On Fri, 07 Jan 2011 20:58:02 -0000, Dave CROCKER <dhc(_at_)dcrocker(_dot_)net>
wrote:
Here's the proposal that Barry just announced, for splitting the DKIM
specification into a DKIM-specific portion and an underlying, more
generic
portion that could be re-purposed for other services. It's current
working
acronym is DOSETA.
By and large I would be happy to see such a split, especially as it would
leave the top-level DKIM protocol unchanged (modulo such further nits as
we might need to fix even with DKIM as it stands).
The precise detail of the split would need discussion, and that is mostly
for later. So I will just mention a couple of items as markers for things
I might want to raise then.
Proposal for specification of re-usable components
--------------------------------------------------
(The working acronym is DOSETA, for DOmain SEcurity TAgging.)
Abstract
DomainKeys Security Tagging (DOSETA) is a component mechanism that
enables
development of a security-related service, such as authentication or
encryption,
with keys based on domain names; ....
I think keys should be able to be based on things other than domain names.
Names of netnews newgroups in one obvious exception, but there may be many
situations where the entity claiming authority to certify some document
may have no obvious relation to a domain.
Table of Contents
3. DOSETA Library
3.3 Key Management
3.4 Selectors for Keys
3.5 DNS Binding for Key Retrieval
3.6 Stored Key Data
Again, keys in some protocols may need to be long lived, and DNS may not
be the appropriate way to retrieve them. That could well be one option
provided under DOSETA, but provisions shold be made for other
possibilities such as registries, etc.
--
Charles H. Lindsey ---------At Home, doing my own thing------------------------
Tel: +44 161 436 6131
Web: http://www.cs.man.ac.uk/~chl
Email: chl(_at_)clerew(_dot_)man(_dot_)ac(_dot_)uk Snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9 Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html