On 12/6/22 2:33 PM, Jon Callas wrote:
On Dec 6, 2022, at 14:23, Michael Thomas <[email protected]> wrote:
On 12/6/22 2:05 PM, [email protected] wrote:
I very much disagree with everything the above poster said.
Deniability is a default property of all e2ee messaging apps; it’s both
surprising and disheartening that email — a largely unencrypted medium — fails
to provide deniability for its users. If we said that signal was behaving this
way, or TLS, or any other e2ee protocol, we’d be up in arms.
If you want deniability you need to do it some other way. You have absolutely
no control over the receiving domain and little to no control over the sending
domain as well. Even if this wg produced a BCP, BCP's are toothless and rely on
good will when there may be none or can't be bothered. Even unsigned mail can
make for good circumstantial evidence.
I'm very much pro-signature removal.
I'm going to disagree with Mike a bit in that *deniability* is not what we
want. What we want is not creating a mostly-valid non-repudiation. (Me, I don't
think deniable encryption is possible, but that's another long discussion.)
There have been a few cases where DKIM signatures were used to verify hacked
email accounts.
Yes, imagine my surprise when I found out about Her Emails only about a
year ago. But that isn't the only use of forensics.
However, as you know, DKIM authenticates the Administrative Domain not the
user. We know that if someone were to be able to do simple SMTP forging to an
outgoing MTA, the MTA would sign the message despite it not coming from the
user.
The purpose of a DKIM signature is, as our original statement put it, to make
sure that a message from your bank actually came from your bank, even if it
passed through your alumni association. Once it arrives to your real mailbox,
that signature is not needed.
That's not true in all cases. Spam and phishing slips through filters,
etc, regularly and doing forensics may happen well past delivery
windows. Part of DKIM is a "blame me" mechanism. If you remove the
signature how do they know they are actually responsible? Or how do you
complain to their upstream provider without proof that it actually came
from their customers? Especially when it's not in their interest to
accept blame. And even if you remove the signature, there is a lot of
other evidence that a leaked email provides. DKIM with Her Emails made a
pretty watertight case that they were real, but even without it it would
have been really hard to disclaim them, especially if people get access
to the receiving domain's logs in a legal setting.
Mike
_______________________________________________
Ietf-dkim mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-dkim