Skip to main content

The Authenticated Received Chain (ARC) Protocol
draft-ietf-dmarc-arc-protocol-23

Yes

(Alexey Melnikov)

No Objection

(Alissa Cooper)
(Alvaro Retana)
(Deborah Brungard)
(Martin Vigoureux)
(Spencer Dawkins)
(Suresh Krishnan)

No Record


Note: This ballot was opened for revision 18 and is now closed.

Adam Roach Former IESG member
Yes
Yes (2018-11-20 for -21) Sent
Thanks to everyone for the work that went into this document. I'm excited by
this experiment, and hope it eventually grows into something we can put on the
standards track.

---------------------------------------------------------------------------

id-nits reports:

  ** There are 3 instances of too long lines in the document, the longest one
     being 15 characters in excess of 72.

---------------------------------------------------------------------------

§7.2:

>       remote-ip[1]=10.10.10.13</comment>

Please consider using an IPv6 address here. See
https://www.iab.org/2016/11/07/iab-statement-on-ipv6/

In any case, please use an address from the ranges reserved by either RFC 5737
or (preferably) RFC 3849.

---------------------------------------------------------------------------

Appendix B:

> Received: from example.org (example.org [208.69.40.157])
...
> Received: from segv.d1.example (segv.d1.example [72.52.75.15])
...
> Received: from [10.10.10.131] (w-x-y-z.dsl.static.isp.com [w.x.y.z])
...
>     [208.69.40.157]) by clochette.example.org with ESMTP id


The two comments I made on §7.2 apply to these four IP addresses as well.
Alexey Melnikov Former IESG member
Yes
Yes (for -18) Unknown

                            
Ben Campbell Former IESG member
Yes
Yes (2018-11-20 for -21) Sent
Thanks for including the Experimental Considerations
Alissa Cooper Former IESG member
No Objection
No Objection (for -21) Not sent

                            
Alvaro Retana Former IESG member
No Objection
No Objection (for -21) Not sent

                            
Deborah Brungard Former IESG member
No Objection
No Objection (for -21) Not sent

                            
Eric Rescorla Former IESG member
No Objection
No Objection (2018-11-21 for -21) Sent
Rich version of this review at:
https://mozphab-ietf.devsvcdev.mozaws.net/D3829


These would be DISCUSS-worthy comments but this is an Experimental
document so I am just making them comments.

IMPORTANT
S 9.
>      handlers for a message.  This record may include Personally
>      Identifiable Information such as IP address(es) and domain names.
>      Such information is also included in existing non-ARC related header
>      fields such as the "Received" header fields.
>   
>   9.  Security Considerations

You need to document what the semantics of a received message with an
ARC Chain is. As I understand it, it's that the highest-numbered
instance N vouches that:
It processed a message with this body, a given authres, and ARC chains
1..N-1. And then instance N-1 vouches that it received a message with
a given authres, and ARC chains 1..N-2, and so on. Is that correct?


COMMENTS
S 4.1.3.
>   
>      To preserve the ability to verify the integrity of a message, the
>      signature of the AMS header field SHOULD include any DKIM-Signature
>      header fields already present in the message.
>   
>   4.1.3.  ARC-Seal (AS)

It would be useful to state the rationale here for why you have
separate signatures for headers and body.


S 7.2.
>      Through the collection of ARC-related data, an ADMD can identify
>      handling paths that have broken authentication.
>   
>      An Authenticated Received Chain allows an Internet Mail Handler to
>      potentially base decisions of message disposition on authentication
>      assessments provided by different ADMDs.

"potentially base" seems pretty handwavy. As below, I think you need
to provide some guidance about what on would actually do.
Martin Vigoureux Former IESG member
No Objection
No Objection (for -21) Not sent

                            
Spencer Dawkins Former IESG member
No Objection
No Objection (for -21) Not sent

                            
Suresh Krishnan Former IESG member
No Objection
No Objection (for -21) Not sent

                            
Benjamin Kaduk Former IESG member
No Record
No Record (2018-11-21 for -21) Sent for earlier
Section 3

Do we really need a trailer appended to the (new) BCP 14 boilerplate?

Section 3.5

(I note that "Seal" is used in other IETF contents to enclude
encryption, e.g., RFC 1508.  I don't see a need for this usage to
change, though.)

Section 9.2

Are there any concerns about privacy relating to the possibility of 
using a tailored set of [ARC Sets inducing] DNS queries, to
fingerprint/identify specific clients/recipients?