Re: [ietf-dkim] Delegating responsibility: a make vs. buy design decision

2006-08-22 Thread Graham Murray
Damon <[EMAIL PROTECTED]> writes: > Should mailing lists sign messages? The problem with mailing lists is that there are 2 identities which it might be useful to verify. First that the message did actually come via the mailing list, and the second is the identity of the person submitting the mess

Re: [ietf-dkim] Delegating responsibility: a make vs. buy designdecision

2006-08-22 Thread Scott Kitterman
On Tuesday 22 August 2006 20:22, [EMAIL PROTECTED] wrote: > "This could be done, but dilutes the simplicity argument that motivated > "the Authorized Signing Domains approach in the first place. Formerly > "the ISP just signed using their own domain name; now they must create a > "subdomain for ea

Re: [ietf-dkim] Delegating responsibility: a make vs. buy design decision

2006-08-22 Thread Scott Kitterman
On Tue, 22 Aug 2006 16:06:08 -0700 Jim Fenton <[EMAIL PROTECTED]> wrote: >Scott Kitterman wrote: > >On Mon, 21 Aug 2006 14:55:08 -0700 Michael Thomas <[EMAIL PROTECTED]> wrote: >Scott Kitterman wrote: >OTOH, it seems to me that it's been said Ad Nauseum. Where feasible I agree it's better, but the

Re: [ietf-dkim] Delegating responsibility: a make vs. buy design decision

2006-08-22 Thread Scott Kitterman
On Tue, 22 Aug 2006 15:59:00 -0700 Jim Fenton <[EMAIL PROTECTED]> wrote: >Scott Kitterman wrote: >> On Monday 21 August 2006 01:34, Jim Fenton wrote: >>> Scott Kitterman wrote: Yes, but the fundamental operational problem will be to pick the correct domain to sign with. You have to mak

Re: [ietf-dkim] Delegating responsibility: a make vs. buy design decision

2006-08-22 Thread Douglas Otis
On Aug 22, 2006, at 5:05 PM, Damon wrote: If an ISP were using the key/location provided to them from various customers, there would be an identical process need. The assigned keys however now include a need to acquire these keys rather than simply creating them. In addition, there would

RE: [ietf-dkim] Delegating responsibility: a make vs. buy designdecision

2006-08-22 Thread Bill.Oxley
"This could be done, but dilutes the simplicity argument that motivated "the Authorized Signing Domains approach in the first place. Formerly "the ISP just signed using their own domain name; now they must create a "subdomain for each of their customers, publish keys there, and sign each "using t

Re: [ietf-dkim] Delegating responsibility: a make vs. buy designdecision

2006-08-22 Thread Hector Santos
Jim, I consider the baseline situation where verifiers receiving non-signed messages and what you would use from the minimum 2822 headers available to extract the domain policy information. What will that be? In other words, if you have: Received: From: To: Subject: Date: and no othe

Re: [ietf-dkim] Delegating responsibility: a make vs. buy design decision

2006-08-22 Thread Damon
If an ISP were using the key/location provided to them from various customers, there would be an identical process need. The assigned keys however now include a need to acquire these keys rather than simply creating them. In addition, there would be a separate key/ domain needed for each custome

Re: [ietf-dkim] Delegating responsibility: a make vs. buy design decision

2006-08-22 Thread Damon
But there is a residual problem. Suppose [EMAIL PROTECTED] is a subscriber to this list and someone spoofs a message from [EMAIL PROTECTED] to the list. ietf-dkim@mipassoc.org accepts the message and sends it to isp.com, their Authorized Signing Domain, and it is signed and sent. Is the signatu

Re: [ietf-dkim] Delegating responsibility: a make vs. buy design decision

2006-08-22 Thread Douglas Otis
On Aug 22, 2006, at 4:06 PM, Jim Fenton wrote: Scott Kitterman wrote: I disagree. What I think we've discovered that there is no additional complexity for signers or authors. It is, in fact, simpler for signers. With the need to choose the appropriate subdomain depending on which auth

Re: [ietf-dkim] Delegating responsibility: a make vs. buy design decision

2006-08-22 Thread Douglas Otis
On Aug 22, 2006, at 3:59 PM, Jim Fenton wrote: Scott Kitterman wrote: We had been discussing the need to segregated authenticated traffic (where authorization to use the 2822.From has been established) from other traffic being signed by use of a subdomain. This is to avoid issues like

Re: [ietf-dkim] Bayesian filters are the pits

2006-08-22 Thread J.D. Falk
On 2006-08-22 12:56, Hallam-Baker, Phillip wrote: Third we need to promote the idea that you should not look for the existence or even the validity of a DKIM header as being as important as the domain that is claiming responsibility. If you can't correlate the domain to some form of additional

Re: [ietf-dkim] Delegating responsibility: a make vs. buy design decision

2006-08-22 Thread Jim Fenton
Scott Kitterman wrote: On Mon, 21 Aug 2006 14:55:08 -0700 Michael Thomas <[EMAIL PROTECTED]> wrote: Scott Kitterman wrote: OTOH, it seems to me that it's been said Ad Nauseum. Where feasible I agree it's better, but there are operational frictions that will imped

Re: [ietf-dkim] Delegating responsibility: a make vs. buy design decision

2006-08-22 Thread Jim Fenton
Scott Kitterman wrote: > On Monday 21 August 2006 01:34, Jim Fenton wrote: > >> Scott Kitterman wrote: >> >>> Yes, but the fundamental operational problem will be to pick the correct >>> domain to sign with. You have to make that decision either way. The >>> basis upon which you make the

Re: [ietf-dkim] Bayesian filters are the pits

2006-08-22 Thread Douglas Otis
On Aug 22, 2006, at 12:56 PM, Hallam-Baker, Phillip wrote: Third we need to promote the idea that you should not look for the existence or even the validity of a DKIM header as being as important as the domain that is claiming responsibility. If you can't correlate the domain to some form

Re: [ietf-dkim] Bayesian filters are the pits

2006-08-22 Thread Scott Kitterman
On Tuesday 22 August 2006 15:56, Hallam-Baker, Phillip wrote: > ... we need to promote the idea that you should not look for the > existence or even the validity of a DKIM header as being as important as > the domain that is claiming responsibility. If you can't correlate the > domain to some form

[ietf-dkim] Bayesian filters are the pits

2006-08-22 Thread Hallam-Baker, Phillip
I have been looking through some of the responses from the spamming community to SPF. I conclude that the real problem here is that people using naive Bayesian filtering don't have a clue.   The problem with the Bayesisan approach is that it is very vulnerable to counter-programming by spa

Re: [ietf-dkim] Keys vs. Reputation

2006-08-22 Thread Douglas Otis
On Aug 22, 2006, at 9:57 AM, Jon Callas wrote: On 21 Aug 2006, at 10:48 PM, Douglas Otis wrote: When DKIM fails to offer a means to assure the validity of the 2822.From address, then an important goal has been missed. The use of a subdomain for signing removes an ability to indicate with

[ietf-dkim] When is 2822.From valid?

2006-08-22 Thread Douglas Otis
A DKIM base compatible option? When subdomains or other domains are used to sign the message, a significant utility is lost. This utility allows the 2822.From address to be assured on a per message basis independent of a policy assertion. To overcome this limitation, adopting the r= param

Re: [ietf-dkim] Keys vs. Reputation

2006-08-22 Thread Jon Callas
On 21 Aug 2006, at 10:48 PM, Douglas Otis wrote: When DKIM fails to offer a means to assure the validity of the 2822.From address, then an important goal has been missed. The use of a subdomain for signing removes an ability to indicate with the i= syntax that the 2822.From is assured to b

Re: [ietf-dkim] Keys vs. Reputation

2006-08-22 Thread Douglas Otis
On Tue, 2006-08-22 at 10:45 -0400, Damon wrote: > > Wow, that was a lot of typing to try and convince me that everyone > hates more phone calls and trouble tickets and therefore we should > punt. > > Are you saying that you see NO value in it or so little value that it > would be statistically ins

Re: [ietf-dkim] Keys vs. Reputation

2006-08-22 Thread Damon
On 8/22/06, Douglas Otis <[EMAIL PROTECTED]> wrote: On Tue, 2006-08-22 at 05:54 -0400, Hector Santos wrote: > > But 99% of the times or lets just say it is expected police protocol > and practice for a traffic stop that if there is a problem with your > Driver's license; the photo, the sex, age,

Re: [ietf-dkim] Keys vs. Reputation

2006-08-22 Thread Douglas Otis
On Tue, 2006-08-22 at 05:54 -0400, Hector Santos wrote: > > But 99% of the times or lets just say it is expected police protocol > and practice for a traffic stop that if there is a problem with your > Driver's license; the photo, the sex, age, height, etc, it is simply > not quite consistent which

[ietf-dkim] Re: Question regarding computing message hashes

2006-08-22 Thread Frank Ellermann
Paul Hoffman wrote: >> I'm not quite sure, what "||" means. I assume it means >> concatenation of the two strings. Is that right? > Yes. That is standard terminology in security documents. It's also the string concatenation operator in REXX. In a security related memo I've seen { } (curly brac

Re: [ietf-dkim] Keys vs. Reputation

2006-08-22 Thread Hector Santos
Original Message - From: "Dave Crocker" <[EMAIL PROTECTED]> > In other words, the job of DKIM is to deliver a valid identity > to an assessment mechanism. To me, SSP is an protocol assessment mechanism. I view it as an assessment of the proper and expected protocol usage and consistency.

Re: [ietf-dkim] Delegating responsibility: a make vs. buy designdecision

2006-08-22 Thread Hector Santos
>> Scott Kitterman wrote: >> >> OTOH, it seems to me that it's been said Ad Nauseum. Where >> feasible I agree it's better, but there are operational frictions >> that will impede this approach in some cases. > Michael Thomas wrote: > What I believe that we've discovered is that this isn't nea