-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At the end of January Dave Crocker posted a review of the then current
"-01" version of draft-gondwana-dkim2-motivation. This document has now
been split into an "-02" and draft-gondwana-dkim2-headers (-01).
Rather belatedly this is a response to that review, albeit spread over
14 (sorry) emails... ">>" is a quote from our document, ">" a quote from
Dave Crocker ... lines that do not start with a ">" are me speaking.

- -=-=-=-=-=-=-=-=-=-=-=-=-

>> 3.  Basic ideas
>>
>>     An email is DKIM2 signed by the originator -- in pretty much the same
>>     way as is done in the existing DKIM1 standard.  In practice the vast
>>     majority of mail is signed using relaxed/relaxed methods.  DKIM2 will
>>     only allow relaxed/relaxed.
>>
>>     Each "hop" that handles the email adds another, sequentially
>>     numbered, DKIM2 header field.
>
>MTA or Intermediary/mediator, or both?
>
>If MTA, why?

That isn't answerable in those terms ... if you move an email between
different systems within the same organisation (whatever that term
means) then there's no necessity to document this in DKIM2 headers
(unless of course the message is changed).

However, if the message is then passed elsewhere then a DKIM2 header
will be needed to show that the message which was addressed (RCPT TO) to
one mailbox is now addressed (RCPT TO) another.

>Also, this adds overhead to basic email relaying.

Almost certainly, yes

>>   A simple relay will only add a single
>>     header.
>
>ahh.  So this really is intending to add this requirement to every MTA, for 
>every message.

apart from special cases yes

>   *Why?*

to deal with the replay issue, to prevent backscatter (or rather to
enable systems to accept an email and then change their mind and
generate a DSN without creating backscatter) and to ensure that DSNs can
be passed back along the "outgoing path" correctly

>>   Email service providers will often add two, one on behalf of
>>     the actual originator the other for themselves.  A relay that
>>     rewrites email from one domain to another will add two headers to
>>     record the rewriting.
>
>That's not a relay.
>
>Relays don't change the message.  And they typically only add a Received: 
>header 
>field.

they generally change the destination mailbox as well ... there is an
old email architecture where machines with a high MX value accepted
email then sent it on to machines with a lower MX value when they had
come back online. People may still operate systems that way but I doubt
that many do. Those systems will not change the destination mailbox,
everyone else does.

>So this is really for Intermediaries and not Relays?
>
>Also, adding a DKIM signature isn't onerous, but it's not free, either.
>
>If this is for Intermediaries/mediators, how does this differ from ARC, and 
>what 
>are the improvements?

it differs from ARC by being simpler (one of very first design goals was
that DKIM2 could be explained in a 5 minute "lightning talk". I don't
think that ARC achieves that and it does less than DKIM2). It also
differs by changing the trust model.

>>     If an email is accepted by a server but it is later found that it
>>     cannot be delivered onward, or further analysis of its contents leads
>>     to a determination that it should not be delivered after all, then
>>     the previous hop is informed by means of a Delivery Status
>>     Notification (DSN).
>
>Previous hop?  Not the Originator?  Why?

to achieve the goal of allowing all the systems that handled an email on
its outgoing path to become aware of delivery failures.

Those systems may feel empowered to deal with the delivery failure
themselves and not bother the Originator (both mailing lists and ESPs
may be in that situation).

Also when an email have been passed through a system to somewhere else
and a delivery failure occurs, that system may feel that it is prudent
(perhaps from a security or data protection standpoint) to hide the
identity of the "somewhere else" from the Originator -- but instead to
just report the failure as if the passing onwards had never occurred.

>>   If a DSN is received for an email that was
>>     previously relayed, then the DSN is passed back to the system that
>>     delivered the email.  Hence, DSNs are returned back along the
>>     "outgoing path" until they reach a system that can take
>>     responsibility for handling the report.
>
>Received by whom?
>Relayed by whom?

The organisation which received the email and sent it to somewhere else
will be given the DSN. It will not be sent to specific machine because
large-scale systems don't work that way, but it will come back to the
organisation who will then decide what to do with it.

>"delivered the email"?  Should this have said 'originated'?  If not, then the 
>statement needs to be clearer about its reasoning.

it should say "relayed the email" ... and I will reiterate a point I
made earlier about this document not being in any way intended to be
final so we have avoided exact definitions of every term so as to be
able to put across ideas of the design without making the document
horrendously long

>
>DSN passed to the /delivering/ system??? Methinks originating is meant.
>
>Why is the 'previous hop' mediating notification of the originator?

because it feels empowered to do so -- for example that may be what the
contract between a brand and an ESP says will happen.

>Why is this path dependent?
>
>   *Why is this extra handling overhead, and demonstrably fragile
>   handing model being required for every message and every MTA?*

because systems further along a "forwarding path" will be unaware of the
contract between a brand and an ESP, will be unaware that the previous
hop was a mailing list, and will be unaware of the Data Protection (or
security) issues that could arise by sending a message back to the
Originator

>>     The DKIM2 headers contain the source and destination of the e
>
>Oh?  email addresses, or just domains?

MAIL FROM and RCPT TO values

>Is 'source' the signer or is that a third parameter?  If same as source, why?

The signer is a domain and a selector as in DKIM1

>So this requires a separate message for each addressee,  For every provider, 
>everywhere, including sites with no DKIM Replay problems. /The incremental 
>cost 
>of the proposed mechanism is not small./

I published some data on that in early March

    Yesterday (Wednesday) at $DAYJOB the percentage of mail delivered to
    a single recipient (rather than 2 or more) was 99.8566%  (I feel
    justified in providing the precision because the total count was
    many billions)

    I also note that the chances of email being automatically classified
    as spam increases with the number of recipients ... it doubles by
    the time the number of recipients reaches 10.

ie: the non-small incremental mainly falls on spammers. Pretty much
everyone else either sends to just one person at a time or personalises
the email they send (with one-click unsubscribes (hurrah) or tracking
pixels (boo hiss)).

>   *Given that DKIM Replay is not a universal problem, dealing with it
>   should incur extra cost only for those having the problem.*

if only it were possible to predict whose email will be replayed

>>     They may also request "feedback" from later entities as to the
>>     quality of the email.  This feedback is sent directly from systems
>>     that choose to honor such requests to any all of the requestors that
>>     the sender deems appropriate.
>
>'quality' is a pretty squishy topic.  I believe there is no widespread, 
>operational history with sharing such information, never-mind any standard for 
>representing it.

"quality" was a way of saying "whether or not the this-is-spam button
was pressed; which may have occurred because your email was spam,
because it was boring, because my finger slipped, or because on
Wednesdays I hate everyone"

>   *This, again, seems an open research topic, once the intended
>   meaning is clarified.
>   *

Feedback loops (as I think you acknowledged earlier) are a well-
established part of the email landscape -- and I think were even when
RFC5598 was written.  So I'm far from clear what the research might seek
to establish.

>>     Intermediaries that alter emails record their actions (so that later
>>     hops can undo and check signatures).  Intermediaries whose
>>     alterations are too complex to be described or reversed will either
>>     have to arrange to be treated as the originator of the message (if
>>     they are near the start of the message's journey) or they will need
>>     to implicitly trusted by any further intermediaries (if they are near
>>     the end of the message's) journey.
>
>There is quite a lot to unpack with this paragraph, and quite a lot of work 
>needed to satisfy its requirements. And before that, quite a lot of work to 
>explain the reasoning and basis for it.
>
>"arrange to be treated as the originator" - huh?

An outgoing "security gateway" may make changes such as adding
disclaimers (or logos) to the end of every email, or may strip out
dangerous attachments (or those containing company secrets!).

    [[[ at $DAYJOB$ I get 5 or so emails a day which purport to contain
    a report of an MTA's experience in using MTA-STS when sending us
    email -- but the actual attachment with the info has been removed:
    ie these security gateways are very real! ]]]

Such a gateway may well wish not to provide any information that reveals
the original content of the email. If so then they need to be provided
with keys so that they can sign an initial (i=1) DKIM2 header

>"need to implicitly trusted by any further intermediaries" - huh?
>"if they are near the end of the message's" - huh?

Similarly an incoming "security gateway" may make changes such as
removing malware or rewriting URLs to use inter-stitials.

In such a case if the email is handled by DKIM2 aware systems thereafter
it may be better all round for those systems to unconditionally trust
the gateway (and the DKIM2 signature it applies) rather than messing
around with "undoing" the changes. Such trust, since the security
gateway would be at the organisations border (and the trusting systems
would be inside that border) does not seem hard to achieve.

>Please revise, to be more pedagogical for an average (or less than average) 
>reader.  I really did not understand what was meant and the reader should not 
>have to guess or fill in the blanks.

This was already rewritten in #2.6 of -02 of the motivation draft

>>     Intermediaries that duplicate ("explode") emails, record their action
>>     so that any further systems that see multiple copies of the email
>>     will not reject or discard the email as a "replay".

- -- 
richard                                                   Richard Clayton

Those who would give up essential Liberty, to purchase a little temporary 
Safety, deserve neither Liberty nor Safety. Benjamin Franklin 11 Nov 1755

-----BEGIN PGP SIGNATURE-----
Version: PGPsdk version 1.7.1

iQA/AwUBZ/l0dmHfC/FfW545EQI/OwCeN1PUC2OBk9zgUMo2fViMqQj93lEAnRLv
QKmwhDOYcYiBQzu7HdqKzZga
=8TeI
-----END PGP SIGNATURE-----

_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to