On 11/27/2022 6:13 PM, Murray S. Kucherawy wrote:
On Sun, Nov 27, 2022 at 6:01 PM Dave Crocker <[email protected]> wrote:

    Hmmm.  Having looked through the RFC, for every occurrence of
    'delivery', I don't see an obvious statement indicating it is a goal.

This is the citation I keep coming to, toward the end of Section 1.1:
    DKIM operates entirely on the content (body and selected header
    fields) of the message, as defined inRFC 2822  
<https://www.rfc-editor.org/rfc/rfc2822>  [RFC2822  
<https://www.rfc-editor.org/rfc/rfc2822>].  The
    transmission of messages via SMTP, defined inRFC 2821  
<https://www.rfc-editor.org/rfc/rfc2821>  [RFC2821  
<https://www.rfc-editor.org/rfc/rfc2821>], and
    such elements as the envelope-from and envelope-to addresses and the
    HELO domain are not relevant to DKIM verification.  This is an
    intentional decision made to allow verification of messages via
    protocols other than SMTP, such as POP [RFC1939  
<https://www.rfc-editor.org/rfc/rfc1939>] and IMAP [RFC3501  
<https://www.rfc-editor.org/rfc/rfc3501>]
    which an MUA acting as a verifier might use.
I take this to mean the MUA is intended to be able to do the verification, or at least that was our thinking back then.  Personally, I don't remember ever mentally considering DKIM to be a transport-only mechanism, but kind of a lot's happened since then.

Yeah.  I think that still fits within the place my reading landed on, even without seeing that bit of text.


It's fine if we think this was in hindsight a bad posture to take, but we should probably draw a line from there to here and give some explanation that doesn't seem like we're arbitrarily contradicting ourselves.

I think it was a reasonable posture at the time.  First, because it meant that the design of DKIM was such that its use did not require infrastructure support.  And I think that was enormously helpful for early adoption.

But second because, well, gosh, we explicitly did not expect replay to be the problem it has become.

So, more than hindsight is presentsight.  Current use of DKIM isn't in the MUA -- with rare exceptions -- and removal of the signature at delivery is an easy way of closing one avenue for abuse.  (And to the extent some site deems it essential to retain the signature through delivery, they can.)


    I /do/ see a reference to wanting DKIM evaluation to be at the MDA
    or MUA.  Saying MUA does, obviously, imply surviving past formal
    delivery.  Hmmm...

The thing I'm noticing is that this is the only place (that I can recall) where it's specific about which part of the ecosystem constitutes a "Verifier".  That is, 4686 says the Verifier might be something using POP or IMAP to look at a message in a mailbox.  Meanwhile, I'm quite certain we wrote 6376 with MSAs and MDAs in mind since that's where the implementations of the time were, even though I don't think we explicitly said it must be thus.  As it turns out, we wrote a standard that can be, and is, successfully applied in any of those places.

    Going back to an earlier posting, I noted that a site that removes
    the signature as part of delivery could provide an option to
    retain it.


Making this only a recommendation certainly does have particular advantages.

Indeed.

Note that this does not mean it can't be standards track.  Merely that statements about use need to be, ummm, flexible...

d/


--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
mast:@[email protected]
_______________________________________________
Ietf-dkim mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to