[ietf-dkim] The URL to my paper describing the DKIM policy options
Bill.Oxley at cox.com
Bill.Oxley at cox.com
Wed Jul 26 08:54:20 PDT 2006
I think that each domain would have a public key and the aggregator MTA
that is shared would sign on behalf of that domain
Jobob.com uses mx.isp.com to send mail
jobob.com would have a dns record containing public key information
mx.isp.com would sign using jobob.com keys.
Now conversely keeping jobob.com keys updated in a timely manner would
be time consuming so perhaps isp.com would have a policy that
I sign all mail
And maintain a single record. This would be trivially spoofable until
the message hits the verifier which would then fail the signature.
Cox Communications, Inc.
bill.oxley at cox.com
From: ietf-dkim-bounces at mipassoc.org
[mailto:ietf-dkim-bounces at mipassoc.org] On Behalf Of Scott Kitterman
Sent: Wednesday, July 26, 2006 11:34 AM
To: ietf-dkim at mipassoc.org
Subject: Re: [ietf-dkim] The URL to my paper describing the DKIM policy
On Wednesday 26 July 2006 11:03, Arvel Hathcock wrote:
> I think we've got a winner here -- and deliverable within a reasonable
> time frame -- if we can keep the core requirements to a minimum.
As we think through the definition of minimum, I think it important that
consider the class of domains that are not supported by one or more
mail servers. Domains that send through shared servers are a large
of the domains in existence (although no doubt a much smaller fraction
e-mail being sent).
Is the concept of operations that these servers should sign using the
provider's key (so all signatures for the domain are 3rd party) or that
provider should manage multiple keys to support per domain keys and sign
messages first party for the domain?
When one says 'signs all messages' does that mean first party signatures
any signature? Announcing that all messages are signed, but may be
anybody, is trivially spoofable.
I understand and agree that we need to keep this to a minimum set of
functionality to produce something useful, I believe that there is a
irreduceable amount of complexity we need to consider. I think it's
to work through it now and produce a simpler policy protocol.
NOTE WELL: This list operates according to
More information about the ietf-dkim