On Nov 29, 2006, at 1:44 PM, Michael Thomas wrote:

I'm not sure whether this rises to a -ssp-req item or not -- I sort of lean toward it just to make certain that it is tracked. Or if there's a bunch of disagreement about what satisfies the SSP criteria, then it most likely should be...

This should be tracked.

DKIM policy (which should include domain associations) must not be limited to just one email header. Visual recognition of a From email address is confounded when displaying UTF-8, where an ACE label or different character repertoires might be used. Surely no one expects people to visually validate puny-code conversions or inspect character codes. This is just one problem related to visual recognition strategies. This situation becomes even more problematic as the From header itself changes roles. The sooner the DKIM WG acknowledges a visual recognition strategy is seriously (if not fatally) flawed, the better. DKIM must be used in conjunction with trusted lists such as address-books for there to be spoofing protections.

Proponents of visual recognition proclaim messages (such as those passed through a mailing-list) should be rejected to support this highly flawed strategy. A visual recognition protection scheme is so flawed as to be dangerous when describing visual recognition in conjunction with authorization as protection. Bad actors will adapt, and be rewarded with a means to gain a recipient's confidence. It is hard to imagine a worse strategy. There is no reason for DKIM to be so disruptive with current and future email applications.

An authorization/visual recognition strategy will likely only block a few percent of spoofing attempts once countered. An annotation scheme based upon "listed" recognition schemes will not disrupt use of mailing-lists or the EAI efforts, for example. Once dependence upon visual recognition has been set aside as flawed, then other headers can be afforded protection under an annotation/trusted list strategy.

-Doug


_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to