14.11.2016 16:00, John R Levine пишет:
>
> Bonus hack for BCC users: instead of putting the recipients into the
> r= tag, put in colon separated hex or base32 MD5 hashes of the
> recipients.  To avoid rainbow table attacks, the new rs= tag includes
> a variable length random salt string that is prefixed to each address
> before hashing.  So to verify the signature, salt and hash the actual
> recipients and see if all the hashes are in the r= list.  This leaks
> the number of recipients but not their addresses.

It doesn't protect against BCC discovery. If Alice al...@example.com
wants to check Bob bob@example is a recipients of Bcc, she can directly
get a hash of Bob's address with salt without the need to use any
rainbow tables. Asymmetric cryptography is requires with both sender's
and recipient's key to avoid this possibility.


-- 
Vladimir Dubrovin
@Mail.Ru
_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to