Re: [ietf-dkim] 23 again (sorry John) was Output summary - proposing ODID "Originating Domain Identity"

2011-05-06 Thread John Levine
> For what it's worth, our stats show that it is in use on 3.58% of
> signatures received since August.

Do you have enough data to know in how many of those 3.58% the body
wasn't the same length as the l= value ?

Looking at my much smaller archive, it appears that in most cases the
l= matches the body length so ignoring l= would make no practical
difference.

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] 23 again (sorry John) was Output summary - proposing ODID "Originating Domain Identity"

2011-05-06 Thread Murray S. Kucherawy
> -Original Message-
> From: John Levine [mailto:jo...@iecc.com]
> Sent: Friday, May 06, 2011 5:37 AM
> To: ietf-dkim@mipassoc.org
> Cc: Murray S. Kucherawy
> Subject: Re: [ietf-dkim] 23 again (sorry John) was Output summary -
> proposing ODID "Originating Domain Identity"
> 
> > For what it's worth, our stats show that it is in use on 3.58% of
> > signatures received since August.
> 
> Do you have enough data to know in how many of those 3.58% the body
> wasn't the same length as the l= value ?
> 
> Looking at my much smaller archive, it appears that in most cases the
> l= matches the body length so ignoring l= would make no practical
> difference.

Yes, that's here:

http://www.opendkim.org/stats/report.html#l_tag

You can see the count that have "l=" smaller than the final message size as 
well as the "l=0" ones, and how many of those passed or failed.

That's out of 155972 signatures that used "l=", and 4.36M total signatures 
observed, in just over eight months of data.


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] 23 again (sorry John) was Output summary - proposing ODID "Originating Domain Identity"

2011-05-06 Thread Alessandro Vesely
On 05/May/11 22:54, Barry Leiba wrote:
 If this is the sort of advice we are going to give then we should just
 deprecate "l=".
>>>
>>> +1: it was an error in the PS and the DS fixes it.
>>>
>>> Alternatively we can allow it, warn, and expect implementers to code
>>> heuristics that can discern attacks from regular footers.
>>
>> Speaking as an implementer, I ignore l=, because the hassle of working
>> around it and trying to guess how hostile any added content might be is
>> vastly greater than any utility it has.
> 
> We certainly could deprecate it, and add something that says that
> verifiers MAY consider a signature for which l= is less than the full
> message length to fail verification.  Such a change should have been
> proposed earlier in the process, but I won't consider it out of scope
> if we have consensus to do that now.

One place to put a normative "MAY" is in the last paragraph of section
6.1.3 "Compute the Verification".  E.g., replacing it with

   A body length specified in the "l=" tag of the signature limits the
   number of bytes of the body passed to the verification algorithm.
   Any added content, that is text beyond that limit, is not
   validated by DKIM, whether it was present at the time of signing
   or not.  Verifiers MAY apply whatever heuristics in order to
   determine the legitimacy of existing added content; in particular,
   verifiers MAY consider any added content hostile and hence return
   PERMFAIL (unsigned content) for signatures having l= less than the
   full message length.

If something like this is stated, the INFORMATIVE IMPLEMENTATION
WARNING of section 3.5 should be modified so as to avoid redundancy.
E.g. by replacing

   To avoid this attack, signers should be extremely wary of using
   this tag, and verifiers might wish to ignore the tag

with, say,

   To avoid this attack, signers should be extremely wary of using
   this tag, unless they know what heuristics verifiers will apply.
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Protocol layering / Software vs. Protocol

2011-05-06 Thread Charles Lindsey
On Thu, 05 May 2011 21:24:00 +0100, Barry Leiba   
wrote:

> Doug says...
>> This can *only* be achieved by some mandatory test within the Verifier.
>
> Not at all; that's exactly Dave's point in discussing the difference
> between the protocol and the software system that wraps around it.
> The Verifier is a component that verifies the signature, and that's
> all we're defining normatively here.  Other parts of the system will
> evaluate things whether the verified signature can be relied upon, and
> what it can be relied upon for; whether the domain that signed it is
> trustworthy; whether a failed signature can nonetheless provide useful
> information; and so on.

Not so. As you should know from off-list discussions, that sentence is  
actually mine, though used in a marginally different context than Doug  
used it.

IF there were to be some "mandatory test within the Verifier", then that  
test would be, ipso facto, a part of the protocol and not part of the  
"software system that wraps around it". So your argument was circular :-( .

-- 
Charles H. Lindsey -At Home, doing my own thing
Tel: +44 161 436 6131   
   Web: http://www.cs.man.ac.uk/~chl
Email: c...@clerew.man.ac.uk  Snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9  Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output

2011-05-06 Thread John R. Levine
> http://www.opendkim.org/stats/report.html#l_tag
>
> You can see the count that have "l=" smaller than the final message size as 
> well as the "l=0" ones, and how many of those passed or failed.
>
> That's out of 155972 signatures that used "l=", and 4.36M total signatures 
> observed, in just over eight months of data.

Hmmn.  If my arithmetic is right, about 95% of l= signatures didn't cover 
the whole body, and only a few of those were l=0.  Your users must 
subscribe to different mailing lists than I do.

Regards,
John Levine, jo...@iecc.com, Primary Perpetrator of "The Internet for Dummies",
Please consider the environment before reading this e-mail. http://jl.ly
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output

2011-05-06 Thread Rolf E. Sonneveld
On 5/6/11 4:35 PM, John R. Levine wrote:
>> http://www.opendkim.org/stats/report.html#l_tag
>>
>> You can see the count that have "l=" smaller than the final message size as 
>> well as the "l=0" ones, and how many of those passed or failed.
>>
>> That's out of 155972 signatures that used "l=", and 4.36M total signatures 
>> observed, in just over eight months of data.
> Hmmn.  If my arithmetic is right, about 95% of l= signatures didn't cover
> the whole body, and only a few of those were l=0.  Your users must
> subscribe to different mailing lists than I do.

John, the opendkim project gathers information from various sources, 
they're not necessarily the users of Murray and they're not necessarily 
subscribed to mailing lists. The statistics also doesn't tell which 
inbound mail is from legitimate sources and which inbound mail is from 
spammers/bad guys. Maybe the 95% you mention, are the spammers who try 
to abuse l= in DKIM...

/rolf
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output

2011-05-06 Thread Murray S. Kucherawy
> -Original Message-
> From: Rolf E. Sonneveld [mailto:r.e.sonnev...@sonnection.nl]
> Sent: Friday, May 06, 2011 8:12 AM
> To: John R. Levine
> Cc: Murray S. Kucherawy; ietf-dkim@mipassoc.org
> Subject: Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output
> 
> John, the opendkim project gathers information from various sources,
> they're not necessarily the users of Murray and they're not necessarily
> subscribed to mailing lists. The statistics also doesn't tell which
> inbound mail is from legitimate sources and which inbound mail is from
> spammers/bad guys. Maybe the 95% you mention, are the spammers who try
> to abuse l= in DKIM...

Correlation against Spamassassin results is possible, though the data set is 
more limited because only a few reporting hosts include that extended data.  
I'm not sure what this tells you but here it is:

++--+--+
| l= present | pass | spam |
++--+--+
|   4902 |0 |0 |
|307 |0 |1 |
|  49265 |1 |0 |
|775 |1 |1 |
++--+--+
+--+--+--+
| l=0  | pass | spam |
+--+--+--+
| 3357 |0 |0 |
|  305 |0 |1 |
| 3386 |1 |0 |
|   14 |1 |1 |
+--+--+--+
+--+--+--+
| l= < msgsize | pass | spam |
+--+--+--+
| 4819 |0 |0 |
|  307 |0 |1 |
|43539 |1 |0 |
|  768 |1 |1 |
+--+--+--+

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output

2011-05-06 Thread Murray S. Kucherawy
> -Original Message-
> From: John R. Levine [mailto:jo...@iecc.com]
> Sent: Friday, May 06, 2011 7:35 AM
> To: Murray S. Kucherawy
> Cc: ietf-dkim@mipassoc.org
> Subject: Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output
> 
> > http://www.opendkim.org/stats/report.html#l_tag
> >
> > You can see the count that have "l=" smaller than the final message
> > size as well as the "l=0" ones, and how many of those passed or failed.
> >
> > That's out of 155972 signatures that used "l=", and 4.36M total
> > signatures observed, in just over eight months of data.
> 
> Hmmn.  If my arithmetic is right, about 95% of l= signatures didn't cover
> the whole body, and only a few of those were l=0.  Your users must
> subscribe to different mailing lists than I do.

Might not be list traffic.  But I have data for that too.  Count of signatures 
with "l=" that did or didn't appear to pass through an MLM:

+--+--+
| count(*) | mailing_list |
+--+--+
|77246 |0 |
|78853 |1 |
+--+--+


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output

2011-05-06 Thread Hector Santos

John R. Levine wrote:
>> http://www.opendkim.org/stats/report.html#l_tag
>>
>> You can see the count that have "l=" smaller than the final message size as 
>> well as the "l=0" ones, and how many of those passed or failed.
>>
>> That's out of 155972 signatures that used "l=", and 4.36M total signatures 
>> observed, in just over eight months of data.
> 
> Hmmn.  If my arithmetic is right, about 95% of l= signatures didn't cover 
> the whole body, and only a few of those were l=0.  Your users must 
> subscribe to different mailing lists than I do.

of course, we don't all live in the same levine list world.

What I found in a quick grep scan of ~7000 list messages:

137 used l= with some value
  3 used l=0 from the same source

More details:

   - Sorted down to 37 domains, 36 unknown, 1 known domain,
   - Except for 1 known, all mail from the 36 was spam,
   - 20 of them had the same patterns but different domains, and
   - the 20 used two signatures, sha1 and sha256

The collection were saved prior to verification so I don't know off 
hand if they failed or the actual body counts.

In my network of mail, I will say, l= is used by spammers blasting 
list mail to their collected emails addresses to spam.


-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - Keep your Eye on the Prize!

2011-05-06 Thread Hector Santos
Murray S. Kucherawy wrote:
>> -Original Message-

>> Therefore with no subjective consideration, no assertions, no
>> philosophies, the protocol defines a process model of:
>>
>> trust = TrustIdentityAssessor(SDID [,AUID])
>>
>> There is NO opinion about this! That is your DKIM Trust Protocol Model
>> with a Mandatory SDID input and an optional AUID input.
> 
> Actually, using your notation, it's:
> 
>   trust = TrustIdentityAssessor(SDID[, AUID[, s=[, t=[, l=[, x=[, ...]])
> 
> How far do we really need to go here?

As far are the protocol technical specification says it is. However, 
isn't these additional parameters not part of a Trust Assessor 
functionality and are part of the validation functionality?  In 
principle, the RFC4871 process model prototyping using a dyadic FP 
(Functional Programming) methodology would be overall:

   MAIL.PAYLOAD= MAIL_FEED()
   VERIFY.OUTPUT   = DKIM_VERIFY(MAIL.PAYLOAD)
   ACCESSOR.OUTPUT = DKIM_ACCESSORS(VERIFY.OUTPUT, MAIL.PAYLOAD)

In this summary prototype, MAIL.PAYLOAD provides all the inputs 
(RFC5322 message) for both verification and for any inputs required 
for any assessors in the process. The only new data would be included 
within the VERIFY.OUTPUT and ASSESSOR.OUTPUT namespaces.

With 3.9, VERIFY.OUTPUT is defined to be:

   VERIFY.OUTPUT.RESULT
   VERIFY.OUTPUT.SDID

Without 3.9, the technical reading extraction would be:

   VERIFY.OUTPUT.RESULT
   VERIFY.OUTPUT.SDID
   VERIFY.OUTPUT.AUID

and IMO, per RFCs 4686, 5016, 5617, 5585, 5863 it would be:

   VERIFY.OUTPUT.RESULT
   VERIFY.OUTPUT.SDID
   VERIFY.OUTPUT.AUID
   VERIFY.OUTPUT.ODID

To exclude AUID and/or ODID, it would be a subjective conclusion for a 
specific implementation mandate.

>> To be consistent you have three protocol design tech writing choices:
>>
>>1) Remove the second clause in that 3.11 3rd paragraph - problem fixed.
>>2) Add AUID to 3.9 as an optional output
>>3) Remove section 3.9
> 
> or the solution I'm beginning to like:
> 
> 4) Alter 3.11 to match 3.9.

or take out 3.11 and like it was done for RFC5322.From, you can modify
the two references to the unfortunate technically incorrect sentence
in the abstract and section 1.2:

DKIM separates the question of the identity of the signer of
the message from the purported author of the message.

What "question" are we separating?  The association?  It would be 
technically incorrect given the binding requirement.

In lieu of ADSP, it may be a policy-based association separation but 
still an
DKIM-based association of authenticity.  As long as "Purported Author" 
is a fundamental requirement to be bound to the signature, it will 
always be an inherent association between the signer and author that 
can not be separated.

Maybe it can be change to a more functionally correct description:

DKIM provides a mechanism which allows for the separation of
the authorized association|relationship of the identity of
the message signer from any other agent or user identity,
including the originating author domain.

Anyway

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - Keep your Eye on the Prize!

2011-05-06 Thread Douglas Otis
On 5/5/11 9:40 PM, Hector Santos wrote:
> Dave CROCKER wrote:
>
 I don't think this is correct. The signer creates and signs the i= value,
 so it's not "garbage",
>> 
>>> By "garbage", I mean "not guaranteed to have any useful meaning".
>> 
>>> So, I believe, it's essentially meaningless as far as the protocol can
>>> stipulate.  Assertions of its semantics thus fall outside of the base DKIM
>>> spec.
>> It's worth noting that Murray said 'could be'.
>>
>> But Murray's final paragraph has the essential points: within the scope of 
>> the
>> DKIM Signing specification, the receive-side has no way to determine what the
>> semantics of i= are, as we discussed at great length when formulating the 
>> Update
>> RFC.
>>
>> But, then, folks on the list already know that.
> "We have here is a failure to communicate." - Cool Hand Luke
>
> Dave,
>
> This approach you have is an implementation conclusion.  It is not
> part of the protocol. The protocol clearly says in 3.11:
>
>  Upon successfully verifying the signature, a receive-side DKIM
>  verifier MUST communicate the Signing Domain Identifier (d=) to a
>  consuming Identity Assessor module and MAY communicate the Agent or
>  User Identifier (i=) if present.
>
> Therefore with no subjective consideration, no assertions, no
> philosophies, the protocol defines a process model of:
>
>  trust = TrustIdentityAssessor(SDID [,AUID])
>
> There is NO opinion about this! That is your DKIM Trust Protocol Model
> with a Mandatory SDID input and an optional AUID input.
>
> In order for this to work, your 3.9 Output Requirement MUST expose
> those two parameters at the very least.  There is no assertions or
> opinions - thats the protocol you defined.
>
> Now, when you begin to exclude it, then you mixing up implementation
> desires with subjective conclusion that really is not part of the
> protocol defined.  There is some subjective information notes about
> the value, but that has nothing to do with the protocol you defined.
>
> To be consistent you have three protocol design tech writing choices:
>
> 1) Remove the second clause in that 3.11 3rd paragraph - problem fixed.
>
> 2) Add AUID to 3.9 as an optional output
>
> 3) Remove section 3.9
>
> This is what happens when you add something in the last minute without
> any consensus.  It was just added - no consensus.
I must agree with Hector on this point.  It seems the motivation to 
"simplify" DKIM has wrongly included removal of output information 
intended to be bound with the signature.  It would be like SMTP later 
deciding not to include trace information intended to be bound with the 
message.

While the "i=" may contain the email address of the author or the 
postmaster of the domain or simply an opaque tag, the meaning is NOT 
undefined.  Its meaning IS defined by the signing domain.  The whole 
point of DKIM was to establish a context for such information, 
especially information intended to be closely bound with the signature.  
Deprecating that aspect of DKIM overlooks many security aspects, and the 
valid and intended use of this information.  What this parameter had 
been defined should ensure against any interoperability issues, but 
perhaps deserves a warning that it NOT be used by third parties who are 
unaware of the signing domains definition of this field.  It would still 
be extremely useful within enterprise applications, for example.

-Doug




___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output

2011-05-06 Thread Michael Thomas
On 05/06/2011 08:12 AM, Rolf E. Sonneveld wrote:
> John, the opendkim project gathers information from various sources,
> they're not necessarily the users of Murray and they're not necessarily
> subscribed to mailing lists. The statistics also doesn't tell which
> inbound mail is from legitimate sources and which inbound mail is from
> spammers/bad guys. Maybe the 95% you mention, are the spammers who try
> to abuse l= in DKIM...
>

Good luck with spammers trying abuse that. A naive filter wouldn't
know at all about l= but are well acquainted with spammers inserting
good looking text with spammy text. A dkim aware filter would be even
less impressed as the unsigned content would stick out like a sore
thumb. For all of the hysterical warnings in the spec, it would be
nice to hear about even ONE successful abuse. It's been, what, 5
years now?

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


[ietf-dkim] Ticket #24

2011-05-06 Thread Douglas Otis
The intended content of this ticket by Charles Lindsey, Rolf Sonneveld 
and my self is as follows:
,---
We were asked by Barry to provide an agreed text to resolve the
"multiple header" problem, for consideration by the WG.

The attack arises when some header (typically From:) which is supposed
to appear once in fact appears twice. DKIM is REQUIRED to sign the
bottom one, whereas most email agents will only display or use the top
one. There are three forms of the attack:

1. Some man-in-the-middle adds a header to some already signed message.
2. An earlier validly signed message is replayed with an added header.
3. The message is signed by the Bad Guy himself
(d="my-throwayay-domain.com") with two headers, of which he hopes the
recipient will see only the top (unsigned) one.

The proposed technique of signing with 'h="from:from"' works fine in the
first two cases (where the signer can be presumed honest) but fails
totally when this technique is not used by a "to big to block"
domain and in the third where he most certainly is not honest.

We are concerned that all who see a validly signed message which appears
to be From: somewh...@ebay.com will be able to *rely* on what
they see, whether they understand DKIM, or whether they have just been
told that their ISP does some magical trick to "detect people
masquerading as Ebay".

DKIM can not limit its validation to process to just signature
confirmations. This approach would then expect existing email agents to
adopt DKIM's unusual header selection methods retro-actively. To be
compatible with existing email infrastructure and transparent to the
fullest extent possible, one can not expect new supporting
infrastructure or modified clients; This can *only* be achieved by some
mandatory test within the Verifier.

We propose two wordings; one which tests for all once-only headers, and
a less desirable minimalistic version just testing for a duplicate From:
(which would be the cause of the worst scams, though lesser attacks
involving other headers have been mentioned on the WG.

1. Add:
---
6.1.n.  Validate Multiple Header Field Occurrences

Through inadvertence or malice, a message may be received having
multiple occurrences of single only header fields per [RFC5322]. To
provide results upon which subsequent agents can rely, verifiers MUST
detect an invalid number of single only header fields present within the
Signature header field's "h=" list and return PERMFAIL (illegal multiple
header fields).

See Sections 8.14 and 8.15 for further discussion of such attacks.

2, Add to 6.1:
---
To provide results upon which subsequent agents can rely, verifiers MUST
detect an invalid number of From header fields and return PERMFAIL
(illegal multiple headers.  [RFC5322] requires there be exactly one
 From header field.

See Sections 8.14 and 8.15 for further discussion of header field
considerations.
---

Editor's Note:
Wording within Sections 8.14 or 8.15 may need to change slightly to be
in alignment with these changes.

NOTE. We claim that these wordings make no layering violations. They
affect only operations required to be performed as part of the DKIM
protocol. The result reported by the verifier will still be just
PASS/PERMFAIL/TEMPFAIL, and whether or not the (malformed) message gets
forwarded to the recipient (possibly annotated with warnings) is a
matter for the Assessor, not for DKIM.
'---
-Doug
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Protocol layering / Software vs. Protocol

2011-05-06 Thread Douglas Otis
On 5/6/11 6:28 AM, Charles Lindsey wrote:
> On Thu, 05 May 2011 21:24:00 +0100, Barry Leiba
> wrote:
>> Doug says...
>>> This can *only* be achieved by some mandatory test within the Verifier.
>> Not at all; that's exactly Dave's point in discussing the difference
>> between the protocol and the software system that wraps around it.
>> The Verifier is a component that verifies the signature, and that's
>> all we're defining normatively here.  Other parts of the system will
>> evaluate things whether the verified signature can be relied upon, and
>> what it can be relied upon for; whether the domain that signed it is
>> trustworthy; whether a failed signature can nonetheless provide useful
>> information; and so on.
> Not so. As you should know from off-list discussions, that sentence is
> actually mine, though used in a marginally different context than Doug
> used it.
>
> IF there were to be some "mandatory test within the Verifier", then that
> test would be, ipso facto, a part of the protocol and not part of the
> "software system that wraps around it". So your argument was circular :-( .
This sentence was indeed written by Charles.  He is far more eloquent, 
and I wanted to respond but was rushed by other pressing security 
matters.  While we have collaborated in creating something that should 
better clarify DKIM's role, it is my opinion verification requirements 
are better stated as MUST.

Unreliable Assurances are Worse than NONE.

 From the aspect of proper protocol design and layering aspects, proper 
design must not expect consumers of the protocol to second guess the 
validity of the inputs used, especially when these inputs become less 
clear in the process.

SMTP can not be expected to ensure header field ordering, especially 
those defined by DKIM.  The modern version of the message format also 
clearly stipulates which header fields are required not to repeat.  The 
premise used by DKIM in requiring the From header field to be signed, 
incorrectly assumed that by requiring this header field to be included 
in the signature's validation, the particular header field would be 
obvious to subsequent consumers of its output.  This was clearly a 
mistake made by DKIM that MUST BE corrected.

As email transitions into the use of UTF-8, DKIM's role in better 
securing messages becomes even more significant.  As such, it is 
important to embrace the incumbent obligations.  DKIM must not blame 
SMTP or DNS for its failings.

-Doug








___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output

2011-05-06 Thread John R. Levine
> Might not be list traffic.  But I have data for that too.  Count of 
> signatures with "l=" that did or didn't appear to pass through an MLM:
>
> +--+--+
> | count(*) | mailing_list |
> +--+--+
> |77246 |0 |
> |78853 |1 |
> +--+--+

That's just strange.  Most of the l= signatures don't cover the whole 
body, and half of those didn't go through a mailing list?

Regards,
John Levine, jo...@iecc.com, Primary Perpetrator of "The Internet for Dummies",
Please consider the environment before reading this e-mail. http://jl.ly
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Ticket #24

2011-05-06 Thread Barry Leiba
I have just updated the tracker ticket for this:
http://trac.tools.ietf.org/wg/dkim/trac/ticket/24

To be concise, here are the proposed changes.  The group's preferred
change, #1, is this:

> 1. Add:
> ---
> 6.1.n.  Validate Multiple Header Field Occurrences
>
> Through inadvertence or malice, a message may be received having
> multiple occurrences of single only header fields per [RFC5322]. To
> provide results upon which subsequent agents can rely, verifiers MUST
> detect an invalid number of single only header fields present within the
> Signature header field's "h=" list and return PERMFAIL (illegal multiple
> header fields).
>
> See Sections 8.14 and 8.15 for further discussion of such attacks.

That asks for a lot, so the group has a second alternative, #2, which
only asks for the "from":

> 2, Add to 6.1:
> ---
> To provide results upon which subsequent agents can rely, verifiers MUST
> detect an invalid number of From header fields and return PERMFAIL
> (illegal multiple headers.  [RFC5322] requires there be exactly one
>  From header field.
>
> See Sections 8.14 and 8.15 for further discussion of header field
> considerations.

While I address the other two open tickets, do the IESG writeup, and
otherwise get ready to send 4871bis to the IESG, everyone please take
the time to read Doug's note and weigh in on these two alternatives.
Let us know, in this thread, whether you support one or the other of
them, or whether you prefer the text as it currently is in the -09
version of 4871bis.

If you have anything to say in argument for or against, please keep it
VERY BRIEF.  This is a call for new consensus, and the arguments have
been made at length already.  We need to see rough consensus *for* one
of these changes in order to make them.

I'll let this float for a few days -- I expect to be ready with the
writeup by the middle of next week.

Barry, as chair

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Ticket #24

2011-05-06 Thread John Levine
I appreciate the work that Doug and Charles put into their proposal,
but for reasons already discussed, I think we should leave section
6.1 as is in -09.

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Ticket #24

2011-05-06 Thread Murray S. Kucherawy
> -Original Message-
> From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] 
> On Behalf Of John Levine
> Sent: Friday, May 06, 2011 11:15 AM
> To: ietf-dkim@mipassoc.org
> Cc: barryle...@computer.org
> Subject: Re: [ietf-dkim] Ticket #24
> 
> I appreciate the work that Doug and Charles put into their proposal,
> but for reasons already discussed, I think we should leave section
> 6.1 as is in -09.

+1.  Sections 3.8, 8.14 and 8.15 already say enough about this issue.

-MSK

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output

2011-05-06 Thread Murray S. Kucherawy
> -Original Message-
> From: John R. Levine [mailto:jo...@iecc.com]
> Sent: Friday, May 06, 2011 10:50 AM
> To: Murray S. Kucherawy
> Cc: ietf-dkim@mipassoc.org
> Subject: Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output
> 
> > Might not be list traffic.  But I have data for that too.  Count of
> > signatures with "l=" that did or didn't appear to pass through an MLM:
> >
> > +--+--+
> > | count(*) | mailing_list |
> > +--+--+
> > |77246 |0 |
> > |78853 |1 |
> > +--+--+
> 
> That's just strange.  Most of the l= signatures don't cover the whole
> body, and half of those didn't go through a mailing list?

I suspect it's use of "l=" by a signer without regard to whether or not the 
mail is heading to an MLM.  For example, OpenDKIM's antecedent had that as an 
option; only the evolution to OpenDKIM allowed you to be more specific.


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output requirements

2011-05-06 Thread Murray S. Kucherawy
> -Original Message-
> From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] 
> On Behalf Of Barry Leiba
> Sent: Thursday, May 05, 2011 1:08 PM
> To: Charles Lindsey
> Cc: DKIM
> Subject: Re: [ietf-dkim] Output requirements
> 
> >> +   Verifiers SHOULD ignore those signatures that produce a PERMFAIL
> >> +   result (see Section 7.1), acting as though they were not present
> in
> >> +   the message.  ...
> >
> > s/Verifiers SHOULD ignore/Identity assessors SHOULD ignore/
> >
> > (and probably in other places too). Verifiers are explicitly instructed
> > to return PERMFAIL/TEMPFAIL), and "returning" something is evidently
> > inconsistent with "ignoring" it.
> 
> +1

Since this is already somewhat mushy, might I suggest:

Verifiers MAY decline to report, and identity assessors SHOULD ignore, ...


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] I-D ACTION:draft-ietf-dkim-mailinglists-08.txt

2011-05-06 Thread Murray S. Kucherawy
This was a delayed notice.  There's not actually a new version today.

> -Original Message-
> From: i-d-announce-boun...@ietf.org [mailto:i-d-announce-
> boun...@ietf.org] On Behalf Of internet-dra...@ietf.org
> Sent: Friday, May 06, 2011 11:30 AM
> To: i-d-annou...@ietf.org
> Cc: ietf-dkim@mipassoc.org
> Subject: I-D ACTION:draft-ietf-dkim-mailinglists-08.txt
> 
> A new Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the Domain Keys Identified Mail Working
> Group of the IETF.
> 
> Title : DKIM And Mailing Lists
> Author(s) : M. Kucherawy
> Filename  : draft-ietf-dkim-mailinglists-08.txt
> Pages : 31
> Date  : 2011-04-27
> 
>DomainKeys Identified Mail (DKIM) allows an administrative mail
>domain (ADMD) to assume some responsibility for a message.  Based on
>deployment experience with DKIM, this Best Current Practices document
>provides guidance for the use of DKIM with scenarios that include
>Mailing List Managers (MLMs). {DKIM 12}
> 
> 
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft-ietf-dkim-mailinglists-08.txt
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> Below is the data which will enable a MIME compliant mail reader
> implementation to automatically retrieve the ASCII version of the
> Internet-Draft.

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output

2011-05-06 Thread John R. Levine
>>> +--+--+
>>> | count(*) | mailing_list |
>>> +--+--+
>>> |77246 |0 |
>>> |78853 |1 |
>>> +--+--+
>>
>> That's just strange.  Most of the l= signatures don't cover the whole
>> body, and half of those didn't go through a mailing list?

> I suspect it's use of "l=" by a signer without regard to whether or not 
> the mail is heading to an MLM.  For example, OpenDKIM's antecedent had 
> that as an option; only the evolution to OpenDKIM allowed you to be more 
> specific.

Except that doesn't explain why l= doesn't cover the entire body.

Signing or verifying bug?  Clever spammer replaying signed mail and 
getting away with it?  Forwarders of some sort that add a footer but 
otherwise don't look like mailing lists?

Regards,
John Levine, jo...@iecc.com, Primary Perpetrator of "The Internet for Dummies",
Please consider the environment before reading this e-mail. http://jl.ly
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] issue: Section 2.6/ 3.5 AUID/i= should have pubkey t=s info

2011-05-06 Thread Murray S. Kucherawy
> -Original Message-
> From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] 
> On Behalf Of Barry Leiba
> Sent: Thursday, May 05, 2011 3:24 PM
> To: dcroc...@bbiw.net
> Cc: ietf-dkim@mipassoc.org
> Subject: Re: [ietf-dkim] issue: Section 2.6/ 3.5 AUID/i= should have pubkey 
> t=s info
> 
> > Repeating or rephrasing specification text invites divergent
> > interpretations.
> 
> Indeed, and I agree that not repeating is best.  On the other hand,
> we're already repeating the part about "or a subdomain of", which is
> why I support adding a notation about "except when t=s".
> 
> >    Note the constraint on the value of "i=" that is imposed by the
> > "t=s" tag of
> > the stored key record. (See Section 3.6.1).
> 
> That works for me.

Seems minor, editorial and useful.  Added for the next version.

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output

2011-05-06 Thread Murray S. Kucherawy
> -Original Message-
> From: John R. Levine [mailto:jo...@iecc.com]
> Sent: Friday, May 06, 2011 11:43 AM
> To: Murray S. Kucherawy
> Cc: ietf-dkim@mipassoc.org
> Subject: Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output
> 
> >>> +--+--+
> >>> | count(*) | mailing_list |
> >>> +--+--+
> >>> |77246 |0 |
> >>> |78853 |1 |
> >>> +--+--+
> >>
> >> That's just strange.  Most of the l= signatures don't cover the whole
> >> body, and half of those didn't go through a mailing list?
>
> > I suspect it's use of "l=" by a signer without regard to whether or not
> > the mail is heading to an MLM.  For example, OpenDKIM's antecedent had
> > that as an option; only the evolution to OpenDKIM allowed you to be more
> > specific.
> 
> Except that doesn't explain why l= doesn't cover the entire body.
> 
> Signing or verifying bug?  Clever spammer replaying signed mail and
> getting away with it?  Forwarders of some sort that add a footer but
> otherwise don't look like mailing lists?

My guess is the third one.  The specification for what we decide is a mailing 
list submission isn't bulletproof, but is listed as:

- has a "Precedence: list" field
- has a "List-Id: field
- has a "List-Post:" field
- has a "List-Unsubscribe:" field
- has a "Mailing-List:" field

If there are other metrics that are easily detected, I could add monitoring for 
them and then cut off future reports at today's date, or something like that.

There's also the whole thing about "l=" is the post-canonicalization body 
count, not the actual full message byte count.  I'll double-check on that logic.

This won't change the "l=" use information though, just the pass/fail reporting 
accuracy.



___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - Keep your Eye on the Prize!

2011-05-06 Thread Barry Leiba
We've had a bit of discussion in this thread (and elsewhere) about
this, but I need to get a clear view of consensus.  Doug agrees with
Hector's note, below, and Dave and Murray do not.  I'd like to hear
from others within the next few days, about whether you think we
should make the change Hector requests or not.  I need to get a sense
of whether there's significant support for it.  Again, please keep
arguments to a minimum, so it's clearer to me what the consensus is --
we've had the arguments going for a while now.

Barry, as chair

On Wed, May 4, 2011 at 6:11 PM, Hector Santos  wrote:
> Ah come on guys!  We all know what the problems are, we know the sides
> and what colors we wear.  Is it possible to come up with a compromise
> to solve this conflicts once and for all?
>
> Dave, don't you want receivers to follow RFC5585 design?  If so, then
> what can't we get the Outputs described for that design to work?  From
> what I can see, there are four variables:
>
>    status  REQUIRED
>    SDID    REQUIRED, MANDATORY for Trust Identity Assessor (see 2.7)
>    AUID    OPTIONAL, see 3.11
>    ODID    OPTIONAL for Checking Signing Process (see RFC5585)
>
> We have the REQUIRED/MANDATORY identity you want.  But you have the
> others too.
>
> What is technically wrong with this?
>
> --
> Sincerely
>
> Hector Santos
> http://www.santronics.com

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - Keep your Eye on the Prize!

2011-05-06 Thread John R. Levine
> this, but I need to get a clear view of consensus.  Doug agrees with
> Hector's note, below, and Dave and Murray do not.  I'd like to hear
> from others within the next few days, about whether you think we
> should make the change Hector requests or not.

Dave and Murray are right, Hector is not.

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


[ietf-dkim] I-D ACTION:draft-ietf-dkim-mailinglists-08.txt

2011-05-06 Thread Internet-Drafts
A new Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Domain Keys Identified Mail Working Group of 
the IETF.

Title : DKIM And Mailing Lists
Author(s) : M. Kucherawy
Filename  : draft-ietf-dkim-mailinglists-08.txt
Pages : 31
Date  : 2011-04-27

   DomainKeys Identified Mail (DKIM) allows an administrative mail
   domain (ADMD) to assume some responsibility for a message.  Based on
   deployment experience with DKIM, this Best Current Practices document
   provides guidance for the use of DKIM with scenarios that include
   Mailing List Managers (MLMs). {DKIM 12}


A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-dkim-mailinglists-08.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output

2011-05-06 Thread Rolf E. Sonneveld
Hi, Murray,

On 5/6/11 8:50 PM, Murray S. Kucherawy wrote:
>> -Original Message-
>> From: John R. Levine [mailto:jo...@iecc.com]
>> Sent: Friday, May 06, 2011 11:43 AM
>> To: Murray S. Kucherawy
>> Cc: ietf-dkim@mipassoc.org
>> Subject: Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output
>>
> +--+--+
> | count(*) | mailing_list |
> +--+--+
> |77246 |0 |
> |78853 |1 |
> +--+--+
 That's just strange.  Most of the l= signatures don't cover the whole
 body, and half of those didn't go through a mailing list?
>>> I suspect it's use of "l=" by a signer without regard to whether or not
>>> the mail is heading to an MLM.  For example, OpenDKIM's antecedent had
>>> that as an option; only the evolution to OpenDKIM allowed you to be more
>>> specific.
>> Except that doesn't explain why l= doesn't cover the entire body.
>>
>> Signing or verifying bug?  Clever spammer replaying signed mail and
>> getting away with it?  Forwarders of some sort that add a footer but
>> otherwise don't look like mailing lists?
> My guess is the third one.  The specification for what we decide is a mailing 
> list submission isn't bulletproof, but is listed as:
>
> - has a "Precedence: list" field
> - has a "List-Id: field
> - has a "List-Post:" field
> - has a "List-Unsubscribe:" field
> - has a "Mailing-List:" field

I assume this is a boolean OR list?

/rolf

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output

2011-05-06 Thread Murray S. Kucherawy
> -Original Message-
> From: Rolf E. Sonneveld [mailto:r.e.sonnev...@sonnection.nl]
> Sent: Friday, May 06, 2011 1:48 PM
> To: Murray S. Kucherawy
> Cc: ietf-dkim@mipassoc.org
> Subject: Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output
> 
> > My guess is the third one.  The specification for what we decide is a
> > mailing list submission isn't bulletproof, but is listed as:
> >
> > - has a "Precedence: list" field
> > - has a "List-Id: field
> > - has a "List-Post:" field
> > - has a "List-Unsubscribe:" field
> > - has a "Mailing-List:" field
> 
> I assume this is a boolean OR list?

Correct.


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


[ietf-dkim] I-D ACTION:draft-ietf-dkim-rfc4871bis-09.txt

2011-05-06 Thread Internet-Drafts
A new Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Domain Keys Identified Mail Working Group of 
the IETF.

Title : DomainKeys Identified Mail (DKIM) Signatures
Author(s) : D. Crocker, et al
Filename  : draft-ietf-dkim-rfc4871bis-09.txt
Pages : 75
Date  : 2011-05-01

   DomainKeys Identified Mail (DKIM) permits a person, role, or
   organization that owns the signing domain to claim some
   responsibility for a message by associating the domain with the
   message.  This can be an author's organization, an operational relay
   or one of their agents.  DKIM separates the question of the identity
   of the signer of the message from the purported author of the
   message.  Assertion of responsibility is validated through a
   cryptographic signature and querying the signer's domain directly to
   retrieve the appropriate public key.  Message transit from author to
   recipient is through relays that typically make no substantive change
   to the message content and thus preserve the DKIM signature.

   This memo obsoletes RFC4871 and RFC5672.


A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-dkim-rfc4871bis-09.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output

2011-05-06 Thread Rolf E. Sonneveld
On 5/6/11 8:43 PM, John R. Levine wrote:
 +--+--+
 | count(*) | mailing_list |
 +--+--+
 |77246 |0 |
 |78853 |1 |
 +--+--+
>>> That's just strange.  Most of the l= signatures don't cover the whole
>>> body, and half of those didn't go through a mailing list?
>> I suspect it's use of "l=" by a signer without regard to whether or not
>> the mail is heading to an MLM.  For example, OpenDKIM's antecedent had
>> that as an option; only the evolution to OpenDKIM allowed you to be more
>> specific.
> Except that doesn't explain why l= doesn't cover the entire body.
>
> Signing or verifying bug?  Clever spammer replaying signed mail and
> getting away with it?  Forwarders of some sort that add a footer but
> otherwise don't look like mailing lists?

or just "authoring MLM's" (see par. 4.2 of 
http://www.ietf.org/id/draft-ietf-dkim-mailinglists-08.txt) which 
probably use software that incorporates some (minimalistic) type of MLM 
which adds one of the headers, listed by Murray.

I notice I regularly get mail from marketing departments of my car 
dealer, smart phone provider, from Adobe, etc. that carry a 
'List-Unsubscribe' header and some of them carry a Precedence header. I 
wouldn't be surprised if the percentage of this type of messages is 
greater than the percentage of the 'classic' re-sending MLM type of 
messages.

Back to the topic of this thread: I don't think we can draw any 
conclusions from these statistics in relation to the description of l= 
in rfc4871bis. The current description in rfc4871bis works for me.

/rolf
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output

2011-05-06 Thread Hector Santos
Rolf E. Sonneveld wrote:

> Back to the topic of this thread: I don't think we can draw any 
> conclusions from these statistics in relation to the description of l= 
> in rfc4871bis. The current description in rfc4871bis works for me.

I would like to know the percentage of l=xxx where xxx equals actual 
body count.

If its very high, that will tell me there are many references to "l=" 
with text that sounds like its expected to be added.  I posted this here:

http://mipassoc.org/pipermail/ietf-dkim/2011q2/016138.html

So if we wish to discourage "l=" useful, some of these text needs to 
be reworded, like this one in section 3.5

bh=  The hash of the canonicalized body part of the message as
 limited by the "l=" tag (base64; REQUIRED).

It sounds like its expected and the REQUIRED is too close to "l=" 
which can throw someone off.  I suggested the change to be:

   bh=  The hash (base64; REQUIRED) of the canonicalized body part
of the message. It is limited to the entire body length
count or length explicitly set with the optional "l=" tag
count value. If the hash is to represent the entire body
with no expectation for additional unhashed text appended
to the body, the l= tag SHOULD NOT be used. (See Section 9.1).

My post list all the references to "l=" for reading and setting.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output

2011-05-06 Thread Murray S. Kucherawy
> -Original Message-
> From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] 
> On Behalf Of Hector Santos
> Sent: Friday, May 06, 2011 3:33 PM
> To: Rolf E. Sonneveld
> Cc: ietf-dkim@mipassoc.org
> Subject: Re: [ietf-dkim] l= statistics was 23 again (sorry John) was Output
> 
> Rolf E. Sonneveld wrote:
> 
> > Back to the topic of this thread: I don't think we can draw any
> > conclusions from these statistics in relation to the description of l=
> > in rfc4871bis. The current description in rfc4871bis works for me.
> 
> I would like to know the percentage of l=xxx where xxx equals actual
> body count.

Assuming you mean "percentage of signatures using 'l=' where the signed length 
and the message length are the same", OpenDKIM's data shows that as 9008 out of 
156524, or less than 6%.  Absent an error in the data, that suggests to me that 
when "l=" is used, it's being used because the mail is following a path through 
which it is likely to be extended.

> So if we wish to discourage "l=" useful, some of these text needs to
> be reworded, like this one in section 3.5 [...]

I don't think the proposed text adds or clarifies anything that isn't already 
there.  The semantics and use of "l=" are pretty well defined already.

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] I-D ACTION:draft-ietf-dkim-mailinglists-08.txt

2011-05-06 Thread Franck Martin
Sorry if I jump in, some comments:

4.3 it would be nice to talk about message encoding change like QP->8bits,
may be in minor or major body changes. It is a minor change for the human
but major for the machines as many characters got changed.

5.1 "Some mail filtering software incorrectly penalizes a message
containing a DKIM signature that fails verification." You should
remind/add that a message that fails DKIM must be considered like having
no signature at all. Then you can bring ADSP, policy in the picture, and
there ADSP too will not make the difference if a message has no signature
or a failed signature. I have the feeling that making the point clears
helps in building message policies (out of scope of this document).

"such as a signing and author subdomain {DKIM 12}" -> "such as a signing
and author subdomain {DKIM 12} or a totally different domain"


5.2 There are some professional services that allows to look in to
reception at some providers

5.3 postmaster should inform their users that messages are likely to be
discarded if sent via a MLM.

6.8 talk about headers to add to the message but do not talk which
recommended headers should be signed. They are specified in DKIM 5.5 but
would be nice to do a reminder here specific to MLM.

Speaking of DKIM 5.5, List- headers are recommended to be signed, but
doesn't it creates confusion?  My feel is that they should be signed only
if present in the message, if they are not present DKIM should not mention
them in h= at all.

On 5/7/11 6:30 , "internet-dra...@ietf.org" 
wrote:

>draft-ietf-dkim-mailinglists-08


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html