On Jan 10, 2007, at 7:33 AM, Dave Crocker wrote:
Wietse Venema wrote:
>> Perhaps some people are confusing verification and presentation.
>>
I really don't understand all of this hand wringing about True Verification vs. Mutant Verification Intent on Taking Over Earth. The protocol document needs to be precise about what it takes for a properly written verifier to verify a properly signed message. That's it. Trying to make normative any or all of the ways _not_ to verify a signature is not only a waste of time, it's a hopeless task.

Mostly +1.

In line with Wietse, we need to distinguish between two, basic activities. One is verification. I would call the other "interpretation", rather than "presentation" because it is a function of the filtering agent -- and can result in a variety of handling outcomes -- rather than just presentation to the user.

The fundamental point is that dkim-base defines how to create a signature and how to validate a signature. Anything done after the basic, interoperable, yes/no validation is outside the scope of -base.

Calling it "policy" is a good way of distinguishing it from the scope of -base which is intended to be purely mechanism.

The base draft requires the From header be signed. This header might become modified for EAI compliance. One mode of verification might therefore always include header copies to allow DKIM verification to remain robust. It may be better to anticipate that From header may _not_ play a significant role in the validation/anti-spoofing process. Instead, perhaps an EAI style identity might be placed within the DKIM signature. Validation could then include a means to confirm associations between domains when they differ from what is found within a specific header. In addition, the originating header is not always going to be the From header, where EAI fix-ups will require added heuristics without tangible benefit.

The alternative associative approach also eliminates a need to share private keys in some fashion. While DNS zone delegation or CNAME arrangements at specific key leafs might be seen as a workable solution, either of these schemes require detailed coordination between at least two parties. This level of coordination will needlessly increase costs associated with DKIM, and thus make DKIM less practical in many situations.

An associative scheme with the sending entity would allow these sending entities to better protect reputations of outbound servers. It would also permit the email-address domains owners an autonomous means to opportunistically take advantage of DKIM signing. When a provider signs within sub-domains unique for each organization serviced, then such a scheme would also assure that associations would not open the door for spoofing. This approach avoids private key sharing, DNS delegation, and the use of CNAMEs that is unlikely to prove practical. An associative scheme would incur the same overhead as that of a CNAME as well, and more easily accommodate use of other headers reflecting the entity introducing the message.

-Doug




_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to