On Oct 24, 2006, at 9:54 AM, Stephen Farrell wrote:

Consider the following two policies:
        X: "Every email has at least one signature"
        Y: "Every email has a signature of type A and a signature of type B"
Now consider a recipient that only supports verification of signature type A.
Consider the following attack:
        Bogus message with signature of type B.
This message is consistent with policy X, it is not consistent with policy Y. This means that if our policy language can only express policy X it will not be possible to tell the recipient the information it needs to know in order to determine that the message is bogus.

Huh? The recipient doesn't support signature type B and will therefore not consider the message signed. Same as if the message were an unsigned forgery or a real unsigned message, or has been mangled etc. So I don't see the benefit in the recipient finding out (via SSP) that the signer does use B, if the recipient cannot (cryptographically) check that the message is accompanied by such a signature and not just some random bits in the correct format.

There are two elements checked when DKIM_BASE and DKIM_POLICY are used to validate incoming messages. Once multiple signatures bridge an algorithm transition, then DKIM_POLICY expressed somewhere can remove doubt about which algorithms should be present. In practice, any algorithm transition may take years and may also involve more than one alternative.

In cases where there is doubt:

a) the user may be asked to sort through questionable messages, rather than having them rejected outright;

b) deprecated signatures may be accepted, when a supported non- deprecated signature should have been present;

-Doug


_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to