Re: [ietf-dkim] SSP thought experiment

Douglas Otis <dotis@mail-abuse.org> Fri, 04 August 2006 19:06 UTC

Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1G950M-0002xD-3N for ietf-dkim-archive@lists.ietf.org; Fri, 04 Aug 2006 15:06:42 -0400
Received: from sb7.songbird.com ([208.184.79.137]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G94tc-0003Ij-Js for ietf-dkim-archive@lists.ietf.org; Fri, 04 Aug 2006 14:59:45 -0400
Received: from sb7.songbird.com (sb7.songbird.com [127.0.0.1]) by sb7.songbird.com (8.12.11.20060308/8.12.11) with ESMTP id k74IubnB003286; Fri, 4 Aug 2006 11:56:37 -0700
Received: from a.mail.sonic.net (a.mail.sonic.net [64.142.16.245]) by sb7.songbird.com (8.12.11.20060308/8.12.11) with ESMTP id k74Iu4Gw003229 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-dkim@mipassoc.org>; Fri, 4 Aug 2006 11:56:04 -0700
Received: from [168.61.10.151] (SJC-Office-DHCP-151.Mail-Abuse.ORG [168.61.10.151]) (authenticated bits=0) by a.mail.sonic.net (8.13.8.Beta0-Sonic/8.13.7) with ESMTP id k74ItW2Y021719 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NO); Fri, 4 Aug 2006 11:55:33 -0700
In-Reply-To: <20060804140319.G49810@simone.iecc.com>
References: <20060802002353.U59653@simone.iecc.com> <44D0E259.7040400@mtcc.com> <20060802165510.X1168@simone.iecc.com> <44D160BD.7080209@mtcc.com> <20060802223619.E86316@simone.iecc.com> <44D24A20.6050109@mtcc.com> <20060803153457.X33570@simone.iecc.com> <44D36203.2060803@mtcc.com> <20060804112731.I21459@simone.iecc.com> <44D36B4A.2050903@mtcc.com> <20060804114527.Y27352@simone.iecc.com> <44D37376.4020408@mtcc.com> <20060804132203.Y49810@simone.iecc.com> <EAF17954-74A3-4374-A059-B31A1414B350@mail-abuse.org> <20060804140319.G49810@simone.iecc.com>
Mime-Version: 1.0 (Apple Message framework v752.2)
Content-Type: text/plain; charset="US-ASCII"; delsp="yes"; format="flowed"
Message-Id: <1A4853A3-DAFE-459A-B9D9-C24EFA4D7C84@mail-abuse.org>
Content-Transfer-Encoding: 7bit
From: Douglas Otis <dotis@mail-abuse.org>
Subject: Re: [ietf-dkim] SSP thought experiment
Date: Fri, 04 Aug 2006 11:55:31 -0700
To: John L <johnl@iecc.com>
X-Mailer: Apple Mail (2.752.2)
X-Songbird: Clean, Clean
Cc: DKIM List <ietf-dkim@mipassoc.org>
X-BeenThere: ietf-dkim@mipassoc.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IETF DKIM Discussion List <ietf-dkim.mipassoc.org>
List-Unsubscribe: <http://mipassoc.org/mailman/listinfo/ietf-dkim>, <mailto:ietf-dkim-request@mipassoc.org?subject=unsubscribe>
List-Archive: <http://mipassoc.org/pipermail/ietf-dkim>
List-Post: <mailto:ietf-dkim@mipassoc.org>
List-Help: <mailto:ietf-dkim-request@mipassoc.org?subject=help>
List-Subscribe: <http://mipassoc.org/mailman/listinfo/ietf-dkim>, <mailto:ietf-dkim-request@mipassoc.org?subject=subscribe>
Sender: ietf-dkim-bounces@mipassoc.org
Errors-To: ietf-dkim-bounces@mipassoc.org
X-SongbirdInformation: support@songbird.com for more information
X-Songbird-From: ietf-dkim-bounces@mipassoc.org
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 39bd8f8cbb76cae18b7e23f7cf6b2b9f

On Aug 4, 2006, at 11:05 AM, John L wrote:

> a) "SIGN ALL MAIL" and "DO NOT USE ANY SERVICES KNOWN TO DAMAGE  
> THEIR SIGNATURES"
>
> b) "SIGN ALL MAIL"
>
> I want to put "ALL MAIL HAS TOM SWIFTIES" in my SSP.
>
> Assuming you agree that's ridiculous, what's the practical  
> difference to people using SSP between that and b) above?

The From email-address DKIM policy represents a partial or complete  
list of signing domain (valid sources).  Whether partial or complete,  
this list might allow recipients to verify that 90% of the From  
domains have a valid association with the signing domain.  This  
leaves a remaining 10% that must be treated according to the  
reputation of the smtp client or a non-designated signing domain.   
However, a client DKIM policy transaction offers a means to greatly  
improve the odds of blocking abuse with DKIM.

Require that all DKIM client use a "_dkim.<host-name>" that can be  
verified with a simple Address record lookup.  This would enable a  
DKIM client policy.  The DKIM client policy can assert "ONLY SEND  
SIGNED DKIM MESSAGES."  A client that does not authenticate or does  
not sign with DKIM can then be blocked.

DKIM client policy will prevent a significantly greater number of  
abusive messages without creating delivery issues for valid  
messages.  For DKIM to succeed, it must not cause delivery problems  
or support issues.

-Doug
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html