On 1/25/25 10:10 AM, Richard Clayton wrote:
> There are additional needs.  They are new.  Or, at least, they were not
> previously a priority.  Since they were not needs when DKIM was developed, they
> are not 'shortcomings'.

they may not have been perceived to be shortcomings then -- they are
now, which is why a number of people wish to improve things for the
people whose email they handle

Fwiw, mailing list traversal was always a shortcoming of DKIM from the very beginning. That some people dismissed it at the time doesn't alter the fact that it was -- and is -- a shortcoming. Our original intent at Cisco was to address the internal spear-phishing problem for us, but given Cisco's widespread use of mailing lists -- both internal and external -- that made it a hard goal to achieve. z= and l= were an attempt to be "good enough" on my part even though there was a lot of hostility at the time (they actually worked pretty well in practice). That's especially true of l= since the objection was that it was "insecure", but any new mechanism which records what changes an intermediary made has the exact same "insecurity" in that the message will differ from the originating signature's signed canonical text whose changes may or may not be benign. Frankly, that's up for the receiver to figure out which I think they are capable given spam/scam filters, etc and the reputation that you can assess from the intermediaries making the mutations. I even wrote a patent app about that which I don't think was issued probably because it was too obvious.

Mike


_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to