[ietf-dkim] NO DKIM "POLICY"

2009-02-19 Thread Hector Santos
What is the current recommended method to establish or expose that a DOMAIN should not be signed, is not expected to be signed and that any DKIM supportive receiver seeing a message with a signature from a purported domain should be rejected with full confidence? Will a NULL public key do the t

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-19 Thread Suresh Ramasubramanian
On the lines of "v=spf1 -all" or example.com. IN MX 0 . (mark delany's old mxzerodot proposal)? Yes a null signature could probably do it but something more explicit perhaps to signal that this is not simply breakage? On Thu, Feb 19, 2009 at 11:20 AM, Hector Santos wrote: > What is the curren

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-19 Thread Douglas Otis
On Feb 19, 2009, at 11:20 AM, Hector Santos wrote: > What is the current recommended method to establish or expose that a > DOMAIN should not be signed, is not expected to be signed and that > any DKIM supportive receiver seeing a message with a signature from > a purported domain should be

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-19 Thread Murray S. Kucherawy
On Thu, 19 Feb 2009, Hector Santos wrote: > What is the current recommended method to establish or expose that a > DOMAIN should not be signed, is not expected to be signed and that any > DKIM supportive receiver seeing a message with a signature from a > purported domain should be rejected with

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-19 Thread John Levine
>What is the current recommended method to establish or expose that a >DOMAIN should not be signed, is not expected to be signed and that any >DKIM supportive receiver seeing a message with a signature from a >purported domain should be rejected with full confidence? That's easy: don't publish

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-19 Thread Hector Santos
John Levine wrote: >> What is the current recommended method to establish or expose that a >> DOMAIN should not be signed, is not expected to be signed and that any >> DKIM supportive receiver seeing a message with a signature from a >> purported domain should be rejected with full confidence? >

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-19 Thread Barry Leiba
>> By design, a broken signature is equivalent to no signature. > > Yeah, that RFC 4871 anomaly "Failure Promotion to no signature" always > did baffled me. If either one were "better", attackers would just shift to the better one. It's simple enough to use no signature at all, if no signature is

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-19 Thread Douglas Otis
On Feb 19, 2009, at 2:27 PM, John Levine wrote: >> What is the current recommended method to establish or expose that >> a DOMAIN should not be signed, is not expected to be signed and >> that any DKIM supportive receiver seeing a message with a signature >> from a purported domain should b

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-19 Thread Murray S. Kucherawy
On Fri, 20 Feb 2009, Franck Martin wrote: > Should we not query every time the DNS, to check that this domain will > sign every message as policy and that a non signed message is therefore > invalid? You would then only query for a non-signed message, not every message. > In the case of the eba

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-19 Thread Franck Martin
o-Detected Subject: Re: [ietf-dkim] NO DKIM "POLICY" On Thu, 19 Feb 2009, Hector Santos wrote: > What is the current recommended method to establish or expose that a > DOMAIN should not be signed, is not expected to be signed and that any > DKIM supportive receiver seeing a me

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-19 Thread Hector Santos
Barry Leiba wrote: >>> Levine wrote: >>> >>> By design, a broken signature is equivalent to no signature. > >> Yeah, that RFC 4871 anomaly "Failure Promotion to no signature" always >> did baffled me. > > If either one were "better", attackers would just shift to the better > one. It's simple

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-19 Thread Hector Santos
Murray S. Kucherawy wrote: > On Fri, 20 Feb 2009, Franck Martin wrote: >> Should we not query every time the DNS, to check that this domain will >> sign every message as policy and that a non signed message is >> therefore invalid? > > You would then only query for a non-signed message, not ever

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-20 Thread Hector Santos
Douglas Otis wrote: > On Feb 19, 2009, at 2:27 PM, John Levine wrote: > >>> What is the current recommended method to establish or expose that >>> a DOMAIN should not be signed, is not expected to be signed and >>> that any DKIM supportive receiver seeing a message with a signature >>> from

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-20 Thread Douglas Otis
On Feb 20, 2009, at 11:43 AM, Hector Santos wrote: > Douglas Otis wrote: >> On Feb 19, 2009, at 2:27 PM, John Levine wrote: What is the current recommended method to establish or expose that a DOMAIN should not be signed, is not expected to be signed and that any DKIM support

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-20 Thread Franck Martin
but it can come from @example.com signed by @test.com - Original Message - From: "Douglas Otis" To: "Hector Santos" Cc: ietf-dkim@mipassoc.org Sent: Saturday, 21 February, 2009 8:10:00 AM (GMT+1200) Auto-Detected Subject: Re: [ietf-dkim] NO DKIM "POLICY&q

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-20 Thread Douglas Otis
On Feb 20, 2009, at 1:58 PM, Franck Martin wrote: but it can come from @example.com signed by @test.com This could be described a third-party signature, where test.com should not be considered authoritative for example.com, just as ads.example.com should not be. While test.com may allow

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-20 Thread Franck Martin
Any way to tell someone its signature is used in third party signing? - Original Message - From: "Douglas Otis" To: "Franck Martin" Cc: ietf-dkim@mipassoc.org, "Hector Santos" Sent: Saturday, 21 February, 2009 10:20:39 AM (GMT+1200) Auto-Detected Su

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-20 Thread Hector Santos
Franck Martin wrote: > Any way to tell someone its signature is used in third party signing? AFAIK, not in a standard fashion As Doug pointed out, you can detect that it appears to be 3rd party, but the long debated issue has been how to determine if the 3rd party was "authorized" to sign for t

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-20 Thread Franck Martin
Douglas Otis" , ietf-dkim@mipassoc.org Sent: Saturday, 21 February, 2009 11:59:28 AM (GMT+1200) Auto-Detected Subject: Re: [ietf-dkim] NO DKIM "POLICY" Franck Martin wrote: > Any way to tell someone its signature is used in third party signing? AFAIK, not in a standard fashion

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-21 Thread Hector Santos
Franck Martin wrote: > I see a problem with I allow 3rd party signers. In the case of > a mailing list or forwarder or remailer, it may sign without the > knowledge of the original sender which is acceptable. I just noticed this mailing list is signing as a 3d party: From: Hector Santos

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-21 Thread John Levine
>Any way to tell someone its signature is used in third party signing? No. See the list archives where this issue was beaten to death several times. Remember that invalid signatures are ignored, and signers are already aware of all the valid signatures they've applied. R's, John __

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-21 Thread Hector Santos
John Levine wrote: >> Any way to tell someone its signature is used in third party signing? > > Remember that invalid signatures are ignored, and signers are already > aware of all the valid signatures they've applied. Well, according what I seen by the GMAIL verifier, it is discarding mail wit

Re: [ietf-dkim] NO DKIM "POLICY"

2009-02-21 Thread Jeff Macdonald
On Sat, Feb 21, 2009 at 10:45:34AM +1200, Franck Martin wrote: > Any way to tell someone its signature is used in third party signing? I've been working on something to do just that. Or at least a way to say such signatures are allowed. My understanding of a "third party" signature is an authent