Re: [secdir] FW: Secdir review of draft-ietf-dkim-deployment-11.txt

Dave CROCKER <dhc@dcrocker.net> Tue, 02 February 2010 05:31 UTC

Return-Path: <dhc@dcrocker.net>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3DF6428C226; Mon, 1 Feb 2010 21:31:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IJU4JVoCw4XR; Mon, 1 Feb 2010 21:31:20 -0800 (PST)
Received: from sbh17.songbird.com (sbh17.songbird.com [72.52.113.17]) by core3.amsl.com (Postfix) with ESMTP id 9352128C222; Mon, 1 Feb 2010 21:31:20 -0800 (PST)
Received: from [192.168.1.36] (adsl-68-122-70-87.dsl.pltn13.pacbell.net [68.122.70.87]) (authenticated bits=0) by sbh17.songbird.com (8.13.8/8.13.8) with ESMTP id o125VpR6016786 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 1 Feb 2010 21:31:56 -0800
Message-ID: <4B67B8C5.5060006@dcrocker.net>
Date: Mon, 01 Feb 2010 21:31:49 -0800
From: Dave CROCKER <dhc@dcrocker.net>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.7) Gecko/20100111 Thunderbird/3.0.1
MIME-Version: 1.0
To: Charlie Kaufman <charliek@microsoft.com>
References: <D80EDFF2AD83E648BD1164257B9B09120B7E076E@TK5EX14MBXC115.redmond.corp.microsoft.com>
In-Reply-To: <D80EDFF2AD83E648BD1164257B9B09120B7E076E@TK5EX14MBXC115.redmond.corp.microsoft.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: ClamAV 0.92/10348/Mon Feb 1 10:43:19 2010 on sbh17.songbird.com
X-Virus-Status: Clean
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (sbh17.songbird.com [72.52.113.17]); Mon, 01 Feb 2010 21:31:57 -0800 (PST)
X-Mailman-Approved-At: Tue, 02 Feb 2010 06:23:53 -0800
Cc: DKIM IETF WG <ietf-dkim@mipassoc.org>, iesg <iesg@ietf.org>, secdir@ietf.org
Subject: Re: [secdir] FW: Secdir review of draft-ietf-dkim-deployment-11.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Feb 2010 05:31:22 -0000

On 2/1/2010 3:42 PM, Charlie Kaufman wrote:
> All of my comments were in the form of questions for which
> it would be helpful to include answers in the document if the authors knew
> them. I'm guessing they didn't.


Charlie,

I wrote a response at the time of your review, but it apparently only went to a 
small circle of folk, which was not intentional.

(The usual disclaimer applies:  the enclosed represents my personal opinion, only.)

Here's what I sent:



-------- Original Message --------
Subject: Re: Secdir review of draft-ietf-dkim-deployment-10.txt
Date: Sat, 19 Dec 2009 12:33:56 -0800
From: Dave CROCKER <dcrocker@bbiw.net>
Organization: Brandenburg InternetWorking
To: Pasi Eronen <pasi.eronen@nokia.com>
CC: tony+dkimov@maillennium.att.com <tony+dkimov@maillennium.att.com>, 
dkim@esiegel.net <dkim@esiegel.net>, phillip@hallambaker.com 
<phillip@hallambaker.com>,  stephen.farrell@cs.tcd.ie 
<stephen.farrell@cs.tcd.ie>, barryleiba@computer.org <barryleiba@computer.org>

Responses to the additional review -- as before, this is on my own initiative;
the other authors might have differing assessments.


Overall comment:  The issues raised are all reasonable, but they seek more
detail that is currently available.  The intent for this initial version of the
Deployment document was to provide basic information about deployment, and
revise the document as more field experience is gained.  As such, efforts to
provide increasingly broad and fine-grained information is not currently likely
to be productive.

This is the sort of exercise in which the classic "perfect is the enemy of
good" concern applies.

I did not identify any changes to the draft that are needed as a result of this
review.

d/



On 12/18/2009 10:38 PM, Charlie Kaufman wrote:
>   I have no problems with the guidance it gives
...


> Specific suggestions:
>
> In Section 7.3, the document mentions problems likely to be introduced if
> Author Domain Signing Practices (ADSP) is enabled. There are common practices
> in mail processing that will cause email to be dropped if these practices are
> followed, and it would be useful to have an explicit list of things known to
> fail and their prevalence.

1. The document points to discussion in the ADSP specification.

2. ADSP remains controversial and the decision for the Deployment document was
to make generic reference to ADSP, but not to get bogged down in the controversy.

3. The existing Deployment draft warns a potential ADSP user to be careful.
For now, that is the best and most complete advice to give.


>    The
> most general solution is for the forwarder to change the "From: " field in

Changing the From: field is a particularly onerous suggestion.  It modifies
purported authorship and it has no empirical basis for claiming improved
functional utility, safety or human usability.  It is a reasonable theoretical
suggestion but almost certainly a counter-productive one to implement.

It does, however, nicely demonstrate why ADSP is controversial.  But, again,
the Deployment document sought to give a basic acknowledgment that ADSP
exists, but to refrain from engaging in its controversy.


> the email message to itself and copy the name of the actual sender somewhere
> else. But that causes other problems. Similarly, there have been in the past
> many web sites that let you "mail a copy of this document to a friend" and
> let you specify the friend's email address and your own. ADSP would delete
> such mail sent by users who used such a web site if the site forged the
> "From:" field.

Yes it would.


> DKIM allows the signer to choose which header fields in the message are
> signed. Guidance on which fields should be signed and which should not would
> be helpful.

Yes it would.

Section 5.4 of RFC 5617 specifies this, and there is no additional guidance
available.  The community has not had discussion or formulated consensus about
it.  So the Deployment document cannot currently add to that discussion.

My personal view is that the choice matters far less than is often believed,
because data integrity -- nevermind data validity -- are not goals of DKIM.
Rather, the hashing is meant to validate the d= identifier.  Any data integrity
benefits are strictly secondary.  Hence the choice of header fields to cover is
probably quite flexible.


> When rolling over keys, it's a matter of sender policy how long the old
> signing key should remain valid for verification after it is no longer used
> for signing. It would be good to hear a recommendation as to how long that
> should be.

While that seems a reasonable idea, it would almost certainly be
counterproductive to include now, since real recommendations need to come from
some operational consensus.  Since DKIM's use of signing technology carries a
very different semantic than previous uses, and since it applies to transport
rather than longer-term, any current recommendation for key management rollover
would be theoretical rather than empirical.  The decision was to avoid having
the document engage in such abstract exercises.


> This would be coupled with guidance to verifiers as to how long
> after email is received it should be expected to be verifiable.

Either the public key is in the DNS or it isn't.  This is a transport-related
service.  There is no expectation that keys will be valid for very long.


>      Is it
> reasonable to wait until logs in and reads mail, or must it be checked as
> part of placing the mail in the user's inbox? Do we expect to change keys
> every few hours or every few years?

Again, this is a transport-related service, not one intended to be relevant to
end-users.


> It probably belonged in the original DKIM spec, but it would be good to know
> how DKIM is supposed to interact with S/MIME or OpenPGP.

Since DKIM has nothing to do with S/MIME or OpenPGP there is no "interaction".

However, the DKIM Overview (RFC 5585) contains some brief reference to these
technologies.


> It appears DKIM allows the signing of only the first 'n' bytes of a message
> in order to give better performance. Advice and rationale for picking an 'n'
> would be helpful.

l= is not for "better performance" but for robustness in the face of very
specific body changes by intermediaries -- adding text at the end.

l= is another controversial topic for which there is no additional, empirical
information available.  Again, the decision was to have the Deployment refrain
from engaging in controversy.


> On page 8, quoting RFC5672 on the issue of interpretation of the d= and i=
> fields, this document says "To the extent that a receiver attempts to intuit
> any structured semantics for either of the identifiers, this is a heuristic
> function that is outside the scope of DKIM's specification and semantics."
> While true, the purpose of those fields is so that the receiver can intuit
> something from them.

Not really.  It is so that the receiver can take those exact and complete
strings and use them for lookups into information bases.  The d= is for use in
key retrieval and reputation lookup.  The i= is for an unspecified range of uses.

In any event, the cited text seeks to warn the receiver off from parsing the
details of either string, or at least to help the receiver to understand that
any attempt to parse the strings moves the receiver beyond the scope of the
DKIM specification.


>    While DKIM may not specify the semantics to allow
> implementers flexibility, this document should suggest possibilities and
> report on existing practice (if any).

No it shouldn't.  That moves the document into heuristics that are beyond the
scope of the DKIM specification.


> Another area where guidance would be useful is in what a receiving agent
> should display to users concerning DKIM signed messages. Perhaps the answer
> is *nothing*, where DKIM is only used as one of many heuristics for spam
> filtering. But either way, it would be good to know. If we expect users to
> configure some signers as good, advice as to how they are expected to learn
> what to do would also be helpful.

"Good to know" is the problem.  There is no empirical basis for "knowing" what
to recommend.  Basically, DKIM is not for end-user display.  The associated
identifier is for processing by an assessment (and filtering) engine.

Appendix D of the DKIM core specification contains some pro forma discussion of
the topic.  The Deployment document seeks not to replicate discussion contained
elsewhere.


> Section 8.4 begins "It is expected that the most common venue for a DKIM
> implementation will be within the infrastructure of an organization's email
> service". Section 8.5 begins "The DKIM specification is expected to be used
> primarily between Boundary MTAs...". I don't believe these can both be true.

Boundary MTAs are part of an organization's email service infrastructure.


d/
-- 

   Dave Crocker
   Brandenburg InternetWorking
   bbiw.net