[pfx] Re: Fwd: [S-announce] [ANN]ounce of s-dkim-sign v0.6.1

2024-05-13 Thread Steffen Nurpmeso via Postfix-users
Wietse Venema via Postfix-users wrote in
 <20240513204918.ga80...@spike.porcupine.org>:
 |This discussion seems of-topic for the postfix-users mailing list.

Yes, i apologise, and am silent now.

 |If you feel strongly about how email is authenticated, I suggest
 |that you join the relevant working group discussions while the
 |details are still mutable. Complaining about the final result is
 |too late, and publishing non-interoperable tech is unproductive.
 |
 |Frankly, I don't care how a digital signature is computed as long
 |as it is clear what it does and does not protect. All algorithms
 |will eventually become obsolete, though it may take 20 years. There
 |will be an opportunity to replace a bad algorithm with a better or
 |worse one.

Only to add that Matthieu Herrb, a (pretty widely known, decade
long) developer of OpenBSD and the freedesktop space, posted on
openbsd-ports@

  While on the subject :  https://16years.secvuln.info/

  The old Debian OpenSSL bug from 2006 still haunts DKIM signatures today

Unfortunately Google and Microsoft (and IETF etc etc) do not move
on to RFC 8463.  If they will not have done until fall i will try
to get the slim two digest variant of ed25519 through.

--steffen
|
|Der Kragenbaer,The moon bear,
|der holt sich munter   he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: Fwd: [S-announce] [ANN]ounce of s-dkim-sign v0.6.1

2024-05-13 Thread Wietse Venema via Postfix-users
This discussion seems of-topic for the postfix-users mailing list.
If you feel strongly about how email is authenticated, I suggest
that you join the relevant working group discussions while the
details are still mutable. Complaining about the final result is
too late, and publishing non-interoperable tech is unproductive.

Frankly, I don't care how a digital signature is computed as long
as it is clear what it does and does not protect. All algorithms
will eventually become obsolete, though it may take 20 years. There
will be an opportunity to replace a bad algorithm with a better or
worse one.

Wietse
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org


[pfx] Re: Fwd: [S-announce] [ANN]ounce of s-dkim-sign v0.6.1

2024-05-13 Thread Steffen Nurpmeso via Postfix-users
postfix-users@postfix.org wrote in
 :
 |On Sun, May 12, 2024 at 03:59:27AM +0200, Steffen Nurpmeso via Postfix-u\
 |sers wrote:
 ...
 |>   v0.6.1, 2024-05-12:
 |> - Adds the algorithm big_ed-sha256 which effectively is RFC 8463
 |>   (aka ed25519-sha256), but performs three digest operations where
 |>   only two are needed.
 |>   We keep our two-digest ed25519-sha256 "as-is".
 |>   (If the big players do not start to support RFC 8463 by fall 2024,
 |>   i will propose a draft xed25519-sha256 which changes the algorithm
 |>   accordingly.)
 |> 
 |> Ie, the ed25519 keys etc can remain the same and everything, but
 ...
 |This is not a productive direction.  Please implement only algorithms
 |that are specified in a published standards track RFC.  Nobody benefits
 |from ad-hoc non-interperable DKIM signature schemes that just create
 |confusion.

Hm, from my very short look it seemed rspamd has a lot of such
things, if i recall correctly.  At least code-wise.

 |Your "big_ed-sha256" is just a correct implementation of "ed25519-sha256",
 |and should be the only choice offered.

In my humble opinion though RFC 8463 is a mess.  Just like most of
the IETF email additions since 2010.  "Throw it all into the
trashbin".
Maybe you can even get Argon2id-sha256 from the rspamd author if
you ask for it, shall it not already be there.  (You have to live
with ascii_isspace() still.)  No.  You do not need three digests.
If you have a modern algorithm that digests itself, why would you
digest in addition?  I mean you can, of course, but why would you
want to.  The DKIM RFC speaks upon digesting the message, the
algorithm does it.  Where is the problem?

No, the problem is what i quoted on the IETF list, you can see

/* For GCrypt, and for EC, we pass the hash-of-headers to the signing
routine.  For anything else we just pass the headers. */

in one MTA, or

  static int sephash = 0;
  ...
#ifdef HAVE_ED25519
} else if (strncmp(optarg, "ed25519-", 8) == 0) {
hashalg = optarg + 8;
cryptalg = "ed25519";
keyid = EVP_PKEY_ED25519;
sephash = 1;
#endif
  ...[and you do not want to see the rest]

in another filter, and more, and all that.  RFC 8463 introduces
spaghetti, all over the place.  That is plain fact.  For
absolutely no reason even.  It gives a shit about code quality.
It is a brain fucker.  It does exactly what the OpenPGP WG turmoil
is all about, and what caused RePGP -- like many other IETF email
additions of the last decade.  And have a go, look at the code of
some of the speaking participants of the IETF email lists.  At the
very least, you will find those preprocessor djungles that the
real good ones from Bell Labs etc tried to get rid off.  No!

Ie on the dash shell list hosted by the linux kernel people you
get three authentication-results headers for each of whatever
(SPF, DKIM, 'forgotten the rest).  No, fold it into your DKIM
flags, where is the difference in between for example d/D (DKIM
fail/pass), s/S (SPF), ..etc.. and that.  Maybe introduce
a DKIM-Store: that should not be sent over "egress" / always be
removed on "ingress" for the purpose of handing info from the
ingress verifiers to the egress signers, with totally free content
(but "should be crypto-verifiable"), etc.  To give it a name, to
be able to filter it, whatever.  For automated processing, that is
more than sufficient.  For example.  No ARC header at all.
I have one!

  Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) 
header.d= header.i=* header.b=""
  X-Original-To:..
  Received:..
  Authentication-Results: smtp.subspace.kernel.org; arc=none 
smtp.client-ip=***
  Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none 
dis=none) header.from=
  Authentication-Results: smtp.subspace.kernel.org; spf=pass 
smtp.mailfrom=

Oh my god.  I will fight that mess to the second last breath.
I am not keen about log- or statistical masturbation orgies.  But
you could still get it nonetheless i think, if you just believe
the Received: lines before the DKIM signature, .. no?

On the other hand one of this list's members showed me something
juristic on email forwarders, it seems in Germany the situation
for universities and these kind of corpus regarding offering
stable email addresses that forward to other emails is
juristically determined to be illegal.  That was from 2015.  It
does not take into account the original email hop-to-hop
infrastructure, it does not take into account that SMTP is by
itself not encrypted (due to bad IETF decisions, again, and again,
in my opinion), it does not simply say, "hey, simply S/MIME
encapsulate before the forward by some easily produced per-user
self-signed-certificate (showing OpenSSL command, hihihi), and
ignore all the remaining ten thousand pages".  
Anyhow.  How 

[pfx] Re: Fwd: [S-announce] [ANN]ounce of s-dkim-sign v0.6.1

2024-05-11 Thread Viktor Dukhovni via Postfix-users
On Sun, May 12, 2024 at 03:59:27AM +0200, Steffen Nurpmeso via Postfix-users 
wrote:

> Well here i am indeed back again, to announce
> 
>   v0.6.1, 2024-05-12:
> - Adds the algorithm big_ed-sha256 which effectively is RFC 8463
>   (aka ed25519-sha256), but performs three digest operations where
>   only two are needed.
>   We keep our two-digest ed25519-sha256 "as-is".
>   (If the big players do not start to support RFC 8463 by fall 2024,
>   i will propose a draft xed25519-sha256 which changes the algorithm
>   accordingly.)
> 
> Ie, the ed25519 keys etc can remain the same and everything, but
> in order to generate ed25519 keys as of RFC 8463, use
> "key big_ed-sha256" instead of "key ed25519-sha256".
> This gives DKIM success for you.

This is not a productive direction.  Please implement only algorithms
that are specified in a published standards track RFC.  Nobody benefits
from ad-hoc non-interperable DKIM signature schemes that just create
confusion.

Your "big_ed-sha256" is just a correct implementation of "ed25519-sha256",
and should be the only choice offered.

-- 
Viktor.
___
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org