> is.
> We've moved it from duplicate detection to rapid assessment of reputation
> for
> hosts that have sudden volume increases.
>

I wonder if this could be separated into "reputation" and "hosts that have
sudden volume increases".

Reputation is hard.  Large operators spend a lot of R&D time coming up with
algorithms that accurately (for some value thereof) compute the reputation
it should associate with an identity.  That investment means they're not
inclined to share that secret sauce.  Small operators without those
resources long for an open source solution, or a cheap or free service from
which they can reliably get reputation data.  Companies that offer
reputation data for public consumption have been sued out of existence by
people that get marked as suspect, so really good ones don't seem to abound
last I checked.

There's a lot less secret sauce involved in the latter.  It would be
interesting to see if some simple recordkeeping of this nature could make a
dent in the problem space we're discussing.  But that might just encourage
further distribution of the attack to avoid detection.

-MSK
_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to