ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] draft-kucherawy-dmarc-rcpts

2016-11-14 09:40:36
On 11/13/2016 09:38 PM, Murray S. Kucherawy wrote:
On Sun, Nov 13, 2016 at 9:39 PM, Mark Delany <sx6un-fcsr7(_at_)qmda(_dot_)emu(_dot_)st <mailto:sx6un-fcsr7(_at_)qmda(_dot_)emu(_dot_)st>> wrote:

    Hi Murray.


Mark!

    > RFC6376 and even RFC4871, but now it's apparently happening

    I'd be interested to hear about the actual scenarios. Are the targeted
    users somehow given an indication that the email verifies and it's
    from a credible domain and yet it contains a malevolent payload?


As I understand the attack:

Spammer tries to send spam to a victim. The MSA blocks this because it's spam. However, the spam filter is not applied to mail sent by the spammer to itself, because why would that be a problem? So the spammer sends itself a piece of spam, which the MSA dutifully signs. Then the spammer downloads that message and remails it using whatever envelope it likes. The signature will continue to validate, carrying the reputation of the signing domain through any whitelist or other system that says this signer tends to send good mail.


This sounds like a misconfiguration problem.It's a problem because it's $spam/$malware/$bad regardless of who the recipient is.

The rule is: if you think it's bad, don't sign it. If you sign it, you own it.

Mike
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html