On Tue, Feb 17, 2026 at 02:25:31AM +0100, Steffen Nurpmeso wrote:
> Crystal Kolipe via Mutt-dev wrote in
>  <[email protected]>:
>  ...
> 
> (murderer style citation skipped.)

I have, and always have, posted using the standard and widely-accepted quoting
format of '> ' at the beginning of each line.

Please do not imply otherwise.

The ridiculous citation style was introduced by _you_ in a previous message to
this thread, which _I_ then quoted using '> '.

>  |[.] although that seems like a niche case.
> 
> Must be said though that dkim is per-domain, so you seem to
> support "the other approach" that seems to have the desire to add
> support for forbidding "explosion" meaning mailing-list targets?

I have no idea what you are referring to by, "the other approach".

If this matters, and you want a response about it, please explain what you
mean.

> I for one am totally against this, the "iterated DKIM" should not
> introduce anything like that.  It should be a cryptographic helper
> of SMTP that allows to link a message to a domain, no tracking, no
> flow control, nothing.  Only being able to crypt-verify, however,
> up to the original sender, which is new (anyway).

All I said was:

* Signing a non-existant field with DKIM is permitted by RFC 6376.
  (You implied that it was not, or that it was discouraged.)

* The effect of doing that is that DKIM verifiers will fail the message if
  that header is later added, (unless it is added with null content).

* This _could_ be used by senders to avoid the following situation:

  * Compose a private message, with visible To: and Cc: which do NOT include
    any public or private lists, just individual accounts, with the intention
    that the message was delivered only to those accounts, and not
    bounce-forwarded, (re-mailed to a public list with the original visible
    From: header).

  * One of the recipients does exactly that, re-sends the message to a public
    list with the original From: intact.
  
  * This will pass SPF validation on the listserver, (as long as the sending
    MX has a valid SPF record for it's _envelope_ from).  It will also pass
    DKIM if and only if the original message body has not been modified and
    neither have any of the signed headers.

  * Just because the list server address does not appear in the visible To:
    or Cc: headers does not matter, it could have been Bcc'ed.

There is not much, if anything, that the original sender can do to avoid the
message content being re-posted to a public mailing list.

However, they _can_ take steps to ensure that the message, (with the original
and unmodified From: header, fails DKIM verification for anyone receiving it
via a list that inserts a known header.

The mechanism to do that is to sign the non-existant header field at the time
of sending.

What I described is just regular use of DKIM, albeit a use that most people do
not care about, or have a use for.  Hence, 'a niche case'.

It does not create any incompatibility, nor is it any kind of "other approach"
whatever that means.

It _might_ cause problems if people are signing non-existant headers for mail
that is intended for public lists.  But in that case, the user's system is
mis-configured, and they are responsible for correcting it.

Reply via email to