+1

My favorite line from Mike's email is "there is value that can be leveraged in 
conjunction with other tools as part of an overall anti-abuse
program. "

An example of how this fits into an overall strategy is captured in a white 
paper PayPal published in 2008:

https://www.thepaypalblog.com/2008/04/a-practical-app/

(the link to the paper is in the last paragraph of that blog post)

-- Brett

On May 26, 2010, at 9:22 AM, MH Michael Hammer (5304) wrote:

> 
> 
>> -----Original Message-----
>> From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-
>> boun...@mipassoc.org] On Behalf Of Steve Atkins
>> Sent: Tuesday, May 25, 2010 7:03 PM
>> To: DKIM List
>> Subject: Re: [ietf-dkim] list vs contributor signatures, was Wrong
>> Discussion
>> 
>> 
>> On May 25, 2010, at 3:38 PM, Brett McDowell wrote:
>> 
>>> On May 10, 2010, at 3:09 PM, Steve Atkins wrote:
>>> 
>>>> On May 10, 2010, at 11:59 AM, John R. Levine wrote:
>>>> 
>>>>>> Apart from ADSP rules, a broken signature must be treated as if
> there
>> was no
>>>>>> signature at all. That in itself is not the problem. The problem
> with
>> broken
>>>>>> signatures is that people will not buy into a technology (DKIM)
> if it
>> will
>>>>>> not cover a significant part of their e-mail.
>>>>> 
>>>>> Of course.  That's why MLMs should sign their mail, or equvalently
> the
>> MSA
>>>>> they use should sign it.  Problem solved, right?
>>>>> 
>>>>> Free bonus: MLMs can sign the list mail even if the contributor
> didn't
>>>>> sign it.
>>>> 
>>>> +1. It's pretty much a non-issue (unless you believe that DKIM is
>>>> magic fairy dust that will prevent all "fraudulent use of your
> brand").
>>> 
>>> I believe we can disagree without being disagreeable.  I'm sure
> there is
>> no one on this list (or in the world) who thinks DKIM is magic fairy
> dust
>> that will prevent all fraudulent use of a brand.
>> 
>> If ADSP is not there to prevent "fraudulent use of your brand", what
>> is it for?
>> 
> 
> A most pithy question deserving of an answer. ADSP does not "prevent
> fraudulent use of your brand". Never has and never will. What it is
> intended to prevent is "fraudulent use of your domain" that may or may
> not be a brand. It is a specific tool targeted at a narrow problem.
> Nothing more and nothing less. It does not prevent abuse of the display
> name nor does it prevent the use of cousin domains as just two examples
> of the many things it does not do. It is a point solution to a point
> problem.
> 
>> While I don't think ADSP proponents actually believe it is magical
> brand
>> protection fairy dust, that is the operational model we're using when
>> we're
>> discussing the usage of ADSP.
>> 
> 
> Have to disagree with you here Steve. It's not magical and as I pointed
> out above, it is not strictly speaking "brand protection".
> 
>> ADSP does not, and can not, provide significant operational value
>> in dealing with phishing, which is the only concrete example
>> anyone has brought forward. So we're left with "brand protection",
>> which is still plausible because it's so vague.
>> 
> 
> The only reason that ADSP does not provide significant operational
> benefits is that for the sake of compromise it was crippled at birth.
> Speaking based on the experience of DKIM signing all mail for some
> heavily abused domains since 2007, there is value that can be leveraged
> in conjunction with other tools as part of an overall anti-abuse
> program. 
> 
>> (If it were described as "Brand protection as applied to the section
> of
>> the byte sequence in the From: field that isn't the part usually
> displayed
>> to the end user" that would be less vague, but more obviously
> useless).
>> 
> 
> There is a very simple solution I have suggested in the past that can
> and will likely be implemented once email authentication reaches a
> critical mass. That is for MUAs to set the default implementation to NOT
> display the display name if the mail is unauthenticated.
> 
> I would hope that the long term goal is to reduce the attack surface
> available to abusers.
>> 
>> 
>>> I would like to think we are all on this list making a good faith
> effort
>> to explore and debate the right way to deal with the status quo,
> including
>> the option of sustaining it.  I personally don't agree with the
> position
>> that the status quo should be sustained, but I respect both that
> position
>> and those who articulate it.
>> 
>> 
>> Yes, this summary may be blunt and possibly even disagreeable, but
>> there comes a point when developing something that's going to affect
>> many, many people that you have to mention the elephant in the room -
>> which is that while lots of people involved have invested quite a bit
> of
>> effort
>> and professional credibility in putting it together there's still no
>> definition
>> of what problem it's supposed to solve, and the end result appears to
>> be pretty much useless for any concrete phishing or brand protection
>> scenario.
>> 
> 
> As I commented above, the only reason that ADSP as written appears to be
> of little potential value is that it was intentionally made so. Consider
> that one of the authors has pretty much always argued against its
> usefulness and value. 
> 
> The ability to make assertions about a sending domains mail streams has
> a proven track record in private peering arrangements between some
> (large/well known) senders and receivers. There is clear potential value
> to enabling an open and automated way of expressing these assertions
> such that both sides of the equation (sending domain and receiving
> domain) are able to scale. That we have failed to do so with the current
> incarnation of ADSP does not change this.
> 
> Mike
> 
> _______________________________________________
> NOTE WELL: This list operates according to 
> http://mipassoc.org/dkim/ietf-list-rules.html

_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to