ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] Not exactly not a threat analysis

2005-08-15 09:47:24
At 22:30 14-08-2005, Dave Crocker wrote:
I'm suggesting some minor changes, only to tighten it up a bit:


There is nothing in an ordinary email message, except for the RCPT TO line and the IP address of the host that sent it to you, that is a reliable identifier. A validated DKIM signature lets you take some reasonable subset of the message you received and know that it came from a designated source.
     The main benefit of DKIM is that a validating agent can know where the
     message came from. This is more reliability than email source
     identification has ever had before.

I'll give it a try.

There is nothing in an ordinary email message, except for the IP address of the host that sent it to you, that is a reliable identifier. A validated DKIM signature adds a level of authentication by identifying the domain responsible for the message.

The main benefit of DKIM is that a validating agent can know who is responsible for the message. This is more reliable than email source identification has ever been before. Furthermore, DKIM does not put any constraints on the delivery path.

Regards,
-sm
_______________________________________________
ietf-dkim mailing list
<http://dkim.org>