Re: Last Call: <draft-levine-herkula-oneclick-04.txt> (Signalling one-click functionality for list email headers) to Proposed Standard

"John R Levine" <johnl@taugh.com> Tue, 13 September 2016 15:51 UTC

Return-Path: <johnl@taugh.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8BC9412B3C1 for <ietf@ietfa.amsl.com>; Tue, 13 Sep 2016 08:51:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=CA20z+Rv; dkim=pass (1536-bit key) header.d=taugh.com header.b=YBJvy43t
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0PUtbQUE2Sqb for <ietf@ietfa.amsl.com>; Tue, 13 Sep 2016 08:51:18 -0700 (PDT)
Received: from miucha.iecc.com (abusenet-1-pt.tunnel.tserv4.nyc4.ipv6.he.net [IPv6:2001:470:1f06:1126::2]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C3AC712B7DE for <ietf@ietf.org>; Tue, 13 Sep 2016 08:17:01 -0700 (PDT)
Received: (qmail 58270 invoked from network); 13 Sep 2016 15:16:58 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent; s=e39d.57d8186a.k1609; bh=EgTeZHSciMGcaod52Z33AIhphEMbJ+Sm6DKo6aA+PII=; b=CA20z+RvBaPimUV9HPIoT1BIeWlqSSAOBSIT/DgCxlpTnijJ9h5QvhZTyUdptfmbb7d/P9XgRT3QxcUi63siE0oLPUBY/0ylQCYR2se2iClb/2aUfKENiJOTIcCI747S5YfuBwFNFQEiELAbJJz/fsvJAigdeBYYYGKThV6R2A3N6XXc2tgeC6EjoOTlAX3IONnmG4CZUVNhc88pl0acF1IJfKV2QRXYLL/B+KP0phPlCzCaM0Dvxk4f5AO5zZik
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent; s=e39d.57d8186a.k1609; bh=EgTeZHSciMGcaod52Z33AIhphEMbJ+Sm6DKo6aA+PII=; b=YBJvy43tQtsDc8K1LrADDDb69Hx7QD8lLdlfWQO7BhSnTGgvG0p8EKhsVCYFPCjx+SfH36HCchx1SgbkwtuI1ftNL0g0yj7MsdemtKKWgwIo9CRU+de+MRTYuxEyg924D6ySqF7F3PXo/3+rFSVkZnxt0ERQeu+SOy1YvxYT4GoJLo5AqWOWkUBJVEG2U5+n8QQ1JrB6WTK3Zkg0Pg35QaABu7WJ0PaxeQkYETwRlOjVzyZWIFg/dCt5efytObG7
Received: from localhost ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTPS (TLS1.0/X.509/SHA1) via TCP6; 13 Sep 2016 15:16:58 -0000
Date: Tue, 13 Sep 2016 11:16:59 -0400
Message-ID: <alpine.OSX.2.11.1609131109220.64399@ary.local>
From: John R Levine <johnl@taugh.com>
To: John C Klensin <john-ietf@jck.com>
Subject: Re: Last Call: <draft-levine-herkula-oneclick-04.txt> (Signalling one-click functionality for list email headers) to Proposed Standard
In-Reply-To: <92E953F2FB47FC32E3F4A4FC@JcK-HP8200>
References: <20160913134903.53136.qmail@ary.lan> <92E953F2FB47FC32E3F4A4FC@JcK-HP8200>
User-Agent: Alpine 2.11 (OSX 23 2013-08-11)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"; format="flowed"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/CFJ0s9do-LOVrJEOirOIbMGQyE8>
Cc: IETF general list <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Sep 2016 15:51:22 -0000

I think I have a pretty good idea about what to add, some motivation about 
why some mailers want to make it easy to unsubscribe, and a SHOULD about 
using a unique URL with a hard to forge hash.  I don't think it's worth 
trying to define hard to forge.

The email world has gotten very concentrated and I wouldn't be surprised 
if less than ten providers handled more than half of the world's active 
mailboxes.  There's a whole lot of list providers ranging from big 
corporate ones down to little boutiques, e.g., one that only handles mail 
to subscribers of Wordpress blogs.  Out in the long tail of mailbox 
provieders there's a lot of commercial and free webmail software.  So even 
though the biggest impetus for this is Gmail, I expect to see it 
implemented by a lot of senders and receivers.

R's,
John


> --On Tuesday, September 13, 2016 13:49 +0000 John Levine
> <johnl@taugh.com> wrote:
>
>>> Ah.   That may suggest the disconnect we are having lies
>>> somewhere other than in what I assumed.   This document
>>> appears to have been written for Standards Track and the Last
>>> Call is for publishing it as a Proposed Standard.  That
>>> implies at least a plausible assumption or realistic hope
>>> that it will be implemented and deployed by multiple
>>> independent parties.  For that purpose, it just isn't
>>> complete and doesn't contain enough information, with that
>>> issue about hashes as one example, perhaps among many.
>>
>> We already have two implementations in progress, at Gmail and
>> AOL, and as Tobias said, this got enough attention at MAAWG
>> that I think it's likely that other webmail providers will do
>> it, too, as will a lot of ESPs (bulk mail providers.)  I agree
>> that it could use some more hints about unique URLs to avoid
>> forgery.
>
> Yes, but, again, I think it is more than hints -- I think there
> either needs to be enough information in the spec for safe,
> interoperable, independent implementations to be created or that
> it isn't appropriate for a Proposed Standard.  For a situation
> like this, "enough information" isn't present and "independent"
> doesn't apply if either depends, not on the text, but on
> side-discussions between implementers or in MAAWG (or other
> bodies, even the halls of the IETF) unless the content of those
> discussions is normatively references (and meets the RFC
> Editor's criteria for accessibility of normatively referenced
> materials).
>
>> I don't know where if anywhere this would go in the draft, but
>> the ESPs that are likely to implement this have rather
>> different concerns from discussion lists like this one.  They
>> want the subscribers to get the mail, but they are much more
>> concerned about minimizing complaints for fear of their mail
>> going somewhere other than recipients' inboxes. If you make
>> the unsub process complex, a fair number of people will figure
>> (correctly for them) that it's easier just to report it all as
>> spam until it goes away.
>
>> So given a tradeoff between defending against fake
>> unsubscribes versus making it easy for people to mail the mail
>> stop, they'll pick the latter.  I doubt this will ever make it
>> into Mailman, but that's OK.
>
>> The reason we're having this discussion is that Gmail noticed
>> that people used the spam button to unsubscribe, so they added
>> an option to the spam button to unsubscribe at the same time,
>> and for that to work they need to do it without further
>> interaction.  It'd also be useful to automatically unsub from
>> mail to closed or abandoned mailboxes.
>
> IMO, that motivation and perspective is very important.  It is
> clearly not how I was thinking about the problem.
>
> After this (to me very helpful) discussion, let me summarize my
> concerns and then move on -- if no one other than myself and
> those directly involved care, I don't want to spend more time on
> it.  The two issues below are almost completely separate.
>
> (1) Traditionally, the IETF makes standards _for the Internet_.
> When the needs, perspectives, and views of tradeoffs of a few
> very specific providers (whether specific by size or some other
> criteria) are different from those of the vast majority of
> providers (by count, not number of users or, in this case,
> number of messages), then we have a problem that, as far as I
> know, the IETF community has never really addressed.  With no
> disrespect to Google or AOL (or, in other areas and for example,
> Cisco, Huawei, and Juniper) one extreme version of the question
> is whether it appropriate for 600 pound gorillas or a consortium
> or them to shape the Internet, even if that hurts or locks out
> smaller providers or users with different profiles and needs.
>
> I don't know the answer to any of those questions, nor to what
> the IETF should do about them.  They raise some old topics about
> who really has change control of a suggested or approved
> standard, but that is only part of the issue.  IMO, a serious
> discussion is probably overdue.  I don't think that discussion
> should be placed in the critical path of any given document if
> we can process those documents without setting precedents that
> preempt the discussion and its possible conclusions.
>
> (2)  For a proposed standard that meets both the criteria of RFC
> 2026 and successors and what I believe to be IETF's traditional
> approach and role, I think this document needs a lot of work.  I
> think it should be explicit about use cases and motivations
> (reflecting your comments above); that it should contain (or
> normatively reference) enough information to permit
> interoperable implementations and safe use without
> side-knowledge that is not _very_ generally available; that it
> should discuss difference (and maybe tradeoffs) among different
> types of provider and user models; and that it should have a
> sufficient discussion of security issues to permit readers to
> assess risks, including risks associated with weak
> implementations.  I don't think our norms for Proposed Standards
> permit a document to say "security is out of scope" or even
> "deliberate malicious behavior is out of scope", so that needs
> to be fixed.
>
> With one possible exception, all of this second issue is about
> the spec, not the header/protocol.   The exception is that, for
> interoperation this is appropriately safe, either you need to
> describe the conditions for a sufficiently protective hash and
> make its presence a MUST requirement or you need an in-depth
> Security Considerations discussion about that issue.
>
> YMMD and, again, I hope to not spend more of my time and that of
> the IETF list on this document and the second point above (if
> the first issue doesn't get some response in this thread, I may
> start another one).
>
> best,
>     john
>
>
>

Regards,
John Levine, johnl@taugh.com, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail. https://jl.ly