[ietf-dkim] draft-ietf-dkim-threats-02 nit//Affects verification of messages?

Douglas Otis <dotis@mail-abuse.org> Thu, 06 April 2006 19:28 UTC

Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1FRa9S-0001fE-14 for ietf-dkim-archive@lists.ietf.org; Thu, 06 Apr 2006 15:28:18 -0400
Received: from sb7.songbird.com ([208.184.79.137]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FRa9R-0004Jo-Lg for ietf-dkim-archive@lists.ietf.org; Thu, 06 Apr 2006 15:28:18 -0400
Received: from sb7.songbird.com (sb7.songbird.com [127.0.0.1]) by sb7.songbird.com (8.12.11.20060308/8.12.11) with ESMTP id k36J7ehb026935; Thu, 6 Apr 2006 12:07:40 -0700
Received: from a.mail.sonic.net (a.mail.sonic.net [64.142.16.245]) by sb7.songbird.com (8.12.11.20060308/8.12.11) with ESMTP id k36J7Mgd026876 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-dkim@mipassoc.org>; Thu, 6 Apr 2006 12:07:22 -0700
Received: from [168.61.10.151] (SJC-Office-DHCP-151.Mail-Abuse.ORG [168.61.10.151]) (authenticated bits=0) by a.mail.sonic.net (8.13.6/8.13.3) with ESMTP id k36J6kOT018382 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NO) for <ietf-dkim@mipassoc.org>; Thu, 6 Apr 2006 12:06:46 -0700
Resent-Message-Id: <9DB1AE2D-D2FE-46E8-A66B-1B8B9C34AFE8@mail-abuse.org>
Mime-Version: 1.0 (Apple Message framework v749.3)
Content-Type: text/plain; charset="US-ASCII"; delsp="yes"; format="flowed"
Resent-Date: Thu, 06 Apr 2006 12:07:07 -0700
Message-Id: <D55849F9-9A8B-4BC8-A516-0B2F4DC23C2D@mail-abuse.org>
Content-Transfer-Encoding: 7bit
Resent-To: IETF-DKIM <ietf-dkim@mipassoc.org>
From: Douglas Otis <dotis@mail-abuse.org>
Resent-From: Douglas Otis <dotis@mail-abuse.org>
Date: Thu, 06 Apr 2006 12:02:58 -0700
To: IETF Discussion <ietf@ietf.org>
X-Mailer: Apple Mail (2.749.3)
X-Songbird: Clean, Clean
Cc:
Subject: [ietf-dkim] draft-ietf-dkim-threats-02 nit//Affects verification of messages?
X-BeenThere: ietf-dkim@mipassoc.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IETF DKIM Discussion List <ietf-dkim.mipassoc.org>
List-Unsubscribe: <http://mipassoc.org/mailman/listinfo/ietf-dkim>, <mailto:ietf-dkim-request@mipassoc.org?subject=unsubscribe>
List-Archive: <http://mipassoc.org/pipermail/ietf-dkim>
List-Post: <mailto:ietf-dkim@mipassoc.org>
List-Help: <mailto:ietf-dkim-request@mipassoc.org?subject=help>
List-Subscribe: <http://mipassoc.org/mailman/listinfo/ietf-dkim>, <mailto:ietf-dkim-request@mipassoc.org?subject=subscribe>
Sender: ietf-dkim-bounces@mipassoc.org
Errors-To: ietf-dkim-bounces@mipassoc.org
X-SongbirdInformation: support@songbird.com for more information
X-Songbird-From: ietf-dkim-bounces@mipassoc.org
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 4d87d2aa806f79fed918a62e834505ca

,----
|1.2.  Document Structure
|...
|
| The sections dealing with attacks on DKIM each begin with a table
| summarizing the postulated attacks in each category along with their
| expected impact and likelihood.  The following definitions were used
| as rough criteria for scoring the attacks:
|
| Impact:
|
|  High: Affects the verification of messages from an entire domain or
|      multiple domains
'____

It is not clear what is meant by "affects verification of messages."   
The verification process depends only upon the integrity of the  
network infrastructure.  The threat document should consider the  
impact upon the classification of a domain's messages.  Even when a  
private key is compromised, the verification process still passes  
valid messages.  The threat review indicates a compromised key as  
causing a high impact.  One could conclude this impact results when  
messages from a bad actor accrue to the exploited domain.

The introduction offers these possible uses of DKIM.
,----
| Once the attesting party or parties have been established, the
| recipient may evaluate the message in the context of additional
| information such as locally-maintained whitelists, shared reputation
| services, and/or third-party accreditation.
'____

A threat document should consider how an exploit might affect these  
uses of DKIM.


Change:

"Affects the verification of messages..."

to

"Affects the classification of messages..."

-Doug




_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html