Re: [ietf-dkim] A comprehensive DKIM verification specification will not violate protocol layers.

2010-11-23 Thread Charles Lindsey
On Mon, 22 Nov 2010 22:32:41 -, Douglas Otis   
wrote:

> Murray argued singleton header checks to qualify DKIM signatures
> violates protocol layering.

Which is why I want to fix this problem with normative wording that does  
not violate protocol layering.

Quite simple:

Signers MUST/SHOULD not sign messages with multiple <0nce-only> headers  
(detailed wording to be discussed).

Verifiers MUST/SHOULD check that signing requirement has been met (i.e.  
that no multiple  headers, or whatever the detailed wording  
says, are present).

No protocol layering violation, because the verifier is just checking  
something laid down for signers in the same protocol. RFC 5322 hardly gets  
mentioned, except presumably when defining  or in eplanatory  
NOTEs, secutiy considerations, etc. All the scams under discussion still  
get caught.

-- 
Charles H. Lindsey -At Home, doing my own thing
Tel: +44 161 436 6131   
   Web: http://www.cs.man.ac.uk/~chl
Email: ...@clerew.man.ac.uk  snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9  Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] A comprehensive DKIM verification specification will not violate protocol layers.

2010-11-22 Thread Douglas Otis
Murray argued singleton header checks to qualify DKIM signatures 
violates protocol layering.  SMTP messages are exchanged in two parts, a 
header and a body section. The header section should conform with 
RFC5322, and the body should conform with RFC2045.  RFC2047 and RFC2231 
define header encoding for non US-ASCII repertoire using US-ASCII, and 
RFC1652 relaxes restrictions on the body.

Section 6.4 of RFC5321 makes it clear that non-compliance with RFC5322 
occurs, and that there is no consensus whether to reject, repair, or 
accept such messages.  RFC1847 (Security Multiparts for MIME), RFC4880 
(PGP), or RFC3851 (S/MIME) authenticates the source and integrity of the 
message body, whereas DKIM retains the integrity of trusted portions of 
the header section, specifically the From header field, and perhaps others.

Whenever message acceptance is based upon valid DKIM signatures by 
trusted domains, defeating trivial exploitation of DKIM's bottom-up 
header selection requires exclusion of multiple singleton header fields 
from being considered having valid DKIM signatures.  Otherwise, this 
would permit inappropriate header fields to be conveyed using top-down 
selections.  It is imperative that DKIM's verification process defeat 
such exploits, since DKIM does not assume applications conveying the 
header section is DKIM aware.

Expecting consumers of DKIM results to re-evaluate the header section 
eliminates DKIM's value proposition.  Recommending subsequent checks for 
multiple singleton headers represents poor protocol layering, since this 
would expect consumers of DKIM results to recheck the header section 
being associated with a DKIM domain.

-Doug







___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html