On Sep 7, 2006, at 10:20 AM, Thomas A. Fine wrote:


Ok. There's a few reasons why we've been told we need this, and they're all wrong. Let's take a look at each of them:

1. Provide the ability to transition a domain, where part is ready and part is not.

This would not be a problem unless one assumes policy can only be applied domain wide.

2. Provide the ability to only sign important addresses.

Or sign all messages and apply different policies based upon email- addresses.

These can be handled by "I sign some mail" (or perhaps just as well with no policy at all). Then the company can sign only the mail they want to sign.

This affords no protections beyond there being no policy asserted.

In both of these first two cases, there is an assumption that it will be hard for bigbank.com to get to the policy of "I sign all email", and we should accomodate them. Granted it's hard. But we should also be able to assume that it is worth it, and that "I sign all" is the desired long-term situation.

Without a means to differentiate policies based upon email-addresses, employees of BigBank.com participating in mailing lists need to use a different email-address domains. Unless all employee's email- addresses are changed, BigBank.com remains exposed to the possibility of poorly vetted messages being signed without a means to adjust assurances being implied by a trusted domain list.

A half-covered domain leaves that domain severely exposed. Suppose bigbank.com signs for "accounts", "statements", "president", and "investment". They would also have to try to exhaustively cover for 1000 legitimate looking variations on those addresses, as well as 10000 legitimate looking addresses that don't look anything like the real ones, and almost certainly miss something, and leave themselves open to phishing, anyway. All despite the fact that they tried to do something that is in many ways more complicated than full coverage.

When DKIM related annotations are always expected by the recipient, there would be zero concern related to look-alike attacks, as these messages would not obtain these annotations. These annotations could be based upon an email-address being found within the address book, or within a trusted domain list in conjunction with email-address assurances made by way of policy.


100% coverage may be hard, but it is necessary to protect a domain. Half-assed coverage is useful transitionally, that is all. Subdomains are another mechanism by which bigbank.com can split up their transition, and protect the most important addresses first, although again, without complete coverage you can have similar problems.

100% coverage will not protect the domain. There remains the problem of look-alike and cousin domain attacks. The only tenable protection available would be based upon recognized email-addresses found within the address book or domains listed as being trusted. Even when the domain is listed as being trusted, policy can play a vital role in identifying which email-address the domain asserts as appropriate for high level assurances.


3. Provide the ability to sign all addresses, but offer different strengths of signatures, ranging from "this came from us" to "we absolutely certify the accuracy of everything in this message"

I'm trying to make sense out of this.  I'm not sure I see it yet.

What good does it do to give a particular address it's own key if you're already signing everything? Is there some proposed mechanism for quality assurance ratings as a part of DKIM?

Although there is always the wonders of web-mail. : (

A sales person or executive may wish to obtain their own email- address restricted DKIM key. This would allow them an ability to sign messages without needing to obtain direct access to the corporate servers, which may be blocked by hotel firewalls for example.


I suppose one case might be the disgruntled bigbank employee who starts generating fake messages from [EMAIL PROTECTED] That's an internal matter for bigbank, and it isn't our job to fix this problem. Internally, there's dozens of ways for them to secure important addresses, including software that requires extra verification for certain addresses, or use of subdomains to partition off everyone from mid-management on down.

BigBank may indeed prevent abuse of the [EMAIL PROTECTED] email- address. However, don't assume the recipient even sees this addresses. They may be viewing only the display name. This issue must consider how the message is annotated. Without annotation DKIM is absolutely worthless at preventing any type of spoofing. With annotation, DKIM can preventing the all too common spoof.

But ultimately, no scheme can completely prevent this from happening. What if the guy that maintains DNS is the one that's disgruntled?

One could presume that someone administering their system has been well vetted. A sale's person's laptop or a temp worker may represent something far less trustworthy.

4. Provide the ability for users outside of a domain to send mail from within that domain.

External access is not be the issue raising the concern. All messages being signed still leaves an array of possible messages from mailing lists and e-invites etc. There are too many domains for safe annotations to be created on a per domain basis without some assistance from that domain. Allow them to indicate which email- addresses should be treated harshly, or provided high level assurance annotations.

Again, it's not DKIM's job to solve the internal problems of a domain, especially when those internal problems are so easily solved otherwise. VPN is one solution, so widely available that I can run it on my palm.

Policy offers a means to better protect recipients of their messages. It has nothing to do with internal problems. What is being described is fairly normal. Not everyone within an email- address domain are equally trustworthy. Allow policy to assert different levels of assurance for those messages where only the domain itself is being trusted. In other words, recipients don't already know the specific From email-address, they just trust the domain.

-Doug




_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to