On Sep 6, 2006, at 4:24 PM, Thomas A. Fine wrote:


The alleged half-implemented DKIM within a domain makes no sense whatsoever - why would a domain work really hard to maintain thousands or millions of records, so that the spammers can continue to forge spam from their domain with policy-assured freedom? They won't.

What is being forged, the email-address?


The sensible solution is to dispense with all this user-signed nonsense. It does no real good.

The mechanism being sought is to use policy as a means to differentiate a message from other messages within a common signing domain. The concern is not limited to just spammers. The recipient can then recognize specific assurances via message annotations. This mechanism is essential.


Domains should be free to set up as many keys as they want, and use them however they want. If they want to set up a million keys, one for each user, well, that's dumb in my opinion, but let them, because it's not for me to dictate. At any rate, this will handle any odd situations where users have a legitimate need to self-sign.

BUT: this should all be part of the standard mechanism for distributing valid keys, and should not in any way be a special case for user validation. It should simply be part of the selector mechanism.

An arcane component of a DKIM signature (the selector) or a signing subdomain (where assurances of the email-address being valid is lost) does not offer viable differentiated protections. Keep in mind, the entire domain is not equally trustworthy.

-Doug
_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to