> On 24 Mar 2023, at 16:38, Murray S. Kucherawy <superu...@gmail.com> wrote:
> 
> Informal comments only here.  I know a merger with Dave's draft is in 
> progress, so some of these may not apply by the time you're done.
> 
> Section 1.1:
> 
> It feels a little presumptuous to assume any DKIM receiver has also built out 
> a reputation system, or has access to one.  I guess it might depend on what 
> you consider a reputation system though; are there DNSxLs for DKIM domains 
> that are open to the public?  I don't think SpamAssassin carries with it a 
> set of domains that should be dropped if they carry valid DKIM signatures.  
> Either way, I think the generalization is peculiar.  At a minimum, say "some 
> systems develop reputations" etc.

Almost all major filtering systems (public, commercial and private) have some 
sort of reputation engine in them and I’m pretty comfortable talking about it. 
However, your point is well taken. I don’t think, too, that the domain is the 
reputation, DKIM is really about identity. So, what if we change the language 
from “reputation” to “Identity” 

Reputation is the idea that a filtering system can make an informed judgment 
about whether a particular email is wanted or unwanted based on the previous 
history of mail with a similar identity. What DKIM (and other authentication 
methods) gives us is a durable and verifiable domain identity to anchor the 
reputation. The DKIM replay attack vector is taking advantage of that identity 
by, essentially, stealing the reputation of a known good domain. 

Maybe we don’t  need to mention reputation at all, even. Can we add something 
like this to section 1.1 in the edited document: 

DKIM authentication allows domains to create a durable identity to attach to 
email. Since its initial proposal it has been widely deployed by systems 
sending and receiving email. Receiving services use the DKIM identity as part 
of their inbound mail handling, and make delivery decisions based on the DKIM 
domain. Email sending services sign customer email with the customer’s own 
domain, but many also sign with their own domain. 

> 
> I think I concur with the suggestion that wa should drop discussion of ARC.  
> This WG, or the DMARC WG, can develop an update to ARC based on the outcome 
> here if the community chooses to do so, but I don't think it should be part 
> of this WG's premise.

Agreed. 

> 
> Section 1.2:
> 
> The opening sentence that emphasizes non-use of RFC 2119, amusingly, forces 
> you to include a reference to RFC 2119.  I suggest instead: "This document is 
> not normative in any way."
> 
> "administratively" should be "administrative functions" or similar.  ("users" 
> and "services" are nouns, so this should be too.)S
> 
> The "List-*" header fields are defined in RFC 4021.
> 
> In "trace and operational headers", "headers" should be "header fields".
> 
> Are we actually defining new Mail Handling Services here, or rather declaring 
> special cases of Originators and Relays?  Do they become Authors again after 
> they've handled/filtered a message?
> 
> Are we sure SPF and DMARC should be in scope for this work?  SPF feels 
> irrelevant, and DMARC feels like a layer violation.  If we want to do so, we 
> could refer the reader to the RFCs defining those protocols just to make them 
> aware of the bits of the ecosystem, but then I would leave them out of the 
> rest of the document.

I don’t think either should be in scope, honestly. They may end up being part 
of the solution space, but the issue here is the DKIM domain. 

> Section 2:
> 
> "headers" should be "header fields"
> 
> "customized by" the ultimate recipient?  or should that be "for"?
> 
> Involvement of SPF here doesn't seem to be needed either.  We only need to 
> tall the DKIM story.
> I think the notion of folders also exceeds DKIM's scope.  That's a handling 
> choice post-DKIM.  It's enough to highlight that a false positive is procured 
> by the attacker, to the attacker's benefit.

+1

> Section 3:
> 
> Does including SPF in this part of the discussion contribute to the problem 
> statement or muddy it?  This is about DKIM, not about spam handling in 
> general.

I think it muddies it, honestly. 

> Section 3.1's "DKIM" bullet talks about signature survival, while Section 
> 3.2's "DKIM" bullet talks about who does the signing.  This seems dissonant, 
> or at least makes them hard to compare and contrast since they talk about 
> different things.

Agreed. 

> Section 4:
> 
> Caching known signatures, a con: adds a potentially expensive database 
> component to the receiving service, and will require tinkering to figure out 
> what cache duration is appropriate to catch replays while not also catching 
> legitimate mail.
> 
> The "sign for the next hop" proposal could use a language tweak of some kind. 
>  I can't quite put my finger on it.  If it's "sign for the next hop" at a 
> host level, I have to know that host; today, I just sign and toss it in the 
> queue, and my MTA figures out which MX is going to take it, but if I have to 
> know which MX that is, I can't sign until connection time; milter-based 
> filters at least don't work that way because the integration point doesn't 
> allow it.  If it's actually "sign for the next ADMD", that problem goes away, 
> but the definition of "ADMD" gets a bit muddy because now you have to include 
> in that definition any MX that might be providing transparent 
> store-and-forward.

Need to think a little more about this. 

> Section 5 you won't need.
> 
> Section 6 can simply say there are no security considerations for a problem 
> statement document, though you anticipate some interesting ones in documents 
> to follow.  :-)
> 
> Lastly, you can drop the "yet" from Section 7.  :-)

Thanks.
laura 

> 
> -MSK
> _______________________________________________
> Ietf-dkim mailing list
> Ietf-dkim@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf-dkim

-- 
The Delivery Experts

Laura Atkins
Word to the Wise
la...@wordtothewise.com         

Email Delivery Blog: http://wordtothewise.com/blog      






_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to