[Ietf-dkim] Re: Signature algorithm and future development of DKIM

2024-08-30 Thread Taavi Eomäe
many also send the majority of their traffic signed with body length and thus much more easily found. Best Regards, Taavi Eomäe smime.p7s Description: S/MIME Cryptographic Signature ___ Ietf-dkim mailing list -- ietf-dkim@ietf.org To unsubscribe s

[Ietf-dkim] Re: Should we be recording all modifications

2024-11-18 Thread Taavi Eomäe
On 18/11/2024 00:19, Bron Gondwana wrote: And I do agree there needs to be a way to say "I made changes, and I'm not telling you how to undo them" as well. This has the risk of completely nullifying the intent behind the new standard by providing a path of least resistance too many would take.

[Ietf-dkim] Re: One other possible charter thing

2025-01-07 Thread Taavi Eomäe
On 07/01/2025 15:29, Richard Clayton wrote: I can't see any value in knowing how the signer of a message obtained a key ... on my system it fetches the private key from a file and never uses the public key at all -- so DNSSEC is not at all relevant at that end of the connection. The hypothetica

[Ietf-dkim] Re: cipher suite updates?

2025-01-07 Thread Taavi Eomäe
multiple signatures!) [1]: https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdf [2]: https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism/cyber-security-guidelines/guidelines-cryptography Best Regards, Taavi Eomäe smime.p7s Description: S/MIME Cry

[Ietf-dkim] Re: One other possible charter thing

2025-01-07 Thread Taavi Eomäe
On 06/01/2025 19:58, Michael Thomas wrote: This pretty much tells you everything you need to know about the state of DNSSec [...] I don't think the fact if Google has or has not deployed something should be the deciding factor here. Are you against DNS (and by extension its security mechan

[Ietf-dkim] Re: One other possible charter thing

2025-01-06 Thread Taavi Eomäe
On 06/01/2025 03:01, Michael Thomas wrote: That makes the assumption that there weren't alternatives a housing the public keys in DNS that were more secure. There were. There still are, and they are widely known and deployed. Wouldn't it suffice if Authentication-Results header were to option

[Ietf-dkim] Re: Should we be recording all modifications

2024-11-21 Thread Taavi Eomäe
On 20/11/2024 15:31, Richard Clayton wrote: Since we're meant to be discussing whether to open a WG and what it's charter should be, should superseding ARC be specifically mentioned ? Once again I have to disagree that DKIM2 should mix "just trust me" operations with "you can see what I did" o

[Ietf-dkim] Re: cipher suite updates?

2025-01-08 Thread Taavi Eomäe
On 07/01/2025 23:02, Michael Thomas wrote: Has NIST given a timeline of when they are going to pick the quantum resistant algorithm? I suppose if it's far enough out, it might be worthwhile to wait, but on the other hand figuring out a transition sooner rather than later might be good. The

[Ietf-dkim] Re: cipher suite updates?

2025-01-08 Thread Taavi Eomäe
On 07/01/2025 23:15, Murray S. Kucherawy wrote: Do we need to say explicitly in a charter that the best contemporary practices in terms of cryptography have to be used in the development of a new thing?  If so, it seems like every charter would need to be explicit about it. Is there any harm

[Ietf-dkim] Re: Review Response #7: Header Fields

2025-04-16 Thread Taavi Eomäe
On 16.04.2025 13:01, Steffen Nurpmeso wrote: Ie, it is a quality-of-implementation issue, and standards cannot cover everything. Ie dkimpy's default set, or my one with one-letter shortcuts to very easily have a comprehensive default set at hand (that then can be added to or subtracted from). If

[Ietf-dkim] Re: DKIM2 Forwarding with Security Gateways

2025-05-06 Thread Taavi Eomäe
Hi, On 05.05.2025 21:29, Wei Chuang wrote: One idea is to ask receivers to fully trust the security gateway as the modifications done are to protect the receiver's users with best effort by the gateway. In this case ARC would be the only correct solution. While DKIMv2 might provide some theo

[Ietf-dkim] Re: DKIM2 and DMARC

2025-05-08 Thread Taavi Eomäe
On 08.05.2025 01:54, Tero Kivinen wrote: I think all this is bad idea. The recipient should do everything it does based in its own policies, whatever the sender wants or does not want does not matter. I have to agree. Same goes for the forwarding part. Mostly just reiterating what you've just

[Ietf-dkim] Re: DKIM2 Forwarding with Security Gateways

2025-05-08 Thread Taavi Eomäe
Hi, On 07.05.2025 00:57, Wei Chuang wrote: I put out the "certification" process as a strawman to see if such flexibility for arbitrary modification by a "trusted" security way is of interest to the community.  Looking at the other similar reply as well, it sounds like no, this is a bridge too

[Ietf-dkim] Re: On the rationale for a new protocol (from the meeting)

2025-03-31 Thread Taavi Eomäe
On 31/03/2025 11:55, Alessandro Vesely wrote: If we don't change the canonicalizations, a DKIM1 verifier will be able to verify a DKIM2 signature, limited to DKIM1 semantics. A successful verification still adds something to the properties of a message. And as mentioned in some other thread I

[Ietf-dkim] Re: On the rationale for a new protocol (from the meeting)

2025-03-31 Thread Taavi Eomäe
On 31/03/2025 18:11, Michael Thomas wrote: If they ignore the plain and clear text of STD 76, what makes you think they will honor it in a new protocol? Which is what is not being asked from those implementations, if the version is incremented instead of a new set of headers. Those implement

[Ietf-dkim] Re: On the rationale for a new protocol (from the meeting)

2025-03-31 Thread Taavi Eomäe
On 31/03/2025 15:25, Brotman, Alex wrote: I have a hard time believing that all the libraries focusing on DKIMv1 will go back and create some code to handle this case. Indeed, they probably won't. Which is exactly why it might be better to have those old implementations continue stripping sig

[Ietf-dkim] Re: On the rationale for a new protocol (from the meeting)

2025-03-31 Thread Taavi Eomäe
On 31/03/2025 21:09, Michael Thomas wrote: Is there actually evidence of this "punishment"? Filtering is notoriously opaque. Sounds more like paranoid behavior on the part of some deployments. Yes. Rspamd for example is assigning the R_DKIM_REJECT symbol a weight of 1.0 (not 0.0 or 0.1, like

[Ietf-dkim] Re: On the rationale for a new protocol (from the meeting)

2025-04-04 Thread Taavi Eomäe
On 31/03/2025 19:35, John Levine wrote: I don't understand what point you are making. The spec says that's wrong. How would the presence or absence of v=2 make it less wrong? It's not about if it's wrong or not, it's only an observation that this behavior already exists in the ecosystem as a

[Ietf-dkim] Re: On the rationale for a new protocol (from the meeting)

2025-04-04 Thread Taavi Eomäe
On 31/03/2025 17:53, Michael Thomas wrote: It was always a bad idea to strip signatures, and continues to be. The text of DKIM couldn't be more clear that a broken signature is equivalent to no signature and broken signatures have always had forensic value. Unfortunately in reality broken si

[Ietf-dkim] Re: unwinding changes, was DKIM2 Forwarding with Security Gateways

2025-05-08 Thread Taavi Eomäe
Hi, On 08.05.2025 20:03, John Levine wrote: Except that DKIM2 will let recipients reliably look back through the changes that forwarders make. Which was exactly the point I was trying to make. a) If the changes are reversible (they're not "arbitrary modifications"), validity is easy to veri

[Ietf-dkim] Re: Domain Name Specification for DKIM2 I-D

2025-07-24 Thread Taavi Eomäe
Hi, On 24.07.2025 14:26, Alessandro Vesely wrote: However, the implementation considerations that guided the choices of RFC 8463 may still apply to a PQ algorithm.  Therefore, we should devise a format in which some tags have multiple values, dependent on the algorithm, while others are valid