On 03/06/2025 00:18, Bron Gondwana wrote:
On Mon, May 26, 2025, at 18:15, Dave Crocker wrote:
[...]

If it detected DKIM Replay in the general case, it would not be trivial - 
however it only detects DKIM Replay in the direct case.
Given that Replay is about actions involving an intermediary, I don't know what 
direct vs. indirect means.

In any event, yes, there are legitimate scenarios that match Replay abuse 
scenarios.

And there always will be.

Can you give some examples of legitimate scenarios that match Reply abuse 
scenarios (in a world where every site which sends you indirect mail is running 
DKIM2.  I agree that until then, there will be scenarios that match Replay 
abuse)


I may be dumb, but I cannot figure out how DKIM2 (or DKOR) can tell Replay abuse from, say, this list post as relayed by mail2.ietf.org. Even if both ietf.org and the abuser implemented DKIM2, what do the new rt= and mf= tags add to the equation? If their respective implementations are correct, the new tags will bear the formally correct values in both cases.

I guess one can draw some conclusion when mf=*@gmail.com, but this is a reputation driven reasoning that can be done even now, like so: If the recipient is not in the To:/Cc: fields, i.e. an *unofficial recipient*, and the actual sender is *unknown*, then it must be an abusive message.

What am I missing?


Best
Ale
--






_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to