Comments inline

> -----Original Message-----
> From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-
> boun...@mipassoc.org] On Behalf Of Dave CROCKER
> Sent: Tuesday, October 05, 2010 8:45 AM
> To: Ian Eiloart
> Cc: Tim Polk; ietf-dkim@mipassoc.org
> Subject: Re: [ietf-dkim] ISSUE: 4871bis - Security Loop hole with
Multiple
> 5322.From
> 
> 
> 
> On 10/5/2010 8:15 AM, Ian Eiloart wrote:
> >> It has been observed by implementations that is it possible to
replay
> >> >  a message with a 2nd 5322.From header at the top which wouldn't
> break
> >> >  the DKIM signature validity, but would often be displayed by
MUAs to
> >> >  display the new 5322.From display rather than the signature
bound
> >> >  5322.From header.
> > Ouch. That's nasty. But wouldn't it be better to advise MUA vendors
to
> > display the signed header? Are there really MUA's that will display
the
> > unsigned headers*and*  assert that it was validated? If so, that's
> surely a
> > bug in the implementation of the MUA.
> 
> 
> Your comments underscore the importance of being careful about what we
> expect
> from DKIM.  As you note, if software is DKIM-aware, it also needs to
be
> DKIM-intelligent.
> 

Agreed.

> At a deeper level, there is a continuing problem with casting DKIM as
a
> mechanism to "protect" a message.  That's something that OpenPGP and
> S/Mime do;
> it's not something DKIM does.  DKIM merely tries to do enough to
ensure
> that the
> d= is valid, to provide a basis for reputation assessment.
> 

As long as DKIM signs the body and fails to validate on a signed but
modified body then there has to be some presumption that DKIM is a
mechanism (of some sort) that protects the message (to some extent).

> Hence, I recommend that this ISSUE be declined and closed.
> 

I'm still cogitating on the appropriate response to this ISSUE.

Mike

_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to