----- Original Message -----
From: "Stephen Farrell" <[EMAIL PROTECTED]>

> I'm not entirely clear what you don't like there, but
> rather than explain it might be easier if you could
> offer a better wording?

See below.

>> We even have a TOC index for Reputation but not SSP.
>> Go figure.

> Well, that's not quite accurate. 3.2.3 is called reputation
> attacks and (is one paragraph that) discusses attacks
> against the reputation of someone. While that may be
> confusing, it has no implication at all that a reputation
> system is, or is not, a reasonable counter measure .....

Here is what 3.2.3 says:

| 3.2.3.  Reputation Attacks
|
|    ..... It is for this reason that reputation systems
|    must be based on an identity that is, in practice, fairly
|    reliable.

The way this sounds to me, the section provides operational guidelines
(functional specifications) for a Reputation System.

> .... and it certainly says nothing about SSP.

Exactly. Why not? When in fact, SSP can most definitely address the "joe
job" issue?  The section could say.

  SSP may play a role to address this reputation attack threat.

> I'd also note that section 4.2 is basically about SSP,
> even if the acronym doesn't appear in the title.

Right

The basic problem is that reading this document, one gets the idea that
the solution to the threats is basically a A/R system, including
explaining how it be also harmful. Quoting 4.1.5

   When reputation services are deployed, this could
   damage the originator's reputation.

A meaningless statement because we are not designing a A/R system (or
are we?).  Even then, the harm is described to occur only when they are
deployed when then fact, they are not deployed. So there is no harm. A
meaningless useless statement.

In fact, not one discussion about SSP in this section.  I would like to
know how a SSP can help or be harmful with SMR (Signed Message Replays).
Is that not the focus?

So on and so on with this document.

All in all, SSP needs to be introduced and emphasized more than A/R
currently is.  The document reeks with A/R discussions and concepts that
have nothing to do with DKIM/SSP.

hmmmmmm, one second ..... I can't believe what I am seeing....

It looks to me that the Threats Draft Intro and the SSP draft Intro are
nearly the same except the paragraph on SSP was PULLED and replaced with
A/R paragraph.  Wow!

My suggestion?

Pull the A/R paragraph and focus once again with SSP. Just put it back
from the SSP draft.   The SSP draft intro 2nd paragraph is perfect to
explain why threats might exists:

  However, the legacy of the Internet is such that not all messages
  will be signed, and the absence of a signature on a message is not an
  a priori indication of forgery.  In fact, during early phases of
  deployment it must be expected that most messages will remain
  unsigned.

Unchanged, this is perfect introduction for why they might be threats.

  However, some senders may choose to sign all of their
  outgoing mail, for example, to protect their brand name.  Such
  signers must be able to advertise to verifiers that messages claiming
  to be from them that are not signed are forgeries.  This is the topic
| for Sender Signing Policy (SSP).

Really, the whole document needs to deemphasis the unexistent concept of
A/R - it doesn't exist, there is no standard or solution yet using A/R,
and concentrate more on SSP for threat discussions - how it helps and
how it doesn't help.

--
Hector Santos, Santronics Software, Inc.
http://www.santronics.com


_______________________________________________
ietf-dkim mailing list
http://dkim.org

Reply via email to