Re: [apps-discuss] I-D Action: draft-ietf-appsawg-rfc7001bis-03.txt

Hector Santos <hsantos@isdg.net> Sat, 14 March 2015 22:53 UTC

Return-Path: <hsantos@isdg.net>
X-Original-To: apps-discuss@ietfa.amsl.com
Delivered-To: apps-discuss@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 430801A0387 for <apps-discuss@ietfa.amsl.com>; Sat, 14 Mar 2015 15:53:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.002
X-Spam-Level:
X-Spam-Status: No, score=-102.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H26NXcT4h6Kr for <apps-discuss@ietfa.amsl.com>; Sat, 14 Mar 2015 15:53:40 -0700 (PDT)
Received: from listserv.winserver.com (news.winserver.com [208.247.131.9]) by ietfa.amsl.com (Postfix) with ESMTP id 588D81A037A for <apps-discuss@ietf.org>; Sat, 14 Mar 2015 15:53:39 -0700 (PDT)
DKIM-Signature: v=1; d=isdg.net; s=tms1; a=rsa-sha1; c=simple/relaxed; l=2335; t=1426373615; h=Received:Received: Received:Received:Message-ID:Date:From:Organization:Subject:To: List-ID; bh=QI7JmCvqKoP+/cEXp0jAbWd1P0I=; b=ZZMig8q7VnDYGBC4yhvv w8izESBoIBEIbhtzs1FPzAOOMyQ/zQKKAAYHeNAAniDjjBoP9mkHdURG0aQZDCFj DP9Ej8VG/ct41pDeV6FsfZfN0/WAPefg9mqrGbiBf+f57gFIkQ5EVF0BRwAml4jU /WGO5gOfVVjmU2TOYGmLRgg=
Received: by winserver.com (Wildcat! SMTP Router v7.0.454.4) for apps-discuss@ietf.org; Sat, 14 Mar 2015 17:53:35 -0500
Authentication-Results: dkim.winserver.com; dkim=pass header.d=beta.winserver.com header.s=tms1 header.i=beta.winserver.com; adsp=pass policy=all author.d=isdg.net asl.d=beta.winserver.com; dmarc=fail author.d=isdg.net signer.d=beta.winserver.com (unauthorized signer);
Received: from beta.winserver.com (hector.wildcatblog.com [208.247.131.23]) by winserver.com (Wildcat! SMTP v7.0.454.4) with ESMTP id 83660537.2730.324; Sat, 14 Mar 2015 17:53:34 -0500
DKIM-Signature: v=1; d=beta.winserver.com; s=tms1; a=rsa-sha256; c=simple/relaxed; l=2335; t=1426373433; h=Received:Received: Message-ID:Date:From:Organization:Subject:To:List-ID; bh=2o1I9UJ hqSa40kA7A+8HnAQxHNMhMkP9MxIXlDCtO0I=; b=bYOSQeW91+VSVZsRk/zFavg WYT8Evdtbx8e5UBZpoo2wTjIYhQVg0qfIoJy3FFRS1meS/W6UIW1ceaxK8BB7yzL tdo1qrD1JMm/9d5TwuDA375mieMWctglJrHZMoKQ53dJ42zNoQVV+0HlZ/pvay1J XEOfFqivITB0GhkTW49k=
Received: by beta.winserver.com (Wildcat! SMTP Router v7.0.454.4) for apps-discuss@ietf.org; Sat, 14 Mar 2015 18:50:33 -0400
Received: from [192.168.1.2] ([99.121.4.27]) by beta.winserver.com (Wildcat! SMTP v7.0.454.4) with ESMTP id 2970936675.9.9408; Sat, 14 Mar 2015 18:50:32 -0400
Message-ID: <5504BBF0.9000100@isdg.net>
Date: Sat, 14 Mar 2015 18:53:36 -0400
From: Hector Santos <hsantos@isdg.net>
Organization: Santronics Software, Inc.
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.5.0
MIME-Version: 1.0
CC: apps-discuss <apps-discuss@ietf.org>
References: <20150309213241.21308.78039.idtracker@ietfa.amsl.com>
In-Reply-To: <20150309213241.21308.78039.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Comment: Missing recipient address appended by wcSMTP router.
To: apps-discuss@ietf.org
Archived-At: <http://mailarchive.ietf.org/arch/msg/apps-discuss/sja5FJ12JISUqPG2kHB3m8u-R-w>
Subject: Re: [apps-discuss] I-D Action: draft-ietf-appsawg-rfc7001bis-03.txt
X-BeenThere: apps-discuss@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: General discussion of application-layer protocols <apps-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/apps-discuss>, <mailto:apps-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/apps-discuss/>
List-Post: <mailto:apps-discuss@ietf.org>
List-Help: <mailto:apps-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/apps-discuss>, <mailto:apps-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 14 Mar 2015 22:53:43 -0000

Some comments

On 3/9/2015 5:32 PM, internet-drafts@ietf.org wrote:
>
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>   This draft is a work item of the Applications Area Working Group Working Group of the IETF.
>
>          Title           : Message Header Field for Indicating Message Authentication Status
>          Author          : Murray S. Kucherawy
> 	Filename        : draft-ietf-appsawg-rfc7001bis-03.txt
> 	Pages           : 46
> 	Date            : 2015-03-09
>
> Abstract:
>     This document specifies a message header field called Authentication-
>     Results for use with electronic mail messages to indicate the results
>     of message authentication efforts.  Any receiver-side software, such
>     as mail filters or Mail User Agents (MUAs), can use this header field
>     to relay that information in a convenient and meaningful way to users
>     or to make sorting and filtering decisions.


For sentence #1,

      .... indicate the results
      of different message authentication efforts.

or

      .... indicate the results of any internal message
      authorization and authentication efforts.


I was under the impression that this header can only be "trusted" 
internally, essentially by the creator to be used by the backend 
"receiver-side" software or even at the UI hosted presentation?

The DKIM/ADSP/DMARC/SPF/OTHER machine domain host name creating this 
header needs to be trusted.

The main reason I say this is because the first time I began to use 
this for DKIM, I also used it for ADSP, Not SPF, nor ATPS.  SPF 
already had an internally produced and most importantly trusted result 
header (Received-SPF) and AUTH-RES wasn't quite ready to pass all the 
essential, different A/A protocol process parameters information being 
done, including SPF and ATPS.

So I created the fields I needed.   Since it would intended for 
internal consumption, other consumers like RFC-based Offline Mail 
Readers/Writers, these offline MUAs should not rely on it.

Is this still true?   If so, what are the rules for this?  How about 
different AUTH-RES from different processing host?

As a related tech note,  does the latest work reflect all the 
essential information needed for?

   DKIM
   DMARC
   SPF

Is it ready for indicating 3rd party results?

Does it still support ADSP or its obsolete in the new AUTH-RES as well?


-- 
HLS