Hector Santos:
> > A bad actor can register look-alike domains and added their own DKIM
> > signature sent through any number of providers. Designation does not
> > make this problem worse.  With the entire email-address being
> > internationalized, a problem of visual recognition must be handled
> > through other strategies.
> 
> What Frank is saying is the ISP.COM has all power to control this and
> protect his users from direct DKIM phish attacks in a very elegant and
> graceful manner using SSP.
> 
> Example:

None of these loopholes would exist if d= domains were required to
match rfc822.from domains (*). Third party signatures are part of
the problem. Making them "work right" requires additional complexity.
Complexity leads to error, vulnerability and exploitation.

        Wietse

(*) This is possible even when the signer is in a different domain.
    All they need is the private key that matches the public key
    in the d= DNS record. That record can, but does not have to,
    be CNAME delegated to the signer's DNS.
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to