On 19 Mar 2025, at 10:34, Murray S. Kucherawy wrote:

> On Wed, Mar 19, 2025 at 10:29 AM Jim Fenton <fen...@bluepopcorn.net> wrote:
>
>> If I understand what you are describing properly, the verifying MTA can
>> verify the signature, but an individual recipient wouldn’t have the
>> envelope information to do that with — they would rely on the
>> Authentication-Results header field instead.
>>
>> But they would still have the signature itself, and could try various
>> likely envelope addresses until they found one for which the signature
>> verifies properly.
>>
>
> In the single recipient model, the attack you're describing requires you to
> be in possession of a message that was delivered to an unknown recipient
> and you're trying to discover who that was.  If you have in hand a message
> that was delivered to you and you want to know who else might've received
> it, that won't succeed because that information can't be recovered (because
> it wasn't there at signing time).

Your earlier message referred to “N recipients going to MX-A” so it wasn’t 
clear that you were talking about a single-recipient model. It sounded like you 
were depending on the envelope information not being added to any header field 
for confidentiality.

I agree that the single-address-per-envelope model doesn’t have that problem. 
But I wonder if it might make it a little easier for implementations to operate 
only on the message header and not the envelope itself, so perhaps having the 
receiving MTA copy the envelope address into a trace header field would be a 
good idea. But you know much more about implementing DKIM than I do.

-Jim

_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to