This is an interesting sketch, but it doesn't  include the hard parts, so
it's hard to know if it can provide what is needed.  For example, will the
rolling hash allow for exact boundaries of changes to be determined?
Subjects are pretty short, how does a rolling hash handle that?  I'm not
familiar with rolling hashes, so perhaps my questions are naive.

The mime body canonicalization is odd, what percentage of mail isn't
multipart at this point?  It also requires that mime canonicalization
requires impl of this other spec, which seems more v2ish, though maybe not
in formatting.

I'd say the mime header canonicalization doesn't go far enough.  For
example, most mailing lists that are i18n aware are going to decode rfc2047
subjects before adding a subject prefix, and then reencode, which may not
be in the same charset, especially if the prefix and subject are in
different languages.  Another issue we see is in optional things, such as
quoting in address and parameter headers.  Defining a canonical form for
those headers might be necessary to accomplish what you want.  There's also
smtputf8 downgrades, which would imply taking a utf8 nonencoded subject and
encoding it.  It's also useful if your system uses a non rfc822 format
internally and only gateways to the internet.

I think a proper mime canonicalization would be useful on it's own, we've
talked about it before internally here at Google.

I believe that we discussed something similar to this early on this list,
but the challenge is in the details.

Brandon


On Sep 25, 2017 3:02 AM, "Rick van Rein" <r...@openfortress.nl> wrote:

> Hello DKIM/DMARC list,
>
> I would like to propose a method for "fixing" the real-world problems
> that currently break DKIM.  I am aware of the work on ARC, but in
> comparison this appriach:
>
>  1. is much simpler, with a simple cryptographic foundation
>  2. works without explicit support from message-modifying intermediates
>  3. locates message parts that have changed [within practical bounds]
>  4. allows training on acceptable changes for given senders/intermediates
>  5. pins down rogue senders/intermediates more accurately
>
> The idea isn't completely worked out yet, but the approach should be
> crystal clear from the current text.  I believe that this leads to
> better email user experiences than possible with ARC.
>
> I am looking forward to your responses.  Please keep me in Cc: if possible?
>
>
> Best wishes,
>
> Rick van Rein
> ARPA2.net / InternetWide.org
> > *From:* internet-dra...@ietf.org
> > *Date:* 25 September 2017 at 11:49
> > *To:* "Rick van Rein" <r...@openfortress.nl>
> > *Subject:* New Version Notification for draft-vanrein-dkim-lenient-00.
> txt
> > A new version of I-D, draft-vanrein-dkim-lenient-00.txt
> > has been successfully submitted by Rick van Rein and posted to the
> > IETF repository.
> >
> > Name:         draft-vanrein-dkim-lenient
> > Revision:     00
> > Title:                Lenient DKIM
> > Document date:        2017-09-25
> > Group:                Individual Submission
> > Pages:                7
> > URL:            https://www.ietf.org/internet-drafts/draft-vanrein-dkim-
> lenient-00.txt
> > Status:         https://datatracker.ietf.org/doc/draft-vanrein-dkim-
> lenient/
> > Htmlized:       https://tools.ietf.org/html/
> draft-vanrein-dkim-lenient-00
> > Htmlized:       https://datatracker.ietf.org/
> doc/html/draft-vanrein-dkim-lenient-00
> >
> >
> > Abstract:
> >    DKIM is a framework for signed messages, especially for email.  While
> >    in transit, changes are sometimes made, and these break the DKIM-
> >    Signature.  This specification makes DKIM more lenient, without
> >    changes to its core.  It adds leniency towards MIME body rewrites,
> >    removal of alternatives and annotation with bits of text.  The
> >    intention is to allow these changes such that they can be clearly
> >    shown to the user, while indicating that the remainder of the
> >    signedmessage is still in tact.
> >
> >
> >
> >
> > Please note that it may take a couple of minutes from the time of
> submission
> > until the htmlized version and diff are available at tools.ietf.org.
> >
> > The IETF Secretariat
> >
>
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>
_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to