Re: [dmarc-ietf] Request for feedback: draft-ser-authentication-results-openpgp

2020-10-22 Thread Simon Ser
On Thursday, October 22, 2020 9:51 AM, Murray S. Kucherawy 
 wrote:

> On Mon, Oct 19, 2020 at 2:49 PM Simon Ser  wrote:
>
> > I've submitted a draft for a new Authentication-Results method a while
> > back [1]. I'd like to get some feedback.
> >
> > My use-case is: on a mailing list system [2], I'd like to display PGP
> > signature status, if a PGP signature is present. I'd like the
> > verification to happen once in a mail filter. Having a standardized
> > Authentication-Results method that mail filters can generate and mail
> > user agents can display would be helpful. A very similar thing is
> > already implemented for DKIM.
> >
> > Does this sounds like something worth doing?
>
> Your references to RFC 7601 should change to RFC 8601.

Good catch!

> Are there any existing implementations of MTAs that generate this, and MUAs 
> that consume it?

No, I wanted to try to standardize this before writing software that
depends on it. If you think software should come first, I could start
using an x- token or something.

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Request for feedback: draft-ser-authentication-results-openpgp

2020-10-22 Thread Simon Ser
Thanks for your reply.

On Tuesday, October 20, 2020 3:24 AM, John Levine  wrote:

> [ Replies sent to ietf-822 since this is unrelated to DMARC ]

(Sorry, I wasn't sure where to send this e-mail to.)

> In article 
> ZxWD3Yo-oiRI8Rq8k9H-7vG3Rgogp5lhNRwW3JcDUpFjHlfxgubW8rC5g4jQKWnhFazItAexGXsB4xMb69mZg2jRtuXEC7l1GxfmqdBbCOU=@emersion.fr
>  you write:
>
> > I've submitted a draft for a new Authentication-Results method a while
> > back 1. I'd like to get some feedback.
> > My use-case is: on a mailing list system 2, I'd like to display PGP
> > signature status, if a PGP signature is present. ...
>
> >
>
> > Does this sounds like something worth doing?
>
> Maybe, but probably not.
>
> DKIM is intended as a signature for messages in transit, applied as a
> message leaves its sending system and verified as it arrives at the
> recipient system. The sorts of changs made by list managers often
> break DKIM signatures, causing all sorts of excitement when DMARC
> is involved.
>
> PGP signatures (and S/MIME signatures) are normally applied and
> verified by the end-user mail programs. They're in the message body
> and the changes that list managers typically make, tagging the
> signature or adding body headers or footers, are unlikely to break a
> PGP signature.

I can think of ways a ML can change a PGP-signed message to make it
invalid. Adding a footer to all inline text parts for instance.

> Or to put it another way, if your A-R header said the PGP signature on
> the message contents was good, but the end user found it was bad, that
> would suggest something was screwed up, not normal mailing list
> processing.

I don't think I understand your point here.

I don't expect the A-R header of the mailing list server which relayed
the message to be preserved. In fact, many mail filters adding A-R will
just remove all existing A-R header fields.

In an email client, I may want to display the DKIM A-R result in the
UI. A bad DKIM signature might indicate an untrustworthy message.
Similarly, I may want to display the PGP signature verification result.

> PS: It's not unreasonble for a list manager to use a PGP signature to
> verify that it should forward a message, but there's not much use to
> adding a header saying it did so.

(My goal isn't to necessarily block messages with a bad PGP signature,
but rather display the PGP verification result in the mailing list
archives UI.)

Well, what's the use-case for A-R then? Couldn't the receiving server
check DKIM/DMARC without adding an A-R field and drop/quarantine
messages which fail this test?

My understanding was that A-R allows to have standardized email filters
that check DKIM/DMARC, put the result in a header field, and then
system administrators can consume this field and decide what to do. I
think this could apply to PGP as well.

I don't want to perform PGP key lookup and verification in the Web
server displaying the ML archives. I'd rather do this upon receiving
the message, in a completely isolated daemon (just like DKIM, e.g. with
OpenDKIM).

Thanks,

Simon

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


[dmarc-ietf] Request for feedback: draft-ser-authentication-results-openpgp

2020-10-19 Thread Simon Ser
Hi all,

I've submitted a draft for a new Authentication-Results method a while
back [1]. I'd like to get some feedback.

My use-case is: on a mailing list system [2], I'd like to display PGP
signature status, if a PGP signature is present. I'd like the
verification to happen once in a mail filter. Having a standardized
Authentication-Results method that mail filters can generate and mail
user agents can display would be helpful. A very similar thing is
already implemented for DKIM.

Does this sounds like something worth doing?

Thanks,

Simon

[1]: https://datatracker.ietf.org/doc/draft-ser-authentication-results-openpgp/
[2]: https://lists.sr.ht

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc