[ietf-dkim] ADSP and Discardable (was Re: Lists BCP draft review)

2010-06-02 Thread Rolf E. Sonneveld
Douglas Otis wrote:

 IIRC, Sendmail defined DISCARD in their Access Database Format, where to 
 override rejection, assert OK; to permit relaying, assert RELAY; to 
 always reject the message, assert REJECT; and to discard the message 
 completely, assert DISCARD.  

And the Postfix man page for accesss defines DISCARD as:

Claim successful delivery and silently discard  the message. Log the optional 
text if specified, otherwise log a generic message.


But the fact that Sendmail or Postfix define it this way does not 
necessarily mean that discard/discardable has the same meaning in 
the context of ADSP. If discardable needs further definition, it has 
to be defined in the context of ADSP in the next revision of the ADSP 
document.

 Unfortunately, ADSP  did not define what 
 was meant by discardable.  This draft could add clarity with a section 
 that defines its meaning.
   

No, not in this BCP draft. It has to be defined in the next revision of 
the ADSP document.

/rolf

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Ian Eiloart


--On 26 May 2010 11:48:53 -0700 Michael Thomas m...@mtcc.com wrote:


 Perhaps I'm missing something. I'm working with the mental model
 that the underlying problem ADSP advocates would like to address
 is phishing or brand protection, as they're the only concrete problems
 I've seen mentioned.

 So you're on a tangent about something that's not even vaguely in our
 charter. ADSP doesn't claim to solve phishing, it just allows
 bit-for-bit domain names to be safely tossed if they don't have a
 signature. How that integrates into the larger anti-phishing modules is
 frankly where the secret sauce lies for vendors.

Addressing an issue and solving it aren't the same things. Heck, neither is 
even a prerequisite for the other, given that some problems are 
self-resolving or solved accidentally.


-- 
Ian Eiloart
IT Services, University of Sussex
01273-873148 x3148
For new support requests, see http://www.sussex.ac.uk/its/help/


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Ian Eiloart


--On 26 May 2010 14:00:54 -0700 Steve Atkins st...@wordtothewise.com 
wrote:


 Given that, it's not something that will provide any benefit once ADSP is
 deployed - maybe just the opposite, as it will effectively neuter the
 approach you're currently using. You may win the battle of preventing use
 of the string paypal.com in the non-displayed part of the From: field,
 yet lose the war of protecting your users from phishers.


There's nothing undisplayed about the From header in my mail client. Mail 
clients that don't display the From header address probably should not be 
used. In future, I'll bet they'll display the DKIM/ADSP status, too.


-- 
Ian Eiloart
IT Services, University of Sussex
01273-873148 x3148
For new support requests, see http://www.sussex.ac.uk/its/help/


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Ian Eiloart


--On 27 May 2010 21:57:54 -0400 John R. Levine jo...@iecc.com wrote:

 We have had ADSP deployed since the week before the February MAAWG
 meeting.  I just asked our infrastructure guru to do a quick check and
 we are seeing about a million ADSP look-up's per day at this point.

 That's a good start.  Now we need to figure out some way to find out
 who's  doing those lookups, and what they're doing with them.


It should be fairly easy to figure out how many unique IP addresses are 
doing the lookups, and give some view of the distribution. And then not too 
hard to figure out how many of those IP addresses don't belong to the top 5 
or so mailbox providers.

If paypal want to broaden the uptake of ADSP, then contributing DKIM/ADSP 
code or config recipes to open source MTA projects would be useful!

-- 
Ian Eiloart
IT Services, University of Sussex
01273-873148 x3148
For new support requests, see http://www.sussex.ac.uk/its/help/


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Dave CROCKER


On 6/2/2010 4:08 AM, Ian Eiloart wrote:
 --On 26 May 2010 14:00:54 -0700 Steve Atkinsst...@wordtothewise.com
 wrote:
You may win the battle of preventing use
 of the string paypal.com in the non-displayed part of the From: field,
 yet lose the war of protecting your users from phishers.

 There's nothing undisplayed about the From header in my mail client.

That's nice, but it is no longer typical.  Far From: it


   Mail
 clients that don't display the From header address probably should not be
 used.

As soon as you convince all of the major MUAs to change and as soon as those 
changes propagate into the user world, it will be reasonable to worry about 
whether displaying the information matters.

That is, it will be reasonable to then ask whether users will assess the 
validity of that information and make intelligent decisions based on it.  
(Hint: 
  user interface works makes pretty clear that they won't...)

d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Ian Eiloart


--On 27 May 2010 14:57:06 -0700 Steve Atkins st...@wordtothewise.com 
wrote:


 On May 27, 2010, at 2:22 PM, Steve Atkins thinkoed:

 Legitimate email from paypal:

72% rejected by ADSP
28% not rejected

 Phishing emails using paypal in the From line:

39% rejected by ADSP
61% rejected.

 That should be

 Legitimate email from paypal:

72% rejected by ADSP
28% not rejected

 Phishing emails using paypal in the From line:

39% rejected by ADSP
61% not rejected.

How many used �...@paypal.com?

 Cheers,
  Steve
 ___
 NOTE WELL: This list operates according to
 http://mipassoc.org/dkim/ietf-list-rules.html



-- 
Ian Eiloart
IT Services, University of Sussex
01273-873148 x3148
For new support requests, see http://www.sussex.ac.uk/its/help/



___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Ian Eiloart


--On 28 May 2010 13:26:28 -0700 Dave CROCKER d...@dcrocker.net wrote:


 On 5/28/2010 12:07 PM, Jeff Macdonald wrote:
 But I'd like to see if I understand the difference your are trying to
 highlight between a manually maintained list and a self published
 list.

 There is a key semantic difference which, I believe, makes for a key
 difference  in utility.

 In a manually maintained list, there is an independent assessment of what
 domain  names are worth worrying about.  (The independence is from the
 owner of the  domain.  The assessment might be by a third part or it
 might be by the recipient.)

 The owner-based list is a statement by the domain owner, themselves, of
 what  domains the recipient should handle in a particular way.

 An important problem with this latter model is how noisy it is.  Both the
 domain  owner and the transmission process introduce significant errors.

 By contrast, the former model can incorporate a conformance metric into
 the  decision whether to list the domain.


Actually, the difference is less than you think. It's quite possible to 
combine both models. Spamassassin, for example, allows you to maintain a 
list of domains for which you should treat SPF or DKIM matches or fails in 
a particular way. For example, you could tell spamassassin to blacklist SPF 
fails for certain domains, or whitelist messages DKIM signed by certain 
domains.

Effectively, you're applying your own domain reputation system, and using 
SPF or DKIM published information to make the reputations more usable.

Similarly, with ADSP you don't have to rely on published information, and 
when information is published, you don't have to guess whether the 
publisher is competent. You can maintain your own list of domains that you 
trust to get ADSP right, and use standard software to apply that judgement. 
Several benefits are gained from ADSP:

1. Code reuse: Although you may choose to maintain your drop list, you 
don't have to write software for your MTA, you can just configure it.

2. Discoverability: You can find out from ADSP publications that the sender 
cares about this stuff. OK, it's still a leap to add them to your drop 
list, but you do at least have somewhere to start. If a large sender and 
receiver come to a private agreement about DKIM use, then only they 
benefit. If they choose to use ADSP to implement that agreement, then other 
mail systems can also benefit.

3. Discussability: given that it's a standard, potential users can read 
about best practice, and senders and receivers have a common language to 
talk about how things should work.



-- 
Ian Eiloart
IT Services, University of Sussex
01273-873148 x3148
For new support requests, see http://www.sussex.ac.uk/its/help/


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread John R. Levine
 That's a good start.  Now we need to figure out some way to find out
 who's  doing those lookups, and what they're doing with them.

 It should be fairly easy to figure out how many unique IP addresses are doing 
 the lookups, and give some view of the distribution. And then not too hard to 
 figure out how many of those IP addresses don't belong to the top 5 or so 
 mailbox providers.

That would be of some help, but the real question is what they're doing 
with it after they get it. The top mailbox providers presumably have 
reasonable DNS caches, so their lookups will be imperceptible anyway.

Since few people in the world at large understand DKIM, much less ADSP, 
the large numbers of lookups that Brett reports must be coming from 
software packages that have a configuration that looks them up.  It might 
be possible to intuit from the details of the lookups, e.g., the sequence 
of queries, what packages they are, at which point we could probably look 
and see what they're doing with them.

 If paypal want to broaden the uptake of ADSP, then contributing DKIM/ADSP 
 code or config recipes to open source MTA projects would be useful!

There's ADSP code in Spamassassin for anyone who wants it.  They suggest 
that you configure it to ignore actual ADSP and hard code a handful of 
domains such as paypal.com and ebay.com.

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Dave CROCKER


On 6/2/2010 4:46 AM, Ian Eiloart wrote:
 --On 28 May 2010 13:26:28 -0700 Dave CROCKERd...@dcrocker.net  wrote:
 On 5/28/2010 12:07 PM, Jeff Macdonald wrote:
 But I'd like to see if I understand the difference your are trying to
 highlight between a manually maintained list and a self published
 list.

 There is a key semantic difference which, I believe, makes for a key
 difference  in utility.
...

 Actually, the difference is less than you think. It's quite possible to
 combine both models.

You do not discuss combining the models.  You discuss a tool that supports 
both.  Juggling two things is not the same as combining them.

In any event, the scope of this working group does not include design of 
filtering engines.  It stops with providing filtering engines additional 
information.

My previous point was -- and remains -- that the fundamental semantics of 
self-published information about a signer is entirely different from assessment 
information about that signer that is published by someone else.  No software 
design eliminates that difference.


 Effectively, you're applying your own domain reputation system, and using
 SPF or DKIM published information to make the reputations more usable.

That's not a reputation system.  It's possibly useful information, but it's 
not reputation as the term is typically used in the industry.

d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] ADSP and Discardable (was Re: Lists BCP draft review)

2010-06-02 Thread John Levine
 Unfortunately, ADSP  did not define what was meant by discardable.

We said:

   All mail from the domain is signed with an
   Author Domain Signature.  Furthermore, if a
   message arrives without a valid Author Domain
   Signature due to modification in transit,
   submission via a path without access to a
   signing key, or any other reason, the domain
   encourages the recipient(s) to discard it.

Keeping in mind that senders cannot force receivers to do anything,
what else should we have said?

R's,
John



___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread John Levine
Similarly, with ADSP you don't have to rely on published information, and 
when information is published, you don't have to guess whether the 
publisher is competent. You can maintain your own list of domains that you 
trust to get ADSP right, and use standard software to apply that judgement. 

Manual drop lists are a fine idea, but what do they have to do with ADSP?

1. Code reuse: Although you may choose to maintain your drop list, you 
don't have to write software for your MTA, you can just configure it.

I'm happy to reuse the manual drop code in Spamassassin.  I still don't
see what it has to do with ADSP.

2. Discoverability: You can find out from ADSP publications that the sender 
cares about this stuff. OK, it's still a leap to add them to your drop 
list, but you do at least have somewhere to start.

Here's a thought experiment: let's say you have your list of domains
that are known to be phish targets that sign their mail, so you drop
unsigned mail, and they all happen to publish ADSP.  Someone's ADSP
record goes away.  Is it more likely that they've stopped signing
their mail, or that their ADSP record is temporarily messed up?  Why?

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Ian Eiloart


--On 2 June 2010 08:35:56 -0400 John R. Levine jo...@iecc.com wrote:


 There's ADSP code in Spamassassin for anyone who wants it.  They suggest
 that you configure it to ignore actual ADSP and hard code a handful of
 domains such as paypal.com and ebay.com.


Why not do both? Look up, and log results for all domains. That'll give you 
evidence to base listing decisions on later. If you do decide to list a 
domain, then take action based on published policy. That gives the 
publisher the ability to change their policy without notifying you out of 
band.

-- 
Ian Eiloart
IT Services, University of Sussex
01273-873148 x3148
For new support requests, see http://www.sussex.ac.uk/its/help/


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] ADSP and Discardable (was Re: Lists BCP draft review)

2010-06-02 Thread Rolf E. Sonneveld

John Levine wrote:

Unfortunately, ADSP  did not define what was meant by discardable.
  


We said:

   All mail from the domain is signed with an
   Author Domain Signature.  Furthermore, if a
   message arrives without a valid Author Domain
   Signature due to modification in transit,
   submission via a path without access to a
   signing key, or any other reason, the domain
   encourages the recipient(s) to discard it.

Keeping in mind that senders cannot force receivers to do anything,
what else should we have said?
  


given the recent discussions, it seems to me that people want to have a 
definition of what 'discard' means in the context as described above. As 
a non-native English speaker (or what's the right term?) I suppose (but 
am not sure) the word 'discard' can have multiple meanings (apart from 
'To throw away'). Otherwise 'silently discard' would be a pleonasm, 
isn't it?


I suggest to put the subject 'discard and discardable' on the to-do list 
for a next revision of ADSP. If my analysis (that the word 'discard' 
means different things to different people) is correct, then there's 
still some discussion to go. After all, throwing away mail silently is 
contradictory to the original SMTP model (mail is delivered or a NDN 
comes back) and can have negative impact on the reliability of the 
e-mail system, as perceived by users of e-mail.


/rolf
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread MH Michael Hammer (5304)


 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-
 boun...@mipassoc.org] On Behalf Of John Levine
 Sent: Wednesday, June 02, 2010 9:21 AM
 To: ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] list vs contributor signatures, was Wrong
 Discussion
 

snip

 
 Here's a thought experiment: let's say you have your list of domains
 that are known to be phish targets that sign their mail, so you drop
 unsigned mail, and they all happen to publish ADSP.  Someone's ADSP
 record goes away.  Is it more likely that they've stopped signing
 their mail, or that their ADSP record is temporarily messed up?  Why?
 
Signing their mail does not equal ADSP. Knowing they sign their mail
does not equal ADSP. As you have pointed out, ADSP does not equal manual
drop lists. 

The fact that someone's ADSP record - absent any other data points -
goes away, tells us nothing other than their ADSP record went away.
There could be any number of reasons as to why it went away. 

Are we now going to have to write a draft for casting goat bones to
determine the meaning of standards implementations and operational
practices? 

It's really quite simple. If there is no longer an ADSP record then ADSP
is not applicable. Doesn't matter whether they are still signing or not
signing. If a domains DNS records returned an NXDOMAIN on a lookup would
you insist on doing something other than saying the domain doesn't
exist?

Mike

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] ADSP and Discardable (was Re: Lists BCP draft review)

2010-06-02 Thread John R. Levine
 given the recent discussions, it seems to me that people want to have a 
 definition of what 'discard' means in the context as described above. As a 
 non-native English speaker (or what's the right term?) I suppose (but am not 
 sure) the word 'discard' can have multiple meanings (apart from 'To throw 
 away'). Otherwise 'silently discard' would be a pleonasm, isn't it?

Your English is fine.  Discard means throw away.

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] ADSP and Discardable (was Re: Lists BCP draft review)

2010-06-02 Thread Al Iverson
On Wed, Jun 2, 2010 at 9:48 AM, John R. Levine jo...@iecc.com wrote:
 given the recent discussions, it seems to me that people want to have a
 definition of what 'discard' means in the context as described above. As a
 non-native English speaker (or what's the right term?) I suppose (but am not
 sure) the word 'discard' can have multiple meanings (apart from 'To throw
 away'). Otherwise 'silently discard' would be a pleonasm, isn't it?

 Your English is fine.  Discard means throw away.

Agree. Discard and silently discard mean the same thing, in my
opinion. Though, I am guilty of using the phrase silently discard.
Maybe in an attempt to be slightly over-specific.

Cheers,
Al

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] ADSP and Discardable (was Re: Lists BCP draft review)

2010-06-02 Thread Dave CROCKER


On 6/2/2010 8:08 AM, Al Iverson wrote:
 Agree. Discard and silently discard mean the same thing, in my
 opinion. Though, I am guilty of using the phrase silently discard.
 Maybe in an attempt to be slightly over-specific.


I do not recall seeing a dictionary or technical definition of discard that 
says anything at all about whether the discarder says anything at all.

Taken on its own and without further technical specifications 'discard' does 
not 
direct, imply or request that the action be silent or noisy, and if noisy who 
gets to hear it.

d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Dave CROCKER


On 6/2/2010 6:33 AM, MH Michael Hammer (5304) wrote:
 It's really quite simple.


This is the crux of the disparity of views.

Those of use who note that none of this is simple worry about adoption and 
success barriers, noting that new services have a long and problematic history 
and that more efforts fail than succeed.

We also note that operational details often are far more complicated and/or 
costly than designers anticipate.

In other words, as soon as the effort moves outside of a few people's minds, 
nothing about this is simple.  (Well, given the track record of new protocols, 
in general and security-related protocols in particular, I suppose it is simple 
and reasonable to anticipate failure.)

d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] ADSP and Discardable (was Re: Lists BCP draft review)

2010-06-02 Thread Ian Eiloart


--On 2 June 2010 10:48:03 -0400 John R. Levine jo...@iecc.com wrote:

 given the recent discussions, it seems to me that people want to have a
 definition of what 'discard' means in the context as described above. As
 a  non-native English speaker (or what's the right term?) I suppose (but
 am not  sure) the word 'discard' can have multiple meanings (apart from
 'To throw  away'). Otherwise 'silently discard' would be a pleonasm,
 isn't it?

 Your English is fine.  Discard means throw away.

And, to silently discard is to discard without informing anyone. It 
means, for example, that you don't also generate a bounce message, or a 
notification to the recipient.

My guess is that the phrase the domain encourages the recipient(s) to 
discard it is intended to refer to a silent discard. Otherwise it would 
say bounce (which I take to mean discard and notify the sender). 
Bounce is an unlikely recommendation, since most people don't like to 
bounce messages of uncertain origin these days. I guess you might bounce if 
it you had an SPF pass.

 R's,
 John
 ___
 NOTE WELL: This list operates according to
 http://mipassoc.org/dkim/ietf-list-rules.html



-- 
Ian Eiloart
IT Services, University of Sussex
01273-873148 x3148
For new support requests, see http://www.sussex.ac.uk/its/help/


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] ADSP and Discardable (was Re: Lists BCP draft review)

2010-06-02 Thread Dave CROCKER


On 6/2/2010 8:50 AM, Al Iverson wrote:
 Taken on its own and without further technical specifications 'discard' does
 not direct, imply or request that the action be silent or noisy, and if
 noisy who gets to hear it.

 I'm perfectly fine with being more explicit, but I do think there's an
 implication of silent by the use of the word discard in the context of
 email delivery.


Among some folk, perhaps.  But this is not the sort of issue that should be 
relied on by implication or statistical likelihood of interpretation, if there 
is to be productive discussion and use of the term in a standards arena.


d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Steve Atkins

On Jun 2, 2010, at 4:50 AM, Ian Eiloart wrote:

 
 
 --On 27 May 2010 14:57:06 -0700 Steve Atkins st...@wordtothewise.com wrote:
 
 
 Legitimate email from paypal:
 
   72% rejected by ADSP
   28% not rejected
 
 Phishing emails using paypal in the From line:
 
   39% rejected by ADSP
   61% not rejected.
 
 How many used �...@paypal.com?

100% of the legitimate email from paypal. 39% of the phishing email that used 
paypal in the From line.

(A large fraction of the 61% of the phishing email that ADSP considered 
legitimate did use @paypal.com, though, IIRC. More use of friendly from and 
less use of associated domains than I've noticed in recent phishing mail in 
general.)

Cheers,
  Steve


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] ADSP and Discardable (was Re: Lists BCP draft review)

2010-06-02 Thread Steve Atkins

On Jun 2, 2010, at 8:08 AM, Al Iverson wrote:

 On Wed, Jun 2, 2010 at 9:48 AM, John R. Levine jo...@iecc.com wrote:
 given the recent discussions, it seems to me that people want to have a
 definition of what 'discard' means in the context as described above. As a
 non-native English speaker (or what's the right term?) I suppose (but am not
 sure) the word 'discard' can have multiple meanings (apart from 'To throw
 away'). Otherwise 'silently discard' would be a pleonasm, isn't it?
 
 Your English is fine.  Discard means throw away.
 
 Agree. Discard and silently discard mean the same thing, in my
 opinion. Though, I am guilty of using the phrase silently discard.
 Maybe in an attempt to be slightly over-specific.

In the email filter space there is sometimes a distinction.

Discard is sometimes used to mean discard and notify. That is throw
away the content of the message, but send a message to the intended
recipient telling them you've done so. Virus filters often do this sort of 
thing.

Silently discard clarifies that you really just mean throw it away, and
throughout the development process that was the intended meaning of
the word discard in the spec.

The advantage of the notification is that it allows the recipient to be aware
of false positives. The disadvantage is that, unlike virus filtering, phishing
can be designed to work even though the main body of the message is
discarded, by designing the message such that the right part of it (such
as a URL) is passed through the notification process. The only way to
entirely avoid that is to avoid identifying the message that was discarded
in the notification, and that's just appallingly bad UX all around.

Given the appalling false positive rates, I'm not sure that silently discard
is *clearly* the right thing to do, but discard and notify has even bigger
problems.

Cheers,
  Steve


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Dave CROCKER


On 6/2/2010 9:12 AM, MH Michael Hammer (5304) wrote:

 For shame Dave. Taking one sentence out of context is something I would
 not have expected from you.

After all this time, I am glad to hear that I can still surprise you...

FWIW I took it out of context entirely knowingly.  Frankly, I wasn't interested 
in the particular topic.

As I said, I think that that captures the critical difference in what drives 
the 
two sides of these various-but-really-identical debates.  The particular 
context 
wasn't the point.  The difference in attitudes about /any/ of these topics is 
the point.


 The whole point of having a standard is to avoid the voodoo and
 guessing.

Right.  And a standard that is not adopted or used does not achieve this. 
Worrying very carefully about adoption barriers -- who will adopt it and why -- 
is essential to this, but we have not been succeeding in getting answers to 
hard 
questions here.


 You are absolutely correct that we should anticipate failures. That does
 not mean we should anticipate FAILURE from a reasonably crafted
 standard.

Actually, yes it does.  That is exactly my point.

A side effect of living in Silicon Valley is seeing how often carefully crafted 
startups fail.  Good ideas and a well-designed product are not sufficient to 
guarantee success, absent properly matching the /perceived/ needs of the folks 
who will use it /and/ the folks who will pay for it.


 We cannot protect foolish people from doing foolish things to
 themselves. This is another case of King Canute.

The benefit of that perspective is acknowledging limitations.  The danger is 
not 
putting in enough effort to make things appropriately usable and/or not putting 
enough effort into crafting a value proposition that is compelling to the 
target 
audience.

d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Scott Kitterman


John Levine jo...@iecc.com wrote:

Similarly, with ADSP you don't have to rely on published information, and 
when information is published, you don't have to guess whether the 
publisher is competent. You can maintain your own list of domains that you 
trust to get ADSP right, and use standard software to apply that judgement. 

Manual drop lists are a fine idea, but what do they have to do with ADSP?

1. Code reuse: Although you may choose to maintain your drop list, you 
don't have to write software for your MTA, you can just configure it.

I'm happy to reuse the manual drop code in Spamassassin.  I still don't
see what it has to do with ADSP.

2. Discoverability: You can find out from ADSP publications that the sender 
cares about this stuff. OK, it's still a leap to add them to your drop 
list, but you do at least have somewhere to start.

Here's a thought experiment: let's say you have your list of domains
that are known to be phish targets that sign their mail, so you drop
unsigned mail, and they all happen to publish ADSP.  Someone's ADSP
record goes away.  Is it more likely that they've stopped signing
their mail, or that their ADSP record is temporarily messed up?  Why?

Or, I suspect most likely, they thought they were signing everything and then 
later something changed or they discovered they missed a piece of their 
infrastructure,  so they've retracted the policy until they've corrected the 
problem. 

Scott K
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] ADSP and Discardable (was Re: Lists BCP draft review)

2010-06-02 Thread Rolf E. Sonneveld
Scott Kitterman wrote:
 Dave CROCKER d...@dcrocker.net wrote:

   
 On 6/2/2010 8:08 AM, Al Iverson wrote:
 
 Agree. Discard and silently discard mean the same thing, in my
 opinion. Though, I am guilty of using the phrase silently discard.
 Maybe in an attempt to be slightly over-specific.
   
 I do not recall seeing a dictionary or technical definition of discard 
 that 
 says anything at all about whether the discarder says anything at all.

 Taken on its own and without further technical specifications 'discard' does 
 not 
 direct, imply or request that the action be silent or noisy, and if noisy 
 who 
 gets to hear it.
 

 IIRC, this is by design since there was no consensus around what exactly to 
 do.  Personally, I tend to favor not having messages silently vanish.
   

+1

As stated before, I have not followed the entire discussion on ADSP in 
depth, so please bear with me. I could not find relevant items in the 
archives, but has there ever been suggested to have a 'rejectable' in 
addition to 'discardable' and 'all'?

/rolf

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread John R. Levine
 Well, you'd process that mail as if... there were no ADSP policy because... 
 there's no ADSP policy.

I guess I agree, since I would use a credible manually maintained 
list and ignore the ADSP whether or not there was any.

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Brett McDowell
On May 28, 2010, at 12:01 AM, Steve Atkins wrote:

 
  1. Do we want to reduce the DKIM broken signature rate or do we want to make 
 ADSP less vulnerable to it. Or both, I guess.

I think both of those objectives are of interest.

 
  2. If we want to reduce the DKIM broken signature rate, do we need to rework 
 DKIM at all

I don't think so.

 , or do we need to make operational recommendations to the generator and 
 signer of the mail

yes

 , or do we need to provide operational advice to forwarders and mailing list 
 managers

yes

 . For any of those we need to balance the improvement against the reduction 
 in deployment and reduction in correct deployment the increased complexity 
 will cause. The history of SPF-all and SRS is likely relevant there.
 

Why is guidance for how to use something that already exist make things more 
complex?  It should dramatically reduce complexity through clear 
recommendations.

Re-writing DKIM would be a problem, and I for one am not in favor of that as I 
agree with Steve that it will have a negative impact on deployments, but surely 
implementation guidance would only have a positive impact on deployments.

  3. If we want to make ADSP less vulnerable to it, this basically means 
 reworking ADSP such that it says that receivers should accept unsigned mail 
 in some cases - the various suggestions about accepting unsigned mail from 
 trusted mailing lists or forwarders. This is bound to open up a bunch of 
 theoretical security issues, and probably some real ones.

I do not believe that is our only option.  We can extend ADSP to provide a few 
new options over all and discardable that meet current use cases.  
Otherwise we could publish guidance to address expected use but I assume that 
guidance will leave it to the deployer to decide who and why they trust 
certain streams and/or policy assertions.

 
  3a.  If we go in that direction we're looking at making some fairly tricky 
 security related decisions. We'd need a proper analysis of the security risks 
 and operational benefits, which would require us to be more honest than we 
 have been in the past about what the end goals are, and how some of the more 
 obvious attack trees would affect those goals.
 
Maybe you are contemplating a different part of the elephant but I don't see 
what you are getting at with this line of rhetoric.

 Any of those changes - i.e. doing anything other than accepting the seriously 
 broken behaviour and just documenting it - would require buy-in from the 
 chairs and other participants, and likely a charter clarification.

I would not be surprised if we need a charter clarification to tackle adding 
options to ADSP, but aren't we already chartered to provide BCP guidance for 
the technologies that have come out of this WG?

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] ADSP, was Lists BCP draft available

2010-06-02 Thread Brett McDowell
On May 26, 2010, at 12:59 PM, Steve Atkins wrote:

 On May 26, 2010, at 7:45 AM, Brett McDowell wrote:
 
 On May 25, 2010, at 8:43 PM, Scott Kitterman wrote:
 
 Like I said, throw away anything that doesn't have our signature has 
 some chance of broad adoption.  Every extra word you add to the message 
 makes it less likely that people will do it.
 
 I agree with this. I have yet to see any proposals for additions that 
 didn't either add enough complexity to act as a barrier to deployment or 
 alternately make it trivially possible to allow third parties to create 
 messages that render discardable moot. 
 
 I agree that adding anything to throw away anything that doesn't have our 
 signature add complexity to implementation and therefore, by definition, is 
 a barrier to adoption.  That's not what we are debating.  What we are 
 debating is whether such complexity is a necessary evil that we should 
 provide a specification to support -- as an optional mechanism for 
 stakeholders who want to opt-in to the authenticated email ecosystem.  I 
 *think* the answer is yes.  But we haven't yet had the meaningful debate 
 that will resolve that question.
 
 Let's debate whether transient trust through a MLM is actionable.  Would a 
 new header that enabled the MLM to report to the receiver that they indeed 
 validated the original signature actually make any difference in the 
 deliverability of that message to the receiver, and if yes, is that actually 
 a good thing?  I say yes and yes.  But I expect that if we debate this 
 specific point one of you might highlight an unintended consequence that 
 would tip the balance away from pursuing such a model.  
 
 Thoughts?
 
 Aesthetically I like the idea of some way for the MLM to tunnel 
 authentication information through to the recipient.

Perhaps that's common ground we just discovered.  Let's build on that.

 
 But I don't think it's clear that doing so would change anything at the 
 recipients MX. As a concrete example, if two subscribers to a mailing list 
 send mail to the list, one DKIM signed and one not, and the list then signs 
 each message and sends it to the recipient, is there any reason that the 
 recipients MX would treat those two messages differently?
 

Yes.  But we need more information about the scenario in order to describe how. 
 The following detail will illustrate how.

A = sender of message from an ADSP=discardable domain but the message was not 
DKIM signed
B = sender of message from an ADSP=discardable domain and the message was DKIM 
signed
C = the MLM who is a participating MLM in the authenticated email ecosystem
D = receiver of email from the MLM who is a participating receiver (DKIM/ADSP 
inbound)
Note: this scenario takes place in after this IETF DKIM WG standardizes the new 
header I mentioned above.

In this scenario C will report to D that the message from A was not signed on 
inbound and that the message from B was.  This would lead D to deliver the 
message from B but not deliver the message from A.  The MLM signed both 
messages before sending to D.

-- Brett


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Brett McDowell
On May 28, 2010, at 1:08 AM, Steve Atkins wrote:

 Paypal is rather a special case, as they actively register
 many, many domains in a lot of TLDs that contain the word
 paypal or some misspelling of it, both proactively and in
 response to enforcement. I didn't consider those domains
 as triggering an ADSP rejection for a number of reasons.
 One is that many (most?) of them would have been acquired
 by paypal though enforcement action after the phishes were
 sent, and the other is that it's a behaviour (registering a
 huge number of domains purely to deny them to others)
 that's atypical and that doesn't scale.
 
 Havning said that, I did spot check quite a lot of the phishes that
 I'd tagged as not rejected and the vast majority weren't
 using domains I'd expect paypal to have proactively reserved
 (paypal.net, for instance) - they were mostly using the word
 paypal in the friendly from, the local part or a subdomain of
 the domain part. Of those that weren't of that form many were
 things like @paypal-access.com and suchlike. So I think those
 two numbers are likely accurate to within a few percent or better.

Your numbers were so far off from what we see that I was perplexed, but now 
it's clear why.  

In reality we do register many of the domains you assumed we don't (like 
paypal.net) and we are not unique in that practice.  We have over a thousand of 
these domains parked.  

The result of this simple error in assumption has skewed your data to the point 
where it is no longer representative.  I feel compelled to point out this error 
since several people on the list have been quoting your data since you 
circulated it and are likely to draw erroneous conclusions from it.


-- Brett

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Michael Thomas
On 06/02/2010 11:41 AM, Steve Atkins wrote:
 Fourth, as I mentioned above, even if all you said was valid, registering 
 thousands of domains in order to make ADSP sort-of work against phishing 
 isn't something that scales, either in terms of domain name system nor the 
 expense. If ADSP requires users to spend tend of thousands of dollars a year 
 to maintain domain registrations in order for it to have a significant effect 
 on phishing then it's not something that's really going to scale to more than 
 a handful of senders.

I'd be willing to bet a good chunk of money that Paypay -- and lots of other 
domains --
have this practice regardless, and preceding ADSP. ADSP use supplements that 
current
best practice for phishing target domains. Which is sort of the point.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Brett McDowell
On Jun 2, 2010, at 9:33 AM, MH Michael Hammer (5304) wrote:

 
 
 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-
 boun...@mipassoc.org] On Behalf Of John Levine
 Sent: Wednesday, June 02, 2010 9:21 AM
 To: ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] list vs contributor signatures, was Wrong
 Discussion
 
 
 snip
 
 
 Here's a thought experiment: let's say you have your list of domains
 that are known to be phish targets that sign their mail, so you drop
 unsigned mail, and they all happen to publish ADSP.  Someone's ADSP
 record goes away.  Is it more likely that they've stopped signing
 their mail, or that their ADSP record is temporarily messed up?  Why?
 
 Signing their mail does not equal ADSP. Knowing they sign their mail
 does not equal ADSP. As you have pointed out, ADSP does not equal manual
 drop lists. 
 
 The fact that someone's ADSP record - absent any other data points -
 goes away, tells us nothing other than their ADSP record went away.
 There could be any number of reasons as to why it went away. 
 
 Are we now going to have to write a draft for casting goat bones to
 determine the meaning of standards implementations and operational
 practices? 
 
 It's really quite simple.

Agreed.

BTW, I'm actually agreeing to this statement in the context it was made :-)

 If there is no longer an ADSP record then ADSP
 is not applicable.

Well, you'd process that mail as if... there were no ADSP policy because... 
there's no ADSP policy.

Do we really need to publish informational guidance on this point?  If yes, 
then let's do it.


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] ADSP and Discardable (was Re: Lists BCP draft review)

2010-06-02 Thread Douglas Otis
On 6/2/10 10:10 AM, Scott Kitterman wrote:
 Dave CROCKERd...@dcrocker.net  wrote:

 On 6/2/2010 8:08 AM, Al Iverson wrote:

 Agree. Discard and silently discard mean the same thing, in my
 opinion. Though, I am guilty of using the phrase silently discard.
 Maybe in an attempt to be slightly over-specific.

 I do not recall seeing a dictionary or technical definition of discard that
 says anything at all about whether the discarder says anything at all.

 Taken on its own and without further technical specifications 'discard' does 
 not
 direct, imply or request that the action be silent or noisy, and if noisy who
 gets to hear it.
  
 IIRC, this is by design since there was no consensus around what exactly to 
 do.  Personally, I tend to favor not having messages silently vanish.

The initial intent was to assert signing domain's policies rather than 
attempting any receiver recommendations.  In this vein, a better an 
alternative to discardable could have been 
no-third-party-services-used such as N3PS.  The discardable 
assertion did not emerge directly from the list.  John explained 
discardable as his response to phished domain's concerns of being 
flooded with NDNs.  ADSP did not produce a flood, as seen by the 
phisher's reactions of avoiding exact matches.

Rather than asserting author domain signing policies, ADSP could be 
changed into offering receiver recommendations, which discardable 
attempts.  Perhaps all could change to non-deliverable.  However, 
could this result in bounces, in addition to rejections.  After all, not 
all receivers evaluate DKIM prior to acceptance.  Should these 
recommendation be rejectable and remain silent about accepted 
messages?  To avoid this quagmire, the WG concluded that ADSP was to 
state the domain's signing policy.   Clearly, discardable represents a 
clear departure.  Will discardable ultimately prove helpful?  It has 
already caused many to ignore handling for all, since all lacks the 
concise instruction offered by discardable.  It seems discardable is 
in danger of ensuring an unproductive outcome for ADSP.

-Doug








___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Brett McDowell
On May 28, 2010, at 12:28 AM, Steve Atkins wrote:

 
 On May 27, 2010, at 9:15 PM, John Levine wrote:
 
 On the other hand, John and Steve expect that the benefits PayPal is
 seeing in thwarted phishing messages will be short-lived, as phishers
 just change domain names, and send out just as many messages as
 before, fooling just as many recipients into thinking they're from
 PayPal.
 
 Actually, that's Steve.  John sees utility in manual drop lists, but
 not in ADSP since there is no way to tell whether someone publishing
 ADSP understands what it means.  Recent experience suggests that they
 often don't.
 
 It's not really my view either. I do think that there's some risk of manual
 drop lists becoming less effective, but I also think that it's more a risk
 than a certainty, and it's something that may be resolved by a couple
 of smart engineers - as it's a flexible approach that can
 be modified in response to opponent behaviour in days or hours.
 
 That flexibility (and lack of publication of the details) and direct
 involvement of smart people in real time to maintain it are some of the
 things that make the manual drop list approach much more viable
 than a static, self-publication approach.

My problem with this position is that it seems to argue for proprietary one-off 
solutions vs. Internet standards for email authentication policy assertions.  I 
would think that's a non-starter, especially for participants in this WG.
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread John R. Levine
 In terms of public information, we are in production with DKIM 
 verification/blocking today with two mailbox providers.  We'd like to be in 
 production with say... two hundred by some near-term date certain.  Hence the 
 need for ADSP.

This is a non-sequitur, but we've been through it before so I won't keep 
beating the greasy spot where the horse used to be.

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Brett McDowell

On Jun 2, 2010, at 2:41 PM, Steve Atkins wrote:

 
 On Jun 2, 2010, at 10:59 AM, Brett McDowell wrote:
 
 On May 28, 2010, at 1:08 AM, Steve Atkins wrote:
 
 Paypal is rather a special case, as they actively register
 many, many domains in a lot of TLDs that contain the word
 paypal or some misspelling of it, both proactively and in
 response to enforcement. I didn't consider those domains
 as triggering an ADSP rejection for a number of reasons.
 One is that many (most?) of them would have been acquired
 by paypal though enforcement action after the phishes were
 sent, and the other is that it's a behaviour (registering a
 huge number of domains purely to deny them to others)
 that's atypical and that doesn't scale.
 
 Havning said that, I did spot check quite a lot of the phishes that
 I'd tagged as not rejected and the vast majority weren't
 using domains I'd expect paypal to have proactively reserved
 (paypal.net, for instance) - they were mostly using the word
 paypal in the friendly from, the local part or a subdomain of
 the domain part. Of those that weren't of that form many were
 things like @paypal-access.com and suchlike. So I think those
 two numbers are likely accurate to within a few percent or better.
 
 Your numbers were so far off from what we see that I was perplexed, but now 
 it's clear why.  
 
 In reality we do register many of the domains you assumed we don't (like 
 paypal.net) and we are not unique in that practice.  We have over a thousand 
 of these domains parked.  
 
 The result of this simple error in assumption has skewed your data to the 
 point where it is no longer representative.
 
 There's no error in assumption. The data is fairly accurate as measured (and 
 also reasonably representative of the behaviour of a mixed-use domain, I 
 think). 
 
 First, as I said above
 
 they were mostly using the word
 paypal in the friendly from, the local part or a subdomain of
 the domain part
 
 ... in other words your argument doesn't apply at all to most of the phishing 
 email that ADSP failed to deal with.

I don't think you are following me... the receivers who are performing ADSP 
look-ups and enforcing discardable would have blocked a ton of that email you 
are reporting would have made it through.

 
 Second...
 
steve$ host -t txt _adsp._domainkey.paypal.net
_adsp._domainkey.paypal.net has no TXT record
steve$ host -t txt paypal.net
paypal.net has no TXT record
 
 ... I wasn't going to mention it, but you brought it up. The MX for 
 paypal.net will also give a 2xx response to any RCPT TO in the paypal.net 
 domain.

...and I wasn't going to mention that I tried to work with you off-list to get 
more information about your phish from paypal.net but you didn't respond.   If 
you get a chance, please do send that along.

 
 Third, as I mentioned above, even if you were publishing ADSP records for 
 lookalike domains, most of those lookalike domains appear to have been 
 acquired after enforcement of a phishing issue - meaning that there would 
 have been no ADSP records when the phishing mails were sent, and your 
 ownership of them now is irrelevant.

As I've reported before, we have over 100 millions reasons (blocked attacks 
from our registered domains) why you are wrong about this assertion.

 
 Fourth, as I mentioned above, even if all you said was valid, registering 
 thousands of domains in order to make ADSP sort-of work against phishing 
 isn't something that scales, either in terms of domain name system nor the 
 expense. If ADSP requires users to spend tend of thousands of dollars a year 
 to maintain domain registrations in order for it to have a significant effect 
 on phishing then it's not something that's really going to scale to more than 
 a handful of senders.

You have this backwards.  Major brands register cousin domains for more reasons 
than phishing.  This practice pre-dated ADSP and it will continue with or 
without ADSP.  It's simply an operational fact that is relevant to any debate 
about how ADSP can/should be used.

 
 I feel compelled to point out this error since several people on the list 
 have been quoting your data since you circulated it and are likely to draw 
 erroneous conclusions from it.
 
 
 I understand you want to discredit the statistics

and I understand you wanted to report statistics to discredit ADSP... actually 
I don't understand that but it is certainly consistent with your arguments

 - they show that as measured at my inbox, based on paypal related email, ADSP 
 dkim=discardable as currently used by PayPal to combat phishing is 
 significantly less useful than flipping a coin. 72% false positive, 61% false 
 negative.

but your processing assumptions about what would get through vs. what would 
bounce was wrong.

 
 These statistics are quite valid, and reasonably representative.

now I'm just repeating myself...

 The only non-representative thing about them is that they're measured at my 
 mailbox, 

Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Brett McDowell
On May 28, 2010, at 12:15 AM, John Levine wrote:

 On the other hand, John and Steve expect that the benefits PayPal is
 seeing in thwarted phishing messages will be short-lived, as phishers
 just change domain names, and send out just as many messages as
 before, fooling just as many recipients into thinking they're from
 PayPal.
 
 Actually, that's Steve.  John sees utility in manual drop lists, but
 not in ADSP since there is no way to tell whether someone publishing
 ADSP understands what it means.  

ADSP seems to mean one thing to pundits and something else to the people 
actually using it.  Who is right?

 Recent experience suggests that they
 often don't.

Can you name someone with ADSP experience who doesn't understand what it means?
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread MH Michael Hammer (5304)


 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-
 boun...@mipassoc.org] On Behalf Of Michael Thomas
 Sent: Wednesday, June 02, 2010 3:07 PM
 To: Steve Atkins
 Cc: DKIM List
 Subject: Re: [ietf-dkim] list vs contributor signatures, was Wrong
 Discussion
 
 On 06/02/2010 11:41 AM, Steve Atkins wrote:
  Fourth, as I mentioned above, even if all you said was valid,
 registering thousands of domains in order to make ADSP sort-of work
 against phishing isn't something that scales, either in terms of
domain
 name system nor the expense. If ADSP requires users to spend tend of
 thousands of dollars a year to maintain domain registrations in order
for
 it to have a significant effect on phishing then it's not something
that's
 really going to scale to more than a handful of senders.
 
 I'd be willing to bet a good chunk of money that Paypay -- and lots of
 other domains --
 have this practice regardless, and preceding ADSP. ADSP use
supplements
 that current
 best practice for phishing target domains. Which is sort of the point.
 
 Mike


Thousands of domains registered and counting. Been doing it well before
ADSP and view it as only one of the things that owners of abused domains
do.

Mike

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Brett McDowell

On May 28, 2010, at 12:14 AM, John Levine wrote:

 So I understand your line of reasoning. But today, I believe ADSP can
 provide a benefit. Brett has data that supports that.
 
 Once again, we have a pernicious confusion between manually maintained
 drop lists and ADSP.
 
 Brett has data that supports the former, not the latter.

I disagree, but here's some new data that might better illustrate the case for 
ADSP.

In terms of public information, we are in production with DKIM 
verification/blocking today with two mailbox providers.  We'd like to be in 
production with say... two hundred by some near-term date certain.  Hence the 
need for ADSP.

The case is even stronger from the mailbox providers' perspective since they 
would be working with orders of magnitude more senders.



___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Brett McDowell
On Jun 2, 2010, at 3:26 PM, John R. Levine wrote:

 Recent experience suggests that they often don't.
 Can you name someone with ADSP experience who doesn't understand what it 
 means?
 
 Not to pick on you specifically, since there are multiple examples, but I'd 
 say that domains that publish dkim=discardable and who let their users 
 subscribe and send messages to mailing lists don't understand what their ADSP 
 is telling people.
 
 I suppose it's possible they do know and they don't care how much damage they 
 cause to everyone else, but I'd rather think it was confusion than malice.
 

You'd call it malice to prioritize consumer protection over the a very small 
population of employees being temporarily inconvenienced by having some of 
their messages to mail lists delivered to SPAM and in some corner cases, 
actually unsubscribed from lists... while we invest time and resources to (a) 
assess how MTA's, MUA's and MLM's actually deal with these mail streams and (b) 
work with the standards community to improve the ecosystem by shaving off the 
rough edges we find?

Neither ignorance or malice, simply the will to be an early adopter of young 
standards with proven consumer protection capabilities coming from a respected 
source.  Yes, we are learning by doing and we are contributing all of that back 
to the community.

What surprises me is how our efforts have been received by the community who 
produced these standards in the first place.  


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Dave CROCKER


On 6/2/2010 11:29 AM, Brett McDowell wrote:
 ADSP seems to mean one thing to pundits and something else to the people
 actually using it.  Who is right?

 Recent experience suggests that they often don't.

 Can you name someone with ADSP experience who doesn't understand what it
 means?


Since we've been seeing reports of breakage due to using ADSP records for
domains that are not under sufficient control, it is clear that some fraction of
the ADSP-using world does not understand what it is for, or at least what its
limitations are.

d/

-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread John R. Levine
 If the domain or subdomain involved has enduser (at all) accounts then
 it is likely a poor candidate for ADSP DISCARDABLE. ADSP DISCARDABLE
 should be used for domains that are subject to high levels of abuse and
 are used primarily for transactional or marketing email and where the
 mail flows are strictly controlled.

I entirely agree.  (So there!)

The question remains how to reliably identify such domains.

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread MH Michael Hammer (5304)


 -Original Message-
 From: John R. Levine [mailto:jo...@iecc.com]
 Sent: Wednesday, June 02, 2010 3:38 PM
 To: MH Michael Hammer (5304)
 Cc: DKIM List
 Subject: RE: [ietf-dkim] list vs contributor signatures, was Wrong
 Discussion
 
  I can't help myself. This image of John sitting at a desk with his
quill
  and inkwell manually maintaining his credible list by the light of a
  whale oil lamp keeps popping into my minds eye. How scalable is that
  list John?
 
 If ye towne cryer dost distribute such a liste to manye and divers
mail
 servers, as scalable as ye do wante.
 

This addresses distribution of the list, not maintaining the list. Ye
olde add/change/delete issue. And of course there is the question of
whether folks will trust (the generic) you as widely as a solid
standards based approach for self-publication.

 I agree it would be useful to have a way to discover whose mail is
signed
 and usefully discardable.  But there's little reason to think that
 self-publication along the lines of ADSP will do it successfully.
 

There's little reason to think it won't. Time wounds all heels. As I've
said before, I believe ADSP is crippled intentionally so. There were
compromises of various sorts in order to be able to get the document
out. One need only look at the discussions around SSP drafts 1- I think
it was 13 or so).  Could it be fixed? Possibly. Will it be fixed?
Doubtful. It is unlikely that there will be sufficient will or consensus
from this working group for such an effort to be successful.

Mike

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread MH Michael Hammer (5304)


 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-
 boun...@mipassoc.org] On Behalf Of Dave CROCKER
 Sent: Wednesday, June 02, 2010 3:48 PM
 To: Brett McDowell
 Cc: ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] list vs contributor signatures, was Wrong
 Discussion
 
 
 
 On 6/2/2010 11:29 AM, Brett McDowell wrote:
  ADSP seems to mean one thing to pundits and something else to the
people
  actually using it.  Who is right?
 
  Recent experience suggests that they often don't.
 
  Can you name someone with ADSP experience who doesn't understand
what it
  means?
 
 
 Since we've been seeing reports of breakage due to using ADSP records
for
 domains that are not under sufficient control, it is clear that some
 fraction of
 the ADSP-using world does not understand what it is for, or at least
what
 its
 limitations are.
 

If we apply this to other standards (SMTP, DNS, HTTP, etc) we would just
have to power down the whole internet. The best that we can do is come
up with something that makes a modicum of sense, fix things we didn't
anticipate or understand because we needed operational experience and
move on.

There will always be some fraction of the user/implementer base that
won't understand protocols, standards or RFCs. It kind of goes with the
territory.

Mike

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Dave CROCKER


On 6/2/2010 12:58 PM, MH Michael Hammer (5304) wrote:
 Since we've been seeing reports of breakage due to using ADSP records for
 domains that are not under sufficient control, it is clear that some
 fraction of the ADSP-using world does not understand what it is for, or at
 least what its limitations are.

 If we apply this to other standards (SMTP, DNS, HTTP, etc) we would just
 have to power down the whole internet. The best that we can do is come up
 with something that makes a modicum of sense, fix things we didn't anticipate
 or understand because we needed operational experience and move on.

 There will always be some fraction of the user/implementer base that won't
 understand protocols, standards or RFCs. It kind of goes with the territory.


Mike, this is the sort of discussion disconnect that prevents making progress. 
I'm copying the list because it's a broad-based problem we are all having in 
trying to discuss issues.

First, a question was put forward and I offered an answer.  It is simply not 
fair to then respond in a manner that dismisses that answer (or at least 
dismisses it in this way.)

Second, the usual way that services get successful is to look for problems in 
their use and look for ways to correct them.  Simply saying that there are 
always some problems is not helpful.

Third, we do not have massive amounts of ADSP success which permits 
marginalizing a tiny amount of problems.  We have tiny use, with notable 
breakage.

Fourth, it has become increasingly clear to me, at least, that there is 
broad-based misunderstanding of what can reasonably be accomplished with DKIM 
and what can reasonably be accomplished with ADSP, versus what cannot.  Failure 
to gain broad-based agreement about both capabilities and limits ensures an 
on-going mismatch in expectations.

If proponents want simply to keep automatically saying that things are great 
and 
keep automatically rejecting any counter-points, then I'm not clear what the 
purpose of these discussions is.

d/

-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread MH Michael Hammer (5304)


 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-
 boun...@mipassoc.org] On Behalf Of Brett McDowell
 Sent: Wednesday, June 02, 2010 3:46 PM
 To: John R. Levine
 Cc: DKIM List
 Subject: Re: [ietf-dkim] list vs contributor signatures, was Wrong
 Discussion
 

SNIP

 
 What surprises me is how our efforts have been received by the
community
 who produced these standards in the first place.
 
 

Brett, I'm sorry you are surprised. 

This space has been contentious going back something like 10 years (or
more). Many of the participants go at it tong and hammer but we can
still sit down for dinner or a drink at the usual gatherings.

Truth be told, the Financial sector (including PayPal) as well as other
key groups have been pretty much MIA from a lot of the discussions for a
long time. Many of the points of contention have been discussed ad
nauseum over the years without resolution or through compromises that
gave us crippled outcomes like ADSP.

Actually, IETF has been somewhat mild compared to MARID G.

Mike

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread MH Michael Hammer (5304)


 -Original Message-
 From: MH Michael Hammer (5304)
 Sent: Wednesday, June 02, 2010 4:21 PM
 To: 'Brett McDowell'; John R. Levine
 Cc: DKIM List
 Subject: RE: [ietf-dkim] list vs contributor signatures, was Wrong
 Discussion
 
 
 
 
 Actually, IETF has been somewhat mild compared to MARID G.
 
 Mike

Apologies, that should read IETF-DKIM

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Dave CROCKER


On 6/2/2010 1:21 PM, MH Michael Hammer (5304) wrote:
 Actually, IETF has been somewhat mild compared to MARIDG.


Narrower topic.  Smaller group.

Made it a lot easier to be selective with the attacks...

d/

-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread MH Michael Hammer (5304)


 -Original Message-
 From: Dave CROCKER [mailto:d...@dcrocker.net]
 Sent: Wednesday, June 02, 2010 4:06 PM
 To: MH Michael Hammer (5304)
 Cc: ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] list vs contributor signatures, was Wrong
 Discussion
 
 
 
 On 6/2/2010 12:58 PM, MH Michael Hammer (5304) wrote:
  Since we've been seeing reports of breakage due to using ADSP
records
 for
  domains that are not under sufficient control, it is clear that
some
  fraction of the ADSP-using world does not understand what it is
for, or
 at
  least what its limitations are.
 
  If we apply this to other standards (SMTP, DNS, HTTP, etc) we would
just
  have to power down the whole internet. The best that we can do is
come
 up
  with something that makes a modicum of sense, fix things we didn't
 anticipate
  or understand because we needed operational experience and move on.
 
  There will always be some fraction of the user/implementer base that
 won't
  understand protocols, standards or RFCs. It kind of goes with the
 territory.
 
 
 Mike, this is the sort of discussion disconnect that prevents making
 progress.
 I'm copying the list because it's a broad-based problem we are all
having
 in
 trying to discuss issues.
 

Simply stating that we are seeing some reports of breakage due to using
ADSP records for domains that are not under sufficient control does not
add much of anything meaningful to the discussion. This issue has been
discussed for YEARS and now that we see it some people are acting
shocked? I'm shocked I tell you. I seem to remember this very discussion
at an excellent dinner following the FTC workshop in 2007. This same
discussion was held years before that when SSP was just a gleam in
everyone's eye. This is something that was predicted and predictable. 

At the end of the day, ADSP was a compromise that limited usefulness to
a handful of corner cases implemented under extremely tight control at
the risk of breakage and collateral damage if not carefully implemented.

 First, a question was put forward and I offered an answer.  It is
simply
 not
 fair to then respond in a manner that dismisses that answer (or at
least
 dismisses it in this way.)
 
 Second, the usual way that services get successful is to look for
problems
 in
 their use and look for ways to correct them.  Simply saying that there
are
 always some problems is not helpful.
 

We know the answers for ADSP... see above.

 Third, we do not have massive amounts of ADSP success which permits
 marginalizing a tiny amount of problems.  We have tiny use, with
notable
 breakage.
 

I'm still waiting for someone to produce use numbers (of domains) for
ADSP. Just out of curiosity, what number do we have to reach to hit the
technical term massive? Somehow I doubt that in it's current
incarnation ADSP will ever have massive implementation.

From another perspective, in the greater scheme of standards, ADSP is
still very much wet behind the ears. It wasn't until October of 2008
that there was interoperability testing. 

 Fourth, it has become increasingly clear to me, at least, that there
is
 broad-based misunderstanding of what can reasonably be accomplished
with
 DKIM
 and what can reasonably be accomplished with ADSP, versus what cannot.

I agree with you on that. Something along the lines of pixie dust,
unicorn horns, magic spam prevention, makes you taller and your teeth
whiter... 

 Failure
 to gain broad-based agreement about both capabilities and limits
ensures
 an
 on-going mismatch in expectations.
 

And thus the rise of 3rd party trusted intermediaries.

 If proponents want simply to keep automatically saying that things are
 great and
 keep automatically rejecting any counter-points, then I'm not clear
what
 the
 purpose of these discussions is.
 

I'm not a proponent and I'm not saying things are great. I believe I've
stated a few times that I believe that ADSP is crippled and I don't see
myself publishing discardable. 

When the counterpoints are along the lines of some people have some
problems and the point is made if we were following the standard then
we wouldn't be seeing your mail anyways, then my response is. then
why aren't you discarding it? Either you believe in the standard you
helped craft or you don't.

So, is this a discussion about a BCP for MLMs or is this a discussion
about revisiting the ADSP spec? The course of the discussion really
depends on what the consensus is.

Mike



___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread MH Michael Hammer (5304)


 -Original Message-
 From: Dave CROCKER [mailto:d...@dcrocker.net]
 Sent: Wednesday, June 02, 2010 4:26 PM
 To: MH Michael Hammer (5304)
 Cc: DKIM List
 Subject: Re: [ietf-dkim] list vs contributor signatures, was Wrong
 Discussion
 
 
 
 On 6/2/2010 1:21 PM, MH Michael Hammer (5304) wrote:
  Actually, IETF has been somewhat mild compared to MARIDG.
 

I appreciate that you understood what I meant rather than what I wrote.

 
 Narrower topic.  Smaller group.
 
 Made it a lot easier to be selective with the attacks...
 

Actually, I think it was because MARID involved much more of the
characteristics of a religious war. This is merely about passionate
philosophical positions.

Mike

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Steve Atkins

On Jun 2, 2010, at 12:28 PM, Brett McDowell wrote:

 
 On Jun 2, 2010, at 2:41 PM, Steve Atkins wrote:
 
 
 Second...
 
   steve$ host -t txt _adsp._domainkey.paypal.net
   _adsp._domainkey.paypal.net has no TXT record
   steve$ host -t txt paypal.net
   paypal.net has no TXT record
 
 ... I wasn't going to mention it, but you brought it up. The MX for 
 paypal.net will also give a 2xx response to any RCPT TO in the paypal.net 
 domain.
 
 ...and I wasn't going to mention that I tried to work with you off-list to 
 get more information about your phish from paypal.net but you didn't respond. 
   If you get a chance, please do send that along.

I did[1].

It looks like your mailsystem is discarding email it shouldn't. There's a copy 
at http://tupid.org/paypal1.txt if you can't find it.

It seems that paypal is not currently monitoring phishing, nor doing anything 
to deter it, on 99.9% of the domains they own, so have no real idea of what 
phishing is going on. 

Pointing those thousand domains at a catch-all mailserver with a wildcard MX 
and looking for bounces and spamfilter rejections might be a good way of 
getting metrics about how phishers respond to domains being owned by paypal 
over time. Those same metrics after adding SPF and ADSP records for those 
domains over time would be interesting. 
http://blog.wordtothewise.com/2010/05/how-to-disable-a-domain/ has some 
examples of how to set those up.

That's the sort of data gathering I was suggesting you do, rather than just a 
bald count of DNS queries, when I looked at the numbers for my mailbox. 
(There's a copy of my raw data at http://tupid.org/paypal1.sql.txt if anyone is 
interested in running their own model against it.)

(I'm not going to respond to the other misunderstandings unless someone really 
wants me to. I'm guessing most people are long past tl;dr at this point.)

Cheers,
  Steve

[1] May 28 13:54:47 fruitbat postfix/smtp[31990]: DA551814E6: 
to=bmcdow...@paypal.com, relay=gort.ebay.com[216.113.167.215]:25, delay=0.74, 
delays=0.17/0/0.45/0.11, dsn=2.0.0, status=sent (250 ok:  Message 769193797 
accepted)
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] the danger of ADSP, was list vs contributor

2010-06-02 Thread John R. Levine
 You'd call it malice to prioritize consumer protection over the a very 
 small population of employees being temporarily inconvenienced by having 
 some of their messages to mail lists delivered to SPAM and in some 
 corner cases, actually unsubscribed from lists...

You're welcome to take whatever risks you want with your own mail. 
That's not the issue. I was thinking of the perverse case where another 
organization sent discardable mail to a different list, and unrelated 
people rejected it and got bounced off.  Yes, they both were arguably 
doing something wrong, but it was startling to find second order damage 
from ADSP to someone who wasn't publishing it.

If it's not clear, I think it's wonderful that Paypal signs all their mail 
so that we can reasonably safely dump the unsigned stuff.  I have my mail 
system set up to do that, albeit configured locally, not by ADSP.

The basic problem with ADSP is that we shipped an untested prototype, and 
at this point the only way to test it is to try experiments and hope they 
don't do too much damage before we have a chance to tweak and mitigate the 
problems.  I appreciate that Paypal's intentions are entirely virtuous, 
and that you deal with problems pretty quickly for a large organization.

But since you're the elephant in this particular room, the visibility of 
accidental damage would be particularly great.  I am concerned that since 
the distinction between DKIM and ADSP is unclear to many people, they may 
take away the impression that if they sign with DKIM, their mail will get 
lost.

Since Paypal's practices are for the most part so good, it's very useful 
to be able to talk to people who are scratching their heads about DKIM and 
say do what Paypal does.  It's harder to say do what Paypal does, 
except don't do that.

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Brett McDowell
On Jun 2, 2010, at 4:05 PM, Dave CROCKER wrote:

 If proponents want simply to keep automatically saying that things are great 
 and 
 keep automatically rejecting any counter-points, then I'm not clear what the 
 purpose of these discussions is.

If opponents want simply to keep automatically saying that things are terrible 
and keep automatically rejecting any counter-points, then I'm not clear what 
the purpose of these discussions is.



___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] the danger of ADSP, was list vs contributor

2010-06-02 Thread Michael Thomas
On 06/02/2010 02:11 PM, John R. Levine wrote:
 The basic problem with ADSP is that we shipped an untested prototype, and
 at this point the only way to test it is to try experiments and hope they
 don't do too much damage before we have a chance to tweak and mitigate the
 problems.  I appreciate that Paypal's intentions are entirely virtuous,
 and that you deal with problems pretty quickly for a large organization.

This is the list's fault pure and simple. It's subscriber heuristics --
and please do not tell me they are anything but -- failed. While we
shouldn't expect much from mailing list operators and/or developers, we are
most certainly under no obligation to route around their buggy software
as if it were sacrosanct. This is a two way street.

Instead of kvetching about ADSP, you might tell the list owners that their
list software heuristics are broken.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Brett McDowell

On Jun 2, 2010, at 4:36 PM, MH Michael Hammer (5304) wrote:

 So, is this a discussion about a BCP for MLMs or is this a discussion
 about revisiting the ADSP spec? The course of the discussion really
 depends on what the consensus is.

Let's break these up.  Murray tried and I think succeeded to some degree of 
getting a clear thread that is dedicated only to the MLM BCP.  What makes that 
a refreshingly productive thread is that we have an I-D to review and comment 
on.

Perhaps we are at (or long past) the point of diminishing returns in debating 
the efficacy of ADSP until we have an I-D that covers fixing/enhancing ADSP to 
make it more useful.

-- Brett
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] the danger of ADSP, was list vs contributor

2010-06-02 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] 
 On Behalf Of John R. Levine
 Sent: Wednesday, June 02, 2010 2:11 PM
 To: Brett McDowell
 Cc: DKIM List
 Subject: Re: [ietf-dkim] the danger of ADSP, was list vs contributor
 
 The basic problem with ADSP is that we shipped an untested prototype,
 and
 at this point the only way to test it is to try experiments and hope
 they
 don't do too much damage before we have a chance to tweak and mitigate
 the
 problems.  I appreciate that Paypal's intentions are entirely virtuous,
 and that you deal with problems pretty quickly for a large
 organization.

If we all agree that that's a valid characterization of ADSP, I suggest we move 
to get it downgraded from Proposed Standard to Experimental.  There's certainly 
a lot of rhetoric suggesting it's an experiment that's in the process of 
failing, though the experiment is also arguably not complete.

At any rate, I'm happy to participate in an effort to specify something that 
actually stands a chance of working, and test it in widely available software.

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] the danger of ADSP, was list vs contributor

2010-06-02 Thread Steve Atkins

On Jun 2, 2010, at 2:58 PM, Murray S. Kucherawy wrote:
 
 
 The basic problem with ADSP is that we shipped an untested prototype,
 and
 at this point the only way to test it is to try experiments and hope
 they
 don't do too much damage before we have a chance to tweak and mitigate
 the
 problems.  I appreciate that Paypal's intentions are entirely virtuous,
 and that you deal with problems pretty quickly for a large
 organization.
 
 If we all agree that that's a valid characterization of ADSP, I suggest we 
 move to get it downgraded from Proposed Standard to Experimental.  There's 
 certainly a lot of rhetoric suggesting it's an experiment that's in the 
 process of failing, though the experiment is also arguably not complete.

+1

 
 At any rate, I'm happy to participate in an effort to specify something that 
 actually stands a chance of working, and test it in widely available software.
 

Also, there have been a couple of suggestions along those lines that at least 
sound promising, but that weren't based on ADSP. I'm not sure where the best 
place to discuss them might be (and ASRG isn't it).

Cheers,
  Steve
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] the danger of ADSP, was list vs contributor

2010-06-02 Thread Dave CROCKER


On 6/2/2010 2:58 PM, Murray S. Kucherawy wrote:
 If we all agree that that's a valid characterization of ADSP, I suggest we
 move to get it downgraded from Proposed Standard to Experimental.

I don't recall seeing anything that looks like we all agree on such a point. 
That some do is fine,but  we also know that many do not.

So we all really need to back away from this sort of drama.


   There's
 certainly a lot of rhetoric suggesting it's an experiment that's in the
 process of failing, though the experiment is also arguably not complete.

We should all be far more concerned that legitimate questions about limits to 
usability and observed failure scenarios cannot be reasonably discussed.

That's a good way to ensure that serious barriers to widespread successful use 
will not be resolved.

d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] the danger of ADSP, was list vs contributor

2010-06-02 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-
 boun...@mipassoc.org] On Behalf Of Steve Atkins
 Sent: Wednesday, June 02, 2010 3:07 PM
 To: DKIM List
 Subject: Re: [ietf-dkim] the danger of ADSP, was list vs contributor
 
  At any rate, I'm happy to participate in an effort to specify
  something that actually stands a chance of working, and test it in
  widely available software.
 
 Also, there have been a couple of suggestions along those lines that at
 least sound promising, but that weren't based on ADSP. I'm not sure
 where the best place to discuss them might be (and ASRG isn't it).

A completely new spec with the goal of domain protection tied to DKIM is 
(theoretically) a good fit for this WG, I would think.

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] the danger of ADSP, was list vs contributor

2010-06-02 Thread John R. Levine
 If we all agree that that's a valid characterization of ADSP, I suggest we 
 move to get it downgraded from Proposed Standard to Experimental.  There's 
 certainly a lot of rhetoric suggesting it's an experiment that's in the 
 process of failing, though the experiment is also arguably not complete.

At this point, I think a reasonable message is to tell people that it's 
fine to publish whatever ADSP they think best describes their mail stream.

But don't use it to manage your inbound mail unless you're willing to hand 
control of your mail to people of unknown competence and/or virtue.  Some 
senders will be fine, some will not.  I'm trying to come up with as many 
perverse ADSP scenarios as I can.

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


[ietf-dkim] ADSP intent vs. usage (was Re: list vs contributor signatures, was Wrong Discussion)

2010-06-02 Thread J.D. Falk
On Jun 2, 2010, at 1:26 PM, John R. Levine wrote:

 Recent experience suggests that they often don't.
 Can you name someone with ADSP experience who doesn't understand what it 
 means?
 
 Not to pick on you specifically, since there are multiple examples, but 
 I'd say that domains that publish dkim=discardable and who let their users 
 subscribe and send messages to mailing lists don't understand what their 
 ADSP is telling people.

Perhaps another way to put it is that they're not using ADSP discardable in the 
way that ADSP's designers intended.  This appears to present two options, both 
of which have been attempted in this thread:

1. assume that the domain owner is wrong
2. assume that the ADSP design is wrong

I think there's also a third option, which I haven't seen explored in depth yet 
(though I may have missed it):

3. find out why the domain owner thought that their implementation would be okay

--
J.D. Falk jdf...@returnpath.net
Return Path Inc





___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] ADSP and Discardable (was Re: Lists BCP draft review)

2010-06-02 Thread J.D. Falk
On Jun 2, 2010, at 10:55 AM, John R. Levine wrote:

 My guess is that the phrase the domain encourages the recipient(s) to 
 discard it is intended to refer to a silent discard.
 
 I don't think any of us expected the recipient to send a notification.  I 
 certainly didn't, since the assumption would be that the message was 
 probably from a hostile sender.

+1

Also, there's documented precedent within the IETF.  RFC 863 has a clear 
definition: A discard service simply throws away any data it receives.  RFC 
5321 (and 2821, and 821) applied that definition to email, with specifics for 
programmers:

 2.3.6.  Buffer and State Table
 
SMTP sessions are stateful, with both parties carefully maintaining a
common view of the current state.  In this document, we model this
state by a virtual buffer and a state table on the server that
may be used by the client to, for example, clear the buffer or
reset the state table, causing the information in the buffer to be
discarded and the state to be returned to some previous state.

5321 uses discard or discarded in other places, too.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc





___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] the danger of ADSP, was list vs contributor

2010-06-02 Thread J.D. Falk
On Jun 2, 2010, at 4:08 PM, Dave CROCKER wrote:

 On 6/2/2010 2:58 PM, Murray S. Kucherawy wrote:
 If we all agree that that's a valid characterization of ADSP, I suggest we
 move to get it downgraded from Proposed Standard to Experimental.
 
 I don't recall seeing anything that looks like we all agree on such a 
 point. 
 That some do is fine,but  we also know that many do not.

Count me as not agreeing.  We always knew ADSP discardable wasn't appropriate 
for domains with users who send messages to mailing lists, and is equally 
inappropriate for all sorts of other legitimate uses of email.  It's possible 
that the draft doesn't contain a strong enough warning that discardable = mail 
could be discarded, but that doesn't mean the whole thing is entirely broken.

I'd really like to hear from a domain owner who published a discardable policy 
even though they knew they had users who send messages to mailing lists.  I'd 
like to know why they thought it was okay.  Then, we'll know.

--
J.D. Falk jdf...@returnpath.net
Return Path Inc


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] ADSP and Discardable (was Re: Lists BCP draft review)

2010-06-02 Thread Dave CROCKER



 Also, there's documented precedent within the IETF.  RFC 863 has a clear
 definition:
...
 2.3.6.  Buffer and State Table
...
 5321 uses discard or discarded in other places, too.


Well, one must always respect the lawyerly exercise of doing an audit to find
precedent.

But there's some distance between respect and agreement.

The problem is that an existence proof is quite different from being able to
assess/predict dominant human interpretation of the term.

In other words, just because someone, somewhere, sometime used the word in a
particular way, it says nothing about what most people, most of the time, will
take it mean.  I thought the issue here was the latter, not the former.

d/

-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] the danger of ADSP, was list vs contributor

2010-06-02 Thread Douglas Otis
On 6/2/10 2:43 PM, Michael Thomas wrote:
 Instead of kvetching about ADSP, you might tell the list owners that their
 list software heuristics are broken.

Michael,

Mailing lists are on higher ground, since they are not introducing the 
new mechanism.  ADSP is dealing with an issue significantly impacting 
less than one percent of email domains.  Mailing lists, on the other 
hand, serve a much higher percentage.

Domains wanting to make restrictive ADSP assertions while using 
third-party services, should enumerate which are to be excluded.  This 
enumeration helps prevent breakage without needing to elicit cooperation 
from non-participants.  This enumeration is possible within a single 
transaction that only occurs with the infrequent corner cases.  The goal 
of reducing the success of phishing is far better met when not requiring 
targeted domains to use more domains or sub-domains as their only means 
to isolate policy.  Especially when this leaves personal interactions 
exposed and creates increased recipient confusion.

-Doug


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] the danger of ADSP, was list vs contributor

2010-06-02 Thread Dave CROCKER


On 6/2/2010 3:36 PM, J.D. Falk wrote:
We always knew ADSP discardable wasn't appropriate
 for domains with users who send messages to mailing lists, and is equally
 inappropriate for all sorts of other legitimate uses of email.

This suggests attempting an exercise.  The exercise is to try to document the 
boundaries for using ADSP.  It requires being careful in describing failure 
scenarios and careful is assessing their likelihood.

As for attempting careful caveats so far, they are scattered around:

http://dkim.org/specs/draft-ietf-dkim-deployment-11.html#rfc.section.7.3

Whether they are too generic is a reasonable question to explore.
d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] the danger of ADSP, was list vs contributor

2010-06-02 Thread Michael Thomas
On 06/02/2010 03:47 PM, Douglas Otis wrote:
 On 6/2/10 2:43 PM, Michael Thomas wrote:
 Instead of kvetching about ADSP, you might tell the list owners that their
 list software heuristics are broken.

 Mailing lists are on higher ground, since they are not introducing the
 new mechanism.

When we let existing heuristics dictate what we can design on the net, then we 
have
failed. Heuristics by their nature are then things that need to deal with their 
own
shortcomings. The problem here is not with ADSP. It's bad assumptions made by 
heuristics.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] the danger of ADSP, was list vs contributor

2010-06-02 Thread Steve Atkins

On Jun 2, 2010, at 4:10 PM, Michael Thomas wrote:

 On 06/02/2010 03:47 PM, Douglas Otis wrote:
 On 6/2/10 2:43 PM, Michael Thomas wrote:
 Instead of kvetching about ADSP, you might tell the list owners that their
 list software heuristics are broken.
 
 Mailing lists are on higher ground, since they are not introducing the
 new mechanism.
 
 When we let existing heuristics dictate what we can design on the net, then 
 we have
 failed. Heuristics by their nature are then things that need to deal with 
 their own
 shortcomings. The problem here is not with ADSP. It's bad assumptions made by 
 heuristics.

The heuristic here is that a 5xx ESMTP response means that the
recipient is rejecting email from the sender, I believe. It's not really
an obscure bit of existing practice, rather it's both best and common.

Once we're at the point where we're describing that as something
that can safely be ignored if we want to then I have to wonder
what mail system we're planning to layer all this stuff on top of.

Cheers,
  Steve


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] the danger of ADSP, was list vs contributor

2010-06-02 Thread Michael Thomas
On 06/02/2010 04:25 PM, Steve Atkins wrote:

 On Jun 2, 2010, at 4:10 PM, Michael Thomas wrote:

 On 06/02/2010 03:47 PM, Douglas Otis wrote:
 On 6/2/10 2:43 PM, Michael Thomas wrote:
 Instead of kvetching about ADSP, you might tell the list owners that their
 list software heuristics are broken.

 Mailing lists are on higher ground, since they are not introducing the
 new mechanism.

 When we let existing heuristics dictate what we can design on the net, then 
 we have
 failed. Heuristics by their nature are then things that need to deal with 
 their own
 shortcomings. The problem here is not with ADSP. It's bad assumptions made 
 by heuristics.

 The heuristic here is that a 5xx ESMTP response means that the
 recipient is rejecting email from the sender, I believe. It's not really
 an obscure bit of existing practice, rather it's both best and common.

No. The heuristic is because I got a reject(s) from this subscriber delivering
his list mail, I'm going to kick him. That's a heuristic. It's not working 
right.
You could probably get the same bad outcome with a determined attacker not using
ADSP at all.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] the danger of ADSP, was list vs contributor

2010-06-02 Thread John Levine
This suggests attempting an exercise.  The exercise is to try to document the 
boundaries for using ADSP.  It requires being careful in describing failure 
scenarios and careful is assessing their likelihood.

As for attempting careful caveats so far, they are scattered around:

http://dkim.org/specs/draft-ietf-dkim-deployment-11.html#rfc.section.7.3

We put some warnings in RFC 5617, Appendix B, including this one:

B.5.  Domains with Independent Users and Liberal Use Policies

   When a domain has independent users and its usage policy does not
   explicitly restrict them to sending mail only from designated mail
   servers (e.g., many ISP domains and even some corporate domains),
   then it is only appropriate to publish an ADSP record containing
   unknown.  Publishing either all or discardable will likely
   result in significant breakage because independent users are likely
   to send mail from the external paths enumerated in Appendix B.1.

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list ADSP, was Lists BCP draft available

2010-06-02 Thread John Levine
 But I don't think it's clear that doing so would change anything at
 the recipients MX. As a concrete example, if two subscribers to a
 mailing list send mail to the list, one DKIM signed and one not,
 and the list then signs each message and sends it to the recipient,
 is there any reason that the recipients MX would treat those two
 messages differently?

Yes.

I still don't get it.  The sorting rules I use on mailing lists are
based on the list's identity using List-ID: headers or subject tags,
not the individual sender.  People will, I hope, correct me if I'm
wrong, but I'm pretty sure that's typical of existing practice.

It's possible to add all sorts of extra stuff to messages to pass
through all sorts of complex assertions, but my list sorting works
perfectly well now.  What problem for the list recipient are we
solving with this proposed extra mechanism?

To address one possibility, none of the lists I'm on have significant
problems with bad guys sneaking messages onto the lists by pretending
to meet the criteria for posting messages to the list.  Back in the
Krazy Kevin era, 15 years ago, that was a problem but list owners and
managers have dealt with it quite successfully.  If the claim is that
it'll become a problem again, I think it's fair to ask why, since list
owners and managers have dealt with it in the past, they wouldn't
continue to do so.

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] the danger of ADSP, was list vs contributor

2010-06-02 Thread Steve Atkins

On Jun 2, 2010, at 4:42 PM, John Levine wrote:

 This suggests attempting an exercise.  The exercise is to try to document 
 the 
 boundaries for using ADSP.  It requires being careful in describing failure 
 scenarios and careful is assessing their likelihood.
 
 As for attempting careful caveats so far, they are scattered around:
 
   http://dkim.org/specs/draft-ietf-dkim-deployment-11.html#rfc.section.7.3
 
 We put some warnings in RFC 5617, Appendix B, including this one:
 
 B.5.  Domains with Independent Users and Liberal Use Policies
 
   When a domain has independent users and its usage policy does not
   explicitly restrict them to sending mail only from designated mail
   servers (e.g., many ISP domains and even some corporate domains),
   then it is only appropriate to publish an ADSP record containing
   unknown.  Publishing either all or discardable will likely
   result in significant breakage because independent users are likely
   to send mail from the external paths enumerated in Appendix B.1.

It would be interesting to see the result of someone publishing ADSP
records following the advice in that document. It'd be a good first
step on looking at operational experience.

Cheers,
  Steve


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


[ietf-dkim] My discardable statistics

2010-06-02 Thread John Levine
I've been saving the DKIM signatures on mail sent to my inbox for
about the past year, so I did a little analysis on them.  There's a
total of 71,000 signed messages that got to the procmail delivery
filter, signed by a total of 474 domains.  I went through and looked
up the ADSP records for all of them.  I found 51 ADSP records:

24 dkim=all
19 dkim=unknown
8 dkim=discardable

A few had t=s but none of the discardables did.

Let's take a look at those eight records. The number on each line is
the number of messages:

135 paypal.com dkim=discardable
23 paypal.co.uk dkim=discardable
7 intl.paypal.com dkim=discardable
6 mail.julianhaight.com dkim=discardable
4 undp.org dkim=discardable
4 info.paypal.com dkim=discardable
2 info.paypal.ca dkim=discardable
1 info.paypal.co.uk dkim=discardable

Six of them are Paypal, who presumably know what they're doing.

Of the other two, mail.julianhaight.com is Julian's personal domain.
All of the mail from that domain came through a mailing list, which
tells us that he didn't follow the advice in RFC 5617.

It appears that undp.org really is a branch of the United Nations, and
their mail management isn't very good.  All four of those messages
came from the UNDP's mail servers, all four of them had return
addresses that appear to be individual users at undp.org, and all four
of them are spam or phish, presumably from botted PCs.  Two of the
DKIM signatures verify, two don't, haven't looked hard enough to tell
why not, but they were broken when they arrived at my MTA.  (Look at
the spamassassin lines, added at SMTP time.)

They're all in my spam archive, so you can look at them yourself:

http://spample.iecc.com/yjf/21798071
http://spample.iecc.com/yvh/22631217
http://spample.iecc.com/oga/22622255
http://spample.iecc.com/gdx/22039445

Looking at the headers, this mail appears to have taken the same path
that real user mail would have taken, so discardable is wrong here,
too.  Note that even though the mail is spam, the From: line addresses
are in the domain of the sending system, so for ADSP purposes, they're
OK, or would be if the signatures were good.

I admit that this isn't a very big sample, but it does say that of
all the people who sent me mail in the past year, Paypal is the
only one who used ADSP discardable in a way that would would be
useful for inbound mail handling.

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] the danger of ADSP, was list vs contributor

2010-06-02 Thread John Levine
 The basic problem with ADSP is that we shipped an untested prototype, ...

The problems with ADSP aren't just for lists, but whatever.

Instead of kvetching about ADSP, you might tell the list owners that
their list software heuristics are broken.

Oh, OK, that shouldn't be hard.

I'll get right on it as soon as I'm done telling all the forwarders
to rewrite the envelopes so I can use SPF -all.

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Bill.Oxley
havnt been keeping up with all of the threads so forgive me if I am repeating 
earlier arguments
ADSP is crippled, intentionally so. Its usefulness is limited to financial 
transaction types of transactions that may well be easily duplicated with a 
whale lamp, quill and parchment rbl management.
DKIM is useful to determine who actually sent the mail. 1/2 of SPAM has valid 
DKIM signatures, the other half (bots) dont use it. It is a decent indicator 
that is useful along with all of the other tools on the belt. Its not a 
standalone fixall.
carry on,
Bill
On Jun 2, 2010, at 4:21 PM, MH Michael Hammer (5304) wrote:

 
 
 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-
 boun...@mipassoc.org] On Behalf Of Brett McDowell
 Sent: Wednesday, June 02, 2010 3:46 PM
 To: John R. Levine
 Cc: DKIM List
 Subject: Re: [ietf-dkim] list vs contributor signatures, was Wrong
 Discussion
 
 
 SNIP
 
 
 What surprises me is how our efforts have been received by the
 community
 who produced these standards in the first place.
 
 
 
 Brett, I'm sorry you are surprised. 
 
 This space has been contentious going back something like 10 years (or
 more). Many of the participants go at it tong and hammer but we can
 still sit down for dinner or a drink at the usual gatherings.
 
 Truth be told, the Financial sector (including PayPal) as well as other
 key groups have been pretty much MIA from a lot of the discussions for a
 long time. Many of the points of contention have been discussed ad
 nauseum over the years without resolution or through compromises that
 gave us crippled outcomes like ADSP.
 
 Actually, IETF has been somewhat mild compared to MARID G.
 
 Mike
 
 ___
 NOTE WELL: This list operates according to 
 http://mipassoc.org/dkim/ietf-list-rules.html


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] the danger of ADSP, was list vs contributor

2010-06-02 Thread Michael Thomas
 Instead of kvetching about ADSP, you might tell the list owners that
 their list software heuristics are broken.

 Oh, OK, that shouldn't be hard.

Actually, I doubt it will be hard. The casualties of ADSP causing
third party kicks causes the blame to laid where it deserves: the
list software. I have little doubt that they'll squawk and scream
and throw tantrums about ADSP and in the end fix their broken
software.

Mike, we've already seen the first stages right here, actually
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] shared drop lists

2010-06-02 Thread John Levine
 My problem with this position is that it seems to argue for
 proprietary one-off solutions vs. Internet standards for email
 authentication policy assertions.

That's certainly a reasonable concern.  I expect that if it turns out
there are more discardable domains than Paypal, people would use
shared drop lists, just like they use shared blacklists and whitelists
of IP addresses and domains now.

Last year Paul Hoffman, Arvel Hathcock and I published RFC 5518 on
Vouch by Reference, which we intended as a way to publish whitelists
of responsible domains, originally DKIM signing domains but also
usable for domains that pass SPF -all.  It would only take a small
tweak to VbR to use it to publish shared drop lists.

VbR is deliberately really simple; it's a single DNS lookup, prepend the
name you're looking up to _vouch and the VbR service's name.  The result
is a txt record saying what kind of mail it's vouching for, with the
list currently being all, list, or transaction.

We could add discardable as a VbR field, and do lookups like this,
for a list called drop.services.net.

$ dig info.paypal.ca._vouch.drop.services.net txt

;  DiG 9.6.1-P1  info.paypal.ca._vouch.drop.services.net txt

;; QUESTION SECTION:
;info.paypal.ca._vouch.drop.services.net. IN TXT

;; ANSWER SECTION:
info.paypal.ca._vouch.drop.services.net. 7200 IN TXT transaction discardable

(This really works, by the way.  Try it!)

There'd be some other minor tweaks to VbR to bypass an optimization in
VbR that puts hints in the mail about where to look, obviously not
useful if you're looking up mail that you suspect is a phish.

At this point my published drop list contains paypal domains, who
publish ADSP, and ebay and amazon who don't publish ADSP, but who send
transaction mail all of which is as far as I can tell signed.  Looking
at the rest of the signatures in my archive, I don't see anyone other
reasonable candidates yet.

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] list vs contributor signatures, was Wrong Discussion

2010-06-02 Thread Jim Fenton
wakes up

MH Michael Hammer (5304) wrote:

 I'm still waiting for someone to produce use numbers (of domains) for
 ADSP. Just out of curiosity, what number do we have to reach to hit the
 technical term massive? Somehow I doubt that in it's current
 incarnation ADSP will ever have massive implementation.
   

I recently surveyed the domains from which Cisco has received valid DKIM 
signatures:

dkim=unknown: 205 domains
dkim=all: 135 domains
dkim=discardable:  63 domains

There are perhaps some other domains that are publishing 'discardable' 
because they don't send any mail, but we wouldn't have seen them in this 
study.

There's only a weak motivation (involving better DNS caching) for 
publishing dkim=unknown, so it's hard to gauge ADSP deployment by that 
number.  In order to publish all or discardable, the domain's practices 
need to align with that, so unless there's a way to tell that a domain 
is signing all their mail and not publishing ADSP then it's challenging 
to gauge ADSP deployment for either of these categories.

Addressing a question from elsewhere else in this massive thread, my 
home MTA runs the stock version of spamassassin that comes with Fedora 
12.  I haven't tweaked anything.  Assuming my reading of the 
configuration files is correct, spamassassin is querying ADSP for 
incoming mail, and applying a positive bump to the spamminess score 
when a message comes from a domain with dkim=all, and a bigger bump for 
dkim=discardable.  This could account for many of the adsp lookups that 
people are seeing.

-Jim


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html