On Wed, Mar 19, 2025 at 10:14 AM Jim Fenton <fen...@bluepopcorn.net> wrote:

> I’d still be concerned about the confidentiality of the bcc recipient
> addresses. If a recipient wanted to ask, “Did Bob get bcc’ed on this?” they
> could potentially find out by trying to add Bob’s email address and seeing
> if the hash matched.
>

I don't understand how that attack would work.  Imagine the signature
validates with, let's say, the visible set of recipients only.  To ask your
question, I also feed it the Bob address.  That means what gets fed to the
hash changes, which would invalidate the signature, and I can't learn
anything from it.

Can you illustrate?

-MSK
_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to