With DKIM, according to my understanding, you are supposed to treat a
"bad" sig the same way you'd treat "no" sig.  So it would neither help
nor hurt to have a bad signature; it would be like having none (or a
missing sig).

Personally, I think DKIM would be a whole lot more effective and
powerful if we *could* treat bad sigs as bad.  Also, I think there is
danger of people reacting to bad signatures negatively.  Personally, I'd
eye a failed sig with a more suspicious eye than no sig.

                                        -Joe


Bob Puff wrote:
> I confess not having read up on Domain Keys.. I did get into SPF a little, but
> understand its flaws as well.
> 
> If a bad DK isn't bad, then how is this supposed to help spam?  I mean, if the
> mere presence of some signature in the headers will increase the likelihood of
> an email being delivered (or at least help it NOT be tagged as spam), surely
> the spammers will pick up on this, and the whole benefit lost.
> 
> Example:
> 
> Spammer takes a legit message from a DK sender, replaces it with his spam, and
> blasts it out with the original DK headers.  The message has obviously been
> altered, and contains spam.  Would it not be right to reject this message,
> since it fails the DK check?
> 
> Now if the DK verification were done on the input side to Mailman (that is, in
> the MTA), I can see a benefit.  But even in that scenerio, unless Mailman is
> signing, I'd think removal of the DK headers would be the right thing to do.
> 
> Bob
> 
_______________________________________________
Mailman-Developers mailing list
Mailman-Developers@python.org
http://mail.python.org/mailman/listinfo/mailman-developers
Mailman FAQ: http://www.python.org/cgi-bin/faqw-mm.py
Searchable Archives: 
http://www.mail-archive.com/mailman-developers%40python.org/
Unsubscribe: 
http://mail.python.org/mailman/options/mailman-developers/archive%40jab.org

Security Policy: 
http://www.python.org/cgi-bin/faqw-mm.py?req=show&file=faq01.027.htp

Reply via email to