-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

In message <[email protected]>,
Inveigle.net <[email protected]> writes

>As discussed briefly at IETF-124, I have created an I-D describing an 
>alternate method for signing DKIM2 recipients and the next domain.

on a separate topic  The draft also envisages a "DKIM2-NextDomain" which
is rather like the "pp=" tag which I proposed...

>Shortly before the meeting, Wei mentioned the potential for pp= to be 
>used to delegate signing to a platform and ease migration to Ed25519. I 
>had previously highlighted the benefits of explicitly delegating signing 
>authority, so since there is some support for that idea I have also 
>incorporated this into the DKIM2-NextDomain header.

.. exactly so

I have now been persuaded this is Not A Good Idea, so perhaps I should
rehearse that:

#1 DKIM1 has already dealt with this issue.

    An ESP signs on behalf of a brand (this is standard, the email gets
    two signature one for the brand that aligns with the From: and one
    from the ESP to signal they have handled the email, which matters
    for some feedback mechanisms, plus for general deliverability.

    The ESP either provides a public key for the brand to put into their
    DNS or more commonly asks for the brand to add a CNAME that points
    to the ESP's DNS entry which holds the public key. Typically the ESP
    will get two CNAMEs added so they can easily roll the key if needed.

#2 There is (probably) an extra DNS lookup

    A verifier needs to resolve the pp= entry to determine if permission
    has been granted. The ESP still needs to tell the brand what to do,
    so there's still DNS things to hold the hand of the brand owner for.
    If ESPs go for CNAMEs again, then there's an extra DNS fetch (that
    is not parallelisable)

#3  There is risk of hijack if the brand says "X can sign as me"

    There are risks in the CNAME scheme as well, but the ESP can do
    checks to detect this whereas an incorrect (or just outdated! if the
    brand has changed provider) pp= record may be harder to detect at an
    early stage of an attack.

#4  KISS

    We have a solution already (see #1) and our design philosophy has
    always been to make DKIM2 as similar to DKIM1 as possible for brands
    and ESPs. Everyone (and their consultants) knows how DKIM1 keys are
    delegated to ESPs... let's just do the same.

>An explicit signing approval allows an ESP which currently manages user 
>keys to sign the original approval using an RSA key, then re-sign the 
>email and recipients using their own Ed25519 keys.

I think algorithm issues are a red herring -- multiple CNAMEs give as
much flexibility as may be needed

- -- 
richard @ highwayman . com                       "Nothing seems the same
                          Still you never see the change from day to day
                                And no-one notices the customs slip away"

-----BEGIN PGP SIGNATURE-----
Version: PGPsdk version 1.7.1

iQA/AwUBaSzzWGHfC/FfW545EQLGLwCghx0ZF2413sshzAZD9VSpvbhwyFsAoKJa
OytqR6JD5OCUrId4S5BycW/w
=K8t8
-----END PGP SIGNATURE-----

_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to