[Last-Call] Re: [Emailcore] Re: Last Call: <draft-ietf-emailcore-rfc5321bis-42.txt> (Simple Mail Transfer Protocol) to Internet Standard

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Perhaps amazingly, I agree with Dave here.

The point of DKIM is to tie a message to a domain name, which meed not appear anywhere else in the message, so that recipient systems can look at their mail streams and come to an opinion about the mail signed by that domain. That opinion is often useful to decide whether to treat a message as spam, or a phish, but the DKIM signature says nothing at all about whether the message is "authentic" since bad guys are just as good at signing as good guys, perhaps better. DKIM doesn't belong in this part of the A/S and I don't think it belongs in the A/S at all.

R's,
John

On Wed, 26 Mar 2025, Dave Crocker wrote:

On 3/26/2025 9:42 AM, Eric Rescorla wrote:

I believe the following paragraph should have a reference to DKIM,
which also provides a signature over the message.

A continuing question, through these discussions is why? What is the goal for this topic, in this document, for these readers?

What benefits will accrue?  What damage will be done by not having these texts?



   Very high confidence in the authenticity of a message and its
   originator lies only in end-to-end methods involving the message
   bodies, such as those that use digital signatures on the original
   message (see RFC 1847 [27] and, e.g., Pretty Good Privacy (PGP) in
   RFC 9580 [51] or Secure/Multipurpose Internet Mail Extensions (S/
   MIME) in RFC 8551 [47]).

I recognize that the security properties of DKIM are slightly harder to
state, in part because it does not provide end-to-end signatures, but
it does in fact provide some level of authenticity for the message,

Not really.  Or rather, simply NO.

Except for the d= domain name.  Authenticity and authorization for that. Neither for anything else.

Some sites use policies for signing that are much more strict than the semantics of the DKIM spec, but that it, therefore, outside of DKIM and is not at all consistent across the industry.


up to the claim of the sender (in the signed From field), and in practice

Having DKIM cover the From: field does not carry any assertion of authenticity.


the mail server operator will often be able to control who gets
a credential for a given user at that domain.

Sure.  All sorts of good practices.  Entirely outside the DKIM spec.


However, DKIM is by
far the most common mechanism by which emails are signed, so
I think it needs to be mentioned, though I don't think a lot of detail
is required. Perhaps something like:

   The strongest mechanism for providing the authenticity of a message and its
   originator lies only in end-to-end methods involving the message
   bodies, such as those that use digital signatures on the original
   message (see RFC 1847 [27] and, e.g., Pretty Good Privacy (PGP) in
   RFC 9580 [51] or Secure/Multipurpose Internet Mail Extensions (S/
   MIME) in RFC 8551 [47]). Signatures applied by the originating MTA
   as in DKIM [XX] also provide strong authenticity, subject to the correct
   behavior of that MTA.

DKIM was designed to permit any handler of the message to do signing, including the MUA, or other components that are not MTAs.

Ultimately language such as you suggest promotes a misunderstanding of what DKIM does and does not do.  This misunderstanding is pervasive, and very much counterproductive.

DKIM's goal is to create a noise-free channel, for a message stream carrying a domain name in the d= parameter, for much easier reputation analysis.  It does that.

As a side effect -- but only a side effect -- it also provides data integrity for the covered fields (but no other).  That's it.

DKIM does nothing else.


d/



Regards,
John Levine, johnl@xxxxxxxxx, Primary Perpetrator of "The Internet for Dummies",
Please consider the environment before reading this e-mail. https://jl.ly

--
last-call mailing list -- last-call@xxxxxxxx
To unsubscribe send an email to last-call-leave@xxxxxxxx




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux