Hector Santos writes:

 >     http://tools.ietf.org/html/draft-santos-dkim-dsap-00#section-4.2

Thank you for the URL.

In the following, I do not mean to discuss the concrete proposal as if
it were WG business (I don't believe it is).  I'm trying to understand
what model of Internet mail system behavior is presumed, which I
believe is WG business, as it is essential to framing BCPs and new
protocols to improve security.

 >     o  Original Party Signatures (OP)
 > 
 >        *  never expected
 >        *  always expected
 >        *  optional

I don't understand the differentation between 'optional' and 'never'
here in terms of real mail system behavior.  What would the
interpretation of a valid DKIM signature satisfying identity
alignment?  That's not a question about the spec (I can and will read
the spec).  The point is that in practice lots of admins do not read
the spec, and even those who do often provide some heuristic
interpretation rather than follow it precisely.  I doubt the answers
would be consistent with each other or with the spec.

That sounds like trouble to me.  We should prefer conceptualizations
that are crisp and intuitive to non-IETF-ers.

 >     o  3rd Party Signatures (3P)
 > 
 >        *  never expected
 >        *  always expected
 >        *  optional

Again, I don't understand the semantics of "expected" here, and
they're quite different from the semantics of the same values for OP.
Some 3rd parties will sign, others won't.  What key do they sign with?
Some will be authorized 3PS, some won't.  etc. etc.  I don't see how
this three-valued parameter can possibly be a good fit for most
"naive" admins' mental models, or for what they want the system to do.

 >     Subscription Controls

As I explain in more detail elsewhere, no policy framework I've seen
can justify subscription controls.

Overall, I get the impression that your mental model of email is
framed almost entirely by the corporate transactional mail use case,
where the employer can and does forbid "personal" and "indirect" use
of mailboxes in the corporate domain.  That's an important use case,
but your proposals leave little room for reliable and convenient
service to other use cases.  Rather, they arrogate all policy
decisions to Domain Owners, which will surely be a bottleneck for
small organizations running mailing lists and new entrants wishing to
develop new 3rd party email services.  Such services will want to
mitigate (ie, non-conforming behavior to avoid validation failure).

You threaten non-conforming services with

 > thats the purpose of this *security* concept.  Breaking it and
 > assuming the original domains will allow this to occur unchallenged
 > is not a good idea, playing with fire.

but in practice it seems to me that the restrictions and inconvenience
involved in conforming to your proposals is already everything those
"original domains" can use to threaten mailing lists, and quite
restrictive (at least) for other 3rd party services!

In any case, Google and several MTA vendors were already providing
relaxed implementations combining DMARC policy information with other
metadata and content analysis in making acceptance decisions.  Yahoo! 
and AOL quite obviously *want* the "security broken" (they thank us
for doing exactly what you describe as "playing with fire").  Aren't
they "original domains"?  If they are, the "original domains" are
going to have to sort things out among themselves to get a coherent
protocol.  If they aren't, aren't *they* the problem, not the 3rd
party services who are only doing what their clients and their
clients' domain owners want done?

That is, shouldn't you advocates of full OP control figure out how to
arrange that your protocol doesn't get hijacked by domains that permit
unregulated use of 3rd party services by mailbox users?

Steve

_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to