Re: [ietf-dkim] 23 again (sorry John) was Output summary - proposing ODID "Originating Domain Identity"

2011-05-05 Thread Murray S. Kucherawy
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] > On Behalf Of Barry Leiba > Sent: Thursday, May 05, 2011 1:55 PM > To: John R. Levine > Cc: ietf-dkim@mipassoc.org; Alessandro Vesely > Subject: Re: [ietf-dkim] 23 again (sorry John) was Ou

Re: [ietf-dkim] 23 again (sorry John) was Output summary - proposing ODID "Originating Domain Identity"

2011-05-05 Thread Murray S. Kucherawy
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] > On Behalf Of Barry Leiba > Sent: Thursday, May 05, 2011 1:55 PM > To: John R. Levine > Cc: ietf-dkim@mipassoc.org; Alessandro Vesely > Subject: Re: [ietf-dkim] 23 again (sorry John) was Ou

Re: [ietf-dkim] Output summary - Keep your Eye on the Prize!

2011-05-05 Thread Murray S. Kucherawy
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] > On Behalf Of Hector Santos > Sent: Thursday, May 05, 2011 9:41 PM > To: dcroc...@bbiw.net > Cc: ietf-dkim@mipassoc.org > Subject: Re: [ietf-dkim] Output summary - Keep your Eye on the Priz

Re: [ietf-dkim] Output summary - Keep your Eye on the Prize!

2011-05-05 Thread Hector Santos
Dave CROCKER wrote: >>> I don't think this is correct. The signer creates and signs the i= value, >>> so it's not "garbage", > >> By "garbage", I mean "not guaranteed to have any useful meaning". > >> So, I believe, it's essentially meaningless as far as the protocol can >> stipulate. A

Re: [ietf-dkim] Output summary - Keep your Eye on the Prize!

2011-05-05 Thread Dave CROCKER
On 5/5/2011 8:12 PM, Murray S. Kucherawy wrote: >> From: Michael Thomas [mailto:m...@mtcc.com] Sent: Thursday, May 05, 2011 >> 1:35 PM >> >> On 05/04/2011 08:34 PM, Murray S. Kucherawy wrote: >>> Technical: The AUID is an unvetted value. The local-part and the >>> subdomain could be garbage. It

Re: [ietf-dkim] Output summary - Keep your Eye on the Prize!

2011-05-05 Thread John Levine
>I don't think this is correct. The signer creates and signs the i= value, >so it's not "garbage", and it can't be "false" either. Perhaps the word "stable" would be more applicable. The d= value is tied to the DNS, is relatively stable, and the verifier can check that there's a key record in the

Re: [ietf-dkim] Output summary - Keep your Eye on the Prize!

2011-05-05 Thread Murray S. Kucherawy
> -Original Message- > From: Michael Thomas [mailto:m...@mtcc.com] > Sent: Thursday, May 05, 2011 1:35 PM > To: Murray S. Kucherawy > Cc: ietf-dkim@mipassoc.org > Subject: Re: [ietf-dkim] Output summary - Keep your Eye on the Prize! > > On 05/04/2011 08:34 PM, Murray S. Kucherawy wrote: >

Re: [ietf-dkim] issue: Section 2.6/ 3.5 AUID/i= should have pubkey t=s info

2011-05-05 Thread Hector Santos
Barry Leiba wrote: >> I think the definition of i= should include information about the >> public key t=s tag. �This t=s information that will deviate the "i=" >> definition is not found until 3.6.1 and 3.10. �The same can apply to >> section 2.6 Agent or User Identifier (AUID) which makes no menti

Re: [ietf-dkim] Question: ADSP DKIM=UNKNOWN and A-R reporting

2011-05-05 Thread Hector Santos
Barry Leiba wrote: >>> That's not what RFC5617 says. >> � �Meaning: �No valid Author Domain Signature was found on the message >> � � � � � � �and the published ADSP was "unknown". >> >> Can't that be read as meaning a non-Author Domain Signature was not >> expected? > > No, not at all. I can't t

Re: [ietf-dkim] 23 again (sorry John) was Output summary - proposing ODID "Originating Domain Identity"

2011-05-05 Thread John R. Levine
> I agree, as a participant. Nevertheless, we have consensus to leave > it in because of the stats Murray gave us on the usage (on the signing > side). I agree we need to leave it in, but as I said, I would rather not offer advice about how to code around its limitations, not least because what

Re: [ietf-dkim] issue: Section 2.6/ 3.5 AUID/i= should have pubkey t=s info

2011-05-05 Thread Barry Leiba
> Repeating or rephrasing specification text invites divergent interpretations. Indeed, and I agree that not repeating is best. On the other hand, we're already repeating the part about "or a subdomain of", which is why I support adding a notation about "except when t=s". >    Note the constrain

Re: [ietf-dkim] Output summary - Keep your Eye on the Prize!

2011-05-05 Thread Douglas Otis
On 5/5/11 1:34 PM, Michael Thomas wrote: > On 05/04/2011 08:34 PM, Murray S. Kucherawy wrote: >> Technical: The AUID is an unvetted value. The local-part and the subdomain >> could be garbage. It's inappropriate for a security protocol to return a >> possibly false value in the context of sayin

Re: [ietf-dkim] Protocol layering / Software vs. Protocol

2011-05-05 Thread Douglas Otis
On 5/5/11 1:24 PM, Barry Leiba wrote: > Dave says... >> In terms of working group process, one line of criticism demands >> re-opening >> (and, apparently, reversing) the work of the Update (RFC 5672). I >> haven't seen >> any working group consensus to do this nor any industry feedback >> indi

Re: [ietf-dkim] issue: Section 2.6/ 3.5 AUID/i= should have pubkey t=s info

2011-05-05 Thread Dave CROCKER
On 5/5/2011 1:37 PM, Barry Leiba wrote: >> Possible small change in 3.5 i= definition, 2nd paragraph change: >> >>The syntax is a standard email address where the Local-part MAY be >>omitted. The domain part of the address MUST be the same as, or a >>subdomain of, the val

Re: [ietf-dkim] 23 again (sorry John) was Output summary - proposing ODID "Originating Domain Identity"

2011-05-05 Thread Barry Leiba
>>> If this is the sort of advice we are going to give then we should just >>> deprecate "l=". >> >> +1: it was an error in the PS and the DS fixes it. >> >> Alternatively we can allow it, warn, and expect implementers to code >> heuristics that can discern attacks from regular footers. > > Speakin

Re: [ietf-dkim] Question: ADSP DKIM=UNKNOWN and A-R reporting

2011-05-05 Thread Barry Leiba
>> That's not what RFC5617 says. > >    Meaning:  No valid Author Domain Signature was found on the message >              and the published ADSP was "unknown". > > Can't that be read as meaning a non-Author Domain Signature was not > expected. No, not at all. I can't think of any interpretation

Re: [ietf-dkim] issue: Section 2.6/ 3.5 AUID/i= should have pubkey t=s info

2011-05-05 Thread Barry Leiba
> I think the definition of i= should include information about the > public key t=s tag.  This t=s information that will deviate the "i=" > definition is not found until 3.6.1 and 3.10.  The same can apply to > section 2.6 Agent or User Identifier (AUID) which makes no mention of > t=s or any refe

Re: [ietf-dkim] Output summary - Keep your Eye on the Prize!

2011-05-05 Thread Michael Thomas
On 05/04/2011 08:34 PM, Murray S. Kucherawy wrote: > Technical: The AUID is an unvetted value. The local-part and the subdomain > could be garbage. It's inappropriate for a security protocol to return a > possibly false value in the context of saying something was cryptographically > validated

Re: [ietf-dkim] Protocol layering / Software vs. Protocol

2011-05-05 Thread Barry Leiba
Dave says... > In terms of working group process, one line of criticism demands re-opening > (and, apparently, reversing) the work of the Update (RFC 5672).  I haven't > seen > any working group consensus to do this nor any industry feedback indicating > this > is necessary.  Consequently, attemp

Re: [ietf-dkim] Output requirements

2011-05-05 Thread Barry Leiba
>> +   Verifiers SHOULD ignore those signatures that produce a PERMFAIL >> +   result (see Section 7.1), acting as though they were not present in >> +   the message.  ... > > s/Verifiers SHOULD ignore/Identity assessors SHOULD ignore/ > > (and probably in other places too). Veriffiers are explicit

Re: [ietf-dkim] "Output" considered harmful

2011-05-05 Thread Barry Leiba
Mike Thomas says... > 4871 had it right on this account. Everything since then has > screwed the pooch. Put it back. Mike, I have a lot of catching up to do, having been travelling for a bit. Some of that catching up involves dealing with complaints (plural) about what you say on this list. Whil

Re: [ietf-dkim] Issue: Section 3.9 - Add AUID and ODID

2011-05-05 Thread Hector Santos
Rolf E. Sonneveld wrote: > On 5/5/11 1:52 AM, Hector Santos wrote: >> >> 3.x Originating Domain Identity (ODID) >> >> The ODID is the domain part of the From: address. This identity >> MAY be considered as an output communicated to an advanced >> Identity Assessor module. >> >>

Re: [ietf-dkim] Issue: Section 3.9 - Add AUID and ODID

2011-05-05 Thread Hector Santos
Rolf E. Sonneveld wrote: >> >> 3.x Originating Domain Identity (ODID) >> >> The ODID is the domain part of the From: address. This identity >> MAY be considered as an output communicated to an advanced >> Identity Assessor module. >> >> INFORMATIVE IMPLEMENTATION NOTE: >> >

Re: [ietf-dkim] Output summary - Keep your Eye on the Prize!

2011-05-05 Thread Hector Santos
Murray, your technical *subjective* reasoning is not convincing. First, as for procedural issues, I have come to understand for bis work, how Hansen, Klensin and SM describes it. You do not seem to reflect the same advice and quite often in contradiction. In regards to AUID, the only technical *n

Re: [ietf-dkim] Issue: Section 3.9 - Add AUID and ODID

2011-05-05 Thread Hector Santos
Rolf E. Sonneveld wrote: >> >> 3.x Originating Domain Identity (ODID) >> >> The ODID is the domain part of the From: address. This identity >> MAY be considered as an output communicated to an advanced >> Identity Assessor module. >> >> INFORMATIVE IMPLEMENTATION NOTE: >> >

Re: [ietf-dkim] Output summary - Keep your Eye on the Prize!

2011-05-05 Thread Hector Santos
Murray, your technical *subjective* reasoning is not convincing. First, as for procedural issues, I have come to understand for bis work, how Hansen, Klensin and SM describes it. You do not seem to reflect the same advice and quite often in contradiction. In regards to AUID, the only technical

Re: [ietf-dkim] 23 again (sorry John) was Output summary - proposing ODID "Originating Domain Identity"

2011-05-05 Thread John R. Levine
> Alternatively we can allow it, warn, and expect implementers to code > heuristics that can discern attacks from regular footers. Speaking as an implementer, I ignore l=, because the hassle of working around it and trying to guess how hostile any added content might be is vastly greater than an

[ietf-dkim] 23 again (sorry John) was Output summary - proposing ODID "Originating Domain Identity"

2011-05-05 Thread Alessandro Vesely
On 04.05.2011 21:13, MH Michael Hammer (5304) wrote: >> boun...@mipassoc.org] On Behalf Of Dave CROCKER >> On 5/4/2011 11:34 AM, Murray S. Kucherawy wrote: >>> So the issue is that someone might read it as "leave l= out >>> of what you feed to the hash" versus "hash it, but ignore what it's >>> te

Re: [ietf-dkim] Output summary - proposing ODID "Originating Domain Identity"

2011-05-05 Thread Michael Thomas
On 05/05/2011 03:35 AM, Rolf E. Sonneveld wrote: > Excuse me for my poor English, I shouldn't have used the word 'certify' > here. I'm not talking about validity of content. Were I used the word > 'certify' I mean: > > if a DKIM signature verifies successfully, the consumer can be sure that > the b

Re: [ietf-dkim] Protocol layering / Software vs. Protocol

2011-05-05 Thread Douglas Otis
On 5/4/11 10:01 AM, Dave CROCKER wrote: > Folks, > \ > In terms of working group process, one line of criticism demands re-opening > (and, apparently, reversing) the work of the Update (RFC 5672). I haven't > seen > any working group consensus to do this nor any industry feedback indicating > th

Re: [ietf-dkim] Output summary - proposing ODID "Originating Domain Identity"

2011-05-05 Thread Rolf E. Sonneveld
On 5/5/11 1:36 AM, Michael Thomas wrote: > On 05/04/2011 03:55 PM, Rolf E. Sonneveld wrote: >> >> Well, I think you both are right in reading what my concern/objection >> against 4871bis is. And maybe you're also right in that RFC4871 >> wasn't that much different of RFC4871bis. >> >> I think in

Re: [ietf-dkim] Output summary - proposing ODID "Originating Domain Identity"

2011-05-05 Thread Rolf E. Sonneveld
On 5/5/11 1:07 AM, Murray S. Kucherawy wrote: >> I think in the early days of DKIM most people assumed DKIM would become a >> protocol where: >> * the body hash and header hash, using various header fields, certifies the >> DKIM signature and >> * the DKIM signature certifies the body and header

Re: [ietf-dkim] Issue: Section 3.9 - Add AUID and ODID

2011-05-05 Thread Rolf E. Sonneveld
On 5/5/11 1:52 AM, Hector Santos wrote: >>> Murray wrote: >>> You want AUID and RFC5322.From added to the Output Requirements >>> section explicitly. > BTW, while RFC5322.From will satisfy requirements, I am proposing a > new ODID identity (RFC5322.From.domain) since that is whats already > extract