Re: [dmarc-ietf] Benjamin Kaduk's Discuss on draft-ietf-dmarc-rfc7601bis-04: (with DISCUSS and COMMENT)

Benjamin Kaduk <kaduk@mit.edu> Sun, 06 January 2019 17:27 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DEDBE130DD2; Sun, 6 Jan 2019 09:27:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mit.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hALpGb9Kyd_f; Sun, 6 Jan 2019 09:27:36 -0800 (PST)
Received: from NAM03-CO1-obe.outbound.protection.outlook.com (mail-eopbgr790092.outbound.protection.outlook.com [40.107.79.92]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9AE8E12DF71; Sun, 6 Jan 2019 09:27:36 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=g/11h++VBEz7EIMho7vls8QDp+QOO+UA3SEOaw2W4qI=; b=a7xWl2MvAaOKEy+sOQiBYm/s2GqHVxk7bwB9K1xhwiOv/2F9dPj1bOSCiFkuGBfiR2ls1p0b9DvoB7CkEeQ1NAli9lSftqBqy5ZrCeuTPPpV7HKvNYx5ObnaPSADU/JuSGusAhMdQVqMTJ/H4yNooztTVVXfpvPhG7VSi1unhMM=
Received: from DM5PR0102CA0029.prod.exchangelabs.com (2603:10b6:4:9c::42) by DM6PR01MB4026.prod.exchangelabs.com (2603:10b6:5:2e::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1495.6; Sun, 6 Jan 2019 17:27:34 +0000
Received: from DM3NAM03FT057.eop-NAM03.prod.protection.outlook.com (2a01:111:f400:7e49::201) by DM5PR0102CA0029.outlook.office365.com (2603:10b6:4:9c::42) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1495.6 via Frontend Transport; Sun, 6 Jan 2019 17:27:34 +0000
Authentication-Results: spf=pass (sender IP is 18.9.28.11) smtp.mailfrom=mit.edu; ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=bestguesspass action=none header.from=mit.edu;
Received-SPF: Pass (protection.outlook.com: domain of mit.edu designates 18.9.28.11 as permitted sender) receiver=protection.outlook.com; client-ip=18.9.28.11; helo=outgoing.mit.edu;
Received: from outgoing.mit.edu (18.9.28.11) by DM3NAM03FT057.mail.protection.outlook.com (10.152.83.45) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1471.13 via Frontend Transport; Sun, 6 Jan 2019 17:27:34 +0000
Received: from kduck.kaduk.org (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id x06HRUb3014396 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sun, 6 Jan 2019 12:27:32 -0500
Date: Sun, 06 Jan 2019 11:27:30 -0600
From: Benjamin Kaduk <kaduk@mit.edu>
To: "Murray S. Kucherawy" <superuser@gmail.com>
CC: The IESG <iesg@ietf.org>, Tim Draegen <tim@dmarcian.com>, IETF DMARC WG <dmarc@ietf.org>, draft-ietf-dmarc-rfc7601bis@ietf.org, dmarc-chairs@ietf.org
Message-ID: <20190106172729.GL28515@kduck.kaduk.org>
References: <154280871768.11502.10059395575461348698.idtracker@ietfa.amsl.com> <CAL0qLwZb_=N+nEQQqvqURKvz9yM1bMZfyhrXcqVf0rm90qpcsQ@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <CAL0qLwZb_=N+nEQQqvqURKvz9yM1bMZfyhrXcqVf0rm90qpcsQ@mail.gmail.com>
User-Agent: Mutt/1.10.1 (2018-07-13)
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:18.9.28.11; IPV:CAL; SCL:-1; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(136003)(376002)(39860400002)(396003)(346002)(2980300002)(199004)(189003)(60444003)(43544003)(51444003)(50466002)(786003)(316002)(55016002)(6916009)(446003)(426003)(36906005)(5024004)(14444005)(11346002)(956004)(47776003)(336012)(356004)(305945005)(23726003)(106002)(5660300001)(478600001)(53546011)(76176011)(33656002)(104016004)(26826003)(229853002)(46406003)(7696005)(4326008)(39060400002)(2906002)(16586007)(186003)(9686003)(54906003)(26005)(53416004)(1076003)(486006)(106466001)(126002)(8676002)(6246003)(8936002)(97756001)(58126008)(86362001)(476003)(1411001)(246002)(88552002)(4744004)(75432002)(18370500001); DIR:OUT; SFP:1102; SCL:1; SRVR:DM6PR01MB4026; H:outgoing.mit.edu; FPR:; SPF:Pass; LANG:en; PTR:outgoing-auth-1.mit.edu; A:1; MX:1;
X-Microsoft-Exchange-Diagnostics: 1; DM3NAM03FT057; 1:AnnURoAZqU1Mv4d5nX96iBsFb/QDrhxBSvfg7MAmgXPP+pKDVeWPf6R7lWFWYVxZW5VE8LWEarYo1ZuBpH/oi7T6bsYhusqCEaKNfQ+qgTg95/eK7EwdHPP0RMcagwqN
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6e5f23af-ca85-4042-7e3c-08d673fc3f0f
X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600109)(711020)(4608076)(4709027)(2017052603328)(7153060); SRVR:DM6PR01MB4026;
X-Microsoft-Exchange-Diagnostics: 1; DM6PR01MB4026; 3:k7XGP0nJqc7UafGqBi3yOXv6l/pOLYohEb2SufbolN3M/0KWx8YrcfpNtcYSe57rncIh6tOHPLLuqBTFOw9qYrcdkOpbKF7X/I6Y+DgXpiaDA08Q7K2ShcHgmjyQ3lomD4lf89UGw2iLAOP7XYBdmZYLqDQtF2CWx/RWp2KjVTIAPOdm86JanMvu+rY/TY9pLJVu0viJM6Tdr0lygDKHIh7OGhJy1h+I49MvOcVaLK9qu7iORzzWUfAV6jmHZzrrY7qe685XMRBSUmmIyF6irERItkOGjcpxTG41Vbf/+g8QK3QitDnlyI5V7nPograReRWnuHQ/cU8YLriTgv5hKZ6u5MlQDRt9iV+FsTEbeMuWWYN+PQ/v6qw9Zc9+5OjA; 25:BIErpaFWxQEonfmAAzZWlrnfzsdbRh2uADlBZI8iRBEGrKO5x2XCTVt44kgXJu/w4dFsr7kB8AV8umSKTRnC+Ea86DUWPKQ/njWJT/Y7bHInVduG3uCELUlzgb1bf94XX5z6ra1OFf5fv+CYUtnE+TM12XqYtQKynTbWACix7tVK88nAqqWFRD7XkLr6PGBBWwViAMLTpP1bRooG7IfuxiBfqRmEIoL7ECBnd8b8gTABnxtUyqNt9s5Jl6Ii4WAjo51nVM0i/rfoe7Nm4AxJGSRdIHMY70PF9nHaL4PjnJNitauIwvefxTcUWU6fwnS7wGzzHoI+vcGON3DJFMtS6w==
X-MS-TrafficTypeDiagnostic: DM6PR01MB4026:
X-Microsoft-Exchange-Diagnostics: 1; DM6PR01MB4026; 31:B4qwhOgzg6dXHlLlMbNJHw5gJIJakAgOY9Mgm1L7YurX6LLUhE8Q4xo/Z5aHRglF2HHXZpL6PZc3btDnQuzV2zPo5qQLr3vDnK8+PO8yE73YYt4RNhzmIHxjyPHXumPna4kT8lIcj6hioanN+3/YAtIh70apYIdG9eFsf1EPx0QEkhUZ9cgCzcNnQFFUhkkjwyeYboXUT9aXpq09TW8DvJzIRFQetpDuotYc6UOC63o=; 20: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
X-Microsoft-Antispam-PRVS: <DM6PR01MB40262958F2C81524F4579EDEA0880@DM6PR01MB4026.prod.exchangelabs.com>
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(3230021)(908002)(999002)(5005026)(6040522)(8220060)(2401047)(8121501046)(93006095)(93004095)(3231475)(944501520)(52105112)(3002001)(10201501046)(6041310)(20161123562045)(201703131423095)(201702281528075)(201702281529075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123560045)(20161123558120)(201708071742011)(7699051)(76991095); SRVR:DM6PR01MB4026; BCL:0; PCL:0; RULEID:; SRVR:DM6PR01MB4026;
X-Microsoft-Exchange-Diagnostics: 1; DM6PR01MB4026; 4:wYzgU8zaKxPH7gwb99VFH2zZSybDQsW1Glu2m19tZb4s/RzaaSIsQZjLSanCTxDeFp+FkrGpGuSiD4LFII5SFtCBtT8ZiZrzzi48wSkYzDRhCVJDjwOKSiEPLFNFwbVa1uFwROlr36EGDe6UAIp6vwQowCn2u3flU4U0xukfzVI+ZasL8TMG6TWlP0up2FpMZHSR71+hzHQDIY3d9XjgAjrIgrXg513Okz/Vskpuj7jP68N7Go7Ov6MYjtn+Rct8nCc1kKVkFnbge+E5vUfktlx6FwTuqN+QGFnVsgqIE79ZfDGto+CSZu3jJm0oOVtN
X-Forefront-PRVS: 09090B6B69
X-Microsoft-Exchange-Diagnostics: 1; DM6PR01MB4026; 23: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
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Message-Info: fjF0NoLKh9h5BHn4SteyAkzCu38W7oTtSDDJB6uzBkMU2A5gAF5oA9zD/7fZYdkKI/pEoOwsXK15yWwFIMetp4Kb7JMlNNuYNyPwqL8bW0nNAt7oVBRVpTwh4Y6QoF+ZeDok6zur860oKYREESHUR3o3T9q9BQTQFZCx45FgKvDIf20PiXtJ0uKSYAhgmVwW8YIhFRt4i2Hnt8EkwxKkaOv5bdDq1zO+UwYbbCGGVQ0x+tMF4oKd176wFnhD/niK5rcgsa7yJneykgFhsC1nhyHH5pfY+vN6ZYT/JgRNlVd+mDUXFgq7Dro8SBIiQfRl
X-Microsoft-Exchange-Diagnostics: 1; DM6PR01MB4026; 6:3TrPVMjLF9gPuMbrVz34xhriHuKgds6pF/jfO0Rs5ZiYA6+TcZpIVo6z7joLnO4x4wG+kblmbAKBAgYt62ujUIKTanoD7cvFqTTJIRacQfNaPeQbxZbEN5GqIp3xdcB0SmAYOIDJzEeLwtOmkU3WVwwRJOQ8GFIONza3ZHKFw9lhUjTjDqhUPnTlgS7EPh0EcmT+pH+LoHvitgoIUKI2uQIvvFS8zCPCynVlOLfHHXSckioR64ruwoCSCIbzERaNmPpbe4iZ6LYFpkgPDmEIgu0mLnE/HYjb8kk5lDkwHsqfHEt6n2+2JcGE8n7o9wSbCSkCmAIG3rHu2VbJQMOR3zLwgUYAZMAOLsP4qT6XmYc3UldJLL7nXbBCrLB2c6/p9TvEhehCZw1BYI77NxC5byPOcSGR4vEWGT7gz/K/yfZM/mo9ih1g7J1UnhVpIxHc2iB/c5+XE1MK1mRJY72kqw==; 5:dG3bRGEhPuQkfkZmksbDuiyHLgY0XZ7DYMfC631OTgLZ5glsWxyZdbgCzixf2Yj+AwTcNTvX/7h5usk8mteX8CpGF6N1qBsW723rb1xa/3y0akZUO8IwChRb7gIN0yMJ4GBYbPZ8WH2krZWQRTco79ViMSd9egLIPrnr558HhvP17RAEVjMg5KbzlHxZi9YYgWzC1MxHOxGGCcorHEuvDA==; 7:hO+SnX+yjBBW5sh4f/WDT2w1LCEFkAKadPRor4QIwIGZwzG4KJ5NaJahu/vZk+2yeD2c9hY3t0wSWS1zXx5qj9m2PvfYjl26/IyonQZVS809X4npb4PGUlYyBY2qfsGupBRHRaZJJYZ3bWQ5HH74fw==
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: mit.edu
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 06 Jan 2019 17:27:34.1124 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 6e5f23af-ca85-4042-7e3c-08d673fc3f0f
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=64afd9ba-0ecf-4acf-bc36-935f6235ba8b; Ip=[18.9.28.11]; Helo=[outgoing.mit.edu]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR01MB4026
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/Lo3W0EfrD3PdZMAWlODPPWRktAA>
Subject: Re: [dmarc-ietf] Benjamin Kaduk's Discuss on draft-ietf-dmarc-rfc7601bis-04: (with DISCUSS and COMMENT)
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Jan 2019 17:27:46 -0000

On Sat, Jan 05, 2019 at 09:07:24PM -0800, Murray S. Kucherawy wrote:
> On Wed, Nov 21, 2018 at 5:58 AM Benjamin Kaduk <kaduk@mit.edu> wrote:
> 
> >
> > For example, in Section 1:
> >
> >    There exist registries for tokens used within this header field that
> >    refer to the specifications listed above.  Section 6 describes the
> >    registries and their contents and specifies the process by which
> >
> > I don't think all of this is still present anymore.  (If we were talking
> > about registration policies, for example, we'd need an 8126 reference to
> > replace the 5226 reference that was removed.)
> >
> 
> There appears to be obvious consensus for restoring all of the text so that
> this document is a complete description of Authentication-Results.
> Hopefully the update I'm planning to post takes care of all of this.

It seems pretty likely, yes.  I'll keep an eye out for the next rev and
clear my discuss accordingly.

> [We should double-check that everything that now allows EAI-formatted
> > stuff is updated to also refer to this document from the IANA registry.
> > On first glance this might include vbr.mv and vbr.md, but probably much
> > more.]
> >
> 
> The pending update should take care of this as well.
> 
> Don't we need to mention the updates (or obsoletes) relationship w.r.t.
> > 7601 in the Abstract and Introduction?
> >
> 
> Since I started doing IETF work, it seems like there's never been
> consistent guidance on this.  Some ADs ask for it, others find it redundant
> to what's in the header of the first page and have asked me to remove it in
> prior work.  I'll add it here and hopefully nobody pushes back.
> 
> Section 4.1 has:
> >
> >    MUAs and downstream filters MUST ignore any result reported using a
> >    "result" not specified in the IANA "Result Code" registry or a
> >    "ptype" not listed in the "Email Authentication Property Types"
> >    registry for such values as defined in Section 6.  [...]
> >
> > This would seem to be an internal inconsistency, in that it seems to
> > preclude any sort of experimental usage as described in Sections 2.7.x.
> >
> 
> Fixed next version.
> 
> In Section 2.3:
> >
> >    Combinations of ptypes and properties are registered and described in
> >    the "Email Authentication Methods" registry, coupled with the
> >    authentication methods with which they are used.  This is further
> >    described in Section 6.
> >
> > The relevant subsection of section 6 is a pretty empty stub now.
> >
> 
> Fixed next version.
> 
> ----------------------------------------------------------------------
> > COMMENT:
> > ----------------------------------------------------------------------
> >
> > Thanks you for updating in response to the secdir review!
> >
> > Are we now intending to restrict ourselvesto domain-based authentication
> > schemes, having removed the disclaimer present in 7601 about the intent
> > of the document?
> >
> 
> No; this document talks about SMTP AUTH and reverse DNS authentication,
> neither of which necessarily tie directly to domain names for domains in
> the message.
> 
> Which disclaimer are you referring to?
> 

I was thinking about "[t]his specification is not intended to be restricted
to domain-based authentication schemes, [...]".  I don't think we should
make any change to the document text (but if the answer was "yes", I might
have suggested something).

> 
> > Section 1.1
> >
> >    In particular, the mere presence of this header field does not mean
> >    its contents are valid.  Rather, the header field is reporting
> >    assertions made by one or more authentication schemes applied
> >    somewhere upstream.  For an MUA or downstream filter to treat the
> >    assertions as actually valid, there must be an assessment of the
> >    trust relationship among such agents, the validating MTA, and the
> >    mechanism for conveying the information
> >
> > If this document is reporting assertions made upstream, we should say
> > what kind of integrity and authenticity guarantees we do or do not
> > provide for the reported information.  (That is, "this header is
> > transmitted in cleartext and could be modified by any agent along the
> > delivery path", modulo the speculation we have later about potential
> > ways to improve on that situation.)  Section 1.6 goes a bit farther in
> > this vein; maybe a forward reference is in order?
> >
> 
> Eric made a suggestion about mentioning that the paths between components
> that either generate or consume this header field must also be trusted, and
> I've added that already.  Is that satisfactory?

I think that covers my concern, yes.

> Section 1.4
> >
> > Isn't there a requirement to drop this header on the boundary, if there
> > are any internal consumers?  This is not a global requiremnet on
> > existing servers, of course, but a deployment consideration that may
> > affect existing servers.  The end of section 7.1 seems to cover this
> > situation pretty well, as well.
> >
> 
> This section is talking about changes to other protocols (there are none)
> and required changes to message handling logic (i.e., you don't have to
> start rejecting mail just because "dkim=fail" or something).

It talks about required changes to message handling logic on existing
servers, and I am claiming that there is one such, in certain cases.  In
particular, when the new deployments that use this header are in the
interior of a network, the boundary servers of that network must drop
instances of this header that claim to represent that network from incoming
traffic, to ensure that the internal consumers only receive accurate data.
This is hardly a universal case, but may be worth mentioning explicitly.

> Section 1.5.1
> >
> > Please consider using the RFC 8174 version of the BCP 14 boilerplate.
> >
> 
> Done in the new version.
> 
> Section 1.5.4
> >
> >    o  An "intermediate MTA" is any MTA that is not a delivery MTA and is
> >       also not the first MTA to handle the message.
> >
> > Is this intended to be global or within an ADMD?
> >
> 
> It's global.

Okay, thanks.

> Section 2.2
> >
> > I guess wouldn't be a whole lot of value in subtyping Keyword to have
> > one symbol per registry, though the thought did occur to me while
> > reading.
> >
> 
> I agree, not really.
> 
> Section 2.3
> >
> >    body:  Information that was extracted from the body of the message.
> > [...]
> >       interest.  The "property" is an indication of where within the
> >       message body the extracted content was found, and can indicate an
> >       offset, identify a MIME part, etc.
> >
> > I'm not seeing where it's specified how the "property" gives an offset.
> > I see other descriptions below about specific header fields and SMTP
> > verbs and such, though.
> 
> 
> That's text from the 2009 version of this work.  Those were speculative at
> the time and haven't yet materialized, at least not in standardized use.

Are you proposing to leave the text unchanged regardless?

> 
> > (Do we need to make it more clear that the
> > "property" is defined within the context of the method?)
> >
> 
> That doesn't appear to have been necessary in the ~10 years since the first
> version.

A pretty solid argument :)

>    The results for Sender ID are listed and described in Section 4.2 of
> >    [SENDERID], but for the purposes of this specification, the SPF
> >    definitions enumerated above are used instead.  Also, [SENDERID]
> >    specifies result codes that use mixed case, but they are typically
> >    used all lowercase in this context.
> >
> > We use much stronger statements about lowercasing than "typically",
> > elsewhere in this doc.  Is this time different?
> >
> 
> Removed.
> 
> Section 2.7.6
> >
> >    Experimental method identifiers MUST only be used within ADMDs that
> >    have explicitly consented to use them.  These method identifiers and
> >    the parameters associated with them are not documented in RFCs.
> >    Therefore, they are subject to change at any time and not suitable
> >    for production use.  [...]
> >
> > This part seems to value RFC status too highly -- earlier in the section
> > we only say that they should "preferably" be published in an RFC.
> >
> 
> I'll just make it "formally".
> 
> Section 2.7.7
> >
> > Do we want to say that temporary registrations are available for
> > wide-scale or long-running experiments?
> >
> 
> It's never come up before.  Since the registry includes the ability to mark
> something "deprecated", one could do the registration and then deprecate it
> if the experiment fails.  Or we could allow a third status of
> "experimental".  But since there's never been such demand in the ten years
> since the original version, I'd just as soon leave it until someone wants
> to do it.

Fair enough.  (IIUC, temporary registrations are globally available for
~all IANA registries, as a function of BCP 37 (e.g., RFC 2780 section 2),
so my suggestion was just to make this more widely advertised rather than
changing registration policy.)

> Section 3
> >
> >    of the validity of the connection's identity using DNS.  It is
> >    incumbent upon an agent making use of the reported "iprev" result to
> >    understand what exactly that particular verifier is attempting to
> >    report.
> >
> > Does that in practice constrain "iprev" usage to within a single ADMD?
> >
> 
> I would imagine so.

This is just the COMMENT section, so do what you will, but I would consider
mentioning this property of "iprev" more explicitly.

> Section 4.1
> >
> >    MUAs SHOULD ignore instances of this header field discovered within
> >    message/rfc822 MIME attachments.
> >
> > When would I want to not ignore it?
> >
> 
> The discretion is left for operators that know what they're doing.  You
> have to understand, for example, that you're going to be applying the
> results of authentication checks done in the possibly very distant past.  I
> can add a sentence or two to that effect.

Thanks!

> Section 5
> >
> > I guess there's not really any special behavior to worry about when a
> > message's path causes it to have two or more disjoint path segments in
> > its delivery path that go through a given ADMD.  (That is, delete on
> > entry is still the right thing to do.)  The last paragraph of Section
> > 1.2 covers a related case, but I am thinking of something like a message
> > that gets delivered to an expander and some of the recipients' delivery
> > path would then return through a previously visited domain.
> >
> >                                                 For example, an MTA for
> >    example.com receiving a message MUST delete or otherwise obscure any
> >    instance of this header field bearing an authentication service
> >    identifier indicating that the header field was added within
> >    example.com prior to adding its own header fields.  [...]
> >
> > Do we want to say anything about the authserv-id here?
> >
> 
> That's the "authentication service identifier".

Whoops, sorry for missing that.

> Section 6.4
> >
> > I think we need to update the registry to also refer to this document.
> >
> 
> It's in the pending update.
> 
> Appendix C
> >
> >    2.  Border MTAs are more likely to have direct access to external
> >        sources of authentication or reputation information since modern
> >        MUAs are more likely to be heavily firewalled.  [...]
> >
> > It's unclear that this statement about "modern MUAs" is still true,
> > given the "zero trust" movement and such.
> >
> 
> It's certainly still true in my work environment, but perhaps less so for
> mobile devices.  I'll tweak the text accordingly.

Thanks!

-Benjamin