On 11 Dec 2024, at 22:59, Murray S. Kucherawy wrote:

I've uploaded the charter text at the top of this thread to the tracker (not the one from 11/27 yet). I wanted to do another round trip on some of
Dave's points.

I am not concerned with milestones yet. The text is far more important.

On Wed, Nov 27, 2024 at 4:15 PM Dave Crocker <d...@dcrocker.net> wrote:

Summary:

- As provided, this is an extremely broad and extremely vague statement of work. It continues to sound far more appropriate for the IRTF than the IETF, especially absent a concete draft specification to take as input. (It's not as if the IETF hasn't accepted charters like this. But it /is/ as if such working groups have typically not fared well. Stated more baldly, "let's charter a group and then figure out what we are going to do" has a bad history in the IETF.)

Bron (or anyone involved), do we have any initial documents to propose formally in the charter?

Murray, are you looking for existing documents to be listed in the charter that might be proposed for adoption, or do you want a more detailed description of what documents that will fulfill the charter will contain?

At base, I disagree with Dave that this is anything like IRTF work (in that the IRTF, as least as constituted today, is doing things that fall into academic research, not pre-standards work) or that work brought to the IETF needs to be somehow more concrete than the work proposed here. The motivation draft is far less of a "broad" and "vague" base document than initially provided for much successful work proposed in the IETF, and this work is building on already existing DKIM mechanisms, so I don't understand Dave's evaluation of this proposal. That aside, the technical folks who are proposing the work are a group of serious implementers who have already successfully implemented and deployed DKIM (among other email infrastructure) and are bringing this work with that implementation and deployment background, so I think there is a hight likelihood for success.

- The draft seems to include a target of 'trust relationships' which is an open research topic that DKIM only indirectly relates to, except for trusting a signature.

DKIM benefits from trust relationships, as does any other authentication protocol, and is of limited use without them, but pays very little attention to them in text because they are the purview of an implementation's "special sauce". If there's a clear intent to develop an interoperable notion of trust relationships (i.e., reputation), we should say so explicitly, otherwise I suggest that we should avoid the topic or, at a minimum, leave it to a post-rechartering topic.

Agree that this should be left for post-chartering, if tackled at all.

- IETF Internet Mail handling really only covers a single posting/delivery sequence. It touches on more elaborate sequences, but only piecemeal. And draft charter does not really note or deal with this difference in scope. So the proffered 'holistic' effort is a very considerable increase in scope from something labeled DKIMbis or DKIM2.

I concur, though I don't believe this is a showstopper, is it? Maybe we just need to be more explicit that the scope here is to try to carry authentication information from injection through delivery and every intermediary in between.

I agree it's not a showstopper. 5322's discussion of "Resent-*" fields (see particularly the "Note:" on forwarding in https://www.rfc-editor.org/rfc/rfc5322.html#section-3.6.6) goes beyond single posting/delivery, and I think this work can do the same. I do of course think that mailing lists, particularly those that rewrite the contents of messages, are the elephant in the room for all of this work, but I think the folks proposing this work have a handle on how much work they've bitten off. (And I'll give Murray a hard time for saying that this is about intermediaries between injection and delivery; as Dave below, it is a series of injections and deliveries.)

DKIM2 Draft Charter
---
**[Background](https://notes.ietf.org/#Background)**

Emails often flow indirectly through multiple systems, undergoing redirection, expansion into multiple copies via aliases and mailing lists, as well as rewriting and filtering before eventually arriving at a mailbox or being processed by a receiving software agent.

The opening sentence sets a stage that matches many end-user experience views of email, but misses the basic technical distinction that is the essence of the enhancement being sought. **As described in that sentence, email is delivered more than once, before it is 'finally' delivered.**

That sentence does not use the word "delivery" at all and therefore does not imply that delivery (as understood in email architecture terms) happens more than once, or that it is "finally" delivered. If the objection is that the phrase "eventually arriving at a mailbox" is incorrect because each act of redirection, expansion through alias or MLs, rewriting, and filtering is itself an act of "arriving at a mailbox", I can see improving that phrase to, "before arriving at a particular mailbox or processed by some receiving software agent". Overall, given that charters are information for the entire IETF (and beyond) to understand the work that is being done (in addition to defining what the WG may and may not work on), I think leaving the opening in terms of the functional (what Dave calls "end-user experience) view and get more precise if it is called for later in the charter.

So instead, perhaps:

It is common for an email to go through multiple posting/delivery sequences, before eventually arriving at a 'final' mailbox or being processed by a 'final' receiving software agent. Examples of such 'indirect' flow include redirection through an alis, expansion into multiple copies via an alias or a mailing list, as well as rewriting and filtering before eventually arriving at a mailbox or being processed by a receiving software agent.

Would like to hear other opinions of this.

I think this proposal over-complicates the introduction, leaving the reader guessing what important distinction is being made by putting 'final' and 'indirect' in scare quotes. I'd rather see the original opening with the clarification I gave above.

I left 'rewriting' in but actually don't know what it refers to, nor why 'filtering' is relevant to DKIM signature survival.

(By the way, I thought that posting from an ESP was also classed as an indirect flow. Is this not correct?)

I presume "filtering" includes any sort of stripping of material an intermediary or edge MTA might consider to be worth stripping for whatever reason (e.g., malformed header fields) but I agree that an example might be helpful to clarify.

I imagine "rewriting" is there for any of a number of reasons. Very early on in my email career I used to see things like m...@example.com used externally but it was rewritten (unnecessarily, it turns out) to m...@host.example.com prior to delivery when the main ingress server figured out which host was mine. There are probably more apt modern examples.

Yep. "Rewriting" I take to be the aforementioned mailing list elephant. "Filtering" is (AFAICT) just another example of indirect flow where a message leaves and is reintroduced into the transport system.

And yes, I think ESPs count as an indirect flow.

- DKIM provides a way to detect that the content of a message was not altered between the signing domain and its eventual destination.

This sounds correct but can be misleading, given the 'eventual'.

...between the signer and any verifier?

As above, s/its eventual destination/a given destination.

DKIM was designed to work from one posting to one delivery. It was never intended to survive the vagaries of what can happen between a delivery and a next posting. That it sometimes does survive is nice, but was not a design goal.

So what is being sought here is a very basic and very substantial increase in scope for DKIM.

Is this another example of what you described above as the perceived use case vs. what's actually happening?

Perhaps:

"DKIM provides a way to detect that the content of a message was not altered between the signer and a verifier, even if this requires one or more intermediate deliveries and re-injections."

Seems fine to me.

Several attempts have been made to address the issues that arise with alterations made by intermediate systems. For various reasons, these technologies have failed to provide the information to reliably distinguish between legitimate mail, and replay or alteration of messages by bad actors.

DKIM does not attempt to distinguish 'legitimate' mail from mail that is not legitimate.

Luckily, the above sentence doesn't say that it does. The "attempts" and "technologies" are not DKIM.

From the use here, I infer "unmodified since injection" to cover content and something about the original, intended recipient set to cover replay.

As for 'replay' it needs to be precisely defined here, especially since there are different views about what it refers to.

+1

I'm not even sure it needs to be mentioned here, but yes, worth defining if you do.

As for alteration by bad actors, I was not aware that that is considered a problem for DKIM. In fact I thought it was /not/ a problem. So this needs to be explained and documented.

This gets to "acceptable" mutations, whatever that means. Or "innocent", maybe?

DKIM2 is (in part) attempting to define how to sign not only the original message but also alterations made by intermediaries. Whether those mutations are "acceptable" or "innocent" is left to the verifier/evaluator.

Objectives

This working group will take a holistic approach to the underlying problems of message alterations, error handling, and trust relationships between the systems involved in handling an email - from its inception to arrival at its final destination.

There are problems with error handling? What are they? I don't recall seeing discussion of this. What is the actual work to be done? What goals for improvement are sought?

+1

Agreed, that needs a bit more text.

Trust relationships are far -- very far -- beyond the scope of DKIM, other than whether a DKIM signature can be trusted.

I think it's fine to discuss how trust relationships might couple with DKIM to impact handling decisions, but how to develop or track trust is probably rightly out of scope (unless someone has something in mind).

Yes, I read it as how DKIM2 results can be used with trust relationships to impact handling decisions, not defining trust relationships.

Given the considerable increase of scope for DKIM and range of topics cited here for improvement, the charter should have a concrete proposal to take as input, if only to provide an example of how one might approach dealing with these topics.

I would prefer a good starting point as well.

I'm fine with Richard providing the draft he mentioned as a starting point, but I don't think it is strictly necessary.

The working group will use the mechanisms of DKIM as a basis, extending and modifying them to solve problems that have been identified in real-world usage.

Since they have been identified, they should be documented here, clearly enough to aid the working group in knowing whether something is in-scope our out of scope.

+1

I think they have been identified ("issues that arise with with alterations made by intermediate systems", inability to "distinguish between legitimate mail, and replay or alteration of messages by bad actors"), but I think being specific here is fine.

It will be necessary for any new design to work in parallel with the existing mechanisms, and have a clear upgrade path.

If it is parallel, it is independent. So I don't know what it means 'to work' in parallel. And I don't know what it means to not work in parallel.

I imagine the intent is not to disrupt the deployed DKIM base while DKIM2
(or whatever) is being developed or deployed.

That was my belief as well.

To achieve its goals, this work requires a wide scope. The design may supersede, modify, or replace many parts of the current email infrastructure and associated reporting mechanisms - while retaining the ability to support existing use-cases.

Oh. In parallel with existing /email/. You want to replace the current Internet Mail infrastructure. Gosh...

I don't believe that was the intent, though I absolutely see how it could be read that way. This may replace parts of the current email *source authentication* infrastructure and its associated reporting mechanisms, not the whole kit-and-kaboodle.

Forgive me, but, again, this is something for the IRTF, not the IETF.

I'm not convinced there's an IRTF project to charter here; this feels IETF-y to me.

I agree. See above. This is engineering.

pr
--
Pete Resnick https://www.episteme.net/
All connections to the world are tenuous at best

_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to