On Mar 12, 2007, at 7:54 AM, Hector Santos wrote:

The original scope (SSP) was on track with addressing with what I believe were the most marketable features of the product:

   - High benefits for exclusive domain policies

Benefit is a rather general term. In marketing terms, a benefit could mean greater opening rates and fewer false positive detections as a spoof. Both of these benefits occur without SSP.

It is dangerous to suggest recipients will soon expect protection with MTA filtering using some SSP policy assertion. This method of protection is too prone to many types of visual attack. This "benefit" also assumes recipients will remain unaware which email- address has been assured by DKIM. For a mailing list, the email- address being assured will differ from that assured when signed by a first party. Perhaps the mail-list is trusted enough to allow first party "policy conflicts" to exist within their messages. Should the MTA operator make this decision for everyone?

In addition, SSP benefits will be nil when signing messages of public accounts such as "[EMAIL PROTECTED]". SSP acceptance benefits can be jeopardized by abusive replay. A high benefit should include some means of protection.

   - High benefits in exposing the nature of domain usage

Why would the nature of the message be placed into a generalized policy statement? Whoever signs the message could make such an assertion on a per message basis.

As a product producer, this is how I am going to be able to "help" the "world of domains" outside my own control. It is what I see my customers will desire, and at the same time, as a USER of the product, I would like to also protect my own domains being exploited and used at other compatible DKIM/SSP systems out there. I would rather that they honor our DKIM/SSP own policies.

What happens when your customer happens to communicate through an IPv6 to IPv4 gateway? What happens to messages when the IPv4 address resolves to ipv4-gateway.com and signed by my-domain.com? Now imagine the signing is for public accounts that have been rate limited as a means to reduce abuse. In this case, the signature still does not offer a basis for acceptance, as it remains easily abused if it did.

For replay abuse, SSP could offer some real value. SSP could provide a safe means to authorize the transmitter of the message, where when the signature is found conjunction with a transmitter authorization, the recipient will have been offered a safe basis for acceptance. This would also prevent the signer's reputation from being damaged due to abusive replays as well. It seems this is where SSP can offer real value. For cases where transmitter authorization is not found, receiver side rate-limiting can be employed instead.

We are simply not going to protect the entire spectrum of DKIM with no or flexible SSP policies. But we can MOST definitely address domains (HIGH VALUE or not, but HIGH VALUE will probably be most interested) with "tighter" policies who simply do not expect MIDDLE WARE and/or LIST SERVERS to be "touching" or passing thru such mediums.

Anything created with a high value should include some means of protection. The ability to replay a signed message may place even "HIGH VALUE" signatures in jeopardy of no longer being white-listed. SSP can defend the benefit of DKIM by offering a safe means to authorize the transmitter. Sender-ID does not offer a safe means.

-Doug


_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to