-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At the end of January Dave Crocker posted a review of the then current
"-01" version of draft-gondwana-dkim2-motivation. This document has now
been split into an "-02" and draft-gondwana-dkim2-headers (-01).

Rather belatedly this is a response to that review, albeit spread over
14 (sorry) emails... ">>" is a quote from our document, ">" a quote from
Dave Crocker ... lines that do not start with a ">" are me speaking.

- -=-=-=-=-=-=-=-=-=-=-=-=-

>> 4.  How the aims of DKIM2 are achieved
>>
>> 4.1.  Simplification & codification
>>
>>     *Issue*:
>>
>>     Every DKIM1 signature specifies an explicit list of which email
>>     header fields have been signed.  This leads to inconsistent signing
>>     of headers, and allows a signature to be created in which security-
>>     critical headers are not covered.
>
>Rather, it simplified the specification and permitted operational flexibility, 
>leaving this particular configuration choice to be specified later, based on 
>operational experience and independent community rough consensus.  It was not 
>clear what the right set would be and it was (and remains) possible that 
>different scenarios would benefit from different sets.
>
>In other words, there was no definitive basis for specifying the exact set to 
>cover.  To my knowledge, there still isn't.
>
>   *So the concern, here, is not with something left out of DKIM but
>   something left out of community discussion and consensus. Worse,
>   there has not been any public discussion that has demonstrated this
>   to be a problem.*
>
>One of the problems in the assumption about this item is that DKIM is supposed 
>to be 'protecting' data integrity of 'security-critical' header fields.  That 
>was never a design goal. The design goal was simply a means of affixing an 
>accountable domain name.
>
>Data integrity protection is a collateral benefit, given the method used to 
>affix the d= domain name.
>
>So the movement to 'protecting security-critical fields' is a major change in 
>goals for the mechanism.
>
>   *That said, the change does not require a new 'protocol'. *
>
>   *It requires a new BCP declaring a signing practice to cover a
>   specific set of header fields (and body).*

If all that was being done was to try and improve the list of headers
that people sign then I would agree. But that's not what is happening
here ...

>>   To prevent bad actors from adding
>>     headers which were not originally present it is common to oversign by
>>     signing null versions of headers that are not present.  This
>>     oversigning may be extended to signing two, for example, Subject
>>     header fields because some recipients may not enforce the [RFC5322]
>>     requirement of uniqueness.
>>
>>     *Mitigation:*
>>
>>     DKIM2 will specify a fixed set of headers in accordance with now
>>     well-established best practice (and insist they are unique) so there
>>     will be no need to list what is signed.
>
>"insist they are unique"
>
>Sigh.  Another step in making email a rigid, limited service, based on a 
>snapshot in time, with a specific set of uses.

Our current thinking, which will be reflected in documents Real Soon Now
is that we will provide a standard list of header fields that will be
required to be signed by default -- signers can add to this if they
wish. In each case we will sign all instances of a header field that are
present (in the order they occur in the email) -- viz: we will specify
oversigning by default.

The list of header fields is currently

        Author
        Bcc
        Cc
        Content-Base
        Content-Description
        Content-Disposition
        Content-Features
        Content-ID
        Content-Language
        Content-Location
        Content-Transfer-Encoding
        Content-Translation-Type
        Content-Type
        Disposition-Notification-Options
        Disposition-Notification-To
        Date
        From
        In-Reply-To
        List-Unsubscribe
        List-Unsubscribe-Post
        MIME-Version
        Reply-To
        Require-Recipient-Valid-Since
        Sender
        Subject
        To

we believe that not securing these header fields would enable a bad guy
to take a message and cause it to be processed or displayed or responded
to in a way that the originator of the message did not intend.

Note that all DKIM2-* header fields will also be included

>   *Note that this purports to fix a problem, but it isn't one. It's
>   ugly, but that's different from being a problem. *

the problem it fixes is that people don't currently sign for all of the
headers I have listed and this affects the security of email

>   *So this is a move to make email a lot more rigid, in order to make
>   a few folk more comfortable, rather than to fix an actual,
>   significant problem.*

in what way ... you can supply any number (from 0 upwards) of any of
these header fields in your message and (provided you get the
modification algebra right) add or remove any number of these headers

you can also put in any other header fields you wish, and you can
declare them to be signed from that "hop" (that i= value) onward

you may not end up with a valid RFC5322 message but that's not
immediately relevant

>>     However, some exotic headers may need to be signed for unusual or
>>     future use-cases.  DKIM2 will allow this with an h= field.
>
>ahhh.

if it is clear that further header fields should be added to the default
list whilst the Working Group is active we should of course do so --
some people seem keen on Expires, for example.

>   *So the proposal is not to eliminate listing of fields to be signed,
>   but to have a core set of required/default fields and not list them.*
>
>That's quite different from what was being claimed..
>
>It also, again, is solving a non-existent problem.

We've explained what issue it addresses.

It also reduces the size of every (cautious) email by 383 bytes (766 if
the oversigning is not default) ... and there's a carbon footprint issue
here that we should not ignore without careful consideration

This article talks about deleting email, calculations for reducing the
size of billions upon billions of emails per day are left as an exercise
for the reader.

<https://mycarbonfootprint.id/references/358/wow-menarik-ternyata-
menghapus-email-bisa-kurangi-emisi-karbon>

- -- 
richard                                                   Richard Clayton

Those who would give up essential Liberty, to purchase a little temporary 
Safety, deserve neither Liberty nor Safety. Benjamin Franklin 11 Nov 1755

-----BEGIN PGP SIGNATURE-----
Version: PGPsdk version 1.7.1

iQA/AwUBZ/l0wWHfC/FfW545EQJz8QCgxZl0BJiFC2iSiHKppihh9eNOJ0IAoJc6
FiFCPHrVKTZudfs6fFZth29Q
=dvzt
-----END PGP SIGNATURE-----

_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to