On Sep 11, 2006, at 5:50 PM, Hector Santos wrote:
On Sep 11, 2006, at 5:05 PM, Hector Santos wrote:

There are so many issues with this DKIM-BASE + LOCAL POLICY UNKNOWN that I find it hard to see how it justifies the risk of signing.

What issues and risks do you refer to with respect to signing?

DKIM results are not visible to the recipient without either annotation or 100% blocking of unsigned email-addresses.

When the operation of DKIM does not expect all messages containing a specific email-address to be blocked, one should assume annotation is how a recipient is aware of valid DKIM signatures.

- Inconsistent results.

Either the signature is valid or it is not. This does not depend upon policy.

The message can be annotated as having the following:
 - A valid signature with a matching email-address domain.
 - A valid signature with an associated email-address domain.
 - An assured email-address comparing with a retained email-address.

These annotations do not depend upon policy for consistent results. When policy does not assure an email-address is initially signed with only compliant services subsequently used, only annotations offer recipients any consistent information. Invalid signatures with such an email-address are consistently _not_ blocked. Of course blocking breaks existing uses of email, and does not offer much in the way of anti-spoofing protection anyway.

Can you be a bit more specific about what do you mean by inconsistent results?

- Fake it to you make it.

An assured email-address comparing with a retained email-address can provide comprehensive protections from spoofing. Again, this protection does not depend upon email-address policy.

- 3rd party signatures

When a signature can be associated with the email-address, this email- address can be annotated. Here policy can offer requisite email- address associations. If not, then no annotations and no resulting issues either.

- Bad Actors remain in legacy operations HOPING for unknowns.

They never receive the requisite annotations!

- Good Actors remain in legacy operations FEARING the unknowns.

What is there to fear?

- Receivers requiring to support multiple "batteries."

The MUA already has an address-book.  No batteries required.

What is your concern? Blocking messages that happen to have invalid signatures breaks email. As this blocking can only hope to provide minor protections, why not adopt a system that provides substantially better protections from spoofing and retains email delivery integrity? Policy is needed for associations to increase DKIM's coverage.

-Doug


_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to