ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] linkage between "originator" and "handling agent"

2005-08-17 13:19:04

On Aug 17, 2005, at 7:18 AM, Scott Kitterman wrote:

Douglas Otis wrote:
There are two ways to look at DKIM goals-
1- A mechanism that provides an accountable domain for the message.
A number of features are available as a product of the accountable domain.
 a) reputation accrual
 b) directed abuse reporting
 c) IP address independent basis for message acceptance

None of which relate to preventing forgery.


DKIM alone or in combination with domain-wide assertions do not assure prevention of forgery (the falsification of a sending mailbox- address). This assumption trusts the signing domain, but without assurances. The 'i=' parameter appears related to the use of user- keys. The 'i=' parameter may also declare just the domain, or not be used at all. I would also argue that user-keys are not appropriate for DNS. Unless you are suggesting every user has their own key, then claims of preventing forgery by implementing DKIM is very misleading. The term 'forgery' is misleading and may lead to a dangerous reliance on this half measure. I am simply asking for better descriptive language when describing the intended goal of a domain-wide assertion.



2- A mechanism that is able to optionally constrain the use the From- domain.
 a) debunk spoofed messages


I don't think debunk really captures it. I think we are after a mechanism to allow receivers to determine if the sending domain (yes, I know that's an amorphous term) is willing to state the the message is authorized.

Anti-phishing and anti-forgery clearly overstate the results of a domain-wide assertion in conjunction with DKIM. While DKIM in combination with domain-wide assertions, or the visibility of the accountable domain, will limit sources of possible abuse, it is important to be realistic about what DKIM and DKIM in combination with a domain-wide assertion provides.

There are many problems that will need to be addressed with a domain- wide assertion mechanism. I would even argue that simply exposing the accountable domain, verified by a valid DKIM signature, would be a better means to achieve greater safety. There are many ploys where pretty names are used, or where reliance upon the MUA offering greater emphasis on unchecked headers may actually pose greater risks to recipients. This is made worse when these recipients have been assured by some "icon" that indicates this message is DKIM verified, believe DKIM prevents 'forgery' and that the sender mailbox address can be fully trusted. Would the recipient understand that only the domain of the From is being checked?

There are very good reasons not to rely upon the browser 'lock' icon. The domain being trusted should always be visible. Not doing so leaves the system extremely vulnerable. While it could be assumed that blatant criminals would not be able to retain services of a Certificate Authority, this still leaves a large window of risk. In the case of DKIM, there is not even a CA. In the end, the trust is based upon the signing domain. There is tremendous value being able to verify (and see) who is being trusted.

Once the accountable domain is visible, much of the justifications for implementing the automation of detecting spoofed messages vanish. A list of institutions plagued by phishing which also fully implement DKIM with deterministic header conventions would enable effective filters without any domain-wide assertions as well. Domain- wide email assertions could be considered a method to indicate implementations of various present and future protocols. The binding of headers seems rather perilous from a standardization perspective for the reasons mentioned.


To clarify basic elements involved in DKIM, versus expressing domain- wide assertions, these two efforts should be independent. This would ensure a flexible language is used to express these two highly independent functions.

One might, I suppose, make the arguement that the policy linkage between the sending domain and the DKIM signing domain is really a form of a very narrow reputation service. So, on that note, you might be right, but then where's the value in DKIM signatures alone? Is it sufficient to merit a working group? Is it sufficient to garner deployment?


There is great value in knowing who allowed abusive email. There is great value knowing who should receive complaints when abuse appears. There is great value, when those accountable for abuse are blocked by a reputation service, the innocent domains are not inadvertently impaired. There is great value knowing where to go when there is criminal activity. I believe just a few of these and many more reasons would be sufficient.



Perhaps if we proceed down this path, what we really ought to be doing is including reputation protocol that will leverage off of DKIM signature within the scope of the planned working group. Not that I'm suggesting we should proceed down this path.

I am not suggest that either.


I do think that DKIM needs to decide if it's just some random signed identifier or if it has a relationship to reducing forgery. Some have indicated they see sufficient value in the signed identifier. I don't.

I see many advantages avoiding the 'forgery' or 'phishing' issue. I suspect this will be the preverbal rat-hole deluxe. I also see tremendous value in having the administrative domain sign the message. This is not just some random signature, as you describe it.

-Doug







_______________________________________________
ietf-dkim mailing list
http://dkim.org