ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] a protocol needs a payload

2009-02-17 19:29:46
Dave CROCKER wrote:


Murray S. Kucherawy wrote:
On Tue, 17 Feb 2009, Jim Fenton wrote:
But -rfc4871-errata-02 defines this backwards.  The erratum makes
everything else internals, which eliminates a lot of information
that might be useful to a downstream assessor.  For example:
[...]

Perhaps this is a terminology question.

No, the confusion is much deeper than that.  It's about a protocol
layering and protocol specification scope.

The fact that upper layers sometimes reach down into lower layer
information, and the fact that this is sometimes useful, does not
eliminate the nature of the layering or the fact that there is a
layering violation.  Protocol layering is a matter of design
discipline, not just terminology.

This is part of the reason that it's important to recognize that upper
layers may wish to make use of additional information in the signature,
and not only the signing domain.


In this case, it appears that Jim is confusing the sole stated goal of
DKIM:

     "permitting a signing domain to claim responsibility for the
introduction of a message into the mail stream"

with other useful goals.  He's conflating these other goals, such as
validation of message content, into the DKIM Signing spec, on the
theory that someone, sometime, might want to do it a variety of
yet-to-be-specified functions.

The DKIM signing specification is a base which may be extended.  It is
for that reason that we worked hard to make sure that the base
specification was extensible (addition of tag/value pairs, for example).


Apparently the feeling is that any constraint in the Signing spec will
somehow prevent value-add functions that go beyond the spec.

When the specification describes specific payload values, and makes
extensions and other values that might be useful "DKIM internals"
requiring a layering violation to access, it does seem to be
discouraging value-add functions.

But again, why is this part of the erratum seeking to resolve d=/i=
confusion?

-Jim

_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html