On Wed, Jan 29, 2025 at 8:45 PM Jim Fenton <fen...@bluepopcorn.net> wrote:

> I’m a little unclear on the need to fully describe the “mutation” that
> might be applied by an intermediary. Even if fully described, you need to
> have some trust of the intermediary to accept the mutation, because
> otherwise you don’t know that the mutation doesn’t contain harmful/unwanted
> content (barring some magic AI thing perhaps).
>
> If you do have trust of the intermediary to only sign messages where they
> have verified the DKIM signature of the message received by the
> intermediary, shouldn’t the intermediary’s signature on the modified
> message should be sufficient? I thought this was effectively what  ARC is
> doing, although I have quibbles about how ARC does it.
>

I think there's a difference between a general mechanism that can describe
any mutation, and a fixed set of known mutations we can all agree are well
understood and generally harmless (Subject tags, small footers, etc.).  The
former approach does indeed mean the verifier has to decide if the mutation
is acceptable, which I think is a difficult problem.

But I'm content to leave that discussion to the WG rather than the charter.

As I understand it, ARC on the other hand doesn't care what the mutation
is, but just proves a chain of handling; if hop N+1 observes that N liked
the message and N+1 trusts N, then N+1 can also like the message even if it
was modified in transit.

-MSK
_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to