On Nov 21, 2006, at 5:44 PM, Hallam-Baker, Phillip wrote:

Policy should support that statement and only that statement plus the absolute bare minimum required to move from one version of DKIM (read algorithm choices) to another.

A separate authorization scheme can be easily subverted to mislead recipients. DKIM will not prevent spam, and an authorization scheme will not thwart phishing attempts. Perhaps just the opposite could be true. The goal of blocking spam should not cloud rational choices.

DKIM signatures are not visible. Without alternation of the MUA, there is no assurance recipients see elements assured by policy. When the MUA is altered, the address-book provides a far more secure method to authorize annotations added to DKIM signed messages.

Of course policy used as authorization must be discoverable from all possible sub-domains as well. The majority of email domains do not publish policy records. Searching for largely non-existent records after each message generates a flood of DNS traffic. Even a new wildcard PPTR discovery scheme still involves several non-cached transactions per message, and can not indicate when this scheme is available before hand.

Blocking all bad messages based upon what is "authorized" will not reduce the success rate for a substantial portion of phishing attempts. An effective annotation scheme based upon the recipient's address book should greatly reduce the success of phishing without adding to email's overhead. Making phishing less successful is the best way to stop phishing traffic.

It remains conjecture an authorization scheme provides a measurable reduction in the success rate. As bad actor are able to authorize their own messages in various forms, an authorization scheme may increase the success rate of phishing attempts. Recipients are not protected by such a highly flawed scheme.

-Doug


_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to