On 4/22/2025 3:02 PM, Richard Clayton wrote:
In message <[email protected]>, Dave
Crocker <[email protected]> writes

> On 4/21/2025 11:51 PM, Richard Clayton wrote:
>> I think you may have overlooked some aspects of what is needed to make a
>> difference to the current situation.
>>
>> Your design records and signs the RCPT TO of the original email and
>> insists that there is only one recipient per email -- so far so good.

I agree with John Levine that you cannot determine that other systems
checked this ... so that "so far" is not in fact very far at all

1. Once again, you are criticizing it for not doing things it was not
   intended to do
   (This is starting to be a pattern.)
2. Further, you are asserting an obligation to do things that
   a) are not specified as a requirement, with specific respect to
   handling DKIM Replay, unless you care to point to where it is, and
   b) you have not presented any evidence that whatever it is you are
   demanding to be done cannot be done as a separate mechanism that
   will work with this.

I guess the other point seems to be that since you offer no criticism about this doing what it is intended to do, you do not disagree it can do it.

The operative design point here falls under the rubric of 'divide and conquer'.

Rather than having everything be conflated and mixed together, it is pretty much always better to define separate functions separately.  Merging them become useful only after there is enough experience to know how merging them will create benefits.  We are a very, very long way from that.

Also, this goes to the underlying issue with the Motivation document, which states some problems it is reacting to but has no overall design framework, never-mind any threat model to build on.



>> However, you do not capture whether an intermediate system has
>> intentionally replayed the message (and what their identity might be).

> Richard, excluding things that are out of scope is not 'missing' them.

> My spec seeks only to deal with detecting Replay. It does that.

If you do not add other features to it then your proposal is of no
practical use

Oh?  Sounds dramatic.  Except, of course, it is quite wrong.

There is a goal of permitting receivers to detect DKIM Replay. This accomplishes that.

If you think it does not, please engage in the typical IETF practice of offering a technical analysis and show how it does not.



.. there are many flows where "replay" occurs, where
everyone wishes to deliver the resulting email.

Please show what specific mechanisms will provide that, and then show how they cannot work with DKOR.



However, there are situations where the replay is malicious (and usually
at considerable scale) and delivery of the email is not a sensible
outcome.

I outlined in my previous email what other features could be part of a
protocol beyond merely recording the existence of replay -- and how
systems could use those features. Mere identification of "replay" is
just not sufficient to address any of today's abuse issues.

The problem is with your assertion by authority that they cannot be achieved with this mechanism in place.  Feel free to show you work.


d/

--
Dave Crocker

Brandenburg InternetWorking
bbiw.net
bluesky: @dcrocker.bsky.social
mast: @[email protected]
_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to