Re: [ietf-dkim] THIS IS A MULTIPLE 5322.FROM MESSAGE

2010-10-05 Thread Julian Mehnle
Again, please don't CC me. I'm subscribed to the list. Stephen Farrell wrote: > On 05/10/10 23:54, Julian Mehnle wrote: > > Recommending that one more "From" be added to h= (and hashed) > > than From headers are initially placed in the message should be >

Re: [ietf-dkim] THIS IS A MULTIPLE 5322.FROM MESSAGE

2010-10-05 Thread Julian Mehnle
Hector Santos wrote: > Right. Does this add "signer" reputation weight for the injected > 5322.From? Probably not. AFAICT mipassoc.org doesn't verify DKIM sigs on list messages, and even if it did, a verified DKIM sig (such as one created by the original author of the message) doesn't tell any

Re: [ietf-dkim] THIS IS A MULTIPLE 5322.FROM MESSAGE

2010-10-05 Thread Julian Mehnle
President Obama wrote: > [...] Funny, but this shows nothing because mipassoc.org resigns messages (d=mipassoc.org). (Oh, and it even included *two* "From"s in h= on your message.) > I propose the following addition text by adding to 48721bis to address > this serious issue; > >Special Co

Re: [ietf-dkim] ISSUE: 4871bis - Security Loop hole with Multiple 5322.From

2010-10-05 Thread Julian Mehnle
Hector Santos wrote: > Julian Mehnle wrote: > > > I interpret RFC 4871, section 5.4 (actually, exactly the part you > > quoted originally), such that signing a message that has a dingle > > From field with h=From:From ensures that adding another From field > >

Re: [ietf-dkim] ISSUE: 4871bis - Security Loop hole with Multiple 5322.From

2010-10-05 Thread Julian Mehnle
Please don't CC me. I'm subscribed to the list. Hector Santos wrote: > Julian Mehnle wrote: > > > The trick is to list From twice in h=. This ensures more From headers > > cannot be added without breaking the signature. > > Julian, this was explored and

Re: [ietf-dkim] ISSUE: 4871bis - Security Loop hole with Multiple 5322.From

2010-10-05 Thread Julian Mehnle
Murray S. Kucherawy wrote: > But the attacker in this scenario is already the signer (or has > compromised the signer), so he/she will just sign the single From:. If the attacker is the signer, they can just as well resign many times. I don't think that's the scenario that Hector meant, though.

Re: [ietf-dkim] ISSUE: 4871bis - Security Loop hole with Multiple 5322.From

2010-10-05 Thread Julian Mehnle
Hector Santos wrote: > It has been observed by implementations that is it possible to replay > a message with a 2nd 5322.From header at the top which wouldn't break > the DKIM signature validity, but would often be displayed by MUAs to > display the new 5322.From display rather than the signature

[ietf-dkim] Re: SSP + SPF records in DNS

2008-01-01 Thread Julian Mehnle
Julian Mehnle wrote: > [...] there are indeed other ways for DNS-traffic-based DoS attacks that > are just as suitable as, if not more than, SPF: > > http://www.openspf.org/auth/draft-otis-spf-dos-exploit_Analysis#rebuttal Er, that was supposed to read http://www.openspf.org/draft-

[ietf-dkim] Re: SSP + SPF records in DNS

2008-01-01 Thread Julian Mehnle
Douglas Otis wrote: > On Dec 30, 2007, at 7:15 PM, Frank Ellermann wrote: > > Nobody proposed to use SPF to "validate a DKIM domain in some > > manner". SPF validates envelope sender addresses, it allows "accept > > and bounce" after a PASS. SPF is for SMTP, not for DKIM. If you > > reject a SSP