-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At the end of January Dave Crocker posted a review of the then current
"-01" version of draft-gondwana-dkim2-motivation. This document has now
been split into an "-02" and draft-gondwana-dkim2-headers (-01).

Rather belatedly this is a response to that review, albeit spread over
14 (sorry) emails... ">>" is a quote from our document, ">" a quote from
Dave Crocker ... lines that do not start with a ">" are me speaking.

- -=-=-=-=-=-=-=-=-=-=-=-=-

>> 4.2.  Preventing backscatter
>>
>>     *Issue:*
>>
>>     With DKIM1, you can send delayed bounces if the message has come
>>     directly to you and the DKIM signature is DMARC aligned, but
>>     otherwise you need to reject at SMTP transaction time to ensure you
>>     won't be creating backscatter.
>
>What is a 'delayed bounce'?

a DSN (Delivery Status Notification)

>   *DKIM has nothing to do with bounces.  Really.  Nothing.*
>
>Nothing 'requires' rejection at SMTP transaction time.

Perhaps you could explain how backscatter is avoided if you do not
reject at SMTP transaction time ?  We give one example of how you can
currently avoid it, but it makes assumptions that do not always hold

>Rejection at transaction time merely moves the question of sending a bounce 
>from 
>the server SMTP, after the session, to the client SMTP, contemporaneously with 
>the session. Or also after it.

yes, but presumably the client SMTP system has some reason for believing
it should be handling the email in the first place -- so it is far
better placed in deciding whether a DSN is appropriate

>In the overall, global model of multi-handler email, this distinction is 
>pretty 
>minor.  It might be deemed significant only in a highly constrained, 
>single-hop 
>scenario.  But even then, well...
>
>>     *Mitigation:*
>>
>>     Provided that an email is correctly signed when received, it can be
>>     rejected at a later point in time.  The DSN will be sent to the
>>     immediately preceding intermediary.  Since the bounce travels back
>>     along the (fully authenticated) incoming path it cannot be sent to an
>>     uninvolved third party.
>
>So, the model is a per-hop signing sequence that is used in reverse to send 
>bounces back through every /relay/ that handled the message?
>
>   *This is quite a fragile operational model.*

why is it fragile when the cryptography gives assurance as to which
entities are taking some "responsibility" for the email ?

>Note that source routing has been largely deprecated in modern networking, yet 
>this scheme relies on it.

it is retracing the outgoing path -- so it is not source routing

>If someone thinks there is promising operational history with this model, 
>please 
>provide citations.

Tor works this way

        Dingledine, Roger, Nick Mathewson, and Paul F. Syverson. "Tor:
        The second-generation onion router." USENIX security symposium.
        Vol. 4. 2004.

        there's a lot more papers, that will get you started

>> 4.3.  Improved privacy for forwarders
>>
>>     *Issue:*
>>
>>     If you want to create a privacy preserving forwarding service, you
>>     need to SRS rewrite the email's bounce address so that bounces don't
>>     accidentally leak the real address of the recipient.
>
>This is presented in a fashion that does not adequately describe the context 
>for 
>the concern.

we should definitely make our document longer in due course

>   *Also, I believe it is a wholly new functional requirement, lacking
>   any history of community concern. *
>
>Feel free to provide documentation to the contrary.

I am told that major German ISPs do not send DSNs when relaying from
their system to another system fails -- on the advice of the lawyers who
believe that GDPR violations may occur.

>To suggest a more complete foundation and to test whether I understand what is 
>intended:
>
>   When a message is re-posted, such as by an aliasing or mailing list
>   service, the original author will not necessarily know the address
>   of the final recipient.  If there is desire to keep the original
>   author from knowing that (new) address, then a bounce message
>   created during this later processing MUST NOT have the original
>   RFC5321.Mail-From return address.  Otherwise, the original author
>   might see this later recipient address in the bounce email.

yes, that's what we are on about

>>     *Mitigation:*
>>
>>     Since the DSN messages always go back up the DKIM2 chain, any hop can
>>     strip off the higher number (i=) records; including the sender and
>>     recipient addresses for them, and create a bounce as if the forwarder
>>     itself was doing the rejection.  As asynchronous bounces will be
>>     common in DKIM2, this is indistinguishable to the sender.
>
>   *This is quite a lot of unnecessary mechanism, for this purpose,
>   absent a much larger system-wide goal for hardened security and
>   privacy functions. *
>
>   *To date, there is no specification for such a service.  That makes
>   the requirement, here, frankly arbitrary.*
>
>Replacing an SMTP Mail From with a different address is appropriate for a 
>number 
>of cases.  It is simple and effective. It is also already quite common.
>
>The current scheme is much more complicated and does not seem to provide an 
>improvement.
>
>How is i= relevant to this?  

later (in time, and higher i= values) of DKIM2 header field

>What does it mean to be a 'higher number' i= 
>record? The text here appears to rely on some extensive detail that isn't at 
>all 
>obvious to me.  I suspect it won't be to other readers. (From reading much 
>farther down, I gather it's the sequence number, except that the nature and 
>use 
>of the sequence number is not explained.  E.g., sequence of what?

yes, we should explain what i= means before using it... and the i=
values are ascending integer values (with no gaps)

- -- 
richard                                                   Richard Clayton

Those who would give up essential Liberty, to purchase a little temporary 
Safety, deserve neither Liberty nor Safety. Benjamin Franklin 11 Nov 1755

-----BEGIN PGP SIGNATURE-----
Version: PGPsdk version 1.7.1

iQA/AwUBZ/l032HfC/FfW545EQLO7wCggAOLmQHETJWkMeb9L5XdjvFyX4oAniWX
yy1Xo3XUJw3/A4UNAS9eIFIm
=yJRY
-----END PGP SIGNATURE-----

_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to