Michael, I agree with you that there's a security risk to allowing footer
modifications. But I think Wei's point is critical, the difference between
the l= vulnerability and the algebra vulnerability is that the algebra will
require clear attribution of which party made the modification. That makes
an enormous difference. Unlike l= you can now verify whether or not any 3rd
party modifications were made, and choose to not trust the DKIM pass if
modifications exist.

I personally, don't think that the algebra is enough to treat it as a DKIM
pass, and think it should be handled in a nuanced way in a third category,
neither DKIM pass nor fail. But I recognize that it's valuable to have the
attribution of what change was made and it then gives different receivers
flexibility on what policies/approaches they want to have. If you're a more
conservative receiver then you can easily decide to treat any 3rd party
modifications as a DKIM fail. But you'll still be in a better situation
than with l= where you can't even tell if a modification was made.

-Emanuel

On Mon, Jan 27, 2025 at 11:27 AM Michael Thomas <m...@mtcc.com> wrote:

>
> On 1/27/25 11:19 AM, Al Iverson wrote:
>
> On Mon, Jan 27, 2025 at 1:14 PM Michael Thomas <m...@mtcc.com> 
> <m...@mtcc.com> wrote:
>
>
> which you can't do with l=.
>
> Something doesn't compute here. Back when the concern around the L tag
> hit the public consciousness in May 2024, I observed a fair amount of
> mail hitting my spamtrap network with the L tag set up in a way where
> I was able to grab messages and modify the body to change it to add
> "evil" links just fine, and then inject the message, receive it, and
> it passes DKIM. So either I don't understand, or you're wrong about
> that. L was implemented in a way that didn't "just allow appending
> content," it also effectively allows modifying content beyond byte X
> with no corresponding failure in the DKIM signature checks.
>
> The only way that would work is if the originator did something like
> l=0, which hopefully nobody does. If the l= contains the entire body as
> sent by the originator you wouldn't be able to do that.
>
> Yep. In what I've observed, L=1. I'm glad you now agree that it's possible!
>
> Only if the sender is being exceedingly stupid. All that proves is that
> there are stupid deployments. Hardly something to judge all by.
>
> That said, the complaints (overblown imo) about l= go back 20 years.
> It's hardly a new argument, and anything the supersedes it will have the
> same considerations.
>
> "Hardly new" doesn't seem to be a suitable reason to leave it be.
> "Anything new will have the same problem" is a heck of an assumption,
> and not one I agree with.
>
>
> Assuming any new scheme allows for arbitrary body changes, it's the same
> security risk, and actually makes it more difficult to evaluate.
>
> Mike
> _______________________________________________
> Ietf-dkim mailing list -- ietf-dkim@ietf.org
> To unsubscribe send an email to ietf-dkim-le...@ietf.org
>
_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to