On 06/25/2018 10:10 AM, Steffen Nurpmeso wrote: > DKIM reuses the *SSL key infrastructure, which is good. Are you saying that DKIM relies on the traditional PKI via CA infrastructure? Or are you saying that it uses similar technology that is completely independent of the PKI / CA infrastructure? > (Many eyes see the code in question.) It places records in DNS, which > is also good, now that we have DNS over TCP/TLS and (likely) DTLS. > In practice however things may differ and to me DNS security is all in > all not given as long as we get to the transport layer security. I believe that a secure DNS /transport/ is not sufficient. Simply security the communications channel does not mean that the entity on the other end is not lying. Particularly when not talking to the authoritative server, likely by relying on caching recursive resolvers. > I personally do not like DKIM still, i have opendkim around and > thought about it, but i do not use it, i would rather wish that public > TLS certificates could also be used in the same way as public S/MIME > certificates or OpenPGP public keys work, then only by going to a TLS > endpoint securely once, there could be end-to-end security. All S/MIME interactions that I've seen do use certificates from a well know CA via the PKI. (My understanding of) what you're describing is encryption of data in flight. That does nothing to encrypt / protect data at rest. S/MIME /does/ provide encryption / authentication of data in flight /and/ data at rest. S/MIME and PGP can also be used for things that never cross the wire. > I am not a cryptographer, however. (I also have not read the TLS v1.3 > standard which is about to become reality.) The thing however is that > for DKIM a lonesome user cannot do anything -- you either need to have > your own SMTP server, or you need to trust your provider. I don't think that's completely accurate. DKIM is a method of signing (via cryptographic hash) headers as you see (send) them. I see no reason why a client can't add DKIM headers / signature to messages it sends to the MSA. Granted, I've never seen this done. But I don't see anything preventing it from being the case. > But our own user interface is completely detached. (I mean, at least > if no MTA is used one could do the DKIM stuff, too.) I know that it is possible to do things on the receiving side. I've got the DKIM Verifier add-on installed in Thunderbird, which gives me client side UI indication if the message that's being displayed still passes DKIM validation or not. The plugin actually calculates the DKIM hash and compares it locally. It's not just relying on a header added by receiving servers. -- Grant. . . . unix || die