On Sun 20/Jul/2025 16:43:35 +0200 Tero Kivinen wrote:

If you count in emails inside big companies, it seems that every single email is CC'ed to dozen of people [...]

I am not sure if that kind of emails are intended to use DKIM2, but if so that kind of traffic might not be vanishingly small, and if those emails are delivered in one transaction it saves lots of resources.


DKIM signatures were never intended to provide an authentication seal to be stored with the message. So, what would be the point of signing internal messages? I would argue that if, based on the way mail flow works in a given ADMD, the system is confident about the origin of a message, then there's no need to verify the signature, and therefore no need to sign it. An auth=pass might be all you want for Authentication-Results:.

A messages intended for a mix of internal and external recipients can be securely delivered to internal recipients with the signature, or one of the signatures, prepared for external destinations.

The practice of BCCing messages to the author's Sent folder (to spare an IMAP transfer) would theoretically require a separate transaction and its own signature with the appropriate rt=. In practice, it is sufficient to just deliver the message, with the signature it happens to bear (which might be used for debugging.)


Best
Ale
--





_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to