Request: Please sign this list's messages via DKIM or SPF
lists at binarus.de
Mon Apr 4 12:43:59 EDT 2016
> You are for sure aware that neither SPF nor DKIM are able or designed to fight Spam.
I know that a lot of people are stressing this. But it is not my opinion nor experience (see below).
> In fact more than half of the Spam reaching our inboxes are valid according DKIM/SPF so we even might reduce spam by rejecting DKIM/SPF signed mail.
In our case, we have cut down SPAM by approximately 90% alone by doing SPF and DKIM checks with incoming messages. For example, my own corporate mailbox approximately got over 200 SPAM messages per day before rejecting messages without DKIM or SPF, and now I am getting somewhere between 10 and 30. That's what I meant by "extremely effective in our case".
> DKIM/SPF does only include that the sending server is mandated by DNS to send mail for the given domain and this is easily done with all modern spammer tools.
Well, most spammer tools might do this. But the spammer then first has to get a domain and then has to set up the DNS entries, which obviously is too complicated for most spammers. Furthermore, I am constantly seeing messages trying to get into the server which originate from dynamic IP addresses. The majority of spam messages seems still to be sent directly (i.e. without passing a "smarthost") to our receiving MTA by PCs which have been infected with a trojan horse; it seems that the sending MTA more often than not is part of this trojan and thus sends the messages from a dynamic IP address. I am convinced that it is impossible for a spammer to continuously update his SPF entries for all devices he has under control with the dynamic IP addresses of these devices.
[N.B. Of course, we are rejecting messages event if they pass SPF, but the SPF entry has something like +all or ~all in it.]
Now to the most important part of SPF and DKIM (I am stressing this because I am convinced that many people really believe that you can't fight SPAM with SPF or DKIM):
As you correctly have stated, if a message passes the SPF or DKIM test, it can be taken for sure that the *owner* (or some person which has been authorized by the owner) of the (pretended) sender's domain actually has authorized that message (at least indirectly). In other words, if a message which passes the SPF or DKIM test contains SPAM, the owner of the (pretended) sender's domain either has allowed somebody to use the domain for sending spam, or he obviously is not in control of his staff or his mail or DNS server. In either case, you could (and should) blacklist this sender domain.
This is the key aspect: Without SPF and DKIM, you can *not* blacklist a sender domain after receiving SPAM from that domain, because you could be sure that the sender domain has been faked by the spammer, and if you would have blacklisted it, you would not get legitimate emails from there any more (imagine the spammer had used somebody at ibm.com as sender's address).
But with SPF or DKIM, you can immediately blacklist any sender domain after having received SPAM from that domain. You now know *for sure* that the spammer did not abuse / fake the sender's address (letting apart such things like a hacked mail relay etc.), but that the domain owner has authorized the SPAM, thus you are sure that you do not want to get any more messages from that domain.
Combine SPF / DKIM with domain blacklisting, and then you *have* an efficient spam fighting tool.
More information about the Info-cyrus