,---
|5.3.1.  Negative Commentary
|...
|6. Security Threat with DKIM base, a first party signer can
|   always clarify which address it is signing on behalf of
|   by using the i= tag. That is, when there's ambiguity
|   between, say, From: and Sender: the signer has the
|   ability to clarify which address the signature was on
|   behalf of if it so desires. For a third party signature,
|   there is no clarity since the signature by definition has
|   no relationship to the origination addresses.
'___

There are some simple remedies for this problem. One could amend the DKIM base to allow the i= parameter to include other domains when supported by policy, but this will confront backward compatibility issues. Another alternative could be to include a new parameter in both the DKIM signature field and the key. For example, "m=<email- address>" could be used as an alternative to "i=" and "g='. The signing domain should include only validated email-addresses within the "m=" parameter. This avoids the exploit raised regarding the use of signing domains that are different from that of the email-address domain. The "m=" parameter should also be defined where the assertion of the email-address having been validated is also clearly assured.

-Doug
_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to