Alessandro Vesely wrote in
 <8e69637f-508c-49e6-9029-5bacdb799...@tana.it>:
 |On Sun 06/Apr/2025 20:56:35 +0200 Dave Crocker wrote:
 |> The goals for the new effort are for a very different set of services.  \
 |> There 
 |> is nothing wrong with wanting those services, but really, they are \
 |> not DKIM.
 |> 
 |> The semantics of the new effort really are orthogonal to DKIM.  (And \
 |> that is 
 |> one of the reaon the technical errors in the Motivation draft demonstrat\
 |> e a 
 |> fundamental misunderstanding, rather than being minor distractions.)
 |> 
 |> One of the reasons a new effort should adopt a different name is \
 |> to help people 
 |> understand that the new effort is for something entirely different \
 |> from what 
 |> DKIM intended to do.
 |
 |AIUI, countering replay is a major semantic difference.  DKIM bears \
 |the concept 
 |of identifying a domain responsible for a message regardless of which hops 
 |forwarded the message.  It overcame SPF in this regard.  However, replay \
 |is a 
 |trouble for freemail providers, as it prevents them from controlling \
 |the spread 
 |of a message.  As it turns out, spread can be controlled by tweaking a few 
 |technical knobs of DKIM.  The result, of course, is something different.
 |
 |Although different, DKIM2 shares a huge amount of concepts developed \
 |alongside 
 |DKIM, from the tag=value specification, to underscored domains and key 
 |distribution, to hashing and signing.  The latter, signing, seems to \
 |be the 
 |most widely known feature of DKIM.  "If you see DKIM-Signature: don't 
 |autoconvert."  It has had a significant impact on the email ecosystem. \
 | It is 
 |from this point of view that DKIM and DKIM2 are two of a kind.

It is bizarre that it is considered to throw away a functional
protocol that is installed and in use in very large number of
installations with likely grown and proven and often not simple
configurations for no other purpose but to serve big egos.

I do not personally concur with neither Dave Crocker nor you in
that i do not see a difference.  It is only that the DomainKey's
coverage is extended to protect the SMTP envelope:

  DomainKeys Identified Mail (DKIM) permits a person, role, or
  organization that owns the signing domain to claim some
  responsibility for a message by associating the domain with the
  message

Where do you see a semantic difference when the envelope is
protected additionally?  (My proposal: temporarily, on mutual
agreement, in the direct sender->receiver line where the envelope
is anyway visible?)  I even sound suggestive and manipulative.

That differences, protected by signatures, come in, i welcome very
much, as it will allow cryptographically verifying all
modifications a message has seen, up to the original version.
And that means that all DKIM signatures along the path can be
verified -- this is, actually, isn't it?, for the first time, the
very realization of the RFC 6376 DKIM manifest, as above:
responsibility can be proven, along the path!
That is a semantic difference, but in the spirit of DKIM, desired!

That certain headers will always be covered, and that certain
constructs are no longer valid (in my proposal that only iterates
DKIM): that has proven necessary or desirable.  It in parts should
have been cast in standard words many years before even!

That in addition the additional header fields used by both
proposals are linked with sequence numbers, ie, that the "header
stack" is let's say "bypassed", well, it is so la-la.  I mean, it
remains a stack for the "normal" header fields included in the
signature itself.
Here there is a semantic difference to RFC 6376, namely "6.1.
Extract Signatures from the Message".  The existing DKIM says:

  Verifiers MAY try signatures in any order they like.  For
  example, one implementation might try the signatures in textual
  order, whereas another might try signatures by identities that
  match the contents of the From header field before trying other
  signatures.  Verifiers MUST NOT attribute ultimate meaning to
  the order of multiple DKIM-Signature header fields.

And that has to change, especially the

  another might try signatures by identities that match the
  contents of the From header field before trying other signatures

paradigm is where i disagree with Dave Crocker, when he says "it
is not DKIM that is at fault, it is DMARC".
The iterated DKIM will have most hops (as far as reality really
sees this in plural) only check the newest, the one with the
highest sequence number.  If that succeeds we are with 6376 again:
a ~"single successful validation allows verification to succeed".
(You know all that, of course.  Just saying.)

 |Best
 |Ale
 |-- 

Greetings, and
Ciao,

--steffen
|
|Der Kragenbaer,                The moon bear,
|der holt sich munter           he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)

_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to