I hope this isn't re-hashing old ground but an idea has occured to me
that would, I think, help with the current deluge of mail from worms that
forge From: addresses.
The idea is to "sign" the From: and Message-ID: pair using
a public key scheme, and add the signature as a new header.
The goal is to allow recipient to have some confidence that mail is
really from the sender without collecting the whole mail, but just
by examining the headers. (Signed mail is all very well
but sucking 5M of spam body to allow me to check it isn't helping
with my bandwidth problem.)
(I currently discard any mail which has its Message-ID inserted
by my ISP - this is wonderfully successful for an ad. hoc. hack
e.g. it managed to discard 80% of the 10000 emails I received
in one day of recent MyDoom peak. Snag is that there are
presumably false discards - including mails from my ISP!)
The idea is that the unique Message-Id is a "challenge" for the sender's
key pair.
As many tools also discard mails with duplicate ids then forger
cannot just re-use signature headers from a previous mail.
Issues I can see are where public key comes from (key server or embedded in the
mail) and possible size of key and signature data.
Is this worth discussing further?
--
Nick Ing-Simmons