[ietf-dkim] DKIM 3rd party Authorization using DKIM-Conditional

2018-02-12 Thread Hector Santos
On 2/12/2018 12:40 PM, John R. Levine wrote: Just for fun I sent in a new I-D of the dkim-conditional draft that takes out version numbers and adds feature tags in a backward compatible way. https://datatracker.ietf.org/doc/draft-levine-dkim-conditional/ +1. But just for fun? I wish you wou

Re: [ietf-dkim] DKIM and EAI

2017-12-06 Thread Hector Santos
+1. I think there are parsing issues to be highlighted. Do you decode first, then extract the Author Domain or extract first before decoding? etc. On 12/5/2017 10:27 PM, John R. Levine wrote: If I may change the topic for a moment ... I'm working on some stuff for ICANN to help people ge

Re: [ietf-dkim] [dmarc-ietf] a slightly less kludge alternative to draft-kucherawy-dmarc-rcpts

2016-11-17 Thread Hector Santos
not require you to accept the mail for the hard reject policy (-ALL). Hector, the reality is that most mailbox providers do not reject on SPF -all because so many senders don't understand what they are "saying" with -all and the mailbox providers are the ones who get the com

Re: [ietf-dkim] [dmarc-ietf] a slightly less kludge alternative to draft-kucherawy-dmarc-rcpts

2016-11-17 Thread Hector Santos
On 11/16/2016 1:09 PM, Terry Zink wrote: This means ARC will be needed not only for mailing lists which modify the header or body of an email, but for EVERY mailing list and EVERY forwarded email or EVERYTIME the recipient has been modified and the email leaves the ADMD boundary. From a DMARC p

Re: [ietf-dkim] [dmarc-ietf] a slightly less kludge alternative to draft-kucherawy-dmarc-rcpts

2016-11-16 Thread Hector Santos
On 11/16/2016 8:03 AM, Murray S. Kucherawy wrote: That's not correct. The verifying MTA, if it doesn't know the new tags, is unaffected by the new tags because RFC6376 directs the verifier to ignore them. It's as if they weren't there. Do you have any data with unknown tag recordings addin

Re: [ietf-dkim] [dmarc-ietf] draft-kucherawy-dmarc-rcpts

2016-11-14 Thread Hector Santos
On 11/13/2016 1:50 AM, Murray S. Kucherawy wrote:> I've posted a draft that attempts to address an attack that's begun to appear with DKIM. Interestingly, we called it out as a possible attack in RFC6376 and even RFC4871, but now it's apparently happening and being annoying enough that people (I

Re: [ietf-dkim] DKIM Key Size Reporting Methods

2015-05-13 Thread Hector Santos
On 5/13/2015 3:19 PM, Hector Santos wrote: > There are several ways to offer the DKIM key size expectation for > Receiver local policies to deal with: > > 1) Report the bit size in Authentication-Results (Auth-Res) header. > > Authentication-Results: mail.example.com &

[ietf-dkim] DKIM Key Size Reporting Methods

2015-05-13 Thread Hector Santos
There are several ways to offer the DKIM key size expectation for Receiver local policies to deal with: 1) Report the bit size in Authentication-Results (Auth-Res) header. Authentication-Results: mail.example.com dkim=pass . bitsize=num-bits; 2) Add a DMARC tag extension "ess="

Re: [ietf-dkim] DKIM Key Size Constraints

2015-05-13 Thread Hector Santos
On 5/13/2015 7:31 AM, Scott Kitterman wrote: > > DKIM is a security protocol. I find it very odd to claim that the security > part of a security protocol isn't part of the protocol. Good point. But we did take it into account. As you point out, the APIs seem to have limited the size. > While I

Re: [ietf-dkim] DKIM Key Size Constraints

2015-05-13 Thread Hector Santos
On 5/13/2015 1:25 AM, Roland Turner wrote: > On 05/13/2015 12:27 PM, Murray S. Kucherawy wrote: > >> https://sourceforge.net/p/opendkim/bugs/221/) appears to agree with >> what I'm saying above. When talking about unacceptably small keys, >> the "unacceptable" decision is not made by the protocol,

Re: [ietf-dkim] DKIM Key Size Constraints

2015-05-13 Thread Hector Santos
IMO, this suggestion would be better as an Informational and BCP note. I don't think it warrants a change to STD76. We went through this already. We (DKIM WG) were well aware of the weakness of a smaller key but we had backward compatibility concerns so the proper verification migration pat

Re: [ietf-dkim] DKIM Key Size Constraints

2015-05-12 Thread Hector Santos
On 5/12/2015 11:31 AM, Martijn Grooten wrote: >> Why remove 512 support from the verification side? Does this mean the >> verifier will take valid 512 signature and make it invalid, no signature >> message? Is there a correlation out there that 512 bits signers are more >> prune to be Bad Guys? S

Re: [ietf-dkim] DKIM Key Size Constraints

2015-05-12 Thread Hector Santos
STD76, DKIM is an Internet Standard, already has a Signer/Verifier migration path in section 3.3 towards the higher key with backward compatibility support for the verification of the smaller key. Why remove 512 support from the verification side? Does this mean the verifier will take valid 51

Re: [ietf-dkim] DKIM Key Size Constraints

2015-05-12 Thread Hector Santos
theoretical exploit in action and its easily addressable with all the current DKIM features and options. On 5/12/2015 8:56 AM, Scott Kitterman wrote: > On May 12, 2015 7:28:25 AM EDT, Hector Santos wrote: >> -1 >> >> Please stop! No more DKIM code changes ok? The IETF just m

Re: [ietf-dkim] DKIM Key Size Constraints

2015-05-12 Thread Hector Santos
-1 Please stop! No more DKIM code changes ok? The IETF just made it a STD. Maybe we should remove the STD status first, move it back to proposed standard or experimental if this and other changes are coming. If signers want 1024 bits, then can do so ready. -- HLS On 5/11/2015 1:06 PM, Scot

Re: [ietf-dkim] Fwd: Request to move RFC 5617 (ADSP) to Historic

2013-09-12 Thread Hector Santos
On 9/12/2013 3:28 PM, Dave Crocker wrote: > > There seems to be a pattern that has developed, of demanding that > failure mean literally no adoption. It doesn't mean that. It means > that it has no community traction. ADSP more than qualifies on the > pragmatics of failure. > > d/ > The pragmat

Re: [ietf-dkim] Fwd: Request to move RFC 5617 (ADSP) to Historic

2013-09-11 Thread Hector Santos
This will require a substantial review before any change of status is done and should be done as part of WG working on Domain Policies. There is already substantial work with ADSP and APIs implemented and deployed. We continue to get world wide usage of our ADSP zone record generator wizard:

Re: [ietf-dkim] Seeking Clarification of the l= Tag

2013-08-04 Thread Hector Santos
On 8/4/2013 4:35 PM, Pawel Lesnikowski wrote: > There are few details I'd like to clarify. > > Body hash for this message is correctly computed by the sender. > Entire signature of this message in fact valid - this is why Port25, > Gmail, and Mail.dll validate DKIM signature with 'pass' result. >

Re: [ietf-dkim] The problem with the DKIM design community

2013-07-02 Thread Hector Santos
On 7/2/2013 10:11 AM, Murray S. Kucherawy wrote: > On Mon, Jul 1, 2013 at 12:24 PM, Michael Deutschmann < > mich...@talamasca.ocis.net> wrote: > >> On Mon, 1 Jul 2013, Alessandro Vesely wrote: >>> Well, not really. MAIL FROM: is only visible after delivery, so to >>> avoid dangling signatures on

Re: [ietf-dkim] The problem with the DKIM design community

2013-06-23 Thread Hector Santos
Oh, I didn't know there was a requirement for one to have IMPLEMENTED and DEPLOYED proposed protocols before one can have any sort of engineering insight into problems and their resolutions? I'm sure that is not what you mean. Sure, it helps, but keep in mind DKIM itself was engineered with li

Re: [ietf-dkim] Weird i= in client mail

2013-06-21 Thread Hector Santos
There are a number of domains supporting ADSP, ATPS and ASL records. There is a healthy set of world-wide usage at our ADSP Wizard [1]. The problem is I doubt anyone is "ACTING" on any strong policy rule. That was one of the chief complaint among the policy advocates (vendors) with the first se

[ietf-dkim] DKIM promotion to Internet Standard status

2013-05-29 Thread Hector Santos
M overview (RFC5585) informational publications. Perhaps some update in the future can correct this design and market inconsistency and explicitly provide knowledge of the alternative frameworks available for DKIM. -- Hector Santos, CTO Santronics Sof

Re: [ietf-dkim] Authentication-Results

2013-03-26 Thread Hector Santos
Our "extant" product supports AUTH-RES for DKIM and ADSP. Without a thorough review again and confirmation, I feel, unfortunately, probably not 100% according your specification. At the time it was implemented, over a few years ago, I had found it inadequate to cover all bases. I do recall it

Re: [ietf-dkim] The good ol' "t=" tag in key records

2012-07-23 Thread Hector Santos
Barry Leiba wrote: > > That said, I'm inclined to agree with Mike T that input from the > reputation target is suspicious, so it's not clear how much value it > will have nor whether it might be gamed (by the reputation target) or > hacked (by someone wanting to hurt the target's reputation). It

Re: [ietf-dkim] The good ol' "t=" tag in key records

2012-07-23 Thread Hector Santos
Murray S. Kucherawy wrote: > On Mon, Jul 23, 2012 at 7:28 AM, Dave Crocker wrote: > >> Here are two small tweaks that might correct things: >> >> y This domain is testing DKIM. Verifiers MUST NOT treat messages >> from Signers in testing mode differently from unsigned email. >>

Re: [ietf-dkim] The good ol' "t=" tag in key records

2012-07-22 Thread Hector Santos
John R. Levine wrote: >> I've opened a ticket to arrange that "t=y" suppresses any positive impact >> domain reputation has in the next version of OpenDKIM, as an experiment. > > I'm inclined to leave well enough alone. That wouldn't have been an > unreasonable interpretation six years ago when

Re: [ietf-dkim] The good ol' "t=" tag in key records

2012-07-22 Thread Hector Santos
Murray S. Kucherawy wrote: > And you thought this list was dead. > > I was asked to consult recently on some DKIM questions raised by a customer > of a former employer. The questions involved the meaning of "t=" in DKIM > keys and the text in RFC6376. The focus of this tag has always been, to >

[ietf-dkim] ATPS Testing

2012-01-10 Thread Hector Santos
stalled customer servers. In the mean time, here is our auto-responder email address: dkim-autoresp...@isdg.net And for those with OpenDKIM setups exploring this, we have a wizard at this URL to help prepare your records: http://www.winserver.com/public/wcadsp --

[ietf-dkim] DKIM WG Greylisting

2012-01-10 Thread Hector Santos
ad of member's submissions. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] Doublefrom, ADSP and mailing lists in perspective,

2011-07-29 Thread Hector Santos
y our needs... > > Apropos rocket science, at our current rate of progress we risk > outliving the Space Shuttle program. > > > Mark. > ___ > NOTE WELL: This list operates according to > http://mipassoc.org/dkim/ietf-list-rule

Re: [ietf-dkim] Doublefrom, ADSP and mailing lists in perspective,

2011-07-29 Thread Hector Santos
- break it enough to make sure there is controversy and conflict to create an IETF no consensus. Hey, I'm all for proving me wrong. Please do so. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: T

Re: [ietf-dkim] Doublefrom, ADSP and mailing lists in perspective,

2011-07-28 Thread Hector Santos
as a Work-In-Progress still missing a viable > policy layer. +1. But 5+ years WIP? :) It wasn't rocket science. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates ac

Re: [ietf-dkim] Doublefrom, ADSP and mailing lists in perspective,

2011-07-28 Thread Hector Santos
ning local mail pickups. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com Michael Deutschmann wrote: > On Wed, 27 Jul 2011, Douglas Otis wrote: >> Your fix will not control phishing or spoofing abuse and would expose >> these domains to open-ended sources

Re: [ietf-dkim] Draft on email transition to IPv6 from IPv4 for sevice providers and other communities

2011-07-24 Thread Hector Santos
is a > function of the number of clients (malicious or otherwise) rather than > the address space they use. Are you anticipating a larger number of > new SMTP clients as a consequence of IPV6? > > > Mark. > ___ > NOTE WELL: This lis

[ietf-dkim] Issue: 6.1 treatment of bad signature

2011-07-10 Thread Hector Santos
valid signature requirement as outlined in section 6.0, a verifier SHOULD NOT treat a message that has one or more bad signatures and no good signatures differently from a message with no signature at all. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com

Re: [ietf-dkim] Final update to 4871bis for working group review

2011-07-10 Thread Hector Santos
t, and what other information they > take into account is carefully not said). The malicious signer is hoping > that the treatment his scam gets is favourable enough to get past the > assessor unscathed and so reach that lenient MUA, where the real damage > happens. > >

Re: [ietf-dkim] Doublefrom language should be in ADSP, not core

2011-07-10 Thread Hector Santos
cted. Michael Deutschmann wrote: > On Sun, 10 Jul 2011, Hector Santos wrote: >> Now of course, if ADSP was a standard and whitehouse.com had an >> exclusive signing policy, receivers would of rejected the junk >> distributed by Dave's list server as an ADSP violation. But

Re: [ietf-dkim] Doublefrom language should be in ADSP, not core

2011-07-10 Thread Hector Santos
pects of the protocol BROKE down when it was separated and we never got over it. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] Final update to 4871bis for working group review

2011-07-08 Thread Hector Santos
/receiver can do a lot here, but I personally don't like to be playing these games and we don't know how other software will behave, so I would prefer to just kick out damaged mail - even when its possible to validate one of the multiple froms. -- Hector Santos

[ietf-dkim] One From DKIM Rule

2011-07-08 Thread Hector Santos
dress legacy signers and verifiers, which includes receivers or internal mail creators don't allow multiple from headers. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates a

Re: [ietf-dkim] Final update to 4871bis for working group review

2011-07-07 Thread Hector Santos
he h= setting to be flexible for the operator, then they can add it (we add it by default) as a short term solution. In the long term, I don't think it has to be used, but then again, I am strongly basing that that most DKIM implementations will eventually use a ONE FROM RULE

[ietf-dkim] Duplicate Signatures in a distribution with same payload

2011-07-06 Thread Hector Santos
correct, including time wise, given the fact the payload is 100% exact? Just wondering how much time I should spent on what appears to be one of the final considerations for our new revision of DKIM implementation. Thanks -- Hector Santos, CTO http://www.santronics.com http

Re: [ietf-dkim] Final update to 4871bis for working group review

2011-07-06 Thread Hector Santos
egrate it with DKIM and they need to dot all the eyes, cross all the t's in their integration. If they have software control of their DKIM stuff, its probably a good idea to make their the Verifier and Signer has a One From DKIM Rule concept as cited in my previous post and the specs

Re: [ietf-dkim] Final update to 4871bis for working group review

2011-07-06 Thread Hector Santos
gt; time [...etc...]" > > Barry, as participant > ___ > NOTE WELL: This list operates according to > http://mipassoc.org/dkim/ietf-list-rules.html > > -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] Final update to 4871bis for working group review

2011-07-03 Thread Hector Santos
Its a complex beast. But completing it, at the very least, I can use the "official completion announcement" as part of our marketing. PS: We resolved the overhead issues with DKIM signing so we are now ready to go. :) -- Hector Santos, CTO http://www.santronics.com http://santronics.bl

Re: [ietf-dkim] New canonicalizations

2011-05-30 Thread Hector Santos
er. We need to deal with that, for sure, as a highlighted signer recommendation targeting list mail. But as the table above shows, without the fix it doesn't matter. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com

Re: [ietf-dkim] New canonicalizations

2011-05-29 Thread Hector Santos
Alessandro Vesely wrote: > On 27/May/11 19:16, Murray S. Kucherawy wrote: >> I'm all for including experimental code in future releases of our >> stuff, especially if it's an experiment other implementations are >> trying. But I need to see a spec first, or enough detail that I >> could write one.

[ietf-dkim] DKIMnomics

2011-05-28 Thread Hector Santos
Alessandro Vesely wrote: > On 25/May/11 20:23, Dave CROCKER wrote: >> That's not likely to be the goal of this sort of exercise. Rather, it >> will be to choose a set of particular types of breakage, ignoring others. >> For an effort like that, it is not meaningful to come up with additional

Re: [ietf-dkim] MLMs and signatures again

2011-05-27 Thread Hector Santos
Hector Santos wrote: > MH Michael Hammer (5304) wrote: >> >> Remember, it's not static, it's dynamic. What was a non-phished domain >> yesterday could be a phished domain today or tomorrow. DKIM isn't a >> magic bullet, it's one more tool in the tool

Re: [ietf-dkim] New canonicalizations

2011-05-27 Thread Hector Santos
Who it happens to (the messenger), is a very important factor in all this. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] MLMs and signatures again

2011-05-27 Thread Hector Santos
Hector Santos wrote: > John R. Levine wrote: > >> These days most subscriptions are entered on a web page, and if you're >> lucky the mailer will send a confirmation message with a URL that sends >> the subscriber back to the web page. Where's the MTA go

Re: [ietf-dkim] MLMs and signatures again

2011-05-27 Thread Hector Santos
ombination with SPF it works very nicely on double fail and none/fail > as far as catching badness with very little impact on legitimate mail. > What sort of phishing are we talking about? Identities or the context? -- Hector Santos, CTO http://

Re: [ietf-dkim] MLMs and signatures again

2011-05-27 Thread Hector Santos
target that includes the address you directed replies to. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] MLMs and signatures again

2011-05-27 Thread Hector Santos
our own local side lists, not others and that will scale just fine. The only thing is that it may be two separate applications (SMTP and MLS) so interfacing them would be an implementation question. Generally, an accept or forwarding file is use

Re: [ietf-dkim] MLMs and signatures again

2011-05-26 Thread Hector Santos
n its checking especially with the terrible accept/bounce problem everyone is trying to avoid with SMTP rejects. I am just saying, it will help to know to some extent what is the make up of the collection you have from a pre-filter standpoin

Re: [ietf-dkim] MLMs and signatures again

2011-05-26 Thread Hector Santos
. Before that, it was in the 1-4% range. So if most of the 6% SPF rejects are spoof attempts on our domains, then I have no reason to believe that DKIM plus our ADSP/ATPS/ASL policies would not yield the same result. Hector Santos wrote: > MH Michael Hammer (5304) wrote: > >> The ot

Re: [ietf-dkim] MLMs and signatures again

2011-05-26 Thread Hector Santos
t, but I am going to try turning off SPF for my domains and see if I get the expected 100% "would-be" rejects based on DKIM and my ADSP policies. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com __

Re: [ietf-dkim] MLMs and signatures again

2011-05-26 Thread Hector Santos
r specific LIST-ID among other things for acceptance or rejection. But thats local policy and not a stock script we distribute. And now with DKIM, I am exploring similar scripts checking LIST-ID to match the signing side where the List-ID is used for signing specific list only when its going o

Re: [ietf-dkim] MLMs and signatures again

2011-05-26 Thread Hector Santos
have an official SMTP reject, and want the list server to create a non-bounce notification. But I can see where this be a good idea to do now - SMTP level rejects with response text "User not member of so and so list." -- Hector Santos, CTO http://www.santronics.com http://santronics.blog

Re: [ietf-dkim] MLMs and signatures again

2011-05-26 Thread Hector Santos
nless all the list software and/or operators add Plug and Play hooks, to do the "Always Resign" thing you want, we will always have the problems for a very long time. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com John R. Levine wrote: >> Perh

Re: [ietf-dkim] MLMs and signatures again

2011-05-26 Thread Hector Santos
check for member subscription. I guess if the RECEIVER is a List Server SMTP Server, then its database will be easily accessible to do a member check at SMTP level. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE W

Re: [ietf-dkim] MLMs and signatures again

2011-05-26 Thread Hector Santos
Steve Atkins wrote: > On May 26, 2011, at 1:50 PM, Hector Santos wrote: >> If by traditional, you mean the members are vetted with subscription >> and confirmation, then this tends to be true. But when not, when the >> list or any group forum is anonymous in nature, histo

Re: [ietf-dkim] MLMs and signatures again

2011-05-26 Thread Hector Santos
irmation, then this tends to be true. But when not, when the list or any group forum is anonymous in nature, history has told us its get corrupted with junk and most people tend to dislike it. -- Hector Santos, CTO http://www.santronics.com http://sant

Re: [ietf-dkim] DKIM Scouts, was 8bit downgrades

2011-05-26 Thread Hector Santos
one reason only - you can't assume everyone is going to resign yet alone add DKIM to their software. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] DKIM Scouts, was 8bit downgrades

2011-05-26 Thread Hector Santos
Ian Eiloart wrote: > On 26 May 2011, at 12:46, Hector Santos wrote: > >> In principle, passthru mail should not be tampered, but MLM list mail are >> the industry accepted exception to this non-tampering tradition and today >> (at least in the USA), it is CAN-SPAM leg

Re: [ietf-dkim] New canonicalizations

2011-05-26 Thread Hector Santos
ly one of the simpler C14N issues to deal with. It may be minor, but it still an issue for a LIST that DKIM mail passes thru. I feel should be part of a DKIM C14N consideration and also an MLM awareness issue, not necessary for my sake but for DKIM sake. -- Hector Santos, CTO http://www.santro

Re: [ietf-dkim] DKIM Scouts, was 8bit downgrades

2011-05-26 Thread Hector Santos
essage [Click for Signer Options] then the exclusively mutual (radio) option is automatically unchecked.: (_) Keep Original Submission Integrity because it doesn't matter any more when the MLM is always (re)signing. Anyway, IMV, what people need is insights and let them make their own decisions b

Re: [ietf-dkim] New canonicalizations

2011-05-26 Thread Hector Santos
ely, it also comes with a change requirement. At the end of the day, no matter what, people software (Old and New) need to change to make DKIM work better. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] New canonicalizations

2011-05-26 Thread Hector Santos
Alessandro Vesely wrote: >> Hector wrote: >> 4 - Lines over 998 (1000 with CRLF), this is an invalid RFC5322, but >> its possible some verifiers are designed to do a buffered C14N >> and don't check for RFC5322 line lengths between two memory points >

Re: [ietf-dkim] DKIM Scouts, was 8bit downgrades

2011-05-25 Thread Hector Santos
ven if TBIRD doesn't have its own table, when the user tries to save it, Windows will most likely make the shell association. BTW, under OE, while it does show the SMIME.P7S icon attachment, the message display is blank. That may be related to what you are talking about. In any case, i

Re: [ietf-dkim] 8bit downgrades

2011-05-25 Thread Hector Santos
Scott Kitterman wrote: > On Wednesday, May 25, 2011 02:04:45 PM Hector Santos wrote: > ... >> When I remove the domains I know, the rest is pretty much spam. > ... > > Isn't that pretty generally true, DKIM or no DKIM. Sure, in general I would agree with that and m

Re: [ietf-dkim] 8bit downgrades

2011-05-25 Thread Hector Santos
% failure NEW: 4.8% failure and the major contributor to this is that I have no more facebookmail.com failures! When I remove the domains I know, the rest is pretty much spam. :) Hector Santos wrote: > Alessandro Vesely wrote: > >> For example, MTAs that autoconvert from quoted-print

Re: [ietf-dkim] New canonicalizations

2011-05-25 Thread Hector Santos
ng: >> >> 5 - Incorrect handling of lines beginning with dots, for example >> I sent a message containing a line beginning with: > > Yes, dot is one of the punctuation characters that should be removed. This turned out to be a bug in our beta code, r

Re: [ietf-dkim] New canonicalizations

2011-05-25 Thread Hector Santos
Alessandro Vesely wrote: > On 25/May/11 10:03, Hector Santos wrote: >> How would 7/8 bit be considered? >> >> Personally, the STRIP C14N idea would work just fine by removing all >> trailing WSP (CR, LF, SP) and for QP text, decode it first. I'm >> consi

Re: [ietf-dkim] New canonicalizations

2011-05-25 Thread Hector Santos
e encountered. - MLM that add an extra line at the top (possibly because of any empty header file of size 2, crlf) - Intermediaries that expand QP to 8 bit - Intermediaries that reformat to BASE64 I personally have not seen anything else. -- Hector Santos, C

Re: [ietf-dkim] DKIM Scouts, was 8bit downgrades

2011-05-24 Thread Hector Santos
l agree it's fine. Not in Thunderbird V2.0, V3.1. It knows nothings about your signature - Click View | Message Security Info and it says: Message Has No Digital Signature Message Not Encrypted What version of TBird did you use? -- Sincerely Hector S

Re: [ietf-dkim] DKIM Scouts, was 8bit downgrades

2011-05-24 Thread Hector Santos
rnet for >> Dummies", >> Please consider the environment before reading this e-mail. http://jl.ly > > > _______ > NOTE WELL: This list operates according to > http://mipassoc.org/dkim/ietf-list-rules.html > > -- Hector S

Re: [ietf-dkim] DKIM Scouts, was 8bit downgrades

2011-05-24 Thread Hector Santos
Franck Martin wrote: >> Steve Atkins mentioned: >>> This (entirely RFC valid yet completely broken) behaviour has bitten me >>> a couple of times. > Hector followed up: >> +1 >> >> If everyone (mail transport/mail handlers) just followed the basic &g

[ietf-dkim] DKIM Scouts, was 8bit downgrades

2011-05-24 Thread Hector Santos
t in principle, intermediaries need to refrain from thinking they know better for downlinks. hmmm, perhaps "DKIM Scouts" :) -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] 8bit downgrades

2011-05-24 Thread Hector Santos
are seeing it now, its because of this DKIM integrity invention highlight the issues. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] 8bit downgrades

2011-05-24 Thread Hector Santos
Ian Eiloart wrote: > On 23 May 2011, at 17:10, Hector Santos wrote: > >> Rhetorically, why not? Put another way, why should a receiver >> tolerate failure, or better, why should DKIM itself - the technology >> - tolerate failure? Sounds like DKIM has some inner soul t

[ietf-dkim] Perfect Solution (FDS), was dot-forward, was 8bit downgrades

2011-05-24 Thread Hector Santos
ernet for > Dummies", > Please consider the environment before reading this e-mail. http://jl.ly > ___ > NOTE WELL: This list operates according to > http://mipassoc.org/dkim/ietf-list-rules.

Re: [ietf-dkim] 8bit downgrades

2011-05-23 Thread Hector Santos
is pretty much nothing. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] Last Call: (DKIM And Mailing Lists) to BCP

2011-05-23 Thread Hector Santos
heir own bee's wax if they see an unexpected, unsolicited, unknown, unauthorized non-first party DKIM signed mail when the author domain may have a policy that says "Thats a NO NO" Dave, you got receivers all twisted up in knots! -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] 8bit downgrades

2011-05-23 Thread Hector Santos
Alessandro Vesely wrote: > On 23/May/11 06:35, Hector Santos wrote: >> Alessandro Vesely wrote: >> >>> For example, MTAs that autoconvert from quoted-printable to 8bit, a >>> rather common circumstance. >> I did the following Content-Transfer-Encoding failure

Re: [ietf-dkim] 8bit downgrades

2011-05-23 Thread Hector Santos
Ian Eiloart wrote: > On 23 May 2011, at 15:19, Hector Santos wrote: >>> But why skip? Usually the message won't be downgraded. And even if they >>> are, usually a broken signature will cause no harm. >> Thats the problem - define "usually" and also de

Re: [ietf-dkim] New canonicalizations

2011-05-23 Thread Hector Santos
ange and even within the core headers, it definitely should avoid signing headers that are guarantee to change based on a known path it will take - like for an MKM, consider not hashing the 5322.Subject tag and use "l=" when the target path is known to be a list adding a footer. So with th

Re: [ietf-dkim] 8bit downgrades

2011-05-23 Thread Hector Santos
Ian Eiloart wrote: > On 20 May 2011, at 05:24, Hector Santos wrote: > >> In this case, if this is enforced with a MUST, for a system that is >> not 8BITMIME ready but is adding DKIM signing support, to remain >> compliant it is far more feasible to add a rule to a DK

Re: [ietf-dkim] New canonicalizations

2011-05-23 Thread Hector Santos
Charles Lindsey wrote: > On Mon, 23 May 2011 03:50:06 +0100, Hector Santos wrote: >> >> It would of been nice to have some DKIM-Signature flag that might >> indicate the Content-Transfer-Encoding, i.e.: >> >> et="base64" <--- copy of the top

Re: [ietf-dkim] 8bit downgrades

2011-05-22 Thread Hector Santos
oing thru a list. It would be interesting to see what Murray can show for his volume collection. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dki

Re: [ietf-dkim] Certifying the DKIM public key?

2011-05-22 Thread Hector Santos
rs do not have a common source to do this and even then, they may only want to do this for selected VBR records, Author Domains and signers. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] New canonicalizations

2011-05-22 Thread Hector Santos
nbase64 before hash verification. Of course, it still would of failed due to the list footer so, but if l= was used, there is some avenue for success. The main realization is that Sender/Signers need to be more aware of the target/path if they desire a higher rate of return. -- H

Re: [ietf-dkim] 8bit downgrades

2011-05-22 Thread Hector Santos
Murray S. Kucherawy wrote: > Hector Santos followed up Crocker'ss passing of the buck: >> >> Please refrain from passing the buck to the WG. The document editors >> are: >> >> D. Crocker (editor) >> Tony Hansen (editor) >> M.

Re: [ietf-dkim] 8bit downgrades

2011-05-22 Thread Hector Santos
sign mail While that may be a functional description of a fallback, we don't have the automated technical capability to define it reliably. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Re: [ietf-dkim] 8bit downgrades

2011-05-22 Thread Hector Santos
synergism with past or concurrent document productions, lost of WG interest participation with a resultant Consensus by Osmosis process, and frankly, all of which, all reflected a mark of poor leadership. In this case (8BIT Downgrades), it is my view the SHOULD language is fine and was quite fitting the understood technical feasibility realities. -- Hector Santos, CTO http://www.santronics.com http://santronics.blogspot.com ___ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

[ietf-dkim] DKIM Requirements Summary

2011-05-20 Thread Hector Santos
y ignore unlikely domains |8.13 | | |X| | | | | | | | | | | | | +---+ FootNotes 1. No explicit statement for signer and sha1 2. is a NULL string an asciiz Str

Re: [ietf-dkim] 8bit downgrades

2011-05-20 Thread Hector Santos
r and before the beginning of the body content. See the slippery slope? What do we expect will happen in the future when the MLMs are more DKIM aware, and the 8bit streams are not altered to the extent that DKIM faults are negligible and this MUST is now doing need

Re: [ietf-dkim] 8bit downgrades

2011-05-19 Thread Hector Santos
Pete Resnick wrote: > On 5/19/11 6:52 PM, Hector Santos wrote: >> SHOULD is an optional requirement - Its a recommendation for the >> better, but things will not break things for your peers if you don't >> follow it. You may be shamed but the person shaming you i

Re: [ietf-dkim] 8bit downgrades

2011-05-19 Thread Hector Santos
We don't have any great insight into the warts > of what paths are likely to downcode a message and what paths aren't, > so I would prefer not to purport to offer advice about it. We do have great insight - Don't Tamper with Passthru mail - that should be the advice burn into sy

Re: [ietf-dkim] 8bit downgrades

2011-05-19 Thread Hector Santos
LD be converted to 7-bit MIME by an MUA or MSA prior to presentation to the DKIM So I don't even know why we are talking about this. If its out of scope how we can contemplate a MUST here. I concur with Levine, take it out. -- Hector Santos, CTO http://www.santronic

  1   2   3   4   5   6   7   8   9   10   >