On Nov 28, 2006, at 4:48 AM, Charles Lindsey wrote:

On Mon, 27 Nov 2006 13:07:02 -0000, Stephen Farrell <[EMAIL PROTECTED]> wrote:

Charles Lindsey wrote:
On Sat, 25 Nov 2006 06:25:27 -0000, Jim Fenton <[EMAIL PROTECTED]> wrote:

It's not entirely forgotten; section 2.3 of draft-allman-dkim- ssp-02 discusses multiple From addresses. We thought about resolving the ambiguity by (1) arbitrarily picking the first address in the From header field, (2) picking the address in the Sender header field, or (3) querying SSP for all addresses in the From header field, and combining them somehow. We picked (1), ...

 And there I think you picked the wrong one.

Fair enough that you disagree, but the main point though is that the WG reached rough consensus.

I have seen sufficient comments from others to the effect that the Sender needs to be looked at in many situations that this matter probably ought to be reviewed (does that mean raising an Issue?).

No. For base, Barry and I are using a scheme where re-opening a decided issue (which is what you'd presumably like in this case) requires N people supporting, for some informally defined, but increasing, value of N ....

That is fair comment, but there seem to be an awful lot of people still discussing the Role of Sender (and even List-ID and Return- Path) as possible signing domains.

OK, this is a petition for reopening this Issue. That gives 1 vote, but you will need lots more to take action. So I invite anyone else who supports this view to reply with a +1. If there is insufficient support, then I will shut up.
+1!

Selection of the From address is premised upon a bad assumption that by only "authorizing" this header, spoofing an "author" of the message can be prevented. This concept remains highly flawed for the following reasons:

1) Only the display name may be visible.
2) The display name may appear as the actual email-address.
3) UTF-8 support makes human checking impossible.
4) Look-alike and cousin domains are not prevented.
5) Increases likelihood of multiple From email-address use.
6) Not likely able to incorporate EAI email-address versions.
7) Establishes credibility of phishing attempts by self "authorization".
8) Reduces email delivery integrity in many scenarios.
9) Requires excessive DNS overhead climbing label trees for every
     unsigned message to satisfy a small percentage of domains that
     will publish an "all From headers should be signed."

This narrow view overlooks a far more protective alternative that:
1) Thwarts look-alike and cousin domains  spoofing.
2) Is compatible with any EAI scheme.
3) Will not increase credibility of phishing attempts.
4) Will increase email delivery integrity.
5) Will not require excessive DNS overhead.
6) Can be implemented by the recipient and email-address domain
     owner independent of their providers.
7) Eliminates exchange of private keys with providers, zone
     delegations to the provider, or negotiations with the provider the
     selector locations for a series of CNAME records.

The alternative is protection by an annotation scheme checking two basic items:

1) Is a signed email-address known by the recipient (i.e. in the address-book)?

2) Is the signing domain designated by this email-address domain?
    (Obvious only when same domain.)

When other headers are used to communicate with a recipient, then which headers gets annotated can still be controlled by the domain of the email-address ONLY when other headers are allowed to make associations!

Setting flags regarding whether all such headers are signed can be added. However, such flags should not be checked by most recipients. A false expectation of blocking abuse by way of "authorization" has been shown not to work, but this seems to be what is behind most participants motivations. This limits their thinking to only the use of the From header. Allowing associations to support an annotation scheme has not been considered. The same association scheme can also prevent white-listing abuse and ensure DSNs once this approach is considered more carefully.

-Doug




_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to