On 04/26/2011 09:16 PM, Michael Thomas wrote:
On 04/26/2011 05:08 PM, J.D. Falk wrote:
On Apr 25, 2011, at 10:12 AM, Jeff Mitchell wrote:


If you trust the issued certificates(!) being used to sign the mail, you at 
least have a good indication that the spam is coming from the domain that it 
says it's coming from. This can make spam blocking much more effective because 
instead of simply hoping that a domain-based blocklist will block spam and not 
ham (due to spoofed sender addresses), you have a pretty good feeling that this 
will be the case.

Of course this relies on various other bits and pieces to fall into place, such 
as properly handling such messages (Gmail's detection and handling rules aren't 
public AFAIK), CAs not being compromised, etc. Not to mention that the spammers 
can simply register another domain and buy a new cert -- but then the argument 
above still holds.

DKIM doesn't use purchased certificates.  It's all self-signed.


Well, they aren't self-signed either; DKIM doesn't use x.509
style certs at all. It's just RSAPublicKey DER-encoded public
keys that are placed in the DNS.

Sorry, yes. I've had GPG and X509 on the brain lately. Thanks for the correction, Mike and J.D.

--Jeff

Reply via email to