Weaknesses
This section does not cite any references or sources. Please help improve this section by adding citations to reliable sources. Unsourced material may be challenged and removed. |
DKIM signatures do not encompass the message envelope, which holds the return-path and message recipients. Since DKIM does not attempt to protect against mis-addressing, this does not affect its utility. A concern for any cryptographic solution would be message replay abuse, which bypasses techniques that currently limit the level of abuse from larger domains. Replay can be inferred by using per-message public keys, tracking the DNS queries for those keys and filtering out the high number of queries due to e-mail being sent to large mailing lists or malicious queries by bad actors. For a comparison of different methods also addressing this problem see e-mail authentication.
Read more about this topic: Domain Keys Identified Mail
Famous quotes containing the word weaknesses:
“A pretty little collection of weaknesses and a terror of spiders are our indispensable stock-in-trade with the men.”
—Colette [Sidonie Gabrielle Colette] (18731954)
“One of the weaknesses in the cooperative is that it has never been sufficiently leavened by the imagination. This is a quick-silver faculty, and likely to be a cause of worry to any collective settlement.”
—Edward Dahlberg (19001977)
“Much can be inferred about a man from his mistress: in her one beholds his weaknesses and his dreams.”
—G.C. (Georg Christoph)