[Ietf-dkim] Re: PROPOSAL: reopen this working group and work on DKIM2

2024-11-07 Thread Murray S. Kucherawy
On Thu, Nov 7, 2024 at 4:26 PM Franck Martin wrote: > A last nit, many standardized on opendkim, because of interoperability. > There were too many weird things happening between different > implementations of DKIM1. I don’t know if interoperability should be better > addressed (better debugging,

[Ietf-dkim] Re: PROPOSAL: reopen this working group and work on DKIM2

2024-11-07 Thread Murray S. Kucherawy
On Thu, Nov 7, 2024 at 12:27 AM Bron Gondwana wrote: > We have a draft charter here: > https://notes.ietf.org/YGynIPpYS7yqg5G7ZeSQeA > I've loaded that text into the datatracker for DKIM, and move it to "Draft Charter" state: https://datatracker.ietf.org/doc/charter-ietf-dkim/ Comments from peo

[Ietf-dkim] Re: Signature algorithm and future development of DKIM

2024-08-18 Thread Murray S. Kucherawy
On Sat, Aug 17, 2024 at 3:05 PM Steffen Nurpmeso wrote: > Since then myriads of possibilities have been added to generate > "more identification value" of an email's source, even "over the > corner", and what not. > Myriads? Which ones are those? > |indirect mail flows. I think you'd need t

[Ietf-dkim] Re: Signature algorithm and future development of DKIM

2024-08-18 Thread Murray S. Kucherawy
On Sun, Aug 18, 2024 at 10:18 PM Jan Dušátko wrote: > I would like to correct to the "signed part of message is unchanged", > because of problematic length tag in DKIM-Signature header. > Are you observing widespread use of "l="? I seem to recall it had almost completely fallen out of use. As

[Ietf-dkim] Re: Signature algorithm and future development of DKIM

2024-08-17 Thread Murray S. Kucherawy
On Sat, Aug 17, 2024 at 12:36 PM Steffen Nurpmeso wrote: > |> Instead there should be a (yet another) DNS entry that notifies > |> whether a host DKIM-signs its emails, or not. > |> Then receivers can peek that state. > |> This idea in several forms was posted here in the past, without > |>

[Ietf-dkim] Re: Signature algorithm and future development of DKIM

2024-08-16 Thread Murray S. Kucherawy
On Fri, Aug 16, 2024 at 3:14 PM Steffen Nurpmeso wrote: > Instead there should be a (yet another) DNS entry that notifies > whether a host DKIM-signs its emails, or not. > Then receivers can peek that state. > This idea in several forms was posted here in the past, without > responses. > Why do

[Ietf-dkim] Re: Manipulation of signed messages

2024-05-30 Thread Murray S. Kucherawy
On Thu, May 30, 2024 at 9:13 AM Alessandro Vesely wrote: > z= saves all fields, which would be too much in most cases. Moreover, > doing so > suggests treating all fields as a whole, rather than dealing with each > one's > peculiarity. > That's not what the RFC says. Of course, if an Original-

[Ietf-dkim] Re: Manipulation of signed messages

2024-05-30 Thread Murray S. Kucherawy
On Thu, May 30, 2024 at 3:30 AM Alessandro Vesely wrote: > z= is a valuable tool for debugging and learning why signatures fail. For > reversing purposes, instead, Original-* fields are preferable as they can > be > individually added and possibly signed also by different operators. > Reversal >

[Ietf-dkim] Re: Manipulation of signed messages

2024-05-29 Thread Murray S. Kucherawy
On Wed, May 29, 2024 at 11:09 AM Alessandro Vesely wrote: > On Wed 29/May/2024 19:29:27 +0200 John Levine wrote: > > It appears that Alessandro Vesely said: > >>My verifier, in particular, works every time on my messages. It doesn't > mean > >>it doesn't work at scale. > > > > Nor, of course,

[Ietf-dkim] Re: DKIM with body length

2024-05-23 Thread Murray S. Kucherawy
On Thu, May 23, 2024 at 11:13 AM John Levine wrote: > On the other hand, I see that the perl and python DKIM modules sign > the MIME Content-* headers by default. Do you remember what opendkim > does? A quick look at the code wasn't too enlightening. > It signs them all unless you configure it t

[Ietf-dkim] Re: DKIM with body length

2024-05-23 Thread Murray S. Kucherawy
On Thu, May 23, 2024 at 7:44 AM Wei Chuang wrote: > Just specifically in regards authenticating mailing list modifications: > fair enough that the ideas should be implemented first before any sort of > IETF publication for it. Still there ought to be a place for informal, > early discussion of i

[Ietf-dkim] Re: WG Action: Formed Mail Maintenance (mailmaint) / Commitment

2024-05-21 Thread Murray S. Kucherawy
On Tue, May 21, 2024 at 10:05 AM Jim Fenton wrote: > One thing that hasn’t been clear to me: > > On 21 May 2024, at 9:48, Murray S. Kucherawy wrote: > > > * Prior to accepting any Standards Track document for development, there > must > > be a commitment to imple

[Ietf-dkim] Re: Fwd: WG Action: Formed Mail Maintenance (mailmaint) / Commitment

2024-05-21 Thread Murray S. Kucherawy
ing group. The only constraint being established is: If you want this particular working group to process your work, there's a specific minimum you need to meet. On Sun, May 19, 2024 at 7:22 PM Dave Crocker wrote: > On 5/10/2024 2:33 PM, Dave Crocker wrote: > > On 5/10/2024 10:54

[Ietf-dkim] Re: DKIM with body length

2024-05-20 Thread Murray S. Kucherawy
On Sun, May 19, 2024 at 9:27 AM Wei Chuang wrote: > As many of you know there was a DKIM security vulnerability disclosure > Friday around the signature header body length tag "l=". The blog post is > here: https://www.zone.eu/blog/2024/05/17/bimi-and-dmarc-cant-save-you/ > The authors state that

[Ietf-dkim] Fwd: WG Action: Formed Mail Maintenance (mailmaint)

2024-05-10 Thread Murray S. Kucherawy
FYI -- Forwarded message - From: IESG Secretary Date: Thu, May 9, 2024 at 1:01 PM Subject: WG Action: Formed Mail Maintenance (mailmaint) To: IETF Announcement List Cc: , , A new IETF WG has been formed in the Applications and Real-Time Area. For additional information, please

Re: [Ietf-dkim] Question regarding RFC 6376

2024-03-11 Thread Murray S. Kucherawy
On Mon, Mar 11, 2024 at 2:04 PM David Harris wrote: > Thank you for taking the time to answer my questions - most appreciated. > > Your answer has addressed questions 1 and 2 for me. I'm still unclear on > certain aspects of question 3, though: > > [...] > > The pseudocode for "sig-alg" says: > >

Re: [Ietf-dkim] Question regarding RFC 6376

2024-03-11 Thread Murray S. Kucherawy
On Mon, Mar 11, 2024 at 6:50 AM David Harris wrote: > Question 1: > > My first question is the exact meaning of this piece of pseudocode: > >body-hash= hash-alg (canon-body, l-param) > > Does this mean: > > 1: Pass the canonicalized body to the hash algorithm, then pass the value > of >

Re: [Ietf-dkim] Fwd: Re: [..] Recommendation for dkim signing

2024-03-07 Thread Murray S. Kucherawy
On Thu, Mar 7, 2024 at 1:05 PM A. Schulze wrote: > I enabled double signing years ago on my personal domain and last year at > an medium scale ESP. > So far, we didn't noticed negative effects. > Intentionally I removed SPF on my personal domain last year, also without > any delivery issues. > >

Re: [Ietf-dkim] Headers that should not be automatically oversigned in a DKIM signature?

2024-02-05 Thread Murray S. Kucherawy
On Mon, Feb 5, 2024 at 1:39 PM Steffen Nurpmeso wrote: > If a graphical user interface gives you a green "ok" button to > click, or "red" otherwise, that is even better as in browser URL > lines. Then pop up a tree-view of message modifications and > alertize where it broke, checkbox for is-this

Re: [Ietf-dkim] Question about lone CR / LF

2024-02-05 Thread Murray S. Kucherawy
On Mon, Feb 5, 2024 at 8:50 AM Dave Crocker wrote: > OpenDKIM will not sign a message that fails basic RFC5322 header checks > (e.g., "From" or "Date" is missing), but will place an > Authentication-Results field indicating the message is malformed. At some > point, though, someone talked me int

Re: [Ietf-dkim] Question about lone CR / LF

2024-02-03 Thread Murray S. Kucherawy
On Sat, Feb 3, 2024 at 1:54 PM John R Levine wrote: > > > It also optionally does LF to CRLF translation. I'm fairly certain this > is > > to accommodate local/human SMTP injections since humans can't be expected > > to type CRLFs when entering manual tests from a shell. ... > > Unix MTAs strip

Re: [Ietf-dkim] Question about lone CR / LF

2024-02-03 Thread Murray S. Kucherawy
On Sat, Feb 3, 2024 at 5:40 AM Dave Crocker wrote: > Having a DKIM module check for one aspect of RFC5322 conformance -- raises > a need to make it a full RFC5322 compliance engine. > > If it doesn't, then the attention to compliance is a random walk through > whatever concerns are fashionable a

Re: [Ietf-dkim] Question about lone CR / LF

2024-02-01 Thread Murray S. Kucherawy
On Thu, Feb 1, 2024 at 10:03 AM John Levine wrote: > It appears that Murray S. Kucherawy said: > >-=-=-=-=-=- > > > >On Wed, Jan 31, 2024 at 5:44 PM Steffen Nurpmeso > wrote: > > > >> But i cannot read this from RFC 6376. > > > >Sections 2.8

Re: [Ietf-dkim] Question about lone CR / LF

2024-02-01 Thread Murray S. Kucherawy
On Wed, Jan 31, 2024 at 5:44 PM Steffen Nurpmeso wrote: > But i cannot read this from RFC 6376. > Sections 2.8 and 3.4.4 don't answer this? -MSK ___ Ietf-dkim mailing list Ietf-dkim@ietf.org https://www.ietf.org/mailman/listinfo/ietf-dkim

Re: [Ietf-dkim] Headers that should not be automatically oversigned in a DKIM signature?

2024-01-31 Thread Murray S. Kucherawy
On Wed, Jan 31, 2024 at 9:35 AM Hector Santos wrote: > First time I have come across the term (“oversign”) and it appears to be > a feature with several products in the market. But checking the RFC, unless > I missed it, it’s not a RFC defined term. Replay is the term used. > You won't find it

[Ietf-dkim] Shutdown deadline

2024-01-03 Thread Murray S. Kucherawy
Hi all, welcome back from the holidays. It's been about ten weeks since Laura posted about the status of the WG, and a final plea was made for energy and activity. Since then, despite a handful of people expressing interest at the M3AAWG meeting in Brooklyn, there has been no activity of any kind

Re: [Ietf-dkim] DKIM Signature

2023-10-27 Thread Murray S. Kucherawy
On Sun, Oct 1, 2023 at 1:50 AM Jan Dušátko wrote: > I would like to ask to consider the possibility of defining a DKIM > signature using Ed448. [...] Which DKIM implementations are known to be willing to support this if it were added? ED25519 support was added by a working group called DCRUP.

Re: [Ietf-dkim] [Lists] DKIM Working Group Status Update

2023-10-27 Thread Murray S. Kucherawy
On Fri, Oct 27, 2023 at 6:33 AM wrote: > Appreciate all the work and effort you’ve put into this. I would like to > help out as much as I can. I know Monitoring isn’t part of this from IETF > POV, however, I think it’s something that is important and I will bring > this up on the M3AAWG side. >

Re: [Ietf-dkim] DKIM Working Group Status Update

2023-10-27 Thread Murray S. Kucherawy
On Thu, Oct 26, 2023 at 12:03 PM Wei Chuang wrote: > I was there at M3AAWG and concur with the chair's observations. I should > also note I was part of the group who proposed restarting the DKIM WG at > Dispatch IETF-115. My hope back then was that solving DKIM replay > systematically could be

Re: [Ietf-dkim] DKIM-FBL

2023-09-27 Thread Murray S. Kucherawy
I'm betting the chairs would want this not to consume any of the so-far-meager energy this WG is showing. I can imagine that ietf-smtp would be a reasonable place to at least announce that you're working on this. I don't know that that's a good home for ongoing discussion either though. We don't

Re: [Ietf-dkim] What makes this posting different from the original posting?

2023-09-08 Thread Murray S. Kucherawy
On Fri, Sep 8, 2023 at 7:17 AM Jesse Thompson wrote: > > Is rfc6651 a lost cause? It looks like it defines a reporting mechanism in > control of the signer, as opposed to the attacker. > > > Has anyone (else) implemented it? > > > That's what I want to understand. Or, more specifically, if no one

Re: [Ietf-dkim] What makes this posting different from the original posting?

2023-09-07 Thread Murray S. Kucherawy
On Thu, Sep 7, 2023 at 9:38 PM Jesse Thompson wrote: > Is rfc6651 a lost cause? It looks like it defines a reporting mechanism in > control of the signer, as opposed to the attacker. > Has anyone (else) implemented it? -MSK ___ Ietf-dkim mailing list

Re: [Ietf-dkim] What makes this posting different from the original posting?

2023-09-07 Thread Murray S. Kucherawy
On Thu, Sep 7, 2023 at 3:15 PM Evan Burke wrote: > To be clear, for us x= was one of the most effective defenses against > large-scale replay attacks. Not perfect, obviously, but applied carefully > and in conjunction with header oversigning, it created a significantly > narrower window for attac

Re: [Ietf-dkim] What makes this posting different from the original posting?

2023-09-07 Thread Murray S. Kucherawy
On Thu, Sep 7, 2023 at 10:03 AM Dave Crocker wrote: > > The "new header field" (or similar) approach alone would not open any > doors for revocation/invalidation of the fact that the signature was > applied on that first single message. Relying solely on fast key > rotation/invalidation would mea

Re: [Ietf-dkim] What makes this posting different from the original posting?

2023-08-29 Thread Murray S. Kucherawy
On Tue, Aug 29, 2023 at 8:11 PM Dave Crocker wrote: > On 8/29/2023 7:46 PM, Grant Taylor wrote: > > On 8/29/23 9:02 PM, Dave Crocker wrote: > > > > Why not re-use the existing DKIM solution, just with a different > > domain / set of keys? > > Because it does not provide the affirmative informatio

Re: [Ietf-dkim] What makes this posting different from the original posting?

2023-08-29 Thread Murray S. Kucherawy
On Tue, Aug 29, 2023 at 11:10 AM Dave Crocker wrote: > Two thoughts: > >1. If the substance of the message should fail a quality assessment, >why does it pass at the outbound (sending) site? >2. If the problem is reasonable content, but sent to many unintended >(or, rather, undecl

Re: [Ietf-dkim] Replay attack definition discussion

2023-08-17 Thread Murray S. Kucherawy
On Thu, Aug 17, 2023 at 3:30 AM Alessandro Vesely wrote: > > I'm not convinced advice is necessary here. Do you really need signs in > > banks that say "Don't put your signature on random financial > documents"? I > > have to believe that people understand what it means to sign something, > and

Re: [Ietf-dkim] Replay attack definition discussion

2023-08-16 Thread Murray S. Kucherawy
On Wed, Aug 16, 2023 at 11:19 AM Dave Crocker wrote: > On 8/16/2023 10:48 AM, Murray S. Kucherawy wrote: > > Yet, an open > > signer is for DKIM the equivalent of what an open relay is for SPF. > > It is nothing of the sort. > > [...] > For the record, the attrib

Re: [Ietf-dkim] Replay attack definition discussion

2023-08-16 Thread Murray S. Kucherawy
On Wed, Aug 16, 2023 at 10:25 AM Alessandro Vesely wrote: > On Wed 16/Aug/2023 15:26:43 +0200 Laura Atkins wrote: > >> On 16 Aug 2023, at 12:59, Alessandro Vesely wrote: > >> On Wed 16/Aug/2023 11:17:50 +0200 Laura Atkins wrote: > On 16 Aug 2023, at 09:57, Alessandro Vesely wrote: > H

Re: [Ietf-dkim] Call for adoption results: draft-ietf-dkim-replay-problem Adopted

2023-08-14 Thread Murray S. Kucherawy
On Sun, Aug 13, 2023 at 8:34 PM Jesse Thompson wrote: > If I understand based on my limited view of history, DKIM was designed for > authentication between two hops. Signature survival across intermediaries > was only achievable by encouraging intermediaries to not make any changes > to the messa

Re: [Ietf-dkim] Call for adoption results: draft-ietf-dkim-replay-problem Adopted

2023-08-12 Thread Murray S. Kucherawy
On Sat, Aug 12, 2023 at 12:31 PM Steffen Nurpmeso wrote: > |> The aspect of DKIM-subsignatures revealing Bcc: presence (of 1+ > |> recipients of a domain) if a Bcc: recipient replies to a message > |> that Murray Kucherawy adduced i obviously have not fully addressed > |> with my response. >

Re: [Ietf-dkim] Call for adoption results: draft-ietf-dkim-replay-problem Adopted

2023-08-09 Thread Murray S. Kucherawy
On Wed, Aug 9, 2023 at 3:14 PM Steffen Nurpmeso wrote: > And couldn't it become standardized that verification results then > must be included in future DKIM signatures? > So then a verifier inserts a RFC 7001 header, and that will be > covered by a further DKIM signature. > Aren't you basically

Re: [Ietf-dkim] Call for adoption results: draft-ietf-dkim-replay-problem Adopted

2023-08-09 Thread Murray S. Kucherawy
On Wed, Aug 9, 2023 at 9:07 AM Steffen Nurpmeso wrote: > All these problems are long known to (and "solved" by) the OpenPGP > (and S/MIME) communities, no? > In OpenPGP you can either encrypt-to a single or many recipients. > (With at least GnuPG you can also "hide" those recipients: > >‐

Re: [Ietf-dkim] Call for adoption results: draft-ietf-dkim-replay-problem Adopted

2023-08-09 Thread Murray S. Kucherawy
On Wed, Aug 9, 2023 at 2:54 AM Laura Atkins wrote: > If there are multiple BCCs that implies that whatever is creating the mail > must make individual copies of the message with only the BCC recipient in > that line before it’s signed with DKIM. So for a message with 3 BCCs, there > are 4 separat

Re: [Ietf-dkim] Call for adoption results: draft-ietf-dkim-replay-problem Adopted

2023-08-09 Thread Murray S. Kucherawy
On Wed, Aug 9, 2023 at 2:54 AM Laura Atkins wrote: > It seems to me there is a lot of heavy lifting to be done to make sure > that the individual recipient only sees a copy of the message with their > address in the BCC header. > > If there are multiple BCCs that implies that whatever is creating

Re: [Ietf-dkim] Call for adoption results: draft-ietf-dkim-replay-problem Adopted

2023-08-08 Thread Murray S. Kucherawy
On Tue, Aug 8, 2023 at 8:21 PM Jesse Thompson wrote: > > As you cited, RFC 5322 describes three ways that the "Bcc" field is > typically used. You're talking about just one of those, and I'm not sure > it's the most common one. In any case, I suggest that "should" is a bit of > a leap, especial

Re: [Ietf-dkim] draft-ietf-dkim-replay-problem comments

2023-08-08 Thread Murray S. Kucherawy
On Tue, Aug 8, 2023 at 9:25 AM Alessandro Vesely wrote: > On Tue 08/Aug/2023 14:47:37 +0000 Murray S. Kucherawy wrote: > > On Tue, Aug 8, 2023 at 7:17 AM Scott Kitterman > wrote: > > > >> That's true of all indirect mail flows. It's not a distin

Re: [Ietf-dkim] draft-ietf-dkim-replay-problem comments

2023-08-08 Thread Murray S. Kucherawy
On Tue, Aug 8, 2023 at 7:17 AM Scott Kitterman wrote: > That's true of all indirect mail flows. It's not a distinguishing feature > of the attack. > Quite right, making this harder to pin down. But, to Alessandro's point, I do think the description in the document is accurate. -MSK __

Re: [Ietf-dkim] draft-ietf-dkim-replay-problem comments

2023-08-08 Thread Murray S. Kucherawy
On Tue, Aug 8, 2023 at 2:16 AM Alessandro Vesely wrote: > On Mon 07/Aug/2023 23:52:02 + Scott Kitterman wrote: > > On Monday, August 7, 2023 7:47:47 PM EDT Murray S. Kucherawy wrote: > >> > >> I think the document does describe the attack. An instance of the >

Re: [Ietf-dkim] Call for adoption results: draft-ietf-dkim-replay-problem Adopted

2023-08-07 Thread Murray S. Kucherawy
On Mon, Aug 7, 2023 at 9:23 PM Jesse Thompson wrote: > On Mon, Aug 7, 2023, at 10:54 PM, Murray S. Kucherawy wrote: > > On Mon, Aug 7, 2023 at 8:00 PM Emanuel Schorsch 40google@dmarc.ietf.org> wrote: > > If there are not that many BCC recipients for a message then

Re: [Ietf-dkim] Call for adoption results: draft-ietf-dkim-replay-problem Adopted

2023-08-07 Thread Murray S. Kucherawy
On Mon, Aug 7, 2023 at 8:00 PM Emanuel Schorsch wrote: > If there are not that many BCC recipients for a message then it is likely > not necessary as the duplicate message counting is unlikely to have a > negative impact. If there are a large number of BCC recipients for a given > message then I

Re: [Ietf-dkim] Call for adoption results: draft-ietf-dkim-replay-problem Adopted

2023-08-07 Thread Murray S. Kucherawy
On Mon, Aug 7, 2023 at 7:43 PM Jesse Thompson wrote: > Similar to what Emmanuel is saying about detecting SPF/DKIM zone > misalignment, the solution to DKIM replay is for receivers to maintain some > state and feed it into bespoke replay detection algorithms. If all > receivers can maintain this

Re: [Ietf-dkim] draft-ietf-dkim-replay-problem comments

2023-08-07 Thread Murray S. Kucherawy
On Mon, Aug 7, 2023 at 3:58 PM Scott Kitterman wrote: > On Monday, August 7, 2023 6:53:19 PM EDT Murray S. Kucherawy wrote: > ... > > (2) Throughout the document, the proper term "Replay Attack" (and > sometimes > > "Replay") is used, but it's nev

[Ietf-dkim] draft-ietf-dkim-replay-problem comments

2023-08-07 Thread Murray S. Kucherawy
Hi, Some comments after a review of the adopted document: (1) I find the abstract is more readable if broken into three paragraphs, with the second starting "DKIM survives ..." and the third "This document discusses ...". (2) Throughout the document, the proper term "Replay Attack" (and sometime

Re: [Ietf-dkim] Proposals for tolerating mailing list modifications

2023-08-05 Thread Murray S. Kucherawy
On Fri, Aug 4, 2023 at 2:46 PM Michael Thomas wrote: > Well, for starters ARC doesn't have broad deployment. But the author > doesn't say why ARC is needed or relevant. That is the point here. *All* > changes need to be justified including any imported mechanisms. The less > rat holes the better.

Re: [Ietf-dkim] Proposals for tolerating mailing list modifications

2023-08-04 Thread Murray S. Kucherawy
Colleagues, On Fri, Aug 4, 2023 at 12:08 PM Michael Thomas wrote: > Exactly. Any proposed modifications to DKIM should be based on DKIM > itself. Anything else is off-topic. It's not like you can't propose the > ARC modifications to DKIM in terms of DKIM itself, though all of those > modificatio

Re: [Ietf-dkim] Call for adoption results: draft-ietf-dkim-replay-problem Adopted

2023-08-03 Thread Murray S. Kucherawy
On Thu, Aug 3, 2023 at 10:01 AM Suresh Ramasubramanian wrote: > Would this effort be better targeted at the various open source as well as > proprietary implementations of DKIM libraries, to flag if not eliminate the > various edge cases that are being gamed by the spammers? > > > > Rolling out s

Re: [Ietf-dkim] Call for adoption results: draft-ietf-dkim-replay-problem Adopted

2023-08-01 Thread Murray S. Kucherawy
On Tue, Aug 1, 2023 at 8:29 AM Laura Atkins wrote: > We have a current version of the draft problem statement available on the > data tracker. Murray and a few others made a few comments that were added > in the -03 version. > > > https://mailarchive.ietf.org/arch/msg/ietf-dkim/Q5ybHiYkMlg5QFaFp2

Re: [Ietf-dkim] DKIM issues (tag "v=DKIM1", tag "p=")

2023-05-16 Thread Murray S. Kucherawy
On Tue, May 16, 2023 at 7:00 AM Jan Dušátko wrote: > 1) At this moment, the use of the tag "v=DKIM1;" is only RECOMMENDED and > if this tag is used, it must be the first. Unlike, for example, SPF and > DMARC, this is not a REQUIRED (MANDATORY) record. In case of an attempt > to identify DKIM reco

Re: [Ietf-dkim] Moving forward - from the chairs

2023-04-10 Thread Murray S. Kucherawy
On Mon, Apr 10, 2023 at 11:24 AM Scott Kitterman wrote: > On Monday, April 10, 2023 2:05:28 PM EDT Laura Atkins wrote: > ... > > There is currently an active Call for Adoption for a draft. > ... > > What's the plan for closing this out? I haven't seen any objections to > the > idea and as of tom

[Ietf-dkim] Cooling things off

2023-03-28 Thread Murray S. Kucherawy
Colleagues, Things have gotten somewhat heated in here. I think we need to take a step back. While I have no doubts whatsoever that the participants and chairs are well-intentioned and would like to see this working group make progress in an appropriate direction, even if we may not all agree ye

Re: [Ietf-dkim] What has been tried and doesn't work should be documented in the problem statement

2023-03-27 Thread Murray S. Kucherawy
On Tue, Mar 28, 2023 at 1:05 AM Michael Thomas wrote: > Lastly: cutting off debate because of time is bogus. Murray already said > that the milestone dates were fairly arbitrary. Using them as a tool to > get the chair's preferred result is... disingenuous. > The milestones are negotiable, but i

Re: [Ietf-dkim] What has been tried and doesn't work should be documented in the problem statement

2023-03-26 Thread Murray S. Kucherawy
On Sat, Mar 25, 2023 at 10:29 AM Michael Thomas wrote: > On 3/24/23 6:19 PM, Barry Leiba wrote: > > I don't agree with the premise. I think what was tried and didn't > > work should be documented in the result that the working group comes > > out with, but not in the problem statement. > > There

Re: [Ietf-dkim] Clarifying the problem

2023-03-25 Thread Murray S. Kucherawy
On Fri, Mar 24, 2023, 10:10 Michael Thomas wrote: > On 3/24/23 9:58 AM, Laura Atkins wrote: > > > On 24 Mar 2023, at 16:48, Michael Thomas > wrote: > > > On 3/24/23 6:14 AM, Laura Atkins wrote: > > Please, let’s focus on the current issue with is addressing and refining > the problem statement

Re: [Ietf-dkim] Comments on draft-chuang-dkim-replay-problem

2023-03-24 Thread Murray S. Kucherawy
On Fri, Mar 24, 2023 at 9:59 AM Dave Crocker wrote: > On 3/24/2023 9:38 AM, Murray S. Kucherawy wrote: > > I think I concur with the suggestion that wa should drop discussion of > > ARC. This WG, or the DMARC WG, can develop an update to ARC based on > > the outcome

[Ietf-dkim] Comments on draft-chuang-dkim-replay-problem

2023-03-24 Thread Murray S. Kucherawy
Informal comments only here. I know a merger with Dave's draft is in progress, so some of these may not apply by the time you're done. Section 1.1: It feels a little presumptuous to assume any DKIM receiver has also built out a reputation system, or has access to one. I guess it might depend on

Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-22 Thread Murray S. Kucherawy
On Sun, Mar 19, 2023 at 11:04 PM Emanuel Schorsch wrote: > In my mind, there are two important things I would like to see achieved: > > 1) Distinguish indirect from direct flows (encode in some way which server > / mailingList the original DKIM message was intended to come from). This is > needed

Re: [Ietf-dkim] Clarifying the problem

2023-03-22 Thread Murray S. Kucherawy
On Tue, Mar 21, 2023 at 8:37 PM Scott Kitterman wrote: > > >>1. Do receivers keep tabs on which users are using things like > >>mailing lists to differentiate users who expect to get indirect mail > vs > >>those who don't? > >> > >> The large mailbox operators might have hints about

Re: [Ietf-dkim] Clarifying the problem

2023-03-21 Thread Murray S. Kucherawy
There was one prior answer to this. Here's another. There's a claim here that the problem statement(s) is/are too vague. I'm a little worried that tightening up the problem definition along these 20 vectors will give us such a tight problem statement that any solution is so targeted as to be of

Re: [Ietf-dkim] Process Questions

2023-03-13 Thread Murray S. Kucherawy
On Fri, Mar 10, 2023 at 11:19 AM Michael Thomas wrote: > On 3/10/23 7:46 AM, Laura Atkins wrote: > > > On 10 Mar 2023, at 00:30, Michael Thomas > wrote: > > Now that we have a chair, I have a question about process wrt to the > charter. The charter states that either the working group will prod

Re: [Ietf-dkim] DKIM update - header tag

2023-03-13 Thread Murray S. Kucherawy
On Fri, Mar 10, 2023 at 10:48 AM Jan Dušátko wrote: > I got recommendation to propose changes in that mailing group. > My work depend on appropriate protection of our brand, however this > tasks require also management of records required for that protection. > We have huge problem with identific

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-19 Thread Murray S. Kucherawy
On Sun, Feb 19, 2023 at 11:49 AM Dave Crocker wrote: > This is a very basic point about protocols vs. implementations. A > protocol defines the 4 walls of its sandbox. It owns that sandbox and > defines whatever it needs to, within the confines of that space. > > [...] > > But again, this is pro

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-18 Thread Murray S. Kucherawy
On Sat, Feb 18, 2023 at 8:27 PM Michael Thomas wrote: > > >> Beyond this SHOULD, I think we need to consider whether the caller needs >> to be told specifically when a failure occurs for this reason. Right now >> an implementation might return just a PERMFAIL without noting that it's >> because

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-18 Thread Murray S. Kucherawy
On Sat, Feb 18, 2023 at 12:10 PM Michael Thomas wrote: > > > Beyond this SHOULD, I think we need to consider whether the caller needs > to be told specifically when a failure occurs for this reason. Right now > an implementation might return just a PERMFAIL without noting that it's > because of

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-17 Thread Murray S. Kucherawy
On Fri, Feb 17, 2023 at 9:35 AM Scott Kitterman wrote: > Currently RFC 6376 says, "Signatures MAY be considered invalid". I think > the practical effect as described in protocol terms would be to change the > MAY to SHOULD under X conditions and SHOULD NOT under !X conditions. Not > that I'd ex

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-17 Thread Murray S. Kucherawy
On Thu, Feb 16, 2023 at 2:13 PM Barry Leiba wrote: > I like this approach: if the issue is that an "expired" signature is > treated as unsigned, I think we have an unacceptable level of false > positives. But if the fact that a signature is valid but expired is > simply another factor in the dec

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-16 Thread Murray S. Kucherawy
On Wed, Feb 15, 2023 at 10:49 PM Evan Burke wrote: > >> I don't think we're saying different things. I remember the point of the >> answer I got in that session being that most, but not all, implementations >> check or enforce signature expiration. But that means if "x=" is the >> solution we l

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-15 Thread Murray S. Kucherawy
On Wed, Feb 15, 2023 at 2:21 PM Michael Thomas wrote: > > There's also the question of whether "x=" is properly enforced. RFC 6376 > says verifiers "MAY" choose to enforce it. I think I asked about this at a > conference recently and was told that it's not universally supported by > implementat

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-15 Thread Murray S. Kucherawy
On Wed, Feb 15, 2023 at 5:39 AM Scott Kitterman wrote: > Any reputation based solution does have down scale limits. Small mail > sources > (such as your random Nebraska forwarder) generally will have no reputation > vice a negative one and so wouldn't get penalized in a scheme like the one > I >

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-15 Thread Murray S. Kucherawy
On Tue, Feb 14, 2023 at 11:44 AM Michael Thomas wrote: > At maximum, isn't it just the x= value? It seems to me that if you don't > specify an x= value, or it's essentially infinite, they are saying they > don't care about "replays". Which is fine in most cases and you can just > ignore it. Somet

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-14 Thread Murray S. Kucherawy
On Tue, Feb 14, 2023 at 11:18 AM Michael Thomas wrote: > Have you considered something like rate limiting on the receiver side for > things with duplicate msg-id's? Aka, a tar pit, iirc? > As I recall that technique is sometimes not suggested because (a) we can't come up with good advice about h

Re: [Ietf-dkim] replay clues

2023-02-12 Thread Murray S. Kucherawy
On Sun, Feb 12, 2023 at 11:19 AM Michael Thomas wrote: > > It's certainly possible to collect data that might correlate something > like "Subject signed vs. not signed" with a spam score, and that could feed > in to a best practices document. I don't know who might be up for > investing the time

Re: [Ietf-dkim] Setting a stage for detection

2023-02-12 Thread Murray S. Kucherawy
On Sun, Feb 12, 2023 at 12:16 PM Dave Crocker wrote: > There appears to be no perfect way to distinguish a Replay attack from a > legitimate re-posting by an Alias or even a Mailing list (that preserves > the original DKIM signature.) > > The only 'signal' that is valid, also is ambiguous. The s

Re: [Ietf-dkim] Setting a stage for detection

2023-02-12 Thread Murray S. Kucherawy
On Sun, Feb 12, 2023 at 1:21 PM Dave Crocker wrote: > One of the continuing problems with anti-abuse discussions is that > discussion always goes to detecting bad actors. While of course there need > to be discussions about them, the problem is that there seem to be no > discussions about good a

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-12 Thread Murray S. Kucherawy
On Fri, Feb 10, 2023 at 2:13 PM Michael Thomas wrote: > Another thing that should probably be discussed is outbound spam > filtering. At a high level, this is really about the sender sending spam. > But email afaik is silent on whether senders or receivers should filter for > spam (and if there i

Re: [Ietf-dkim] replay clues

2023-02-12 Thread Murray S. Kucherawy
On Sat, Feb 11, 2023 at 2:35 PM Michael Thomas wrote: > It's never been especially clear to me whether deployments do their > filtering up front, ie at the MX, or farther down the line. There are > certainly advantages to do it right at the MX with less burden on using AR > to signal all of what

Re: [Ietf-dkim] replay clues

2023-02-12 Thread Murray S. Kucherawy
On Sat, Feb 11, 2023 at 4:48 PM Stephen Farrell wrote: > FWIW, as this discussion has a bit of a flavour of one person > arguing with a bigger bunch of people, I'd like to say that > Mike is asking good questions that deserve consideration. > Have they not been getting consideration? I know I'v

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-10 Thread Murray S. Kucherawy
On Fri, Feb 10, 2023 at 12:06 PM Evan Burke wrote: > > On Fri, Feb 10, 2023 at 11:47 AM Dave Crocker wrote: > >> On 2/10/2023 11:35 AM, Wei Chuang wrote: >> > ARC is a tool to help support modern Indirect Mail Flows, and I >> > believe belongs in the solution space to be explored. >> >> Since AR

Re: [Ietf-dkim] replay clues

2023-02-10 Thread Murray S. Kucherawy
On Fri, Feb 10, 2023 at 8:09 PM Michael Thomas wrote: > I've always thought that the likelihood of a protocol level solution for > this issue is pretty close to zero if not zero. The various proposed > solutions in the problem draft haven't given me any reason to dissuade > me of that notion. > >

Re: [Ietf-dkim] Chartering update

2023-02-04 Thread Murray S. Kucherawy
On Sat, Feb 4, 2023 at 11:11 AM Michael Thomas wrote: > There are architectural ramifications regardless of whether it's mandatory > or not. It would be a lot more reassuring if this were a common and > accepted practice. I don't know the answer to that. If it's uncommon, there > needs to be wide

Re: [Ietf-dkim] Chartering update

2023-02-04 Thread Murray S. Kucherawy
On Thu, Feb 2, 2023 at 3:26 PM Michael Thomas wrote: > I guess my concern is more along the lines of what solutions *aren't*. > There are a bunch of drafts trying to tie the envelope to the email and I > think there needs to be a meta discussion of whether that is a good idea or > not in general.

Re: [Ietf-dkim] sender signing practices

2023-02-03 Thread Murray S. Kucherawy
On Fri, Feb 3, 2023 at 5:14 PM Michael Thomas wrote: > That said, I don't know why we didn't make To:, Cc: and Subject: > mandatory signed fields. But even if it's not mandatory, that should be > a signal that the message should be given increased scrutiny. > RFC 4871 included those as SHOULD wh

[Ietf-dkim] Chartering update

2023-02-02 Thread Murray S. Kucherawy
Colleagues, The IESG is prepared to approve the charter overall. There was one blocking point about publishing the problem statement, which is that the IESG would like that not to be a "maybe". I think that's a reasonable change to make. There is also the fact that I have not secured co-chairs.

Re: [Ietf-dkim] Lars Eggert's Block on charter-ietf-dkim-04-05: (with BLOCK and COMMENT)

2023-01-31 Thread Murray S. Kucherawy
On Tue, Jan 31, 2023 at 2:12 PM Michael Thomas wrote: > Also: the date on the problem statement seems awfully aggressive. My > thinking is that the problem statement should at least discuss (as is > mentioned in the charter) how "replays" are completely legitimate uses > of DKIM, and thus limit t

Re: [Ietf-dkim] Rechartering

2023-01-12 Thread Murray S. Kucherawy
On Mon, Jan 9, 2023 at 12:57 AM Alessandro Vesely wrote: > On Thu 05/Jan/2023 22:26:32 +0100 Dave Crocker wrote: > > On 1/5/2023 9:20 AM, Alessandro Vesely wrote: > >> How about "replay-resistant protocol"? > > > > btw, it isn't clear that 'protocol' is what a solution will be. might > be. > > mi

Re: [Ietf-dkim] Rechartering

2023-01-05 Thread Murray S. Kucherawy
On Sat, Dec 31, 2022 at 3:02 PM Murray S. Kucherawy wrote: > On Sat, Dec 31, 2022 at 2:43 PM Dave Crocker wrote: > >> The initial effort to form a working group in the IETF was pretty casual >> and surfaced a lack of sufficient consensus among advocates. The IETF >> sa

Re: [Ietf-dkim] Rechartering

2022-12-31 Thread Murray S. Kucherawy
On Sat, Dec 31, 2022 at 2:43 PM Dave Crocker wrote: > The initial effort to form a working group in the IETF was pretty casual > and surfaced a lack of sufficient consensus among advocates. The IETF > said go away until there's more agreement. > > We went away for a year, during which we develop

Re: [Ietf-dkim] Rechartering

2022-12-31 Thread Murray S. Kucherawy
On Sat, Dec 31, 2022 at 1:09 PM Michael Thomas wrote: > > On 12/29/22 7:20 PM, Murray S. Kucherawy wrote: > > On Sun, Dec 25, 2022 at 4:14 PM Michael Thomas wrote: > >> >> >> Done, and thanks for that text. >> >> One nit, Barry's text should be

Re: [Ietf-dkim] Rechartering

2022-12-29 Thread Murray S. Kucherawy
On Sun, Dec 25, 2022 at 4:14 PM Michael Thomas wrote: > > > Done, and thanks for that text. > > One nit, Barry's text should be above the proposals not below. It makes it > look like those are the only proposals on the table which I'm nearly > certain is not your intent. > One other thing though,

Re: [Ietf-dkim] Rechartering

2022-12-25 Thread Murray S. Kucherawy
On Sun, Dec 25, 2022 at 6:31 AM Barry Leiba wrote: > I agree with Mike and Scott on the point that it’s worth explicitly > allowing the result to be a “can’t do it” publication. Implicit “couldn’t > do it” is fine in most cases, but here we might say something like, “If the > working group decid

  1   2   >