> -----Original Message-----
> From: Daniel Black [mailto:[email protected]]
> Sent: Saturday, May 29, 2010 2:10 AM
> To: [email protected]; Murray S. Kucherawy
> Subject: Re: [ietf-dkim] Lists "BCP" draft review

Hi Daniel, sorry for the less-than-timely reply.

Some specific replies to points you made, and then I'll work the rest into the 
next draft revision.

> Actual Review:
> 
> Principle Recommendations:
> 
> Incorporate ARF/draft-ietf-mark-dkim-reporting as strong
> recommendations so
> that any incompatibilities anywhere will be obvious the the sender
> domain. As
> gaining statistics and experience is a dominate objective of this
> working
> group getting report forwarding done by verifiers so senders have a
> full
> picture is essential.

I'm not sure that this is the right place to refer people to the MARF work on 
DKIM failure reporting.  Generally it's a concept that would be of use to all 
senders and requires participation of all receivers, and isn't specific to 
mailing lists.

Perhaps it would be appropriate for an appendix.

> Another idea based on what Barry said was to introduce a section of why
> MLM
> break signature and potentially dkim compliant practices that could be
> achieved in the medium to longer term. An attempt at this has been
> incorporated into the current section 3.3.

Do you have a summary of either set of practices?  (Those being things MLMs do 
that break signatures, and things MLMs could do to provide the list-specific 
information people want without breaking signatures.)  That would be extremely 
helpful here.  You're right, I've tried to do that in 3.3, but I've only got my 
own experience plus feedback from one other person to go on so far.

> Specific components of the draft:
> 
> section 1.1
> 
> add to list of questions:
> 
> "What options exist for a recipient verifying a message?"
> 
> minor: I tend to think this current list of questions omits the
> significance of
> the end recipients' options in decision making based on dkim signatures
> and
> this is discussed in the draft.

Absent any kind of formal definition that binds a DKIM signature's "d=" tag to 
something specific to the list (such as a domain in a List-* header field) I 
don't think there's much advice we can provide here that DKIM itself doesn't 
already say.  Until then, a list signature is just another third-party 
signature.

> section 1.2
> 
> insert as 1.2 before the current 1.2:
> 
> "1.2 DKIM / ADSP failure reporting
> [...]

I think this would be useful advice in general, but your specific case depends 
on work being done in a different working group and possibly on a different 
schedule.

Would it be sufficient to make a more general reference to DKIM feedback 
mechanisms?  Or is it safe to make a reference to an I-D as a "work in 
progress" and proceed from there?

> section 3.3 Current MLM Effects On Signatures
> 
> Append at end of subject tags paragraph.
> 
> "The content of MLM modification of the subject tag is effectively
> replicating
> the List-ID value in a way visible to the recipient. This behavior was
> motivated by a lack of MUA support for displaying List-ID tags. It
> desirable
> for MUA to start supporting List-ID tags in order to deprecate this
> behaviour
> in MLMs."
> 
> Addition to other header fields paragraph:
> 
> "The modification of Sender/Reply-to stems from a goal to guide the
> recipients
> behaviour to continue the conversion or or off list. There could be an
> attempt
> to create a new header field to describe the desired behaviour and for
> MUAs to take note of this header field."

I think I agree with Dave that we shouldn't make a vague reference to future 
work.  The focus here is making DKIM work in the current context.

I'd be happy to help with such an effort if you'd like to start one.  I'm 
skeptical about its success due to MUA development inertia, but then I had the 
same concern about MLMs and it has been allayed somewhat.

> significant: explores options in changing MLM behaviour, that while is
> not
> going to happen in any hurry may end up occurring eventually. I
> acknowledge
> that the bit on attachment filtering alternatives isn't complete.

While discussing helpful MLM behavior changes is certainly useful, the 
recommendations of this document should probably presume those aren't going to 
happen in the short term and thus only be limited to DKIM-specific things.

> new paragraph at the end of 3.3
> 
> In essence, the practices of MLM breaking DKIM signature verification
> could be
> reduced with better MUA support on existing standards and the
> introduction of
> a few simple standards so that MUA and MLM can operate consistently
> rather
> then retrofitting desired behavior into existing header fields
> potentially in a
> incompatible way.

I wonder if collecting all of the sentiments about MLMs and MUAs and their 
respective changes to improve the situation overall should be collected in an 
appendix.  It seems to be a common thread in conversation though.  I'll try it 
from that angle.

Thanks again!

-MSK

_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to