Re: [ietf-dkim] Introducing myself
2006-11-01 09:14:45
On Tue, 31 Oct 2006 09:26:57 -0000, Jon Callas <jon(_at_)callas(_dot_)org>
wrote:
On 30 Oct 2006, at 1:42 PM, Charles Lindsey wrote:
I'm going to cherry-pick a few things, particularly the ones I think I'm
best suited to answer.
3.2 Tag=Value Lists
INFORMATIVE IMPLEMENTATION NOTE: Although the "plain text"
defined below (as "tag-value") only includes 7-bit characters, an
implementation that wished to anticipate future standards would
be
advised to not preclude the use of UTF8-encoded text in tag=value
lists.
Those future standards are nearer than you think. The currently active
ietf-eai WG is charged with producing an experimental protocol for
writing
headers in UTF-8. ...
No, because we want DKIM to work with 7-bit-clean mail. We want broad,
fast deployment and that means working with old systems.
Sure, but that is no reason for making it _not_ work with new systems. If
it is REQUIRED (rather then merely suggested, as in the present draft)
that UTF8-encoded text in tag=value lists is allowed, all existing mail
will still work, but so will the new. That should make everybody happy,
including the implementors who now have one test less to write.
3.5 The DKIM-Signature header field
h= Signed header fields
Why MUST NOT this list be empty? Suppose you want to sign the body, but
not any headers? Unusual, but perhaps sensible for some application. No
interoperability arises.
Because you have to sign at least one header. Think of DKIM as a
header-signing system. It signs the body, too, but that's a means to an
end.
Fair enough, but that sounds like grounds for SHOULD NOT rather than MUST
NOT, since nothing actually breaks if you violate it.
i= Identity of the user or agent
Must this tag, if a <local-part> is present, be a valid working email
address?
No, it can be anything you want.
OK.
l= Body length count
INFORMATIVE IMPLEMENTATION WARNING:
I am very suspicious of the propriety of suggesting, in any IETF
standard,
that it is legitimate to remove text from a message being conveyed ...
The point of body lengths is that many systems add text to the end of a
message. In fact, the list server that is delivering this to you is
doing precisely that.
So I see, and a very sternly worded remark ("NOTE WELL: ...") it is. So
why do you want to even suggest that is would be legitimate for verifiers
(or their policy modules) to chop it out?
q= A colon-separated list of query methods used to retrieve the
public key
Clearly, the use of DNS or some similar global database is the only
sensible PKI that is workable for DKIM. But am I right in saying that
this
tag does not preclude the use of other PKIs for other applications (e.g.
attached certificates, web-of-trust, private agreements between the
communicating parties, etc.)?
A couple of comments on this one.
DKIM is not a PKI. It has no trust model.
I would not say it has no trust model. The DNS is not all that easy to
spoof, but it still gives a reasonably strong assurance you have the
correct key, though clearly other PKIs are much stronger.
Second, PKIs are not distribution mechanisms.
A mattter ot definition, I think. I would regard a PKI as encompassing
either or both of a distribution and a trust mechanism.
Why MUST signers support "dns/ext" (clearly, verifiers MUST)? ...
See my reply to Eliot for this, and the similar wordings for hash and
encryption algorithms. I think you have misunderstood the point of my
concern. If it had said that signers SHOULD use dns/ext, ... rsa, ...
sha-256, etc, (at least when the application is DKIM) then that would have
been OK.
5.3 Normalize the Message to Prevent Transport Conversions
I found this section absolutely astounding.
Message bodies written in Non-ASCII charsets have been commonplace now
for
12 or more years, and they are most readily represented as 8-bit.
8BITMIME
has been around for the same length of time and is now almost
universally
deployed. 8bit using 8BITMIME has become, or is well on the way to
becoming, the preferred CTE for charsets which will not fit into 7bits.
And yet you are now seriously proposing, for a protocol that needs to be
used in the great majority of future email messages if it is to fulfill
its purpose, to return to encodings that can be squashed into 7bits.
That
is one monumental step backwards for the IETF.
You're confusing making sure that 7-bit systems don't break with
encouraging them. We're not encouraging them.
You say "signers SHOULD convert the message to a suitable MIME content
transfer encoding such as quoted-printable or base64". That sounds to me
like a pretty strong discouragement to continue using CTE 8bit.
... But we're being realistic and want DKIM to work with existing
systems.
Then is that case it has to work with CTE 8bit even when it gets changed
to Q-P or Base64 by some non-8BITMIME MTA en route (I doubt there are many
systems left that still do that, but there will be some).
And it is not as if this was a difficult problem to solve. All you have to
do is to decode any Q-P or Base64 encountered during the canonicalization
process and use that in the hash. By definition, changing the CTE does not
alter the "meaning" of the message, so no harm can arise from that. Why
was this not done?
Sorry to have gone on at such length. But some of these issues seem of
importance, so I hope someone will take the trouble to reply.
It's all right. Sorry for being a bit abrupt, but you need to catch up
to what we're doing.
Go look at the web site at www.dkim.org, .......
Yes, I have already looked at all the sources you mention.
--
Charles H. Lindsey ---------At Home, doing my own thing------------------------
Tel: +44 161 436 6131
Web: http://www.cs.man.ac.uk/~chl
Email: chl(_at_)clerew(_dot_)man(_dot_)ac(_dot_)uk Snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9 Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html
|
|