[dkim-dev] dkim and email list software - potential solution
daniel at cacert.org
Mon Sep 28 19:13:03 PDT 2009
Please excuse the massive cross post and reply to the dkim-dev list if
possible and it is of collective interest to many email list software
I've put together a paper on DKIM that I've just put out for review. It is
available here if anyone would like to review it. Feedback can still be
As you may know ( and others), DKIM has an incompatibility with email list
software message modification and ADSP verification (RFC5617).
The incompatibility is as follows:
1. An author emails to a mailing list.
2. The author's email infrastructure DKIM signs the email message and
publishes a ADSP dkim record saying 'I sign all messages for this domain'
3. The message is received by the email list
4. the email list software removes the DKIM-signature or, though message
modification, invalidates the signature
5. the email list subscriber receivers the email and attempts a DKIM-signature
validation. If the signature did not exist it will validate ok.
6. the email list subscriber attempts to validated the DKIM-ADSP. The author
domain, taken from the From: address, has a DKIM-ADSP record saying "all"
(meaning I sign all messages) or "discard" (discard if the author domain
signature is invalid or missing).
7. email gets dropped due to ADSP
The ways email list software can deal with this is (from ):
1. ignore the problem - not really friendly given social demand for
2. Parse DKIM-Signature and don't do transforms that break this - will end up
lots of exception handling code and an inconstant emails to the subscriber
that may not meet the list owner's policy.
3. remove DKIM-Signature conditionally - fails ADSP really badly
4. sign list-ID headers and ask verifiers to check for list-id tags in a
spamyness way - complicates verification, provides spoofing loophole as DKIM is
antispoofing more that anitspam
5. remove DKIM-Signature always - fails ADSP really badly
As we can see none of these are ideal.
What I propose as a solution is:
1. rewrite the From: address of the email to include the domain of the email
and one or both of:
2. make "sender" or "reply-to" email headers contain the original sender
3. make the mail list contain a delivery from the rewitten address in#1 to the
Rewriting the From address immediately makes the Author domain the email list.
As such the ADSP verification by the receiver immediately looks to the email
list domain for signatures.
The original DKIM-signature is there and should not be removed despite being
invalid (as recommended in one of the RFC), however as it is no longer the
Author Domain Signature its criticality is not as important.
Having a From domain here makes it easy for DKIM signing software to sign all
email for the for email list. Some signing software says sign only "From:.
I discarded the idea of adding a From address as sender-id verification will
fail if two (or more) from addresses though earlier versions do and DKIM
Having a reply-to and sender (RFC5322 3.6.2) gives the MUA the hint as to
where to send the reply now that we have altered the from address.
I acknowledge that email lists already mundge this sometimes hence option #3.
Taking care of those cases where the MUA or user just copies the from address
or where option #2 is not considered, it would be just polite to deliver the
munged email address of the email list domain back to the author.
Careful consideration here needs to take care of the transformation. Relaying
through a mail server should require some checks and here it is particular
important. Mutilating an address to sympa-dev+daniel_cacert.org at cru.fr without
checks would just encourage spammers to send email to sympa-
dev+(arbitaryemailaddress)@cru.fr and the email list would become effectively
an open relay. Some kind of check to make sure the arbitaryemailaddress is a
subscriber of the list would be a primary check though other encrypted/signed
addresses are also possible here.
I see this as the solution that requires the least amount of code changes,
preserves most existing behaviour, and becomes it becomes DKIM friendly. I'm
keen to know if you agree or think otherwise. I don't know how IETF authors
feel about this but I'll also find out fairly soon :-)
The referenced paper contains some guidelines for DKIM signing list
messages too. Feedback on that also welcome.
 https://community.cacert.org/dkim/ - dkim paper talking about email lists
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 198 bytes
Desc: This is a digitally signed message part.
Url : http://mipassoc.org/pipermail/dkim-dev/attachments/20090929/8869b335/attachment.bin
More information about the dkim-dev