Re: [ietf-dkim] [dmarc-ietf] draft-kucherawy-dmarc-rcpts

2016-11-15 Thread Martijn Grooten
On Tue, Nov 15, 2016 at 11:56:11AM -0600, Scott Kitterman wrote: > Not at all. As I understand the scenario, the provider knows it's > bad, doesn't send the mail on to the outside world, but still gives a > signed copy back to the originator (which is then available for > replay). My understandin

Re: [ietf-dkim] [dmarc-ietf] draft-kucherawy-dmarc-rcpts

2016-11-15 Thread Martijn Grooten
On Mon, Nov 14, 2016 at 07:42:16AM -0500, Scott Kitterman wrote: > OK. Ultimately, "don't sign spam" has got to be the solution or reputation > is > going to suffer, so I think they are going to have to eventually bite the > bullet and fix it. I think you underestimate how difficult it is to d

Re: [ietf-dkim] [dmarc-ietf] a slightly less kludge alternative to draft-kucherawy-dmarc-rcpts

2016-11-15 Thread Martijn Grooten
On Tue, Nov 15, 2016 at 08:07:38AM +0900, Murray S. Kucherawy wrote: > This is not reversible so nothing is leaked, but as we've all conceded by now > it's not hard to attack this to recover the hashed address especially since > one > might have good guesses as to what that address would be. I ca

Re: [ietf-dkim] draft-kucherawy-dmarc-rcpts

2016-11-14 Thread Martijn Grooten
On Mon, Nov 14, 2016 at 02:48:01PM +0900, Murray S. Kucherawy wrote: > On Mon, Nov 14, 2016 at 5:30 AM, Martijn Grooten > wrote: > > It isn't very clear to me how this proposal deals with receipients at > different domains, including but not limited to blind carbon co

Re: [ietf-dkim] draft-kucherawy-dmarc-rcpts

2016-11-13 Thread Martijn Grooten
On Sun, Nov 13, 2016 at 03:50:05PM +0900, Murray S. Kucherawy wrote: > https://datatracker.ietf.org/doc/draft-kucherawy-dkim-rcpts/ > > Comments welcome. Thanks for this. It isn't very clear to me how this proposal deals with receipients at different domains, including but not limited to blind c

Re: [ietf-dkim] DKIM Key Sizes

2016-10-29 Thread Martijn Grooten
On Fri, Oct 28, 2016 at 11:06:34AM +0100, Stephen Farrell wrote: > Instead, I'd point out that this can be handled, even now, > by simply rolling to a new key and then shortly publishing > the private key used to sign the messages. That way Podesta > could deny the content once more, at least at th

Re: [ietf-dkim] DKIM Key Size Constraints

2015-05-19 Thread Martijn Grooten
On Tue, May 19, 2015 at 11:40:12AM +0200, Alessandro Vesely wrote: > Apologies for jumping in late; just to note that 1024-bit keys seem to have > been accepted until quite recently: > https://www.sophos.com/en-us/support/knowledgebase/122327.aspx This refers to certificates signed with RSA-1024 k

Re: [ietf-dkim] DKIM Key Size Constraints

2015-05-13 Thread Martijn Grooten
On Wed, May 13, 2015 at 01:21:36PM +0800, Roland Turner wrote: > (e.g. perhaps measurement discovers that 512 bit keys are only used by > low-risk domains; does this warrant killing the feature for the good of those > who are being targeted, or retaining it because it's still in use, with a > clea

Re: [ietf-dkim] DKIM Key Size Constraints

2015-05-12 Thread Martijn Grooten
> Why remove 512 support from the verification side? Does this mean the > verifier will take valid 512 signature and make it invalid, no signature > message? Is there a correlation out there that 512 bits signers are more > prune to be Bad Guys? Spammers? The problem here is that 512-bit keys ca

Re: [ietf-dkim] DKIM Key Size Constraints

2015-05-12 Thread Martijn Grooten
PS References that were left out of the version of the email I did not send to Hector only: [1] http://blog.cryptographyengineering.com/2015/03/attack-of-week-freak-or-factoring-nsa.html [2] http://www.wired.com/2012/10/dkim-vulnerability-widespread/ Virus Bul

Re: [ietf-dkim] DKIM Key Size Constraints

2015-05-12 Thread Martijn Grooten
> I propose a short draft that updates 6376 to say MUST use at least 1024 bits > and setting that as the minimum size verifiers must be able to validate. I'm > volunteering to write it if people agree it's appropriate. I think it is appropriate - and I agree with others that we shouldn't go beyon

[ietf-dkim] DKIM support in MUAs

2010-10-14 Thread Martijn Grooten
Graham Murray wrote: > An MUA does not have to do filtering in order to support DKIM. It could > display the Authentication Results header, or take some action > depending > on whether there is a valid DKIM signature - in a similar way that some > web browsers will turn the URL bar green when the s

Re: [ietf-dkim] Clarifying DKIM (etc.) expectations for mailing lists in the face of digests

2010-08-05 Thread Martijn Grooten
> On 8/4/2010 2:01 PM, John Levine wrote: > >> There's a scenario where a spammer/phisher sets up a mailing list, > ... > > I don't see how this poses any new problems. > > > More to the point is that this attack does not appear to be relevant to > the > question I asked. > > Phrased differently, t

Re: [ietf-dkim] Clarifying DKIM (etc.) expectations for mailing lists in the face of digests

2010-08-04 Thread Martijn Grooten
roken, don't send it through systems that are likely to break it. Martijn. > -Original Message- > From: Dave CROCKER [mailto:dcroc...@bbiw.net] > Sent: 04 August 2010 18:35 > To: Martijn Grooten > Subject: Re: [ietf-dkim] Clarifying DKIM (etc.) expectations for > mail

Re: [ietf-dkim] Clarifying DKIM (etc.) expectations for mailing lists in the face of digests

2010-08-04 Thread Martijn Grooten
> What is the security model that makes this expectation of preservation > important > and reasonable, given that it is so easily and whimsically violated by > a common > recipient-selectable setting? There's a scenario where a spammer/phisher sets up a mailing list, adds a bunch of addresses to

Re: [ietf-dkim] Mailing list reality check

2010-08-04 Thread Martijn Grooten
> Assuming you do any sorting of inbound mail at all, how do you treat > mail from lists to which you have subscribed? > > A) Use the From: address (or something that identifies the contributor) > as the primary sort criterion > > B) Use the List-ID: (or something that identifies the list) as the >

Re: [ietf-dkim] New Version Notification for draft-levine-dbr-00(fwd)

2010-06-24 Thread Martijn Grooten
> So why does a domain that performs that painful audit and > remediation need to then tell John's drop list that it's OK to > drop unsigned mail? It doesn't. It can just publish an ADSP > record and be done with it. No need to count on some unreliable, > unaccountable point of failure to mediate t