[ietf-dkim] Collected data

2010-10-13 Thread Murray S. Kucherawy
-Original Message- From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Jim Fenton Sent: Tuesday, October 12, 2010 9:53 PM To: IETF DKIM WG Subject: [ietf-dkim] Last call comment: Changing the g= definition Between June 1 and September 1,

Re: [ietf-dkim] Collected data

2010-10-13 Thread Murray S. Kucherawy
-Original Message- From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Murray S. Kucherawy Sent: Tuesday, October 12, 2010 11:30 PM To: IETF DKIM WG Subject: [ietf-dkim] Collected data (oops) Oops, sorry for the bogus Subject: change. Feel

Re: [ietf-dkim] Example of DKIM bypasses RFC5322 Checking

2010-10-13 Thread Ian Eiloart
--On 12 October 2010 13:02:41 -0400 Hector Santos hsan...@isdg.net wrote: Your mail to 'ietf-dkim' with the subject (no subject) Is being held until the list moderator can review it for approval. The reason it is being held: Message has implicit destination Either the

Re: [ietf-dkim] Last Call comments on draft-ietf-dkim-rfc4871bis-02

2010-10-13 Thread Jeff Macdonald
On Wed, Oct 13, 2010 at 12:50 AM, Jim Fenton fen...@cisco.com wrote: 6.3 paragraph 5 has changed signing identity to SDID.  The signing identity really corresponds to the AUID.  As currently worded, the mail system is advised to take pains to ensure that the SDID is displayed for a message

Re: [ietf-dkim] FW: An issue with DKIM reporting extensions

2010-10-13 Thread John Levine
- In order to make use of ADSP, Y needs to change which MTA it's using. This is almost certainly an expensive effort. - Y simply can't use ADSP. - The DKIM reporting extensions should have a flag that says DSNs should not cause generation of fraud reports. I'll take

Re: [ietf-dkim] ISSUE: 4871bis-02 - Section 8.14 comments

2010-10-13 Thread John Levine
Subject: Buy fake watches at fakewatch.example.com! Will some clients display the second subject line? I suspect some will. Do we need to recommend that signers also add a protective second subject: to their h= value? Or do we need to require that verifiers make sure that any header fields

Re: [ietf-dkim] FW: An issue with DKIM reporting extensions

2010-10-13 Thread MH Michael Hammer (5304)
-Original Message- From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim- boun...@mipassoc.org] On Behalf Of John Levine Sent: Wednesday, October 13, 2010 9:29 AM To: ietf-dkim@mipassoc.org Subject: Re: [ietf-dkim] FW: An issue with DKIM reporting extensions - In order

Re: [ietf-dkim] FW: An issue with DKIM reporting extensions

2010-10-13 Thread Rolf E. Sonneveld
On 10/13/10 3:29 PM, John Levine wrote: - In order to make use of ADSP, Y needs to change which MTA it's using. This is almost certainly an expensive effort. - Y simply can't use ADSP. - The DKIM reporting extensions should have a flag that says DSNs should not

Re: [ietf-dkim] detecting header mutations after signing

2010-10-13 Thread Charles Lindsey
On Tue, 12 Oct 2010 14:36:42 +0100, Hector Santos hsan...@isdg.net wrote: What it means for most systems that they need to change a model based on this: CHECK DKIM PASS -- ACCEPT CHECK RFC5322 BAD -- REJECT BREAK RESIGN DISTRIBUTE To this:

Re: [ietf-dkim] FW: An issue with DKIM reporting extensions

2010-10-13 Thread Steve Atkins
On Oct 13, 2010, at 8:07 AM, Rolf E. Sonneveld wrote: or a special selector (e.g. s=notifications), to identify the different nature of this mail stream? No. Never do this. Selectors are an operational convenience for key rotation and ease of domain delegation. They have no semantics

Re: [ietf-dkim] Last call comment: Changing the g= definition

2010-10-13 Thread Barry Leiba
   If a v= value is not found at the beginning of the DKIM key record,    the key record MAY be interpreted as for DomainKeys [RFC4870].  The    definition given here is upwardly compatible with what is used for    DomainKeys, with the exception of the g= value.  In a DomainKeys    key

Re: [ietf-dkim] detecting header mutations after signing

2010-10-13 Thread Charles Lindsey
On Mon, 11 Oct 2010 23:05:13 +0100, Wietse Venema wie...@porcupine.org wrote: Charles Lindsey: When the bad guy sends mail with (multiple) forged headers, the best they can get is that naive mail programs render their forged header with an indication that THE BAD GUY'S DKIM SIGNATURE

Re: [ietf-dkim] Example of DKIM bypasses RFC5322 Checking

2010-10-13 Thread Barry Leiba
What happens if you do the same thing, but put the To: header above the From: headers? What about when it's between the two From: headers? Actually, the chairs would rather take this off the DKIM mailing list, as out of the group's scope. If some folks want to go do some testing about what

Re: [ietf-dkim] ISSUE: 4871bis-02 - Section 8.14 comments

2010-10-13 Thread Jim Fenton
On 10/13/10 8:04 AM, John Levine wrote: Subject: Buy fake watches at fakewatch.example.com! Will some clients display the second subject line? I suspect some will. Do we need to recommend that signers also add a protective second subject: to their h= value? Or do we need to require that

Re: [ietf-dkim] I-D ACTION:draft-ietf-dkim-rfc4871bis-02.txt

2010-10-13 Thread Charles Lindsey
On Tue, 12 Oct 2010 07:46:42 +0100, Barry Leiba barryle...@computer.org wrote: There are only two significant changes between -01 and -02 ... most of the changes are just updating the references. The substantive changes are: 1. The addition of the paragraph that begins Similarly, a message

Re: [ietf-dkim] I-D ACTION:draft-ietf-dkim-rfc4871bis-02.txt

2010-10-13 Thread Charles Lindsey
On Tue, 12 Oct 2010 14:00:19 +0100, Dave CROCKER d...@dcrocker.net wrote: Oh boy. Very sorry folks. The full text reads: tSimilarly, a message not compliant with RFC5322, RFC2045 and RFC2047, can be subject to attempts by intermediaries to correct

Re: [ietf-dkim] Collected data

2010-10-13 Thread Murray S. Kucherawy
-Original Message- From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Jim Fenton Sent: Wednesday, October 13, 2010 10:42 AM To: ietf-dkim@mipassoc.org Subject: Re: [ietf-dkim] Collected data [sticking with Murray's subject line so as not to

[ietf-dkim] What DKIM provides, again

2010-10-13 Thread Murray S. Kucherawy
-Original Message- From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Jeff Macdonald Sent: Wednesday, October 13, 2010 11:27 AM To: DKIM Subject: Re: [ietf-dkim] detecting header mutations after signing rant Count me as one of those who was

Re: [ietf-dkim] detecting header mutations after signing

2010-10-13 Thread Dave CROCKER
On 10/13/2010 2:27 PM, Jeff Macdonald wrote: DKIM seems to make assurances to message integrity. But it doesn't. I think the reason why many think it does is because of the body hash. It is trying to do to much. It should just provide an identifier that can be verified. Instead of using the

Re: [ietf-dkim] Collected data

2010-10-13 Thread Jim Fenton
On 10/13/10 10:53 AM, Murray S. Kucherawy wrote: -Original Message- From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Jim Fenton Sent: Wednesday, October 13, 2010 10:42 AM To: ietf-dkim@mipassoc.org Subject: Re: [ietf-dkim] Collected data

Re: [ietf-dkim] detecting header mutations after signing

2010-10-13 Thread Jeff Macdonald
On Wed, Oct 13, 2010 at 2:40 PM, Dave CROCKER d...@dcrocker.net wrote: On 10/13/2010 2:27 PM, Jeff Macdonald wrote: DKIM seems to make assurances to message integrity. But it doesn't. I think the reason why many think it does is because of the body hash. It is trying to do to much. It

Re: [ietf-dkim] FW: An issue with DKIM reporting extensions

2010-10-13 Thread Michael Thomas
On 10/13/2010 11:25 AM, Scott Kitterman wrote: On Wednesday, October 13, 2010 11:55:25 am Steve Atkins wrote: On Oct 13, 2010, at 8:07 AM, Rolf E. Sonneveld wrote: or a special selector (e.g. s=notifications), to identify the different nature of this mail stream? No. Never do this.

Re: [ietf-dkim] detecting header mutations after signing

2010-10-13 Thread Jeff Macdonald
On Wed, Oct 13, 2010 at 2:47 PM, Scott Kitterman ietf-d...@kitterman.com wrote: On Wednesday, October 13, 2010 02:27:29 pm Jeff Macdonald wrote: And even if there was a DKIM signature, it is the BAD GUY'S signature, which should cause it to go into the SPAM folder, with a large phishing

Re: [ietf-dkim] What DKIM provides, again

2010-10-13 Thread Michael Thomas
On 10/13/2010 12:47 PM, Jeff Macdonald wrote: Then you send me a piece of signed mail, I change everything except the Message-ID and Date, and send it to someone else. And the verifier will green-light it, meaning you've taken responsibility for it. Are you OK with that? My way of

Re: [ietf-dkim] Last call comment: Changing the g= definition

2010-10-13 Thread Barry Leiba
    If a v= value is not found at the beginning of the DKIM key record,     the key record MAY be interpreted as for DomainKeys [RFC4870].  The     definition given here is upwardly compatible with what is used for     DomainKeys, with the exception of the g= value.  In a DomainKeys     key

Re: [ietf-dkim] detecting header mutations after signing

2010-10-13 Thread MH Michael Hammer (5304)
-Original Message- From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim- boun...@mipassoc.org] On Behalf Of Jeff Macdonald Sent: Wednesday, October 13, 2010 3:59 PM To: ietf-dkim@mipassoc.org Subject: Re: [ietf-dkim] detecting header mutations after signing On Wed, Oct 13,

Re: [ietf-dkim] What DKIM provides, again

2010-10-13 Thread Jeff Macdonald
On Wed, Oct 13, 2010 at 4:01 PM, Michael Thomas m...@mtcc.com wrote: But like I said, I was ranting. Jeff, an identifier that's not bound to something is useless. It's like Mike just bouncing around the aether. Until it binds to something, it's not providing anything useful and certainly not

Re: [ietf-dkim] What DKIM provides, again

2010-10-13 Thread Murray S. Kucherawy
-Original Message- From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Jeff Macdonald Sent: Wednesday, October 13, 2010 1:15 PM To: DKIM WG Subject: Re: [ietf-dkim] What DKIM provides, again On Wed, Oct 13, 2010 at 4:01 PM, Michael Thomas

Re: [ietf-dkim] detecting header mutations after signing

2010-10-13 Thread Murray S. Kucherawy
-Original Message- From: John Levine [mailto:jo...@iecc.com] Sent: Wednesday, October 13, 2010 2:47 PM To: ietf-dkim@mipassoc.org Cc: Murray S. Kucherawy Subject: Re: [ietf-dkim] detecting header mutations after signing DKIM simply highlights an issue that's been there for a very

Re: [ietf-dkim] detecting header mutations after signing

2010-10-13 Thread Murray S. Kucherawy
-Original Message- From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Mark Delany Sent: Wednesday, October 13, 2010 1:59 PM To: ietf-dkim@mipassoc.org Subject: Re: [ietf-dkim] detecting header mutations after signing I understand the issues

Re: [ietf-dkim] detecting header mutations after signing

2010-10-13 Thread Steve Atkins
On Oct 13, 2010, at 1:59 PM, Mark Delany wrote: It strikes me that a DKIM verifier is already well into the business of 2822 semantics as it knows about headers, header labels, continuation syntax, header/body boundaries and so on. In that light, taking an additional step wrt duplicate

Re: [ietf-dkim] Last call comment: Changing the g= definition

2010-10-13 Thread Murray S. Kucherawy
-Original Message- From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Barry Leiba Sent: Wednesday, October 13, 2010 3:46 PM To: IETF DKIM WG Subject: Re: [ietf-dkim] Last call comment: Changing the g= definition Everyone, please weigh in on

Re: [ietf-dkim] ISSUE: 4871bis-02 - Section 8.14 comments

2010-10-13 Thread Hector Santos
+1. Barry, as the original issue submitter and I only provided suggested text to jump start WG input with better text, I am very happy with Jim Fenton's text. It doesn't lay blame and straight to the key points. Folks, this is really a simple solution and in my opinion, DKIM can gain from

Re: [ietf-dkim] Last call comment: Changing the g= definition

2010-10-13 Thread SM
At 13:03 13-10-10, Barry Leiba wrote: To avoid second-guessing in a security context, and because DomainKeys is an obsolete protocol, DKIM verifiers MUST interpret this situation in DKIM terms, matching only empty i= values. Changing the g= definition takes advancement

Re: [ietf-dkim] ISSUE: 4871bis-02 - Section 8.14 comments

2010-10-13 Thread Murray S. Kucherawy
-Original Message- From: Jim Fenton [mailto:fen...@cisco.com] Sent: Wednesday, October 13, 2010 3:22 PM To: Murray S. Kucherawy Cc: ietf-dkim@mipassoc.org Subject: Re: [ietf-dkim] ISSUE: 4871bis-02 - Section 8.14 comments Here's some text I propose for section 8.14, in place of

Re: [ietf-dkim] Collected data

2010-10-13 Thread Hector Santos
Jim Fenton wrote: It also adds more complexity to the specification and to implementations. Besides, DK compatibility should become less of an issue with time since it is a legacy protocol. +1 IMO, DKIM is already a complex technology to properly implement and integrate into a system,

[ietf-dkim] ISSUE: 3.6.2.1 - Working with other TXT records

2010-10-13 Thread Hector Santos
Folks, I know section 3.6.2.1 has this informative note: INFORMATIVE OPERATIONAL NOTE: Wildcard DNS records (e.g., *.bar._domainkey.example.com) do not make sense in this context and should not be used. Note also that wildcards within domains (e.g.,

Re: [ietf-dkim] detecting header mutations after signing

2010-10-13 Thread Mark Delany
In that light, taking an additional step wrt duplicate headers (or malformed 2822 in general) is still in the same layer as the verifier. My objection isn't so much layering within the software, because I know that gets mushy real quick, but layering among the protocol specifications.

Re: [ietf-dkim] detecting header mutations after signing

2010-10-13 Thread Hector Santos
+1, well said Mark. Its a real potential situation that is on par, IMTO, with what the DKIM technology was suppose to help with. It was unfortunate it fell through the cracks during the Threats Analysis RFC 5016 production. If it was realized back then, I don't think anyone would be debating

[ietf-dkim] 550 5.7.0 bad DKIM signature data

2010-10-13 Thread Steve Atkins
Anyone recognize 550 5.7.0 bad DKIM signature data? A couple of folks just got bounced off a mailing list due to their MTAs doing that in response to some mail I sent, so I'm interested in what software might do that. Cheers, Steve ___ NOTE WELL:

Re: [ietf-dkim] detecting header mutations after signing

2010-10-13 Thread Scott Kitterman
On Wednesday, October 13, 2010 03:59:27 pm Jeff Macdonald wrote: On Wed, Oct 13, 2010 at 2:47 PM, Scott Kitterman ietf-d...@kitterman.com wrote: On Wednesday, October 13, 2010 02:27:29 pm Jeff Macdonald wrote: And even if there was a DKIM signature, it is the BAD GUY'S signature, which

Re: [ietf-dkim] detecting header mutations after signing

2010-10-13 Thread Dave CROCKER
On 10/13/2010 3:17 PM, John R. Levine wrote: We put a bunch of stuff in DKIM to allow benign modifications of messages, notably relaxed canoncalization. (We can argue about whether l= is useful, but it's easy enough to ignore if one thinks it isn't.) I think it's also reasonable to put

Re: [ietf-dkim] detecting header mutations after signing

2010-10-13 Thread Dave CROCKER
On 10/13/2010 4:59 PM, Mark Delany wrote: I know we're not in the MUA business, but if DKIM makes no difference to what an end-user finally sees, then it serves a very limited purpose indeed. Well, yes. But that's a /good/ thing, as a core capability. More importantly, we are not in the

Re: [ietf-dkim] detecting header mutations after signing

2010-10-13 Thread Dave CROCKER
On 10/13/2010 8:56 PM, Mark Delany wrote: If DKIM has any value it's that it ultimately affects the user mail experience for the better. Consequently, to remain silent on matters that we know will adversely affect that experience seems contradictory. Similarly to not offer guidance to

Re: [ietf-dkim] ISSUE: 4871bis-02 - Section 8.14 comments

2010-10-13 Thread Jim Fenton
On 10/13/10 4:32 PM, Murray S. Kucherawy wrote: It seems to me you're saying the same thing bis-02 is saying, but with perhaps less terse language. In particular, bis-02 says SHOULD NOT validate something that's malformed, while you're saying SHOULD validate format before processing.

Re: [ietf-dkim] 550 5.7.0 bad DKIM signature data

2010-10-13 Thread SM
Hi Steve, At 18:56 13-10-10, Steve Atkins wrote: Anyone recognize 550 5.7.0 bad DKIM signature data? dkim-filter and OpenDKIM can send such a response. A couple of folks just got bounced off a mailing list due to their MTAs doing that in response to some mail I sent, so I'm interested in what

Re: [ietf-dkim] ISSUE: 3.6.2.1 - Working with other TXT records

2010-10-13 Thread SM
At 17:31 13-10-10, Hector Santos wrote: I know section 3.6.2.1 has this informative note: [snip] This is just to jump start suggested text. Others can add/change whether they think helps: The DKIM public key TXT record MUST not be mixed or merged with other TXT records, i.e. SPF.

Re: [ietf-dkim] removing the g= definition?

2010-10-13 Thread Tony Hansen
On 10/13/2010 6:36 PM, SM wrote: At 13:03 13-10-10, Barry Leiba wrote: To avoid second-guessing in a security context, and because DomainKeys is an obsolete protocol, DKIM verifiers MUST interpret this situation in DKIM terms, matching only empty i= values.

Re: [ietf-dkim] detecting header mutations after signing

2010-10-13 Thread John R. Levine
What you are calling for would be good to have. It should be done. Just not in the signing spec. Correct me if I'm wrong, but I hear you saying that if one creates or verifies the DKIM signature on a message, one should also do the double header check somewhere in the mail processing path,