Re: [ietf-dkim] Question: ADSP DKIM=UNKNOWN and A-R reporting

2011-05-05 Thread Barry Leiba
 That's not what RFC5617 says.

    Meaning:  No valid Author Domain Signature was found on the message
              and the published ADSP was unknown.

 Can't that be read as meaning a non-Author Domain Signature was not
 expected.

No, not at all.  I can't think of any interpretation of that sentence
that would give that meaning.

No valid Author Domain Signature was found says nothing about
anything else that might or might not have been found.

If it rains, then I won't play baseball, says nothing about what
I'll do if it doesn't rain.

Barry, as participant

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Question: ADSP DKIM=UNKNOWN and A-R reporting

2011-05-05 Thread Hector Santos
Barry Leiba wrote:
 That's not what RFC5617 says.
 � �Meaning: �No valid Author Domain Signature was found on the message
 � � � � � � �and the published ADSP was unknown.

 Can't that be read as meaning a non-Author Domain Signature was not
 expected?
 
 No, not at all.  I can't think of any interpretation of that sentence
 that would give that meaning.
 
 No valid Author Domain Signature was found says nothing about
 anything else that might or might not have been found.
 
 If it rains, then I won't play baseball, says nothing about what
 I'll do if it doesn't rain.

This is part of the semantics clarification we seek.  You are probably 
catching up, but the text descriptions for DKIM=UNKNOWN are found in 
ADSP Section 4.2.1 and 5.4:

unknown   The domain might sign some or all email.

Meaning:  No valid Author Domain Signature was found on the message
  and the published ADSP was unknown.

Think of the software:

First, No ADSP record is found.

In this case, there is absolutely no policy semantics regarding DKIM 
the verifier can make for the author domain.  No sig, double, triple, 
mixed 1st, 3rd, some valid, some broken, whatever, the verifier can 
not make any ADSP interpretation other than  dkim-adsp=none.

But now we have an explicit DKIM=UNKNOWN;

The semantic and also part of the WG conflicts is the absence of a 
valid Author Domain signature and includes the presence of a valid 3rd 
party signature.

In other words, should the verifier?

   #1 - ignore signatures where SDID != ODID, and
   #2 - only look for signatures where SDID == ODID

The problem Barry, and this was a long term issue with ADSP, is that 
it lacks an explicit semantic or definition where it says:

 mail can be signed by anyone

or

 ignore mail that have 3rd party signatures

This conflict begins in RFC5017 (Requirements for Signing Practice) in 
most debated item in section 5.3, Item #10:

   5.3. Practice and Expectation Requirements

   10. SSP MUST NOT provide a mechanism that impugns the existence of
   non-first party signatures in a message.  A corollary of this
   requirement is that the protocol MUST NOT link practices of first
   party signers with the practices of third party signers.

 INFORMATIVE NOTE: the main thrust of this requirement is that
 practices should only be published for that which the publisher
 has control, and should not meddle in what is ultimately the
 local policy of the receiver.

 Refs: Deployment Consideration, Section 4.3.

Base on this, its implies to me we should ignore 3rd party signatures, 
but that is conflicts with ADSP and even the fundamental idea behind 
RFC5017 - check for author  policies and policy violations.

So I can understand that if there are no explicit record, then the 
receiver can not make any presumptions about the signatures in the 
message.  But if there is a record, then its negates what item 10# is 
saying for the verifier with a local policy to support ADSP to mind 
its bee's wax with the presence of a non-first party signature.

Do you see the conflict?

Just consider when an explicit ADSP record is found with:

 DKIM=DISCARDABLE
 DKIM=ALL

Does these also come an item #10 ignore 3rd party signature concept 
even with the receiver is willing to honor ADSP and author domain 
policies?

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Question: ADSP DKIM=UNKNOWN and A-R reporting

2011-05-04 Thread Alessandro Vesely
On 03.05.2011 15:28, Hector Santos wrote:
 Authentication-Results: dkim.winserver.com;
   dkim=pass header.i=mipassoc.org header.d=mipassoc.org header.s=k1;
   adsp=fail policy=unknown author.d=tana.it signer.d=mipassoc.org 
 (unauthorized signer);
 
 The (unauthorized signer) was added because it was an explicit 
 DKIM=UKKNOWN DNS record declaration.
 
 If there was no ADSP record, the adsp= info would look like this:
 
   adsp=none author.d=tana.it signer.d=mipassoc.org;
 
 Would that be a reasonable valid A-R reporting for ADSP based on my 
 interpretation of explicit vs implicit DKIM=UNKNOWN setting?

I don't think so.  The only difference between setting unsigned and letting
it be derived by default should be the ability to control the expiration of
such value.

As for ATPS, I will happily mention mipassoc.org as authorized signer, and
I'll possibly authorize more domains, but then I'll also forget some.  That's
what happened when I enabled ADSP promising to myself to whitelist each and
every MLM, and failing to keep it.  IMHO, MLMs should tell authors' servers
about subscriptions, as that would solve a number of problems.  Until they
continue not doing that, this particular problem remains among the unsolved 
ones.
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Question: ADSP DKIM=UNKNOWN and A-R reporting

2011-05-04 Thread Hector Santos
Alessandro Vesely wrote:

 The (unauthorized signer) was added because it was an explicit 
 DKIM=UKKNOWN DNS record declaration.

 If there was no ADSP record, the adsp= info would look like this:

   adsp=none author.d=tana.it signer.d=mipassoc.org;

 Would that be a reasonable valid A-R reporting for ADSP based on my 
 interpretation of explicit vs implicit DKIM=UNKNOWN setting?
 
 I don't think so.  The only difference between setting unsigned 
 and letting it be derived by default should be the ability to 
 control the expiration of such value.

Can you rephrase this so I can better understand your thinking?

I am merely thinking of terms of intent.  With no ADSP record, then 
I view that as a conscience operational decision to allow any signer 
to exist (for your messages).

But if have an explicit ADSP record, that is a conscience operational 
decision to assert a policy declaration, one that comes with an author 
domain expectation (See RFC5017) for a valid signing practice.  When 
the policy is violated, it is very important to know that in order to 
get a payoff value.

I would like to point out there is a long term philosophical mindset 
conflict in regards to what is expected in receiver local policies:

  Accept all, Let Users decide, the DMA (Marketers) Cat's Meow.

vs

  Deterministically Filter all the bad first, controlling receiver
  (and thus users) abuse.

So depending on what side one is on or lean towards, the design 
considerations vary greatly.

So only as an rhetorical example, what was tana.it intent by declaring 
DKIM=UNKNOWN?

Per ADSP section 4.2.1 and 5.4:

unknown   The domain might sign some or all email.

Meaning:  No valid Author Domain Signature was found on
  the message and the published ADSP was unknown.

To me that means when a message is signed, it MUST be a valid 1st 
party.  When only a 3rd party signature is found, it is a policy 
violation.

But thus we have the root of the conflict:

See RFC5017, section 5.4 item #10.

  10. SSP MUST NOT provide a mechanism that impugns the existence of
  non-first party signatures in a message.  A corollary of this
  requirement is that the protocol MUST NOT link practices of first
  party signers with the practices of third party signers.

   INFORMATIVE NOTE: the main thrust of this requirement is that
   practices should only be published for that which the publisher
   has control, and should not meddle in what is ultimately the
   local policy of the receiver.

This was a very controversial item and you can see the sensitivity of 
it by the words used to mandate a MUST NOT!

On the way one hand, it wants receivers to mind their own bee's wax in 
regard to 3rd party signers but excluded the idea that receivers may 
want to honor author policies as part of their local policies.  Item 
#10 was the central conflict that created ADSP in an attempt to get 
receivers to ignore the existence of 3rd party signatures and just use 
ADSP to look for the author domain non-signed messages.  If the 3rd 
party signature exist, ignore it.  Thats a engineering flaw when you 
have explicit policy declarations telling receivers what is expected.

 As for ATPS, I will happily mention mipassoc.org as 
 authorized signer, and I'll possibly authorize more domains, 
 but then I'll also forget some.  

Right, but does that means others would not a have definitive 
operational understanding of how their mail will be signed or expected 
to be signed?  I think receivers can only work with DKIM on a basic 
idea to give the domain the benefit of the doubt.  If you declare a 
policy, that helps alot. Otherwise, the domain really doesn't care, 
but the receiver will still care when it becomes abusive.

 That's what happened when I enabled ADSP promising to myself 
 to whitelist each and every MLM, and failing to keep it.  IMHO, 
 MLMs should tell authors' servers about subscriptions, as that 
 would solve a number of problems.  Until they continue not 
 doing that, this particular problem remains among the unsolved ones.

+1.  I think we can correct ADSP if it semantics can covers the ideas:

ALWAYS SIGNED:

 By ME
 By any signer
 By MLM signer

ALWAYS SIGNED with Authorization using Extensions

 By ME
 By any Authorized signer
 By any Authorized MLM signer

I am not sure if we need to distinguish list signers but if we want to 
separate private vs public mail streams, maybe it can help.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Question: ADSP DKIM=UNKNOWN and A-R reporting

2011-05-04 Thread Alessandro Vesely
On 04.05.2011 14:56, Hector Santos wrote:
 Alessandro Vesely wrote:
 The only difference between setting unsigned and letting it be derived
 by default should be the ability to control the expiration of such
 value.
 
 Can you rephrase this so I can better understand your thinking?

ATPS wasn't visible when I set that record.  The only reason I put it there
was to state a decent TTL, which makes sense since the design of the DNS is
such that replying not found never costs less than directly stating that
it will stay unknown at least for the whole day.

 I am merely thinking of terms of intent.  [...]
 
 So only as an rhetorical example, what was tana.it intent by declaring 
 DKIM=UNKNOWN?

Hm... I'm not sure how layer logic applies to that reasoning.  A default is
a value; discriminating whether it was explicitly given or assumed resembles
Terrell's ternary logic, holding that a bit has three values
http://tools.ietf.org/html/draft-terrell-math-quant-ternary-logic-of-binary-sys
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


[ietf-dkim] Question: ADSP DKIM=UNKNOWN and A-R reporting

2011-05-03 Thread Hector Santos
RFC5617 has for this tag value:

dkim=   Outbound Signing Practices for the domain (plain-text;
REQUIRED).  Possible values are as follows:

unknown   The domain might sign some or all email.

For my A-R reporting if there an explicit DKIM=UNKNOWN record, I took 
this declaration to mean the domain only allows it to sign sometimes 
and no one else.
There is no failure handling semantics unlike DKIM=DISCARDABLE, so no 
verifier action is done other than A-R record it.

For example, this is such a reporting for a list message posted here 
by Alessandro with its tana.it domain.

Authentication-Results: dkim.winserver.com;
  dkim=pass header.i=mipassoc.org header.d=mipassoc.org header.s=k1;
  adsp=fail policy=unknown author.d=tana.it signer.d=mipassoc.org 
(unauthorized signer);

The (unauthorized signer) was added because it was an explicit 
DKIM=UKKNOWN DNS record declaration.

If there was no ADSP record, the adsp= info would look like this:

  adsp=none author.d=tana.it signer.d=mipassoc.org;

Would that be a reasonable valid A-R reporting for ADSP based on my 
interpretation of explicit vs implicit DKIM=UNKNOWN setting?

Of course, it should been labeled as DKIM=OPTIONAL because if someone 
went to extent to declare a record, it wouldn't be unknown what he 
intended.


-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Question: ADSP DKIM=UNKNOWN and A-R reporting

2011-05-03 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] 
 On Behalf Of Hector Santos
 Sent: Tuesday, May 03, 2011 6:29 AM
 To: ietf-dkim@mipassoc.org
 Subject: [ietf-dkim] Question: ADSP DKIM=UNKNOWN and A-R reporting
 
 RFC5617 has for this tag value:
 
 dkim=   Outbound Signing Practices for the domain (plain-text;
 REQUIRED).  Possible values are as follows:
 
 unknown   The domain might sign some or all email.
 
 For my A-R reporting if there an explicit DKIM=UNKNOWN record, I took
 this declaration to mean the domain only allows it to sign sometimes
 and no one else.

That's not what RFC5617 says.

 For example, this is such a reporting for a list message posted here
 by Alessandro with its tana.it domain.
 
 Authentication-Results: dkim.winserver.com;
   dkim=pass header.i=mipassoc.org header.d=mipassoc.org header.s=k1;
   adsp=fail policy=unknown author.d=tana.it signer.d=mipassoc.org
 (unauthorized signer);
 
 The (unauthorized signer) was added because it was an explicit
 DKIM=UKKNOWN DNS record declaration.

Reporting a fail against dkim=unknown is technically impossible.  You 
should use unknown.  See Section 5.4.

Also, it should be dkim-adsp, not adsp.  See Section 5.3.

 If there was no ADSP record, the adsp= info would look like this:
 
   adsp=none author.d=tana.it signer.d=mipassoc.org;

none doesn't appear in the registry.


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Question: ADSP DKIM=UNKNOWN and A-R reporting

2011-05-03 Thread Hector Santos
Murray S. Kucherawy wrote:

 For my A-R reporting if there an explicit DKIM=UNKNOWN record, I took
 this declaration to mean the domain only allows it to sign sometimes
 and no one else.
 
 That's not what RFC5617 says.

Meaning:  No valid Author Domain Signature was found on the message
  and the published ADSP was unknown.

Can't that be read as meaning a non-Author Domain Signature was not 
expected.

 Authentication-Results: dkim.winserver.com;
   dkim=pass header.i=mipassoc.org header.d=mipassoc.org header.s=k1;
   adsp=fail policy=unknown author.d=tana.it signer.d=mipassoc.org
 (unauthorized signer);

 The (unauthorized signer) was added because it was an explicit
 DKIM=UKKNOWN DNS record declaration.
 
 Reporting a fail against dkim=unknown is technically impossible.  

I don't quite read it that way Murry.  But it says No Author Domain 
Signature, it would be a failed. See below why I used adsp= instead.

 You should use unknown.  See Section 5.4.
 
 Also, it should be dkim-adsp, not adsp.  See Section 5.3.
 
 If there was no ADSP record, the adsp= info would look like this:

   adsp=none author.d=tana.it signer.d=mipassoc.org;
 
 none doesn't appear in the registry.
 

I am also reporting ADSP/ATPS/ASL reporting and wanted to fold it into 
one line. The adsp= tag is for handler PASS|FAIL|NONE status for our 
internal MAIL API consumption only. I needed a different simpler 
namespace to not step over the two line dkim-adsp, dkim-atps.

   adsp=HANDLER status [policy=explicit-dkim=value] 

Anyway. My Reading is:

No DNS record  - no consideration for ADSP whatsoever. No (NONE)
 assumptions can be made, so you can't default
 to an UNKNOWN because it was known to the
 author and verifier - it wasn't defined (NONE)

DKIM=UNKNOWN   - it describes it as an optional expectation
 and its defines it as Author Domain, not
 just any signature.

To me, there is diagnostic value between a real no signature (NONE) 
and an invalid one (FAIL). I don't wish to combine those as UNKNOWN. 
In short the combinations of inputs and outputs allows for all states 
to exist.

Note, these are all part of the semantics ambiguities discussed in the 
past regarding ADSP.  I hope we can fix it.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html