Re: [ietf-dkim] 8bit downgrades

2011-05-22 Thread Michael Deutschmann
On Thu, 19 May 2011, Murray S. Kucherawy wrote: The presented argument, which comes from an IETF outsider involved with MTA development, is whether or not that SHOULD is worthy of a MUST because failing to do it in the vast majority of cases will result in a downgrade somewhere on the path

Re: [ietf-dkim] New canonicalizations

2011-05-22 Thread Alessandro Vesely
On 19/May/11 05:17, John Levine wrote: The point I was making was that ever more complex ways to decide that two mutated versions of a message are the same aren't likely to help much, certainly not compared to the large cost of implementing code even more complex than what relaxed does now.

Re: [ietf-dkim] EAI and 8bit downgrades

2011-05-22 Thread John R. Levine
Specify MUST, but clarify that this is just for now and may be revisited at a later time -- for example, if the SMTP protcol design community ever backs down and accepts DJB's approach to the 8-bit message problem (http://cr.yp.to/smtp/8bitmime.html, essentially that it is OK to break any

Re: [ietf-dkim] 8bit downgrades

2011-05-22 Thread Dave CROCKER
On 5/19/2011 10:50 AM, Murray S. Kucherawy wrote: Can anyone remember why there’s a SHOULD for the downgrade to 7-bit in RFC4871 Section 5.3, rather than a MUST? To concur with one of the lines of explanation that has been offered: It is generally a good idea to refrain from mandating

Re: [ietf-dkim] New canonicalizations

2011-05-22 Thread John R. Levine
Interesting, but not less intricate. The semantics of authenticating only the armored part of a message is not obvious. Resorting to base64 encoding is subject to varying interpretations, including spammers attempts to avoid naive content filtering. S/MIME and PGP MIME have been doing just

Re: [ietf-dkim] EAI and 8bit downgrades

2011-05-22 Thread Douglas Otis
On 5/22/11 10:38 PM, John R. Levine wrote: Specify MUST, but clarify that this is just for now and may be revisited at a later time -- for example, if the SMTP protcol design community ever backs down and accepts DJB's approach to the 8-bit message problem (http://cr.yp.to/smtp/8bitmime.html,

Re: [ietf-dkim] Certifying the DKIM public key?

2011-05-22 Thread Dave CROCKER
On 5/19/2011 3:17 PM, Murray S. Kucherawy wrote: -Original Message- From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Rolf E. Sonneveld ... recently someone asked me whether it would have any added value if the DKIM public key, which is stored

Re: [ietf-dkim] Certifying the DKIM public key?

2011-05-22 Thread John R. Levine
through a separate, value-added mechanism. My own preference would be for using a special header-field that contains the cert, with the specification of using such certs as saying that they are enabled when included in the set of h= covered header fields. I don't see how this is

Re: [ietf-dkim] Certifying the DKIM public key?

2011-05-22 Thread Dave CROCKER
On 5/22/2011 10:27 AM, John R. Levine wrote: through a separate, value-added mechanism. My own preference would be for using a special header-field that contains the cert, with the specification of using such certs as saying that they are enabled when included in the set of h= covered

Re: [ietf-dkim] 8bit downgrades

2011-05-22 Thread Hector Santos
Dave CROCKER wrote: On 5/19/2011 2:53 PM, Pete Resnick wrote: In RFC 2119 (the document that defines MUST, SHOULD, etc.), MUST does not mean vitally important and SHOULD does not mean really really important, but less important than MUST. MUST means you have to do this or you're not going

Re: [ietf-dkim] Certifying the DKIM public key?

2011-05-22 Thread John R. Levine
VBR queries are about an actor, not a message. Certs can be coupled to a particular message -- this was an interesting semantic distinction about Goodmail's certification scheme -- although I believe that typically they, too, are only scoped to the actor, not the specific content. Now

Re: [ietf-dkim] Certifying the DKIM public key?

2011-05-22 Thread Michael Thomas
On 05/22/2011 10:27 AM, John R. Levine wrote: It occurs to me that since mail certification is likely to make assertions about behavior as well as identity, the SSL model in which certs last for a year won't work, since behavior can change rapidly. Either the certifier has to issue a stream

Re: [ietf-dkim] Certifying the DKIM public key?

2011-05-22 Thread John R. Levine
But this is exactly what DKIM is. You prove yourself fsvo prove to the registrar who certifies you by virtue of placing your NS records in the root servers instead of issuing a cert. Registrars, as we all know, rarely check any credential beyond the confirmation code from the credit card

Re: [ietf-dkim] 8bit downgrades

2011-05-22 Thread Hector Santos
Michael Deutschmann wrote: On Thu, 19 May 2011, Murray S. Kucherawy wrote: The presented argument, which comes from an IETF outsider involved with MTA development, is whether or not that SHOULD is worthy of a MUST because failing to do it in the vast majority of cases will result in a

Re: [ietf-dkim] 8bit downgrades

2011-05-22 Thread Murray S. Kucherawy
-Original Message- From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Hector Santos Sent: Sunday, May 22, 2011 10:43 AM To: ietf-dkim@mipassoc.org Subject: Re: [ietf-dkim] 8bit downgrades Please refrain from passing the buck to the WG. The

Re: [ietf-dkim] 8bit downgrades

2011-05-22 Thread Hector Santos
Murray S. Kucherawy wrote: Hector Santos followed up Crocker'ss passing of the buck: Please refrain from passing the buck to the WG. The document editors are: D. Crocker (editor) Tony Hansen (editor) M. Kucherawy (editor) If the WG was technically incapable as you are

Re: [ietf-dkim] Certifying the DKIM public key?

2011-05-22 Thread J.D. Falk
On May 22, 2011, at 12:27 PM, John R. Levine wrote: It occurs to me that since mail certification is likely to make assertions about behavior as well as identity, the SSL model in which certs last for a year won't work, since behavior can change rapidly. Either the certifier has to issue

Re: [ietf-dkim] New canonicalizations

2011-05-22 Thread Hector Santos
Alessandro Vesely wrote: On 19/May/11 05:17, John Levine wrote: And anyway, if your goal is for your message to survive, you should armor it better, not come up with more arcane ways to declare that it may be bleeding heavily but it's not dead yet. Interesting, but not less intricate. The

Re: [ietf-dkim] Last Call: draft-ietf-dkim-mailinglists-10.txt (DKIM And Mailing Lists) to BCP

2011-05-22 Thread ned+dkim
2. Should this be Informational or BCP? a: BCP, making it clear when we're insufficiently certain about something. Last Call will sort out any objections. Well, I couldn't afford to go, so I can't say you're wrong, and I don't know why I didn't see that on the list. I

Re: [ietf-dkim] Certifying the DKIM public key?

2011-05-22 Thread Hector Santos
John R. Levine wrote: But this is exactly what DKIM is. You prove yourself fsvo prove to the registrar who certifies you by virtue of placing your NS records in the root servers instead of issuing a cert. Registrars, as we all know, rarely check any credential beyond the confirmation code

Re: [ietf-dkim] 8bit downgrades

2011-05-22 Thread Hector Santos
Alessandro Vesely wrote: For example, MTAs that autoconvert from quoted-printable to 8bit, a rather common circumstance. I did the following Content-Transfer-Encoding failure analysis: Failure rates for message top level encoding type