sbp commented on issue #236:
URL: 
https://github.com/apache/tooling-trusted-releases/issues/236#issuecomment-3433537173

   Outgoing email from ATR is now DKIM signed. The next step in this issue is 
to add DKIM verification. That alone, however, is not enough to guarantee that 
the email was from ATR; it could have been sent by some other process with 
access to mail-relay. It may be that a simple _unauthenticated_ header 
indicating that it was sent from ATR is enough. In other words, we trust email 
sent by ASF processes to not spoof an ATR header. If we did not trust our own 
email, then presumably we would not sign it. The reason for avoiding an 
authenticated header is that it would either have to use a long-lived secret, 
or we'd have to use something like Sigstore. Or we could just do as the issue 
originally suggested, and store things in the database.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to