Re: [ietf-dkim] Output summary - Communicating Results

2011-05-01 Thread Hector Santos
I'm starting a separate thread for the considered intro text discussion.

This response attempts to provide DKIM in-scope justification why two 
additional outputs should be part of a more DKIM Complete Output 
summary.

Murray S. Kucherawy wrote:

 That's probably true, but that is also completely different 
 from necessitating a change to the mandatory output.

Maybe this is about DKIM Output Complete  rather to redundant burn 
in of what is mandatory.  Everyone already knows SDID is a mandatory 
output for trust based assessor.  The proposed text did say other 
outputs are possible, but I believe there is a minimal set of in-scope 
outputs that we know are useful bits of information because of what 
implementators are showing.

Let me use ODID (Originating Domain Identity) to help describe this.

I believe we have four minimal in-scope outputs that is consistent 
with the DKIM Service Architecture (RFC5585),  Identity Assessor 
Layers and Reporting recommendations.

RCODE  result code)
SDID   d=, described as a MUST for (trust) assessors
AUID   i=, described as a MAY for assessors
ODID   Domain part of From: address.

There is nothing new here and I believe satisfies IETF protocol 
design, bis work and DS considerations. It reflects current 
implementations, doesn't change code and definitely helps future 
implementors.

Justifying ODID is simple:

The ODID is an optional requirement in the complete software 
engineering design described in the DKIM Service Architecture [RFC5585].

While ODID is an optional consideration for implementors to support 
the Checking Signing Practices (ADSP) module, it is nonetheless part 
of the RFC described DKIM Service Architecture.  Therefore for 
RFC4871bis to be consistent with RFC5585, it needs to explicitly 
expose the ODID as part of the DKIM Complete Output.

Justifying AUID is simple as well.

Dave's MLM shows an A-R (using Thomas's list post):

  Authentication-Results: sbh17.songbird.com;
dkim=pass (1024-bit key) header.i=m...@mtcc.com

It only shows the AUID. This suggest existing implementations are 
using the DKIM recommended A-R reporting method and needs the AUID as 
part of a DKIM Complete Outputs.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Hector Santos
Murray S. Kucherawy wrote:
 -Original Message-

 But what it did most of for me (yesterday) was highlight the confusion
 with AUID with the lack of an official DKIM label for an Originating
 Domain Identity.  I guess I was moving forward the past year with
 integrating DKIM into our mail products and I see now I was mistakenly
 labeling the AUID as the FROM domain when its not officially defined
 as the From domain.
 
 That's unfortunate, but it's also the first case I've heard 
 of someone mistaking the AUID for the From: field.

To be more precise, may erroneous labeling of AUID as the author or 
user DOMAIN in the From: address for ADSP purposes.

Its been an ongoing debate with what AUID (i=) is. Just see the recent 
threads with Fenton's proposal to remove it and some suggested to keep 
with refinements like i= should be the From address.

This is why Barry's message is important here (got to find it) because 
if I can correctly recall, he showed both CON and PRO logic on how/why 
an undefined i= can be assumed to be the From and and the From.domain 
for ADSP purposes.

3.x  Originating Domain Identity (ODID)

The ODID is the domain part of the From: address.  This identity
MAY be considered as an output communicated to an advanced
Identity Assessor module.
 
 We already have a name for that: RFC5322.From.  We don't need a 
 new name for something old.

If we want to say From.Domain is an identity, fine by me.

 I don't see any ambiguity here that needs fixing, unless there 
 are lots of people that want to come forward now and admit 
 they had the same misunderstanding you did.

There is plenty of archive evidence old and new regarding i= (AUID) 
ambiguity, including whether it should be a USER identity as the 
definition ambiguously says Agent or User.

Who/What is an Agent? Undefined?

Who is the User?  I presume the RFC5322.From?  No?

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Ticket 23 -- l= and Content-type

2011-05-01 Thread Hector Santos
John R. Levine wrote:
 What's your counter-proposal to Alessandro's proposal to modify 9.1.1?
 
 Oh, that.  Replace all of sec 9.1 with:
 
   As noted in Section 4.4.5, use of the l= tag enables a variety of
   attacks in which added content can partially or completely changes the
   recipient's view of the message.
 
 I don't think we actually understand all the ways that l= allows you to 
 shoot yourself in the foot, so I would prefer not to give the impression 
 that if people avoid a few cases we describe, they're safe.

+1

Unfortunately, if you do a global search in the document where l= is 
mentioned, you will see sentences with inferences for an expectation 
it is present and/or should be added.  These sentences need to be 
reworded to indicate it is an option and not an expectation.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


[ietf-dkim] New Introduction Text

2011-05-01 Thread Hector Santos
Murray S. Kucherawy wrote:

 How will you state it?
 
 How about:
 
 1.  Introduction
 
 [...]
 
 1.1.  DKIM Architecture Documents
 
 Readers are advised to be familiar with the material in [RFC4686] 
 and [RFC5585] and [RFC5863], which respectively provide the background 
 for the development of DKIM, an overview of the service, and deployment 
 and operations guidance and advice.
 
 1.2.  Signing Identity
 
 [...]

+1 Perfect.  Very good!  I like it!

Now if we can just be more DKIM Output Complete and be z-order 
compatible with the excellent section 1.1, I think I can die and rest 
in peace. :)

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Hector Santos
Dave CROCKER wrote:

 In other words, DKIM has nothing to do with the rfc5321.From field, and 
 therefore it is entirely inappropriate -- that is, out of scope -- for 
 the specification to suggest dealing with it.
 
 At least, please show working group rough consensus support for doing 
 what you suggest.
 

Dave,

All I am trying to do is show the inconsistencies in RFC4871bbis not 
matching current implementation needs and it is incomplete in what 
RFC5585 describes.

I didn't write RFC5585 but if I did, I would not have added the 
Checking Signing Practice and titled it as DKIM Service Architecture 
because the concept was removed from DKIM.  But you did and the 
Deployment Guide has an entire section on ADSP.  The archive is my 
evidence, I have stated if you don't want ADSP then don't reference it 
any DKIM related document.

But it was done in in the Deployments Guide and explicitly added as 
part of the DKIM Service Architecture, not stated it is an Extension 
or any one shown to be not part of the architecture.  Its right there 
as a large part of the software engineering design.  What do you 
expect people to think?

So I suggest reasonable people taking this documents will clearly see 
policy, signing practice, adsp or whatever you wish to call, its part 
of the DKIM design and architectural consideration and RFC4871bis does 
not prepare anyone for that DKIM architecture design.

IETF BIS work should be, at least I thought it was, about codifying 
current implementation and they match RFC5585, not RFC4871bis.  Is 
that a problem? I think so.  You seem to think not.

All I am saying is with the window of opportunity we have now, connect 
the dots and be consistent with the RFC described DKIM Service 
architecture.

Finally, you keep saying:

 DKIM has nothing to do with the rfc5321.From field

(Well, I think you meant RFC5322.From. Right?)

This is not technically correct.

1) It is the only single requirement for binding to the signature and 
there again, the archive evidence will show where I have stated on 
many occasions if we want the above statement to be true, then we need 
to relax the specs to remove this single mandatory binding signature 
requirement.

2) The binding of 5322.From is inherently associated with the SDID 
responsibility claim for the bits that are signed. So for anyone to 
use SDID trust, it is to both technically and ergonomically (UI) claim 
the author is trusted whether or not the signer had any association 
with the author or not.

Again, its about protocol consistency.  So maybe I should ask the 
chairs for:

  Consensus needs to be reevaluated
-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Ticket 23 -- l= and Content-type

2011-05-01 Thread Alessandro Vesely
On 01/May/11 06:18, John R. Levine wrote:
 What's your counter-proposal to Alessandro's proposal to modify 9.1.1?
 
 Oh, that.  Replace all of sec 9.1 with:
 
   As noted in Section 4.4.5, use of the l= tag enables a variety of
   attacks in which added content can partially or completely changes the
   recipient's view of the message.
 
 I don't think we actually understand all the ways that l= allows you to 
 shoot yourself in the foot, so I would prefer not to give the impression 
 that if people avoid a few cases we describe, they're safe.

-1, I agree we don't know all the ways DKIM can be fooled.  Neither we
actually saw real attacks in the wild.  We don't even state how to
react to multiple Froms.  Presumably, the wider the DKIM deployment,
the more we'll learn on handling attacks.  However, hiding the few
things we know doesn't seem to be a good start toward such watchful
cooperative deployment.
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Ticket 23 -- l= and Content-type

2011-05-01 Thread John R. Levine
 I don't think we actually understand all the ways that l= allows you to
 shoot yourself in the foot, so I would prefer not to give the impression
 that if people avoid a few cases we describe, they're safe.

 -1, I agree we don't know all the ways DKIM can be fooled.  Neither we
 actually saw real attacks in the wild.  We don't even state how to
 react to multiple Froms.  Presumably, the wider the DKIM deployment,
 the more we'll learn on handling attacks.  However, hiding the few
 things we know doesn't seem to be a good start toward such watchful
 cooperative deployment.

The message should be don't use l= if you care about your signature.

I don't think we yet have consensus to take out l= but it is quite clear 
that the problems it causes are far greater than whatever problems it 
might solve.

Regards,
John Levine, jo...@iecc.com, Primary Perpetrator of The Internet for Dummies,
Please consider the environment before reading this e-mail. http://jl.ly
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Michael Thomas
Dave CROCKER wrote:
 
 On 4/30/2011 9:10 PM, Hector Santos wrote:
 So perhaps to help shut down this ambiguity we should add a DKIM
 terminology to clearly separate it from AUID.

 3.x  Originating Domain Identity (ODID)

 The ODID is the domain part of the From: address.  This identity
 MAY be considered as an output communicated to an advanced
 Identity Assessor module.
 
 
 Oh heck, let's just declare that the DKIM Signing module MAY output anything 
 it 
 wants.  

That's what 4871 did. Manifestly it worked just fine. We had a tremendous number
of interoperable implementations. The procrustean insistence that there be a
single output has not helped interoperability one iota.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Ticket 23 -- l= and Content-type

2011-05-01 Thread Dave CROCKER

On 4/30/2011 11:43 PM, Murray S. Kucherawy wrote:
 I'd like to leave in MIME and HTML exploits as examples if people agree that 
 wouldn't be harmful, such as this updated text in 4.4.5:

   tINFORMATIVE IMPLEMENTATION NOTE: Using body length
  limits enables an attack in which an attacker 
 modifies a
  message to include content that solely benefits the
  attacker. It is possible for the appended content to
  completely replace the original content in the end
  recipient's eyes, such as via alterations to the MIME
  structure or exploiting lax HTML parsing in the MUA,
  and to defeat duplicate message detection algorithms.
  To avoid this attack, signers should be wary of using
  this tag, and verifiers might wish to ignore the tag,
  {DKIM 2} perhaps based on other criteria./t

 I'm worried that without this, a neophyte won't see what the attack is.


+1

d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Ticket 23 -- l= and Content-type

2011-05-01 Thread Hector Santos
Alessandro Vesely wrote:
 On 01/May/11 06:18, John R. Levine wrote:
 What's your counter-proposal to Alessandro's proposal to modify 9.1.1?
 Oh, that.  Replace all of sec 9.1 with:

   As noted in Section 4.4.5, use of the l= tag enables a variety of
   attacks in which added content can partially or completely changes the
   recipient's view of the message.

 I don't think we actually understand all the ways that l= allows you to 
 shoot yourself in the foot, so I would prefer not to give the impression 
 that if people avoid a few cases we describe, they're safe.
 
 -1, I agree we don't know all the ways DKIM can be fooled.  Neither we
 actually saw real attacks in the wild.  We don't even state how to
 react to multiple Froms.  Presumably, the wider the DKIM deployment,
 the more we'll learn on handling attacks.  However, hiding the few
 things we know doesn't seem to be a good start toward such watchful
 cooperative deployment.

It appears to me, the current practical use case for l= is for systems 
like an non-DKIM aware MLM that is not stripping and replacing 
signatures. The idea of a non-tampered mail passthru concept. This at 
least should be stated.  For DKIM aware MLM that are resigning, the 
l= concern is gone as long as the ODID (Originating Domain Identity) 
accepts the independent MLM DKIM resigning role.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Hector Santos
Michael Thomas wrote:
 Dave CROCKER wrote:

 On 4/30/2011 9:10 PM, Hector Santos wrote:
 So perhaps to help shut down this ambiguity we should add a DKIM
 terminology to clearly separate it from AUID.

 3.x  Originating Domain Identity (ODID)

 The ODID is the domain part of the From: address.  This identity
 MAY be considered as an output communicated to an advanced
 Identity Assessor module.

 Oh heck, let's just declare that the DKIM Signing module MAY output 
 anything it wants.  
 
 That's what 4871 did. Manifestly it worked just fine. We had a 
 tremendous number of interoperable implementations. The procrustean 
 insistence that there be a single output has not helped 
 interoperability one iota.

Its just really odd that the we need to hide the facts in RFC4871bis 
but not in  RFC5585 (DKIM Architecture) and RFC5863 (DKIM Deployment 
Guideline)?

Ok, we got it! We need to isolate the signer domain for some future 
market place. I'm saving my pennies for this. Mission Accomplished.

But in the mean time, implementors are not listening. They are looking 
at other things especially the author thing we must burn into the 
signature.

Why is it so hard to document these facts in the new revised manual?


-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Hector Santos
Hector Santos wrote:
 Murray S. Kucherawy wrote:
 
 Hector stated:
 I think this message by Barry in March 2009 summarizing a conference
 call between Pasi, Stephen and Barry nicely captures the upper/lower
 layers, ADSP, i= and outputs conflicts that continue today:

 http://mipassoc.org/pipermail/ietf-dkim/2009q1/011314.html

 I think that message doesn't say a single thing about layers.  
 It looks entirely procedural to me.
 
 Darn it. I copied the wrong link and now I can't find it. :(
 
 Let me search again.. Quick search failed. I'll search deeper 
 later if you still want me to.  I will find it at some point just to 
 have it in my DKIM notes.

Here is the correct message link:

Status and direction
http://mipassoc.org/pipermail/ietf-dkim/2009q1/011194.html

For all and intent and purposes, this message can be reposted today 
and still bee relevant, covering the final issues we are still dealing 
with.  Note the chairs recommended move forward items, in particular 
#4 which is what I believe we are trying to help with in this WGLC:

   4. *Aim 4871bis at incorporating what we've learned since 4871.*
  If that results in a document that can and should move to
  Draft Standard, we'll do that.  If it does not, then 4871bis
  will go to Proposed Standard, and it will take another
  round of work to move up the standards track.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Douglas Otis
On 4/30/11 10:37 PM, Murray S. Kucherawy wrote:
  -Original Message- From: Hector Santos
  [mailto:hsan...@isdg.net] Sent: Saturday, April 30, 2011 9:10 PM
  To: Murray S. Kucherawy Cc: ietf-dkim@mipassoc.org Subject: Re:
  [ietf-dkim] Output summary - proposing ODID Originating Domain
  Identity
 
  But what it did most of for me (yesterday) was highlight the
  confusion with AUID with the lack of an official DKIM label for an
  Originating Domain Identity. I guess I was moving forward the past
  year with integrating DKIM into our mail products and I see now I
  was mistakenly labeling the AUID as the FROM domain when its not
  officially defined as the From domain.

  That's unfortunate, but it's also the first case I've heard of
  someone mistaking the AUID for the From: field.

I think this missed Hector's concern.  Perhaps it would have been 
clearer indicating confusion was in respect to i= parameter now called 
the AUID which can be a copy of an address that was within the From 
header field.  The domain can differ whenever the AUID is a subdomain of 
the ODID when allowed by the key rr.

Section 3.5 had stated the following omitted information:

INFORMATIVE DISCUSSION: This document does not require the
value of the i= tag to match the identity in any message
header fields. This is considered to be a verifier policy issue.
Constraints between the value of the i= tag and other
identities in other header fields seek to apply basic
authentication into the semantics of trust associated with a
role such as content author. Trust is a broad and complex
topic and trust mechanisms are subject to highly creative
attacks. The real-world efficacy of any but the most basic
bindings between the i= value and other identities is not
well established, nor is its vulnerability to subversion by
an attacker. Hence reliance on the use of these options
should be strictly limited. In particular, it is not at all
clear to what extent a typical end-user recipient can rely on
any assurances that might be made by successful use of the
i= options.

-Doug





___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] 
 On Behalf Of Hector Santos
 Sent: Sunday, May 01, 2011 4:51 PM
 To: Michael Thomas
 Cc: dcroc...@bbiw.net; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
 Its just really odd that the we need to hide the facts in RFC4871bis
 but not in RFC5585 (DKIM Architecture) and RFC5863 (DKIM Deployment
 Guideline)?

I've lost track of how many times and how many different ways it's been 
explained that nothing is being hidden.  I'm going to give up now.

 But in the mean time, implementors are not listening. They are looking
 at other things especially the author thing we must burn into the
 signature.

Which implementers, and why aren't they saying anything?


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Ticket 23 -- l= and Content-type

2011-05-01 Thread Hector Santos

Is this new text for section 9.1 Misuse of Body Length Limits (l= Tag)?

Murray S. Kucherawy wrote:

 INFORMATIVE IMPLEMENTATION NOTE: Using body length
 limits enables an attack in which an attacker modifies a
 message to include content that solely benefits the
 attacker. It is possible for the appended content to
 completely replace the original content in the end
 recipient's eyes, such as via alterations to the MIME
 structure or exploiting lax HTML parsing in the MUA,
 and to defeat duplicate message detection algorithms.
 To avoid this attack, signers should be wary of using
 this tag, and verifiers might wish to ignore the tag,
 {DKIM 2} perhaps based on other criteria.
 
 I'm worried that without this, a neophyte won't see what the attack is.
 
 I'm fine with the proposed simplification of 9.1, and I 
 think at least Dave and JD have +1'd it already as well.
 
 Is that acceptable?

+1.

Small note if you are concern about neophytes.   There are sentences 
where l= is referenced where it sounds like the tag is expected to 
be there or needs to used.   So maybe an addition sentence can be 
appended to above:

  Signers do not need to add the l= tag to the signature
  if they are signing the entire body.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Murray S. Kucherawy
 -Original Message-
 From: Hector Santos [mailto:hsan...@isdg.net]
 Sent: Sunday, May 01, 2011 5:33 PM
 To: Murray S. Kucherawy
 Cc: Murray S. Kucherawy; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
 Here is the correct message link:
 
 Status and direction
 http://mipassoc.org/pipermail/ietf-dkim/2009q1/011194.html

That message (a) was sent six months before ADSP was published, and (b) was 
written at a time when ADSP still made use of i=.  If you take the time to 
read the text in RFC5617, it doesn't use i= at all.

 For all and intent and purposes, this message can be reposted today
 and still bee relevant,

...except that it doesn't cover what the working group actually published.

 covering the final issues we are still dealing
 with.  Note the chairs recommended move forward items, in particular
 #4 which is what I believe we are trying to help with in this WGLC:
 
4. *Aim 4871bis at incorporating what we've learned since 4871.*
   If that results in a document that can and should move to
   Draft Standard, we'll do that.  If it does not, then 4871bis
   will go to Proposed Standard, and it will take another
   round of work to move up the standards track.

Sounds like precisely what we've done.

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


[ietf-dkim] WGLC version of drafts posted

2011-05-01 Thread Murray S. Kucherawy
Hello all,

As you know WGLC for our two open drafts closed yesterday.

The MLM draft hasn't changed in this round, so the -08 version can be 
considered the output of the WGLC for that draft.

I'm in the process of posting an -09 for RFC4871bis, which I believe is the 
WGLC output for that draft.  There are three open tickets remaining which were 
either controversial or did not appear to garner enough consensus support to 
include them.  Of course, the Chair is the final authority on those points.

Thanks all for the input and lively discussion.

-MSK
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Hector Santos
Murray S. Kucherawy wrote:
 -Original Message-

 Its just really odd that the we need to hide the facts in RFC4871bis
 but not in RFC5585 (DKIM Architecture) and RFC5863 (DKIM Deployment
 Guideline)?
 
 I've lost track of how many times and how many different ways 
 it's been explained that nothing is being hidden.  I'm going to 
 give up now.

If nothing is being hidden, then why not explicitly add AUID and ODID 
(or RFC5585.From.Domain) to the Output Summary?  Whats the danger?

Maybe its not a Output Summary?

Here are some definitions for a summary [1]:

A summary, synopsis, or recap is a shorter version of the original.
Such a simplification highlights the major points from the much
longer subject, such as a text, speech, film, or event. The purpose
is to help the audience get the gist in a short period of time.

An abstract or a condensed presentation of the substance of a body
of material; concise, brief or presented in a condensed form;
Performed speedily and without formal ceremony

etc.  What you are proposing is just the redundant Mandatory Output 
information, and not a DKIM Output Complete summary that reflects 
current implementations.

 But in the mean time, implementors are not listening. They are looking
 at other things especially the author thing we must burn into the
 signature.
 
 Which implementers, and why aren't they saying anything?

Well you, I did and many in the archives has say things, and many have 
stated very clearly the ODID is considered a very fundamental part of 
DKIM.  RFC5585 reflects how signing practices is part of the expected 
DKIM Architecture.

The two open source APIs:

OpenDKIM
ALT-N

has support for signing practices.

Systems using A-R to report DKIM results are using AUID, such as 
Dave's MLM.

And I know our DKIM product has direct support for the design 
described in RFC5595 including A-R with all four outputs (status, 
SDID, AUID, ODID) as well as the ADSP extensions.

The biggest software company, Microsoft, has announced ADSP support 
and that means ODID output is required.  How can that be not significant?

Yes, it is getting tiresome because it is real hard to understand why 
adding the obvious to the Output Summary is a problem. What harm is 
there?  None that I can see.

Why isn't there any mediated compromise to settle these 5-6 years 
conflict?

In my view, your proposed section 1.1 DKIM Architecture Documents and 
with adding the AUID and ODID as part of the output to make all the 
documents protocol consistent will settle the issue, in my view, for 
all parties.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com

[1] http://www.google.com/search?rlz=1C1CHMG_enUS291US310q=define:summary


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Hector Santos
Murray S. Kucherawy wrote:
 -Original Message-

 Here is the correct message link:

 Status and direction
 http://mipassoc.org/pipermail/ietf-dkim/2009q1/011194.html
 
 That message (a) was sent six months before ADSP was published, 
 and (b) was written at a time when ADSP still made use of i=.  
 If you take the time to read the text in RFC5617, it doesn't use 
 i= at all.

Since day one POLICY anchored off the ODID in the same way Domainkeys, 
which has inherent support for POLICY, anchored off the ODID.

There were suggestions as Barry noted due to the ambiguity (which 
remains today) for what i= should be and that included i=From and thus 
possibly it could be the feed for policy.   But we also talking the 
ideas of extension modeling and outputs to pass to them. It was the 
beginning of reducing it to one only - signer and only for trust 
purposes, excluding the needs for ADSP.

 For all intent and purposes, this message can be reposted today
 and still bee relevant,
 
 except that it doesn't cover what the working 
 group actually published.

Exactly, which is why we still have the issues today.

4. *Aim 4871bis at incorporating what we've learned since 4871.*
   If that results in a document that can and should move to
   Draft Standard, we'll do that.  If it does not, then 4871bis
   will go to Proposed Standard, and it will take another
   round of work to move up the standards track.
 
 Sounds like precisely what we've done.

I take the position that 4871bis does not incorporate what we have learned
since 4871.  If it did, these concerns would not be on-going.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


[ietf-dkim] Issue: 3.9 Output Requirements - missing RFC5322.From

2011-05-01 Thread Hector Santos
The new section 1.1 DKIM Architecture Documents advises reading 
RFC5585 (DKIM Service Architecture) and RFC5863 (Deployment 
Guideline). The new 3.9 Output Requirement does not provide the 
essential piece (RFC5322.From) explicitly described by the advised 
DKIM related RFC documents.

A simple change will fix this in 3.9 last sentence:

The output MAY include other signature properties or result meta-
data, including RFC5322.From, PERMFAILed or otherwise ignored
signatures, for use by modules that consume those results.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Dave CROCKER

On 5/1/2011 6:36 PM, Murray S. Kucherawy wrote:
 I've lost track of how many times and how many different ways it's been
 explained that nothing is being hidden.  I'm going to give up now.


+1

d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Hector Santos
Dave CROCKER wrote:
 On 5/1/2011 6:36 PM, Murray S. Kucherawy wrote:
 I've lost track of how many times and how many different ways it's been
 explained that nothing is being hidden. 
 
 
 +1

Good.  So there should not be a problem *not* hiding an explicit 
identity definition required to complete the DKIM Service Architecture 
in RFC5585:

   3.x  Originating Domain Identity (ODID)

The ODID is the domain part of the From: address.  This identity
MAY be considered as an output communicated to an advanced
Identity Assessor module.

   INFORMATIVE IMPLEMENTATION NOTE:

   The ODID and SDID are inputs for the optional
   Checking Signing Practices component as described
   in the DKIM Service Architecture [RFC5585]

If something like this is not added or anything close to it, I don't 
know any other way it can be described but an intentional neglect to 
mention anything closely related to it.

I would like to ask the chairs if we can get Consensus Reevaluated. 
 From the limited WG participants providing input, it appears we have 
Rough Consensus for this identity to be included in RFC4871bis.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html