-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Statistics: Estimate how common key rotation within the same selector is #100
Comments
We can also backdate dkim keys in our database to the earliest email that verifies with that key and domain and selector! Right now we just add the current date right |
It's a good idea! Should be quick to implement but I created an issue for it anyhow #101 |
I have collected some stats but it's not entirely obvious how to interpret it. The crazy image below shows the DSPs sorted by this measure. |
@Divide-By-0 This is for |
Using a large set of emails, for each domain-selector-pair in the set, try to dkim verify each email back in time (against current DNS record) and see if there is a pattern that older emails before some date cannot be verified, while newer emails can. This would indicate that the dkim key has been rotated for that selector.
In each specific case, there may of course be other reasons, so there is a lot of noise in the data, but for a large enough set of email, it should be possible to obtain some useful statistics.
Implementation idea:
Loop though mbox file(s) and try verify each email with https://pypi.org/project/dkimpy/
The text was updated successfully, but these errors were encountered: