>>Note that to validate the message, the app needs access to not only the 
>>signed header fields, but also the body, that the value of bh= is based upon.

Of course. That’s why I suggested that content validation should be ignored. 
Only headers should be validated.
Since the content is "signed" using bh= hash, the hash can be ignored and 
everything else can be validated.

This of course puts some responsibility on the user that is scanning the QR 
code, to ensure the details (from, to, date, subject) matches up with the email 
they are seeing on the screen, and that "date" is not too far in the past, so 
the QR code is not stolen from a legitimate email.

Since the To: header field is included in DKIM and QR code, it would mean a 
fraudster somehow needs to be able to gain access to the victim's mailbox to be 
able to mint a email that matches a QR code.

The idea here is that a end-user should be able to scan'n'verify a email by 
QR-code and not have to worry about phishing. Since the details about who 
signed the email and the data in email comes out in clear, it will be very 
evident if a emai from a bank is signed by "russianwebhost.ru" or similar and 
thus alert the user about phishing.

>> can implement new standards 

Its about excluding the client and the receiving server from the equation. If 
anyone - regardless of email operator or receiving server or client - can 
download a app and scan a QR code to ensure an email is not phishing, I think 
it gets traction, especially since the QR code would be visible in email, 
people would look up "Why does all email from Paypal now include a QR code" and 
they find out about the verification.

>>Are there still so many MUAs with no DKIM add-on?

MUAs need to include it per default for it to get traction.

_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to