Re: [Bimi] MUA Evaluation of BIMI

Trent Adams <tadams@proofpoint.com> Tue, 22 March 2022 16:20 UTC

Return-Path: <tadams@proofpoint.com>
X-Original-To: bimi@ietfa.amsl.com
Delivered-To: bimi@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 624363A03F9 for <bimi@ietfa.amsl.com>; Tue, 22 Mar 2022 09:20:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=proofpoint.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ccBcsvljI6Zi for <bimi@ietfa.amsl.com>; Tue, 22 Mar 2022 09:20:16 -0700 (PDT)
Received: from mx0b-00148503.pphosted.com (mx0b-00148503.pphosted.com [148.163.159.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0CC333A043C for <bimi@ietf.org>; Tue, 22 Mar 2022 09:20:15 -0700 (PDT)
Received: from pps.filterd (m0162102.ppops.net [127.0.0.1]) by mx0b-00148503.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 22MGJlXP027178 for <bimi@ietf.org>; Tue, 22 Mar 2022 09:20:14 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=proofpoint.com; h=from : to : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=corp-2019-08-07; bh=fDS5ZaLI8QHqjYSxykw4azdzU2XEtniQBV+p35CO0+4=; b=b6Fu5Zdmvjr/GbxrBzbmx0I4IbuDz6aqgB19oZ13pQcZ19PRauBcFFZBOlNXKwDh1rP2 Z+fIv6zIgc/BslRLXtQjqex32VsZSqcAq4jhVpO6S7w4aGHj5RND7m3B7lEuRPec6oMf heK8JliaqOhYPva0Gmr0YY6EfaO69UQJhmPZh5X2AfhKNrEHCL9xMiKSKBQUqdgoABFr f3J3v2rTp6uvQn6Ibf+1wZehsnepKEHoLArV6G7gRo8AbYWkXtX5o3ZcXTztzkvWylrm xShXBfqj898/utn7X8hIWa8ee5t6YrCWr+gY8JnsUDRVxI+SnWBZ2VT41TrxrwOzSIw3 sw==
Received: from lv-exch04.corp.proofpoint.com ([136.179.16.100]) by mx0b-00148503.pphosted.com (PPS) with ESMTPS id 3ewy420wq2-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT) for <bimi@ietf.org>; Tue, 22 Mar 2022 09:20:13 -0700
Received: from lv-exch06.corp.proofpoint.com (10.19.10.26) by lv-exch04.corp.proofpoint.com (10.19.10.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.2308.21; Tue, 22 Mar 2022 09:20:12 -0700
Received: from lv-exch04.corp.proofpoint.com (10.19.10.24) by lv-exch06.corp.proofpoint.com (10.19.10.26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.2308.21; Tue, 22 Mar 2022 09:20:12 -0700
Received: from NAM10-MW2-obe.outbound.protection.outlook.com (10.19.16.20) by lv-exch04.corp.proofpoint.com (10.19.10.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.2308.21 via Frontend Transport; Tue, 22 Mar 2022 09:20:11 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=niDa/JprgIaBdCj05kEyBtjzkYb0wDefsGYVOWiyaqjhVyrHJ+hOMUAoyZbeEdl774YVR+MsnSYT+y8bxZcqqU80rzsiHDwFR+GYlrLMrvl7gboMYHUCsuLhvLigDtgbXJjOHBumtQc6EL0Pn/1xTy4D4Pp35zO9eyCIPgPAgcgDMQwbebW7nTZsZtDVoVHUW+PlXYY5FJLHxqGzQB39eczSu1K6u8WvXX+KjANhaCKR1U6JHw8aZZAzNAQetLoeVH1zvBCC2Zq2hqtVOd26nqH85+MjaMA0eZJFADNnttltB5flp32wSmgrbFvV62b5yo7rD25w8/eBKqPYP+Uieg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=uWrEDmCo+usOFPrTzlEy0N9MooghyUsGxIQdfrscbkU=; b=dwyekVoNuTzjhM/ty9mr9Tn6ebWmGFVgNCSvPt0FrF9D+n0UP5BrpEXq52Q8KZrIgF947L8ErgBJsdtKHVCvjKziRS3V6defZfmm1F2R3NavVQBO1W5L0qXl0NQqm8ZRclzt3MfxS0y39Sqk0wpCeeMgifB+SAaOSwu37Vk60bmWxZdzo4q4DIxjQcOO5V5u3ggDCpNmEdvcpaHSjUrmfhTvvBOpnwAPhauNXDlhBr2Y/tez95tviFKFi6KIC8noGqnBFrBlaakzZsra6Tll5zl75RPnZxnLG5umMKM0Ymb/NeqwjlwSsFeoo4Jqa0o2X3wqnYOoFntcaqlLog2uig==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=proofpoint.com; dmarc=pass action=none header.from=proofpoint.com; dkim=pass header.d=proofpoint.com; arc=none
Received: from CH2PR12MB5001.namprd12.prod.outlook.com (2603:10b6:610:61::18) by MN2PR12MB2989.namprd12.prod.outlook.com (2603:10b6:208:c4::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.15; Tue, 22 Mar 2022 16:20:09 +0000
Received: from CH2PR12MB5001.namprd12.prod.outlook.com ([fe80::4d89:e9d3:abef:5ebe]) by CH2PR12MB5001.namprd12.prod.outlook.com ([fe80::4d89:e9d3:abef:5ebe%7]) with mapi id 15.20.5102.016; Tue, 22 Mar 2022 16:20:08 +0000
From: Trent Adams <tadams@proofpoint.com>
To: "bimi@ietf.org" <bimi@ietf.org>
Thread-Topic: [Bimi] MUA Evaluation of BIMI
Thread-Index: AQHYNakS7cBGBKKcikGTe1q57Bj1Vqy/BUnggABVaQCAAOT4gIAAjqgAgAASRgCAAAbcrIAABSUAgAE58LCAADXFgIABO/GAgABzfgCAAAX7gIAAyymAgAZknAA=
Date: Tue, 22 Mar 2022 16:20:08 +0000
Message-ID: <7C40D2B0-0F88-4198-B132-23E4329F8390@proofpoint.com>
References: <MN2PR11MB4351832ACD2F68404D87275FF7119@MN2PR11MB4351.namprd11.prod.outlook.com> <20220316182949.1A3F73945349@ary.qy> <B0FB719D-DF38-4D9E-B18C-C1D65EA7CAA4@proofpoint.com> <46fbb64b-cf30-bd49-1f39-f5dcb204ae93@taugh.com> <f9261037-7901-3e14-83c2-c02664c7c230@dcrocker.net> <fa8e50c2-97c4-1d02-fbb5-a3bc9382bd5a@mailkit.com>
In-Reply-To: <fa8e50c2-97c4-1d02-fbb5-a3bc9382bd5a@mailkit.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.59.22031300
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 02ff65f8-36d8-4eec-77e5-08da0c1fd562
x-ms-traffictypediagnostic: MN2PR12MB2989:EE_
x-microsoft-antispam-prvs: <MN2PR12MB2989B7ADAAE5833D968BB955B3179@MN2PR12MB2989.namprd12.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH2PR12MB5001.namprd12.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(166002)(8936002)(5660300002)(86362001)(122000001)(38100700002)(2906002)(38070700005)(316002)(83380400001)(2616005)(36756003)(6512007)(186003)(6506007)(6916009)(8676002)(53546011)(76116006)(64756008)(66946007)(66556008)(66446008)(66476007)(91956017)(508600001)(6486002)(33656002)(71200400001)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_7C40D2B00F884198B13223E4329F8390proofpointcom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH2PR12MB5001.namprd12.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 02ff65f8-36d8-4eec-77e5-08da0c1fd562
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Mar 2022 16:20:08.9085 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46785c73-1c32-414b-86bc-fae0377cab01
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: vQGZofM2+prPvuAMPLE9Whydz2WLEQmvGOdVJAYvlefFd8spVk2Y4Lmn4KZahremRjOh166WAZEuXuy9QMQijA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR12MB2989
X-PassedThroughOnPremises: Yes
X-OriginatorOrg: proofpoint.com
X-Proofpoint-GUID: 0ykpXtf6rPttd7majrCRHH1rW3KzspYW
X-Proofpoint-ORIG-GUID: 0ykpXtf6rPttd7majrCRHH1rW3KzspYW
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.850,Hydra:6.0.425,FMLib:17.11.64.514 definitions=2022-03-22_07,2022-03-22_01,2022-02-23_01
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxscore=0 phishscore=0 bulkscore=0 mlxlogscore=999 malwarescore=0 spamscore=0 suspectscore=0 priorityscore=1501 adultscore=0 impostorscore=0 clxscore=1015 lowpriorityscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000 definitions=main-2203220091
Archived-At: <https://mailarchive.ietf.org/arch/msg/bimi/gKONds5kmO1KOj51wJXho-yKJRo>
Subject: Re: [Bimi] MUA Evaluation of BIMI
X-BeenThere: bimi@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Brand Indicators for Message Identification <bimi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bimi>, <mailto:bimi-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bimi/>
List-Post: <mailto:bimi@ietf.org>
List-Help: <mailto:bimi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bimi>, <mailto:bimi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2022 16:20:21 -0000

It sounds like there's rough consensus around the idea that for an MUA to have any chance at evaluating BIMI, we first need to ensure the MUA can reliably identify the relevant authentication results.  If not, then the MUA can't evaluate BIMI.  And even if the AuthN-Results can be identified, there's the question about whether or not the MUA can rely upon the information.  I suggest we set aside the veracity of the information until after we more fully explore whether we can reliably identify the AuthN-Results first.

Fortunately, there are a couple existing methods for MTAs to convey authentication results to an MUA:


  *   An AuthN-Results header inserted by the mailbox provider (which may include the BIMI-Results).
  *   A signed ARC signature block, which includes the AuthN-Results.

If we first look at the AuthN-Results header, the question is how the MUA can identify the relevant header.  There's no guarantee that there is only one AuthN-Results header in a given email and, if there's more than one, it's not clear which one's applicable (especially as we can't rely on order).  Fortunately, RFC8601 defines a services identifier that might be used.  Unfortunately, the "authserv-id" field is optional (and can be any arbitrary string).  That makes it sub-optimal for an MUA to rely upon it.

Then, if we consider the ARC signature block, it'll include the AuthN-Results, with the added benefit that it requires that the evaluator be identified by a domain (in the "d=" value of the ARC-Seal block).  Unfortunately, the ARC Signing Domain Identifier (SDID) may be difficult for the MUA to match to the mailbox provider and message.

It's also worth noting that even if the evaluator (whether identified via the AuthN-Results header or the ARC signature block) is identified by a domain, there's no guarantee that the domain will match the domain of the recipient… so the MUA may have a hard time matching them up.  For example, when sending to a "@gmail.com" address, the AuthN-Results authserv-id and the associated ARC results SDID are "google.com".  So, absent prior knowledge baked into the MUA to link the two… there's currently no way for the MUA to figure that out.

Even with the limitations… I think we may be able to specify a cascading set of options the MUA can use to identify relevant AuthN-Results from the mailbox provider (along with the associated caveats).  If, after going through the full if-then-else set of options, and the MUA can't reliably identify relevant AuthN-Results… then it can't evaluate BIMI.

The question I'm wondering about now… is what percentage of relevant AuthN-Results can be identified using this process?   Because if the number is vanishingly small (and unlikely to increase), should we stop chasing the solution for MUAs?  If so, then perhaps we fall back to a section that just describes the issues along with a "user beware" message rather than specifying all the different options.

Anyway, before we start talking about the veracity of the AuthN-Results… is there anything I'm missing, or I've misstated?

Progress(?),
Trent


From: bimi <bimi-bounces@ietf.org> on behalf of Jakub Olexa <jakub=40mailkit.com@dmarc.ietf.org>
Organization: Mailkit
Date: Friday, March 18, 2022 at 2:43 AM
To: "bimi@ietf.org" <bimi@ietf.org>
Subject: Re: [Bimi] MUA Evaluation of BIMI

I'd say the only thing that would be worth checking is the source of the A-R header and host MAY match the server host (which may often not be possible) or fallback to the topmost A-R header. Keep in mind that BIMI is not a trust indicator


I'd say the only thing that would be worth checking is the source of the A-R header and host MAY match the server host (which may often not be possible) or fallback to the topmost A-R header.

Keep in mind that BIMI is not a trust indicator but just a logo - marketing feature rather than security feature. Custom MUA of a hosting company may rely on the A-R headers in a different way as it would get those from the MTA they have control over then a public MUA that simply has to trust that the user chose an imap server for a reason. What's the point of questioning the headers authenticity? I do get that it would prevent a malicious actor from having a "fake" logo displayed but the impact would be very limited.

maybe we could require MUAs to rely on the BIMI-Indicator header added by MUA.

Jakub Olexa
Founder & CEO
E-mail: jakub@mailkit.com<mailto:jakub@mailkit.com>
Tel: +420 778 535 877<tel:+420778535877>

Mailkit - Closing the circle between Deliverability and Engagement<https://urldefense.com/v3/__https:/www.mailkit.com__;!!ORgEfCBsr282Fw!vffTF121WWRZp3c6MeAaSmZYDkpQYWTA2tLEoWsZ49u2F-7fHnr2CSIcf06VWlRahB7B9jGfL5wEhxp-41Dzl5gIBCszefZs$>
On 17.03.2022 20:35, Dave Crocker wrote:


You can tie yourself in knots here but I really doubt you're going to end up with anything better than believe your MTA's A-R or you don't.


This seems to be trust without verification and without any meaningful basis for the trust, other than having logged into an IMAP session with a mailbox provider.

Since 'users' certainly won't be doing a meaningful assessment, this reduces to:  Random MUAs with support for displaying Bimi images must use any A-R header field that shows up.

Note that the trust includes having no basis for knowing whether the connected servers knows about, or cares about, A-R fields.

d/