Re: [ietf-dkim] ISSUE 1525 -- combine Arvel's, Doug's, and John's ideas (?)
2008-01-19 14:26:10
On Jan 18, 2008, at 11:53 PM, Frank Ellermann wrote:
Douglas Otis wrote:
There is a domain within the signature that should be used to
assess compliance. What prevents a valid signature of the From
domain from allowing a message to comply with "all" or "strict"?
The most interesting case for SSP is "no signature".
SSP should create compliance requirements for messages based upon From
header's domain(s). A "strict" or "all" compliance requirement
should be met with a signature that could be valid for the From email-
address's domain. The signature should not need to be "on-behalf-of"
the From email-address (as determined by the signatures i= parameter).
IMHO there should be an exception for restricted keys, where these
signatures must be on-behalf-of the From email-address to fulfill a
compliance requirement of "all" or "strict".
For my unconvincing "toss a coin" list (Message-ID or first author
or Reply-To) it's of course possible to add "use any signature for a
domain in From addresses" to figure out a relevant domain for SSP.
It should not matter which header a domain's signature is on-behalf-
of. DKIM is not about establishing an author's identity. The trust
being established is with the signing domain. The signing domain has
the option of using ambiguous signature (no i= or no local-part and
multiple email-addresses of their domain). IMHO, the signing domain
should be able to even use an opaque identity that does not associate
with any header. An opaque id could prove useful to protect someone's
privacy. A domain should be able to indicate they sign "all" without
conveying anything more than that it was signed by their domain.
But that only works if there is a corresponding DKIM signature, when
it's not really necessary to test SSP.
Just having a DKIM signature is not enough. Domains protected by DKIM
and an SSP assertion of "all" or "strict" must include a signature
from a domain that would be valid for the From email-address domain in
question. The DKIM WG seems unnecessarily focused on the on-behalf-of
feature of the DKIM signature. This feature _might_ enable an MUA to
highlight which identity the signature was on-behalf-of. There may be
cases where it is not possible for MUAs to establish which identity
the signature was on-behalf-of. In that case, just the signature
domain could be highlighted. Due to the possible on-behalf-of
uncertainty, DKIM signature notifications must be able to convey just
the domain of the signature.
Although compliance for "all" or "strict" could be defined to require
an unambiguous on-behalf-of, such a requirement will make unambiguous
on-behalf-of less certain. The signing domain might then "falsify"
the on-behalf-of to meet an unambiguous on-behalf-of. Security
concerns are better met by not placing constraints on the types of
signatures used. There are also the issue of body length, and subject
lines where security might be impacted. The verifier/MUA can use the
information and display whatever they consider appropriate. One could
argue that excluding the subject line and including body length should
not be used as well. There is no reason to use SSP as a means to
constrain these parameters.
Or do I miss something obvious in your proposal ? We could pick
John's proposal where Arvel's idea doesn't work, just look at all
domains in From addresses, for legit mail it's rare. That needs
some "SSP processing limits" for malicious mails (not as badly as
for SPF).
EAI might wish to allow two From email-addresses to permit alternative
formats. SSP could assert that messages containing more than two From
email-addresses are not complaint with "all" or "strict". This would
limit the number of policy search operations to two per message.
Except in cases of restricted keys, SSP compliance should not depend
upon which header the address is on-behalf-of. Ensuring an
unambiguous signature is within the control by the signing domain and
is independent of SSP compliance. MUAs are free to display
ambiguously signed, body length, and excluded subject line messages in
any manner they consider appropriate. There is no reason for the DKIM
WG to dictate how the on-behalf-of feature of the signature must be
used before a domain can assert their signing practices or policies.
Let the market decide.
-Doug
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- Re: [ietf-dkim] Re: ISSUE 1525 -- Restriction to posting by first Author breaks email semantics, (continued)
- [ietf-dkim] ISSUE 1525 -- combine Arvel's, Doug's, and John's ideas (?), Frank Ellermann
- Re: [ietf-dkim] ISSUE 1525 -- combine Arvel's, Doug's, and John's ideas (?),
Douglas Otis <=
- Re: [ietf-dkim] ISSUE 1525 -- combine Arvel's, Doug's, and John's ideas (?), Damon
- Re: [ietf-dkim] Re: ISSUE 1525 -- Restriction to posting by first Author breaks email semantics, Jon Callas
- Re: [ietf-dkim] Re: ISSUE 1525 -- Restriction to posting by first Author breaks email semantics, Michael Thomas
- Re: [ietf-dkim] Re: ISSUE 1525 -- Restriction to posting by first Author breaks email semantics, Jon Callas
- Re: [ietf-dkim] Re: ISSUE 1525 -- Restriction to posting by first Author breaks email semantics, Michael Thomas
- Re: [ietf-dkim] Re: ISSUE 1525 -- Restriction to posting by first Author breaks email semantics, Jim Fenton
- RE: [ietf-dkim] Re: ISSUE 1525 -- Restriction to posting by firstAuthor breaks email semantics, Bill.Oxley
- Re: [ietf-dkim] Re: ISSUE 1525 -- Restriction to posting by firstAuthor breaks email semantics, Jim Fenton
- Re: [ietf-dkim] Re: ISSUE 1525 -- Restriction to posting by firstAuthor breaks email semantics, Douglas Otis
- Re: [ietf-dkim] Re: ISSUE 1525 -- Restriction to posting by firstAuthor breaks email semantics, Jim Fenton
|
|
|