] Replay attacks and ISP business models (2024)

Discussion:

] Replay attacks and ISP business models

Sam Hartman

2005-08-01 06:33:41 UTC

Permalink

Hi. I would like to make it very clear that this message is an
individual technical contribution and I'm not speaking as an AD.
MIME-Version: 1.0

I'd like to make sure the issue of replays is covered at the BOF and
is something the IETF community considers carefully before approving a
charter for this working group. I understand this mailing list has
come to accept replays as a cost of DKIM, but I believe that the IETF
as a whole needs to consider that issue. To be clear, I'm asking for
discussion, not saying I believe DKIM is a bad idea. I'm fine with an
informed consensus to proceed.

I'd like to remind the list of section 9.5 of the DKIM base draft.

9.5 Replay Attacks

In this attack, a spammer sends a message to be spammed to an
accomplice, which results in the message being signed by the
originating MTA. The accomplice resends the message,
including the
original signature, to a large number of recipients, possibly
by
sending the message to many compromised machines that act as
MTAs.
The messages, not having been modified by the accomplice,
have valid
signatures.

Partial solutions to this problem involve the use of
reputation
services to convey the fact that the specific email
address is being
used for spam, and that messages from that signer are
likely to be
spam. This requires a real-time detection mechanism in
order to
react quickly enough. However, such measures might be
prone to
abuse, if for example an attacker resent a large number
of messages
received from a victim in order to make them appear to
be a spammer.

I'd like to ask us to think particularly about the impact of this
attack on business models of medium sized ISPs. Fundamentally few
people are going to block all mail from AOL,, Yahoo, Gmail or the
like. However smaller ISPs have been subjected to a wide variety of
problems with various blackhole lists. Sometimes this was because
they were doing something wrong, sometimes the blackhole lists were
doing something wrong. There's a lot of debate about where the right
balance is that I would like to avoid.

However there is a similar issue with DKIM. It's not clear what
policies a medium sized ISP could adopt to avoid being subject to such
an attack. It's not clear how you could maintain a reputation while
still defaulting to providing service to anyone who wants an account.

Do we care? Is this acceptable to the operations communities?

Jim Fenton

2005-08-01 09:31:43 UTC

Permalink

Sam Hartman wrote as an individual contribution:

>However there is a similar issue with DKIM. It's not clear what
>policies a medium sized ISP could adopt to avoid being subject to such
>an attack. It's not clear how you could maintain a reputation while
>still defaulting to providing service to anyone who wants an account.
>
>
There are a few possibilities:

- There was a suggestion of a "revocation ID" that could optionally be
part of the signature. If present, the verifier would need to query the
originating domain (DNS again, probably...) to see if there is a record
indicating that the given revocation ID has indeed been revoked (absence
of a record indicating no revocation). ISPs would potentially apply a
different revocation ID per customer. This warrants further study; if
DNS is used for this, we need to think about both the transaction load
and the amount of negative caching that would need to be done.

- As a business model, ISPs might consider message signing to be a
premium service, for which they either charge extra or vet their
customers more thoroughly. "Free" accounts might not get their mail
signed or might get it signed by some key with a potentially more
dubious reputation.

- Operationally, DKIM might be used with other mechanisms (SenderID/SPF
or CSV for example) and an affirmative result from both would probably
be a better indication that a replay attack is not taking place.
Messages which pass DKIM but fail the other mechanism might be subject
to additional scrutiny.

>
>Do we care? Is this acceptable to the operations communities?
>
>
>
I care. This is an example of where signature-based mechanisms aren't
perfect, but nothing is. Nevertheless, I feel that they still add
significant enough value to be worthwhile. But I'm not an operations
guy, so we need their comments as well.

-Jim

Tony Finch

2005-08-03 22:38:02 UTC

Permalink

On Mon, 1 Aug 2005, Jim Fenton wrote:
>
> - There was a suggestion of a "revocation ID" that could optionally be part of
> the signature. If present, the verifier would need to query the originating
> domain (DNS again, probably...) to see if there is a record indicating that
> the given revocation ID has indeed been revoked (absence of a record
> indicating no revocation). ISPs would potentially apply a different
> revocation ID per customer. This warrants further study; if DNS is used for
> this, we need to think about both the transaction load and the amount of
> negative caching that would need to be done.

The scaling issues here are similar to per-user keys, so I won't repeat
myself.

One thing that hasn't been mentioned yet is the idea of "soft" defences
against replay attacks. For example, a suitable reputation or revocation
service could include a rate-limiting system, so that as well as pass and
fail they could return an intermediate result that would translate into an
SMTP 450 response. This could be used to slow down a bulk mailing until it
becomes clear whether it's good or bad.

Tony.
--
f.a.n.finch <***@dotat.at> http://dotat.at/
BISCAY: WEST 5 OR 6 BECOMING VARIABLE 3 OR 4. SHOWERS AT FIRST. MODERATE OR
GOOD.

Andrew Newton

2005-08-05 07:35:16 UTC

Permalink

On Aug 3, 2005, at 6:38 PM, Tony Finch wrote:

>
> On Mon, 1 Aug 2005, Jim Fenton wrote:
>
>>
>> - There was a suggestion of a "revocation ID" that could
>> optionally be part of
>> the signature. If present, the verifier would need to query the
>> originating
>> domain (DNS again, probably...) to see if there is a record
>> indicating that
>> the given revocation ID has indeed been revoked (absence of a record
>> indicating no revocation). ISPs would potentially apply a different
>> revocation ID per customer. This warrants further study; if DNS
>> is used for
>> this, we need to think about both the transaction load and the
>> amount of
>> negative caching that would need to be done.
>>
>
> The scaling issues here are similar to per-user keys, so I won't
> repeat
> myself.
>
> One thing that hasn't been mentioned yet is the idea of "soft"
> defences
> against replay attacks. For example, a suitable reputation or
> revocation
> service could include a rate-limiting system, so that as well as
> pass and
> fail they could return an intermediate result that would translate
> into an
> SMTP 450 response. This could be used to slow down a bulk mailing
> until it
> becomes clear whether it's good or bad.

Zombies spreading the load around to different points of injection
could get around these "soft" defenses. And given the lack of
clarity in being able to describe the problem we are trying to get
DKIM to solve (as witnessed in the BoF), I find relying on less well-
defined mechanisms to shore up some of the issues with DKIM to be
unpalatable and giving of an incomplete story to observers.

DKIM needs to have a good story regarding defense of replay.
However, I'm now less convinced of Doug's revocation ID idea. It
almost seems that replay can be detected just by monitoring the
number of queries against a user key. This would be especially true
if the other key retrieval methods are used for user keying.

-andy

william(at)elan.net

2005-08-05 07:50:49 UTC

Permalink

On Fri, 5 Aug 2005, Andrew Newton wrote:

> DKIM needs to have a good story regarding defense of replay. However, I'm
> now less convinced of Doug's revocation ID idea. It almost seems that replay
> can be detected just by monitoring the number of queries against a user key.

The problem are those user keys. Yes you could use that, but its
incredebly bad for dns stability (this comes back to the whole point
that public keys in dns is bad and user public keys makes it 10x worse)
where as simple A lookups based on unique id in the signature is fairly
low overhead (but it does mean extra dns lookup).

> This would be especially true if the other key retrieval methods are
> used for user keying.

Correct. Then dns revocation is not as useful.

--
William Leibzon
Elan Networks
***@elan.net

Tony Finch

2005-08-05 07:56:28 UTC

Permalink

On Fri, 5 Aug 2005, william(at)elan.net wrote:
>
> The problem are those user keys. Yes you could use that, but its
> incredebly bad for dns stability (this comes back to the whole point
> that public keys in dns is bad and user public keys makes it 10x worse)
> where as simple A lookups based on unique id in the signature is fairly
> low overhead (but it does mean extra dns lookup).

How unique? Per-domain? per-user? per-message? The latter is much worse
than per-user keys.

Tony.
--
f.a.n.finch <***@dotat.at> http://dotat.at/
BISCAY: WEST 5 OR 6 BECOMING VARIABLE 3 OR 4. SHOWERS AT FIRST. MODERATE OR
GOOD.

william(at)elan.net

2005-08-05 08:04:28 UTC

Permalink

On Fri, 5 Aug 2005, Tony Finch wrote:

> On Fri, 5 Aug 2005, william(at)elan.net wrote:
>>
>> The problem are those user keys. Yes you could use that, but its
>> incredebly bad for dns stability (this comes back to the whole point
>> that public keys in dns is bad and user public keys makes it 10x worse)
>> where as simple A lookups based on unique id in the signature is fairly
>> low overhead (but it does mean extra dns lookup).
>
> How unique? Per-domain? per-user? per-message? The latter is much worse
> than per-user keys.

Its more or less up to the message signer if unique id is there what that
unique id is common for. BTW - why do you think per-message keys are much
worse (assuming that the settings is such that results are not to be
cached)? In my view it cant be any worse then using DNSBL and that seems
to be working ok with multiple lists tested for every received message.

--
William Leibzon
Elan Networks
***@elan.net

Michael Thomas

2005-08-05 08:23:15 UTC

Permalink

william(at)elan.net wrote:

>
>
> On Fri, 5 Aug 2005, Tony Finch wrote:
>
>> On Fri, 5 Aug 2005, william(at)elan.net wrote:
>>
>>>
>>> The problem are those user keys. Yes you could use that, but its
>>> incredebly bad for dns stability (this comes back to the whole point
>>> that public keys in dns is bad and user public keys makes it 10x worse)
>>> where as simple A lookups based on unique id in the signature is fairly
>>> low overhead (but it does mean extra dns lookup).
>>
>>
>> How unique? Per-domain? per-user? per-message? The latter is much worse
>> than per-user keys.
>
>
> Its more or less up to the message signer if unique id is there what that
> unique id is common for. BTW - why do you think per-message keys are
> much worse (assuming that the settings is such that results are not to
> be cached)? In my view it cant be any worse then using DNSBL and that
> seems to be working ok with multiple lists tested for every received
> message.

I'm sorry, but I have a real hard time seeing how one can cry about the
sky falling wrt the prospects of some domains in the future delegating
large numbers of selectors while on the other hand saying that per-message
lookups to the home domain from every receiver will not. At the very
least, you can't have it both ways.

Mike

Douglas Otis

2005-08-05 10:18:15 UTC

Permalink

On Aug 5, 2005, at 10:23 AM, Michael Thomas wrote:

>
> william(at)elan.net wrote:
>
>
>>
>>
>> On Fri, 5 Aug 2005, Tony Finch wrote:
>>
>>
>> Its more or less up to the message signer if unique id is there
>> what that
>> unique id is common for. BTW - why do you think per-message keys
>> are much worse (assuming that the settings is such that results
>> are not to be cached)? In my view it cant be any worse then using
>> DNSBL and that seems to be working ok with multiple lists tested
>> for every received message.
>>
>
> I'm sorry, but I have a real hard time seeing how one can cry about
> the
> sky falling wrt the prospects of some domains in the future delegating
> large numbers of selectors while on the other hand saying that per-
> message
> lookups to the home domain from every receiver will not. At the very
> least, you can't have it both ways.

This "bad-list" lookup would have a minor impact as a negative
result. This lookup would not need to be made when the HELO is with
the signature's domain. A user-key lookup would likely be just as
frequent due to DNS cache concerns. As least with the revocation-
identifier there could be a method to eliminate the lookup in most
cases. A bad identifier could be safely given a long time to live as
well.

-Doug

Douglas Otis

2005-08-05 10:11:49 UTC

Permalink

On Aug 5, 2005, at 9:35 AM, Andrew Newton wrote:

>
>
> On Aug 3, 2005, at 6:38 PM, Tony Finch wrote:
>
>>
>> One thing that hasn't been mentioned yet is the idea of "soft"
>> defences
>> against replay attacks. For example, a suitable reputation or
>> revocation
>> service could include a rate-limiting system, so that as well as
>> pass and
>> fail they could return an intermediate result that would translate
>> into an
>> SMTP 450 response. This could be used to slow down a bulk mailing
>> until it
>> becomes clear whether it's good or bad.
>>
>
> Zombies spreading the load around to different points of injection
> could get around these "soft" defenses. And given the lack of
> clarity in being able to describe the problem we are trying to get
> DKIM to solve (as witnessed in the BoF), I find relying on less
> well-defined mechanisms to shore up some of the issues with DKIM to
> be unpalatable and giving of an incomplete story to observers.
>
> DKIM needs to have a good story regarding defense of replay.
> However, I'm now less convinced of Doug's revocation ID idea. It
> almost seems that replay can be detected just by monitoring the
> number of queries against a user key. This would be especially
> true if the other key retrieval methods are used for user keying.

The use of the DNS query would provide some warning especially with
respect to the revocation-identifier. There would be much less to
differentiate abuse with a common key on a large domain. I assume
you are suggesting that per-user keys would be a solution for large
domains, which seems to be a reason you now indicate DKIM
specifically protects the mailbox address. While this could be
attempted, it would not be always true. When this is true or not
true would not be apparent. I would say it is safer to declare that
DKIM provides an accountable domain. Yes, key servers would better
support per-user keys. Will DKIM get per-user keys off the ground.
Is that the goal of DKIM?

I would also say that for DKIM to have a benefit, finding an
accountable domain is not enough. This domain must be able to take
positive action to stop abuse. This was the idea behind the
revocation-identifier.

-Doug

John Levine

2005-08-06 01:11:46 UTC

Permalink

> It almost seems that replay can be detected just by monitoring the
> number of queries against a user key.

Only if you know in advance how many times a message will legitimately
be delivered and can see through the recipients' DNS caches to know
how many times a key was fetched, neither of which seems very likely.

Before we can describe a replay defense, the people who are concerned
about replay need to define what replay means, i.e., what's the
technical difference between a replay and a valid delivery. The
definition can't require knowledge of people's mental states.

R's,
John

Andrew Newton

2005-08-06 06:31:38 UTC

Permalink

On Aug 5, 2005, at 9:11 PM, John Levine wrote:

>
>
>> It almost seems that replay can be detected just by monitoring the
>> number of queries against a user key.
>>
>
> Only if you know in advance how many times a message will legitimately
> be delivered

Or if you see that a particular user key is being queries a million
times while most user keys are only queried hundreds of times in a
certain time period, that might be a clue that something is up.

> and can see through the recipients' DNS caches to know
> how many times a key was fetched, neither of which seems very likely.

That all depends on how far and wide the replay is being used. But
this is why I also added "This would be especially true if the other
key retrieval methods are used for user keying."

> Before we can describe a replay defense, the people who are concerned
> about replay need to define what replay means, i.e., what's the
> technical difference between a replay and a valid delivery. The
> definition can't require knowledge of people's mental states.

You don't like the description of replay attacks in Section 9.5 of
DKIM-base?

-andy

John R Levine

2005-08-06 15:07:14 UTC

Permalink

> > Only if you know in advance how many times a message will legitimately
> > be delivered
>
> Or if you see that a particular user key is being queries a million
> times while most user keys are only queried hundreds of times in a
> certain time period, that might be a clue that something is up.

Right. He might be sending mail to an active mailing list.

> > Before we can describe a replay defense, the people who are concerned
> > about replay need to define what replay means, i.e., what's the
> > technical difference between a replay and a valid delivery. The
> > definition can't require knowledge of people's mental states.
>
> You don't like the description of replay attacks in Section 9.5 of
> DKIM-base?

No, because it depends on the mental state of "spammer" and
"accomplice". Here's section 9.5 with minor edits to make its
terminology more consistent with other RFCs:

9.5 Replay Attacks

In this attack, a user sends a message to be distributed to a
mailing list, which results in the message being signed by the
originating MTA. The mailing list resends the message, including the
original signature, to a large number of recipients, possibly by
sending the message to many intermediate exploders that act as MTAs.
The messages, not having been modified by the mailing list, have valid
signatures.

Regards,
John Levine, ***@iecc.com, Primary Perpetrator of "The Internet for Dummies",
Information Superhighwayman wanna-be, http://iecc.com/johnl, Mayor
"I dropped the toothpaste", said Tom, crestfallenly.

wayne

2005-08-06 21:04:38 UTC

Permalink

In <43DA5981-5166-4AB3-A305-***@hxr.us> Andrew Newton <***@hxr.us> writes:

> On Aug 5, 2005, at 9:11 PM, John Levine wrote:
>
>>
>>
>>> It almost seems that replay can be detected just by monitoring the
>>> number of queries against a user key.
>>>
>>
>> Only if you know in advance how many times a message will legitimately
>> be delivered
>
> Or if you see that a particular user key is being queries a million
> times while most user keys are only queried hundreds of times in a
> certain time period, that might be a clue that something is up.

I've heard this line of argument that measuring per-user DKIM lookups
to detect and stop the replay attack before, but I just don't think it
will work.

First off, that implies that the large ISPs, email hosters, or anyone
who can have spammers easily sign up for their services, will need to
do per-user DKIM keys. Elsewhere on this list, I've seen it argued
that per-user keys will be rare. Certainly, if every
yahoo/aol/hotmail/etc user had their own key, the amount of DNS
caching is going to be very significant.

Secondly, you have to do something about the DoS attack on user
accounts of victims by having bad people do lots of queries to
trigger the "this must be spam" detection systems and have victims'
accounts shut down.

And, thirdly, as JohnL points out:

In <***@tom.iecc.com> "John R Levine" <***@iecc.com> writes:

> No, because it depends on the mental state of "spammer" and
> "accomplice". Here's section 9.5 with minor edits to make its
> terminology more consistent with other RFCs:
>
> 9.5 Replay Attacks
>
> In this attack, a user sends a message to be distributed to a
> mailing list, which results in the message being signed by the
> originating MTA. The mailing list resends the message, including the
> original signature, to a large number of recipients, possibly by
> sending the message to many intermediate exploders that act as MTAs.
> The messages, not having been modified by the mailing list, have valid
> signatures.

Indeed. Spammers have been known to use bob-standard mailing list
software to deliver their spam. It is a little less common now, but
technically, that is all they are doing.

One minor difference between what spammers do now a days and mailing
lists, is that mailing lists tend to send from a much smaller set of
IP addresses than the thousands of zombies that spammers use. I'm not
sure how that difference can be detected for our purposes though, and
I'm not sure that this is a stable difference that we can use.

Back in Jan 2004, when I posted my first thoughts on DK, I mentioned
that Razor/DCC/Pyzor could detect replayed messages, but that means that
in order to make DKIM work, you have to also use another new
protocol. While Razor/DCC/Pyzor try to do their own caching, you are
still basically requiring a per-email call-back to verify whether the
email is bulk. Then you need to do something to decide if the email
is unsolicited, because simply being bulk isn't bad.

Personally, I use both DCC and pyzor on a per-email basis as part of
my spamassassin setup. I don't have any objections to this, and I
think DKIM would be great because the detection rates on DCC/Pyzor
would be very high. However, I've heard a lot of screaming from many
different sources about how how callbacks are unacceptable. YMMV.

-wayne

John Levine

2005-08-06 22:05:22 UTC

Permalink

>9.5 Replay Attacks
>
> In this attack, a user sends a message to be distributed to a
> mailing list, which results in the message being signed by the
> originating MTA. The mailing list resends the message, including the
> original signature, to a large number of recipients, possibly by
> sending the message to many intermediate exploders that act as MTAs.
> The messages, not having been modified by the mailing list, have valid
> signatures.

If I may reply to myself here, I know of a variety of ways to detect
multiple message deliveries. We've been doing that for years with
DCC. What I don't see is the difference between the multiple
deliveries that are due to "replay" and the ones that are just normal
mail deliveries. That's why I'm still waiting for a useful definition
of "replay", better than "multiple deliveries that we don't like."

DCC users are all familiar with this problem, since it means that we
have to manually whitelist all of the mailing lists we subscribe to to
keep them from being caught by DCC. Having lived with it for a couple
of years, I strongly think that it's not something that we should try
to mix into a signature authentication scheme. If it's important for
DKIM, why wasn't it equally important for S/MIME and PGP?

R's,
John

Douglas Otis

2005-08-07 00:56:11 UTC

Permalink

On Sat, 2005-08-06 at 22:05 +0000, John Levine wrote:
>
> DCC users are all familiar with this problem, since it means that we
> have to manually whitelist all of the mailing lists we subscribe to to
> keep them from being caught by DCC. Having lived with it for a couple
> of years, I strongly think that it's not something that we should try
> to mix into a signature authentication scheme. If it's important for
> DKIM, why wasn't it equally important for S/MIME and PGP?

This concern seems to center on the general goals of DKIM. Rather than
declaring user-keys, as with S/MIME and OpenPGP, DKIM allows the entire
domain to share the same public key. When done in this fashion, the
impact created by per-domain keys, rather per-user keys, would represent
an incremental increase of traffic carried by DNS. Domains also provide
non-uniform distribution of use, which also helps to minimize the
impact. Here DKIM establishes an accountable domain that should respond
to reports of abuse, in order to retain a good reputation and to protect
their recipients.

User-keys in DNS could have a significant impact on DNS traffic. When
compared to the overall traffic carried by the the messages, this would
represent just a percentage of increase. But when considering the
impact on DNS cache, the effects could be far greater. Perhaps one
solution for protecting the DNS cache would be to severely limit any TXT
or KEY record's TTL. However, short TTLs for user-keys AND domain-keys
would impact the overall performance of email, as every operation would
likely suffer a DNS lookup, with perhaps an increase in the already high
DNS response loss rate. With long time-outs and damage to DNS cache,
the affect that user-keys may have on DNS could be damaging other
applications as well.

With per-user keys, such as with S/MIME, key revocation is solution to
address abusive behavior, which includes abusive replay. When not using
IP address based reputation, but instead depending upon a verified
signature, the normal means to protection reputation are lost. These
normal techniques include rate limiting, monitoring log errors, and of
course canceling accounts. None of these normal techniques will be
affective against abusive replay. With a domain-key used across a large
domain, key revocation is not practical, nor perhaps is the use of user-
keys in DNS. This does not mean there is no solution. It is clear the
revocation-identifier mechanism suggested to address this issue, is not
well understood.

Indeed there could be a centralized repository that holds the hash of
all signatures used in messages identified as abusive. The definition
of abusive is always established by this central repository. There is
no need to define abuse, this third-party must establish the criteria
for abuse.

The revocation-identifier offers an alternative. The signing domain
that receives reports of abuse based upon the revocation-identifier,
could create their own revocation-identifier "bad-list" in the same
manner as a black-hole list (which is currently done at every
connection). A negative results is short lived and uses a minimum of
resources. The signing domain would have the ability to defend their
reputation, and act quickly when there are reports of abuse. The
revocation-identifier would not depend upon monitoring DNS logs either,
as some have suggested.

To reduce the burden of doing an A record lookup to check whether a
revocation-identifier is in the bad-list, this step could be skipped
when the HELO is within the signing domain. In this case, even a
reputation check done on the HELO would not need to be repeated for the
signing domain either. By allowing this two step HELO/signing domain
check, there is a means to defend network resources from DoS attacks as
well.

A centralized hash of signatures of known bad messages simply does not
scale as well, can not be as responsive, nor will this centralized
approach provide those directly affected any say. If anything, the
problems this centralized approach could create may lead to abandoning
the use of domain-keys. This may be replaced by user-keys, or the
entire scheme dropped as unworkable.

A user-key is key delegation. It makes no sense to say some delegation
is absolutely required, but then leave those domains that don't give
each and every user their own key, no means to address replay abuse. I
don't agree that the 'g=local-part' is not a user-key. This muddling
with user-key definitions represents a failure to recognize what DKIM is
providing, an accountable domain.

Some company may want to provide an ad agency a delegated key. The ad
agency will likely be well compensated and would hope for a continued
relationship. There are any number of messages this ad agency could
send that would cause them to have their key revoked and their
relationship terminated. Publishing the message with the wrong local-
part would be likely low on the list of potential problems. I would
suggest a flag be added that indicates the key is delegated where the
selector is then treated as the revocation-identifier.

There should also be a provision to indicate that "third-part"
signatures be allowed only when within the signing domain. This would
permit a company to delegate keys to less trust-worthy entities, but
where they clearly indicate these keys represent different accountable
domains. Those with sufficient clue could quickly locate those
accountable for delegating the keys causing a problem. Allowing the
domain themselves an ability to quickly stop a problem would be the best
method to prevent future problems.

Either the domain is accountable and is both careful and responsive with
respect to key delegation, or they are not. Those that are not, deserve
the reputation they obtain. It is unreasonable to expect there can be a
policy that says only this amount of a user-key approach can be used in
DNS. Recognize that DNS can not properly support a user-key approach.
By allowing the sub-domain "third-party" signature restriction actually
better mitigates the risks of delegating keys.

DKIM does not assure the local-part! Ever. Those that wish to make this
assurance must do so independent of DKIM. One method would be provide
authenticated access to their administrated SMTP servers on port 587, or
even port 443 if needed. Otherwise, the sub-domain "third-party"
signature restriction is still much better than nothing. I would even
argue, much better than user-keys in DNS.

-Doug

Tony Finch

2005-08-07 07:06:17 UTC

Permalink

On Sat, 6 Aug 2005, Douglas Otis wrote:
>
> User-keys in DNS could have a significant impact on DNS traffic. When
> compared to the overall traffic carried by the the messages, this would
> represent just a percentage of increase. But when considering the
> impact on DNS cache, the effects could be far greater. Perhaps one
> solution for protecting the DNS cache would be to severely limit any TXT
> or KEY record's TTL. However, short TTLs for user-keys AND domain-keys
> would impact the overall performance of email, as every operation would
> likely suffer a DNS lookup, with perhaps an increase in the already high
> DNS response loss rate. With long time-outs and damage to DNS cache,
> the affect that user-keys may have on DNS could be damaging other
> applications as well.

DNS performance depends on the cacheing of NS records, not leaf records,
so forcing short TTLs on DKIM records won't have much impact.

Tony.
--
f.a.n.finch <***@dotat.at> http://dotat.at/
BISCAY: WEST 5 OR 6 BECOMING VARIABLE 3 OR 4. SHOWERS AT FIRST. MODERATE OR
GOOD.

Douglas Otis

2005-08-07 08:52:05 UTC

Permalink

On Sun, 2005-08-07 at 08:06 +0100, Tony Finch wrote:
> On Sat, 6 Aug 2005, Douglas Otis wrote:
> >
> > User-keys in DNS could have a significant impact on DNS traffic. When
> > compared to the overall traffic carried by the the messages, this would
> > represent just a percentage of increase. But when considering the
> > impact on DNS cache, the effects could be far greater. Perhaps one
> > solution for protecting the DNS cache would be to severely limit any TXT
> > or KEY record's TTL. However, short TTLs for user-keys AND domain-keys
> > would impact the overall performance of email, as every operation would
> > likely suffer a DNS lookup, with perhaps an increase in the already high
> > DNS response loss rate. With long time-outs and damage to DNS cache,
> > the affect that user-keys may have on DNS could be damaging other
> > applications as well.
>
> DNS performance depends on the cacheing of NS records, not leaf records,
> so forcing short TTLs on DKIM records won't have much impact.

Increasing the amount of DNS traffic will impact the time required to
obtain any requisite DNS record for any application. I was attempting
to include both possible strategies, one with a higher level of DNS
traffic when key records bypass the DNS cache as a reaction to user-key
use, or one where the DNS cache may be unable to accommodate the
resulting orders of magnitude increase in resource record data. Again,
I think this requires study. The traffic generated by user-keys in DNS
would be further increased when the DNS cache is bypassed for just these
records.

-Doug

Andrew Newton

2005-08-07 00:33:01 UTC

Permalink

On Aug 6, 2005, at 11:07 AM, John R Levine wrote:
> No, because it depends on the mental state of "spammer" and
> "accomplice".

How interesting that you think we cannot describe an attack unless we
know the mental state of the attacker. I really don't know the
mental state of the spammers who send most of the spam I receive,
does that mean I cannot begin to describe how they sent the spam? If
victims of a bank robbery cannot tell the police that the bank robber
did it to feed his family or just to be rich, does that mean the
police have to ignore any details of the robbery given to them by the
victims?

> Here's section 9.5 with minor edits to make its
> terminology more consistent with other RFCs:
>
> 9.5 Replay Attacks
>
> In this attack, a user sends a message to be distributed to a
> mailing list, which results in the message being signed by the
> originating MTA. The mailing list resends the message,
> including the
> original signature, to a large number of recipients, possibly by
> sending the message to many intermediate exploders that act as
> MTAs.
> The messages, not having been modified by the mailing list, have
> valid
> signatures.

Actually, I was thinking that zombies would be the primary vehicles
for the replay. This mailing list centric view of the attack would
lead people to believe that it is the only method. I much prefer the
current wording.

On Aug 6, 2005, at 5:04 PM, wayne wrote:
> First off, that implies that the large ISPs, email hosters, or anyone
> who can have spammers easily sign up for their services, will need to
> do per-user DKIM keys.

For domains with more than a few users, yes.

> Elsewhere on this list, I've seen it argued
> that per-user keys will be rare.

Technologists have a fairly poor track record with predicting the
future, especially with regard to how others will use technology.

> Certainly, if every
> yahoo/aol/hotmail/etc user had their own key, the amount of DNS
> caching is going to be very significant.
>
> Secondly, you have to do something about the DoS attack on user
> accounts of victims by having bad people do lots of queries to
> trigger the "this must be spam" detection systems and have victims'
> accounts shut down.

Good point. But the revocation ID suffers from the same problem.

> Back in Jan 2004, when I posted my first thoughts on DK, I mentioned
> that Razor/DCC/Pyzor could detect replayed messages, but that means
> that
> in order to make DKIM work, you have to also use another new
> protocol. While Razor/DCC/Pyzor try to do their own caching, you are
> still basically requiring a per-email call-back to verify whether the
> email is bulk. Then you need to do something to decide if the email
> is unsolicited, because simply being bulk isn't bad.
>
> Personally, I use both DCC and pyzor on a per-email basis as part of
> my spamassassin setup. I don't have any objections to this, and I
> think DKIM would be great because the detection rates on DCC/Pyzor
> would be very high. However, I've heard a lot of screaming from many
> different sources about how how callbacks are unacceptable. YMMV.

It would seem that if they become acceptable just to prevent replay
for DKIM, then there are a host of other options that should be
acceptable.

-andy

John R Levine

2005-08-07 03:03:19 UTC

Permalink

> How interesting that you think we cannot describe an attack unless we
> know the mental state of the attacker.

In this case you are correct, because there is no technical difference
between a "replay attack" and a "mailing list". Your bank robbery
example fails because there are plenty of differences other than mental
state between a normal withdrawal and a bank robbery.

> I really don't know the mental state of the spammers who send most of
> the spam I receive, does that mean I cannot begin to describe how they
> sent the spam?

You can do so, but that's not what you're doing. You are making a
prediction about how they might send spam in the future, without anything
other than your hunch to back it up.

> Actually, I was thinking that zombies would be the primary vehicles
> for the replay. This mailing list centric view of the attack would
> lead people to believe that it is the only method. I much prefer the
> current wording.

Oh, my. I would have thought my point would be blindingly obvious, but I
guess I'm still not getting through. First, I am NOT saying that spammers
will spam through mailing lists. Here's what I'm saying:

Every description of a "replay attack" is also a description of a
mailing list. Anything that stops mail delivered by "replay attacks"
will also stop mail delivered by mailing lists. The only difference
between the two is mental state. If we think it's spam, it's
a replay attack, if think it's good mail it's a mailing list.

The point of my reworded section 9.5 was to show that its description of a
replay attack is also a description of a mailing list. If you think
they're different, you need give us a way to tell them apart without
resorting to mental states. Having used bulk counters for a couple of
years, I'm fairly sure it's not possible, since if it were, we'd have come
up with something better than a per-list whitelist to keep list mail from
being tagged by DCC. But please, prove me wrong, show us how to tell list
mail from spam by technical means.

If you're going to say that if it's from a zombie it's a replay attack, I
think you're wrong, but if you're right, that's great, all we have to do
is block mail from zombies, something we all try to do anyway and that has
no relation at all to mail signatures, and the problem is solved.

I see no reason to believe that spammers would send massive numbers of
identical messages through zombies, since they don't now. What I see from
DCC and in catchall accounts that collect multiple spams is spammers who
mutate messages to defeat bulk detectors. Since bulk detectors exist now
and are fairly effective (give or take the arms race to recognize the
mutated messages as similar), the direction I see is for spammers to
increase the diversity of what they send, not decrease it.

R's,
John

PS:

> Technologists have a fairly poor track record with predicting the
> future, especially with regard to how others will use technology.

No disagreement there.

Andrew Newton

2005-08-07 11:16:30 UTC

Permalink

On Aug 6, 2005, at 11:03 PM, John R Levine wrote:

> First, I am NOT saying that spammers
> will spam through mailing lists.

Good. Otherwise we can drop section A.4 and quit worrying about
signatures surviving mailings lists and mailings lists resigning
messages. BTW: is the last paragraph in A.4 up to date?

> Here's what I'm saying:
>
> Every description of a "replay attack" is also a description of a
> mailing list.

But if it is the action of just sending the mail by the mailing list
and not the forwarding (as you said you are NOT saying above), then
this is no different than anybody sending mail.

So I don't see your point.

-andy

John R Levine

2005-08-07 16:39:08 UTC

Permalink

> > First, I am NOT saying that spammers
> > will spam through mailing lists.
>
> Good. Otherwise we can drop section A.4 and quit worrying about
> signatures surviving mailings lists and mailings lists resigning
> messages. BTW: is the last paragraph in A.4 up to date?

I've always said it's not worth worrying about. Some lists pass mail
through verbatim so any signatures will survive. Other lists rewrite
HTML, add headers and footers, add, delete, and reorder MIME parts so no
signature could survive. Other lists are at any imaginable point in
between. Jim Fenton has been one of the more articulate advocates of list
survival so he should be able to explain the rationale.

> So I don't see your point.

Yeah. Let's try an example. You're running an ISP, and you're using a
swell new signature system which includes an anti-replay feature that can
detect multiple deliveries. You have two users, A and B, that each send
out a message, and five minutes later the replay detector goes off and
tells you that each message has been delivered a thousand times. Uh, oh.

One of the users is a spammer who sent a message to an accomplice who
spammed it out to a thousand victims. The other user sent mail to a
mailing list that happens not to break signatures, and the list sent the
mail out to a thousand subscribers.

To make the comparison easier, assume that the accomplice is using zombies
that relay mail through their ISP's MTA (quite common now), and the
mailing list is on a small business line that sends mail through its ISP's
MTA, so all two thousand detected deliveries came from normal ISP MTAs.

Which user is the spammer and which is the list subscriber? Which account
do you cancel? How do you tell which is which?

R's,
John

Michael Thomas

2005-08-07 19:38:57 UTC

Permalink

John Levine wrote:
>>It almost seems that replay can be detected just by monitoring the
>>number of queries against a user key.
>
>
> Only if you know in advance how many times a message will legitimately
> be delivered and can see through the recipients' DNS caches to know
> how many times a key was fetched, neither of which seems very likely.
>
> Before we can describe a replay defense, the people who are concerned
> about replay need to define what replay means, i.e., what's the
> technical difference between a replay and a valid delivery. The
> definition can't require knowledge of people's mental states.

I agree. I think that the thing that really ought to
be proven here is whether "replay" is a real threat or
not. At this point, it is purely academic and I think we
have a pretty spotty track record of determining what the
miscreants next steps will actually be. For one, it's not
clear that if domains -- in an effort to maintain their
reputation -- start spam-filtering their outbound mail,
you'd reduce the effectiveness of the so-called replay
attack by about 2 orders of magnitude. It seems to me that
it's pretty likely that they'll find something else to do
if that scenario plays out.

Mike

wayne

2005-08-08 00:24:13 UTC

Permalink

In <***@mtcc.com> Michael Thomas <***@mtcc.com> writes:

>
> I agree. I think that the thing that really ought to
> be proven here is whether "replay" is a real threat or
> not. At this point, it is purely academic and I think we
> have a pretty spotty track record of determining what the
> miscreants next steps will actually be.

I don't think the replay attack is purely academic. There is an
extremely long history of spammers doing all sorts of things to ride
on the reputation of others. That includes signing up for free email
accounts on the hopes that people won't reject email from
$large_emailer, trying to get on things like bondedsender/iadb,
sending email $big_isp's MTAs, and, of course forging email
addresses.

Are you seriously suggesting not worrying about the replay attack
until it is widespread?

> For one, it's not
> clear that if domains -- in an effort to maintain their
> reputation -- start spam-filtering their outbound mail,
> you'd reduce the effectiveness of the so-called replay
> attack by about 2 orders of magnitude. It seems to me that
> it's pretty likely that they'll find something else to do
> if that scenario plays out.

I don't see how filtering their outbound will help much in preventing
the reply attack. At the time the original email is sent, it is
neither bulk nor unsolicited. It is only once it is recent to
millions that it becomes bulk and unsolicited. While I'm not one of
those people who think that content is 100% irrelevant and and should
never be checked as part of spam filtering, I do think that trying to
detect spam based solely on the content is a bad idea and won't work.

-wayne

Michael Thomas

2005-08-08 01:02:11 UTC

Permalink

wayne wrote:
> Are you seriously suggesting not worrying about the replay attack
> until it is widespread?

Widespread is different than seen in the wild. At this point,
there's no evidence that I'm aware of that it's been seen
in the wild. I wouldn't expect it for quite some time --
why would they bother right now? A lot can happen between
then and now, so I'm not sure that proceeding way down _any_
one line of defense is all that wise.

>> For one, it's not
>>clear that if domains -- in an effort to maintain their
>>reputation -- start spam-filtering their outbound mail,
>>you'd reduce the effectiveness of the so-called replay
>>attack by about 2 orders of magnitude. It seems to me that
>>it's pretty likely that they'll find something else to do
>>if that scenario plays out.
>
>
>
> I don't see how filtering their outbound will help much in preventing
> the reply attack.

It doesn't prevent it, it just makes it less likely to be
a viable vector: if 99% of your spam campaign is not leaving
the outbound ISP, my guess is that you're going to look for
other distribution mechanisms. We're already seeing a shift
on that anyway, right? With zombies, right?

I really like the formulation I heard here: a lot of the
utility of signing is in just getting spammers and other
miscreants to attack somebody else instead of me. Eventually
we may be able to close the noose, but until then I'd just
assume at least they not sully my name.

Mike

wayne

2005-08-08 01:33:15 UTC

Permalink

In <***@mtcc.com> Michael Thomas <***@mtcc.com> writes:

> wayne wrote:
>> Are you seriously suggesting not worrying about the replay attack
>> until it is widespread?
>
> Widespread is different than seen in the wild. At this point,
> there's no evidence that I'm aware of that it's been seen
> in the wild. I wouldn't expect it for quite some time --
> why would they bother right now?

You snipped the part where I explained that spammers have had a long
history of riding on other people's good reputations. Any system that
can not deal with that is useless. That is why we have to bother
RIGHT NOW.

> A lot can happen between
> then and now, so I'm not sure that proceeding way down _any_
> one line of defense is all that wise.

I strongly disagree. Spammers can adapt very quickly and have done so
in the past.

>>> For one, it's not
>>>clear that if domains -- in an effort to maintain their
>>>reputation -- start spam-filtering their outbound mail,
>>>you'd reduce the effectiveness of the so-called replay
>>>attack by about 2 orders of magnitude. It seems to me that
>>>it's pretty likely that they'll find something else to do
>>>if that scenario plays out.
>> I don't see how filtering their outbound will help much in preventing
>> the reply attack.
>
> It doesn't prevent it, it just makes it less likely to be
> a viable vector: if 99% of your spam campaign is not leaving
> the outbound ISP, my guess is that you're going to look for
> other distribution mechanisms. We're already seeing a shift
> on that anyway, right? With zombies, right?

That is the whole point of the the replay attack, you only need one
email to leave the outbound ISP with the signature, and then you can
send it a million times via other sources.

Or, if you are saying that all spam problems can be solved if all mail
sources do a better job of filtering on the outbound, then sure. But
then, what is the point of DKIM?

> I really like the formulation I heard here: a lot of the
> utility of signing is in just getting spammers and other
> miscreants to attack somebody else instead of me. Eventually
> we may be able to close the noose, but until then I'd just
> assume at least they not sully my name.

But with the replay attack, there isn't any reason for the spammers to
attack anyone else. They want the reputation of others to help them
pass spam filters.

-wayne

Michael Thomas

2005-08-08 18:19:12 UTC

Permalink

wayne wrote:
> In <***@mtcc.com> Michael Thomas <***@mtcc.com> writes:
> >> A lot can happen between
>>then and now, so I'm not sure that proceeding way down _any_
>>one line of defense is all that wise.
>
>
> I strongly disagree. Spammers can adapt very quickly and have done so
> in the past.

That's rather the point. Anything that attempts to deal with
this problem would be a *very* long slog. I'm sure they'd like
nothing better than us wasting tons of resources on routes
they don't take. It's not like they don't read these mailing
lists too.

>>I don't see how filtering their outbound will help much in preventing
>>>the reply attack.
>>
>>It doesn't prevent it, it just makes it less likely to be
>>a viable vector: if 99% of your spam campaign is not leaving
>>the outbound ISP, my guess is that you're going to look for
>>other distribution mechanisms. We're already seeing a shift
>>on that anyway, right? With zombies, right?
>
> Or, if you are saying that all spam problems can be solved if all mail
> sources do a better job of filtering on the outbound, then sure. But
> then, what is the point of DKIM?

"Solved", no. Mitigated, possibly. And there's still plenty of
motivation for DKIM; like, for instance, that it will actually
give some motivation for domains to police their servers. That
and it will make running an anonymous (ie, not attached to a
domain) zombie farm harder eventually. Both of those would be
good things.

>>I really like the formulation I heard here: a lot of the
>>utility of signing is in just getting spammers and other
>>miscreants to attack somebody else instead of me. Eventually
>>we may be able to close the noose, but until then I'd just
>>assume at least they not sully my name.
>
>
> But with the replay attack, there isn't any reason for the spammers to
> attack anyone else. They want the reputation of others to help them
> pass spam filters.

Why would they do that now? Maybe we'll end up in the place
where this is a real live problem, but we can deal with it
then. I mean, we're not even talking about dealing with reputation
and/or accreditation in this working group and that's a *very*
obvious next step, IMO -- much more so than this attack.

Mike

Douglas Otis

2005-08-08 01:42:12 UTC

Permalink

On Sun, 2005-08-07 at 18:02 -0700, Michael Thomas wrote:
> wayne wrote:

> > I don't see how filtering their outbound will help much in preventing
> > the reply attack.
>
> It doesn't prevent it, it just makes it less likely to be
> a viable vector: if 99% of your spam campaign is not leaving
> the outbound ISP, my guess is that you're going to look for
> other distribution mechanisms. We're already seeing a shift
> on that anyway, right? With zombies, right?

The spam campaign may be messages signed by your domain sent from
various places. The spam campaign would most likely avoid repeating any
spam from the signing domain to avoid being detected. The spammer would
just be sending single messages to themselves. They would already have
other distribution methods looking to capitalize on your signature's
reputation.

> I really like the formulation I heard here: a lot of the
> utility of signing is in just getting spammers and other
> miscreants to attack somebody else instead of me. Eventually
> we may be able to close the noose, but until then I'd just
> assume at least they not sully my name.

A replay attack will sully the domain name. This will remain a problem
for large domains. Make a convincing case for the use of DKIM where the
>From or the Sender headers are not bound to the signature. I would
expect the majority of email will be sent in this manner by major
providers. For DKIM to provide a suitable solution for the general
case, it would need to consider dealing with the replay attack, and DoS
defenses based upon domain name acceptance criteria.

-Doug

Douglas Otis

2005-08-08 01:04:47 UTC

Permalink

On Sun, 2005-08-07 at 18:17 -0400, John R Levine wrote:

> >
> > If replay does become a problem, then what is the response?
>
> Kick off the users playing replay games, I'd guess. Disregarding joe jobs
> (which I see no reason to expect will ever be anything other than an edge
> case) the sender has to be in cahoots with the person doing the replay,
> you know who he is since you have his DKIM signed mail, so you whack him.

Canceling this account will not immediately stop the damage being done
by the abusive replay. In all likelihood, the miscreant has already
anticipated this reaction and is already collecting another series of
spams while issuing their replay for the duration of the key. This
should provide many days of unfettered spamming. Over a the year, a
spammer could issue replay attacks continuously, while perhaps only
compromising just 100 accounts.

Without some type of replay preventative, DKIM would make the spam
situation worse, as conventional techniques used to control abuse would
become ineffective, with perhaps the exception of repeated message
filtering techniques. Without some other means to control this type of
abuse, recipients would be reliant upon centralized clearing houses
where the hash of each message must be checked before accepting the
message.

Looking for repeated messages within email queues, a technique used by
email filtering, will often misclassify spam in many cases. One such
case that may be misclassified includes mailing lists. This technique
will remain error prone even should mailing lists sign messages.
Perhaps mailing lists signing their own messages will reduce the size of
the white-list based upon the domain name. The white-list could be
simplified by being based upon the IP address, but this suffers the
problems of path registration. Repeated message techniques will always
require such a white-listing mechanism in those cases where messages are
repeated and yet are not spam.

> > While John Levine wants mailing lists to re-sign their messages to
> > permit repeat thresholds on the same signatures, there would also be
> > advantages for mailing list to not re-sign an already signed message.
>
> I think every agent that sends mail should sign the mail they send, but I
> am not so foolish as to think this will happen any time soon. Until then,
> there will be many mailing lists whose behavior is technically
> indistinguishable from a "replay attack." I'm still waiting for someone
> to explain how you stop replay without also wrecking mailing lists, other
> that by implausibly labor intensive approaches like manually whitelisting
> every legitimate remailer in the world.

The damage done to mailing lists reputation may also be the effect of
collateral damage caused by other servers sharing the same IP address
space. Here DKIM could be beneficial. Most of these mailing lists are
responsive to abuse complaints and also confirm the subscribed mailbox
addresses.

Abuse must be dealt with promptly, if to remove the incentives. A
centralized clearing house of message hashes will likely need to utilize
the IP address to apply less complex white-lists. In other words,
reputation will remain a function of the IP address, where some of the
benefit of DKIM being independent of the IP address is lost. With this
approach, there are three items of information to be shared with the
clearing house. The clearing house would also be expected to track
billions of messages, rather than millions of sending servers.

With the use of the revocation-identifier and bad-list, this mechanism
would allow a reputation scheme be based exclusively on the domain name.
If the domain maintains their bad-list, then no other information needs
to be shared with the reputation service. No repeated message technique
would be needed. The recipient would not be reliant upon a massive
centralized per-message clearing house. The bad-list would also make
the domain signing the messages authoritative about classifying which
accounts are committing an abusive replay attack.

In addition, a third-party that specializes in detecting spam, perhaps
in conjunction with assessing reputations, would receive acknowledgments
via the bad-list. This is helpful, as the same non-replayed messages
may emerge from thousands of compromised systems. This would allow the
spam problem to be addressed incrementally, one account at a time.

Obviously, if a domain indicates that a particular account is replaying
messages, then IP addresses seen sending these messages becomes suspect.
Here, the replay attack in conjunction with the revocation-identifier
and bad-list actually exposes servers used by miscreants. Looking for
repeated messages, signed by the mailing list or by the initial sender,
will still require complex white-listing. A revocation-identifier in
combination with a bad-list avoids much of this complexity.

-Doug

John R Levine

2005-08-08 01:53:00 UTC

Permalink

> > indistinguishable from a "replay attack." I'm still waiting for someone
> > to explain how you stop replay without also wrecking mailing lists, other
> > that by implausibly labor intensive approaches like manually whitelisting
> > every legitimate remailer in the world.
>
> The damage done to mailing lists reputation may also be the effect of
> collateral damage caused by other servers sharing the same IP address
> space.

No, that's not what I said. Please go back and re-read my previous
messages, paying particular attention to the fact that what mailing lists
normally do, with no abuse at all, no spammers involved, nothing other
than what they do every day in correct operation, is identical to a
"replay attack",

The damage to mailing lists has nothing to do with "other servers sharing
the same IP address". The damage to mailing lists is that any scheme that
prevents spammers from delivering 100 copies of a message to spam
recipients will also prevent mailing lists from delivering 100 copies of a
message to the recipients who asked for it.

Any so-called replay prevention scheme is a direct attack on the normal
operation of mailing lists. Can I make that any clearer?

Regards,
John Levine, ***@iecc.com, Primary Perpetrator of "The Internet for Dummies",
Information Superhighwayman wanna-be, http://iecc.com/johnl, Mayor
"I dropped the toothpaste", said Tom, crestfallenly.

Douglas Otis

2005-08-08 06:26:09 UTC

Permalink

On Sun, 2005-08-07 at 21:53 -0400, John R Levine wrote:

> > The damage done to mailing lists reputation may also be the effect of
> > collateral damage caused by other servers sharing the same IP address
> > space.
>
> No, that's not what I said. Please go back and re-read my previous
> messages, paying particular attention to the fact that what mailing lists
> normally do, with no abuse at all, no spammers involved, nothing other
> than what they do every day in correct operation, is identical to a
> "replay attack",

I agree mere existence of replicate signed messages would not be a
positive indication of spam. Schemes that attempt to filter messages
based upon replicate message rates are error prone, and this would
include those messages seen from a mailing list. This would be true
regardless as to whether the mailing list re-signed messages or not.

You make a good point such methods used to detect abuse would require
extensive white-listing to avoid errors. While mailing lists re-signing
messages may allow the white-list to be based upon names, it would be
more likely that the white-list would be IP address based anyway.
Reputation would then still include the IP address, which would not
provide protection from collateral damage when using the IP address for
white-listing.

> The damage to mailing lists has nothing to do with "other servers sharing
> the same IP address". The damage to mailing lists is that any scheme that
> prevents spammers from delivering 100 copies of a message to spam
> recipients will also prevent mailing lists from delivering 100 copies of a
> message to the recipients who asked for it.
>
> Any so-called replay prevention scheme is a direct attack on the normal
> operation of mailing lists. Can I make that any clearer?

I agree with you about not being able to depend upon a key or
revocation-identifier lookup rate compared to the signing rate as a
means to know whether there is a replay attack. An abnormal change in
the account as determined by the revocation-identifier, when seen in
conjunction with abuse reports, would be strong evidence there may be a
problem. Prior to signatures, the administrator may have depended upon
error logs, or abnormally high sending rates as confirmation of abusive
behaviors when investigating abuse reports. Signatures unfortunately
blind the administrator to possible replay abuse. The revocation-
identifier would provide some oversight that would be otherwise lost.

The only point I ever attempted to make along these lines would be that
a revocation-identifier once again provides a general indication of
_possibly_ abusive behavior. The administrator would need to confirm
their suspicions using other techniques. Abuse reports that highlight
the revocation-identifier could be helpful in this process of course.

-Doug

Amir Herzberg

2005-08-08 13:07:58 UTC

Permalink

John R Levine wrote:
>>>indistinguishable from a "replay attack." I'm still waiting for someone
>>>to explain how you stop replay without also wrecking mailing lists, other
>>>that by implausibly labor intensive approaches like manually whitelisting
>>>every legitimate remailer in the world.
>... what mailing lists
> normally do, with no abuse at all, no spammers involved, nothing other
> than what they do every day in correct operation, is identical to a
> "replay attack",
...
> Any so-called replay prevention scheme is a direct attack on the normal
> operation of mailing lists. Can I make that any clearer?

Good point: automatically rejecting forwarded DKIM mail may interfer
with current mailing lists. However, I think John is too quick in
concluding that this prevents any `so-called replay prevention scheme`.
Or in other words, maybe we can control replay, rather than flatly
reject (prevent) any replay.

Controlling replays implies that when we receive e-mail, we identify
three DKIM classes:

Class 1 (non-DKIM) - Unsigned mail (i.e., no DKIM services).

Class 2 (no-replay-protection DKIM) - Signed (DKIM) mail w/o
replay/destination protection. Here, the current destination is not
covered by the signature (typcially, the original destination was
mailing list, which just forwarded this message).

Class 3 (`full` DKIM) - Signed (DKIM) mail with replay/destination
protection. Here, the destination is signed (or just a hash of the
destination, possibly using hash tree, for privacy and efficiency).
Mailing lists and other forwarding services will need special
DKIM-enhancements to provide this DKIM service. This will not work of
course for current forwarding and mailing list systems (but will work
for enhanced, DKIM-supporting systems)

Recipients do not have to discard e-mail from classes 1 or 2. Indeed,
they are not likely to do so, at least in the near to medium term.
However, this does give DKIM the ability to protect against replay.
Namely, blacklist servers will be aware that class 2 DKIM does not
protect against replay - and will not be hasty to conclude that the
responsibility for the spam is on the original sender. It may be on the
forwarding agent - a mailing list or a Zombie.

p.s. this message is cross posted to MASS WG since John sent there his
post (and also I sent my orignal note there), but please respond to
IETF-DKIM since discussion moved there.
--
Best regards,

Amir Herzberg

Associate Professor
Department of Computer Science
Bar Ilan University
http://AmirHerzberg.com
Try TrustBar - improved browser security UI:
http://AmirHerzberg.com/TrustBar
Visit my Hall Of Shame of Unprotected Login pages:
http://AmirHerzberg.com/shame

Amir Herzberg

2005-08-08 14:18:55 UTC

Permalink

John R Levine wrote:
>>>indistinguishable from a "replay attack." I'm still waiting for someone
>>>to explain how you stop replay without also wrecking mailing lists, other
>>>that by implausibly labor intensive approaches like manually whitelisting
>>>every legitimate remailer in the world.
>... what mailing lists
> normally do, with no abuse at all, no spammers involved, nothing other
> than what they do every day in correct operation, is identical to a
> "replay attack",
...
> Any so-called replay prevention scheme is a direct attack on the normal
> operation of mailing lists. Can I make that any clearer?

Good point: automatically rejecting forwarded DKIM mail may interfer
with current mailing lists. However, I think John is too quick in
concluding that this prevents any `so-called replay prevention scheme`.
Or in other words, maybe we can control replay, rather than flatly
reject (prevent) any replay.

Controlling replays implies that when we receive e-mail, we identify
three DKIM classes:

Class 1 (non-DKIM) - Unsigned mail (i.e., no DKIM services).

Class 2 (no-replay-protection DKIM) - Signed (DKIM) mail w/o
replay/destination protection. Here, the current destination is not
covered by the signature (typcially, the original destination was
mailing list, which just forwarded this message).

Class 3 (`full` DKIM) - Signed (DKIM) mail with replay/destination
protection. Here, the destination is signed (or just a hash of the
destination, possibly using hash tree, for privacy and efficiency).
Mailing lists and other forwarding services will need special
DKIM-enhancements to provide this DKIM service. This will not work of
course for current forwarding and mailing list systems (but will work
for enhanced, DKIM-supporting systems)

Recipients do not have to discard e-mail from classes 1 or 2. Indeed,
they are not likely to do so, at least in the near to medium term.
However, this does give DKIM the ability to protect against replay.
Namely, blacklist servers will be aware that class 2 DKIM does not
protect against replay - and will not be hasty to conclude that the
responsibility for the spam is on the original sender. It may be on the
forwarding agent - a mailing list or a Zombie.

p.s. this message is cross posted to MASS WG since John sent there his
post (and also I sent my orignal note there), but please respond to
IETF-DKIM since discussion moved there.
--
Best regards,

Amir Herzberg

Associate Professor
Department of Computer Science
Bar Ilan University
http://AmirHerzberg.com
Try TrustBar - improved browser security UI:
http://AmirHerzberg.com/TrustBar
Visit my Hall Of Shame of Unprotected Login pages:
http://AmirHerzberg.com/shame

wayne

2005-08-09 04:01:13 UTC

Permalink

In <***@tom.iecc.com> "John R Levine" <***@iecc.com> writes:

> You're also making the assumption that spammers will blast out many
> identical messages with the same signature. They stopped doing that in
> about 1999,

That's interesting. I took a quick look at my spam folder and quickly
found identical copies of spams delivered to just me. I didn't bother
to look to see at any of the spam sightings collections to see how
many individual spams delivered to me were also delivered to others.

> and nobody's suggested what would make them resume doing so.

That is also interesting. I recall several people saying that riding
on other people's reputations would be a good reason why spammers
might want to do so.

> It's far more likely that they'll keep doing what they're doing now,
> sending out messages that are all different, or at most sending to a
> handful of recipients before changing the message. Replay protection,
> even if it's possible, is of no help.

Well, I guess it all depends on what you define as "a handful".
Nothing is stopping a spammer from replaying just one email. They
could probably generate hundreds or thousands of variations before
they start their spam run.

Well, you may be right that replay protection may not be possible, or
that it may be of little help.

That kind of raises the question though: What good does having a DKIM
signed email give us? Why, as a domain owner, would I want to sign
email? Why, as a email receiver, would I want to check the signature?

I thought I knew what people would give as the answers to those
questions, but it is clear that others have different ideas of the
goals and benefits of signing email.

-wayne

Michael Thomas

2005-08-01 19:33:51 UTC

Permalink

Sam Hartman wrote:
> I'd like to ask us to think particularly about the impact of this
> attack on business models of medium sized ISPs. Fundamentally few
> people are going to block all mail from AOL,, Yahoo, Gmail or the
> like. However smaller ISPs have been subjected to a wide variety of
> problems with various blackhole lists. Sometimes this was because
> they were doing something wrong, sometimes the blackhole lists were
> doing something wrong. There's a lot of debate about where the right
> balance is that I would like to avoid.

Are you implying that this problem wouldn't crop up
without the "replay" problem? I expect that it would,
although I'd hope we're past many of the teething pains
given the existance of RBL's for quite some time now.

> However there is a similar issue with DKIM. It's not clear what
> policies a medium sized ISP could adopt to avoid being subject to such
> an attack. It's not clear how you could maintain a reputation while
> still defaulting to providing service to anyone who wants an account.

I would expect that outgoing spam filtering ought to be the
norm for ISP's. I don't believe that's currently the case (?).
And in particular, an ISP may want to *really* dial up the
filters for new and/or quiescent accounts. And I don't think
that this is just an ISP problem: zombied machines in enterprise
could lead to negative reputation too.

There's also room for further work in this area too in the
area of accreditation. Note also that DKIM has an expirey
on the signature, so there is at least some time horizon
for an individual attack.

> Do we care? Is this acceptable to the operations communities?

Yes, at least I care. What's not entirely clear to me is whether
this a new attack per se, or just a permutation of an old one.
Lots of spam is relayed through ISP MTA's today. Those MTA's doing
outbound filtering would help a lot regardless of whether DKIM is
around or not. DKIM seems to me to help the incentive to do that
kind of policing. A wildcard is that I believe that some ISP's
are not allowed to block outgoing mail (European?). This might
put them in an untenable position even if they have good remediation
procedures. I have some thoughts here, but I'm afraid I might be
out in the weeds.

Mike

Tony Finch

2005-08-04 08:12:32 UTC

Permalink

On Mon, 1 Aug 2005, Sam Hartman wrote:
>
> I'd like to make sure the issue of replays is covered at the BOF and
> is something the IETF community considers carefully before approving a
> charter for this working group.
>
> I'd like to ask us to think particularly about the impact of this
> attack on business models of medium sized ISPs. Fundamentally few
> people are going to block all mail from AOL,, Yahoo, Gmail or the
> like. However smaller ISPs have been subjected to a wide variety of
> problems with various blackhole lists.
>
> It's not clear how you could maintain a reputation while still
> defaulting to providing service to anyone who wants an account.

I agree that this needs to be addressed in the security considerations
section, but I don't think replay attacks are a problem for DKIM itself.
DKIM is providing message origin authentication and message integrity, and
replay is not an attack on either of these services. Another way of
stating this is that DKIM by itself does not completely address spam; it
depends on reputation services for that, and replay is an attack against
reputations.

What DKIM needs to do is provide a sufficiently fine-grained idea of
identity so that reputation services are not forced into causing
collateral damage. Fortunately that's already the case: you can key the
reputation lookup off the signer's identity i= rather than the domain d=,
so the ISP's reputation need not be tainted if only a very small
proportion of its customers behave badly. Doug's suggestion of using a
revocation ID is also relevant here.

There is also a layer 8 defence: ISPs could use something like the
Spamhaus registry of known spam operations to vet customers; this could be
automated by keying lookups off their credit card numbers (or a hash of
their credit card numbers to avoid exposing them). This would shift the
problem to free email providers (or to identity hijacking, but that's a
result of more fundamental security problems).

Tony.
--
f.a.n.finch <***@dotat.at> http://dotat.at/
BISCAY: WEST 5 OR 6 BECOMING VARIABLE 3 OR 4. SHOWERS AT FIRST. MODERATE OR
GOOD.

Hallam-Baker, Phillip

2005-08-05 14:52:21 UTC

Permalink

> This "bad-list" lookup would have a minor impact as a negative
> result. This lookup would not need to be made when the HELO is with
> the signature's domain. A user-key lookup would likely be just as
> frequent due to DNS cache concerns. As least with the revocation-
> identifier there could be a method to eliminate the lookup in most
> cases. A bad identifier could be safely given a long time to
> live as
> well.

>From the point of view of getting DKIM chartered I think it is probably
sufficient to note that schemes of this type have existed in the past
and were very successful until the majority of spammers began to modify
each message.

There were two principle weaknesses in DCC, the first was the tactical
problem of defeating hashbusting, the second was that is was vulnerable
as a censorship scheme.

DKIM eliminates the hashbusting problem but the censorship issue is
still there. My confidence in Vernon's ability to solve it is in no way
enhanced by his habit of reporting people as spammers because he simply
didn't like them.

If DCC is going to work there has to be accountability for the
moderators. Otherwise you get issues like people signing up for MoveOn
or the Drudge Report for the sole purpose of reporting posts as spam.

>From a timing point of view this is a second order problem, it is
dealing with the spammer response which is unlikely to appear until DKIM
is widely deployed. I think it is a good thing to start building
prototypes to meet the anticipated attack but far too soon to think
about a formal standards process.

One area we might want to anticipate DCC like schemes though would be in
advice to mailing list software to offer the option of signing the
message for each recipient rather than signing the message once and for
all. This would avoid or at least reduce the censorship problem.

Miles Libbey

2005-08-06 23:03:38 UTC

Permalink

--- Sam Hartman <hartmans-***@mit.edu> wrote:
> I'd like to ask us to think particularly about the impact of this
> attack on business models of medium sized ISPs. Fundamentally few
> people are going to block all mail from AOL,, Yahoo, Gmail or the
> like. However smaller ISPs have been subjected to a wide variety of
> problems with various blackhole lists. Sometimes this was because
> they were doing something wrong, sometimes the blackhole lists were
> doing something wrong. There's a lot of debate about where the right
> balance is that I would like to avoid.

Certainly a tough balance. There are a lot of crazy blacklists out
there, and there seem to be very few reputation systems in the wild
that have more than 2 shades (ultra-bad and ultra-good). There are a
few that are starting to pop out of the woodwork (IronPort and
Return-Path both have one, there are likely others). One way
reputation systems could work would be to define an ISP as neither good
nor bad -- and either don't (or make it extremely hard to) let the
reputation sway. FWIW, this is what we do. An email truly from
yahoo.com is not guarenteed inbox delivery. This also reduces the
incentive for spammers to either send through an ISP's system or resend
a ISP-domain email.

> However there is a similar issue with DKIM. It's not clear what
> policies a medium sized ISP could adopt to avoid being subject to
> such
> an attack. It's not clear how you could maintain a reputation while
> still defaulting to providing service to anyone who wants an account.

How much of this lack of clarity is due to the lack of clarity
surrounding how all the individual blacklists are run?

miles

Hallam-Baker, Phillip

2005-08-07 16:09:27 UTC

Permalink

> Every description of a "replay attack" is also a description
> of a mailing list. Anything that stops mail delivered by
> "replay attacks" will also stop mail delivered by mailing
> lists. The only difference between the two is mental state.
> If we think it's spam, it's a replay attack, if think it's
> good mail it's a mailing list.

Not quite, a mailing list can resign the message if it is DKIM capable.

I think that we need to look at the problem naked DKIM solves as being
an adjunct to a spam filtering mechanism that is adaptive. This is a
major culture shock for the security area since we usually try to design
systems that are complete and address every anticipated attack.

This is not what people who are in the spam control business are looking
for, they already have systems that solve 90% of spam problems and they
want to add authentication because it shuts down many of the tactics
used in the remaining 10%.

But DKIM is being presented as a security solution for ubiquitous
deployment.

That means that it has to provide value to the wider community of users,
beyond simply allowing people to send their messages to big ISPs.

We could spend time trying to argue down this criteria but it is much
quicker and easier to meet it.

John R Levine

2005-08-07 17:14:46 UTC

Permalink

> > If we think it's spam, it's a replay attack, if think it's
> > good mail it's a mailing list.
>
> Not quite, a mailing list can resign the message if it is DKIM capable.

Sure, but now we're perilously close to saying that all mailing lists have
to upgrade or the DKIM replay detector will whack them, which strikes me
as a total non-starter. That tells me that a replay detector won't be
useful because of all the false positives.

> I think that we need to look at the problem naked DKIM solves as being
> an adjunct to a spam filtering mechanism that is adaptive. This is a
> major culture shock for the security area since we usually try to design
> systems that are complete and address every anticipated attack.
>
> This is not what people who are in the spam control business are looking
> for, they already have systems that solve 90% of spam problems and they
> want to add authentication because it shuts down many of the tactics
> used in the remaining 10%.

Sounds about right to me.

R's,
John

Douglas Otis

2005-08-07 21:14:01 UTC

Permalink

On Sun, 2005-08-07 at 12:38 -0700, Michael Thomas wrote:
>
> I agree. I think that the thing that really ought to
> be proven here is whether "replay" is a real threat or
> not.

If replay does become a problem, then what is the response? Should
large domains then issue user-keys to everyone? If DKIM is to be
beneficial, it must serve in deciding whether to accept email on the
basis of the signature being verified. The value of this acceptance is
reduced when a signature must also be checked against a third-party
clearing house to decide whether this represents a message being
abusively replayed.

The majority of the messages signed will likely not be bound to any
email address seen by the recipient. Make a convincing case why a
signature matters when only an accountable domain is determined.

> At this point, it is purely academic and I think we
> have a pretty spotty track record of determining what the
> miscreants next steps will actually be. For one, it's not
> clear that if domains -- in an effort to maintain their
> reputation -- start spam-filtering their outbound mail,
> you'd reduce the effectiveness of the so-called replay
> attack by about 2 orders of magnitude.

The spammer would be sending the messages to themselves. If they used a
service that "pre-tested" the quality of their efforts using outbound
filters, then this would only benefit the spammer. They only need to
accumulate enough versions of their spam before moving on to a different
account. They would change accounts when they start their replay
tactics. Replay would be used to plunder the reputation value that may
exist in having the message signed. There is no way to train the filter
as these will be unique messages. I would be surprised if an outbound
filter technique would even noticed a small percentage of such messages
when done by a clueful spammer.

> It seems to me that it's pretty likely that they'll find something
> else to do if that scenario plays out.

The spammer will still be able to accumulate enough emails to stage a
replay attack with or without an outbound filter. In fact an outbound
filter ensures that a replay attack will be the avenue left open for
abuse.

While John Levine wants mailing lists to re-sign their messages to
permit repeat thresholds on the same signatures, there would also be
advantages for mailing list to not re-sign an already signed message.
Leaving the signature unchanged helps from the perspective of taking the
problem to its source, without a list administrator needing to become
involved. There will also be a need to handle existing mailing lists
that simply explode a list.

.From a perspective of detecting a replay attack using a revocation-
identifier, the primary means will be by checking a bad-list on the
signing domain, when the message appears to be from a different domain
as determined by the HELO. The bad-list would be created from abuse
reports or feed-back channels motivated by a desire to protect their
reputation.

The information placed in the bad-list may be confirmed by the signing
domain by examining logs for the account identified by the revocation-
identifier. If there is no evidence of replay or sending abuse, then
there may be reason to believe a message was sent to a few individuals
which may have been sufficient for them to become tagged as a spammer.
In this case, it may be better to warn the account about how their
messages are being received. If such messages were sent to a list, then
there would be less grace provided, which seems appropriate.

-Doug

Hallam-Baker, Phillip

2005-08-08 00:14:00 UTC

Permalink

> From: John R Levine [mailto:***@iecc.com]

> Sure, but now we're perilously close to saying that all
> mailing lists have to upgrade or the DKIM replay detector
> will whack them, which strikes me as a total non-starter.
> That tells me that a replay detector won't be useful because
> of all the false positives.

How is that different from telling folk they must DKIM their email or
the spam filter will whack 'em?

> > This is not what people who are in the spam control business are
> > looking for, they already have systems that solve 90% of
> spam problems
> > and they want to add authentication because it shuts down
> many of the
> > tactics used in the remaining 10%.
>
> Sounds about right to me.

When I design a system I don't just make it work for me and my company.
I try to make it work for as many groups as I can, even competitors in
some cases. Delivering the maximum possible value to effort ratio is the
aim.

I have a feeling that some folk are so focused on the 80/20 rule here
that they are failing to accept the fact that maybe they are actually
imposing a 50/50 cut and leaving an important 30% of low hanging fruit
functionality on the table.

John R Levine

2005-08-08 01:55:14 UTC

Permalink

> > Sure, but now we're perilously close to saying that all
> > mailing lists have to upgrade or the DKIM replay detector
> > will whack them, which strikes me as a total non-starter.
> > That tells me that a replay detector won't be useful because
> > of all the false positives.
>
> How is that different from telling folk they must DKIM their email or
> the spam filter will whack 'em?

It's somewhat different, but I hope we can agree that it would be a poor
idea in general to do silly things that will lose valid mail.

> I have a feeling that some folk are so focused on the 80/20 rule here
> that they are failing to accept the fact that maybe they are actually
> imposing a 50/50 cut and leaving an important 30% of low hanging fruit
> functionality on the table.

I'm not sure what the two sides of the argument are supposed to be.

Regards,
John Levine, ***@iecc.com, Primary Perpetrator of "The Internet for Dummies",
Information Superhighwayman wanna-be, http://iecc.com/johnl, Mayor
"I dropped the toothpaste", said Tom, crestfallenly.

Hallam-Baker, Phillip

2005-08-08 00:27:38 UTC

Permalink

> [mailto:owner-ietf-***@mail.imc.org] On Behalf Of Michael Thomas

> I agree. I think that the thing that really ought to
> be proven here is whether "replay" is a real threat or
> not. At this point, it is purely academic and I think we
> have a pretty spotty track record of determining what the
> miscreants next steps will actually be.

You might. But actually the events of the past few years have been tracking some predictions pretty closely.

Sure the bad guys will respond with a replay attack at some point, but as has already been explained at some length it is a softball attack that is not going to tax anti-spam schemes of any scale.

The principle challenge in establishing a free anti-replay scheme is that generating the critical mass to redo DCC in an open fashion without the censorship issues is not really going to be possible until after the attack occurs. But by Web standards it is not a very difficult or complex collaboration.

I do NOT want to start on a standards effort for that area NOW because there is another area that is growing rapidly that might well provide some important and useful leverage. If you have been following blogspam you will know that comment and trackback spam are big issues for the blogosphere. Moreover the naïve DCC approach is an absolute non-starter in such a partisan environment.

While I do not want to prejudge the technology infrastructure that is applied to control blogspam it is pretty clear that the final solution will look something like a federated version of the slashdot moderation scheme. I don't at this point know if the federated identity scheme would be based on SAML, WS-Federation or something else entirely. Nor would I at this point take a stand insisting on a particular approach.

Although I am pretty confident that we can anticipate the attack profile for the next 2-3 years with reasonable accuracy I am not yet at a point where I would want to make any commitment to what the technology infrastructure for meeting that attack profile will be.

wayne

2005-08-08 01:21:04 UTC

Permalink

In <***@MOU1WNEXMB04.vcorp.ad.vrsn.com> "Hallam-Baker, Phillip" <***@verisign.com> writes:

> Sure the bad guys will respond with a replay attack at some point,
> but as has already been explained at some length it is a softball
> attack that is not going to tax anti-spam schemes of any scale.

Uh, I don't think that it has already been shown that the replay
attack is going to be easy for anti-spam schemes to deal with.

If DKIM can't place strong controls on the sending of bulk email using
the signer's reputation, then I don't seem any value in it.

While some people say that spam can include things other than UBE, it
is really only UBE that causes the scaling problem.

If it is not bulk, then there is a limit to how many emails the
spammer can send. In the limiting case of everyone being spammers,
then everyone will receive as many spams, on average, as the average
person can compose.

If the message is solicited, then it doesn't make any difference if it
is bulk.

Yes, things like Razor/DCC/Pyzor can detect if a message is bulk, and
doing DKIM will make life *much* easier for them. Those systems don't,
however, do a good job of detecting if the message is unsolicited.

> The principle challenge in establishing a free anti-replay scheme is
> that generating the critical mass to redo DCC in an open fashion
> without the censorship issues is not really going to be possible
> until after the attack occurs. But by Web standards it is not a very
> difficult or complex collaboration.

The other half of UBE detection, determining if the email was
solicited, is hard. I'm not sure, but it sounds like this is in part
what you mean by "censorship" since it is easy for people to falsely
declare a bulk email as being unsolicited, and thus giving the email a
bad reputation.

Right now, the "solicited" status is generally determined by things
like if the content looks hammy (bayesian, content filters, etc.),
whether the user has whitelisted the source, or whether the source has
a good reputation.

I thought the goal of DKIM (and the like) was to allow another,
better, way of determining the reputation of the source, and thus have
a good idea whether the email is solicited or not.

Again, if DKIM can't place strong controls on the sending of bulk
email using the signer's reputation, then I don't seem any value in
it.

-wayne

Hallam-Baker, Phillip

2005-08-08 00:40:42 UTC

Permalink

> [mailto:owner-ietf-***@mail.imc.org] On Behalf Of Douglas Otis

> If replay does become a problem, then what is the response?
> Should large domains then issue user-keys to everyone?

There is actually little difference in per-user keys and signing the
sender field.

Per user keys only make a difference if they are individually
controlled.

> The value of this acceptance is reduced when a signature
> must also be checked against a third-party clearing house to
> decide whether this represents a message being abusively replayed.

Are you arguing that the third party clearing house protocol is
absolutely essential for DKIM to have any value at all?

Continue reading on narkive:

Search results for '] Replay attacks and ISP business models' (Questions and Answers)

209 replies Why is the media so BIASED against Donald Trump and all Republicans in general? started 2020-12-08 23:19:06 UTC politics 4 replies networking? started 2008-03-11 20:34:23 UTC security
] Replay attacks and ISP business models (2024)

FAQs

What is a real life example of a replay attack? ›

Replay Attack Examples

From online banking transactions to keyless car entry, replay attacks are a security concern whenever an authenticated message authorizes a specific action. This action can be unlocking a car, sending a banking transaction, or any other number of security-sensitive actions.

What is the best defense method to stop a replay attack? ›

Encrypting data-in-transit: To prevent replay attacks, encrypt data during transmission using strong encryption algorithms.

What authentication methods are susceptible to replay attacks? ›

Authentication and sign-on by clients using Point-to-Point Protocol (PPP) are susceptible to replay attacks when using Password Authentication Protocol (PAP) to validate their identity, as the authenticating client sends its username and password in "normal text", and the authenticating server then sends its ...

What is replaying attack? ›

A replay attack is a network attack when an attacker intercepts a network communication between two parties to delay, redirect, or repeat it. Then, the cybercriminal pretends to be one of the legitimate parties and retransmits the traffic to replicate or manipulate the original action.

Does TLS protect against replay attacks? ›

In practice, messages sent over TLS usually include some counter or timestamp so that an attacker cannot record a TLS message and send it again within the same connection.

What happens if an attacker can a replay attack against an IPsec VPN? ›

A replay attack is when an attacker captures and retransmits IPsec packets to fool the receiver into accepting them as legitimate. This can lead to data corruption, session hijacking, or unauthorized access.

Does VPN prevent replay attacks? ›

Malicious actors usually capture your network communications using easily available software tools. A VPN hides your IP address and encrypts all of your data in a secure tunnel, making it impossible for intruders to identify you or see what you're up to. This way, a VPN can protect you from targeted replay attacks.

How does ESP prevent replay attacks? ›

ESP anti-replay protection is a feature that prevents an attacker from reusing or reordering the ESP packets sent by a legitimate sender. It works by using a sequence number for each packet, which is incremented by one for each new packet.

What are the tools for replay attack? ›

In network replay attacks, the attacker intercepts network traffic and then resends it at a later time. This can be done using tools like Wireshark or tcpdump.

What protects Kerberos from replay attacks? ›

Kerberos prevents replay attacks using two main mechanisms: timestamps and session keys. Timestamps are used to ensure that the messages or tickets are fresh and not reused. The client and the server must have synchronized clocks, and they must check that the timestamps are within a certain margin of error.

Does HMAC prevent replay attacks? ›

Protection Against Replay Attacks: HMAC can prevent replay attacks, where an attacker intercepts and resends a valid message. By including a timestamp or a nonce in the message, HMAC can ensure that each message is unique and not a replay.

Which is the strongest authentication mechanism? ›

Most Secure: Hardware Keys

External hardware keys, like Yubikeys, are among the strongest authentication factors available. Also called FIDO keys, they generate a cryptographically secure MFA authentication code at the push of a button.

What are some defense strategies against replay attacks? ›

One of the challenges in preventing replay attacks is ensuring the integrity and confidentiality of data during transmission. Encryption techniques, secure protocols, and timestamp verifications are commonly employed to mitigate the risks associated with replay attacks and safeguard the authenticity of communications.

Which one of the following techniques is useful in preventing replay attacks? ›

Stopping a Replay Attack

All he or she has to do is capture and resend the entire thing — message and key — together. To counter this possibility, both sender and receiver should establish a completely random session key, which is a type of code that is only valid for one transaction and can't be used again.

Is session hijacking a replay attack? ›

Stealing a user's session ID is the first step to a replay attack and is referred to as session hijacking. There are several ways hackers can do this.

What are examples of replay? ›

Examples of replay in a Sentence

Verb The tied game will be replayed on Saturday. The game's highlights were replayed on the evening news. The footage has been played and replayed on television. Noun They scheduled the replay for Saturday.

What is a real world example of a DDoS attack? ›

One of the largest verifiable DDoS attacks on record targeted GitHub, a popular online code management service used by millions of developers. This attack reached 1.3 Tbps, sending packets at a rate of 126.9 million per second. The GitHub attack was a memcached DDoS attack, so there were no botnets involved.

What are real life examples of session hijacking? ›

This might happen when you're shopping online, paying a bill, or checking your bank balance. Session hijackers usually target browser or web applications, and their aim is to take control of your browsing session to gain access to your personal information and passwords.

What is spoofing attack in real life example? ›

Fake job offers, fake banking-related messages, fake lottery messages, money refund scams, and password reset messages are some examples of Text Message Spoofing. Spoofed messages are difficult to identify until the person is aware of where to look for them.

Top Articles
Latest Posts
Article information

Author: Margart Wisoky

Last Updated:

Views: 5955

Rating: 4.8 / 5 (78 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Margart Wisoky

Birthday: 1993-05-13

Address: 2113 Abernathy Knoll, New Tamerafurt, CT 66893-2169

Phone: +25815234346805

Job: Central Developer

Hobby: Machining, Pottery, Rafting, Cosplaying, Jogging, Taekwondo, Scouting

Introduction: My name is Margart Wisoky, I am a gorgeous, shiny, successful, beautiful, adventurous, excited, pleasant person who loves writing and wants to share my knowledge and understanding with you.