Re: [Ietf-dkim] DKIM-Signature: r=y and MLM

2018-08-18 Thread Murray S. Kucherawy
On Fri, Aug 17, 2018 at 4:15 AM, Alessandro Vesely wrote: > > The DKIM aggregate reports show whether a server signs correctly all > mails or > > not. If the aggregate reports show that this is sometimes (let's say in > 1%) > > not done correctly, the signer has no way to find for which email th

Re: [Ietf-dkim] DKIM-Signature: r=y and MLM

2018-08-18 Thread Murray S. Kucherawy
On Sat, Aug 18, 2018 at 2:45 PM, Murray S. Kucherawy wrote: > On Fri, Aug 17, 2018 at 4:15 AM, Alessandro Vesely wrote: > >> > The DKIM aggregate reports show whether a server signs correctly all >> mails or >> > not. If the aggregate reports show that this i

Re: [Ietf-dkim] DKIM-Signature: r=y and MLM

2018-08-18 Thread Murray S. Kucherawy
On Fri, Aug 10, 2018 at 8:38 PM, Dilyan Palauzov wrote: > I suggest here in to suggest in a more formal manner, that MLMs modifying > a message are supposed to remove the r=y part of just invalidated > DKIM-Signature and this logic is also applied for ARC, if relevant (I don't > know ARC). Fixin

Re: [Ietf-dkim] DKIM-Signature: r=y and MLM

2018-08-18 Thread Murray S. Kucherawy
On Sat, Aug 18, 2018 at 8:30 PM, Dilyan Palauzov wrote: > Two out of two responders were against removing r=y from the > DKIM-Signature. > > I am fine with removing the invalidated DKIM-Signatures, but mailman > developers are not (https://gitlab.com/mailman/mailman/issues/500) as > this were inc

Re: [Ietf-dkim] DKIM-Signature: r=y and MLM

2018-08-18 Thread Murray S. Kucherawy
On Sat, Aug 18, 2018 at 10:42 PM, Dilyan Palauzov wrote: > I suggested to write in ARC to alter the existing signature. > As I said before, I suspect you will have a hard time selling an "alter the existing signature" idea no matter what document you propose to create or update. -MSK __

Re: [Ietf-dkim] Looking for a little help testing DKIM failure reports, thank you.

2018-12-17 Thread Murray S. Kucherawy
DKIM verifiers are not required to generate reports. It's completely optional. Does the place you're sending to advertise somehow that they will be generated? On Mon, Dec 17, 2018 at 8:36 AM Fazzina, Angelo wrote: > Hi, I am trying to test my TXT records for the ability to report failures.. >

Re: [Ietf-dkim] Adding an aim= tag to DKIM Signature Tag Specifications

2020-05-11 Thread Murray S. Kucherawy
On Mon, May 11, 2020 at 10:30 AM Dave Crocker wrote: > On 5/11/2020 10:21 AM, Alessandro Vesely wrote: > > The question is, what responsibility is being claimed? > > > Tagging keys with aim= would allow senders to choose an appropriate > selector > > under different circumstances. > > If sig

Re: [Ietf-dkim] Adding an aim= tag to DKIM Signature Tag Specifications

2020-05-12 Thread Murray S. Kucherawy
On Tue, May 12, 2020 at 1:20 AM Alessandro Vesely wrote: > On Mon 11/May/2020 20:23:12 +0200 Murray S. Kucherawy wrote: > > Indeed; why would I believe what any given domain claims in this tag? > > If you trust the domain, you can as well trust their tagging. > If you tru

Re: [Ietf-dkim] Adding an aim= tag to DKIM Signature Tag Specifications

2020-05-12 Thread Murray S. Kucherawy
On Tue, May 12, 2020 at 9:30 AM Alessandro Vesely wrote: > On Tue 12/May/2020 17:48:38 +0200 Murray S. Kucherawy wrote: > > On Tue, May 12, 2020 at 1:20 AM Alessandro Vesely > wrote: > >> On Mon 11/May/2020 20:23:12 +0200 Murray S. Kucherawy wrote: > >>> Ind

Re: [Ietf-dkim] Adding an aim= tag to DKIM Signature Tag Specifications

2020-05-12 Thread Murray S. Kucherawy
On Tue, May 12, 2020 at 11:14 AM Alessandro Vesely wrote: > On Tue 12/May/2020 19:09:55 +0200 Murray S. Kucherawy wrote: > > On Tue, May 12, 2020 at 9:30 AM Alessandro Vesely > wrote: > >> On Tue 12/May/2020 17:48:38 +0200 Murray S. Kucherawy wrote: > >>>

Re: [Ietf-dkim] DKIM reply mitigations: re-opening the DKIM working group

2022-11-10 Thread Murray S. Kucherawy
On Thu, Nov 10, 2022 at 12:42 PM Scott Kitterman wrote: > I agree that we don't want too much detail in the charter about the > technical > nature of the problem, but I would like to understand it in more detail in > order to better assess the appropriateness of what is there. > > If a domain is

Re: [Ietf-dkim] DKIM reply mitigations: re-opening the DKIM working group

2022-11-10 Thread Murray S. Kucherawy
On Thu, Nov 10, 2022 at 12:54 PM Laura Atkins wrote: > In many cases, the reason the mail isn’t going out through the signing > domain is because the signing domain’s anti-spam heuristics are good enough > that the sender couldn’t maintain an account there long enough to send out > any volume of

Re: [Ietf-dkim] DKIM reply mitigations: re-opening the DKIM working group

2022-11-10 Thread Murray S. Kucherawy
[offlist] On Thu, Nov 10, 2022 at 1:21 PM Laura Atkins wrote: > > On 10 Nov 2022, at 13:17, Murray S. Kucherawy wrote: > > On Thu, Nov 10, 2022 at 12:54 PM Laura Atkins > wrote: > >> In many cases, the reason the mail isn’t going out through the signing >>

Re: [Ietf-dkim] DKIM reply mitigations: re-opening the DKIM working group

2022-11-10 Thread Murray S. Kucherawy
On Thu, Nov 10, 2022 at 1:24 PM Murray S. Kucherawy wrote: > [offlist] > > ... > Actually I didn't intend for it to be offlist, sorry for the confusing tag. -MSK ___ Ietf-dkim mailing list Ietf-dkim@ietf.org https://www.ietf.org/mail

Re: [Ietf-dkim] DKIM reply mitigations: re-opening the DKIM working group

2022-11-11 Thread Murray S. Kucherawy
On Fri, Nov 11, 2022 at 5:05 AM Scott Kitterman wrote: > > A heuristic I’ve suggested previously is “If the recipient’s email > address > > is not in the To: or Cc: header then treat the mail as unsigned”. > > Which is a fancy way of making DKIM only work for direct mail flows. > That's part of

Re: [Ietf-dkim] DKIM reply mitigations: re-opening the DKIM working group

2022-11-11 Thread Murray S. Kucherawy
On Fri, Nov 11, 2022 at 11:42 AM Laura Atkins wrote: > > The MP limits the volume of messages that a user can send out. However, > by signing even one message, it takes the responsibility for its content. > > > This appears to be the disconnect. The MP takes responsibility for the > *MESSAGE* -

Re: [Ietf-dkim] DKIM reply mitigations: re-opening the DKIM working group

2022-11-14 Thread Murray S. Kucherawy
On Sat, Nov 12, 2022 at 7:32 AM Roland Turner wrote: > On 11/11/22 23:09, Murray S. Kucherawy wrote: > > More concerning to me: The IETF has previously taken the position that the > market will figure out spam and phishing, and therefore consideration of > protocol solutions shou

Re: [Ietf-dkim] DKIM reply mitigations: re-opening the DKIM working group

2022-11-14 Thread Murray S. Kucherawy
On Mon, Nov 14, 2022 at 12:26 AM Scott Kitterman wrote: > Is compatibility with DKIM sufficient for the charter or should there be > broader language about compatibility with existing email architecture? > I'm > inclined to say "Yes", but I'm unsure about wording. I also assume "Yes". I'm hav

Re: [Ietf-dkim] DKIM reply mitigations: re-opening the DKIM working group

2022-11-14 Thread Murray S. Kucherawy
On Mon, Nov 14, 2022 at 12:42 AM Scott Kitterman wrote: > > I don't think there's any point in pursuing solutions that require a human > to read/understand anything about header fields. > > Having reviewed the proposals again, it seems like anything that actively > makes replays harder without ad

Re: [Ietf-dkim] DKIM reply mitigations: re-opening the DKIM working group

2022-11-15 Thread Murray S. Kucherawy
On Mon, Nov 14, 2022 at 11:04 AM Laura Atkins wrote: > Does it make sense to add in a brief discussion of ‘responsibility for the > message'? As I see it, responsibility implies able to do something against > the originator of the message or act to stop the message if it turns out to > be a probl

Re: [Ietf-dkim] Remove the signature! (was: Re: DKIM reply mitigations: re-opening the DKIM working group)

2022-11-20 Thread Murray S. Kucherawy
On Sun, Nov 20, 2022, 11:08 Dave Crocker wrote: > Seriously. DKIM is intended as a transit-time mechanism. When delivery > occurs, transit is done. So DKIM has done its job and can (safely?) be > removed. One of the informational RFCs the original working group produced discussed this. A rea

Re: [Ietf-dkim] Remove the signature! (was: Re: DKIM reply mitigations: re-opening the DKIM working group)

2022-11-20 Thread Murray S. Kucherawy
On Sun, Nov 20, 2022 at 11:08 AM Dave Crocker wrote: > On 11/11/2022 7:19 AM, Murray S. Kucherawy wrote: > > I think you've hit on possibly the most interesting part of this: In > > RFC 6376, we said "You're taking some responsibility for this > > message

Re: [Ietf-dkim] Remove the signature! (was: Re: DKIM reply mitigations: re-opening the DKIM working group)

2022-11-21 Thread Murray S. Kucherawy
Hey Miles, On Mon, Nov 21, 2022 at 10:29 AM Miles Libbey wrote: > - the (signed) Date: header would get further in the past the longer a > replay is used, which would/could be a sign of misbehavior > I think this is a decent theory, but with automation, the delta between "Date" and/or the signa

Re: [Ietf-dkim] Remove the signature! (was: Re: DKIM reply mitigations: re-opening the DKIM working group)

2022-11-21 Thread Murray S. Kucherawy
Hi Jon, On Mon, Nov 21, 2022 at 4:07 PM Jon Callas wrote: > As another original author, it was hard for me to understand what this was > talking about when the discussion first came up. I even considered replying > to this thread asking something like, "isn't replay just sending the > message ag

Re: [Ietf-dkim] Remove the signature! (was: Re: DKIM reply mitigations: re-opening the DKIM working group)

2022-11-21 Thread Murray S. Kucherawy
On Mon, Nov 21, 2022 at 2:01 PM Dave Crocker wrote: > On 11/21/2022 1:56 PM, Murray S. Kucherawy wrote: > > I don't want to get into implementation discussions before we even > > have a charter, but I'm curious about how this could be made effective. > > I'd

Re: [Ietf-dkim] Remove the signature! (was: Re: DKIM reply mitigations: re-opening the DKIM working group)

2022-11-27 Thread Murray S. Kucherawy
On Sat, Nov 26, 2022 at 4:31 PM Dave Crocker wrote: > On 11/26/2022 3:20 PM, Barry Leiba wrote: > > I will say that the use case that is broken by removing the signature > > is the "re-send" case, where the MUA or some other post-delivery agent > > (perhaps a sieve script) re-introduces the messa

Re: [Ietf-dkim] Remove the signature! (was: Re: DKIM reply mitigations: re-opening the DKIM working group)

2022-11-27 Thread Murray S. Kucherawy
On Sun, Nov 27, 2022 at 6:01 PM Dave Crocker wrote: > On 11/27/2022 5:48 PM, Murray S. Kucherawy wrote: > > Post-delivery survival of the signature is not only not a goal, it is >> arguably (or possibly demonstrably) a problem. >> > > Can we say more about this

[Ietf-dkim] Rechartering

2022-11-27 Thread Murray S. Kucherawy
Hi folks, Area Director hat on here: The discussion Barry kicked off has been interesting, but it has strayed (and mea culpa, in part, because the material is interesting) from the work of discussing a charter. I've set the stage for re-chartering in the system, and now we need some charter text

Re: [Ietf-dkim] Rechartering

2022-11-28 Thread Murray S. Kucherawy
On Sun, Nov 27, 2022 at 6:50 PM Dave Crocker wrote: > On 11/27/2022 6:30 PM, Murray S. Kucherawy wrote: > > Domain Keys Identified Mail (DKIM, RFC 6376) defines a mechanism for > > using a digital signature to associate a domain identity with an email > > message in a secu

Re: [Ietf-dkim] Rechartering

2022-11-28 Thread Murray S. Kucherawy
On Sun, Nov 27, 2022 at 9:34 PM Scott Kitterman wrote: > I would add mention of the problem statement draft. I think it may turn > out > to be the most important of the ones we have now. > Do you mean: Mention it as a mandatory deliverable? Should we still produce that document even if we conc

Re: [Ietf-dkim] Rechartering

2022-12-02 Thread Murray S. Kucherawy
I've placed what I believe is the text that is closest to consensus in the datatracker: https://datatracker.ietf.org/doc/charter-ietf-dkim/ Please provide comments or criticism soon. Once it appears to be stable relative to this audience, I'll send it on its way for internal (IESG) and then full

Re: [Ietf-dkim] Rechartering

2022-12-04 Thread Murray S. Kucherawy
On Sat, Dec 3, 2022 at 12:20 PM Jon Callas wrote: > > On Dec 3, 2022, at 11:42, Dave Crocker wrote: > > > > On 12/3/2022 11:35 AM, Jon Callas wrote: > >> Agreed, and we need some other weasel word than "lightweight" because > there are lots of people working on "lightweight" symmetric ciphers. >

Re: [Ietf-dkim] Rechartering

2022-12-07 Thread Murray S. Kucherawy
On Tue, Dec 6, 2022 at 4:20 PM Dave Crocker wrote: > DKIM was developed to facilitate delivery handling decisions. The > language in the RFC 4871 and RFC 6376 doesn't make this as explicit as I'd > wish, given the perspective I'm advocating, but it's got some implicating > language. References

Re: [Ietf-dkim] Rechartering

2022-12-07 Thread Murray S. Kucherawy
On Wed, Dec 7, 2022 at 2:06 PM Dave Crocker wrote: > As appealing as the AS concept is, I've never been clear how operationally > useful they are. > > More to the current point, if the anti-replay work to be done benefits > from a position on transit vs. non-transit, then including it directly in

Re: [Ietf-dkim] Rechartering

2022-12-08 Thread Murray S. Kucherawy
On Thu, Dec 8, 2022 at 12:56 AM Laura Atkins wrote: > > Fair enough. Does the charter need to say that a revision to best > practices, relative to the replay problem, might be a possible output? > It's within the realm of possibility that no protocol work comes out of > this, but a "checkpoint"

Re: [Ietf-dkim] Taking Responsibility

2022-12-11 Thread Murray S. Kucherawy
On Fri, Dec 9, 2022 at 7:08 PM Barry Leiba wrote: > I have no formal role here, so please just take this as a plea from a > participant: > > Let's please stop bickering: it's simply hindering a productive > discussion of a charter, and it's clear that we can have endless > back-and-forth messages

Re: [Ietf-dkim] Misuse of antiforgery protocols

2022-12-11 Thread Murray S. Kucherawy
On Sat, Dec 10, 2022 at 7:42 PM Michael Deutschmann wrote: > It's a bit annoying that after almost two weeks, the only responses in > this thread have been about this side issue, with my main point > unaddressed. > As I read your original post, it was about DKIM+DMARC being an anti-forgery tool,

Re: [Ietf-dkim] Misuse of antiforgery protocols

2022-12-11 Thread Murray S. Kucherawy
On Sun, Dec 11, 2022 at 12:34 PM Michael Thomas wrote: > Re: stripping signatures, all the attacker needs to do is either send it > to a service that doesn't strip signatures or use their own MTA. Trivially > avoidable, and a Maginot Line of epic narrowness. > Right, I think this is an aspect of

Re: [Ietf-dkim] Misuse of antiforgery protocols

2022-12-11 Thread Murray S. Kucherawy
On Sun, Dec 11, 2022 at 1:11 PM Michael Thomas wrote: > > > As for resolution: the first obvious one is to not send spam in the first >> place. That is the root of the problem. The second is that Bcc's can be >> treated with more suspicion. Neither of these needs the working group to do >> anythi

Re: [Ietf-dkim] Misuse of antiforgery protocols

2022-12-11 Thread Murray S. Kucherawy
On Sun, Dec 11, 2022 at 1:41 PM Michael Thomas wrote: > > But the BCC aspect is interesting too. Don't providers already view things >> with massive rcpt-to (bcc's) suspiciously? >> > That's easy to evade: Send a spam message to yourself only. That has the > signature. Now capture that from you

Re: [Ietf-dkim] Misuse of antiforgery protocols

2022-12-11 Thread Murray S. Kucherawy
On Sun, Dec 11, 2022 at 1:55 PM Murray S. Kucherawy wrote: > In the transaction where the signature is applied, there's only one > envelope recipient. When I'm executing the attack, I could do one envelope > per recipient if I'm worried about being detected that way.

Re: [Ietf-dkim] Misuse of antiforgery protocols

2022-12-11 Thread Murray S. Kucherawy
ce DKIM is (currently, at least) decoupled from the envelope, I think we're also taking across layers here. -MSK On Sun, Dec 11, 2022, 14:46 Michael Deutschmann wrote: > On Sun, 11 Dec 2022, Murray S. Kucherawy wrote: > > Then from that other account I can spray it to as many recipients as I

Re: [Ietf-dkim] Rechartering

2022-12-11 Thread Murray S. Kucherawy
On Thu, Dec 8, 2022 at 11:52 AM Jim Fenton wrote: > > >> I think a checkpoint / review is a good goal for the group. > >> > > > > This seems like something reasonable and easy to add. > > > > Any objections? > > I’m fine if the revision to best practices is scoped to the replay > problem. This wa

Re: [Ietf-dkim] Misuse of antiforgery protocols

2022-12-12 Thread Murray S. Kucherawy
On Mon, Dec 12, 2022 at 1:13 AM Alessandro Vesely wrote: > > The alternative is to say: Well, if you can't make at least one of those > > two quantities bulletproof, then don't sign your mail. That, though, > > sounds a lot to me like tossing DKIM in the bin. > > On the opposite, if Gmail restri

Re: [Ietf-dkim] Misuse of antiforgery protocols

2022-12-12 Thread Murray S. Kucherawy
On Sun, Dec 11, 2022 at 2:43 PM Michael Thomas wrote: > But I want to return to my previous point of whether reputation is even > quantifiable, and whether somebody has actually gone out and researched it. > We can say that this is a problem in theory, but do we have any data to > back it up? I k

Re: [Ietf-dkim] Taking Responsibility

2022-12-12 Thread Murray S. Kucherawy
On Mon, Dec 12, 2022 at 5:03 PM Michael Thomas wrote: > Note that in both cases it requires the good will of the receiver (or > client in the web case). We already have the equivalent of expired certs > with the x= option. If senders are concerned about this, there is > already solution in the cu

Re: [Ietf-dkim] Misuse of antiforgery protocols

2022-12-12 Thread Murray S. Kucherawy
On Mon, Dec 12, 2022 at 12:36 PM Michael Thomas wrote: > I have good reason to be suspicious. That Google was one of the major > proponents of ARC which was supposedly to deal with the mailing list > problem but all boiled down to reputation that could already be done with > plain old DKIM sugges

Re: [Ietf-dkim] Misuse of antiforgery protocols

2022-12-13 Thread Murray S. Kucherawy
On Tue, Dec 13, 2022 at 2:54 AM Alessandro Vesely wrote: > Perhaps they could devise better methods than asking _accountable? (Y/N)_ > on a > questionnaire. Linking to bank accounts is an example. > Would you link a free email account to your bank account for any reason? I don't think I would.

Re: [Ietf-dkim] Misuse of antiforgery protocols

2022-12-14 Thread Murray S. Kucherawy
On Tue, Dec 13, 2022 at 5:00 PM Michael Thomas wrote: > On 12/13/22 6:35 AM, Murray S. Kucherawy wrote: > > > This tactic appears to me to have three problems: (1) negative reputations > are of little value to receivers, because attackers can easily shed them; > (2) if

Re: [Ietf-dkim] Rechartering

2022-12-23 Thread Murray S. Kucherawy
On Sun, Dec 11, 2022 at 7:25 PM Murray S. Kucherawy wrote: > > I've synthesized the feedback to date into a new update to the charter > text. It calls out the order of operations the group seems to prefer, and > makes explicit the possible output of a "best practices"

Re: [Ietf-dkim] Rechartering

2022-12-23 Thread Murray S. Kucherawy
On Fri, Dec 23, 2022 at 1:17 PM Michael Thomas wrote: > Shouldn't the problem statement explore whether there is a plausible > tractable solution before it moves on to protocol work? That is, if there > isn't a tractable solution the wg should go into hibernation again. I'm > pretty sure that I b

Re: [Ietf-dkim] Misuse of antiforgery protocols

2022-12-25 Thread Murray S. Kucherawy
On Sat, Dec 24, 2022 at 9:12 PM Michael Deutschmann wrote: > On Mon, 12 Dec 2022, you wrote: > > > Blind-carbon-copy is already a sign of spam. > > > > Except when it's not, like this very mailing list. > > Only if you don't whitelist *all* forwarders you set up and mailing lists > you have joine

Re: [Ietf-dkim] Rechartering

2022-12-25 Thread Murray S. Kucherawy
On Sun, Dec 25, 2022 at 6:31 AM Barry Leiba wrote: > I agree with Mike and Scott on the point that it’s worth explicitly > allowing the result to be a “can’t do it” publication. Implicit “couldn’t > do it” is fine in most cases, but here we might say something like, “If the > working group decid

Re: [Ietf-dkim] Rechartering

2022-12-29 Thread Murray S. Kucherawy
On Sun, Dec 25, 2022 at 4:14 PM Michael Thomas wrote: > > > Done, and thanks for that text. > > One nit, Barry's text should be above the proposals not below. It makes it > look like those are the only proposals on the table which I'm nearly > certain is not your intent. > One other thing though,

Re: [Ietf-dkim] Rechartering

2022-12-31 Thread Murray S. Kucherawy
On Sat, Dec 31, 2022 at 1:09 PM Michael Thomas wrote: > > On 12/29/22 7:20 PM, Murray S. Kucherawy wrote: > > On Sun, Dec 25, 2022 at 4:14 PM Michael Thomas wrote: > >> >> >> Done, and thanks for that text. >> >> One nit, Barry's text should be

Re: [Ietf-dkim] Rechartering

2022-12-31 Thread Murray S. Kucherawy
On Sat, Dec 31, 2022 at 2:43 PM Dave Crocker wrote: > The initial effort to form a working group in the IETF was pretty casual > and surfaced a lack of sufficient consensus among advocates. The IETF > said go away until there's more agreement. > > We went away for a year, during which we develop

Re: [Ietf-dkim] Rechartering

2023-01-05 Thread Murray S. Kucherawy
On Sat, Dec 31, 2022 at 3:02 PM Murray S. Kucherawy wrote: > On Sat, Dec 31, 2022 at 2:43 PM Dave Crocker wrote: > >> The initial effort to form a working group in the IETF was pretty casual >> and surfaced a lack of sufficient consensus among advocates. The IETF >> sa

Re: [Ietf-dkim] Rechartering

2023-01-12 Thread Murray S. Kucherawy
On Mon, Jan 9, 2023 at 12:57 AM Alessandro Vesely wrote: > On Thu 05/Jan/2023 22:26:32 +0100 Dave Crocker wrote: > > On 1/5/2023 9:20 AM, Alessandro Vesely wrote: > >> How about "replay-resistant protocol"? > > > > btw, it isn't clear that 'protocol' is what a solution will be. might > be. > > mi

Re: [Ietf-dkim] Lars Eggert's Block on charter-ietf-dkim-04-05: (with BLOCK and COMMENT)

2023-01-31 Thread Murray S. Kucherawy
On Tue, Jan 31, 2023 at 2:12 PM Michael Thomas wrote: > Also: the date on the problem statement seems awfully aggressive. My > thinking is that the problem statement should at least discuss (as is > mentioned in the charter) how "replays" are completely legitimate uses > of DKIM, and thus limit t

[Ietf-dkim] Chartering update

2023-02-02 Thread Murray S. Kucherawy
Colleagues, The IESG is prepared to approve the charter overall. There was one blocking point about publishing the problem statement, which is that the IESG would like that not to be a "maybe". I think that's a reasonable change to make. There is also the fact that I have not secured co-chairs.

Re: [Ietf-dkim] sender signing practices

2023-02-03 Thread Murray S. Kucherawy
On Fri, Feb 3, 2023 at 5:14 PM Michael Thomas wrote: > That said, I don't know why we didn't make To:, Cc: and Subject: > mandatory signed fields. But even if it's not mandatory, that should be > a signal that the message should be given increased scrutiny. > RFC 4871 included those as SHOULD wh

Re: [Ietf-dkim] Chartering update

2023-02-04 Thread Murray S. Kucherawy
On Thu, Feb 2, 2023 at 3:26 PM Michael Thomas wrote: > I guess my concern is more along the lines of what solutions *aren't*. > There are a bunch of drafts trying to tie the envelope to the email and I > think there needs to be a meta discussion of whether that is a good idea or > not in general.

Re: [Ietf-dkim] Chartering update

2023-02-04 Thread Murray S. Kucherawy
On Sat, Feb 4, 2023 at 11:11 AM Michael Thomas wrote: > There are architectural ramifications regardless of whether it's mandatory > or not. It would be a lot more reassuring if this were a common and > accepted practice. I don't know the answer to that. If it's uncommon, there > needs to be wide

Re: [Ietf-dkim] replay clues

2023-02-10 Thread Murray S. Kucherawy
On Fri, Feb 10, 2023 at 8:09 PM Michael Thomas wrote: > I've always thought that the likelihood of a protocol level solution for > this issue is pretty close to zero if not zero. The various proposed > solutions in the problem draft haven't given me any reason to dissuade > me of that notion. > >

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-10 Thread Murray S. Kucherawy
On Fri, Feb 10, 2023 at 12:06 PM Evan Burke wrote: > > On Fri, Feb 10, 2023 at 11:47 AM Dave Crocker wrote: > >> On 2/10/2023 11:35 AM, Wei Chuang wrote: >> > ARC is a tool to help support modern Indirect Mail Flows, and I >> > believe belongs in the solution space to be explored. >> >> Since AR

Re: [Ietf-dkim] replay clues

2023-02-12 Thread Murray S. Kucherawy
On Sat, Feb 11, 2023 at 4:48 PM Stephen Farrell wrote: > FWIW, as this discussion has a bit of a flavour of one person > arguing with a bigger bunch of people, I'd like to say that > Mike is asking good questions that deserve consideration. > Have they not been getting consideration? I know I'v

Re: [Ietf-dkim] replay clues

2023-02-12 Thread Murray S. Kucherawy
On Sat, Feb 11, 2023 at 2:35 PM Michael Thomas wrote: > It's never been especially clear to me whether deployments do their > filtering up front, ie at the MX, or farther down the line. There are > certainly advantages to do it right at the MX with less burden on using AR > to signal all of what

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-12 Thread Murray S. Kucherawy
On Fri, Feb 10, 2023 at 2:13 PM Michael Thomas wrote: > Another thing that should probably be discussed is outbound spam > filtering. At a high level, this is really about the sender sending spam. > But email afaik is silent on whether senders or receivers should filter for > spam (and if there i

Re: [Ietf-dkim] Setting a stage for detection

2023-02-12 Thread Murray S. Kucherawy
On Sun, Feb 12, 2023 at 1:21 PM Dave Crocker wrote: > One of the continuing problems with anti-abuse discussions is that > discussion always goes to detecting bad actors. While of course there need > to be discussions about them, the problem is that there seem to be no > discussions about good a

Re: [Ietf-dkim] Setting a stage for detection

2023-02-12 Thread Murray S. Kucherawy
On Sun, Feb 12, 2023 at 12:16 PM Dave Crocker wrote: > There appears to be no perfect way to distinguish a Replay attack from a > legitimate re-posting by an Alias or even a Mailing list (that preserves > the original DKIM signature.) > > The only 'signal' that is valid, also is ambiguous. The s

Re: [Ietf-dkim] replay clues

2023-02-12 Thread Murray S. Kucherawy
On Sun, Feb 12, 2023 at 11:19 AM Michael Thomas wrote: > > It's certainly possible to collect data that might correlate something > like "Subject signed vs. not signed" with a spam score, and that could feed > in to a best practices document. I don't know who might be up for > investing the time

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-14 Thread Murray S. Kucherawy
On Tue, Feb 14, 2023 at 11:18 AM Michael Thomas wrote: > Have you considered something like rate limiting on the receiver side for > things with duplicate msg-id's? Aka, a tar pit, iirc? > As I recall that technique is sometimes not suggested because (a) we can't come up with good advice about h

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-15 Thread Murray S. Kucherawy
On Tue, Feb 14, 2023 at 11:44 AM Michael Thomas wrote: > At maximum, isn't it just the x= value? It seems to me that if you don't > specify an x= value, or it's essentially infinite, they are saying they > don't care about "replays". Which is fine in most cases and you can just > ignore it. Somet

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-15 Thread Murray S. Kucherawy
On Wed, Feb 15, 2023 at 5:39 AM Scott Kitterman wrote: > Any reputation based solution does have down scale limits. Small mail > sources > (such as your random Nebraska forwarder) generally will have no reputation > vice a negative one and so wouldn't get penalized in a scheme like the one > I >

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-15 Thread Murray S. Kucherawy
On Wed, Feb 15, 2023 at 2:21 PM Michael Thomas wrote: > > There's also the question of whether "x=" is properly enforced. RFC 6376 > says verifiers "MAY" choose to enforce it. I think I asked about this at a > conference recently and was told that it's not universally supported by > implementat

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-16 Thread Murray S. Kucherawy
On Wed, Feb 15, 2023 at 10:49 PM Evan Burke wrote: > >> I don't think we're saying different things. I remember the point of the >> answer I got in that session being that most, but not all, implementations >> check or enforce signature expiration. But that means if "x=" is the >> solution we l

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-17 Thread Murray S. Kucherawy
On Thu, Feb 16, 2023 at 2:13 PM Barry Leiba wrote: > I like this approach: if the issue is that an "expired" signature is > treated as unsigned, I think we have an unacceptable level of false > positives. But if the fact that a signature is valid but expired is > simply another factor in the dec

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-17 Thread Murray S. Kucherawy
On Fri, Feb 17, 2023 at 9:35 AM Scott Kitterman wrote: > Currently RFC 6376 says, "Signatures MAY be considered invalid". I think > the practical effect as described in protocol terms would be to change the > MAY to SHOULD under X conditions and SHOULD NOT under !X conditions. Not > that I'd ex

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-18 Thread Murray S. Kucherawy
On Sat, Feb 18, 2023 at 12:10 PM Michael Thomas wrote: > > > Beyond this SHOULD, I think we need to consider whether the caller needs > to be told specifically when a failure occurs for this reason. Right now > an implementation might return just a PERMFAIL without noting that it's > because of

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-18 Thread Murray S. Kucherawy
On Sat, Feb 18, 2023 at 8:27 PM Michael Thomas wrote: > > >> Beyond this SHOULD, I think we need to consider whether the caller needs >> to be told specifically when a failure occurs for this reason. Right now >> an implementation might return just a PERMFAIL without noting that it's >> because

Re: [Ietf-dkim] DKIM Replay Problem Statement and Scenarios -01 draft posted

2023-02-19 Thread Murray S. Kucherawy
On Sun, Feb 19, 2023 at 11:49 AM Dave Crocker wrote: > This is a very basic point about protocols vs. implementations. A > protocol defines the 4 walls of its sandbox. It owns that sandbox and > defines whatever it needs to, within the confines of that space. > > [...] > > But again, this is pro

Re: [Ietf-dkim] DKIM update - header tag

2023-03-13 Thread Murray S. Kucherawy
On Fri, Mar 10, 2023 at 10:48 AM Jan Dušátko wrote: > I got recommendation to propose changes in that mailing group. > My work depend on appropriate protection of our brand, however this > tasks require also management of records required for that protection. > We have huge problem with identific

Re: [Ietf-dkim] Process Questions

2023-03-13 Thread Murray S. Kucherawy
On Fri, Mar 10, 2023 at 11:19 AM Michael Thomas wrote: > On 3/10/23 7:46 AM, Laura Atkins wrote: > > > On 10 Mar 2023, at 00:30, Michael Thomas > wrote: > > Now that we have a chair, I have a question about process wrt to the > charter. The charter states that either the working group will prod

Re: [Ietf-dkim] Clarifying the problem

2023-03-21 Thread Murray S. Kucherawy
There was one prior answer to this. Here's another. There's a claim here that the problem statement(s) is/are too vague. I'm a little worried that tightening up the problem definition along these 20 vectors will give us such a tight problem statement that any solution is so targeted as to be of

Re: [Ietf-dkim] Clarifying the problem

2023-03-22 Thread Murray S. Kucherawy
On Tue, Mar 21, 2023 at 8:37 PM Scott Kitterman wrote: > > >>1. Do receivers keep tabs on which users are using things like > >>mailing lists to differentiate users who expect to get indirect mail > vs > >>those who don't? > >> > >> The large mailbox operators might have hints about

Re: [Ietf-dkim] Welcome to the rechartered working group

2023-03-22 Thread Murray S. Kucherawy
On Sun, Mar 19, 2023 at 11:04 PM Emanuel Schorsch wrote: > In my mind, there are two important things I would like to see achieved: > > 1) Distinguish indirect from direct flows (encode in some way which server > / mailingList the original DKIM message was intended to come from). This is > needed

[Ietf-dkim] Comments on draft-chuang-dkim-replay-problem

2023-03-24 Thread Murray S. Kucherawy
Informal comments only here. I know a merger with Dave's draft is in progress, so some of these may not apply by the time you're done. Section 1.1: It feels a little presumptuous to assume any DKIM receiver has also built out a reputation system, or has access to one. I guess it might depend on

Re: [Ietf-dkim] Comments on draft-chuang-dkim-replay-problem

2023-03-24 Thread Murray S. Kucherawy
On Fri, Mar 24, 2023 at 9:59 AM Dave Crocker wrote: > On 3/24/2023 9:38 AM, Murray S. Kucherawy wrote: > > I think I concur with the suggestion that wa should drop discussion of > > ARC. This WG, or the DMARC WG, can develop an update to ARC based on > > the outcome

Re: [Ietf-dkim] Clarifying the problem

2023-03-25 Thread Murray S. Kucherawy
On Fri, Mar 24, 2023, 10:10 Michael Thomas wrote: > On 3/24/23 9:58 AM, Laura Atkins wrote: > > > On 24 Mar 2023, at 16:48, Michael Thomas > wrote: > > > On 3/24/23 6:14 AM, Laura Atkins wrote: > > Please, let’s focus on the current issue with is addressing and refining > the problem statement

Re: [Ietf-dkim] What has been tried and doesn't work should be documented in the problem statement

2023-03-26 Thread Murray S. Kucherawy
On Sat, Mar 25, 2023 at 10:29 AM Michael Thomas wrote: > On 3/24/23 6:19 PM, Barry Leiba wrote: > > I don't agree with the premise. I think what was tried and didn't > > work should be documented in the result that the working group comes > > out with, but not in the problem statement. > > There

Re: [Ietf-dkim] What has been tried and doesn't work should be documented in the problem statement

2023-03-27 Thread Murray S. Kucherawy
On Tue, Mar 28, 2023 at 1:05 AM Michael Thomas wrote: > Lastly: cutting off debate because of time is bogus. Murray already said > that the milestone dates were fairly arbitrary. Using them as a tool to > get the chair's preferred result is... disingenuous. > The milestones are negotiable, but i

[Ietf-dkim] Cooling things off

2023-03-28 Thread Murray S. Kucherawy
Colleagues, Things have gotten somewhat heated in here. I think we need to take a step back. While I have no doubts whatsoever that the participants and chairs are well-intentioned and would like to see this working group make progress in an appropriate direction, even if we may not all agree ye

Re: [Ietf-dkim] Moving forward - from the chairs

2023-04-10 Thread Murray S. Kucherawy
On Mon, Apr 10, 2023 at 11:24 AM Scott Kitterman wrote: > On Monday, April 10, 2023 2:05:28 PM EDT Laura Atkins wrote: > ... > > There is currently an active Call for Adoption for a draft. > ... > > What's the plan for closing this out? I haven't seen any objections to > the > idea and as of tom

Re: [Ietf-dkim] DKIM issues (tag "v=DKIM1", tag "p=")

2023-05-16 Thread Murray S. Kucherawy
On Tue, May 16, 2023 at 7:00 AM Jan Dušátko wrote: > 1) At this moment, the use of the tag "v=DKIM1;" is only RECOMMENDED and > if this tag is used, it must be the first. Unlike, for example, SPF and > DMARC, this is not a REQUIRED (MANDATORY) record. In case of an attempt > to identify DKIM reco

Re: [Ietf-dkim] Call for adoption results: draft-ietf-dkim-replay-problem Adopted

2023-08-01 Thread Murray S. Kucherawy
On Tue, Aug 1, 2023 at 8:29 AM Laura Atkins wrote: > We have a current version of the draft problem statement available on the > data tracker. Murray and a few others made a few comments that were added > in the -03 version. > > > https://mailarchive.ietf.org/arch/msg/ietf-dkim/Q5ybHiYkMlg5QFaFp2

Re: [Ietf-dkim] Call for adoption results: draft-ietf-dkim-replay-problem Adopted

2023-08-03 Thread Murray S. Kucherawy
On Thu, Aug 3, 2023 at 10:01 AM Suresh Ramasubramanian wrote: > Would this effort be better targeted at the various open source as well as > proprietary implementations of DKIM libraries, to flag if not eliminate the > various edge cases that are being gamed by the spammers? > > > > Rolling out s

Re: [Ietf-dkim] Proposals for tolerating mailing list modifications

2023-08-04 Thread Murray S. Kucherawy
Colleagues, On Fri, Aug 4, 2023 at 12:08 PM Michael Thomas wrote: > Exactly. Any proposed modifications to DKIM should be based on DKIM > itself. Anything else is off-topic. It's not like you can't propose the > ARC modifications to DKIM in terms of DKIM itself, though all of those > modificatio

Re: [Ietf-dkim] Proposals for tolerating mailing list modifications

2023-08-05 Thread Murray S. Kucherawy
On Fri, Aug 4, 2023 at 2:46 PM Michael Thomas wrote: > Well, for starters ARC doesn't have broad deployment. But the author > doesn't say why ARC is needed or relevant. That is the point here. *All* > changes need to be justified including any imported mechanisms. The less > rat holes the better.

[Ietf-dkim] draft-ietf-dkim-replay-problem comments

2023-08-07 Thread Murray S. Kucherawy
Hi, Some comments after a review of the adopted document: (1) I find the abstract is more readable if broken into three paragraphs, with the second starting "DKIM survives ..." and the third "This document discusses ...". (2) Throughout the document, the proper term "Replay Attack" (and sometime

Re: [Ietf-dkim] draft-ietf-dkim-replay-problem comments

2023-08-07 Thread Murray S. Kucherawy
On Mon, Aug 7, 2023 at 3:58 PM Scott Kitterman wrote: > On Monday, August 7, 2023 6:53:19 PM EDT Murray S. Kucherawy wrote: > ... > > (2) Throughout the document, the proper term "Replay Attack" (and > sometimes > > "Replay") is used, but it's nev

  1   2   3   >