Michael Thomas wrote:

>> Generally I agree, but does saying "verification is undefined" satisfy those 
>> concerned that this is a security vulnerability?  The example of 
>> double-From: shows verification succeeds.  It's the interpretation of those 
>> results that is the problem.
> 
> These are two separate questions, I think. I'm only commenting on whether
> DKIM should be the SMTP police.

I don't think so, but it should inspect its own protocol requirements 
and within those requirements is its crown jewel - 5322.FROM, the only 
header that is required binding.

Now lets consider if its wasn't a requirement, would it matter then?

       I think it greatly matters to the MUA participants.

Note, the 5322.Subject is also a victim here, but its optional and its 
security threat is not even close that what a multiple 5322.From 
reveals.  So I think it warrants adding a check for that too.  But not 
as much as the From.

The point is DKIM took on the job of providing a mail integrity and 
authentication work and raised the about what is expected. Included in 
that job is protecting its primary header - 5322.From.

Keep in mind that not protecting it will also hurt ADSP which I 
already showed that implementation may look for the first one as well. 
  In the spoofed Obama message, this is the authentication results 
generated here:

   Authentication-Results: dkim.winserver.com;
     dkim=pass header.i=mipassoc.org header.d=mipassoc.org 
header.s=k00001;
     adsp=none author.d=whitehouse.gov signer.d=mipassoc.org;

It picked up the wrong one.

So we have TWO protocols that are affected by this.  The irony in all 
this is that this Multiple 5322.From could be used to solve the MLM 
3rd party issue. :)

The verifier MUST check for invalid 5322.From messages if only because 
its part of the DKIM and ADSP formula and mechanics.

Anyway, I hope the right decision is made and address it before it 
widely discovered and becomes a problem.  Even without DKIM, MTA 
should be more aware about this and deal with it.  But only DKIM can 
close the loophole for legacy operations.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to