On 11/23/20 12:48 PM, Dave Crocker wrote:
This recent article also goes into things that DKIM signatures imply:
https://blog.cryptographyengineering.com/2020/11/16/ok-google-please-publish-your-dkim-secret-keys/ <https://blog.cryptographyengineering.com/2020/11/16/ok-google-please-publish-your-dkim-secret-keys/>

The level of condescension, ignorance, and error throughout that article is impressive.  Given that it was written by someone whose profession requires extreme care about complex matters, the level of carelessness in the article is especially unfortunate.

Conveniently, he put his biggest error in bold font:

     "*DKIM provides a life-long guarantee of email authenticity that anyone can use to cryptographically verify the authenticity of stolen emails, even years after they were sent."*

DKIM does no such thing.


Yeah, that was pretty bad. "DKIM can be used to verify a piece of mail due to operator practices, but there are absolutely no guarantee that a signature will verify in the future due to those same practices."


ps. making sure that DKIM signature become invalid  relatively soon -- I think that removing the keys is simpler and just as effective as publishing the private keys -- seems like a reasonable suggestion.


Stephen Farrell is threatening to write an ID on the subject of publishing private keys. Frankly the stakeholders -- providers and users -- are not very well aligned on when where and why a provider would do such a thing. And writing an ID to say how to invalidate key when just unpublishing old selectors when you rotate keys is an easy second best shows that inertia is the actual issue, not the technical shortcoming.

Mike

_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to