[Ietf-dkim] Re: DKIM works fine

2025-04-14 Thread Murray S. Kucherawy
Participating only:

On Mon, Apr 7, 2025 at 11:11 AM Dave Crocker  wrote:

> but let's be clear on my reasoning for using the name DKIM is "it is
> intended to plug into the same place in the stack as DKIM does; and reuse
> the key infrastructure of DKIM - meaning it will be more understandable to
> MOST people if it's called DKIM2 than if it's called e.g. SEEDS (Signed
> Explicit Email Destination and Source) - and that branding will assist with
> getting people to convert.
>
> Your assertion about understandabability collides with likelihoods of
> cognitive confusion.  Especially since -- as the Motivation document
> demonstrates and a lot of industry discussion demonstrates -- people
> already tend to misunderstand what DKIM does.
>
> As they misunderstand DMARC, with one vendor claiming it eliminates CEO
> spoofing.
>
> By the way, with your logic, UDP and TCP should have similar names, since
> they plug into the same place in the stack.
>
> Or perhaps 'place in the stack' is of import to a very, very narrow
> demographic, whereas the much larger demographic is a lot more likely to
> more attention to basic email functionality than to abstract network
> architecture placement.
>

I'm not following the objection here either with respect to
architectural placement.  As I understand where in the email flow this
would occur, it would be right where DKIM is now, either instead of it or
alongside it.  That's probably where I would implement it given my
understanding so far.  So then, at least, the intent to depict it as being
at that point in the handling chain seems pragmatic to me.

And I don't know what else to call it until we've started to gel on both
implementation and outcome.  Is there a better suggestion?

-MSK
___
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org


[Ietf-dkim] Re: DKIM works fine

2025-04-14 Thread Murray S. Kucherawy
On Wed, Apr 9, 2025 at 8:17 AM Pete Resnick  wrote:

> On 7 Apr 2025, at 13:11, Dave Crocker wrote:
>
> Bron,
>
> On 4/7/2025 10:53 AM, Bron Gondwana wrote:
>
> I buy this argument. You're quite correct, DKIM doesn't have any actual
> problems.  It's perfect. It does exactly what it's specified to do.
>
> DKIM is also insufficient for the purpose for which it's trying to be
> used.  And there's an argument that "the purpose of a system is what it
> does".
>
> My point is that it is fine for what it is trying to do.  It does exactly
> that.  That's sufficiency, not insufficiency.
>
> I suspect you two just talked past each other because of Bron's use of the
> passive in his second paragraph. If I understand correctly, Bron is saying
> that DKIM is insufficient for the purpose for which *certain anti-spam
> mechanisms* are trying to use it. Or maybe for the purpose for which some
> other thing is trying to use DKIM. But either way, that DKIM is sufficient
> for its designed purpose, and insufficient for some other purpose. That
> isn't surprising, but maybe that needs to be clear in one of the documents.
>
+1, I think they're both right.

DKIM has proven to be a font of attractive nuisances.  It would be so much
better "if only we could solve replay", or "if only we could recover author
signatures", or "if only we could control bounce noise", or "if only we
could tie it to the From domain."  These always seem to be eternally
elusive, which is why they keep coming up and the proposed solutions, every
iteration of which often looks remarkably like the one before it, never
seem to go anywhere (or they get forced, with ugly results).

I think DKIM's curse is that it is -- or was, when it first appeared -- so
promising of a development that people expect it, by itself, to deliver
more than it can.  Maybe it got over-hyped, despite careful use of language
like "take some responsibility" or "noise-free channel" or "associate a
domain name", and so when some derivative capability isn't possible, it's
identified as a shortcoming.

Pete wants to drive to Chicago, but his fancy new car can only go as far as
Calumet City.  You can almost see Chicago from there, but you can't
experience it.  Imagine the frustration.

So while I think we should continue to be crisp in how we talk about what
DKIM really does, and not more, I also fully understand where people are
coming from who tend to use language that identifies these absent things as
defects, because it really does feel like they should be there, or at least
be within our grasp.

-MSK
___
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org


[Ietf-dkim] Re: DKIM works fine

2025-04-09 Thread Alessandro Vesely

On Wed 09/Apr/2025 06:15:16 +0200 Dave Crocker wrote:

On 4/8/2025 5:43 AM, Alessandro Vesely wrote:

Although different, DKIM2 shares a huge amount of concepts developed 
alongside DKIM, from the tag=value specification, to underscored domains and 
key distribution, to hashing and signing. The latter, signing, seems to be 
the most widely known feature of DKIM.  "If you see DKIM-Signature: don't 
autoconvert."  It has had a significant impact on the email ecosystem.  It is 
from this point of view that DKIM and DKIM2 are two of a kind.


tag=value is a construct that has been in use since the start of networking.  
An RFC733 header field is, really, tag=value.



Eh, not quite.  DKIM definitions are really cute, and subsequent RFCs build on 
them.  RFC 8617, ARC, for example, doesn't even define the terms *signer* and 
*verifier*.




Crypto hashing was around long before DKIM, too.

But, sure, it is likely the new thing can share some code from the old thing.  
This does not make them semantically related, which the name incorrectly implies.



ARC chose a different name. Then we could argue whether DKIM2 is more like ARC 
than DKIM, but one is the ancestor of the other two, so if protocols have a 
family name, it should be that.



Best
Ale
--





___
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org


[Ietf-dkim] Re: DKIM works fine

2025-04-09 Thread Steffen Nurpmeso
Alessandro Vesely wrote in
 <8e69637f-508c-49e6-9029-5bacdb799...@tana.it>:
 |On Sun 06/Apr/2025 20:56:35 +0200 Dave Crocker wrote:
 |> The goals for the new effort are for a very different set of services.  \
 |> There 
 |> is nothing wrong with wanting those services, but really, they are \
 |> not DKIM.
 |> 
 |> The semantics of the new effort really are orthogonal to DKIM.  (And \
 |> that is 
 |> one of the reaon the technical errors in the Motivation draft demonstrat\
 |> e a 
 |> fundamental misunderstanding, rather than being minor distractions.)
 |> 
 |> One of the reasons a new effort should adopt a different name is \
 |> to help people 
 |> understand that the new effort is for something entirely different \
 |> from what 
 |> DKIM intended to do.
 |
 |AIUI, countering replay is a major semantic difference.  DKIM bears \
 |the concept 
 |of identifying a domain responsible for a message regardless of which hops 
 |forwarded the message.  It overcame SPF in this regard.  However, replay \
 |is a 
 |trouble for freemail providers, as it prevents them from controlling \
 |the spread 
 |of a message.  As it turns out, spread can be controlled by tweaking a few 
 |technical knobs of DKIM.  The result, of course, is something different.
 |
 |Although different, DKIM2 shares a huge amount of concepts developed \
 |alongside 
 |DKIM, from the tag=value specification, to underscored domains and key 
 |distribution, to hashing and signing.  The latter, signing, seems to \
 |be the 
 |most widely known feature of DKIM.  "If you see DKIM-Signature: don't 
 |autoconvert."  It has had a significant impact on the email ecosystem. \
 | It is 
 |from this point of view that DKIM and DKIM2 are two of a kind.

It is bizarre that it is considered to throw away a functional
protocol that is installed and in use in very large number of
installations with likely grown and proven and often not simple
configurations for no other purpose but to serve big egos.

I do not personally concur with neither Dave Crocker nor you in
that i do not see a difference.  It is only that the DomainKey's
coverage is extended to protect the SMTP envelope:

  DomainKeys Identified Mail (DKIM) permits a person, role, or
  organization that owns the signing domain to claim some
  responsibility for a message by associating the domain with the
  message

Where do you see a semantic difference when the envelope is
protected additionally?  (My proposal: temporarily, on mutual
agreement, in the direct sender->receiver line where the envelope
is anyway visible?)  I even sound suggestive and manipulative.

That differences, protected by signatures, come in, i welcome very
much, as it will allow cryptographically verifying all
modifications a message has seen, up to the original version.
And that means that all DKIM signatures along the path can be
verified -- this is, actually, isn't it?, for the first time, the
very realization of the RFC 6376 DKIM manifest, as above:
responsibility can be proven, along the path!
That is a semantic difference, but in the spirit of DKIM, desired!

That certain headers will always be covered, and that certain
constructs are no longer valid (in my proposal that only iterates
DKIM): that has proven necessary or desirable.  It in parts should
have been cast in standard words many years before even!

That in addition the additional header fields used by both
proposals are linked with sequence numbers, ie, that the "header
stack" is let's say "bypassed", well, it is so la-la.  I mean, it
remains a stack for the "normal" header fields included in the
signature itself.
Here there is a semantic difference to RFC 6376, namely "6.1.
Extract Signatures from the Message".  The existing DKIM says:

  Verifiers MAY try signatures in any order they like.  For
  example, one implementation might try the signatures in textual
  order, whereas another might try signatures by identities that
  match the contents of the From header field before trying other
  signatures.  Verifiers MUST NOT attribute ultimate meaning to
  the order of multiple DKIM-Signature header fields.

And that has to change, especially the

  another might try signatures by identities that match the
  contents of the From header field before trying other signatures

paradigm is where i disagree with Dave Crocker, when he says "it
is not DKIM that is at fault, it is DMARC".
The iterated DKIM will have most hops (as far as reality really
sees this in plural) only check the newest, the one with the
highest sequence number.  If that succeeds we are with 6376 again:
a ~"single successful validation allows verification to succeed".
(You know all that, of course.  Just saying.)

 |Best
 |Ale
 |-- 

Greetings, and
Ciao,

--steffen
|
|Der Kragenbaer,The moon bear,
|der holt sich munter   he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)

___
Ietf-dkim 

[Ietf-dkim] Re: DKIM works fine

2025-04-09 Thread Pete Resnick

On 7 Apr 2025, at 13:11, Dave Crocker wrote:


Bron,

On 4/7/2025 10:53 AM, Bron Gondwana wrote:
I buy this argument. You're quite correct, DKIM doesn't have any 
actual problems.  It's perfect. It does exactly what it's specified 
to do.


DKIM is also insufficient for the purpose for which it's trying to be 
used.  And there's an argument that "the purpose of a system is what 
it does".


My point is that it is fine for what it is trying to do.  It does 
exactly that.  That's sufficiency, not insufficiency.


I suspect you two just talked past each other because of Bron's use of 
the passive in his second paragraph. If I understand correctly, Bron is 
saying that DKIM is insufficient for the purpose for which *certain 
anti-spam mechanisms* are trying to use it. Or maybe for the purpose for 
which some other thing is trying to use DKIM. But either way, that DKIM 
is sufficient for its designed purpose, and insufficient for some other 
purpose. That isn't surprising, but maybe that needs to be clear in one 
of the documents.


pr
--
Pete Resnick https://www.episteme.net/
All connections to the world are tenuous at best
___
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org


[Ietf-dkim] Re: DKIM works fine

2025-04-08 Thread Dave Crocker

On 4/8/2025 5:43 AM, Alessandro Vesely wrote:

On Sun 06/Apr/2025 20:56:35 +0200 Dave Crocker wrote:

...
The semantics of the new effort really are orthogonal to DKIM. (And 
that is one of the reaon the technical errors in the Motivation draft 
demonstrate a fundamental misunderstanding, rather than being minor 
distractions.)

...
AIUI, countering replay is a major semantic difference.  DKIM bears 
the concept of identifying a domain responsible for a message 
regardless of which hops forwarded the message.  It overcame SPF in 
this regard.  However, replay is a trouble for freemail providers, as 
it prevents them from controlling the spread of a message.  As it 
turns out, spread can be controlled by tweaking a few technical knobs 
of DKIM.  The result, of course, is something different.


No it cannot.  It cannot control distribution.

What it CAN control is use of the DKIM domain name for reputation 
analysis.  And this is a very large difference, especially given the 
human factors of phishing.


Also, addition of this additional control does not require modifying 
DKIM itself.



Although different, DKIM2 shares a huge amount of concepts developed 
alongside DKIM, from the tag=value specification, to underscored 
domains and key distribution, to hashing and signing. The latter, 
signing, seems to be the most widely known feature of DKIM.  "If you 
see DKIM-Signature: don't autoconvert."  It has had a significant 
impact on the email ecosystem.  It is from this point of view that 
DKIM and DKIM2 are two of a kind.


tag=value is a construct that has been in use since the start of 
networking.  An RFC733 header field is, really, tag=value.


Crypto hashing was around long before DKIM, too.

But, sure, it is likely the new thing can share some code from the old 
thing.  This does not make them semantically related, which the name 
incorrectly implies.



d/

--
Dave Crocker

Brandenburg InternetWorking
bbiw.net
bluesky: @dcrocker.bsky.social
mast: @dcrocker@mastodon.social

___
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org


[Ietf-dkim] Re: DKIM works fine

2025-04-08 Thread Alessandro Vesely

On Sun 06/Apr/2025 20:56:35 +0200 Dave Crocker wrote:
The goals for the new effort are for a very different set of services.  There 
is nothing wrong with wanting those services, but really, they are not DKIM.


The semantics of the new effort really are orthogonal to DKIM.  (And that is 
one of the reaon the technical errors in the Motivation draft demonstrate a 
fundamental misunderstanding, rather than being minor distractions.)


One of the reasons a new effort should adopt a different name is to help people 
understand that the new effort is for something entirely different from what 
DKIM intended to do.



AIUI, countering replay is a major semantic difference.  DKIM bears the concept 
of identifying a domain responsible for a message regardless of which hops 
forwarded the message.  It overcame SPF in this regard.  However, replay is a 
trouble for freemail providers, as it prevents them from controlling the spread 
of a message.  As it turns out, spread can be controlled by tweaking a few 
technical knobs of DKIM.  The result, of course, is something different.


Although different, DKIM2 shares a huge amount of concepts developed alongside 
DKIM, from the tag=value specification, to underscored domains and key 
distribution, to hashing and signing.  The latter, signing, seems to be the 
most widely known feature of DKIM.  "If you see DKIM-Signature: don't 
autoconvert."  It has had a significant impact on the email ecosystem.  It is 
from this point of view that DKIM and DKIM2 are two of a kind.



Best
Ale
--





___
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org


[Ietf-dkim] Re: DKIM works fine

2025-04-07 Thread Dave Crocker

Bron,

On 4/7/2025 10:53 AM, Bron Gondwana wrote:
I buy this argument. You're quite correct, DKIM doesn't have any 
actual problems.  It's perfect. It does exactly what it's specified to do.


DKIM is also insufficient for the purpose for which it's trying to be 
used.  And there's an argument that "the purpose of a system is what 
it does".


My point is that it is fine for what it is trying to do.  It does 
exactly that.  That's sufficiency, not insufficiency.


Since you feel otherwise, perhaps you can explain in technical terms?  
This seems not a small point in understanding the new work, in relation 
to the old.


What it is not so fine for is evaluating DKIM in terms of things it was 
not intended to do.  Some of which are things the Motivation draft 
claims it does, but doesn't.




The purpose for which DKIM is trying to be used includes the kind of 
reputation and "quality of email coming from X domain" tracking that 
pretty much every medium-to-large email operator is doing - and it 
insufficient for that purpose.


Again, please explain in technical detail.  Just trading conclusions 
isn't helpful to group discussion and understanding.






On that basis...


I'm perfectly happy to call it something completely different - I'm to 
a large interest more interested in the tech than the branding...


ahh, name confusion doesn´t matter much.  right.



but let's be clear on my reasoning for using the name DKIM is "it is 
intended to plug into the same place in the stack as DKIM does; and 
reuse the key infrastructure of DKIM - meaning it will be more 
understandable to MOST people if it's called DKIM2 than if it's called 
e.g. SEEDS (Signed Explicit Email Destination and Source) - and that 
branding will assist with getting people to convert.


Your assertion about understandabability collides with likelihoods of 
cognitive confusion.  Especially since -- as the Motivation document 
demonstrates and a lot of industry discussion demonstrates -- people 
already tend to misunderstand what DKIM does.


As they misunderstand DMARC, with one vendor claiming it eliminates CEO 
spoofing.


By the way, with your logic, UDP and TCP should have similar names, 
since they plug into the same place in the stack.


Or perhaps 'place in the stack' is of import to a very, very narrow 
demographic, whereas the much larger demographic is a lot more likely to 
more attention to basic email functionality than to abstract network 
architecture placement.


d/

--
Dave Crocker

Brandenburg InternetWorking
bbiw.net
bluesky: @dcrocker.bsky.social
mast: @dcrocker@mastodon.social
___
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org


[Ietf-dkim] Re: DKIM works fine

2025-04-07 Thread Bron Gondwana
I buy this argument. You're quite correct, DKIM doesn't have any actual 
problems.  It's perfect.  It does exactly what it's specified to do.

DKIM is also insufficient for the purpose for which it's trying to be used.  
And there's an argument that "the purpose of a system is what it does".

The purpose for which DKIM is trying to be used includes the kind of reputation 
and "quality of email coming from X domain" tracking that pretty much every 
medium-to-large email operator is doing - and it insufficient for that purpose.

On that basis...

On Sun, Apr 6, 2025, at 14:56, Dave Crocker wrote:
> Stray, Sunday night thought for the working group to consider:
> 
>> DKIM does not have any actual problems.  Even DKIM Replay is not a DKIM 
>> problem.
>> 
> Consider:
> 
>> DKIM was designed to associate a domain name to a message, with the intent 
>> that no message will have that association without the 'approval' of the 
>> domain owner.  The purpose is to create a noise-free channel, for reputation 
>> analysis of mail having that association.
>> 
>> And indeed, that´s what DKIM does. 
>> 
>> Although Replay is a problem, it is not a DKIM problem, because the replayed 
>> messages really were associated with the domain name through regular DKIM 
>> authorization.  (My noting that the Replay problem is an externalization of 
>> limitations to control and accountability of a platform's users is not meant 
>> as criticism, but to focus on the reality that, again, DKIM was never 
>> intended to deal with problems within the scope of control of the domain 
>> owner.)
>> 
> The goals for the new effort are for a very different set of services.  There 
> is nothing wrong with wanting those services, but really, they are not DKIM.  
> 
> The semantics of the new effort really are orthogonal to DKIM.  (And that is 
> one of the reaon the technical errors in the Motivation draft demonstrate a 
> fundamental misunderstanding, rather than being minor distractions.)
> 
> One of the reasons a new effort should adopt a different name is to help 
> people understand that the new effort is for something entirely different 
> from what DKIM intended to do.
> 

I'm perfectly happy to call it something completely different - I'm to a large 
interest more interested in the tech than the branding... but let's be clear on 
my reasoning for using the name DKIM is "it is intended to plug into the same 
place in the stack as DKIM does; and reuse the key infrastructure of DKIM - 
meaning it will be more understandable to MOST people if it's called DKIM2 than 
if it's called e.g. SEEDS (Signed Explicit Email Destination and Source) - and 
that branding will assist with getting people to convert.

Bron.

--
  Bron Gondwana, CEO, Fastmail Pty Ltd
  br...@fastmailteam.com

___
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org


[Ietf-dkim] Re: DKIM works fine

2025-04-07 Thread Steven M Jones
> On Apr 6, 2025, at 11:57 AM, Dave Crocker  wrote:
> The goals for the new effort are for a very different set of services.  There 
> is nothing wrong with wanting those services, but really, they are not DKIM.  
> 
> The semantics of the new effort really are orthogonal to DKIM.  (And that is 
> one of the reaon the technical errors in the Motivation draft demonstrate a 
> fundamental misunderstanding, rather than being minor distractions.)
> 
> One of the reasons a new effort should adopt a different name is to help 
> people understand that the new effort is for something entirely different 
> from what DKIM intended to do.
> 

+1or humming, or whatever the current protocol for expressing agreement is.___
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org