Alessandro Vesely wrote in
 <76cede70-0558-ed62-7420-97e2e899e...@tana.it>:
 |On Fri 11/Aug/2023 00:33:46 +0200 Steffen Nurpmeso wrote:
 |> Murray S. Kucherawy wrote in <CAL0qLwaLuNbwbnB4NLrMbqxP=QdiSRvNXVpRjF8P+\
 |> dkgjtw...@mail.gmail.com>:
 |>> On Wed, Aug 9, 2023 at 3:14 PM Steffen Nurpmeso <stef...@sdaoden.eu> \
 |>> wrote:
 |>>> And couldn't it become standardized that verification results then 
 |>>> must be included in future DKIM signatures?
 |>>> So then a verifier inserts a RFC 7001 header, and that will be 
 |>>> covered by a further DKIM signature.
 |>>
 |>> Aren't you basically describing ARC here?
 |>
 |> I am only talking DKIM.
 |> If you DKIM sign a message and have an authentication result 
 |> (made) available (yourself), anything but not including it in your 
 |> own signature seems senseless.
 |
 |Indeed, including and signing Authentication-Results is one of the \
 |two relevant 
 |differences between DKIM and ARC.  The other is chaining existing signat\
 |ures. 
 |I don't think considering DKIM plus A-R, that is ARC minus chaining \
 |makes any 
 |sense at this point.

To me only relevant is one thing, and i can show you with an
ietf.org mail i got from this list (shortened .. of course).

So here is an extract of a mail header stack, and when you refer
to ARC, i want to make that "stack" bold, as it is how i --- who
would rather like email being an endless wrapture of MIME
structures to mimic what our forefathers did with their
sealed-envelope-in-sealed-envelope etc. --- understand email
headers (with some noticeble exceptions like RFC 6783 mailing-list
headers, which instead "unshift the stack"):

  DKIM-Signature: [.]
  h=In-Reply-To:References:Date:From:To:Subject:List-Id:
  List-Unsubscribe:List-Archive:List-Post:List-Help:List-Subscribe[.]
  X-Original-To: ietf-d...@ietfa.amsl.com
  Delivered-To: ietf-d...@ietfa.amsl.com
  Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) 
with ESMTP id 782ACC1527A6 for <ietf-d...@ietfa.amsl.com>; Thu, 10 Aug 2023 
21:14:55 -0700 (PDT)
  ...
  Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit 
key) header.d=fastmail.com header.b="PTllFt48"; dkim=pass (2048-bit key) 
header.d=messagingengine.com header.b="1IRMwJ9b"
  Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com 
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OwzGu5MRNMu5 for 
<ietf-d...@ietfa.amsl.com>; Thu, 10 Aug 2023 21:14:50 -0700 (PDT)

I think DKIM underspecifies which headers should be covered by the
signature.  This is all i want to say.  If in this example
ietfa.amsl.com spends expensive CPU cycles to generate an
authentication result, why is that not covered by the latter
generated DKIM signature?

(Letting aside that de facto, in this example, ietfa.amsl.com/IPv4
sends to ietfa.amsl.com/IPv6, and both create DKIM signatures from
this short glance --- luckily not two Authentication-Results:.)

This is especially true for the eventually possible "smart" (heh)
DKIM with DKIM-Store, where recipient-domain DKIM implementations
would be enabled to verify all message permutations along the way.
I have no idea of other aspects of AR©.

--steffen
|
|Der Kragenbaer,                The moon bear,
|der holt sich munter           he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)

_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to