Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-19 Thread Douglas Otis


On Apr 19, 2006, at 12:30 PM, Stephen Farrell wrote:


I wish you'd stop with the spurious figures.


These figures strongly suggest the recommendation in section 5.2 is  
inadequate to accommodate lapses in availability owing to vacations,  
when that is important to the sender.


Section 5.2
...
,---
| A signer SHOULD NOT sign with a key that is expected to expire within
| seven days; that is, when rotating to a new key, signing should
| immediately commence with the new key and the old key SHOULD be
| retained for at least seven days before being removed from the key
| server.
'___

A safer recommendation would be:

: A signer SHOULD NOT sign with a key that is expected to expire within
: a transit period where protection is desired; that is, when rotating
: to a new key, signing should immediately commence with the new key
: and the old key SHOULD be retained for at least the period where
: transit protection is desired before being removed from the key
: server.


Again, all this is an aside for us. There's no required  
correlation between x= and key life cycles. Please stop flogging  
that dead horse.


The x= parameter is a totally separate issue.  Where have I  
conflated the two?


There: [1]. Took all of 5 seconds to find one. There are others.

[1] http://mipassoc.org/pipermail/ietf-dkim/2006q2/003248.html


Hector made the inference key availability and the x= parameter are  
related.


My statement was simply:

"When the transport includes IMAP and POP, this 7 day advice is far  
too short of a period to ensure verification."


This was referring to section 5.2 and was not commenting upon the  
conclusion reached by Hector.  My apologies for not changing the  
subject line.


-Doug




___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-19 Thread Stephen Farrell


Doug,

I wish you'd stop with the spurious figures.

Douglas Otis wrote:


Again, all this is an aside for us. There's no required correlation 
between x= and key life cycles. Please stop flogging that dead horse.


The x= parameter is a totally separate issue.  Where have I conflated 
the two?


There: [1]. Took all of 5 seconds to find one. There are others.

Stephen.

[1] http://mipassoc.org/pipermail/ietf-dkim/2006q2/003248.html


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-19 Thread Douglas Otis


On Apr 19, 2006, at 1:33 AM, Stephen Farrell wrote:


Douglas Otis wrote:


When a large portion of a country's population goes on vacation for 5


Exactly what portion is that?


What portion of the population would be enough to matter?

"The expected transit time of a message from originator to recipient"  
refers to transit latency where originators and recipients are  
typically people.  A measure of "normal" or the mean of person to  
person email message transit latency will be within the realm of a  
few days at most.  Concerns related to how long a key should remain  
available to protect this transit period must consider typically  
induced latencies due to common human behavior.


While machine to machine latencies are often measured in seconds, but  
still equipment failure recovery often gives up after 5 days.   
Transports beyond SMTP listed as being protected by DKIM carry the  
message to the recipient.  These transports may suffer typical spikes  
in latency when a person is on vacation.  Unusual behaviors will not  
be attractive, as the bad actor would have trouble knowing when to  
exploit this behavior.  The question of expected transit time  
requires the consideration of what is "typical" human behavior.  The  
DKIM charter appears to ask the question of expected transit times of  
messages between humans.  The norm is not interesting, but social  
behavior is predicable.


The WG may conclude the mailbox following a vacation will not be  
assured protection based upon their inadequate recommendations.  This  
would be unfortunate.  A criminal could easily take advantage of such  
poor recommendations and run phishing expeditions during typical  
vacation periods.   People, being social, often exhibit predictable  
behaviors that criminals often exploit.  Going on vacation is a  
classic example.  A person coming back from vacation finding urgent  
notices from their bank, who also learns messages do not verify after  
a few days, would be exposed to possible exploits that deliberately  
spoof such messages knowing many other valid messages will also not  
verify.


In a quote from the Cornell page:
"In Europe, vacation time often occurs in August--all of August! A  
European Union directive prescribes four weeks annual leave for all  
employees (EC 93/104 Art.7(1))."


Average Number of Vacation Days Per Year
Italy   42 days
France  37 days
Germany 35 days
Brazil  34 days
United Kingdom  28 days
Canada  26 days
Korea   25 days
Japan   25 days
U.S.13 days

Source: World Tourism Organization (WTO).


I bet a beer that there are more Swedes that have an email address  
they never or sporadically read than there are Swedes that  
regularly read mail except for
during their supposed 5-week offline.  But that's as bogus as your  
assertion, since its also based on no data.


At this point in time, until some data supports the duration of the  
typical spikes in latency due to vacations, assuming the WG decides  
to protect recipients over their vacation, the recommendations made  
in Section 5.2 in the base draft should only explain what the key  
availability duration should cover, and not indicate that 7 days is  
okay.  In my view, 7 day key availability is not adequate to protect  
emails to the recipient at the MUA.  By assuring protection at the  
MUA, DKIM can offer protection once the sender starts signing their  
messages, and the recipient obtains an email client able to verify  
DKIM signatures.  No other dependency would slow DKIM deployment and  
use.  There would be no delay induced waiting for the deployment  
results header handling, for example.



If you've got a real distribution, then that'd be interesting.  
Deriving/divining a figure of 6.26 days without that isn't usefully  
more interesting. Maybe John would like ASRG to include this as  
part of their work.


The standard deviation figure was mentioned to explain that the  
nature of the distribution of the data must be considered before  
making conclusions about what a standard deviation implies.  If the  
WG decides to protect individuals over their vacation, then the  
duration of these vacations could be assessed using statistics.   
Looking at POP polling intervals and running statistics on this  
information as a whole will overwhelm the information related to  
vacations.  Looking for periods longer than a few days of no polling  
might provide suitable information.  With the US typically taking  
short vacations, the more interesting data would also likely be found  
elsewhere.



Again, all this is an aside for us. There's no required correlation  
between x= and key life cycles. Please stop flogging that dead horse.


The x= parameter is a totally separate issue.  Where have I conflated  
the two?


-Doug


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rul

Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-19 Thread Stephen Farrell


Douglas Otis wrote:
When a large portion of a country's population goes on vacation for 5 


Exactly what portion is that? I bet a beer that there are more
Swedes that have an email address they never or sporadically
read than there are Swedes that regularly read mail except for
during their supposed 5-week offline. But that's as bogus as
your assertion, since its also based on no data.

If you've got a real distribution, then that'd be interesting.
Deriving/divining a figure of 6.26 days without that isn't
usefully more interesting. Maybe John would like ASRG to
include this as part of their work.

Again, all this is an aside for us. There's no required
correlation between x= and key life cycles. Please stop
flogging that dead horse.

S.


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Douglas Otis


On Apr 18, 2006, at 6:56 PM, Stephen Farrell wrote:


Douglas Otis wrote:
If 7 days provides for the SMTP transport, and people in Sweden  
and France want to verify messages following their 5 week  
vacation, then this would require a minimum of 42 days of key  
availability.  The suggestion for 45 days provided an additional 3  
days to assure availability following such a vacation.


Eh... That's nonsense. You may as well say that if I choose to stay  
offline for a year, then everyone has to abide by that and leave  
keys lying about until I'm back.


When a large portion of a country's population goes on vacation for 5  
weeks (or maybe all of August), as provided by local laws, 90% of the  
time they would have normal access to their email.  This would  
significantly affect the distribution of transit delays.  A message  
verified at the MUA, where keys are removed every few days, then  
expose these individuals to the fraud DKIM could have prevented, even  
when only checked at the MUA.  August may become a phishing season. : (



If you knew the distribution of transit times based on some  
reasonable sample, then I'd listen. Presumably there's a bell curve  
in there and we could argue about how many std. devs. to ask  
signers to take into account. Anything less soundly based is only  
as good as our charter, i.e. "a few days at most" so we may as well  
stick with that.


"A few days at most" is _not_ what the charter says.

"... the expected transit time of a message from originator to  
recipient, which is normally only a matter of a few days at most.


Most engineers would read this sentence differently, looking for what  
is being measured.  Normal latency is _really_ not important nor  
significant consideration for establishing a limit.


Consider a European work schedule with an 8 hour work day 5 days a  
week, where email access is obtained from a system at the work  
place.  The standard deviation for email access latency would be  
about 50 hours.  Key availability needs to accommodate the possible  
SMTP latency of 7 days + access latency where 16/48 hours may be  
predominate latency.  This latency would suggest 99% of an area under  
a Gaussian bell curve or normal distribution would be encompassed by  
adding an additional 6.26 days to that needed for SMTP latency.  The  
problem with this conclusion is that the distribution caused by a  
vacation is _not_ Gaussian.


Ostensibly non-arbitrary vacation rules don't count. The fact that  
you forgot maternity/paternity/parental leave e.g. in Bayern or  
Ireland and the fact that those durations differ and change outside  
the control of the IETF are all exceptionally good indicators that  
you're basically way off base.


Human behaviors are always outside the control of an IETF standard,  
however a protective standard should accommodate typical human  
behaviors. In some countries, a human induced latency within the MUA  
transport may commonly extend for better than a full month, where the  
mean is still 50 hours.


-Doug




___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Stephen Farrell



Lyndon Nerenberg wrote:



Real, significant, usable, numbers would be welcome. I've not seen
any.


I'll see what I can pull from the mail logs at work.  We push a couple 
of million messages a day, and exercise the AOL and Yahoo mail throttles 
on an ongoing basis.


That'd be great. Esp. if you could co-ordinate with a few others
first that see similar distributions.

Thanks,
S.

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Lyndon Nerenberg



Real, significant, usable, numbers would be welcome. I've not seen
any.


I'll see what I can pull from the mail logs at work.  We push a  
couple of million messages a day, and exercise the AOL and Yahoo mail  
throttles on an ongoing basis.


--lyndon

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Stephen Farrell



Lyndon Nerenberg wrote:

On Apr 18, 2006, at 6:56 PM, Stephen Farrell wrote:


If you knew the distribution of transit times based on some
reasonable sample, then I'd listen. Presumably there's a bell
curve in there and we could argue about how many std. devs. to
ask signers to take into account. Anything less soundly based
is only as good as our charter, i.e. "a few days at most" so
we may as well stick with that.


Factoring on normal successful deliveries misses an uncommon, 


How (un)common?

> but
important, class of messages: those delayed by temporary transport 
failures.  E.g. hardware-induced SMTP server failure, intermediate 
network outages, system- and network-admin PEBKAC, recipient mail store 
quota violations, and inbound SMTP server throttling (AOL, Yahoo).  All 
of these are out of the transacting parties control (even the quota 
case, since the receiver can't always control what gets dumped in their 
inbox).


What we need to examine are the stat's related to these delay scenarios, 
and base the lifetime on those numbers, ignoring the typical successful 
delivery case.  (My guess is that sendmail's default delivery timeout 
will heavily influence the results.)


Real, significant, usable, numbers would be welcome. I've not seen
any.

Absent such we're back at the charter text.

S.

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Lyndon Nerenberg

On Apr 18, 2006, at 6:56 PM, Stephen Farrell wrote:


If you knew the distribution of transit times based on some
reasonable sample, then I'd listen. Presumably there's a bell
curve in there and we could argue about how many std. devs. to
ask signers to take into account. Anything less soundly based
is only as good as our charter, i.e. "a few days at most" so
we may as well stick with that.


Factoring on normal successful deliveries misses an uncommon, but  
important, class of messages: those delayed by temporary transport  
failures.  E.g. hardware-induced SMTP server failure, intermediate  
network outages, system- and network-admin PEBKAC, recipient mail  
store quota violations, and inbound SMTP server throttling (AOL,  
Yahoo).  All of these are out of the transacting parties control  
(even the quota case, since the receiver can't always control what  
gets dumped in their inbox).


What we need to examine are the stat's related to these delay  
scenarios, and base the lifetime on those numbers, ignoring the  
typical successful delivery case.  (My guess is that sendmail's  
default delivery timeout will heavily influence the results.)


--lyndon
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Stephen Farrell


Doug,

Douglas Otis wrote:
If 7 days provides for the SMTP transport, and people in Sweden and 
France want to verify messages following their 5 week vacation, then 
this would require a minimum of 42 days of key availability.  The 
suggestion for 45 days provided an additional 3 days to assure 
availability following such a vacation.


Eh... That's nonsense. You may as well say that if I choose to stay
offline for a year, then everyone has to abide by that and leave
keys lying about until I'm back.

If you knew the distribution of transit times based on some
reasonable sample, then I'd listen. Presumably there's a bell
curve in there and we could argue about how many std. devs. to
ask signers to take into account. Anything less soundly based
is only as good as our charter, i.e. "a few days at most" so
we may as well stick with that.

Ostensibly non-arbitrary vacation rules don't count. The fact
that you forgot maternity/paternity/parental leave e.g. in
Bayern or Ireland and the fact that those durations differ and
change outside the control of the IETF are all exceptionally
good indicators that you're basically way off base.

The real point is that there is no required correlation
between x= and the duration for which a key is made
available (!= being available) in DNS. There are many
reasons why x= can be in the future but yet no key is
available to check a signature. Endless argument about
some subset of those is unproductive.

So, let's move on. This is a useless dead-end.

Stephen.

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Douglas Otis


On Apr 18, 2006, at 5:36 PM, Stephen Farrell wrote:

Doug,

Your response is non-responsive :-(

Douglas Otis wrote:

On Apr 18, 2006, at 4:10 PM, Stephen Farrell wrote:


Douglas Otis wrote:


The duration of the signature should cover the "expected"  
distribution of transit times for a message from the originator  
to recipient.


Sure. Can you get us the peer reviewed stats so we can remove  
those quotes from "expected"?


I certainly don't have 'em, and in the absence of such real,  
agreed-upon information I think we're just wasting time speculating.
Section 5.2 in the base draft makes an _unsupported_ speculation  
about adequate key availability.  The transit period should extend  
beyond norms for SMTP, as indicated in other places within the  
this Base and the Threat draft, when describing MUA signing and  
verification.


So you have no data to offer.


When talking about transports, such as those related to the MUA,  
transit times include SMTP delivery plus delays created by the  
typical vacation/convention/civic duties, etc.


If 7 days provides for the SMTP transport, and people in Sweden and  
France want to verify messages following their 5 week vacation, then  
this would require a minimum of 42 days of key availability.  The  
suggestion for 45 days provided an additional 3 days to assure  
availability following such a vacation.


The table below outlines minimum paid vacation mandates for full time  
workers:


 Country Vacation Time
 Argentina   14 calendar days
 Australia   No national law, but 4 weeks is standard
 Belgium 20 days, premium pay
 Bulgaria20 business days
 Canada  At least 2 weeks, determined by provincial law
 Chile   15 working days
 Czech Republic  4 weeks
 France  5 weeks
 Germany 4 weeks
 Hong Kong   7 days
 Hungary 20 work days
 Ireland 4 weeks
 Israel  14 days
 Italy   Mandated vacation, length determined by employment  
contract

 Japan   10 days paid time off (includes other leave time)
 Mexico  6 days
 Poland  18 working days
 Puerto Rico 15 days
 Saudi Arabia15 days
 Singapore   7 days
 South Africa21 consecutive days
 South Korea 10 working days
 Spain   30 calendar days
 Sweden  5 weeks
 Taiwan  7 days
 The Netherlands 4 weeks
 Turkey  12 work days
 UK  No national law, implementing EC directive (4 weeks  
annual leave)

 Ukraine 24 calendar days
 US  No national requirement.  Some public employee  
requirements.

 Venezuela   15 paid days

Source: Keller, William L., Timothy J. Darby, and American Bar  
Association.

International Labor Law Committee.
International Labor and Employment Laws. 2 vols. Washington, D.C.:  
Bureau of National Affairs, 1997, 2002 Supplements


http://www.ilr.cornell.edu/library/research/QuestionOfTheMonth/ 
archive/vacationtime.html


Concerns regarding how long a key should remain available depends  
upon what transport is being protected by the signature/key  
mechanism.  The desire was to focus upon determining the transports,  
rather than offering conservative estimates for what the transports  
may require when accessed directly by the recipient.  Too short a  
period unfortunately removes protection from some of these transports.


There are recent mails talking about "months later", those  
discussions are not, IMO, in scope and are significantly  
distracting.
Deciding whether other transports beyond SMTP might expect  
protection by DKIM message verification could be productive  
without too much distraction.


DKIM is to be used for:
1) SMTP only
   Starting at the MSA and ending at the MDA mailbox.
2) SMTP + other transports
   Starting at the originator and ending when first viewed by the  
recipient.


So we agree that "months later" is irrelevant. Good.


What is relevant is the transport being protected.  Each transport  
demands a different duration of key availability, even though in most  
cases, the key will be used within a few days.


-Doug




___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Stephen Farrell


Doug,

Your response is non-responsive :-(

Douglas Otis wrote:


On Apr 18, 2006, at 4:10 PM, Stephen Farrell wrote:


Douglas Otis wrote:


The duration of the signature should cover the "expected" 
distribution of transit times for a message from the originator to 
recipient.


Sure. Can you get us the peer reviewed stats so we can remove those 
quotes from "expected"?


I certainly don't have 'em, and in the absence of such real, 
agreed-upon information I think we're just wasting time speculating.


Section 5.2 in the base draft makes an _unsupported_ speculation about 
adequate key availability.  The transit period should extend beyond 
norms for SMTP, as indicated in other places within the this Base and 
the Threat draft, when describing MUA signing and verification.


So you have no data to offer.

There are recent mails talking about "months later", those discussions 
are not, IMO, in scope and are significantly distracting.


Deciding whether other transports beyond SMTP might expect protection by 
DKIM message verification could be productive without too much distraction.


DKIM is to be used for:

1) SMTP only
   Starting at the MSA and ending at the MDA mailbox.

2) SMTP + other transports
   Starting at the originator and ending when first viewed by the 
recipient.


So we agree that "months later" is irrelevant. Good.

Stephen.

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Douglas Otis


On Apr 18, 2006, at 4:10 PM, Stephen Farrell wrote:


Douglas Otis wrote:


The duration of the signature should cover the "expected"  
distribution of transit times for a message from the originator to  
recipient.


Sure. Can you get us the peer reviewed stats so we can remove those  
quotes from "expected"?


I certainly don't have 'em, and in the absence of such real, agreed- 
upon information I think we're just wasting time speculating.


Section 5.2 in the base draft makes an _unsupported_ speculation  
about adequate key availability.  The transit period should extend  
beyond norms for SMTP, as indicated in other places within the this  
Base and the Threat draft, when describing MUA signing and verification.



There are recent mails talking about "months later", those  
discussions are not, IMO, in scope and are significantly distracting.


Deciding whether other transports beyond SMTP might expect protection  
by DKIM message verification could be productive without too much  
distraction.


DKIM is to be used for:

1) SMTP only
   Starting at the MSA and ending at the MDA mailbox.

2) SMTP + other transports
   Starting at the originator and ending when first viewed by the  
recipient.


-Doug


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Stephen Farrell


Doug,

Douglas Otis wrote:
The duration of the signature should cover the "expected" distribution 
of transit times for a message from the originator to recipient.


Sure. Can you get us the peer reviewed stats so we can
remove those quotes from "expected"?

I certainly don't have 'em, and in the absence of such
real, agreed-upon information I think we're just wasting
time speculating.

There are recent mails talking about "months later", those
discussions are not, IMO, in scope and are significantly
distracting.

Stephen.


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Douglas Otis


On Apr 18, 2006, at 2:25 PM, Stephen Farrell wrote:


Douglas Otis wrote:

On Apr 18, 2006, at 1:35 PM, Stephen Farrell wrote:


There's been a good bit of MUA related discussion about
long time periods.

Our charter says explicitly that the following is out of
scope:

* Signatures that are intended to make long-term assertions  
beyond the

  expected transit time of a message from originator to recipient,
  which is normally only a matter of a few days at most.


The term transit however does include the IMAP and POP transport  
and the recipient may perform DKIM verifications at the MUA rather  
than elsewhere.  The difference between 7 and 45 days does not  
make this a "long term" assertion.


Seems like it does to me: "a few days at most" is pretty clear.


The duration of the signature should cover the "expected"  
distribution of transit times for a message from the originator to  
recipient.


The Threat and Base draft specifically includes the IMAP and POP MUAs  
as suitable transports using DKIM verification.


Many emails are received by their recipients over these transports  
within a few days.  A normal transit time does not describe the  
"expected" distribution of transit times however.  A good design  
should encompass a large percentage of the distribution of transit  
times.  Not all email will transit within a few days, and not all  
email is transmitted and verified exclusively by servers using SMTP.


If the goal is to provide a signature only to be verified between  
SMTP MTAs, then the Threat and Base draft need to be substantially  
changed to reflect this design constraint.  Creating a flow of about- 
to-expire messages does not offer significant protection from message  
replay abuse, which will still thrive within the current 7 day  
limit.  (Even 7 days is more than a few days.)


A statement of what is normal should not affect the consideration for  
the period of availability needed to reasonably cover the expected  
distribution of transit times over SMTP, IMAP, POP, UUCP, HTTP, etc.   
The charter criteria is clear, the signature should cover the transit  
duration from originator to recipient.  This statement does not  
appear to limit the signature availability to a few days, it only  
indicates what is normally seen for transit times.  Normal is not  
very interesting when setting limits.  A greater amount of  
information must be considered when setting such limits and why they  
call it engineering.


-Doug



___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Michael Thomas

Stephen Farrell wrote:



There's been a good bit of MUA related discussion about
long time periods.

Our charter says explicitly that the following is out of
scope:

* Signatures that are intended to make long-term assertions beyond the
  expected transit time of a message from originator to recipient,
  which is normally only a matter of a few days at most.

A good part of the discussion seems to me to fall under
this heading. So while MUA verification isn't precluded,
that bullet says that we should not spend time figuring
out what needs to happen in an MUA, or indeed anywhere,
months after signing.


Thank you.

That said, what I'd really, really, really like is a DKIM signer plugin for
Thunderbird. I've looked at the plugin for the DK verifier and have come
to the conclusion that I'm old and in the way.

  unhipply yours, Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Stephen Farrell


Doug,

Douglas Otis wrote:


On Apr 18, 2006, at 1:35 PM, Stephen Farrell wrote:



There's been a good bit of MUA related discussion about
long time periods.

Our charter says explicitly that the following is out of
scope:

* Signatures that are intended to make long-term assertions beyond the
  expected transit time of a message from originator to recipient,
  which is normally only a matter of a few days at most.


The term transit however does include the IMAP and POP transport and the 
recipient may perform DKIM verifications at the MUA rather than 
elsewhere.  The difference between 7 and 45 days does not make this a 
"long term" assertion.  


Seems like it does to me: "a few days at most" is pretty clear.

Stephen.

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Douglas Otis


On Apr 18, 2006, at 1:35 PM, Stephen Farrell wrote:



There's been a good bit of MUA related discussion about
long time periods.

Our charter says explicitly that the following is out of
scope:

* Signatures that are intended to make long-term assertions beyond the
  expected transit time of a message from originator to recipient,
  which is normally only a matter of a few days at most.


The term transit however does include the IMAP and POP transport and  
the recipient may perform DKIM verifications at the MUA rather than  
elsewhere.  The difference between 7 and 45 days does not make this a  
"long term" assertion.  The goal of DKIM offering protection for the  
"expected transit time", ensuring the message reaches the  
"recipient", remains the critical criteria which seems well within  
the charter.


-Doug

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Douglas Otis


On Apr 18, 2006, at 1:03 PM, Scott Kitterman wrote:


On 04/18/2006 15:43, Douglas Otis wrote:


Or the primary goal of offering protection for all obtainable use  
cases?


I guess we disagree about MUA level verification being obtainable.   
I actually have some e-mail accounts I only check about once or  
twice a year.  If we design for the MSA-MTA-MDA case, it should  
cover most typical MUA cases too.


When the design criteria handles the typical MUA use scenarios, it  
would also meet the needs of the MSA/MDA verification case.  Checking  
email every 6 months does not represent the typical use of email.



In the MSA-MTA-MDA case we can place an upper bound on how long  
from signing to delivery.  With the MUA case, we could spend weeks  
arguing over it to no point.


DKIM verification is still specified as taking place beyond the MDA.   
MUA verification was the reason for excluding the envelope.  The MUA  
use case has already resulted in design considerations.



MUA level verification will never have the same level of  
reliability as MTA/MDA verification for a variety of reasons, of  
which this is only one, so lets not focus on it.


The MUA verifications should not have lower reliability due to poor  
key availability recommendations.  As this is forgoing perhaps  
critical protections, there should be a reason offered besides  
verification at the MUA may take longer.  Add a statement that MUA  
verifications may take longer than verification at the MDA.



5.2  Select a private-key and corresponding selector information
,---
| A signer SHOULD NOT sign with a key that is expected to expire within
| seven days; that is, when rotating to a new key, signing should
| immediately commence with the new key and the old key SHOULD be
| retained for at least seven days before being removed from the key
| server.
'__

Here the draft has completely discounted DKIM verification at the  
MUA. : (



To ensure MUA verification remains practical and safe, the draft  
should change key availability recommendations.


: A signer SHOULD NOT sign with a key that is expected to expire within
: 45 days; that is, when rotating to a new key, signing should
: immediately commence with the new key, and the old key SHOULD be
: retained for at least 45 days before being removed from the key
: server.


Adding the expiry within the key could still retain the shorter SMTP  
acceptance constraint.


: A signer SHOULD NOT sign with a key that is expected to expire within
: 45 days; that is, when rotating to a new key, signing should
: immediately commence with the new key, and the old key SHOULD be
: retained for at least 45 days before being removed from the key
: server.  The signer may add a retirement date that represents the
: time the key was no longer used for signing.

-Doug




___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Stephen Farrell


There's been a good bit of MUA related discussion about
long time periods.

Our charter says explicitly that the following is out of
scope:

* Signatures that are intended to make long-term assertions beyond the
  expected transit time of a message from originator to recipient,
  which is normally only a matter of a few days at most.

A good part of the discussion seems to me to fall under
this heading. So while MUA verification isn't precluded,
that bullet says that we should not spend time figuring
out what needs to happen in an MUA, or indeed anywhere,
months after signing.

So let's move on.

Stephen.



___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Scott Kitterman
On 04/18/2006 15:43, Douglas Otis wrote:
> On Apr 18, 2006, at 11:33 AM, Scott Kitterman wrote:

> > I would not say that we shouldn't include DKIM protection beyond
> > SMTP, but that whatever happens after delivery shouldn't distract
> > us from the primary use case.
>
> Or the primary goal of offering protection for all obtainable use cases?
>

I guess we disagree about MUA level verification being obtainable.  I actually 
have some e-mail accounts I only check about once or twice a year.  If we 
design for the MSA-MTA-MDA case, it should cover most typical MUA cases too.  
In the MSA-MTA-MDA case we can place an upper bound on how long from signing 
to delivery.  With the MUA case, we could spend weeks arguing over it to no 
point.

MUA level verification will never have the same level of reliability as 
MTA/MDA verification for a variety of reasons, of which this is only one, so 
lets not focus on it.  If you'd like some experience with this, you can go 
play with the Thunderbird Extension for Sender Verification.

http://taubz.for.net/code/spf/

In the end, deployed experience with DKIM will tell us how long to leave keys 
in DNS.  No point in getting to worked up over it now anyway.

Scott K
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html