On Nov 28, 2006, at 10:06 AM, Scott Kitterman wrote:

On Tuesday 28 November 2006 12:36, Frank Ellermann wrote:

In that point I agree with Hector: The problems of braindead MUAs are out of scope.

Except that any solution that starts out with upgrade every MUA in the world (except I think GNUs) is probably not going to get much traction.

Don't forget most email applications and browsers offer plug-in interfaces.

See:
http://www.iconix.com/

This startup has a fairly broad offering already. They can also enable DKIM on Exchange.

The reality is that from an end user perspective 2822.From is the only game in town.

By design, DKIM signatures are not visible. By inspection of a raw message, a recipient has no way of knowing which messages hold a valid DKIM signature. Do not assume DKIM prevents spoofing attempts based upon visible headers with existing MUAs. Unless invalid signatures are rejected (which breaks email in many scenarios), valid DKIM signature might then be placed into a "valid DKIM signature" folder as a type of annotation. A filter can inspect the "valid DKIM signature" folder for signed originators found within the address book and then move those messages into the "trusted" folder. This would be far more secure and simpler than checking whether each and _every_ unsigned messages should have been signed. I like the Iconix approach myself. It will take a while before people stop reviewing unsigned mail, but they will not be fooled when expecting trustworthy messages to be signed by someone they already know.

How would you expect to communicate an assertion that a bank always signs to the recipient? Would conveying this assertion increase a likelihood of their customers then being fooled by look-alikes?

-Doug



_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to