> -----Original Message-----
> From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-
> boun...@mipassoc.org] On Behalf Of Mark Delany
> Sent: Saturday, October 16, 2010 2:39 AM
> To: ietf-dkim@mipassoc.org
> Subject: Re: [ietf-dkim] Data integrity claims
> 
> On Sat, Oct 16, 2010 at 12:10:48AM -0400, Dave CROCKER allegedly
wrote:
> >
> >
> > On 10/15/2010 8:32 PM, Mark Delany wrote:
> > > Therefore one could
> > > argue that DKIM is "protecting" that relationship between the
message
> > > and identifier.
> >
> > Clever phrasing.  Might be too subtle for general use, but I think
it
> offers a
> > perspective that could be useful.
> >
> > I think the issue here is that when people talk about protecting a
> message, they
> > tend to have in mind all sorts of attacks designed to trick users.
DKIM
> > actually does not have much to say about such things.
> >
> > Yes, it ties an identifier to a bag of bits, and yes it specifies
what
> those
> > bits are, but it really does deal only with those bits and not
> (necessarily) the
> > entire message.
> 
> I have a problem with this approach and I don't pretend to know the
> right answer.
> 
> My problem is that if some valuable domain like paypal sends me a
> bunch of bits that I or my MUA or my MTA ties to paypal.com then the
> end goal of DKIM is, IMO, that those bunch of bits I "see" are the
> ones that paypal sent. No more, no less.
> 
> To murder another idiom: "What you see is what they sent" is I believe
> the ultimate goal of DKIM. Or, "what you complain about is what they
> sent". Whatever.
> 
> So anything that circumvents "what you see is what they sent" I think
> is in scope for DKIM to eliminate or mitigate.
> 
> Is that requirement solved in the verification protocol of DKIM or is
> that solved in advice to MTAs/MUAs?  I don't know. But I am sure that
> if we don't end up with that guarantee, then I do wonder what we are
> offering.
> 
> 

Mark is more clearly articulating what I have been struggling with. 

This is also one of the reasons I have always felt that 1st party
signatures are inherently a different value proposition from 3rd party
signatures.

Mike

_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to