Barry Warsaw wrote:
>> This is not the spec -- and it's not been widely vetted.
>
> Fair enough; it's also out of date as Stephen pointed out.  Still, it 
> does indicate that the DKIM authors acknowledge that there are 
> compatibility issues with mailing lists.  The updated section 4 that 
> Stephen posted seems to be moving toward resolving those issues.

I'm afraid that there's not much consensus on how to deal with the
mailing list issue; the people who say "resign" are guessing as there
is little/no evidence that resigning is actually a viable strategy. In fact,
up until I found that your new version removed signatures I had pretty
much figured that this was a tempest in a teapot because the vast majority
of first party DKIM signatures pass verification through lists in an actual
large  deployment.

Let me float this though: how about a "signature friendly" knob that
configures the list to not do things that are known to be harmful to
signatures (including s/mime and pgp for that matter). I don't think
this needs to be _especially_ complicated, but it would probably need
to be fleshed out.
>
> I really want to see the spec address mailing list issues in a 
> thorough way, with clear instructions on what such remailers must and 
> should do.  Then we can say "Mailman is broken wrt to the spec" or 
> "Mailman complies with the spec" or "Can someone please contribute 
> code to comply with the spec" or "the spec is broken, we don't agree 
> with it, so we won't support it and everyone should abandon Mailman" :).

I think it would actually work a lot better the other way: with real life
experience and real life running code we can make a much better case
for what constitutes a best common practice. Part of the problem right
now is that a lot of the speculation is just that.
>>
>> The bottom line here is that you are removing signatures that are not
>> broken. In fact, you don't even check to see if they're broken at all.
>> That's bad all around.
>
> We're removing signature that we know nothing about.  As I said, IWBNI 
> we had code that could check DKIM signatures and sign messages.  So a 
> question to ask, in the face of no available code to do the verifying 
> or signing, is it better to possibly break signatures because of 
> Mailman transformations or better to not have a signature at all.  And 
> why?

Do you remove PGP ascii armor just on the offhand chance that you might
destroy a PGP signature with some  configurations of mailman? By removing
signatures you go from having about a 99% success rate to a 0% success 
rate.
You don't have to have 100% success rate with filters to bias them to do the
right thing, but removing signatures makes it stand out for the *lack* 
of its
signature, especially given filters trained on signing all of their 
mail. As I
mentioned, we are planning to annotate messages that don't verify from our
domain. With this change there will be a lot more people getting useless
false positives. Is that of no consequence?

But let's turn this around: why do you think practice is helpful? I really
don't understand the motivation at all. Destroying information -- especially
when you're charged with forensic exercises like spam filters are -- is
*rarely* the right thing to do. It seems to me that the burden of proof
should be on why removing them is the right thing, not the other way
around.

       Mike
_______________________________________________
Mailman-Developers mailing list
Mailman-Developers@python.org
http://mail.python.org/mailman/listinfo/mailman-developers
Mailman FAQ: http://www.python.org/cgi-bin/faqw-mm.py
Searchable Archives: 
http://www.mail-archive.com/mailman-developers%40python.org/
Unsubscribe: 
http://mail.python.org/mailman/options/mailman-developers/archive%40jab.org

Security Policy: 
http://www.python.org/cgi-bin/faqw-mm.py?req=show&file=faq01.027.htp

Reply via email to