On 3/6/25 2:27 PM, Murray S. Kucherawy wrote:
On Thu, Mar 6, 2025 at 1:36 PM Michael Thomas <[email protected]> wrote:

    On 3/6/25 1:22 PM, John Levine wrote:
    > It would be reasonable to design DKIM2 to make signing multiple
    messages fast,
    > e.g., if messages only have different headers, reuse the body
    hash.  But that's
    > just an optimization.

    I think this appeal to "efficiency" is something of a red herring.
    I was
    pretty concerned back in the day that the cost of RSA operations
    would
    be significant, but it turns out that they weren't. That was 20 years
    ago and lots of Ticks and Tocks have happened in the mean time.
    This is
    especially true if you're doing spam filtering which is expensive and
    ought to be done both sending and receiving.

    But I looked at this message's source and it has 4 signatures from
    google: 2 ARC signatures, 1 DKIM, and one Google DKIM signature
    which I
    have no idea what it is. Gmail is probably the largest mailbox
    provider
    in the world and they didn't seem to be too resistant to running
    experiments that incur RSA signing operations.


I mean, it is provably more efficient to avoid doing unnecessary hashes, but I don't think in this context that the win is significant even at a large operator.  My own open source implementation provides no provision at all for reusing a body hash across many signatures, and nobody ever identified it as something that was sorely needed.

Yeah, I think the right thing to do here is to just drop the line of reasoning about efficiency altogether. Operators are going to implement this or not and the potential minuscule additional overhead is not going to be a deciding factor, imo.

Mike
_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to