Re: [ietf-dkim] NEW ISSUE: SSP-02: Policy Scope //defaults

2008-02-22 Thread Frank Ellermann
Charles Lindsey wrote:

 It is evident to me that the whole idea is utterly indefensible.

+1  It's a real issue, but *doumenting* it instead of *fixing* it
with obscure scopes suffices for now.  Gateway operators need to
know it, e.g., GMaNe could educate its users in its FAQ.

In addition to the domain owners intending to introduce some kind
of strict/reject/discard/whatever *SP, they first have to educate
their users.  And maybe folks like you have to do something with
their mail2news solutions if they want SSP protection.

Later, if say NNTP introduces a variant of DKIM in addition to
pgpverify for its purposes, a document explaining NNTP-DKIM
can say what NNTP-*SP is supposed to be, if anything at all.

Based on SPF experiences:
1 - Whenever scopes were discussed on the SPF list it ended up
in 2822-ratholes.
2 - The number of popular SPF extensions (modifiers including
ways to emulate scopes with modifiers) after four years is
*zero*.  By a stretch of fantasy I can defend op=auth, but
that's all after four years.  

Let's get some KISS *SP out soon, and see what happens.  Maybe
experimental is good enough for now.  There are issues where I
am far from sure that they'll work.  But the lack of *SP scopes
isn't one of them.

 Frank

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] NEW ISSUE: SSP-02: Policy Scope //defaults

2008-02-22 Thread Douglas Otis

On Feb 22, 2008, at 5:53 AM, Frank Ellermann wrote:

 Charles Lindsey wrote:

 It is evident to me that the whole idea is utterly indefensible.

 +1  It's a real issue, but *doumenting* it instead of *fixing* it  
 with obscure scopes suffices for now.  Gateway operators need to  
 know it, e.g., GMaNe could educate its users in its FAQ.

When SSP policy applies to other transport protocols independent of  
SMTP, a prefix of ! for Not Used, - for Except, and a protocol  
wildcard of * for Any Other Protocol as in  [! | -]protocol  
would allow construction of the transport sources for DKIM messages.   
If policy scope is defined in the future, a default of s=SMTP would  
be required.

 In addition to the domain owners intending to introduce some kind of  
 strict/reject/discard/whatever *SP, they first have to educate their  
 users.  And maybe folks like you have to do something with their  
 mail2news solutions if they want SSP protection.

Agreed.  However, the s=SMTP (default) would indicate the domain  
does not sign NNTP messages.  A domain that does sign NNTP to avoid  
mail2news problems, could indicate this by asserting s=SMTP:NNTP.

 Later, if say NNTP introduces a variant of DKIM in addition to  
 pgpverify for its purposes, a document explaining NNTP-DKIM can  
 say what NNTP-*SP is supposed to be, if anything at all.

Using separate policy records would be an option, however, this would  
impose greater overhead.  By stating that today's DKIM policy records  
pertain to governing SMTP related infrastructure, this would clarify  
the scope of this record at least.

 Let's get some KISS *SP out soon, and see what happens.  Maybe  
 experimental is good enough for now.  There are issues where I am  
 far from sure that they'll work.  But the lack of *SP scopes isn't  
 one of them.

Agreed, but a concern still remains with respect to truncating the  
discovery processes.  This becomes especially important as perhaps  
dozens of message protocols attempt to introduce their policies in the  
same fashion.  As more organizations attempt to unite this protocol  
babble, curbing undesired key/policy discovery transactions walking up  
domains not supporting the protocol is likely to only grow in  
importance.

Despite the lack of adoption of various modifiers used by SPF,  
providing a foundation for policy scope within the DKIM policy  
records, with a default of s=SMTP would provide a framework for  
future adoption.  Macro expansion features and Exist mechanisms of  
SPF, due to inherent dangers, where strongly argued against.  Removing  
these seldom unused features today from SPF parsing routines would  
help keep the Internet a much safer place.  However, not having a  
general means to truncate policy discoveries related to security  
enhancements of various communication schemes will be placing DNS at  
greater risk again.

To that end, declare the scope of the DKIM policy record is limited to  
SMTP infrastructure, and that publishing DKIM policy necessitate a  
proof of protocol use.  In the case of SMTP, this could be  
publishing the MX record.  Required proof of use protects domains  
that do not support SMTP from being inundated with a flurry of  
undesired transactions that only result in an uncertain status for  
the abusive message inducing undesired traffic.  Disavowing use of a  
protocol refutes abusive messages to a greater degree than attempting  
to validate message signatures and applying the all or repudiate- 
able policy assertions.

-Doug 
  
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] NEW ISSUE: SSP-02: Policy Scope // defaults

2008-02-21 Thread Douglas Otis

On Feb 21, 2008, at 4:01 AM, Charles Lindsey wrote:

 On Wed, 20 Feb 2008 18:30:53 -, Douglas Otis [EMAIL PROTECTED] 
 abuse.org
 wrote:

 And after all that waffle, you still have not answered the question.  
 Are you proposing the default is s=* or are you proposing the  
 default s=SMTP (since your message seemed to be proposing both).

The change in defaults was to meet your requested default.  From your  
comments, it would seem you view the policy scope statement  
differently from what was intended.  The view that SSP policy records  
only pertain to SMTP related infrastructure, which includes messages  
introduced into this infrastructure, would also be acceptable (When  
disavow can be confirmed of course).  There are other message  
transports able to operate independently from SMTP and yet utilize  
DKIM.  It would help reduce DNS overhead combining DKIM policy records  
for various independent protocols into a single record, while also  
limiting exposure to abuse otherwise sent over disavowed transports.

Policy scope would permit fully independent protocols a means to  
assert both protocol support and the application of DKIM policy  
against the protocol.  This scope statement could thereby block  
possible vectors of abuse.  The policy scope would provide an  
incentive for domains not implementing DKIM to assert a policy scope  
just to disavow use of a protocol at an existing domain to mitigate  
traffic that distributed spoofing might otherwise create.

The scope parameter offers three states:

1) Status Quo,

2) DKIM policy Applies to the specific transport protocol carrying the  
message,

3) Transport Protocol Disavowed.

In the case of another protocols bridged into SMTP, the policy defined  
for SMTP would apply.  The policy scope does not refer to transports  
being bridged into SMTP, expect at the bridge when the transport  
itself has been disavowed.

 But as for publishers of SSP records, the stricter the policy they  
 declare, the more careful they must be that users of their domain,  
 are not able to bypass the signing mechanism by using strange  
 protocols/whatever.  How they do that is their problem. So if they  
 publish s=* (or if that is the default), then they are saying that  
 if anything arrives looking like an RFC 2822 message from our  
 dopmain, but unsigned, then you should reject/discard/suspect/ 
 whatever it.

Agreed.  But requiring an explicit restriction would minimize the  
number of domains astonished by the impact of the policy.  When too  
many make a mistake using the default, then the default assertion has  
little meaning.  As such, in the long run, it would be safer to  
require restrictions for other protocols be expressed explicitly.

 But if they publish s=SMTP and something leaves their domain via  
 UUCP/NNTP/whatever-else, then they are saying it is OK not to be  
 signed.

When messages enter into infrastructure supporting messages normally  
carried by SMTP, then the policy defined for SMTP should be used.   
This may block messages from other transports integrated into SMTP  
related infrastructure.  When NTTP messages never touch SMTP  
infrastructure, and the policy scope is s=SMTP, then NTTP messages are  
excluded from assertions of being signed.  This default would create  
less astonishment, and not affect NTTP messages that are handled  
separately from those related to SMTP.

  But then it it gets gatewayed back into SMTP, verifiers may not be  
 able to tell that it was not SMTP originally, and so will still  
 reject/discard/suspect/whatever it.

Yes.  When a message is carried over SMTP, there is nothing  
differentiating the messages from the perspective of the recipient.

When the recipient uses a different client for different transports,  
or when messages carried over different transports are delivered to a  
different location, then explicitly indicating whether messages for a  
particular transport are all signed would be highly beneficial.

 Or if you intend that the s=SMTP is to be evaluated according to  
 the protocol by which it was received by the verifier, then it will  
 still be rejected/whatever, even though it legitimately left the  
 original domain unsigned via UUCP/NNTP;

When the domain also signs all messages carried by NNTP, then the  
policy scope could be s=SMTP:NTTP dkim=all.  When it does not, then  
s=SMTP dkim=all would accurately reflect that situation.  When scope  
is introduced after SSP is initially published, the scope default will  
need to be s=SMTP.

 is the gateway supposed not to have gatewayed it in that situation.  
 All you have created then is a glorious opportunity for everyone to  
 blame everyone else for preventing the mail from being delivered.

When protocol bridging is done internal to the administrative domain,  
then Authentication-Results headers with the parameter Transport=  
added could allow each message type to be handled properly and perhaps  
delivered to a 

Re: [ietf-dkim] NEW ISSUE: SSP-02: Policy Scope

2008-02-20 Thread Charles Lindsey
On Fri, 15 Feb 2008 19:27:29 -, Douglas Otis [EMAIL PROTECTED]  
wrote:

 On Feb 15, 2008, at 4:50 AM, Charles Lindsey wrote:

 On Thu, 14 Feb 2008 19:08:41 -, Douglas Otis [EMAIL PROTECTED]  
 wrote:

 s= Policy Scope (plain-text; OPTIONAL; default is SMTP).  A colon-

 No! The default must be '*'.

 The concern regarding defaults was addressed in Take #3.  This version  
 includes a means to exclude policy.

And indeed Take #3 starts:

s= Policy Scope (plain-text; OPTIONAL; default is *).

so it seems my point is accepted.

 *  matches against all unlisted transport protocols
 !  disavows protocol use
 -  excludes protocol from policy assertions

 I suspect the default should be s=SMTP where this would be the same as  
 s=SMTP:-*.  When the domain exchanges no communication whatsoever,  
 s=!* could be used.  When only SMTP messages are used, then  
 s=SMTP:!* would make this assertion.

But now you are contradicting yourself. First you say 'default is *';  
now you are saying 'I suspect the default should be s=SMTP'. Which is it?


 But you have to make it clear that verifiers can only discern the  
 protocol used by the originating site by carefull examination of  
 Received headers (and believable ones at that). So I am still very  
 dubious about adding this feature.


 Trace headers can not be included within DKIM signatures.

Then in that case the whole idea of a protocol parameter in SSP falls flat  
on its face. Because there is no other method, apart from Received  
headers, for telling what was the original protocol used in sending the  
message, and we all know how easy Received headers are to spoof.

So we are back to what Hector is saying. SSP MUST be applicable to any  
message in RFC 2822 format, or any format similar to that (which clearly  
includes News). Because other formats are regularly gated _into_ SMTP  
(often with the removal of headers such as Newsgroups and Path which might  
have indicated their origin). So sites that publish  
strict/discardable/whatever policies will just have to be careful.

-- 
Charles H. Lindsey -At Home, doing my own thing
Tel: +44 161 436 6131   
   Web: http://www.cs.man.ac.uk/~chl
Email:[EMAIL PROTECTED]: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9  Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] NEW ISSUE: SSP-02: Policy Scope

2008-02-20 Thread Douglas Otis

On Feb 20, 2008, at 3:41 AM, Charles Lindsey wrote:

 On Fri, 15 Feb 2008 19:27:29 -, Douglas Otis [EMAIL PROTECTED] 
 abuse.org
 wrote:

 On Feb 15, 2008, at 4:50 AM, Charles Lindsey wrote:

 On Thu, 14 Feb 2008 19:08:41 -, Douglas Otis [EMAIL PROTECTED] 
 
 wrote:

 s= Policy Scope (plain-text; OPTIONAL; default is SMTP).  A  
 colon-

 No! The default must be '*'.

 The concern regarding defaults was addressed in Take #3.  This  
 version includes a means to exclude policy.

 And indeed Take #3 starts:

 s= Policy Scope (plain-text; OPTIONAL; default is *).

 so it seems my point is accepted.

*  matches against all unlisted transport protocols
!  disavows protocol use
-  excludes protocol from policy assertions

 I suspect the default should be s=SMTP where this would be the  
 same as s=SMTP:-*.  When the domain exchanges no communication  
 whatsoever, s=!* could be used.  When only SMTP messages are  
 used, then s=SMTP:!* would make this assertion.

 But now you are contradicting yourself. First you say 'default is  
 *';
 now you are saying 'I suspect the default should be s=SMTP'. Which  
 is it?

The policy assertion of s=*, this would mean that other protocols  
might be affected the publisher did not expect.  Rather than  
potentially blocking other protocols, an assertion of s=SMTP, as a  
default, would require publishers to proactively make explicit  
restrictions on other protocols.  From the comments on this list, it  
seems most view the policy record as being related to messages  
entering the SMTP related infrastructure.   In that respect, the SMTP  
policy would be applied anyway.  Having this policy record impact  
fully independent and separate message transports seems as though it  
should be explicit.  Having an explicit policy will also allow the  
verifier to better trust that this restriction was the intent of the  
policy.  Trust in assertion is important.

 But you have to make it clear that verifiers can only discern the  
 protocol used by the originating site by carefull examination of  
 Received headers (and believable ones at that). So I am still very  
 dubious about adding this feature.

 Trace headers can not be included within DKIM signatures.

 Then in that case the whole idea of a protocol parameter in SSP  
 falls flat on its face. Because there is no other method, apart from  
 Received headers, for telling what was the original protocol used in  
 sending the message, and we all know how easy Received headers are  
 to spoof.

Type of transport is always implied.  Messages handled primarily by  
SMTP transport, you would be absolutely right, SMTP is the only  
assumption that should be made.  DKIM can also be used by independent  
and separate message transports protocols that are completely  
unrelated to SMTP.  In that case, the transport is also implied, but  
it would not be SMTP.

 So we are back to what Hector is saying. SSP MUST be applicable to  
 any message in RFC 2822 format, or any format similar to that (which  
 clearly includes News). Because other formats are regularly gated  
 _into_ SMTP (often with the removal of headers such as Newsgroups  
 and Path which might have indicated their origin). So sites that  
 publish strict/discardable/whatever policies will just have to be  
 careful.

If this view prevails, then the *SP should be defined as being  
applicable to SMTP related messages, which includes any other  
protocols that might be delivered to the same location as those  
carried over SMTP.

-Doug

-


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] NEW ISSUE: SSP-02: Policy Scope

2008-02-15 Thread Charles Lindsey
On Thu, 14 Feb 2008 19:08:41 -, Douglas Otis [EMAIL PROTECTED]  
wrote:



On Feb 14, 2008, at 3:26 AM, Charles Lindsey wrote:

On Wed, 13 Feb 2008 22:46:10 -, Douglas Otis [EMAIL PROTECTED]  
wrote:


Agreed.  DKIM can be employed in conjunction with _many_ transport  
protocols.  While a domain may assert they sign all their SMTP  
traffic, they may not be signing other types of traffic that could  
potentially use DKIM signature headers.  How would a domain indicate  
what protocol they cover by their assertion?  It seems logical to  
restrict the _SSP policy to that of SMTP.  Other protocols can define  
where the relevant policy can be found, or they could add a protocol  
policy scope to the record.


If you want to indicate that information, then propose a new tag within  
the SSP record for the purpose. But the default should be that the SSP  
applies to all modes of transport. Otherwise the Bad Guys will just  
send mail like the following:


Received: by bar.com from foo.com by SMTP ...
Received: by foo.com from ebay.com by UUCP ...
From: [EMAIL PROTECTED]
[NO DKIM signature]


Agreed.  This issue does not appear to have been entered into the RT  
tracking, but both you and Jim have suggested this alternative  
solution.  Here is a more formalized suggestion for a tag added to the  
policy record.


s= Policy Scope (plain-text; OPTIONAL; default is SMTP).  A colon-
separated list of policy scopes specify which protocols to which
this record applies.  Verifiers for a given service type MUST
ignore this record if the appropriate type is not listed.
Currently defined service types  are as follows:


No! The default must be '*'.


*   matches all service types
!  disavows protocol use

SMTPRFC2821
NNTPRFC3977
MSRPRFC4975

This tag is intended to constrain the use of policy for various
transport protocols that may implement, should DKIM be defined by
other protocols in the future. This tag can also disavow use
of specific protocols to repudiate references to this domain.


But you have to make it clear that verifiers can only discern the protocol  
used by the originating site by carefull examination of Received headers  
(and believable ones at that). So I am still very dubious about adding  
this feature.


--
Charles H. Lindsey -At Home, doing my own thing
Tel: +44 161 436 6131   
   Web: http://www.cs.man.ac.uk/~chl

Email:[EMAIL PROTECTED]: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9  Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] NEW ISSUE: SSP-02: Policy Scope

2008-02-14 Thread Douglas Otis

The prior syntax did not seem to permit enough flexibility.

s= Policy Scope (plain-text; OPTIONAL; default is *).  A colon-
  separated list of policy scopes specify which protocols to which
  this record applies.  Verifiers for a given service type MUST
  ignore this record if the appropriate type is not listed.
  Currently defined protocol types are as follows:

  *  matches all unlisted service types
  !  disavows protocol use
  -  excludes from policy

  SMTP  RFC2821
  NNTP  RFC3977
  MSRP  RFC4975
  UUCP  RFC976

  This tag is intended to constrain the use of policy for various
  transport protocols that may implement, should DKIM be defined by
  other protocols in the future. This tag can also disavow use
  of specific protocols to repudiate references to this domain.

  As example, s=SMTP:-UUCP:!* would mean this domain only uses
  SMTP and UUCP to exchange messages, but that this policy does not
  apply to UUCP.

ABNF:

  policy-s-tag  = %x73 [FWS] = [FWS][exclude|disavow] policy-s-tag- 
type

  0*( [FWS] : [FWS] policy-s-tag-type )
  disavow = !
  exclude = -
  policy-s-tag-type   = SMTP /
NNTP /
MSRP /
 UUCP /
* /
x-policy-s-tag-type
  x-policy-s-tag-type = hyphenated-word   ; for future extension
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] NEW ISSUE: SSP-02: Policy Scope

2008-02-13 Thread Wietse Venema
Douglas Otis:
 The current assumption used when asserting DKIM policy is that this  
 policy might apply across _all_ protocols used to carry messages that  
 might contain DKIM signatures.  Either DKIM policy records need to  
 declare the scope of the protocols covered by the policy, or the label  
 used to discover a policy should employ different labels.
 
 Add:
 
 Policy assertions for _SSP records are limited to messages exchanged  
 by SMTP.  When other protocols are used to receive messages, the  
 appropriate policy should be applied upon receipt, and/or the protocol  
 should be tracked within the message.  One method for such tracking  
 could be implemented using Authenticated-Results headers.

Excuse my ignorance, but why limit DKIM (or SSP) to information
that is delivered via SMTP? They can work with any transport that
uses RFCx822 for content and that uses DNS for name resolution.

Wietse
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] NEW ISSUE: SSP-02: Policy Scope

2008-02-13 Thread Wietse Venema
Wietse Venema:
 Douglas Otis:
  The current assumption used when asserting DKIM policy is that this  
  policy might apply across _all_ protocols used to carry messages that  
  might contain DKIM signatures.  Either DKIM policy records need to  
  declare the scope of the protocols covered by the policy, or the label  
  used to discover a policy should employ different labels.
  
  Add:
  
  Policy assertions for _SSP records are limited to messages exchanged  
  by SMTP.  When other protocols are used to receive messages, the  
  appropriate policy should be applied upon receipt, and/or the protocol  
  should be tracked within the message.  One method for such tracking  
  could be implemented using Authenticated-Results headers.
 
 Excuse my ignorance, but why limit DKIM (or SSP) to information
 that is delivered via SMTP? They can work with any transport that
 uses RFCx822 for content and that uses DNS for name resolution.

-1 for the updated proposal.  Cosmetic surgery on a dead horse
won't bring it back to life.

Wietse
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] NEW ISSUE: SSP-02: Policy Scope

2008-02-13 Thread Michael Thomas

Wietse Venema wrote:

Douglas Otis:
The current assumption used when asserting DKIM policy is that this  
policy might apply across _all_ protocols used to carry messages that  
might contain DKIM signatures.  Either DKIM policy records need to  
declare the scope of the protocols covered by the policy, or the label  
used to discover a policy should employ different labels.


Add:

Policy assertions for _SSP records are limited to messages exchanged  
by SMTP.  When other protocols are used to receive messages, the  
appropriate policy should be applied upon receipt, and/or the protocol  
should be tracked within the message.  One method for such tracking  
could be implemented using Authenticated-Results headers.


Excuse my ignorance, but why limit DKIM (or SSP) to information
that is delivered via SMTP? They can work with any transport that
uses RFCx822 for content and that uses DNS for name resolution.


  What I'd like to know is how we implement the electric chair for
  violators of this prohibition.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] NEW ISSUE: SSP-02: Policy Scope

2008-02-13 Thread Douglas Otis


On Feb 13, 2008, at 1:32 PM, Wietse Venema wrote:


Douglas Otis:
The current assumption used when asserting DKIM policy is that this  
policy might apply across _all_ protocols used to carry messages  
that might contain DKIM signatures.  Either DKIM policy records  
need to declare the scope of the protocols covered by the policy,  
or the label used to discover a policy should employ different  
labels.


Add:

Policy assertions for _SSP records are limited to messages  
exchanged by SMTP.  When other protocols are used to receive  
messages, the appropriate policy should be applied upon receipt,  
and/or the protocol should be tracked within the message.  One  
method for such tracking could be implemented using Authenticated- 
Results headers.


Excuse my ignorance, but why limit DKIM (or SSP) to information that  
is delivered via SMTP? They can work with any transport that uses  
RFCx822 for content and that uses DNS for name resolution.


Agreed.  DKIM can be employed in conjunction with _many_ transport  
protocols.  While a domain may assert they sign all their SMTP  
traffic, they may not be signing other types of traffic that could  
potentially use DKIM signature headers.  How would a domain indicate  
what protocol they cover by their assertion?  It seems logical to  
restrict the _SSP policy to that of SMTP.  Other protocols can define  
where the relevant policy can be found, or they could add a protocol  
policy scope to the record.


The policy should make it clear when it applies to SMTP.  When there  
is also a mandate to publish an MX record while publishing SMTP  
policy, the the following states will have been defined:


SMTP  SMTP/DKIM
DISCOVERY POLICY
(MX)  (SSP) State

 NO NO  0 Status Quo
 YESNO  1 No Policy Defined
 NO YES 2 SMTP Disavowed (cease further transactions)
 YESYES 3 Policy Defined (SMTP/DKIM supported)

For example, when non-smtp-domain.sld.tld publishes a SMTP/DKIM  
policy without an MX record resulting in state 2, this halts a  
discovery process from making SSP record queries against sld, and  
could prevent bogus key record queries from being made against non- 
smtp-domain.sld.tld.  Being able to disavow having sent a message  
while also curbing some DNS related traffic should provide an  
incentive for domains to publish SMTP/DKIM policy record.  As  
currently defined, only state 2 offers a clear indication of a message  
being disavowed or repudiated.  This repudiation should be even  
stronger evidence than that obtained with an invalid signature.  Those  
that fail to publish MX records in conjunction with SSP policy records  
might find some verifiers consider their SMTP traffic as having been  
disavowed.  This would also be an incentive to publish.


Providing incentives for domains that don't use email to publish  
policy records ensures greater value in bothering to query for the  
record in the first place.  The juice being worth the squeeze.


-Doug
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] NEW ISSUE: SSP-02: Policy Scope

2008-02-13 Thread dhc



Michael Thomas wrote:

  What I'd like to know is how we implement the electric chair for
  violators of this prohibition.



They might be handicapped, but I really don't think we should go out of our way, 
like that, to improve their mobility...


d/
--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] NEW ISSUE: SSP-02: Policy Scope

2008-02-13 Thread Jim Fenton

Wietse Venema wrote:


Excuse my ignorance, but why limit DKIM (or SSP) to information
that is delivered via SMTP? They can work with any transport that
uses RFCx822 for content and that uses DNS for name resolution.
  


Interesting idea.  In 4871, we do have the s= tag and the DKIM Service 
Types registry.  Perhaps SSP should specify which service type(s) to 
which the record applies; for completeness we should probably have a way 
of specifying multiple (service type, policy) groups, although the only 
service type in the registry now is email.


-Jim

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] NEW ISSUE: SSP-02: Policy Scope

2008-02-13 Thread Douglas Otis


On Feb 13, 2008, at 3:33 PM, Jim Fenton wrote:


Wietse Venema wrote:


Excuse my ignorance, but why limit DKIM (or SSP) to information
that is delivered via SMTP? They can work with any transport that
uses RFCx822 for content and that uses DNS for name resolution.



Interesting idea.  In 4871, we do have the s= tag and the DKIM  
Service Types registry.  Perhaps SSP should specify which service  
type(s) to which the record applies; for completeness we should  
probably have a way of specifying multiple (service type, policy)  
groups, although the only service type in the registry now is email.


Jim,

The service type that could be noted in the key does will not work as  
there are no defined key locations.  The policy scope needs to be  
within the policy record or reflected in the label used to locate the  
record.


Depending upon the label works well, but then there might be a desire  
to signal cease and desist when there are multiple policies.   The  
cease and desist state can be generally defined as the presence of  
the policy record with the absence of the discovery record.


-Doug
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] NEW ISSUE: SSP-02: Policy Scope

2008-02-13 Thread Jim Fenton



Douglas Otis wrote:


On Feb 13, 2008, at 3:33 PM, Jim Fenton wrote:


Wietse Venema wrote:


Excuse my ignorance, but why limit DKIM (or SSP) to information
that is delivered via SMTP? They can work with any transport that
uses RFCx822 for content and that uses DNS for name resolution.



Interesting idea.  In 4871, we do have the s= tag and the DKIM 
Service Types registry.  Perhaps SSP should specify which service 
type(s) to which the record applies; for completeness we should 
probably have a way of specifying multiple (service type, policy) 
groups, although the only service type in the registry now is email.


Jim,

The service type that could be noted in the key does will not work as 
there are no defined key locations.  The policy scope needs to be 
within the policy record or reflected in the label used to locate the 
record.


I'm not depending on the key; I'm simply noting that since there is 
extensibility of DKIM signatures beyond SMTP and that it may be 
desirable to have similar extensibility of SSP.


Depending upon the label works well, but then there might be a desire 
to signal cease and desist when there are multiple policies.   The 
cease and desist state can be generally defined as the presence of 
the policy record with the absence of the discovery record.


I don't know what a discovery record is.  Why can't the practices for 
these other services be located at the same place?  It seems unlikely 
that we will ever have that many services using RFCx822 for content that 
we'll run out of record space.  Feel free to quote me widely when I'm 
wrong about that.


-Jim

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] NEW ISSUE: SSP-02: Policy Scope

2008-02-13 Thread SM

At 15:33 13-02-2008, Jim Fenton wrote:
Interesting idea.  In 4871, we do have the s= tag and the DKIM 
Service Types registry.  Perhaps SSP should specify which service 
type(s) to which the record applies; for completeness we should 
probably have a way of specifying multiple (service type, policy) 
groups, although the only service type in the registry now is email.


DKIM is also referenced in SIP.  To make room for a service type, you 
could have a record such as email._ssp._domainkey.example.com.


Regards,
-sm  


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] NEW ISSUE: SSP-02: Policy Scope

2008-02-13 Thread Douglas Otis


On Feb 13, 2008, at 3:58 PM, Jim Fenton wrote:

Douglas Otis wrote:


Jim,

The service type that could be noted in the key does will not work  
as there are no defined key locations.  The policy scope needs to  
be within the policy record or reflected in the label used to  
locate the record.


I'm not depending on the key; I'm simply noting that since there is  
extensibility of DKIM signatures beyond SMTP and that it may be  
desirable to have similar extensibility of SSP.


Understood, but this does not help much.  This does not prevent  
negatively rating unsigned messages traversing a protocol not covered  
by the DKIM policy assertion.  It may also be that new protocols will  
also introduce use of DKIM policies.  When messages are being merged  
by various protocol gateways, the correct policy should be applied at  
the point of ingress.  A restriction on the SSP record as being  
limited to SMTP may mean messages emerging from this mailing-list  
could become non-compliant with a From domain's all assertion.  This  
non-compliance might be forgiven by a mailing-lists favourable DKIM  
signature rating, and the policy would not be applied against the non- 
SMTP protocol.


Depending upon the label works well, but then there might be a  
desire to signal cease and desist when there are multiple  
policies.   The cease and desist state can be generally defined  
as the presence of the policy record with the absence of the  
discovery record.


I don't know what a discovery record is.


The discovery record is how the transmitter discovers the receiver.   
In the case of SMTP, this can be defined as being an MX record when  
policy is published.


Why can't the practices for these other services be located at the  
same place?


Domains are unlikely to apply DKIM in all possible places at once.   
Conflicting assertions may therefore result when not scoping the  
protocol coverage of the policy record.


 It seems unlikely that we will ever have that many services using  
RFCx822 for content that we'll run out of record space.


You mean space to scope protocols within the policy record?  Agreed,  
and assuming a default scope of SMTP also seems appropriate.  Using  
different labels rather than a scope parameter providers greater  
flexibility.  The protocol used to accept the message should be known  
by the verifier.  (See authenticated-results header.)



 Feel free to quote me widely when I'm wrong about that.



It might be good to scope protocols within the key as well, but  
frankly that seems less of a problem.  You can quote me as well. : )


-Doug


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html