On Aug 30, 2006, at 12:38 PM, John Levine wrote:

If I understand your position, you are positing that someone will pay between $20 and $50/mo for Internet access, probably some extra amount per month for a DKIM-capable mail service, but they use a crummy DNS service where they don't know how to put in NS records, and the $2/mo it would cost to switch to a DNS service that does support them is an insurmountable barrier. Maybe I'm getting hard hearted in my old age, but pleas of selective ineptness or selective poverty do not make a compelling argument for anything.

Why sign a message when the signature is never seen by the recipient? In all likelihood, a valid signature not matching the address in question will not receive any positive annotations, especially from a large domain.

Assume you are right about the majority not wanting to coordinate with their email-provider, convey a set of moderately complex details to their name service provider, and then hope their mail continues to work. When either name-service-provider, or the domain owner makes an error transcribing a detail, it is likely the email-service provider who will need to sort out what went wrong. This will require support staff (your time) to deal with configuration issues when someone makes a mistake. In addition, all of your accounts now must carefully track who uses what keys.

The many ways that this can be done, is a problem in itself. Even within this group, it is difficult for anyone to predict what the other may want, and where it might be placed within the namespace. As a result of these issues, this service will cost more per month. The question "Why did we want DKIM?" might come many people's mind.

Some might suggest so Eliot's dad knows when Eliot is telling him to buy shares in Petroleum International stock, or load a player for the latest video from Paris. Social relationships are exposed in many ways, perhaps by promotions offering free music downloads when you tell a friend, or by mailing lists like this one. The majority remains prone to social spoofing. Some might call it spear phishing, but it is worse. There is little that is more compelling than being told by a friend to try something that is really exciting or funny.

Ensuring your email-address is within the signing domain is not really the end of the story either. Is everyone else within this domain trustworthy? Is there a way for a recipient to know whether anyone within the domain can also use this address, and which domain is actually doing the signing and validating of the email-address. It is not good to have these details hidden. It would be better for the message annotations to indicate who is doing what for whom, and whether they said it was okay.

Imagine that you want to raise some money to fund those foreign exchanges students, but you don't want to deal with telling everyone how to setup their DNS, so you offer to sign messages is a "special" way. : )

Your premium service now asserts the email address has been "validated" (when it has been of course). Along with their assigned address within the domain, you asked for a secondary contact address that you happen to also validate. As part of this service they can also request inclusion of a limited number of other addresses. It does not matter whether the address is within in your domain.

To allow this to work, a special signature is needed to be able to assert (for any address domain) the email-address is valid. Alas that is missing from DKIM at this time, but assume it does exist. Eliot knows that he can trust your service, and signs up the moment he hears about it. To allow his dad to know that he is using your service, Eliot puts your domain name into the policy of his vanity email-address, [EMAIL PROTECTED] _dfsp._domainkey.at-large.com IN TXT "v=0.0; f=A; a=taugh.com:at-large.com;"

Eliot's dad's MUA knows all about DKIM and this new special way of asserting a valid address. The MUA notices Eliot's email-address is in the address book. It then checks the policy record. When the policy indicates taugh.com signs for at-large.com, the signature is then checked. Because the signing domain was in the policy "a=" list, the MUA also knows that the message is valid when asserted "valid" with this new and special Inter-Domain assertion. A gold star is then placed next Eliot's email-address allowing his dad to know it was from him. Eliot did not having to explain to his dad all about how trustworthy John Levine is at taugh.com and where to look in the raw headers for taugh.com.

-Doug


_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to