Perhaps the issue is that two similar but different things are being
conflated here.

Is DKIM2 a new protocol? I think the answer to this is clearly yes. We are
defining a new interaction between systems.

Does the DKIM2 protocol need to be implemented as a new header field, or
can it reuse DKIM-Signature? The current view is that it needs to be
separate, but it is acknowledged that this decision needs to be justified.

Adding additional tags is certainly not a justification for needing a new
header. Verifiers do not need to know about all tags present in the
signature header in order to do signature verification.

Changing the meaning of DKIM1's tags could be a reason, though it's a
fairly weak one. Proposals from the meeting were changing h= to not need to
list mandatory headers, and removing the need for c= by mandating a single
canonicalization method (relaxed/relaxed, or maybe relaxed/simple). Even if
there is an entirely new header, these decisions should be evaluated.

Simplicity for adoption is a potentially stronger reason. DKIM2 is expected
to produce signatures in situations that are not be producing them today.
By having a completely separate header, it is much easier to ensure that
these additional signatures do not disrupt existing flows because signing
systems can do whatever they do for DKIM1 and add DKIM2 in parallel. Extra
DKIM signatures are not likely to be a problem in flows where the message
is delivered unmodified, but in modifying flows there may be differences in
how the message is treated.

On Sat, Mar 22, 2025, 6:49 p.m. Steffen Nurpmeso <stef...@sdaoden.eu> wrote:

> Dear Michael Thomas.
>
> Michael Thomas wrote in
>  <80a3e172-3a1c-471a-b72b-3c07b4dd8...@mtcc.com>:
>  ...
>  |Again, why? Especially if the receiver knows whether it's base DKIM vs
>  |upgraded DKIM via some explicit signaling with the tags from the sender?
>  |If they are just unknown tags, it will verify and even if the receiver
>  |is upgrade-savvy it would just look like a normal STD76 signature.
>
> Since *noone* ever brought that up, i do it myself.
> (If still not /dev/null'ed.)
>
> It cannot be that easy, because the entire email infrastructure is
> totally messed up.  By the IETF.  Mostly DMARC, though.  Noone
> cares for ARC, really.  But DKIM.  But 99% DMARC, say.
>
> The reason is that
>
>   MITIGATIONS
>
> are active, everywhere.  This means that, more often than not,
> either "elder" DKIM signatures are simply thrown away, or renamed
> to, for example, X-Mailman-Original-DKIM-Signature.
> Depends on what is rewritten, and if, etc etc.
>
> And this in turn means that it is IMPOSSIBLE to create valid
> DKIMv1 chains, "except for a single hop message".
>
> That ship has sailed.
> The damage was done many years ago.
> You need to add something new.
>
> Having said that.  It can be absolutely identical to DKIMv1 except
> for the name of the header as such.
>
> For, i think, the last time, and i well understand that many
> comments around here shoot against me by bringing snippets of the
> arguments of the ACDC draft in favour of something else, however
> technically sound that can be (cough, cough), anyone who looks
> will find that the technical approach of the ACDC thing is easily
> done, and is capable to do anything of DKIMv2, but more elegant,
> and with lesser effort.  And scalable, just as is SMTP.
>
> Greetings,
>
> --steffen
> |
> |Der Kragenbaer,                The moon bear,
> |der holt sich munter           he cheerfully and one by one
> |einen nach dem anderen runter  wa.ks himself off
> |(By Robert Gernhardt)
>
> _______________________________________________
> Ietf-dkim mailing list -- ietf-dkim@ietf.org
> To unsubscribe send an email to ietf-dkim-le...@ietf.org
>
_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to