Re: [dmarc-ietf] A detour into signature semantics, was Fwd: New Version

2014-06-20 Thread John Levine
If the signature is valid *and* the signer has a good reputation, then a delivery agent might do something nice to the message. If it sees a lot of cruddy mail with my signature, The issue is not your 'signature' but your d= domain name. That's where the reputation assessment is supposed to

Re: [dmarc-ietf] Fwd: New Version Notification for draft-kucherawy-dkim-delegate-00.txt

2014-06-20 Thread John Levine
I don't know anyone who's checked whether DKIM validators verify the version number, but if it's an issue, there aren't that many widely used DKIM engines so it wouldn't be hard to check. Just FYI, libdkim which all our products use does check the v= and if it's not v=1 verification fails

Re: [dmarc-ietf] The theory of DKIM versions

2014-06-19 Thread John Levine
sigh, stupid editor. As I was saying: I can think of a variety of ways to get this effect by hacks that stay at v=1, all rather ugly. For example, we could invent pseudo-canonicalizations like c=condrelaxed/condsimple which are the same as relaxed and simple, but only are valid if the verifier

Re: [dmarc-ietf] signature sample, was So if you don't want

2014-06-19 Thread John Levine
Here's an example. The top signature is from the list, the second and third signatures were applied by the sender. The second is the normal signature and the third a weak conditional signature. The third has cs=fs which means it's only valid with an additional (forwarder) signature, and fs=t

Re: [dmarc-ietf] malware cleaning, was Change the mailing list protocol, not DMARC.

2014-06-14 Thread John Levine
I'm not sure we need to be considerate of such behavior. If it's malware, reject it outright. Can't do that. Many viruses attach themselves to legitimate messages. If the author is the boss, rejecting it would be, uh, bad. I don't think I've seen malware attached to a real message in the

Re: [dmarc-ietf] Fwd: New Version Notification for draft-kucherawy-dkim-delegate-00.txt

2014-06-14 Thread John Levine
When DKIM-Delegate is used, there are two, valid signatures for the same domain. One is 'stronger'. The scenario being discussed is for a recipient who gets both signatures when they are valid, but who does not know about DKIM-Delegate. They only know about DKIM. That's not a problem -- if it

Re: [dmarc-ietf] Fwd: New Version Notification for draft-kucherawy-dkim-delegate-00.txt

2014-06-14 Thread John Levine
If a signature has an rsf= tag, verifiers ignore it unless there's a matching signature from a domain the rsf= points to. This is not backward compatible, since verifiers that don't understand rsf= will often get the wrong answer, so it needs a version bump. Can't both the version

Re: [dmarc-ietf] Fwd: New Version Notification for draft-kucherawy-dkim-delegate-00.txt

2014-06-11 Thread John Levine
On Wed, Jun 11, 2014 at 7:15 AM, John Levine jo...@taugh.com wrote: Right. So if you don't want people using unforwarded weak signatures for reputation management, you need to put something into them so that old clients don't accept them as signatures and ignore the t= tag. Either call them

Re: [dmarc-ietf] confusing 3rd party support so it remains out

2014-06-05 Thread John Levine
In article caba8r6ttzt+vtv4oqvx-s7desv+cu72xm9-pcazt3+m6ecb...@mail.gmail.com you write: -=-=-=-=-=- -=-=-=-=-=- Let me see if I understand this... you want to be able to use a strong DMARC setting for your domain, and let YMail send mail on behalf of your domain? I think the use case here is

Re: [dmarc-ietf] DKIM through mailing lists (rebutting MLs won't change)

2014-06-04 Thread John Levine
But that is not equivalent to putting non-resolvable gibberish on the right side of the @ sign. That's a reliable way of assuring that such messages do not get queued on my server. As a matter of practicality, I highly doubt that I'm unique in requiring that the sender domain (envelope and

Re: [dmarc-ietf] fussp alert, was DKIM through mailing lists

2014-06-04 Thread John Levine
Otherwise it is easy to send an email with a domain that contains an extra letter and bypass DMARC. It is ALWAYS easy to send an email with a domain that contains an extra letter and bypass DMARC. Lookalike or cousin domains are specifically not something it addresses. Keep in mind that is

Re: [dmarc-ietf] list side validation, was Yet another mailing list solution thread

2014-06-03 Thread John Levine
The OAR isn't necessary for a DMARC compliant MLM which would know to make sure the message passed DMARC as sent by following one of the mitigation strategies (don't munge the message, munge the from, embed the message as an attachment, etc). It seems necessary for any whitelisting scheme,

Re: [dmarc-ietf] Yet another mailing list solution thread

2014-06-03 Thread John Levine
Even if I grant you that (and I'm not sure I do), I also don't know why OAR is better than AR. I get the impression there are two reasons for OAR: a) A-R is likely to be stripped by intermediate MTAs, OAR isn't. b) whoever suggested OAR didn't understand A-R semantics Take your pick. R's,

Re: [dmarc-ietf] DKIM through mailing lists (rebutting MLs won't change)

2014-06-03 Thread John Levine
Yes the email is legitimate, but how does the MTA knows it? Well a bayesian filter has learned that this type of content is legitimate, and then one day a spammer uses the same content, but change one link... That could happen to any mail feature you care to name. Big companies send buckets of

Re: [dmarc-ietf] DKIM through mailing lists (rebutting MLs won't change)

2014-05-31 Thread John Levine
That's okay -- it was just a thought. However, note that not all MLMs are in as good a shape as GNU Mailman is, volunteer-wise. For *them*, it might be useful. I wouldn't count on it. I did .invalid patches for majordomo2, which is largely abandonware but still used a fair number of places.

Re: [dmarc-ietf] DMARC mitigation techniques

2014-05-31 Thread John Levine
I would love to see that list of multiple mitigations shared with the broader community. That would be useful information for people in the IETF, as well as other MLM teams not involved wherever those discussions occurred. Your wish is our command:

Re: [dmarc-ietf] send-to-a-friend, was Solution for

2014-05-29 Thread John Levine
Since you don't mention it, what about the mail this article to a friend use case that has also been mentioned? Is that a problem that should be addressed here? ... Franky, that case has always been kind of ick, and is easily solved by sending From the domain in question

Re: [dmarc-ietf] Solution for DMARC disruption of normal email use while still offering its normal protection

2014-05-28 Thread John Levine
For a service at this scale, you'd need to only do this for places where you trust their Authentication-Results header. There is a potential issue of conflicting AR headers, which is one benefit of the OAR. Its not clear to me that gmail.com needs to tell another service to trust the OAR from a

<    5   6   7   8   9   10