Steffen Nurpmeso wrote in <20230309221555.or-j9%stef...@sdaoden.eu>: ... |one could add one entry for each, with the necessity to cover all |of these in the signature. Then receivers could check all in turn |and pick one matching. ([Of course] The values of all those
Of course this is total mess as it reveals the real receivers. (The MUA i maintain then sends splices and sends an individual message to each "to" when it has to encrypt. On the other hand it is a missing feature that a single message with multiple public keys of receivers to be decrypted by all of them can be generated. Anyhow only the former "applies" here.) Then again DKIM _could_ checkout DNS for some public key of receiver domains, and then something comparable could be done. (Even in a way that does not reveal the true number of receivers i'd be hoping.) Of course the messages get larger and larger with such (even with today's small keys like ED25519, if the list of receivers is large enough), revealing something by itself. --steffen | |Der Kragenbaer, The moon bear, |der holt sich munter he cheerfully and one by one |einen nach dem anderen runter wa.ks himself off |(By Robert Gernhardt) _______________________________________________ Ietf-dkim mailing list Ietf-dkim@ietf.org https://www.ietf.org/mailman/listinfo/ietf-dkim