On Jun 4, 2013, at 3:08 PM, Barry Leiba <barryleiba@xxxxxxxxxxxx> wrote: > The draft continues to make broad, onerous claims like this, but provides no documentation to indicate that the DKIM signing specification is flawed in the function it is performing: attaching a validated domain name to a message. Dear Barry, Thank you for your response.
Of course it is incorrect for a DKIM signature to be valid when a message has multiple From header fields. DKIM requires AT LEAST the From header field to be the minimal portion of the message signed. Every other part of the message is optional. DKIM was intended not to require ANY change of other mail components. None. When the DKIM signature is trusted and changes how the message is handled, it would be wrong to suggest special consideration is then given other message fragments. In addition, recipients will not see the signature header field nor should they be expected to understand what it contains. They will see and understand the From header field however. Of course dkim=pass is placed in an Authentication-Results header where many suggest this indicates the message has been "authenticated"!
DKIM does NOT score messages. Either the signature is valid or not. The spec wrongly justifies allowing invalid repeated headers to result in a DKIM signature verified as valid.
No. Just indicate the signature is NOT valid. This is the only sure way to ensure trust is not misapplied and cause harm.
You and Dave Crocker made assurances this issue would not be abused. It is being abused and NO other protocol layer ensures message structures are valid. None. It was negligent for DKIM to ignore occurrences of highly deceptive invalidly repeated header fields as it walks up and down the header field stack. It is also wrong to suggest some other protocol layer handles this checking. Such suggestion represents a waste of resources as ONLY DKIM should determine signature validity which MUST consider invalidly repeated header fields. It also appears most even expect DKIM signature validation checks message structure, but this ONLY happens by double listing singleton header fields in the signed header list. MOST domains don't bother with this ugly hack, especially larger domains where checking message structure is critical.
Putting people at risk in some race to obtain Standard status can not be justified. Getting this right is far far more important. Allowing this to become a standard will make specification modification even more difficult. Regards, Douglas Otis |