Re: [dmarc-ietf] the painful issue of SPF HELO

2015-01-27 Thread Hector Santos
On 1/25/2015 10:03 AM, Anne Bennett wrote: Hector Santos hsan...@isdg.net: DMARC uses the result of SPF authentication of the MAIL FROM identity. Does that mean it gets return-path from the Authentication-Result: header? or the Return-Path:, Sender: headers? It doesn't say how it gets

Re: [dmarc-ietf] the painful issue of SPF HELO

2015-01-24 Thread Hector Santos
On 1/23/2015 8:29 PM, Murray S. Kucherawy wrote: For reasons not worth getting into now, this version of the base specification is on track to be published not as a standard but as an Informational document, kind of as a handoff step between the team that first developed DMARC and the IETF,

Re: [dmarc-ietf] update on dmarc from a mailing list USER'S perspective?

2015-01-24 Thread Hector Santos
On 1/24/2015 6:08 AM, eugene hayhoe wrote: As an IT non-professional (in every sense of the word, I only joined this group out of frustration at no longer having reliable access to several email lists I had enjoyed for years previously, in an attempt to understand WHY that was so) VERY

Re: [dmarc-ietf] ... and two more tiny nits, while I'm at it

2015-01-17 Thread Hector Santos
I have two concerns. It seems you jumped the gun to accept the RFC 4408 obsolete idea. Is 7208 backward compatible or not? Does DMARC require 7208 operations or 4408 operations? And is this -12 publication worthy of even considering for implementation? Or should we wait for the more solid

Re: [dmarc-ietf] DMARC and Bounces (was: Indirect Mail Flows)

2014-11-30 Thread Hector Santos
On 11/29/2014 7:04 AM, José Ferreira wrote: Like is said, they are rare but important. And some domain owners may not adopt p=reject for that reason. Jose Borges Ferreira Domains that publish a p=reject and don 't understand its possible outcomes, shouldn't be our (IETF protocol standards

Re: [dmarc-ietf] milestone 1 *almost* done

2014-11-25 Thread Hector Santos
On 11/21/2014 12:56 PM, Tim Draegen wrote: WG, The work found here: http://trac.tools.ietf.org/wg/dmarc/trac/wiki/MilestoneOneWiki ..is almost complete. However, there is a note (reinforced by feedback during the recent in-person meeting) to recast the collected issues in terms of RFC 5598.

Re: [dmarc-ietf] draft-kucherawy-dmarc-base feedback

2014-11-09 Thread Hector Santos
On 11/8/2014 8:29 PM, Franck Martin wrote: Note that an email with no RFC 5322 field is not valid, as well as one with more than 1. This header is mandatory as well as the Date header. These are the only 2 headers mandatory in an email. So rejecting an email with no RFC 5322 or more than one

Re: [dmarc-ietf] draft-kucherawy-dmarc-base feedback

2014-11-09 Thread Hector Santos
On 11/9/2014 4:19 AM, Franck Martin wrote: I'm not talking on how many mailboxes/domain there are in this header It would be wrong to assume SMTP will reject messages based on possible RFC5322 violations. While SMTP implementations have been lenient, they have been lenient in a way which

Re: [dmarc-ietf] wiki vs. list?

2014-10-28 Thread Hector Santos
On 10/28/2014 4:16 PM, Brett McDowell wrote: Brett McDowell wrote: I suspect there was a purpose for that argument that might still be relevant to our work even though the argument doesn’t seem to be supported, but I’m not seeing it yet. Hector Santos hsan...@isdg.net wrote: Thats

Re: [dmarc-ietf] wiki vs. list?

2014-10-26 Thread Hector Santos
On 10/26/2014 10:10 AM, Murray S. Kucherawy wrote: On Fri, Oct 24, 2014 at 2:17 PM, Stephen J. Turnbull step...@xemacs.org wrote: Hector Santos writes: POLICY has been reestablished as the DKIM framework long ago. I have no clue what this sentence means. What is POLICY? What is the DKIM

Re: [dmarc-ietf] wiki vs. list?

2014-10-23 Thread Hector Santos
I'm already lost of whats going on. It seems we are waiting of Murray. Its all Murray. Geez, Its all really Murray's framework to all this. Not a negative, but there has to be more. There is more. There has always been more, that is why we are lost here after 9 years. We need policy and we

Re: [dmarc-ietf] Modeling MLM behavior

2014-10-07 Thread Hector Santos
. Have a good day Stephen -- Hector Santos http://www.santronics.com On 10/6/2014 10:29 PM, Stephen J. Turnbull wrote: Hector Santos writes: The 2006 DSAP draft section 3.3 Mailing List Servers suggest some simple basic concepts that I believe is near universal. URL, please. I never heard

Re: [dmarc-ietf] Modeling MLM behavior

2014-10-07 Thread Hector Santos
permission to do so that all downlinks can verify. But then we will have a backward compatibility loophole. Thanks Murray. Have a good day. -- Hector Santos http://www.santronics.com On 10/6/2014 8:03 PM, Murray S. Kucherawy wrote: On Mon, Oct 6, 2014 at 4:15 PM, Hector Santos hsan...@isdg.net

Re: [dmarc-ietf] Additional List-foo Header Field To Help Mitigate Mailing List Damage

2014-09-14 Thread Hector Santos
it at a site because it is rewriting but he won't be able to use it at other sites and in not in general. -- Hector Santos http://www.santronics.com ___ dmarc mailing list dmarc@ietf.org https://www.ietf.org/mailman/listinfo/dmarc

Re: [dmarc-ietf] Additional List-foo Header Field To Help Mitigate Mailing List Damage

2014-09-13 Thread Hector Santos
On 9/13/2014 5:28 PM, Scott Kitterman wrote: I'm confident we're going to end up with a portfolio of mitigations, similar to what's in the Appendices of RFC 7208. I'm equally confident that despite the distaste many of us feel when we consider it, rewriting From in the MLM is going to be on the

Re: [dmarc-ietf] Indirect mail flows

2014-09-11 Thread Hector Santos
. This is not good mail engineering. I make no apology for having strong moral ethical feelings about it. -- Hector Santos http://www.santronics.com On Sep 9, 2014, at 11:44 PM, Stephen J. Turnbull step...@xemacs.org wrote: Derek Diget writes: How are such modifications RFC5321 compliant

Re: [dmarc-ietf] Indirect mail flows

2014-09-09 Thread Hector Santos
That is should be expected when people monkey around with long time mail infrastructure. Its a bad idea and sets a terrible precedent by alluding to the idea its normal. No its not normal. It will be exploited and probably its too late to put this one back if a few mailing list packages are

Re: [DNSOP] Last Call: draft-ietf-appsawg-nullmx-05.txt (A NULL MX Resource Record for Domains that Accept No Mail) to Proposed Standard

2014-07-27 Thread Hector Santos
On 7/25/2014 6:41 PM, Mark Andrews wrote: In message 53d2dbec.6060...@isdg.net, Hector Santos writes: We will need to tweak the code or the retry frequency table for this particular socket error, in this case 10061. To optimize, we will need to specifically look for three conditions

Re: [DNSOP] Last Call: draft-ietf-appsawg-nullmx-05.txt (A NULL MX Resource Record for Domains that Accept No Mail) to Proposed Standard

2014-07-25 Thread Hector Santos
On 7/25/2014 1:18 PM, Kevin Darcy wrote: I remain skeptical that the methodology in the draft, as written, requires no code changes, since I just performed a private experiment with a recent version of sendmail, and delivery failed in a spectacularly ugly way that made it appear much more like

Re: [DNSOP] Masataka Ohta's 2004 draft...

2014-07-23 Thread Hector Santos
On 7/23/2014 7:57 AM, Masataka Ohta wrote: David Conrad wrote: Since I mentioned it and some folks said where is it?: http://tools.ietf.org/html/draft-ietf-dnsop-ohta-shared-root-server-03 In what context, did you mention it? Masataka Ohta

Re: [dmarc-ietf] WG Review: Domain-based Message Authentication, Reporting Conformance (dmarc)

2014-07-20 Thread Hector Santos
On 7/20/2014 12:27 AM, Douglas Otis wrote: This is missing two citations that I thought were supposed to be included, since they touch on indirect email flows: Delegating DKIM Signing Authority - draft-kucherawy-dkim-delegate-00 DKIM Third-Party Authorization Label -

Re: [dmarc-ietf] Draft DMARC working group charter

2014-07-05 Thread Hector Santos
On 7/3/2014 11:04 PM, Pete Resnick wrote: As the working group develops solutions to deal with indirect mail flows, it will seek to maintain the end-to-end nature of existing identifier fields in mail, in particular avoiding solutions that require rewriting of originator fields. It is simply

Re: [dmarc-ietf] Draft DMARC working group charter

2014-07-02 Thread Hector Santos
So what are we looking for? A new RD effort? What about all the threat analysis and functional requirement design done (RFCs)? Does this suggest new or renewed signing authorization proposals are welcome? -- Hector Santos http://www.santronics.com On Jul 2, 2014, at 2:01 PM, Barry Leiba

Re: [dmarc-ietf] DKIM Forwarding History (Provenance) Proposal

2014-06-29 Thread Hector Santos
made into an STD document last year and already there is consideration in changing. Thanks -- Hector Santos http://www.santronics.com On Jun 28, 2014, at 8:01 PM, Wei Chuang wei...@google.com wrote: Hi Hector On Sat, Jun 28, 2014 at 8:22 AM, Hector Santos hsan...@isdg.net wrote: On 6/28

Re: [dmarc-ietf] DKIM Forwarding History (Provenance) Proposal

2014-06-28 Thread Hector Santos
On 6/28/2014 9:41 AM, Wei Chuang wrote: Note this isn't a full proposal as we would like the concept to be considered first. If this discussion is successful, we would like to also discuss a related improvement to SPF and DMARC, as well as the binary encoding change. At the conclusion we can

Re: [dmarc-ietf] Draft DMARC working group charter

2014-06-28 Thread Hector Santos
On 6/27/2014 3:26 PM, Jim Fenton wrote: There's a proto-wg called dbound thinking about this topic. Marc Blanchet and I are trying to write up a problem statement before the Toronto cutoff, so we can at least try and see if there is any agreement on what problem we're trying to solve. That's

Re: [dmarc-ietf] DMARC Lists - Minimal Change Set

2014-06-28 Thread Hector Santos
On 6/26/2014 9:13 PM, Chris Meidinger wrote: So two questions to the group: 1: Regardless of whether it has simply always been that way, could list operators forego modifying message bodies by adding footers? But will operators forgo adding footers for this as a standard practice? You

Re: [dmarc-ietf] it's a version bump no matter what you call it, was Fwd: New Version

2014-06-20 Thread Hector Santos
On 6/20/2014 12:13 AM, Stephen J. Turnbull wrote: Hector Santos writes: The DNS-based author domain defined policy is the only common approach we have now. To a man with a hammer, every problem looks like a nail. Yes, indeed, in this case, it is that simple -- Occam's razor. Quite

Re: [dmarc-ietf] it's a version bump no matter what you call it, was Fwd: New Version

2014-06-19 Thread Hector Santos
. -- Hector Santos http://www.santronics.com On Jun 19, 2014, at 12:49 PM, S Moonesamy sm+i...@elandsys.com wrote: Hi Matt, At 18:58 15-06-2014, Matt Simerson wrote: Yes, it does. But SA uses the results of Mail::DKIM heuristically and a DKIM failure is frequently not a sufficient basis

Re: [dmarc-ietf] it's a version bump no matter what you call it, was Fwd: New Version

2014-06-19 Thread Hector Santos
reputation method doesn't exist in practice for everyone to use. The DNS-based author domain defined policy is the only common approach we have now. -- Hector Santos http://www.santronics.com On Jun 19, 2014, at 2:45 PM, Murray S. Kucherawy superu...@gmail.com wrote: On Thu, Jun 19, 2014

Re: [dmarc-ietf] draft-levine-dkim-conditional-00

2014-06-16 Thread Hector Santos
On 6/16/2014 4:17 PM, John Levine wrote: Here's a draft that puts the forwarding thing into DKIM, with the dread version bump. It defines a general syntax for conditional signatures, with the forwarding signature the only condition defined so far. (Since you asked, new conditions don't need

Re: [dmarc-ietf] advice to MTAs

2014-06-14 Thread Hector Santos
On Jun 14, 2014, at 5:25 AM, Patrick Rauscher lis...@prauscher.de wrote: Hey, On Fri, 2014-06-13 at 22:35 -0400, Hector Santos wrote: Perhaps I'm oversimplifying, but it has seemed self-evident that you need a single identifier that is displayed to the end user and 5322.From

Re: [dmarc-ietf] Fwd: New Version Notification for draft-kucherawy-dkim-delegate-00.txt

2014-06-14 Thread Hector Santos
to be problem for me, you and most domains. Most domains are not going to need such scale or expect to be authorizing anyone else but themselves. Besides, we are talking software -- let it do the work. Personally, it's getting ridiculous. So much time being wasted. -- Hector Santos http

Re: [dmarc-ietf] advice to MTAs

2014-06-13 Thread Hector Santos
. And that comes from two key concepts, it was historically never expected to be altered (for any communication system past and present) and its the minimum default identity for replying. -- Hector Santos http://www.santronics.com ___ dmarc mailing list

Re: [dmarc-ietf] Fwd: New Version Notification for draft-kucherawy-dkim-delegate-00.txt

2014-06-11 Thread Hector Santos
On 6/11/2014 4:58 PM, Murray S. Kucherawy wrote: One thing that is missing (and there's a placeholder for it) is examples so you can see how it works. I'll make sure that's there for -01. Examples are good. Can we work it out here, a software walkthru? Save some drafting time. The

Re: [dmarc-ietf] Change the mailing list protocol, not DMARC.

2014-06-10 Thread Hector Santos
On 6/10/2014 9:55 AM, Stephen J. Turnbull wrote: Hector Santos writes: Are you oppose to any other domain using strong policies or just certain ones? Domains where users have until now felt free to use their mailboxes as they see fit (posting to mailing lists, as From: in on-behalf

Re: [dmarc-ietf] Change the mailing list protocol, not DMARC.

2014-06-10 Thread Hector Santos
On 6/10/2014 6:55 PM, Dave Warren wrote: I've been surprised how many otherwise-technically-competent people use subject tags to filter mailing lists. However, I suspect much/most of this could go away if MUAs started displaying List-* information in a useful way, and made filtering on those

Re: [dmarc-ietf] Change the mailing list protocol, not DMARC.

2014-06-09 Thread Hector Santos
On 6/9/2014 2:01 AM, Matt Simerson wrote: I also fail to see how this is a security issue. Agreed. It's *really* easy to filter and block delivery for non-existent domains. That is exactly what will be required to mitigate and close this new security hole. if mail.from.tld is .invalid

Re: [dmarc-ietf] advice to MTAs

2014-06-08 Thread Hector Santos
On 6/8/2014 11:30 AM, Murray S. Kucherawy wrote: On Sun, Jun 8, 2014 at 12:25 AM, Vlatko Salaj vlatko.sa...@goodone.tk DMARC participating MTAs SHOULD include Authentication Results for all underlying protocols (SPF/DKIM), as well as such results for DMARC validation itself, among

Re: [dmarc-ietf] DKIM through mailing lists (rebutting MLs won't change)

2014-06-04 Thread Hector Santos
that your mail is being displayed with invalid indicators on a wide spread set of mail reading devices. -- Hector Santos http ://www.santronics.com On Jun 4, 2014, at 10:39 AM, John Levine jo...@taugh.com wrote: But that is not equivalent to putting non-resolvable gibberish on the right side

Re: [dmarc-ietf] Solution for DMARC disruption of normal email use while still offering its normal protection

2014-05-29 Thread Hector Santos
On 5/29/2014 3:09 AM, Murray S. Kucherawy wrote: On Thu, May 29, 2014 at 12:06 AM, John R Levine jo...@taugh.com mailto:jo...@taugh.com wrote: By the way, to return to the original point, it still seems vanishingly unlikely to me that if we invented per-sender whitelists that the

Re: [dmarc-ietf] Solution for DMARC disruption of normal email use while still offering its normal protection

2014-05-29 Thread Hector Santos
On 5/29/2014 4:28 PM, J. Gomez wrote: On Wednesday, May 28, 2014 10:13 PM [GMT+1=CET], Tim Draegen wrote: I don't believe TPA-Label hits the mark between solving a big hurt and simple. IOW, it's too complicated for the amount of pain it would resolve. Just my opinion, take care, I'm of the

Re: [dmarc-ietf] DKIM through mailing lists

2014-05-28 Thread Hector Santos
On 5/28/2014 9:47 PM, Arvel Hathcock wrote: Anything that requires mailing list software to change won't work. If mailing list software is changed, the right answer is for the mailing list to re-sign the message. That doesn't help the DMARC situation now, but DMARC could be given other

Re: [dmarc-ietf] Supporting and Updating the IETF DMARC I-D draft

2014-05-24 Thread Hector Santos
On 5/24/2014 4:10 PM, Matt Simerson wrote: On May 24, 2014, at 12:50 PM, Hector Santos hsan...@isdg.net wrote: Off hand, I think the DMARC draft needs to be updated for two basic fundamental parts: 1) Separate Policy Handling and Reporting. If I read the draft right, reporting

Re: [dmarc-ietf] FYI: AOL Mail updates DMARC policy to 'reject'

2014-04-24 Thread Hector Santos
n 4/24/2014 2:27 PM, Terry Zink wrote: ADSP was brushed off because the same folks who believed ADSP's strong reject/discard policy concept will ever get used, also believed DMARC's strong p=reject will never be used as well, and certainly not by the likes of a AOL.COM and YAHOO.COM, two aged

Re: [dmarc-ietf] DMARC Extension for 3rd party Signers

2014-04-21 Thread Hector Santos
On 4/21/2014 2:54 PM, Vlatko Salaj wrote: On Sunday, April 20, 2014 9:00 PM, Hector Santos wrote: This would be a simple first step consideration -- A new ATPS tag this may fix DKIM 3rd party support, but does little to support 3rd party SPF. i think it's important to have a fix for all

[dmarc-ietf] DMARC Extension for 3rd party Signers

2014-04-19 Thread Hector Santos
I hope this would be a consideration as a fix or method to address the problem with DMARC's p=reject restrictive policy for 3rd party signers, including mailing list. Please correct any misunderstanding with the DMARC draft I may have. DMARC by definition requires alignment for matching

Re: [DNSOP] beta release of getdns stub resolver

2014-02-26 Thread Hector Santos
wrote: Not yet, but that us on the hit list for us. On Wednesday, February 26, 2014, Hector Santos hsan...@isdg.net wrote: Is there is a plug and play 32 bit and/or 64 bit Windows version? On 2/26/2014 1:46 PM, Wiley, Glen wrote: Verisign and NLnet Labs are pleased to announce the first beta

Re: [dkim-ops] What does t=y actually do?

2014-02-07 Thread Hector Santos
On 2/7/2014 10:31 AM, John Levine wrote: An acquaintance notes that many of his clients still have t=y in their DKIM records. Do any DKIM implementations pay any attention to it? RFC 6376 still says: y This domain is testing DKIM. Verifiers MUST NOT treat messages from

Re: Terms and Conditions May Apply

2013-10-14 Thread Hector Santos
Youtube URL. http://www.youtube.com/watch?v=2UWRuIXXzYs On 10/13/2013 3:16 PM, Brian E Carpenter wrote: I know we don't normally do movie plugs on this list, but anyone who's planning to attend the technical plenary in Vancouver could do worse than watch Terms and Conditions May Apply. It

Re: Last Call: Change the status of ADSP (RFC 5617) to Internet Standard

2013-10-03 Thread Hector Santos
On 10/2/2013 5:04 PM, Murray S. Kucherawy wrote: On Wed, Oct 2, 2013 at 7:41 AM, The IESG iesg-secret...@ietf.org wrote: The IESG has received a request from an individual participant to make the following status changes: - RFC5617 from Proposed Standard to Historic The supporting document

Re: Last Call: Change the status of ADSP (RFC 5617) to Historic

2013-10-03 Thread Hector Santos
On 10/3/2013 11:11 AM, Scott Kitterman wrote: Alessandro Vesely ves...@tana.it wrote: On Wed 02/Oct/2013 16:52:38 +0200 John Levine wrote: The IESG has received a request from an individual participant to make the following status changes: - RFC5617 from Proposed Standard to Historic The

Re: Last Call: Change the status of ADSP (RFC 5617) to Historic

2013-10-03 Thread Hector Santos
I agree, the problem IMV is the illusion that DMARC will replace it has some domains has already done by switching their strong exclusive mail operations declaration from _ADSP TXT record policy to a _DMARC policy. Like FACEBOOK.COM. The REJECTING/DISCARD concept is still the same and active,

How to protect DKIM signatures: Moving ADSP to Historic, supporting DMARC instead

2013-10-03 Thread Hector Santos
On 10/3/2013 1:51 PM, Douglas Otis wrote: Dear Hector, Indeed, more should be said about underlying reasons. The reason for abandoning ADSP is for the same reason few providers reject messages not authorized by SPF records ending in -all (FAIL). Mailing-List software existed long before

Re: How to protect DKIM signatures: Moving ADSP to Historic, supporting DMARC instead

2013-10-03 Thread Hector Santos
Please accept my apology as I do not mean to be disrespectful. I find it impossible to separate all design considerations that are involved in this decision you are requesting us to consider regarding a near 7-8 years DKIM + POLICY investment. DKIM originated with POLICY support built-in and

Re: How to protect DKIM signatures: Moving ADSP to Historic, supporting DMARC instead

2013-10-03 Thread Hector Santos
On 10/3/2013 6:25 PM, Douglas Otis wrote: On Oct 3, 2013, at 1:37 PM, Barry Leiba barryle...@computer.org wrote: To both Doug and Hector, and others who want to drift in this direction: As I've said before, the question of moving ADSP to Historic is one we're taking on its own, and is not

[jira] [Commented] (CB-4391) iOS 7: splash screen has a white bar at the bottom of the device screen

2013-09-19 Thread Hector Santos (JIRA)
[ https://issues.apache.org/jira/browse/CB-4391?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13771966#comment-13771966 ] Hector Santos commented on CB-4391: --- Somebody know a method to put a color background

Re: ORCID - unique identifiers for contributors

2013-09-17 Thread Hector Santos
+1 Thank you for your input. Seems to me to be a conflict of interest issue. I support the basic concept but why not use a IETF registry instead? Solves several of the conflict of interest concerns, including about 3rd party entities disappearing, losing support, etc. -- HLS On 9/17/2013

Re: ORCID - unique identifiers for contributors

2013-09-17 Thread Hector Santos
On 9/17/2013 1:55 PM, Michael Tuexen wrote: On Sep 17, 2013, at 7:48 PM, Scott Brim scott.b...@gmail.com wrote: On Tue, Sep 17, 2013 at 1:37 PM, Michael Tuexen michael.tue...@lurchi.franken.de wrote: I was always wondering the authors can't get an @ietf.org address, which is listed in the

Re: ORCID - unique identifiers for contributors

2013-09-17 Thread Hector Santos
On 9/17/2013 3:24 PM, Melinda Shore wrote: On 9/17/13 11:14 AM, Michael Tuexen wrote: For example http://www.ietf.org/rfc/rfc3237.txt has 7 authors. I know that at least 4 affiliations have changed and at least you can't reach me anymore via the given e-mail address or telephone number. This

Re: ORCID - unique identifiers for contributors

2013-09-17 Thread Hector Santos
On 9/17/2013 4:52 PM, Yoav Nir wrote: Having an IETF identity is OK if all you ever publish is in the IETF. Some of our participants also publish at other SDOs such as IEEE, W3C, ITU, and quite a few publish Academic papers. Using the same identifier for all these places would be useful, and

Re: [ietf-dkim] Fwd: Request to move RFC 5617 (ADSP) to Historic

2013-09-12 Thread Hector Santos
On 9/12/2013 3:28 PM, Dave Crocker wrote: There seems to be a pattern that has developed, of demanding that failure mean literally no adoption. It doesn't mean that. It means that it has no community traction. ADSP more than qualifies on the pragmatics of failure. d/ The pragmatics of

Re: [ietf-dkim] Fwd: Request to move RFC 5617 (ADSP) to Historic

2013-09-11 Thread Hector Santos
This will require a substantial review before any change of status is done and should be done as part of WG working on Domain Policies. There is already substantial work with ADSP and APIs implemented and deployed. We continue to get world wide usage of our ADSP zone record generator wizard:

Re: What real users think [was: Re: pgp signing in van]

2013-09-09 Thread Hector Santos
On 9/9/2013 4:09 PM, Brian E Carpenter wrote: On 10/09/2013 01:58, Ted Lemon wrote: ... Seriously, this perfectly illustrates the reason why PGP hasn't seen widespread deployment: it doesn't address a use case that anybody understands or cares about, True story: Last Saturday evening I

Re: pgp signing in van

2013-09-07 Thread Hector Santos
On 9/6/2013 10:35 PM, Melinda Shore wrote: One of the useful things that PKI provides is some agreement, at least, about what we expect from certification authorities and what it means to issue and sign a certificate. That is to say, the semantics are reasonably well sorted-out, which is not

Re: pgp signing in van

2013-09-07 Thread Hector Santos
On 9/6/2013 11:04 PM, Ted Lemon wrote: On Sep 6, 2013, at 10:35 PM, Melinda Shore melinda.sh...@gmail.com wrote: I actually don't think that pgp is likely to be particularly useful as a serious trust mechanism, mostly because of issues like this. It's not at all clear to me that serious trust

Re: draft-moonesamy-ietf-conduct-3184bis

2013-08-31 Thread Hector Santos
Along with the other recent drafts for streamlining the RFC process, I get the feeling even this new drafting on conduct is simply going to be a new rubber stamping tool to shut down the process of due diligent engineering discussions, required cross areas reviews, including increasing

Re: Last Call: draft-ietf-repute-query-http-09.txt (A Reputation Query Protocol) to Proposed Standard

2013-08-30 Thread Hector Santos
John, I don't think it would of been fun designing and testing a text-based hosting protocol manually with your terminal/telecommunication/telnet client New Line Mode (add LF to CR) option disabled or server text responses only issue CR or LF. It would of been very hard or confusing to do

Re: AppsDir review of draft-ietf-repute-model-08

2013-08-30 Thread Hector Santos
On 8/30/2013 10:46 AM, Tony Hansen wrote: The document describes a model for reputation services, particularly those being produced by the Repute WG. It follows the recommendations of RFc4101 for describing a protocol model, which requires answers to 1) the problem the protocol is trying to

Re: AppsDir review of draft-ietf-repute-model-08

2013-08-30 Thread Hector Santos
have these general considerations summarized. Thanks On 8/30/2013 3:20 PM, Andrew Sullivan wrote: On Fri, Aug 30, 2013 at 02:37:13PM -0400, Hector Santos wrote: For example, DKIM-REPUTE product designers would need to consider SPF reputons product models. Simple text as follows can resolve

Re: AppsDir review of draft-ietf-repute-model-08

2013-08-30 Thread Hector Santos
On 8/30/2013 4:09 PM, Andrew Sullivan wrote: On Fri, Aug 30, 2013 at 03:39:14PM -0400, Hector Santos wrote: archives of the Repute WG to find or extract these very real and practical integration considerations. The document should have these general considerations summarized. But your

Re: [dnsext] SPF isn't going to change, was Deprecating SPF

2013-08-24 Thread Hector Santos
Phillip Hallam-Baker wrote: On Fri, Aug 23, 2013 at 3:46 PM, manning bill bmann...@isi.edu wrote: the question is not that nobody checks type 99, the question is is the rate of adoption of type 99 -changing- in relation to type 16? As John pointed out, support for checking

Re: [dnsext] SPF isn't going to change, was Deprecating SPF

2013-08-24 Thread Hector Santos
Hector Santos wrote: Phillip Hallam-Baker wrote: Putting a statement in an RFC does not mean that the world will automatically advance towards that particular end state. Thats correct. No one is forced to support RFC 4408bis. From my perspective, there are four basic major changes to BIS

SPF PTR Support [was SPF isn't going to change]

2013-08-24 Thread Hector Santos
Scott Kitterman wrote: Hector Santos hsan...@isdg.net wrote: I should add: 5- Deprecate PTR by removing PTR publishing support We won't advocate this because for our small to mid size market, this is the lowest cost setup for them - using a PTR. For all our domains, we use PTR

Re: SPF PTR Support [was SPF isn't going to change]

2013-08-24 Thread Hector Santos
Scott Kitterman wrote: PS: I am not trying to change anything about the PTR 4408BIS status. Just pointing out that a change was made that does touch base with operations and thus not supporting (or delaying, forever) this part of 4408BIS is highly possible. You might change what you recommend

Re: [dnsext] full standards, Deprecating SPF

2013-08-23 Thread Hector Santos
Andras Salamon wrote: On Thu, Aug 22, 2013 at 11:53:29PM -, John Levine wrote: If you think it's important to move it to full standard, why don't you do somthing about it? A quick look suggests that 3597 meets the requirements in sec 2.2 of RFC 6410 I wouldn't think that it'd be hard to

Re: The Last Call social contract (was - Re: Rude responses)

2013-08-23 Thread Hector Santos
Dave Crocker wrote: On 8/23/2013 11:06 AM, Scott Brim wrote: We don't have to be like the ones we all know who sneer at anyone presuming to get in the way of their code going into production. Since this is such a fundamental point, I'm sending this reply to emphasize: The concern I

Re: [spfbis] Last Call: draft-ietf-spfbis-4408bis-19.txt (Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1) to Proposed Standard

2013-08-21 Thread Hector Santos
Eliot Lear wrote: Patrik, First, I appreciate that you and Dave are bringing data to the table. However, in this case, it is not in dispute that queries are happening. What *is* in dispute is whether there are answers. I must admit I am having a difficult time understanding the logic,

Re: [spfbis] Last Call: draft-ietf-spfbis-4408bis-19.txt (Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1) to Proposed Standard

2013-08-21 Thread Hector Santos
Scott Kitterman wrote: On Wednesday, August 21, 2013 14:44:41 Olafur Gudmundsson wrote: What I want the IESG to add a note to the document is that says something like the following: The retirement of SPF from specification is not to be taken that new RRtypes can not be used by applications, the

Re: [spfbis] SPF TYPE support

2013-08-20 Thread Hector Santos
On 8/19/2013 7:42 PM, S Moonesamy wrote: At 14:10 19-08-2013, Hector Santos wrote: I'm having a hard time with both sides of the argument, especially the supposed existence of an interop problem which seems to only highlight how to procedurally stump the SPF type advocates with a error

Re: [spfbis] Last Call: draft-ietf-spfbis-4408bis-19.txt (Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1) to Proposed Standard

2013-08-20 Thread Hector Santos
On 8/20/2013 1:12 AM, S Moonesamy wrote: There is a message from the Responsible Area Director at http://www.ietf.org/mail-archive/web/spfbis/current/msg02167.html which might shine some light about that part of the charter. Both RR Type 16 and RR Type 99 are in use on the Internet. Tony

SPF TYPE support

2013-08-19 Thread Hector Santos
Hi, I'm having a hard time with both sides of the argument, especially the supposed existence of an interop problem which seems to only highlight how to procedurally stump the SPF type advocates with a error correction standpoint. What is that error by the way? I don't believe there was

Re: [ietf-dkim] Seeking Clarification of the l= Tag

2013-08-04 Thread Hector Santos
On 8/4/2013 4:35 PM, Pawel Lesnikowski wrote: There are few details I'd like to clarify. Body hash for this message is correctly computed by the sender. Entire signature of this message in fact valid - this is why Port25, Gmail, and Mail.dll validate DKIM signature with 'pass' result. The

Mentoring Electronic Participants [was Invitation to request an IETF mentor]

2013-07-20 Thread Hector Santos
Overall, I think the IETF has a marketing problem addressing its #1 customer base - electronic participants. I was somewhat hoping to see more done in the mentor area of assisting electronic participants. Of coarse, this sort of electronic mentoring it could include an end goal to get folks

Dotless Domain conflict with user searching and branding [was: IAB Statement on Dotless Domain]

2013-07-14 Thread Hector Santos
On 7/13/2013 2:20 PM, Yoav Nir wrote: So finding your site is not that difficult for first-timers. But regardless, the people who type in addresses or DNS names in full are rare and far between. Agreed. Just to see again, I tried it on my wife's new computer with Chrome and it showed:

Re: Dotless Domain conflict with user searching and branding [was: IAB Statement on Dotless Domain]

2013-07-14 Thread Hector Santos
On 7/14/2013 9:53 AM, Yoav Nir wrote: On Jul 14, 2013, at 4:34 PM, Hector Santos hsan...@isdg.net wrote: On 7/13/2013 2:20 PM, Yoav Nir wrote: So finding your site is not that difficult for first-timers. But regardless, the people who type in addresses or DNS names in full are rare

Re: IAB Statement on Dotless Domains

2013-07-13 Thread Hector Santos
All the discussion details are overwhelming but I do seem to feel there is a marketing and branding problem especially when it comes to searching a domain at the USER DATA ENTRY LEVEL, i.e. slow keyboard input. For example, I own WINSERVER.COM. Try typing WINSERVER in google (for the first

Re: IAB Statement on Dotless Domains

2013-07-13 Thread Hector Santos
On 7/13/2013 11:27 AM, Noel Chiappa wrote: From: Livingood, Jason jason_living...@cable.comcast.com FWIW, I think for most larger companies with multi-billion dollar revenues streams it is less about the up-front fees to apply operationalize a gTLD than the long term

Re: IETF registration fee?

2013-07-10 Thread Hector Santos
On 7/10/2013 5:17 PM, Josh Howlett wrote: Day passes have nothing to do with it. I disagree. Day passes encourage the notion that it's normal to parachute into the IETF to attend a single session. I think that the IETF's strength is that we don't totally compartmentalise work items. I am

Re: Regarding call Chinese names

2013-07-10 Thread Hector Santos
On 7/10/2013 8:04 PM, Hui Deng wrote: Hello all We submitted two drafts to help people here to correctly call chinese people names: http://tools.ietf.org/html/draft-deng-call-chinese-names-00 http://tools.ietf.org/html/draft-zcao-chinese-pronounce-00 Fantastic. Short and sweet!

Re: [DNSOP] New Version Notification for draft-wkumari-dnsop-hammer-00.txt

2013-07-03 Thread Hector Santos
well, for a moment, I did have to think about this draft being a joke or not. But the acronym was perfect. :) On 7/3/2013 1:30 PM, Warren Kumari wrote: On Jul 2, 2013, at 1:58 AM, Matthijs Mekking matth...@nlnetlabs.nl wrote: This sounds a lot like prefetch in unbound, and the

Re: [ietf-dkim] The problem with the DKIM design community

2013-07-02 Thread Hector Santos
On 7/2/2013 10:11 AM, Murray S. Kucherawy wrote: On Mon, Jul 1, 2013 at 12:24 PM, Michael Deutschmann mich...@talamasca.ocis.net wrote: On Mon, 1 Jul 2013, Alessandro Vesely wrote: Well, not really. MAIL FROM: is only visible after delivery, so to avoid dangling signatures one should

Re: [DNSOP] Fwd: New Version Notification for draft-wkumari-dnsop-hammer-00.txt

2013-07-02 Thread Hector Santos
I like the idea. A fews ago we needed to write a local cache for our total system framework to create a single source API query for all of our apps within the framework using DNS. The cache database was prepared with a query frequency field (QFF) with the idea in the future to come up with

Part of Improving IETF Electronic Diversity [was: RFC 6234 code]

2013-06-28 Thread Hector Santos
I believe this is all part of improving the IETF Electronic Diversity picture. Just like we have to deal with greater people personal globalization diversity issues, there is also greater technology and legal diversity issues to deal with. So many tools, so many languages, so many OSes, so

Re: RFC 6234 code

2013-06-27 Thread Hector Santos
What language, OS? There are plenty of rich hashing/encrypting C/C++ libraries out there. Windows has CAPI, even OPENSSL has these libraries. On 6/27/2013 11:49 AM, Dearlove, Christopher (UK) wrote: RFC 6234 contains, embedded in it, code to implement various functions, including SHA-2.

Re: RFC 6234 code

2013-06-27 Thread Hector Santos
Ok, other than time, it should be easy to extract, clean up and cross your fingers that it compiles with your favorite C compiler. But I would write to the authors to get the original source. Or google: C source crypto libraries API hashing functions among the first hit:

Re: SHOULD and RECOMMENDED

2013-06-25 Thread Hector Santos
I want to know more what it translates to as a technical specification for CODING. To me, it means this: o Authorization Lift Time [X] Send Notification Time to send: __4__ mins (default) The problem as I experienced thus far is whether one MUST IMPLEMENT this protocol

Re: SHOULD and RECOMMENDED

2013-06-25 Thread Hector Santos
Sounds like an never ending loop. 2119 is an RFC too and thus written in RFCish as well. To me, it only matters in terms of implementation - should we waste time and money on implementing a SHOULD/RECOMMENDED feature? Is it required to be coded? Can it be delayed, for version 2.0? Is it

Re: SHOULD and RECOMMENDED

2013-06-25 Thread Hector Santos
that last that long. On Jun 25, 2013, at 8:13 PM, Hector Santos hsan...@isdg.net wrote: I want to know more what it translates to as a technical specification for CODING. To me, it means this: o Authorization Lift Time [X] Send Notification Time to send: __4__ mins (default

Re: SHOULD and RECOMMENDED

2013-06-24 Thread Hector Santos
On 6/24/2013 8:39 AM, John C Klensin wrote: --On Monday, June 24, 2013 07:52 -0400 Phillip Hallam-Baker hal...@gmail.com wrote: They are not synonyms Lets go back to 1980: Implementations SHOULD support DES vs RECOMMENDED encryption algorithms: DES, IDEA Actually, that is the point. The

<    1   2   3   4   5   6   7   8   9   10   >