Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-12-08 Thread Douglas Otis
I support adoption of dkim-atps as an experimental RFC.  It would have 
been clearer to use the term Author-Domain rather than Author.  Clearly, 
it is not the Author offering Authorization.


-Doug
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-12-08 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of 
 Douglas Otis
 Sent: Thursday, December 08, 2011 10:12 AM
 To: ietf@ietf.org
 Subject: Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized 
 Third-Party Signers) to Experimental RFC
 
 I support adoption of dkim-atps as an experimental RFC.  It would have
 been clearer to use the term Author-Domain rather than Author.
 Clearly, it is not the Author offering Authorization.

This has already been fixed in the working copy, which I'll post after the IETF 
LC closes.

-MSK
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-12-05 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of John 
 Levine
 Sent: Sunday, December 04, 2011 1:28 PM
 To: ietf@ietf.org
 Cc: dcroc...@bbiw.net
 Subject: Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized 
 Third-Party Signers) to Experimental RFC
 
 ADSP already dictates use of the From: domain.  ATPS is a modification
 to ADSP.  It doesn't change anything that DKIM reports, only the rule
 for deciding whether ADSP finds an Author Domain Signature.

ATPS can be applied without ADSP by a Verifier that cares about author domain 
signatures in its own way, so it's not a direct modification to ADSP.  But 
there is a section that discusses how they work in tandem.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-12-05 Thread Dave CROCKER


On 12/4/2011 1:27 PM, John Levine wrote:

ADSP already dictates use of the From: domain.


The the nature ADSP's use of the From: domain is fundamentally different from 
ATPS' use.


Broadly, we can distinguish:

   Name extraction:determining what name is being claimed

   Name verification:  determining that the use of the name is authorized

   Name assessment:determining whether the name is associated with good
   or bad actor.

ADSP adds a constraint on name verification; it mandates that at least one DKIM 
d= name match the domain in the From: field.


ATPS essentially modifies name extraction, by making it a two-step process. The 
first step is the usual one, with d=, for use with validation, but the second 
one takes the domain in the From: field and makes it the output string to the 
assessment process.



 ATPS is a modification

to ADSP.  It doesn't change anything that DKIM reports, only the rule
for deciding whether ADSP finds an Author Domain Signature.


While yes it has text pertaining to ADSP, I will claim that with ADSP, too, the 
modification is in name extraction rather than validation or assessment.


d/

--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-12-05 Thread Dave CROCKER



On 11/30/2011 1:03 PM, Barry Leiba wrote:

In plain English, this reads as an update of ADSP but this draft does not
  update RFC 5617.

It does not.  There's no reason that anyone implementing ADSP need pay
attention to this.*IF*  you implement this, it might change your
behaviour with respect to ADSP, but information about that is
contained here.  There's no reason for this to update 5617 in the
IETF sense.



I think Barry's characterization is correct.  The word update can have some 
different uses in this realm.


In IETF RFC formal lingo, I believe update means that the new spec is 
modifying the core document.  It really is, therefore, to be taken as part of 
that core document's text.


In a very different sense, some specification provide optional value-add to a 
core spec.  Using that enhancement is optional; so it's no part of the core. 
However, if one chooses to use the enhancement, then yes the enhancements 
updates some aspect of the core.


I believe that ATPS is the latter form of update to DKIM and ADSP.

d/

--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-12-05 Thread John R. Levine
ATPS essentially modifies name extraction, by making it a two-step process. 
The first step is the usual one, with d=, for use with validation, but the 
second one takes the domain in the From: field and makes it the output string 
to the assessment process.


If you're referring to the second paragraph in section 5, I agree that the 
second sentence should go, or at least be rewritten to clarify that the 
client is supposed to pretend that the message passed ADSP.  If it's 
anything else in atps-11, you'll have to help me out with references to 
specific language.


R's,
John
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-12-05 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of John 
 R. Levine
 Sent: Monday, December 05, 2011 5:25 PM
 To: Dave Crocker
 Cc: ietf@ietf.org
 Subject: Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized 
 Third-Party Signers) to Experimental RFC
 
 If you're referring to the second paragraph in section 5, I agree that
 the second sentence should go, or at least be rewritten to clarify that
 the client is supposed to pretend that the message passed ADSP.  If
 it's anything else in atps-11, you'll have to help me out with
 references to specific language.

But that's what Section 6 says.

Section 5 is for those people that do DKIM without ADSP but care about giving 
author domain signatures preferential treatment.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-12-05 Thread John Levine
Section 5 is for those people that do DKIM without ADSP but care about
giving author domain signatures preferential treatment.

Since there's nothing in the DKIM spec that suggests that's a correct
way to use DKIM, I'd be fairly unhappy about any language that
purports to legitimize it.

Here in standards-land, if you think that author domain signatures
matter, you're supposed to use ADSP.

R's,
John
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-12-04 Thread Murray S. Kucherawy
 -Original Message-
 From: Rolf E. Sonneveld [mailto:r.e.sonnev...@sonnection.nl]
 Sent: Saturday, December 03, 2011 4:49 AM
 To: Murray S. Kucherawy
 Cc: ietf@ietf.org
 Subject: Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized 
 Third-Party Signers) to Experimental RFC
 
 Hi, Murray,
 
 having read the draft I support its publication as experimental RFC. One
 suggestion: under 'Security Considerations' add a reference to what is
 said about DNSSEC in RFC6376 par. 8.5. In my opinion, the same
 consideration applies for this ATPS document.

Thanks; I've added that to the working copy.

Cheers,
-MSK
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-12-04 Thread Murray S. Kucherawy
 -Original Message-
 From: Dave CROCKER [mailto:d...@dcrocker.net]
 Sent: Saturday, December 03, 2011 10:38 AM
 To: Murray S. Kucherawy
 Cc: ietf@ietf.org
 Subject: Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized 
 Third-Party Signers) to Experimental RFC
 
 
 So I suggest for the Abstract:
 
 This specification modifies Domain Keys
 Identified Mail (DKIM) by allowing advertisement of third-party
 signature authorizations that are to be interpreted as equivalent to a
 signature by the administrative domain of a message's author. The 
 supplement
 initially has Experimental status.
 
 (I think it's important for an Abstract to summarize the core
 semantic.)

I'm a little worried about using this kind of language in something 
Experimental when referencing a Draft Standard.  My understanding is that the 
former can't formally modify the latter.  So instead of This specification 
modifies, I'd be comfortable with This experimental specification proposes a 
modification to, or suchlike.  Should it earn its way up to the Standards 
Track, your wording would be adopted.

 I also suggest:
 
 3. Discussion
 ...
 
 o  Signers, who send mail on behalf of Authors and apply [DKIM]
signatures using their own domains; and
 
 -
 
 o  Signer, which applies a [DKIM] signature using its own domain,
but on behalf of the message's Author ADMD; and

OK.

 { Stylistically, I find that specification text is easier when things
 are written in the singular.  So I suggest author (ADMD), signer and
 verifier, rather than their plural form. }

I would agree, but in fact when ATPS is in use there are at least two ADMDs and 
there may be multiple signers involved for a single verifier, so the plural 
seems more illustrative here.

 A Verifier participates in this protocol if it wishes to ensure that
 a message bears one or more signatures from sources approved to sign
 mail on behalf of the Author, and identify for special treatment mail
 that meets (or does not meet) that criterion.
 
 -
 
 A Verifier participating in this protocol treats the signer's
 authorization on behalf of the author's ADMD as meaning that the signer's
 signature is equivalent to a signature by the author's ADMD.

That ascribes semantics that are discussed later.  This section is really 
trying to describe the potential audience first, leaving an actual description 
of the mechanism for later.  So I'd prefer a merge of the two, something like:

t A Verifier participates in this protocol if it wishes
to ensure that a message bears one or more signatures
from sources authorized to sign mail on behalf of the
ADMD, and identify for special treatment mail
that meets (or does not meet) that criterion.  It
will do so by treating the signer's authorization on
behalf of the author's ADMD as meant that the signer's
signature is equivalent to one affixed by the
author's ADMD. /t

 On re-reading, I think this also warrants an enhanced statement in the
 Introduction (roughly from the view that an Introduction expands on the
 Abstract.)
 
 So:
 
 Absent is a protocol by which an ADMD can announce that DKIM
 signatures on its mail added by other ADMDs should also be considered
 trustworthy by verifiers.  This memo presents an experimental
 mechanism for doing so.
 
 -
 
 Absent is a protocol by which an Author ADMD can announce that specific
 DKIM signatures on its mail, which are added by other ADMDs, are to
 treated the same as a signature by the Author ADMD itself.  This memo
 presents an experimental mechanism for doing so.

OK.

 {BTW, the document should be sanitized of normative vocabulary that is
 not meant to be normative.  That is, replace should, must and may with
 synonyms. }

Done.

 Thinking a bit more about this, actually, I think it is.
 
 With a normal DKIM signature, the d= string is taken as the output to the
 higher-level module that then makes whatever reputation (or the like) 
 assessment
 that is to be performed.
 
 With ATPS, the requirement is to replace the d= string with the domain name 
 from
 the From: field.  That replacement value is then passed to the
 assessment module.
 
 In other words, DKIM provides it's own identifier to be used for assessment,
 whereas ATPS dictates use of the From: field domain name for
 assessment.
 
 That's a fundamental change in semantics.

If you are using ATPS, sure.  So ATPS augments DKIM's semantics if you're using 
it.  But I don't think it's reasonable to say this is any kind of update to 
DKIM itself, at least not in the way the IETF uses the term Updates as it 
refers to RFCs.

At any rate, I think this draft already does make it clear that it's doing 
something quite beyond what DKIM

Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-12-04 Thread John Levine
With ATPS, the requirement is to replace the d= string with the domain name 
from 
the From: field.  That replacement value is then passed to the assessment 
module.

In other words, DKIM provides it's own identifier to be used for assessment, 
whereas ATPS dictates use of the From: field domain name for assessment.

At least one of us is confused here.

ADSP already dictates use of the From: domain.  ATPS is a modification
to ADSP.  It doesn't change anything that DKIM reports, only the rule
for deciding whether ADSP finds an Author Domain Signature.  

With or without ADSP or ATPS, DKIM returns a possibly empty list of d=
domains from valid signatures.  ADSP returns the practices value
(unknown/all/discardable) and a bit whether it found an Author Domain
signature.  Since there might be multiple DKIM signatures, even if
ADSP says it found an Author Domain signature, you can't assume a d=
domain had any relationship to the From: domain.

It's true that ATPS adds a field to DKIM signatures that doesn't
affect DKIM evaluation, but DKIM already knows how to skip over fields
it doesn't understand.

R's,
John
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-12-03 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Dave CROCKER
 Sent: Friday, December 02, 2011 3:59 PM
 To: SM
 Cc: ietf@ietf.org
 Subject: Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized 
 Third-Party Signers) to Experimental RFC
 
 On 11/30/2011 12:34 PM, SM wrote:
  Readers should be familiar with the material and terminology
  discussed in [MAIL] and [EMAIL-ARCH].
 
  The references to RFC 5598 and RFC 5322 should be normative.
 
 Arguably, they already are:  the text says should and that's a
 normative term in the document...  (but no, I doubt Murray, really
 intended it and for some odd reason, I agree both docs /should/ be
 normative...)

Yes, I've already changed my working copy.

  In Section 3:
 
  An Author participates in this protocol if it wishes to announce that
  a message from it (in the RFC5322.From sense) should be considered
  authentic as long as it bears a signature from any in a set of
  specified domains.
 
  It's the domain and not the author which participates in this
 protocol.
 
 +1
 [...]

The working copy now uses ADMD.

  The Abstract section uses the term authorization whereas authentic
  is used in the above text. Shouldn't that be considered as authorized?
 
 +1 on the concern about using the correct term.
 
 The document needs to be much more clear and precise about this, since
 it is the essential semantic behind the spec and I think the current
 text is a bit confusing in that regard.

SM and I agreed that changing it to authorized and also making reference to 
Section 1.5.2 of RFC5451 for a bit of further explanation should make it 
clearer, so that's done in the working copy.

 Does a signature by this on behalf of signer mean something different
 from a regular DKIM signature?  It appears the current text means the
 answer to be yes.

Correct, inasmuch as there are some people in the community who think author 
domain signatures might be more important or valuable than others.  This memo 
doesn't make such an assertion, but merely acknowledges that perception.

   It should say this explicitly.  If it is not redefining the existing,
 core DKIM semantic, it should say so.  If it /is/ changing basic DKIM
 semantics, then this is more than an extension to DKIM.

It is not.

Section 1 of this draft reiterates that DKIM's core semantics don't extend to 
any kind of binding of the delivered, validated domain name to any part of the 
message.  However, there are some people who believe that such a binding is 
valid and useful.  This draft is meant for those people, without altering 
DKIM's base semantics.

 I suggest that the incremental semantic should merely be that the
 signature by an authorized signer should be interpreted as if the
 signature had been by the authorizing domain.
 
 It's a simple semantic and is, frankly, what I think is intended, based
 on the discussions surrounding this mechanism that I've heard.

This is stated in Sections 5 and 6.

  In plain English, this reads as an update of ADSP but this draft does not 
  update
  RFC 5617.
 
 +1

The definition used for Updates, as I understand it, is that we say X 
updates Y if someone implementing X really needs also to read Y in order to 
implement X completely.  I don't think that's true here.  In this case, RFC5617 
stands on its own just fine without this addition.

If I should be using some other criteria for doing the Updates, please let me 
know.

  The IANA Considerations section is unusual. If no action is required at this
  time, the sub-sections are not needed. I suggest updating the DKIM- 
  Signature
  Tag Specification Registry for the tags as they will appear on the 
  Internet.
 
 +1

The working copy already has this change; specifically, Section 8.1 is still 
the template for a future registry creation, but the remaining subsections are 
now actionable by IANA.

-MSK

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-12-03 Thread Rolf E. Sonneveld

Hi, Murray,

having read the draft I support its publication as experimental RFC. One 
suggestion: under 'Security Considerations' add a reference to what is 
said about DNSSEC in RFC6376 par. 8.5. In my opinion, the same 
consideration applies for this ATPS document.


/rolf

On 12/3/11 9:32 AM, Murray S. Kucherawy wrote:

-Original Message-
From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
Dave CROCKER
Sent: Friday, December 02, 2011 3:59 PM
To: SM
Cc: ietf@ietf.org
Subject: Re: Last Call:draft-kucherawy-dkim-atps-11.txt  (DKIM Authorized 
Third-Party Signers) to Experimental RFC

On 11/30/2011 12:34 PM, SM wrote:

Readers should be familiar with the material and terminology
discussed in [MAIL] and [EMAIL-ARCH].

The references to RFC 5598 and RFC 5322 should be normative.

Arguably, they already are:  the text says should and that's a
normative term in the document...  (but no, I doubt Murray, really
intended it and for some odd reason, I agree both docs /should/ be
normative...)

Yes, I've already changed my working copy.


In Section 3:

An Author participates in this protocol if it wishes to announce that
a message from it (in the RFC5322.From sense) should be considered
authentic as long as it bears a signature from any in a set of
specified domains.

It's the domain and not the author which participates in this

protocol.

+1
[...]

The working copy now uses ADMD.


The Abstract section uses the term authorization whereas authentic
is used in the above text. Shouldn't that be considered as authorized?

+1 on the concern about using the correct term.

The document needs to be much more clear and precise about this, since
it is the essential semantic behind the spec and I think the current
text is a bit confusing in that regard.

SM and I agreed that changing it to authorized and also making reference to 
Section 1.5.2 of RFC5451 for a bit of further explanation should make it clearer, so 
that's done in the working copy.


Does a signature by this on behalf of signer mean something different
from a regular DKIM signature?  It appears the current text means the
answer to be yes.

Correct, inasmuch as there are some people in the community who think author 
domain signatures might be more important or valuable than others.  This memo 
doesn't make such an assertion, but merely acknowledges that perception.


   It should say this explicitly.  If it is not redefining the existing,
core DKIM semantic, it should say so.  If it /is/ changing basic DKIM
semantics, then this is more than an extension to DKIM.

It is not.

Section 1 of this draft reiterates that DKIM's core semantics don't extend to 
any kind of binding of the delivered, validated domain name to any part of the 
message.  However, there are some people who believe that such a binding is 
valid and useful.  This draft is meant for those people, without altering 
DKIM's base semantics.


I suggest that the incremental semantic should merely be that the
signature by an authorized signer should be interpreted as if the
signature had been by the authorizing domain.

It's a simple semantic and is, frankly, what I think is intended, based
on the discussions surrounding this mechanism that I've heard.

This is stated in Sections 5 and 6.


In plain English, this reads as an update of ADSP but this draft does not update
RFC 5617.

+1

The definition used for Updates, as I understand it, is that we say X updates 
Y if someone implementing X really needs also to read Y in order to implement X completely.  
I don't think that's true here.  In this case, RFC5617 stands on its own just fine without this 
addition.

If I should be using some other criteria for doing the Updates, please let me 
know.


The IANA Considerations section is unusual. If no action is required at this
time, the sub-sections are not needed. I suggest updating the DKIM- Signature
Tag Specification Registry for the tags as they will appear on the Internet.

+1

The working copy already has this change; specifically, Section 8.1 is still 
the template for a future registry creation, but the remaining subsections are 
now actionable by IANA.

-MSK

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-12-03 Thread Dave CROCKER


On 12/3/2011 12:32 AM, Murray S. Kucherawy wrote:

Does a signature by this on behalf of signer mean something different
from a regular DKIM signature?  It appears the current text means the
answer to be yes.


Correct, inasmuch as there are some people in the community who think author
domain signatures might be more important or valuable than others.  This memo
doesn't make such an assertion, but merely acknowledges that perception.


Understood.  I meant the this as a writing question; the meaning wasn't clear to 
me and I think it needs to be easily clear to the reader.


So I suggest for the Abstract:

   This specification modifies Domain Keys
   Identified Mail (DKIM) by allowing advertisement of third-party
   signature authorizations that are to be interpreted as equivalent to a
   signature by the administrative domain of a message's author. The supplement
   initially has Experimental status.

(I think it's important for an Abstract to summarize the core semantic.)

Also, the original text said 'originator' and I think you don't mean that, since 
that equates to the Sender: field and not the From: field, per RFC 5598.


I also suggest:


   3. Discussion
   ...



   o  Signers, who send mail on behalf of Authors and apply [DKIM]
  signatures using their own domains; and


   -

   o  Signer, which applies a [DKIM] signature using its own domain,
  but on behalf of the message's Author ADMD; and

{ Stylistically, I find that specification text is easier when things are 
written in the singular.  So I suggest author (ADMD), signer and verifier, 
rather than their plural form. }


and


   A Verifier participates in this protocol if it wishes to ensure that
   a message bears one or more signatures from sources approved to sign
   mail on behalf of the Author, and identify for special treatment mail
   that meets (or does not meet) that criterion.


   -

   A Verifier participating in this protocol treats the signer's
   authorization on behalf of the author's ADMD as meaning that the signer's
   signature is equivalent to a signature by the author's ADMD.

That is, I'm pressing for having this semantic made clear more than once in the 
document, even though it needs formal, normative assertion only once (of course).


On re-reading, I think this also warrants an enhanced statement in the 
Introduction (roughly from the view that an Introduction expands on the Abstract.)


So:


   Absent is a protocol by which an ADMD can announce that DKIM
   signatures on its mail added by other ADMDs should also be considered
   trustworthy by verifiers.  This memo presents an experimental
   mechanism for doing so.


   -

   Absent is a protocol by which an Author ADMD can announce that specific
   DKIM signatures on its mail, which are added by other ADMDs, are to
   treated the same as a signature by the Author ADMD itself.  This memo
   presents an experimental mechanism for doing so.

{BTW, the document should be sanitized of normative vocabulary that is not meant 
to be normative.  That is, replace should, must and may with synonyms. }




   It should say this explicitly.  If it is not redefining the existing,
core DKIM semantic, it should say so.  If it /is/ changing basic DKIM
semantics, then this is more than an extension to DKIM.


It is not.


Thinking a bit more about this, actually, I think it is.

With a normal DKIM signature, the d= string is taken as the output to the 
higher-level module that then makes whatever reputation (or the like) assessment 
that is to be performed.


With ATPS, the requirement is to replace the d= string with the domain name from 
the From: field.  That replacement value is then passed to the assessment module.


In other words, DKIM provides it's own identifier to be used for assessment, 
whereas ATPS dictates use of the From: field domain name for assessment.


That's a fundamental change in semantics.



Section 1 of this draft reiterates that DKIM's core semantics don't extend
toany kind of binding of the delivered, validated domain name to any part of the
message. However, there are some people who believe that such a binding is valid
and useful. This draft is meant for those people, without altering DKIM's base
semantics.


ack.



I suggest that the incremental semantic should merely be that the
signature by an authorized signer should be interpreted as if the
signature had been by the authorizing domain.

It's a simple semantic and is, frankly, what I think is intended, based
on the discussions surrounding this mechanism that I've heard.


This is stated in Sections 5 and 6.


Indeed, they do.

And while we're in Section 5 (DKIM):  the SHOULD needs to be a MUST.

With respect to DKIM itself, this new mechanism has one simple semantic:  Use 
the domain name in the From: field as the output.  That's not optional and 
that's not modifiable.  If the verifier is playing in the ATPS sandbox, that's 
the single immutable requirement.


With respect to 

Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-12-02 Thread Hector

Dave CROCKER wrote:


On 11/30/2011 8:09 PM, Murray S. Kucherawy wrote:
As the draft says, the point is to make the idea available and see if 
it sticks to anyone or anything.  If the bulk senders (or receivers) 
do decide they collectively want this, there's something for them to 
try and report back.


if one thinks the mechanism is a bad idea, it's still worth having a 
good document to describe it.l


The usual people with DKIM continue to utterly surprise me.

#1 The Author Domain verification was always in DKIM since its 
conception, especially as a selling and marketing point, in its 
presentations, and its description to news rags publishers.  It was 
sold DKIM to me as a proof of concept.


#2 It was burned into the APIs available.

#3 It was burned into your DKIM Architectural Framework RFC5585 and it 
even included nice pretty ASCII-ART pictures that I am sure you are 
proud of:



|
|- RFC5322 Message
V
 ++
 |  Message Signed?   |
 +-++-+
   |yes  |no
   | |
   |SDID/AUID|AUID
   | |
   V |
 +-+ SDID/AUID   |
 |  Verify +-+   |
 |  Signature  | |   |
 +--+--+ |   |
pass|fail|   |
V|   |
 +-+ |   |
 |SDID | |   |
 | Assessments | |   |
 | | V   V
 +-+--++  +---+
 ||  / Check   \
 |+--SDID--/  Signing  \
 | /   Practices \
 |+---+---+
 ||
 VV


The issue was always how to implement it for 3rd party Signers once 
the DKIM mindset in its eventual RFC changed to a 3rd party signer 
TRUST vendor and vainly tried unsuccessfully to remove the Author 
Domain from the DKIM picture.


The methods for 3rd party Authorization were long conceived and the 
only problem was how to scale it in DNS.  This I-D simply took and 
existing idea of having an Authorized Signer List (ASL) and offers a 
way to scale it.


We are probably the only vendor in the market to actively supports 
both the ASL idea and the ATPS idea.  This is a web-based wizard we 
provided to customers before an internal version was provided:


   http://www.winserver.com/public/wcadsp/default.wct

It allows for DKIM author domains to create DNS records with ASL tags 
for ADSP records and also add ATPS sub-domain records with the BASE32 
hash of the ASL domains.


The bottom line, the proof of concept works, just like it always did 
since it Author Domain validation was originally conceived in DKIM 
v1.0.The ASL and ATPS ideas simply offers a way to address the 
long time issues of the 3rd party signer.


The idea is good for the smaller scale. For the larger scale, it still 
remains a problem.


Implementation wise, it is very complex and unless the DKIM system 
offers the automation tools, its harder to get the layman operator to 
begin doing it on its own.  After all, with ATPS, you have to get a 
utility to do the BASE32 hashing.


Finally, the public Wizard focused on Windows based records, a real 
one has to cover both and its needs to be BATCH so that any updates 
are automatically and/or delayed updated in the DNS server databases. 
 i.e. individual updating was not good enough.



Thanks

--
Hector Santos, CTO
http://www.santronics.com
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-12-02 Thread Dave CROCKER



On 11/30/2011 12:34 PM, SM wrote:

Readers should be familiar with the material and terminology
discussed in [MAIL] and [EMAIL-ARCH].

The references to RFC 5598 and RFC 5322 should be normative.


Arguably, they already are:  the text says should and that's a normative term 
in the document...  (but no, I doubt Murray, really intended it and for some odd 
reason, I agree both docs /should/ be normative...)




In Section 3:

An Author participates in this protocol if it wishes to announce that
a message from it (in the RFC5322.From sense) should be considered
authentic as long as it bears a signature from any in a set of
specified domains.

It's the domain and not the author which participates in this protocol.


+1

Domain-based identification roughly equates to organizational, not personal, 
actors.  Although the document appears to define the term Author precisely and 
use it consistently within the document, the particular label that's been chosen 
is likely to encourage confusion with the reader who will think that author 
means the /person/ that wrote the message.


Alternative terms to consider:

   Author Domain

   Organization

   Administrative Domain (ADMD)



The Abstract section uses the term authorization whereas authentic is used
in the above text. Shouldn't that be considered as authorized?


+1 on the concern about using the correct term.

The document needs to be much more clear and precise about this, since it is the 
essential semantic behind the spec and I think the current text is a bit 
confusing in that regard.


Does a signature by this on behalf of signer mean something different from a 
regular DKIM signature?  It appears the current text means the answer to be yes. 
 It should say this explicitly.  If it is not redefining the existing, core 
DKIM semantic, it should say so.  If it /is/ changing basic DKIM semantics, then 
this is more than an extension to DKIM.


I suggest that the incremental semantic should merely be that the signature by 
an authorized signer should be interpreted as if the signature had been by the 
authorizing domain.


It's a simple semantic and is, frankly, what I think is intended, based on the 
discussions surrounding this mechanism that I've heard.





In Section 6:

A Verifier implementing both ADSP and ATPS SHOULD treat a message for
which the ATPS test described above passes as if it were signed by
the author domain. That is, a pass of ATPS means a pass for ADSP.



In plain English, this reads as an update of ADSP but this draft does not update
RFC 5617.


+1



In Section 8:

No actions are required by IANA at this time. The following need
only be applied if and when this specification reaches the Standards
Track.

The IANA Considerations section is unusual. If no action is required at this
time, the sub-sections are not needed. I suggest updating the DKIM-Signature
Tag Specification Registry for the tags as they will appear on the Internet.


+1


d/
--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-12-01 Thread Frank Ellermann
On 1 December 2011 05:09, Murray S. Kucherawy m...@cloudmark.com wrote:

 so long as experimental-status drafts are allowed to make IANA
 registrations. (I thought they weren't, which is why it is the
 way it is right now.)

Depends on the registry, some registrations need standards track,
others want published RFC, some need IETF consensus, and so on,
down to first come first served.  The author of RFC 5451 wants
published RFC with IETF review. that's below standards track,
or in other words, IETF experimental with IETF Last Call is okay.

-Frank
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-11-30 Thread SM

At 11:38 30-11-2011, The IESG wrote:


The IESG has received a request from an individual submitter to consider
the following document:
- 'DKIM Authorized Third-Party Signers'
  draft-kucherawy-dkim-atps-11.txt as an Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2011-12-28. Exceptionally, comments may be


In Section 2:

  Readers should be familiar with the material and terminology
   discussed in [MAIL] and [EMAIL-ARCH].

The references to RFC 5598 and RFC 5322 should be normative.

In Section 3:

  An Author participates in this protocol if it wishes to announce that
   a message from it (in the RFC5322.From sense) should be considered
   authentic as long as it bears a signature from any in a set of
   specified domains.

It's the domain and not the author which participates in this 
protocol.  As a nit, the RFC 5598 term looks more like Originator 
instead of Author.


The Abstract section uses the term authorization whereas 
authentic is used in the above text.  Shouldn't that be considered 
as authorized?


In Section 4.1:

  When the Signer generates a DKIM signature on behalf of an Author, it
   MUST include an atps tag in the signature and include as its value
   the Author's domain name.

See above comment about originator.

In Section 6:

  A Verifier implementing both ADSP and ATPS SHOULD treat a message for
   which the ATPS test described above passes as if it were signed by
   the author domain.  That is, a pass of ATPS means a pass for ADSP.

In plain English, this reads as an update of ADSP but this draft does 
not update RFC 5617.


In Section 8:

  No actions are required by IANA at this time.  The following need
   only be applied if and when this specification reaches the Standards
   Track.

The IANA Considerations section is unusual.  If no action is required 
at this time, the sub-sections are not needed.  I suggest updating 
the DKIM-Signature Tag Specification Registry for the tags as they 
will appear on the Internet.


Regards,
-sm 


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-11-30 Thread Barry Leiba
  Readers should be familiar with the material and terminology
   discussed in [MAIL] and [EMAIL-ARCH].

 The references to RFC 5598 and RFC 5322 should be normative.

I agree; I missed that in my shepherd review.  So sorry.

  A Verifier implementing both ADSP and ATPS SHOULD treat a message for
   which the ATPS test described above passes as if it were signed by
   the author domain.  That is, a pass of ATPS means a pass for ADSP.

 In plain English, this reads as an update of ADSP but this draft does not
 update RFC 5617.

It does not.  There's no reason that anyone implementing ADSP need pay
attention to this.  *IF* you implement this, it might change your
behaviour with respect to ADSP, but information about that is
contained here.  There's no reason for this to update 5617 in the
IETF sense.

 The IANA Considerations section is unusual.  If no action is required at
 this time, the sub-sections are not needed.

I did call this out in my shepherd review (see the PROTO writeup:
https://datatracker.ietf.org/doc/draft-kucherawy-dkim-atps/history/
and click show all on the PROTO writeup entry; side point: it should
probably be easier to get to the PROTO writeup for a document).

I actually think it's clever to put the information here in this
manner, but, as I say in the writeup, it is unusual.  I prefer that we
leave it here, and just make sure that the intelligent folks at IANA
do the intelligent thing.  This can then serve as a template for the
IANA Considerations section for a possible revision that moves ATPS to
Standards Track, should that happen.

Barry, document shepherd
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-11-30 Thread SM

Hi Barry,
At 13:03 30-11-2011, Barry Leiba wrote:

It does not.  There's no reason that anyone implementing ADSP need pay
attention to this.  *IF* you implement this, it might change your
behaviour with respect to ADSP, but information about that is
contained here.  There's no reason for this to update 5617 in the
IETF sense.


Ok.


I did call this out in my shepherd review (see the PROTO writeup:
https://datatracker.ietf.org/doc/draft-kucherawy-dkim-atps/history/
and click show all on the PROTO writeup entry; side point: it should
probably be easier to get to the PROTO writeup for a document).


I missed that.


I actually think it's clever to put the information here in this
manner, but, as I say in the writeup, it is unusual.  I prefer that we
leave it here, and just make sure that the intelligent folks at IANA
do the intelligent thing.  This can then serve as a template for the
IANA Considerations section for a possible revision that moves ATPS to
Standards Track, should that happen.


Agreed.

I support publication of the draft as Experimental.

Regards,
-sm 


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-11-30 Thread Murray S. Kucherawy
Hi, SM.  Thanks for your comments.

In reply to the stuff Barry hasn't already covered:

 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of SM
 Sent: Wednesday, November 30, 2011 12:35 PM
 To: ietf@ietf.org
 Subject: Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized 
 Third-Party Signers) to Experimental RFC
 
 In Section 3:
 
An Author participates in this protocol if it wishes to announce that
 a message from it (in the RFC5322.From sense) should be considered
 authentic as long as it bears a signature from any in a set of
 specified domains.
 
 It's the domain and not the author which participates in this protocol.
 As a nit, the RFC 5598 term looks more like Originator instead of
 Author.

The term is more based on how DKIM and ADSP use it.  But you're right in that 
Author Domain is the more correct term rather than Author.  I'll change that 
for -12.

 The Abstract section uses the term authorization whereas authentic
 is used in the above text.  Shouldn't that be considered as
 authorized?

Yes, I think that's more correct as well.

-MSK
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-11-30 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of 
 Murray S. Kucherawy
 Sent: Wednesday, November 30, 2011 2:21 PM
 To: ietf@ietf.org
 Subject: RE: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized 
 Third-Party Signers) to Experimental RFC
 
  It's the domain and not the author which participates in this protocol.
  As a nit, the RFC 5598 term looks more like Originator instead of
  Author.
 
 The term is more based on how DKIM and ADSP use it.  But you're right
 in that Author Domain is the more correct term rather than Author.
 I'll change that for -12.

Actually ADMD from RFC5598 seems to be a good fit, so I'll use that.

Thanks again!

-MSK
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-11-30 Thread John Levine
I'm one of the authors of RFC 5617, which this document would update
if it moved into the standards track.  It doesn't seem very useful to
me, but it also seems mostly harmless so there's no reason not to
publish it as experimental.

This strikes me a hack that appeals primarily to bulk mail senders who
grossly overestimate how interested receivers are in helping them do
their mail management.  So I would be surprised if there were many
receiver-side implementations, but it's an experiment so what the
heck.


 No actions are required by IANA at this time.  The following need
  only be applied if and when this specification reaches the Standards
  Track.

I would strongly suggest changing the IANA section so that the
DKIM-Signature tags in section 8.4 are registered when this is
published.  Tags are text strings, and I'd rather the tags it uses be
noted and reserved so that nobody uses them for something else in the
future and risks collisions.  For the same reason, it'd probably be a
good idea to register the authentication-results tags described in
sections 8.2 and 8.3.

Regards,
John Levine, jo...@iecc.com, Primary Perpetrator of The Internet for Dummies,
Please consider the environment before reading this e-mail. http://jl.ly

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-11-30 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of John 
 Levine
 Sent: Wednesday, November 30, 2011 6:04 PM
 To: ietf@ietf.org
 Subject: Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized 
 Third-Party Signers) to Experimental RFC
 
 I'm one of the authors of RFC 5617, which this document would update if
 it moved into the standards track.  It doesn't seem very useful to me,
 but it also seems mostly harmless so there's no reason not to publish
 it as experimental.
 
 This strikes me a hack that appeals primarily to bulk mail senders who
 grossly overestimate how interested receivers are in helping them do
 their mail management.  So I would be surprised if there were many
 receiver-side implementations, but it's an experiment so what the heck.

As the draft says, the point is to make the idea available and see if it sticks 
to anyone or anything.  If the bulk senders (or receivers) do decide they 
collectively want this, there's something for them to try and report back.

  No actions are required by IANA at this time.  The following need
  only be applied if and when this specification reaches the Standards
  Track.
 
 I would strongly suggest changing the IANA section so that the DKIM-
 Signature tags in section 8.4 are registered when this is published.
 Tags are text strings, and I'd rather the tags it uses be noted and
 reserved so that nobody uses them for something else in the future and
 risks collisions.  For the same reason, it'd probably be a good idea to
 register the authentication-results tags described in sections 8.2 and
 8.3.

I'd be fine with that, so long as experimental-status drafts are allowed to 
make IANA registrations.  (I thought they weren't, which is why it is the way 
it is right now.)

Thanks,
-MSK
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-11-30 Thread Dave CROCKER


On 11/30/2011 8:09 PM, Murray S. Kucherawy wrote:

As the draft says, the point is to make the idea available and see if it sticks 
to anyone or anything.  If the bulk senders (or receivers) do decide they 
collectively want this, there's something for them to try and report back.


if one thinks the mechanism is a bad idea, it's still worth having a good 
document to describe it.l




I'd be fine with that, so long as experimental-status drafts are allowed to 
make IANA registrations.  (I thought they weren't, which is why it is the way 
it is right now.)


depends on the criteria for the registry.

d/
--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized Third-Party Signers) to Experimental RFC

2011-11-30 Thread Murray S. Kucherawy
 -Original Message-
 From: Dave CROCKER [mailto:d...@dcrocker.net]
 Sent: Wednesday, November 30, 2011 11:16 PM
 To: Murray S. Kucherawy
 Cc: ietf@ietf.org
 Subject: Re: Last Call: draft-kucherawy-dkim-atps-11.txt (DKIM Authorized 
 Third-Party Signers) to Experimental RFC
 
  I'd be fine with that, so long as experimental-status drafts are
  allowed to make IANA registrations.  (I thought they weren't, which is
  why it is the way it is right now.)
 
 depends on the criteria for the registry.

So it does, and the registry for DKIM signature tags is IETF Consensus, which 
doesn't require standards track documents to update.  So I guess the 
registrations could indeed be made here.  Neat.

It's a short walk from the current wording to actually requesting the IANA 
action.  I'll check with my shepherd and sponsoring AD for advice prior to the 
end of LC.

Thanks,
-MSK
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf