On 12/7/22 1:47 PM, Murray S. Kucherawy wrote:


Yes, it's definitely true that the standard was written from the perspective of delivery-time evaluation, and then sending that result to MUAs rather than having MUAs actually do the evaluation.  So although 4686 says that's a design goal, 6376 sure doesn't have that flavor.
That's certainly what we had in mind as to how to deploy it, there certainly was no reason to preclude MUA's or other validators to use the signature as well.

It is absolutely within the purview of the reconstituted WG to "fix" this by clarifying using current operational realities and acquired experience.  An applicability statement, for instance, would not be out of the question.


Part of the problem is that use for forensics is essentially opaque. We really can't know with any certainty how often it is used because companies aren't in the habit of letting the world know about phishing attacks against them, for example.

And therein lies the problem: the only difference between forensics of the phishing kind and the Her Emails kind is the intent of the investigation which is a very layer 8 difference. For all of the layers below, they are identical.

Mike
_______________________________________________
Ietf-dkim mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to