Re: [Ietf-dkim] Proposals for tolerating mailing list modifications

Michael Thomas <mike@mtcc.com> Fri, 04 August 2023 21:46 UTC

Return-Path: <mike@fresheez.com>
X-Original-To: ietf-dkim@ietfa.amsl.com
Delivered-To: ietf-dkim@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 93BBEC15109E for <ietf-dkim@ietfa.amsl.com>; Fri, 4 Aug 2023 14:46:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.847
X-Spam-Level:
X-Spam-Status: No, score=-1.847 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.249, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.091, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mtcc.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VDOTlkRSLG4C for <ietf-dkim@ietfa.amsl.com>; Fri, 4 Aug 2023 14:46:40 -0700 (PDT)
Received: from mail-pf1-x432.google.com (mail-pf1-x432.google.com [IPv6:2607:f8b0:4864:20::432]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2BA42C151063 for <ietf-dkim@ietf.org>; Fri, 4 Aug 2023 14:46:39 -0700 (PDT)
Received: by mail-pf1-x432.google.com with SMTP id d2e1a72fcca58-68783004143so1972187b3a.2 for <ietf-dkim@ietf.org>; Fri, 04 Aug 2023 14:46:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mtcc.com; s=fluffulence; t=1691185599; x=1691790399; h=in-reply-to:subject:from:references:to:content-language:user-agent :mime-version:date:message-id:from:to:cc:subject:date:message-id :reply-to; bh=Juvo6VGSbbLiBOKJIHOCqLrhXDs4D9nCwDCn/oNrXNk=; b=PwVKP8N8fo5cfq/ltbbZK9nfrPF+LbLB5HQNS452DNj9F8PhC5tPcRV7oVRZ5MchI2 SM0P3WObSgbxKLX2YdQ22GWCodBJxnXXrSyX0vC+04CchMhW5jbuWwPDvhdnk7UdsJ3x 8TlgxCxdG1Afe4ueJUP8EJqDWhZIL6yBoE0BujA/4JJSjH73o89l3FmreawsgviCdych Q3CRT8YPRDEDcnvbg0KIxCb4HAKKMiYPE4kbPmm3C4TYjEvChB724M9PpRmCXGMLnQE9 sxxnFSwGeGkesiV2oybWhrPw5/2aFFrTjbwwP/7i/t7iSdu7EosT3Vd71g0WE9x7lGAq V3Ow==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1691185599; x=1691790399; h=in-reply-to:subject:from:references:to:content-language:user-agent :mime-version:date:message-id:x-gm-message-state:from:to:cc:subject :date:message-id:reply-to; bh=Juvo6VGSbbLiBOKJIHOCqLrhXDs4D9nCwDCn/oNrXNk=; b=jQ5xYmTNtABPHL0f5YkuAyD5aq6mitQ8MwQa53ucOeLp0BioA114zK5Ea8zWdAS1zS SsB0g98m74Cc/DVpN80JWXgRQspa1QETHvrCj++tV5uj4zAmxTey5JyU6ODldU6YxW7M ReyzLfNwVLCZ3L4yiyIvBk49q0EQQZpMXDoYZtfCIzeP3gymkzAkloD37tDu0H6LE4A+ A8QmgDMB2anmOskoP2dycCWfaspcOsrYCK64Q34mnKw7GvIEvXAkhe+nWI/raPwj9blA MQVDss1krHfK7C9BNxvnjAEFyuBT16IzXPjjKSST85kbVaOUVOW2Yhok5XHYvnBTbO7A SzIA==
X-Gm-Message-State: AOJu0YxEQYoLzQUsUjj8sHeIHfmcyyc91SJvEpgGMh8sVHgtDj8ODR1l KpftsAKNhF03cvrgAbA3B2WSvKOODrn+xs9TWR8=
X-Google-Smtp-Source: AGHT+IFXdleh+/slr9utq2Ar2KuXAcd1IObQ30qkt/KjO83UEeVakR60Umbs0L0DyOiWUYgqJCR1Kw==
X-Received: by 2002:a05:6a00:13a5:b0:687:5434:bd14 with SMTP id t37-20020a056a0013a500b006875434bd14mr3660702pfg.11.1691185599115; Fri, 04 Aug 2023 14:46:39 -0700 (PDT)
Received: from [192.168.1.201] ([206.107.197.106]) by smtp.gmail.com with ESMTPSA id b14-20020aa7870e000000b00687790191a2sm1993444pfo.58.2023.08.04.14.46.38 for <ietf-dkim@ietf.org> (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 04 Aug 2023 14:46:38 -0700 (PDT)
Content-Type: multipart/alternative; boundary="------------0Z22lFsYgFX7BThotIo2lDUO"
Message-ID: <3608f591-c768-97b0-583a-724a92c3880d@mtcc.com>
Date: Fri, 04 Aug 2023 14:46:38 -0700
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Thunderbird/102.12.0
Content-Language: en-US
To: ietf-dkim@ietf.org
References: <CAAFsWK3uzVT3Kr7A03DXKTYEe6g+Ww0vX1tK7V3exogyjeek+A@mail.gmail.com> <760b4c18-46fa-f23d-88fa-100418aaeb72@mtcc.com> <CADyWQ+EK3pP_rfRoh+_dLFzWE5cw7ATwT-LLah=012pDQRPR9Q@mail.gmail.com> <9DEDECE4-4CA2-49E9-9502-95179ABE2EAF@bluepopcorn.net> <e532131a-20a0-d7e4-aad1-1478cd38bf0a@dcrocker.net> <F5B66298-C886-4873-807B-DB37D0AB84FC@bluepopcorn.net> <721103d5-afd8-a98c-6efa-95f82b661c7c@bbiw.net> <1FB729B8-543D-401E-AFB5-0779C2126DE1@bluepopcorn.net> <080b2574-0904-d819-e4c2-da62c2a46e07@mtcc.com> <CAL0qLwYp-9MrsugTtxDBf1KkF_LeJaCR-7SZ=R_NikgkTQBSAA@mail.gmail.com>
From: Michael Thomas <mike@mtcc.com>
In-Reply-To: <CAL0qLwYp-9MrsugTtxDBf1KkF_LeJaCR-7SZ=R_NikgkTQBSAA@mail.gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf-dkim/SF_xnfvgDUEJiMFM5_tzelkfxDs>
Subject: Re: [Ietf-dkim] Proposals for tolerating mailing list modifications
X-BeenThere: ietf-dkim@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF DKIM List <ietf-dkim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-dkim>, <mailto:ietf-dkim-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf-dkim/>
List-Post: <mailto:ietf-dkim@ietf.org>
List-Help: <mailto:ietf-dkim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-dkim>, <mailto:ietf-dkim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Aug 2023 21:46:45 -0000

On 8/4/23 2:29 PM, Murray S. Kucherawy wrote:
> Colleagues,
>
> On Fri, Aug 4, 2023 at 12:08 PM Michael Thomas <mike@mtcc.com> wrote:
>
>     Exactly. Any proposed modifications to DKIM should be based on DKIM
>     itself. Anything else is off-topic. It's not like you can't
>     propose the
>     ARC modifications to DKIM in terms of DKIM itself, though all of
>     those
>     modifications have nothing to do with the current charter.
>
>
> Two things:
>
> 1) Please endeavor to lower the temperature on this thread.
>
> 2) If the chairs have decided, or decide in the future, that ARC has 
> been discussed and consensus is to consider that topic closed, that's 
> their purview.  However, such a decision cannot be derived directly 
> from the charter text I'm looking at.  In particular, this text:
>
> "The DKIM working group will first develop and publish a clear problem 
> statement.
> Then, it will produce one or more technical specifications that propose
> replay-resistant mechanisms. The working group will prefer solutions 
> compatible
> with DKIM's broad deployment, and there will be an expectation that 
> these solutions
> will have been through implementation and interoperability testing 
> before publication."
>
> ...does not, to me, constrain the solution space to DKIM itself.  If 
> there's a solution to DKIM replay outside of DKIM itself, then it's 
> fair game.
>
Well, for starters ARC doesn't have broad deployment. But the author 
doesn't say why ARC is needed or relevant. That is the point here. *All* 
changes need to be justified including any imported mechanisms. The less 
rat holes the better. Same with the mailing list modification draft. Why 
is that even relevant?

Mike