Hi...

On 11/7/2024 6:42 AM, Murray S. Kucherawy wrote:
I've loaded that text into the datatracker for DKIM, and move it to "Draft Charter" state:
https://datatracker.ietf.org/doc/charter-ietf-dkim/


Commenting on that draft:

Attribution of email is made difficult by the exact properties that make email valuable as a technology - a heterogeneous network of systems with different owners, different software, different update lifecycles - and of course different bugs!

This is an impressive opening sentence, but I'll suggest that, at best, it not be the opening.  DKIM exists and is in widespread use.  For a long time.  So, this is a follow-on effort, which means that there are quite a few years of context.  While there can be some utility in pedagogy in a charter, it should state, and work, from the established context.

Also, generally, something like an IETF charter needs to work hard to focus on immediate pragmatics, rather than broad concepts.  The latter seems to me to make more sense for the IRTF.

Also "attribution of email" seems atypical and extremely broad phrasing.  All sorts of different things involving email might benefit from 'attribution'.  Also, while I might have missed it, I believe 'attribution' is not a term in common use around email technical or email security or anti-abuse communities.


Emails also often flow indirectly through these networks, undergoing redirection, expansion into multiple copies via aliases and mailing lists, as well as rewriting and filtering before eventually arriving at a mailbox or being processed by a receiving software agent.

While 'indirect' has well-established context in many email technical circles, I believe it does not have clear, consistent, and precise meaning.  So it needs to be defined here, with more than an example.

I see this is an extremely important point, since the movement that has taken place with email is to consider tight integration of domain name and sending platform, in substantial contrast with the way email worked for perhaps 40 years.  That is, 'indirect' is tending to be treated as almost aberrant, or at least as problematic.


DKIM gave us good tools for attributing the source of messages that were not modified between originator and destination.

That's not the exact definition of DKIM's semantics.  So, for example, a vetting authority that does not actually send a message could sign it and feed the signature back to a platform that does the sending. (And there used to be a production example of this happening.)

Also, a platform might affix multiple dkim signatures, using different domain names, to cover various roles.  These are not all 'sources' of the message, are they?

The problem, here, is the danger of taking common practice and retrofitting it as a requirement to something that actually permits a much wider range of use.


Several attempts have been made to address the issues that arise with intermediaries. For various reasons, these technologies have failed to fully address the issues that arise when changes are legitimately made or when bad actors alter or replay messages, and we do not have well-specified mechanisms that ensure that error reports reach all the entities that need to be aware of them.

This is a useful paragraph.  I think it needs context.  Perhaps:

   A DKIM signature will typically survive relaying through a Mail
   Transfer Agent (MTA) from posting to delivery.  The signature will
   typically not survive through an intermediary, which takes delivery
   and re-posts to a fresh set of recipients, such as is common for a
   mailing list service.  Typically, intermediaries modify a message in
   ways that break the original DKIM signature.



This working group will take a holistic approach to the underlying problems of attribution, error signalling, and trust relationships between the entities involved in handling an email - from its inception to arrival at its final destination. The working group will use the mechanisms of DKIM as a basis, extending it to solve the problems that have been identified in real-world usage.

This is extremely vague, absent any statements about approaches or final capabilities.  Unfortunately, this kind of vagueness does not bode well for timely or effective wg output, given common wg processes.



It will be necessary for any new mechanism to work in parallel with the existing attribution mechanisms, and have a clean upgrade path.

Parallel vs. upgrade are separate paths.  Really, they compete. If 'separate' is what is meant, then this is not a DKIMbis effort.  (And creation of a parallel capability tends to be a lot more challenging for gaining widespread adoption.)


This work will have a wide scope and the design may supersede, modify, or replace many parts of the current email attribution techniques and associated reporting mechanisms - while retaining the ability to support the same use-cases.

Since 'email attribution techniques' isn't anchored, the reader can't guess what might be affect or what certainly won't be.

One thing that seems clear to me is that this text rather strongly indicates that this is NOT a DKIMbis enhancement effort but is considerably more ambitious.  Just how ambitious cannot be determined, since, again, the language is vague.



To gain widespread adoption, it is expected that design proposals will be tested during the development of specifications. The working group will favor designs that are tested at scale and may dismiss those that are not.

There's already been discussion about the problem with requiring testing at scale before accepting a proposal.

IETF requirements for implementation, anytime before considering Full Standard, are usually basic, functional testing, rather than for performance or scaling.

I think that when those are a major concern, the testing is usually done before coming to the IETF.



This working group will produce the following document(s):

 *

    A design overview describing the problem area and proposed mechanism

Frankly, I think this needs to be in an advanced state prior to chartering this as an IETF effort.  Otherwise, the wg will spend a long time debating what problems it is trying to solve and what approaches to consider.

The IETF really is not a good venue for the kind of broad discussions required to reach convergence on what that first bullet requires.


 *

    An algebra for describing how to reverse common changes to email
    content

As appealing as this topic is, I continue to believe it is a distracting and possibly counter-productive path to pursue.

It is the sort of capability that can only work if the scope of acceptable changes is kept extremely small.  If it is then enforced, it becomes yet-another way that email is made to sleep in a Procrustean bed, further limiting the range of its uses.


 *

    A specification for authenticated email flow through multiple sites.

Email already flows through multiple sites, called MTAs.  I assume what is meant is through multiple intermediaries, with repeated posting/delivery sequences.



 *

    A specification for error and bounce handling with the
    authenticated email flow.

We don't already have that?  The charter needs to be specific about what we already have and how it is insufficient and what types of enhancements are expected.



 *

    A best practices guide for implementation during the changeover
    period, in which interoperability with existing standards needs to
    be maintained.

'changeover period'?  This sounds like there is expected to be an actual replacement (of DKIM?)  That's pretty much not how the Internet works.  (cf, IPv4, IPv6).  At best, 'changeover' typically takes one or more decades.

If, on the other hand, what is meant as operational advice for adoption of the enhancement, then it would probably be best to say something like that.

One of my mantras is:

   If it is an enhancement, then what worked before will continue to work.

   If the new thing does not directly support the old thing, then the
   new thing is entirely new (and actually competes with the old thing
   -- and will be a lot hard to get widespread adoption.)



This working group will also update the following existing document(s):

  * DMARC to add DKIM2 as an additional authentication mechanism


d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
***  bluesky: @dcrocker.bsky.social  ***
mast: @dcrocker@mastodon.social
_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to