[ietf-dkim] DKIM Client Policy Requirement

Douglas Otis <dotis@mail-abuse.org> Sun, 06 August 2006 01:00 UTC

Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1G9Wzy-0001Vc-7f for ietf-dkim-archive@lists.ietf.org; Sat, 05 Aug 2006 21:00:10 -0400
Received: from sb7.songbird.com ([208.184.79.137]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G9Wzw-0002Ns-Rc for ietf-dkim-archive@lists.ietf.org; Sat, 05 Aug 2006 21:00:10 -0400
Received: from sb7.songbird.com (sb7.songbird.com [127.0.0.1]) by sb7.songbird.com (8.12.11.20060308/8.12.11) with ESMTP id k760wipk031953; Sat, 5 Aug 2006 17:58:45 -0700
Received: from b.mail.sonic.net (b.mail.sonic.net [64.142.19.5]) by sb7.songbird.com (8.12.11.20060308/8.12.11) with ESMTP id k760weDT031917 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-dkim@mipassoc.org>; Sat, 5 Aug 2006 17:58:40 -0700
Received: from [192.168.2.42] (64-142-13-68.dsl.static.sonic.net [64.142.13.68]) (authenticated bits=0) by b.mail.sonic.net (8.13.8.Beta0-Sonic/8.13.7) with ESMTP id k760wANX031801 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NO); Sat, 5 Aug 2006 17:58:11 -0700
In-Reply-To: <44D5356A.9010100@mtcc.com>
References: <20060805034058.861.qmail@simone.iecc.com> <44D4FB5A.5020704@mtcc.com> <20060805163953.Q47527@simone.iecc.com> <6D2FE363-D3F0-4242-BAB9-9E89EC5567BA@mail-abuse.org> <44D5356A.9010100@mtcc.com>
Mime-Version: 1.0 (Apple Message framework v752.2)
Content-Type: text/plain; charset="US-ASCII"; delsp="yes"; format="flowed"
Message-Id: <AD1A54A2-6C3A-483D-BE41-ED105ACC65D4@mail-abuse.org>
Content-Transfer-Encoding: 7bit
From: Douglas Otis <dotis@mail-abuse.org>
Date: Sat, 05 Aug 2006 17:58:08 -0700
To: Michael Thomas <mike@mtcc.com>
X-Mailer: Apple Mail (2.752.2)
X-Songbird: Clean, Clean
Cc: ietf-dkim@mipassoc.org
Subject: [ietf-dkim] DKIM Client Policy Requirement
X-BeenThere: ietf-dkim@mipassoc.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IETF DKIM Discussion List <ietf-dkim.mipassoc.org>
List-Unsubscribe: <http://mipassoc.org/mailman/listinfo/ietf-dkim>, <mailto:ietf-dkim-request@mipassoc.org?subject=unsubscribe>
List-Archive: <http://mipassoc.org/pipermail/ietf-dkim>
List-Post: <mailto:ietf-dkim@mipassoc.org>
List-Help: <mailto:ietf-dkim-request@mipassoc.org?subject=help>
List-Subscribe: <http://mipassoc.org/mailman/listinfo/ietf-dkim>, <mailto:ietf-dkim-request@mipassoc.org?subject=subscribe>
Sender: ietf-dkim-bounces@mipassoc.org
Errors-To: ietf-dkim-bounces@mipassoc.org
X-SongbirdInformation: support@songbird.com for more information
X-Songbird-From: ietf-dkim-bounces@mipassoc.org
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 0ddefe323dd869ab027dbfff7eff0465

A DKIM client authentication method validates the DKIM client.

A DKIM Client Policy defines whether:

  - The entire domain subject to the policy must adhere to a DKIM  
client authentication method.

  - All messages from a DKIM client within this domain must be signed.

  - All messages from a DKIM client within this domain must be signed  
by this domain.



An illustrative example of a DKIM authentication method could be:

_dkim.host-name-0.example.com	A	1.2.3.4
				A	1.2.3.5
				A	1.2.3.6
				A	1.2.3.7

EHLO _dkim.host-name-0.example.com

_DKIM_CP.example.com		DKIM-CP	"All clients DKIM authenticate & "All  
clients sign all"

  or

_DKIM_CP.example.com		DKIM-CP	"All clients DKIM authenticate & "All  
clients signed all by this domain"

Establishing a domain name evaluation early better defends the  
resources used to process DKIM signatures.  Use of the _dkim prefix  
eliminates any discovery process of the authentication assured to  
work for the client.  With the _dkim prefix, the associated A records  
must be present.  The "All clients DKIM authenticate" could be  
implied by the presence of a DKIM From policy where this policy could  
then also delineate the signing requires of the client.  Combining  
this policies into one record could be done to reduce the number of  
transactions.

-Doug




_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html