On Sun 10/Sep/2023 18:44:00 +0200 Jesse Thompson wrote:
On Fri, Sep 8, 2023, at 9:23 AM, Murray S. Kucherawy wrote:
On Fri, Sep 8, 2023 at 7:17 AM Jesse Thompson <z...@fastmail.com> wrote:__
Is rfc6651 a lost cause? It looks like it defines a reporting mechanism in 
control of the signer, as opposed to the attacker.

Has anyone (else) implemented it?

That's what I want to understand. Or, more specifically, if no one implemented 
it, why? And have those blockers changed due to the changed landscape with dkim 
replay, etc.

When DKIM was young, a mechanism like the one defined in RFC 6651 was enormously valuable to me when two implementations were trying to debug interoperability problems. It allowed us to see why signatures were failing. Once all the bugs were worked out and things like canonicalization and common MTA mutations were well understood, the need for this sort of thing faded away.

DKIM Replay is leading to interoperability problems as result of local policies 
being rolled out to mitigate the abuse, and senders (and their customers) need 
to make changes to their configuration to not get caught up in the emerging 
algorithms. Examples may include duplicate message throttling, blind recipient 
limitations, tighter expiration enforcement, etc.

I think usage of the 'p' and 'x' reports and the 'rs' tag would be valuable 
(perhaps enormously, as you experienced first hand)

    p    Reports are requested for signatures that are rejected for local
         policy reasons at the Verifier that are related to DKIM
         signature evaluation.

    x    Reports are requested for signatures rejected by the Verifier
         because the expiration time has passed.


These look like aggregate data that could be included in DMARC reports or extensions thereof. Perhaps that tool has more traction than 6651.


Best
Ale
--








_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to