* Scott Kitterman:

> This is not something that can be dealt with operationally.  Unlike
> GPG, where keys are trusted based on signatures and web of trust
> (and people can decline to sign bad keys), in DKIM keys are trusted
> based on their being published in the sending domain's DNS and there
> is no human in the loop.

I still don't see how this is different from the OpenPGP situation.

Assuming that DNS is secure enough, If the sender doesn't publish a
short key, it's not possible to use one.  There is also no certificate
chaining which could result in an unknown set of potentially
problematic certificates.  It really boils down to using DKIM
correctly.

Rejecting short keys still has value because without such drastic
measures, insecure cryptography works as well as secure cryptography,
but I don't think this warrants a security update.


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to