(Apologies for the delay in responding.  Extended and draining travel and a broken laptop got in the way.)

Bron, et al,

Thanks for this note, which engaged with useful detail and provided useful scenario data to consider. We need more scenarios.

Also, on reflection, I've come round to the view that it will be useful to explicitly support a chain of signatures along the transit handling path, with annotations that indicate the order of the chain. The next draft of DKOR supports that.


Inline...


On 4/26/2025 1:51 PM, Bron Gondwana wrote:
For succinctness I shall call your proposal DKOR and ours DKIM2 below, acknowledging that the name DKIM2 does not have consensus.

On Sat, Apr 26, 2025, at 13:07, Dave Crocker wrote:
On 4/25/2025 8:13 PM, Bron Gondwana wrote:
On Fri, Apr 25, 2025, at 12:31, Dave Crocker wrote:



HTTPS followed an incremental adoption path, not all that different from what I've proposed, since there is utility for any pair of client and server that adopted it.  This is profoundly different from your proposal.

I disagree with your "profoundly different" assertion here.  DKOR is a strict subset of the capabilities provided by DKIM2.  DKOR provides benefits as soon as both a single sender and a single receiver implement it, for direct mail flows between those two systems.

*DKIM2 also provides immediate benefits* as soon as two systems support it, for direct mail flows between those two systems.

As offered, DKIM2 requires massive infrastructure adoption, before being useful.

That is, it has so far only been offered as a single, integrated, take-it-or-leave-it set end-to-end infrastructure changes.  In fact I pressed for divide-and-conquer thinking about this effort and it was been repeatedly and vigorously rejected.

To the extent that adoption by just two end systems can achieve benefit, I believe there has been nothing said or documented to support that.  It's not that I'm disagreeing with your claim. It's that I don't see how it is true, given what has been said, so far.

Also, it's not that I disagree that DKOR can be viewed as a subset of DKIM2. It's that there has been no sense of how to operationalize a sub-setting of DKIM2, nor does the documentation support doing that.



Both systems provide much less benefit if messages flow indirectly through a forwarder or mailing list that is not participating.

Less is not the same as none.



DKIM2 provides an upgrade path where when the intermediate systems are upgraded to support DKIM2, every hop of the pathway is DKIM2 and you can eventually start requiring a full DKIM2 pathway to accept mail from more sites.  I can anticipate a future DMARC-style technique for publishing a DNS record saying "do not accept messages from this domain that have exited the DKIM2 ecosystem at any point".

Consider the likely, and long-term, reality that only /some/ intermediaries adopt it.  How will that look, in terms of actual efficacy?

And I'm suggesting the consideration be in terms of detailed scenarios, not just broad, generic reactions to the idea.



DKOR, by my reading, can never reach that endpoint by itself.

When something makes no effort to do a thing, it's misleading to claim that it cannot 'reach' that thing. It is declaring a failure to reach a goal that does not exist, except as a post-hoc, externally-imposed thing.

Stylistically, it is of course fine to say that what it is trying to do is not useful or is insufficiently useful, but these need to be explained in detail, rather than just asserted.  Especially when the thing being criticized is not being offered as the only path to pursue..

DKOR has a more modest goal than DKIM2.  As you note, it is a subset.

If that subset of DKIM2 can, in fact, be considered as a real-world, operational subset, then let's do that and compare just that portion of DKIM2 with the same scope and goals as DKOR.

And there is nothing about DKOR that is meant to limit pursuit of /additional/ and complementary mechanism.  Independently.


I agree that it's a potential stepping stone in the right direction, but by itself it's not sufficient.

ack.



Our approach solves the whole problem enough to be worth the effort.

You keep saying that.  I keep asking for detailed scenarios that show how.  You then keep coming back witht he same, generic claims.

OK - let's suppose that I had DKOR headers on this email.

Presumably my system would send two messages with DKOR headers; one
MAIL-FROM:[email protected]
RCPT-TO:[email protected]
the other
MAIL-FROM:[email protected]
RCPT-TO:[email protected]
...
   It's unclear from your draft whether the IETF mailing list server is expected to add its own MAIL-FROM and RCPT to headers to each email or not, but regardless...

The mailing list is re-posting mail.  A new submission.  It can do whatever it wants.

Except, of course, it must use new RCPT addresses, since that's its job.

Whether it specifies a different Mail-From varies, but it is a common and reasonable thing to do, since the originating site can't do anything about delivery problems for addresses used by the mailing list.

Making this a BCP-based normative requirement -- I'd suggest SHOULD rather than MUST,  just to deal with scenarios that don't need a different address -- would be reasonable.

But note that neither of these has anything specifically requiring a change in signing technologies.

Nor does a SHOULD that the mailing list add its own signature.


there's no way for Gmail to know - if this was a spammy message, whether the spam was generated by me and sent to the IETF list, or whether the IETF list was a bad actor.  It would need a reputation database.  You've basically re-implemented the same problems that ARC has.

I'm going to claim that this is required, no matter what underlying tech is used.

Any scenario that matches on simple, objective, non-obvious criteria for spamminess might involve a message that is actually legitimate.  Feel free to provide an analysis that comprehensively shows otherwise.  However, to date, after some decades, I think we have not seen it.



With DKIM2, the second message would have on its copy from me:

|DKIM2-Signature: i=1; mf=||[email protected]| <mailto:[email protected]>|; rt=||[email protected]| <mailto:[email protected]>|; d=fastmailteam.com|

And then on its copies from the mailing list:

DKIM2-Signature: i=2; [email protected]; [email protected]; d=ietf.org
DKIM2-Signature: i=2; [email protected]; [email protected] 
<mailto:[email protected]>; d=ietf.org

DKIM2-Signature: i=2; [email protected]; [email protected] <mailto:[email protected]>; d=ietf.org

etc.  Each with a separate signature, so they would be clearly not just a replay of a single message which was directed at the mailing list.

After reviewing this a number of times, over the last month, I've come round.

First, to the goal of supporting a chain of signatures and second to having the signatures label the sequence.

On the numbering sequence, it might seem obvious and trivial to add, but it's use involves an extra bit of analysis mechanism and even trivial stuff can get tricky, in the considerable scale and complexity of highly distributed and independent implementations and erratic adoption.  But overall, I'm sufficiently swayed to include it in the next version of DKOR.




Even more importantly, they would have delta header fields:

Or not.

Or, rather, they /might/ not.  And for a very long time, probably won't.

But that can be ok, unless an artificial dependency is created. Much like DANE did with DNSSec.  The dependency is strictly operational, but it was written into the core DANE specification and constituted a show-stopper for adoption.

In technical and even operational terms, the delta mechanism is fully and completely independent of the signing methodology. Signing needs to cover the delta header field, but that's a mild operational convention, not a technical design integration.

To stress this point:  The delta mechanism can be and should be pursued independently of any changes to the signing tech.

Use it when it is ready to be used, but don't depend on it, for now.



  Yours brings some benefit, but the overall benefit is trivial

So, making it easy to detect DKIM Repaly is a trivial benefit?  Wow.

If it detected DKIM Replay in the general case, it would not be trivial - however it only detects DKIM Replay in the direct case.

Given that Replay is about actions involving an intermediary, I don't know what direct vs. indirect means.

In any event, yes, there are legitimate scenarios that match Replay abuse scenarios.

And there always will be.

So, yes, there is more needed to assess the difference.  However I think the view that this is somehow amenable to perfect assessment by strictly objective, mechanical means is wrong and misguided, based on the industry's experience over three decades.



It's still not possible to distinguish between an alumni forwarder and a DKIM replay; short of keeping a database of every alumni forwarder that points to you, and at scale that's decidedly non-trivial.

We've seen an example of using a Microsoft intermediary to commit DKIM Replay spam.

Every technical aspect of that looks to be legitimate.  But the operational practice was not.



because it doesn't close the forwarding hole and forwarding becomes even more of a poisoned chalice than it has already become (Wei showed evidence of this and a credible theory for why).

Scenarios, Bron.  Show yours working in detail for all this extra benefit, so others can a) evaluate what it will take to adopt it, b) evaluate its likely efficacy, and c) consider being able to use different components that might have superior characteristics.


See above a worked example.  I'm happy to do more examples if that's still not clear enough.

Yes, please.

I think ones that might be especially helpful would deal with paths that have only partial adoption.


This is my objection to your proposed approach.  It's both trivial in its implementation, and trivial in its benefit.

Again, saying that making it easy to adopt and easy to use and effective for finding Replay is a trivial benefit seems really quite surprising.

I reject the assertion that DKOR will be effective for finding Replay.  It is indistinguishable from alumni forwarding or mailing lists, and provides no upgrade path to make it distinguishable.

Your rejection appears to be predicated on the view that I suggest DKOR be the only action taken.  But it isn't.

I am suggesting it as an upgrade to signing activities, where the upgrade is compatible with existing DKIM, rather than requiring a replacement of the global DKIM infrastructure.

Preserving an existing, widely-adopted, and useful infrastructure is not a small benefit. Adding enhancements that rely on it and, therefore, are compatible with it -- ie, enhancements that represent incremental benefit -- are especially worthy.

And the cost of replacement is pretty much always much bigger, in terms of time, money, and effort, than is estimated.  Advocates are pretty much always wildly optimistic about the expected rate of change, when compared against what actually happens.

d/


--
Dave Crocker

Brandenburg InternetWorking
bbiw.net
bluesky: @dcrocker.bsky.social
mast: @[email protected]
_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to