Re: [dmarc-ietf] PSD simplification
Scott Kitterman <sklist@kitterman.com> Thu, 13 December 2018 01:27 UTC
Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 19722129BBF for <dmarc@ietfa.amsl.com>; Wed, 12 Dec 2018 17:27:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=kitterman.com header.b=CmYUmpjs; dkim=pass (2048-bit key) header.d=kitterman.com header.b=yn7B9JG+
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OImprTzK9C7l for <dmarc@ietfa.amsl.com>; Wed, 12 Dec 2018 17:27:12 -0800 (PST)
Received: from softlayer.kitterman.com (softlayer.kitterman.com [169.62.11.132]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CD5F9128B14 for <dmarc@ietf.org>; Wed, 12 Dec 2018 17:27:11 -0800 (PST)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201812e; t=1544664429; h=date : in-reply-to : references : mime-version : content-type : content-transfer-encoding : subject : to : from : message-id : date : subject : from; bh=Ad81SD0Vvwv6EbglQBn4evn8ZY11/aCqVY1+irfGhmo=; b=CmYUmpjso0Ca0mDdgwSYrj5q9WR0uRIGjdGwGEEiHYbDwYeHAIUKHvDi Erbd+CBX+KfPj+CGJTEy1viN6zuhCA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201812r; t=1544664429; h=date : in-reply-to : references : mime-version : content-type : content-transfer-encoding : subject : to : from : message-id : date : subject : from; bh=Ad81SD0Vvwv6EbglQBn4evn8ZY11/aCqVY1+irfGhmo=; b=yn7B9JG+Yzn+RezOD4C+LX9Lq5mcu5ZqxJ0RC3iWSNf5cFfeMSqfGeDI iuvqeDo6Muho5qlfYJeuClvPBBQs3ity/2QwnEXhQ1K+8BCKXUNwZ8MMZ2 HfRYFJRfrEngSzr5xOFCKR2CpT4t97JQL4lWfy7UzU1SfEZGhAn7FD6bfx yjfegEi+eg9eYP/MHRn+uisjXcBJ36xCnK6mvRwKmpSHldUrEjebvw980k KiowJEsoY9STg5thXexKSnymKUoECHlRm+s5GrWUkH7WVoJo7IrVnTiUnR phFKVr6CiSlddCFHal2FztbheIqHZCYMM5rTvoTrdzm6z7g1lRQkrA==
Received: from [192.168.1.146] (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by softlayer.kitterman.com (Postfix) with ESMTPSA id EE1992D4062B; Wed, 12 Dec 2018 19:27:08 -0600 (CST)
Date: Thu, 13 Dec 2018 01:27:03 +0000
In-Reply-To: <3003562c-e2df-2ab0-e34b-8bda4f881d40@dcrocker.net>
References: <b3ab712a-74b3-d580-65bc-a97bf8c4652d@gmail.com> <9e00a59d-33da-33e8-4611-ab2152235106@gmail.com> <1b0bef4b-61e6-776c-79e8-89631efa8053@dcrocker.net> <8090288.RMFQGzStmc@kitterma-e6430> <3003562c-e2df-2ab0-e34b-8bda4f881d40@dcrocker.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
To: dmarc@ietf.org
From: Scott Kitterman <sklist@kitterman.com>
Message-ID: <B64DD715-DFC4-42E1-87FC-15A5ED0B83F9@kitterman.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/3BrmdLxJWa5Bh2Z0vQUEskpteQY>
Subject: Re: [dmarc-ietf] PSD simplification
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Dec 2018 01:27:14 -0000
On December 12, 2018 3:30:20 PM UTC, Dave Crocker <dhc@dcrocker.net> wrote: >On 12/11/2018 9:01 PM, Scott Kitterman wrote: >> On Tuesday, December 11, 2018 08:17:38 PM Dave Crocker wrote: > >>> 1. If the registry is to constrain which public suffix operators >>> are constrained to assert a default record, then I'll claim that's >>> a false sense of security, given the range of unrelated and even >>> more serious powers a parent domain can exert over a subordinate >>> one. >>> >>> 2. If it is to avoid wasting a DNS a query to a record that won't >>> be there, that's false economy. Most queries to the registry will >>> fail. And most queries to both the From: domain name and its >>> organizational domain already fail. The incremental cost of a >>> wasted query to the organizational domain's parent is pretty >>> small. >>> >>> And the cost of creating and running a query-able database that is >>> kept current is high and error-prone (as the existing PSL >>> demonstrates.) >.... > >> I think your analysis is essentially correct, but I think point 1 is >> backwards. Since (in the current draft), based on the registry >> entries, the third level queries will usually not take place. It's >> not that the PSOs are constrained not to publish records (they >> aren't), it's that no one will (should) query for them based on the >> third level test if they aren't in the registry. >> >> This may seem like a small thing, but I believe it makes all the >difference. >> You are certainly correct that nothing in an RFC can prevent a PSO >from >> publishing such records. What we can do is give guidance on when not >to look >> at them. > >That's a cost-saving line of concern. My point is that the existing >mechanism already has quite a bit operational inefficiency from queries >that fail, so that adding one more is a minor issue, especially as >against the considerable administrative and operational cost of >creating >and running a registry. > > >> I believe avoiding the privacy implications of the related feedback >> are worth the transactional costs of the registry (but then I would, >> wouldn't I). I don't think a bad situation justifies making it >> worse. > >Sorry but I don't know what privacy implications you are referring to. >I don't even have a guess. > >And the draft makes no reference to privacy issues. Or rather, the >Privacy Considerations section says the draft doesn't introduce any. As written, it doesn't. If you change it the way you propose, it will. Scott K
- [dmarc-ietf] PSD simplification Dave Crocker
- Re: [dmarc-ietf] PSD simplification Scott Kitterman
- Re: [dmarc-ietf] PSD simplification Dave Crocker
- Re: [dmarc-ietf] PSD simplification John Levine
- Re: [dmarc-ietf] PSD simplification Dave Crocker
- Re: [dmarc-ietf] PSD simplification John R Levine
- Re: [dmarc-ietf] PSD simplification Dave Crocker
- Re: [dmarc-ietf] PSD simplification John R Levine
- Re: [dmarc-ietf] PSD simplification Scott Kitterman
- Re: [dmarc-ietf] PSD simplification Dave Crocker
- Re: [dmarc-ietf] PSD simplification Scott Kitterman
- Re: [dmarc-ietf] PSD simplification Dave Crocker
- Re: [dmarc-ietf] PSD simplification Kurt Andersen (b)
- Re: [dmarc-ietf] PSD simplification Dave Crocker
- Re: [dmarc-ietf] PSD simplification John Levine
- Re: [dmarc-ietf] PSD simplification Scott Kitterman
- Re: [dmarc-ietf] PSD simplification John Levine
- Re: [dmarc-ietf] PSD simplification Scott Kitterman
- Re: [dmarc-ietf] PSD simplification Dave Crocker
- Re: [dmarc-ietf] PSD simplification Alessandro Vesely
- Re: [dmarc-ietf] PSD simplification Scott Kitterman
- Re: [dmarc-ietf] PSD simplification Scott Kitterman