Re: [Ietf-dkim] Taking Responsibility

2022-12-10 Thread Al Iverson
roblem doesn't seem right to me. There'd be an awful lot of existing, current usage to unwind there to get back to your desired square one, and I'd argue that there's value and utility to lose by doing so. Cheers, Al Iverson -- Al Iverson / Deliverability blogging at www.spam

Re: [Ietf-dkim] Problem Statement

2022-12-10 Thread Al Iverson
email authentication goes. You're more likely a sender, not a forwarder. Cheers, Al Iverson -- Al Iverson / Deliverability blogging at www.spamresource.com Subscribe to the weekly newsletter at wombatmail.com/sr.cgi DNS Tools at xnnd.com / (312) 725-0130 / Chicago (Central Time) __

Re: [Ietf-dkim] Misuse of antiforgery protocols

2022-12-12 Thread Al Iverson
ind-carbon-copy. > > Blind-carbon-copy is already a sign of spam. Except when it's not, like this very mailing list. Cheers, Al Iverson -- Al Iverson / Deliverability blogging at www.spamresource.com Subscribe to the weekly newsletter at wombatmail.com/sr.cgi DNS Tools

Re: [Ietf-dkim] Call for adoption

2023-04-07 Thread Al Iverson
+1 on adoption of Wei's latest draft. -- Al Iverson / Deliverability blogging at www.spamresource.com Subscribe to the weekly newsletter at wombatmail.com/sr.cgi DNS Tools at xnnd.com / (312) 725-0130 / Chicago (Central Time) ___ Ietf-dkim ma

Re: [Ietf-dkim] Headers that should not be automatically oversigned in a DKIM signature?

2024-01-19 Thread Al Iverson
o be specific enough to exclude any of this from the definition of DKIM replay; it says nothing yay or nay about the potential for additional headers. And I think that's fine, as exploits evolve and it would be limiting to have done otherwise. Cheers, Al Iverson -- Al Iv

[Ietf-dkim] Re: DKIM with body length

2024-05-20 Thread Al Iverson
ional reality that large/savvy MBPs will already be invalidating signatures containing l=, while driving the point home for smaller providers or those who may be more of a stickler about RFCs. Cheers, Al Iverson -- Al Iverson // 312-725-0130 // Chicago http://www.spamresource.com // Deliverability ht

[Ietf-dkim] Re: PROPOSAL: reopen this working group and work on DKIM2

2024-11-07 Thread Al Iverson
as well. I lean toward thinking it should be called DKIM2 but your changes here don't necessarily prohibit that (or prohibit future discussion on it). Cheers, Al Iverson ___ Ietf-dkim mailing list -- ietf-dkim@ietf.org To unsubscribe send an email to ietf-dkim-le...@ietf.org

[Ietf-dkim] Re: Charter #4?

2025-01-23 Thread Al Iverson
> In message il.com>, Murray S. Kucherawy writes > > >I've uploaded the charter, > > which I found at > > https://datatracker.ietf.org/doc/charter-ietf-dkim/ > > for the record, I think this is suitable for moving forward +1,

[Ietf-dkim] Re: Charter #4?

2025-01-27 Thread Al Iverson
modifying content beyond byte X with no corresponding failure in the DKIM signature checks. In my opinion, Wei is correct here. Cheers, Al Iverson -- Al Iverson // 312-725-0130 // Chicago http://www.spamresource.com // Deliverability http://www.aliverson.com // All about me https://xnnd.com/ca

[Ietf-dkim] Re: Charter #4?

2025-01-27 Thread Al Iverson
lown imo) about l= go back 20 years. > It's hardly a new argument, and anything the supersedes it will have the > same considerations. "Hardly new" doesn't seem to be a suitable reason to leave it be. "Anything new will have the same problem" is a heck of an

[Ietf-dkim] Re: Charter v5 available

2025-01-28 Thread Al Iverson
this is great. And this time around I'm going to try not to fall into the trap of debating bits about DKIM shortcomings or potential fixes today -- seems like that's best saved for discussion within the charter-defined working group, not in the meta-discussion around defining th

[Ietf-dkim] Re: ELI5: DKIM2 and DMARC

2025-03-23 Thread Al Iverson
don't /only/ show failed-but-accepted messages. If this use case is invalidated (is it? I don't quite understand why it would be invalidated), others still exist. TL;DR, DKIM2 w/o DMARC leaves what I think would be reporting gaps that I think IT/security people might not want to lose insig

[Ietf-dkim] Re: ELI5: DKIM2 and DMARC

2025-03-24 Thread Al Iverson
I agree. I honestly do want "no auth, no entry" but I approach it through deliverability eyes of "my server, my rules" for inbound mail processing. I want to enable choice, not demand the only path. Cheers, Al -- Al Iverson // 312-725-0130 // Chicago http://www.spamresource.c

[Ietf-dkim] Re: ELI5: DKIM2 and DMARC

2025-03-24 Thread Al Iverson
Thanks for taking the time to reply and explain, Todd! I appreciate it. >> > Moreover it removes the need for any kind of reporting, as a Domain Owner >> > will know from the rejections which messages that it authorized failed to >> > authenticate and presumably why, and the Domain Owner will ne

[Ietf-dkim] Re: Multiple rcpt-to's

2025-03-26 Thread Al Iverson
ome back post send nowadays. Even for those platforms, they effectively still utilize "one message per rcpt to" as they use salted links and image paths to track clicks and opens, respectively. So if the question is, is this how it primarily is today, the answer is that there's lots of

[Ietf-dkim] Re: On the rationale for a new protocol (from the meeting)

2025-03-31 Thread Al Iverson
signature, accidentally or otherwise. I think I don't want an existing DKIM verifier to be able to provide some sort of result for a DKIM2 signature. I foresee much confusion resulting from that. I think there would be lots of downside from that confus