On Sep 6, 2006, at 4:38 PM, Wietse Venema wrote:

Jim Fenton:
The aspect of user-level SSP that concerns me equally is the transaction load. When user-level SSP is "turned on", the verifier MUST query for a user-level record in addition to the domain-level record. User-level queries are not as effectively cached, since these are queries for individual addresses, not domains.

Could someone please explain the nature of the problem that would exist when these (financial) institutions can't selectively add DKIM signatures to outbound email? Engineering is about balance, but I haven't heard enough to make the trade off yet.

An institution that signs all their messages may wish to restrict which messages are seen by recipients as being annotated with added assurances. (A gold star next to the email-address perhaps.) Not all messages being signed are equally vetted, and not all are equally trustworthy. The desire is to limit assurances automatically placed upon their messages to that of a select few. The identifier commonly communicated is that of an email-address, which is a natural means to differentiate messages.

With per-user records in the DNS, should we not be worried about brute-force attacks to guess email addresses?

Why? The signature must be valid and the email-address must be assured to be valid. How is the email-address susceptible?


I'm also worried about the implied requirement that a DKIM verifier would have to do SSP lookups even when a valid first-hand DKIM signature exists.

The envisioned means of applying protection depends upon the email- address first being recognized. Only in those cases, might there be any need for any additional transactions.

-Doug


_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to