On 11/21/2024 1:21 AM, Bron Gondwana wrote:
I have made a second pass at it. Text below, or see the raw copy at:

https://notes.ietf.org/YGynIPpYS7yqg5G7ZeSQeA


Summary:

 * As provided, this is an extremely broad and extremely vague
   statement of work.  It continues to sound far more appropriate for
   the IRTF than the IETF, especially absent a concete draft
   specification to take as input.  (It's not as if the IETF hasn't
   accepted charters like this.  But it /is/ as if such working groups
   have typically not fared well. Stated more baldly, "let's charter a
   group and then figure out what we are going to do" has a bad history
   in the IETF.)
 * The draft seems to include a target of 'trust relationships' which
   is an open research topic that DKIM only indirectly relates to,
   except for trusting a signature.
 * IETF Internet Mail handling really only covers a single
   posting/delivery sequence.  It touches on more elaborate sequences,
   but only piecemeal. And draft charter does not really note or deal
   with this difference in scope. So the proffered 'holistic' effort is
   a very considerable increase in scope from something labeled DKIMbis
   or DKIM2.


Detailed comments:


  DKIM2 Draft Charter


    // <https://notes.ietf.org/#Background>Background

Emails often flow indirectly through multiple systems, undergoing redirection, expansion into multiple copies via aliases and mailing lists, as well as rewriting and filtering before eventually arriving at a mailbox or being processed by a receiving software agent.

The opening sentence sets a stage that matches many end-user experience views of email, but misses the basic technical distinction that is the essence of the enhancement being sought. *As described in that sentence, email is delivered more than once, before it is 'finally' delivered.*

So instead, perhaps:

   It is common for an email to go through multiple posting/delivery
   sequences,  before eventually arriving at a 'final' mailbox or being
   processed by a 'final' receiving software agent. Examples of such
   'indirect' flow include redirection through an alis, expansion into
   multiple copies via an alias or a mailing list, as well as rewriting
   and filtering before eventually arriving at a mailbox or being
   processed by a receiving software agent.

I left 'rewriting' in but actually don't know what it refers to, nor why 'filtering' is relevant to DKIM signature survival.

(By the way, I thought that posting from an ESP was also classed as an indirect flow.  Is this not correct?)



DKIM provides a way to detect that the content of a message was not altered between the signing domain and its eventual destination.

This sounds correct but can be misleading, given the 'eventual'.

DKIM was designed to work from one posting to one delivery.  It was never intended to survive the vagaries of what can happen between a delivery and a next posting.  That it sometimes does survive is nice, but was not a design goal.

So what is being sought here is a very basic and very substantial increase in scope for DKIM.



Several attempts have been made to address the issues that arise with alterations made by intermediate systems. For various reasons, these technologies have failed to provide the information to reliably distinguish between legitimate mail, and replay or alteration of messages by bad actors.

DKIM does not attempt to distinguish 'legitimate' mail from mail that is not legitimate.

As for 'replay' it needs to be precisely defined here, especially since there are different views about what it refers to.

As for alteration by bad actors, I was not aware that that is considered a problem for DKIM. In fact I thought it was /not/ a problem.  So this needs to be explained and documented.



    Objectives

This working group will take a holistic approach to the underlying problems of message alterations, error handling, and trust relationships between the systems involved in handling an email - from its inception to arrival at its final destination.

There are problems with error handling?  What are they?  I don't recall seeing discussion of this.  What is the actual work to be done?  What goals for improvement are sought?

Trust relationships are far -- very far -- beyond the scope of DKIM, other than whether a DKIM signature can be trusted.

Given the considerable increase of scope for DKIM and range of topics cited here for improvement, the charter should have a concrete proposal to take as input, if only to provide an example of how one might approach dealing with these topics.



The working group will use the mechanisms of DKIM as a basis, extending and modifying them to solve problems that have been identified in real-world usage.

Since they have been identified, they should be documented here, clearly enough to aid the working group in knowing whether something is in-scope our out of scope.



It will be necessary for any new design to work in parallel with the existing mechanisms, and have a clear upgrade path.

If it is parallel, it is independent.  So I don't know what it means 'to work' in parallel.  And I don't know what it means to not work in parallel.



To achieve its goals, this work requires a wide scope. The design may supersede, modify, or replace many parts of the current email infrastructure and associated reporting mechanisms - while retaining the ability to support existing use-cases.

Oh.  In parallel with existing /email/.  You want to replace the current Internet Mail infrastructure.  Gosh...

Forgive me, but, again, this is something for the IRTF, not the IETF.



    Deliverables

To gain widespread adoption, it is expected that proposed solutions will be tested during the development of specifications. The working group will favor designs which have been tested for interoperability at scale.

This working group will produce multiple documents, at least:

  * A overview document describing the problem area and proposed
    mechanism (informational)
  * One or more documents on implementation of the mechanism
    (standards track)
  * A guide for implementation during the changeover period, in which
    interoperability with existing mechanisms needs to be maintained
    (informational)

This working group will also liaise with the DMARC working group on adding this as a recognised authentication mechanism.


    Milestones

  * WG Formation: Dec 2024
  * Overview document adopted: Jan 2025

You think it will take only one month to complete the overview document, given what time-frames other email work has been taking?



  * Mechanism document draft(s) adopted: Mar 2025

Only two more months for a stable specification effort?  Really?


  * Experiments and updated drafts: Apr 2025 - Nov 2025
  * Implementation guide adopted: Nov 2025
  * Group of documents sent to IESG: Dec 2025


d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
***  bluesky: @dcrocker.bsky.social  ***
mast: @dcrocker@mastodon.social
_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to