On 4/11/2025 1:03 PM, Richard Clayton wrote:
> There has been a continuing need to be able to add/replace crypto algorithms. > So the dexterity is a legitimate need, but is not new. And it is already > supported in DKIM.  And, really, it has nothing to do with the status of P-Q
> concerns.

it is mainly about post-quantum if we write MUST for both RSA and EC
_and_ enough people use EC to shame the people who ignore that MUST :-)

Since DKIM already provides the desired 'dexterity', this is another example of needing a BCP and not a protocol revision.



>> 4.9.  Reducing crypto-calculations
>>
>>     Experience at large mailbox providers is that incoming messages can
>>     have large numbers of DKIM signatures all of which need to be
>>     checked.

> But, do they really /all/ have to be checked?  Seriously, why can't there be
> some selectivity?

They all need to be checked because of feedback loops

Please explain.



>>   For DKIM2, in the common case where email has not been
>>     altered by earlier hops, it will only be necessary to check the first
>>     DKIM2 signature, the one applied by the previous hop and, if
>>     "feedback" is to be provided, the signatures of any entities that
>>     have requested feedback.

> huh?  This does not seem at all obvious.

nevertheless I believe it to be a correct statement ... which other
signatures do you think need to be checked and to what purpose ?

Your text makes an assertion of fact.  I invited you to explain that assertion.

I continue that invitation.



> Also, it is not obvious that the current use of DKIM requires checking all the
> signatures.  Please explain why.

see above

see above.



>>     If DKIM-replay is felt to be an issue (and some providers will detect
>>     this by identifying non-unique signatures)

> Non-unique signatures?  Since I am quite sure this does not mean two different > signatures that produce the same value, what does this mean and how is it a
> problem?

I discuss DKIM-replay in another of these emails so I will not repeat
that commentary here

So far, I haven't seen any explanation of the rather curious term 'non-unique signature', yet that was what I asked about.



>>   then more DKIM2 headers
>>     may need to be processed to establish the veracity of an alleged
>>     forwarding path.  Additionally any attempt to do forensics or to
>>     assign reputation to intermediates will require more signatures to be
>>     checked.

> What is meant by forwarding path?

the path taken by the email to arrive at the current machine

> How is it specified?

in the DKIM2 headers

> What does it me to
> 'establish the veracity' of it?

is there a correlation between RCPT-TO:<n-1> and MAIL-FROM:<n> ?

Since SMTP does not require any correlation between these, it appears you are proposing a change to SMTP.




note that systems which know there is not a correlation can generate a
DKIM2 header to show the correlation -- the entity that signs that DKIM2
header will be taking some responsibility (to coin a phrase) for that

> As for needing to check signatures by intermediaries, before performing
> reputation analysis... yup?  What is the problem?

Interesting this did not garner a response.


d/
--
Dave Crocker

Brandenburg InternetWorking
bbiw.net
bluesky: @dcrocker.bsky.social
mast: @[email protected]

_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to