Re: [ietf-dkim] yet more sophistry, was Data integrity claims

2010-10-18 Thread Alessandro Vesely
On 16/Oct/10 21:24, John R. Levine wrote: >> "Which header fields are essential to protect? >> How much of the message body is essential to protect?" > > Your questions are noted. Other than the MUST to sign the From: > header, the DKIM spec offers the technical latitide to create a > totally w

Re: [ietf-dkim] detecting header mutations after signing

2010-10-18 Thread Ian Eiloart
--On 15 October 2010 11:53:51 -0400 Dave CROCKER wrote: > > > On 10/15/2010 11:40 AM, Mark Delany wrote: >> Well, if you want to introduce semantic changes why not just change >> the meaning of h=from:to: to be semantically identical to >> h=from:from:to:to: > > > This would mean that it is /ne

Re: [ietf-dkim] ISSUE: 4871bis-02 - Section 8.14 comments

2010-10-18 Thread Charles Lindsey
On Fri, 15 Oct 2010 15:48:05 +0100, Ian Eiloart wrote: > Here's a more interesting attack: > > Compose an email apparently from eBay, and send it to yourself. Get a > valid > DKIM signature, then add a From: header containing an eBay address, and > use > the replay to send that message to thi

Re: [ietf-dkim] detecting header mutations after signing

2010-10-18 Thread Charles Lindsey
On Fri, 15 Oct 2010 17:50:33 +0100, Murray S. Kucherawy wrote: >> -Original Message- >> From: ietf-dkim-boun...@mipassoc.org >> [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Charles Lindsey >> Sent: Friday, October 15, 2010 7:30 AM >> To: DKIM >> Subject: Re: [ietf-dkim] detect

Re: [ietf-dkim] ISSUE: 4871bis-02 - Section 8.14 comments

2010-10-18 Thread Charles Lindsey
On Fri, 15 Oct 2010 17:47:24 +0100, Jim Fenton wrote: > On 10/15/10 6:06 AM, Charles Lindsey wrote: >> I don't quite see what an attacker can usefully do by modifying messages >> in transit. If they message was already signed (say by ebay), then the >> attacker must somehow get ebay to sign a

Re: [ietf-dkim] Issue: 4871bis - section 5.4/5.5 clarify 5322.From requirement

2010-10-18 Thread Charles Lindsey
On Sat, 16 Oct 2010 05:09:53 +0100, Hector Santos wrote: > This probably means that it should clarified what that 5.4 sentence > means and also the next section 5.5 > > 5.5. Recommended Signature Content > > .. > > The following header fields SHOULD be included in the signature, if >

Re: [ietf-dkim] layer violations, was detecting header mutations after signing

2010-10-18 Thread Charles Lindsey
On Fri, 15 Oct 2010 17:45:22 +0100, Michael Thomas wrote: > On 10/15/2010 06:51 AM, Charles Lindsey wrote: >> And yet the current protocol will allow an evil mail _apparently_ from >> Ebay to appear, with no means for the recipient to detect the >> difference. > > They're not apparently from t

Re: [ietf-dkim] layer violations, was detecting header mutations after signing

2010-10-18 Thread Charles Lindsey
On Fri, 15 Oct 2010 18:04:22 +0100, Murray S. Kucherawy wrote: > This to me says you still believe DKIM's ultimate payload is something > other than a validated identifier, in this case a domain name. We're > thus not on the same page. > > If instead we do agree that that's its sole intend

Re: [ietf-dkim] Issue: 4871bis - section 5.4/5.5 clarify 5322.From requirement

2010-10-18 Thread Hector Santos
Charles, I was showing what already is written and suggesting that it might need clarification. Charles Lindsey wrote: > On Sat, 16 Oct 2010 05:09:53 +0100, Hector Santos wrote: > >> This probably means that it should clarified what that 5.4 sentence >> means and also the next section 5.5 >> >>

Re: [ietf-dkim] detecting header mutations after signing

2010-10-18 Thread Dave CROCKER
On 10/18/2010 3:31 AM, Ian Eiloart wrote: > --On 15 October 2010 11:53:51 -0400 Dave CROCKER wrote: >> On 10/15/2010 11:40 AM, Mark Delany wrote: >>> Well, if you want to introduce semantic changes why not just change >>> the meaning of h=from:to: to be semantically identical to >>> h=from:from:

Re: [ietf-dkim] detecting header mutations after signing

2010-10-18 Thread Mark Delany
On Mon, Oct 18, 2010 at 06:07:15AM -0700, Dave CROCKER allegedly wrote: > > > On 10/18/2010 3:31 AM, Ian Eiloart wrote: > > --On 15 October 2010 11:53:51 -0400 Dave CROCKER wrote: > >> On 10/15/2010 11:40 AM, Mark Delany wrote: > >>> Well, if you want to introduce semantic changes why not just c

Re: [ietf-dkim] ISSUE: 3.6.2.1 - Working with other TXT records

2010-10-18 Thread Hector Santos
SM wrote: > Hi Hector, > At 09:28 16-10-10, Hector Santos wrote: >> From an IETF procedural angle. :) > > I'll comment on how I read what the WG Chairs said in general terms. If > you believe that the process followed is not fair, you could discuss the > matter with the WG Chairs. I'll quot

Re: [ietf-dkim] detecting header mutations after signing

2010-10-18 Thread Dave CROCKER
> Well, if you want to introduce semantic changes why not just change > the meaning of h=from:to: to be semantically identical to > h=from:from:to:to: ... >>> I assumed that the proposal applied only to headers rfc5322 says cannot be >>> duplicated. >> >> That is a constraint that was

[ietf-dkim] How MUAs render mail (was: Data integrity claims)

2010-10-18 Thread Wietse Venema
Mark Delany: > My problem is that if some valuable domain like paypal sends me a > bunch of bits that I or my MUA or my MTA ties to paypal.com then the > end goal of DKIM is, IMO, that those bunch of bits I "see" are the > ones that paypal sent. No more, no less. But the user does not see a bunch

Re: [ietf-dkim] How MUAs render mail

2010-10-18 Thread Hector Santos
Wietse Venema wrote: > Mark Delany: >> My problem is that if some valuable domain like paypal sends me a >> bunch of bits that I or my MUA or my MTA ties to paypal.com then the >> end goal of DKIM is, IMO, that those bunch of bits I "see" are the >> ones that paypal sent. No more, no less. > > But

Re: [ietf-dkim] How MUAs render mail

2010-10-18 Thread Mark Delany
> result of software layers that render those bits. DKIM has no > control over that rendering process. Really? Do you mean doesn't or shouldn't or can't? Apropos layering violations: are we saying that having a UA inject message 'A' via a DKIM layer into the mail stream, and then having some ran

Re: [ietf-dkim] ISSUE: 3.6.2.1 - Working with other TXT records

2010-10-18 Thread Murray S. Kucherawy
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] > On Behalf Of John Levine > Sent: Friday, October 15, 2010 7:14 PM > To: ietf-dkim@mipassoc.org > Cc: dcroc...@bbiw.net > Subject: Re: [ietf-dkim] ISSUE: 3.6.2.1 - Working with other TXT re

Re: [ietf-dkim] DKIM and patents

2010-10-18 Thread Murray S. Kucherawy
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] > On Behalf Of Mark Delany > Sent: Friday, October 15, 2010 11:19 PM > To: ietf-dkim@mipassoc.org > Subject: Re: [ietf-dkim] DKIM and patents > > On Sat, Oct 16, 2010 at 02:54:13PM +1200, F

Re: [ietf-dkim] I-D Action:draft-ietf-dkim-mailinglists-04.txt

2010-10-18 Thread Murray S. Kucherawy
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] > On Behalf Of Alessandro Vesely > Sent: Saturday, October 16, 2010 8:37 AM > To: ietf-dkim@mipassoc.org > Subject: Re: [ietf-dkim] I-D Action:draft-ietf-dkim-mailinglists-04.txt > > I have

Re: [ietf-dkim] How MUAs render mail

2010-10-18 Thread Wietse Venema
Mark Delany: > > But the user does not see a bunch of bits. The user sees the combined > > result of software layers that render those bits. DKIM has no > > control over that rendering process. > > Really? Do you mean doesn't or shouldn't or can't? Does DKIM control text-to-voice conversion, or

[ietf-dkim] Protecting MUAs

2010-10-18 Thread Murray S. Kucherawy
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] > On Behalf Of Mark Delany > Sent: Friday, October 15, 2010 11:39 PM > To: ietf-dkim@mipassoc.org > Subject: Re: [ietf-dkim] Data integrity claims > > So anything that circumvents "what you

Re: [ietf-dkim] detecting header mutations after signing

2010-10-18 Thread Murray S. Kucherawy
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] > On Behalf Of MH Michael Hammer (5304) > Sent: Saturday, October 16, 2010 10:43 AM > To: Wietse Venema; ietf-dkim@mipassoc.org > Subject: Re: [ietf-dkim] detecting header mutations after si

Re: [ietf-dkim] sophistry is bad, was Data integrity claims

2010-10-18 Thread Murray S. Kucherawy
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] > On Behalf Of Scott Kitterman > Sent: Saturday, October 16, 2010 11:56 AM > To: ietf-dkim@mipassoc.org > Subject: Re: [ietf-dkim] sophistry is bad, was Data integrity claims > > > The curr

Re: [ietf-dkim] Data integrity claims

2010-10-18 Thread Murray S. Kucherawy
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] > On Behalf Of Mark Delany > Sent: Sunday, October 17, 2010 6:23 PM > To: ietf-dkim@mipassoc.org > Subject: Re: [ietf-dkim] Data integrity claims > > By DKIM process, I would include anythi

Re: [ietf-dkim] Data integrity claims

2010-10-18 Thread MH Michael Hammer (5304)
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim- > boun...@mipassoc.org] On Behalf Of Murray S. Kucherawy > Sent: Monday, October 18, 2010 2:26 PM > To: ietf-dkim@mipassoc.org > Subject: Re: [ietf-dkim] Data integrity claims > > > -Original Message-

Re: [ietf-dkim] How MUAs render mail

2010-10-18 Thread Dave CROCKER
On 10/18/2010 11:01 AM, Wietse Venema wrote: > Does DKIM control text-to-voice conversion, ... > Obviously these two are among the more lossy transformations. But > even text-to-screen conversion, ... Folks, This is all slightly surreal. There is a premise that is motivating the proponents of

Re: [ietf-dkim] Data integrity claims

2010-10-18 Thread Murray S. Kucherawy
> -Original Message- > From: MH Michael Hammer (5304) [mailto:mham...@ag.com] > Sent: Monday, October 18, 2010 11:44 AM > To: Murray S. Kucherawy; ietf-dkim@mipassoc.org > Subject: RE: [ietf-dkim] Data integrity claims > > > There's nothing between an MTA and an MUA that prevents this atta

Re: [ietf-dkim] sophistry is bad, was Data integrity claims

2010-10-18 Thread Scott Kitterman
On Monday, October 18, 2010 02:19:06 pm Murray S. Kucherawy wrote: > > -Original Message- > > From: ietf-dkim-boun...@mipassoc.org > > [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Scott Kitterman > > Sent: Saturday, October 16, 2010 11:56 AM > > To: ietf-dkim@mipassoc.org > > Subjec

Re: [ietf-dkim] How MUAs render mail

2010-10-18 Thread Murray S. Kucherawy
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] > On Behalf Of Dave CROCKER > Sent: Monday, October 18, 2010 11:50 AM > Cc: ietf-dkim@mipassoc.org > Subject: Re: [ietf-dkim] How MUAs render mail > > Folks making assertions about what MUA

Re: [ietf-dkim] Data integrity claims

2010-10-18 Thread MH Michael Hammer (5304)
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim- > boun...@mipassoc.org] On Behalf Of Murray S. Kucherawy > Sent: Monday, October 18, 2010 2:51 PM > To: ietf-dkim@mipassoc.org > Subject: Re: [ietf-dkim] Data integrity claims > > > -Original Message-

Re: [ietf-dkim] Data integrity claims

2010-10-18 Thread Murray S. Kucherawy
> -Original Message- > From: MH Michael Hammer (5304) [mailto:mham...@ag.com] > Sent: Monday, October 18, 2010 12:11 PM > To: Murray S. Kucherawy; ietf-dkim@mipassoc.org > Subject: RE: [ietf-dkim] Data integrity claims > > See above. This leads me to believe that you might be amenable to >

Re: [ietf-dkim] Data integrity claims

2010-10-18 Thread MH Michael Hammer (5304)
I'm trying to find a way for us to build a consensus on how to move forward. While I have tended towards favoring a normative approach, you are swaying me with this "amazing Security Considerations addendum". Mike > -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-

Re: [ietf-dkim] How MUAs render mail

2010-10-18 Thread Douglas Otis
On 10/18/10 6:49 AM, Wietse Venema wrote: > Mark Delany: >> My problem is that if some valuable domain like paypal sends me a >> bunch of bits that I or my MUA or my MTA ties to paypal.com then the >> end goal of DKIM is, IMO, that those bunch of bits I "see" are the >> ones that paypal sent. No

Re: [ietf-dkim] Data integrity claims

2010-10-18 Thread Hector Santos
MH Michael Hammer (5304) wrote: > This is no more presumptuous than expecting that MUAs will adapt to > consume the output of DKIM as it stands now. The question is the value > equation. I'm not in a position to answer that question. Perhaps we > should try to get some of the MUA folks to join the

[ietf-dkim] DKIM Component Responsibility

2010-10-18 Thread Hector Santos
Murray S. Kucherawy wrote: > Current implementations, especially the two library ones that > are referenced most often in here, haven't the functionality to > cause header fields to be removed, prefixed, reordered, modified, > etc. This change would require them to be overhauled to extend > t

Re: [ietf-dkim] layer violations, was detecting header mutations after signing

2010-10-18 Thread Murray S. Kucherawy
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] > On Behalf Of Charles Lindsey > Sent: Monday, October 18, 2010 4:24 AM > To: DKIM > Subject: Re: [ietf-dkim] layer violations, was detecting header mutations > after signing > > > Irrelev

Re: [ietf-dkim] Data integrity claims

2010-10-18 Thread Hector Santos
FWIW, the telnet mail interface typo fix should be: telnet bbs.winserver.com -- HLS Hector Santos wrote: > I'm a MUA author of BOTH types and people forget that there are TWO > kinds here. We have: > > Console based Mail Reader/Writers Online Interface (Dialup/Telnet) > >

Re: [ietf-dkim] layer violations, was detecting header mutations after signing

2010-10-18 Thread Hector Santos
Murray S. Kucherawy wrote: >> -Original Message- >> From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] >> On Behalf Of Charles Lindsey >> Sent: Monday, October 18, 2010 4:24 AM >> To: DKIM >> Subject: Re: [ietf-dkim] layer violations, was detecting header mutation

Re: [ietf-dkim] Data integrity claims

2010-10-18 Thread Douglas Otis
On 10/18/10 12:18 PM, Murray S. Kucherawy wrote: > >> This is no more presumptuous than expecting that MUAs will adapt > >> to consume the output of DKIM as it stands now. > > In another message I indicated that I don't presume either, but > assert that there's no middle ground; they will or t

Re: [ietf-dkim] Data integrity claims

2010-10-18 Thread Murray S. Kucherawy
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] > On Behalf Of Douglas Otis > Sent: Monday, October 18, 2010 3:33 PM > To: ietf-dkim@mipassoc.org > Subject: Re: [ietf-dkim] Data integrity claims > > Should the charter of a security relat

Re: [ietf-dkim] Protecting messages, not MUAs, MTAs, or anything else

2010-10-18 Thread John R. Levine
Merely detecting that an incoming message is malformed (e.g. two From: fields, whether or not either was signed) and refusing to verify it is insufficient, because that has the net effect of setting a bit that the MUA likely won't even check, ... This is getting awfully overcomplicated. One of

[ietf-dkim] Invalid RFC5322 related DKIM Implementation requirements

2010-10-18 Thread Hector Santos
I think most people understand this: - DKIM "SHOULD" be checking its input, - With increase awareness, the backend MTA receivers "SHOULD" checking for these "Special RFC5322" multiple header issues. Whether SHOULD should be changed to MUST is not a concern to me, either way, there

Re: [ietf-dkim] detecting header mutations after signing

2010-10-18 Thread John R. Levine
>> What is the value proposition that DKIM offers that incentivizes people >> to adopt it? > > I'll take a crack at that: DKIM offers the MUA enough data to know what > parts of a message to be rendered can be considered "valid" inasmuch as > someone (the signer) took responsibility for it. I ha

Re: [ietf-dkim] detecting header mutations after signing

2010-10-18 Thread Murray S. Kucherawy
> -Original Message- > From: John R. Levine [mailto:jo...@iecc.com] > Sent: Monday, October 18, 2010 5:25 PM > To: Murray S. Kucherawy > Cc: ietf-dkim@mipassoc.org > Subject: Re: [ietf-dkim] detecting header mutations after signing > > Also, although I certainly do not purport to be a whiz

Re: [ietf-dkim] Protecting messages, not MUAs, MTAs, or anything else

2010-10-18 Thread Hector Santos
John R. Levine wrote: > So, uh, can we agree that Jim's SHOULD language to tell people to do > this is a good idea? Yes. +1. I think I was the first to agree with Jim's input and didn't see much follow up except you and maybe another person. Maybe Barry can provide a repeat of the exact chang

Re: [ietf-dkim] detecting header mutations after signing

2010-10-18 Thread John Levine
>> difference between a green bar SSL page and one with no SSL. I don't want >> to mess with the MUA at all, but rather use DKIM to help decide what >> messages to show her and which messages to consign to the junk folder. >Why do we think such a sorting module can't/won't have the >intelligence

Re: [ietf-dkim] detecting header mutations after signing

2010-10-18 Thread Steve Atkins
On Oct 18, 2010, at 5:50 PM, John Levine wrote: >>> difference between a green bar SSL page and one with no SSL. I don't want >>> to mess with the MUA at all, but rather use DKIM to help decide what >>> messages to show her and which messages to consign to the junk folder. > >> Why do we think

Re: [ietf-dkim] Data integrity claims

2010-10-18 Thread Douglas Otis
On 10/18/10 4:15 PM, Murray S. Kucherawy wrote: > > On Monday, October 18, 2010 3:33 PM, Douglas Otis wrote: > > > > Should the charter of a security related protocol need to > > anticipate minor modifications to a verification process, that > > appears essential for ensuring a DKIM signature is

Re: [ietf-dkim] detecting header mutations after signing

2010-10-18 Thread John Levine
>There's a strong correlation between badly structured emails (SMTP, >MIME, HTML) and email that the recipient doesn't want to see. You're right, but I think that's largely orthogonal to DKIM. If a message has a good signature from a credible signer, I expect I'd want to show it to the user even

[ietf-dkim] FYI: TXT Record setup resolved by Domain Hosting Provider

2010-10-18 Thread Hector Santos
FYI: Maybe there are lurkers here from Network Solutions reading my recent posts, but the issue with their web-based DNS Records Manager inability to allow domain customer to make TXT records without a sub-domain has been resolved. It was done by allowing a special sub-domain input: "@ (n

Re: [ietf-dkim] detecting header mutations after signing

2010-10-18 Thread Hector Santos
John Levine wrote: >> OTOH, we already have a SHOULD that tells MUA writers >> to splatter the d= field somewhere in the GUI where the user >> can't ignore it > > Ugh, you're right. Now that I look at it, I'd like to completely > delete Appendix D, since it says some things that are just wrong,