On Tue, Jan 28, 2025 at 2:56 PM Michael Thomas <m...@mtcc.com> wrote:

> That wasn't obvious to me, you might add some text that links the two. And
>> "annotations in transit"... annotations of what? Also "intended"? What
>> might be considered "unintended"?
>>
> The example I gave elsewhere is what I understand: If you're holding a
> message and decide its next hop is X, you would include that little tidbit
> in the new signature somehow.  That way at delivery time you end up with a
> verifiable record of the intended path, and if there's any indication that
> something off that path handled the message, you have reason to be
> suspicious.
>
> Ie, analogous to that new tag in ARC that linked the signature to an A-R
> (iirc)? But my point was I didn't understand what you meant so either I'm
> dumb or the text is not clear. I asked on another post whether it actually
> involved DKIM/signatures or not and didn't get a very clear answer. So
> you're saying "yes it does"?
>
The answer is open; generally, we're saying "consider using a new tag for
this, but it's fine if you have to go to a fully new external mechanism".

>
> But I don't want to be that technically specific in the charter.  We want
> some solution to the backscatter problem, and this is the one currently on
> the table.  Let's specify it later.
>
> Well, you might just say that bullet three is in reference to the back
> scatter problem, because it confused me.
>
Will do.

>
> One last thing: the charter seems like it's dancing around with whether to
>> just upgrade DKIM or do something new. DKIM explicitly allows tag upgrades
>> by telling evaluators they MUST ignore unknown tags. I think we should make
>> explicit that adding a new tag is not a reason to create something new.
>> That is, adding a new tag to a DKIM signature block is not "disturbing" the
>> existing ecosystem.
>>
> That takes advantage of the existing extension mechanism in DKIM.  We
> already say "Pursuit of incremental enhancements to DKIM and/or novel
> applications of DKIM are preferred, but not required."  I think we need to
> give this group the latitude to consider using new tags, but also accept
> that that might not be enough to meet the full set of goals that have been
> stated.  It might be good to include in an appendix the reason the simple
> new tag approach was considered and discarded; that would head off
> challenges later during IETF-wide evaluations.
>
> What I hope to proscribe is some change to DKIM itself that renders the
> deployed base broken, or some reason that when using $NEW_THING, you can
> not simultaneously use STD 76.  We should consider that unacceptable.  We
> probably don't want any flag days either.
>
> Yes, definitely. That would be extremely bad. But as far I can tell, those
> three bullets can either be grafted onto DKIM or live as new headers (in
> particular the mutations bullet) which doesn't involve changes to DKIM per
> se.
>

The charter suggests that such an approach should be considered, but
doesn't constrain the WG to only that possibility.

-MSK
_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to