ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] Broken signature analysis

2010-02-24 13:33:45
The thing that I'm skeptical about is that an automaton can be  
programmed
to do this sort of analysis with any sort of accuracy. We're talking  
about
a potential flood of reports coming in, I assume, so I doubt we're  
all going
to be putting out job reqs for "DKIM Signature Breakage Analysis  
Engineer".
There were far too many breakages even with tools and hunches that  
were very
difficult to figure out, and even then there were lots of mysteries.

And of course, there's an open question about what you do with this  
sort of
forensic data... it can be gamed, after all. So if there's any  
advantage for
bad guys to game it, it probably will be.

I wasn't thinking of wide activation necessarily, it might be  
something that, eg, just MAAWG members and implementors might  
selective enable over an interop testing period.


Mark.

_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html