Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Douglas Otis
On Apr 18, 2006, at 6:56 PM, Stephen Farrell wrote: Douglas Otis wrote: If 7 days provides for the SMTP transport, and people in Sweden and France want to verify messages following their 5 week vacation, then this would require a minimum of 42 days of key availability. The suggestion for

Re: [ietf-dkim] Collecting SMTP delivery data.

2006-04-18 Thread Hector Santos
What exactly are we looking for here? What's the goal? - Average User Mail Reception Time? - Average POP3/IMAP Polling Time? --- Hector - Original Message - From: "Lyndon Nerenberg" <[EMAIL PROTECTED]> To: "Stephen Farrell" <[EMAIL PROTECTED]> Cc: Sent: Tuesday, April 18, 2006 11:

[ietf-dkim] Collecting SMTP delivery data.

2006-04-18 Thread Lyndon Nerenberg
On Apr 18, 2006, at 7:50 PM, Stephen Farrell wrote: That'd be great. Esp. if you could co-ordinate with a few others first that see similar distributions. Sure. I'm swamped with other stuff until next week, though. If there are others on the list who can contribute datasets to the cause,

Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Stephen Farrell
Lyndon Nerenberg wrote: Real, significant, usable, numbers would be welcome. I've not seen any. I'll see what I can pull from the mail logs at work. We push a couple of million messages a day, and exercise the AOL and Yahoo mail throttles on an ongoing basis. That'd be great. Esp. if y

Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Lyndon Nerenberg
Real, significant, usable, numbers would be welcome. I've not seen any. I'll see what I can pull from the mail logs at work. We push a couple of million messages a day, and exercise the AOL and Yahoo mail throttles on an ongoing basis. --lyndon _

Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Stephen Farrell
Lyndon Nerenberg wrote: On Apr 18, 2006, at 6:56 PM, Stephen Farrell wrote: If you knew the distribution of transit times based on some reasonable sample, then I'd listen. Presumably there's a bell curve in there and we could argue about how many std. devs. to ask signers to take into account

Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Lyndon Nerenberg
On Apr 18, 2006, at 6:56 PM, Stephen Farrell wrote: If you knew the distribution of transit times based on some reasonable sample, then I'd listen. Presumably there's a bell curve in there and we could argue about how many std. devs. to ask signers to take into account. Anything less soundly bas

Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Stephen Farrell
Doug, Douglas Otis wrote: If 7 days provides for the SMTP transport, and people in Sweden and France want to verify messages following their 5 week vacation, then this would require a minimum of 42 days of key availability. The suggestion for 45 days provided an additional 3 days to assure

Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Douglas Otis
On Apr 18, 2006, at 5:36 PM, Stephen Farrell wrote: Doug, Your response is non-responsive :-( Douglas Otis wrote: On Apr 18, 2006, at 4:10 PM, Stephen Farrell wrote: Douglas Otis wrote: The duration of the signature should cover the "expected" distribution of transit times for a message

Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Stephen Farrell
Doug, Your response is non-responsive :-( Douglas Otis wrote: On Apr 18, 2006, at 4:10 PM, Stephen Farrell wrote: Douglas Otis wrote: The duration of the signature should cover the "expected" distribution of transit times for a message from the originator to recipient. Sure. Can you g

Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Douglas Otis
On Apr 18, 2006, at 4:10 PM, Stephen Farrell wrote: Douglas Otis wrote: The duration of the signature should cover the "expected" distribution of transit times for a message from the originator to recipient. Sure. Can you get us the peer reviewed stats so we can remove those quotes fr

Re: [ietf-dkim] Straw poll on x=

2006-04-18 Thread Michael Thomas
Paul Hoffman wrote: The meaning of x= is completely clear in the -00 and -01 drafts. However, many people on the list, including some of the document authors, have wide disagreement about what x= is supposed to do. Some people say that it is supposed to be when a particular signature is no lo

Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Stephen Farrell
Doug, Douglas Otis wrote: The duration of the signature should cover the "expected" distribution of transit times for a message from the originator to recipient. Sure. Can you get us the peer reviewed stats so we can remove those quotes from "expected"? I certainly don't have 'em, and in the

Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Douglas Otis
On Apr 18, 2006, at 2:25 PM, Stephen Farrell wrote: Douglas Otis wrote: On Apr 18, 2006, at 1:35 PM, Stephen Farrell wrote: There's been a good bit of MUA related discussion about long time periods. Our charter says explicitly that the following is out of scope: * Signatures that are inten

RE: [ietf-dkim] Straw poll on x=

2006-04-18 Thread Paul Hoffman
At 5:28 PM -0400 4/18/06, <[EMAIL PROTECTED]> wrote: Proposed x=Expiration date (plain-text; RECOMMENDED, default is no expiration). The format is the same as in the "t=" tag, represented as an absolute date, not as a time delta from the signing timestamp. Signatures MU

[ietf-dkim] Re: [dkim-dev] Clarifications on draft-ietf-dkim-base-01

2006-04-18 Thread Eric Allman
--On April 18, 2006 5:45:46 PM -0400 Tony Hansen <[EMAIL PROTECTED]> wrote: ... I think this clarification by itself is reason enough to get a -02 out as quickly as possible. Agreed. I'm going to try to fold in the various comments I've received and then get -02 out. I'm at a conference

Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Michael Thomas
Stephen Farrell wrote: There's been a good bit of MUA related discussion about long time periods. Our charter says explicitly that the following is out of scope: * Signatures that are intended to make long-term assertions beyond the expected transit time of a message from originator to reci

Re: [ietf-dkim] Re: authentication result headers are an unsafe alternative

2006-04-18 Thread Stephen Farrell
Hi Murray, Murray S. Kucherawy wrote: If indeed discussion of Authentication-Results: or similar mechanisms is outside of the scope of this working group (or even if it isn't), I'd like to remind everyone that there's a mailing list dedicated to that very discussion. It is: [EMAIL PROT

[ietf-dkim] Re: [dkim-dev] Clarifications on draft-ietf-dkim-base-01

2006-04-18 Thread Tony Hansen
Which is just the opposite of what I expected. I'm willing to change my implementation to use this interpretation instead, but I think this clarification by itself is reason enough to get a -02 out as quickly as possible. Tony Hansen [EMAIL PROTECTED] Murray S. Kucherawy wrote: >

[ietf-dkim] Re: authentication result headers are an unsafe alternative

2006-04-18 Thread Murray S. Kucherawy
If indeed discussion of Authentication-Results: or similar mechanisms is outside of the scope of this working group (or even if it isn't), I'd like to remind everyone that there's a mailing list dedicated to that very discussion. It is: [EMAIL PROTECTED] Bastardizing the administrativ

Re: [ietf-dkim] Straw poll on x=

2006-04-18 Thread Stephen Farrell
Paul Hoffman wrote: At 9:58 PM +0100 4/18/06, Stephen Farrell wrote: So there is no clear consensus to delete x=, therefore we go with the status quo. Right. Could I ask that someone try propose text for the draft to clarify the meaning of x=, bearing in mind all of the list discussion?

RE: [ietf-dkim] Straw poll on x=

2006-04-18 Thread Bill.Oxley
Current x= Signature Expiration (plain-text; RECOMMENDED, default is no expiration). The format is the same as in the "t=" tag, represented as an absolute date, not as a time delta from the signing timestamp. Signatures MUST NOT be considered valid if the current tim

Re: [ietf-dkim] Straw poll on x=

2006-04-18 Thread Paul Hoffman
At 9:58 PM +0100 4/18/06, Stephen Farrell wrote: So there is no clear consensus to delete x=, therefore we go with the status quo. Right. Could I ask that someone try propose text for the draft to clarify the meaning of x=, bearing in mind all of the list discussion? The meaning of x= is co

Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Stephen Farrell
Doug, Douglas Otis wrote: On Apr 18, 2006, at 1:35 PM, Stephen Farrell wrote: There's been a good bit of MUA related discussion about long time periods. Our charter says explicitly that the following is out of scope: * Signatures that are intended to make long-term assertions beyond the

Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Douglas Otis
On Apr 18, 2006, at 1:35 PM, Stephen Farrell wrote: There's been a good bit of MUA related discussion about long time periods. Our charter says explicitly that the following is out of scope: * Signatures that are intended to make long-term assertions beyond the expected transit time of a m

[ietf-dkim] Re: [dkim-dev] Clarifications on draft-ietf-dkim-base-01

2006-04-18 Thread Murray S. Kucherawy
Tony Hansen wrote: This paragraph should be ignored completely. It should have been removed. Should the CRLF be there or not between the canonicalized headers and the DKIM-Signature? I expect it to be there, but this paragraph is the only place that says it should be there. No, it should not

Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Douglas Otis
On Apr 18, 2006, at 1:03 PM, Scott Kitterman wrote: On 04/18/2006 15:43, Douglas Otis wrote: Or the primary goal of offering protection for all obtainable use cases? I guess we disagree about MUA level verification being obtainable. I actually have some e-mail accounts I only check abo

Re: [ietf-dkim] Straw poll on x=

2006-04-18 Thread Stephen Farrell
Results are in: Keep (8) [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] Remove (9) [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAI

[ietf-dkim] Re: [dkim-dev] Clarifications on draft-ietf-dkim-base-01

2006-04-18 Thread Tony Hansen
Murray S. Kucherawy wrote: > There are a few spots in the newer draft which are ambiguous. I chatted > with Eric yesterday and he concurs; it's stuff he meant to change but > they fell through the cracks prior to submission. They'll be fixed in > the next one. > > My implementation follows the i

Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Stephen Farrell
There's been a good bit of MUA related discussion about long time periods. Our charter says explicitly that the following is out of scope: * Signatures that are intended to make long-term assertions beyond the expected transit time of a message from originator to recipient, which is normall

[ietf-dkim] Clarifications on draft-ietf-dkim-base-01

2006-04-18 Thread Murray S. Kucherawy
There are a few spots in the newer draft which are ambiguous. I chatted with Eric yesterday and he concurs; it's stuff he meant to change but they fell through the cracks prior to submission. They'll be fixed in the next one. My implementation follows the intended algorithm as we discussed it

Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Scott Kitterman
On 04/18/2006 15:43, Douglas Otis wrote: > On Apr 18, 2006, at 11:33 AM, Scott Kitterman wrote: > > I would not say that we shouldn't include DKIM protection beyond > > SMTP, but that whatever happens after delivery shouldn't distract > > us from the primary use case. > > Or the primary goal of of

Re: [ietf-dkim] Expiration Tag (x=) is required to minimizeDNSlookups.

2006-04-18 Thread Hector Santos
- Original Message - From: "Steve Atkins" <[EMAIL PROTECTED]> > Simple, functional and deployed beats complex, over-designed and > theoretical. Agree, but I also recognize the school of thought that simplicity promotes complexity which promotes over-designed functionality when resolving f

Re: [ietf-dkim] authentication result headers are an unsafe alternative

2006-04-18 Thread Douglas Otis
On Apr 18, 2006, at 11:33 AM, Scott Kitterman wrote: On 04/18/2006 14:18, Douglas Otis wrote: Depending upon an unsigned "results" header being added to the message is an unsafe practice. It is not practical to determine who added the "results" header, whether the MDA strips/adds all pr

Re: [ietf-dkim] 2.1 Signers // Within an administrative domain?

2006-04-18 Thread Douglas Otis
On Apr 18, 2006, at 10:43 AM, <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> wrote: ,--- | 2.1 Signers |... | The key issue is that a message must be signed before it | leaves the administrative domain of the signer. '--- What is intended by this statement? How does this relate to messages signed

Re: [ietf-dkim] Straw poll on x=

2006-04-18 Thread Hector Santos
From: "Stephen Farrell" <[EMAIL PROTECTED]> > Last call for opinions. I'm gonna count 'em up when I > get home and send results in a few hours. I prefer KEEP X= Please note: It is already optional. If people don't want to use it, they don't have to add it to the signature. If kept, we need on

Re: [ietf-dkim] x= lets senders expire responsibility

2006-04-18 Thread Scott Kitterman
On 04/14/2006 12:26, Douglas Otis wrote: > On Apr 14, 2006, at 5:56 AM, Hector Santos wrote: > >>> Unless it has help from the backend server, offline mail systems > >>> will not work very reliably when keys are being changed. > >> > >> Should DKIM require services beyond DNS for verification? > >

Re: [ietf-dkim] authentication result headers are an unsafe alternative

2006-04-18 Thread Scott Kitterman
On 04/18/2006 14:18, Douglas Otis wrote: > On Apr 18, 2006, at 10:42 AM, Scott Kitterman wrote: > > From a protocol design perspective, I think the right answer is to > > design for the case where the receiving MTA/MDA will check the > > signature and record a result that, if appropriate, an MUA ca

Re: [ietf-dkim] authentication result headers are an unsafe alternative

2006-04-18 Thread Douglas Otis
On Apr 18, 2006, at 10:42 AM, Scott Kitterman wrote: From a protocol design perspective, I think the right answer is to design for the case where the receiving MTA/MDA will check the signature and record a result that, if appropriate, an MUA can use. Depending upon an unsigned "results" h

Re: [ietf-dkim] Straw poll on x=

2006-04-18 Thread Tony Hansen
step 1) remove it step 2) decide what we really want step 3) propose something with those exact semantics Stephen Farrell wrote: > Last call for opinions. I'm gonna count 'em up when I > get home and send results in a few hours. ___ NOTE WELL: This list

Re: [ietf-dkim] Expiration Tag (x=) is required to minimize DNSlookups.

2006-04-18 Thread Steve Atkins
On Apr 18, 2006, at 10:32 AM, Hector Santos wrote: - Original Message - From: "Steve Atkins" <[EMAIL PROTECTED]> But it still an optimization concept: - No need to DNS lookup, regardless of TTL state. Yes. DNS is cheap, and NXDOMAIN is cached, though. How often, in practice,

Re: [ietf-dkim] Expiration Tag (x=) is required to minimize DNSlookups.

2006-04-18 Thread Hector Santos
- Original Message - From: "Steve Atkins" <[EMAIL PROTECTED]> >> >> But it still an optimization concept: >> >> - No need to DNS lookup, regardless of TTL state. > > Yes. DNS is cheap, and NXDOMAIN is cached, though. How often, in > practice, do you think that even an MUA, let alone

Re: [ietf-dkim] dkim-base-01: 6.2 - DNS error

2006-04-18 Thread Scott Kitterman
On 04/14/2006 10:36, Hector Santos wrote: > In section 6.2 "Get The Public Key, we have step #2 > > | 2. If the query for the public key fails to respond, the verifier > | SHOULD defer acceptance of this email (normally this will be > | achieved with a 451/4.7.5 SMTP reply code). > >

RE: [ietf-dkim] 2.1 Signers // Within an administrative domain?

2006-04-18 Thread Bill.Oxley
If a MUA is the signer I would hope it is within its own administrative domain. I haven't seen one yet that was outside of its own domain. Thanks, Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PR

[ietf-dkim] 2.1 Signers // Within an administrative domain?

2006-04-18 Thread Douglas Otis
,--- | 2.1 Signers |... | The key issue is that a message must be signed before it | leaves the administrative domain of the signer. '--- What is intended by this statement? How does this relate to messages signed by an MUA, which is not mentioned as a possible signer? Is this statement i

Re: [ietf-dkim] Proposal: Do the semantics first, then straw poll

2006-04-18 Thread Jim Fenton
Jon Callas wrote: > The issue, then, is what happens when I have my expiration being > (e.g.) a month and I decide out of the blue to change keys. The answer > is that some messages now won't verify, which means they are > "suspicious" which interacts with SSP and other things to make it so > that

Re: [ietf-dkim] Expiration Tag (x=) is required to minimize DNS lookups.

2006-04-18 Thread Paul Hoffman
At 12:29 PM -0400 4/18/06, Hector Santos wrote: - Original Message - From: "Paul Hoffman" <[EMAIL PROTECTED]> To: Sent: Tuesday, April 18, 2006 11:38 AM Subject: Re: [ietf-dkim] Expiration Tag (x=) is required to minimize DNS lookups. At 2:34 PM + 4/18/06, Mark Delany wrote: >Th

Re: [ietf-dkim] Straw poll on x=

2006-04-18 Thread Stephen Farrell
Last call for opinions. I'm gonna count 'em up when I get home and send results in a few hours. Cheers, S. ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] Expiration Tag (x=) is required to minimize DNS lookups.

2006-04-18 Thread Steve Atkins
On Apr 18, 2006, at 9:29 AM, Hector Santos wrote: - Original Message - From: "Paul Hoffman" <[EMAIL PROTECTED]> To: Sent: Tuesday, April 18, 2006 11:38 AM Subject: Re: [ietf-dkim] Expiration Tag (x=) is required to minimize DNS lookups. At 2:34 PM + 4/18/06, Mark Delany wrot

Re: [ietf-dkim] Expiration Tag (x=) is required to minimize DNS lookups.

2006-04-18 Thread Hector Santos
- Original Message - From: "Paul Hoffman" <[EMAIL PROTECTED]> To: Sent: Tuesday, April 18, 2006 11:38 AM Subject: Re: [ietf-dkim] Expiration Tag (x=) is required to minimize DNS lookups. > At 2:34 PM + 4/18/06, Mark Delany wrote: > >This is surely an edge case that Knuth warns us ab

Re: [ietf-dkim] Expiration Tag (x=) is required to minimize DNSlookups.

2006-04-18 Thread Hector Santos
- Original Message - From: "Mark Delany" <[EMAIL PROTECTED]> >>x= is needed to offer a major DKIM verifier optimization to >>address expiring or revoked keys. > > This is surely an edge case that Knuth warns us about. -10 You got to be kidding me? :-) Besides, you mean Hoare an

Re: [ietf-dkim] Proposal: Do the semantics first, then straw poll

2006-04-18 Thread Douglas Otis
On Apr 17, 2006, at 11:24 PM, Hallam-Baker, Phillip wrote: Expiry is a reason for bouncing mail?? Which document are you reading there? Expired sig equals unsigned at worst. Expired sig plus other factors might lead to bounce, for example. A transport layer verifier that sees a three

Re: [ietf-dkim] Expiration Tag (x=) is required to minimize DNS lookups.

2006-04-18 Thread Paul Hoffman
At 2:34 PM + 4/18/06, Mark Delany wrote: This is surely an edge case that Knuth warns us about. +1 The current spec has enough language to handle key rollover gracefully. Further, if a sender wants to minimize DNS lookups, the DNS TTL is the perfect tool, and is already implemented every

Re: [ietf-dkim] Expiration Tag (x=) is required to minimize DNS lookups.

2006-04-18 Thread Mark Delany
On Tue, Apr 18, 2006 at 06:39:49AM -0400, Hector Santos allegedly wrote: > Summary: > >x= is needed to offer a major DKIM verifier optimization to >address expiring or revoked keys. This is surely an edge case that Knuth warns us about. Mark. ___

[ietf-dkim] Expiration Tag (x=) is required to minimize DNS lookups.

2006-04-18 Thread Hector Santos
Summary: x= is needed to offer a major DKIM verifier optimization to address expiring or revoked keys. Background: Overall we have this basic key rollover, revocation and removal time model such as: DAY T1 : First day mail is signed with KEY1 DAY T2 Last day mail is signed