Issue 1527 - Threats (was Re: [ietf-dkim] Hostile to DKIM deployment)

2007-12-14 Thread Dave Crocker
Jim Fenton wrote: Wietse Venema wrote: What is the relevance of this for the current effort? I have nothing against an SSP that says what mail if any a domain signs or sends. Like many, I would use that to throw away some mail. But it would be a mistake to position SSP as the solution for

Re: Issue 1527 - Threats (was Re: [ietf-dkim] Hostile to DKIM deployment)

2007-12-14 Thread Hector Santos
Dave Crocker wrote: Right. So let's explore what current problems specific functions in SSP will mitigate. Folks who are proponents of particular SSP features should document specific threats and specific SSP feature(s) that will mitigate them. An essential part of such exercise is to

Re: Issue 1527 - Threats (was Re: [ietf-dkim] Hostile to DKIM deployment)

2007-12-14 Thread Dave Crocker
Michael Thomas wrote: Any sort of analysis needs to keep in mind that although SSP thwarts a relatively narrow set of attacks in and of itself, it could well be useful in conjunction with various phishing filtering heuristics, reputation, and the like which are all outside of the scope

Re: Issue 1527 - Threats (was Re: [ietf-dkim] Hostile to DKIM deployment)

2007-12-14 Thread Dave Crocker
Stephen Farrell wrote: An essential part of such exercise is to explain why the mitigation is strategic. That is, why will it not be easy for attackers to work around the SSP mechanism and achieve equivalent attack success. Modulo look-alike domains I guess? (There's text in 4868, 4.2.1

Re: Issue 1527 - Threats (was Re: [ietf-dkim] Hostile to DKIM deployment)

2007-12-14 Thread Stephen Farrell
Dave Crocker wrote: Right. So let's explore what current problems specific functions in SSP will mitigate. Folks who are proponents of particular SSP features should document specific threats and specific SSP feature(s) that will mitigate them. I think that'd be useful. Of course,

Re: Issue 1527 - Threats (was Re: [ietf-dkim] Hostile to DKIM deployment)

2007-12-14 Thread Steve Atkins
On Dec 14, 2007, at 9:32 AM, Stephen Farrell wrote: Dave Crocker wrote: Right. So let's explore what current problems specific functions in SSP will mitigate. Folks who are proponents of particular SSP features should document specific threats and specific SSP feature(s) that will

Re: Issue 1527 - Threats (was Re: [ietf-dkim] Hostile to DKIM deployment)

2007-12-14 Thread Michael Thomas
Steve Atkins wrote: On Dec 14, 2007, at 9:32 AM, Stephen Farrell wrote: Dave Crocker wrote: Right. So let's explore what current problems specific functions in SSP will mitigate. Folks who are proponents of particular SSP features should document specific threats and specific SSP

Re: Issue 1527 - Threats (was Re: [ietf-dkim] Hostile to DKIM deployment)

2007-12-14 Thread Steve Atkins
On Dec 14, 2007, at 10:10 AM, Michael Thomas wrote: Steve Atkins wrote: On Dec 14, 2007, at 9:32 AM, Stephen Farrell wrote: Modulo look-alike domains I guess? (There's text in 4868, 4.2.1 about that btw.) I don't think anything in SSP can mitigate that threat. In that instance the

Re: Issue 1527 - Threats (was Re: [ietf-dkim] Hostile to DKIM deployment)

2007-12-14 Thread John Levine
An essential part of such exercise is to explain why the mitigation is strategic. That is, why will it not be easy for attackers to work around the SSP mechanism and achieve equivalent attack success. Modulo look-alike domains I guess? Depending on the threat, there's all sorts of likely