On Mon 24/Mar/2025 20:19:29 +0100 Richard Clayton wrote:
In message <b9029423-1b4a-4e82-b8ae-4acbbe810...@tana.it>, Alessandro Vesely 
<ves...@tana.it> writes

BTW, is dkim2=fail different from "failing DKIM2 signatures from a 100% DKIM2 mail chain"? I mean, do verifiers always check all the signatures along the chain or can sometimes check just the last one?

In DKIM2 you need to validate the signature of the entity passing you the message (the highest numbered header field) because that assures you that you can give it back to them if you need to...


What does that mean? Should I wait for more information in order to make a delivery decision?

"Similar to ARC" should mean that all signatures have to be valid.


... you then need to undo all the modifications in other header fields (if any) but you don't need to check those signatures !

Then you can check the very first signature (if there is more than one of course) and that tells you if the purported original sender did indeed sign the message.


Checking the chain of rt= =~ next mf= would be pointless if a man in the middle could insert fake signatures to make the chain look legit.

Of course, If I trust the signer of the last signature, it would be fine to check only that. Bat that would be too similar to ARC...


If you want to do forensics you can check more, but that's all that a receiver is likely to care about.

It ought to be not very hard to check all signatures, reversing the changes. There needs to be a way to tell what changes are tolerated. For example, I'd accept a plain text footer of a few lines, but not html inserts that could completely replace the original content in the end recipient's eyes.


Best
Ale
--



_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to