Re: [ietf-dkim] RFC4871bis - whether to drop -- h: Acceptable hash algorithms

2009-06-04 Thread Douglas Otis
On Jun 4, 2009, at 4:32 PM, Murray S. Kucherawy wrote: >> Disagree. This feature is about better informing recipients as to >> the >> status of the signature. > > For the sake of enumerating implementations, the current libdkim > implementation does make a distinction between a signature tha

Re: [ietf-dkim] RFC4871bis - whether to drop -- k: Key type

2009-06-04 Thread Douglas Otis
On Jun 4, 2009, at 3:46 PM, Jon Callas wrote: > > On Jun 4, 2009, at 2:18 PM, Douglas Otis wrote: > >> >> On Jun 4, 2009, at 11:34 AM, Jon Callas wrote: >>> >>> On Jun 3, 2009, at 10:53 PM, Eliot Lear wrote: >>> The basic question is simply this: is it sufficient to list the key algor

Re: [ietf-dkim] RFC4871bis - whether to drop -- h: Acceptable hash algorithms

2009-06-04 Thread Murray S. Kucherawy
> Disagree. This feature is about better informing recipients as to the > status of the signature. For the sake of enumerating implementations, the current libdkim implementation does make a distinction between a signature that failed to verify and one that couldn't be verified because the key'

Re: [ietf-dkim] RFC4871bis - whether to drop -- h: Acceptable hash algorithms

2009-06-04 Thread Mark Delany
>> If a site wanted to revoke instantly any signature previously >> generated with rsa-craphash, couldn't it just revoke its old keys >> and generate new keys, and begin signing with rsa-goodhash? > > Yes, it is a design feature of DKIM that an operational crypto error > can be instantly "revoked"

Re: [ietf-dkim] RFC4871bis - whether to drop -- k: Key type

2009-06-04 Thread Jon Callas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Jun 4, 2009, at 2:18 PM, Douglas Otis wrote: > > On Jun 4, 2009, at 11:34 AM, Jon Callas wrote: >> >> On Jun 3, 2009, at 10:53 PM, Eliot Lear wrote: >> >>> The basic question is simply this: is it sufficient to list the >>> key algorithm in the

Re: [ietf-dkim] RFC4871bis - whether to drop -- h: Acceptable hash algorithms

2009-06-04 Thread Douglas Otis
On Jun 4, 2009, at 2:55 PM, Murray S. Kucherawy wrote: TXT RR tags h: Acceptable hash algorithms > > If a site wanted to revoke instantly any signature previously > generated with rsa-craphash, couldn't it just revoke its old keys > and generate new keys, and begin signing

Re: [ietf-dkim] RFC4871bis - whether to drop -- h: Acceptable hash algorithms

2009-06-04 Thread Jon Callas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Jun 4, 2009, at 2:55 PM, Murray S. Kucherawy wrote: TXT RR tags h: Acceptable hash algorithms The spec needs to define the supported set of hash algorithms. There may be some value in a signer being able to

Re: [ietf-dkim] RFC4871bis - whether to drop -- h: Acceptable hash algorithms

2009-06-04 Thread Murray S. Kucherawy
> >> TXT RR tags > >> > >> h: Acceptable hash algorithms > >> > >> The spec needs to define the supported set of hash algorithms. There > >> may be some value in a signer being able to state that they're using > >> an algorithm that isn't supported, perhaps. > >> > >> But unless there is a vi

Re: [ietf-dkim] chained signatures, was l= summary

2009-06-04 Thread Murray S. Kucherawy
> The issue of A-R headers being trusted only when signed by DKIM runs > counter to their intended use. That's not necessarily true. You're making hard assertions about a fuzzy situation. DKIM signing might work just fine in certain installations. That's why RFC5451 suggests doing this withou

Re: [ietf-dkim] RFC4871bis - whether to drop -- k: Key type

2009-06-04 Thread J.D. Falk
Wietse Venema wrote: > Siegel, Ellen: Eliot Lear wrote: > The basic question is simply this: is it sufficient to list the key > algorithm in the header? I don't see a plausible attack, so I'm okay +1 >>> +1 >>> > with that. But let's at least have the debate based on facts.

Re: [ietf-dkim] RFC4871bis - whether to drop -- k: Key type

2009-06-04 Thread Douglas Otis
On Jun 4, 2009, at 11:34 AM, Jon Callas wrote: > > On Jun 3, 2009, at 10:53 PM, Eliot Lear wrote: > >> The basic question is simply this: is it sufficient to list the key >> algorithm in the header? I don't see a plausible attack, so I'm >> okay with that. But let's at least have the debate

Re: [ietf-dkim] incompetent list managers, was chained signatures, was l= summary

2009-06-04 Thread John Levine
> A competent mailing list admin would reject all messages from > dubious sources. But it would be foolish to assume that all such > admins are as competent as we would wish. So the mere fact that they > (re)sign messages does not prove their origin, except insofar as you > are prepared to have con

Re: [ietf-dkim] chained signatures, was l= summary

2009-06-04 Thread Douglas Otis
On Jun 4, 2009, at 5:20 AM, Charles Lindsey wrote: > On Wed, 03 Jun 2009 17:13:02 +0100, Murray S. Kucherawy > wrote: > >>> WTF is the point of inserting an A-R header if you are not willing >>> to take responsibility for what you have done by signing it? >>> >>> And why should anyone else bel

Re: [ietf-dkim] RFC4871bis - whether to drop -- k: Key type

2009-06-04 Thread Jon Callas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Jun 3, 2009, at 10:53 PM, Eliot Lear wrote: > The basic question is simply this: is it sufficient to list the key > algorithm in the header? I don't see a plausible attack, so I'm okay > with that. But let's at least have the debate based on fac

Re: [ietf-dkim] RFC4871bis - whether to drop -- k: Key type

2009-06-04 Thread Wietse Venema
Siegel, Ellen: > > > > Eliot Lear wrote: > > > > The basic question is simply this: is it sufficient to list the key > > > > algorithm in the header? I don't see a plausible attack, so I'm okay > > > > > > +1 > > > > +1 > > > > > > with that. But let's at least have the debate based on facts.

Re: [ietf-dkim] RFC4871bis - whether to drop -- k: Key type

2009-06-04 Thread Siegel, Ellen
> > Eliot Lear wrote: > > > The basic question is simply this: is it sufficient to list the key > > > algorithm in the header? I don't see a plausible attack, so I'm okay > > > > +1 > > +1 > > > > with that. But let's at least have the debate based on facts. > > > > yup. > > +1 > +1 Ellen

Re: [ietf-dkim] RFC4871bis - whether to drop -- k: Key type

2009-06-04 Thread Murray S. Kucherawy
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim- > boun...@mipassoc.org] On Behalf Of Dave CROCKER > Sent: Wednesday, June 03, 2009 11:13 PM > To: ietf-dkim@mipassoc.org >> DKIM IETF WG > Subject: Re: [ietf-dkim] RFC4871bis - whether to drop -- k: Key type > >

Re: [ietf-dkim] chained signatures, was l= summary

2009-06-04 Thread Michael Thomas
Charles Lindsey wrote: > On Wed, 03 Jun 2009 17:13:02 +0100, Murray S. Kucherawy > wrote: > >>> WTF is the point of inserting an A-R header if you are not willing to >>> take responsibility for what you have done by signing it? >>> >>> And why should anyone else believe your A-R if you have omi

Re: [ietf-dkim] chained signatures, was l= summary

2009-06-04 Thread Charles Lindsey
On Wed, 03 Jun 2009 17:13:02 +0100, Murray S. Kucherawy wrote: >> WTF is the point of inserting an A-R header if you are not willing to >> take responsibility for what you have done by signing it? >> >> And why should anyone else believe your A-R if you have omitted that >> elementary step? > >

Re: [ietf-dkim] chained signatures, was l= summary

2009-06-04 Thread Charles Lindsey
On Wed, 03 Jun 2009 14:58:06 +0100, John Levine wrote: > The most common use of A-R will likely involve a secure channel > between the place where it's applied and the place where it's > interpreted, e.g., it's applied at a border MTA and it's interpreted > in a downstream MTA or MUA within the s