On 5/3/19 11:30 AM, Grant Taylor wrote:
> On 5/3/19 9:48 AM, Bill Cole wrote:
>> An entirely different mechanism (DKIM) exists to verify From headers.
> 
> DKIM is only positive confirmation that the (signed) headers (and body 
> content) has not changed since the signature was applied.
> 

Not completely true as long as domain/DNS control is not compromised.

> DKIM does nothing to verify the authenticity of what was signed (at the 
> time it was signed).
> 

Technically this is correct but the fact that it's signed and matches 
the author's domain in the From: header provides authenticity of the 
origin of the email.  In SA rules this would be DKIM_VALID_AU hits.

For example, Microsoft signs customer emails using the tenant's 
subdomain under onmicrosoft.com.  All this confirms is the email came 
from the Office 365 platform with the original content unmodified. 
Since it doesn't align with the From: domain, DKIM really means nothing 
from a forged/spoofed (negative) perspective.  DKIM can prove the 
positive that it was not forged/spoofed when it aligns and hits 
DKIM_VALID_AU.

> ARC (not DMARC) is a similar signature of what comes in to detect 
> modification down stream.
> 

I am not completely clear on ARC but I though it's objective is to 
provide a "chain of custody" as email goes through mail servers so 
receiving mail servers can authenticate the origin.  I was thinking it's 
something like a combination of SPF (validation) and DKIM (authentication).

-- 
David Jones

Reply via email to