Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-18 Thread Tony Hansen
Eliot Lear wrote:
> The real question for me now is simply this: will those people who
> are writing the overview now commit to updating it after SSP is
> complete? And I for one want to see SSP complete quickly.

Irrespective of whether we publish something now or not, the authors of
the overview document have always been committed to publishing a version
that includes SSP information *at the same time as the SSP protocol
specification*. From the charter:

Nov 2007WG last call on SSP protocol
Nov 2007WG last call on overview document

What we've been exploring in this little debate here is whether we
should publish a version earlier without much SSP information in it.

Tony Hansen
[EMAIL PROTECTED]
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-16 Thread Stephen Farrell



Hallam-Baker, Phillip wrote:

It is sufficient to have last call on the policy requirements. 


Well, it would be if we got some last-call comments.

Can I ask folks to read ssp-reqs and send their comments please.

Stephen.
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-15 Thread Hector Santos

Eliot Lear wrote:

Hi,



Given two sets of RECEIVERS:

  RECEIVER-A:  Legacy DKIM-BASE system. Supports DKIM-BASE only
  RECEIVER-B:  Updated to support DKIM-BASE+SSP

and given a DOMAIN that has determined that it "better" to use SSP 
than not use SSP, therefore it uses a strong SSP policy for signing.


then who do you think the BAD GUY will target?

  Simple:  RECEIVER-A

RECEIVER-A will bare the blunt of the premature decisions.  The DOMAIN 
reputation will be harmed because there exist a legacy of DKIM-BASE 
only systems that bad guys will target.


First, I'm not sure how DOMAIN comes into this equation.  I suspect that 
RECEIVER-A will maintain a list of domains, either manually or out of 
band, that it knows signs messages, and may then weight messages from 
those domains with invalid signatures somewhat toward spam.  The only 
issue is that RECEIVER-A may not be able to make an easy decision about 
a message with an invalid signature from a domain that has no SSP 
record.  Perhaps it doesn't sign any mail.


Right, or the DOMAIN signs all mail and Bad Guys (BG) target legacy 
systems, including RECEIVER-A DKIM-BASE only systems with no signature 
mail purportedly from this DOMAIN   BGs will stay away from RECEIVER-B 
type systems.


So using the word "break" is not a term I would use.  But I would say 
that the promotion and recommendation that it is SAFE to use DKIM-BASE 
without any helper technology is in my strong opinion, a very poor 
engineering decision because it HARM receivers and domains.


I just don't see this.


Fair enough, it is just a consequence of the above which is not much 
different than today with BGs targetting legacy systems.  Receiver-A, 
including non-DKIM ready system will feel the blunt of the exploitation. 
The unsuspecting domains, who unbeknowst to them, their domain is 
being used in vain at these sites (spoofed, phished), are harmed.   No 
different than it is today.   I'm just hoping that we don't begin march 
into a new era with the same mistakes of opening new holes due to 
incomplete considerations.


Of course, RECEIVER-A would have to upgrade and I believe that is 
question Mr. Lear was poising to Mr. Powers.  Will systems upgrade at 
a later point?


No, my question was directed at Dave Crocker and Tony Hansen about 
whether they would be willing to revise the overview document.


My apology. Rereading your message, I misread it to mean you were asking 
 Mr Powers if they would upgrade (software) since he showed an urgency 
to get an operation going now.  My bad, I read you wrong. Sorry.


--
HLS


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Fwd: Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-15 Thread Charles Lindsey

On Wed, 14 Mar 2007 15:20:28 -, Powers, Jot <[EMAIL PROTECTED]> wrote:


It has come to my attention that perhaps I confused the discussions with
"fixing" -base due to the FWS stuff, and overview.


And speaking of the FWS stuff, I demonstrated that an actual BUG existed
in base, and Frank confirmed that, but there has been no response from
anyone in a position to fix it.



--
Charles H. Lindsey -At Home, doing my own thing
Tel: +44 161 436 6131   
   Web: http://www.cs.man.ac.uk/~chl

Email:[EMAIL PROTECTED]: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9  Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-15 Thread Jeff Macdonald
On Thu, Mar 15, 2007 at 04:07:32AM -0700, Dave Crocker wrote:
> The view that -base is sufficient presumes a) quite a high level of 
> expertise, I believe, and b) quite a high level of effort.  Most managers 
> and decisions makers, out in the larger Internet, do not have either.

You seem to be saying that a top to bottom strategy is needed. For that
to happen you need to target Direct marketing publications. Writing an
overview doc posted on the net probably won't be read by upper
management. 


> Consequently, none of the folk in this working group are representative of 
> that larger community. (Dare I note that even within the working group, 
> there is often disparity on basic point about DKIM, which -overview ought 
> to be useful in settling?

So who is overview really for? Management or implementors?


-- 
:: Jeff Macdonald | Principal Engineer, Messaging Technologies
:: e-Dialog | [EMAIL PROTECTED]
:: 131 Hartwell Ave. | Lexington, MA 02421 
:: v: 781-372-1922 | f: 781-863-8118 
:: www.e-dialog.com

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-15 Thread Dave Crocker



Michael Thomas wrote:

I think this touches on the important question about all of this: what are
we trying to accomplish right now? My feeling is that we want as quickly as
possible to fertilize the fields with as many DKIM signers as possible.
This is a very straightforward proposition and -base provides the necessary
blueprint on how to do that.


This is concisely stated.  I think it gets to the core view that many folk 
hold.  And, yes, I disagree with it.  But it's almost refreshing to disagree 
with such a clearly stated view.


I tend towards viewing wide-spread adoption as difficult.  Can't imagine where 
that perspective comes from...


Successful adoption of brand new IETF work usually entails quite a bit of 
post-standards marketing, as in "educating".  Getting folks on the same page 
about what to say is important and difficult.


The view that -base is sufficient presumes a) quite a high level of expertise, 
I believe, and b) quite a high level of effort.  Most managers and decisions 
makers, out in the larger Internet, do not have either.


Consequently, none of the folk in this working group are representative of 
that larger community. (Dare I note that even within the working group, there 
is often disparity on basic point about DKIM, which -overview ought to be 
useful in settling?



d/
--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-15 Thread Eliot Lear

Hi,

I am more confused than ever, I suppose:



Are you suggesting that deploying SSP will break dkim-base? Could you 
explain how, if so?


Yes and No.

The answer to your question depends on many factors, but it is really 
quite simple. This scenario is not new. Code Red and similar threats 
is based on the premise that there exist of market of old and legacy 
systems.


Given two sets of RECEIVERS:

  RECEIVER-A:  Legacy DKIM-BASE system. Supports DKIM-BASE only
  RECEIVER-B:  Updated to support DKIM-BASE+SSP

and given a DOMAIN that has determined that it "better" to use SSP 
than not use SSP, therefore it uses a strong SSP policy for signing.


then who do you think the BAD GUY will target?

  Simple:  RECEIVER-A

RECEIVER-A will bare the blunt of the premature decisions.  The DOMAIN 
reputation will be harmed because there exist a legacy of DKIM-BASE 
only systems that bad guys will target.


First, I'm not sure how DOMAIN comes into this equation.  I suspect that 
RECEIVER-A will maintain a list of domains, either manually or out of 
band, that it knows signs messages, and may then weight messages from 
those domains with invalid signatures somewhat toward spam.  The only 
issue is that RECEIVER-A may not be able to make an easy decision about 
a message with an invalid signature from a domain that has no SSP 
record.  Perhaps it doesn't sign any mail.


So using the word "break" is not a term I would use.  But I would say 
that the promotion and recommendation that it is SAFE to use DKIM-BASE 
without any helper technology is in my strong opinion, a very poor 
engineering decision because it HARM receivers and domains.


I just don't see this.



Of course, RECEIVER-A would have to upgrade and I believe that is 
question Mr. Lear was poising to Mr. Powers.  Will systems upgrade at 
a later point?


No, my question was directed at Dave Crocker and Tony Hansen about 
whether they would be willing to revise the overview document.


Eliot
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-14 Thread Douglas Otis


On Mar 14, 2007, at 6:42 PM, Hector Santos wrote:

We are not talking about DAY 1 of the Internet here.  But 35+  
years, and we have enough knowledge and insight to know today that  
if you can recognize the creation of a potential problem, then it  
would be neglectful if a) you didn't bring it up and b) if you  
continue to pursue such a course to allow it to happen.


DKIM represents a change in how message content can be identified.   
Placing information at the domain helps in preventing false-positive  
filtering of valid messages and allows more aggressive filtering of  
phishing attempts.  DKIM does not include any means to determine  
whether a transmitter is controlled by an affiliated entity, or  
whether there is a chance a message is part of campaign expending the  
signer's clout with abusive replays.  Perhaps a lower false-positive  
rate with a means to assure email-addresses is more than good enough.


DKIM serving as a basis for white-listing also depends on who is  
allowed to utilize the signing-domain.  Unless each person obtains  
their own signing-domain, DKIM signature abuse will likely preclude  
the general public from obtaining enhanced deliverability. : (


When everyone obtains their own signing-domain, tracking reputations  
will be difficult.  Everyone will also be in jeopardy of having their  
signature besmirched by replays of perhaps innocent messages, as  
tolerance for abusive replays may become wickedly low.


Bad actors are obtaining millions of new domains every day.  How many  
bad emails will it take before a signing-domain ends up on someone's  
do-not-accept list?  This could be worse than an IP address black- 
hole listing, as DKIM requires the signing-domain match that of the  
assured email-address.  Someone's email-address could easily become  
forfeit as a result of the abuse DKIM policy does not offer a means  
to control.  Not even your version SSP helps with this type of  
problem either.


While the Internet has been around for a while, the next few years  
will be bringing in many changes.  The only thing that remains the  
same is change.  It seems there are many possible scenarios ignored  
with your policy categorizations.  Bad actors are good at leveraging  
weaknesses that few thought would become a problem at the time.   
However, Edward Murphy is seldom wrong. : )


-Doug




___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-14 Thread Eric Allman



--On March 14, 2007 8:11:11 AM -0700 Dave Crocker <[EMAIL PROTECTED]> 
wrote:



Eliot, you are, of course, correct.  But that rather misses the
point.

The point is what will facilitate adoption.  (Why is it that the
IETF works so hard to ignore adoption issues, as we think merely
publishing a document is the end of the task?)

The Overview document, approximately in its current form (IMO), can
be extremely helpful for the rest of the community, to understand
DKIM and make deployment and use decisions about it.


I'm not saying that having some sort of overview document is a good 
thing for assisting with adoption.  I am saying that it doesn't need 
to be an RFC.  It can be just a draft, or (horrors) a non-IETF 
document.


I *am* saying that taking the time and effort to get WG consensus, go 
through Last Call, IESG Approval, and the RFC Editor queue is just 
overhead for now.  Wait until we have the whole thing before we go 
through the expense of formalizing it.


eric
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-14 Thread Hector Santos

Wietse Venema wrote:

Hector Santos:
This is exactly the same problem that the industry evolved to over the 
past two decades and what has brought us together here.   The problem is 
dealing with the legacy market of old SMTP systems and how the bad guys 
use this to gain entry into systems.  If that wasn't the problem then we 
would have FULL control of all anonymous transactions.


Indeed. The evolutionary approach does not work. It has saddled us
up with a series of legacy systems that we need to cope with.

Instead, we need to get things right the first time. Therefore we
need to discourage deployment until we have achieved the complete
and perfect solution.  After that point has been reached, the world
will be perfect forever and nothing will ever need to be changed.


Of course, that is silly so I don't know why you brought it up.

Nonetheless, there is nothing wrong with having a "Getting right the 
first time" approach to design.  Its a QA thing, not an ABSOLUTE and if 
you do some research, you will find this old mantra is once again 
growing in engineering, management and QA circles.  The goal?  To 
minimize duplicity of rework, potential problems for you and customers 
and hence cost.


We are not talking about DAY 1 of the Internet here.  But 35+ years, and 
we have enough knowledge and insight to know today that if you can 
recognize the creation of a potential problem, then it would be 
neglectful if a) you didn't bring it up and b) if you continue to pursue 
such a course to allow it to happen.


--
HLS


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-14 Thread Wietse Venema
Hector Santos:
> This is exactly the same problem that the industry evolved to over the 
> past two decades and what has brought us together here.   The problem is 
> dealing with the legacy market of old SMTP systems and how the bad guys 
> use this to gain entry into systems.  If that wasn't the problem then we 
> would have FULL control of all anonymous transactions.

Indeed. The evolutionary approach does not work. It has saddled us
up with a series of legacy systems that we need to cope with.

Instead, we need to get things right the first time. Therefore we
need to discourage deployment until we have achieved the complete
and perfect solution.  After that point has been reached, the world
will be perfect forever and nothing will ever need to be changed.

Wietse
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-14 Thread Hector Santos

Steve Atkins wrote:


On Mar 14, 2007, at 1:28 PM, Hector Santos wrote:

I could be wrong, but I believe he was referring to backward 
compatibility issues with a new legacy market of DKIM-BASE only 
systems vs DKIM-BASE PLUS SSS systems.


Are you suggesting that deploying SSP will break dkim-base? Could you 
explain how, if so?


Yes and No.

The answer to your question depends on many factors, but it is really 
quite simple. This scenario is not new. Code Red and similar threats is 
based on the premise that there exist of market of old and legacy systems.


Given two sets of RECEIVERS:

  RECEIVER-A:  Legacy DKIM-BASE system. Supports DKIM-BASE only
  RECEIVER-B:  Updated to support DKIM-BASE+SSP

and given a DOMAIN that has determined that it "better" to use SSP than 
not use SSP, therefore it uses a strong SSP policy for signing.


then who do you think the BAD GUY will target?

  Simple:  RECEIVER-A

RECEIVER-A will bare the blunt of the premature decisions.  The DOMAIN 
reputation will be harmed because there exist a legacy of DKIM-BASE only 
systems that bad guys will target.


So using the word "break" is not a term I would use.  But I would say 
that the promotion and recommendation that it is SAFE to use DKIM-BASE 
without any helper technology is in my strong opinion, a very poor 
engineering decision because it HARM receivers and domains.


Of course, RECEIVER-A would have to upgrade and I believe that is 
question Mr. Lear was poising to Mr. Powers.  Will systems upgrade at a 
later point?


Of course, I think the answer is YES if such systems realize that its 
better to upgrade.  But we can only hope it is sooner than later so that 
we minimize the number of legacy of DKIM-BASE only systems.


Hope this helps

---
HLS



___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-14 Thread Steve Atkins


On Mar 14, 2007, at 1:28 PM, Hector Santos wrote:


Dave Crocker wrote:


The real question
for me now is simply this: will those people who are writing the  
overview now commit to updating it after SSP is complete?  And I  
for one want to see SSP complete quickly.
Whether the current document is "updated", or a new document is  
written, or an overview section in the SSP specification itself is  
added strikes me as a decision to make at the time we need the  
additional writing.


I could be wrong, but I believe he was referring to backward  
compatibility issues with a new legacy market of DKIM-BASE only  
systems vs DKIM-BASE PLUS SSS systems.


Are you suggesting that deploying SSP will break dkim-base? Could you  
explain how, if so?


Cheers,
  Steve



___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-14 Thread Hector Santos

Dave Crocker wrote:


The real question
for me now is simply this: will those people who are writing the 
overview now commit to updating it after SSP is complete?  And I for 
one want to see SSP complete quickly.


Whether the current document is "updated", or a new document is written, 
or an overview section in the SSP specification itself is added strikes 
me as a decision to make at the time we need the additional writing.


I could be wrong, but I believe he was referring to backward 
compatibility issues with a new legacy market of DKIM-BASE only systems 
vs DKIM-BASE PLUS SSS systems.


I'm certainly happy to commit to putting in the effort to make sure 
there is text of an overview style for SSP.


Well, IMO, you talk about independent, value-added assessment services 
in a futuristic manner anyway, why SSP wasn't there or included in the 
first place speaks volumes about the true nature of the problem here.


FWIW, I am prime example of a target audience member your overview 
attempts to address.  I would probably be asking "what are these 
independent, value-added services, and do they exist today?"


--
HLS

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


RE: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-14 Thread Hallam-Baker, Phillip
Absolutely. 

And the question that I raized was rather different. The question is whether we 
should publish a version of the overview with references to policy taken out.

I do not accept that we have to wait till completion of the policy 
specification to publish a version of overview. It is sufficient to have last 
call on the policy requirements. The overview document does not go into the 
details of how policy works, requirements are sufficient. 

> -Original Message-
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of Dave Crocker
> Sent: Wednesday, March 14, 2007 11:11 AM
> To: Eliot Lear
> Cc: Untitled; Powers, Jot
> Subject: Re: [ietf-dkim] Re: I-D 
> ACTION:draft-ietf-dkim-overview-04.txt
> 
> 
> 
> Eliot Lear wrote:
> > Jot,
> > 
> > The overview isn't keeping DKIM from the world.  In fact 
> you guys can 
> > sign today, if you don't already (haven't checked).
> 
> Eliot, you are, of course, correct.  But that rather misses the point.
> 
> The point is what will facilitate adoption.  (Why is it that 
> the IETF works so hard to ignore adoption issues, as we think 
> merely publishing a document is the end of the task?)
> 
> The Overview document, approximately in its current form 
> (IMO), can be extremely helpful for the rest of the 
> community, to understand DKIM and make deployment and use 
> decisions about it.
> 
> 
>  > The real question
> > for me now is simply this: will those people who are writing the 
> > overview now commit to updating it after SSP is complete?  
> And I for 
> > one want to see SSP complete quickly.
> 
> Whether the current document is "updated", or a new document 
> is written, or an overview section in the SSP specification 
> itself is added strikes me as a decision to make at the time 
> we need the additional writing.
> 
> I'm certainly happy to commit to putting in the effort to 
> make sure there is text of an overview style for SSP.
> 
> d/
> -- 
> 
>Dave Crocker
>Brandenburg InternetWorking
>bbiw.net
> ___
> NOTE WELL: This list operates according to 
> http://mipassoc.org/dkim/ietf-list-rules.html
> 

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-14 Thread Michael Thomas

Dave Crocker wrote:



Eliot Lear wrote:

Jot,

The overview isn't keeping DKIM from the world.  In fact you guys can 
sign today, if you don't already (haven't checked).  


Eliot, you are, of course, correct.  But that rather misses the point.

The point is what will facilitate adoption.  (Why is it that the IETF 
works so hard to ignore adoption issues, as we think merely publishing a 
document is the end of the task?)


The Overview document, approximately in its current form (IMO), can be 
extremely helpful for the rest of the community, to understand DKIM and 
make deployment and use decisions about it.


Who, exactly, is this "rest of the community"? I'd say that there
are at least two distinct communities:

1) software/hardware vendors as well as open source implementations
   writing DKIM
2) IT folks deploying (1)

From what I can tell, (1) seems to be doing pretty OK with what we've
given them. Google's recent introduction of dkim signing seems to have
only required -base (actually -allman-01) to get them going. And google
isn't the only one who's digested the spec and popped out an
implementation.

As for (2), I suspect they are going to be taking their cues from (1).
Arvel's user base is a great testament of how (2) needs software that
makes doing the right thing easy. I don't think they need any deep
understanding of the motivations and mechanics -- and for Arvel's
customers an awareness that the IETF even exists :)

So I'm sort of dubious -- at this stage -- that either of these is
the *necessary* audience. Or is there some other necessary audience?
I can see this later as I've already written, but not now.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-14 Thread Michael Thomas

Powers, Jot wrote:

On 3/14/07 8:01 AM, "Michael Thomas" <[EMAIL PROTECTED]> scribbled:


Powers, Jot wrote:

On 3/12/07 5:43 AM, "Tony Hansen" <[EMAIL PROTECTED]> scribbled:


In other words, would folks prefer to:

A. Expedite publishing the Overview documents, in order to facilitate
development and deployment of the -base specification (with an update
later on for SSP), or

+1


B. Defer the Overview document until the SSP specification is complete.

As the largest phishing target out there, we're interested in having DKIM be
out there as soon as possible, without waiting for SSP, because even "fast"
for the IETF process isn't particularly speedy, whereas spammers and
phishers are.

Not to pick on Jot, but this is very illustrative of why putting
-overview in the path right now may be very counter-productive.
-Base *is* done. Waiting for -overview is *not* required. The
best possible wait time is the zero you can do by reading -base
right now and deploying it.


Don't worry, I can take it.  :)

I almost wrote:

C:  Wait for nothing.

But I was trying to be a good little list member and only vote on the
options provided.

Just to be clear:

We would DKIM sign now (and did a while ago) if our appliance vendor
supported DKIM, which they plan on doing, once it is a "standard" for some
value of "standard".  (They have said summer '07)

Our approach is that we don't care about chicken's or eggs, we just love a
nice chicken omlete.  :)


I think this touches on the important question about all of this: what
are we trying to accomplish right now? My feeling is that we want as
quickly as possible to fertilize the fields with as many DKIM signers
as possible. This is a very straightforward proposition and -base
provides the necessary blueprint on how to do that. I really don't
think we need anything more elaborate than that (from an IETF
perspective, that is).

How receivers use the verification results will hopefully become a
lot more apparent once we have a critical mass of people signing, and
this is a *good* thing -- we're creating a tool, not a solution. When
that plays out, I think it would be very useful to document that, and
any SSP related practices into a BCP. That's what I've envisioned
-overview as being a start on: an eventual BCP.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-14 Thread Powers, Jot
On 3/14/07 8:00 AM, "Eliot Lear" <[EMAIL PROTECTED]> scribbled:

> Jot,
> 
> The overview isn't keeping DKIM from the world.  In fact you guys can
> sign today, if you don't already (haven't checked).  The real question
> for me now is simply this: will those people who are writing the
> overview now commit to updating it after SSP is complete?  And I for one
> want to see SSP complete quickly.

It has come to my attention that perhaps I confused the discussions with
"fixing" -base due to the FWS stuff, and overview.

I read the discussion as having Overview be one of the solutions to this,
and thus holding up base, not SSP.  If that is the case, I apologize for
muddying the waters.

Regardless, I would like to see RFCs move forward (be it base or SSP)
without waiting for an overview document.

-Jot
-- 
Jot Powers <[EMAIL PROTECTED]>
Phone: 480-862-7234Cell: 480-221-1157
Skype: jotebay

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-14 Thread Powers, Jot
On 3/14/07 8:01 AM, "Michael Thomas" <[EMAIL PROTECTED]> scribbled:

> Powers, Jot wrote:
>> On 3/12/07 5:43 AM, "Tony Hansen" <[EMAIL PROTECTED]> scribbled:
>> 
>>> In other words, would folks prefer to:
>>> 
>>> A. Expedite publishing the Overview documents, in order to facilitate
>>> development and deployment of the -base specification (with an update
>>> later on for SSP), or
>> 
>> +1
>> 
>>> B. Defer the Overview document until the SSP specification is complete.
>> 
>> As the largest phishing target out there, we're interested in having DKIM be
>> out there as soon as possible, without waiting for SSP, because even "fast"
>> for the IETF process isn't particularly speedy, whereas spammers and
>> phishers are.
> 
> Not to pick on Jot, but this is very illustrative of why putting
> -overview in the path right now may be very counter-productive.
> -Base *is* done. Waiting for -overview is *not* required. The
> best possible wait time is the zero you can do by reading -base
> right now and deploying it.

Don't worry, I can take it.  :)

I almost wrote:

C:  Wait for nothing.

But I was trying to be a good little list member and only vote on the
options provided.

Just to be clear:

We would DKIM sign now (and did a while ago) if our appliance vendor
supported DKIM, which they plan on doing, once it is a "standard" for some
value of "standard".  (They have said summer '07)

Our approach is that we don't care about chicken's or eggs, we just love a
nice chicken omlete.  :)

-Jot
-- 
Jot Powers <[EMAIL PROTECTED]>
Phone: 480-862-7234Cell: 480-221-1157
Skype: jotebay

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-14 Thread Eliot Lear

Jot,

The overview isn't keeping DKIM from the world.  In fact you guys can 
sign today, if you don't already (haven't checked).  The real question 
for me now is simply this: will those people who are writing the 
overview now commit to updating it after SSP is complete?  And I for one 
want to see SSP complete quickly.


Eliot
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-14 Thread Dave Crocker



Eliot Lear wrote:

Jot,

The overview isn't keeping DKIM from the world.  In fact you guys can 
sign today, if you don't already (haven't checked).  


Eliot, you are, of course, correct.  But that rather misses the point.

The point is what will facilitate adoption.  (Why is it that the IETF works so 
hard to ignore adoption issues, as we think merely publishing a document is 
the end of the task?)


The Overview document, approximately in its current form (IMO), can be 
extremely helpful for the rest of the community, to understand DKIM and make 
deployment and use decisions about it.



> The real question
for me now is simply this: will those people who are writing the 
overview now commit to updating it after SSP is complete?  And I for one 
want to see SSP complete quickly.


Whether the current document is "updated", or a new document is written, or an 
overview section in the SSP specification itself is added strikes me as a 
decision to make at the time we need the additional writing.


I'm certainly happy to commit to putting in the effort to make sure there is 
text of an overview style for SSP.


d/
--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-14 Thread Michael Thomas

Powers, Jot wrote:

On 3/12/07 5:43 AM, "Tony Hansen" <[EMAIL PROTECTED]> scribbled:


In other words, would folks prefer to:

A. Expedite publishing the Overview documents, in order to facilitate
development and deployment of the -base specification (with an update
later on for SSP), or


+1


B. Defer the Overview document until the SSP specification is complete.


As the largest phishing target out there, we're interested in having DKIM be
out there as soon as possible, without waiting for SSP, because even "fast"
for the IETF process isn't particularly speedy, whereas spammers and
phishers are.


Not to pick on Jot, but this is very illustrative of why putting
-overview in the path right now may be very counter-productive.
-Base *is* done. Waiting for -overview is *not* required. The
best possible wait time is the zero you can do by reading -base
right now and deploying it.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-14 Thread Powers, Jot
On 3/12/07 5:43 AM, "Tony Hansen" <[EMAIL PROTECTED]> scribbled:

> In other words, would folks prefer to:
> 
> A. Expedite publishing the Overview documents, in order to facilitate
> development and deployment of the -base specification (with an update
> later on for SSP), or

+1

> B. Defer the Overview document until the SSP specification is complete.

As the largest phishing target out there, we're interested in having DKIM be
out there as soon as possible, without waiting for SSP, because even "fast"
for the IETF process isn't particularly speedy, whereas spammers and
phishers are.

-Jot
-- 
Jot Powers <[EMAIL PROTECTED]>
Phone: 480-862-7234Cell: 480-221-1157
Skype: jotebay

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-14 Thread Charles Lindsey

On Mon, 12 Mar 2007 12:43:58 -, Tony Hansen <[EMAIL PROTECTED]> wrote:


In other words, would folks prefer to:




B. Defer the Overview document until the SSP specification is complete.


+1

--
Charles H. Lindsey -At Home, doing my own thing
Tel: +44 161 436 6131   
   Web: http://www.cs.man.ac.uk/~chl

Email:[EMAIL PROTECTED]: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9  Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-13 Thread Michael Thomas

Dave Crocker wrote:
The -base document does not provide a general systems-framework for 
understanding the role of -base, because that was not a goal for -base. 
-overview provides that framework.


More generally, the deployment of security-related protocols has a long 
history of being problematic.  Understanding why and how DKIM is a 
credible mechanism, in the face of that problematic history, also is not 
something -base was intended to provide, since it is a specification 
rather than a tutorial.  On the other hand, -base does help with that 
understanding.


Given the disagreements with how people view dkim as being used in
reality, I'd suggest that a dose of reality may be required before
the overview you seek has any chance at consensus. I've already seen
-overview being misconstrued by the Mailman folks to strip signatures
given some editorializing about that subject. And we know what happens
when we talk about those disagreements.

I've been a proponent for a DKIM BCP for a long time. I think that is
where -overview fits in, and it will make a huge amount of sense when
we actually have enough experience to make a BCP -- and that goes for
SSP as well. As it currently stands, there is far too much room for
speculation so I think it is pretty much a waste of time to be going
over the same set of arguments that we didn't overcome the last time.

As far as the hand-wringing about -base not being enough.. I just don't
buy it. We have a lot of implementations and deployments (esp. counting
DK) even with the paucity of overview material. So that's not the
problem. Nor does not doing -overview now prevent writing DKIM
evangelizing articles/papers/etc that fill that gap -- with as much
speculation as the author feels like dreaming up. So that's not the
problem either. So what is the problem that -overview is trying to
solve that _requires_ official IETF status *right now*?

Mike

Mike



And so on...

Deployment is not a technical issue, so much as a management decision 
issue.


-Base is not intended to help decision makers or designers of the 
framework into which DKIM will fit.  The -Overview document is intended 
to help with this.


For anyone who is serious about wanting to get DKIM used, I would think 
that they would want it used sooner, rather than later.  Anything that 
will facilitate the 'sooner' ought to be a straightforward choice.


In particular, I do not understand the idea of delaying something that 
can be of significant use for early-stage -base adoption, and waiting 
for some unknown moment in the problematic future, when SSP might 
eventually converge and get approved.


d/


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-13 Thread Hector Santos

Jeff Macdonald wrote:

On Tue, Mar 13, 2007 at 10:01:03AM -0700, J.D. Falk wrote:

On 2007-03-12 16:51, Hector Santos wrote:

I tend to side with the high probability that blindly signing MAIL in a 
DKIM-BASE only manner (with no helper support, and I presume you are 
just against SSP, not other kind of helpers, like DAC or some other yet 
to be established reputation helper)
Hmm, not sure who you're arguing with here -- can't be me, I'm not 
against SSP.  Never have been.  I just don't think it's a good idea to 
continue telling the world that DKIM isn't ready.


I don't think the 'world' understands that DKIM is just a building
block.


I don't think the "world" understands that a building block does not 
mean it is a public consumption technology without the helper blocks.


In fact, putting out a "building block" before it the required parts are 
ready can do more harm than good.


The easiest issue to envision is that this can build a new legacy market 
of "DKIM-BASE" systems that now the receiver has to deal with.


Lets say you finally (by you, I am speaking in general), finally realize 
that DKIM-BASE by itself, although theoretically usable, it is not 
practical to be used on its own.  You realize you need something else 
before you can turn it on.


What then?  What are the rules for the receiver?

  - Support DKIM-BASE only systems?
  - Don't Support DKIM-BASE only systems?

This is exactly the same problem that the industry evolved to over the 
past two decades and what has brought us together here.   The problem is 
dealing with the legacy market of old SMTP systems and how the bad guys 
use this to gain entry into systems.  If that wasn't the problem then we 
would have FULL control of all anonymous transactions.


So by drinking your wine before its time, we risk wasting the potential 
of a promising technology being forced into the market place before 
essential elements are at the very least, settled for final development.


I'm not against DKIM-BASE. I'm against premature decisions that will 
ruin it.


--
HLS

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-13 Thread Hector Santos

J.D. Falk wrote:

On 2007-03-12 16:51, Hector Santos wrote:

I tend to side with the high probability that blindly signing MAIL in 
a DKIM-BASE only manner (with no helper support, and I presume you are 
just against SSP, not other kind of helpers, like DAC or some other 
yet to be established reputation helper)


Hmm, not sure who you're arguing with here -- can't be me, I'm not 
against SSP.  Never have been.  I just don't think it's a good idea to 
continue telling the world that DKIM isn't ready.


We can probably drive a car with just the frame, engine, wheels, etc but 
no body yet and get good use of it.  You will be exposed to the elements 
of the world during the process of using it, but its usable.  Some 
people won't care and some people actually like the eating bugs.   Some 
will be excited to have it now.  However, I'm sure most people will 
prefer that there was "added security,"  "a helper,",  "a wrapper,"  "a 
blanket,"  "a body" that helps protects you from the elements.


So is the frame ready?  Sure, 100%, it still has its kinks. But is it 
ready.  I don't think anyone disputes that.


But is it ready for public consumption?  Has all the engineering been 
worked out so that its SAFE to be used in the public?  Does it present 
any liability issues?  Is an early release better with the risk of 
creation a wide tertiary market of "different helper" systems in the 
name of getting exposure and experience with this "frame-" work., or is 
better to have an augmenting IETF standard helper technology?


--
HLS



___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-13 Thread Dave Crocker



Jeff Macdonald wrote:

I don't think the 'world' understands that DKIM is just a building
block.



That is one of the reasons for wanting to get the Overview document out 
sooner, rather than later.


d/

--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-13 Thread Jeff Macdonald
On Tue, Mar 13, 2007 at 10:01:03AM -0700, J.D. Falk wrote:
> On 2007-03-12 16:51, Hector Santos wrote:
> 
> >I tend to side with the high probability that blindly signing MAIL in a 
> >DKIM-BASE only manner (with no helper support, and I presume you are 
> >just against SSP, not other kind of helpers, like DAC or some other yet 
> >to be established reputation helper)
> 
> Hmm, not sure who you're arguing with here -- can't be me, I'm not 
> against SSP.  Never have been.  I just don't think it's a good idea to 
> continue telling the world that DKIM isn't ready.

I don't think the 'world' understands that DKIM is just a building
block.



-- 
:: Jeff Macdonald | Principal Engineer, Messaging Technologies
:: e-Dialog | [EMAIL PROTECTED]
:: 131 Hartwell Ave. | Lexington, MA 02421 
:: v: 781-372-1922 | f: 781-863-8118 
:: www.e-dialog.com

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-13 Thread J.D. Falk

On 2007-03-12 16:51, Hector Santos wrote:

I tend to side with the high probability that blindly signing MAIL in a 
DKIM-BASE only manner (with no helper support, and I presume you are 
just against SSP, not other kind of helpers, like DAC or some other yet 
to be established reputation helper)


Hmm, not sure who you're arguing with here -- can't be me, I'm not 
against SSP.  Never have been.  I just don't think it's a good idea to 
continue telling the world that DKIM isn't ready.


--
J.D. Falk, Anti-Spam Product Manager
Yahoo! Mail
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-13 Thread Dennis Dayman

Jeff Macdonald wrote:

On Mon, Mar 12, 2007 at 08:43:58AM -0400, Tony Hansen wrote:
  

In other words, would folks prefer to:

A. Expedite publishing the Overview documents, in order to facilitate
development and deployment of the -base specification (with an update
later on for SSP), or


+1

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-13 Thread Jeff Macdonald
On Mon, Mar 12, 2007 at 08:43:58AM -0400, Tony Hansen wrote:
> In other words, would folks prefer to:
> 
> A. Expedite publishing the Overview documents, in order to facilitate
> development and deployment of the -base specification (with an update
> later on for SSP), or

+1


-- 
:: Jeff Macdonald | Principal Engineer, Messaging Technologies
:: e-Dialog | [EMAIL PROTECTED]
:: 131 Hartwell Ave. | Lexington, MA 02421 
:: v: 781-372-1922 | f: 781-863-8118 
:: www.e-dialog.com

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-12 Thread Jim Fenton

Eric Allman wrote:



--On March 12, 2007 8:43:58 AM -0400 Tony Hansen <[EMAIL PROTECTED]> wrote:


In other words, would folks prefer to:

A. Expedite publishing the Overview documents, in order to
facilitate development and deployment of the -base specification
(with an update later on for SSP), or

B. Defer the Overview document until the SSP specification is
complete.


B.  But I think I'm going against the flow.


+1.  I'd like to focus on SSP, but wouldn't rule out a draft (which 
wouldn't be published as an RFC) that contains deployment guidance in 
the interim.


-Jim
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-12 Thread Hector Santos

J.D. Falk wrote:

On 2007-03-12 11:05, Steve Atkins wrote:


On Mar 12, 2007, at 10:34 AM, Wietse Venema wrote:


Tony Hansen:

However, I'd like to hear some discussion on the issue: Should we put
out a version now (without the SSP references), or hold off until  
SSP is totally finished?


I would not wait with an Overview document until SSP is ready for
prime time. I would encourage deployment of DKIM-base now so that
we can gain useful experience.


+1


+1


We're also more likely to get DKIM widely deployed before there's much
real-world experience with SSP than after.


SSP is pointless if it scares everyone away from deploying DKIM at all.


It is totally ironic that there come could be two opposite viewpoints. 
Of course, one of us is going to be proven wrong. :-).


I tend to side with the high probability that blindly signing MAIL in a 
DKIM-BASE only manner (with no helper support, and I presume you are 
just against SSP, not other kind of helpers, like DAC or some other yet 
to be established reputation helper), will not only open the door for 
DOMAIN reputation damage but make DKIM as useless as the NO POLICY DRIVE 
DOMAINKEYS currently is in the wide public open market place.


If there is any proof that a DKIM-BASE only concept will be proven to be 
worthless (not widely adopted across the board),  all anyone has to do 
is look are DOMAINKEYS.


I take the position that if this issues are known as they are today and 
we fail to do something about it, then we acted irresponsibly.


--
HLS

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-12 Thread Dave Crocker





I would not wait with an Overview document until SSP is ready for
prime time. I would encourage deployment of DKIM-base now so that
we can gain useful experience.
  

I sure hope that -overview is not looked upon as a necessary ingredient
for developing/deploying -base. Because I don't think it is.



In order to decide to deploy -base, one must understand not only its details, 
but the context in which it is supposed to operate.


The -base document does not provide a general systems-framework for 
understanding the role of -base, because that was not a goal for -base. 
-overview provides that framework.


More generally, the deployment of security-related protocols has a long 
history of being problematic.  Understanding why and how DKIM is a credible 
mechanism, in the face of that problematic history, also is not something 
-base was intended to provide, since it is a specification rather than a 
tutorial.  On the other hand, -base does help with that understanding.


And so on...

Deployment is not a technical issue, so much as a management decision issue.

-Base is not intended to help decision makers or designers of the framework 
into which DKIM will fit.  The -Overview document is intended to help with this.


For anyone who is serious about wanting to get DKIM used, I would think that 
they would want it used sooner, rather than later.  Anything that will 
facilitate the 'sooner' ought to be a straightforward choice.


In particular, I do not understand the idea of delaying something that can be 
of significant use for early-stage -base adoption, and waiting for some 
unknown moment in the problematic future, when SSP might eventually converge 
and get approved.


d/
--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-12 Thread J.D. Falk

On 2007-03-12 11:05, Steve Atkins wrote:


On Mar 12, 2007, at 10:34 AM, Wietse Venema wrote:


Tony Hansen:

However, I'd like to hear some discussion on the issue: Should we put
out a version now (without the SSP references), or hold off until  
SSP is totally finished?


I would not wait with an Overview document until SSP is ready for
prime time. I would encourage deployment of DKIM-base now so that
we can gain useful experience.


+1


+1


We're also more likely to get DKIM widely deployed before there's much
real-world experience with SSP than after.


SSP is pointless if it scares everyone away from deploying DKIM at all.

--
J.D. Falk, Anti-Spam Product Manager
Yahoo! Mail
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-12 Thread Eric Allman



--On March 12, 2007 8:43:58 AM -0400 Tony Hansen <[EMAIL PROTECTED]> wrote:


In other words, would folks prefer to:

A. Expedite publishing the Overview documents, in order to
facilitate development and deployment of the -base specification
(with an update later on for SSP), or

B. Defer the Overview document until the SSP specification is
complete.


B.  But I think I'm going against the flow.

eric

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-12 Thread Paul Hoffman

At 1:34 PM -0400 3/12/07, Wietse Venema wrote:

I would not wait with an Overview document until SSP is ready for
prime time. I would encourage deployment of DKIM-base now so that
we can gain useful experience.


+1

--Paul Hoffman, Director
--Domain Assurance Council
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


RE: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-12 Thread Hallam-Baker, Phillip
Having spent a day reading through the draft from start to finish I think it is 
hard to see how to untangle the two. 

Policy is a major motivation behind a lot of what is in the overview. 

> -Original Message-
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of Michael Thomas
> Sent: Monday, March 12, 2007 1:57 PM
> To: Wietse Venema
> Cc: ietf-dkim@mipassoc.org
> Subject: Re: [ietf-dkim] Re: I-D 
> ACTION:draft-ietf-dkim-overview-04.txt
> 
> Wietse Venema wrote:
> > Tony Hansen:
> >   
> >> However, I'd like to hear some discussion on the issue: 
> Should we put 
> >> out a version now (without the SSP references), or hold 
> off until SSP 
> >> is totally finished?
> >> 
> >
> > I would not wait with an Overview document until SSP is ready for 
> > prime time. I would encourage deployment of DKIM-base now 
> so that we 
> > can gain useful experience.
> >   
> I sure hope that -overview is not looked upon as a necessary 
> ingredient for developing/deploying -base. Because I don't 
> think it is.
> 
> My preference is to wait and have one document that covers both.
> 
>Mike
> ___
> NOTE WELL: This list operates according to 
> http://mipassoc.org/dkim/ietf-list-rules.html
> 

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


RE: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-12 Thread Hallam-Baker, Phillip
I don't think we need to agree on the policy implementation to get overview out.

We do have to have agreement on the requirements. 

> -Original Message-
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of Wietse Venema
> Sent: Monday, March 12, 2007 1:34 PM
> To: ietf-dkim@mipassoc.org
> Subject: Re: [ietf-dkim] Re: I-D 
> ACTION:draft-ietf-dkim-overview-04.txt
> 
> Tony Hansen:
> > However, I'd like to hear some discussion on the issue: 
> Should we put 
> > out a version now (without the SSP references), or hold off 
> until SSP 
> > is totally finished?
> 
> I would not wait with an Overview document until SSP is ready 
> for prime time. I would encourage deployment of DKIM-base now 
> so that we can gain useful experience.
> 
>   Wietse
> ___
> NOTE WELL: This list operates according to 
> http://mipassoc.org/dkim/ietf-list-rules.html
> 

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-12 Thread Steve Atkins


On Mar 12, 2007, at 10:34 AM, Wietse Venema wrote:


Tony Hansen:

However, I'd like to hear some discussion on the issue: Should we put
out a version now (without the SSP references), or hold off until  
SSP is

totally finished?


I would not wait with an Overview document until SSP is ready for
prime time. I would encourage deployment of DKIM-base now so that
we can gain useful experience.


+1

We're also more likely to get DKIM widely deployed before there's much
real-world experience with SSP than after.

Cheers,
  Steve

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-12 Thread Michael Thomas

Wietse Venema wrote:

Tony Hansen:
  

However, I'd like to hear some discussion on the issue: Should we put
out a version now (without the SSP references), or hold off until SSP is
totally finished?



I would not wait with an Overview document until SSP is ready for
prime time. I would encourage deployment of DKIM-base now so that
we can gain useful experience.
  

I sure hope that -overview is not looked upon as a necessary ingredient
for developing/deploying -base. Because I don't think it is.

My preference is to wait and have one document that covers both.

  Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-12 Thread Wietse Venema
Tony Hansen:
> However, I'd like to hear some discussion on the issue: Should we put
> out a version now (without the SSP references), or hold off until SSP is
> totally finished?

I would not wait with an Overview document until SSP is ready for
prime time. I would encourage deployment of DKIM-base now so that
we can gain useful experience.

Wietse
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-12 Thread Hector Santos

Hi Tony,

My technical and "product attraction" opinion is:

The original scope (SSP) was on track with addressing with what I 
believe were the most marketable features of the product:


   - High benefits for exclusive domain policies
   - High benefits in exposing the nature of domain usage

As a product producer, this is how I am going to be able to "help" the 
"world of domains" outside my own control. It is what I see my customers 
will desire, and at the same time, as a USER of the product, I would 
like to also protect my own domains being exploited and used at other 
compatible DKIM/SSP systems out there. I would rather that they honor 
our DKIM/SSP own policies.


We are simply not going to protect the entire spectrum of DKIM with no 
or flexible SSP policies.   But we can MOST definitely address domains 
(HIGH VALUE or not, but HIGH VALUE will probably be most interested) 
with "tigher" policies who simply do not expect MIDDLE WARE and/or LIST 
SERVERS to be "touching" or passing thru such mediums.


In effect, we want to provide "increased assurances" to the domains 
wanting to increase security value with direct communications with their 
end-users and target recipients.


In short, speaking as one vendor, we will not expose our customers with 
a "out of the box" DKIM solution until we have a SSP or similar concept 
wrapper concept.  I see absolutely no value in a DKIM-BASE only system 
and in fact, could hurt more than it helps and the longer DKIM-BASE is 
used and ignored, the more it becomes obsolete.


So if all possible, I "vote" for concurrent (or near) release of both 
specs, whatever that means in terms of IETF. I think Jim Fenton's 
updated SSP-03 is good enough to start and it covers the "features" that 
I outlined in my own (now expired) draft DSAP which was strategically 
written to simply highlight the concerns.  With that, I support SSP-03 
rather than continue with DSAP.


--
HLS


Tony Hansen wrote:

[EMAIL PROTECTED] wrote:

A New Internet-Draft is available from the on-line Internet-Drafts
directories.

Title   : DomainKeys Identified Mail (DKIM) Message
  Signing Service Overview


As you read through this, you will find that the stuff in it dealing
with SSP is only part way there. This is hardly unsuprising since SSP
itself is only part where there.

An outstanding issue from the last IETF was (quoting the minutes):

Tony Hansen reviewed the status of the DKIM Overview document,
and we got another "hum" from the room about preference to put
the document out soon, to aid implementations of the DKIM base,
with a possible second version later, covering subsequent
topics...  or to publish the overview document only after the
working group completes (or largely completes) the rest of its
work.  The consensus was again not overwhelming, and was
marginally in favour of publishing a first version now.

Given the lukewarm consensus before about publishing this document now
versus later, we didn't push hard one way or the other for the latest
update.

However, I'd like to hear some discussion on the issue: Should we put
out a version now (without the SSP references), or hold off until SSP is
totally finished?

Tony Hansen
[EMAIL PROTECTED]
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html






___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-12 Thread Eliot Lear

Tony Hansen wrote:

In other words, would folks prefer to:

A. Expedite publishing the Overview documents, in order to facilitate
development and deployment of the -base specification (with an update
later on for SSP), or

B. Defer the Overview document until the SSP specification is complete.


B.  I would rather see us put all of our efforts into concluding work on 
SSP.  Any distraction from that adds no functionality and will simply 
require revision when SSP is eventually complete, thus making more work.


Eliot
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] Re: I-D ACTION:draft-ietf-dkim-overview-04.txt

2007-03-12 Thread Tony Hansen
In other words, would folks prefer to:

A. Expedite publishing the Overview documents, in order to facilitate
development and deployment of the -base specification (with an update
later on for SSP), or

B. Defer the Overview document until the SSP specification is complete.

Tony Hansen
[EMAIL PROTECTED]

Tony Hansen wrote:
> [EMAIL PROTECTED] wrote:
>> A New Internet-Draft is available from the on-line Internet-Drafts
>> directories.
>>
>>  Title   : DomainKeys Identified Mail (DKIM) Message
>>Signing Service Overview
> 
> As you read through this, you will find that the stuff in it dealing
> with SSP is only part way there. This is hardly unsuprising since SSP
> itself is only part where there.
> 
> An outstanding issue from the last IETF was (quoting the minutes):
> 
>   Tony Hansen reviewed the status of the DKIM Overview document,
>   and we got another "hum" from the room about preference to put
>   the document out soon, to aid implementations of the DKIM base,
>   with a possible second version later, covering subsequent
>   topics...  or to publish the overview document only after the
>   working group completes (or largely completes) the rest of its
>   work.  The consensus was again not overwhelming, and was
>   marginally in favour of publishing a first version now.
> 
> Given the lukewarm consensus before about publishing this document now
> versus later, we didn't push hard one way or the other for the latest
> update.
> 
> However, I'd like to hear some discussion on the issue: Should we put
> out a version now (without the SSP references), or hold off until SSP is
> totally finished?
> 
>   Tony Hansen
>   [EMAIL PROTECTED]

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html