On 24/06/2022 17:54, Alessandro Vesely via mailop wrote:
On Wed 22/Jun/2022 13:31:49 +0200 Slavko via mailop wrote:

Neither I use it.  I didn't know rspamd implements ARC.  Most of that module's documentation seems to be about signing, which is not difficult.  But there is a whitelisted_signers_map variable, for verifying.  Did you set it?

In order to have ARC working for mailing lists, you need to add the relevant domain to that map, for every list you subscribe to.  At that point, mailing lists that send personalized messages to each subscriber can ARC-seal the messages destined to you instead of rewriting From:, if they know that you did set whitelisted_signers_map appropriately.  Hm...


I really, really miss one simple feature in ARC signatures. Whilst it is +/- trivial to have a list of trusted signers on a receiver side, it would be super helpful to allow **a sender** to specify it's next trusted hop.

For example, if I send a message from `example.com` to some mailing list `ml.com` why cannot I add a special ARC signature element like `nh=ml.com` which would specify that the next trusted signature must be done by `ml.com`. In this way, an ARC sender can tell that a receiver can trust `ml.com` to restore the DMARC result for `example.com` when it observes forwarding.

This might introduce a lot of additional value to ARC, as with this approach not only receivers decide whom to trust but also senders can influence on that as senders are mostly aware about who are theirs trusted forwarders.

I was also thinking about a separate DNS record that would specify a list of the trusted senders, but it seems that including a next trusted forwarder info into AMS and sealing it into AS seems to be even a better approach.

_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to