Re: [ietf-dkim] Ticket 23 -- l= and Content-type

2011-05-01 Thread Hector Santos
not need to add the l= tag to the signature if they are signing the entire body. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list

Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Hector Santos
view, your proposed section 1.1 DKIM Architecture Documents and with adding the AUID and ODID as part of the output to make all the documents protocol consistent will settle the issue, in my view, for all parties. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com [1

Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Hector Santos
done. I take the position that 4871bis does not incorporate what we have learned since 4871. If it did, these concerns would not be on-going. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list

[ietf-dkim] Issue: 3.9 Output Requirements - missing RFC5322.From

2011-05-01 Thread Hector Santos
change will fix this in 3.9 last sentence: The output MAY include other signature properties or result meta- data, including RFC5322.From, PERMFAILed or otherwise ignored signatures, for use by modules that consume those results. -- Hector Santos, CTO http://www.santronics.com http

Re: [ietf-dkim] Output summary - proposing ODID Originating Domain Identity

2011-05-01 Thread Hector Santos
to mention anything closely related to it. I would like to ask the chairs if we can get Consensus Reevaluated. From the limited WG participants providing input, it appears we have Rough Consensus for this identity to be included in RFC4871bis. -- Hector Santos, CTO http://www.santronics.com http

Re: [ietf-dkim] Output summary

2011-04-30 Thread Hector Santos
, then we should allow a add a more directly DKIM related reference to DKIM Service Architecture [RFC5585] document. Doesn't that fit with DS? -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list

Re: [ietf-dkim] Output summary

2011-04-30 Thread Hector Santos
Signing Practices per RFC5585. Thanks -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com Dave CROCKER wrote: Current implementations are irrelevant. They will completely and utterly ignore what is in 4871bis, because they are done and work fine. The problem is whether

Re: [ietf-dkim] Output summary

2011-04-30 Thread Hector Santos
. -- Sincerely Hector Santos http://www.santronics.com Hector Santos wrote: Dave, My perspective was that the damage was done per se in the last errata and changes with this bis are irrelevant and don't reflect current existing implementations. Code changes are not necessary for current

Re: [ietf-dkim] Output summary

2011-04-29 Thread Hector Santos
, that is the goal in protocol designs. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

[ietf-dkim] Issue: 6.5. Recommended Signature Content - Order and Message-ID

2011-04-29 Thread Hector Santos
feedback verification method: http://www.google.com/patents/about?id=NXSGEBAJ So in my strong opinion, the RFC5322 Message-ID is a traditional strong original mail authenticity identity and should be included in the core group. -- Hector Santos, CTO http://www.santronics.com

[ietf-dkim] Issue: 6.5. Recommended Signature Content - additional MLM Headers

2011-04-29 Thread Hector Santos
, but in a DKIM era, this header can be protected like other MLM core headers. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com [1] http://www.ietf.org/mail-archive/web/ietf-message-headers/current/msg00038.html ___ NOTE WELL

[ietf-dkim] Issue: Section 5.2 - Invalid Signatures

2011-04-29 Thread Hector Santos
. If no valid signature is found, the message is considered to be unsigned by DKIM standards. To limit potential denial-of-service attacks, verifiers MAY limit the total number of signatures they will attempt to verify. -- Hector Santos, CTO http://www.santronics.com http

Re: [ietf-dkim] Issue: Operations Note in 6.4 redundant and should be removed

2011-04-29 Thread Hector Santos
that offers the best technical and DKIM results. If that can be stated in 6.5, I agree the 6.4 note would become redundant. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http

Re: [ietf-dkim] ISSUE: Updating Section 6.5: Recommended Signature Content

2011-04-29 Thread Hector Santos
. That's just not right. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] ISSUE: Updating Section 6.5: Recommended Signature Content

2011-04-29 Thread Hector Santos
-ID may apply under certain scenario where it is known this header may be altered, such as under a resigner creating a new message. Whatever. Hector Santos wrote: Murray S. Kucherawy wrote: Recommend adding the following paragraph (excuse the XML markup): t There are tradeoffs

Re: [ietf-dkim] Output summary

2011-04-29 Thread Hector Santos
hosting requirements. You won't, you will need to combine all the DKIM documents which was what we had to do with I considered the holy bible for internet hosting - RFC1123. Twelve years later RFC2821 made RFC1123 obsolete. -- Hector Santos, CTO http://www.santronics.com http

[ietf-dkim] Cleaning up the l= peppering / was: Ticket 23 -- l= and Content-type]

2011-04-29 Thread Hector Santos
related concerns peppered in the document should be consolidated under 9.1. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] Output summary

2011-04-28 Thread Hector Santos
John R. Levine wrote: That is quite specifically what 4871 says. To do anything different would be a major incompatible change. We have explicitly rejected the idea that first party signatures are special in DKIM. (They are in ADSP, but that's ADSP.) Among the reasons we rejected the

Re: [ietf-dkim] Output summary

2011-04-28 Thread Hector Santos
concept. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] Output summary - A Day late, Dollar Short

2011-04-28 Thread Hector Santos
namespace and let implementators decides? I think it is really unreasonable to throw in this section (that is not minor) at the last minute without the proper WG-man-hours for a thorough consideration. -- Hector Santos, CTO http://www.santronics.com

Re: [ietf-dkim] Output summary

2011-04-28 Thread Hector Santos
1 DKIM Service Architecture. The AUID is needed for the major CSP (Checking Signing Practice) black box flow in the DKIM design. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates

[ietf-dkim] Output summary - Mandatory Outputs

2011-04-28 Thread Hector Santos
Rolf Wrote: As the From: address is mandatory input for the signature, it may be a logical step to also make it mandatory in the output? Murray Responded: Given the above, do we still need to? Hector Santos responded: To be more DKIM Mail Integration Consistent and Complete - yes. See

Re: [ietf-dkim] Output summary

2011-04-28 Thread Hector Santos
some WGLC compromise that finishes the job and still makes RFC4871bis useful for today's DKIM deployment requirements. Can that be done? I don't know. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL

Re: [ietf-dkim] Output summary - Mandatory Outputs

2011-04-28 Thread Hector Santos
Dave CROCKER wrote: On 4/28/2011 12:49 PM, Hector Santos wrote: To illustrate this in RFC5585 by labeling the inputs required: | |- RFC5322 Message V ++ | Message Signed

Re: [ietf-dkim] Output summary - Mandatory Outputs

2011-04-28 Thread Hector Santos
Dave CROCKER wrote: On 4/28/2011 3:23 PM, Hector Santos wrote: Rather I am highlighting the limited DKIM output requirements is outdated and insufficient to support today's (extended) DKIM mail integration and security needs outlined by WG consensus-built RFC documents: What part

Re: [ietf-dkim] Output summary - Mandatory Outputs

2011-04-28 Thread Hector Santos
to also make it mandatory in the output? is no. No further discussions needed about From: Address nor the AUID for the Output Summary. -- Hector Santos, CTO http://www.santronics.com ___ NOTE WELL: This list operates according to http://mipassoc.org

Re: [ietf-dkim] Output summary - Mandatory Outputs

2011-04-28 Thread Hector Santos
A-R today because its the only BCP around for DKIM and if anyone who dares to claim it not needed and even tries to compete with it, well, you, I and probably many others will contest that claim as well. -- Hector Santos, CTO http://www.santronics.com [1] http://en.wikipedia.org/wiki

Re: [ietf-dkim] Ticket #10: public key example -- no change needed

2011-04-27 Thread Hector Santos
Rolf E. Sonneveld wrote: -1. I suggest to add clarifications etc. to a future update of RFC5863 (deployment and operations document). So you agree clarification is required but not for RFC4871bis? Interesting. Lets see: 1) A few words clarification for DKIM-BASE standard. A little

Re: [ietf-dkim] Ticket #10: public key example -- one $ORIGIN line fixes problems

2011-04-27 Thread Hector Santos
Alessandro Vesely wrote: On 27/Apr/11 01:25, John Levine wrote: Whether the name in the DNS record should be brisbane or brisbane._domainkey or brisbane._domainkey.example.org depends entirely on the most recent $ORIGIN line in the master file. If the $ORIGIN is _domainkey.example.org, an

Re: [ietf-dkim] Ticket #19

2011-04-27 Thread Hector Santos
Dave CROCKER wrote: The best I can suggest is something along the lines of noting that assessment-level heuristics can be aided by certain choices of signature d= names. And then specifying what they might be, so that both signers and verifiers know how to encourage success for the

Re: [ietf-dkim] Ticket #10: public key example -- no change needed

2011-04-27 Thread Hector Santos
Rolf E. Sonneveld wrote: Interesting. Lets see: 1) A few words clarification for DKIM-BASE standard. A little [LESS] confusion for Windows people and domains using ISP managed DNS zones. Well, maybe it's time Windows people leave their .local zones and discover a whole world beyond

Re: [ietf-dkim] Ticket #11

2011-04-27 Thread Hector Santos
into the mail stream.) I think I could live with that. +1 -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] ADSP stats

2011-04-27 Thread Hector Santos
, and are looking forward to being part of creating it. +1. I have strong convictions Policy with be DKIM's White Horse. Thanks for your input. -- Hector Santos, CTO http://www.santronics.com ___ NOTE WELL: This list operates according to http

Re: [ietf-dkim] Output summary

2011-04-27 Thread Hector Santos
understand. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] Output summary

2011-04-27 Thread Hector Santos
. -- Hector Santos, CTO http://www.santronics.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] ISSUE: Updating Section 6.5: Recommended Signature Content

2011-04-26 Thread Hector Santos
header is IETF RFC material fit issue, then is it possible to use a generalized text: o Any DKIM related verification results and trace fields -- Hector Santos, CTO http://www.santronics.com ___ NOTE WELL: This list operates according to http

Re: [ietf-dkim] Taking responsibility for a message

2011-04-26 Thread Hector Santos
. -- HLS Hector Santos wrote: This is the problem with this ambiguous responsibility term in DKIM and it becomes worst when blame or credit is distributed. IMO, you can't have it both ways. Sure, you are saying if unsigned parts altered or removed, then the mail is still valid, everything

Re: [ietf-dkim] draft-ietf-dkim-rfc4871bis-07 // Attacks Involving Additional Header Fields

2011-04-26 Thread Hector Santos
Dave, Everyone accepts (maybe some reluctantly and with high DKIM concern), the *policy semantics* separation between the AUID and SDID from RFC4871bis. My exception is the incorrect extended assertions there is no DKIM created binding association between the 5322.From and the signature

Re: [ietf-dkim] Ticket #19 - Plights of the living Dead

2011-04-26 Thread Hector Santos
John R. Levine wrote: I have to agree with Dave. This is way outside anything that DKIM specifies, it's the first party vs. third party distinction that I hope we have buried for good. Bury things alive, not making sure its not dead first or trying to get rid of significant distinctions

Re: [ietf-dkim] Ticket #10: public key example -- no change needed

2011-04-26 Thread Hector Santos
John Levine wrote: Whether the name in the DNS record should be brisbane or brisbane._domainkey or brisbane._domainkey.example.org depends entirely on the most recent $ORIGIN line in the master file. If the $ORIGIN is _domainkey.example.org, an entirely plausible scenario, the current text

Re: [ietf-dkim] Ticket #10: public key example -- no change needed

2011-04-26 Thread Hector Santos
because will have the GUI softare, but in general for all. Levine may not need help, but others might. Adding the complete public subdomain brisbane._domainkey is better than just having brisbane and if you must explain the initial ZONE assumption. -- HLS Hector Santos wrote: John Levine wrote

Re: [ietf-dkim] Ticket #17

2011-04-26 Thread Hector Santos
these labels will look like. Can you provide a few example maybe showing how an IDN address and domain will look like under each RFC and also UTF8 for? From: DKIM-Signature: d= DNS zone record or anything else you deem important to show the issue and/or conflicts? -- Hector Santos

Re: [ietf-dkim] Issue: Section 4.3 Hash method Note

2011-04-25 Thread Hector Santos
not support lesser hash strength rsa-sha1 and will treat such messages as unsigned. Whatever. Murray S. Kucherawy wrote: -Original Message- From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Hector Santos Sent: Sunday, April 24, 2011 4:39 PM

Re: [ietf-dkim] Issue: Section 4.3 Hash method Note

2011-04-25 Thread Hector Santos
Barry replied: Dave further tweaks: INFORMATIVE NOTE: Although use of rsa-sha256 is strongly encouraged, some senders might prefer to use rsa-sha1 when balancing security strength against performance, complexity, or other needs. �However, compliant verifiers might not implement rsa-sha1;

Re: [ietf-dkim] I-D Action:draft-ietf-dkim-rfc4871bis-06.txt // Input requirements

2011-04-25 Thread Hector Santos
Michael Deutschmann wrote: On Fri, 22 Apr 2011, Hector Santos wrote: However, I suspect you're getting at the fact that, if it had to be written today, such a certification standard would be hamstrung by the fact that ADSP sucks. Almost... see below. All it could do is make dkim

Re: [ietf-dkim] Issue: Section 4.3 Hash method Note

2011-04-25 Thread Hector Santos
should cover all the RFC4871bis paths an implementator may take with this particular note: - Updated systems pulling sha1 support, - New systems never adding sha1 support, or - All systems adding a failsafe switch to disable sha1. -- Hector Santos, CTO http://www.santronics.com

Re: [ietf-dkim] Revision to draft-ietf-dkim-rfc4871bis posted

2011-04-24 Thread Hector Santos
Quick question and comment: I see the major change is the TOC (table of content) outline and all the document's TOC references. Chapter 1 is a editor note, (very odd). Is that what we really want for a CHAPTER 1? Especially when it indicates the idea of removal thus once again changing the

[ietf-dkim] Issue: Section 4.3 Hash method Note

2011-04-24 Thread Hector Santos
less secured (low-security). -- Hector Santos, CTO http://www.santronics.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] I-D Action:draft-ietf-dkim-rfc4871bis-06.txt // Input requirements

2011-04-22 Thread Hector Santos
SDID. -- Hector Santos, CTO http://www.santronics.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] ISSUE: non-ascii header text

2011-04-22 Thread Hector Santos
Douglas Otis wrote: Changing a reference of RFC3490 to RFC5890 already represents an incompatible change. Your assertion is noted. John, it is correct to reference RFC5890 but for any implementations that currently have RFC3490 support there is a conflict verifiers need to be aware of. A

Re: [ietf-dkim] ADSP stats

2011-04-21 Thread Hector Santos
to that? Could that show how as exploited AUID can use ADSP to protect against multiple SDID signing exploits? -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim

Re: [ietf-dkim] #4: non-ascii header text

2011-04-21 Thread Hector Santos
Barry Leiba wrote: I asked my IDNA expert, who said that the definitive answer is it depends. �He suggests our chair ask our AD to check with the IESG. Our chair is asking our AD to check. We have the IESG's answer: we should change the reference to RFC 5890 and change the text to use

Re: [ietf-dkim] ADSP stats

2011-04-20 Thread Hector Santos
Murray S. Kucherawy wrote: Bill Oxley: In my mind the whole adsp degenerated into a use case only for well recognized narrowband senders such as banks. Had nothing to do with reputation sellers, and judging by a recent exit from the market a reputation is only as good as it is maintained.

Re: [ietf-dkim] ISSUE: non-ascii header text

2011-04-20 Thread Hector Santos
Murray S. Kucherawy wrote: Oops, this is a separate issue. But I hope it's also not contentious. [...] Since I'm not exactly an EAI/IDNA expert... The only thing that's not obvious to me is whether the hash functions should hash the bytes of the UTF-8, or convert them to UTF wide

Re: [ietf-dkim] ISSUE: non-ascii header text

2011-04-20 Thread Hector Santos
Charles Lindsey wrote: Murray, I viewed this as another layer issue. Adding a DKIM-Signature: header is no different than any other RFC5322 header where UTF8 conversion is already a consideration. But maybe to provide guidance for what parts of the DKIM-Signature RFC5322 header needs to be

Re: [ietf-dkim] ADSP stats

2011-04-20 Thread Hector Santos
, you are not going to get wider acceptance. Its as simple at that. At this moment, you are the DKIM technology market leader. It is up to you as a PRODUCT RD engineer if you want to see ADSP used, tested and explored among your OPENDKIM customer base. -- Hector Santos, CTO http

Re: [ietf-dkim] ADSP stats

2011-04-20 Thread Hector Santos
author domain policy records. Silly or not, those are the fact lawyers look for. -- Hector Santos, CTO http://www.santronics.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] ADSP stats

2011-04-18 Thread Hector Santos
Murray S. Kucherawy wrote: -Original Message- I can break it down by month if anyone's interested in trend data, but the numbers are so small in the first place that I doubt it'd be very interesting. So we can't tell how widely ADSP has been deployed because we don't check in

Re: [ietf-dkim] ADSP stats

2011-04-18 Thread Hector Santos
Murray S. Kucherawy wrote: We tried policy, and couldn't make it work. It's time to spend all this energy looking at something else. Murray, I appreciate your assessment. The writing was on the wall when you have an opponent of policy become the author of ADSP, broken by erroneous removing

Re: [ietf-dkim] [dkim] #1: Suggestion to change text in section 2.3

2011-04-17 Thread Hector Santos
Murray S. Kucherawy wrote: -Original Message- Why isn't an authorized signer an identity example? It is. The question is: Is it harmful not to list it explicitly? There doesn't seem to be support for that idea so far. Which makes very strange. If you think it is, and had

Re: [ietf-dkim] [dkim] #1: Suggestion to change text in section 2.3

2011-04-16 Thread Hector Santos
Dave CROCKER wrote: On 4/15/2011 12:10 PM, Murray S. Kucherawy wrote: All of that discussion belongs in the deployment document or some unwritten specs about policy or reputation (which is all semantics), not in the base specification (which is all syntax). +1 It's more fun to

Re: [ietf-dkim] [dkim] #1: Suggestion to change text in section 2.3

2011-04-16 Thread Hector Santos
Hector Santos wrote: Dave CROCKER wrote: On 4/15/2011 12:10 PM, Murray S. Kucherawy wrote: All of that discussion belongs in the deployment document or some unwritten specs about policy or reputation (which is all semantics), not in the base specification (which is all syntax). +1 It's

Re: [ietf-dkim] ADSP stats

2011-04-16 Thread Hector Santos
them, Microsoft is still a market leader. Ignore ADSP at your own peril. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] ADSP stats

2011-04-16 Thread Hector Santos
Hector Santos wrote: John R. Levine wrote: So in my limited dataset, ADSP usage is if anything shrinking, with only Paypal publishing discardable. hmm John, you do realize its only April? 1/4 of 2011? According to your stats: 2649*4 = 10,596

Re: [ietf-dkim] [dkim] #1: Suggestion to change text in section 2.3

2011-04-15 Thread Hector Santos
what is already stated as an independent trusted identity. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] [dkim] #1: Suggestion to change text in section 2.3

2011-04-15 Thread Hector Santos
Barry Leiba wrote: My proposed text attempts to inject the idea that at least one identity is an author authorized signer distinct from what is already stated as an independent trusted identity. But I don't think the actual author (in the case of this message, me, the guy who's writing it)

Re: [ietf-dkim] [dkim] #1: Suggestion to change text in section 2.3

2011-04-15 Thread Hector Santos
and will hopefully universally trusted by all DKIM receivers. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] [dkim] #10: Error in Appendix C. Creating a Public Key

2011-04-15 Thread Hector Santos
think this clarifies anything in particular. If the zone file is for a domain itself, this makes sense, but the text as-is is just fine if the zone file is for _domainkey.domain. I've seen it done (and have done it) using both designs, so both are equally correct. -- Hector Santos, CTO

Re: [ietf-dkim] [dkim] #1: Suggestion to change text in section 2.3

2011-04-15 Thread Hector Santos
? -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

[ietf-dkim] issue: 2.5 SDID minor nit

2011-04-15 Thread Hector Santos
into the mail stream. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] [dkim] #11: 2.5 SDID minor nit

2011-04-15 Thread Hector Santos
Murray S. Kucherawy wrote: I think it's redundant to refer to a signed message, since that's what the entire document is defining; if the message isn't signed, the document doesn’t apply in the first place. So the question to me is more like: Is an intermediary adding a signature

Re: [ietf-dkim] [dkim] #11: 2.5 SDID minor nit

2011-04-15 Thread Hector Santos
Dave CROCKER wrote: I think that that's entirely the wrong question. For this stage of the document, the questions are: 1) What problems have been documented as being due to this wording? 2) What technical errors does this text clearly represent. In both cases, the answer for

[ietf-dkim] issue: Appendix C. Creating a Public Key

2011-04-14 Thread Hector Santos
For appendix C, I believe the example for the public key DNS record is missing the complete subdomain. It has brisbane where it should be brisbane._domainkey Text change to consider: This public-key data (without the BEGIN and END tags) is placed in the DNS as a TXT record subdomain

Re: [ietf-dkim] [dkim] #10: Error in Appendix C. Creating a Public Key

2011-04-14 Thread Hector Santos
correct. ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL

Re: [ietf-dkim] ISSUE: non-ascii header text

2011-04-13 Thread Hector Santos
Dave CROCKER wrote: On 4/13/2011 10:31 AM, J.D. Falk wrote: I'm generally in favor of updating the document to match the current state of IDN and EAI work, but I don't know it well enough to comment intelligently on whether John's proposed text does so. as phrased, I'll disagree with

Re: [ietf-dkim] [dkim-ops] key validation question

2011-04-12 Thread Hector Santos
SM wrote: [I suggest following up on the DKIM WG mailing list] You are restating a MUST. :-) I agree that it is important. The problem here is that it still leads to various interpretations due to the keywords. I'll try rewriting the text in Section 3.6.1: h= Acceptable hash

Re: [ietf-dkim] Work group future

2011-04-12 Thread Hector Santos
did nothing until Microsoft came out with their own versions. Anyway thanks for your comments regarding the WG future. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according

[ietf-dkim] LAST CALL ISSUE: Section 2.3 Evaluation Layer introduction

2011-04-12 Thread Hector Santos
is not consistent in 2.3, I would like to see that we also add Policy Assessment semantics to this text. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf

Re: [ietf-dkim] Working Group Last Call on 4871bis

2011-04-12 Thread Hector Santos
semantics to help serve DKIM total deployment interest or c) we can remove the independent trust assessment service evaluation layer semantic that should had been snuck in at the last minute in the first place without keeping it open ended. -- Hector Santos, CTO http://www.santronics.com http

[ietf-dkim] issue: Section 2.3 Evaluation Layer introduction

2011-04-12 Thread Hector Santos
Hector Santos wrote: Fundamentally, we tried to make DKIM-BASE independent of specific implementation evaluation methods starting by pulling semantics regarding policy. However, an evaluation layer for trust was reintroduced in section 2.3. 2.3. Identity A person, role

Re: [ietf-dkim] ISSUE: verifier message editing language

2011-04-12 Thread Hector Santos
be rendered - should be treated +1 -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [dkim-ops] key validation question

2011-04-10 Thread Hector Santos
using SHA1. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ dkim-ops mailing list dkim-ops@mipassoc.org http://mipassoc.org/mailman/listinfo/dkim-ops

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-08 Thread Hector Santos
Douglas Otis wrote: On 4/7/11 10:08 AM, Murray S. Kucherawy wrote: You could, if you know that the use of i= by a given SDID is consistent, and it's useful for you to track per-AUID reputation. Those are two big ifs to me. Murray, Anyone processing this type of data will quickly

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-07 Thread Hector Santos
. The easier implementation is #1 and maybe with limited #2 would work. So to answer to this question, yes, it is better to use headers if only because it would be the only way to currently maximize the probability of support without a need for software change. -- Hector Santos, CTO http

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-06 Thread Hector Santos
Charles Lindsey wrote: Which suggests that future use profiles may need tag hooks to hang their features on, and so if there is some underused existing tag (such as i=) already in the spec, then it is better left there to facilitate such future profiles. Good point. The thing is, for

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-06 Thread Hector Santos
Michael Thomas wrote: On 04/06/2011 08:48 AM, Steve Atkins wrote: That sounds like a fragile way to extend things - leave a little used feature around and hope someone who wants something new hijacks that field in a non-conflicting way instead. (Which may not be what you're suggesting, but

Re: [ietf-dkim] Extensions (was RE: Proposal: Removal of AUID (i= tag/value))

2011-04-06 Thread Hector Santos
standard allows for signer-defined non-standard tags to exist and be bound to the DKIM-Signature. Of course, the only technical requirement would be for it to follow the tag=value ABNF syntax. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com

Re: [ietf-dkim] Extensions (was RE: Proposal: Removal of AUID (i= tag/value))

2011-04-06 Thread Hector Santos
Tony Hansen wrote: Whether it were done by adding semantic signposts for i=, additional tag values, or additional 5322 headers, it should *not* be done in an ad-hoc fashion. +1. From my perspective, we are beyond the idea of whether i= or a new st= tag is needed or not, but rather

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-06 Thread Hector Santos
it is already possible to create multi-signer streams, the only incentive I can see is a signer incentive to reduce multi-signer stream management and cost related issues. It sounds your question about handling results a certain way. -- Hector Santos, CTO http://www.santronics.com http

Re: [ietf-dkim] Work group future

2011-04-05 Thread Hector Santos
Murray S. Kucherawy wrote: -Original Message- That's a fairly grandiose expectation. One might also wonder why law enforcement hasn't managed to stop drug abuse, cybercrime, or myriad other plagues on society. Does that mean laws should not exist? The issue is that the

Re: [ietf-dkim] Open issues in RFC4871bis

2011-04-05 Thread Hector Santos
Murray S. Kucherawy wrote: -Original Message- 2.3. Identity A person, role, or organization. In the context of DKIM, examples include the author, the author's organization, an ISP along the handling path, an independent trust assessment service, and a mailing list

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-05 Thread Hector Santos
with the d= value, I see less value in passing this to the engine unless it is something that reflects the 5322.From address and even then, the 5322.From is also hash bound signature requirement. So with a reputation mindset only, I can only see i= useful for logging or tracing. -- Hector

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-05 Thread Hector Santos
Lets also keep mind that i= predated any reputation assessment modeling the WG cogs took on which was first out of scope as oppose to the focus with the chartered policy standard proposal. Hence DKIM verification output modeling was based on a security model to protect against any signature

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-05 Thread Hector Santos
and the outcome would be the same - no valid signature. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-05 Thread Hector Santos
John R. Levine wrote: So if we keep i= as is in the spec, we can conclude the standard process and give a meaning of i= outside this spec in another RFC? No, it's not backward compatible. My signatures all have a fully compliant i= value which is not an e-mail address. (Take a look.) It

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-04 Thread Hector Santos
Dave CROCKER wrote: On 4/1/2011 10:04 PM, Franck Martin wrote: I would suggest we deprecate i= and add st= (if not already used) that would let the sender specify a stream category. With IPv6 we may loose IP reputation, this is a way to bring it back within DKIM. Why doesn't

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-04 Thread Hector Santos
component. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-02 Thread Hector Santos
, etc) in describing the what, why and when to use reasons for his particular i= option, was not easy to do especially when it came to the DNS management aspects. -- Hector Santos http://www.santronics.com ___ NOTE WELL: This list operates according

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-01 Thread Hector Santos
to ambiguously document for customer to understand and use with no real verification payoff, then +1 to remove i= from DKIM. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-01 Thread Hector Santos
setup does not have a i= defined, yet it is showing one in the A-R record when verified by sbh17.songbird.com. Does that mean, a proposal to remove i= in DKIM-BASE, would imply an update to the A-R draft is necessary? -- Hector Santos, CTO http://www.santronics.com http

<    4   5   6   7   8   9   10   11   12   13   >