On 12/6/22 3:22 PM, [email protected] wrote:
That's not true in all cases. Spam and phishing slips through filters, etc, regularly and doing forensics may happen well past delivery windows. Part of DKIM is a "blame me" mechanism. If you remove the signature how do they know they are actually responsible?

Perhaps the domain can keep the signatures separate, just not when sent out to the MUA. Or we can figure out something more creative.

. And even if you remove the signature, there is a lot of other evidence that a leaked email provides. DKIM with Her Emails made a pretty watertight case that they were real, but even without it it would have been really hard to disclaim them, especially if people get access to the receiving domain's logs in a legal setting.

Not all versions of adversarial attribution are done publicly or in a legal setting, and journalistic authentication is always possible. This is materially different than not offering any protection to users at all, and offering authenticated proof of private communications. A user may be able to disclaim specific messages, for example, even if others appear to be correct (“that message was modified!”)

I (and others) wrote a usenix paper on the subject. Perhaps taking a look at the paper’s motivation will be helpful in understanding our complaint with how DKIM works now: https://www.usenix.org/conference/usenixsecurity21/presentation/specter-keyforge


Frankly using Her Emails as a motivation to do something is rather pointless. The valid DKIM signature was icing on the cake. The cake would have been eaten with our without it though. Nobody actually cared about whether it could standup in court or not. Even I for years didn't know that DKIM was part of the picture but it really didn't matter one way or the other whether I thought they were legit or not.

Mike
_______________________________________________
Ietf-dkim mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to