On 8/20/2025 11:34 AM, John R. Levine wrote:
On Wed, 20 Aug 2025, Murray S. Kucherawy wrote:
I have to find the specific sections, but I recall RFC 6376 talking about
why client verification of signatures is not a great idea.  Keys rotate,
for example, so long-term signature validation is not guaranteed to be
reliable.  People who were around in the RFC 4871 days may remember other
reasons why the general position was that this wasn't something worth
pursuing.

Client signing was clearly out of the question since there's no reasonable way to manage the signing keys, so if they're not going to sign it makes sense for them not to verify either.

I do not understand what the key management problem is that you are referring to. I am guessing the issue has to do with multiple users being able to access the same private key.

But, of course, there is nothing to prevent each user from having a different private key, tied to different public key, tied to a different selector.  That sort of administrative freedom was one of the reasons for have selectors.

Also, issues with signing are largely irrelevant to possible issues with validation, given that the former is dealing with private/protected keys and the later is dealing with very public keys.



Also, by that point we had realized that spam filtering works a lot better in the MTA than in the MUA.  It can look at lots of mail at once, not just mail to one user, and have shared dynamically updated criteria.  You can still have per-user criteria, but they're applied in the MTA so, among other things, all of the user's MUAs see the same results.

Except there is nothing preventing having UAs share assessment data with a common analysis engine.


d/

--
Dave Crocker

Brandenburg InternetWorking
bbiw.net
bluesky: @dcrocker.bsky.social
mast: @[email protected]

_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to