I think having a precised understanding of the problem that the charter is 
meant to address is important.  I am having a hard time finding a technical 
distinction between a "replay attack" and the, by design, nature of DKIM's 
independence from transport details.

I have not read all the drafts, but the ones I have looked at seem to want to 
tie some aspect of a DKIM signature to something in the envelope.  I think 
that would be a 5321/5322 layering violation that would make such proposals 
difficult for protocol based systems to implement.

I think there needs to be something about not breaking the architecture of 
email in the charter based on what I've read so far, but I don't think I have 
a fine enough understanding of the problem yet to propose words.

Understanding and bounding the problem is, I think, an essential prerequisite 
to the charter.  We've seen efforts fail before due to a lack of consensus on 
the exact problem (DBOUND comes immediately to mind).

Even if there's no report, I think we should make sure we understand the 
problem first.

Would someone who's pushing for a solution please describe what's being done 
that's technically distinguishable from something like traditional email 
forwarding (e.g. using may alumni.example.edu address and then 
alumni.example.edu forwards it to my current "real" address).  By design, DKIM 
has no problem with this behavior, so I'd like to understand how to 
distinguish good from bad in this space.

Scott K

On Wednesday, November 9, 2022 12:43:35 PM EST Barry Leiba wrote:
> Is this relevant to the charter?  Do you doubt the attacks
> sufficiently that you would want to object to chartering a working
> group to address the issue?
> 
> Barry
> 
> On Wed, Nov 9, 2022 at 4:54 PM Alessandro Vesely <ves...@tana.it> wrote:
> > On Wed 09/Nov/2022 13:08:15 +0100 Barry Leiba wrote:
> > > [...]
> > > 
> > > Current proposals include the following drafts:
> > >   - draft-bradshaw-envelope-validation-extension-dkim
> > >   - draft-chuang-replay-resistant-arc
> > >   - draft-gondwana-email-mailpath
> > >   - draft-kucherawy-dkim-anti-replay
> > > 
> > > The working group will start by considering those proposals; other
> > > proposals remain welcome.
> > 
> > Isn't there a report on relevant replay attacks?  All the above I-D say
> > that replay attacks are a problem.  Bron adds that the attack was widely
> > seen in early 2022.  However, there's not a panoramic view of the
> > problem, mentioning volume, scope, targets and such.
> > 
> > I know replay attacks are possible, but I never saw one.
> > 
> > 
> > Best
> > Ale
> > --
> > 
> > 
> > 
> > 
> > _______________________________________________
> > Ietf-dkim mailing list
> > Ietf-dkim@ietf.org
> > https://www.ietf.org/mailman/listinfo/ietf-dkim
> 
> _______________________________________________
> Ietf-dkim mailing list
> Ietf-dkim@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf-dkim




_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to