Re: [ietf-dkim] Final update to 4871bis for working group review

2011-07-12 Thread Charles Lindsey
On Mon, 11 Jul 2011 14:56:26 +0100, Murray S. Kucherawy wrote: >> -Original Message- >> From: ietf-dkim-boun...@mipassoc.org >> [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Charles Lindsey >> Sent: Monday, July 11, 2011 3:52 AM >> > "Age

Re: [ietf-dkim] Final update to 4871bis for working group review

2011-07-11 Thread Charles Lindsey
On Mon, 11 Jul 2011 05:53:58 +0100, Murray S. Kucherawy wrote: > Actually, let me revise that a bit: > > "Agents that evaluate or apply DKIM output need to be aware that a DKIM > signer can sign messages that are malformed (e.g., violate RFC5322), or > become malformed in transit, or contai

Re: [ietf-dkim] Final update to 4871bis for working group review

2011-07-10 Thread Charles Lindsey
On Fri, 08 Jul 2011 18:51:39 +0100, Pete Resnick wrote: > I want to try to be precise, which I don't think Charles is being with > his below two sets of "facts". Let me try to clarify: > > On 7/8/11 5:52 AM, Charles Lindsey wrote: >> 1. The fact that DKI

Re: [ietf-dkim] Final update to 4871bis for working group review

2011-07-08 Thread Charles Lindsey
On Fri, 08 Jul 2011 14:54:43 +0100, Murray S. Kucherawy wrote: >> -Original Message- >> [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Charles Lindsey >> Sent: Friday, July 08, 2011 3:52 AM >> 1. The fact that DKIM choose headers to sign from the

Re: [ietf-dkim] Final update to 4871bis for working group review

2011-07-08 Thread Charles Lindsey
On Fri, 08 Jul 2011 13:05:49 +0100, McDowell, Brett wrote: > John, this particular part of the discussion is not about changing the > RFC or DKIM implementations, only changing deployment configuration > practices. Exactly so. All I am trying to do is to ensure that those who engage in d

Re: [ietf-dkim] Final update to 4871bis for working group review

2011-07-08 Thread Charles Lindsey
On Thu, 07 Jul 2011 22:06:29 +0100, Murray S. Kucherawy wrote: > My favourite counterexample, which I've used many times already, is > Mailman. It doesn't even check DKIM signatures, but you can still fake > your way through its authorization process such that a different From: > is sho

Re: [ietf-dkim] Final update to 4871bis for working group review

2011-07-08 Thread Charles Lindsey
On Thu, 07 Jul 2011 18:09:14 +0100, Pete Resnick wrote: > I am perfectly happy with Murray's original (and now, revised) text. > (Nits still being discussed are entirely up to the WG.) I am not happy > with Charles's text. Particularly: > > On 7/7/11 5:08

Re: [ietf-dkim] Final update to 4871bis for working group review

2011-07-07 Thread Charles Lindsey
On Thu, 07 Jul 2011 15:28:09 +0100, Barry Leiba wrote: >> The signer most certainly CAN attack, but what he is attacking is not >> DKIM; rather it is the recipient, or Ebay, or lenient MTAs. DKIM is, in >> fact, his weapon of attack. > > Right, but the point is that, with DKIM (as Murray says,

Re: [ietf-dkim] Final update to 4871bis for working group review

2011-07-07 Thread Charles Lindsey
On Wed, 06 Jul 2011 17:31:47 +0100, Barry Leiba wrote: > I actually like Charles's edits except for one paragraph, and, as a > participant, would be happy to change 8.15 accordingly. The one > problem paragraph is this one: > > On Wed, Jul 6, 2011 at 7:17 AM, Charle

Re: [ietf-dkim] Final update to 4871bis for working group review

2011-07-07 Thread Charles Lindsey
On Wed, 06 Jul 2011 21:51:49 +0100, Hector Santos wrote: > My only comment is that we are making way too much out of this. > > DKIM requires a From: hashing a minimum requirement and since RFC5322 > only one there are two basic fundamentals rules, together called the > One From DKIM Rule: > > One

Re: [ietf-dkim] Final update to 4871bis for working group review

2011-07-06 Thread Charles Lindsey
On Sun, 03 Jul 2011 04:26:49 +0100, Barry Leiba wrote: > Because of the extent of the changes, though, the chair (I) thinks it > needs to come back to the working group for another review. So the > working group is now asked to look over the diffs, noting that in a > few cases blocks of text w

Re: [ietf-dkim] Pete's review of 4871bis

2011-06-30 Thread Charles Lindsey
On Wed, 29 Jun 2011 18:31:04 +0100, Murray S. Kucherawy wrote: >> -Original Message- >> From: ietf-dkim-boun...@mipassoc.org >> [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Charles Lindsey >> Sent: Wednesday, June 29, 2011 9:20 AM >> To: D

Re: [ietf-dkim] Pete's review of 4871bis

2011-06-30 Thread Charles Lindsey
On Wed, 29 Jun 2011 19:49:27 +0100, Pete Resnick wrote: > On 6/29/11 11:20 AM, Charles Lindsey wrote: >> A phisher obtains a throwaway domain and creates a public/private key >> pair >> for >> it. He then sends messages of the following form: >> >

Re: [ietf-dkim] Pete's review of 4871bis

2011-06-29 Thread Charles Lindsey
On Wed, 29 Jun 2011 05:46:06 +0100, Pete Resnick wrote: > 32. Section 8.14: This is a complete mischaracterization of the problem. > This is absolutely not an attack vector. If a signer wishes to prevent > additional *known* header fields from being verified, it can simply use > the technique o

Re: [ietf-dkim] spam filtering 101, was DKIM expert group meeting for Dutch 'comply or explain' list

2011-06-27 Thread Charles Lindsey
On Fri, 24 Jun 2011 17:58:19 +0100, Dave CROCKER wrote: > Let's simplify this discussion: > > Spammers do a variety of techniques to trick filters and users. > > We should have the DKIM signing specification normatively require > checking > for every known technique, since we cannot be

Re: [ietf-dkim] Last Call: (DomainKeys Identified Mail (DKIM) Signatures) to Draft Standard

2011-06-27 Thread Charles Lindsey
On Fri, 24 Jun 2011 22:43:27 +0100, Steve Atkins wrote: > Your current argument is of the form: > > Doug: X is bad, and could theoretically lead to end-user confusion > in one particular obscure replay scenario, given a carefully chosen set > of assumptions about MUA user interface desi

Re: [ietf-dkim] DKIM expert group meeting for Dutch 'comply or explain' list

2011-06-24 Thread Charles Lindsey
On Fri, 24 Jun 2011 05:55:38 +0100, John R. Levine wrote: >> Assuming this is some other protocol layers problem; to ensure >> consistency >> between any possible display and DKIM validation, ... > > ... is, for about the hundredth time, not DKIM's job. > > Please chant "we have no idea how M

Re: [ietf-dkim] New canonicalizations

2011-05-30 Thread Charles Lindsey
On Sat, 28 May 2011 17:29:23 +0100, Alessandro Vesely wrote: > IMHO, the "hard parts" of the code are (i) selecting a MIME parser, > and (ii) finding a good way to structure experimental C14Ns and handle > double (triple?) signatures in the existing code. For a Mime Parser, see http://www.cs.m

Re: [ietf-dkim] New canonicalizations

2011-05-26 Thread Charles Lindsey
On Wed, 25 May 2011 01:33:00 +0100, Dave CROCKER wrote: > To make a canonicalization algorithm that is more robust -- such as > having it > based on canonical forms of data, independent of encoding -- makes some > sense. > Trying to create the ability to "reverse" changes strikes me as far to

Re: [ietf-dkim] New canonicalizations

2011-05-23 Thread Charles Lindsey
On Mon, 23 May 2011 03:50:06 +0100, Hector Santos wrote: > Case in point. Right now, I am looking at a gmail.com which I am > pretty sure was not in Base64 MIME. However, it was submitted to IETF > DISCUSS group and its showing up as base64 MIME. I don't know if the > list did it one of the hop

Re: [ietf-dkim] Issue: Consider deprecating "l="

2011-05-10 Thread Charles Lindsey
On Tue, 10 May 2011 00:02:36 +0100, Barry Leiba wrote: > That was quick. I believe we already have enough objections to say > that we do NOT have rough consensus for deprecating l= at this time. > I'll close the issue in the tracker (issue #26), and we will leave it > as it is. > > Of course,

Re: [ietf-dkim] Output requirements

2011-05-09 Thread Charles Lindsey
On Sat, 07 May 2011 13:50:41 +0100, Alessandro Vesely wrote: > On 06/May/11 20:37, Murray S. Kucherawy wrote: >Verifiers SHOULD ignore those signatures that produce a PERMFAIL >result (see Section 7.1), acting as though they were not present >in the message. ... >>

[ietf-dkim] Duplicated jeaders - A common proposed change

2011-05-07 Thread Charles Lindsey
Issued in behalf of myself, Doug Otis and Rolf Sonneveld We were asked by Barry to provide an agreed text to resolve the "multiple header" problem, for consideration by the WG. The attack arises when some header (typically From:) which is supposed to appear once in fact appears twice. DKIM is RE

Re: [ietf-dkim] Protocol layering / Software vs. Protocol

2011-05-06 Thread Charles Lindsey
On Thu, 05 May 2011 21:24:00 +0100, Barry Leiba wrote: > Doug says... >> This can *only* be achieved by some mandatory test within the Verifier. > > Not at all; that's exactly Dave's point in discussing the difference > between the protocol and the software system that wraps around it. > The Ve

Re: [ietf-dkim] Output summary - proposing ODID "Originating Domain Identity"

2011-05-02 Thread Charles Lindsey
On Sun, 01 May 2011 05:10:06 +0100, Hector Santos wrote: > So perhaps to help shut down this ambiguity we should add a DKIM > terminology to clearly separate it from AUID. > >3.x Originating Domain Identity (ODID) > >The ODID is the domain part of the From: address. This identity >M

Re: [ietf-dkim] Output requirements

2011-05-02 Thread Charles Lindsey
On Fri, 29 Apr 2011 18:39:03 +0100, Murray S. Kucherawy wrote: > Right before Section 6: > + Verifiers SHOULD ignore those signatures that produce a PERMFAIL > + result (see Section 7.1), acting as though they were not present in > + the message. ... s/Verifiers SHOULD ignore/Identity

Re: [ietf-dkim] Output summary

2011-04-29 Thread Charles Lindsey
On Thu, 28 Apr 2011 18:52:19 +0100, John R. Levine wrote: > Last paragraph of sec 5.2: " Verifiers SHOULD ignore failed signatures as > though they were not present in the message." Actually, that does not seem quite right. It is assessors who should do that. Verifiers are explicitly asked to

Re: [ietf-dkim] Output summary

2011-04-29 Thread Charles Lindsey
On Thu, 28 Apr 2011 20:00:33 +0100, Rolf E. Sonneveld wrote: > On 4/28/11 7:38 PM, Murray S. Kucherawy wrote: >> Thus it is with DKIM. DKIM sits on top of RFC5322 and related message >> format specs, which in turn sit on top of SMTP, which sits on top of >> TCP, which sits on top of IP, w

Re: [ietf-dkim] draft-ietf-dkim-rfc4871bis-07 // Attacks Involving Additional Header Fields

2011-04-27 Thread Charles Lindsey
On Tue, 26 Apr 2011 05:29:35 +0100, Dave CROCKER wrote: >> DKIM doesn't create any binding between the RFC5322.From domain and the >> "d=" >> value as you're doing. What you're talking about here falls into the >> realm >> of ADSP or other policy-like assertions, not DKIM itself which is the

Re: [ietf-dkim] draft-ietf-dkim-rfc4871bis-07 // Attacks Involving Additional Header Fields

2011-04-27 Thread Charles Lindsey
On Tue, 26 Apr 2011 02:33:11 +0100, Douglas Otis wrote: > Although DKIM is reviewed within IETF's security area, input validation > by DKIM remains dangerously neglected. DKIM's Introduction indicates it > can be implemented independent of clients. As such, few assumptions are > safe in how u

Re: [ietf-dkim] Taking responsibility for a message

2011-04-27 Thread Charles Lindsey
On Tue, 26 Apr 2011 13:22:15 +0100, Alessandro Vesely wrote: > I guess Message-ID is among those "structural, not semantic" fields. > I concur. However, we miss a field that says an MTA is _knowingly_ > breaking whatever signatures may be present. The Message-ID gets copied into the Reference

Re: [ietf-dkim] #4: non-ascii header text

2011-04-25 Thread Charles Lindsey
On Thu, 21 Apr 2011 18:46:07 +0100, Barry Leiba wrote: >>> I asked my IDNA expert, who said that the definitive answer is "it >>> depends".  He suggests our chair ask our AD to check with the IESG. >> >> Our chair is asking our AD to check. > > We have the IESG's answer: we should change the re

Re: [ietf-dkim] Issue: Repeated headers

2011-04-25 Thread Charles Lindsey
On Tue, 19 Apr 2011 22:37:59 +0100, Murray S. Kucherawy wrote: >> -Original Message- >> From: ietf-dkim-boun...@mipassoc.org >> [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Charles Lindsey >> Sent: Tuesday, April 19, 2011 12:56 PM >> To: DKIM

Re: [ietf-dkim] Issue: Repeated headers

2011-04-25 Thread Charles Lindsey
On Wed, 20 Apr 2011 23:15:52 +0100, Barry Leiba wrote: >> Yes indeed. We discussed lots of wording for all of this, and the one >> that >> has got into the document is about the worst. > > Your objection is noted. > >> Note that I have escalated this to as Issue. DKIM is broken if we do not >

Re: [ietf-dkim] ISSUE: non-ascii header text

2011-04-20 Thread Charles Lindsey
On Wed, 20 Apr 2011 09:24:26 +0100, Hector Santos wrote: > Murray S. Kucherawy wrote: > >>> Oops, this is a separate issue. But I hope it's also not >>> contentious. >>> [...] >> >> Since I'm not exactly an EAI/IDNA expert... >> >>> The only thing that's not obvious to me is whether the hash fun

Re: [ietf-dkim] I-D Action:draft-ietf-dkim-rfc4871bis-06.txt // Input requirements

2011-04-19 Thread Charles Lindsey
On Sun, 17 Apr 2011 16:23:31 +0100, Barry Leiba wrote: >> additional discussion and references.  In addition, verifiers MUST >> ensure the presence of multiple singleton originating header fields >> do not provide a valid signature result. >> --- >> >> Not including this additional requirement

[ietf-dkim] Issue: Repeated headers

2011-04-19 Thread Charles Lindsey
On Sat, 16 Apr 2011 01:05:02 +0100, Douglas Otis wrote: > http://tools.ietf.org/html/draft-ietf-dkim-rfc4871bis-06#section-3.8 > ,--- > DKIM's design is predicated on valid input. Therefore, signers and > verifiers SHOULD take reasonable steps to ensure that the messages > they are processing a

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-13 Thread Charles Lindsey
On Mon, 11 Apr 2011 16:53:34 +0100, John R. Levine wrote: >> 3. From = al...@example.com i=mal...@example.com d=example.com. > >> 3a. From = supp...@example.com i=al...@example.com d=example.com > > How in the world in an automaton supposed to guess that 3. is bogus and > 3a. is not? It isn't s

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-13 Thread Charles Lindsey
On Mon, 11 Apr 2011 18:45:22 +0100, Douglas Otis wrote: > > Review the charter exclusions. There can be no deeper meaning defined > for the i= field. But undoubtedly individuals are going to use the field in ways that they find useful to their purpose (with knowledge of their own situations

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-11 Thread Charles Lindsey
On Fri, 08 Apr 2011 19:55:09 +0100, Franck Martin wrote: > On 4/8/11 23:38 , "Charles Lindsey" wrote: >> In practice, there are three usages which seem to be common; are there >> others? >> >> 1. FROM = Alice@whatever i=sales.example.com d=example.com &g

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-08 Thread Charles Lindsey
On Thu, 07 Apr 2011 16:44:56 +0100, Steve Atkins wrote: > On Apr 7, 2011, at 5:13 AM, Charles Lindsey wrote: >> E.g. DKIM-Signature: v=1; d=corp.example.com; ; >> tx="birthdate=1970-02-24" >> >> or DKIM-Signature: v=1; d=corp.exam

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-07 Thread Charles Lindsey
On Wed, 06 Apr 2011 17:29:49 +0100, Steve Atkins wrote: > As a concrete example, if I wanted to include the authenticated > age of each email sender (something the gambling industry might > be interested in) then I can do that within the DKIM signature: > > DKIM-Signature: v=1; d=corp.example.c

Re: [ietf-dkim] Extensions (was RE: Proposal: Removal of AUID (i= tag/value))

2011-04-07 Thread Charles Lindsey
On Wed, 06 Apr 2011 21:18:11 +0100, Steve Atkins wrote: > The only safe way to add proprietary gunk into the dkim-signature > header is to add it to the IANA DKIM-Signature tag registry > (how does that happen? Presumably it requires an RFC?) Do we currently have such an IANA DKIM-Signature ta

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-06 Thread Charles Lindsey
On Mon, 04 Apr 2011 21:24:29 +0100, Murray S. Kucherawy wrote: Not quite. For example if an st= tag is in the header and the signature verifies, then you know that tag was put there (or at least was present) when the signature was made, and was not inserted by some scammer-in-the-middle.

Re: [ietf-dkim] Proposal: Removal of AUID (i= tag/value)

2011-04-06 Thread Charles Lindsey
On Tue, 05 Apr 2011 11:33:10 +0100, Rolf E. Sonneveld wrote: > Ad 2. To give some examples of use profiles: > > * of course, the first thing that comes to mind is to use DKIM as > mechanism to build reputation services on. For this use profile > not many restrictions will be re

[ietf-dkim] DKIM software needed

2011-03-03 Thread Charles Lindsey
Having just had a deluge of bogus messages from Twitter, all allegedly DKIM-signed, I think I need a working DKIM checker (my ISP has not implemented DKIM ckecking so far). I have not the time to write my own, so can someone please point me to an implementation that could be deployed as a pr

Re: [ietf-dkim] draft-ietf-dkim-rfc4871bis-03 submitted

2011-02-28 Thread Charles Lindsey
On Sat, 26 Feb 2011 15:27:03 -, John Levine wrote: >> Therefore, a verifier SHOULD NOT validate a message that is not >> compliant with [RFC5322, RFC2045 and RFC2047] specifications. >> >> IMHO, it is somewhat vague. That SHOULD-NOT could be "promoted" to a >> MUST-NOT for a finite numbe

Re: [ietf-dkim] Re-thinking the organization of the DKIM spec

2011-01-17 Thread Charles Lindsey
On Sat, 15 Jan 2011 17:17:01 -, Scott Kitterman wrote: > On Thursday, January 13, 2011 02:48:14 pm Barry Leiba wrote: >> ... And at some point between now and then, please make it clear >> where you stand on the question, so we can fairly judge consensus. > > > -1 on splitting now. Yes, I

Re: [ietf-dkim] Proposed documentation split between DKIM and "DOSETA"

2011-01-14 Thread Charles Lindsey
On Thu, 13 Jan 2011 12:50:45 -, Eliot Lear wrote: > While perhaps this is an entertaining idea (I was particularly > entertained since it seems to take my notion of generalization far > beyond where I might have taken it), absent an application I have a > difficult time supporting it. And ev

Re: [ietf-dkim] Proposed documentation split between DKIM and "DOSETA"

2011-01-14 Thread Charles Lindsey
On Thu, 13 Jan 2011 17:00:03 -, Steve Atkins wrote: > But if other ways of getting the public key are more suitable, what's > left? The only thing DKIM does is allow a domain to assert responsibility > for a message in a relatively cheap (if unreliable) way. That is most certainly NOT the

Re: [ietf-dkim] Proposed documentation split between DKIM and "DOSETA"

2011-01-13 Thread Charles Lindsey
On Wed, 12 Jan 2011 17:10:52 -, Dave CROCKER wrote: > This raise a specific and interesting technical point. I haven't seen a > response so far, so... > The core of this technology has keys that are named and accessed in > terms of > domain names. It really is fundamental to this technic

Re: [ietf-dkim] Re-thinking the organization of the DKIM spec

2011-01-12 Thread Charles Lindsey
On Tue, 11 Jan 2011 12:12:53 -, Eliot Lear wrote: > 4. Rather than keep it in the back of my head, I'll state it outright: > is a goal here to provide an alternative to SSL-based web page > security? Conveniently, web content does take the form of header/body. > If so, one reasonable questi

Re: [ietf-dkim] Proposed documentation split between DKIM and "DOSETA"

2011-01-12 Thread Charles Lindsey
On Tue, 11 Jan 2011 18:09:53 -, Alessandro Vesely wrote: > On 07/Jan/11 21:58, Dave CROCKER wrote: >> Here's the proposal that Barry just announced, for splitting the DKIM >> specification into a DKIM-specific portion and an underlying, more >> generic >> portion that could be re-purposed

Re: [ietf-dkim] Proposed documentation split between DKIM and "DOSETA"

2011-01-10 Thread Charles Lindsey
On Fri, 07 Jan 2011 20:58:02 -, Dave CROCKER wrote: > Here's the proposal that Barry just announced, for splitting the DKIM > specification into a DKIM-specific portion and an underlying, more > generic > portion that could be re-purposed for other services. It's current > working > acro

Re: [ietf-dkim] A comprehensive DKIM verification specification will not violate protocol layers.

2010-11-23 Thread Charles Lindsey
On Mon, 22 Nov 2010 22:32:41 -, Douglas Otis wrote: > Murray argued singleton header checks to qualify DKIM signatures > violates protocol layering. Which is why I want to fix this problem with normative wording that does not violate protocol layering. Quite simple: Signers MUST/SHOULD

Re: [ietf-dkim] Getting resolution on the "double header" issue

2010-11-12 Thread Charles Lindsey
On Thu, 11 Nov 2010 17:55:55 -, Douglas Otis wrote: > Once one DKIM verification vendor includes these necessary checks that > suppress DKIM PASS, and another vendor does not, DKIM implementations > are no longer compatible. IMHO, this represents a DKIM protocol failure > to properly defin

Re: [ietf-dkim] Getting resolution on the "double header" issue

2010-11-11 Thread Charles Lindsey
On Mon, 08 Nov 2010 09:20:19 -, Barry Leiba wrote: > I have a chair statement to start with, and then the rest of this > message will be as a participant. > > As chair: > We have gone off in the weeds on the "double header" issue, and are > fighting with ourselves. The chairs need everyone

Re: [ietf-dkim] Necessary Verifier Actions to mitigate exploitation of trust established through DKIM signatures.

2010-11-08 Thread Charles Lindsey
On Fri, 05 Nov 2010 18:46:37 -, Douglas Otis wrote: > Append to Section 6 Verifier Actions: > > It is not reasonable to assume a message is in compliance with RFC5322. > To mitigate trivial exploitation of trust established by DKIM > signatures, messages having multiple header fields for "o

Re: [ietf-dkim] Proposal for new text about multiple header issues

2010-11-03 Thread Charles Lindsey
On Tue, 02 Nov 2010 18:47:23 -, Alessandro Vesely wrote: > On 01/Nov/10 22:56, Douglas Otis wrote: >> On 10/30/10 3:05 AM, Alessandro Vesely wrote: >>> On 28/Oct/10 03:36, Douglas Otis wrote: I'll repeat the example given previously. The multiple listing of a header in the h=

Re: [ietf-dkim] layer violations, was detecting header mutations after signing

2010-10-22 Thread Charles Lindsey
On Thu, 21 Oct 2010 16:17:18 +0100, Alessandro Vesely wrote: > DKIM-Signature: d=Big-IPS.com; h=from; (supposedly)... >> From accou...@big-bank.com >> From some...@big-ips.com >> Subject: Audit notification >> >> > In my hypothesis, a verifier would discard the 2nd "From > accou...@b

Re: [ietf-dkim] detecting header mutations after signing

2010-10-21 Thread Charles Lindsey
On Wed, 20 Oct 2010 18:32:44 +0100, John R. Levine wrote: >> A reputation service can only say that a domain is >>BAD >>GOOD >> or NO EVIDENCE AVAILABLE EITHER WAY. >> >> I think the last case has to be treated pretty much like GOOD, otherwise >> newcomers to the internet will never even

Re: [ietf-dkim] layer violations, was detecting header mutations after signing

2010-10-21 Thread Charles Lindsey
On Wed, 20 Oct 2010 15:27:16 +0100, Alessandro Vesely wrote: > On 20/Oct/10 13:23, Charles Lindsey wrote: >> The scam I have described involves the use, by the phisher, of a >> DKIM-signed (by himself) email with two From: headers, which is intended >> to fool verifiers i

Re: [ietf-dkim] Data integrity claims

2010-10-20 Thread Charles Lindsey
On Mon, 18 Oct 2010 20:18:16 +0100, Murray S. Kucherawy wrote: >> This is no more presumptuous than expecting that MUAs will adapt to >> consume the output of DKIM as it stands now. > > In another message I indicated that I don't presume either, but assert > that there's no middle ground; the

Re: [ietf-dkim] Protecting messages, not MUAs, MTAs, or anything else

2010-10-20 Thread Charles Lindsey
On Tue, 19 Oct 2010 01:32:29 +0100, Hector Santos wrote: > John R. Levine wrote: > >> So, uh, can we agree that Jim's SHOULD language to tell people to do >> this is a good idea? > > Yes. +1. I think I was the first to agree with Jim's input and didn't > see much follow up except you and maybe a

Re: [ietf-dkim] detecting header mutations after signing

2010-10-20 Thread Charles Lindsey
On Tue, 19 Oct 2010 14:18:45 +0100, Wietse Venema wrote: > My preference would be to enforce this within the existing protocol > (that is: send h=from:from:subject:subject...), But that only copes with some of the scams that are possible; for full protection you need > ... but I could live

Re: [ietf-dkim] detecting header mutations after signing

2010-10-20 Thread Charles Lindsey
On Tue, 19 Oct 2010 16:23:39 +0100, John R. Levine wrote: >> good signature -> good message. >> >> Don't you mean >> >> Good signature -> authenticated message (that is, someone >> accepts responsibility) I think it needs to mean Good signature -> authenticated message (that is, someone

Re: [ietf-dkim] ISSUE: 3.6.2.1 - Working with other TXT records

2010-10-20 Thread Charles Lindsey
On Mon, 18 Oct 2010 18:06:14 +0100, Murray S. Kucherawy wrote: >> -Original Message- >> From: ietf-dkim-boun...@mipassoc.org >> [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of John Levine >> Sent: Friday, October 15, 2010 7:14 PM >> To: ietf-dkim@mipassoc.org >> Cc: dcroc...@bbiw

Re: [ietf-dkim] layer violations, was detecting header mutations after signing

2010-10-20 Thread Charles Lindsey
On Mon, 18 Oct 2010 21:19:18 +0100, Murray S. Kucherawy wrote: >> -Original Message- >> From: ietf-dkim-boun...@mipassoc.org >> [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Charles Lindsey >> Sent: Monday, October 18, 2010 4:24 AM >> To: DKIM >

Re: [ietf-dkim] layer violations, was detecting header mutations after signing

2010-10-18 Thread Charles Lindsey
On Fri, 15 Oct 2010 18:04:22 +0100, Murray S. Kucherawy wrote: > This to me says you still believe DKIM's ultimate payload is something > other than a validated identifier, in this case a domain name. We're > thus not on the same page. > > If instead we do agree that that's its sole intend

Re: [ietf-dkim] layer violations, was detecting header mutations after signing

2010-10-18 Thread Charles Lindsey
On Fri, 15 Oct 2010 17:45:22 +0100, Michael Thomas wrote: > On 10/15/2010 06:51 AM, Charles Lindsey wrote: >> And yet the current protocol will allow an evil mail _apparently_ from >> Ebay to appear, with no means for the recipient to detect the >> difference. > >

Re: [ietf-dkim] Issue: 4871bis - section 5.4/5.5 clarify 5322.From requirement

2010-10-18 Thread Charles Lindsey
On Sat, 16 Oct 2010 05:09:53 +0100, Hector Santos wrote: > This probably means that it should clarified what that 5.4 sentence > means and also the next section 5.5 > > 5.5. Recommended Signature Content > > .. > > The following header fields SHOULD be included in the signature, if >

Re: [ietf-dkim] ISSUE: 4871bis-02 - Section 8.14 comments

2010-10-18 Thread Charles Lindsey
On Fri, 15 Oct 2010 17:47:24 +0100, Jim Fenton wrote: > On 10/15/10 6:06 AM, Charles Lindsey wrote: >> I don't quite see what an attacker can usefully do by modifying messages >> in transit. If they message was already signed (say by ebay), then the >> attacker must

Re: [ietf-dkim] detecting header mutations after signing

2010-10-18 Thread Charles Lindsey
On Fri, 15 Oct 2010 17:50:33 +0100, Murray S. Kucherawy wrote: >> -Original Message- >> From: ietf-dkim-boun...@mipassoc.org >> [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Charles Lindsey >> Sent: Friday, October 15, 2010 7:30 AM >> To: D

Re: [ietf-dkim] ISSUE: 4871bis-02 - Section 8.14 comments

2010-10-18 Thread Charles Lindsey
On Fri, 15 Oct 2010 15:48:05 +0100, Ian Eiloart wrote: > Here's a more interesting attack: > > Compose an email apparently from eBay, and send it to yourself. Get a > valid > DKIM signature, then add a From: header containing an eBay address, and > use > the replay to send that message to thi

Re: [ietf-dkim] detecting header mutations after signing

2010-10-15 Thread Charles Lindsey
On Thu, 14 Oct 2010 17:30:42 +0100, Murray S. Kucherawy wrote: >> -Original Message- >> From: ietf-dkim-boun...@mipassoc.org >> [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Charles Lindsey >> Sent: Thursday, October 14, 2010 7:32 AM >> To: D

Re: [ietf-dkim] detecting header mutations after signing

2010-10-15 Thread Charles Lindsey
On Thu, 14 Oct 2010 19:01:17 +0100, Alessandro Vesely wrote: > On 13/Oct/10 20:45, Scott Kitterman wrote: >> On Wednesday, October 13, 2010 12:54:23 pm Murray S. Kucherawy wrote: >>> If we can extract DKIM from the equation entirely and the problem >>> remains, >>> how is it a DKIM problem?

Re: [ietf-dkim] layer violations, was detecting header mutations after signing

2010-10-15 Thread Charles Lindsey
On Thu, 14 Oct 2010 18:30:38 +0100, Murray S. Kucherawy wrote: >> -Original Message- >> From: ietf-dkim-boun...@mipassoc.org >> [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of John R. Levine >> Sent: Thursday, October 14, 2010 10:15 AM >> To: DKIM List >> Subject: Re: [ietf-dkim]

Re: [ietf-dkim] layer violations, was detecting header mutations after signing

2010-10-15 Thread Charles Lindsey
On Thu, 14 Oct 2010 18:23:21 +0100, Michael Thomas wrote: > I would hope so because this would be a really stupid thing to do. > Without the next line of defense -- virus, malware, spam, phishing -- > you'd be setting your users up for big problems. Just because it's > DKIM signed from a good sou

Re: [ietf-dkim] layer violations, was detecting header mutations after signing

2010-10-15 Thread Charles Lindsey
On Thu, 14 Oct 2010 18:01:25 +0100, Michael Thomas wrote: > Because the audience who ought to be dealing with the larger problem has > little to > nothing to do with the audience that would have to deal with that > MUST/SHOULD. > It's a useless requirement to put on DKIM. So which two audien

Re: [ietf-dkim] layer violations, was detecting header mutations after signing

2010-10-15 Thread Charles Lindsey
On Thu, 14 Oct 2010 17:45:39 +0100, John R. Levine wrote: > Well, yeah. That's why I don't understand why people are so opposed to a > SHOULD saying they should. Or even a MUST saying they must. -- Charles H. Lindsey -At Home, doing my own thing Tel: +44 161 43

Re: [ietf-dkim] layer violations, was detecting header mutations after signing

2010-10-15 Thread Charles Lindsey
On Thu, 14 Oct 2010 15:17:15 +0100, John R. Levine wrote: > We seem to be talking past each other here. > > I don't see anyone proposing a deep dive into 5322 validation. But 4871 > already says you MUST sign the From: header. Why is that OK, but saying > you MUST NOT sign or validate something

Re: [ietf-dkim] ISSUE: 4871bis-02 - Section 8.14 comments

2010-10-15 Thread Charles Lindsey
On Wed, 13 Oct 2010 23:22:07 +0100, Jim Fenton wrote: > Here's some text I propose for section 8.14, in place of the current > text. Bear in mind that this is in the context of the Security > Considerations section of the spec, so it is really a discussion of the > threat and how it is dealt with

Re: [ietf-dkim] ISSUE: 4871bis-02 - Section 8.14 comments

2010-10-15 Thread Charles Lindsey
On Wed, 13 Oct 2010 18:13:43 +0100, Jim Fenton wrote: > My inclination is that the spec should say something like: > > - The verifier SHOULD consider the signature invalid if a signed header > field occurs an inappropriate number of times in the message header > according to section 3.6 of RFC 53

Re: [ietf-dkim] detecting header mutations after signing

2010-10-14 Thread Charles Lindsey
On Wed, 13 Oct 2010 19:27:29 +0100, Jeff Macdonald wrote: >> If we can extract DKIM from the equation entirely and the problem >> remains, how is it a DKIM problem? > > > I agree with this. > > And even if there was a DKIM signature, it is the BAD GUY'S signature, > which should cause it to g

Re: [ietf-dkim] detecting header mutations after signing

2010-10-14 Thread Charles Lindsey
On Wed, 13 Oct 2010 17:54:23 +0100, Murray S. Kucherawy wrote: >> -Original Message- >> From: ietf-dkim-boun...@mipassoc.org >> [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Charles Lindsey >> Sent: Wednesday, October 13, 2010 9:12 AM >> To: D

Re: [ietf-dkim] detecting header mutations after signing

2010-10-14 Thread Charles Lindsey
On Wed, 13 Oct 2010 17:34:32 +0100, Charles Lindsey wrote: > But full 100% RFC5322 checking is extremely tedious, and is more that we > actually need. > > What we want is more like > CHECK DKIM && CHECK RFC5322 headers included in h= tag --> > ACCE

Re: [ietf-dkim] ISSUE: 4871bis-02 - Section 8.14 comments

2010-10-13 Thread Charles Lindsey
On Tue, 12 Oct 2010 14:21:31 +0100, Hector Santos wrote: > In the new section 8.14, I believe there is many statements that are > hardly true, but subjective and written by someone begging to pass the > buck with conflictive arguments. > > DKIM is part of the SYSTEM, DKIM is NOT the SYSTEM. Lets

Re: [ietf-dkim] ISSUE: 4871bis-02 - Section 8.14 comments

2010-10-13 Thread Charles Lindsey
On Tue, 12 Oct 2010 21:41:18 +0100, Scott Kitterman wrote: > DKIM also attempts to provide assurance that content is unmodified. > Without that the identity assurance is meaningless. +1 And also assurance that other headers than From are unmodified. -- Charles H. Lindsey -At Home,

Re: [ietf-dkim] I-D ACTION:draft-ietf-dkim-rfc4871bis-02.txt

2010-10-13 Thread Charles Lindsey
On Tue, 12 Oct 2010 14:00:19 +0100, Dave CROCKER wrote: > Oh boy. Very sorry folks. > > The full text reads: > >> Similarly, a message not compliant with RFC5322, RFC2045 >> and >>RFC2047, can be subject to attempts by intermediaries to >> correct >>

Re: [ietf-dkim] I-D ACTION:draft-ietf-dkim-rfc4871bis-02.txt

2010-10-13 Thread Charles Lindsey
On Tue, 12 Oct 2010 07:46:42 +0100, Barry Leiba wrote: > There are only two significant changes between -01 and -02 ... most of > the changes are just updating the references. The substantive changes > are: > 1. The addition of the paragraph that begins "Similarly, a message > that is not comp

Re: [ietf-dkim] detecting header mutations after signing

2010-10-13 Thread Charles Lindsey
On Mon, 11 Oct 2010 23:05:13 +0100, Wietse Venema wrote: > Charles Lindsey: >> > When the bad guy sends mail with (multiple) forged headers, the >> > best they can get is that naive mail programs render their forged >> > header with an indication that THE BAD

Re: [ietf-dkim] detecting header mutations after signing

2010-10-13 Thread Charles Lindsey
On Mon, 11 Oct 2010 14:07:03 +0100, Wietse Venema wrote: > Charles Lindsey: >> All you have ensured is that any message signed (say by ebay) is proof >> against reply attacks that add additional headers. >> >> But the scam we are considering does not involve rep

Re: [ietf-dkim] detecting header mutations after signing

2010-10-13 Thread Charles Lindsey
On Tue, 12 Oct 2010 14:36:42 +0100, Hector Santos wrote: > What it means for most systems that they need to change a model based > on this: > > CHECK DKIM PASS --> ACCEPT > CHECK RFC5322 BAD --> REJECT > BREAK > RESIGN > DISTRIBUTE > > To this: > >

Re: [ietf-dkim] detecting header mutations after signing

2010-10-11 Thread Charles Lindsey
On Fri, 08 Oct 2010 18:25:40 +0100, Wietse Venema wrote: > If I understand things correctly, the solution is already available > in DKIM today. It involves signer configuration (sign for N+1 > instances of each header that is covered by the signature) and > requires no change in protocol or se

Re: [ietf-dkim] THIS IS A MULTIPLE 5322.FROM MESSAGE

2010-10-08 Thread Charles Lindsey
On Thu, 07 Oct 2010 19:18:19 +0100, Michael Thomas wrote: > The larger issue here is would anybody rush out to close this MUST. > I think that it is highly unlikely that anybody is going to care at this > point. That goes for *any* new MUST, IMO: unless it's really a serious > protocol endangerin

[ietf-dkim] Fwd: Re: THIS IS A MULTIPLE 5322.FROM MESSAGE

2010-10-08 Thread Charles Lindsey
On Thu, 07 Oct 2010 17:09:14 +0100, Michael Thomas wrote: > I'm with Steve on this one. Forcing implementations of DKIM to > determine whether a message is compliant is a pretty high bar. ... How can you claim it is a "high bar" when clearly it isn't.? All that the implementor of a verifier has

Re: [ietf-dkim] THIS IS A MULTIPLE 5322.FROM MESSAGE

2010-10-07 Thread Charles Lindsey
On Wed, 06 Oct 2010 13:00:25 +0100, Steve Atkins wrote: > On Oct 6, 2010, at 1:47 AM, Mark Delany wrote: >> Right. We could attempt to enumerate the 1,000 edge-cases we know >> today and then re-bis 4871 for the additional 1,000 edge-cases we >> learn tomorrow, or we could simply say that inva

Re: [ietf-dkim] ISSUE: 4871bis - Security Loop hole with Multiple 5322.From

2010-10-07 Thread Charles Lindsey
On Wed, 06 Oct 2010 13:25:28 +0100, Murray S. Kucherawy wrote: >> -Original Message- >> From: ietf-dkim-boun...@mipassoc.org >> [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Charles Lindsey >> Sent: Wednesday, October 06, 2010 3:47 AM >> To: D

Re: [ietf-dkim] THIS IS A MULTIPLE 5322.FROM MESSAGE

2010-10-07 Thread Charles Lindsey
On Wed, 06 Oct 2010 18:57:10 +0100, MH Michael Hammer (5304) wrote: > If the consensus is that it is a problem but not really a 4871 problem > then do we just walk away from it and leave it at that - "not our > problem"? Should we perhaps look for the place where the 5322 people > roost (

[ietf-dkim] Fwd: Re: THIS IS A MULTIPLE 5322.FROM MESSAGE

2010-10-07 Thread Charles Lindsey
On Wed, 06 Oct 2010 13:01:29 +0100, Wietse Venema wrote: > Mark Delany: >> Right. We could attempt to enumerate the 1,000 edge-cases we know >> today and then re-bis 4871 for the additional 1,000 edge-cases we >> learn tomorrow, or we could simply say that invalid 2822 messages >> MUST never ver

  1   2   3   4   5   >