DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel

  • Stephen Farrell
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4043)


DomainKeys Identified Mail is an anti-spam proposal that involves mail servers digitally signing outbound email and verifying signatures on inbound email. The scheme makes no use of existing public key infrastructure or email security standards. This paper provides an outline of the scheme and discusses some reasons why re-use of existing standards is inappropriate in this context.


Signature Scheme Signature Verification Internet Draft Certificate Revocation List Message Body 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    IETF DKIM working group charter page,
  2. 2.
    IETF PKIX working group charter page,
  3. 3.
    IETF OpenPGP working group charter page,
  4. 4.
    W3C XML Key management system working group home page,
  5. 5.
    IETF S/MIME working group charter page,
  6. 6.
    W3C XML Signature working group home page,
  7. 7.
    Allman, E., et al.: DomainKeys Identified Mail Signatures (DKIM), Internet draft, draft-ietf-dkim-base-00.txt, work-in-progress (February 2006),
  8. 8.
    Allman, E., et al.: DKIM Sender Signing Policy, Internet draft, draft-allman-dkim-ssp-01, work-in-progress. (October 2005),
  9. 9.
    Fenton, J.: Analysis of threats motivating DomainKeys Identified Mail (DKIM)., Internet draft, draft-ietf-dkim-threats-01.txt, work-in-progress (March 2006),
  10. 10.
    ITU-T Recommendation X.509: InformationTechnology–Open Systems Interconnection–The Directory: Public key and attribute certificate frameworks (August 2005)Google Scholar
  11. 11.
    Hallam-Baker, P., Mysore, S.: XML Key Management Specification (XKMS 2.0)., W3C Recommendation (June 2005),
  12. 12.
    Cantor, S., et al.: Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard, (March 15, 2005),
  13. 13.
    Housley, R., et al.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, RFC 3280 (April 2002),
  14. 14.
    Callas, J., et al.: OpenOpenPGP Message Format, RFC 2440 (November 1998),
  15. 15.
    Householder, A., King, B.: Securing an Internet Name Server, CERT Co-ordination center (August 2002),
  16. 16.
    IETF DNSSEC (concluded) working group charter page,
  17. 17.
    Ramsdell, B.: Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification, RFC 3251 (July 2004),
  18. 18.
    Housley, R.: Cryptographic Message Syntax (CMS)., RFC 3252 (July 2004),
  19. 19.
    Eastlake, D., et al.: XML Signature Syntax and Processing, W3C Recommendation (February 2002),

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Stephen Farrell
    • 1
  1. 1.Distributed Systems Group, Department of Computer ScienceTrinity CollegeDublin 2Ireland

Personalised recommendations