On Wed 23/Jul/2025 20:40:14 +0200 Tero Kivinen wrote:
Alessandro Vesely writes:
On Sun 20/Jul/2025 16:43:35 +0200 Tero Kivinen wrote:

If you count in emails inside big companies, it seems that every single email is CC'ed to dozen of people [...]

I am not sure if that kind of emails are intended to use DKIM2, but if so that kind of traffic might not be vanishingly small, and if those emails are delivered in one transaction it saves lots of resources.

DKIM signatures were never intended to provide an authentication seal to be stored with the message. So, what would be the point of signing internal messages? I would argue that if, based on the way mail flow works in a given ADMD, the system is confident about the origin of a message, then there's no need to verify the signature, and therefore no need to sign it. An auth=pass might be all you want for Authentication-Results:.

So you are saying there cannot be phishing attacks from internal network? Having DKIM signature on the internal emails protects against phishing attacks which do not come through official company servers.


That's up to an accurate definition of internal. A message that doesn't originate on a company server has to be defined as external.

I'm not sure if the savings are worth it. In some cases, such as Bcc: at the MSA, the savings come from simplifying the code.

The question is whether it's worth mentioning this in the spec. Obviously, no one is forced to use DKIM, security bigotry aside. Analyzing the system to see where DKIM is effective should still be a good idea. So I'd appreciate some suggestions for developers on interface options that might solve problems.


Best
Ale
--




_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to