Douglas Otis wrote:

On Aug 22, 2005, at 11:02 AM, Scott Kitterman wrote:

So to narrow my previous attempt at a summary, you think that domain-wide assertions cannot be accurately made for mail addresses, but that it can for HELO/EHLO?



Accuracy is not the issue. While a domain-wide assertion may accurately issue requirements, the value of the assertion should be assessed against intended goals. Part of that assessment should include whether a goal is reasonably achieved, and weighed against administrative complexity and a potential for inordinate use of DNS. An assertion that HELO must verify with a CSA record where the same CSA record makes the assertion, achieves the goal of assured verification with low administrative complexity and low use of DNS.

It would seem to me then that effictiveness and usefulness of domain wide sender policy assertions is a matter for proper design. I think that saying that something must be well designed is not a reason to put it out of scope for the working group's initial efforts.

Binding a mailbox-address or mailbox-domain to a domain signature is not a goal, it is a mechanism. What is the intended goal? What is the selection process? What level of administrative effort will this entail? What level of DNS interaction is required?

Good design questions for the group to work on once it's chartered.

Such a domain-wide assertion could inhibit a zombie system from purporting to offer valid signatures when signing for other domains. It could also inhibit a zombie system from sending without a signature. What has been excluded? A goal of preventing unauthorized sending of email is accomplished with low administrative complexity and low use of DNS.

Yes.  An excellent reason to include such work in the charter.

In the same manner many use self-signed keys when accessing servers using SSH, the same type of local manual binding is possible once there is a domain signature. Should specific communications be important to the recipient where they wish to be alerted to _possible_ spoofing of these individuals or roles, perhaps the MUA could offer a button to remember the mailbox-address/signing domain/ opaque-identifier bindings. Any other message using that same mailbox-address that does not include this binding would cause a warning. While this approach is not iron-clad, it could help eliminate many of the common exploits. Often the recipient knows by other means whether this is a valid message to permit such initial assessments.

So you think that such a relationship can be established, at least in part, but that it's not suitable to put it in DNS?

I have yet to hear your explanation how abuse can be determined in advance.

I will say again that I don't think that's the point. The point is to detect forgery. Whilst strictly speaking operating outside the domain owner's stated sender policy isn't necessary exactly congruent with forgery, I'll take that as close enough.

And that it will be up to users to determine the relationship between the signing domain and the e-mail addresses and evaluate the legitimacy of the message?

When DKIM becomes widely deployed (which assumes stumbling blocks were not created), then simple features such as single click recording of typical mailbox-address/signing-domain/opaque-identifier bindings would make establishing a strong relationship a rather painless task. It would also instill confidence without making email more complex to use or entail a major portion of the Earth's available ram to support DNS.

It sounds to me like that's a long way of saying yes to my question. Is that right?

Scott Kitterman
_______________________________________________
ietf-dkim mailing list
http://dkim.org

Reply via email to