On 06/Jul/11 20:34, Murray S. Kucherawy wrote: > Anyway, with a few nitty edits from me as well, here's the current > 8.15 for -15 for everyone's consideration.
A few comments: > 8.15. Attacks Involving Extra Header Fields > > [...] > > Many email components, including MTAs, MSAs, MUAs and filtering > modules, implement message format checks only loosely. This is done > out of years of industry pressure to be liberal in what is accepted > into the mail stream for the sake of reducing support costs; > improperly formed messages are often silently fixed in transit, > delivered unrepaired, or displayed inappropriately (e.g., by showing > only one of multiple From: fields). I'd s/to be liberal/to be exceedingly liberal/ (we don't want to revise Postel's statement, do we?) > A genuine signature from a domain under attack can be obtained by > legitimate means, but extra header fields can then be added, either > by interception or by replay. In this scenario, DKIM can aid in > detecting addition of specific fields in transit. This is done by > having the signer list the field name(s) in the "h=" tag an extra > time (e.g., "h=from:from:..." for a message with one From field), so > that addition of an instance of that field downstream will render the > signature unable to be verified. (See Section 3.5 for details.) > This in essence is an explicit indication that the signer repudiates > responsibility for such a malformed message. +1 for exemplifying "h=from:from:...", even if it's not a cure-all. > DKIM signs and validates the data it is told to and works correctly. > So in this case, DKIM has done its job of delivering a validated > domain (the "d=" value) and, given the semantics of a DKIM signature, > essentially the signer has taken some responsibility for a > problematic message. It is up to the identity assessor or some other > subsequent agent to act on such messages as needed, such as degrading > the trust of the message (or, indeed, of the signer), or by warning > the recipient, or even refusing delivery. I'd omit any allegation on what an assessor's needed actions might be. (Actually, we'd need yet another policy or authentication method in order to allow the outcome of an identity assessor to be formally expressed. Without it, the quick-n-dirty approach of degrading the trust of a message by tampering with its DKIM verification's results may seem the easiest remedy --much like what Doug et al. proposed.) > An agent consuming DKIM results needs to be aware that the validity > of any header field, signed or otherwise, is not guaranteed by DKIM. Please, s/validity/reliability/: someone might believe a field is valid if it retains the value that was given to it originally. _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html