On 2017 Feb 12, 16:17, Michael Ströder wrote:
> Josh Good wrote:
> > On 2017 Feb 11, 19:18, [email protected] wrote:
> >> So technically integrity is assured from server to server, but not between 
> >> clients
> >> and server.
> > 
> > That is correct. DKIM is for MTA-to-MTA integrity.
> 
> There are no widely used MUA implementations making use of DKIM but it is 
> definitely not
> technically or standard-wise limited to MTA-to-MTA:
> 
> https://tools.ietf.org/html/rfc6376#section-2.1
> (same text in predecessor RFC 4871)

Yes, theoretically a sending MUA could DKIM sign, but the user cannot
from his MUA insert a new, personal DKIM selector into his domain DNS
TXT record. So DKIM is not real end-to-end as the sending in-the-flesh
user cannot choose his own keys to sign with DKIM, but can only use
those keys his domain administrator has vetted for him to use. Would you
trust such a scheme if you lived in North Korea?

> Compared to S/MIME and PGP it provides integrity protection of message
> headers and body while S/MIME and PGP only sign the message body.

Very true. But then, S/MIME and PGP also provide encryption of the body,
whereas DKIM can only digitally sign emails.

Regards,

-- 
Josh Good

Reply via email to