Incoming SMTP in the year 2017 and absence of DKIM
For those who operate public facing SMTPd that receive a large volume of incoming traffic, and accordingly, a lot of spam... How much weight do you put on an incoming message, in terms of adding additional score towards a possible value of spam, for total absence of DKIM signature?
On Wed, Nov 29, 2017 at 12:03 PM, Eric Kuhnke <eric.kuhnke@gmail.com> wrote:
For those who operate public facing SMTPd that receive a large volume of incoming traffic, and accordingly, a lot of spam...
How much weight do you put on an incoming message, in terms of adding additional score towards a possible value of spam, for total absence of DKIM signature?
Zero. DKIM for mailing lists is a horribly broken design and legitimate mailing lists are second only to spam in quantity of SMTP transactions. Regards, Bill Herrin -- William Herrin ................ herrin@dirtside.com bill@herrin.us Dirtside Systems ......... Web: <http://www.dirtside.com/>
Greetings, * William Herrin (bill@herrin.us) wrote:
On Wed, Nov 29, 2017 at 12:03 PM, Eric Kuhnke <eric.kuhnke@gmail.com> wrote:
For those who operate public facing SMTPd that receive a large volume of incoming traffic, and accordingly, a lot of spam...
How much weight do you put on an incoming message, in terms of adding additional score towards a possible value of spam, for total absence of DKIM signature?
Zero. DKIM for mailing lists is a horribly broken design and legitimate mailing lists are second only to spam in quantity of SMTP transactions.
Eh, that's really not accurate, imv, and some folks who run mailing lists have put in serious effort to make sure to *not* break DKIM signatures (which is certainly possible to do). The combination of making DKIM signatures work and DMARC allows messages to go through that would otherwise end up getting bounced, from what I've seen. What's annoying are the systems that appear to assume a DMARC policy that says "bounce it if it's not from a server in our SPF list" when there's no DMARC policy in place, but there is an SPF list. Not everyone really wants to put in the effort to set up DKIM, but they're fine putting up an SPF record, but there seem to be a number of servers out there that bounce mailing list traffic in those cases (seems to specifically be MS Exchange systems, from the google'ing that I've done). Thanks! Stephen
On Wed, Nov 29, 2017 at 12:17 PM, Stephen Frost <sfrost@snowman.net> wrote:
* William Herrin (bill@herrin.us) wrote:
On Wed, Nov 29, 2017 at 12:03 PM, Eric Kuhnke <eric.kuhnke@gmail.com> wrote:
How much weight do you put on an incoming message, in terms of adding additional score towards a possible value of spam, for total absence of DKIM signature?
Zero. DKIM for mailing lists is a horribly broken design and legitimate mailing lists are second only to spam in quantity of SMTP transactions.
Eh, that's really not accurate, imv, and some folks who run mailing lists have put in serious effort to make sure to *not* break DKIM signatures (which is certainly possible to do).
Alright, so "horribly broken design" overstates the case but there are enough problems that weighting the absence of DKIM at something other than zero will surely do more harm than good. Regards, Bill Herrin -- William Herrin ................ herrin@dirtside.com bill@herrin.us Dirtside Systems ......... Web: <http://www.dirtside.com/>
On 11/29/2017 09:24 AM, William Herrin wrote:
On Wed, Nov 29, 2017 at 12:17 PM, Stephen Frost <sfrost@snowman.net> wrote:
On Wed, Nov 29, 2017 at 12:03 PM, Eric Kuhnke <eric.kuhnke@gmail.com> wrote:
How much weight do you put on an incoming message, in terms of adding additional score towards a possible value of spam, for total absence of DKIM signature? Zero. DKIM for mailing lists is a horribly broken design and legitimate mailing lists are second only to spam in quantity of SMTP transactions. Eh, that's really not accurate, imv, and some folks who run mailing
* William Herrin (bill@herrin.us) wrote: lists have put in serious effort to make sure to *not* break DKIM signatures (which is certainly possible to do).
Alright, so "horribly broken design" overstates the case but there are enough problems that weighting the absence of DKIM at something other than zero will surely do more harm than good.
There are quite a few things you can do to get the mailing list traversal rate > 90%, iirc. For average mailman-like lists like nanog it's very high. Of course while a "badly" behaving mailing list can trivially defeat any DKIM signature, it doesn't really take too much effort to not behave "badly". Whether that false positive rate is too high is another question. Mike
On Wed, 29 Nov 2017 09:32:27 -0800, Michael Thomas said:
There are quite a few things you can do to get the mailing list traversal rate > 90%, iirc.
Only 90% should be considered horribly broken. Anything that makes it difficult to run a simple mailing list with less that at least 2 or 3 9's is unacceptable.
On 11/29/2017 10:03 AM, valdis.kletnieks@vt.edu wrote:
On Wed, 29 Nov 2017 09:32:27 -0800, Michael Thomas said:
There are quite a few things you can do to get the mailing list traversal rate > 90%, iirc. Only 90% should be considered horribly broken. Anything that makes it difficult to run a simple mailing list with less that at least 2 or 3 9's is unacceptable.
I've been saying for years that it should be possible to create the concept of DKIM-friendly mailing lists. In such a case, you could have your nines. Until then, the best you can hope for is the list re-signing the mail and blaming the list owner instead. Mike
98% of the spam that gets through my filters, which comes from an IP not in any of the major RBLs, has no DKIM signature for the domain. My theory is that it does introduce somewhat of a barrier to spam senders because
Anecdotal experience. I'm subscribed to a lot of mailing lists. Some pass through DKIM correctly. Others re-sign the message with DKIM from their own server. they are frequently not in control of the mail server (which may be some ignorant third party's open relay), nor do they have access to the zonefile for the domain the mail server belongs to for the purpose of adding any sort of DKIM record. On Wed, Nov 29, 2017 at 10:12 AM, Michael Thomas <mike@mtcc.com> wrote:
On 11/29/2017 10:03 AM, valdis.kletnieks@vt.edu wrote:
On Wed, 29 Nov 2017 09:32:27 -0800, Michael Thomas said:
There are quite a few things you can do to get the mailing list
traversal rate > 90%, iirc.
Only 90% should be considered horribly broken. Anything that makes it difficult to run a simple mailing list with less that at least 2 or 3 9's is unacceptable.
I've been saying for years that it should be possible to create the concept of DKIM-friendly mailing lists. In such a case, you could have your nines. Until then, the best you can hope for is the list re-signing the mail and blaming the list owner instead.
Mike
A broken DKIM signature is indistinguishable from a lack of a signature header. It's possible that as a heuristic you might be able to divine something from lack of signature and the existence of selectors for a domain, but afaik there isn't an easy way to query for all of the dkim selectors for a domain, and even if there were it would be a pretty sketchy heuristic, is my bet. Mike On 11/29/2017 10:18 AM, Eric Kuhnke wrote:
Anecdotal experience. I'm subscribed to a lot of mailing lists. Some pass through DKIM correctly. Others re-sign the message with DKIM from their own server.
98% of the spam that gets through my filters, which comes from an IP not in any of the major RBLs, has no DKIM signature for the domain. My theory is that it does introduce somewhat of a barrier to spam senders because they are frequently not in control of the mail server (which may be some ignorant third party's open relay), nor do they have access to the zonefile for the domain the mail server belongs to for the purpose of adding any sort of DKIM record.
On Wed, Nov 29, 2017 at 10:12 AM, Michael Thomas <mike@mtcc.com> wrote:
On 11/29/2017 10:03 AM, valdis.kletnieks@vt.edu wrote:
On Wed, 29 Nov 2017 09:32:27 -0800, Michael Thomas said:
There are quite a few things you can do to get the mailing list
traversal rate > 90%, iirc.
Only 90% should be considered horribly broken. Anything that makes it difficult to run a simple mailing list with less that at least 2 or 3 9's is unacceptable.
I've been saying for years that it should be possible to create the concept of DKIM-friendly mailing lists. In such a case, you could have your nines. Until then, the best you can hope for is the list re-signing the mail and blaming the list owner instead.
Mike
On 11/29/2017 11:33 AM, Michael Thomas wrote:
A broken DKIM signature is indistinguishable from a lack of a signature header.
I'll argue that it's possible to distinguish between the two. *However* the DKIM standard states that you should treat a broken DKIM signature the same as no DKIM signature. I've come to understand DKIM to be proof /positive/, as in trust something when there is a DKIM signature -and- it validates. Everything else defaults to neutral, NOT /negative/.
It's possible that as a heuristic you might be able to divine something from lack of signature and the existence of selectors for a domain, but afaik there isn't an easy way to query for all of the dkim selectors for a domain, and even if there were it would be a pretty sketchy heuristic, is my bet.
Not being able to tell if DKIM is in use has been a long standing annoyance of mine. That being said, I think it could be trivial to query for DMARC records and deduce things from the existence of the "adkim" option. If it's there and set to reject, then there really should be DKIM-Signature header for the message. -- Grant. . . . unix || die
On 11/29/2017 11:53 AM, Grant Taylor via NANOG wrote:
On 11/29/2017 11:33 AM, Michael Thomas wrote:
A broken DKIM signature is indistinguishable from a lack of a signature header.
I'll argue that it's possible to distinguish between the two. *However* the DKIM standard states that you should treat a broken DKIM signature the same as no DKIM signature.
Remember: if you treat a broken signature better than lack of signature, spammers will just insert phony signatures to game you. So they really are the same.
Not being able to tell if DKIM is in use has been a long standing annoyance of mine.
That being said, I think it could be trivial to query for DMARC records and deduce things from the existence of the "adkim" option. If it's there and set to reject, then there really should be DKIM-Signature header for the message.
I haven't really kept up with dmarc, but its progenitor ssp could give you that indication, iirc. The real problem with large enterprise that we found, however, is that it was really hard to track down every 25 year old 386 sitting in dusty corners that was sending mail directly instead of through corpro servers to make certain that everything was signed that should be signed. Maybe that's gotten better in the last 15 years, but I'm not too hopeful. Mike
On Wed, Nov 29, 2017 at 12:17:57PM -0800, Michael Thomas wrote:
The real problem with large enterprise that we found, however, is that it was really hard to track down every 25 year old 386 sitting in dusty corners that was sending mail directly instead of through corpro servers to make certain that everything was signed that should be signed. Maybe that's gotten better in the last 15 years, but I'm not too hopeful.
15 years ago we blocked outbound port 25 except from our campus mail servers. That should be SOP by now. It is fairly easy to look at firewall logs to find these.
On 11/29/2017 01:17 PM, Michael Thomas wrote:
Remember: if you treat a broken signature better than lack of signature, spammers will just insert phony signatures to game you.
So they really are the same.
Yes, they are /effectively/ the same. However it is possible to distinguish between a broken DKIM signature and the lack of a DKIM signature. What you do with that information is up to you. - Guidelines suggest that you treat them the same. (Thus them being /effectively/ the same.)
The real problem with large enterprise that we found, however, is that it was really hard to track down every 25 year old 386 sitting in dusty corners that was sending mail directly instead of through corpro servers to make certain that everything was signed that should be signed. Maybe that's gotten better in the last 15 years, but I'm not too hopeful.
I hear you, and I don't disagree with your sentiments about the difficult of the matter. However, I find it highly suspect that such systems ancient are still in use. There may very well be replacements for said systems that are < 20 years old. Either way, they would still run afoul of things like SPF (unless you allow your entire IP space to send email). There are other security / vulnerability implications of such infrastructures. - I'd argue that they are motivation enough to wrangle these rogue systems. -- Grant. . . . unix || die
In article <85393a12-a51f-6722-4171-118919fcc2d0@mtcc.com> you write:
The real problem with large enterprise that we found, however, is that it was really hard to track down every 25 year old 386 sitting in dusty corners that was sending mail directly instead of through corpro servers to make certain that everything was signed that should be signed. Maybe that's gotten better in the last 15 years, but I'm not too hopeful.
No kidding. That's why you publish a DMARC policy record that says don't treat my mail any differently, but please send me summary reports about it. This lets you see where mail with your From: domain is coming from, to track down all those dusty servers. Once you've found them all, then you can decide whether publishing a policy is likely make things better or worse. You'll also find a whole lot of Chinese botnets that send out spam with random return addresses including yours, but they're not hard to tell apart. R's, John
In which case neither will they be RFC compliant. (1) The "inaddr-arpa" ptr from the incoming connection, when resolved, MUST result in a set of IP Addresses which includes the original IP Address. (2) The "name" specified in the HELO/EHLO MUST resolve to an MTA that meets the above reverse/forward resolution requirement. (3) The domain name specified in the envelope-from MUST be resolvable to an MTA that meets the above requirement (1) or be empty. (4) The SPF checking, if done, MUST NOT fail. (5) The connecting MTA MUST NOT speak when not spoken to (that is, it MUST NOT not violate the SMTP chat protocol). If you dump all connections that are do not meet these requirements, you will have eliminated 99% or more of all spam. DKIM signatures do not really add much at all except prove that the message was sent through a server that could calculate a DKIM signature. It says nothing about whether the message is SPAM or not. 99% (or more) of all spam will have violated one or more of rules (1) through (5) long before the message contents are accepted so that the signature can be verified. --- The fact that there's a Highway to Hell but only a Stairway to Heaven says a lot about anticipated traffic volume.
-----Original Message----- From: NANOG [mailto:nanog-bounces@nanog.org] On Behalf Of Eric Kuhnke Sent: Wednesday, 29 November, 2017 11:19 To: nanog@nanog.org list Subject: Re: Incoming SMTP in the year 2017 and absence of DKIM
Anecdotal experience. I'm subscribed to a lot of mailing lists. Some pass through DKIM correctly. Others re-sign the message with DKIM from their own server.
98% of the spam that gets through my filters, which comes from an IP not in any of the major RBLs, has no DKIM signature for the domain. My theory is that it does introduce somewhat of a barrier to spam senders because they are frequently not in control of the mail server (which may be some ignorant third party's open relay), nor do they have access to the zonefile for the domain the mail server belongs to for the purpose of adding any sort of DKIM record.
On Wed, Nov 29, 2017 at 10:12 AM, Michael Thomas <mike@mtcc.com> wrote:
On 11/29/2017 10:03 AM, valdis.kletnieks@vt.edu wrote:
On Wed, 29 Nov 2017 09:32:27 -0800, Michael Thomas said:
There are quite a few things you can do to get the mailing list
traversal rate > 90%, iirc.
Only 90% should be considered horribly broken. Anything that makes it difficult to run a simple mailing list with less that at least 2 or 3 9's is unacceptable.
I've been saying for years that it should be possible to create the concept of DKIM-friendly mailing lists. In such a case, you could have your nines. Until then, the best you can hope for is the list re-signing the mail and blaming the list owner instead.
Mike
In article <1d458e76-ab61-db28-79cb-6aabcab4ff3b@mtcc.com> you write:
I've been saying for years that it should be possible to create the concept of DKIM-friendly mailing lists. ...
I suppose, if your users are OK with no subject tags, message footers, or any of the other cruft that list users have taken for granted for the past 30 years. The people who brought us DMARC have a new anti-DMARC thing called ARC that is intended to help recipients guess whether a message with a broken signature came through a mailing list. It's a kludge, but since it's a kludge that Gmail has already implemented, you'll be seeing more of it. Returning to the original question, if a message has no DKIM signature, that doesn't say anything particularly bad, but it does mean that the sending IP is your main bit of info to decide whether it's mail you want, which has issues of its own. R's, John PS: details here https://dmarc.org/resources/specification/ PPS: Please spare us pontification about why ARC can't possibly work unless you're prepared to cite section numbers in the ARC spec supporting your argument.
On 11/29/2017 01:11 PM, John Levine wrote:
PPS: Please spare us pontification about why ARC can't possibly work unless you're prepared to cite section numbers in the ARC spec supporting your argument.
Apparently the levine unit is hearing things again because nobody -- least of all me -- has said anything about arc. Mike
On Wed, 29 Nov 2017 13:46:05 -0800, Michael Thomas said:
Apparently the levine unit is hearing things again because nobody -- least of all me -- has said anything about arc.
I believe it was a pre-emptive statement.
On 11/29/2017 01:11 PM, John Levine wrote:
I've been saying for years that it should be possible to create the concept of DKIM-friendly mailing lists. ... I suppose, if your users are OK with no subject tags, message footers, or any of the other cruft that list users have taken for granted for
In article <1d458e76-ab61-db28-79cb-6aabcab4ff3b@mtcc.com> you write: the past 30 years.
Message footers and subject lines can be dealt with. That's already been proven within the current DKIM spec. Mike
On 11/29/2017 03:24 PM, Michael Thomas wrote:
Message footers and subject lines can be dealt with. That's already been proven within the current DKIM spec.
Please humor my ignorance and explain how a subject line (which is (over)signed) can be dealt with in the current DKIM spec? I get how footers can be dealt with, read appended. At least as long as DKIM only signs a given amount of the (original) body. (Though HTML (read: MIME structures) can complicate this.) - Or are you referring to something else? -- Grant. . . . unix || die
On 11/29/2017 02:40 PM, Grant Taylor via NANOG wrote:
On 11/29/2017 03:24 PM, Michael Thomas wrote:
Message footers and subject lines can be dealt with. That's already been proven within the current DKIM spec.
Please humor my ignorance and explain how a subject line (which is (over)signed) can be dealt with in the current DKIM spec?
I get how footers can be dealt with, read appended. At least as long as DKIM only signs a given amount of the (original) body. (Though HTML (read: MIME structures) can complicate this.) - Or are you referring to something else?
You know what the original header was via the signature. You can take the delta of the current subject line and remove any additions and validate the signature. Whether you're happy with the additions is a different concern, If I were constructing a spam filter out of it, I'd give a lot of prejudice to anything added, but that's outside of what you can do within the bounds of the spec. Mike
On 11/29/2017 03:46 PM, Michael Thomas wrote:
You know what the original header was via the signature. You can take the delta of the current subject line and remove any additions and validate the signature. Whether you're happy with the additions is a different concern,
Are you referring to the optional z DKIM-Signature tag? Or are you referring to brute forcing what the subject was in order to derive the delta of the current subject? This would be compounded by any number of other changes to (over)singed headers / body portion.
If I were constructing a spam filter out of it, I'd give a lot of prejudice to anything added, but that's outside of what you can do within the bounds of the spec.
*If* the z tag was included in the DKIM-Signature header, I can see how this would work and I agree with your distrust of said additions / alterations. -- Grant. . . . unix || die
On 11/29/2017 03:00 PM, Grant Taylor via NANOG wrote:
On 11/29/2017 03:46 PM, Michael Thomas wrote:
You know what the original header was via the signature. You can take the delta of the current subject line and remove any additions and validate the signature. Whether you're happy with the additions is a different concern,
Are you referring to the optional z DKIM-Signature tag?
Or are you referring to brute forcing what the subject was in order to derive the delta of the current subject? This would be compounded by any number of other changes to (over)singed headers / body portion.
If I were constructing a spam filter out of it, I'd give a lot of prejudice to anything added, but that's outside of what you can do within the bounds of the spec.
*If* the z tag was included in the DKIM-Signature header, I can see how this would work and I agree with your distrust of said additions / alterations.
Yes, with the z= Mike
On 11/29/2017 11:03 AM, valdis.kletnieks@vt.edu wrote:
Only 90% should be considered horribly broken. Anything that makes it difficult to run a simple mailing list with less that at least 2 or 3 9's is unacceptable.
There have been a number of things that fall into that category, two of which immediately come to mind are: - Requiring Reverse DNS - SPF I'm not commenting about the viability of these things, just that they are fairly well accepted and that they can trivially break mailing lists. IMHO, DKIM and DMARC are just the recent additions to that list. -- Grant. . . . unix || die
In article <88a1ae22-a5c1-dc46-caa7-cca813109e99@tnetconsulting.net> you write:
- Requiring Reverse DNS - SPF
I'm not commenting about the viability of these things, just that they are fairly well accepted and that they can trivially break mailing lists.
A mailing list sending with bad rDNS or bad SPF is a pretty cruddy mailing list. Normal lists put their own bounce address in the envelope so they can handle the bounces, so their own SPF applies. No idea why you think rDNS for a list's MTA is any harder than anyone else's MTA. R's, John
On 11/29/2017 02:13 PM, John Levine wrote:
A mailing list sending with bad rDNS or bad SPF is a pretty cruddy mailing list.
s/mailing list sending/sending server/ Agreed.
Normal lists put their own bounce address in the envelope so they can handle the bounces, so their own SPF applies.
Yep. V.E.R.P. is a very powerful thing. (B.A.T.V. is an interesting alternative, but I never messed with it.)
No idea why you think rDNS for a list's MTA is any harder than anyone else's MTA.
I don't. I'm saying that I've heard arguments over the last 15 years from people that (FC)rDNS and SPF (independently) are things that will break some portion of email. - I believe that these are simply technologies that the email industry has adopted and now considers to be Best Practice, if not actual requirements that MUST be done. IMHO, Mailing List Managers are simply a different form of MUA that utilizes the same email infrastructure (MTAs.) Thus, MLMs are subject tot he same requirements as "individual email" (as referred to earlier.) -- Grant. . . . unix || die P.S. I'm strongly of the opinion that if a MLM alters the message in ANY capacity, that it is actually generating a new message. Thus the MLM is the new author. It's just using content strongly based on emails that came into it. - But that's a different discussion that lasted days on the mailman mailing list.
In article <3677d101-3874-b8e4-87b3-37e4dd870325@tnetconsulting.net> you write:
Normal lists put their own bounce address in the envelope so they can handle the bounces, so their own SPF applies.
Yep. V.E.R.P. is a very powerful thing. (B.A.T.V. is an interesting alternative, but I never messed with it.)
VERP helps identify the bouncing party, but list bounce handling works fine without it. What matters is that it's the list's address in the envelope, not the message author. BATV works OK (I should know, I invented it) but it has its false positives.
I'm saying that I've heard arguments over the last 15 years from people that (FC)rDNS and SPF (independently) are things that will break some portion of email.
Broken rDNS is just broken, since there's approximately no reason ever to send from a host that doesn't know its own name. Broken SPF may or may not be an issue since there are lots of legit ways to send mail that SPF can't describe. R's, John
P.S. I'm strongly of the opinion that if a MLM alters the message in ANY capacity, that it is actually generating a new message. Thus the MLM is the new author. It's just using content strongly based on emails that came into it. - But that's a different discussion that lasted days on the mailman mailing list.
It's an interesting theological argument but it makes little practical difference.
On Wed, Nov 29, 2017 at 5:50 PM, John Levine <johnl@iecc.com> wrote:
In article <3677d101-3874-b8e4-87b3-37e4dd870325@tnetconsulting.net> you
write:
Normal lists put their own bounce address in the envelope so they can handle the bounces, so their own SPF applies.
Yep. V.E.R.P. is a very powerful thing. (B.A.T.V. is an interesting alternative, but I never messed with it.)
VERP helps identify the bouncing party, but list bounce handling works fine without it.
Not so much, no. There's no "must" standard for the format of bounce message, deferred bounces are still a thing and mail gets auto-forwarded to addresses which bounce (that is, bounce from an address different than the one you sent to). Without something like VERP to encode the original recipient in the return address, the percentage of bounces your list successfully processes each month will slowly but steadily decline. Broken rDNS is just broken, since there's approximately no reason ever
to send from a host that doesn't know its own name. Broken SPF may or may not be an issue since there are lots of legit ways to send mail that SPF can't describe.
+1
P.S. I'm strongly of the opinion that if a MLM alters the message in
ANY capacity, that it is actually generating a new message. Thus the MLM is the new author. It's just using content strongly based on emails that came into it. - But that's a different discussion that lasted days on the mailman mailing list.
It's an interesting theological argument but it makes little practical difference.
I could not disagree with you more. It's relatively easy to design and implement a system which allows the originating MUA and MTA to offer proof of authority to act on behalf of a given email address. Though possible, systems which would allow intermediate mail handlers to generate proof of authority to handle a message alleged to originate from a particular address don't especially exist and would be much more complex. Systemic and computational complexity is a very practical difference between the two situations. Regards, Bill Herrin -- William Herrin ................ herrin@dirtside.com bill@herrin.us Dirtside Systems ......... Web: <http://www.dirtside.com/>
On 11/29/2017 07:16 PM, William Herrin wrote:
There's no "must" standard for the format of bounce message, deferred bounces are still a thing and mail gets auto-forwarded to addresses which bounce (that is, bounce from an address different than the one you sent to).
Agreed. I wish that more software would use the well defined Delivery Status Notification and Message Disposition Notifications. (RFC 6553)
Without something like VERP to encode the original recipient in the return address, the percentage of bounces your list successfully processes each month will slowly but steadily decline.
I think it's entirely possible to teach MLMs about the most common forms of bounces (DSNs). But it will quickly get into a game of diminishing returns. Especially if the bounce (because it's not going to be the well known DNS format) goes out of it's way to hide something. In that case, the only thing that you could count on (that I'm aware of) is something like VERP. I wonder if SMTP's ORCPT parameter to the RCPT command would cross forwarders. (I'm not holding my breath.) Aside: I'm quite interested in discussing the the following reply, but I suspect it's going to be a bit of a rabbit whole. Is such a discussion appropriate for NANOG? (I'll assume that a lack of reply indicates that the discussion is better had elsewhere.)
I could not disagree with you more. It's relatively easy to design and implement a system which allows the originating MUA and MTA to offer proof of authority to act on behalf of a given email address. Though possible, systems which would allow intermediate mail handlers to generate proof of authority to handle a message alleged to originate from a particular address don't especially exist and would be much more complex. Systemic and computational complexity is a very practical difference between the two situations.
I feel like SPF & DKIM (at least partially) address the former scenario. - I think that SPF and DKIM-ATPS can (at least partially) address the latter. With the latter assuming some sort of established business relationship between the originating and intermediary parties. -- Grant. . . . unix || die
In article <bef74f87-c3b7-b4ae-83c3-6cbbc27b9222@tnetconsulting.net> you write:
Without something like VERP to encode the original recipient in the return address, the percentage of bounces your list successfully processes each month will slowly but steadily decline.
I think it's entirely possible to teach MLMs about the most common forms of bounces (DSNs). But it will quickly get into a game of diminishing returns. Especially if the bounce (because it's not going to be the well known DNS format) goes out of it's way to hide something. In that case, the only thing that you could count on (that I'm aware of) is something like VERP.
If you look at the bounce handling in packages like sympa and mailman, they have lots of heuristics to try to figure out what bounces mean. They work OK but I agree they are far from perfect.
- I think that SPF and DKIM-ATPS can (at least partially) address the latter. With the latter assuming some sort of established business relationship between the originating and intermediary parties.
It's a rathole, it doesn't scale, and it is not a bug that you can send mail to people who you don't already know. If identities were a magic bullet, we'd all be signing with S/MIME. R's, John
On 11/30/2017 11:30 AM, John Levine wrote:
If you look at the bounce handling in packages like sympa and mailman, they have lots of heuristics to try to figure out what bounces mean. They work OK but I agree they are far from perfect.
I never have. Further, I think I'd like to not go insane. I naively would expect that one would look for the most common bounce format (likely standard DSN), then the next most common, ... rinse, lather, repeat. I'd bet that between three and eight formats in, you would have a VERY LARGE portion of bounces covered. I would also configure MLMs to forward unknown bounces to the -owner. Hopefully the -owner would then feed (a sanitized copy of) the unknown bounce type the MLM maintainer(s) to improve said MLM.
It's a rathole, it doesn't scale, and it is not a bug that you can send mail to people who you don't already know.
I wasn't aware that DKIM-ATPS necessitated needing to know who you were going to send to. I thought DKIM-ATPS was meant to allow a 3rd party that you contract to be an "Authorized Third (party) Sender" of email for your domain. Though, that doesn't do anything for recipients forwarding to their new mailbox.
If identities were a magic bullet, we'd all be signing with S/MIME.
I am (and have been for years) a proponent of S/MIME. Though I don't think that it really does anything to help with this paradigm. Unless you are able to filter incoming messages with the intention that all incoming messages MUST be signed and reject (or otherwise filter) unsigned messages. (I think we're still talking about how can an intermediate mail server be authorized to be part of the SMTP end-to-end mail delivery chain. Even if said intermediate mail server is downstream of the sender.) -- Grant. . . . unix || die
In article <3d84c686-aa5f-8180-8a37-be77fef949a8@tnetconsulting.net> you write:
I would also configure MLMs to forward unknown bounces to the -owner. Hopefully the -owner would then feed (a sanitized copy of) the unknown bounce type the MLM maintainer(s) to improve said MLM.
I suppose that would make sense for the 0.1% of mailing lists run by people with the skill and interest to hack on their list software.
It's a rathole, it doesn't scale, and it is not a bug that you can send mail to people who you don't already know.
I wasn't aware that DKIM-ATPS necessitated needing to know who you were going to send to.
ATPS was an experiment that failed. Nobody uses it, it didn't scale.
If identities were a magic bullet, we'd all be signing with S/MIME.
I am (and have been for years) a proponent of S/MIME.
I can't help but note the absence of S/MIME signatures on roughly 100% of all of the messages in this thread.
(I think we're still talking about how can an intermediate mail server be authorized to be part of the SMTP end-to-end mail delivery chain. Even if said intermediate mail server is downstream of the sender.)
Yeah, that's what ARC is intended to do. R's, John
On 11/30/2017 06:47 PM, John Levine wrote:
I suppose that would make sense for the 0.1% of mailing lists run by people with the skill and interest to hack on their list software.
I guess I'm in the 0.1% then.
ATPS was an experiment that failed. Nobody uses it, it didn't scale.
That's sort of what I've gathered.
I can't help but note the absence of S/MIME signatures on roughly 100% of all of the messages in this thread.
I believe that's because the mailing list strips non-text MIME parts, including the S/MIME signatures.
Yeah, that's what ARC is intended to do.
Hum. My understanding of ARC is that it's a way for a server to assert things about what it received. - Where as my interpretation of what we were discussing is the sender authorizing intermediary MTAs to send the message. The former is after the fact, and the latter is before hand. -- Grant. . . . unix || die
Yeah, that's what ARC is intended to do.
Hum. My understanding of ARC is that it's a way for a server to assert things about what it received. - Where as my interpretation of what we were discussing is the sender authorizing intermediary MTAs to send the message. The former is after the fact, and the latter is before hand.
I did a draft of a double signing thing that let the sender say who's expected to sign a modified forwarded version. The big mail systems weren't interested. They want the recipient system to decide. https://datatracker.ietf.org/doc/draft-levine-dkim-conditional/ Regards, John Levine, johnl@iecc.com, Primary Perpetrator of "The Internet for Dummies", Please consider the environment before reading this e-mail. https://jl.ly
On 11/30/2017 07:38 PM, John R. Levine wrote:
I did a draft of a double signing thing that let the sender say who's expected to sign a modified forwarded version. The big mail systems weren't interested. They want the recipient system to decide.
https://datatracker.ietf.org/doc/draft-levine-dkim-conditional/
Okay, I've now read your draft and have some questions. How would the !fs tag enable multiple forwarders? The only way that I can think of is for the originating mail server to DKIM sign the message twice, 1st with the classic DKIM-Signature w/o the !fs tag, and 2nd with a DKIM-Signature that includes the !fs tag with a value of of the recipient's domain. I would assume that would mean that the recipient could then forward the message to a new recipient and that their outgoing mail server would also sign twice, 1st with classic DKIM-Signature w/o the !fs tag, and 2nd with a DKIM-Signature that includes the !fs tag with a value of the new recipient's domain. A1: DKIM-Signature: ... d=domainA.example ... A2: DKIM-Signature: ... d=domainA.example; !fs=domainB.example ... <1st forward> B1: DKIM-Signature: ... d=domainB.example ... B2: DKIM-Signature: ... d=domainB.example; !fs=domainC.example ... <2nd forward> C1: DKIM-Signature: ... d=domainC.example ... C2: DKIM-Signature: ... d=domainC.example; !fs=domainD.example ... <3rd forward> D1: DKIM-Signature: ... d=domainD.example ... D2: DKIM-Signature: ... d=domainD.example; !fs=domainE.example ... <4th forward> E1: DKIM-Signature: ... d=domainE.example ... E2: DKIM-Signature: ... d=domainE.example; !fs=domainF.example ... (I suppose that this pattern could go on forever.) Is this what you were intending? A list of DKIM-Signatures linked via !fs tags? If I do understand correctly, I think that it's intriguing. I'm not aware of anything else that would work quite the same way. -- Grant. . . . unix || die
On Nov 30, 2017, at 1:22 AM, Bjørn Mork <bjorn@mork.no> wrote:
"John Levine" <johnl@iecc.com> writes:
Broken rDNS is just broken, since there's approximately no reason ever to send from a host that doesn't know its own name.
rDNS is not a host attribute, and will therefore tell you exactly nothing about the host.
It tells you something about the competence of the operator and whether the host is intended by the owners to send email. Or, for a more empirical way to look at it, there's reasonable correlation between having missing, generic or incorrect reverse DNS and the host being a source of unwanted or malicious email. Cheers, Steve
Steve Atkins <steve@blighty.com> writes:
On Nov 30, 2017, at 1:22 AM, Bjørn Mork <bjorn@mork.no> wrote:
"John Levine" <johnl@iecc.com> writes:
Broken rDNS is just broken, since there's approximately no reason ever to send from a host that doesn't know its own name.
rDNS is not a host attribute, and will therefore tell you exactly nothing about the host.
It tells you something about the competence of the operator and whether the host is intended by the owners to send email.
No. It only tells you something about the administrative split between IP address management and host management. There is no way my laptop is going to be able to update the rDNS for all addresses it will use in different networks. This does in no way affect its MTA configuration.
Or, for a more empirical way to look at it, there's reasonable correlation between having missing, generic or incorrect reverse DNS and the host being a source of unwanted or malicious email.
Really? Where did you get those numbers? This is a myth. Spam sources are average Internet hosts. The split between working and non-working rDNS is mostly between IPv4 and IPv6, not between ham and spam. And if there is some correlation there, then I'd say that an IPv4 host is more likely to be a spam source than a dual stack or IPv6 only host. Bjørn
On Nov 30, 2017, at 09:55 , Bjørn Mork <bjorn@mork.no> wrote:
Steve Atkins <steve@blighty.com> writes:
On Nov 30, 2017, at 1:22 AM, Bjørn Mork <bjorn@mork.no> wrote:
"John Levine" <johnl@iecc.com> writes:
Broken rDNS is just broken, since there's approximately no reason ever to send from a host that doesn't know its own name.
rDNS is not a host attribute, and will therefore tell you exactly nothing about the host.
It tells you something about the competence of the operator and whether the host is intended by the owners to send email.
No. It only tells you something about the administrative split between IP address management and host management.
There is no way my laptop is going to be able to update the rDNS for all addresses it will use in different networks. This does in no way affect its MTA configuration.
Perhaps a better way to word it is “It tells us something about whether the machine is likely to possess properties which make it generally undesirable for us to accept messages from it directly.” I, for one, have no interest in accepting messages into my mail server directly from your laptop, even if they are legitimately from you to me. I’m perfectly happy to insist that you go via an MTA hosted in a more permanent location on your side first in order to avoid receiving messages directly from the much larger quantity of incompetently administered mailservers, many of which I suspect are not intended by their owners (distinct from their pwn3rs) to be mail servers at all.
Or, for a more empirical way to look at it, there's reasonable correlation between having missing, generic or incorrect reverse DNS and the host being a source of unwanted or malicious email.
Really? Where did you get those numbers? This is a myth. Spam sources are average Internet hosts. The split between working and non-working rDNS is mostly between IPv4 and IPv6, not between ham and spam. And if there is some correlation there, then I'd say that an IPv4 host is more likely to be a spam source than a dual stack or IPv6 only host.
Really? Most of my hosts have working rDNS for both v4 and v6. As to an IPv4 host being a more likely source of SPAM, I’m not convinced about that, either given the amount of SPAM that hits my mailserver via IPv6. Owen
On Thursday, 30 November, 2017 10:55, Bjørn Mork <bjorn@mork.no>, wrote:
Steve Atkins <steve@blighty.com> writes:
On Nov 30, 2017, at 1:22 AM, Bjørn Mork <bjorn@mork.no> wrote:
"John Levine" <johnl@iecc.com> writes:
It tells you something about the competence of the operator and whether the host is intended by the owners to send email.
No. It only tells you something about the administrative split between IP address management and host management.
There is no way my laptop is going to be able to update the rDNS for all addresses it will use in different networks. This does in no way affect its MTA configuration.
Your Laptop should not be an MTA. Perhaps it is a authenticated submission agent sending to MTA, but without properly configured forward/reverse DNS it is not an MTA. Many systems will not accept SMTP from it unless it can authenticate.
Or, for a more empirical way to look at it, there's reasonable correlation between having missing, generic or incorrect reverse DNS and the host being a source of unwanted or malicious email.
Really? Where did you get those numbers? This is a myth. Spam sources are average Internet hosts. The split between working and non- working rDNS is mostly between IPv4 and IPv6, not between ham and spam.
You are incorrect. If DNS is not configured correctly then the spam to ham ratio is pretty much 100% spam with no ham.
And if there is some correlation there, then I'd say that an IPv4 host is more likely to be a spam source than a dual stack or IPv6 only host.
Actually, you are incorrect again. In order of "Spaminess" (most spammy first) you have the following order: IPv4 with incorrectly configured DNS. IPv6 without regard for DNS configuration. IPv4 with correctly configured DNS.
On Nov 30, 2017, at 09:03 , Steve Atkins <steve@blighty.com> wrote:
On Nov 30, 2017, at 1:22 AM, Bjørn Mork <bjorn@mork.no> wrote:
"John Levine" <johnl@iecc.com> writes:
Broken rDNS is just broken, since there's approximately no reason ever to send from a host that doesn't know its own name.
rDNS is not a host attribute, and will therefore tell you exactly nothing about the host.
It tells you something about the competence of the operator and whether the host is intended by the owners to send email.
Or, for a more empirical way to look at it, there's reasonable correlation between having missing, generic or incorrect reverse DNS and the host being a source of unwanted or malicious email.
I’m not so sure about that. Lots of hosts that send unwanted/malicious email have missing, generic, or obviously incorrect rDNS. Lots of hosts that send unwanted/malicious email have valid non-generic possibly correct rDNS. I don’t accept email from the former, but I still get plenty of SPAM from the latter. Unfortunately, until we get widespread deployment of something better than IP reputation based systems, SPAM continues to be a low-cost to the sender side with a high burden on the delivery side and therefore remains a very profitable industry. DKIM certainly could help (though I’m not convinced it’s a 100% effective solution, nor am I particularly convinced we’ve found any particularly effective solutions as yet. Perhaps this is simply the inherent cost of maintaining an open communications infrastructure with a low barrier to entry and the potential for anonymous communications which I believe has value to society and should be preserved. Perhaps someone smarter than I will some day develop a better solution. Owen
In article <B9B24A4F-B0B0-484E-9039-0F68556DE014@delong.com> you write:
Or, for a more empirical way to look at it, there's reasonable correlation between having missing, generic or incorrect reverse DNS and the host being a source of unwanted or malicious email.
I’m not so sure about that.
It's a one way correlation. If the rDNS is busted, you can be pretty sure you don't want the mail. If the rDNS is OK, you need more clues.
Unfortunately, until we get widespread deployment of something better than IP reputation based systems, ...
You might take a look at how current spam filters work. Spamassassin is as good an example as any. It does dynamic weigthted scoring of a lot of factors, of which IP reputation is only one. I find that I can use conservatively run IP blacklists as a cheap prepass to avoid sending the mail to spamassassin at all, but there's a lot more than IP by the time the mail does or does not get delivered. DKIM is useful if have opinions about the reputations of the signing domains, not purely by whether there's a signature.
Perhaps this is simply the inherent cost of maintaining an open communications infrastructure with a low barrier to entry and the potential for anonymous communications which I believe has value to society and should be preserved. Perhaps someone smarter than I will some day develop a better solution.
It seems to be an axiom that any community large enough to be interesting is large enough to contain people who are malicious, so even requiring that people be identified won't help. R's, John
On Nov 30, 2017, at 10:28 , John Levine <johnl@iecc.com> wrote:
In article <B9B24A4F-B0B0-484E-9039-0F68556DE014@delong.com> you write:
Or, for a more empirical way to look at it, there's reasonable correlation between having missing, generic or incorrect reverse DNS and the host being a source of unwanted or malicious email.
I’m not so sure about that.
It's a one way correlation. If the rDNS is busted, you can be pretty sure you don't want the mail. If the rDNS is OK, you need more clues.
Pretty sure, but far from certain. Even this one-way correlation is rather tenuous. It’s mostly harmless because everyone knows that mail servers are filtering on this basis and legitimate senders therefore force themselves into workarounds. In an ideal world, I wouldn’t mind accepting email from Bj0rn’s laptop directly, but today, the price of doing so in SPAM is just too high, so I don’t. Fortunately for everyone’s sake, Bj0rn, while he may not like it, seems to find a way to send his email via some mechanism that allows me to receive it from a host that has working rDNS.
Unfortunately, until we get widespread deployment of something better than IP reputation based systems, ...
You might take a look at how current spam filters work. Spamassassin is as good an example as any. It does dynamic weigthted scoring of a lot of factors, of which IP reputation is only one. I find that I can use conservatively run IP blacklists as a cheap prepass to avoid sending the mail to spamassassin at all, but there's a lot more than IP by the time the mail does or does not get delivered. DKIM is useful if have opinions about the reputations of the signing domains, not purely by whether there's a signature.
Spamassassin is as good an example as any and while it can be effective if you’ve got the cycles to keep it constantly updated and fed with new information and…, it’s a rather large PITA for a small site with an admin that needs to count on most things running on autopilot most of the time in order to survive. So, while it might be a higher-quality solution, I’d argue that it’s not completely “better” in that any autopilotable configuration of it involves a high degree of false negatives or an unacceptable level of false positives.
Perhaps this is simply the inherent cost of maintaining an open communications infrastructure with a low barrier to entry and the potential for anonymous communications which I believe has value to society and should be preserved. Perhaps someone smarter than I will some day develop a better solution.
It seems to be an axiom that any community large enough to be interesting is large enough to contain people who are malicious, so even requiring that people be identified won't help.
People who want to be malicious are usually less willing to do so if they know that they will be identified, so actually, it does help. i.e. rarely to bank robbers sign their names to the robbery note. Owen
On Nov 30, 2017, at 12:11 , valdis.kletnieks@vt.edu wrote:
On Thu, 30 Nov 2017 11:16:09 -0800, Owen DeLong said:
i.e. rarely to bank robbers sign their names to the robbery note.
An amazing number of them use a deposit slip with their name on it for the note.
I’m guessing that the ones that do so only do so once. Owen
I'd love to hear, not here particularly, from someone very knowledgeable about the history of postal fraud and abuse. I suspect there are more than a few parallels and we'd find out how much of our efforts amount to reinventing wheels once one peels away the technical abstractions and jargon. Basically authentication for starters. (And if someone is about to explain the difference between paper and electronic mail, per piece cost and all that, please spare us.) -- -Barry Shein Software Tool & Die | bzs@TheWorld.com | http://www.TheWorld.com Purveyors to the Trade | Voice: +1 617-STD-WRLD | 800-THE-WRLD The World: Since 1989 | A Public Information Utility | *oo*
On 11/30/2017 12:16 PM, Owen DeLong wrote:
it’s a rather large PITA for a small site with an admin that needs to count on most things running on autopilot most of the time in order to survive.
I have to disagree with that. I've been running SpamAssassin for > 15 years and have found it to be mostly trouble free. - I have cron jobs update it's files and rely on milters to accept / tag / reject messages. - I spend very little time caring for / feeding SpamAssassin. Probably < 5 minutes a month.) Sure, I occasionally fiddle with things, but that's because I want to, not because I need to.
So, while it might be a higher-quality solution, I’d argue that it’s not completely “better” in that any autopilotable configuration of it involves a high degree of false negatives or an unacceptable level of false positives.
I've had fairly good luck with autopilot. I also don't see many false negatives. Nor do people report false positives to me. (Granted, I tag at 5 and reject at 15.)
People who want to be malicious are usually less willing to do so if they know that they will be identified, so actually, it does help.
Agreed. -- Grant. . . . unix || die
It's a one way correlation. If the rDNS is busted, you can be pretty sure you don't want the mail. If the rDNS is OK, you need more clues.
Pretty sure, but far from certain.
Even this one-way correlation is rather tenuous. It’s mostly harmless because everyone knows that mail servers are filtering on this basis and legitimate senders therefore force themselves into workarounds.
Having talked to a lot of people who run large mail systems, it's much simpler than that. If you want people to accept your mail, you better have your DNS under control. If it's not important enough to you to make your DNS work, it's not important enough to me to look at what you might try to send.
Fortunately for everyone’s sake, Bj0rn, while he may not like it, seems to find a way to send his email via some mechanism that allows me to receive it from a host that has working rDNS.
Yeah, funny about that.
Spamassassin is as good an example as any and while it can be effective if you’ve got the cycles to keep it constantly updated and fed with new information and…, it’s a rather large PITA for a small site with an admin that needs to count on most things running on autopilot most of the time in order to survive.
That would be me, a daily cron job to install updates does the trick. It's not perfect but it's good enough.
People who want to be malicious are usually less willing to do so if they know that they will be identified, so actually, it does help.
i.e. rarely to bank robbers sign their names to the robbery note.
Of course not. What it means is that now they attack the authentication systems. They do so in many ways, from stealing grandma's credentials on botted computers to buying SIMs in bulk to defeat schemes that want to tie a unique phone number to each account. Regards, John Levine, johnl@iecc.com, Primary Perpetrator of "The Internet for Dummies", Please consider the environment before reading this e-mail. https://jl.ly
On Thu, Nov 30, 2017 at 10:22:40AM +0100, Bj??rn Mork wrote:
rDNS is not a host attribute, and will therefore tell you exactly nothing about the host.
The lack of rDNS disqualifies a system from being a legitimate mail host. The lack of FCrDNS does the same. (Note that it's usually prudent to tempfail some of these cases in order to allow for the circumstance that something is temporarily wonky with DNS. Well-run mail services that are experiencing transient issues will correct those, DNS will once again be working, and queued mail will eventually make it through.) The content of rDNS provides additional information, and some of it's enormously useful: e.g., blah.dynamic.example.com is not a valid mailhost, and immediate rejection is highly advisable. Same for blah.dsl.example.com and blah.unassigned.example.com and many other patterns. And of course depending on the expected mix of spam/nonspam traffic at a particular mail server, there may be no need to accept any mail traffic from blah.example.TLD for many values of "TLD". [1] I just checked on a particular mail server that I'm working on, and in November 2017, 62% of all messages that were rejected were disposed of thusly because they failed rDNS/DNS-related checks. (Which includes things like the above as well as checking HELO, MX validity, etc.) That means that roughly 2/3 of the messages didn't need to be checked against a DNSBL or anything else, reducing the load on valuable shared resources. rDNS/DNS checks are an efficient, reliable, scalable, first-line MTA defense -- and they're quite robust in the face of attempts to game them. ---rsk [1] Or, alternatively, to only accept it at certain MX's designated for the task -- ones which presumably apply higher scrutiny to such traffic than would otherwise be employed. This works for various geoblocking tactics as well.
On Wed, 2017-11-29 at 12:24 -0500, William Herrin wrote:
Alright, so "horribly broken design" overstates the case but there are enough problems that weighting the absence of DKIM at something other than zero will surely do more harm than good.
+1. A DKIM signature by itself means nothing more than someone had the ability to configure DKIM on an email server. The signing domain (d=) is what matters as the signer needs access to the zone in order to be able to publish the key, which may be interpreted as an indication of trust. DMARC requires the signing domain to be either exactly the same or share the same organisational unit with the From address for this reason. Even without DMARC, a receiver *could*, depending on the signing domain, choose to interpret it as a positive signal. This is marginally better than treating any DKIM signature or the absence thereof as a signal of any kind. Personally, unless an author domain is publishing a DMARC policy of reject or quarantine, I don't think recipients should be scoring based on DKIM at all, perhaps with the exception of signing with a revoked key. Ken. -- Ken O'Driscoll / We Monitor Email t: +353 1 254 9400 | w: www.wemonitoremail.com Need to understand deliverability? Now there's a book: www.wemonitoremail.com/book
Eric Kuhnke wrote on 11/29/2017 11:03 AM:
For those who operate public facing SMTPd that receive a large volume of incoming traffic, and accordingly, a lot of spam...
How much weight do you put on an incoming message, in terms of adding additional score towards a possible value of spam, for total absence of DKIM signature?
Spammers can: A) Establish domains that use SPF and DKIM as well as anyone else B) Use the stolen credentials of legitimate accounts on legitimate servers to relay SPAM messages. So the presence of SPF/DKIM does not reliably indicate whether the message is spam or not - only that the sender is "authenticated". The lack of optional tech like SPF and DKIM might be used as a heuristic, but it's not reliable enough to use in practice in my opinion. I wouldn't quarantine or reject messages that are missing these optional technology because the take rate isn't high enough. Where DKIM/SPF really help is when there's a failure that indicates a message has been spoofed. This is a good indication of phishing and is a justified reason to reject or quarantine a message in the interest of your employees or subscribers. Sometimes these will be config errors, but I feel confident telling the sender to take config issues up with their service provider.
On 11/29/2017 01:35 PM, Blake Hudson wrote:
Where DKIM/SPF really help is when there's a failure that indicates a message has been spoofed.
There are other legitimate things that can break DKIM signatures. I have personally seen changes in content type encoding break a DKIM signature. The message was perfectly valid, and only failed DKIM signature validation.
This is a good indication of phishing and is a justified reason to reject or quarantine a message in the interest of your employees or subscribers.
As much as I would like to be able to safely reject on DKIM Signature validation failure, I don't think that it is safe to do so.
Sometimes these will be config errors, but I feel confident telling the sender to take config issues up with their service provider.
Hopefully this will bring the perceived problem to someone's attention who can hypothetically do something to correct it. -- Grant. . . . unix || die
Hi
For those who operate public facing SMTPd that receive a large volume of incoming traffic, and accordingly, a lot of spam...
How much weight do you put on an incoming message, in terms of adding additional score towards a possible value of spam, for total absence of DKIM signature?
No DKIM = not scored. DKIM is not widely used and DKIM does break a lot of mailinglists and sometimes also SRS compliant forwarding. We do score some points if a DKIM header with invalid signature is present. -Benoît Panizzon- -- I m p r o W a r e A G - Leiter Commerce Kunden ______________________________________________________ Zurlindenstrasse 29 Tel +41 61 826 93 00 CH-4133 Pratteln Fax +41 61 826 93 01 Schweiz Web http://www.imp.ch ______________________________________________________
On 11/30/2017 01:53 AM, Benoit Panizzon wrote:
DKIM is not widely used and DKIM does break a lot of mailinglists and sometimes also SRS compliant forwarding.
How does DKIM break SRS compliant forwarding? (Assuming that only the message envelope is modified.) Or are you referring to DMARC's interactions there in? -- Grant. . . . unix || die
participants (18)
-
Benoit Panizzon
-
Bjørn Mork
-
Blake Hudson
-
bzs@theworld.com
-
Chuck Anderson
-
Eric Kuhnke
-
Grant Taylor
-
John Levine
-
John R. Levine
-
Keith Medcalf
-
Ken O'Driscoll
-
Michael Thomas
-
Owen DeLong
-
Rich Kulawiec
-
Stephen Frost
-
Steve Atkins
-
valdis.kletnieks@vt.edu
-
William Herrin