On 11 Oct 2017, at 12:56, Alexandre Takacs wrote:

Thanks for your insight.

The value of DKIM validation at any point is dubious, given that anyone can DKIM-sign their messages for the cost of a domain and some DNS and MTA config clues.

Sorry I am not sure to understand / agree on this one. I personally find value in being able to verify that the mail I am getting from domain "x" is not spoofed.

That's really only true if you know the value of mail which is actually from domain "x".

Not sure to understand that one ? Care to elaborate ?

The fact of a valid signature only proves that a mail server along the transport path was able to construct a valid signature for the message. If the "d" attribute in the signature matches the domain part of the From header address and the SMTP envelope sender address AND you can validate that the domain has implemented DNSSEC, then you can say with some certainty that the message really came from that domain.

However, if you don't really know whether the signing domain is run by angels, demons, or merely mostly well-meaning humans, you get no value from knowing that they signed the message.


One use case I actually have: I get a message from my law firm -

OK, demons it is, but demons that are on your side. Now you get value from the signature.

obviously it might (and is) usually cryptographically (s/mime) signed but it would be interesting to be able to check that the server which sent it did in fact DKIM sign it.

So what would you believe if one of the signatures is valid and one is not?

I'd be slightly more willing to believe the S/MIME signature because it is a more mature technology that is under the control (hopefully) of the actual human sender, not a signing tool on a server that handles signing for at least a whole domain and maybe multiple unrelated domains.

In security terms, DKIM is pure authentication without any intrinsic authorization value. If you don't add your own careful authorization layer, you're at risk of being fooled by domains like 'paypa1.com.' There is also the more arcane (but real) problem of DKIM replay attacks, (explained in depth by Steve Atkins: https://wordtothewise.com/2014/05/dkim-replay-attacks/) which makes the authentication less meaningful than one would hope.

That's an interesting point - thanks for the pointer.

And it would be nice, if not ideal, to be able to do so client side (i.e., in MailMate). Do you have any specifics to substantiate "DKIM validation after final delivery and IMAP retrieval is potentially problematic" ? I'd be interested to learn about it.

DKIM relies on DNS records which are ephemeral by their nature. One mitigation of DKIM replay attacks is the use of short-lived domain keys, so the signature might have been valid when transported via SMTP but not 5 minutes later when you try to validate it. There are also some local delivery mechanisms that make modifications to message headers or bodies that will invalidate the signature.

Some food for thought here indeed - but all that assumes that one is actually able to check the sig in the first place...

Well, you CAN, if you really feel you must...

There is a port of opendkim in MacPorts. There's probably a formula for Homebrew as well, if that's your preferred package manager. It would probably be relatively simple to create a MM Bundle to use opendkim to validate messages, but even without a Bundle you could install opendkim and use it manually in a Terminal session.
_______________________________________________
mailmate mailing list
[email protected]
https://lists.freron.com/listinfo/mailmate

Reply via email to