The hacker does not need access to my zone, he just attaches a lookalike
header yes " And to have *any* rule that allows bypass of defense
based upon the receipt of a header from outside your control is
extremely dangerous." But folks will do it anyway

Bill Oxley 
Messaging Engineer 
Cox Communications, Inc. 
Alpharetta GA 
404-847-6397 
[EMAIL PROTECTED] 


-----Original Message-----
From: Michael Thomas [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, January 31, 2006 12:08 PM
To: Oxley, Bill (CCI-Atlanta)
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]; ietf-dkim@mipassoc.org
Subject: Re: [ietf-dkim] New Issue: 4.2 needs new Attack Item:
InconsistentSignature vs Policy Attacks

[EMAIL PROTECTED] wrote:
> If I do not publish any key records and a bad actor whips up an email
> purported to be from me with a fake signature attached, a non dkim
> compliant mta may have a rule that states "signed messages are
probably
> okay" that might bypass some spam checking software. Before DKIM is
> fully adopted/deployed expect to see this happen,

Unless the attacker also has access to your zone, they won't
be able to insert their key into it, and thus the signature will
never verify. And to have *any* rule that allows bypass of defense
based upon the receipt of a header from outside your control is
extremely dangerous. It would be nothing better than a 
security-through-obscurity backdoor.

                Mike

_______________________________________________
ietf-dkim mailing list
http://dkim.org

Reply via email to