The Unix Heritage Society mailing list
 help / color / mirror / Atom feed
From: steffen@sdaoden.eu (Steffen Nurpmeso)
Subject: Mangled and non-mangled TUHS mail lists
Date: Tue, 03 Oct 2017 20:49:19 +0200	[thread overview]
Message-ID: <20171003184919.1QJzu%steffen@sdaoden.eu> (raw)
In-Reply-To: <472d5571-8093-e02c-4478-a97accc8e632@tnetconsulting.net>

Grant Taylor <gtaylor at tnetconsulting.net> wrote:
 |On 10/03/2017 08:08 AM, Steffen Nurpmeso wrote:
 |> It is a bit of a pity, since almost all MLs really worth reading
 |> use this tagging (e.g., ih, leapsecs, tz, the security lists,
 |> groff, as well as pcc and tinycc-devel, to name a few).
 |
 |I think that modifying the subject to add a tag is a perfectly valid 
 |thing.  As such, provisions should make such modifications /possible/. 
 |Then leave the choice of doing so or not up to each list's administrator.

As has happened recently.  Sure.

 |> And DKIM
 |> is no problem at all if you use G....e groups over HTTPS and give
 |> the business some opportunities to actually make some of the money
 |> necessary to drive the environment you use, HEH???
 |
 |I think that GG is an option.  Just an option that I choose not to use.
 |
 |I also vehemently in the option to host things yourself.  -  Email is 
 |not too complex that people can't successfully run their own server if 
 |they want to do so.
 |
 |> DKIM should
 |> have been designed to create DKIM envelopes, so that lists could
 |> simply create an encapsulating DKIM layer, and all would be fine.
 |
 |I believe that Mailman has an option to attach the DKIM signed message 
 |much like I (mis?)understand the wrapper that you're talking about.
 |
 |In such case, DKIM has no say.  DKIM is designed to validate that a 
 |message has not been modified in source.  -  The wrapper message is a 
 |new message that happens to have an attachment.  Since DKIM filters are 
 |looking for a DKIM-Signature header in the outer most message, it does 
 |not matter what's in the inner / attached message.
 |
 |I also staunchly believe that Mailing lists are an entity unto 
 |themselves.  Said entity is what sends the emails, not me.  As such, my 
 |opinion is that said entity should draft completely new messages using 
 |textual content from source material that I provided.  Thus there is 
 |nothing about the original message envelope to be a problem.

I was not involved in the process of creating that standard, nor
have i yet really thought about the problem, and especially not
did i have to manage real-world problems originating in that.

 |This also means that mailing lists could support things like subject 
 |modification / SPF / DKIM / DMARC / ARC / S/MIME / PGP, etc. directly.

But mailing-lists are a, possibly the most vivid part of email
since a very long time, and designing a standard that does not
play nice with mailing-lists is grotesque.  I was not thinking
about enwrapping the message, but rather of a mechanism like the
stacking of Received: headers which also follows standard.
Something like renaming all DKIM headers stackwise (DKIM ->
DKIM-LVL1, DKIM-LVL1 -> DKIM-LVL2 etc.) and creating new DKIM
headers for the updated message, also covering the DKIM stack.
Something like that.  Like this the existence of a stack that
would need to become unrolled would be known to verifying parties,
which were all newly created for this then new standard.  A stack
level could even be used to save-away tracked headers, like
Subject:, too.  But SHOULD not.  ^.^  Anyway.

 |But ... that's just me and my opinion.

Yep.  Let's just stop draggin' my heart around.

--steffen
|
|Der Kragenbaer,                The moon bear,
|der holt sich munter           he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)


  parent reply	other threads:[~2017-10-03 18:49 UTC|newest]

Thread overview: 27+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-10-01  3:25 Warren Toomey
2017-10-01 14:00 ` Clem Cole
2017-10-01 14:08   ` Don Hopkins
2017-10-02  1:01 ` Dave Horsfall
2017-10-02  8:22   ` jason-tuhs
2017-10-02 12:38     ` Steve Nickolas
2017-10-02 13:34       ` David Ryskalczyk
2017-10-03  0:51         ` Dave Horsfall
2017-10-03  2:19           ` Steve Nickolas
2017-10-03  3:25             ` Grant Taylor
2017-10-03  3:33               ` Dave Horsfall
2017-10-03  3:55                 ` Grant Taylor
2017-10-03  4:17                   ` Dave Horsfall
2017-10-03  4:12                 ` Kurt H Maier
2017-10-03  7:40                   ` Ian Zimmerman
2017-10-03 14:08                 ` Steffen Nurpmeso
2017-10-03 18:20                   ` Grant Taylor
2017-10-03 18:43                     ` Ian Zimmerman
2017-10-03 21:59                       ` Grant Taylor
2017-10-03 18:49                     ` Steffen Nurpmeso [this message]
2017-10-03 21:54                       ` Grant Taylor
2017-10-03 22:00                         ` Mangled and non-mangled TUHS mail lists [ enough already? ] Jon Steinhart
2017-10-04 20:17                         ` Mangled and non-mangled TUHS mail lists Steffen Nurpmeso
2017-10-04  2:28                       ` Dave Horsfall
2017-10-04 20:59                         ` Steffen Nurpmeso
2017-10-03 10:12               ` Steve Nickolas
2017-10-03 19:21                 ` Bakul Shah

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20171003184919.1QJzu%steffen@sdaoden.eu \
    --to=steffen@sdaoden.eu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).