Re: [dmarc-ietf] DMARCbis issue: Separating reporting and policy

2019-05-25 Thread John R Levine
On Sat, 25 May 2019, Dave Crocker wrote: 2. Along similar lines, I get confused when I hear that x% of {some set of domains} has "deployed DMARC". What does that mean? Have they Ultimately, you are asking marketing questions, not technical ones. Right. It's easy enough to imagine soemone han

Re: [dmarc-ietf] DMARCbis issue: what is DMARC ?

2019-05-24 Thread John R Levine
I'm getting the impression that what we need is a non-normative deployment guide, not as part of the spec. Although Section 8 of the spec currently has normative requirements for implementations. Yes, that's different from deployment but having those requirements to implement something that isn'

Re: [dmarc-ietf] DMARCbis issue: what is DMARC ?

2019-05-24 Thread John R Levine
On Fri, 24 May 2019, Jim Fenton wrote: I hope this isn't devolving into a "we can't make any changes, because it might break something" argument. I don't think so, but we also have a tradition of minimizing the changes to what's needed. Look at RFCs 2821 and 5321 for example, where they deli

Re: [dmarc-ietf] DMARCbis issue: Separating reporting and policy

2019-05-24 Thread John R Levine
MTA-STS and TLSRPT started out as one document as well, and separated quite cleanly IMO. I'm not sure what kind of incompatibilities you think might be created. That's because they separated before they were published, so there was nothing to be incompatible with. If I knew what would break wh

[dmarc-ietf] New Version of draft-levine-dbound-dns-03 with code

2019-04-27 Thread John R Levine
You may recall that we've been discussing ways to publish DNS authority boundaries, like the Mozilla PSL but in the DNS itself, not a text file. I've been claiming that with careful use of wildcards one make the number of lookups depend on the number of boundaries, not the number of labels in

Re: [dmarc-ietf] DNS library queries for DKIM and DMARC records?

2019-04-13 Thread John R Levine
As I understand it, your design depends on putting NXDOMAIN signals in the additional section to show that there aren't any boundaries between the names it returns. How do you plan to do that? John, I don't understand your note. In draft-dcrocker-dns-perimeter-00, it says this: Another

Re: [dmarc-ietf] Rethinking DMARC for PSDs

2019-04-08 Thread John R Levine
Since bad email filters are the problem, why is there no IETF working group to define the expected behavior of email filters?More importantly, can we start one NOW? It's kind of outside the IETF's expertise -- there are people in the IETF (not in this WG) who believe that DNSBLs were a fail

Re: [dmarc-ietf] [taugh.com-standards] Benjamin Kaduk's Discuss on draft-ietf-dmarc-eaiauth-04: (with DISCUSS and COMMENT)

2019-04-05 Thread John R Levine
(One thing I'll pick at that I missed before, John: The phrasing "SHOULD do X but MAY do Y" doesn't really work: taken strictly, the MAY weakens the SHOULD. I would take the second key word out, and say "SHOULD do X but Y is permitted .") OK, fixed that and Ben's catch of a dangling section re

Re: [dmarc-ietf] [taugh.com-standards] Benjamin Kaduk's Discuss on draft-ietf-dmarc-eaiauth-04: (with DISCUSS and COMMENT)

2019-04-05 Thread John R Levine
On Fri, 5 Apr 2019, Benjamin Kaduk wrote: The whole premise of rigorous specifications is that anyone can jump in to the ecosystem and implement something that interoperates, and in my opinion the current presentation is not very accomodating to such a participant. We seem to have a fairly basi

Re: [dmarc-ietf] [taugh.com-standards] Benjamin Kaduk's Discuss on draft-ietf-dmarc-eaiauth-04: (with DISCUSS and COMMENT)

2019-04-05 Thread John R Levine
On Fri, 5 Apr 2019, Benjamin Kaduk via Datatracker wrote: I'm not sure I fully understand the security consequences of causing the SPF macros %{s} and %{l} to never match when the local-part contains non-ASCII characters, but they seem potentially quite bad. That is, if the policy is intending t

Re: [dmarc-ietf] [dbound] Fwd: New Version Notification for draft-dcrocker-dns-perimeter-00.txt

2019-04-03 Thread John R Levine
On Wed, 3 Apr 2019, Dave Crocker wrote: Now, about /end to end/ support, not just publishing... Please provide some examples comparable to your proposed use case. That is, what are new RRs that are getting well-scaled, on-going use, defined in say the last 5 years? There aren't many other t

Re: [dmarc-ietf] [dbound] Fwd: New Version Notification for draft-dcrocker-dns-perimeter-00.txt

2019-04-03 Thread John R Levine
On Wed, 3 Apr 2019, Dave Crocker wrote: Section 7's suggestion for using Additional information does not rely on caching. Reliance on existing wildcard depends on propagation of a new RR, which continues to be problematic. There's a reason the Attrleaf table has so many entries... Now we're

Re: [dmarc-ietf] [taugh.com-standards] Secdir last call review of draft-ietf-dmarc-eaiauth-03

2019-03-25 Thread John R Levine
On Mon, 25 Mar 2019, Leif Johansson via Datatracker wrote: The one issue I have is that the security considerations section claims that the proposed changes attempts to mitigate some security issues in email involving SPF, DMARC and/or DKIM but it is not obvious (at least not to me) exactly what

Re: [dmarc-ietf] [secdir] [taugh.com-standards] Secdir last call review of draft-ietf-dmarc-eaiauth-03

2019-03-25 Thread John R Levine
On Mon, 25 Mar 2019, Benjamin Kaduk wrote: Maybe I should just take that out. The only issue it mitigates is that it makes DKIM and DMARC checks on EAI mail more reliable. That seems important enough to state explicitly. OK, added a sentence. Regards, John Levine, jo...@taugh.com, Taughanno

Re: [dmarc-ietf] Email security beyond DMARC?

2019-03-21 Thread John R Levine
IMHO, by cutting out direct domain spoofing, DMARC makes it easier for receivers to craft algorithms that spot impersonation attacks. I realize that's the theory, but do we know how well that works in practice? Regards, John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY Please

Re: [dmarc-ietf] Email security beyond DMARC?

2019-03-21 Thread John R Levine
DMARC has never been an anti-spam scheme. It's about phishing, which is not the same thing. I'm going to have to disagree with you John. DMARC is about preventing direct domain abuse. It does not specifically address phishing as the bad guys can simply use cousin domains, homoglyphs, etc. Wel

Re: [dmarc-ietf] Email security beyond DMARC?

2019-03-21 Thread John R Levine
But if the AIM is to have an end to end easier to implement encryption + phishing protection, probably it would make sense? Not really. This will not reduce the SPAM but using DMARC and properly tune the policy P=reject; pct=100 would help to secure the content and reduce the phishing, (and s

Re: [dmarc-ietf] Email security beyond DMARC?

2019-03-20 Thread John R Levine
On Wed, 20 Mar 2019, Bernie Hoeneisen wrote: I presume that PeP would make spam filtering much harder since the filters can't look inside the messages. This is a mutual challenge of email systems that use true end-to-end encryption. While those improve Privacy, spam mitigation means need to

Re: [dmarc-ietf] [taugh.com-standards] Re: [Gen-art] Genart last call review of draft-ietf-dmarc-eaiauth-03

2019-03-11 Thread John R. Levine
On Mon, 11 Mar 2019, Tim Evens (tievens) wrote: I should have been more clear. This is NOT specific to HTML/HREF rendering. Section references to an RFC without the RFC mentioned is misleading. For example: " DMARC [RFC7489] defines a policy language that domain owners can specify for the

Re: [dmarc-ietf] AD review draft-ietf-dmarc-eaiauth-02

2019-02-27 Thread John R. Levine
A related point ... The draft currently says it updates RFC 7208, but is that right? It only explicitly documents what's already defined there. Should that be removed? It does say that matching a UTF-8 local part fails, which is new. If you write code the way I write code, a current impleme

Re: [dmarc-ietf] We're ready with draft-ietf-dmarc-eaiauth

2019-02-08 Thread John R Levine
Would you care to post that version? The nits check is whining about some out of date refs and one down level citation. Done. Regards, John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY Please consider the environment before reading this e-mail. https://jl.ly __

Re: [dmarc-ietf] Nitpicky questions about DMARC record syntax

2019-01-16 Thread John R Levine
Is there really a benefit in filtering out people/organizations that are not fastidious in the use of whitespace and character case? Maybe, but that's not what standards are about. The point of a standard is to say here's what you do if you want to interoperate. I have never found it product

Re: [dmarc-ietf] Nitpicky questions about DMARC record syntax

2019-01-16 Thread John R Levine
The ABNF rule I included, and the one that cites it (dmarc-record) do not show any white space permitted before the 'v', so no it's not legal. Ah, now that I look at it again, I see that the dmarc-record rule is the one that matters here, since it allows WSP after the version but not before.

Re: [dmarc-ietf] Nitpicky questions about DMARC record syntax

2019-01-16 Thread John R Levine
The formal specification is quite clear on both of your questions: Section 6.4: dmarc-version = "v" *WSP "=" *WSP %x44 %x4d %x41 %x52 %x43 %x31 which means that the white space is required to be allowed and the value in this tag-value is case sensitive. Thanks, but the white space in

Re: [dmarc-ietf] PSD simplification

2018-12-12 Thread John R Levine
On Wed, 12 Dec 2018, Dave Crocker wrote: The source of the pressure is that the cost of a queriable registry is high. Very, very high. So creating one needs to have a very compelling justification. I don't see how this one comes close. Seems that way to me. Even if it's distributed by DNS,

Re: [dmarc-ietf] PSD simplification

2018-12-12 Thread John R Levine
On Wed, 12 Dec 2018, Dave Crocker wrote: we used a DNS scheme like my DBOUND one, whoever runs the DNS policy server can see all the queries and will have some idea of the mail traffic from various names. This approach doesn't have that problem. 1. Doesn't the query to the registry suffer t

Re: [dmarc-ietf] Request to accept a new I-D into the WG work items

2018-11-07 Thread John R Levine
Agree with John but from the dns side, simpler solutions tend to get traction faster. John May agree with that. Sure. My DBOUND approach was pretty simple, using no new rrtypes or other magic. From my high tech gadget On Nov 8, 2018, at 15:47, John R Levine wrote: On Thu, 8 Nov 2018

Re: [dmarc-ietf] Request to accept a new I-D into the WG work items

2018-11-07 Thread John R Levine
On Thu, 8 Nov 2018, tjw ietf wrote: I remember the two hog mentioned but there could of been a third. At this point I can't find any of the drafts other than mine, and a problem statement mostly by Andrew Sullivan. In any event, I agree it's worth having the WG take a whack at this, keeping

Re: [dmarc-ietf] ARC Multi Proposal

2018-11-05 Thread John R Levine
On Mon, 5 Nov 2018, Brandon Long wrote: If it does work, I'd be a surprised. Most likely, it'll fail validation prior to full parsing (we extract the i= first, and only fully parse all the k=v pairs later). Also, does that mean you have to use the same algorithm in both the AMS and AS for a giv

Re: [dmarc-ietf] ARC Multi Proposal

2018-11-02 Thread John R Levine
On Fri, 2 Nov 2018, Kurt Andersen (b) wrote: I mean ARC as it's implemented now, not in our multi-signing draft. It seems like a poor implementation choice to be enforcing something which is not part of the spec :-), especially when there are parenthetical comments and references to things like

Re: [dmarc-ietf] ARC Multi Proposal

2018-11-02 Thread John R Levine
It seems like a poor implementation choice to be enforcing something which is not part of the spec :-), especially when there are parenthetical comments and references to things like ARC-MULTI to warn you against leaping to foot-shooting enforcement choices. Here's what the spec says: 3. Va

Re: [dmarc-ietf] ARC Multi Proposal

2018-11-02 Thread John R Levine
On Fri, 2 Nov 2018, Kurt Andersen (b) wrote: With the current spec, if you have two AMS or AS with the same i= that's invalid, No, it is not invalid. I mean ARC as it's implemented now, not in our multi-signing draft. Regards, John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg N

Re: [dmarc-ietf] WGLC ARC-16 concern on Section 5.1.2 - cv=fail should sign greedily

2018-08-21 Thread John R Levine
On Mon, 20 Aug 2018, Kurt Andersen (b) wrote: No, by subsequent I mean intermediaries who handle the message after the point of initial "oh, this is broken" determination. So if I'm the 5th intermediary (let's assume that all are ARC participating for this discussion), and the chain on the messag

Re: [dmarc-ietf] WGLC ARC-16 concern on Section 5.1.2 - cv=fail should sign greedily

2018-08-17 Thread John R Levine
I'm still at a bit of a loss as to how one can effectively do a "greedy" seal over a broken chain in a deterministic fashion. I've been discussing this with Seth. Particularly once we start doing parallel chains for different algorithms, different implementations will disagree about what's a

Re: [dmarc-ietf] WGLC ARC-16 concern on Section 5.1.2 - cv=fail should sign greedily

2018-08-15 Thread John R Levine
On Wed, 15 Aug 2018, Dave Crocker wrote: This is a very different kind and degree of vague (and without precedent, I believe (unless someone can point to operational experience on the net that is similar?) I believe there are lots of trace fields that don't have a concrete use. I am not famil

Re: [dmarc-ietf] WGLC ARC-16 concern on Section 5.1.2 - cv=fail should sign greedily

2018-08-15 Thread John R Levine
On Wed, 15 Aug 2018, Dave Crocker wrote: Modest, indeed. Also unknown. This is building in a permanent behavior, for a use that is, at best, vague conjecture. Well, sure, but we could say that about all of ARC. As far as I know nobody has any rules yet for evaluating ARC chains beyond "if

Re: [dmarc-ietf] WGLC ARC-16 concern on Section 5.1.2 - cv=fail should sign greedily

2018-08-03 Thread John R Levine
I know I lost the argument on cv (I think cv is entirely superfluous and there's no point adding/signing a cv=fail header), but it seems the argument for that is more data. That said, this "either or" signing set thing on cv=fail seems pretty cumbersome. You guys have looked at as many ARC sign

[dmarc-ietf] ARC-16 and EAI messages

2018-07-31 Thread John R Levine
I was updating my EAI-izing draft for DKIM and DMARC and realized that it would be nice not to have to update ARC, too. The gist of it is the same as what I said for DKIM: anywhere there's a domain name there can be an IDN written with U-labels (Unicode), and anywhere there's user text, the te

Re: [dmarc-ietf] WGLC ARC-16 concern on Section 5.1.2 - cv=fail should sign greedily

2018-07-30 Thread John R Levine
The working group considered cv=invalid last year, but there was strong consensus was against it. The guidance for Sealing cv=invalid Chains somehow made it into this draft applied to all cv=fail Chains. All Chains should be Sealed in the same fashion (your AS covers the ARC Set you've added and a

Re: [dmarc-ietf] WGLC on draft-ietf-dmarc-rfc7601bis-02

2018-07-30 Thread John R Levine
In authentication service identifiers in EAI-formatted messages, a U-label and its equivalent A-label are considered to be the same. Does that mean the proposed change is appropriate, or the current text is sufficient? I still prefer my proposed change. The way you handle A-labels and U-lab

Re: [dmarc-ietf] ARC-16 signature domains

2018-07-27 Thread John R Levine
On Fri, Jul 27, 2018 at 10:24 AM, John Levine wrote: The ARC draft clearly says that every ARC header can be signed by whatever domain you want. Are you saying we should proscribe it, because its semantics are unclear? I'd say that all signatures in a seal SHOULD have the same domain, to m

[dmarc-ietf] Lots of pending errata for RFC 7489

2018-07-27 Thread John R. Levine
There's a bunch of errata from the past year that are neither verified nor rejected. Most of them look correct, suggest they all be hold for update. Erratum 5229: adds some misssing default values to the report XML scheme. Looks correct. Erratum 5365: report filename .gz should be .xml.gz.

Re: [dmarc-ietf] WGLC ARC-16 section 5.2.2 should be stricken

2018-07-27 Thread John R. Levine
. Ah. I still think it should go, but if you really want to do that, invent a new enhanced status code. They're cheap. 5.7.7 isn't right, it's more like corrupt S/MIME bodies. R's, John --Kurt On Thu, Jul 26, 2018 at 4:36 PM, John R. Levine wrote: I agree, this is ou

Re: [dmarc-ietf] WGLC ARC-16 section 5.2.2 should be stricken

2018-07-26 Thread John R. Levine
I agree, this is out of place. Whether you reject at SMTP time is a much broader topic than ARC failures. On Wed, 25 Jul 2018, Seth Blank wrote: https://tools.ietf.org/html/draft-ietf-dmarc-arc-protocol-16#section-5.2.2 I am confused as to where this section comes from. It was never discusse

[dmarc-ietf] [Technical Errata Reported] RFC7489 (5440)

2018-07-25 Thread John R Levine
Something I noticed in a conversation on mailop. -- Forwarded message -- Date: Wed, 25 Jul 2018 15:26:57 From: RFC Errata System To: superu...@gmail.com, zwi...@yahoo-inc.com, rfc-...@rfc-editor.org Cc: jo...@taugh.com, rfc-edi...@rfc-editor.org Subject: [Technical Errata Reporte

[dmarc-ietf] Sort of erratum on RFC 7601 for 7601bis

2018-07-22 Thread John R Levine
An erratum on RFC7601 just appeared that reports a bug in the ABNF for the resinfo rule. I think the purported bug is not a bug but his suggested rewrite to the ABNF is cleaner than what's there now. https://www.rfc-editor.org/errata/eid5435 Regards, John Levine, jo...@taugh.com, Taughannock

Re: [dmarc-ietf] WGLC on draft-ietf-dmarc-rfc7601bis-02

2018-07-17 Thread John R Levine
https://www.ietf.org/rfcdiff?url2=draft-ietf-dmarc-rfc7601bis-02&url1=rfc7601 Looks OK to me. I have some minor editorial niggles about the wording of the EAI advice, but the substance is fine. In section 5: For messages that are EAI-formatted messages, this test is done after con

Re: [dmarc-ietf] ARC protocol-15 posted

2018-06-29 Thread John R Levine
On Fri, 29 Jun 2018, Dave Crocker wrote: Not at all. The point of a standard is to say here is what you do if you want to interoperate. Trying to figure out how to recover when someone else doesn't follow the spec is a fool's errand, since there are more ways to misimplement a spec than any of

Re: [dmarc-ietf] inheritance and public suffix list

2018-04-10 Thread John R Levine
On Tue, 10 Apr 2018, Kurt Andersen (b) wrote: Registries make RSEP requests all the time. They're tedious and fairly expensive, but the process is straightforward. Is this something that could be within the remit of the dmarc-wg if we wanted to pave the way with ICANN across the board? I bel

[dmarc-ietf] Strange dmarc lookups

2018-03-26 Thread John R. Levine
A friend looking at DNS traces says he's seeing a lot of queries like this. _dmarc.78.0x18.0143.0031 The numbers vary, some don't have the 0x. Any idea what it is? The _dmarc suggest something thinks it's finding those domains on From: lines but I'm having trouble imagining what it is.

Re: [dmarc-ietf] [ietf-smtp] Moving RFC4406 to historic?

2018-03-23 Thread John R. Levine
I have now posted https://tools.ietf.org/html/draft-andersen-historic-4406-etal-00 for this task. Please let me know if that fits the bill. Looks good to me. I hope Dave remembers what the process is for a document like this one. AD sponsored? Regards, John Levine, jo...@iecc.com, Primary

Re: [dmarc-ietf] I-D Action: draft-ietf-dmarc-rfc7601bis-01.txt

2018-03-22 Thread John R Levine
On Thu, 22 Mar 2018, Kurt Andersen (b) wrote: That would probably be me, but I don't know what the local-part problem is. My intention was to import the local-part changes from the EAI RFC. The problem has to do with the ambiguity that is being imported along with those local-part ABNF changes

Re: [dmarc-ietf] I-D Action: draft-ietf-dmarc-rfc7601bis-00.txt

2018-02-19 Thread John R Levine
On Mon, 19 Feb 2018, Murray S. Kucherawy wrote: Seems fine, although I've long found 7601 one of the most mysterious RFCs ever published. Why's that? (And why wasn't this mentioned when 7601 or any of its antecedents was in last call? No errata?) I admit I could have been paying more attent

Re: [dmarc-ietf] I-D Action: draft-ietf-dmarc-rfc7601bis-00.txt

2018-02-11 Thread John R. Levine
Here's some stuff from my EAI authentication draft which it would be nice if you could fold in. Is this stuff in scope for this working group? This feels a bit like feature creep. Or should your draft just modify this one instead of RFC7601? The changes are so small that this could go throug

Re: [dmarc-ietf] I-D Action: draft-ietf-dmarc-rfc7601bis-00.txt

2018-02-10 Thread John R. Levine
Here's some stuff from my EAI authentication draft which it would be nice if you could fold in. In section 1.5, I'd add a section about EAI, pointing to RFCs 6530-2, and saying that in EAI messages, you can have UTF-8 most places you can have text intended for humans, and U-labels anywhere the

[dmarc-ietf] New version of E-mail Authentication for Internationalized Mail draft

2018-01-21 Thread John R Levine
Read all about it: https://datatracker.ietf.org/doc/draft-levine-appsarea-eaiauth/ This is an updated version of a draft I wrote two years ago, that tries to nail down the small changes to SPF, DKIM, and DMARC in EAI messages. This version adds a section for the Authentication-Results heade

[dmarc-ietf] Section 5.2.1, header.ds considered confusing

2018-01-02 Thread John R. Levine
I don't see the point of the header.ds field. We already have header.d, so why not just add header.s? If there are two DKIM validations, the A-R header will look like this, no confusion I can see: Authentication-Results: example.com; ... dkim=pass header.d=foo.com header.s=abc; header.b="A

Re: [dmarc-ietf] ARC draft-10 Section 10 - Algorithm Rotation - can we address separately?

2018-01-02 Thread John R Levine
On Tue, 2 Jan 2018, Kurt Andersen (b) wrote: I don't think this will be super complicated, but I do think it would be a mistake to try and publish now and then retrofit rather than adding it before we publish. I agree (which is why I started off with the first draft that is currently found in

Re: [dmarc-ietf] ARC draft-10 Section 10 - Algorithm Rotation - can we address separately?

2017-12-29 Thread John R Levine
I still don't understand why we need to say more than DKIM did on this topic. DKIM doesn't have a chain of signatures. With DKIM, a signature is either valid or not, and you can ignore the ones you don't understand. ARC has a chain of ARC seals, and the current document says there's only one

Re: [dmarc-ietf] Algorithm rotation, New drafts of ARC protocol (10) & usage (03) posted

2017-12-23 Thread John R Levine
That is true, but it's also true that the standards track version of EAI is fairly different from the experimental version, mostly by leaving out a feature that didn't work in the field (downgrading.) Does that mean going with "experimental" first was a good choice or bad choice for them? For

Re: [dmarc-ietf] Algorithm rotation, New drafts of ARC protocol (10) & usage (03) posted

2017-12-22 Thread John R Levine
On Fri, 22 Dec 2017, Dave Crocker wrote: 3. Incompatible features: This is the interesting case, where the previous and later versions have conflicting behaviors. My view is that this is not merely a new 'version' but, rather, is a new protocol. However the protocol itself -- not version -- ha

Re: [dmarc-ietf] Preventing abuse of public-suffix-level domains

2017-12-22 Thread John R Levine
ensible in their namespace as well. Thanks again. Ta. I. -- Dr Ian Levy Technical Director National Cyber Security Centre Staff Officer : Kate Atkins, kat...@ncsc.gov.uk -----Original Message- From: John R Levine [mailto:jo...@taugh.com] Sent: 20 December 2017 17:58 To: Kurt Andersen

Re: [dmarc-ietf] Preventing abuse of public-suffix-level domains

2017-12-20 Thread John R Levine
SPF doesn't have sub-domain level protection like DMARC does, would it be useful to look at adding it? I doubt it. SPF was written and implemented a decade ago and it's unlikely anything new would be widely deployed. DMARC sub-domain level protection assumes that the owner domain isn't a TL

Re: [dmarc-ietf] Preventing abuse of public-suffix-level domains

2017-12-20 Thread John R Levine
On Wed, 20 Dec 2017, Kurt Andersen (b) wrote: I need to be able to emulate in some way the effect of SPF and DMARC records for non-existent first level subdomains under the PSL gov.uk - to stop spoof mail apparently coming from them being delivered. I'm quite sure that you will need to do this

Re: [dmarc-ietf] SHA1 and short keys, threat or menace

2017-12-13 Thread John R Levine
So my thought here is that now that DCRUP is due imminently, we should update the YANG test suite to reject SHA-1 hashes. Thoughts? That's what I would do. Given how new ARC is and the absence of legacy code, I don't see any reason to allow them. R's, John _

Re: [dmarc-ietf] Lenient SPF

2017-10-09 Thread John R Levine
The devil will be in the details, I realise that. Really, this is not a new idea. It doesn't work. Please go back and read the archives from a decade ago when all of these ideas were considered and rejected. R's, John PS: * Asking users to manage their own security settings doesn't work

Re: [dmarc-ietf] Lenient DKIM (new Internet Draft)

2017-09-30 Thread John R Levine
I shall remove the reason of "security painting" by MUAs from the text. What remains is automated content processing (spam filtering) which still appears to be a sufficiently good reason on its own. It still appears to me that most of the difficult cases can be remedied in the proposed [but curre

Re: [dmarc-ietf] Lenient DKIM (new Internet Draft)

2017-09-29 Thread John R Levine
On Fri, 29 Sep 2017, Rick van Rein wrote: Thanks to John for reading the draft proposal. Marking content in an MUA is a WKBI*. There is no reason to believe that users would understand content marking or would make reasonable decisions based on it. Hmm. The idea was founded on the common rel

[dmarc-ietf] Did you get survey spam from VT students?

2017-07-31 Thread John R. Levine
I just got spam from a couple of Virginia Tech students with an impressively clueless "survey" about DKIM and DMARC usage. If you got it, could you instead reply to their professor and the VT IRB pointing out that scraping people's addresses from mailing lists is unethical and, in many countri

Re: [dmarc-ietf] Guidance around constructing an AAR when multiple AR headers are present?

2017-05-24 Thread John R Levine
On Wed, 24 May 2017, Dave Crocker wrote: Unless there is a very compelling need for multiple A-R header fields -- and I don't think I've seen that asserted -- then the simplest thing is to declare them illegal and any occurrence of them as invalidating the authentication mechanism(s). There's

Re: [dmarc-ietf] Guidance around constructing an AAR when multiple AR headers are present?

2017-05-24 Thread John R Levine
Seems reasonable, give or take a word or two to make it clear we're just talking about the ones for the current hop. There should only be the ones from the current hop if the admd is stripping previously existing ones prior to adding any new ones per the authres rfc. I meant not to use a-r wit

Re: [dmarc-ietf] Guidance around constructing an AAR when multiple AR headers are present?

2017-05-24 Thread John R Levine
On Wed, 24 May 2017, Seth Blank wrote: aft-ietf-dmarc-arc-protocol-03#section-5.1.3 : "The AAR should contain all Authentication-Results results from within its ADMD, regardless of how many Authentication-Results headers are on the message." Seems reasonable, give or take a word or two to make

Re: [dmarc-ietf] Fwd: New Version Notification for draft-srose-dkim-ecc-00.txt

2017-04-08 Thread John R Levine
Without marking the published key as obsolete, downgrade attack is possible, because attacker can still use a weaker key to spoof signature. If you know how to spoof a sha256/rsa1024 signature, I know a lot of people who would like to talk to you. Other than that, please review RFC 6376. Ea

Re: [dmarc-ietf] Fwd: New Version Notification for draft-srose-dkim-ecc-00.txt

2017-04-07 Thread John R Levine
Does this initiative include an intention to update the cryptographic guidance from RFC 6376 sections 3.3 and 3.3.3 ? The proposed charter speaks of adding new algorithms, but doesn't discuss deprecating/removing old ones. We haven't decided yet. I'd think that'd be something DCRUP could cons

Re: [dmarc-ietf] Fwd: New Version Notification for draft-srose-dkim-ecc-00.txt

2017-04-07 Thread John R Levine
Ok - nice to know I'm not the only one thinking this (means I'm not totally crazy). I'm willing to drop my draft and just contribute/review this one. There is no reason to have multiple drafts trying to do the same thing. No, don't, we can moosh them together. I don't know much about elliptic

Re: [dmarc-ietf] Fwd: New Version Notification for draft-srose-dkim-ecc-00.txt

2017-04-07 Thread John R Levine
Should we add more hash algorithms? As far as I know SHA-256 is still adequate for the forseeable future, but I expect the crypto experts will weigh in. Ditto whether we really need three new algorithms since the more ways there are to sign, the more ways there are to have broken signatures.

Re: [dmarc-ietf] indeterminisim of ARC-Seal b= value

2017-03-27 Thread John R Levine
I think tightening up some currently allowed ambiguity in the ARC specification is a much simpler and much better solution. I'm not sure why there's such concern about canonicalizing the format and ordering of some tag/value pairs. If you think that's all it would take to make signature headers

Re: [dmarc-ietf] indeterminisim of ARC-Seal b= value

2017-03-26 Thread John R Levine
It's even more important than it was with DKIM to have a test suite that can verify signing behavior. If we don't agree on any sort of standard, a test suite will need to select a preferred format for the ARC headers & will fail all implementations that don't meet this form. We've discussed this

Re: [dmarc-ietf] key sizes, was Section [5.2.1] of the ARC draft

2017-01-25 Thread John R Levine
Signing one seems wrong, ie if the arc-seal only signs a single arc-message-signature at a given hop, then the other signature can't be verified, and if I can't handle the algorithm of the one that's covered, then I can't verify the chain. Currently away on a trip, I'll take a closer look when I

Re: [dmarc-ietf] key sizes, was Section [5.2.1] of the ARC draft

2017-01-25 Thread John R Levine
I see a rabbit hole here... So you're transitioning, so you sign twice (one with your old, one with your new) before you send to me and hey, I'm not the end point either, so I need to forward it along, but I'm also transitioning, so I sign both of yours, twice? I would kind of have to, wouldn'

Re: [dmarc-ietf] key sizes, was Section [5.2.1] of the ARC draft

2017-01-25 Thread John R Levine
Sure, with dkim. With arc, it's a bit more complicated, we need to understand exactly how to sign the chain if there are multiple AMS and AS headers. We probably want text about what happens if only one verifies as well, and whether a hop should continue signing both paths or just one. All quit

Re: [dmarc-ietf] key sizes, was Section [5.2.1] of the ARC draft

2017-01-24 Thread John R Levine
On Tue, 24 Jan 2017, Brandon Long wrote: I'm not opposed to requiring support for different encryption algorithms, but we really need to clean up and understand exactly how we handle migration to a new algorithm, probably with a section in the draft specific to it with an example. Fortunately,

Re: [dmarc-ietf] Section [5.2.1] of the ARC draft

2017-01-23 Thread John R Levine
This sounds like something that we should definitely add so that there is clarity, but it does add a situation where cv=unknown might happen if the previous step only signed with an algorithm that was not understood. Right -- you can't tell a signature with an unknown algorithm with one that's

Re: [dmarc-ietf] [ietf-dkim] a slightly less kludge alternative to draft-kucherawy-dmarc-rcpts

2016-11-15 Thread John R Levine
https://www.ietf.org/rfcdiff?url2=draft-kucherawy-dkim-rcpts-01 I forgot to update the title of Section 3, but other than that I think I captured what's been discussed. Please let me know what I've missed. How come rh= has one hash instead of several? You can put all the addresses in the To:

Re: [dmarc-ietf] [ietf-dkim] a slightly less kludge alternative to draft-kucherawy-dmarc-rcpts

2016-11-14 Thread John R Levine
- pick a random string S of length L using only printable ASCII characters (I like 8 for L but that's arbitrary) - SHA the string produced by prepending S to the recipient address, and express the result in base64 string R - include R in a new "er" (envelope recipient) tag and the salt S in an "rs

Re: [dmarc-ietf] [ietf-dkim] a slightly less kludge alternative to draft-kucherawy-dmarc-rcpts

2016-11-14 Thread John R Levine
The proposal creates redundant information and an especially awkward usage restriction. I entirely agree. Along with Ned's analysis of the various options, I hope this is enough to persuade people that the correct solution to the problem of signing spam for people to resend is Scott's: Don't

Re: [dmarc-ietf] [ietf-dkim] a slightly less kludge alternative to draft-kucherawy-dmarc-rcpts

2016-11-14 Thread John R Levine
On 11/14/2016 10:00 PM, John R Levine wrote: My version puts the recipient addresses into the DKIM-Signature header Privacy violation. You might want to read the rest of the message before responding. Regards, John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY Please

Re: [dmarc-ietf] [ietf-dkim] a slightly less kludge alternative to draft-kucherawy-dmarc-rcpts

2016-11-14 Thread John R Levine
[ resent with a reasonably correct date header ] I can write this up as a draft if people think it's interesting. Murray's draft puts the envelope recipients into the DKIM hash, which means that the message sent to multiple MTAs be signed separately for each target MTA. My version puts the reci

Re: [dmarc-ietf] Proposal to adopt ARC documents into the WG (toward phase 2 milestone)

2016-05-10 Thread John R Levine
On the other hand, for purely transactional domains, it could be simpler for the recipient to be able to easily find that ARC-ish mechanisms are not authorized. As is invariably the case here, except sometimes. It is my impression that there are forwarders that break DMARC signatures (MS Exch

Re: [dmarc-ietf] draft-levine-dkim-conditional-02

2015-10-04 Thread John R Levine
As John pointed out, RFC6376 requires that the signature not pass for any "v=" value other than 1. It won't even get as far as considering the "!" tags. He said "most" implementations he checked will conform to that. I thought it was "all"; perhaps he'd care to elaborate. All the ones that an

Re: [dmarc-ietf] draft-levine-dkim-conditional-02

2015-10-03 Thread John R Levine
Things get easier if you make the new feature optional, in which case you don't need a version number... If you can figure out how to make signature conditional on another with without a version bump, that would be swell. I've been thinking about it for over a year and so far this trick elude

Re: [dmarc-ietf] draft-levine-dkim-conditional-02

2015-10-03 Thread John R Levine
I think at least the latter is a minor point since the XML source for RFC6376 is readily available. I'm happy to pick up the editor pen again if needed. My concern is that once the can is opened, it's hard to keep some of the worms from escaping. There was a further rather theological argum

Re: [dmarc-ietf] draft-levine-dkim-conditional-02

2015-10-03 Thread John R Levine
I think "!cd" is the only thing I changed. Here's my old comment about it with some open issues mentioned, like "v=2" to which Dave objected: https://mailarchive.ietf.org/arch/msg/dmarc/WQNRhqdUjM5Kut0BWzENx8aJSO8 I suppose the version bump to v=2 is an open issue, but I don't really see what

Re: [dmarc-ietf] draft-levine-dkim-conditional-02

2015-10-02 Thread John R Levine
I made a post some time back about changes I made in my implementation versus the spec. I'll dig that up too. For one thing, I apparently decided I didn't like the term "forward signature" and preferred "conditional domain", so the new tag is "!cd". We can argue about that and the other stuff w

Re: [dmarc-ietf] draft-levine-dkim-conditional-02

2015-09-30 Thread John R Levine
I would expect conditional signatures to be applied by large mail systems, using their private list of domains that look like mailing lists to decide who gets them. From the past couple of years of discussion, it is clear that all of the large mail systems already have such a list of domains, s

Re: [dmarc-ietf] DMARC ATPS Interop Note

2015-05-22 Thread John R Levine
Except of course for all of the people who don't look at all the crud in their spam folder. They're not likely to write about messages they don't see. If it's in the spam folder, for a whole lot of people it might as well be discarded. If a tree falls in the forest and your don't hear it, does

Re: [dmarc-ietf] DMARC ATPS Interop Note

2015-05-22 Thread John R Levine
This is of course if the message is not spammy or contain a virus, or nasty stuff like that, where the anti-spam filter may discard the message. Except of course for all of the people who don't look at all the crud in their spam folder. They're not likely to write about messages they don't s

Re: [dmarc-ietf] draft-ietf-dmarc-interoperability-02.txt

2015-05-22 Thread John R Levine
I'm mulling indeed about deleting the whole EAI stuff, because it is about tangent policies around DMARC and not an interoperability issue per se. Really, it's just wrong. Delete it, please. I see the mailing list is focused on finding future solutions, not in explaining current operational

Re: [dmarc-ietf] Weaker single author signature

2015-05-22 Thread John R Levine
> For this to work, you somehow need to persuade the real system to send > you a signed message from the address you're planning to abuse. That > seems like an implausible amount of work. I agree it sounds like a lot of work. But I don't see why you would bother attacking the resigning system a

Re: [dmarc-ietf] Weaker single author signature

2015-05-21 Thread John R Levine
My understanding is that the bad guys were stealing Yahoo address book information and then mailing from OUTSIDE Yahoo to the recipients (not Yahoo) claiming to be from the Yahoo user that they stole the address book info from - thus the p=reject shutting the problem down almost immediately for

<    1   2   3   4   5   >