Bron,

On 4/7/2025 10:53 AM, Bron Gondwana wrote:
I buy this argument. You're quite correct, DKIM doesn't have any actual problems.  It's perfect. It does exactly what it's specified to do.

DKIM is also insufficient for the purpose for which it's trying to be used.  And there's an argument that "the purpose of a system is what it does".

My point is that it is fine for what it is trying to do.  It does exactly that.  That's sufficiency, not insufficiency.

Since you feel otherwise, perhaps you can explain in technical terms?  This seems not a small point in understanding the new work, in relation to the old.

What it is not so fine for is evaluating DKIM in terms of things it was not intended to do.  Some of which are things the Motivation draft claims it does, but doesn't.



The purpose for which DKIM is trying to be used includes the kind of reputation and "quality of email coming from X domain" tracking that pretty much every medium-to-large email operator is doing - and it insufficient for that purpose.

Again, please explain in technical detail.  Just trading conclusions isn't helpful to group discussion and understanding.




On that basis...

....
I'm perfectly happy to call it something completely different - I'm to a large interest more interested in the tech than the branding...

ahh, name confusion doesn´t matter much.  right.



but let's be clear on my reasoning for using the name DKIM is "it is intended to plug into the same place in the stack as DKIM does; and reuse the key infrastructure of DKIM - meaning it will be more understandable to MOST people if it's called DKIM2 than if it's called e.g. SEEDS (Signed Explicit Email Destination and Source) - and that branding will assist with getting people to convert.

Your assertion about understandabability collides with likelihoods of cognitive confusion.  Especially since -- as the Motivation document demonstrates and a lot of industry discussion demonstrates -- people already tend to misunderstand what DKIM does.

As they misunderstand DMARC, with one vendor claiming it eliminates CEO spoofing.

By the way, with your logic, UDP and TCP should have similar names, since they plug into the same place in the stack.

Or perhaps 'place in the stack' is of import to a very, very narrow demographic, whereas the much larger demographic is a lot more likely to more attention to basic email functionality than to abstract network architecture placement.

d/

--
Dave Crocker

Brandenburg InternetWorking
bbiw.net
bluesky: @dcrocker.bsky.social
mast: @[email protected]
_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to