> On May 21, 2016, at 8:45 AM, Jim Popovitch <jim...@gmail.com> wrote:
> 
> On Fri, May 20, 2016 at 5:21 PM, Michael Rathbun <m...@honet.com> wrote:
>> On Fri, 20 May 2016 17:00:37 -0400, Jim Popovitch <jim...@gmail.com> wrote:
>> 
>>> Give me a (real world) example of how 2 DKIM sigs will be in the same
>>> email msg and both sigs will verify.
>> 
>> Here are two:
>> 
>>> Authentication-Results: mx.google.com;
>>>      dkim=pass (test mode) header.i=@humblebundle.com;
>>>      dkim=pass (test mode) header.i=@dynect.net;
>> 
>>> Authentication-Results: mx.google.com;
>>>      dkim=pass header.i=@cpro30.com;
>>>      dkim=pass header.i=@morningconsult.com;
>> 
> 
> 
> That's quite vague.  What was signed by each key? When most people
> think of DKIM they think of a DKIM key being used to guarantee that
> parts of a message haven't been modified in transit.  

If they do, they're thinking about it wrong. DKIM is *not* about message
integrity, it's about someone taking responsibility for the message in
a way that is provable by a third party. Or, if you prefer a more mechanical
model, it's about attaching an unforgeable identifier to a message so that
that identifier can be used as a key to track the history of the email
author.

That it does that partly by using a cryptographic signature that includes
some subset of the content is an implementation detail that's only there to
mitigate replay attacks.

> So, for this
> discussion, I think it's important to identify the parts of the
> message that are being signed, no?

Not generally, no. But that info is in the DKIM-Signature headers
if you want it.

Cheers,
  Steve
_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to