On 12/4/2022 7:52 PM, Murray S. Kucherawy wrote:
On Sat, Dec 3, 2022 at 12:20 PM Jon Callas <[email protected]> wrote:

    > On Dec 3, 2022, at 11:42, Dave Crocker <[email protected]> wrote:
    > On 12/3/2022 11:35 AM, Jon Callas wrote:
    >> Agreed, and we need some other weasel word than "lightweight"
    because there are lots of people working on "lightweight"
    symmetric ciphers. Something like "appropriate"?
    >>
    >> Y'all know this is one of the many bees in my bonnet -- DKIM
    doesn't need a signature that is secure for a year (or more), it
    needs one that is secure for somewhere between a minute and a week.
    >
    > transit-time, cryptographic authentication ?

    I like that.


I've edited in this change, minus "transit-time".  I acknowledge that this is what Jon and Dave are saying was the intent all along, and I'm not arguing the point, but RFC 4686 -- which presumably recorded what was our consensus at the time, and which RFC 6376 references as foundational material -- disagrees, holding out an additional possibility that no DKIM document since then has dispelled.  I don't think we should ignore this conflict; I think it's important to resolve and record that resolution, and this revised perspective can be part of the document(s) this working group produces.


I'll start by noting that, other than Jon Callas, I haven't seen other support for the view I'm espousing.  So my response here is more a matter of due diligence than in an expectation of swaying the group's decisions.

DKIM was developed to facilitate delivery handling decisions. The language in the RFC 4871 and RFC 6376 doesn't make this as explicit as I'd wish, given the perspective I'm advocating, but it's got some implicating language.  References to validation by MTAs or MDAs obviously has to do with transit or delivery, and not after.  Reference to MUAs might imply long-term term.  Or not. Certainly there is no discussion about long-term use of the signature.

It's probably worth noting that the RFC examples, in Sec tion A.3 says "The signature is normally verified by an inbound SMTP server or possibly the final delivery agent." And Section B.2 is similarly limited to delivery-related use of DKIM.

Further, the semantics about the signature are:  "permits a person, role, or organization to claim some responsibility for a message" which is quite far from claims of authorship, or the like.  Not to deny the fact of forensic use of DKIM, but a serious intention to have DKIM be used for longer-term validations would (or at least should) have attended to its requirements explicitly.

I don't see either RFC clearly "disagreeing" with the view that DKIM is for transit-related work.  That's contrary to Murray's assessment.  But again, the RFC doesn't make that limitation clear (enough, IMO), either.

So much for the specification's position on transit vs. later. Now we have some operational realities.

Retaining the signature facilitates replay.  Arguments about how easy it is to move reception to a friendlier site, closing off less friendly sites is like closing off open SMTP relays.  It can be circumvented, but is still worth doing.

There is a nice article detailing the problems of using DKIM for longer-term forensic purposes and even suggesting defeating that use by publishing the private keys:

   blog.cryptographyengineering.com

   Ok Google: please publish your DKIM secret keys <#>

   The Internet is a dangerous place in the best of times. Sometimes
   Internet engineers find ways to mitigate the worst of these threats,
   and sometimes they fail. Every now and then, however, a major …

   🔗
   
https://blog.cryptographyengineering.com/2020/11/16/ok-google-please-publish-your-dkim-secret-keys/
   
<https://blog.cryptographyengineering.com/2020/11/16/ok-google-please-publish-your-dkim-secret-keys/>


Lastly, a current working group is working from current realities.  If specifications written some time ago are either not clear about and issue or have become problematic in the face of current use, it is not unreasonable for a current working group to fix things.  In fact, that's it's job.


d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
mast:@[email protected]
_______________________________________________
Ietf-dkim mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to