ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] ISSUE 1525 -- Clarification about posting by first Author

2008-01-17 08:44:34
Michael Thomas wrote:
Eliot Lear wrote:
John L wrote:

Reflection attacks?  How would a few TXT queries make that happen?

It would be the queries themselves I would be worried about. Suppose someone blasts a message to thousands of domains that has many addresses in the From: line. All of sudden all of those domains are under attack.

Perhaps some careful wording about how this is handled can get us around that? I don't know.

You know, I really wonder whether this is a mole hill sized mountain.
I wonder how long it would take for spam filter writers to notice this
kind of attack and write a new rule to send them to the bit bucket. A
week? Less? Not to mention that Baysian filtering would glom onto it
even faster.

        Mike


Ok, perhaps it's nothing. It did occur to me as a potential attack. Perhaps worth adding a line in Security Considerations?
_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

<Prev in Thread] Current Thread [Next in Thread>