RE: [ietf-dkim] SSP issues

<Bill.Oxley@cox.com> Thu, 31 May 2007 17:47 UTC

Return-path: <ietf-dkim-bounces@mipassoc.org>
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Htojs-0001BO-Vc for ietf-dkim-archive@lists.ietf.org; Thu, 31 May 2007 13:47:09 -0400
Received: from sb7.songbird.com ([208.184.79.137]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Htojq-00059U-Bk for ietf-dkim-archive@lists.ietf.org; Thu, 31 May 2007 13:47:08 -0400
Received: from sb7.songbird.com (sb7.songbird.com [127.0.0.1]) by sb7.songbird.com (8.12.11.20060308/8.12.11) with ESMTP id l4VHieWc000980; Thu, 31 May 2007 10:44:41 -0700
Received: from cox.com (post5.cox.com [24.248.74.41]) by sb7.songbird.com (8.12.11.20060308/8.12.11) with ESMTP id l4VHiUo2000923 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for <ietf-dkim@mipassoc.org>; Thu, 31 May 2007 10:44:31 -0700
Received: from ([192.168.74.254]) by post5.cox.com with ESMTP id KP-GYX41.193569486; Thu, 31 May 2007 13:44:07 -0400
Received: from CATL0MS20.CORP.COX.COM ([10.62.210.20]) by catl0ms22.CORP.COX.COM with Microsoft SMTPSVC(6.0.3790.3959); Thu, 31 May 2007 13:44:07 -0400
Received: from CATL0MS02.corp.cox.com ([10.62.210.88]) by CATL0MS20.CORP.COX.COM with Microsoft SMTPSVC(6.0.3790.3959); Thu, 31 May 2007 13:44:07 -0400
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Subject: RE: [ietf-dkim] SSP issues
Date: Thu, 31 May 2007 13:44:07 -0400
Message-ID: <BB621D48443A854A89D86528F915864C042F4CA2@CATL0MS02.corp.cox.com>
In-Reply-To: <465F073D.3070802@cisco.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [ietf-dkim] SSP issues
Thread-Index: AcejqiXzocK6kacsQvS8IA19ou1VKgAAOFkg
References: <198A730C2044DE4A96749D13E167AD37012A5BFE@MOU1WNEXMB04.vcorp.ad.vrsn.com> <465EDB0E.4030409@cisco.com> <BB621D48443A854A89D86528F915864C042F4C9E@CATL0MS02.corp.cox.com> <465F073D.3070802@cisco.com>
From: Bill.Oxley@cox.com
To: fenton@cisco.com
X-OriginalArrivalTime: 31 May 2007 17:44:07.0723 (UTC) FILETIME=[49DBDFB0:01C7A3AB]
X-Songbird: Clean, Clean
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by sb7.songbird.com id l4VHiUo2000923
Cc: ietf-dkim@mipassoc.org
X-BeenThere: ietf-dkim@mipassoc.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IETF DKIM Discussion List <ietf-dkim.mipassoc.org>
List-Unsubscribe: <http://mipassoc.org/mailman/listinfo/ietf-dkim>, <mailto:ietf-dkim-request@mipassoc.org?subject=unsubscribe>
List-Archive: <http://mipassoc.org/pipermail/ietf-dkim>
List-Post: <mailto:ietf-dkim@mipassoc.org>
List-Help: <mailto:ietf-dkim-request@mipassoc.org?subject=help>
List-Subscribe: <http://mipassoc.org/mailman/listinfo/ietf-dkim>, <mailto:ietf-dkim-request@mipassoc.org?subject=subscribe>
Sender: ietf-dkim-bounces@mipassoc.org
Errors-To: ietf-dkim-bounces@mipassoc.org
X-SongbirdInformation: support@songbird.com for more information
X-Songbird-From: ietf-dkim-bounces@mipassoc.org
X-Spam-Score: 0.2 (/)
X-Scan-Signature: d9238570526f12788af3d33c67f37625

Exactly my point. The mail without an ssp pointer will be handled in the
same fashion as the mail without sigs as opposed to a dkim signed and
ssp matching policy statement.
Thanks,

Bill Oxley
Messaging Engineer
Cox Communications

-----Original Message-----
From: Jim Fenton [mailto:fenton@cisco.com] 
Sent: Thursday, May 31, 2007 1:35 PM
To: Oxley, Bill (CCI-Atlanta)
Cc: ietf-dkim@mipassoc.org
Subject: Re: [ietf-dkim] SSP issues

The problem is that the default needs to be "I do send mail", and "I
don't sign everything", since that is the current situation.  In other
words, the lack of an SSP record corresponding to "badguy.foo.com"
cannot be interpreted as suspicious, since it could simply be someone
who hasn't implemented SSP and doesn't have a record for that reason.

-Jim

Bill.Oxley@cox.com wrote:
> Please excuse my lack of DNS knowledge here
> Ssp.foo.com returns "I send no mail"
> Would work in the same fashion as mx.foo.com, a query returning a
> result. If a bad actor wanted to claim badguy.foo.com and an ssp query
> did not return data from ssp.badguy.foo.com it then becomes a local
> policy decision on whether to deliver or not. I must be missing
> something.
> Thanks,
>
> Bill Oxley
> Messaging Engineer
> Cox Communications
>
> -----Original Message-----
> From: ietf-dkim-bounces@mipassoc.org
> [mailto:ietf-dkim-bounces@mipassoc.org] On Behalf Of Jim Fenton
> Sent: Thursday, May 31, 2007 10:26 AM
> To: Hallam-Baker, Phillip
> Cc: IETF DKIM WG
> Subject: Re: [ietf-dkim] SSP issues
>
> Hallam-Baker, Phillip wrote:
>   
>>> [mailto:ietf-dkim-bounces@mipassoc.org] On Behalf Of Jim Fenton
>>>     
>>> (2) SSP record type (TXT vs. something new). Only 4 messages 
>>> in discussion, mostly saying "if you support TXT, don't 
>>> bother with anything else."  Again, no clear consensus.
>>>     
>>>       
>> I see no value in an SSP record type. The downside for DKIM is
serious
>>     
> - we are gated on new deployments of DNS server code. The downside for
> the DNS described above is equally serious.
>   
>>   
>>     
>
> If we would be gated on new deployments of DNS server code, wouldn't
> this be equally true for XPTR records?
>   
>> As a general rule: deployment of a new Internet protocol or protocol
>>     
> enhancement such as DKIM should not require consumption of any finite
> infrastructure resource. DNS RRs are one such resource.
>   
>>   
>>     
>
> I would have expected this comment from the DNS directorate if there
was
> threat of running out of DNS RRs, but much the opposite:  the IAB "DNS
> choices" draft recommends creation and use of new RRs.
>   
>> The only objection made to using TXT that has been sustained is the
>>     
> wildcard issue and that has been answered by XPTR. The principled
> approach here is to use a new RR to extend the DNS infrastructure so
it
> never needs future extension for other projects with similar goals. 
>   
>> I think that we should only do TXT. The consequence of this is that
>>     
> any email sender can express the policy 'I sign all mail from
> example.com' without modifying their DNS. The sand in the shoe is that
> they have to upgrade their DNS server to express the policy 'All mail
> from *.example.com is signed'.
>   
>>   
>>     
>
> I'm not clear on what "only do TXT" means in this context -- do you
mean
> a directly referenced TXT record or one retrieved via an XPTR lookup
or
> both?
>   
>> I accept the sand in the shoe reluctantly for the following reasons:
>>
>> 1) I don't think that the policy 'All mail from *.example.com is
>>     
> signed' is legitimate, I can see a need for the policy 'No mail is
sent
> from *.example.com' but that is out of scope. I can see how this can
> happen due to split DNS but anyone operating DKIM in this mode should
> either enter the DNS nodes in the external DNS or do the appropriate
> mapping before they sign.
>   
>> 2) Regardless of the wildcard mechanism employed (new RR, XPTR,
>>     
> whatever) administrative wildcards are going to be essential on a zone
> of any size.
>   
>>   
>>     
>
> I think I know from context and from talking with you what
> "administrative wildcards" are, but is this a generally used term?  If
> not, you might want to explain.
>   
>> 3) There is an advantage to DKIM in encouraging deployment of DNS
>>     
> servers capable of DNSSEC.
>   
>>   
>>     
>
> Yes, but I don't see how that is relevant here.
>
>
>   
>>> (3) Upward query vs. wildcard publication.  27 messages in 
>>> discussion from 15 people.  Most of the discussion was a 
>>> rehash of the idea of associating semantics with DNS 
>>> zone-cuts, which we had already discussed and rejected.  I 
>>> have also been trying to get an opinion from DNSOP on the 
>>> idea of a one-level upward search (which I think solves 90% 
>>> of the problem), but haven't gotten any response.
>>>
>>> So I don't know what to write in a revision of the draft.  I 
>>> could just write my opinions, but that's basically what's in 
>>> the draft-allman-dkim-ssp-02 draft already and doesn't make 
>>> any progress toward unifying the different proposals.  I want 
>>> to get something done soon, well before the July 2 deadline.
>>>     
>>>       
>> I think that this is where we reach the 'non-negotiable' issue for
the
>>     
> DNS cabal. Misimplementation of upward query is a major cause of load
on
> the DNS. The DNS cabal will complain loudly on this issue and they
will
> actually have a case.
>   
>>   
>>     
>
> "...is a major cause":  currently?  I don't see how we can design any
> protocol that is misimplementation-proof.
>   
>> What does make sense is to have a policy:
>>       'All mail from {example.com, alice.example.com,
bob.example.com}
>>     
> is signed'
>   
>> 	OTHERWISE 'No mail is sent from *.example.com'
>>
>> I can't see where I would be signing mail from a domain name with no
>>     
> external existence.
>   
>> OK here we come to a strange observation I made to Jim earlier. DKIM
>>     
> does not require a wildcard for DKIM signature policies. 'I sign
> everything in *.example.com' does not make sense, the wildcard that
does
> make sense is 'Nomail is sent from *.example.com'. Which is of course
> out of scope, so maybe the whole wildcard issue is out of scope for
DKIM
> policy and is only in scope for DKIM policy extensions (e.g. NOMAIL).
>   
>>   
>>     
>
> Agree that the NOMAIL policy is the more interesting one to express
with
> a wildcard.  There are some cases where it might be convenient to
> express a signing policy for subdomains, but in every case I can think
> of it's practical for the subdomains to publish their own SSP record.
>
> -Jim
> _______________________________________________
> NOTE WELL: This list operates according to 
> http://mipassoc.org/dkim/ietf-list-rules.html
>
> _______________________________________________
> NOTE WELL: This list operates according to 
> http://mipassoc.org/dkim/ietf-list-rules.html
>
>   

_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html