Re: [ietf-dkim] Are verifiers expected to query SSP on a successful verify?

2006-08-01 Thread Scott Kitterman
On Tue, 01 Aug 2006 17:39:58 +0100 Stephen Farrell [EMAIL PROTECTED] wrote: John Levine wrote: Scenario 3a: 1) A is a popular phishing target and prefers to suffer message rejections for messages that don't carry a valid signature by A (or a designated third party) than to have messages

Re: [ietf-dkim] A few SSP axioms

2006-08-01 Thread Scott Kitterman
On 2 Aug 2006 03:30:50 - John Levine [EMAIL PROTECTED] wrote: There can be other policies but I require those two and am wondering why there seems to be a tremendous pushback on this. I think there is so much pushback on this because it is smething different. You must have a very different

Re: [ietf-dkim] I sign nothing / only only 3rd party / some mail

2006-08-01 Thread Scott Kitterman
On Tue, 01 Aug 2006 17:29:21 -0700 Michael Thomas [EMAIL PROTECTED] wrote: Is there any discovery related requirement here other than the must complete in deterministic number of steps one that we all seem to agree on? Just a nit, I would have thought it would have been complete in no more

Re: [ietf-dkim] A few SSP axioms

2006-07-31 Thread Scott Kitterman
On Mon, 31 Jul 2006 10:02:07 -0400 (EDT) John L [EMAIL PROTECTED] wrote: I have to say that the more discussion I see from advocates of SSP, the less I think that anyone really understands what it's supposed to do. So here's the main SSP axiom that I think should be self-evident, but apparently

Re: [ietf-dkim] A few SSP axioms

2006-07-31 Thread Scott Kitterman
On Monday 31 July 2006 21:22, John Levine wrote: I think this is the key issue then and we ought to focus on it. In my view almost the entire point of a signing policy is constraining whose signatures are considere authorized by the domain owner. I'm assuming that when you say authorized,

Re: [ietf-dkim] The URL to my paper describing the DKIM policy options

2006-07-28 Thread Scott Kitterman
On Thu, 27 Jul 2006 16:33:42 -0700 Jim Fenton [EMAIL PROTECTED] wrote: Scott Kitterman wrote: On Thursday 27 July 2006 14:00, [EMAIL PROTECTED] wrote: My requirements I sign all I sign nothing I sign only 3rd party I sign all and 3rd party I sign some mail My Policy/Practice I

Re: [ietf-dkim] The URL to my paper describing the DKIM policy options

2006-07-28 Thread Scott Kitterman
On Thu, 27 Jul 2006 16:50:17 -0700 Jon Callas [EMAIL PROTECTED] wrote: On 27 Jul 2006, at 4:01 PM, Scott Kitterman wrote: To clarify, by me, I meant my domain. The problem is that in this type of scenario, there is no way to externally distinguish between mail actually sent

Re: [ietf-dkim] SSP complications, wa The URL to my paper ...

2006-07-28 Thread Scott Kitterman
On Friday 28 July 2006 00:22, John Levine wrote: Yes. What I want as a small domain owner is the ability to publish a policy record that say that for mail sent (for some definition of sent that we will probably have to argue about later) from my domain, the domain(s) authorized to sign are

Re: [ietf-dkim] The URL to my paper describing the DKIM policy options

2006-07-28 Thread Scott Kitterman
On Friday 28 July 2006 14:23, John Levine wrote: Yes and what is another customer of the ISP submits mail using my From. in virtually all cases today there is nothing to prevent that. If you give your keys to untrustworthy third parties, all bets are off. No amount of extra protocol goop

Re: [ietf-dkim] The URL to my paper describing the DKIM policy options

2006-07-27 Thread Scott Kitterman
On Wednesday 26 July 2006 23:54, Hallam-Baker, Phillip wrote: [mailto:[EMAIL PROTECTED] On Behalf Of Scott Kitterman It might be useful (later, after the requirements discussion is complete) to explore the feasibility of a common policy record for the two for future revisions. The risk

Re: [ietf-dkim] The URL to my paper describing the DKIM policy options

2006-07-27 Thread Scott Kitterman
On Thursday 27 July 2006 14:00, [EMAIL PROTECTED] wrote: My requirements I sign all I sign nothing I sign only 3rd party I sign all and 3rd party I sign some mail My Policy/Practice I sign all - every piece of mail purported to be from me must be signed Must be signed by you are must

Re: [ietf-dkim] The URL to my paper describing the DKIM policy options

2006-07-27 Thread Scott Kitterman
On Thursday 27 July 2006 17:57, Michael Thomas wrote: Scott Kitterman wrote: If I send mail through the mail server of isp.example.com and they sign with my key, it matters a GREAT deal to me if they also sign other people using my name with my key. This may be largely an operational

Re: [ietf-dkim] The URL to my paper describing the DKIM policy options

2006-07-27 Thread Scott Kitterman
On Thursday 27 July 2006 18:31, Jon Callas wrote: If I use isp.example.com and they sign messages with my name and a key (theirs or mine, doesn't matter) and they also sign messages actually sent by joe spammer (another one of their customers) with my name and a key (again, theirs or

Re: [ietf-dkim] The URL to my paper describing the DKIM policy options

2006-07-27 Thread Scott Kitterman
On Thu, 27 Jul 2006 16:15:03 -0700 Jim Fenton [EMAIL PROTECTED] wrote: Scott Kitterman wrote: On Thursday 27 July 2006 18:31, Jon Callas wrote: If I use isp.example.com and they sign messages with my name and a key (theirs or mine, doesn't matter) and they also sign messages actually sent

Re: [ietf-dkim] The URL to my paper describing the DKIM policy options

2006-07-27 Thread Scott Kitterman
On Thursday 27 July 2006 22:51, [EMAIL PROTECTED] wrote: Scott, Perhaps an easier way, instead of you having to manage a DNS policy record, you offload that to your provider Policy.DKIM.foo.bar.com is a alias to dkim.provider.com who states the policy you request. When changing outbound email

Re: [ietf-dkim] The URL to my paper describing the DKIM policy options

2006-07-26 Thread Scott Kitterman
On Wednesday 26 July 2006 11:03, Arvel Hathcock wrote: I think we've got a winner here -- and deliverable within a reasonable time frame -- if we can keep the core requirements to a minimum. As we think through the definition of minimum, I think it important that we consider the class of

Re: [ietf-dkim] The URL to my paper describing the DKIM policy options

2006-07-26 Thread Scott Kitterman
On Wednesday 26 July 2006 11:54, [EMAIL PROTECTED] wrote: Scott, I think that each domain would have a public key and the aggregator MTA that is shared would sign on behalf of that domain Jobob.com uses mx.isp.com to send mail jobob.com would have a dns record containing public key

Re: [ietf-dkim] requirements

2006-07-26 Thread Scott Kitterman
On Wednesday 26 July 2006 14:14, Michael Thomas wrote: This is a really good instance of what the base level requirements are. On the one hand we can say that the requirement is that an ISP signing on behalf of a customer actually sign on behalf of the customer. That is, the d=customer.com

MX 0 . (was Re: [ietf-dkim] The URL to my paper describing the DKIM policy options)

2006-07-26 Thread Scott Kitterman
On Wednesday 26 July 2006 15:26, Steve Atkins wrote: MX 0 . seems to be the standard way of asserting that a domain neither sends nor receives email. It is a way that people do it. AFAIK, there is no standard that describe that assertion. Scott K

Re: MX 0 . (was Re: [ietf-dkim] The URL to my paper describing the DKIM policy options)

2006-07-26 Thread Scott Kitterman
On Wednesday 26 July 2006 15:50, william(at)elan.net wrote: On Wed, 26 Jul 2006, Scott Kitterman wrote: On Wednesday 26 July 2006 15:26, Steve Atkins wrote: MX 0 . seems to be the standard way of asserting that a domain neither sends nor receives email. It is a way that people do

Re: [ietf-dkim] The URL to my paper describing the DKIM policy options

2006-07-26 Thread Scott Kitterman
On Wednesday 26 July 2006 16:28, Steve Atkins wrote: There is no need to tie signing of email to this domain sends no email. As such it's not something that _has_ to be in SSP (unlike We send no non-signed email). If you believe SSP has value you pretty much have to believe the same of SPF,

Re: [ietf-dkim] requirements

2006-07-26 Thread Scott Kitterman
On Wednesday 26 July 2006 16:36, Michael Thomas wrote: Scott Kitterman wrote: On Wednesday 26 July 2006 14:14, Michael Thomas wrote: This is a really good instance of what the base level requirements are. On the one hand we can say that the requirement is that an ISP signing on behalf

Re: [ietf-dkim] I send nothing

2006-07-26 Thread Scott Kitterman
On Wednesday 26 July 2006 15:58, Hallam-Baker, Phillip wrote: SSP is not very relevant in this case as that spec is not on standards track and DKIM is. Last I checked, it was DKIM-base and DKIM-SSP and it's all supposed to be on standards track. Has this changed? Scott K

Re: [ietf-dkim] 822/2822 or just 2822

2006-07-20 Thread Scott Kitterman
On Thursday 20 July 2006 11:51, Dave Crocker wrote: Barry Leiba wrote: Is the requirement that DKIM support both 822/2822 content (822 being the current standard) or is the intent that DKIM is just required to support 2822 content? I believe there are two parts to the answer to

[ietf-dkim] 822/2822 or just 2822 was - Possible problem with simple body canonicalization -- trailing CRLFs

2006-07-19 Thread Scott Kitterman
On Wednesday 19 July 2006 21:23, John L wrote: If you want your signatures to work, be sure the message you're signing is as squeaky clean 2822 compliant as possible so as to give relay MTAs as little incentive as possible to make helpful modifications. I realize that we have existing

Re: [ietf-dkim] draft-ietf-dkim-base-04 submitted

2006-07-16 Thread Scott Kitterman
On Sat, 15 Jul 2006 08:10:50 -0700 Eric Allman [EMAIL PROTECTED] wrote: I have just submitted draft-ietf-dkim-base-04 to internet-drafts for publication. An advance view can be found at http://www.neophilic.com/~eric/DKIM/draft-ietf-dkim-base-04.txt

Re: [ietf-dkim] drop requirement to sign From or other originator headers?

2006-07-14 Thread Scott Kitterman
On Friday 14 July 2006 01:51, Mark Delany wrote: Eric Allman wrote: Folks OK with that? -1 If a verifier has a verified email with a d= what is the fundamental value-add on insisting that From: is a signed header? After all, a minimalist verifier is going to query some database to ask

Re: [ietf-dkim] +1 on requirements for ssp-like-thing

2006-07-14 Thread Scott Kitterman
On Fri, 14 Jul 2006 13:46:34 -0600 Arvel Hathcock [EMAIL PROTECTED] wrote: 1) I sign everything, for some value of everything 2) I don't send email at all. I'm sorry I had to miss the meetings in Montreal. I want to put forth my belief that, whatever form SSP ultimately takes, being able

Re: [ietf-dkim] Issue: which headers should we REQUIRE to be signed?

2006-07-13 Thread Scott Kitterman
On Thursday 13 July 2006 17:17, Hector Santos wrote: - Original Message - From: Barry Leiba [EMAIL PROTECTED] As chair, I see a growing consensus to do it that way. Let's try to resolve this issue tout de suite, and move on. I'd like to hear from people who think we should have

Re: [ietf-dkim] Issue: which headers should we REQUIRE to be signed?

2006-07-13 Thread Scott Kitterman
On Thursday 13 July 2006 18:09, Dave Crocker wrote: Scott Kitterman wrote: I think that a requirement to sign RFC 2822 required identity header fields (From and Sender if present) makes a lot of sense. I expect that if we don't make this a requirement in Base, then in operations

Re: [ietf-dkim] drop requirement to sign From or other originator headers?

2006-07-13 Thread Scott Kitterman
On Thursday 13 July 2006 23:19, Dave Crocker wrote: Eric Allman wrote: Folks OK with that? +1 d/ +1 Scott K ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] Trust Annotation Support

2006-04-26 Thread Scott Kitterman
On 04/26/2006 17:59, Douglas Otis wrote: On Apr 26, 2006, at 12:32 PM, J.D. Falk wrote: On 2006-04-25 08:51, Douglas Otis wrote: Well vetted sources can be indicated by the signer with some type of notation or semaphore. So, the signer -- who is most often the sender -- indicates to

Re: [ietf-dkim] dkim-base-01: 6.2 - DNS error

2006-04-20 Thread Scott Kitterman
On 04/19/2006 23:51, Jim Fenton wrote: Scott Kitterman wrote: There is another potential issue with this approach if we get to a dedicated RR type. While not an issue when using TXT, there are resolvers that will fail to respond when queried with an unknown RR type (no I don't know

Re: [ietf-dkim] dkim-base-01: 6.2 - DNS error

2006-04-20 Thread Scott Kitterman
On 04/20/2006 09:53, Douglas Otis wrote: On Thu, 2006-04-20 at 07:53 -0400, Scott Kitterman wrote: WRT your point, I agree. Perhaps we need to add another bit along the lines of, If an email is deferred based on lack of response to the query for the public key, the verifier SHOULD

Re: [ietf-dkim] dkim-base-01: 6.2 - DNS error

2006-04-20 Thread Scott Kitterman
On 04/20/2006 18:53, Michael Thomas wrote: Scott Kitterman wrote: On 04/19/2006 23:51, Jim Fenton wrote: This points out another problem: if a verifier defers verification or acceptance of a given message, it SHOULD maintain enough state so that the message may be accepted after some number

Re: [ietf-dkim] Attempted text for x= with DSN considerations

2006-04-19 Thread Scott Kitterman
Because if we put that in the spec then we've effectively gotten rid of x= because no one would use it then and that's what he wants perhaps? Scott K On 04/19/2006 18:54, [EMAIL PROTECTED] wrote: Why would a verifyer refuse a message that had a value for x=? Verifiers MAY support checking of

Re: [ietf-dkim] dkim-base-01: 6.2 - DNS error

2006-04-18 Thread Scott Kitterman
On 04/14/2006 10:36, Hector Santos wrote: In section 6.2 Get The Public Key, we have step #2 | 2. If the query for the public key fails to respond, the verifier | SHOULD defer acceptance of this email (normally this will be | achieved with a 451/4.7.5 SMTP reply code). This

Re: [ietf-dkim] authentication result headers are an unsafe alternative

2006-04-18 Thread Scott Kitterman
On 04/18/2006 14:18, Douglas Otis wrote: On Apr 18, 2006, at 10:42 AM, Scott Kitterman wrote: From a protocol design perspective, I think the right answer is to design for the case where the receiving MTA/MDA will check the signature and record a result that, if appropriate, an MUA can use

Re: [ietf-dkim] DKIM in the MUA should not be the goal, just a side benifit

2006-04-18 Thread Scott Kitterman
On 04/18/2006 15:43, Douglas Otis wrote: On Apr 18, 2006, at 11:33 AM, Scott Kitterman wrote: I would not say that we shouldn't include DKIM protection beyond SMTP, but that whatever happens after delivery shouldn't distract us from the primary use case. Or the primary goal of offering

Re: [ietf-dkim] Concerns about DKIM and mailiing lists, etc.

2006-03-15 Thread Scott Kitterman
a reputation system of some limited kind and reputation is out of bounds, I guess I don't understand what you think we are doing here? Scott Kitterman ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] Auth-Results open discussion forum

2006-03-09 Thread Scott Kitterman
On 03/09/2006 17:10, Dave Crocker wrote: Folks, There is now a list for pursuing the specific topic of the Auth-Results specification. The mailing list is [EMAIL PROTECTED] To subscribe, go to: http://mipassoc.org/mailman/listinfo/mail-vet-discuss The list is intended for specific,

Re: [ietf-dkim] Core algorithm support/use, draft text v2

2006-02-27 Thread Scott Kitterman
On 02/27/2006 10:58, Hallam-Baker, Phillip wrote: [mailto:[EMAIL PROTECTED] On Behalf Of Scott Kitterman Might it be useful to break the exact crypto algorithm out into a separate (very short) RFC so that it can be revised as necessary? Something like: A validator MUST support

Re: [ietf-dkim] Core algorithm support/use, draft text v2

2006-02-26 Thread Scott Kitterman
it becomes clear what the next high strength hash algorithm is or if SHA-1 is determined to be broken to the extent it should be deprecated. None of this affects what has to be implemented now, but may make future transitions easier. Scott Kitterman ___ NOTE

Re: [ietf-dkim] agenda item on upgrading hash algorithms?

2006-02-23 Thread Scott Kitterman
On 02/23/2006 12:16, Douglas Otis wrote: On Feb 22, 2006, at 7:52 PM, Douglas Otis wrote: On Feb 22, 2006, at 6:47 PM, Hallam-Baker, Phillip wrote: In rebuttal to Doug's point about not depending on the DNS supporting longer key sizes, an ECDSA key that gives equivalent strength to a 128

Re: [ietf-dkim] DKIM and mailing lists

2006-01-19 Thread Scott Kitterman
On 01/19/2006 15:50, Michael Thomas wrote: Earl Hood wrote: On January 19, 2006 at 03:10, Hector Santos wrote: Sender-Signing Policy (SSP): NONE (no policy) o=? WEAK (signature optional, no third party) o=~ NEUTRAL (signature optional, 3rd party allowed) o=-

Re: [ietf-dkim] DKIM and mailing lists

2006-01-19 Thread Scott Kitterman
On 01/19/2006 17:50, Michael Thomas wrote: Scott Kitterman wrote: On 01/19/2006 15:50, Michael Thomas wrote: Earl Hood wrote: On January 19, 2006 at 03:10, Hector Santos wrote: Sender-Signing Policy (SSP): NONE (no policy) o=? WEAK (signature optional, no third party) o

[ietf-dkim] Let's get back to chartering/threats (was Re: SSP; Is it safe and fair?)

2006-01-05 Thread Scott Kitterman
I think we've wandered pretty far afield here and I'm not going to follow. Don't take my lack of response for agreement. Scott K ___ ietf-dkim mailing list http://dkim.org

Re: [ietf-dkim] Re: The Value of Reputation

2006-01-04 Thread Scott Kitterman
On 01/04/2006 14:20, Douglas Otis wrote: I really hate it that we are debating SPF on the DKIM list, but it seems unavoidable... SPF and SSP will have similar problems. With SPF, you have pointed out the RFC1123 5.3.6(a) issue that may cause those concerned with the resulting disappearance

Re: [ietf-dkim] Comments on the Threat Draft - draft-fenton-dkim-threats-01

2005-11-21 Thread Scott Kitterman
On Sun, 20 Nov 2005 16:14:48 -0800 Jim Schaad [EMAIL PROTECTED] wrote: Jim, I have some comments on this draft that I would like to make. ... F. Potential Extensions to the base document (I would prefer this to be labeled as appendix rather than section of the document for clarity). This

Re: [ietf-dkim] SSP security relies upon the visual domain appearance

2005-11-21 Thread Scott Kitterman
On Sun, 20 Nov 2005 18:37:06 -0800 Douglas Otis [EMAIL PROTECTED] wrote: On Sun, 2005-11-20 at 14:49 -0500, Scott Kitterman wrote: On 11/19/2005 14:50, Douglas Otis wrote: You agree that SSP does not provide a mechanism to prevent spoofing without reliance upon visual presentations

Re: [ietf-dkim] SSP security relies upon the visual domain appearance

2005-11-21 Thread Scott Kitterman
On Mon, 21 Nov 2005 07:50:25 -0800 Douglas Otis [EMAIL PROTECTED] wrote: On Mon, 2005-11-21 at 10:12 -0500, Scott Kitterman wrote: SSP doesn't do what it doesn't do. SSP is not and does not pretend to be the ultimate solution to phishing. Your concern appears to be with problems that SSP

Re: [ietf-dkim] SSP security relies upon the visual domain appearance

2005-11-20 Thread Scott Kitterman
On 11/19/2005 14:50, Douglas Otis wrote: You agree that SSP does not provide a mechanism to prevent spoofing without reliance upon visual presentations... No. I said pretty much the exact opposite of that. Scott K ___ ietf-dkim mailing list

Re: [ietf-dkim] SSP security relies upon the visual domain appearance

2005-11-20 Thread Scott Kitterman
Doug, I haven't seen anyone else jumping on the bandwagon for your approach. Rather than continue to bog down the discussion here, wouldn't it make more sense for you to go off and develop your draft and then submit it as an individual submission once DKIM-base is submitted? Scott K

Re: [ietf-dkim] SSP security relies upon the visual domain appearance

2005-11-19 Thread Scott Kitterman
On Sat, 19 Nov 2005 07:27:10 -0800 Douglas Otis [EMAIL PROTECTED] wrote: On Fri, 2005-11-18 at 22:29 -0500, Scott Kitterman wrote: That or the title of the thread is bogus. I could equally say if we were trying your approach something like Doug's non-SSP security relies upon every MUA

Re: [ietf-dkim] DKIM charter (Should DKIM directly prevent spoofing?)

2005-11-16 Thread Scott Kitterman
On 11/16/2005 13:32, Douglas Otis wrote: ... Would that get the policy debate off the table? -Doug No. Scott K ___ ietf-dkim mailing list http://dkim.org

Re: [ietf-dkim] DKIM charter (Should DKIM directly prevent spoofing?)

2005-11-16 Thread Scott Kitterman
On 11/16/2005 16:32, Douglas Otis wrote: On Nov 16, 2005, at 12:47 PM, Stephen Farrell wrote: A claim made in the charter of detecting spoofing depends upon a comparison of the signing-domain with the email-address domain. There is no such absolute claim that I can see in the draft

Re: [ietf-dkim] DKIM charter

2005-11-14 Thread Scott Kitterman
On 11/13/2005 14:41, Tony Hansen wrote: To get past the contentions around SSP, I'm wondering if we should change the wording slightly, as follows. Tony Hansen [EMAIL PROTECTED] Barry Leiba wrote: - DRAFT IETF WORKING

Re: [ietf-dkim] DKIM charter

2005-11-14 Thread Scott Kitterman
On 11/14/2005 18:25, Douglas Otis wrote: On Nov 14, 2005, at 2:04 PM, Jim Fenton wrote: Barry, DESCRIPTION OF WORKING GROUP: The Internet mail protocols and infrastructure allow mail sent from one domain to purport to be from another. While there are sometimes legitimate

Re: [ietf-dkim] DKIM charter

2005-11-12 Thread Scott Kitterman
On 11/12/2005 11:07, Barry Leiba wrote: Here it is, appended (not attached) below. Barry ... I like this. I think it is good. Scott K ___ ietf-dkim mailing list http://dkim.org

Re: [ietf-dkim] Re: dkim.org (mipassoc.org/dkim) web page updated

2005-11-11 Thread Scott Kitterman
Doug, I don't know that we're getting any closer to any kind of agreement. Given the request to focus on the charter, let's just let this thread end (I hear cheers in the distance I think). Scott K ___ ietf-dkim mailing list http://dkim.org

Re: [ietf-dkim] SSP focus

2005-11-11 Thread Scott Kitterman
On 11/11/2005 18:10, Dave Crocker wrote: Folks, Having said all of that, I am at a complete loss as to much of this debate. If SSP isn't formalized in this group then you can be certain that bi-lateral or non-standard forms will emerge in parallel to DKIM. Those select domain - and we

Re: [ietf-dkim] Email-address independent of signing-domain DKIM charter

2005-11-07 Thread Scott Kitterman
On 11/06/2005 17:35, Douglas Otis wrote: On Nov 5, 2005, at 9:16 PM, Dave Crocker wrote: However, the best way to gauge this probably is for you to specify the text that you propose to have changed in the charter. While there appears to be some support for imposing a requirement that From

Re: [ietf-dkim] Re: dkim.org (mipassoc.org/dkim) web page updated

2005-11-07 Thread Scott Kitterman
On 11/07/2005 20:37, Douglas Otis wrote: DKIM without SSP can be better than with SSP. Take out the SSP approach, and there should be fewer concerns with respect to potential impact, while there would not be any benefit lost. If anything there would be greater benefits as this approach

Re: [ietf-dkim] Re: dkim.org (mipassoc.org/dkim) web page updated

2005-11-07 Thread Scott Kitterman
On Mon, 7 Nov 2005 19:01:40 -0800 Douglas Otis [EMAIL PROTECTED] wrote: On Nov 7, 2005, at 6:24 PM, Scott Kitterman wrote: On 11/07/2005 20:37, Douglas Otis wrote: DKIM without SSP can be better than with SSP. Take out the SSP approach, and there should be fewer concerns with respect

Re: [ietf-dkim] SSP acceptance chart

2005-11-02 Thread Scott Kitterman
On 11/02/2005 13:19, Douglas Otis wrote: ... ...of no signature? This seems force the use of SSP and completely ignore the reputation of the signing-domain, does it not? That's a feature, not a bug. Scott K ___ ietf-dkim mailing list http://dkim.org

Re: [ietf-dkim] SSP acceptance chart

2005-11-02 Thread Scott Kitterman
Doug, I don't imagine we are ever going to agree on this. I really don't understand your view of the world and I am pretty well convinced I never will. I do not think that adding another level of unpredictable heuristics to spam filtering and calling it reputation is a particularly good

Re: [ietf-dkim] Review of draft-fenton-dkim-threats-01

2005-11-01 Thread Scott Kitterman
in detecting falsehood seems more a question for philosophy rather than engineering. I think it's a distraction that we should just dismiss. Yes. Please. Scott Kitterman ___ ietf-dkim mailing list http://dkim.org

Re: [ietf-dkim] A plea to the silent amongst us

2005-11-01 Thread Scott Kitterman
On 11/01/2005 15:41, Arvel Hathcock wrote: I'm new to the IETF process but I've had the amazing good fortune of having excellent guides. They've encouraged me to speak up when I've had something to say and I want to pass that advice on to whomever might be lurking on this list or who may be

Re: opaque-identifier scaling (was: Re: [ietf-dkim] ebay / eboy)

2005-11-01 Thread Scott Kitterman
On 11/01/2005 22:11, Douglas Otis wrote: ... On a daily basis, our dynamic lists fluctuate in the millions, What is the antecedent of 'our' in this message? Scott K ___ ietf-dkim mailing list http://dkim.org

Re: [ietf-dkim] Re: is this a problem or not?

2005-10-31 Thread Scott Kitterman
On 10/28/2005 08:11 pm, Frank Ellermann wrote: Stephen Farrell wrote: If the above is possible, how should/can it be avoided? Never ever sign anything that is already signed. Or at the very minimum don't drop signatures. It's the point of DKIM to find some accountable party as near to

Re: [ietf-dkim] Should DKIM drop SSP?

2005-10-27 Thread Scott Kitterman
On 10/26/2005 07:24 pm, Douglas Otis wrote: On Oct 26, 2005, at 3:32 PM, Scott Kitterman wrote: No we should not. Is there anything in this line of reasoning that isn't duplicative of the last time we went through your view on this in August? At that time, if I recall, the problem

Re: [ietf-dkim] Re: Should DKIM drop SSP?

2005-10-27 Thread Scott Kitterman
Doug, So is it your view that DKIM roughly at it stands, with SSP and without your Opaque identifier is fatally flawed and shouldn't go forward? Scott K ___ ietf-dkim mailing list http://dkim.org

Re: [ietf-dkim] Should DKIM drop SSP?

2005-10-26 Thread Scott Kitterman
No we should not. Is there anything in this line of reasoning that isn't duplicative of the last time we went through your view on this in August? Scott Kitterman ___ ietf-dkim mailing list http://dkim.org

RE: [ietf-dkim] Revised threat model

2005-09-01 Thread Scott Kitterman
' or 'lookalike' addresses in a phishing attack. Scott Kitterman ___ ietf-dkim mailing list http://dkim.org

Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?

2005-08-25 Thread Scott Kitterman
certainly said that it (meaning forgery protection) is the application that's of most interest to me. Scott Kitterman ___ ietf-dkim mailing list http://dkim.org

[ietf-dkim] Apology

2005-08-25 Thread Scott Kitterman
It has been brought to my attention off-list that some consider my postings here inappropriate. I'm sorry. That hadn't been my intent. Scott Kitterman ___ ietf-dkim mailing list http://dkim.org

Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?

2005-08-24 Thread Scott Kitterman
Sender Signing Policy (I'm not saying the current draft is perfect) for an uncertain, undesigned, and undocumented automated abuse reporting infrastructure. You get to call this 'simple' from a DKIM perspective only by declaring all this complexity external to DKIM. Scott Kitterman

Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?

2005-08-24 Thread Scott Kitterman
Douglas Otis wrote: On Aug 24, 2005, at 7:00 AM, Scott Kitterman wrote: It seems to me that your proposed approach is anything but simple. It would appear to me that you want to trade the direct, obvious, near- term benifits of a defined deterministic Sender Signing Policy (I'm not saying

Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?

2005-08-24 Thread Scott Kitterman
takes. Scott Kitterman ___ ietf-dkim mailing list http://dkim.org

Re: [ietf-dkim] Not exactly not a threat analysis

2005-08-23 Thread Scott Kitterman
with or the one without SSP or are you saying that's true of either one? Scott Kitterman ___ ietf-dkim mailing list http://dkim.org

Re: [ietf-dkim] Not exactly not a threat analysis

2005-08-23 Thread Scott Kitterman
that there are those who do not want SSP for reasons that aren't clear to me. I'd rather get SSP in scope once and for all and not have to have the scope arguement again after base is published. Same starting line for both, not necessarily the same finish line. Scott Kitterman

Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?

2005-08-22 Thread Scott Kitterman
is a charter that just does that base and defers SSP to some future effort. The charter needs to include both. Scott Kitterman ___ ietf-dkim mailing list http://dkim.org

Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?

2005-08-22 Thread Scott Kitterman
Douglas Otis wrote: On Aug 22, 2005, at 8:35 AM, Scott Kitterman wrote: To summarize, you think that SSP is dangerous, won't do what it's proponents claim, and can't be fixed. Thus SSP and it's ilk shouldn't be dealt with by the working group. You believe that there are other, better

Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?

2005-08-21 Thread Scott Kitterman
personally have very little interest in. I am curious if I'm alone in that regard? If that's all DKIM is for, then I've got better ways to spend my spare time. Thanks, Scott Kitterman ___ ietf-dkim mailing list http://dkim.org

Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?

2005-08-21 Thread Scott Kitterman
Douglas Otis wrote: On Sun, 2005-08-21 at 13:35 -0400, Scott Kitterman wrote: Douglas Otis wrote: This also, I think, brings to light an important reason for the divergence in our perspectives. I believe that you are saying that you think DKIM's usefulness is primarily in supporting

Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?

2005-08-20 Thread Scott Kitterman
surprising and difficult to fathom. Scott Kitterman ___ ietf-dkim mailing list http://dkim.org

Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?

2005-08-20 Thread Scott Kitterman
already. Scott Kitterman ___ ietf-dkim mailing list http://dkim.org

Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?

2005-08-20 Thread Scott Kitterman
blacklist if someone doesn't like my mail? What benifit is being offered that I should risk that? Scott Kitterman ___ ietf-dkim mailing list http://dkim.org

Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?

2005-08-20 Thread Scott Kitterman
Douglas Otis wrote: On Sat, 2005-08-20 at 20:29 -0400, Scott Kitterman wrote: So, given that view, as a sender, what's in it for me? Sounds like all I get is more spam reports and maybe on a domain based blacklist if someone doesn't like my mail? What benifit is being offered that I should

Re: [ietf-dkim] DKIM Threat Analysis v0.06

2005-08-19 Thread Scott Kitterman
in the working group output, but that detailed designs aren't necessary. Perhaps not even that. Perhaps the WG just does the SMTP part? Scott Kitterman ___ ietf-dkim mailing list http://dkim.org

Re: [ietf-dkim] DKIM Threat Analysis v0.06

2005-08-18 Thread Scott Kitterman
of SSP in the working group effort would define as the bad act that DKIM will prevent in the absence of a sender policy of some kind. Scott Kitterman ___ ietf-dkim mailing list http://dkim.org

Re: [ietf-dkim] linkage between originator and handling agent

2005-08-17 Thread Scott Kitterman
information, the question in my mind is what can you do with it? Scott Kitterman ___ ietf-dkim mailing list http://dkim.org

RE: [ietf-dkim] a bit of philosophy on working group productivity andscope

2005-08-14 Thread Scott Kitterman
anything useful. Scott Kitterman ___ ietf-dkim mailing list lt;http://dkim.orggt;

<    1   2   3   4