On Fri, Apr 18, 2025 at 11:10 AM Alessandro Vesely <ves...@tana.it> wrote:

> > Indeed so, but reputation systems (because once again to state the
> > obvious, protocols cannot prevent bad email, but they can provide tools
> > for handling it efficiently) may take the view that a brand-new identity
> > that has acted as an intermediary to alter some email is not especially
> > trustworthy...
>
> This position leads to ARC-style authentication, where one must trust that
> the
> changes are benign.
>
> DKIM2 has change tracking.  Can't we tell whether a change is evil or not?
>

I'd put that question back to you: Short of pervasive deployment of RFC
3514, how does one classify, programmatically, whether a message mutation
is evil?  I can find a way to abuse each of the examples you provided.

We need to be careful here to acknowledge that identifying what mutations
might be acceptable isn't a matter of identifying "evil" so much as it is
risk mitigation.

Beyond that, here be dragons.

-MSK
_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to