On Sep 20, 2006, at 10:34 AM, Dave Crocker wrote:

By way of priming the pump here is my own attempt to remedy this:

  Potential DKIM signers wish to assist receive-side message
  evaluation systems by publishing information about the messages
  that they originate and possibly sign. The primary basis for
  determining what practices to specify is a strong indication that
  receive-side processors have an interest in using the information.
  As always, other major factors include potential performance and
  reliability impact upon message handlers, and other system
  operators.

Performance concerns are less significant when DKIM validation is performed by a recipient's email client for messages recognized on the a basis of originating and listed within a trusted-domain list or address-book. Unlike IP address schemes where a time-stamp-line may not offer IP address information, the DKIM message itself offers requisite validation information. DKIM information is independent of any receiving MTA added headers. Any single email client may need to handle messages from several sources, including those that are web- based.

With respect to policy, there should also be a general understanding reached that acceptance of a message can not be solely based upon a DKIM signature domain. The IP address remains a significant identifier that is still needed for general acceptance. This situation might change when call-back or revocation schemes have been added to DKIM, or when there is a way to associate a signing domain with that of the transmitter. Until then, policy should remain focused upon ensuring the DKIM signing-domain offers protection for the transmitter, rather than directly for the message originator when they differ.

When deciding upon a basis for DKIM policy, redirections that encompass desired email-address field or parameter domains must be considered a requisite component. One possible area where DKIM could prove highly valuable would be means to validate a bounce address when a DSN is about to be sent. This can be accomplished within a single lookup as only the domain of the bounce address needs to have a policy published (assuming the bounce address does not use a wildcard MX record).

 i.e.
 <hash1+hash2>.dkim-mf.<mail-from domain>. RR "always" + "strict"


These considerations will change this statement as follows:

  Potential DKIM signers wish to assist receive-side message
  evaluation systems by publishing information about the messages
  that they originate and possibly sign [or have signed]. The
  primary basis for determining what practices to specify is a
  strong indication that receive-side processors have an interest
  in using the information.  As always, other major factors
  include potential performance and reliability impact upon
  message handlers, and other system operators.  [Principal
  email-addresses where policy references of signing-domains and
  their related assurances may impact message handling are
  the 2822.From and the 2821.Mail_From.]

-Doug


_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to