On 1/28/2025 7:29 AM, Murray S. Kucherawy wrote:
I've uploaded the discussed changes to the charter,

Core advocates of this effort are thoroughly committed to the details of their draft document.

And they have been consistently hostile to proposals for alternative details, either ignoring the suggestions, responding with casual dismissal, or worse.  Fundamentally, there has been no willingness to engage in meaningful discussion about alternatives.

As such, an honest and pragmatic charter needs to cite that draft and needs to explicitly encourage consideration of alternatives.


As for the current draft text details...

Background

An Internet message (email) may, from creation to final delivery, pass through multiple intermediaries, some of which simply handle and route the message, others effecting an interim delivery and re-injection into the ecosystem. There are complexities with this handling model, such as evaluation, filtering, intentional mutation, and even malicious activities.

Again, the term intermediaries does not have a clear, consistent, widely-held meaning.  It could reasonably mean MTAs.  It could reasonably mean mailing lists.  Because it variously does.

There is no way to know what is meant here.  Especially for a potentially wide-spread audience, including folk with little email technology background, but who need to understand the goals of this working group.  A charter needs to be understandable to such folk.



The core email protocols do not provide for authentication of the identifiers in the message that indicate authorship, receipt, or handling, nor do they involve themselves with evaluation of the content for any sort of validity or safety. DKIM [STD 76 <https://datatracker.ietf.org/doc/std76/>] defines a mechanism for associating a domain name with a message stream and validating its use, which permits evaluation of the stream with a high probability that the owner of that domain name has some responsibility for the handling of that message.

There are contemporary issues, which were not concerns at the time of STD 76 <https://datatracker.ietf.org/doc/std76/> or earlier standards, that the community now seeks to address, including the following:

 *

    There is a desire to maintain validation of a message's signing
    identifier across common transit and forwarding modifications.
    When a message goes through a re-posting, such as through a
    mailing list, the validation signature typically does not survive
    and cannot be recovered. Fixing this would permit a more robust
    evaluation of the message.

'Message's signing identifier" has meaning only to experts and has not been introduced or explained here.

So, perhaps:

   DKIM attaches a domain name to a message, by using a cryptographic
   signature.  The signature survives simple relaying but does not
   survive transit through some {intermediaries?}. There is a desire to
   retain signature validity across a wider range of common transit,
   including where modifications are made during forwarding, such as by
   mailing lists.



 *

    DKIM “replay” exploits the absence of a protected recipient
    address, where an authorized user of a site sends a message that
    is signed by that site to a collaborating receiver, which then
    re-sends the message to other recipients not in the original set
    of recipients, but without any indication that the message has
    been re-posted. This way, the domain name of the DKIM signature is
    intended to result in a positive reputation analysis that will
    obtain deliveries that otherwise would not succeed.

 *

    “Backscatter” can result from unauthorized use of the (envelope)
    sender of a message, where bulk failure notifications go to an
    address that is not responsible for such unauthorized use.
    Service providers that generate mail on behalf of an entity have
    no visibility into any resulting errors, as they are sent to the
    entity and not the provider.

No optimal or preferred remedy to any of the above is provided by any contemporary technology.

Objectives

The working group will develop a new technology suite that seeks to address these concerns. Pursuit of incremental enhancements to DKIM and/or novel applications of DKIM are preferred, but not required. In particular, this technology will strive to:

 *

    Provide stronger assurances against unauthorized use of the
    (envelope) sender, reducing the success of direct domain name
    misuse and improving the value of delivery status notifications;

'stronger' only makes sense when there is some history of attempting assurances.  To my knowledge, there is no such history.

I suggest removing the word, to avoid implying a history of failed effort about this.



 *

    Identify message mutations made by any handling agent; and

This objective has no foundation in the charter.  There is nothing to indicate why it is a desirable effort, relevant to the problems listed above. Nor any indication that it has no operational history in networking services.



 *

    Attach annotations in transit of the intended chain of handling to
    assure accountability for each delivery.

ditto.



The working group will strongly prefer output that, when deployed, does not disturb the deployed ecosystem. It may, however, through the normal course of evolution, replace technologies such as DKIM, DMARC, and ARC.

The issue is less about disturbing the deployed ecosystem and more with seeking incremental improvement, where replacement is a last resort.  The difference between these two is extremely important. Especially given the demonstrated positions of the primary advocates of this work.



To allow for widespread adoption, proposed solutions are expected to be robust in terms of interoperability and scalability.

Deliverables

The working group will produce multiple documents:

 *

    An overview document describing the problem area and proposed
    mechanism (Informational)

 *

    One or more documents specifying the new mechanism(s) (Standards
    Track)

 *

    An Applicability Statement guiding use during any deployment
    period, in which interoperability with existing mechanisms needs
    to be maintained (Standards Track)

The working group may optionally introduce the mechanism document at Experimental status first to gain operational experience before pursuing Standards Track status.

This working group will also liaise with the DMARC working group on adding its specification as a new recognized authentication mechanism. If the DMARC working group has concluded by that time, this working group can undertake that update in coordination with the responsible Area Director.

Proposed Milestones

[dates to be negotiated; focus on the sequence for now]

 *

    WG Formation: Feb 2025

 *

    Overview document: Mar 2025

 *

    Mechanism document draft(s): Mar 2025

Looking at the history of email specification efforts in recent years, how are these dates plausible?



 *

    Experiments and drafts: Apr 2025 - Nov 2025

 *

    Implementation guide: Nov 2025

 *

    Publish documents as a group: Dec 2025


--
Dave Crocker

Brandenburg InternetWorking
bbiw.net
bluesky: @dcrocker.bsky.social
mast: @dcrocker@mastodon.social
_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to