RE: [ietf-dkim] Charter bashing...

2005-10-12 Thread Bill.Oxley
All, As an interested newbie on the topic I have a question What I want is to clearly identify what domain an email arriving at my mta is from. Hopefully at the dns level I can query the domain in the email, get a public key, match the hash in the header of the email to equate to the queried doma

RE: [ietf-dkim] list config, was Admilistrivia question

2005-10-18 Thread Bill.Oxley
Well if we made it an rss feed instead Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of John Levine Sent: Tuesday, October 18, 2005 1:33 PM To: i

RE: [ietf-dkim] Re: SSP and Sender header field

2005-10-26 Thread Bill.Oxley
I'm confused here, * If you're talking about lists with their own SSP. But I don't * see how that could help if a bad actor claims to be a list, and * to send mail "from" ebay. Somehow the SSP of ebay must be able * to say "lie" no matter what the phisher-disguised-as-list does. If a bad actor

RE: [ietf-dkim] ebay / eboy

2005-11-01 Thread Bill.Oxley
Matching the From to the DKIM signing will only be useful to define whose domain in the From field does not match the signing domain, there may be a lot of interesting information to be gleaned from that. Using that info to drive internal policy may interest some folks and does not apply to others.

RE: [ietf-dkim] DKIM proposed charter tweak

2005-11-02 Thread Bill.Oxley
Would like to change the following "While the techniques specified by the DKIM working group will not prevent fraud or spam, they will provide a tool for defense against them by allowing receiving domains to detect spoofing of known domains." to While the techniques specified by the DKIM working

RE: [ietf-dkim] DKIM proposed charter tweak

2005-11-05 Thread Bill.Oxley
A domain is a public IP Class or Address assigned by a registrar to an individual or company. Sending domain is the IP Class or Address that sent the message. Receiving domain is the IP Class or Address that is considering accepting the message. Very straight forward as I can receive a message w

RE: [ietf-dkim] DKIM charter

2005-11-15 Thread Bill.Oxley
The only problem I have with SPF is a possible licensing nightmare wrt Microsoft. Even if deployed I would be looking at a way to get it out of my network. If you look at new installs of SPF it is stalled since Microsoft announced. Building DKIM around SPF is not a good idea although keeping it ope

RE: [ietf-dkim] SSP security relies upon the visual domain appearance

2005-11-17 Thread Bill.Oxley
Doug, If the hash validates to the signing domain and first sender, why is it nescessary that the two domains be the same? thanks, Bill -Original Message- From: [EMAIL PROTECTED] on behalf of Douglas Otis Sent: Thu 11/17/2005 6:43 PM To: Stephen Farrell Cc: IETF-DKIM Subject: Re: [ietf

RE: [ietf-dkim] SSP security relies upon the visual domain appearance

2005-11-18 Thread Bill.Oxley
Add my agreement, policy should be at the discretion of the signer. Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of John Levine Sent: Friday, Novemb

RE: [ietf-dkim] one more comment I forgot...

2006-01-11 Thread Bill.Oxley
If a forwarder "didn't" strip a signature from the message, after decoding the hash and comparing to the information of the forwarding MTA it wouldn't match anyway, would still invoke some rule on the receiving entity would it not? Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharet

RE: [ietf-dkim] DKIM and mailing lists

2006-01-18 Thread Bill.Oxley
What is a mailing list? To me it is a script driven reply to all central repository. Sounds like a resigning requirement but since I neither design nor manage one twill leave it up to the market. thanks, Bill -Original Message- From: [EMAIL PROTECTED] on behalf of Mark Delany Sent: Wed

RE: [ietf-dkim] New Issue: Introduction lacks the introduction of SSP

2006-01-24 Thread Bill.Oxley
> Once the attesting party or parties have been established, the > recipient may evaluate the message in the context of additional > information such as locally-maintained whitelists, shared reputation > services, and/or third-party accreditation. The description of these > mechanisms is outs

RE: [ietf-dkim] draft-ietf-dkim-threats-00 Overlooking a practicalsolution while also recommending a highly unfair solution

2006-01-24 Thread Bill.Oxley
Doug, I would like to say that the only thing that a properly resolved dkim sig suggests is that the message came from the signing domain, no more no less. It allows better resolution of responsibility without any absolute assigning of same. thanks, Bill -Original Message- From: [EMAIL

RE: [ietf-dkim] How mailing lists mutate messages

2006-01-25 Thread Bill.Oxley
Hector > You got to give me solid, logical and deterministic reasons why we > should even bother looking for DKIM signatures - valid or not. right now for inbound messages from yahoo.com I check to see if there is a dkim= string, if so sent off for further processing, if not toss it :-) thanks, B

RE: [ietf-dkim] How mailing lists mutate messages

2006-01-27 Thread Bill.Oxley
Not at all, I am saying that the receiving entity still decides how any anti-spam measure is utilized. The current situation indicates that a valid email from yahoo.com will have an assigned dkim=$string. Many messages that appear to be from yahoo.com, containing spam do not have that string. At t

RE: [ietf-dkim] Attempted summary, SSP again

2006-01-27 Thread Bill.Oxley
" If it has a valid first party signature, it passes. If it doesn't, it doesn't." If the value of the valid signature states that 3rd party signers are not admissible it does impugn the validated first party signature. So should the first party remove 3rd party signatures? Or should the text read

RE: [ietf-dkim] Attempted summary, SSP again

2006-01-28 Thread Bill.Oxley
Hector, > * The domain name owner can decide the importance of edge > cases such as mail that does not pass through the > approved gateways. Ok, but by doing so, he puts a burden on the edge software too. In order words, should we be responsible in maintain the domain security? If a bad acto

RE: [ietf-dkim] New Issue: 4.2 needs new Attack Item: InconsistentSignature vs Policy Attacks

2006-01-31 Thread Bill.Oxley
> Direct attacks would be bad actor attempts to exploit compliant DKIM/SSP > systems. Indirect attacks would be bad actors attempts to exploit > non-compliant DKIM/SSP and rely in "social engineering" exploits. With > indirect attacks, bad actors will not emphasize on protocol correctness. > > Thes

RE: [ietf-dkim] New Issue: 4.2 needs new Attack Item: InconsistentSignature vs Policy Attacks

2006-01-31 Thread Bill.Oxley
The hacker does not need access to my zone, he just attaches a lookalike header yes " And to have *any* rule that allows bypass of defense based upon the receipt of a header from outside your control is extremely dangerous." But folks will do it anyway Bill Oxley Messaging Engineer Cox Communica

RE: [ietf-dkim] New Issue: 4.2 needs new Attack Item: InconsistentSignature vs Policy Attacks

2006-01-31 Thread Bill.Oxley
Sorry, Should have been clearer. Bad guy sends a message purportedly from cox.com with a header DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=cox.com The non dkim compliant mta who hasn't deployed dkim yet or knowing much about it places a rule stating that signed messages should

RE: [ietf-dkim] New Issue: 4.2 needs new Attack Item: InconsistentSignature vs Policy Attacks

2006-01-31 Thread Bill.Oxley
> A dkim compliant mta will do a dip on my dns records and find no ssp or > dk record and drop the message as non compliant. >if the signature succeeds, why do they need to check ssp? I was making an assumption that if it's the first time cox.com has hit that mta they would get the values for bot

RE: [ietf-dkim] Can vendor's really say they have DKIM support yet?

2006-02-01 Thread Bill.Oxley
Without a policy statement DKIM asserts that the sending MTA sent this particular signed message. That is a benefit of itself to clearly identify the sending party. A policy statement that is 1 I sometimes sign 2 I don't care who signs this 3 I always sign and don't want anyone else to sign Is in

RE: [ietf-dkim] Re: New Issue: Threat-00 Limiting the scope of trust

2006-02-03 Thread Bill.Oxley
Doug Stated Exactly. The signing domain marking a message as trustworthy is assuring the recipient the message is not deceptive in _some_ fashion. This assurance would not be based upon some script or email-address, but upon who is allowed to receive their endorsement. Violate the trust, lose the

RE: [ietf-dkim] testing Message Corpus & question for base spec

2006-02-10 Thread Bill.Oxley
I would treat it the same way as a broken ssl certificate, with suspicion. Rather than determining what is acceptable policy we should briefly outline what consists of a valid dkim sig with a brief note that policy is in the eye of the beholder. thanks, Bill -Original Message- From: [E

RE: [ietf-dkim] testing Message Corpus & question for base spec

2006-02-16 Thread Bill.Oxley
"bad signature --> DKIM Failure, local policy will set procedure" thanks Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Eric Allman Sent: Thursday,

RE: [ietf-dkim] Supporting alternate algorithms

2006-02-21 Thread Bill.Oxley
Why is determining the crypto methodology part of this groups efforts? Shouldn't DKIM specs state where in the dns record the signing entity stores what method they are using for crypto. If joe.stonage.com wants to use the original nix crypt command to sign should he not be allowed to do so? Of cou

RE: [ietf-dkim] ABNF: Sender = Originator / Operator

2006-03-10 Thread Bill.Oxley
Hmmm, I would like author: responsible for the message content Originator: MTA that first handles the author's message Operator: Subsequent MTA's handling before final delivery Thanks, Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL

RE: [ietf-dkim] ABNF: Sender = Originator / Operator

2006-03-10 Thread Bill.Oxley
Delineate original responsibility of who wrote the message (Author) from a more responsible party who allowed the author to access the outside world (Originator) vs a diminished responsibility of who passes the message along, (Operator) Bill Oxley Messaging Engineer Cox Communications, Inc. Alp

RE: [ietf-dkim] Concerns about DKIM and mailing lists

2006-03-15 Thread Bill.Oxley
I receive a dkim signed mail from mipassoc.org with a dkim sig that resolves correctly but the domain mtcc.com is in the from address and they purport to sign all mail, the only dkim sig is from mipassoc.org. Since this mail has passed my blacklists I would then process the mail with my suspiciou

RE: [ietf-dkim] New Issue: 512 too short?

2006-03-16 Thread Bill.Oxley
Signers SHOULD NOT use keys less that 1024 bits, receivers MAY accept keys less than 1024. Let the receivers figure it out Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] ___ NOTE WELL: This

RE: [ietf-dkim] ABNF: Sender = Originator / Operator

2006-03-17 Thread Bill.Oxley
If the author creates the subject matter he is responsible whether knowingly or not. thanks Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of SM Sent:

RE: [ietf-dkim] New Issue: Analyzing Failures: List of Possible Reasons

2006-03-17 Thread Bill.Oxley
I don't think that user recipients are going to see dkim anything unless they are used to viewing their headers. A dkim failure is just an identification failure, not a stop delivery notice. All it means is that I cant clearly identify who sent me this. As an ISP I don't want any part of the liabil

RE: [ietf-dkim] New Issue: Analyzing Failures: List of Possible Reasons

2006-03-18 Thread Bill.Oxley
-Original Message- From: Oxley, Bill (CCI-Atlanta) Sent: Fri 3/17/2006 3:39 PM To: 'Hector Santos' Subject: RE: [ietf-dkim] New Issue: Analyzing Failures: List of Possible Reasons Your support idea is sound although I disagree on what DKIM is actually going to do. However those issues

RE: [ietf-dkim] New Issue: Analyzing Failures: List of Possible Reasons

2006-03-20 Thread Bill.Oxley
I don't think presenting dkim information pro-actively to the end user serves any useful purpose. Unlike PGP the user doesn't have an easy way to decode what the header is telling them. In a few specific cases I will reject mail based on a lack of dkim signatures. We do not envision using dkim to b

RE: [ietf-dkim] Splitting the DKIM base doc

2006-03-27 Thread Bill.Oxley
When two or more vendors are arguing in front of a customer whose implementation is at fault is where the customer points at the RFC and states THIS is correct. Any time I have been a customer/referee in an industry dogfight (WLNP wars) simple single documents carefully spelled out work. Multipart

RE: [ietf-dkim] SSP and o= values

2006-03-27 Thread Bill.Oxley
Did you just pass the whitelisting chore to the name servers? thanks, Bill -Original Message- From: [EMAIL PROTECTED] on behalf of Douglas Otis Sent: Mon 3/27/2006 8:03 PM To: Tony Hansen Cc: ietf-dkim@mipassoc.org Subject: Re: [ietf-dkim] SSP and o= values On Mar 27, 2006, at 3:16 PM,

RE: [ietf-dkim] mailing lists and -base

2006-03-28 Thread Bill.Oxley
Is signing the body at all an essential requirement? Yes, some potential risk for a replay attack but otherwise "whoami I sent this" should be sufficient for some providers, Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Me

RE: [ietf-dkim] Proposal for specifying syntax and semantics for multiple signatures

2006-03-31 Thread Bill.Oxley
The only interesting think dkim does is ensure that the message the receiver see's actually was sent by the purported publisher of that internet bitstream. Who has seen it before offers nothing of interest. thanks Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-639

RE: [ietf-dkim] Proposal for specifying syntax and semantics formultiple signatures

2006-04-01 Thread Bill.Oxley
Many folks use edge devices that look/act like an mta but is antispam/av oriented. Dropping a dkim plugin should be no more dificult that deploying a new av engine. thanx, bll -Original Message- From: [EMAIL PROTECTED] on behalf of Michael Thomas Sent: Fri 3/31/2006 6:32 PM To: Mark Del

RE: [ietf-dkim] Proposal for specifying syntax and semanticsformultiple signatures

2006-04-03 Thread Bill.Oxley
We are a rather smallish ISP that handles about 40 mil mail messages a day. I am talking about signing and verifying. DNS rollout should be a matter of updating the proper record with a policy statement (whatever that turns out to be) and a public key. This is similar (except for the DNS part) to

RE: [ietf-dkim] Proposal for specifying syntax andsemanticsformultiple signatures

2006-04-03 Thread Bill.Oxley
The new found unchecked DKIM junk will always be with us. DKIM base is not about determining acceptance policy, its about identification of where the mail was handled last. SSP is an authentication methodology, not part of the base. Thanks, Bill Oxley Messaging Engineer Cox Communications, Inc.

RE: [ietf-dkim] Alternative text for semantics of multiple signatures

2006-04-04 Thread Bill.Oxley
I like this version Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Michael Thomas Sent: Tuesday, April 04, 2006 4:09 PM To: Paul Hoffman Cc: ietf-dk

RE: [ietf-dkim] Alternative text for semantics of multiple signatures

2006-04-05 Thread Bill.Oxley
Yes, the case indicates importance, much like bold/italic or underline, not meaning Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Arvel Hathcock S

RE: [ietf-dkim] Proposal: get rid of x=

2006-04-07 Thread Bill.Oxley
I would put the date of my next key change in there if I was going to put anything. Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] ___ NOTE WELL: This list operates according to http://mipass

RE: [ietf-dkim] Proposal: get rid of x=

2006-04-08 Thread Bill.Oxley
-Original Message- From: [EMAIL PROTECTED] on behalf of Douglas Otis Sent: Fri 4/7/2006 7:56 PM To: Stephen Farrell Cc: ietf-dkim@mipassoc.org Subject: Re: [ietf-dkim] Proposal: get rid of x= On Apr 7, 2006, at 1:53 PM, Stephen Farrell wrote: > So a signature expiry failure doesn't m

RE: [ietf-dkim] Proposal: get rid of x=

2006-04-10 Thread Bill.Oxley
Why would one care at all about when a sig was signed? A sig will either pass muster or fail, if passed t=$date < curr_date raises a question of expiration for the verifier. Obtaining the actual timestamp of when the message was actually signed doesn't have much value for me. Bill Oxley Messagin

RE: [ietf-dkim] Straw poll on x=

2006-04-11 Thread Bill.Oxley
Keep x, Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Jonathan Clark Sent: Tuesday, April 11, 2006 11:04 AM To: ietf-dkim Subject: [ietf-dkim] St

RE: [ietf-dkim] Proposed fingerprint tag description

2006-04-12 Thread Bill.Oxley
Lets not get into cellular mapping id's (SID) -Original Message- From: [EMAIL PROTECTED] on behalf of Jim Fenton Sent: Wed 4/12/2006 8:00 PM To: Murray S. Kucherawy Cc: ietf-dkim@mipassoc.org Subject: Re: [ietf-dkim] Proposed fingerprint tag description Murray S. Kucherawy wrote: > wil

RE: [ietf-dkim] New issue: Signing by parent domains

2006-04-13 Thread Bill.Oxley
As an ISP we route customer mail thru our mta's, we have business customers that may use their own mta's. If a customer determines that entity at foo.com wishes to use use bar.com's mta are you saying that bar.com should not sign on foo.com's behalf? Will that no present a problem with the recep

RE: [ietf-dkim] New issue: Signing by parent domains

2006-04-13 Thread Bill.Oxley
Jim, So if they use our mta's The signatures would in fact be from cox.com as I don't believe there is a method to have us sign as foo.com as the reverse lookup for foo.com wouldn't match where the mail is coming from, unless I am missing a lot here. Please explain, Thanks, Bill Oxley Messaging E

RE: [ietf-dkim] x= lets senders expire responsibility

2006-04-14 Thread Bill.Oxley
I suspect in the real sysadmin world changing keys every week probably isn't going to happen :-) Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Hec

RE: [ietf-dkim] x= lets senders expire responsibility

2006-04-14 Thread Bill.Oxley
Mike said * For larger business and maybe ISP's even, our anecdotal experience at Cisco is that our messaging and DNS folks don't have mich to do with one another (changing mx records is not a ordinary event). Thus to achieve key rollover, you'd need to create linkages between the gr

RE: [ietf-dkim] Proposal: Do the semantics first, then straw poll

2006-04-17 Thread Bill.Oxley
Responsibility is perhaps the wrong term. If a message is received past the x=date it is stale and out of RFC impact. The sender is no more responsible than sending a dkim sig without a public key, the message becomes out of scope of the RFC and goes back to the verifying entity for a policy decisi

RE: [ietf-dkim] 2.1 Signers // Within an administrative domain?

2006-04-18 Thread Bill.Oxley
If a MUA is the signer I would hope it is within its own administrative domain. I haven't seen one yet that was outside of its own domain. Thanks, Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PR

RE: [ietf-dkim] Straw poll on x=

2006-04-18 Thread Bill.Oxley
Current x= Signature Expiration (plain-text; RECOMMENDED, default is no expiration). The format is the same as in the "t=" tag, represented as an absolute date, not as a time delta from the signing timestamp. Signatures MUST NOT be considered valid if the current tim

RE: [ietf-dkim] Attempted text for x= with DSN considerations

2006-04-19 Thread Bill.Oxley
Why would a verifyer refuse a message that had a value for x=? "Verifiers MAY support checking of x= values or may refuse to accept messages with the x= tag." thanks, Bill -Original Message- From: [EMAIL PROTECTED] on behalf of Douglas Otis Sent: Wed 4/19/2006 6:01 PM To: Stephen

RE: [ietf-dkim] Attempted text for x=

2006-04-19 Thread Bill.Oxley
What he said :-) Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Hector Santos Sent: Thursday, April 20, 2006 2:07 AM To: Stephen Farrell Cc: ietf-d

RE: [ietf-dkim] dkim-base-01: 6.2 - DNS error

2006-04-22 Thread Bill.Oxley
* 2. If the query for the public key fails to respond, the verifier *SHOULD defer acceptance of this email. Verifiers SHOULD track * continuous errors and SHOULD eventually accept the message *object after a number of tries. If the query for the public key fails to respo

RE: [ietf-dkim] When i= domain != d= domain

2006-04-30 Thread Bill.Oxley
In all cases we should be defining status of an event rather than conclusions about potential remedies -Original Message- From: [EMAIL PROTECTED] on behalf of Eric Allman Sent: Fri 4/28/2006 4:10 PM To: [EMAIL PROTECTED] Cc: ietf-dkim@mipassoc.org Subject: Re: [ietf-dkim] When i= domain

RE: [ietf-dkim] Mandatory v= (summary from jabber session)

2006-05-18 Thread Bill.Oxley
v=0.2 v=1 and how about v=t for experimental? Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Eric Allman Sent: Thursday, May 18, 2006 2:02 PM To: I

RE: [ietf-dkim] draft-ietf-dkim-base-02 submitted

2006-05-23 Thread Bill.Oxley
Appendix, Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Eric Allman Sent: Tuesday, May 23, 2006 2:03 PM To: Hector Santos Cc: IETF DKIM WG Subject:

RE: [ietf-dkim] draft-ietf-dkim-base-02 //i= parameter

2006-05-31 Thread Bill.Oxley
Current statement 5.1 is fine, your changes introducing a -i requirement bypasses the main thrust of DKIM. I signed this message/I did not sign this message. Thanks, Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message---

RE: [ietf-dkim] draft-ietf-dkim-base-02 // Parent signing securityconsiderations

2006-06-01 Thread Bill.Oxley
Doug, Just so that I can understand clearly, TLD offers signing ability to those who don't want to develop or buy their own. So bar.com offers to sign for [EMAIL PROTECTED] However by bringing cetificated messages frm [EMAIL PROTECTED] you are assigning a reputation to that signature that DKIM p

RE: [ietf-dkim] draft-ietf-dkim-base-02 // Parent signing securityconsiderations

2006-06-01 Thread Bill.Oxley
Doug, Thanks for the clarification, so an assertion for subdomains that can "opt out" of parent signing systems so that [EMAIL PROTECTED] is authenticated with sig and [EMAIL PROTECTED] is not? Thanks, Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PR

RE: [ietf-dkim] Issue 1287: K... Otis, signature removal

2006-06-05 Thread Bill.Oxley
Well I hate to insist that signers SHOULD do anything but doesn't the issue of multiple signatures belong in a mail list addendum rather than base? If I am forwarding should I want to forward an unverifiable signature over my verifiable one, how would that impact my reputation? Bill Oxley Messag

RE: [ietf-dkim] base-02 // worst-case scenario/duration of exploit/useof deprecated

2006-06-08 Thread Bill.Oxley
Doug, You are dictating what a sender and verifier must do. If I have a faulty algorithm and change my keys to reflect the new ones I may not be interesting in signing with what I consider a depreciated key. I signed my mail, published a key and sent my mail. A receiver who gets old mail that does

RE: [ietf-dkim] Underscore considerations

2006-06-09 Thread Bill.Oxley
Just want to clarify You want to ensure that wildcards and i,g tags can delimit subdomains, is that correct? Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Be

RE: [ietf-dkim] Underscore considerations

2006-06-10 Thread Bill.Oxley
At this point I tend to support Doug's position that we "allow" wildcard entries on both sides of the "@" to delimit abuse. hanks, Bill -Original Message- From: [EMAIL PROTECTED] on behalf of Douglas Otis Sent: Fri 6/9/2006 4:27 PM To: Stephen Farrell Cc: ietf-dkim@mipassoc.org Subject:

RE: [ietf-dkim] Comments on -overview document?

2006-07-09 Thread Bill.Oxley
Dave, if you are speaking to the http://mipassoc.org/dkim/info/DKIM-Intro-Allman.html it looks good except the piece at the bottom of page 6 :::Not an anti-spam technology by itself should be amplified :::Not an anti-spam technology by itself but a methodolgy to clearly identify a responsibl

RE: [ietf-dkim] Comments on -overview document?

2006-07-10 Thread Bill.Oxley
Dave, This document fine except for the following section "Usually, email is i/o-intensive, with unused computational capacity. So, it is likely that no new hardware will be required." This should be deleted. For example if others in my organization who have not followed the mailing list we

RE: [ietf-dkim] Comments on -overview document?

2006-07-10 Thread Bill.Oxley
(forgot to hit reply to all) Eliot, I think we should treat the issue by stating that in the mixed environments currently being tested a 10 to 15% cpu usage has been noted. This will allow the SA types to adequately engineer a DKIM solution based on their layout. When you think of all the edge proc

RE: [ietf-dkim] review of draft-ietf-dkim-overview-01

2006-07-12 Thread Bill.Oxley
Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] Number 1 below is partially true. I can send mail that appears to be from someone else that cannot be tracked back to the actual originating IP but appears to be from elsewhere, this is what

RE: [ietf-dkim] Issue: which headers should we REQUIRE to be signed?

2006-07-13 Thread Bill.Oxley
With no headers at all being signed, a signature should still be either valid or invalid and therefore still useful. Don't NEED headers for base. Thanks, Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [E

RE: [ietf-dkim] Issue: which headers should we REQUIRE to be signed?

2006-07-13 Thread Bill.Oxley
Good? Probably not, useful, not really but that is a policy thingee. Thanks, Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Tony Hansen Sent: Thurs

RE: [ietf-dkim] 822/2822 or just 2822

2006-07-24 Thread Bill.Oxley
On the face of this it looks like a third party is molesting the message after signing but before delivery. If the third party does not currently do DKIM then the signature will result in failure. If the third party is DKIM aware then it could verify the signature, make needed changes then re-sign

RE: [ietf-dkim] The URL to my paper describing the DKIM policy options

2006-07-26 Thread Bill.Oxley
Scott, I think that each domain would have a public key and the aggregator MTA that is shared would sign on behalf of that domain Jobob.com uses mx.isp.com to send mail jobob.com would have a dns record containing public key information mx.isp.com would sign using jobob.com keys. Now conversely

RE: [ietf-dkim] domain (reputation) semantics: selectors vs. sub-domains

2006-07-26 Thread Bill.Oxley
My understanding as well that subdomains should be a separator, not the selector function Thanks, Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Da

RE: [ietf-dkim] requirements

2006-07-26 Thread Bill.Oxley
Scott, I don't know if you have looked at Hector Santos policy document, he does a very good job of assigning values and tags that define needed policies. http://isdg.net/public/ietf/drafts/draft-santos-dkim-dsap-00.html http://isdg.net/public/ietf/drafts/draft-santos-dkim-dsap-00.txt we should a

RE: [ietf-dkim] The URL to my paper describing the DKIM policy options

2006-07-27 Thread Bill.Oxley
My requirements I sign all I sign nothing I sign only 3rd party I sign all and 3rd party I sign some mail My Policy/Practice I sign all - every piece of mail purported to be from me must be signed I sign nothing - If mail arrives with a DKIM sig I didn't send it I sign only 3rd party - I only

RE: [ietf-dkim] The URL to my paper describing the DKIM policy options

2006-07-27 Thread Bill.Oxley
As an example, an ISP that has 10k business customers who potentially will want signed mail a Commercial.isp.com signing domain would assert I only sign 3rd party Using current software I would only sign customers that have been pre-approved. If those customers SPAM for whatever reason, neglect or

RE: [ietf-dkim] The URL to my paper describing the DKIM policy options

2006-07-27 Thread Bill.Oxley
Scott, Perhaps an easier way, instead of you having to manage a DNS policy record, you offload that to your provider Policy.DKIM.foo.bar.com is a alias to dkim.provider.com who states the policy you request. When changing outbound email providers the new provider aliases policy.foo.bar.com to new.d

[ietf-dkim] 3rd party signing

2006-07-28 Thread Bill.Oxley
A recipient will then have a valid party to complain to which is better than blocking a domain that has been spoofed. Thanks, Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: John Levine [mailto:[EMAIL PROTE

RE: [ietf-dkim] Requirements on where/how SSP stuff is published...

2006-07-28 Thread Bill.Oxley
According to my DNS admin "Why are you putting all that crap in DNS? The MTA can do that!! Or use a web page!" Just passing along a reaction I got. Thanks, Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From:

[ietf-dkim] RE: 3rd party signing

2006-07-28 Thread Bill.Oxley
"Scenario B is technically possible but makes no sense. If you have the ability to sign mail, why wouldn't you sign your own?" because this is a special purpose domain simply to manage 3rd party signage, the domain itself will not send any mail. Saying I only sign 3rd party would allow people to

RE: DKIM TTPs (was Re: [ietf-dkim] editorials and nits)

2006-07-30 Thread Bill.Oxley
The query mechanism could certainly point to an alternate retrieval mechanism such as http for long policy statements. Thanks, Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EM

RE: [ietf-dkim] Re: 3rd party signing

2006-07-31 Thread Bill.Oxley
You believe both and apply a receiver policy determined by yourself that will handle a message with an anomaly, Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On

RE: [ietf-dkim] Are verifiers expected to query SSP on a successfulverify?

2006-07-31 Thread Bill.Oxley
How about checking SSP first to see if they sign at all :-)? Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Mark Delany Sent: Monday, July 31, 200

RE: [ietf-dkim] Are verifiers expected to query SSP on asuccessfulverify?

2006-07-31 Thread Bill.Oxley
Can you taken a look at the DSAP proposal or the link Hector provided with the SSP verification Interface Diagram? It does appear to flow this question thanks Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message-

RE: [ietf-dkim] A few SSP axioms

2006-07-31 Thread Bill.Oxley
As long as we all remember that bad actors can get a domain, populate dkim keys and ssp then send spam until they are noticed and shutdown. Policy will be by the receiver that a message that fails dkim/ssp is flagged for a closer examination than a message that passes both dkim and ssp but all mai

RE: [ietf-dkim] A few SSP axioms

2006-07-31 Thread Bill.Oxley
I am not going to recommend whitelisting ANY domain unless I own it. Thanks, Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: John L [mailto:[EMAIL PROTECTED] Sent: Monday, July 31, 2006 10:15 PM To: Oxley

RE: [ietf-dkim] A few SSP axioms

2006-08-01 Thread Bill.Oxley
Perhaps his provider signs all outgoing mail regardless without having to parse a list of who signs their own mail locally. Daemon is also right, spam from bots inside his ISP space will be sending mail that is signed by the provider until they are stopped by the abuse department. Thanks, Bill Oxl

RE: [ietf-dkim] New Requirements: SSP must offer Highest ProtectionPossible

2006-08-01 Thread Bill.Oxley
Benefit, Assertion by the signer to affect the policy of the receiver. Agreed accidental DOS possibility by a (un)helpful relayer. Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailt

RE: [ietf-dkim] A few SSP axioms

2006-08-01 Thread Bill.Oxley
All, As an ISP there are 2 things I will require to implement SSP or another DKIM policy methodology A. I only sign 3rd party B. I sign exclusively any other sigs make mine broken There can be other policies but I require those two and am wondering why there seems to be a tremendous pus

RE: [ietf-dkim] A few SSP axioms

2006-08-01 Thread Bill.Oxley
If I understand this right, a local domain that relays thru my 3rd party MTA may have its own signing policy. I then sign as 3rd party, an ssp lookup on example.com sees the third party only policy and also a foo.example.com shows a relaxed signing policy. Both sigs decrypt as valid. That is a good

RE: [ietf-dkim] A more fundamental SSP axiom

2006-08-02 Thread Bill.Oxley
Dave, As a receiver I would like to know who sent the message, who signed the message and any further information that might allow me to assign a spam score accurately for further edge processing. Thanks, Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL

RE: [ietf-dkim] A more fundamental SSP axiom

2006-08-02 Thread Bill.Oxley
All, Maybe I am confused on how email works. Sending, A. I want to send a message. My MTA looks up the MX record of the receiving party and initiates a bind and a conversation on port 25 with the receiver's MTA. As part of that conversation headers are exchanged one of which is DKIM. I then pass th

RE: [ietf-dkim] SSP thought experiment

2006-08-04 Thread Bill.Oxley
One would assume that an additional signing algorithm has been introduced and not using the TOM SWIFTY algorithm I would refer to base and treat your message as unsigned. thanks, -Original Message- From: [EMAIL PROTECTED] on behalf of John L Sent: Fri 8/4/2006 2:05 PM To: DKIM List Subj

RE: [ietf-dkim] A more fundamental SSP axiom

2006-08-04 Thread Bill.Oxley
> Actually I have a business plan where people pay me to make the reports on their behalf. > > Making reports could improve your reputation. > That's a fine idea, use the extortion plan of some blacklisters for whitelisters. Several of these plans are in the market. I get howled at all the time bec

RE: [ietf-dkim] A more fundamental SSP axiom

2006-08-04 Thread Bill.Oxley
Not before Doug defines client a little more clearly :-) Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Damon Sent: Friday, August 04, 2006 10:01 P

RE: [ietf-dkim] "I sign everything" is not a useful policy

2006-08-04 Thread Bill.Oxley
+1 Bill Oxley Messaging Engineer Cox Communications, Inc. Alpharetta GA 404-847-6397 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Mark Delany Sent: Friday, August 04, 2006 10:58 PM To: ietf-dkim@mipassoc.org Subject: Re: [ietf-

  1   2   3   >