Re: [ietf-dkim] [dkim-ops] key validation question

2011-04-26 Thread Paul Midgen
From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] On Behalf Of Hector Santos Sent: Tuesday, April 12, 2011 12:57 AM To: SM Cc: IETF DKIM WG Subject: Re: [ietf-dkim] [dkim-ops] key validation question SM wrote: > Adding text in RFCs to prevent lies doesn

Re: [ietf-dkim] [dkim-ops] key validation question

2011-04-12 Thread Hector Santos
SM wrote: > Adding text in RFCs to prevent lies doesn't usually solve problems. :-) Sure, but that is what h= attempts to trap using another level of authenticity requirements. We can categorized that scenario many ways but its simply about the domain trying to exclude an method a "bad guy" ca

Re: [ietf-dkim] [dkim-ops] key validation question

2011-04-11 Thread SM
Hi Hector, I don't feel strongly about the change. At 22:59 11-04-2011, Hector Santos wrote: >But the domain must not lie, which was one of the OP's concern, so I >think additional text to require the signer to use one of the h= specified. Adding text in RFCs to prevent lies doesn't usually sol

Re: [ietf-dkim] [dkim-ops] key validation question

2011-04-11 Thread Hector Santos
SM wrote: > [I suggest following up on the DKIM WG mailing list] > > You are restating a MUST. :-) I agree that it is important. The > problem here is that it still leads to various interpretations due to > the keywords. > > I'll try rewriting the text in Section 3.6.1: > > h= Accepta

Re: [ietf-dkim] [dkim-ops] key validation question

2011-04-11 Thread Tony Hansen
ipassoc.org; IETF DKIM WG >> Subject: Re: [ietf-dkim] [dkim-ops] key validation question >> >> Mr Nit Picker suggests: >> >> Refer to Section 3.3 for a discussion of the hash algorithms >> implemented by Signers and Verifiers. The algorithms liste

Re: [ietf-dkim] [dkim-ops] key validation question

2011-04-11 Thread Murray S. Kucherawy
> -Original Message- > From: dkim-ops-boun...@mipassoc.org [mailto:dkim-ops-boun...@mipassoc.org] On > Behalf Of Tony Hansen > Sent: Monday, April 11, 2011 2:40 PM > Cc: dkim-...@mipassoc.org; IETF DKIM WG > Subject: Re: [dkim-ops] [ietf-dkim] key validation question > > >> Mr Nit Picker

Re: [ietf-dkim] [dkim-ops] key validation question

2011-04-11 Thread Murray S. Kucherawy
> -Original Message- > From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-boun...@mipassoc.org] > On Behalf Of John R. Levine > Sent: Monday, April 11, 2011 12:34 PM > To: SM > Cc: dkim-...@mipassoc.org; IETF DKIM WG > Subject: Re: [ietf-dkim] [dkim-ops] ke

Re: [ietf-dkim] [dkim-ops] key validation question

2011-04-11 Thread John R. Levine
> Please refer to Section 3.3 for a discussion of the hash algorithms > implemented by Signers and Verifiers. Which algorithms are listed > in h= is an operational choice made by the sender. Mr Nit Picker suggests: Refer to Section 3.3 for a discussion of the hash

Re: [ietf-dkim] [dkim-ops] key validation question

2011-04-11 Thread SM
Hi Tony, [I suggest following up on the DKIM WG mailing list] At 08:07 11-04-2011, Tony Hansen wrote: >The MUSTs *are* redundant with section 3.3's first paragraph. However, >it's still important. > >If this section were rewritten, I'd suggest something like this: > > h= Acceptable hash algo