Hello,

The last issue is how to resolve Russ's DISCUSS [1].  The options are:

 (1)  Drop the text.

Dave mentioned that it is classic to a avoid problematic Discuss through an easy expedient. In general, that's what done, but not in this case. The argument from Russ was:

 "This text is a warning that there are dragons here, but it does not
  tell the reader anything about the real consequences."

Now, if there was working group consensus on new text in a Full Standard and a reader points out the above, I'll pause and think carefully. Please note that I am not arguing for you to review your position about dropping the text. Some day someone will read this message and find it useful or view it as rubbish.

 (2) Provide replacement text.

     (i)    Dave Crocker provided the following replacement text:

        "Message modification can affect the validity of an existing message
         signature, such as by DKIM [DKIM], PGP [RFC4880], S/MIME [RFC5751]
         and can render the  signature invalid.  This, in turn, can affect
         message handling by later receivers, such as filtering engines that
         consider the presence or absence of a valid signature."

     (ii)  John Klensin suggested the following replacement text:

     "Implementers of MSAs and those who submit messages to
        them should be aware that MUAs (or other submission
        system components) may apply digital signatures or other
        types of message integrity checks (MICs) to messages and
        that, in the most general case, the MSA may not be able
        to detect the fact that MIC arrangements have been used
        by inspection of the message.   Some of the
        transformations permitted by this specification will
        invalidate such MICs.  Although the risk is less
        if MICs protect only internal body parts (i.e., that the
        main header fields are not signed) that restriction does
        not completely eliminate  the risk.   Consequently,
        operators of message originating systems that apply such
        signatures should ensure that the relevant MSAs are
        aware that signatures may be present (or external MICs
        used) and that they are properly configured to avoid
        making changes, remove signatures, or accept that
        signatures may become invalid as appropriate."

If anyone else want to suggest replacement text, please do so.

  (iii) I'll lower-case the text Ned Freed first commented on:

    "If an incoming message includes a DKIM [DKIM], PGP [RFC4880],
     S/MIME [RFC5751], or other signature, sites should consider what
     effect message modifications will have on the validity of the
     signature, and may use the presence or absence of a signature as
     a criterion when deciding what, if any, modifications to make.

I'll attempt to summarize the comments that were posted. Exceptionally, I'll comment on them. As usual, if I misinterpreted what you said, please correct me.

Dave thinks that Russ' opinion is wrong [2].

Comment: I could not use that to argue against the DISCUSS as it would not be viewed as a substantive comment.

Ned mentioned that [3]:

  "This text seems entirely appropriate to me, although I think the use of
   compliance language in it is wrong since (a) considering something isn't
   really a concrete, actionable thing and (b) this is newly added text and
   we should not be adding compliance language during a move to full standard.
   (The MAY is fine as far as I'm concerned, but then again the difference
   between upper and lower case MAY mostly escapes me.)"

Comment: He also provided several other arguments. I considered them as substantive enough and used them to respond to the DISCUSS.

John Levine mentioned that "I suppose we could add some examples, but as others have noted, there's a lot of different possibilities, and we don't know what they are." [4]

Comment: It was not substantive enough to be used as an argument.

Alexey Melnikov mentioned [5] that removing the text will be a disservice to the community.

Comment: I would not use that to convince the AD.

Barry Leiba mentioned "telling Russ that the WG is strongly in favour of having this in
there"[6].  He also commented that:

  "This is a common case, where something needs to progress on the
   standards track, but something else has come along in the interim that
   (1) does not change the existing protocol that's progressing, but
   (2) implementors of the existing protocol now need to be aware of."

And that it is "critical that anyone looking at the new Message Submission spec be aware of its effect on signatures".

Comment: I would have used those arguments if there was a next round of discussions. I did not pick it as the (first) arguments I found seemed convincing enough to clear the DISCUSS. BTW, I was wary of saying the WG is strongly in favour of keeping the text as the argument as it would lead to a fight. As the working group is in shutdown mode, it was not clear to me that the WG had the energy to put up a fight.

Jeff Macdonald sent a "+1" [7] to support Barry's argument.

Comment: It gave a sense about whether the WG would like to keep some text in. I would also like to have substantive comments. I consider the message as helpful.

Murray Kucherawy concurred [8] with Dave on telling Russ that the WG is strongly in favour.

Comment: The previous comment apply here.

I received Frank Ellermann's message [9] a few minutes after I sent my reply to Russ.

Frank commented on removing the note:

  "One potential conflict is an MSA following "MAY add Sender", and a
   DKIM signature explicitly confirming the absence of a Sender header
   field.  Several things are odd in this scenario, but it is clearly
   not the wish to add a Sender.  In other words, 4409bis is not a
   good place to discuss this oddity, and it would be very wrong if
   an MSA stops to add a Sender only because it breaks a "no Sender"
   signature."

Comment: As far as I recall, this was not mentioned during WG discussions.

The argument is based on a "potential conflict". Any replacement text will not be a requirement. As other WG participants have pointed out, the replacement text is advice.

Section 8 describes a number of modifications that are often considered useful. I'll highlight a point in the note:

  "As a matter of guidance for local decisions to implement
   message modification, a paramount rule is to limit such actions to
   remedies for specific problems that have clear solutions."

The point about the "good place to discuss this oddity" reminds me of a discussion in the DKIM WG. My position is that if there is WG agreement on discussing the problem, it is a good enough reason to do it even if it is the wrong place to do it. I'll borrow some words from Alexey: I don't believe in "disservice to the community". If you ask me whether it is appropriate to fix that in a Full Standard, I'll point out that rough consensus can be an overriding factor.

Ned pointed out that S/MIME was dropped [10].

Comment: The replacement text I sent out would need a fix. I don't think that the AD would object to that.

John Klensin pointed out that [11]:

  "But I think that, in the quest of apparent precision, we are
   being a little unrealistic.  There are digital signature systems
   around and in use that do not conform to the IETF-standardized
   versions of DKIM, PGP, and S/MIME.  There are still environments
   in which message content is secured by computing a message
   integrity check values and then sending that value over a
   separate channel, independent of the message itself.  In the
   general case -- the three IETF-standard protocols excluded-- we
   can't even have a general expectation that the Submission server
   will be able to recognize the presence of a signature mechanism
   because that mechanism may be supported through
   undocumented/non-standard message header fields or
   undocumented/non-standard envelope fields. In the case of
   out-of-band transmission of a MIC, there may be no hint at all
   in the envelope or message that a check is being done.

   We can sensibly advise (and probably should, given the concerns
   Russ identified about invalid signatures versus no signatures)
   that part of that Sender (or MUA) communication with the submission
   server include agreements about whether the Submission server should
   remove possibly-affected signatures, ignore the problem, re-sign the
   message with its own keys and mechanisms (or incrementally if
   that is feasible), or even return the message to the submitter
   with an explanation of the problem."

  "we are spending a lot of time on this for a very small
   incremental gain over either saying nothing or saying
   "Submission servers should be really, really, careful
   that their well-intentioned changes to messages don't
   screw things up"

Ned mentioned that "it's important to at least point it out so that there's some
chance people will at least be aware of the issue" [12].

Comment: It gives a sense about whether the WG would like to keep some text in.

Chris Newman believes "the alternative text that was proposed is fine, but I would also be fine with the current text and also with dropping the offending paragraph if necessary to advance the specification" [13].

John Klensin mentioned [14] that "If a primary goal is to mention (advertise?) DKIM, then it it probably better to use Dave's text (despite my concerns and Ned's) and be done with it".

Could the working group please provide feedback to help resolve this last issue?

Thank you,
S. Moonesamy
YAM WG co-chair

1. http://www.ietf.org/mail-archive/web/yam/current/msg00753.html
2. http://www.ietf.org/mail-archive/web/yam/current/msg00755.html
3. http://www.ietf.org/mail-archive/web/yam/current/msg00756.html
4. http://www.ietf.org/mail-archive/web/yam/current/msg00760.html
5. http://www.ietf.org/mail-archive/web/yam/current/msg00761.html
6. http://www.ietf.org/mail-archive/web/yam/current/msg00762.html
7. http://www.ietf.org/mail-archive/web/yam/current/msg00763.html
8. http://www.ietf.org/mail-archive/web/yam/current/msg00767.html
9. http://www.ietf.org/mail-archive/web/yam/current/msg00769.html
10. http://www.ietf.org/mail-archive/web/yam/current/msg00781.html
11. http://www.ietf.org/mail-archive/web/yam/current/msg00785.html
12. http://www.ietf.org/mail-archive/web/yam/current/msg00786.html
13. http://www.ietf.org/mail-archive/web/yam/current/msg00787.html
14. http://www.ietf.org/mail-archive/web/yam/current/msg00790.html

_______________________________________________
yam mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/yam

Reply via email to