On Fri, Mar 24, 2023 at 9:59 AM Dave Crocker <d...@dcrocker.net> wrote:

> On 3/24/2023 9:38 AM, Murray S. Kucherawy wrote:
> > I think I concur with the suggestion that wa should drop discussion of
> > ARC.  This WG, or the DMARC WG, can develop an update to ARC based on
> > the outcome here if the community chooses to do so, but I don't think
> > it should be part of this WG's premise.
>
> sigh.  The draft only makes a quick, careful reference to ARC's having a
> similar vulnerability.  Given it's underlying similarity to DKIM and
> given that this is an introductory document rather than a specification,
> I think it appropriate to give the reader a heads up.  (FWIW, for early
> versions of the draft I was also inclined to want it out.  I think the
> current, brief text is, however, apt.)
>

Fine with me, it's far from a showstopper overall.  I just made the
suggestion.


> > Section 1.2:
> >
> > The opening sentence that emphasizes non-use of RFC 2119, amusingly,
> > forces you to include a reference to RFC 2119.  I suggest instead:
> > "This document is not normative in any way."
>
> As I recall, there was some discussion about this.  For one thing, the
> IETF really likes seeing the reference.  Including it ensures no hiccups
> in the mechanics of handling the document. (And, yes, it is amusing.)
>

I've seen at least the current IESG encourage removal of the reference when
it's not really needed.  It's harmless to leave it in, I suppose, but I'd
be unsurprised to get the question again during IESG Evaluation.


> > Section 6 can simply say there are no security considerations for a
> > problem statement document, though you anticipate some interesting
> > ones in documents to follow.  :-)
>
> Hmmm.  On the other hand, have some discussion of security-related
> issues in a section identified for that topic, might be useful for
> highlighting dangers or concerns.
>

I've always thought of Security Considerations as a place to hold a
discussion about what security issues are being introduced by the material
in the document.  I don't think any are or will be here, which was the
point I was making.  Those would come in any follow-on protocol or best
practices work.

Then again, I don't think anyone's going to complain if we do have an
informative security discussion.  So, as before, just a suggestion.

-MSK
_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to