On 5/5/15 1:24 PM, John R Levine wrote:
>> John’s proposal changes DKIM but also requires additional
>> changes in DMARC to respect the changes that were made to
>> DKIM when doing alignment (the @fs=domain is more or less
>> the same as the Original-To below). ...
>
> It's not supposed to.  The decision about whether a DKIM
> signature that depends on a chained signature is valid is
> supposed to happen entirely within the updated DKIM
> module.  DMARC just uses that result.  I assume the DKIM
> module is able to look at all of the DKIM signatures on a
> message and report back which ones are valid.
Dear John,

Your version of DKIM delegation is cleaner but there is
something that could be even cleaner.  For example,
TPA-Label could be made simpler by requiring a DKIMv2 like
element to indicate which header fields in a delegated
signature added by the third-party signature are not to
change.  Conversely, TPA-Label could reference a compressed
selection of headers that represent a predefined element
indicating which header fields are not to change between the
first and third-party signatures and eliminate even the need
for a DKIMv2 signature.  This could offer a similar expiry
scheme in the same manner, but I doubt such would be needed.
The first party DKIM signature could even include a hash
representing the content of the requisite headers, if that
seems important.

No special DKIM signature. No complex TPA registration which
upset Hector among others. This would have less overhead
without any mandated sequence or special DKIM signatures.

DMARC domain would need to track which third-party services
are being used.  They could simply amend the list as needed
and delay sending to any new domains until registered. This
effort could be delegated to a different entity able to
process outgoing logs and DMARC feedback.  Once in place,
DMARC induced disruption should evaporate while allowing
safe use of Sender header fields to retain SMTP compatibility.

We have seen too many botnets using various polymorphic
schemes able to leverage any window of time to amplify any
malicious message that might be allowed within any expiry. 
Expiry does not seem to offer much protection.

Regards,
Douglas Otis


_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to