Domain Keys Identified Mail - Weaknesses

Weaknesses

This section does not cite any references or sources. Please help improve this section by adding citations to reliable sources. Unsourced material may be challenged and removed.

DKIM signatures do not encompass the message envelope, which holds the return-path and message recipients. Since DKIM does not attempt to protect against mis-addressing, this does not affect its utility. A concern for any cryptographic solution would be message replay abuse, which bypasses techniques that currently limit the level of abuse from larger domains. Replay can be inferred by using per-message public keys, tracking the DNS queries for those keys and filtering out the high number of queries due to e-mail being sent to large mailing lists or malicious queries by bad actors. For a comparison of different methods also addressing this problem see e-mail authentication.

Read more about this topic:  Domain Keys Identified Mail

Famous quotes containing the word weaknesses:

    A pretty little collection of weaknesses and a terror of spiders are our indispensable stock-in-trade with the men.
    Colette [Sidonie Gabrielle Colette] (1873–1954)

    One of the weaknesses in the cooperative is that it has never been sufficiently leavened by the imagination. This is a quick-silver faculty, and likely to be a cause of worry to any collective settlement.
    Edward Dahlberg (1900–1977)

    Much can be inferred about a man from his mistress: in her one beholds his weaknesses and his dreams.
    —G.C. (Georg Christoph)