ietf-mailsig
[Top] [All Lists]

DKIM: key identification and shared keys

2005-08-01 03:43:54

Still new to DKIM (from draft-allman-dkim-base-00) so please bear with me if I'm raising old issues; didn't identify them in the archives.

Looking at section 6.3 `Get the Public Key`...  two questions/comments:

1. It says Verifier MUST retrieve public key... Always? Why not include some key identifier and allow the verifier to use a cached key (based on the identifier)? Of course, if key retrieval is using DNS, then the DNS caching mechanism will also make this a local operation. But I think there are several advantage to allowing a key identifier and a key cache at the verifier. One motivation follows.

2. There is an implied assumption here that we always use public key signatures. Why rule out the use of shared key authentication, for improved performance, e.g. in the (common) scenario of authentication between the border MTA of two large ISPs (with long term relationship)? Here, it may be desirable to avoid the key retrieval (via DNS), as the key should be pre-shared anyway, possibly first sending message with signature until the pre-shared key is established.
--
Best regards,

Amir Herzberg

Associate Professor
Department of Computer Science
Bar Ilan University
http://AmirHerzberg.com
Try TrustBar - improved browser security UI: http://AmirHerzberg.com/TrustBar Visit my Hall Of Shame of Unprotected Login pages: http://AmirHerzberg.com/shame

<Prev in Thread] Current Thread [Next in Thread>