ietf-mailsig
[Top] [All Lists]

Re: DKIM - Header Fields

2005-07-18 16:50:39

Further to this, I like the existing language:

Signers SHOULD NOT sign an existing header field likely to be legitimately modified or removed in transit. In particular, RFC 2821 explicitly permits modification or removal of the "Return-Path" header field in transit.

... and don't think we should try and innumerate _all_ the specific headers which SHOULD NOT be signed but a reference to excluding X- and Authentication-Results might be welcome here. Anyway, I can see the need for a BCP document on DKIM in the coming months with the results of all our findings in this area.

--
Arvel


----- Original Message ----- From: "Arvel Hathcock" <arvel(_at_)altn(_dot_)com>
To: <ietf-mailsig(_at_)imc(_dot_)org>
Sent: Monday, July 18, 2005 7:02 PM
Subject: Re: DKIM - Header Fields



Its pretty useful to be able to sign Authentication-Results ...

That can't be done. This header is subject to stripping and if it gets signed and later stripped it ruins the signature. So, this one must not be signed. It would also be useful to sign the Return-Path header I guess but this also can't be signed because it is subject to stripping as well. Basically, any header in which it's own specification mandates or even suggests with a "MAY" that a change or removal might occur - these must not be included in a signature IMO. MDaemon doesn't sign any X-* header, Return-Path, or Authentication-Results for this reason.

--
Arvel









<Prev in Thread] Current Thread [Next in Thread>