Re: [Bimi] Proposal to Clarify Role of MUA in BIMI Evaluation

John C Klensin <john-ietf@jck.com> Tue, 19 July 2022 14:11 UTC

Return-Path: <john-ietf@jck.com>
X-Original-To: bimi@ietfa.amsl.com
Delivered-To: bimi@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 974C3C188710; Tue, 19 Jul 2022 07:11:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.906
X-Spam-Level:
X-Spam-Status: No, score=-1.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mfWlgim1UlS9; Tue, 19 Jul 2022 07:11:41 -0700 (PDT)
Received: from bsa2.jck.com (ns.jck.com [70.88.254.51]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6CFC2C18871E; Tue, 19 Jul 2022 07:11:37 -0700 (PDT)
Received: from [198.252.137.10] (helo=PSB) by bsa2.jck.com with esmtp (Exim 4.82 (FreeBSD)) (envelope-from <john-ietf@jck.com>) id 1oDnwh-000Jrt-Fh; Tue, 19 Jul 2022 10:11:31 -0400
Date: Tue, 19 Jul 2022 10:11:26 -0400
From: John C Klensin <john-ietf@jck.com>
To: dcrocker@bbiw.net, Ken O'Driscoll <ken@wemonitoremail.com>, Todd Herr <todd.herr=40valimail.com@dmarc.ietf.org>
cc: bimi@ietf.org
Message-ID: <7A3BDBED9D18923897BC35F5@PSB>
In-Reply-To: <0b9c845f-c661-693f-bfff-04455825bf2e@dcrocker.net>
References: <DE61AC51-4BC3-44FF-862D-7D8ADFB3BC29@proofpoint.com> <20CBD506-7E50-4161-ADE6-64614630B1B2@proofpoint.com> <CAHej_8kridbc322MDRpxfgd+8Y2yNacxTAtvr+HF=+wevdRQhw@mail.gmail.com> <VI1PR01MB70538965904FD08A49F75C37C78C9@VI1PR01MB7053.eurprd01.pr od.exchangelabs.com> <0b9c845f-c661-693f-bfff-04455825bf2e@dcrocker.net>
X-Mailer: Mulberry/4.0.8 (Win32)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline
X-SA-Exim-Connect-IP: 198.252.137.10
X-SA-Exim-Mail-From: john-ietf@jck.com
X-SA-Exim-Scanned: No (on bsa2.jck.com); SAEximRunCond expanded to false
Archived-At: <https://mailarchive.ietf.org/arch/msg/bimi/7g0-2uxNy0RZIEf_OLa7UHOn4Z4>
Subject: Re: [Bimi] Proposal to Clarify Role of MUA in BIMI Evaluation
X-BeenThere: bimi@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Brand Indicators for Message Identification <bimi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bimi>, <mailto:bimi-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bimi/>
List-Post: <mailto:bimi@ietf.org>
List-Help: <mailto:bimi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bimi>, <mailto:bimi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Jul 2022 14:11:43 -0000

Dave,

Thanks for an excellent explanation.  I was working on a
somewhat similar note, but your explanation is better.

Ken, Trent, and Alex,

This set of proposals are all feeling, to me, very complex, with
a large (and maybe growing) collection of characteristics that
are either not being explained clearly enough, that make
assumptions or requirements that could lead to the creation of
mail islands, or that violate rather basic principles of how
Internet mail works in the general case.   I hope I -- and Dave
and others-- just don't understand how all of this fits
together.  If we do understand, then taking a few steps back and
rethinking the objectives and mechanisms (rather than trying to
fine-tune) may be in order.  If not, there may be some basic
issues with how the documents are constructed editorially:
historically, at least Dave and I, whether we agree or not, are
rarely obtuse about such things.

As a further observation, it is usually very easy to get a
protocol working among parties who are actively collaborating
(or between a client and server designed or configured and
operated by the same party).  The devil is in the details of
interoperability among completely independent (more than just
"Unaffiliated" if I understand the terminology of the draft)
implementations and that is where I think this design may be
problematic.

best,
   john


It seems to that this is getting very complex 

--On Tuesday, July 19, 2022 06:20 -0700 Dave Crocker
<dhc@dcrocker.net> wrote:

> On 7/18/2022 9:23 AM, Ken O'Driscoll wrote:
>> Non-affiliated MUAs already trust the MTA to deliver
>> messages. Many  also trust the MTA to filter spam, virus,
>> phishing etc. The MTA  authenticates the MUA. Why does BIMI
>> require an additional MUA-level  check at all? What specific
>> risk is it supposed to mitigate?
> 
> 
> The concept of end-to-end distinguishes end points from
> transport infrastructure.  There should always be careful
> consideration of where to provide functionality -- endpoint
> vs. infrastructure. (*)
> 
> "Trust" of the infrastructure is not monolithic.  The fact
> that an MTA is trusted to move a message correctly does not
> mean that it is trusted to evaluate and vet the contents of
> the message. The fact that it is assigned some trust for
> assessing spaminess does not mean it is assigned complete
> trust for all aspects of the content or even all aspects of
> spaminess.
> 
> If a design essentially requires an MUA to impart complete
> trust for mail content validity to the platform provider,
> that's quite a substantial departure from historical
> distributed system design choices, even though it is a common
> implementation choice for some popular services.
> 
> At the very least, a specification should explicate its trust
> choices carefully and thoroughly.
> 
> d/
> 
> 
> 
> (*) The seminal paper on this architectural design issue is:
> 
> End-to-end Arguments in System Design
> http://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.
> pdf
> 
> This topic is often referred to as the End-to-End Principle
> and taken as a mandate, but the wording of the title is more
> nuanced, choosing 'arguments' rather than 'principle'. What it
> really requires is considering tradeoffs in the choices for
> placement.