On Sat, Aug 29, 2020 at 3:43 PM Douglas E. Foster <fosterd=
40bayviewphysicians....@dmarc.ietf.org> wrote:

> To elaborate on my question and Michael Hammer's answer:
>
> To be unique, a signature needs a unique dataset from which the hash is
> computed.   The weak signature will not be unique because it will be
> computed on non-random content such as From, To, and Date.
>

There are additional ways of introducing complexity and randomness.

>
> However, the signature can only be used by the designated domain.   So the
> worst possible "misuse" would be for the designated domain to use the
> signature on other messages.   This seems unlikely, and the worst-case use
> is no different than what ATSP would authorize.   But the weak signature
> has less information leakage, since nothing is published in DNS about the
> signature technique.   So I agree that the approach is a good one for those
> who want to provide mailing-list authorization.
>
> The remaining challenge is to communicate between recipient domains and
> mailing lists so that the list knows whether the recipient will honor the
> weak signature system.
>
> Doug Foster
>
>
>
>
> ------------------------------
> *From*: Jim Fenton <fen...@bluepopcorn.net>
> *Sent*: 8/26/20 5:01 PM
> *To*: Dotzero <dotz...@gmail.com>
> *Cc*: IETF DMARC WG <dmarc@ietf.org>
> *Subject*: Re: [dmarc-ietf] third party authorization, not, was
> non-mailing list
> On 8/26/20 10:54 AM, Dotzero wrote:
>
>
>
> On Wed, Aug 26, 2020 at 1:32 PM Doug Foster <fosterd=
> 40bayviewphysicians....@dmarc.ietf.org> wrote:
>
>> Are the weak signatures vulnerable to a replay attack?    I thought that
>> one of the reasons that DKIM signatures included the whole body was to
>> prevent the signature from being reused.
>>
>>
>>
>> DF
>>
>
> Not particularly vulnerable. The requirement is that you have the "weak
> signature" plus the intermediary full DKIM signature. This let's the
> validator/receiver know that the originating domain knew that the
> intermediary might break the originating domains DKIM signature but the
> validator/receiver would have the DKIM signature of the intermediary. The
> "weak signature" is only validated against that specific message and
> headers it signed and that specific intermediary. It's not a
> generic/general signature.
>
>
> It sounds like the weak signature is just a regular DKIM signature plus
> the designation of the intermediary, and the "weak" part is that you don't
> check the body hash against the body. Have I got that right?
>
> -Jim
>
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>
_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to