Michael Thomas wrote in
 <4af22ea9-b533-497b-bd14-d37b46a61...@mtcc.com>:
 |On 1/30/25 5:00 PM, Murray S. Kucherawy wrote:
 |> On Thu, Jan 30, 2025 at 1:34 PM Michael Thomas <m...@mtcc.com> wrote:
 |>>     But I'm content to leave that discussion to the WG rather than
 |>>     the charter.
 |>>
 |>     I do think it's a valid discussion point to understand why this
 |>     has bubbled up to the top. I know there's been talk about this off
 |>     and on for quite a while, but it's never seemed very serious. That
 |>     makes me curious why it is now.
 |>
 |> Basically, assuming it works, it gives a more reliable answer to "Did 
 |> the author domain actually send this?" than any of the DKIM policy 
 |> add-ons can.
 |>
 |Depending on the scope of what the mutations reversal is, a fair amount 
 |of it has been available 20 years. New work might be more comprehensive, 

No.  What DKIM as standardized provides was never enough to deal
with the actual mutations that a message sees on the fly.  This is
especially true with MIME, as mailing-lists then change the MIME
structure.  It was like that already twenty years ago (even
thirty), so sorry, with respect to how you speak here it must be
said ...

 |but the concept is hardly new. The proposed new work also suffers from 
 |the sender depending on something that's out of its control: that a 
 |mailing list, for example, participates and a receiver cares, which is 
 |far from a given.

That is true.  That is true for anything, may it be DMARC, ARC, or
anything else.  However, *if* the WG adopts a DKIM v1 "iteration
approach, instead of inventing "something new", then it can/could
be expected that the installed software base is "upgraded" as new
versions of their used software appear, and then time will it
bring.
However, it seems to me it (DKIMACDC) *could* (i have yet to see
any possible technical reasoning against it, actually) adapt to
"holes in the chain", if only certain domains along the way are
upgraded.  This, of course, should be those which perform
modifications, like mailing-lists o/
So i bet the IETF lists, given their configuration state, will be
a problem for a long time.

 |So it's just curious to me why people think this is a problem worth 
 |solving now after decades of disparaging the general idea. I had a 
 |specific use case in mind: spear-phishing. This doesn't seem about that. 

What has this to do with DKIM??
Ie if i trust the Kaspersky definition of that phishing attack
that is.
That new DKIM(ACDC) improves the situation: for the first time
reputation can be build upon cryptographic grounds etc etc etc.
I am not a politician to reiterate that shit over and over again.

 |So I'm a little puzzled. I do think we should have a clear rationale for 
 |why we are doing what we are going. That seems to be lacking in the \
 |charter.

Me too.  What *i* do not understand, by the way, is *WHY* the IETF
works the way it does.  Mr. Kucherawy, for example, who deserves
a big and fat acknowledgement, already stated in RFC 7372, and
that was in 2014, eleven (11!) years ago, "(This violates the
advice of Section 6.1 of RFC 6376.)", *several times*.
And there was more, thinking about his draft with the SMTP
receivers cast in stone (forgotten about its name; i think it was
from 2017!).
So the problems and solutions are very well known.
What is happening here *THUS*???
So *IF* *I* see *THAT* picture, you know, the IETF *SUCKS*.

(I am out for cycling now, in the dark, under the stars.)

Greetings and Ciao! from Germany,

--steffen
|
|Der Kragenbaer,                The moon bear,
|der holt sich munter           he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)
|
|In Fall and Winter, feel "The Dropbear Bard"s pint(er).
|
|The banded bear
|without a care,
|Banged on himself for e'er and e'er
|
|Farewell, dear collar bear

_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to