Re: [ietf-dkim] MLMs and the use of multipart/alternative to preserve original DKIM signature and at the same time add a new DKIM signature

2010-08-03 Thread Rolf E. Sonneveld
On 08/03/2010 12:56 AM, Steve Atkins wrote:
 On Aug 2, 2010, at 3:37 PM, Rolf E. Sonneveld wrote:


 Hi, all

 in the light of the discussion about draft-ietf-dkim-mailinglists I'd
 like to propose an alternative way to solve the MLM dilemma on how to
 deal with original DKIM signature/message versus sending out a modified
 version of the message. This proposal may be impractical or hard to
 realize, but I'd just thought I had to share it with you.
  

 The proposal is to preserve the original message + DKIM signature and to
 add the new (probably partially rewritten) output message, combined into
 a multipart/alternative structure. The combined message is sent by the
 MLM to the recipient. For the original message + DKIM signature, we
 could register a Content-Type of e.g. message/dkim-original-message with
 IANA. The output message would be the other part of the
 multipart/alternative, with the normal MIME structure of the MLM output
 message. A sample message sent by an MLM (or more in general, by a
 re-signer) would look like:
  
 Does this mean that anyone can take their own content and
 a message DKIM signed by someone else, and then send it out
 such that their content will be displayed, but the (non-displayed)
 signed message will be checked?


No, it means that for both message parts a DKIM signature is checked for 
presence and the results of both are made available to the receiver 
('receiver' as in Murrays draft defined in par. 3.1). So effectively it 
means that in the situation you described, the 'own content' is 
displayed but lacks a verified DKIM signature and as such should be 
treated as a message without DKIM signature. The proposal just means to 
provide a way to tunnel the original contents of a message + DKIM 
signature and enable the verifier to verify not only the DKIM signature 
provided by the resigner, but also the original DKIM signature as well.

The A-R results of the original DKIM signature, provided by the resigner 
as part of the new DKIM signature can only be trusted if the 
verifier/receiver trusts the resigner. With the original DKIM signature 
+ message present, there is no need for this trust relation; the 
verifier itself can verify.

/rolf
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] MLMs and the use of multipart/alternative to preserve original DKIM signature and at the same time add a new DKIM signature

2010-08-03 Thread Rolf E. Sonneveld
On 08/03/2010 02:36 AM, John Levine wrote:
 The proposal is to preserve the original message + DKIM signature and to
 add the new (probably partially rewritten) output message, combined into
 a multipart/alternative structure. The combined message is sent by the
 MLM to the recipient.
  
 Once again, I can only see this as screwing up the 99+% of users for
 whom the lists work just fine for the1% who consider themselves so
 important that they need to mark their list mail with ADSP.


I did not have ADSP in mind when writing this proposal. Let me be clear 
about ADSP: IMO domains that publish adsp=discardable and yet send mail 
with that domain via mailing lists, get what they deserve: problems.

 Imagine you're a list manager.  Your list has 1000 subscribers.  Two
 of them demand that you do something to prevent address forgery due to
 forged unsigned messages, a problem that you have never observed to
 happen on your lists.  What do you do?  I know what I'd do.


In a nutshell the problem of the combination DKIM + MLM can be 
summarized (and simplified) as follows.

On the plus side:

1. the mail that is received by a subscriber to a mailing list carries 
(most of the time) the original From.
2. the original DKIM signature can still be present in the message (if 
we recommend the MLM authors to not remove DKIM-Signatures)

However...

3. the MLM rewrites the Subject (in many cases)
4. the MLM adds a footer (many cases)
5. see par. 3.3 of Murrays draft for more things MLMs do to messages

That means, we have a signature + From, but we no longer have a reliable 
copy of the message to verify them.

6. we can tell the MLM authors to change their code to no longer do 3., 
4. and 5. but, as Murray describes in par. 3.4:

quote
However, the practice of applying headers and footers to message
bodies is common and not expected to fade regardless of what
documents this or any standards body might produce.
/quote

With this situation in mind, I wrote my proposal, to provide the 
verifier on the receiving side with a means to verify the original DKIM 
signature.

/rolf
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] New Version Notification for draft-levine-dbr-00 (fwd)

2010-08-03 Thread Ian Eiloart


--On 29 July 2010 20:53:40 +0200 J.D. Falk 
jdfalk-li...@cybernothing.org wrote:

 On Jul 29, 2010, at 5:09 PM, Ian Eiloart wrote:

 --On 26 July 2010 18:24:34 +0200 J.D. Falk
 jdfalk-li...@cybernothing.org wrote:

 I think it's because, when you implement most protocols, if your end is
 broken then you can't even talk to the other end.  With ADSP, if your
 end is broken then you can still talk SMTP and even sign with DKIM, but
 the other end may silently discard your message.  There's no feedback.

 About 90% of the email sent to my personal email address ends up in a
 Gmail junk mail folder, that I never check. There's no feedback there,
 either.

 As far as SMTP is concerned, that mail was successfully delivered.


huh? The complaint is that the message is silently discarded somewhere 
downstream, and the sender gets no feedback. How can it matter what the 
technical means of achieving this are?


-- 
Ian Eiloart
IT Services, University of Sussex
01273-873148 x3148
For new support requests, see http://www.sussex.ac.uk/its/help/


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] MLMs and the use of multipart/alternative to preserve original DKIM signature and at the same time add a new DKIM signature

2010-08-03 Thread Hector Santos
Rolf,

It seems much easier for MLS (Mail List Servers) to preempt 
restrictive ADSP Domains from subscribing and from submitting mail to 
the list enabled with DKIM resigning.

Follow the specification and apply it accordingly using engineering 
sense. No Subjective concepts. We need persistent expectations across 
the board. The problem here is that list managers what to sign 
everything with disregard to policy.  There is no way you going to get

  DKIM+POLICY+MLS

correct.  Something has to give.  Support policy is an answer, getting 
rid of it is another so that at least everyone can work under the same 
plane.

It would easy to add new common sense options to our list server such:

List DKIM/ADSP options:

   [X] DKIM Sign this list

   [CLICK FOR DKIM SIGNING OPTIONS]

   [X] Disallow ADSP DISCARDABLE domains from subscribing.
   [X] Disallow ADSP DISCARDABLE domain list submissions.

   [X] Send Notification to domain for ADSP=DISCARD Policy
   restricted subscription or submissions.

   [EDIT NO-ASDP-ALLOW-SUBSCRIPTION TEMPLATE]
   [EDIT NO-ASDP-DISCARD-SUBMISSIONS TEMPLATE]

The template #1 would probably say:

   Dear {MSG.FROM}

   Sorry, but you can not subscribe to this list using
   a restricted ADSP DKIM=DISCARDABLE policy for your
   domain. If we had accept your subscription,  there is
   risk of harming the subscription status of other members
   already on the list. We don't wish to do that.

   Remedies:

   1) Remove the DKIM=DISCARDABLE ADSP policy or change
  ADSP policy to DKIM=ALL and reapply to subscribe
  to the list.

   2) Use another domain that isn't ADSP restricted.

The template #2 would probably say:

   Dear {MSG.FROM}

   Sorry, message submission to this list is restricted to
   domains with non-ADSP DISCARDABLE policies only.
   If we had accepted it,  there is risk of harming the
   subscription status of other members of the list. We don't
   wish to do that.

   Remedies:

   1) Remove the DKIM=DISCARDABLE ADSP policy or change
  ADSP policy to DKIM=ALL and resubmit your message.

   2) Use another domain that isn't ADSP restricted.

I can't remove popular features even if I wanted to and I seriously 
doubt any RFC will change this for most systems:

   [X] Add [LIST] Tag to Subject Line
   [X] Add Footer   [EDIT FOOTER TEMPLE]
   [X] Set Reply-To to List address
   [_] Strip HTML
   [_] Strip Attachments

and all other inherent integrity breaking ideas in MLS software and 
used by MLM (Mail List Managers).

We need to fit DKIM/POLICY into the system. Not fit the SYSTEM into 
DKIM/POLICY.  -1 towards ideas of altering 5322.From lines which will 
only open a nasty can of worms.  We would be breaking all kinds of 
Authorship From expectations, including touching base with copyright 
related issues.

Or get rid of POLICY if its hurting DKIM implementation for list 
servers. Working it to standardization yet list managers with DKIM 
resigners intentionally ignoring it is not going to work very well. 
Not supporting it is one thing, yet allowing ADSP domains to submit 
mail is another thing.  It doesn't mix well.

If this becomes the behavior what will happen is SMTP systems will be 
force to accept mail to discard it.  They won't be be able to reject 
mail at the transport level because that will promote a bounce towards 
the list server and this will hurt members of the list.

We can't dictate to SMTP developer and operators not to employ session 
level rejections.

-- 
HLS

Rolf E. Sonneveld wrote:
 On 08/03/2010 02:36 AM, John Levine wrote:
 The proposal is to preserve the original message + DKIM signature and to
 add the new (probably partially rewritten) output message, combined into
 a multipart/alternative structure. The combined message is sent by the
 MLM to the recipient.
  
 Once again, I can only see this as screwing up the 99+% of users for
 whom the lists work just fine for the1% who consider themselves so
 important that they need to mark their list mail with ADSP.

 
 I did not have ADSP in mind when writing this proposal. Let me be clear 
 about ADSP: IMO domains that publish adsp=discardable and yet send mail 
 with that domain via mailing lists, get what they deserve: problems.
 
 Imagine you're a list manager.  Your list has 1000 subscribers.  Two
 of them demand that you do something to prevent address forgery due to
 forged unsigned messages, a problem that you have never observed to
 happen on your lists.  What do you do?  I know what I'd do.

 
 In a nutshell the problem of the combination DKIM + MLM can be 
 summarized (and simplified) as follows.
 
 On the plus side:
 
 1. the mail that is received by a subscriber to a mailing list carries 
 (most of the time) the original From.
 2. the original DKIM signature can still be present in the message (if 
 we recommend the MLM authors to not remove DKIM-Signatures)
 
 However...
 
 3. the MLM rewrites the Subject (in many cases)
 4. the 

Re: [ietf-dkim] MLMs and the use of multipart/alternative to preserve original DKIM signature and at the same time add a new DKIM signature

2010-08-03 Thread Rolf E. Sonneveld
On 08/03/2010 02:02 PM, Hector Santos wrote:
 Rolf,

 It seems much easier for MLS (Mail List Servers) to preempt
 restrictive ADSP Domains from subscribing and from submitting mail to
 the list enabled with DKIM resigning.

 Follow the specification and apply it accordingly using engineering
 sense. No Subjective concepts. We need persistent expectations across
 the board. The problem here is that list managers what to sign
 everything with disregard to policy.  There is no way you going to get

DKIM+POLICY+MLS

 correct.  Something has to give.  Support policy is an answer, getting
 rid of it is another so that at least everyone can work under the same
 plane.

 It would easy to add new common sense options to our list server such:

 List DKIM/ADSP options:

 [X] DKIM Sign this list

 [CLICK FOR DKIM SIGNING OPTIONS]

 [X] Disallow ADSP DISCARDABLE domains from subscribing.
 [X] Disallow ADSP DISCARDABLE domain list submissions.

 [X] Send Notification to domain for ADSP=DISCARD Policy
 restricted subscription or submissions.

 [EDIT NO-ASDP-ALLOW-SUBSCRIPTION TEMPLATE]
 [EDIT NO-ASDP-DISCARD-SUBMISSIONS TEMPLATE]

 The template #1 would probably say:

 Dear {MSG.FROM}

 Sorry, but you can not subscribe to this list using
 a restricted ADSP DKIM=DISCARDABLE policy for your
 domain. If we had accept your subscription,  there is
 risk of harming the subscription status of other members
 already on the list. We don't wish to do that.

 Remedies:

 1) Remove the DKIM=DISCARDABLE ADSP policy or change
ADSP policy to DKIM=ALL and reapply to subscribe
to the list.

 2) Use another domain that isn't ADSP restricted.

 The template #2 would probably say:

 Dear {MSG.FROM}

 Sorry, message submission to this list is restricted to
 domains with non-ADSP DISCARDABLE policies only.
 If we had accepted it,  there is risk of harming the
 subscription status of other members of the list. We don't
 wish to do that.

 Remedies:

 1) Remove the DKIM=DISCARDABLE ADSP policy or change
ADSP policy to DKIM=ALL and resubmit your message.

 2) Use another domain that isn't ADSP restricted.

 I can't remove popular features even if I wanted to and I seriously
 doubt any RFC will change this for most systems:

 [X] Add [LIST] Tag to Subject Line
 [X] Add Footer   [EDIT FOOTER TEMPLE]
 [X] Set Reply-To to List address
 [_] Strip HTML
 [_] Strip Attachments

 and all other inherent integrity breaking ideas in MLS software and
 used by MLM (Mail List Managers).

 We need to fit DKIM/POLICY into the system. Not fit the SYSTEM into
 DKIM/POLICY.  -1 towards ideas of altering 5322.From lines which will
 only open a nasty can of worms.  We would be breaking all kinds of
 Authorship From expectations, including touching base with copyright
 related issues.

 Or get rid of POLICY if its hurting DKIM implementation for list
 servers. Working it to standardization yet list managers with DKIM
 resigners intentionally ignoring it is not going to work very well.
 Not supporting it is one thing, yet allowing ADSP domains to submit
 mail is another thing.  It doesn't mix well.

 If this becomes the behavior what will happen is SMTP systems will be
 force to accept mail to discard it.  They won't be be able to reject
 mail at the transport level because that will promote a bounce towards
 the list server and this will hurt members of the list.

 We can't dictate to SMTP developer and operators not to employ session
 level rejections.


My proposal was and is _not_ aimed at ADSP and _not_ at policies in 
general. The proposal only identifies a means to make MLMs (and 
re-signers in general) in a way 'transparant' for receivers of a mail. 
Nothing more, nothing less.

/rolf
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] MLMs and the use of multipart/alternative to preserve original DKIM signature and at the same time add a new DKIM signature

2010-08-03 Thread Bill.Oxley
When I receive an email from DKIM mailing list, I know that it may contain 
messages from Dave Hector John Doug et all but in my mind the from is DKIM 
mailing list. The only dkim sig I am interested in is ietf-dkim@mipassoc.org 
and if I bothered to check adsp for etf-d...@mipassoc.org I wouldnt waste time 
checking any other signatures/adsp assertions from participants as I see a 
mailing list as an aggregator. If I was designing mailing list software I would 
strip any incoming headers that made any assertions about the authors, sign the 
pile with my dkim sig and forward as designed. I would be asserting that 
etf-d...@mipassoc.org is the author/aggregator not a forwarding service. Trying 
to have 3rd party in a hands off transaction assert or check that the authoring 
party may be who they say they are and making decisions upon adsp discardable 
that may or may not be valid is beyond any sensible solution.
thanks, now back into lurk mode
Bill

On Aug 3, 2010, at 6:03 AM, Rolf E. Sonneveld wrote:

 On 08/03/2010 02:36 AM, John Levine wrote:
 The proposal is to preserve the original message + DKIM signature and to
 add the new (probably partially rewritten) output message, combined into
 a multipart/alternative structure. The combined message is sent by the
 MLM to the recipient.
 
 Once again, I can only see this as screwing up the 99+% of users for
 whom the lists work just fine for the1% who consider themselves so
 important that they need to mark their list mail with ADSP.
 
 
 I did not have ADSP in mind when writing this proposal. Let me be clear 
 about ADSP: IMO domains that publish adsp=discardable and yet send mail 
 with that domain via mailing lists, get what they deserve: problems.
 
 Imagine you're a list manager.  Your list has 1000 subscribers.  Two
 of them demand that you do something to prevent address forgery due to
 forged unsigned messages, a problem that you have never observed to
 happen on your lists.  What do you do?  I know what I'd do.
 
 
 In a nutshell the problem of the combination DKIM + MLM can be 
 summarized (and simplified) as follows.
 
 On the plus side:
 
 1. the mail that is received by a subscriber to a mailing list carries 
 (most of the time) the original From.
 2. the original DKIM signature can still be present in the message (if 
 we recommend the MLM authors to not remove DKIM-Signatures)
 
 However...
 
 3. the MLM rewrites the Subject (in many cases)
 4. the MLM adds a footer (many cases)
 5. see par. 3.3 of Murrays draft for more things MLMs do to messages
 
 That means, we have a signature + From, but we no longer have a reliable 
 copy of the message to verify them.
 
 6. we can tell the MLM authors to change their code to no longer do 3., 
 4. and 5. but, as Murray describes in par. 3.4:
 
 quote
 However, the practice of applying headers and footers to message
 bodies is common and not expected to fade regardless of what
 documents this or any standards body might produce.
 /quote
 
 With this situation in mind, I wrote my proposal, to provide the 
 verifier on the receiving side with a means to verify the original DKIM 
 signature.
 
 /rolf
 ___
 NOTE WELL: This list operates according to 
 http://mipassoc.org/dkim/ietf-list-rules.html


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] MLMs and the use of multipart/alternative to preserve original DKIM signature and at the same time add a new DKIM signature

2010-08-03 Thread Rolf E. Sonneveld
On 08/03/2010 02:13 PM, bill.ox...@cox.com wrote:
 When I receive an email from DKIM mailing list, I know that it may contain 
 messages from Dave Hector John Doug et all but in my mind the from is DKIM 
 mailing list. The only dkim sig I am interested in is ietf-dkim@mipassoc.org 
 and if I bothered to check adsp for etf-d...@mipassoc.org I wouldnt waste 
 time checking any other signatures/adsp assertions from participants as I see 
 a mailing list as an aggregator.

Again, I am not talking about ADSP.

 If I was designing mailing list software I would strip any incoming headers 
 that made any assertions about the authors, sign the pile with my dkim sig 
 and forward as designed. I would be asserting that etf-d...@mipassoc.org is 
 the author/aggregator not a forwarding service. Trying to have 3rd party in a 
 hands off transaction assert or check that the authoring party may be who 
 they say they are and making decisions upon adsp discardable that may or may 
 not be valid is beyond any sensible solution.
 thanks, now back into lurk mode


Trusting the MLM may be possible for you personnly for this particular 
mailing list, but your choice is not scaleable to the Internet at large. 
Or is the general consensus that (in the long run) the reputation of the 
MLM domain is sufficient for the verifier/receiver of MLM distributed 
mail? I don't read that in the draft.

/rolf
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] MLMs and the use of multipart/alternative to preserve original DKIM signature and at the same time add a new DKIM signature

2010-08-03 Thread Scott Kitterman
On Tuesday, August 03, 2010 08:02:34 am Hector Santos wrote:
 It seems much easier for MLS (Mail List Servers) to preempt 
 restrictive ADSP Domains from subscribing and from submitting mail to 
 the list enabled with DKIM resigning.

This would also give you the use case to deal with of restrictive ADSP 
published after someone has already subscribed.

Scott K
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] MLMs and the use of multipart/alternative to preserve original DKIM signature and at the same time add a new DKIM signature

2010-08-03 Thread Michael Thomas
On 08/03/2010 03:03 AM, Rolf E. Sonneveld wrote:
 With this situation in mind, I wrote my proposal, to provide the
 verifier on the receiving side with a means to verify the original DKIM
 signature.

Rolf,

When we wrote our dkim implementation, we did a bunch of work within the
existing DKIM framework (using l= and z=) that allowed us to get most
original signatures to reverify through mailing lists (~95%). No work
needed on the mailing list software at all. What you're proposing would
be close to 100% reverify rate of the lists that choose to implement
what you're proposing. Right now that's 100% * 0% :) But even if it
was accepted and caught on, it would still be a *very* long time before
you got to anywhere close to what we achieved. Maybe this would be good
for the pathological cases, but it probably wouldn't be good enough to
trust for, say, ADSP-discardable or any other indicator/service that
said that you should treat unsigned/broken signatures harshly.

I guess the meta question here is what the purpose is you have in mind.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] MLMs and the use of multipart/alternative to preserve original DKIM signature and at the same time add a new DKIM signature

2010-08-03 Thread Bill.Oxley
I trust the reputation and blame the reputation of the MLM as a single 
standalone author. I have no interest in the contributors reputation. As a 
receiver who is on many lists I unsubscribe when the list no longer meets my 
viewing needs. As a admin of mail systems I dont want to interrupt that flow 
unless virus or spam is egregious
On Aug 3, 2010, at 9:30 AM, Rolf E. Sonneveld wrote:

 On 08/03/2010 02:13 PM, bill.ox...@cox.com wrote:
 When I receive an email from DKIM mailing list, I know that it may contain 
 messages from Dave Hector John Doug et all but in my mind the from is DKIM 
 mailing list. The only dkim sig I am interested in is ietf-dkim@mipassoc.org 
 and if I bothered to check adsp for etf-d...@mipassoc.org I wouldnt waste 
 time checking any other signatures/adsp assertions from participants as I 
 see a mailing list as an aggregator.
 
 Again, I am not talking about ADSP.
 
 If I was designing mailing list software I would strip any incoming headers 
 that made any assertions about the authors, sign the pile with my dkim sig 
 and forward as designed. I would be asserting that etf-d...@mipassoc.org is 
 the author/aggregator not a forwarding service. Trying to have 3rd party in 
 a hands off transaction assert or check that the authoring party may be who 
 they say they are and making decisions upon adsp discardable that may or may 
 not be valid is beyond any sensible solution.
 thanks, now back into lurk mode
 
 
 Trusting the MLM may be possible for you personnly for this particular 
 mailing list, but your choice is not scaleable to the Internet at large. 
 Or is the general consensus that (in the long run) the reputation of the 
 MLM domain is sufficient for the verifier/receiver of MLM distributed 
 mail? I don't read that in the draft.
 
 /rolf
 ___
 NOTE WELL: This list operates according to 
 http://mipassoc.org/dkim/ietf-list-rules.html


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] MLMs and the use of multipart/alternative to preserve original DKIM signature and at the same time add a new DKIM signature

2010-08-03 Thread John R. Levine
 Trusting the MLM may be possible for you personnly for this particular 
 mailing list, but your choice is not scaleable to the Internet at large. Or 
 is the general consensus that (in the long run) the reputation of the MLM 
 domain is sufficient for the verifier/receiver of MLM distributed mail? I 
 don't read that in the draft.

How do you sort list mail now?  By List-id, or by individual From lines? 
Everyone I know sorts by the list.  In a few cases I do bozo filtering to 
dump individual messages, but that's on genuine mail from bozos, so 
signatures aren't an issue.

If people expect mail recipients to stop treating a list as a single 
mail stream and instead as unrelated messages from the contributors, it'd 
be helpful if they explained why 30 years of practice is going out the 
window.  To me this looks very much like the drunk searching for his keys 
under the streetlight.

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] MLMs and the use of multipart/alternative to preserve original DKIM signature and at the same time add a new DKIM signature

2010-08-03 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-
 boun...@mipassoc.org] On Behalf Of Rolf E. Sonneveld
 Sent: Tuesday, August 03, 2010 6:30 AM
 To: Bill Oxley @ Cox
 Cc: ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] MLMs and the use of multipart/alternative to
 preserve original DKIM signature and at the same time add a new DKIM
 signature
 
 Or is the general consensus that (in the long run) the reputation of
 the
 MLM domain is sufficient for the verifier/receiver of MLM distributed
 mail? I don't read that in the draft.

That's definitely my forward-looking view, but it's hard to include text in a 
document that points to something in the future with any degree of certainty.

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] MLMs and the use of multipart/alternative to preserve original DKIM signature and at the same time add a new DKIM signature

2010-08-03 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-
 boun...@mipassoc.org] On Behalf Of Michael Thomas
 Sent: Tuesday, August 03, 2010 7:59 AM
 To: Rolf E. Sonneveld
 Cc: ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] MLMs and the use of multipart/alternative to
 preserve original DKIM signature and at the same time add a new DKIM
 signature
 
 When we wrote our dkim implementation, we did a bunch of work within
 the
 existing DKIM framework (using l= and z=) that allowed us to get most
 original signatures to reverify through mailing lists (~95%). No work
 needed on the mailing list software at all.

But didn't we also say that such reverified signatures don't get any additional 
meaning with 'z=' reprocessing?


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] MLMs and the use of multipart/alternative to preserve original DKIM signature and at the same time add a new DKIM signature

2010-08-03 Thread Michael Thomas
On 08/03/2010 09:15 AM, Murray S. Kucherawy wrote:
 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-
 boun...@mipassoc.org] On Behalf Of Michael Thomas
 Sent: Tuesday, August 03, 2010 7:59 AM
 To: Rolf E. Sonneveld
 Cc: ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] MLMs and the use of multipart/alternative to
 preserve original DKIM signature and at the same time add a new DKIM
 signature

 When we wrote our dkim implementation, we did a bunch of work within
 the
 existing DKIM framework (using l= and z=) that allowed us to get most
 original signatures to reverify through mailing lists (~95%). No work
 needed on the mailing list software at all.

 But didn't we also say that such reverified signatures don't get any 
 additional meaning with 'z=' reprocessing?

Sorry, I don't understand.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] MLMs and the use of multipart/alternative to preserve original DKIM signature and at the same time add a new DKIM signature

2010-08-03 Thread Murray S. Kucherawy
 -Original Message-
 From: Michael Thomas [mailto:m...@mtcc.com]
 Sent: Tuesday, August 03, 2010 9:21 AM
 To: Murray S. Kucherawy
 Cc: Rolf E. Sonneveld; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] MLMs and the use of multipart/alternative to
 preserve original DKIM signature and at the same time add a new DKIM
 signature
 
  But didn't we also say that such reverified signatures don't get any
  additional meaning with 'z=' reprocessing?
 
 Sorry, I don't understand.

I guess I don't either.  You're saying use of l= and z= got your 
mail-through-lists signature verification statistics up to 95%.  However, 
RFC4871 says Copied header field values are for diagnostic use which I 
interpret to mean (and I think discussion on the list back then also agreed) 
that the information in a z= tag isn't supposed to contribute to the 
canonicalization algorithms, but instead can only be used for diagnostic 
purposes (i.e., This signature failed, and via the 'z=' we know why... but it 
still failed.).

-MSK

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] MLMs and the use of multipart/alternative to preserve original DKIM signature and at the same time add a new DKIM signature

2010-08-03 Thread Michael Thomas
On 08/03/2010 09:40 AM, Murray S. Kucherawy wrote:
 -Original Message-
 From: Michael Thomas [mailto:m...@mtcc.com]
 Sent: Tuesday, August 03, 2010 9:21 AM
 To: Murray S. Kucherawy
 Cc: Rolf E. Sonneveld; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] MLMs and the use of multipart/alternative to
 preserve original DKIM signature and at the same time add a new DKIM
 signature

 But didn't we also say that such reverified signatures don't get any
 additional meaning with 'z=' reprocessing?

 Sorry, I don't understand.

 I guess I don't either.  You're saying use of l= and z= got your 
 mail-through-lists signature verification statistics up to 95%.  However, 
 RFC4871 says Copied header field values are for diagnostic use which I 
 interpret to mean (and I think discussion on the list back then also agreed) 
 that the information in a z= tag isn't supposed to contribute to the 
 canonicalization algorithms, but instead can only be used for diagnostic 
 purposes (i.e., This signature failed, and via the 'z=' we know why... but 
 it still failed.).

Yeah, well, sue me for flipping that MUST NOT the bird. It works, z= is signed
by the originator, and it's probably as high a recovery rate that you'll ever
get going through mailing lists. We weren't proposing that it be part of any
standard, and our reasons had nothing to do with ADSP either. All I'm saying is
that if you want mailing list signature recovery, we've already done that and
wrung out about as much as can be hoped for.

As I asked earlier, what is the purpose of this anyway? We were doing it to
deal with spear-phishing attacks. Maybe I've missed the motivation for the
mime thingy.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] MLMs and the use of multipart/alternative to preserve original DKIM signature and at the same time add a new DKIM signature

2010-08-03 Thread Rolf E. Sonneveld
On 08/03/2010 06:53 PM, Michael Thomas wrote:
 On 08/03/2010 09:40 AM, Murray S. Kucherawy wrote:
 -Original Message-
 From: Michael Thomas [mailto:m...@mtcc.com]
 Sent: Tuesday, August 03, 2010 9:21 AM
 To: Murray S. Kucherawy
 Cc: Rolf E. Sonneveld; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] MLMs and the use of multipart/alternative to
 preserve original DKIM signature and at the same time add a new DKIM
 signature

 But didn't we also say that such reverified signatures don't get any
 additional meaning with 'z=' reprocessing?

 Sorry, I don't understand.

 I guess I don't either. You're saying use of l= and z= got your 
 mail-through-lists signature verification statistics up to 95%. 
 However, RFC4871 says Copied header field values are for diagnostic 
 use which I interpret to mean (and I think discussion on the list 
 back then also agreed) that the information in a z= tag isn't 
 supposed to contribute to the canonicalization algorithms, but 
 instead can only be used for diagnostic purposes (i.e., This 
 signature failed, and via the 'z=' we know why... but it still 
 failed.).

 Yeah, well, sue me for flipping that MUST NOT the bird. It works, z= 
 is signed
 by the originator, and it's probably as high a recovery rate that 
 you'll ever
 get going through mailing lists. We weren't proposing that it be part 
 of any
 standard, and our reasons had nothing to do with ADSP either. All I'm 
 saying is
 that if you want mailing list signature recovery, we've already done 
 that and
 wrung out about as much as can be hoped for.

 As I asked earlier, what is the purpose of this anyway? We were doing 
 it to
 deal with spear-phishing attacks. Maybe I've missed the motivation for 
 the
 mime thingy.

The motivation was the MLM draft document, par. 3.4. I quote:

quote
Changes that merely add new header fields, such as those specified by
[LIST-ID], [LIST-URLS] and [MAIL] are generally the most friendly to
a DKIM-participating email infrastructure in that their addition by
an MLM will not affect any existing DKIM signatures unless those
fields were already present and covered by a signature’s hash or a
signature was created specifically to disallow their addition (see
the note about h= in Section 3.5 of [DKIM]). The shortest path to
success for DKIM would be to mandate that all MLM software be redesigned
or re-configured with that goal in mind.

However, the practice of applying headers and footers to message
bodies is common and not expected to fade regardless of what
documents this or any standards body might produce. This sort of
change will invalidate the signature on a message where the body hash
covers the entire entire message. Thus, the following sections also
investigate and recommend other processing alternatives.

/quote

It was my intention to add one such 'processing alternative'. Now the 
question is: does it cover the remaining 5% or not? And if so (if we 
could get to 100%), is it worth the (huge) effort to rewrite DKIM?

/rolf

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] MLMs and the use of multipart/alternative to preserve original DKIM signature and at the same time add a new DKIM signature

2010-08-03 Thread Rolf E. Sonneveld

On 08/03/2010 06:40 PM, Murray S. Kucherawy wrote:

-Original Message-
From: Michael Thomas [mailto:m...@mtcc.com]
Sent: Tuesday, August 03, 2010 9:21 AM
To: Murray S. Kucherawy
Cc: Rolf E. Sonneveld; ietf-dkim@mipassoc.org
Subject: Re: [ietf-dkim] MLMs and the use of multipart/alternative to
preserve original DKIM signature and at the same time add a new DKIM
signature

 

But didn't we also say that such reverified signatures don't get any
additional meaning with 'z=' reprocessing?
   

Sorry, I don't understand.
 

I guess I don't either.  You're saying use of l= and z= got your mail-through-lists signature 
verification statistics up to 95%.  However, RFC4871 says Copied header field values are for diagnostic use which I 
interpret to mean (and I think discussion on the list back then also agreed) that the information in a z= tag isn't 
supposed to contribute to the canonicalization algorithms, but instead can only be used for diagnostic purposes (i.e., This 
signature failed, and via the 'z=' we know why... but it still failed.).
   


Furthermore, the use of l= is discouraged in RFC4871 and in the MLM draft:

par. 3.5:
quote

   INFORMATIVE IMPLEMENTATION WARNING: Use of the l= tag might
   allow display of fraudulent content without appropriate
   warning to end users.  The l= tag is intended for
   increasing signature robustness when sending to mailing lists
   that both modify their content and do not sign their
   messages.  However, using the l= tag enables attacks in
   which an intermediary with malicious intent modifies a
   message to include content that solely benefits the attacker.
   It is possible for the appended content to completely replace
   the original content in the end recipient's eyes and to
   defeat duplicate message detection algorithms.  Examples are
   described in Security Considerations (Section 8  
http://tools.ietf.org/html/rfc4871#section-8).  To avoid
   this attack, signers should be extremely wary of using this
   tag, and verifiers might wish to ignore the tag or remove
   text that appears after the specified content length.


/quote

and

quote
A possible mitigation to this incompatibility is use of the l= tag
to bound the portion of the body covered by the body hash, but this
not workable for [MIME] messages and moreover has security
considerations (see Section 3.5 of [DKIM]). Its use is therefore
discouraged.
/quote

/rolf
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] MLMs and the use of multipart/alternative to preserve original DKIM signature and at the same time add a new DKIM signature

2010-08-03 Thread Michael Thomas
On 08/03/2010 10:34 AM, Rolf E. Sonneveld wrote:

 quote
 Changes that merely add new header fields, such as those specified by
 [LIST-ID], [LIST-URLS] and [MAIL] are generally the most friendly to
 a DKIM-participating email infrastructure in that their addition by
 an MLM will not affect any existing DKIM signatures unless those
 fields were already present and covered by a signature’s hash or a
 signature was created specifically to disallow their addition (see
 the note about h= in Section 3.5 of [DKIM]). The shortest path to
 success for DKIM would be to mandate that all MLM software be redesigned
 or re-configured with that goal in mind.

 However, the practice of applying headers and footers to message
 bodies is common and not expected to fade regardless of what
 documents this or any standards body might produce. This sort of
 change will invalidate the signature on a message where the body hash
 covers the entire entire message. Thus, the following sections also
 investigate and recommend other processing alternatives.

 /quote

That's not really answering my question, unfortunately. I'm asking
what you intend to use the original signature's verification status
for with the knowledge that you will have a non-zero false positive
rate. We did our experiment with spear-phishing in mind: ie, can we
tag mail purporting to originate from us with a bad/missing signature
with an acceptable false positive rate. It was pretty close. I don't
know what problem your proposal is intending to solve.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html