Murray S. Kucherawy wrote:

> Current implementations, especially the two library ones that 
> are referenced most often in here, haven't the functionality to 
> cause header fields to be removed, prefixed, reordered, modified, 
> etc.  This change would require them to be overhauled to extend 
> their reach into what the MTA can do.  That expansion of scope 
> of "DKIM process" to me requires a recycle at Proposed Standard.

What started all this is one of these API dealing with it with the 
verification and I pointing this out.  However, we did not know why it 
did this and we later found out.

Their solution was only on the verification side with an added 
requirement that all 5322.From be signed - the default behavior.

So any belated injection of a 5322.From header would invalidate the 
signature which I believe will cover the majority of the loophole.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to