On 10/11/10 3:05 PM, Wietse Venema wrote:
> Charles Lindsey:
>>> When the bad guy sends mail with (multiple) forged headers, the
>>> best they can get is that naive mail programs render their forged
>>> header with an indication that THE BAD GUY'S DKIM SIGNATURE VERIFIED.
>>>
>>> Sending forged headers with bad guy's DKIM signatures is not an
>>> interesting attack on DKIM.
>> On the contrary, it is an exceedingly interesting attack.
> If you believe that sending mail with a valid bad guy signature is
> an interesting attack on DKIM, then that implies that you're willing
> to believe mail that is signed by arbitrary strangers.  That is a
> problem that DKIM is not designed to solve.
Use of a pre-pended From could be for servi...@big-bank.com, where the 
valid signature could be for some...@big-ips.com.  It seems important to 
keep this from being an attack vector, as bad actors might send 
themselves their messages to replay them in a deceptive fashion.  Its 
not hard to imagine this becoming a problem.  It also seems unlikely to 
have messages from a large provider blocked when a few of their messages 
are used in an attack that they did not directly issue.

-Doug


_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to