Steffen Nurpmeso wrote in
 <20250415202743.1cAkTnbb@steffen%sdaoden.eu>:
 |Bron Gondwana wrote in
 | <5df9212c-5014-4323-8d70-fbc7d044b...@app.fastmail.com>:
 ||Honestly, with the capacity to undo header changes from dkim2-modificati\
 ||on-algebra I would be more inclined to have the spec list headers which \
 ||MUST NOT be signed (probably just trace headers), and to list additional \
 ||headers to not sign, rather than additional headers to sign.
 |
 |For DKIMACDC we simply go with DKIM.

Having said that i repeat that for *me* the idea to check the
accumulated IETF standards / header registry entries since RFC
6376 happened has a lot of merits.

In fact it seems a lack of inter-IETF/IANA automatization that new
header fields are not automatically announced to standards which
need to cover them cryptographically, .. DKIM!  Isn't it?

The list as posted by Richard Clayton was surely meant to sparkle
discussion, .. i hope.  But there is nothing to discuss.
So i also repeat that it seems to be a non-issue.
In practice good software -- i recall for example Scott
Kitterman's post on his dkimpy on this very list i think -- comes
with a comprehensive (all-inclusive) list of RFC 6376+ headers to
be signed.  (Should have been around May 2024 since i then added
headers to the default lists of my own DKIM signer that normally
do not occur in main header fields, but only in MIME part ones,
like content-description.)

Ie, it is a quality-of-implementation issue, and standards cannot
cover everything.  Ie dkimpy's default set, or my one with
one-letter shortcuts to very easily have a comprehensive default
set at hand (that then can be added to or subtracted from).
If the only freedom that remains is the one to consciously
generate wrong configurations for free-time projects (like IETF
DKIM config), it is a pity, but should not be taken away.

Regarding oversigning/sealing.
For my one i thought about making it the default, but did not.
The manual clearly points it out everwhere, and the examples use
it, however.  I .. would refrain from making it a default.

Regarding block (black) lists as opposed to allow (white) lists.
Better not, there is such an unbelievable amount of garbage in the
main headers, in the wild, *i* would not do this.

Having said that, it is true that only like this very important
header fields like Mail-Followup-To: etc, which were rejected by
IETF in its very usual fail mode, and never sprang into existence
even decades later when DMARC mitigations etc actually increased
their necessity, add the OpenPGP: header field, and there are
surely more, but please do not add autocrypt, HA-HA, here we see
where this ends up.
But Iron-Port, MGA, and whatever else magic huge headers exist,
i would definetely vote for not including those.

So, DKIMACDC: update of RFC 6376, "5.4.1.  Recommended Signature
Content", yes please.  (I do not expect lots of new entries,
however, as in practice i at least do not see such, and MIME
language, jesus, if it has to be.)

Other than that no, it is a quality of implementation issue, but
i expect most people too intelligent to come via 6376

   If the "l=" signature tag is in use (see Section 3.5), the Content-
   Type field is also a candidate for being included as it could be
   replaced in a way that causes completely different content to be
   rendered to the receiving user.

to the conclusion that their default set should include MIME
fields, otherwise the noxxi thing from 2017/8 could not have
happened.  Good software gives a hand.  That a standard likely
will never be able to provide all by itself.

Thank you.

--steffen
|
|Der Kragenbaer,                The moon bear,
|der holt sich munter           he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)

_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to