Re: [Bimi] Proposal to Clarify Role of MUA in BIMI Evaluation

Dave Crocker <dhc@dcrocker.net> Mon, 18 July 2022 21:24 UTC

Return-Path: <dhc@dcrocker.net>
X-Original-To: bimi@ietfa.amsl.com
Delivered-To: bimi@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2E160C147930 for <bimi@ietfa.amsl.com>; Mon, 18 Jul 2022 14:24:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dcrocker.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9uEWZUDwQ38U for <bimi@ietfa.amsl.com>; Mon, 18 Jul 2022 14:23:59 -0700 (PDT)
Received: from purple.birch.relay.mailchannels.net (purple.birch.relay.mailchannels.net [23.83.209.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B1AE7C14F74C for <bimi@ietf.org>; Mon, 18 Jul 2022 14:23:58 -0700 (PDT)
X-Sender-Id: hostingeremail|x-authsender|dhc@dcrocker.net
Received: from relay.mailchannels.net (localhost [127.0.0.1]) by relay.mailchannels.net (Postfix) with ESMTP id 8841A121D71 for <bimi@ietf.org>; Mon, 18 Jul 2022 21:23:57 +0000 (UTC)
Received: from gcp-us-central1-a-smtpout1.hostinger.io (unknown [127.0.0.6]) (Authenticated sender: hostingeremail) by relay.mailchannels.net (Postfix) with ESMTPA id CA618121642 for <bimi@ietf.org>; Mon, 18 Jul 2022 21:23:56 +0000 (UTC)
ARC-Seal: i=1; s=arc-2022; d=mailchannels.net; t=1658179437; a=rsa-sha256; cv=none; b=7H4zvWwL9PrPZyLnedTwS/XW2kBCHgRopp9QW+yGkrjn+C/F//UKMkm81eDwmDpm9mZvXu jMzu2DXTEgvtrhT70Z76yyrq30KgyvS+NPRav56xSE8D8KoZvmDSQIGUHk66b1KXR3Lpzk sbM+Cta+pQy1w8IJtRmaNuRGmX/D6lT2umlkn5kJgNkz7VcbOKfR683wedqgJjuWeTSabR J8TPGfO7mFFl+A5CDW+EbBDIzvY0ozg6DZZrOxSGotf665GzrIbxFMcQfL35VwXVGhkFsZ NtSpEPCL24KKvL71kkRbjOh1a0qqgyFtkkf9qz3Ro1dQV7mcrW0vBcQWlnT+jA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=mailchannels.net; s=arc-2022; t=1658179437; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=eCGh4C6kWB8of/xgkj867/LAwIbYh4LGSNaiLCN4POo=; b=9fGUAQ+zQl0Wg7siR7NfTdrU15HQ1IMxkZ+J4wHB/IFzJzrnD9tnGGz1ajoaa4/45LfEip okog8AazQq5rBjknyywTo6hDVJXfevxkkI93XzkXkVMvRtbJvohbb1yKlkNkiR8o4Uv+x9 cQooSnf3vvWrfGnAov2qXw7FxdiwJSsrEa/NN5Mj8TOs+QPNPP9DdJbyNqnrAyxo8UpoTo Y6eSO7tewZgQfR7W+8abn0n1omLhcLKo6EvOIwes9gG8TsEnB9twc4kMjN6RzaRQ+vTvzJ vSdb3NPJS0a5dBmwTsXp60MvZcbN9xcxV6usFVow25udC/bAT05LubEyeXdgmw==
ARC-Authentication-Results: i=1; rspamd-674ffb986c-xlwfm; auth=pass smtp.auth=hostingeremail smtp.mailfrom=dhc@dcrocker.net
X-Sender-Id: hostingeremail|x-authsender|dhc@dcrocker.net
X-MC-Relay: Neutral
X-MailChannels-SenderId: hostingeremail|x-authsender|dhc@dcrocker.net
X-MailChannels-Auth-Id: hostingeremail
X-Print-Lettuce: 221e694d1ff2e2df_1658179437226_1805302514
X-MC-Loop-Signature: 1658179437226:1441079889
X-MC-Ingress-Time: 1658179437226
Received: from gcp-us-central1-a-smtpout1.hostinger.io (gcp-us-central1-a-smtpout1.hostinger.io [35.184.15.197]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256) by 100.115.18.78 (trex/6.7.1); Mon, 18 Jul 2022 21:23:57 +0000
Received: from [192.168.0.104] (c-73-170-122-71.hsd1.ca.comcast.net [73.170.122.71]) (Authenticated sender: dhc@dcrocker.net) by smtp.hostinger.com (smtp.hostinger.com) with ESMTPSA id 4Lmw225f8Jz2cP4l; Mon, 18 Jul 2022 21:23:54 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dcrocker.net; s=hostingermail-a; t=1658179436; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=eCGh4C6kWB8of/xgkj867/LAwIbYh4LGSNaiLCN4POo=; b=bu5oM99z9IE60MJVran8f5CxOF3rxbjrb6poiRquZ93H5Tkibyn346134/CEsbz7poalSV XexRl6Q9N0IZOn5UJlEcbi8GdgcM4xxo17mN+ymOEy+1XjnoARQbjY5feTOn1gjC2eTYRf ak9oouwY/imfiVA3lH/1kVCbEbvNhG3pEIrRsPFRkKISKGg069bPttGtoSukhrvlk50Oxv t5yFKqHPHZu3+OOvlBtmxC7QOh3h4dBkaFe7sx+5MqE8piUB6oKLCxKX+HZ20qFpWiGJQz UemrW6F0QWQa/5ls4vFp72m1WpW9qBMlq2tBdRs5EyM09rGLEC2RcelOYS7utw==
Message-ID: <7e0642ce-17ed-f87a-d15f-74acb690b93e@dcrocker.net>
Date: Mon, 18 Jul 2022 14:23:54 -0700
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.11.0
Reply-To: dcrocker@bbiw.net
Content-Language: en-US
To: Scott Kitterman <sklist@kitterman.com>
References: <DE61AC51-4BC3-44FF-862D-7D8ADFB3BC29@proofpoint.com> <20CBD506-7E50-4161-ADE6-64614630B1B2@proofpoint.com> <CAHej_8kridbc322MDRpxfgd+8Y2yNacxTAtvr+HF=+wevdRQhw@mail.gmail.com> <VI1PR01MB70538965904FD08A49F75C37C78C9@VI1PR01MB7053.eurprd01.prod.exchangelabs.com> <11A2B052-A26C-4A9C-9D88-72B594DA1C59@proofpoint.com> <VI1PR01MB70537BA29DA1F456B858C17FC78C9@VI1PR01MB7053.eurprd01.prod.exchangelabs.com> <6993E8B6-11A0-4AF3-A94E-044F880E56BC@proofpoint.com> <CAHej_8kjwtGE4rDrXfTpgThOD-jh7t0GK9EUnVjVZT_OJzzsvg@mail.gmail.com> <VI1PR01MB705353E36328899609DE2471C78C9@VI1PR01MB7053.eurprd01.prod.exchangelabs.com> <12a85dfe-664f-d757-0fa2-81f17c8088c2@dcrocker.net> <4e9ab94e-8675-df70-3e4b-00edcedb266e@dcrocker.net> <5DE65D46-853F-4F61-ADA7-20CB5E7E6840@kitterman.com>
From: Dave Crocker <dhc@dcrocker.net>
Cc: bimi@ietf.org
Organization: Brandenburg InternetWorking
In-Reply-To: <5DE65D46-853F-4F61-ADA7-20CB5E7E6840@kitterman.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/bimi/X34ZuQEGgpQyg0J4YB4MRJi8ehE>
Subject: Re: [Bimi] Proposal to Clarify Role of MUA in BIMI Evaluation
X-BeenThere: bimi@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Brand Indicators for Message Identification <bimi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bimi>, <mailto:bimi-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bimi/>
List-Post: <mailto:bimi@ietf.org>
List-Help: <mailto:bimi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bimi>, <mailto:bimi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Jul 2022 21:24:04 -0000

On 7/18/2022 2:13 PM, Scott Kitterman wrote:
> On July 18, 2022 8:50:15 PM UTC, Dave Crocker <dhc@dcrocker.net> wrote:
>> On 7/18/2022 1:22 PM, Dave Crocker wrote:
>>> IMAP and POP are examples of protocols created for MUAs.  They do not specify the way an MUA can/should implement these details or how things should be presented to users, but they very much dictate their realm of functionality.  That naturally pertains to some aspects of MUA design.
>> Addendum:
>>
>> DKIM is designed as an end-to-end mechanism.  Both ends can be implemented in MUAs.  There is nothing that dictates that any aspect of DKIM be implemented in the email handling infrastructure.  The choice to implement it in that infrastructure is operational, rather than architectural.
>>
> I think that's accurate, but not particularly helpful.

Thanks for the helpful assessment.  If no one needed to hear the 
information that's fine.  From the postings, it wasn't clear to me.  The 
boundaries for interoperability and specification work can be confusing.


> Typically MUAs (standalone ones anyway) don't store the results of operations like DKIM verification.

That's nice.  How is it relevant to what I posted?


> They reparse the header and revalidate as needed when a user selects the mail.  While key management actions such as key rotation are formally outside the scope of RFC 6376, such things do happen and so the accuracy of time late verification does decline over time.  It might even be hazardous to attempt if the key size is small or the private key has been made available [1].

Same question.

d/

-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net