Hallam-Baker, Phillip wrote:
>> [mailto:[EMAIL PROTECTED] On Behalf Of Jim Fenton
>>
>> (2) SSP record type (TXT vs. something new). Only 4 messages
>> in discussion, mostly saying "if you support TXT, don't
>> bother with anything else." Again, no clear consensus.
>>
>
> I see no value in an SSP record type. The downside for DKIM is serious - we
> are gated on new deployments of DNS server code. The downside for the DNS
> described above is equally serious.
>
>
If we would be gated on new deployments of DNS server code, wouldn't
this be equally true for XPTR records?
> As a general rule: deployment of a new Internet protocol or protocol
> enhancement such as DKIM should not require consumption of any finite
> infrastructure resource. DNS RRs are one such resource.
>
I would have expected this comment from the DNS directorate if there was
threat of running out of DNS RRs, but much the opposite: the IAB "DNS
choices" draft recommends creation and use of new RRs.
> The only objection made to using TXT that has been sustained is the wildcard
> issue and that has been answered by XPTR. The principled approach here is to
> use a new RR to extend the DNS infrastructure so it never needs future
> extension for other projects with similar goals.
>
> I think that we should only do TXT. The consequence of this is that any email
> sender can express the policy 'I sign all mail from example.com' without
> modifying their DNS. The sand in the shoe is that they have to upgrade their
> DNS server to express the policy 'All mail from *.example.com is signed'.
>
I'm not clear on what "only do TXT" means in this context -- do you mean
a directly referenced TXT record or one retrieved via an XPTR lookup or
both?
> I accept the sand in the shoe reluctantly for the following reasons:
>
> 1) I don't think that the policy 'All mail from *.example.com is signed' is
> legitimate, I can see a need for the policy 'No mail is sent from
> *.example.com' but that is out of scope. I can see how this can happen due to
> split DNS but anyone operating DKIM in this mode should either enter the DNS
> nodes in the external DNS or do the appropriate mapping before they sign.
>
> 2) Regardless of the wildcard mechanism employed (new RR, XPTR, whatever)
> administrative wildcards are going to be essential on a zone of any size.
>
I think I know from context and from talking with you what
"administrative wildcards" are, but is this a generally used term? If
not, you might want to explain.
> 3) There is an advantage to DKIM in encouraging deployment of DNS servers
> capable of DNSSEC.
>
Yes, but I don't see how that is relevant here.
>> (3) Upward query vs. wildcard publication. 27 messages in
>> discussion from 15 people. Most of the discussion was a
>> rehash of the idea of associating semantics with DNS
>> zone-cuts, which we had already discussed and rejected. I
>> have also been trying to get an opinion from DNSOP on the
>> idea of a one-level upward search (which I think solves 90%
>> of the problem), but haven't gotten any response.
>>
>> So I don't know what to write in a revision of the draft. I
>> could just write my opinions, but that's basically what's in
>> the draft-allman-dkim-ssp-02 draft already and doesn't make
>> any progress toward unifying the different proposals. I want
>> to get something done soon, well before the July 2 deadline.
>>
>
> I think that this is where we reach the 'non-negotiable' issue for the DNS
> cabal. Misimplementation of upward query is a major cause of load on the DNS.
> The DNS cabal will complain loudly on this issue and they will actually have
> a case.
>
"...is a major cause": currently? I don't see how we can design any
protocol that is misimplementation-proof.
> What does make sense is to have a policy:
> 'All mail from {example.com, alice.example.com, bob.example.com} is
> signed'
> OTHERWISE 'No mail is sent from *.example.com'
>
> I can't see where I would be signing mail from a domain name with no external
> existence.
>
> OK here we come to a strange observation I made to Jim earlier. DKIM does not
> require a wildcard for DKIM signature policies. 'I sign everything in
> *.example.com' does not make sense, the wildcard that does make sense is
> 'Nomail is sent from *.example.com'. Which is of course out of scope, so
> maybe the whole wildcard issue is out of scope for DKIM policy and is only in
> scope for DKIM policy extensions (e.g. NOMAIL).
>
Agree that the NOMAIL policy is the more interesting one to express with
a wildcard. There are some cases where it might be convenient to
express a signing policy for subdomains, but in every case I can think
of it's practical for the subdomains to publish their own SSP record.
-Jim
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html