Re: [apps-discuss] WGLC on draft-ietf-appsawg-rfc7001bis-05

Scott Kitterman <scott@kitterman.com> Wed, 08 April 2015 17:03 UTC

Return-Path: <scott@kitterman.com>
X-Original-To: apps-discuss@ietfa.amsl.com
Delivered-To: apps-discuss@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 654851B3441 for <apps-discuss@ietfa.amsl.com>; Wed, 8 Apr 2015 10:03:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.299
X-Spam-Level:
X-Spam-Status: No, score=0.299 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, MANGLED_TOOL=2.3, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S5CebaltF8Hw for <apps-discuss@ietfa.amsl.com>; Wed, 8 Apr 2015 10:03:52 -0700 (PDT)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [IPv6:2607:f0d0:3001:aa::2]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 314FF1B3462 for <apps-discuss@ietf.org>; Wed, 8 Apr 2015 10:03:52 -0700 (PDT)
Received: from [100.80.113.105] (121.sub-70-208-142.myvzw.com [70.208.142.121]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id E2353C40243; Wed, 8 Apr 2015 12:03:50 -0500 (CDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1428512631; bh=NpM1TyI581248msX5XlgeKEzcT1PlczKZoIHI096kqk=; h=In-Reply-To:References:Subject:From:Date:To:From; b=APwy4cHHMNphl0pMfr0RTj3wKmscnyCSyM3sfZ59eGsKTklipz2N6rpdKHyghvLpa YQQ/FtOugNjrtVw/8uFS+Xje1mAXkwUSIwewcoSbgAIS6AHINbhs40VFE+rSFENnl6 kmNIDRO92UVJUP0PxBiMXm+KpcBIrUhRwvS1K0ww=
User-Agent: K-9 Mail for Android
In-Reply-To: <039901d07216$10243640$4001a8c0@gateway.2wire.net>
References: <5518019A.7080508@isode.com> <2383989.tErOfD7dMh@kitterma-e6430> <039901d07216$10243640$4001a8c0@gateway.2wire.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----4N62GNZQ9TOZ84RVPPHNU53YYFLVI8"
Content-Transfer-Encoding: 8bit
From: Scott Kitterman <scott@kitterman.com>
Date: Wed, 08 Apr 2015 13:03:35 -0400
To: apps-discuss@ietf.org
Message-ID: <8B93A4F5-3411-4561-8D39-768375CC6B06@kitterman.com>
Archived-At: <http://mailarchive.ietf.org/arch/msg/apps-discuss/T4TWxtCFNqGlsVvSuve1k2nirfU>
Subject: Re: [apps-discuss] WGLC on draft-ietf-appsawg-rfc7001bis-05
X-BeenThere: apps-discuss@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: General discussion of application-layer protocols <apps-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/apps-discuss>, <mailto:apps-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/apps-discuss/>
List-Post: <mailto:apps-discuss@ietf.org>
List-Help: <mailto:apps-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/apps-discuss>, <mailto:apps-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Apr 2015 17:03:54 -0000

Good point. Thanks. 

That still doesn't match the current text. 

Scott

On April 8, 2015 12:06:57 PM EDT, "t.petch" <ietfc@btconnect.com> wrote:
>----- Original Message -----
>From: "Scott Kitterman" <scott@kitterman.com>
>To: <apps-discuss@ietf.org>
>Sent: Wednesday, April 08, 2015 3:29 PM
>> On Sunday, March 29, 2015 02:43:54 PM Alexey Melnikov wrote:
>> > This message is starting 3 weeks (*) Working Group Last Calls on
>> > draft-ietf-appsawg-rfc7001bis-05 (Message Header Field for
>Indicating
>> > Message Authentication Status). The WGLC ends on
>> > April 19th.
>> >
>>
>> I've reviewed the document and believe it's essentially ready for
>publication.
>> I think there is a bit of editorial adjustment needed in the prose
>about
>> different a-r methods.
>>
>> Here's my list of A-R related RFCs:
>>
>> RFC 5451/7001 Message Header Field for Indicating Message
>Authentication
>> Status
>> RFC 5617 DKIM/ADSP
>> RFC 6008 DKIM signature identification (header.b)
>> RFC 6212 Vouch By Reference (VBR)
>> RFC 6577 Sender Policy Framework (SPF)
>> RFC 7281 Authentication-Results Registration for S/MIME
>> RFC 7293 The Require-Recipient-Valid-Since Header Field
>> RFC7489 DMARC
>>
>> Here's what the draft currently says about different methods:
>>
>>   At the time of publication of this document, the following are
>>   published, domain-level email authentication methods in common use:
>>
>>   o  Author Domain Signing Practices ([ADSP])
>>   o  SMTP Service Extension for Authentication ([AUTH])
>>   o  DomainKeys Identified Mail Signatures ([DKIM])
>>   o  Sender Policy Framework ([SPF])
>>   o  Vouch By Reference ([VBR])
>>   o  reverse IP address name validation ("iprev", defined in Section
>3)
>>
>>    In addition, the following are non-standard methods recognized by
>>    this specification that are no longer common:
>>
>>   o  DomainKeys ([DOMAINKEYS]) (Historic)
>>   o  Sender ID ([SENDERID]) (Experimental)
>>
>> I think the list misses DMARC, S/MIME and RRVS.  I also question the
>> description of ADSP and VBR as "common".  Additionally, ADSP is
>historic.
>>
>> Instead of getting into a bike shed discussion about what's common
>and
>how can
>> we tell, what about something like this:
>>
>>   At the time of publication of this document, the following are
>>   published, authentication methods:
>>
>>   o  Author Domain Signing Practices ([ADSP]) (Historic)
>>   o  Domain-based Message Authentication,  Reporting and Conformance
>([DMARC])
>>   o  DomainKeys ([DOMAINKEYS]) (Historic)
>>   o  DomainKeys Identified Mail Signatures ([DKIM])
>>   o  reverse IP address name validation ("iprev", defined in Section
>3)
>>   o  Require-Recipient-Valid-Since Header Field and SMTP Service
>Extension
>>        ([RRVS])
>>   o  SMTP Service Extension for Authentication ([AUTH])
>>   o  Sender ID ([SENDERID]) (Experimental)
>>   o  Sender Policy Framework ([SPF])
>>   o  S/MIME Signature Verification [SMIME-REG]
>>   o  Vouch By Reference ([VBR])
>>
>> None of these are marked deprecated in the registry:
>>
>> http://www.iana.org/assignments/email-auth/email-auth.xhtml
>
>Scott
>
>but if you were to look at the updated registry, as for example in the
>one I have prepared by hand (but which the IETF mailing system refuses
>to post - perhaps I  have upset the Privacy Police:-) then you will
>find
>that domainkeys and DKIM-ADSP are deprecated in the registry.
>
>Tom Petch
>
>> As a result, I don't think we should treat them differently in the
>text beyond
>> noting the status of the relevant RFC.
>>
>> Scott K
>>
>> _______________________________________________
>> apps-discuss mailing list
>> apps-discuss@ietf.org
>> https://www.ietf.org/mailman/listinfo/apps-discuss