On Friday, October 12, 2018 06:02:40 PM pg...@dev-mail.net wrote:
> > RFC 8301 removes rsa-sha1 from DKIM, so "FinCo" isn't wrong to consider
> > the signature invalid.  It's a bit aggressive for my taste, be it's the
> > receivers call.  The most I might do is ignore the signature.  It's
> > definitely not a reason to block the message.
> 
> Thanks for the relevant rfc.
> 
> I tend to agree.
> 
> I may have been unlcear -- it's my server receiving emails from the errant
> FinCo, dkim-signed with sha1 sigs.  So up to me to determine if they are
> 'putting clients at risk' by being lazy about their security, and blocking
> their messages.
> 
> Simply, IMO, FinCo's admins are being lazy/sloppy.  They _should_ know & do
> better.  (This really is a BIG organization; personally, I'd be embarrassed
> ...)
> 
> My suspicion is that this is NOT rising to "nuke the basatards" smtp
> response, and that I should figure out how to get the attention of the
> right persons (NOT 'customer service') at FinCo.  TBH, how to make that
> contact is beyond me; public shaming on Twitter might be an option ;-)
> 
> That's for DKIM.

To amplify a bit:

RFC 8301 changed two security properties relative to DKIM:

1.  Removed rsa-sha1 from the algorithm set (later replaced by Ed25519-sha256 
in another RFC).

2.  Bumped the minimum acceptable RSA key sized to 1024 bits (with 2048 
recommended).

The latter change is operationally much more important today (it's at least 5 
years late).  Not accepting DKIM signatures based on RSA keys < 1024 bits is 
something everyone should be doing and there are risks in not doing so.

The removal of rsa-sha1 was done ahead of it being broken for this use case 
(on the theory it's better disuse in advance of the need to panic over it).

Scott K

Reply via email to