Re: [ietf-dkim] Re: Attempted summary
2006-01-26 19:57:59
On Jan 26, 2006, at 4:59 PM, Jim Fenton wrote:
william(at)elan.net wrote:
On Thu, 26 Jan 2006, Mark Delany wrote:
Right. So the question is, can a signature be constructed such
that it doesn't interact with SSP to infer a binding above and
beyond "I claim it passed through me"?
Make 'i' optional.
'i' is optional, but takes the value @d if it is missing.
My preference however is to have field in signature that specifies
what type of email parameter the signature is associated with
(i.e. see 'id' segment of metasignatures).
If we know this, presumably one could tell, for example, whether a
signature came from a mailing list. But it's the signer's
assertion what their role is: one might imagine setting up a rule,
"I'll accept any messages re-signed by mailing lists." So the Bad
Actors will just start adding a few more headers, and all of a
sudden you're getting lots of mail from the unbelievable-
deals(_at_)example(_dot_)com mailing list, with messages from "people" talking
about what great deals they got.
This overlooks an important application of the DKIM signature. An
approach using DKIM can ensure look-alike domains, use of unicode,
ACE labels, or display-name only headers will _never_ be a problem.
This would be the use the DKIM signature to both register and
recognize the source of a message. Simple "out-of-band" methods can
ensure the source of the message, such as including pass-phrases or
pictures selected when subscribing to a service. Once registered,
these messages can be marked to signify it originates from a
recognized registered source.
When there is an apparent conflict, the recipient should be warned.
Their registration may need to have the source of the message
ignored, merged with or replace the existing registration, or perhaps
blocked as a spoof. This conflict notification would be a nuisance
without the role of the signer also included. When the Mediator role
is noted, the next generation MUA would be able to ignore innocuous
Mediator conflicts with an MSA source, the likely case.
The lack of a registered marking on a message that purports to be
from a registered source would alert the user as well, hence this
would be highly spoof resistant. This approach allows the safe and
painless use of Mediator related services. The source of the message
could also indicate that a Mediator role is not permitted, but this
was not covered in the dkim-options draft. It seemed better to
assume prohibiting the use of Mediator sources will not be required,
following the introduction of the next generation MUAs, or plug-ins
and pre-filters for legacy MUAs. By the way, signature overlays and
the MDA role will be needed to accommodate markings made by pre-
filters to support legacy MUAs. : )
Since there's no way to know what the role of the signer really is,
it's not a useful piece of information. What is useful is who the
signer is, and then the verifier or recipient might recognize it:
Oh, it's signed by mipassoc.org, which gives the responsible
address as ietf-dkim-bounces(_at_)mipassoc(_dot_)org(_dot_) I know that's a mailing
list.
You don't need to know the true role of the signature. As with
virtually everything within a DKIM signed message, beyond the domain
of the signature, nothing should be trusted. With that in mind,
being able to differentiate between an MSA that purports to be that
of your bank, and those on a financial list-server posted to by
employees of your bank, allows you to understand these as coming from
different sources. This differentiation allows the next generation
MUA or pre-filters to ignore harmless the role based conflicts. All
those important messages will be marked as registered with far less
interaction.
Phishing protection requires a pre-filter that must _not_ assume that
the From address is being spoofed. This is the assumption being made
with SSP. That assumption represents a serious flaw in the
protection being sought.
It seems rather safe to assume that with the aid of just the base
DKIM signature, intelligent pre-filters and next generation MUAs will
remove most spoofing concerns. There will be extremely little
administration needed, as there is no complex matrix tables returning
multi-level acceptance results, or email-address domain owners
wondering where their email went. Recognizing the source of a
message provides yes or no results for the recipient. Remember, the
majority of recipients only see the display-name. When erecting a
barrier, be prepared to handle exploits using a different avenue.
Currently, main street is bustling with blind users expecting
protection. With the SSP approach, they will not see what hit
them. : )
-Doug
_______________________________________________
ietf-dkim mailing list
http://dkim.org
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- Re: [ietf-dkim] Re: Attempted summary, (continued)
- Re: [ietf-dkim] Re: Attempted summary, Douglas Otis
- Re: [ietf-dkim] Re: Attempted summary, Wietse Venema
- Re: [ietf-dkim] Re: Attempted summary, Mark Delany
- Re: [ietf-dkim] Re: Attempted summary, Wietse Venema
- Re: [ietf-dkim] Re: Attempted summary, Mark Delany
- Re: [ietf-dkim] Re: Attempted summary, Michael Thomas
- Re: [ietf-dkim] Re: Attempted summary, Mark Delany
- Re: [ietf-dkim] Re: Attempted summary, Douglas Otis
- Re: [ietf-dkim] Re: Attempted summary, william(at)elan.net
- Re: [ietf-dkim] Re: Attempted summary, Jim Fenton
- Re: [ietf-dkim] Re: Attempted summary,
Douglas Otis <=
- Re: [ietf-dkim] Re: Attempted summary, william(at)elan.net
- Re: [ietf-dkim] Re: Attempted summary, Jim Fenton
- Re: [ietf-dkim] Re: Attempted summary, John Levine
- Re: [ietf-dkim] Re: Attempted summary, Jim Fenton
- Re: [ietf-dkim] Re: Attempted summary, william(at)elan.net
- Re: [ietf-dkim] Re: Attempted summary, Douglas Otis
- Re: [ietf-dkim] Attempted summary, SSP again, John Levine
- [ietf-dkim] Re: Attempted summary, SSP again, Frank Ellermann
- Re: [ietf-dkim] Attempted summary, SSP again, Hector Santos
- Re: [ietf-dkim] Attempted summary, SSP again, John R Levine
|
|
|