Okay, we could put policy back in and state a malformed signature cannot pass 
and assign a weight higher than an unsigned message. Then the problem remains 
the same, is it error or malice. A dkim verifier is the wrong tool to do that 
particular job
On Oct 15, 2010, at 7:12 PM, Hector Santos wrote:

> MH Michael Hammer (5304) wrote:
> 
>> And this is where I angst. In all the discussions of a broken signature
>> being morally equivalent to unsigned, the thrust has been that it was
>> likely broken in transit. We failed to have the discussion of it being
>> intentionally broken in transit as an attempt to game the system. For
>> header mutations after signing (which are likely to be a malicious
>> attempt in the specific cases we have been discussing) I feel that
>> treating it as simply the same as unsigned is ignoring the potential
>> maliciousness.
>> 
>> I recognize what Murray and Dave have said on this point but it grates.
>> The reason we are going through the exercise of creating a stable
>> identifier associated with a signing domain is because we perceive some
>> value whether it be policy associated with the stable identifier or
>> reputation associated with the stable identifier. 
>> 
>> To simply ignore this and say it is the same as if it wasn't signed is
>> kind of like saying 0=1.
>> 
> 
> I view this from a Fault Analysis standpoint and the first thing to 
> establish are your boundary conditions and it is difficult to have 
> boundary conditions without a policy framework (or process expectations).
> 
> Part of the modeling do include invalid signatures and we have shown 
> that you can fold many of these invalid signature conditions into a 
> single "never signed" condition.
> 
> This why I continue to have a problem with the 4871 "policy" of 
> transforming an invalid state point to never signed state point.  It 
> was fine when POLICY was still part of the framework. When we insisted 
> on separating the two, that 4871 inherent policy should of been removed.
> 
> This is not the first time, but I would love to re-issue the 
> suggestion to remove that statement from 4871 iff we want to continue 
> to separate policy into another layer.  In that case, the higher layer 
> needs all trace information available.
> 
> The difference is that there is higher weight with deterministic 
> boundary conditions when there is no real signature vs the 
> indeterminate conditions with failed signatures.  But depending on the 
> domain expectation, these failed conditions can be folder to the no 
> signature condition.
> 
> I always come back to an image of an old patented idea of using a 
> perfect circle to represent the optimal boundary conditions for a 
> process.  When that circle is skewed, you are off the optimal plane. 
> It may not represent an emergency, but there is a "shape" or limits 
> that tells you something is not right and alerts need to be signaled.
> 
> For DKIM, we can only do this with Domain Expectations to help 
> verifiers and local policy be molded.
> 
> -- 
> Hector Santos, CTO
> http://www.santronics.com
> http://santronics.blogspot.com
> 
> 
> _______________________________________________
> NOTE WELL: This list operates according to 
> http://mipassoc.org/dkim/ietf-list-rules.html


_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to