Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-05 Thread Rolf E. Sonneveld
On 5/5/11 1:07 AM, Murray S. Kucherawy wrote:
 I think in the early days of DKIM most people assumed DKIM would become a 
 protocol where:
 * the body hash and header hash, using various header fields, certifies the 
 DKIM signature and
 * the DKIM signature certifies the body and header fields, that had been 
 used to create the DKIM signature.

 The current RFC4871bis defines a protocol where:
 * the body hash and header hash, using various header fields, certifies the 
 DKIM signature and
 * the DKIM signature doesn't say anything about the body and header fields, 
 that had been used to create the
 DKIM signature.

 Well, if there is /real/ WG consensus that 4871bis is right in this respect, 
 then so be it. But is there real
 consensus? Or is it just because of what Mike describes as The set of 
 people paying attention now are
 extremely few. Why don't we see any recent contributions from the authors 
 of RFC4871? (except for Mike
 then).
 Any WG only has the people contributing currently upon which to build 
 consensus.  We can't possibly hope to achieve something by requiring votes 
 from past contributors if they've moved on or lost interest.

 Keep in mind, too, that the document still has to go to the entire IETF and 
 then the IESG for review and evaluation before it gets published.  It will 
 get plenty of additional eyes on it to make sure we've done right.

 It seems to me there are a number of WG participants (and I'm one of them), 
 who regret the fact that
 RFC4871bis does not make the few additional steps required to achieve the 
 expectations of the early days: a
 protocol that not only provides a DKIM signature (and an important d= 
 payload) but also a protocol that
 certifies body and (some) header fields.

 I fail to see why we don't take those one or two extra steps, to make DKIM a 
 protocol with much more use
 potential.
 Suppose we do add a mechanism that allows a signer to make some assertion of 
 the validity of the content of some header field or the body of the message.  
 Won't spammers just make those assertions in an attempt to make you believe 
 something that's untrue?  I know I for one would be scared by a message that 
 says This really is a message from eBay.  Trust me! unless I have some 
 additional way to verify or trust the claim itself.

Excuse me for my poor English, I shouldn't have used the word 'certify' 
here. I'm not talking about validity of content. Were I used the word 
'certify' I mean:

if a DKIM signature verifies successfully, the consumer can be sure that 
the body of the message (or the part thereof indicated by l=) and the h= 
headers, used to construct this signature, has not been changed between 
signer and verifier, and there is a one-to-one relation between the h= 
headers and the corresponding headerlines in the header of the message, 
that leaves no room for ambiguity. And in my view neither the consumer 
nor the assessor should have to re-do the work of the verifier, to get 
the assurance, described in the previous line.

 Signer assertions can't be trusted unless you know for sure you can trust the 
 signer.  But DKIM has no way to tell you that.  So this is not something DKIM 
 can specify.

Agreed.

/rolf

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-05 Thread Rolf E. Sonneveld
On 5/5/11 1:36 AM, Michael Thomas wrote:
 On 05/04/2011 03:55 PM, Rolf E. Sonneveld wrote:

 Well, I think you both are right in reading what my concern/objection 
 against 4871bis is. And maybe you're also right in that RFC4871 
 wasn't that much different of RFC4871bis.

 I think in the early days of DKIM most people assumed DKIM would 
 become a protocol where:

 * the body hash and header hash, using various header fields,
   certifies the DKIM signature and
 * the DKIM signature certifies the body and header fields, that
   had been used to create the DKIM signature.


 Rolf,

 By certify do you mean assert that they are true/correct/something 
 along those lines?

see the message I just sent to the list.

/rolf
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-05 Thread Michael Thomas
On 05/05/2011 03:35 AM, Rolf E. Sonneveld wrote:
 Excuse me for my poor English, I shouldn't have used the word 'certify'
 here. I'm not talking about validity of content. Were I used the word
 'certify' I mean:

 if a DKIM signature verifies successfully, the consumer can be sure that
 the body of the message (or the part thereof indicated by l=) and the h=
 headers, used to construct this signature, has not been changed between
 signer and verifier, and there is a one-to-one relation between the h=
 headers and the corresponding headerlines in the header of the message,
 that leaves no room for ambiguity. And in my view neither the consumer
 nor the assessor should have to re-do the work of the verifier, to get
 the assurance, described in the previous line.


Yes, that sounds right. Excuse me because the list volume has
been so high, but what's the problem? Btw, I _think_ the phrase
appropriate here is data integrity.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Douglas Otis
On 5/3/11 4:25 PM, Murray S. Kucherawy wrote:
 Why does the output of DKIM need to include something when the
 consumer of that output already has that information?
 Because a consumer should/must not have to re-do the work of the DKIM
 verifier. Or put it differently: a consumer is just consuming the output
 of the DKIM verification process, it will rely on it (provided there's a
 trust relation between consumer and verifier), and it normally will not
 re-do the work of the DKIM verifier. It has no knowledge of DKIM rules
 (bottom up etc.). Just like a MUA has no information about how two MTA's
 exchange a mail over SMTP.
 The assertion you're making is that the consumer of an API shouldn't need to 
 maintain any context; the API will give you back all the bits of context you 
 need to continue as well as the answer you need.

 If you feed N bytes of data to a hash function, what you get back is the 
 resulting hash, not the hash and the source data or maybe the hash and N.  
 All of the context is still in the API consumer, not in the function that's 
 giving you what you want.

 If you give RSA_Verify() a signature, a public key and a hash, it gives you 
 back a 1 if they match and a 0 otherwise, not 1/0 and then some of that same 
 information you gave it.  The caller is the part of the system that knows 
 what the answer is telling you, because it understands the nature of the 
 function it called.

 So it is with DKIM: If you get back an indication from a verifier function 
 that a signature verified, then the signature covered the lowest From: field 
 that you presented to it.  You know that because that's how the interface 
 you're using was defined.

 An implementation certainly could give you back that From: field's contents 
 (and OpenDKIM does, if you ask for it), but still I don't see any reason to 
 make it mandatory.
In the process of finding the bottom of the header stack, DKIM will have 
read all headers.  DKIM must also count headers as it advances up the 
stack.  Senders signing with DKIM likely do so to better protect 
recipients and to obtain higher use rates.  While conventions regarding 
header limits may change, headers limited to one are unlikely to have 
these limits change due to security issues.  It is also likely those 
using DKIM conform with current stricter requirements and can signify 
this simply by listing them in the signature header field.  Refusing to 
validate malformed email is important to prevent DKIM results from being 
misleading.  Counting header fields is trivial compared to public key 
cryptography.  Not noticing deceptive pre-pended header fields may mean 
DKIM could cause more harm than good.   Nothing in in DKIM's API needs 
to change for DKIM to provide the desired protections being sought.

-Doug

-Doug



 I might even go so far as to say returning that From: field is dangerous 
 since it is not confirmed by anything, so DKIM (which is an authentication 
 protocol) returning data that can't be validated, even if it was signed, is 
 quite possibly asking for trouble.


 ___
 NOTE WELL: This list operates according to
 http://mipassoc.org/dkim/ietf-list-rules.html

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Douglas Otis
On 5/3/11 4:25 PM, Murray S. Kucherawy wrote:
 I might even go so far as to say returning that From: field is dangerous 
 since it is not confirmed by anything, so DKIM (which is an authentication 
 protocol) returning data that can't be validated, even if it was signed, is 
 quite possibly asking for trouble.
This is a remarkable statement.  DKIM's verification of the signing 
domain provides a basis upon which contents of the message may be 
trusted.  That trust most certainly includes the important From header 
field.  In fact, only the From header field MUST be included in the DKIM 
signature.  As such, clearly defining what constitutes the From header 
field IS important.

-Doug






___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Rolf E. Sonneveld

On 5/4/11 1:25 AM, Murray S. Kucherawy wrote:

-Original Message-
From: Rolf E. Sonneveld [mailto:r.e.sonnev...@sonnection.nl]
Sent: Tuesday, May 03, 2011 3:56 PM
To: Murray S. Kucherawy
Cc: IETF DKIM WG
Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
Identity


Why does the output of DKIM need to include something when the
consumer of that output already has that information?

Because a consumer should/must not have to re-do the work of the DKIM
verifier. Or put it differently: a consumer is just consuming the output
of the DKIM verification process, it will rely on it (provided there's a
trust relation between consumer and verifier), and it normally will not
re-do the work of the DKIM verifier. It has no knowledge of DKIM rules
(bottom up etc.). Just like a MUA has no information about how two MTA's
exchange a mail over SMTP.

The assertion you're making is that the consumer of an API shouldn't need to 
maintain any context; the API will give you back all the bits of context you 
need to continue as well as the answer you need.

If you feed N bytes of data to a hash function, what you get back is the 
resulting hash, not the hash and the source data or maybe the hash and N.  All 
of the context is still in the API consumer, not in the function that's giving 
you what you want.

If you give RSA_Verify() a signature, a public key and a hash, it gives you 
back a 1 if they match and a 0 otherwise, not 1/0 and then some of that same 
information you gave it.  The caller is the part of the system that knows what 
the answer is telling you, because it understands the nature of the function it 
called.

So it is with DKIM: If you get back an indication from a verifier function that 
a signature verified, then the signature covered the lowest From: field that 
you presented to it.  You know that because that's how the interface you're 
using was defined.


For a scenario where a caller is calling a DKIM milter which in turn 
calls an API, this is all true. But DKIM will be/is deployed in many 
more scenario's. Consider scenario's like:


   * there can be one or more hops between verifier and consumer
   * between verifier and consumer MTA's can re-order From headers,
   * or remove From headers if there is more than one of them present.
   * What if Postini and MessageLabs are going to use DKIM for inbound
 traffic for their customers and want to communicate the DKIM
 verification results to the consumers within the mail infra of
 their customers?



An implementation certainly could give you back that From: field's contents 
(and OpenDKIM does, if you ask for it), but still I don't see any reason to 
make it mandatory.

I might even go so far as to say returning that From: field is dangerous since 
it is not confirmed by anything, so DKIM (which is an authentication protocol) 
returning data that can't be validated, even if it was signed, is quite 
possibly asking for trouble.


But then DKIM is only authenticating the d= and we should no longer 
position DKIM as being 'effective in defending against the fraudulent 
use of origin addresses'.


/rolf
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Hector Santos
Rolf E. Sonneveld wrote:
 On 5/4/11 1:25 AM, Murray S. Kucherawy wrote:
 The assertion you're making is that the consumer of an API shouldn't 
 need to maintain any context; the API will give you back all the bits 
 of context you need to continue as well as the answer you need.

 ..

 So it is with DKIM: If you get back an indication from a verifier 
 function that a signature verified, then the signature covered the 
 lowest From: field that you presented to it.  You know that because 
 that's how the interface you're using was defined.
 
 For a scenario where a caller is calling a DKIM milter which in turn 
 calls an API, this is all true. But DKIM will be/is deployed in many 
 more scenario's. Consider scenario's like:
 
* there can be one or more hops between verifier and consumer
* between verifier and consumer MTA's can re-order From headers,
* or remove From headers if there is more than one of them present.
* What if Postini and MessageLabs are going to use DKIM for inbound
  traffic for their customers and want to communicate the DKIM
  verification results to the consumers within the mail infra of
  their customers?
 
 An implementation certainly could give you back that From: field's 
 contents (and OpenDKIM does, if you ask for it), but still I don't see 
 any reason to make it mandatory.

 I might even go so far as to say returning that From: field is 
 dangerous since it is not confirmed by anything, so DKIM (which is an 
 authentication protocol) returning data that can't be validated, even 
 if it was signed, is quite possibly asking for trouble.
 
 But then DKIM is only authenticating the d= and we should no longer 
 position DKIM as being 'effective in defending against the fraudulent 
 use of origin addresses'.

+1 well said.

Let me show examples of the DKIM mail integration dilemmas. My apology 
for the length of this, but I am trying to extract all the key design 
issues we are facing or will be facing with DKIM:

A fundamental flaw is to believe all backends have a RFC5322 Mail 
Store. The protocol has to provide for discovery for the software 
engineering interface points to engineer the integration and 
transformations needs.

RFC4871bis is saying there is an mandatory interfacing point for a 
trust transformation and believing that leaving the door open with 
stating the possibility of other outputs is universally obvious.

For a DKIM software engineering minimal, DKIM-BASE needs to expose the 
interface points such the ODID (or From) and the AUID which is 
explicitly stated as a MAY therefore it should also be part of the 
Outputs.  Reasonable engineers to exptract from RFC5585, RFC4686 the 
interface points for  the black box transformed outputs.

There are only four minimal elements that can be extracted based on 
all the different considerations since RFC4871 with all the related 
consensus built documents:

verification status
SDID   signer domain
AUID   agent/user identity
ODID   author domain

Everyone will need those parameters to satisfy the DKIM Service 
Architecture which includes security, policy and trust considerations.

When one actually begins to employ DKIM in a total mail systems that 
includes:

- internet hosting with SMTP, POP3, NNTP, MLM, IMAP, etc,
- how mail is stored and/or transformed, and
- online/offline MUA considerations

it become more clear of what inputs/utputs are needed for DKIM 
purposes and also the complexity of where the trust increases and 
decreases.

Example:

Remote UserA sends dkim signed mail to Local UserB and Local UserC at 
the same local mail host.

UserB likes to use the Online Mail Access (Web site, but it can be any 
other online connection device).  UserC was an online person, but he 
slowly migrated over the years to an offline RFC-based Mail 
Reader/Writer (Outlook, Eudora, Thunderbird and many others).

UserB - online user.

It should be fairly obvious that the centralized backend has rendering 
control for UserB and has all the power to provide the security, 
policy and overall trust outcomes the UserB.  During the import 
process from remote userA, depending on the backend storage method, 
the information was generated necessary for the backend to display the 
information to the UserB.   To assume the backend will do the 
verification dynamically with each message reader, while possible, 
probably not very efficient.  So the odds are good the verification 
was be done once and all the outputs will need to be stored.  Whether 
one is using a raw RFC54322 storage method or it is protocol assumed 
that is expected is not the point because in cases, the output must be 
common.  What is important to consider is that it is backend that is 
telling UserB and all online access users is that what they see 
should be trusted (at least in the header display)

UserC - Online User.

Let uses POP3.  Backends don't have control of what is display or how 
it will be 

Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread John R. Levine
 For a scenario where a caller is calling a DKIM milter which in turn calls an 
 API, this is all true. But DKIM will be/is deployed in many more scenarios.

Indeed, but you're misunderstanding the point of a standard.  The DKIM 
spec tells signers how to create a signature that recipients can verify, 
and it tells verifiers how to check whether a signature is valid.  The 
spec is not an implementation guide for every possible implementation 
scenario.

We're allowed to assume that the spec will be implemented by reasonably 
competent programmers.  I think reasonably competent includes figuring how 
to maintain or communicate the external state needed to do what you want 
to do.

Regards,
John Levine, jo...@iecc.com, Primary Perpetrator of The Internet for Dummies,
Please consider the environment before reading this e-mail. http://jl.ly
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Dave CROCKER


On 5/4/2011 1:23 AM, Rolf E. Sonneveld wrote:
 But then DKIM is only authenticating the d= and we should no longer position
 DKIM as being 'effective in defending against the fraudulent use of origin
 addresses'.


Besides your rather unusual sense of software architecture, your above 
statement 
seems to indicate a failure to attend to differences between rfc4871 and 
rfc4871bis.

Which documentation makes your above claims?

d/

-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Hector Santos
John R. Levine wrote:
 For a scenario where a caller is calling a DKIM milter which 
 in turn calls an  API, this is all true. But DKIM will be/is 
 deployed in many more scenarios.
 
 Indeed, but you're misunderstanding the point of a standard.  The DKIM 
 spec tells signers how to create a signature that recipients can verify, 
 and it tells verifiers how to check whether a signature is valid.  The 
 spec is not an implementation guide for every possible implementation 
 scenario.
 
 We're allowed to assume that the spec will be implemented by reasonably 
 competent programmers.  I think reasonably competent includes 
 figuring how to maintain or communicate the external state needed 
 to do what you want to do.

Beside the point that there are conflicts, these are all valid points 
and the issue is beyond validity or rather how DKIM-BASE goes beyond 
the validity question.

The mandatory single output for SDID attempts to mandate a specific 
receiver design implementation where the message is valid and trusted 
if they have the local or query method available for evaluating trust 
for SDID.  It is a MUST design by DKIM-BASE standards and this SDID 
trust policy design mandate is not the issue for the receiver.  We get it.

The issue is that receivers also have serious security controls, 
anti-abuse operational needs.  With the #1 market of signers being 
spammers increasing using DKIM in some silly idea that it will give 
them brownie points,  DKIM redundant abuse will not be tolerated and 
it doesn't help DKIM to live in indeterministic world where SDID is 
unknown or provides no trust results.

Reasonable competent manager, software engineers and programmers will 
look at the pretty picture called DKIM Service Architectures - we 
all like pictures - and determine very quickly what is the inputs and 
outputs.  It shows in graphically process flow iconic form what is 
required and what is optional.

The design issue is that not all outputs are not spelled out in the 
Functional Specification for DKIM. It doesn't match what RFC5595 calls 
the DKIM Service Architecture.  RFC4871bis does not reflect what 
receivers need for security controls.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Rolf E. Sonneveld
On 5/4/11 3:29 PM, Dave CROCKER wrote:


 On 5/4/2011 1:23 AM, Rolf E. Sonneveld wrote:
 But then DKIM is only authenticating the d= and we should no longer 
 position
 DKIM as being 'effective in defending against the fraudulent use of 
 origin
 addresses'.


 Besides your rather unusual sense of software architecture, 

This comment is not very constructive, especially as it lacks any 
information about /what/ it is, that is unusual.

 your above statement seems to indicate a failure to attend to 
 differences between rfc4871 and rfc4871bis.

 Which documentation makes your above claims?

Both documents refer to rfc4686, albeit only in the Informative 
References section. rfc4871 refers to rfc4686 only in section 8, 
rfc4871bis in section 8 as well as in section 1.1.

Please provide us some pointers regarding the differences between 
rfc4871 and rfc4871bis in relation to the above statement.

/rolf
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Dave CROCKER

On 5/4/2011 7:04 AM, Rolf E. Sonneveld wrote:
 Which documentation makes your above claims?

 Both documents refer to rfc4686, albeit only in the Informative References
 section. rfc4871 refers to rfc4686 only in section 8, rfc4871bis in section 8 
 as
 well as in section 1.1.

 Please provide us some pointers regarding the differences between rfc4871 and
 rfc4871bis in relation to the above statement.


The claim that rfc4871bis has the goal you claim is yours.

So you need to do the work of subtantiating it.

So far, as you acknowledge, your only reference is quite old, merely 
informative, and not a specification.  In contrast, rfc4871bis declares the 
goal 
of its specification and it's not the one you assert.

You've now had multiple people responding to this thread with various 
explanations why it is off the mark.

We should be done.

d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Hector Santos
Dave CROCKER wrote:
 On 5/4/2011 7:04 AM, Rolf E. Sonneveld wrote:
 Which documentation makes your above claims?
 Both documents refer to rfc4686, albeit only in the Informative 
 References section. rfc4871 refers to rfc4686 only in section 
 8, rfc4871bis in section 8 as  well as in section 1.1.

 Please provide us some pointers regarding the differences 
 between rfc4871 and rfc4871bis in relation to the above statement.

 The claim that rfc4871bis has the goal you claim is yours.

It showed that.  Are you suggesting security is not part of DKIM's goal?

 So you need to do the work of subtantiating it.

The proof of concept was done in the WG consensus built RFC4686 security
document.

 So far, as you acknowledge, your only reference is quite old, merely 
 informative, and not a specification.  In contrast, rfc4871bis declares 
 the goal of its specification and it's not the one you assert.

Exactly the point, it doesn't reflect current implementation needs yet
has inconsistencies where any reasonable engineers can presumed the design
is beyond what you attempting to mandate for receivers.

 You've now had multiple people responding to this thread with various 
 explanations why it is off the mark.

But there are multiple people who disagree with those explanations and 
agree Rolf is right on mark.

 We should be done.

We should of been done long ago. IETF needs to consider why you are 
having a hard time explaining away the security concerns for almost 5 
years now.

You need to rethink why reasonable compromising solutions offered 
should be ignored and rudely shunned out.  You need to consider good 
nature WG participant perspectives to help DKIM better fit receiver 
needs and considering ODID (and AUID) is compatible with the DKIM goal.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Michael Thomas
On 05/04/2011 07:08 AM, Dave CROCKER wrote:
 The claim that rfc4871bis has the goal you claim is yours.

 So you need to do the work of subtantiating it.

 So far, as you acknowledge, your only reference is quite old, merely
 informative, and not a specification.  In contrast, rfc4871bis declares the 
 goal
 of its specification and it's not the one you assert.

 You've now had multiple people responding to this thread with various
 explanations why it is off the mark.

 We should be done.



This is a good example of why this effort has come off the rails.
Going from 4871 to DS should have been a fairly straightforward
effort considering the high degree of interoperability we achieved.
Instead of just removing a few unused features, we've seen a
wholesale rewrite when one was manifestly not needed. Worse,
is that when that history is mentioned it is either disregarded
or sneered at by the senior editor. That is a problem.

This entire process needs a reset, starting with the choice of
editors. We are so far afield of what RFC 4871 was that it's impossible
to understand the implications of the subtle changes that have been
introduced. RFC 4871 worked. It did not need anywhere close to this
level of fixing.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Dave CROCKER
Michael,


On 5/4/2011 7:58 AM, Michael Thomas wrote:
 This is a good example of why this effort has come off the rails.
 Going from 4871 to DS should have been a fairly straightforward
 effort considering the high degree of interoperability we achieved.
 Instead of just removing a few unused features, we've seen a
 wholesale rewrite when one was manifestly not needed. Worse,
 is that when that history is mentioned it is either disregarded
 or sneered at by the senior editor. That is a problem.


Wholesale rewrite?  Well, that should be easy for you to document, given how 
convenient it is to point to the existing diffs.  The task when citing a 
problem 
with changes is to point to /specific/ changes that are problematic.  That 
requires some work.

In particular, please cite normative differences.

As for the particular difference between rfc4871's statement of DKIM's purpose 
and rfc4871bis' statement, you might want to review the language in the Service 
Overview and the Deployment documents.  On this issue, the working group's 
learning process has been incremental and well documented.

As for 'sneering' at history, please do cite that occurrence, too.  Please 
distinguish between citing history versus sneering at it.  Explaining the 
criteria that qualifies as 'sneering' would be helpful.

I am also surprised to discover that we have any junior editors or, for that 
matter, that editors are distinguished by seniority.

d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] 
 On Behalf Of Michael Thomas
 Sent: Wednesday, May 04, 2011 7:59 AM
 To: dcroc...@bbiw.net
 Cc: ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating
 Domain Identity
 
 Going from 4871 to DS should have been a fairly straightforward
 effort considering the high degree of interoperability we achieved.
 Instead of just removing a few unused features, we've seen a
 wholesale rewrite when one was manifestly not needed.

Has anyone other than me bothered to generate and review the complete diff?

This is a gross exaggeration of what's actually changed.


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Michael Thomas
On 05/04/2011 08:16 AM, Dave CROCKER wrote:
 Michael,


 On 5/4/2011 7:58 AM, Michael Thomas wrote:
 This is a good example of why this effort has come off the rails.
 Going from 4871 to DS should have been a fairly straightforward
 effort considering the high degree of interoperability we achieved.
 Instead of just removing a few unused features, we've seen a
 wholesale rewrite when one was manifestly not needed. Worse,
 is that when that history is mentioned it is either disregarded
 or sneered at by the senior editor. That is a problem.


 Wholesale rewrite?  Well, that should be easy for you to document, 
 given how convenient it is to point to the existing diffs.  The task 
 when citing a problem with changes is to point to /specific/ changes 
 that are problematic.  That requires some work.

 In particular, please cite normative differences.

As I've already mentioned: the notion of output is a huge NORMATIVE
change. It should have never been allowed as a piece of errata, and
continues to cause all manner of issues. 4871 was NOT BROKEN in this
respect. We have no business telling developers what the layering
relationship is between the DKIM verifier and its consumers.

 As for the particular difference between rfc4871's statement of DKIM's 
 purpose and rfc4871bis' statement, you might want to review the 
 language in the Service Overview and the Deployment documents.  On 
 this issue, the working group's learning process has been incremental 
 and well documented.

Asleep at the switch is a more accurate portrayal. By the time any of this
effort started, we had a wealth of interoperability information which 
resulted
in the non-controversial parts of the errata, and stable unchanging
implementations. The learning should be to leave well enough alone,
instead of changing things just for aesthetics and quite likely breaking
things in the process, either purposefully or inadvertently.


 As for 'sneering' at history, please do cite that occurrence, too.  
 Please distinguish between citing history versus sneering at it.  
 Explaining the criteria that qualifies as 'sneering' would be helpful.

You need look only at the piece that I quoted from. Your continuous use of
ad hominem attacks is well documented.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] 
 On Behalf Of Rolf E. Sonneveld
 Sent: Wednesday, May 04, 2011 7:04 AM
 To: dcroc...@bbiw.net
 Cc: ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
 Both documents refer to rfc4686, albeit only in the Informative
 References section. rfc4871 refers to rfc4686 only in section 8,
 rfc4871bis in section 8 as well as in section 1.1.

There are two main fallacies that appear to be behind the arguments of a few 
people here:

(1) RFC4686 is gospel.  It isn't.  Its status is Informative which means it 
doesn't bind anyone to do anything.

(2) A working group is not entitled to change its mind about something based on 
experience.  It is.

Since RFC4686 was published, some of the consensus view of how this 
does/should/might all work has shifted.  There's nothing wrong with that.

If someone wants to undertake the work of publishing an update because it's 
seen as important, there are several of us that could assist with procedure, 
though it's unlikely to be done by this working group at this point.


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Michael Thomas
On 05/04/2011 08:51 AM, Murray S. Kucherawy wrote:
 Both documents refer to rfc4686, albeit only in the Informative
 References section. rfc4871 refers to rfc4686 only in section 8,
 rfc4871bis in section 8 as well as in section 1.1.
  
 There are two main fallacies that appear to be behind the arguments of a few 
 people here:

 (1) RFC4686 is gospel.  It isn't.  Its status is Informative which means it 
 doesn't bind anyone to do anything.

 (2) A working group is not entitled to change its mind about something based 
 on experience.  It is.

 Since RFC4686 was published, some of the consensus view of how this 
 does/should/might all work has shifted.  There's nothing wrong with that.

 If someone wants to undertake the work of publishing an update because it's 
 seen as important, there are several of us that could assist with procedure, 
 though it's unlikely to be done by this working group at this point.


My sense is that what Rolf is asking at its base is that the there is
a conflict between the two documents and it's not clear why they
exist, and which should be believed. If 4686 is inconsistent, then
we should make a case for why it's wrong and document that. It
may be process-wise informational, but it served at the time as
a guiding document for the creation of 4871, and had working
group consensus at a time of extremely high scrutiny. We do not
have anywhere close to that level of scrutiny now, and as such
any changes made should be viewed with a very high level of
caution and scepticism.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Dave CROCKER


On 5/4/2011 8:18 AM, Murray S. Kucherawy wrote:
 Has anyone other than me bothered to generate and review the complete diff?


I've uploaded Murray's helpful effort to the DKIM site:

http://dkim.org/specs/rfc4871-to-bis02-diff.htm

I had assumed that the complete diff would be unreadable, which is why I 
originally put up the incremental diffs.

However in looking through the complete diff, I'm surprised to discover that it 
is quite easy to see and evaluate all of the changes.

We really ought to stop responding to criticisms that provide no 
substantiation. 
  For criticism to be constructive, it needs to contain meaningful substance.

Complaining is easy; substantiating criticism takes effort.

d/

-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Murray S. Kucherawy
 -Original Message-
 From: Michael Thomas [mailto:m...@mtcc.com]
 Sent: Wednesday, May 04, 2011 9:03 AM
 To: Murray S. Kucherawy
 Cc: Rolf E. Sonneveld; dcroc...@bbiw.net; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
 My sense is that what Rolf is asking at its base is that the there is
 a conflict between the two documents and it's not clear why they
 exist, and which should be believed. If 4686 is inconsistent, then
 we should make a case for why it's wrong and document that. It
 may be process-wise informational, but it served at the time as
 a guiding document for the creation of 4871, and had working
 group consensus at a time of extremely high scrutiny. We do not
 have anywhere close to that level of scrutiny now, and as such
 any changes made should be viewed with a very high level of
 caution and scepticism.

My read is that Rolf is objecting to RFC4871bis on the grounds that it 
conflicts with RFC4686.  (He can and should correct me if I'm wrong.)

If his concerns would be satisfied by a change (perhaps an appendix?) that 
simply acknowledges some evolution in thinking based on experience since 
RFC4686 was published, I imagine that wouldn't meet with much resistance.

But if the point is to use RFC4686 to compel some change in something trying to 
get to DS (or even PS), that's a non-starter.


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Hector Santos
Dave CROCKER wrote:
 Michael,
 On 5/4/2011 7:58 AM, Michael Thomas wrote:
 This is a good example of why this effort has come off the rails.
 Going from 4871 to DS should have been a fairly straightforward
 effort considering the high degree of interoperability we achieved.
 Instead of just removing a few unused features, we've seen a
 wholesale rewrite when one was manifestly not needed. Worse,
 is that when that history is mentioned it is either disregarded
 or sneered at by the senior editor. That is a problem.
 
 
 Wholesale rewrite?  Well, that should be easy for you to 
 document, given how convenient it is to point to the existing diffs.  
 The task when citing a problem with changes is to point to 
 /specific/ changes that are problematic.  That requires some work.
 
 In particular, please cite normative differences.

Its absolutely amazing how the main points are just blow away. Wow!

#1 NEW - The key difference as so many others has stated is the 
MANDATORY mandate for the single output, SDID,  with a MUST design 
mandate for a futuristic single Trust Identity Assessor module.

#2 NEW - RFC4871bis introduces the AUID identity as a MAY for the 
trust module, *yet* this optional consideration is excluded from the 
RFC4871bis Output Requirements.

Incidentally, my concerns as well of many other implementors predated 
RFC4871 (2007 publication) with the drafting leading to the separation 
of policy and all policy related semantics from the base.  This was a 
major concerns cited by many including the prediction that policy will 
be not be completed as a standard.

The goal was to remove the Author Domain (ODID) from DKIM and move it 
to *purported* chartered proposed standard for policy, then called 
SSP. We completed WG consensus built requirements SSP document 
(RFC5017) and eventually ADSP (RFC5617).

In the name of protocol consistency and synergism with completed 
chartered RFC work products, it is only natural to expect the ODID 
MUST be part of the output identities for RFC4871BIS which should 
reflect all the RFC work that was done since RFC4871.  Instead we have:

#3 NEW: RFC4871BIS Output requirements that do not reflect any other 
work that as done, including this so called DKIM Service Architecture.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Dave CROCKER
Folks,


 I've uploaded Murray's helpful effort to the DKIM site:

  http://dkim.org/specs/rfc4871-to-bis02-diff.htm


apologies.  my html editor got sticky.  i guess it really liked the earlier 
diff.

The full diff that I meant to point to is:

http://dkim.org/specs/dkim-rfc4871-rfc-bis-diff.html

d/

-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Michael Thomas
On 05/04/2011 09:15 AM, Murray S. Kucherawy wrote:
 -Original Message-
 From: Michael Thomas [mailto:m...@mtcc.com]
 Sent: Wednesday, May 04, 2011 9:03 AM
 To: Murray S. Kucherawy
 Cc: Rolf E. Sonneveld; dcroc...@bbiw.net; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity

 My sense is that what Rolf is asking at its base is that the there is
 a conflict between the two documents and it's not clear why they
 exist, and which should be believed. If 4686 is inconsistent, then
 we should make a case for why it's wrong and document that. It
 may be process-wise informational, but it served at the time as
 a guiding document for the creation of 4871, and had working
 group consensus at a time of extremely high scrutiny. We do not
 have anywhere close to that level of scrutiny now, and as such
 any changes made should be viewed with a very high level of
 caution and scepticism.
  
 My read is that Rolf is objecting to RFC4871bis on the grounds that it 
 conflicts with RFC4686.  (He can and should correct me if I'm wrong.)

 If his concerns would be satisfied by a change (perhaps an appendix?) that 
 simply acknowledges some evolution in thinking based on experience since 
 RFC4686 was published, I imagine that wouldn't meet with much resistance.

 But if the point is to use RFC4686 to compel some change in something trying 
 to get to DS (or even PS), that's a non-starter.


Compel and non-starter are not helpful. Everything past publication of
4871 should be viewed in the light that fewer and fewer people were paying
attention. The set of people paying attention now are extremely few, and
many of them have self-interest in revisiting and/or changing the previous
consensus -- taking advantage of the much smaller set of participants. Not
that 4686 and 4871 are some sort of ideal residing in a platonic cave, but
they do have the virtue that they were widely reviewed and in the case of
4871, implemented. We risk screwing things up with every edit; the law
of unintended consequences isn't being given the respect it deserves.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] 
 On Behalf Of Hector Santos
 Sent: Wednesday, May 04, 2011 9:17 AM
 To: dcroc...@bbiw.net
 Cc: ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
 Its absolutely amazing how the main points are just blow away. Wow!

Can we remain professional, please?  This flare for the dramatic only drags the 
group down further into the mire (as if that's possible).

 #1 NEW - The key difference as so many others has stated is the
 MANDATORY mandate for the single output, SDID,  with a MUST design
 mandate for a futuristic single Trust Identity Assessor module.

I can't imagine any successful DKIM verifier module based on RFC4871 that 
didn't output at least the SDID and a status for the signature, for each 
signature.  Thus, saying so in RFC4871bis doesn't seem to me to be a normative 
change that breaks anything.

This is completely appropriate in another way: The SDID from a valid signature 
is the only thing that DKIM proves.

 #2 NEW - RFC4871bis introduces the AUID identity as a MAY for the
 trust module, *yet* this optional consideration is excluded from the
 RFC4871bis Output Requirements.

It's true that the AUID is not listed as mandatory output, but that section 
very clearly states that a verifier could output other stuff, including the 
AUID, to a module that wants it.  I can't imagine any DKIM verifier module 
based on RFC4871 that would thus become non-compliant when compared to 
RFC4871bis.

But the AUID is only partially proven by DKIM; the local-part, for example, 
is potentially garbage, as is the subdomain.  So it makes sense not to make it 
a mandatory output of a security protocol.

So, please read the Output Requirements again and explain to me the basis for 
this claim.

 Incidentally, my concerns as well of many other implementors predated
 RFC4871 (2007 publication) with the drafting leading to the separation
 of policy and all policy related semantics from the base.  This was a
 major concerns cited by many including the prediction that policy will
 be not be completed as a standard.

And such separation occurred.  And it was good.

 The goal was to remove the Author Domain (ODID) from DKIM and move it
 to *purported* chartered proposed standard for policy, then called
 SSP. We completed WG consensus built requirements SSP document
 (RFC5017) and eventually ADSP (RFC5617).

Right.

 In the name of protocol consistency and synergism with completed
 chartered RFC work products, it is only natural to expect the ODID
 MUST be part of the output identities for RFC4871BIS which should
 reflect all the RFC work that was done since RFC4871.

No, that's not natural.

 Instead we have:
 
 #3 NEW: RFC4871BIS Output requirements that do not reflect any other
 work that as done, including this so called DKIM Service
 Architecture.

-1.  RFC4871bis very clearly includes all the work that's been done, unless you 
have some other input that hasn't been revealed to date.

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Michael Thomas
On 05/04/2011 09:14 AM, Dave CROCKER wrote:
 I've uploaded Murray's helpful effort to the DKIM site:

  http://dkim.org/specs/rfc4871-to-bis02-diff.htm

 I had assumed that the complete diff would be unreadable, which is why I
 originally put up the incremental diffs.

 However in looking through the complete diff, I'm surprised to discover that 
 it
 is quite easy to see and evaluate all of the changes.

 We really ought to stop responding to criticisms that provide no 
 substantiation.
For criticism to be constructive, it needs to contain meaningful substance.

 Complaining is easy; substantiating criticism takes effort.


44 pages of diffs. That is not by stretch of the imagination 
inconsequential.
I count at least two new normative changes -- in informational notes of all
places -- by scanning *half* the document, both of which are wrong. And that
does not count the normative change with Output.

Thanks for reinforcing my impression that this is a process run amok.

Mike

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] 
 On Behalf Of Michael Thomas
 Sent: Wednesday, May 04, 2011 10:11 AM
 To: dcroc...@bbiw.net
 Cc: ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
 44 pages of diffs.

Updating an RFC number causes a diff.  That's not a valid metric.

 I count at least two new normative changes -- in informational notes of all
 places -- by scanning *half* the document, both of which are wrong. And that
 does not count the normative change with Output.

Where are they?

 Thanks for reinforcing my impression that this is a process run amok.

Not so fast...


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Michael Thomas
On 05/04/2011 10:13 AM, Murray S. Kucherawy wrote:
 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] 
 On Behalf Of Michael Thomas
 Sent: Wednesday, May 04, 2011 10:11 AM
 To: dcroc...@bbiw.net
 Cc: ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity

 44 pages of diffs.
  
 Updating an RFC number causes a diff.  That's not a valid metric.


These aren't updates to just the rfc number though. This document
has been changing and changing and changing up until the weeks
before last call, and through last call. It's impossible to keep up with
unless it is your full time job, which it most certainly isn't in my case --
unless you can figure out how this relates to public key substitution
attacks in android market in-app purchases.

That is why I'm so alarmed.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Murray S. Kucherawy
 -Original Message-
 From: Michael Thomas [mailto:m...@mtcc.com]
 Sent: Wednesday, May 04, 2011 10:21 AM
 To: Murray S. Kucherawy
 Cc: dcroc...@bbiw.net; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
  44 pages of diffs.
 
  Updating an RFC number causes a diff.  That's not a valid metric.
 
 These aren't updates to just the rfc number though. This document
 has been changing and changing and changing up until the weeks
 before last call, and through last call. It's impossible to keep up with
 unless it is your full time job, which it most certainly isn't in my case --
 unless you can figure out how this relates to public key substitution
 attacks in android market in-app purchases.
 
 That is why I'm so alarmed.

Ah, you deftly avoided my question:

You said:

  I count at least two new normative changes -- in informational notes of 
  all places -- by scanning
  *half* the document, both of which are wrong.

What were the two normative changes in informational notes that were wrong in 
the half of the document you scanned?

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Michael Thomas
On 05/04/2011 10:25 AM, Murray S. Kucherawy wrote:
 I count at least two new normative changes -- in informational notes 
 of all places -- by scanning
 *half* the document, both of which are wrong.
  
 What were the two normative changes in informational notes that were wrong in 
 the half of the document you scanned?


It's because I didn't want to imply that those were the only two. It's just
what I found in my quick scan. But they were the advise about ignoring
signatures with sha1, and another saying you could ignore an l= *tag*.

And that's what I found in 15 minutes.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread John R. Levine
 Has anyone other than me bothered to generate and review the complete diff?

I have.  The changes to the parts that actually describe how to create a 
signature are tiny, and well contained, e.g. updating the punycode 
definition, making sha-1 more deprecated, clarifying that unknown options 
and flags are ignored, explicitly deleting whitespace around b= when 
computing signatures, notes that all bets are off if you start with an 
invalid message.

Regards,
John Levine, jo...@iecc.com, Primary Perpetrator of The Internet for Dummies,
Please consider the environment before reading this e-mail. http://jl.ly
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Murray S. Kucherawy
 -Original Message-
 From: Michael Thomas [mailto:m...@mtcc.com]
 Sent: Wednesday, May 04, 2011 10:29 AM
 To: Murray S. Kucherawy
 Cc: dcroc...@bbiw.net; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
 It's because I didn't want to imply that those were the only two. It's just
 what I found in my quick scan. But they were the advise about ignoring
 signatures with sha1, and another saying you could ignore an l= *tag*.

I can't recall the history of the first one, other than it being consistent 
with general IETF movement away from use of SHA1.  Perhaps someone else can 
comment there.

The advice that a verifier can ignore the l= tag was in RFC4871, so copying 
it to RFC4871bis doesn't seem like a problem to me. 


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Dave CROCKER

On 5/4/2011 9:15 AM, Murray S. Kucherawy wrote:
 My read is that Rolf is objecting to RFC4871bis on the grounds that it 
 conflicts with RFC4686.  (He can and should correct me if I'm wrong.)

 If his concerns would be satisfied by a change (perhaps an appendix?) that 
 simply acknowledges some evolution in thinking based on experience since 
 RFC4686 was published, I imagine that wouldn't meet with much resistance.


My reading of the concern is specifically that the statement of DKIM's goal has 
been refined over time and that all that might be useful for the current 
document is to cite that fact and, perhaps, compare original versus current 
statements.  The appendix to do that would be very short.  It perhaps should 
cite the incremental changes across the sequence of wg documents and explain 
the 
salient meaning of the change, but in informative and not normative terms.

If there is more material at issue, what is it?

d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Michael Thomas
On 05/04/2011 10:43 AM, Murray S. Kucherawy wrote:
 -Original Message-
 From: Michael Thomas [mailto:m...@mtcc.com]
 Sent: Wednesday, May 04, 2011 10:29 AM
 To: Murray S. Kucherawy
 Cc: dcroc...@bbiw.net; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity

 It's because I didn't want to imply that those were the only two. It's just
 what I found in my quick scan. But they were the advise about ignoring
 signatures with sha1, and another saying you could ignore an l= *tag*.
  
 I can't recall the history of the first one, other than it being consistent 
 with general IETF movement away from use of SHA1.  Perhaps someone else can 
 comment there.

Saying that receivers can ignore signatures with sha1 is a serious
difference. What does that do for interoperability if followed? Nothing
good is my guess. The advise I've always heard is walk, but don't run
away from sha1. Let's be real: DKIM's crypto guarantees are already low;
sha1 is the least of its weaknesses.

 The advice that a verifier can ignore the l= tag was in RFC4871, so copying 
 it to RFC4871bis doesn't seem like a problem to me.

You can't ignore the *tag*. That's the normative change. Whether you
ignore the *output* is another matter. But of course you can't ignore
the output because l= is internal. Yet another problem.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Hector Santos
Murray S. Kucherawy wrote:

 Its absolutely amazing how the main points are just blow away. Wow!
 
 Can we remain professional, please?  This flare for the dramatic 
 only drags the group down further into the mire (as if that's possible).

My apology but please view that take like I'm giving up, You should 
read the specs correctly, Please Stop, We should be done. etc, none 
attributed anyone person, does make anyone giggle either.

 #1 NEW - The key difference as so many others has stated is the
 MANDATORY mandate for the single output, SDID,  with a MUST design
 mandate for a futuristic single Trust Identity Assessor module.
 
 I can't imagine any successful DKIM verifier module based on RFC4871 
 that didn't output at least the SDID and a status for the signature, 
 for each signature.  Thus, saying so in RFC4871bis doesn't seem to me 
 to be a normative change that breaks anything.

I don't think u read this right.  Not saying it is bad - but its the
only receiver mandate at the expense of others.  No mandate can tell 
receivers what to do.  All options need to be presented.

 This is completely appropriate in another way: The SDID from a 
 valid signature is the only thing that DKIM proves.

Ok, very good. It tells you the payoff value for SDID and its ok, to 
say its a mandatory identity receivers to look at. but its should be 
the exclusive one highlighted.

 
 #2 NEW - RFC4871bis introduces the AUID identity as a MAY for the
 trust module, *yet* this optional consideration is excluded from the
 RFC4871bis Output Requirements.
 
 It's true that the AUID is not listed as mandatory output, but that 
 section very clearly states that a verifier could output other 
 stuff, including the AUID, to a module that wants it.  

It clearly stated the obvious but not specific enough with DKIM 
related  semantics - Being Specific is Terrific!

 I can't imagine any DKIM verifier module based on RFC4871 that 
 would thus become non-compliant when compared to RFC4871bis.

I didn't make that claim.  What I said is that it hasn't learned.

 But the AUID is only partially proven by DKIM; the local-part, 
 for example, is potentially garbage, as is the subdomain.  So it 
 makes sense not to make it a mandatory output of a security protocol.

The problem here is that we are trying to dictate how to use it.  DKIM 
did it write in abstract terms and it should continue with that 
exposure.  You don't have to get into the details and that because 
AUID is still controversial, but making it available will prepare for 
the future.

Personally, I think the definition for it be the SDID domain or 
subdomain should be a MAY and to begin teaching verifiers that a 
mismatch should not invalidate the signature which is only a domain 
comparison check and not a hash bound violation issue.

 So, please read the Output Requirements again and explain to me 
 the basis for this claim.

See above.

 The goal was to remove the Author Domain (ODID) from DKIM and move it
 to *purported* chartered proposed standard for policy, then called
 SSP. We completed WG consensus built requirements SSP document
 (RFC5017) and eventually ADSP (RFC5617).
 
 Right.
 
 In the name of protocol consistency and synergism with completed
 chartered RFC work products, it is only natural to expect the ODID
 MUST be part of the output identities for RFC4871BIS which should
 reflect all the RFC work that was done since RFC4871.
 
 No, that's not natural.

Well, who's right you or me?  I think its natural engineering to be 
protocol consistent among all integrated parts.

 Instead we have:

 #3 NEW: RFC4871BIS Output requirements that do not reflect any other
 work that as done, including this so called DKIM Service
 Architecture.
 
 -1.  RFC4871bis very clearly includes all the work that's been done, 
 unless you have some other input that hasn't been revealed to date.

I stated what I believe are the four minimal extracts for DKIM output 
and mail integration:

signature verify status
SDID
AUID
ODID

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Murray S. Kucherawy
 -Original Message-
 From: Michael Thomas [mailto:m...@mtcc.com]
 Sent: Wednesday, May 04, 2011 10:54 AM
 To: Murray S. Kucherawy
 Cc: dcroc...@bbiw.net; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
  The advice that a verifier can ignore the l= tag was in RFC4871, so
  copying it to RFC4871bis doesn't seem like a problem to me.

 You can't ignore the *tag*. That's the normative change. Whether you
 ignore the *output* is another matter. But of course you can't ignore
 the output because l= is internal. Yet another problem.

But RFC4871 also said you could ignore the tag, so I don't understand the 
distinction you're making.


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Michael Thomas
On 05/04/2011 11:03 AM, Murray S. Kucherawy wrote:
 -Original Message-
 From: Michael Thomas [mailto:m...@mtcc.com]
 Sent: Wednesday, May 04, 2011 10:54 AM
 To: Murray S. Kucherawy
 Cc: dcroc...@bbiw.net; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity

  
 The advice that a verifier can ignore the l= tag was in RFC4871, so
 copying it to RFC4871bis doesn't seem like a problem to me.

 You can't ignore the *tag*. That's the normative change. Whether you
 ignore the *output* is another matter. But of course you can't ignore
 the output because l= is internal. Yet another problem.
  
 But RFC4871 also said you could ignore the tag, so I don't understand the 
 distinction you're making.

Like I said, i only looked at this for a few minutes -- 4871 is wrong or 
sloppy
here too. But my other objection still stands: with the procrustean output
as it stand right now, an upper level entity would not be able to ignore
signatures with l= because that's internal.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Hector Santos
Dave,

Sure, you can add an new appendix to justify the inconsistencies but 
it still doesn't resolve the issue of not exposing the in-scope 
parameters to satisfy the DKIM Service Architecture and all receiver 
needs related to DKIM. The mandate to impose a certain behavior is 
unrealistic and does not represent current implementations.

This may not be an interest to you, but it to others.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


Dave CROCKER wrote:
 On 5/4/2011 9:15 AM, Murray S. Kucherawy wrote:
 My read is that Rolf is objecting to RFC4871bis on the grounds that it 
 conflicts with RFC4686.  (He can and should correct me if I'm wrong.)

 If his concerns would be satisfied by a change (perhaps an appendix?) that 
 simply acknowledges some evolution in thinking based on experience since 
 RFC4686 was published, I imagine that wouldn't meet with much resistance.
 
 
 My reading of the concern is specifically that the statement of DKIM's goal 
 has 
 been refined over time and that all that might be useful for the current 
 document is to cite that fact and, perhaps, compare original versus current 
 statements.  The appendix to do that would be very short.  It perhaps should 
 cite the incremental changes across the sequence of wg documents and explain 
 the 
 salient meaning of the change, but in informative and not normative terms.
 
 If there is more material at issue, what is it?
 
 d/




___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Dave CROCKER

On 5/4/2011 9:47 AM, Michael Thomas wrote:
 The set of people paying attention now are extremely few, and many of them
 have self-interest in revisiting and/or changing the previous consensus --
 taking advantage of the much smaller set of participants.

Creative premise.  Your assertion is that folks outside the wg are not
monitoring it.

Given the continuing, intense attention to DKIM that is taking place at a
variety of vendues, such as MAAWG and some private industry groups, your
assertion does not match the experience a number of us have.


 On 5/4/2011 10:29 AM, Michael Thomas wrote:
 It's because I didn't want to imply that those were the only two. It's
 just what I found in my quick scan. But they were the advise about
 ignoring signatures with sha1, and another saying you could ignore an l=
 *tag*.

So apparently we've moved from a claim of normative changes to citation of
advice, apparently with the claim that the advice is problematic.  Perhaps I'm
not understanding, but highlighting security differences, such as opening a hole
with l= or a protection weakness by using an older algorithm is not unusual and
it's difficult to see what is wrong with reminding an receiver that their
acceptance of data are voluntary.


 And that's what I found in 15 minutes.

Does this mean that 20 minutes work is too much to expect from someone making
basic criticisms of months of wg effort?

Once again:  folks who participate seriously in an IETF working group and who
have substantive concerns have an obligation to provide the substance that
justifies the concern.  They are generally also expected to put effort into
proposing the details of a solution.

Such is the nature of constructive participation.  One can, of course, always
find creative excuses for not participating on that basis.



 On 5/4/2011 10:29 AM, Michael Thomas wrote:
 On 05/04/2011 10:25 AM, Murray S. Kucherawy wrote:
 What were the two normative changes in informational notes that were
 wrong in the half of the document you scanned?


 It's because I didn't want to imply that those were the only two.

This is quite a remarkable premise for refusing to provide concrete substance.

I'm trying to imagine how a working group could ever make progress, were this 
premise prevalent.  Don't offer substance without providing a massive tome to 
cover everything that qualifies it enough to avoid misunderstanding what hasn't 
been said...

d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Dave CROCKER


On 5/4/2011 10:13 AM, Murray S. Kucherawy wrote:
 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] 
 On Behalf Of Michael Thomas
 Sent: Wednesday, May 04, 2011 10:11 AM
 To: dcroc...@bbiw.net
 Cc: ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity

 44 pages of diffs.

 Updating an RFC number causes a diff.  That's not a valid metric.

Since the diff is a side-by-side, it's worth noting that it's only 2/3 the 
length of the full document.

But indeed it's an example of a statistic that is objectively accurate and 
functionally misleading.

Just how onerous is it to look through that diff, enough to get a sense of the 
changes?  1/2-hour?  1 Hour?  Is that onerous, when seeking to put forward 
fundamental criticisms of months of working group effort?

d/

-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Hector Santos
Hector Santos wrote:
 
 Murray wrote:
 This is completely appropriate in another way: The SDID from a valid 
 signature is the only thing that DKIM proves.
 
 Ok, very good. It tells you the payoff value for SDID and its ok, to say 
 its a mandatory identity receivers to look at. but its should be the 
 exclusive one highlighted.

Sorry, I read you wrong!  if you said:

The SDID from a valid signature is the only thing that DKIM
provides for TRUST assessment.

Then it is correct.  But it is not the only thing that DKIM proves and
trying to mandate this solve requirement on receivers is completely
inappropriate.

Now if we wish to be really truly DKIM complete:

The AUID MAY be passed to Trust Assessors as well.

The ODID MAY be used in advanced identity assessors such as
Checking Signing Practices [RFC4686, RFC5595, RFC5016, RFC5617].


-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Murray S. Kucherawy
 -Original Message-
 From: Michael Thomas [mailto:m...@mtcc.com]
 Sent: Wednesday, May 04, 2011 10:54 AM
 To: Murray S. Kucherawy
 Cc: dcroc...@bbiw.net; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
  The advice that a verifier can ignore the l= tag was in RFC4871, so
  copying it to RFC4871bis doesn't seem like a problem to me.
 
 You can't ignore the *tag*. That's the normative change. Whether you
 ignore the *output* is another matter. But of course you can't ignore
 the output because l= is internal. Yet another problem.

So the issue is that someone might read it as leave l=value out of what you 
feed to the hash versus hash it, but ignore what it's telling you?

If so, I agree, we should fix that.


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] 
 On Behalf Of Hector Santos
 Sent: Wednesday, May 04, 2011 11:31 AM
 To: ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
 Now if we wish to be really truly DKIM complete:
 
 The AUID MAY be passed to Trust Assessors as well.
 
 The ODID MAY be used in advanced identity assessors such as
 Checking Signing Practices [RFC4686, RFC5595, RFC5016, RFC5617].

It already says:

   The output MAY include other signature properties or result meta-
   data, including PERMFAILed or otherwise ignored signatures, for use
   by modules that consume those results.

Since the AUID counts as other signature properties and the RFC5322.From 
counts as result meta-data, can we finally say we're done?

(I didn't think so.)


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Hector Santos
Dave CROCKER wrote:
 On 5/4/2011 9:47 AM, Michael Thomas wrote:
 The set of people paying attention now are extremely few, and many of them
 have self-interest in revisiting and/or changing the previous consensus --
 taking advantage of the much smaller set of participants.
 
 Creative premise.  Your assertion is that folks outside the wg are not
 monitoring it.
 
 Given the continuing, intense attention to DKIM that is taking place at a
 variety of vendues, such as MAAWG and some private industry groups, your
 assertion does not match the experience a number of us have.

Then one has to submit the question:

 Is the best interest of entire IETF mail community being served
 using a MAAWG and private industry group mandate to isolate
 DKIM to single identity trust assessment?

I suggest that the best interest of the majority which include small 
to mid operations, free or commercial is not being served.  If you 
want a solution for DKIM it needs to serve all parties of all sizes 
and it must not be done at the expense of security.

To quote a CEO of one such Marketing company [1]:

  Are we on the cusp of a customer trust meltdown? I don’t know.
  But we are dealing with ‘trust’ at a different level than I’ve
  seen before. Up to now, our trust conversations have centered on
  whether we can be trusted to use customer data as they’d like it
  be used. We’ve talked about trust relative to spam, data sharing
  and the like. These breaches take trust to a much more basic 
level —
  can we be trusted to keep our customer data safe and out of the 
hands
  of criminals who might do them harm. This is all about data 
security
  — something us marketers avoid thinking about, but now must because
  it has direct brand ramifications.

and his recommendation [2]:

The framework I see for addressing this challenge is threefold:

1. Rally the industry and articulate data security/best
   practice guidelines

2. Encourage companies to apply those guidelines within
   their own environments

3. Provide a collaboration forum for companies to
   discuss common threats and share best security practices

Security can not be ignored and want to give reasons for receivers 
across the board to accept these new roles, then you must present all 
outputs to help address all DKIM related evaluations, including does 
related to security.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Dave CROCKER


On 5/4/2011 11:34 AM, Murray S. Kucherawy wrote:
 -Original Message-
 From: Michael Thomas [mailto:m...@mtcc.com]
 Sent: Wednesday, May 04, 2011 10:54 AM
 To: Murray S. Kucherawy
 Cc: dcroc...@bbiw.net; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity

 The advice that a verifier can ignore the l= tag was in RFC4871, so
 copying it to RFC4871bis doesn't seem like a problem to me.

 You can't ignore the *tag*. That's the normative change. Whether you
 ignore the *output* is another matter. But of course you can't ignore
 the output because l= is internal. Yet another problem.

 So the issue is that someone might read it as leave l=value  out of what 
 you feed to the hash versus hash it, but ignore what it's telling you?

 If so, I agree, we should fix that.


Seems like the replacement text should be something along the lines of:

  l= Body length count (plain-text unsigned decimal integer; OPTIONAL,
...
  Considerations Section 8.  To avoid this attack, signers should
  be extremely wary of using this tag, and verifiers might wish
  to ignore the tag.

To avoid this attack, signers need to be extremely wary of using this tag, and 
verifiers might choose to ignore signatures containing it.




-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Hector Santos
Missing citations for the quotes below:

[1] http://www.messagesystems.com/wordpress/?p=65
[2] http://www.messagesystems.com/wordpress/?p=69

Hector Santos wrote:
 Dave CROCKER wrote:

 Given the continuing, intense attention to DKIM that is taking place at a
 variety of vendues, such as MAAWG and some private industry groups, your
 assertion does not match the experience a number of us have.
 
 Then one has to submit the question:
 
  Is the best interest of entire IETF mail community being served
  using a MAAWG and private industry group mandate to isolate
  DKIM to single identity trust assessment?
 
 I suggest that the best interest of the majority which include small 
 to mid operations, free or commercial is not being served.  If you 
 want a solution for DKIM it needs to serve all parties of all sizes 
 and it must not be done at the expense of security.
 
 To quote a CEO of one such Marketing company [1]:
 
Are we on the cusp of a customer trust meltdown? I don’t know.
But we are dealing with ‘trust’ at a different level than I’ve
seen before. Up to now, our trust conversations have centered on
whether we can be trusted to use customer data as they’d like it
be used. We’ve talked about trust relative to spam, data sharing
and the like. These breaches take trust to a much more basic 
level — can we be trusted to keep our customer data safe and out 
of the hands of criminals who might do them harm. This is all 
about data security — something us marketers avoid thinking 
about, but now must because it has direct brand ramifications.
 
 and his recommendation [2]:
 
 The framework I see for addressing this challenge is threefold:
 
 1. Rally the industry and articulate data security/best
practice guidelines
 
 2. Encourage companies to apply those guidelines within
their own environments
 
 3. Provide a collaboration forum for companies to
discuss common threats and share best security practices
 
 Security can not be ignored and want to give reasons for receivers 
 across the board to accept these new roles, then you must present all 
 outputs to help address all DKIM related evaluations, including does 
 related to security.
 

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Murray S. Kucherawy
 -Original Message-
 From: Dave CROCKER [mailto:d...@dcrocker.net]
 Sent: Wednesday, May 04, 2011 11:54 AM
 To: Murray S. Kucherawy
 Cc: ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
  You can't ignore the *tag*. That's the normative change. Whether you
  ignore the *output* is another matter. But of course you can't ignore
  the output because l= is internal. Yet another problem.
 
  So the issue is that someone might read it as leave l=value  out
  of what you feed to the hash versus hash it, but ignore what it's
  telling you?
 
  If so, I agree, we should fix that.
 
 Seems like the replacement text should be something along the lines of:
 
   l= Body length count (plain-text unsigned decimal integer; OPTIONAL, ...
   Considerations Section 8.  To avoid this attack, signers should
   be extremely wary of using this tag, and verifiers might wish
   to ignore the tag.
 
 To avoid this attack, signers need to be extremely wary of using this tag, and
 verifiers might choose to ignore signatures containing it.

+1

As WGLC is closed, we'll have to wait for guidance from Barry about when we 
could make this change once consensus is reached.




___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Hector Santos
Murray S. Kucherawy wrote:

 Hector wrote:

 Now if we wish to be really truly DKIM complete:

 The AUID MAY be passed to Trust Assessors as well.

 The ODID MAY be used in advanced identity assessors such as
 Checking Signing Practices [RFC4686, RFC5595, RFC5016, RFC5617].
 
 It already says:
 
The output MAY include other signature properties or result meta-
data, including PERMFAILed or otherwise ignored signatures, for use
by modules that consume those results.
 
 Since the AUID counts as other signature properties and the 
 RFC5322.From counts as result meta-data, can we finally say 
 we're done?
 
 (I didn't think so.)

Professional? :)

I can't be any more:

 Being specific is terrific!

Spell it out. Its not a mystery. Its in-scope, not harmful and gives a 
receiver a better reason to consider DKIM with greater usefulness 
regarding security which no one should take for granted - even 
marketers are finally get that point.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Michael Thomas
On 05/04/2011 11:53 AM, Dave CROCKER wrote:
   Considerations Section 8.  To avoid this attack, signers should
   be extremely wary of using this tag, and verifiers might wish
   to ignore the tag.
  
 To avoid this attack, signers need to be extremely wary of using this tag, and
 verifiers might choose to ignore signatures containing it.




Verifiers must not ignore them, assessors on the other hand may.
But assessors cannot because the existence of l= is not part of
the DKIM output. This results in an inconsistency in the protocol.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Murray S. Kucherawy
 -Original Message-
 From: Michael Thomas [mailto:m...@mtcc.com]
 Sent: Wednesday, May 04, 2011 12:08 PM
 To: dcroc...@bbiw.net
 Cc: Dave CROCKER; Murray S. Kucherawy; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
 Verifiers must not ignore them, assessors on the other hand may.

Either could.  It's an implementation choice.

If the verifier wants to enable the assessor to make the call, it's free to 
export l= information.


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Dave CROCKER


On 5/4/2011 12:08 PM, Murray S. Kucherawy wrote:
 Verifiers must not ignore them, assessors on the other hand may.

 Either could.  It's an implementation choice.

 If the verifier wants to enable the assessor to make the call, it's free to
 export l= information.


Verifiers declare a signature as valid or not.

This discussion is a very nice example of the difference between protocol vs.
implementation.  The protocol says l= is valid.  However a particular
implementor might choose to declare that any l= not covering the entire message
shall result in a failed verification. The same applies for verifiers detecting
use of sha1.

They are free to do that.

d/

-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Michael Thomas
On 05/04/2011 12:08 PM, Murray S. Kucherawy wrote:
 -Original Message-
 From: Michael Thomas [mailto:m...@mtcc.com]
 Sent: Wednesday, May 04, 2011 12:08 PM
 To: dcroc...@bbiw.net
 Cc: Dave CROCKER; Murray S. Kucherawy; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity

 Verifiers must not ignore them, assessors on the other hand may.
  
 Either could.  It's an implementation choice.

 If the verifier wants to enable the assessor to make the call, it's free to 
 export l= information.


I agree that it's an implementation issue. All of this is. But choosing
a single output formally makes that a no-no for the assessor, which
is a silly outcome. And it's but one silly outcome. What of the h= values?
How does an assessor know which ones were signed? That's a layering
violation according to -bis. Silly.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Michael Thomas
On 05/04/2011 11:26 AM, Dave CROCKER wrote:
 It's because I didn't want to imply that those were the only two.

 This is quite a remarkable premise for refusing to provide concrete 
 substance.

 I'm trying to imagine how a working group could ever make progress, 
 were this premise prevalent.  Don't offer substance without providing 
 a massive tome to cover everything that qualifies it enough to avoid 
 misunderstanding what hasn't been said...


More ad-hominems. I've written a DKIM stack. The first one in fact, followed
a week or so later testing with Murray. Call it an argument from 
authority, but
I at least have some experience in what subtle and seemingly inconsequential
wording changes can do to implementations.

44 pages of diffs scares the living hell out of me.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread MH Michael Hammer (5304)
 

 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-
 boun...@mipassoc.org] On Behalf Of Dave CROCKER
 Sent: Wednesday, May 04, 2011 2:54 PM
 To: Murray S. Kucherawy
 Cc: ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating
 Domain Identity
 
 
 
 On 5/4/2011 11:34 AM, Murray S. Kucherawy wrote:
  -Original Message-
  From: Michael Thomas [mailto:m...@mtcc.com]
  Sent: Wednesday, May 04, 2011 10:54 AM
  To: Murray S. Kucherawy
  Cc: dcroc...@bbiw.net; ietf-dkim@mipassoc.org
  Subject: Re: [ietf-dkim] Output summary - proposing ODID
 Originating Domain Identity
 
  The advice that a verifier can ignore the l= tag was in RFC4871,
 so
  copying it to RFC4871bis doesn't seem like a problem to me.
 
  You can't ignore the *tag*. That's the normative change. Whether
you
  ignore the *output* is another matter. But of course you can't
 ignore
  the output because l= is internal. Yet another problem.
 
  So the issue is that someone might read it as leave l=value  out
 of what you feed to the hash versus hash it, but ignore what it's
 telling you?
 
  If so, I agree, we should fix that.
 
 
 Seems like the replacement text should be something along the lines
of:
 
   l= Body length count (plain-text unsigned decimal integer;
OPTIONAL,
 ...
   Considerations Section 8.  To avoid this attack, signers
 should
   be extremely wary of using this tag, and verifiers might
 wish
   to ignore the tag.
 
 To avoid this attack, signers need to be extremely wary of using this
 tag, and
 verifiers might choose to ignore signatures containing it.
 
 

If this is the sort of advice we are going to give then we should just
deprecate l=.

Mike

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Murray S. Kucherawy
 -Original Message-
 From: Michael Thomas [mailto:m...@mtcc.com]
 Sent: Wednesday, May 04, 2011 12:13 PM
 To: Murray S. Kucherawy
 Cc: dcroc...@bbiw.net; Dave CROCKER; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
 I agree that it's an implementation issue. All of this is. But choosing
 a single output formally makes that a no-no for the assessor, which
 is a silly outcome. And it's but one silly outcome. What of the h= values?
 How does an assessor know which ones were signed? That's a layering
 violation according to -bis. Silly.

There's no proscription against providing those details if the verifier wants 
to export them.  The document is saying there is one required output, not 
only one output; it's a minimum.  And I think it's pretty clear about that.


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Hector Santos
Murray S. Kucherawy wrote:

 I agree that it's an implementation issue. All of this is. But choosing
 a single output formally makes that a no-no for the assessor, which
 is a silly outcome. And it's but one silly outcome. What of the h= values?
 How does an assessor know which ones were signed? That's a layering
 violation according to -bis. Silly.
 
 There's no proscription against providing those details if the 
 verifier wants to export them.  The document is saying there 
 is one required output, not only one output; it's a minimum.  
 And I think it's pretty clear about that.

But its not clear on the other outputs appropriate for the receiver to 
consider.

You can have a table:

status  REQUIRED
SDIDREQUIRED, MANDATORY for Trust Identity Assessor (see 2.7)
AUIDOPTIONAL, see 3.11
ODIDOPTIONAL for Checking Signing Process (see RFC5585)

I think what 3.9 should state these minimal DKIM related output 
purpose is to get a Security and/or Trust Evaluation.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Murray S. Kucherawy
 -Original Message-
 From: Hector Santos [mailto:hsan...@isdg.net]
 Sent: Wednesday, May 04, 2011 1:49 PM
 To: Murray S. Kucherawy
 Cc: Michael Thomas; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
 But its not clear on the other outputs appropriate for the receiver to
 consider.

And who gets to define appropriate?

It's already been pointed out that we could list every current tag's value and 
a pile of other stuff to pass on to the next layer, which may or may not find 
it useful, but that would make for an extremely messy protocol.

Protocols need to be kept simple.
 

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Rolf E. Sonneveld
Just a short note. Excuse me for not responding, I've been away from my 
office for a couple of hours due to the fact that we have today Memorial 
Day, at which we remember the WW-II victims. I'm catching up reading all 
contributions...

/rolf

On 5/4/11 10:57 PM, Murray S. Kucherawy wrote:
 -Original Message-
 From: Hector Santos [mailto:hsan...@isdg.net]
 Sent: Wednesday, May 04, 2011 1:49 PM
 To: Murray S. Kucherawy
 Cc: Michael Thomas; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity

 But its not clear on the other outputs appropriate for the receiver to
 consider.
 And who gets to define appropriate?

 It's already been pointed out that we could list every current tag's value 
 and a pile of other stuff to pass on to the next layer, which may or may not 
 find it useful, but that would make for an extremely messy protocol.

 Protocols need to be kept simple.


 ___
 NOTE WELL: This list operates according to
 http://mipassoc.org/dkim/ietf-list-rules.html

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Michael Thomas
On 05/04/2011 01:57 PM, Murray S. Kucherawy wrote:
 And who gets to define appropriate?

 It's already been pointed out that we could list every current tag's value 
 and a pile of other stuff to pass on to the next layer, which may or may not 
 find it useful, but that would make for an extremely messy protocol.

 Protocols need to be kept simple.


4871 was simpler yet: it had no notion of an output. It relied on the
developer to consider what was appropriate to deliver up the food
chain.

Manifestly this is very confusing. What is the output of IKE/KINK?
Patterned after DKIM, it would be the identity in the cert/ticket. But
it is profoundly the wrong question, which is what is leading to all
of these non-sequiturs.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Dave CROCKER


On 5/4/2011 12:24 PM, Michael Thomas wrote:
 On 05/04/2011 11:26 AM, Dave CROCKER wrote:
 It's because I didn't want to imply that those were the only two.

 This is quite a remarkable premise for refusing to provide concrete
 substance.

 I'm trying to imagine how a working group could ever make progress, were
 this premise prevalent. Don't offer substance without providing a massive
 tome to cover everything that qualifies it enough to avoid misunderstanding
 what hasn't been said...


 More ad-hominems.

Oh?

Serious charge.

Please cite the specific text that qualifies as an ad hominem.

Please explain exactly what about it qualifies as an ad hominem.



 44 pages of diffs scares the living hell out of me.

What number of pages would make you merely slightly uncomfortable?  What is your
limit?  Does it matter what the nature of the changes is?


d/

ps. It's worth noting that an unfounded charge of ad hominem behavior is,
itself, an ad hominem, since it focuses attention on a particular person, as
well as libeling them...

-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Michael Thomas
On 05/04/2011 02:11 PM, Michael Thomas wrote:
 On 05/04/2011 01:57 PM, Murray S. Kucherawy wrote:

 And who gets to define appropriate?

 It's already been pointed out that we could list every current tag's value 
 and a pile of other stuff to pass on to the next layer, which may or may not 
 find it useful, but that would make for an extremely messy protocol.

 Protocols need to be kept simple.


  
 4871 was simpler yet: it had no notion of an output. It relied on the
 developer to consider what was appropriate to deliver up the food
 chain.


I should also expand that this entire situation started with Crocker
insisting that we must choose between between i= and d=
as The Output. It was a false dilemma then, and it remains
a false dilemma. And as with all false dilemmas it only causes
heat instead of light.

Mike

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Hector Santos
Murray S. Kucherawy wrote:

 Hector Wrote:
 But its not clear on the other outputs appropriate for the receiver to
 consider.
 
 And who gets to define appropriate?

Well, who gets to define Output Requirements?

I will suggest it is both appropriate and required per RFC5585, 
RFC4686, RFC5017 and RFC5617.

 It's already been pointed out that we could list every 
 current tag's value and a pile of other stuff to pass on 
 to the next layer, which may or may not find it useful, 
 but that would make for an extremely messy protocol.

But that is not being requested.  You need to extract all the primary 
consideration that were discussed, developed, implemented over the 
years.  We have four RFCs, actually seven RFCs thats relates to DKIM

  rfc4686  Analysis of Threats Motivating DKIM
  rfc5016  Requirements for a DKIM Signing Practices Protocol
  rfc5518  Vouch By Reference
  rfc5585  DKIM Service Architecture
  rfc5617  DKIM Author Domain Signing Practices (ADSP)
  rfc5863  DKIM Development, Deployment, and Operations
  rfc5965  An Extensible Format for Email Feedback Reports

But in my opinion RFC5585 is the key document because, well, it has 
pretty pictures! :)   Ideally, you should list all of the above in 
section 1.1, but that is not being request - just the minimal extracts 
for receiver security and trust evaluations.

 Protocols need to be kept simple.

 and secured and useful without losing your hair extracting this 
information for all receivers to consider.


-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Dave CROCKER


On 5/4/2011 2:29 PM, Michael Thomas wrote:
 I should also expand that this entire situation started with Crocker
 insisting that we must choose between between i= and d=
 as The Output. It was a false dilemma then, and it remains
 a false dilemma. And as with all false dilemmas it only causes
 heat instead of light.


Right.  It was all me.  Another ad hominem.  Nice.

But then I suppose the question is why you should have included that 
explansion.

Anyhow, its bad there wasn't any working group consensus on the changes.  I 
guess that means that the published, normative Update RFC was a violation of 
IETF principles and process.

d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Michael Thomas
On 05/04/2011 02:32 PM, Dave CROCKER wrote:

 On 5/4/2011 2:29 PM, Michael Thomas wrote:

 I should also expand that this entire situation started with Crocker
 insisting that we must choose between between i= and d=
 as The Output. It was a false dilemma then, and it remains
 a false dilemma. And as with all false dilemmas it only causes
 heat instead of light.
  

 Right.  It was all me.  Another ad hominem.  Nice.


History is a personal attack? Who knew?

 But then I suppose the question is why you should have included that 
 explansion.

 Anyhow, its bad there wasn't any working group consensus on the changes.  I
 guess that means that the published, normative Update RFC was a violation of
 IETF principles and process.


One of the principles of DS is to remove things which aren't
implemented or serve no purpose. I think it's quite fitting to
ask that DS remove something that was added after the fact
in an errata update and has proved to be problematic. Does
the implementation report say who has implemented this
MUST? If not, why not? Could it be that it's untestable?

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Dave CROCKER


On 5/4/2011 2:47 PM, Michael Thomas wrote:
 On 05/04/2011 02:32 PM, Dave CROCKER wrote:

 On 5/4/2011 2:29 PM, Michael Thomas wrote:
 I should also expand that this entire situation started with Crocker
...
 Right. It was all me. Another ad hominem. Nice.

 History is a personal attack? Who knew?


Ahh.

Before using a term -- especially one with social and legal import -- it's 
worth 
doing the work of understanding what the term means.

As usual, wikipedia is a reasonable reference:

http://en.wikipedia.org/wiki/Ad_hominem


d/

-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Rolf E. Sonneveld
On 5/4/11 11:32 PM, Dave CROCKER wrote:

 On 5/4/2011 2:29 PM, Michael Thomas wrote:
 I should also expand that this entire situation started with Crocker
 insisting that we must choose between between i= and d=
 as The Output. It was a false dilemma then, and it remains
 a false dilemma. And as with all false dilemmas it only causes
 heat instead of light.

 Right.  It was all me.  Another ad hominem.  Nice.

No, it wasn't Dave. Mea Culpa. I had an off-list discussion with Murray 
which resulted in 
http://www.mail-archive.com/ietf-dkim@mipassoc.org/msg15901.html.

/rolf

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Michael Thomas
On 05/04/2011 02:53 PM, Dave CROCKER wrote:


 On 5/4/2011 2:47 PM, Michael Thomas wrote:
 On 05/04/2011 02:32 PM, Dave CROCKER wrote:

 On 5/4/2011 2:29 PM, Michael Thomas wrote:
 I should also expand that this entire situation started with Crocker
 ...
 Right. It was all me. Another ad hominem. Nice.

 History is a personal attack? Who knew?


 Ahh.

 Before using a term -- especially one with social and legal import -- 
 it's worth doing the work of understanding what the term means.

 As usual, wikipedia is a reasonable reference:

 http://en.wikipedia.org/wiki/Ad_hominem

Golly, Dave. I'm trying to figure out how history qualifies as ad hominem.
Maybe it's the guilt by association section that has you all riled up? I'd
think that you'd be proud that it was your idea. I'm all confused now.

Mike

PS: I remember very clearly at the interop at Alt-N when you brought this
   all up.
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Rolf E. Sonneveld

On 5/4/11 7:48 PM, Dave CROCKER wrote:


On 5/4/2011 9:15 AM, Murray S. Kucherawy wrote:
My read is that Rolf is objecting to RFC4871bis on the grounds that 
it conflicts with RFC4686.  (He can and should correct me if I'm wrong.)


If his concerns would be satisfied by a change (perhaps an appendix?) 
that simply acknowledges some evolution in thinking based on 
experience since RFC4686 was published, I imagine that wouldn't meet 
with much resistance.



My reading of the concern is specifically that the statement of DKIM's 
goal has been refined over time and that all that might be useful for 
the current document is to cite that fact and, perhaps, compare 
original versus current statements.  The appendix to do that would be 
very short.  It perhaps should cite the incremental changes across the 
sequence of wg documents and explain the salient meaning of the 
change, but in informative and not normative terms.


If there is more material at issue, what is it?


Well, I think you both are right in reading what my concern/objection 
against 4871bis is. And maybe you're also right in that RFC4871 wasn't 
that much different of RFC4871bis.


I think in the early days of DKIM most people assumed DKIM would become 
a protocol where:


   * the body hash and header hash, using various header fields,
 certifies the DKIM signature and
   * the DKIM signature certifies the body and header fields, that had
 been used to create the DKIM signature.


The current RFC4871bis defines a protocol where:

   * the body hash and header hash, using various header fields,
 certifies the DKIM signature and
   * the DKIM signature doesn't say anything about the body and header
 fields, that had been used to create the DKIM signature.


Well, if there is /real/ WG consensus that 4871bis is right in this 
respect, then so be it. But is there real consensus? Or is it just 
because of what Mike describes as The set of people paying attention 
now are extremely few. Why don't we see any recent contributions from 
the authors of RFC4871? (except for Mike then).


It seems to me there are a number of WG participants (and I'm one of 
them), who regret the fact that RFC4871bis does not make the few 
additional steps required to achieve the expectations of the early days: 
a protocol that not only provides a DKIM signature (and an important d= 
payload) but also a protocol that certifies body and (some) header fields.


I fail to see why we don't take those one or two extra steps, to make 
DKIM a protocol with much more use potential.


/rolf

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Murray S. Kucherawy
 I think in the early days of DKIM most people assumed DKIM would become a 
 protocol where:
 * the body hash and header hash, using various header fields, certifies the 
 DKIM signature and
 * the DKIM signature certifies the body and header fields, that had been used 
 to create the DKIM signature.
 
 The current RFC4871bis defines a protocol where:
 * the body hash and header hash, using various header fields, certifies the 
 DKIM signature and
 * the DKIM signature doesn't say anything about the body and header fields, 
 that had been used to create the
 DKIM signature.
 
 Well, if there is /real/ WG consensus that 4871bis is right in this respect, 
 then so be it. But is there real
 consensus? Or is it just because of what Mike describes as The set of people 
 paying attention now are
 extremely few. Why don't we see any recent contributions from the authors of 
 RFC4871? (except for Mike
 then).

Any WG only has the people contributing currently upon which to build 
consensus.  We can't possibly hope to achieve something by requiring votes from 
past contributors if they've moved on or lost interest.

Keep in mind, too, that the document still has to go to the entire IETF and 
then the IESG for review and evaluation before it gets published.  It will get 
plenty of additional eyes on it to make sure we've done right.

 It seems to me there are a number of WG participants (and I'm one of them), 
 who regret the fact that
 RFC4871bis does not make the few additional steps required to achieve the 
 expectations of the early days: a
 protocol that not only provides a DKIM signature (and an important d= 
 payload) but also a protocol that
 certifies body and (some) header fields.
 
 I fail to see why we don't take those one or two extra steps, to make DKIM a 
 protocol with much more use
 potential.

Suppose we do add a mechanism that allows a signer to make some assertion of 
the validity of the content of some header field or the body of the message.  
Won't spammers just make those assertions in an attempt to make you believe 
something that's untrue?  I know I for one would be scared by a message that 
says This really is a message from eBay.  Trust me! unless I have some 
additional way to verify or trust the claim itself.

Signer assertions can't be trusted unless you know for sure you can trust the 
signer.  But DKIM has no way to tell you that.  So this is not something DKIM 
can specify.

Thus, I believe we had this debate at length and came to the conclusion that 
this creates more of a security problem than it solves.  Any trust in the 
validity of the content of a field or the body can certainly be made, but DKIM 
itself can't do it.  So we're back to protocol vs. implementation, and we can't 
do this in the base protocol, but maybe some higher layer or a later protocol 
extension could do it.  I'd be happy to work on specifying or conducting some 
experiments if someone has an idea about it; in fact, OpenDKIM already has the 
hooks needed to do so.

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Michael Thomas
On 05/04/2011 03:55 PM, Rolf E. Sonneveld wrote:

 Well, I think you both are right in reading what my concern/objection 
 against 4871bis is. And maybe you're also right in that RFC4871 wasn't 
 that much different of RFC4871bis.

 I think in the early days of DKIM most people assumed DKIM would 
 become a protocol where:

 * the body hash and header hash, using various header fields,
   certifies the DKIM signature and
 * the DKIM signature certifies the body and header fields, that
   had been used to create the DKIM signature.


Rolf,

By certify do you mean assert that they are true/correct/something 
along those lines?
DKIM doesn't make such assertions because there's no way absent a good 
deal more
infrastructure that a receiver should believe such an assertion. The 
addition of
ADSP adds one mechanism that allows a very narrow assertion about From to
the author domain be believable, but we certainly do not have anything 
beyond
that. If there was some verbiage in the security analysis, it is likely 
because
the precise delineation of signing protocol (DKIM) and policy protocol 
(ADSP)
was was not completely gelled at the time -- 4686 was put together mainly to
get past some process hurdles (imo) to form the wg, so it's pretty 
early. But
even then there was no intent to certify other header fields other 
than From.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Dave CROCKER


On 5/4/2011 3:04 PM, Michael Thomas wrote:
 On 5/4/2011 2:29 PM, Michael Thomas wrote:
 I should also expand that this entire situation started with Crocker
 ...
 Right. It was all me. Another ad hominem. Nice.
...
 As usual, wikipedia is a reasonable reference:

 http://en.wikipedia.org/wiki/Ad_hominem

 Golly, Dave. I'm trying to figure out how history qualifies as ad hominem.


Started with Crocker points to the person.  Simply and directly.

Further, you are using the reference as part of a claim that there is a problem 
with a working group decision.

Hence you are attempting to pursue a criticism of that previous working group 
decision by asserting that it is somehow relevant to note and emphasize who it 
was that possibly initiated discussion.

I really do encourage you to read the definition of ad hominem in wikipedia.


 Maybe it's the guilt by association section that has you all riled up?

That you think it relevant who proposed an idea and that you think it might 
somehow create guilt is all the essence of ad hominem behavior, all of which 
repeatedly go very, very far beyond permissible IETF participation behavior.


And now that I've supplied an exemplar for explaining and justifying a claim of 
ad hominem, please note that you have not yet provided your own justification 
for the claim that you put forward.

Will that be forthcoming anytime soon?

d/

-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Michael Thomas
On 05/04/2011 04:40 PM, Dave CROCKER wrote:
[]

I'll do Barry the favor of stopping this inane conversation, much
as it amuses me.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-04 Thread Dave CROCKER


On 5/4/2011 4:54 PM, Michael Thomas wrote:
 On 05/04/2011 04:40 PM, Dave CROCKER wrote:
 I'll do Barry the favor of stopping this inane conversation, much
 as it amuses me.


Michael,

You've made a number of serious claims that you have yet to substantiate, 
including a personal one that otherwise resolves to libel.

That's rather more problematic than merely being 'inane'.  That you find such 
behavior amusing should further inform the proper handling of all this.

d/

-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-03 Thread Hector Santos

Rolf E. Sonneveld wrote:
 On 5/1/11 6:55 AM, Dave CROCKER wrote:
 
 [...]
 
 In other words, DKIM has nothing to do with the rfc5321.From field, and
 therefore it is entirely inappropriate -- that is, out of scope -- for 
 the
 specification to suggest dealing with it.
 
 You mean 5322.From?
 And how should we read par. 3.2.2 of RFC4686 if it is out of scope for 
 DKIM to deal with it?
 
 
 
 Although 5322.From is not mentioned here, how can DKIM provide any level 
 of defense against fraudulent use of origin addresses, if d= is the one 
 and only mandatory output of the verification process?
 
 Or should we declare this paragraph obsolete?
 
 /rolf

I think Dave can make it more easier for policy advocates to better 
understand his statement:

  DKIM has nothing to do with the rfc5321.From field

by explaining it terms of Protocol Consistency using what is already 
defined in the Requirements for a DKIM Signing Practices Protocol 
(RFC5017) section 5.3, item #10:

10. SSP MUST NOT provide a mechanism that impugns the existence of
non-first party signatures in a message.  A corollary of this
requirement is that the protocol MUST NOT link practices of first
party signers with the practices of third party signers.

  INFORMATIVE NOTE: the main thrust of this requirement is that
  practices should only be published for that which the publisher
  has control, and should not meddle in what is ultimately the
  local policy of the receiver.

  Refs: Deployment Consideration, Section 4.3.

In short, if there is a Trust Assessment logic at the Verifier and it 
sees a valid signature signed by a trusted domain, then 1st party 
policies MUST NOT (according to item #1) apply.

No one disputed this.  The problems was:

   1) Allowing 1st parties to declare it allows 3rd parties to take over,
   2) Dealing with anonymous fraudulent abuse streams,

Until there is universal trust assessment coverage in greater numbers, 
verifiers will be dealing with a lot of uncertified or unknown signers.

Nonetheless, none of this should exclude the idea of an ODID identity. 
Its there, it exist, its in the mandatory RFC5311.From and we should 
allow Local Policies continue to dictate how it will evaluate the 
blasting of DKIM signed mail on this system.  Until SDID can be useful 
with a payoff, verifiers will need a fall back with ODID.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-03 Thread Rolf E. Sonneveld
On 5/2/11 10:22 PM, Murray S. Kucherawy wrote:
 -Original Message-
 From:ietf-dkim-boun...@mipassoc.org  [mailto:ietf-dkim-boun...@mipassoc.org] 
 On Behalf Of Rolf E. Sonneveld
 Sent: Monday, May 02, 2011 1:14 PM
 To:dcroc...@bbiw.net
 Cc:ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity

 In other words, DKIM has nothing to do with the rfc5321.From field, and
 therefore it is entirely inappropriate -- that is, out of scope -- for the
 specification to suggest dealing with it.
 You mean 5322.From?
 Yes, I think that's what he meant.

 And how should we read par. 3.2.2 of RFC4686 if it is out of scope for
 DKIM to deal with it?

  Bad acts related to email-based fraud often, but not always, involve
  the transmission of messages using specific origin addresses of other
  entities as part of the fraud scheme.  The use of a specific address
  of origin sometimes contributes to the success of the fraud by
  helping convince the recipient that the message was actually sent by
  the alleged author.

  To the extent that the success of the fraud depends on or is enhanced
  by the use of a specific origin address, the bad actor may have
  significant financial motivation and resources to circumvent any
  measures taken to protect specific addresses from unauthorized use.

  When signatures are verified by or for the recipient, DKIM _is
  effective in defending against the fraudulent use of origin addresses_
  on signed messages.

 Although 5322.From is not mentioned here, how can DKIM provide any level
 of defense against fraudulent use of origin addresses, if d= is the one
 and only mandatory output of the verification process?
 Why does the output of DKIM need to include something when the consumer of 
 that output already has that information?

Because a consumer should/must not have to re-do the work of the DKIM 
verifier. Or put it differently: a consumer is just consuming the output 
of the DKIM verification process, it will rely on it (provided there's a 
trust relation between consumer and verifier), and it normally will not 
re-do the work of the DKIM verifier. It has no knowledge of DKIM rules 
(bottom up etc.). Just like a MUA has no information about how two MTA's 
exchange a mail over SMTP.

So for the consumer it is essential to get, in addition to the d= and 
the status, the From address that was used to construct the signature. 
That way the consumer can act upon this triplet of information.

 Or should we declare this paragraph obsolete?
 It could stand some revision, I suspect.

 Nevertheless, the overall threat model doesn't require that DKIM itself, i.e. 
 the protocol being defined, also be the thing that evaluates origin addresses 
 for validity or value.

Agreed.

 It's certainly legitimate to leave that to other modules, just like SMTP 
 isn't required to do any evaluation work of the payload it carries.

Agreed.

 But DKIM is a key component to that overall system.

Because DKIM is a key component to the overall system, it must provide 
reliable information about the origin address to those 'other modules'. 
If DKIM is not designed to provide that, we'll have to declare par. 
3.2.2 of RFC4686 to be 'status: historical'.

Question: does DKIM say anything about the 5322.From header value? If we 
agree with Dave, we'll have to admit that DKIM does not address the 
threat described in par. 3.2.2 of 4686, do you agree?

/rolf
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-03 Thread Murray S. Kucherawy
 -Original Message-
 From: Rolf E. Sonneveld [mailto:r.e.sonnev...@sonnection.nl]
 Sent: Tuesday, May 03, 2011 3:56 PM
 To: Murray S. Kucherawy
 Cc: IETF DKIM WG
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
  Why does the output of DKIM need to include something when the
  consumer of that output already has that information?
 
 Because a consumer should/must not have to re-do the work of the DKIM
 verifier. Or put it differently: a consumer is just consuming the output
 of the DKIM verification process, it will rely on it (provided there's a
 trust relation between consumer and verifier), and it normally will not
 re-do the work of the DKIM verifier. It has no knowledge of DKIM rules
 (bottom up etc.). Just like a MUA has no information about how two MTA's
 exchange a mail over SMTP.

The assertion you're making is that the consumer of an API shouldn't need to 
maintain any context; the API will give you back all the bits of context you 
need to continue as well as the answer you need.

If you feed N bytes of data to a hash function, what you get back is the 
resulting hash, not the hash and the source data or maybe the hash and N.  All 
of the context is still in the API consumer, not in the function that's giving 
you what you want.

If you give RSA_Verify() a signature, a public key and a hash, it gives you 
back a 1 if they match and a 0 otherwise, not 1/0 and then some of that same 
information you gave it.  The caller is the part of the system that knows what 
the answer is telling you, because it understands the nature of the function it 
called.

So it is with DKIM: If you get back an indication from a verifier function that 
a signature verified, then the signature covered the lowest From: field that 
you presented to it.  You know that because that's how the interface you're 
using was defined.

An implementation certainly could give you back that From: field's contents 
(and OpenDKIM does, if you ask for it), but still I don't see any reason to 
make it mandatory.

I might even go so far as to say returning that From: field is dangerous since 
it is not confirmed by anything, so DKIM (which is an authentication protocol) 
returning data that can't be validated, even if it was signed, is quite 
possibly asking for trouble.


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-02 Thread Charles Lindsey
On Sun, 01 May 2011 05:10:06 +0100, Hector Santos hsan...@isdg.net wrote:

 So perhaps to help shut down this ambiguity we should add a DKIM
 terminology to clearly separate it from AUID.

3.x  Originating Domain Identity (ODID)

The ODID is the domain part of the From: address.  This identity
MAY be considered as an output communicated to an advanced
Identity Assessor module.

   INFORMATIVE IMPLEMENTATION NOTE:

   The ODID and SDID are inputs for the optional
   Checking Signing Practices component as described
   in the DKIM Service Architecture [RFC5585]


+1

-- 
Charles H. Lindsey -At Home, doing my own thing
Tel: +44 161 436 6131   
   Web: http://www.cs.man.ac.uk/~chl
Email: c...@clerew.man.ac.uk  Snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9  Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-02 Thread Alessandro Vesely
On 01.05.2011 10:38, Hector Santos wrote:
 Again, its about protocol consistency.  So maybe I should ask the 
 chairs for:
 
   Consensus needs to be reevaluated

IMHO, it needs not:  It is premature to define an ODID now.  ADSP is
considered somewhat broken, and for this message, for example, it seems that
the relevant id should be mipassoc.org rather than tana.it.  ODID would
risk to be a candidate for removal like AUID.

From an engineering POV, policy developments are closely related to the
verification software, as a matter of facts, so that cleaning up the
definition of the interface between them doesn't seem to be urgent.
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-02 Thread Jeff Macdonald
On Mon, May 2, 2011 at 11:27 AM, Charles Lindsey c...@clerew.man.ac.uk wrote:
 On Sun, 01 May 2011 05:10:06 +0100, Hector Santos hsan...@isdg.net wrote:

 So perhaps to help shut down this ambiguity we should add a DKIM
 terminology to clearly separate it from AUID.

    3.x  Originating Domain Identity (ODID)

    The ODID is the domain part of the From: address.  This identity
    MAY be considered as an output communicated to an advanced
    Identity Assessor module.

       INFORMATIVE IMPLEMENTATION NOTE:

       The ODID and SDID are inputs for the optional
       Checking Signing Practices component as described
       in the DKIM Service Architecture [RFC5585]


 +1


-1

-- 
Jeff Macdonald
Ayer, MA

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-02 Thread Hector Santos
Alessandro Vesely wrote:
 On 01.05.2011 10:38, Hector Santos wrote:
 Again, its about protocol consistency.  So maybe I should ask the 
 chairs for:

   Consensus needs to be reevaluated
 
 IMHO, it needs not:  It is premature to define an ODID now.  ADSP is
 considered somewhat broken, and for this message, for example, it seems that
 the relevant id should be mipassoc.org rather than tana.it.  ODID would
 risk to be a candidate for removal like AUID.

IMV, ADSP is only broken in that it didn't allow you to declare you 
were allowing mipassoc.org to sign for you or in general

   My Mail Is Always Signed - by me or someone else.

The only point here is that you did declare an ADSP record 
(DKIM=UKNOWN) and to get that record, the verifier needs an ODID to be 
an identity to satisfy the DKIM Service Architecture as described in 
RFC5585.   All the arguable semantics of its value is not the point in 
the same way regarding the value of SDID.

 Side Note: Relaxed ADSP policies is a high overhead redundant waste
 on receivers because the results are indeterminate.  This is the
 same reason why SPF relaxed policies are wasteful too and more
 domains are changing to a HARD FAIL (-ALL).

 From an engineering POV, policy developments are closely related to the
 verification software, as a matter of facts, so that cleaning up the
 definition of the interface between them doesn't seem to be urgent.

Well, sure, current implementations are already supporting AUID and 
ODID and RFC4871bis doesn't reflect that.

Just look at the A-R header recorded by mipassoc.org for your 
submission signature (that was stripped):

   Authentication-Results: sbh17.songbird.com;
  dkim=pass (1024-bit key) header.i=@tana.it

It reported AUID, not the SDID.

What makes it all harder is DKIM Mail Integration.  We are using the 
A-R to help with adding DKIM related attribute information to import 
mail into our backend mail storage.  We know what to do because of the 
5-6 years of being involved with DKIM. But if a new engineer is 
looking at RFC4871bis, they are not going to gain from all the current 
implementations experiences.  They will need to read RFC5585 (DKIM 
Service Architecture) and maybe even RFC5863 (Deployment) and probably 
at some point ask themselves or their boss ask them about security 
issues and get that from RFC4686 and what will they see?  Something 
about POLICY called ADSP and then ask, ok, what output from RFC4871bis 
is needed to support this thing called ADSP.  They will find hmmm, 
there is nothing about it in RFC4871bis. Ok, its the domain in 
RFC5322.From.

All I am saying, lets add that semantic into RFC4871bis and make life 
easier for the next guy.  I guess he will eventually find out at some 
point and maybe that is what you mean that it isn't urgent.  Ok, sure. 
  But we have been so anal with so many other little things, word 
changes, worried about him not using l= tag or whatever, that we 
missed out on bigger things he will probably need.

Anyway, my opinion.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-02 Thread Rolf E. Sonneveld
On 5/1/11 6:55 AM, Dave CROCKER wrote:

[...]

 In other words, DKIM has nothing to do with the rfc5321.From field, and
 therefore it is entirely inappropriate -- that is, out of scope -- for the
 specification to suggest dealing with it.

You mean 5322.From?
And how should we read par. 3.2.2 of RFC4686 if it is out of scope for 
DKIM to deal with it?

Bad acts related to email-based fraud often, but not always, involve
the transmission of messages using specific origin addresses of other
entities as part of the fraud scheme.  The use of a specific address
of origin sometimes contributes to the success of the fraud by
helping convince the recipient that the message was actually sent by
the alleged author.

To the extent that the success of the fraud depends on or is enhanced
by the use of a specific origin address, the bad actor may have
significant financial motivation and resources to circumvent any
measures taken to protect specific addresses from unauthorized use.

When signatures are verified by or for the recipient, DKIM _is
effective in defending against the fraudulent use of origin addresses_
on signed messages.


Although 5322.From is not mentioned here, how can DKIM provide any level 
of defense against fraudulent use of origin addresses, if d= is the one 
and only mandatory output of the verification process?

Or should we declare this paragraph obsolete?

/rolf
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-02 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] 
 On Behalf Of Rolf E. Sonneveld
 Sent: Monday, May 02, 2011 1:14 PM
 To: dcroc...@bbiw.net
 Cc: ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
  In other words, DKIM has nothing to do with the rfc5321.From field, and
  therefore it is entirely inappropriate -- that is, out of scope -- for the
  specification to suggest dealing with it.
 
 You mean 5322.From?

Yes, I think that's what he meant.

 And how should we read par. 3.2.2 of RFC4686 if it is out of scope for
 DKIM to deal with it?
 
 Bad acts related to email-based fraud often, but not always, involve
 the transmission of messages using specific origin addresses of other
 entities as part of the fraud scheme.  The use of a specific address
 of origin sometimes contributes to the success of the fraud by
 helping convince the recipient that the message was actually sent by
 the alleged author.
 
 To the extent that the success of the fraud depends on or is enhanced
 by the use of a specific origin address, the bad actor may have
 significant financial motivation and resources to circumvent any
 measures taken to protect specific addresses from unauthorized use.
 
 When signatures are verified by or for the recipient, DKIM _is
 effective in defending against the fraudulent use of origin addresses_
 on signed messages.
 
 Although 5322.From is not mentioned here, how can DKIM provide any level
 of defense against fraudulent use of origin addresses, if d= is the one
 and only mandatory output of the verification process?

Why does the output of DKIM need to include something when the consumer of that 
output already has that information?

 Or should we declare this paragraph obsolete?

It could stand some revision, I suspect.

Nevertheless, the overall threat model doesn't require that DKIM itself, i.e. 
the protocol being defined, also be the thing that evaluates origin addresses 
for validity or value.  It's certainly legitimate to leave that to other 
modules, just like SMTP isn't required to do any evaluation work of the payload 
it carries.  But DKIM is a key component to that overall system.

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-02 Thread Hector Santos
Murray S. Kucherawy wrote:

 Although 5322.From is not mentioned here, how can DKIM provide any level
 of defense against fraudulent use of origin addresses, if d= is the one
 and only mandatory output of the verification process?
 
 Why does the output of DKIM need to include something when the 
 consumer of that output already has that information?

Its not really how data is obtained but what Data is needed for

 ADSP
 TRUST

as described as part of the RFC5585 design.

One can reasonably state that the true definition for Output is all 
INPUT that went into the signature and the result code:

HLIST (All the signed headers, h=)
SDID  (d=)
SELECTOR  (s=)
AUID  (i=, if defined)
HASH  (strength)
RCODE (Verifier result code)

Its understood the new 3.9 is burning in what is only value required 
and its for a presumingly a required trust assessor since d= value 
MUST be passed to it.

So why not add a reference to VBR?  You have a MUST there to pass to 
something, help promote VBR to fulfill the MUST.

All is that is being asked is cross the tees, dot the eyes for RFC5585 
with a MAY for ODID.  You don't even have to mention ADSP, just say 
its an optional part of the total DKIM Service Architecture.  Just 
like VBR is, just like A-R is.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com



___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-02 Thread Hector Santos
Murray S. Kucherawy wrote:

 It could stand some revision, I suspect.
 
 Nevertheless, the overall threat model doesn't require that 
 DKIM itself, i.e. the protocol being defined, also be the 
 thing that evaluates origin addresses for validity or value.  
 It's certainly legitimate to leave that to other modules, just 
 like SMTP isn't required to do any evaluation work of the 
 payload it carries.  But DKIM is a key component to that 
 overall system.

A, and the SMTP difference is it did not exclude it in either for 
any SMTP level values and/or payload:

For the client domain, it is a REQUIRE to be valid but not a reason 
for rejection (due to historical hiccups):

For the return path, it is REQUIRE to be valid yet it left the door 
open. See RFC5321, section 3.3:

3.3 Mail Transactions

.

Despite the apparent scope of this requirement, there are
circumstances in which the acceptability of the reverse-path may
not be determined until one or more forward-paths (in RCPT
commands) can be examined.  In those cases, the server MAY
reasonably accept the reverse-path (with a 250 reply) and then
report problems after the forward-paths are received and
examined.  Normally, failures produce 550 or 553 replies.

For the forwarding path, if you are an open relay or if you have an 
old computer(s) and can't scale up or out, you just accept it. But 
more modern systems do local recipient validation checks or just for 
policy reason

450 Sorry, user p...@public.com, didn't pay his pennies this month!

For the Data Payload, the fact you can do a 45x/55x is an explicit 
specification that for want ever reason you have, it can be 
temporarily or permanently rejected. RFC2821 learned since RFC821 with 
an explicit insight for delays in DATA EOD responses in section 6.1 
last paragraph

To avoid receiving duplicate messages as the result of timeouts, a
receiver-SMTP MUST seek to minimize the time required to respond to
the final CRLF.CRLF end of data indicator.  See RFC 1047 [40] for
a discussion of this problem.

This is all recognizing the market place increasingly doing payload 
evaluations to address the highly exploited Accept/Bounce Responsible 
System requirement.

The problem with RFC4871bis is that its locking in a specific assessor 
with only one mandatory feed.   It fails to say:

Despite the apparent scope of this requirement, there are
circumstances in which the acceptability of the signature may
not be determined until ODID (RFC5322.From.Domain value)
can be examined.  In those cases, the verifier MAY
reasonably accept the signature (with a ADSP=PASS status) and
then pass the SDID to the Trust Assessor Module.

See the difference between the BIS for SMTP vs the BIS for DKIM?  2821 
incorporated what was learned other documents since 821.  Its hard to 
extract 4871bis has learned from any of the current experiences 
document nor ready for 2011+ operations accept only for trust.

2821 nor 5321 does not say anything about any one process output being 
mandatory as a MUST for a specific any evaluation. But it was all 
allowed via reply codes just giving way for state machine hooks, shims 
and extensions and augmented technology - SPF for MAIL FROM and DKIM 
for the DATA payload.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Hector Santos
Murray S. Kucherawy wrote:
 -Original Message-

 But what it did most of for me (yesterday) was highlight the confusion
 with AUID with the lack of an official DKIM label for an Originating
 Domain Identity.  I guess I was moving forward the past year with
 integrating DKIM into our mail products and I see now I was mistakenly
 labeling the AUID as the FROM domain when its not officially defined
 as the From domain.
 
 That's unfortunate, but it's also the first case I've heard 
 of someone mistaking the AUID for the From: field.

To be more precise, may erroneous labeling of AUID as the author or 
user DOMAIN in the From: address for ADSP purposes.

Its been an ongoing debate with what AUID (i=) is. Just see the recent 
threads with Fenton's proposal to remove it and some suggested to keep 
with refinements like i= should be the From address.

This is why Barry's message is important here (got to find it) because 
if I can correctly recall, he showed both CON and PRO logic on how/why 
an undefined i= can be assumed to be the From and and the From.domain 
for ADSP purposes.

3.x  Originating Domain Identity (ODID)

The ODID is the domain part of the From: address.  This identity
MAY be considered as an output communicated to an advanced
Identity Assessor module.
 
 We already have a name for that: RFC5322.From.  We don't need a 
 new name for something old.

If we want to say From.Domain is an identity, fine by me.

 I don't see any ambiguity here that needs fixing, unless there 
 are lots of people that want to come forward now and admit 
 they had the same misunderstanding you did.

There is plenty of archive evidence old and new regarding i= (AUID) 
ambiguity, including whether it should be a USER identity as the 
definition ambiguously says Agent or User.

Who/What is an Agent? Undefined?

Who is the User?  I presume the RFC5322.From?  No?

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Hector Santos
Dave CROCKER wrote:

 In other words, DKIM has nothing to do with the rfc5321.From field, and 
 therefore it is entirely inappropriate -- that is, out of scope -- for 
 the specification to suggest dealing with it.
 
 At least, please show working group rough consensus support for doing 
 what you suggest.
 

Dave,

All I am trying to do is show the inconsistencies in RFC4871bbis not 
matching current implementation needs and it is incomplete in what 
RFC5585 describes.

I didn't write RFC5585 but if I did, I would not have added the 
Checking Signing Practice and titled it as DKIM Service Architecture 
because the concept was removed from DKIM.  But you did and the 
Deployment Guide has an entire section on ADSP.  The archive is my 
evidence, I have stated if you don't want ADSP then don't reference it 
any DKIM related document.

But it was done in in the Deployments Guide and explicitly added as 
part of the DKIM Service Architecture, not stated it is an Extension 
or any one shown to be not part of the architecture.  Its right there 
as a large part of the software engineering design.  What do you 
expect people to think?

So I suggest reasonable people taking this documents will clearly see 
policy, signing practice, adsp or whatever you wish to call, its part 
of the DKIM design and architectural consideration and RFC4871bis does 
not prepare anyone for that DKIM architecture design.

IETF BIS work should be, at least I thought it was, about codifying 
current implementation and they match RFC5585, not RFC4871bis.  Is 
that a problem? I think so.  You seem to think not.

All I am saying is with the window of opportunity we have now, connect 
the dots and be consistent with the RFC described DKIM Service 
architecture.

Finally, you keep saying:

 DKIM has nothing to do with the rfc5321.From field

(Well, I think you meant RFC5322.From. Right?)

This is not technically correct.

1) It is the only single requirement for binding to the signature and 
there again, the archive evidence will show where I have stated on 
many occasions if we want the above statement to be true, then we need 
to relax the specs to remove this single mandatory binding signature 
requirement.

2) The binding of 5322.From is inherently associated with the SDID 
responsibility claim for the bits that are signed. So for anyone to 
use SDID trust, it is to both technically and ergonomically (UI) claim 
the author is trusted whether or not the signer had any association 
with the author or not.

Again, its about protocol consistency.  So maybe I should ask the 
chairs for:

  Consensus needs to be reevaluated
-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Michael Thomas
Dave CROCKER wrote:
 
 On 4/30/2011 9:10 PM, Hector Santos wrote:
 So perhaps to help shut down this ambiguity we should add a DKIM
 terminology to clearly separate it from AUID.

 3.x  Originating Domain Identity (ODID)

 The ODID is the domain part of the From: address.  This identity
 MAY be considered as an output communicated to an advanced
 Identity Assessor module.
 
 
 Oh heck, let's just declare that the DKIM Signing module MAY output anything 
 it 
 wants.  

That's what 4871 did. Manifestly it worked just fine. We had a tremendous number
of interoperable implementations. The procrustean insistence that there be a
single output has not helped interoperability one iota.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Hector Santos
Michael Thomas wrote:
 Dave CROCKER wrote:

 On 4/30/2011 9:10 PM, Hector Santos wrote:
 So perhaps to help shut down this ambiguity we should add a DKIM
 terminology to clearly separate it from AUID.

 3.x  Originating Domain Identity (ODID)

 The ODID is the domain part of the From: address.  This identity
 MAY be considered as an output communicated to an advanced
 Identity Assessor module.

 Oh heck, let's just declare that the DKIM Signing module MAY output 
 anything it wants.  
 
 That's what 4871 did. Manifestly it worked just fine. We had a 
 tremendous number of interoperable implementations. The procrustean 
 insistence that there be a single output has not helped 
 interoperability one iota.

Its just really odd that the we need to hide the facts in RFC4871bis 
but not in  RFC5585 (DKIM Architecture) and RFC5863 (DKIM Deployment 
Guideline)?

Ok, we got it! We need to isolate the signer domain for some future 
market place. I'm saving my pennies for this. Mission Accomplished.

But in the mean time, implementors are not listening. They are looking 
at other things especially the author thing we must burn into the 
signature.

Why is it so hard to document these facts in the new revised manual?


-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Hector Santos
Hector Santos wrote:
 Murray S. Kucherawy wrote:
 
 Hector stated:
 I think this message by Barry in March 2009 summarizing a conference
 call between Pasi, Stephen and Barry nicely captures the upper/lower
 layers, ADSP, i= and outputs conflicts that continue today:

 http://mipassoc.org/pipermail/ietf-dkim/2009q1/011314.html

 I think that message doesn't say a single thing about layers.  
 It looks entirely procedural to me.
 
 Darn it. I copied the wrong link and now I can't find it. :(
 
 Let me search again.. Quick search failed. I'll search deeper 
 later if you still want me to.  I will find it at some point just to 
 have it in my DKIM notes.

Here is the correct message link:

Status and direction
http://mipassoc.org/pipermail/ietf-dkim/2009q1/011194.html

For all and intent and purposes, this message can be reposted today 
and still bee relevant, covering the final issues we are still dealing 
with.  Note the chairs recommended move forward items, in particular 
#4 which is what I believe we are trying to help with in this WGLC:

   4. *Aim 4871bis at incorporating what we've learned since 4871.*
  If that results in a document that can and should move to
  Draft Standard, we'll do that.  If it does not, then 4871bis
  will go to Proposed Standard, and it will take another
  round of work to move up the standards track.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Douglas Otis
On 4/30/11 10:37 PM, Murray S. Kucherawy wrote:
  -Original Message- From: Hector Santos
  [mailto:hsan...@isdg.net] Sent: Saturday, April 30, 2011 9:10 PM
  To: Murray S. Kucherawy Cc: ietf-dkim@mipassoc.org Subject: Re:
  [ietf-dkim] Output summary - proposing ODID Originating Domain
  Identity
 
  But what it did most of for me (yesterday) was highlight the
  confusion with AUID with the lack of an official DKIM label for an
  Originating Domain Identity. I guess I was moving forward the past
  year with integrating DKIM into our mail products and I see now I
  was mistakenly labeling the AUID as the FROM domain when its not
  officially defined as the From domain.

  That's unfortunate, but it's also the first case I've heard of
  someone mistaking the AUID for the From: field.

I think this missed Hector's concern.  Perhaps it would have been 
clearer indicating confusion was in respect to i= parameter now called 
the AUID which can be a copy of an address that was within the From 
header field.  The domain can differ whenever the AUID is a subdomain of 
the ODID when allowed by the key rr.

Section 3.5 had stated the following omitted information:

INFORMATIVE DISCUSSION: This document does not require the
value of the i= tag to match the identity in any message
header fields. This is considered to be a verifier policy issue.
Constraints between the value of the i= tag and other
identities in other header fields seek to apply basic
authentication into the semantics of trust associated with a
role such as content author. Trust is a broad and complex
topic and trust mechanisms are subject to highly creative
attacks. The real-world efficacy of any but the most basic
bindings between the i= value and other identities is not
well established, nor is its vulnerability to subversion by
an attacker. Hence reliance on the use of these options
should be strictly limited. In particular, it is not at all
clear to what extent a typical end-user recipient can rely on
any assurances that might be made by successful use of the
i= options.

-Doug





___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] 
 On Behalf Of Hector Santos
 Sent: Sunday, May 01, 2011 4:51 PM
 To: Michael Thomas
 Cc: dcroc...@bbiw.net; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
 Its just really odd that the we need to hide the facts in RFC4871bis
 but not in RFC5585 (DKIM Architecture) and RFC5863 (DKIM Deployment
 Guideline)?

I've lost track of how many times and how many different ways it's been 
explained that nothing is being hidden.  I'm going to give up now.

 But in the mean time, implementors are not listening. They are looking
 at other things especially the author thing we must burn into the
 signature.

Which implementers, and why aren't they saying anything?


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Murray S. Kucherawy
 -Original Message-
 From: Hector Santos [mailto:hsan...@isdg.net]
 Sent: Sunday, May 01, 2011 5:33 PM
 To: Murray S. Kucherawy
 Cc: Murray S. Kucherawy; ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
 Here is the correct message link:
 
 Status and direction
 http://mipassoc.org/pipermail/ietf-dkim/2009q1/011194.html

That message (a) was sent six months before ADSP was published, and (b) was 
written at a time when ADSP still made use of i=.  If you take the time to 
read the text in RFC5617, it doesn't use i= at all.

 For all and intent and purposes, this message can be reposted today
 and still bee relevant,

...except that it doesn't cover what the working group actually published.

 covering the final issues we are still dealing
 with.  Note the chairs recommended move forward items, in particular
 #4 which is what I believe we are trying to help with in this WGLC:
 
4. *Aim 4871bis at incorporating what we've learned since 4871.*
   If that results in a document that can and should move to
   Draft Standard, we'll do that.  If it does not, then 4871bis
   will go to Proposed Standard, and it will take another
   round of work to move up the standards track.

Sounds like precisely what we've done.

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Hector Santos
Murray S. Kucherawy wrote:
 -Original Message-

 Its just really odd that the we need to hide the facts in RFC4871bis
 but not in RFC5585 (DKIM Architecture) and RFC5863 (DKIM Deployment
 Guideline)?
 
 I've lost track of how many times and how many different ways 
 it's been explained that nothing is being hidden.  I'm going to 
 give up now.

If nothing is being hidden, then why not explicitly add AUID and ODID 
(or RFC5585.From.Domain) to the Output Summary?  Whats the danger?

Maybe its not a Output Summary?

Here are some definitions for a summary [1]:

A summary, synopsis, or recap is a shorter version of the original.
Such a simplification highlights the major points from the much
longer subject, such as a text, speech, film, or event. The purpose
is to help the audience get the gist in a short period of time.

An abstract or a condensed presentation of the substance of a body
of material; concise, brief or presented in a condensed form;
Performed speedily and without formal ceremony

etc.  What you are proposing is just the redundant Mandatory Output 
information, and not a DKIM Output Complete summary that reflects 
current implementations.

 But in the mean time, implementors are not listening. They are looking
 at other things especially the author thing we must burn into the
 signature.
 
 Which implementers, and why aren't they saying anything?

Well you, I did and many in the archives has say things, and many have 
stated very clearly the ODID is considered a very fundamental part of 
DKIM.  RFC5585 reflects how signing practices is part of the expected 
DKIM Architecture.

The two open source APIs:

OpenDKIM
ALT-N

has support for signing practices.

Systems using A-R to report DKIM results are using AUID, such as 
Dave's MLM.

And I know our DKIM product has direct support for the design 
described in RFC5595 including A-R with all four outputs (status, 
SDID, AUID, ODID) as well as the ADSP extensions.

The biggest software company, Microsoft, has announced ADSP support 
and that means ODID output is required.  How can that be not significant?

Yes, it is getting tiresome because it is real hard to understand why 
adding the obvious to the Output Summary is a problem. What harm is 
there?  None that I can see.

Why isn't there any mediated compromise to settle these 5-6 years 
conflict?

In my view, your proposed section 1.1 DKIM Architecture Documents and 
with adding the AUID and ODID as part of the output to make all the 
documents protocol consistent will settle the issue, in my view, for 
all parties.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com

[1] http://www.google.com/search?rlz=1C1CHMG_enUS291US310q=define:summary


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Hector Santos
Murray S. Kucherawy wrote:
 -Original Message-

 Here is the correct message link:

 Status and direction
 http://mipassoc.org/pipermail/ietf-dkim/2009q1/011194.html
 
 That message (a) was sent six months before ADSP was published, 
 and (b) was written at a time when ADSP still made use of i=.  
 If you take the time to read the text in RFC5617, it doesn't use 
 i= at all.

Since day one POLICY anchored off the ODID in the same way Domainkeys, 
which has inherent support for POLICY, anchored off the ODID.

There were suggestions as Barry noted due to the ambiguity (which 
remains today) for what i= should be and that included i=From and thus 
possibly it could be the feed for policy.   But we also talking the 
ideas of extension modeling and outputs to pass to them. It was the 
beginning of reducing it to one only - signer and only for trust 
purposes, excluding the needs for ADSP.

 For all intent and purposes, this message can be reposted today
 and still bee relevant,
 
 except that it doesn't cover what the working 
 group actually published.

Exactly, which is why we still have the issues today.

4. *Aim 4871bis at incorporating what we've learned since 4871.*
   If that results in a document that can and should move to
   Draft Standard, we'll do that.  If it does not, then 4871bis
   will go to Proposed Standard, and it will take another
   round of work to move up the standards track.
 
 Sounds like precisely what we've done.

I take the position that 4871bis does not incorporate what we have learned
since 4871.  If it did, these concerns would not be on-going.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Dave CROCKER

On 5/1/2011 6:36 PM, Murray S. Kucherawy wrote:
 I've lost track of how many times and how many different ways it's been
 explained that nothing is being hidden.  I'm going to give up now.


+1

d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Hector Santos
Dave CROCKER wrote:
 On 5/1/2011 6:36 PM, Murray S. Kucherawy wrote:
 I've lost track of how many times and how many different ways it's been
 explained that nothing is being hidden. 
 
 
 +1

Good.  So there should not be a problem *not* hiding an explicit 
identity definition required to complete the DKIM Service Architecture 
in RFC5585:

   3.x  Originating Domain Identity (ODID)

The ODID is the domain part of the From: address.  This identity
MAY be considered as an output communicated to an advanced
Identity Assessor module.

   INFORMATIVE IMPLEMENTATION NOTE:

   The ODID and SDID are inputs for the optional
   Checking Signing Practices component as described
   in the DKIM Service Architecture [RFC5585]

If something like this is not added or anything close to it, I don't 
know any other way it can be described but an intentional neglect to 
mention anything closely related to it.

I would like to ask the chairs if we can get Consensus Reevaluated. 
 From the limited WG participants providing input, it appears we have 
Rough Consensus for this identity to be included in RFC4871bis.

-- 
Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-04-30 Thread Dave CROCKER


On 4/30/2011 9:10 PM, Hector Santos wrote:
 So perhaps to help shut down this ambiguity we should add a DKIM
 terminology to clearly separate it from AUID.

 3.x  Originating Domain Identity (ODID)

 The ODID is the domain part of the From: address.  This identity
 MAY be considered as an output communicated to an advanced
 Identity Assessor module.


Oh heck, let's just declare that the DKIM Signing module MAY output anything it 
wants.  That way we satisfy every possible output desire that has been 
expressed 
or might be expressed.  After all, it's clear that implementers need the 
permission.

Or we might notice that the purpose of a protocol specification is to define 
conventions that are followed by both sides of an interaction and that specific 
specifications are constrained to specific functions, in order to keep them 
tractable.  Telling implementers that they are free to follow any local 
conventions they want violates both of these otherwise-normal requirements.

So rather than continue to fight old, settled issues that primarily have to do 
with making DKIM try to be something it isn', a better idea would be to review:

Section 2.1:
   INFORMATIVE RATIONALE: The signing identity specified by a DKIM
   signature is not required to match an address in any particular
   header field ...

Section 4.5, i=:
  INFORMATIVE DISCUSSION: This specification does not require the
  value of the i= tag to match the identity in any message
  header fields.

Section 4.10:
   INFORMATIVE DISCUSSION: This document does not require the value
   of the SDID or AUID to match an identifier in any other message
   header field.


In other words, DKIM has nothing to do with the rfc5321.From field, and 
therefore it is entirely inappropriate -- that is, out of scope -- for the 
specification to suggest dealing with it.

At least, please show working group rough consensus support for doing what you 
suggest.

d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-04-30 Thread Murray S. Kucherawy
 -Original Message-
 From: Hector Santos [mailto:hsan...@isdg.net]
 Sent: Saturday, April 30, 2011 9:10 PM
 To: Murray S. Kucherawy
 Cc: ietf-dkim@mipassoc.org
 Subject: Re: [ietf-dkim] Output summary - proposing ODID Originating Domain 
 Identity
 
 But what it did most of for me (yesterday) was highlight the confusion
 with AUID with the lack of an official DKIM label for an Originating
 Domain Identity.  I guess I was moving forward the past year with
 integrating DKIM into our mail products and I see now I was mistakenly
 labeling the AUID as the FROM domain when its not officially defined
 as the From domain.

That's unfortunate, but it's also the first case I've heard of someone 
mistaking the AUID for the From: field.

 So perhaps to help shut down this ambiguity we should add a DKIM
 terminology to clearly separate it from AUID.
 
3.x  Originating Domain Identity (ODID)
 
The ODID is the domain part of the From: address.  This identity
MAY be considered as an output communicated to an advanced
Identity Assessor module.

We already have a name for that: RFC5322.From.  We don't need a new name for 
something old.

I don't see any ambiguity here that needs fixing, unless there are lots of 
people that want to come forward now and admit they had the same 
misunderstanding you did.

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html