----- Original Message -----
From: "Jim Fenton" <[EMAIL PROTECTED]>
To: "Douglas Otis" <[EMAIL PROTECTED]>

>> Regardless of the OA, spam will reflect poorly upon the signing
>> domain.  Reports of abuse and expectations of who will resolve an
>> abuse issue  always falls to the signing domain.  There will not be
>> any "spreading" of responsibility.  There is no means to know whether
>> the OA is even valid!  The identity of the OA depends upon the
>> assertion made by the signing domain.
>
> "Spreading" was perhaps not the right word to use.  But the signature is
> now coming from a different place, so whom it reflects poorly upon is
> now changing.  That makes it a fundamentally different thing than key
> delegation.  Allowing a domain to delegate the ability to sign their
> mail and not holding the delegating domain responsible at all seems
> undesirable in that it doesn't discourage domains from doing business
> with dubious mailing services.

Is it possible to view this from a VERIFIER security standpoint based on
what is to expected in DKIM-BASE and all possible signatures regardless what
is deemed useful or not?

After, the verifier is going to be the ultimate "controller" of what gets
processed, what get disseminated, filtered, etc.

Regardless of the meaning the possible the DKIM-BASE signature protocol has
left itself unprotected.

As my chart shows in my DSAP proposal (submitted to the IETF), at

http://isdg.net/public/ietf/drafts/draft-santos-dkim-dsap-00.html#anchor14

The verifier is going to see signature(s) or none at all and from its
standpoint each has a possibility of 10 different arrangements:

4.2. DSAP Tags: op=<signing-policy>; 3p=<signing-policy>;

   From the viewpoint of the verifier, when a message is received, there
   are two basic pieces of signature information to be of interest when
   analyzing the transaction:

   o  Original Party Signatures (OP)

      *  never expected
      *  always expected
      *  optional

   o  3rd Party Signatures (3P)

      *  never expected
      *  always expected
      *  optional

   When the two signature types are combines, the possible policies are
   listed in this following table:

    +=================================================================+
    | op=         | 3p=        | Domain Policy Semantics              |
    |=================================================================|
    | empty       | empty      | No mail expected                     |
    |-----------------------------------------------------------------|
    | never       | never      | No signing expected                  |
    | never       | always     | Only 3P signing expected             |
    | never       | optional   | Only 3P signing optional             |
    |-----------------------------------------------------------------|
    | always      | never      | OP signature expected                |
    | always      | always     | Both parties expected                |
    | always      | optional   | OP expected, 3P may sign             |
    |-----------------------------------------------------------------|
    | optional    | never      | Only OP signing expected             |
    | optional    | always     | OP expected, 3P expected             |
    | optional    | optional   | Both parties may sign.               |
    +-----------------------------------------------------------------+

                  Figure 4: DSAP Message Signing Policies

For the sake of progress, if we set aside 3P policies, we are down to 4
possible OP policies:

 - No Mail Expected by OP (Original Party)
 - No Signing Expected by OP
 - Signing always expected by OP
 - Signaling Optional by OP

It doesn't matter who here thinks if any of these make sense or not. Anyone
can come up with a scenario of when it does or not make sense.  What is more
important is that the VERIFIER will see all the possibilities in the
potential onslaught of DKIM messages.

It would be ideal for the domain to declare what is or not expected in the
mail with purported Domain DKIM markings.

--
Hector Santos, Santronics Software, Inc.
http://www.santronics.com














_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to