I read through the Motivations draft, and have quite a few comments.

Title: The title makes it sound like a DKIM2 specification, rather than a discussion of the motivations for DKIM2.

Intended status: Should be Informational.

Abstract: “replacing the existing email security mechanisms”: TLS, S/MIME, etc. are email security mechanisms, and are not replaced by DKIM2. This needs to be more tightly scoped.

1. Background paragraph 1: The correct historical context for the beginning of DKIM is RFC 4871, “DomainKeys Identified Mail (DKIM) Signatures”. RFC 6376 (cited) was one of the updates mentioned in the following paragraph.

Paragraph 3 and 4: “these problems”. What problems are these? No problems have yet been described.

Paragraph 7 (item 2) should mention something about not interfering with the existing privacy properties of email (e.g., privacy of bcc addresses)

Paragraph 8 (item 3): It isn’t clear what problem this is solving (this comes later)

Throughout the document: Please use accepted terminology for header fields vs. headers. Email messages have exactly one header composed of a number of header fields.

Sections 2 and 3: These should be interchanged, so that the document describes the problems it is solving before describing what it proposes to do about them.

Section 2.1 paragraph 3: “track which addresses can forward to it”. This sounds like a signinficant new burden. How does this work for non-DKIM2 aware recipient systems?

Section 2.1 paragraph 4: “forward-path addresses are not not all present”. I had the impression from elsewhere that there would be exactly one recipient address per signature, and one SMTP transaction per recipient address. Is that incorrect?

Section 2.3: Backscatter has not yet been defined (probably fixed if Sec 2 and 3 are interchanged). This seems to assume that reverse-path DSN has been implemented everywhere. I expect there will be a very long tail for implementation of this.

Please explain how reverse path backscatter works when the MX record in the reverse direction directs mail elsewhere (to an incoming rather than outgoing MTA, for example). Is this a special case where only A/AAAA record lookup is done on the signing hostname? Would all outgoing MTAs be required to accept incoming SMTP connections for incoming DSNs? How does the system needing to send a DSM know whether to send it over the reverse path or in the traditional way? (I realize that I’m probably getting into details of the actual DKIM2 specification at this point.)

Section 2.3 paragraph 3: “any hop can strip off”: Seems like this ought to be a requirement.

Section 2.4 paragraph 3: Paragraph 4 should probably note that it will have to deal with different encodings (e.g., Base64) and multiple MIME parts.

Section 2.5 doesn’t seem to correspond to a problem described anywhere in the document.

Section 4.1 seems to be saying that nobody is adopting elliptic curves, so we should make it mandatory. This neeeds further justification. Algorithm agility is important, particularly to accommodate PQ algorithms, but this seems like an odd requirement.

Section 4.2 paragraph 2 needs to more precisely describe what a single recipient is. Is a role account (e.g., [email protected]) a single recipient if it redistributes to more than one actual mailbox?

Section 4.3 paragraph 3 sounds a lot like the Expires: header field.

Hope this is useful.

-Jim




_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to