Steffen Nurpmeso wrote in
 <20230309221555.or-j9%stef...@sdaoden.eu>:
 ...
 |one could add one entry for each, with the necessity to cover all
 |of these in the signature.  Then receivers could check all in turn
 |and pick one matching.  ([Of course] The values of all those

Of course this is total mess as it reveals the real receivers.

(The MUA i maintain then sends splices and sends an individual
message to each "to" when it has to encrypt.  On the other hand it
is a missing feature that a single message with multiple public
keys of receivers to be decrypted by all of them can be
generated.  Anyhow only the former "applies" here.)

Then again DKIM _could_ checkout DNS for some public key of
receiver domains, and then something comparable could be done.
(Even in a way that does not reveal the true number of receivers
i'd be hoping.)  Of course the messages get larger and larger with
such (even with today's small keys like ED25519, if the list of
receivers is large enough), revealing something by itself.

--steffen
|
|Der Kragenbaer,                The moon bear,
|der holt sich munter           he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)

_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to