Re: [ietf-dkim] Ticket #10: public key example -- no change needed

2011-04-27 Thread Rolf E. Sonneveld
On 4/27/11 3:56 AM, Hector Santos wrote: > What is surreal about this brush back to make a SIMPLE change is that > it touches base with the often stated concern about DKIM DNS > management complexities as one of the barriers for adoption. > > In a perfect DKIM spec world, this section should cover

Re: [ietf-dkim] Ticket #10: public key example -- no change needed

2011-04-27 Thread Alessandro Vesely
On 27/Apr/11 01:25, John Levine wrote: > Whether the name in the DNS record should be brisbane or > brisbane._domainkey or brisbane._domainkey.example.org depends > entirely on the most recent $ORIGIN line in the master file. If the > $ORIGIN is _domainkey.example.org, an entirely plausible scenar

Re: [ietf-dkim] Ticket #11

2011-04-27 Thread Alessandro Vesely
On 26/Apr/11 23:50, MH Michael Hammer (5304) wrote: >>> However I suggest adding the usual waffling qualifier: >>> >>> claiming (some) responsibility >> >> I think we should drop "signed" from it, since that's what the entire >> specification is about in the first place. >> > > I think it is

Re: [ietf-dkim] Feedback on open tickets, please!

2011-04-27 Thread Rolf E. Sonneveld
Hi, Murray, On 4/26/11 8:25 PM, Murray S. Kucherawy wrote: Folks, With four days left in the WGLC for our remaining two documents, there are several items still open in the trackers. Only items that are either minor/editorial in nature or those that get working group consensus will make i

Re: [ietf-dkim] Ticket #10: public key example -- no change needed

2011-04-27 Thread Hector Santos
Rolf E. Sonneveld wrote: > -1. I suggest to add clarifications etc. to a future update of RFC5863 > (deployment and operations document). So you agree clarification is required but not for RFC4871bis? Interesting. Lets see: 1) A few words clarification for DKIM-BASE standard. A little conf

Re: [ietf-dkim] Ticket #19

2011-04-27 Thread Alessandro Vesely
On 26/Apr/11 23:13, Dave CROCKER wrote: > I think I understand the intent, here, and I'm supportive of the goal. > However > the text is technically invalid. A DKIM signature has only one meaning, > relative to existing, formal specification. > > "Inferring" meanings beyond what is defined is

Re: [ietf-dkim] Ticket #10: public key example -- one $ORIGIN line fixes problems

2011-04-27 Thread Hector Santos
Alessandro Vesely wrote: > On 27/Apr/11 01:25, John Levine wrote: >> Whether the name in the DNS record should be brisbane or >> brisbane._domainkey or brisbane._domainkey.example.org depends >> entirely on the most recent $ORIGIN line in the master file. If the >> $ORIGIN is _domainkey.example.or

[ietf-dkim] FYI: Curious IPR from Yahoo! to DKIM

2011-04-27 Thread Alessandro Vesely
I'm puzzled by this message http://www.ietf.org/mail-archive/web/ipr-announce/current/msg00447.html Its date is Tue, 26 Apr 2011 09:01:41 -0700 (PDT), and it talks about a submission on 2011-04-10. However, the given datatracker URL (1530) results in a 404 Not Found error, and the mentioned draf

Re: [ietf-dkim] Ticket #19

2011-04-27 Thread Hector Santos
Dave CROCKER wrote: > The best I can suggest is something along the lines of noting that > assessment-level heuristics can be aided by certain choices of signature d= > names. And then specifying what they might be, so that both signers and > verifiers know how to encourage success for the heur

Re: [ietf-dkim] Ticket #10: public key example -- no change needed

2011-04-27 Thread Rolf E. Sonneveld
On 4/27/11 12:47 PM, Hector Santos wrote: > Rolf E. Sonneveld wrote: > >> -1. I suggest to add clarifications etc. to a future update of >> RFC5863 (deployment and operations document). > > So you agree clarification is required but not for RFC4871bis? No. Just: IF clarification is required, it h

Re: [ietf-dkim] FYI: Curious IPR from Yahoo! to DKIM

2011-04-27 Thread Barry Leiba
> I'm puzzled by this message > > http://www.ietf.org/mail-archive/web/ipr-announce/current/msg00447.html > > Its date is Tue, 26 Apr 2011 09:01:41 -0700 (PDT), and it talks about > a submission on 2011-04-10.  However, the given datatracker URL > (1530) results in a 404 Not Found error, and the me

Re: [ietf-dkim] Ticket #10: public key example -- no change needed

2011-04-27 Thread Hector Santos
Rolf E. Sonneveld wrote: >> Interesting. Lets see: >> >> 1) A few words clarification for DKIM-BASE standard. A little >>[LESS] confusion for Windows people and domains using >>ISP managed DNS zones. > > Well, maybe it's time Windows people leave their .local zones and > discover a whole

Re: [ietf-dkim] Taking responsibility for a message

2011-04-27 Thread Charles Lindsey
On Tue, 26 Apr 2011 13:22:15 +0100, Alessandro Vesely wrote: > I guess Message-ID is among those "structural, not semantic" fields. > I concur. However, we miss a field that says an MTA is _knowingly_ > breaking whatever signatures may be present. The Message-ID gets copied into the Reference

Re: [ietf-dkim] Ticket #11

2011-04-27 Thread Murray S. Kucherawy
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] > On Behalf Of Alessandro Vesely > Sent: Wednesday, April 27, 2011 2:36 AM > To: ietf-dkim@mipassoc.org > Subject: Re: [ietf-dkim] Ticket #11 > > On 26/Apr/11 23:50, MH Michael Hammer (5304

Re: [ietf-dkim] Ticket #11

2011-04-27 Thread Dave CROCKER
On 4/27/2011 9:27 AM, Murray S. Kucherawy wrote: >> Could be more explicit: >> >>A single domain name that is the mandatory payload output of DKIM >>and that refers to the identity claiming some responsibility for >>the message by signing it. >> >> (I've left off "introduced into the m

Re: [ietf-dkim] despair

2011-04-27 Thread Murray S. Kucherawy
> -Original Message- > From: Michael Thomas [mailto:m...@mtcc.com] > Sent: Tuesday, April 26, 2011 4:31 PM > To: Murray S. Kucherawy > Cc: DKIM IETF WG > Subject: Re: [ietf-dkim] despair > > When you commit a 20 page diff without the benefit of a debugging > pass and dev test, how much con

Re: [ietf-dkim] despair

2011-04-27 Thread Dave CROCKER
On 4/27/2011 9:45 AM, Murray S. Kucherawy wrote: > I've been keeping up with the specification changes both in terms of the > documentation and the impact of the changes on live source code. That's > really helped to keep us honest in terms of backward compatibility. ... > It is a useful data poi

Re: [ietf-dkim] despair

2011-04-27 Thread Michael Thomas
On 04/27/2011 09:53 AM, Dave CROCKER wrote: > With that sort of documented history, the responsibility to claim otherwise > falls on the critic. Otherwise the wg is essentially being asked to prove a > negative and almost serves as a DOS attack... > Denial of service on what/whom? As far as I

Re: [ietf-dkim] despair

2011-04-27 Thread Michael Thomas
On 04/27/2011 09:45 AM, Murray S. Kucherawy wrote: >> -Original Message- >> From: Michael Thomas [mailto:m...@mtcc.com] >> Sent: Tuesday, April 26, 2011 4:31 PM >> To: Murray S. Kucherawy >> Cc: DKIM IETF WG >> Subject: Re: [ietf-dkim] despair >> >> When you commit a 20 page diff without th

Re: [ietf-dkim] ADSP stats

2011-04-27 Thread Paul Midgen
I wanted to address Hotmail's use of ADSP, clarify our position on the issue of authentication policy, and share a few bits of information the list may find interesting. Hotmail's use of DKIM+ADSP should not be interpreted as a political statement; we implemented DKIM to offset the impact of we

Re: [ietf-dkim] ADSP stats

2011-04-27 Thread Dave CROCKER
On 4/27/2011 10:20 AM, Paul Midgen wrote:\ > We check ADSP every time we run DKIM and see the following policy > distribution: > > 97.98% "unknown" (including domains not explicitly publishing policy) > 2% "discardable" > 0.02% "all" Paul, Cool. Thanks for sending that detailed note. Are th

Re: [ietf-dkim] Ticket #17

2011-04-27 Thread Douglas Otis
On 4/27/11 2:21 AM, SM wrote: > Hi Doug, At 18:43 26-04-2011, Douglas Otis wrote: > > Not validating input creates a bigger mess when used in conjunction > > with RFC5336bis. As such, it seems unfair for the DKIM WG > > operating within the Security area to close and then hand a mess > > over to t

Re: [ietf-dkim] draft-ietf-dkim-rfc4871bis-07 // Attacks Involving Additional Header Fields

2011-04-27 Thread Charles Lindsey
On Tue, 26 Apr 2011 02:33:11 +0100, Douglas Otis wrote: > Although DKIM is reviewed within IETF's security area, input validation > by DKIM remains dangerously neglected. DKIM's Introduction indicates it > can be implemented independent of clients. As such, few assumptions are > safe in how u

Re: [ietf-dkim] draft-ietf-dkim-rfc4871bis-07 // Attacks Involving Additional Header Fields

2011-04-27 Thread Charles Lindsey
On Tue, 26 Apr 2011 05:29:35 +0100, Dave CROCKER wrote: >> DKIM doesn't create any binding between the RFC5322.From domain and the >> "d=" >> value as you're doing. What you're talking about here falls into the >> realm >> of ADSP or other policy-like assertions, not DKIM itself which is the

[ietf-dkim] Two issues derived from Ticket #20: signature practices

2011-04-27 Thread Alessandro Vesely
On 27/Apr/11 01:42, John R. Levine wrote: > I agree with Dave's changes, +1, and also for Murray's advice of signing A-R fields. However, in such case, the last phrase in Sec 7.2 (INFORMATIVE ADVICE to MUA filter writers) should be changed from To circumvent this attack, verifiers may wish to

Re: [ietf-dkim] ADSP stats

2011-04-27 Thread MH Michael Hammer (5304)
Paul, Thank you for sharing what you have. Comments/questions inline. Mike > -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim- > boun...@mipassoc.org] On Behalf Of Paul Midgen > Sent: Wednesday, April 27, 2011 1:21 PM > To: Scott Kitterman; ietf-dkim@mipassoc.

Re: [ietf-dkim] Ticket #11

2011-04-27 Thread Hector Santos
+1 Dave CROCKER wrote: > On 4/27/2011 9:27 AM, Murray S. Kucherawy wrote: >>> Could be more explicit: >>> >>>A single domain name that is the mandatory payload output of DKIM >>>and that refers to the identity claiming some responsibility for >>>the message by signing it. >>> >>> (I've

Re: [ietf-dkim] Two issues derived from Ticket #20: signature practices

2011-04-27 Thread Murray S. Kucherawy
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] > On Behalf Of Alessandro Vesely > Sent: Wednesday, April 27, 2011 11:41 AM > To: ietf-dkim@mipassoc.org > Subject: [ietf-dkim] Two issues derived from Ticket #20: signature practices > > O

Re: [ietf-dkim] despair

2011-04-27 Thread Barry Leiba
> Complaining is easy. Indeed so. And so let's cut the meta-discussion and not go back to throwing darts around. To the points: Mike's concern is valid. Murray's and Dave's notes have addressed it. I, as a participant, am satisfied with Murray's and Dave's responses to the concern. An

[ietf-dkim] Output summary

2011-04-27 Thread Murray S. Kucherawy
Trust me, this is (supposed to be) minor! Someone off-list pointed out to me that it might be helpful to summarize the expected outputs of a DKIM verifier. Indeed, on review, we don't do that all in one place; some of it is in Section 3 and some in Section 7. With that in mind, I propose this

Re: [ietf-dkim] Two issues derived from Ticket #20: signature practices

2011-04-27 Thread Dave CROCKER
On 4/27/2011 12:17 PM, Murray S. Kucherawy wrote: > Actually if we're talking about A-R fields, RFC5451 talks plenty about this. > Rather than duplicating advice, we should just refer to it. as long as it's informative rather than normative, that seems entirely constructive. d/ -- Dav

Re: [ietf-dkim] Output summary

2011-04-27 Thread Dave CROCKER
On 4/27/2011 12:28 PM, Murray S. Kucherawy wrote: > With that in mind, I propose this as a new Section 4.9, moving the others > down: > > 4.9. Output Requirements > > The output of the verifier MUST embody: > > -A result code that indicates whether or not the signature was validated > (PERMFAIL

Re: [ietf-dkim] Output summary

2011-04-27 Thread Murray S. Kucherawy
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] > On Behalf Of Dave CROCKER > Sent: Wednesday, April 27, 2011 12:42 PM > To: ietf-dkim@mipassoc.org > Subject: Re: [ietf-dkim] Output summary > > > 4.9. Output Requirements > > > > The outp

Re: [ietf-dkim] Output summary

2011-04-27 Thread Dave CROCKER
On 4/27/2011 12:46 PM, Murray S. Kucherawy wrote: >>> 4.9. Output Requirements >>> >>> The output of the verifier MUST embody: sorry for not noticing this earlier: what does it mean for a verifier to 'embody' something. i can guess, given the history of discssion but offhand i think it entire

Re: [ietf-dkim] ADSP stats

2011-04-27 Thread Hector Santos
Good Show! Some inline comments: Paul Midgen wrote: > I wanted to address Hotmail's use of ADSP, clarify our position > on the issue of authentication policy, and share a few bits > of information the list may find interesting. > > Hotmail's use of DKIM+ADSP should not be interpreted as > a p

Re: [ietf-dkim] Output summary

2011-04-27 Thread Murray S. Kucherawy
> -Original Message- > From: Dave CROCKER [mailto:d...@dcrocker.net] > Sent: Wednesday, April 27, 2011 12:58 PM > To: Murray S. Kucherawy > Cc: ietf-dkim@mipassoc.org > Subject: Re: [ietf-dkim] Output summary > > > On 4/27/2011 12:46 PM, Murray S. Kucherawy wrote: > >>> 4.9. Output Requir

Re: [ietf-dkim] Output summary

2011-04-27 Thread Dave CROCKER
> 4.9. Output Requirements > > The output of the verifier MUST embody: >> >> >> sorry for not noticing this earlier: what does it mean for a verifier to >> 'embody' something. > > As in "must be this, or something equivalent to it". MUST include: or MUST contain at least:

Re: [ietf-dkim] ADSP stats

2011-04-27 Thread John R. Levine
>> We check ADSP every time we run DKIM and see the following policy >> distribution: >> >> 97.98% "unknown" (including domains not explicitly publishing policy) >> 2% "discardable" >> 0.02% "all" That's not surprising. Keep in mind that the design of ADSP means that you're supposed to check mai

Re: [ietf-dkim] Two issues derived from Ticket #20: signature practices

2011-04-27 Thread John R. Levine
>> +1, and also for Murray's advice of signing A-R fields. I still don't understand why, if you trust a signer enough to believe the mailing list A-R headers he signs, you don't trust him enough to deliver the mail, and, of course, why we now need to remotely verify contributor addresses when w

Re: [ietf-dkim] despair

2011-04-27 Thread Michael Thomas
On 04/27/2011 12:19 PM, Barry Leiba wrote: > > > >> Complaining is easy. >> > Indeed so. And so let's cut the meta-discussion and not go back to > throwing darts around. To the points: > > Mike's concern is valid. > > Murray's and Dave's notes have addressed it. > I don't see how

Re: [ietf-dkim] Output summary

2011-04-27 Thread John Levine
>4.9. Output Requirements > >The output of the verifier MUST embody: embody --> include (if it embodied them, that arguably implies that it doesn't include anything else) >- A result code that indicates whether or not the signature was >validated (PERMFAIL or TEMPFAIL as >described i

Re: [ietf-dkim] Output summary

2011-04-27 Thread Murray S. Kucherawy
> -Original Message- > From: John Levine [mailto:jo...@iecc.com] > Sent: Wednesday, April 27, 2011 2:10 PM > To: ietf-dkim@mipassoc.org > Cc: Murray S. Kucherawy > Subject: Re: [ietf-dkim] Output summary > > Do we need to say anything about the possibility that there are multiple > signatu

Re: [ietf-dkim] Output summary

2011-04-27 Thread Dave CROCKER
On 4/27/2011 2:11 PM, Murray S. Kucherawy wrote: >> -Original Message- >> From: John Levine [mailto:jo...@iecc.com] >> Sent: Wednesday, April 27, 2011 2:10 PM >> To: ietf-dkim@mipassoc.org >> Cc: Murray S. Kucherawy >> Subject: Re: [ietf-dkim] Output summary >> >> Do we need to say anythi

Re: [ietf-dkim] Output summary

2011-04-27 Thread Hector Santos
Murray S. Kucherawy wrote: > With that in mind, I propose this as a new Section 4.9, moving > the others down: > > 4.9. Output Requirements > > The output of the verifier MUST embody: > > > - A result code that indicates whether or not the signature was > validated (PERMFAIL or TEM

Re: [ietf-dkim] Output summary

2011-04-27 Thread John R. Levine
>> Do we need to say anything about the possibility that there are multiple >> signatures? > > How about "For each signature not ignored by the verifier" or such. Section 5.3 says: Verifiers SHOULD ignore failed signatures as though they were not present in the message. and Section 7 say

Re: [ietf-dkim] Output summary

2011-04-27 Thread Murray S. Kucherawy
> -Original Message- > From: John R. Levine [mailto:jo...@iecc.com] > Sent: Wednesday, April 27, 2011 2:27 PM > To: Murray S. Kucherawy > Cc: ietf-dkim@mipassoc.org > Subject: RE: [ietf-dkim] Output summary > > If you believe that, the output should only include signatures that > verified,

Re: [ietf-dkim] draft-ietf-dkim-rfc4871bis-07 // Attacks Involving Additional Header Fields

2011-04-27 Thread Barry Leiba
> Exception: I am aware that Charles and Doug want the issue re-opened. > Anyone else who wants to see it re-opened and discussed again may post > a message to this thread that says "Consensus needs to be > re-evaluated."  I will reconsider this if there's a demonstration of > real support for me t

Re: [ietf-dkim] ADSP stats

2011-04-27 Thread Paul Midgen
Hi Dave, Yes - percentages of the total "Failed SPF" traffic, which is good and bad. A larger number like 50% of total traffic would be more comforting, but in that 1.5% we don't see the same magnitude of high-volume sender dominance as we otherwise would. Distinct domain breakdown is among the

Re: [ietf-dkim] Output summary

2011-04-27 Thread John R. Levine
> As for TEMPFAIL, you'd have to know which signature(s) were temp-failed in > order to decide about a later retry, which then leans us back toward giving > the whole list of signatures that were present and a status for each. I wouldn't be opposed to doing so, except that 4871 says in two separ

Re: [ietf-dkim] ADSP stats

2011-04-27 Thread Paul Midgen
> -Original Message- > From: MH Michael Hammer (5304) [mailto:mham...@ag.com] > Sent: Wednesday, April 27, 2011 11:57 AM > To: Paul Midgen; Scott Kitterman; ietf-dkim@mipassoc.org > Subject: RE: [ietf-dkim] ADSP stats > > The 2% "discardable" is interesting. Is that percentage of volume

Re: [ietf-dkim] Output summary

2011-04-27 Thread Rolf E. Sonneveld
On 4/27/11 11:39 PM, Murray S. Kucherawy wrote: >> -Original Message- >> From: John R. Levine [mailto:jo...@iecc.com] >> Sent: Wednesday, April 27, 2011 2:27 PM >> To: Murray S. Kucherawy >> Cc: ietf-dkim@mipassoc.org >> Subject: RE: [ietf-dkim] Output summary >> >> If you believe that, the

Re: [ietf-dkim] ADSP stats

2011-04-27 Thread Paul Midgen
> -Original Message- > From: Hector Santos [mailto:hsan...@isdg.net] > Sent: Wednesday, April 27, 2011 1:02 PM > To: Paul Midgen > Cc: Scott Kitterman; ietf-dkim@mipassoc.org > Subject: Re: [ietf-dkim] ADSP stats > > And it should not need to be. Is Live.com included? > For the purpo

Re: [ietf-dkim] ADSP stats

2011-04-27 Thread Douglas Otis
Barry, Ticket #17 was listed as a duplicate of Ticket #4 http://trac.tools.ietf.org/wg/dkim/trac/ticket/17 This is not correct! The result of Ticket #4 was a change that simply said: ,--- Internationalized domain names MUST be converted as described in Section 2.3 of [RFC5890] to "A-Labels" '--

[ietf-dkim] Ticket #17 is not a duplicate

2011-04-27 Thread Douglas Otis
Sorry for the repeated message, but the wrong subject line was used. Barry, Ticket #17 was listed as a duplicate of Ticket #4 http://trac.tools.ietf.org/wg/dkim/trac/ticket/17 This is not correct! The result of Ticket #4 was a change that simply said: ,--- Internationalized domain names MUST be

Re: [ietf-dkim] ADSP stats

2011-04-27 Thread Barry Leiba
> Internationalized domain names MUST be converted as described in Section > 2.3 of [RFC5890] to "A-Labels" > '--- > > This failed to specify Fake A-Labels should not be permitted.  The point > made by Ticket #17.  RFC5980 introduces restrictions against 3,329 > confusable unicode points not exclud

Re: [ietf-dkim] Output summary

2011-04-27 Thread Hector Santos
Murray S. Kucherawy wrote: >> -Original Message- >> From: John R. Levine [mailto:jo...@iecc.com] >> >> If you believe that, the output should only include signatures that >> verified, right? So you aren't suppsed to report TEMPFAIL or PERMFAIL. >> Except that if it TEMPFAILed, the output

Re: [ietf-dkim] Output summary

2011-04-27 Thread MH Michael Hammer (5304)
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim- > boun...@mipassoc.org] On Behalf Of John R. Levine > Sent: Wednesday, April 27, 2011 6:33 PM > To: Murray S. Kucherawy > Cc: ietf-dkim@mipassoc.org > Subject: Re: [ietf-dkim] Output summary > > > As for TEMPF

Re: [ietf-dkim] Output summary

2011-04-27 Thread Dave CROCKER
On 4/27/2011 8:56 PM, MH Michael Hammer (5304) wrote: >> a) If at least one signature verifies, report success with the d= value(s) >> of the valid signature(s) and optionally other stuff. > > I'm not comfortable with this statement. If I have two signatures, one from > the domain in the From and

Re: [ietf-dkim] Output summary

2011-04-27 Thread John R. Levine
>> a) If at least one signature verifies, report success with the d= >> value(s) of the valid signature(s) and optionally other stuff. > > I'm not comfortable with this statement. If I have two signatures, one > from the domain in the From and one from a random 3rd party and the From > domain signa

Re: [ietf-dkim] Output summary

2011-04-27 Thread Murray S. Kucherawy
> -Original Message- > From: John R. Levine [mailto:jo...@iecc.com] > Sent: Wednesday, April 27, 2011 3:33 PM > To: Murray S. Kucherawy > Cc: ietf-dkim@mipassoc.org > Subject: Re: [ietf-dkim] Output summary > > I wouldn't be opposed to doing so, except that 4871 says in two separate > plac

[ietf-dkim] Drafts updated again

2011-04-27 Thread Murray S. Kucherawy
I've posted revisions of the two drafts again to close out those items that were minor or non-controversial, or had achieved consensus. You can use the "History" tabs at their respective datatracker links to see the diffs: http://datatracker.ietf.org/doc/draft-ietf-dkim-rfc4871bis/ http://datat