My comments inline below. They can be summarized as follows:
1. SSP does not dictate receiver behavior. SSP bends over backwards to
state receiver behavior is at receivers' discretion. If someone can find
someplace where SSP dictates receiver behavior please identify it so it
can be fixed.

2. Some IETF particiants believe certain SSP statements such as "strict"
and "deny" are not useful SSP constructs for them. Some are explicit
that these constructs would not be used by their own mail servers.
However there is a large part of the Internet community that desires
these constructs. The brilliance of "strict" and "deny as defined in SSP
is that a strict/deny proponent like myself can build a system using the
strict/deny data provided by other strict/deny proponents' SSP records
AND strict/deny opponents can simply publish "unknown", "all" and
"process" policies and then use their discretion to ignore results
related to strict/deny. Everybody wins! I believe it would be an epic
mistake for the strict/deny opponents to prevent others from utilizing
these capabilities. I have no desire to prevent someone from ignoring
strict/deny at their discretion; why can't I have a syntax I desire to
state strict/deny for those who will use it?

pat

PS: SSP does not dicatate receiver behavior :)

> In general, the draft needs to consider adoption incentives 
> for receivers.  My
> guess is that such an analysis will show that there is a 
> relatively small set
> of publishers and receivers who are highly motivated to 
> implement the more
> advanced features -- advanced relative to earlier SSP drafts 
> -- but that true,
> Internet-scale adoption will be elusive for quite some time.
I strongly disagree. There are a significant number of large receivers
that are highly motivated to adopt the draft. Take one example: Y! has
been public about their work with PayPal to ensure non-delivery of
unsigned or invalidly signed DK messages. (I know this is DK but the
incentive of SSP is the same for DK or DKIM.) I have been very public
about IronPort's desire to implement SSP based on the proxied desires of
our customers. The 100 US Financial Services Roundtable companies (BITS)
have also been public about their desires in this area.

> In my opinion, the draft should be broken into an initial 
> core, with optional
> extensions.  The core should define the publication mechanism 
> and the smallest
> set of features that are deemed useful and likely to receive 
> a broad base of
> initial adoption.  The extensions would target the smaller 
> set of adopters who
> are viewed as being strongly motivated for these enhancement. 
>  The core would
> be appropriate for direct standardization, while the options would be
> experimental.
Again disagree. I feel the extensions are critical.

> 1.  Signer/Validator practices "negotiation" scope
> 
> SSP's description of itself as including "how verifiers 
> should... interpret
> those results" states a scope of protocol semantics that is 
> new to the IETF;
> the protocol is not constrained to "interpret" with respect 
> to defining what
> the published information means, but rather is meant to guide, or even
> mandate, how the mail receive-side participant should handle messages.
This is not true. draft-ietf-dkim-ssp-01 states:
"deny  Messages which are Suspicious from this domain MAY be
         rejected, bounced, or otherwise not delivered at the option of
         the verifier."
There is no mandate here.

> I believe the IETF has not previously standardized a 
> specification which
> attempts to have one network participant dictate the internal 
> operating
> behaviors of another, outside of the protocol interaction 
> itself. As such,
> efforts in this direction need to be careful, modest and incremental.
Again, there is obviously no dictation here. The ability for a sender to
state a policy in such a manner that certain receivers find it most
beneficial but in a way that does not constrain other receivers is a
benefit, not a limitation.

> 2. Unsigned vs. Mismatched Signature
> 
> The original SSP specification applied only to unsigned 
> messages. The current
> version includes mail that is signed but has different 
> domains between the
> DKIM i= attribute and the rfc2822.From field. Presumably, 
> this new capability
> overrides whatever reputation is associated with the message signer.
> 
> If a signer has a good reputation, then why is that not sufficient for
> enabling delivery?  In other words, with a signature of a 
> domain with a good
> reputation, what threats is SSP trying to protect against?
Reputation systems are designed by organizations to optimize delivering
good mail and stopping bad mail. They will design the reputation system
however they see fit to achieve this goal. The market dynamics and
innovation will define reputation systems' design, not SSP. Hypothetical
statements about how reputation systems may develop aren't relevant to
SSP>
 
> 6. Signature Semantics
> 
> DKIM was devised to provide a means of declaring an 
> (organization's) identity
> that is taking "responsibility" for placing a message into 
> the transit stream.
> This is a very constrained semantic for the signature, and 
> really pertains to
> no more than a delivery decision.
> 
> In reviewing the apparent semantics of full SSP use, I 
> believe it seeks to
> move a DKIM signature, which uses the same domain name as is 
> in the From
> field, into the realm of declaring content to be valid.  This 
> is a much more
> demanding semantic and, I believe, moves the DKIM/SSP service 
> into direct
> competition with S/MIME and PGP.  At best, this seems 
> entirely ill-advised.
> At the least, it is considerably more ambitious than the 
> initial functions
> discussed for SSP.  For an initial version of a standard, 
> more ambitious means
> more risky.
I have no idea what "declaring content to be valid" means.

For example, I can sign a DKIM message with SSP and this DKIM message
with matching i= and From domains can state "2+2=5". Certainly I'm not
validating the content here?

I think you mean something else.

References to S/MIME and PGP are unclear and irrelevant. I was unable to
follow this thread on the list a few weeks ago.

Let's determine what the requirements are and build a system to meet
those requirements rather than state "this design moves into the realm
of blah where blah is undefined."



> DETAILED COMMENTS
> =================

> >    In the absence of a valid DKIM signature on behalf of the "From"
> >    address [RFC2822], message verifiers implementing this 
> specification
> >    MUST determine whether messages from that sender are 
> expected to be
> >    signed, and what signatures are acceptable.  In 
> particular, whether a
> 
> Normative text in the Introduction?
> 
> I initially thought that the statement, here, provided a 
> crisp statement
> of scope, but then realized that the "signature on behalf of 
> the From address"
> left things unclear.
> 
> For one thing, it means that SSP will apply to some signed 
> messages, and not
> only to unsigned messages.
> 
> For another, it appears that the test to perform is with the DKIM i=
> parameter.  This can get a bit tricky.  For example, since 
> the DKIM base
> specification does not require that the i= parameter directly 
> relate to the
>  From field, this seems to carry an implied modification to 
> DKIM base? So it
> seems to require that i= be entirely redundant with (one of?) 
> the rfc2822.from
> address(es) in every detail?
> 
> As for "what signatures are acceptable", the implied, 
> open-ended complexity in
> this statement is huge.  Think, for a moment, of just how varied the
> description of 'acceptable' signatures could become.
> 
> Given that DKIM pertains to domains that are trusted, rather 
> than to domains
> that are untrusted, this line of SSP effort appears to be 
> conflating the two
> worlds.
DKIM applies to both. I can determine bankofamerica.com is trusted and
bankofamerica.cl is untrusted. I can use DKIM to authenticate the use of
each of these domains and then apply my trusted and untrusted logic
accordingly.
 
> >    techniques such as DKIM is limited since unsigned messages will
> >    always need to be considered to be potentially legitimate.  This
> 
> A declaration of the limited utility of DKIM, without SSP, is 
> gratuitous,
> probably wrong, and probably counter-productive for early 
> DKIM adoption.
I disagree. For domains which are forged regularly DKIM without SSP is
limited IMHO.

> > 2.9.  Suspicious
> > 
> >    Messages that do not contain a valid Originator 
> Signature and which
> >    are inconsistent with a Sender Signing Practices check (e.g., are
> >    received without a Valid Signature and the sender's 
> signing practices
> >    indicate all messages from the domain are signed) are 
> referred to as
> >    "Suspicious".  The handling of such messages is at the 
> discretion of
> >    the Verifier or final recipient.  "Suspicious" applies 
> only to the
> >    DKIM evaluation of the message; a Verifier may decide the message
> >    should be accepted on the basis of other information 
> beyond the scope
> >    of this document.  Conversely, messages not deemed 
> Suspicious may be
> 
> This is the strongest indication that the SSP specification 
> has moved from
> describing sender-side practices to, instead, attempting to 
> tell receive-side
> validators how to behave.
Receiver-side validators are explicitly *not* being told how to behave.
Their behavior is at their discretion. Some receivers may use this SSP
information and it shouldn't be denied to them based on a clearly
misreading of "discretion" for "dictating". I think many will use this
information beneficially.

> A term like "suspicious" is emotionally charged.  Given that 
> breakage can (and
> will) sometimes account for the condition being described, 
> here, it would be
> better to use a term that is descriptive of the situation, 
> rather than having
> it assert a qualitative assessment.
"suspicious" may be emotionally charged but "Suspicious" should not be.
capitalized "Suspicious" means something very specific in the SSP
document

> >    rejected for other reasons.
> 
> So, the term 'suspicious' will be applied to some acceptable 
> messages and not
> applied to some bogus messages?
First the term "suspicious" is irrelevant. The term "Suspicious" is at
play.
Some acceptable messages will be "Suspicious" because they will be
unsigned or have a broken signature. That's ok because the receiver can
term them "Suspicious" and then, at their discretion, deem them
acceptable and deliver them.
Some bogus messages will have valid DKIM signatures and matching SSP
policies. Such a message from an *untrustworthy* domain like
bankofamerica.cl is not "Suspicious" but is bogus.
 
> >    handling=  Non-compliant message handling request for the domain
> >       (plain-text; OPTIONAL).  Possible values are as follows:
> 
> For some reason, the above language seems awkward to me.  I 
> assume the meaning
> is "Author domain request for handling of non-compliant messages"?
> 
> In any event, this again makes clear that SSP has moved from 
> describing
> 'sender' practices into an attempt by a sender to dictate 
> validator behaviors
> when using sender practices information.
Again, nothing is being dicated. The receiver has their full discretion.
 

_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to