On Dec 21, 2007, at 3:56 PM, Michael Thomas wrote:
They're secret. And obvious.

Is there a reason this list should not be able to review a strategy that significantly limits signature coverage in order to comply with a policy assertion?

In addition, it is a matter of interpretation as to whether a mailing-list should remove signatures prior signing. It is not that far fetched to predict dependence upon permissive signature settings and mailing lists not removing prior signatures is likely a recipe for future policy compliance problems and represents valid concerns when deciding upon policy assertions.

What part of RFC4871 section 4.1 paragraph 3:

Signers SHOULD NOT remove any DKIM-Signature header fields from messages they are signing, even if they know that the signatures cannot be verified.

is not clear? Your fanciful leaps of what-if's fly in the face of my field tested 99.6% pass rate, not to mention that you are simply wrong about what rfc4871 says.

This was section 4.2. "Interpretation" of section 4. "Semantics of Multiple Signatures".

Following this sentence is:
,---
Verifiers MAY process signatures in any order of their choice; for example, some verifiers might choose to process signatures corresponding to the _From_ field in the message header before other signatures. See Section 6.1 for more information about signature choices.

Verifiers SHOULD ignore failed signatures as though they were not present in the message. Verifiers SHOULD continue to check signatures until a signature successfully verifies to the satisfaction of the verifier. To limit potential denial-of-service attacks, verifiers MAY limit the total number of signatures they will attempt to verify.
'---

Section 6.1 tends to repeat the same advice:
,---
When a signature successfully verifies, a verifier will either stop processing or attempt to verify any other signatures, at the discretion of the implementation. A verifier MAY limit the number of signatures it tries to avoid denial-of-service attacks.
'---

If or when spam begins to abuse DKIM signatures, an evaluation limit of one may not be unusual, or the exclusion of evaluations from sources emitting a high level of invalid signatures. Fully benefiting from DKIM may require removal of signatures known to be invalid. Evaluating DKIM signatures requires more of heavily taxed resources. The "even if they know that the signatures cannot be verified" may prove to be bad advice. Changing this advice to "unless they know that the signatures cannot be verified" does _not_ affect your 99.6% results. The "even if they know that the signatures cannot be verified" necessitates expending additional resources per message checked. Is this really wise when spam is the majority of message traffic?

-Doug
_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to