Re: [Bimi] MUA Evaluation of BIMI

Trent Adams <tadams@proofpoint.com> Tue, 15 March 2022 18:32 UTC

Return-Path: <tadams@proofpoint.com>
X-Original-To: bimi@ietfa.amsl.com
Delivered-To: bimi@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0C86B3A0F35; Tue, 15 Mar 2022 11:32:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=proofpoint.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4nHFld_A8EgT; Tue, 15 Mar 2022 11:32:49 -0700 (PDT)
Received: from mx0a-00148503.pphosted.com (mx0b-00148503.pphosted.com [148.163.159.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2ACFA3A0DD4; Tue, 15 Mar 2022 11:32:47 -0700 (PDT)
Received: from pps.filterd (m0086146.ppops.net [127.0.0.1]) by mx0b-00148503.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 22FIWgO8014287; Tue, 15 Mar 2022 11:32:42 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=proofpoint.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=corp-2019-08-07; bh=Tl2JHMqHsNEcdMMnw4SnESEdlrRBylOaL48F1oHHpZc=; b=cta7DQ1PAAQ134mm0Oz5JIt2zaa+auIwAtS3GCU2/asR4pf7FF5XEsW7lKKsYvReD5sS MfAynW+R9eRUrUnJtz28HCahZJsSACWvXE8EbcqE+/HpVwjkmplajBXA6EOrQ9e0uSt0 wL6FuK1BaBtyGKAoy59ylkegLm6mW94TCroumoYM+XINxlBYz2X6jPjObx1AYl4JmfLi Q/k+c4BJZS3fIGyT62rK3ohDqygD/lo4Jm5casSil+rtP4wjhixYVOWdW5oeWpi9lu6j 5GEprEIRxDHnwwu024Ko9Atrj/yxX502BdLf4o7bIFknqtb0n4ttRaQ2V3F1PYZGM/vD OQ==
Received: from lv-exch04.corp.proofpoint.com ([136.179.16.100]) by mx0b-00148503.pphosted.com (PPS) with ESMTPS id 3ersfe97cm-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Tue, 15 Mar 2022 11:32:41 -0700
Received: from lv-exch06.corp.proofpoint.com (10.19.10.26) by lv-exch04.corp.proofpoint.com (10.19.10.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.2308.21; Tue, 15 Mar 2022 11:32:41 -0700
Received: from lv-exch01.corp.proofpoint.com (10.94.30.37) by lv-exch06.corp.proofpoint.com (10.19.10.26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.2308.21; Tue, 15 Mar 2022 11:32:40 -0700
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (10.19.16.20) by lv-exch01.corp.proofpoint.com (10.94.30.37) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.2308.21 via Frontend Transport; Tue, 15 Mar 2022 11:32:40 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UiH16xOgV+SHec1dy9O/aKmuaIXHX0kezLXbEkowCqupGZA4q6mbcADYlNw8QnKfEEAnq0uPexC5fUnhNK4KV9XPwssT3sMkshJxsHOI2TSkXTEbyQ2x8bFafdS0Rf9wzNYH+iNRQgru8dTjR22mlIyOVYPpuSjjOsA8AQdIzoKS7KSHjbyFfyi7eojECUuCsd126DYL47j/iX++vPchncG5ag3ZP+1gNxG3FR0FtEi+EfZ639XoxIjHCAB71ZqrpaKr81Jq0v9BVWaF9om61lvPi0G6yeSjhNIe93NdbE61MZa14W59wdwt9RybnMQ40p0NZlp3ZJgPMj2uV5+2sQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=EKwib5Rk6nqgFUIr3+QcStGJCRZlYoxB9Xt+xXs0N9A=; b=BoFGrlZ1X3q5Y8UsOh1g/owcvl+t6SflEYl/DOGxXLb8vIdAUIIBwPXCCR48BVb+h4+DW0Y5JoYnNqu4HMFJG1ugoOpHRjMyxBSJgfCqZf7vqp0LtzudQjF33SNLxnp5JFchXDYEPnCmkCuNopHu8bpKGXrbYycLYCLdeYgIKTufPbsjUyUhmCdm8NyIRsjXzzAVHb6C+f9WB8jJLxJHBoILWzTeRAJMAc206hRnkwj678zv0tssbUcUbzV4pTeatT58B9v51g0DxqBdEd22JcH76IEBkagIcHY+WyBiRssVhv9MaaTpIY2lAe0fmWDMxMrwV2JI5rVKOu1+Z4/6Pg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=proofpoint.com; dmarc=pass action=none header.from=proofpoint.com; dkim=pass header.d=proofpoint.com; arc=none
Received: from CH2PR12MB5001.namprd12.prod.outlook.com (2603:10b6:610:61::18) by BN6PR12MB1844.namprd12.prod.outlook.com (2603:10b6:404:fc::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.21; Tue, 15 Mar 2022 18:32:37 +0000
Received: from CH2PR12MB5001.namprd12.prod.outlook.com ([fe80::4d89:e9d3:abef:5ebe]) by CH2PR12MB5001.namprd12.prod.outlook.com ([fe80::4d89:e9d3:abef:5ebe%7]) with mapi id 15.20.5061.028; Tue, 15 Mar 2022 18:32:37 +0000
From: Trent Adams <tadams@proofpoint.com>
To: Dave Crocker <dcrocker@bbiw.net>, Ken O'Driscoll <ken=40wemonitoremail.com@dmarc.ietf.org>, "Brotman, Alex" <Alex_Brotman@comcast.com>
CC: "bimi@ietf.org" <bimi@ietf.org>
Thread-Topic: [Bimi] MUA Evaluation of BIMI
Thread-Index: AQHYNakS7cBGBKKcikGTe1q57Bj1Vqy/BUnggABVaQCAAOT4gIAAZqSAgAAD5gCAAADPsIAAGrYA//+gdoA=
Date: Tue, 15 Mar 2022 18:32:37 +0000
Message-ID: <78719B31-2969-43CF-8613-7BF6A44DF850@proofpoint.com>
References: <7639D8E5-B8CA-48E6-B6F3-63BA091C3AC5@contoso.com> <VI1PR01MB7053B6AF625A5FFB2222F795C70F9@VI1PR01MB7053.eurprd01.prod.exchangelabs.com> <MN2PR11MB4351276056888F77815E220EF70F9@MN2PR11MB4351.namprd11.prod.outlook.com> <CB922168-3B56-488E-90DD-2591B064F9FF@proofpoint.com> <VI1PR01MB70533C10733D41443FD2A801C7109@VI1PR01MB7053.eurprd01.prod.exchangelabs.com> <a9fc90ba-7015-cf52-e433-6bf80ca26b0a@dcrocker.net> <VI1PR01MB7053973E7BE66482A2E23E8EC7109@VI1PR01MB7053.eurprd01.prod.exchangelabs.com> <93af3d33-bf16-74cc-9c9f-c65865dc5c4d@bbiw.net>
In-Reply-To: <93af3d33-bf16-74cc-9c9f-c65865dc5c4d@bbiw.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.58.22021501
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 65813442-cb73-464e-b7df-08da06b22e62
x-ms-traffictypediagnostic: BN6PR12MB1844:EE_
x-microsoft-antispam-prvs: <BN6PR12MB18447A231492C1CB0523CECFB3109@BN6PR12MB1844.namprd12.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH2PR12MB5001.namprd12.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(38100700002)(110136005)(6486002)(508600001)(86362001)(8936002)(5660300002)(316002)(38070700005)(64756008)(8676002)(4326008)(66446008)(66476007)(91956017)(83380400001)(66946007)(66556008)(76116006)(6506007)(53546011)(6512007)(71200400001)(2616005)(122000001)(186003)(33656002)(36756003)(2906002)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_78719B31296943CF86137BF6A44DF850proofpointcom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH2PR12MB5001.namprd12.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 65813442-cb73-464e-b7df-08da06b22e62
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Mar 2022 18:32:37.7576 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46785c73-1c32-414b-86bc-fae0377cab01
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: rQl+zGTU//MWUrzOftf3XQnfY6SqhU0blVyImh1AhhQ7/HMLTRGoe3iVulVq0PKhI/oEf+DjuH0CX8kmJ+70gQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR12MB1844
X-PassedThroughOnPremises: Yes
X-OriginatorOrg: proofpoint.com
X-Proofpoint-GUID: iUKfTm0H_8lzLJ1PFFhpYdmwjmakl2cS
X-Proofpoint-ORIG-GUID: iUKfTm0H_8lzLJ1PFFhpYdmwjmakl2cS
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.850,Hydra:6.0.425,FMLib:17.11.64.514 definitions=2022-03-15_09,2022-03-15_01,2022-02-23_01
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 clxscore=1011 spamscore=0 mlxlogscore=999 impostorscore=0 malwarescore=0 priorityscore=1501 phishscore=0 suspectscore=0 bulkscore=0 mlxscore=0 lowpriorityscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000 definitions=main-2203150110
Archived-At: <https://mailarchive.ietf.org/arch/msg/bimi/vy6rdwLrGvbF6dnGiUKkiA7YUKo>
Subject: Re: [Bimi] MUA Evaluation of BIMI
X-BeenThere: bimi@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Brand Indicators for Message Identification <bimi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bimi>, <mailto:bimi-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bimi/>
List-Post: <mailto:bimi@ietf.org>
List-Help: <mailto:bimi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bimi>, <mailto:bimi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2022 18:32:54 -0000

These are all good points… and knowing that there's no clear win here, what if the specification identified a pattern along the lines of:


  1.  If the MUA can validate the DKIM signature in the message, and DMARC alignment passes, it can validate BIMI and take the appropriate steps to display the logo.  Sure, it's a long shot, but it could happen.
  2.  If DKIM validation fails, the MUA looks for the most recent ARC signature block, and if it's from the mailbox provider (e.g. "gmail.com"), the MUA may use the signed AuthN-Results on the way to validating BIMI.
  3.  If there is no identifiable ARC signature from which the MUA can extract verified AuthN-Results from the mailbox provider, the MUA may (at their peril) cook up local magic to identify what they believe to be reasonable AuthN-Results to use for BIMI validation (though, this is discouraged within the Security Considerations section).

I know… this is all very algorithmic… and it side-steps the point about resources of constrained devices (but since there's at least one mobile client doing it today, I guess it's not impossible)… but it would provide some guidance to address the question of how independent MUAs might be able to perform BIMI validation.

Otherwise… if we really don't think it's a good idea to allow anyone other than the MTA validating SPF+DKIM+DMARC to evaluate BIMI… then we should update the spec to specifically call that out.  It's the ambiguity hole we should try to address (even if just for now, knowing we can think up better ideas over time).

More thoughts,
Trent


From: Dave Crocker <dcrocker@bbiw.net>
Organization: Brandenburg InternetWorking
Date: Tuesday, March 15, 2022 at 12:14 PM
To: Ken O'Driscoll <ken=40wemonitoremail.com@dmarc.ietf.org>, Trent Adams <tadams@proofpoint.com>, "Brotman, Alex" <Alex_Brotman@comcast.com>
Cc: "bimi@ietf.org" <bimi@ietf.org>
Subject: Re: [Bimi] MUA Evaluation of BIMI

On 3/15/2022 11:00 AM, Ken O'Driscoll wrote: >> So, not, it is not (necessarily) the wrong place for the >> operation. > > Sure, DKIM can be implemented in an MUA, but the accuracy of the > results is architecture dependent.


On 3/15/2022 11:00 AM, Ken O'Driscoll wrote:

>> So, not, it is not (necessarily) the wrong place for the

>> operation.

>

> Sure, DKIM can be implemented in an MUA, but the accuracy of the

> results is architecture dependent. For example, if the architecture

> modifies inbound messages after DKIM is verified (e.g., puts an

> "External message" warning in) then while the A-R header is correct,

> the MUA-level DKIM validation will give a different answer. The MUA

> may correctly validate DKIM but that does not fully inform the user

> of anything useful regarding message authentication.

>

> So yes, it's possible but with too many caveats to be useful to

> recommend in general, or in a specification.



1. the concern applies to all components that touch the message along

the path.  Within a recipient's enterprise system, the odds of this

being a problem might be higher, but that simply points to the need for

clarity about end-to-end trust issues with BIMI use; it also turns out

to play into the next, larger point...



2. Just as the enterprise might mess up the DKIM signature, it might

create problems with an A-R field.







> I believe the same goes, to a lesser degree, for MUA-level ARC



Sorry to have left that off.  As I recall, it, too, is an end-to-end

architecture that can reasonably be implemented in the MUA.  And yes,

handlers along the path to it can mess up the ARC data.







>> As for the receiving MTA lying, turn the issue around:  how can the

>> MUA know that the field came from that specific, well-behaved,

>> thoroughly compliant MDA or MTA.

>>

>> Broadly, how is the chain of trust established sufficiently for the

>> MUA to know that the A-R header field is to be trusted?

>

> I'm actually not sure that they should be programmatically trusted by

> an MUA because there isn't an established reliable low-cost mechanism

> to do so.



I think you've just implied that an independent MUA should never display

a BIMI icon, since it can't be trusted...





By that I mean, for example, even if the ARC trust issue

> was solved tomorrow, I doubt that a mobile phone based MUA is going

> undertake the resource cost of reliability implementing ARC

> validation for each message.



I was making an architectural point, which means it is independent of

implementation specifics.



You are making a reasonable point, but it is about a specific

implementation/use concern  (And given the power and connectivity of

typical smartphones these days, uhhh...)







> MUA level trust in headers should be based on user/implementor

> awareness of its limitations and risks. A spec. can do that. A spec.

> could even say that a TLS connection between the MUA and MTA is

> required. If you want chain of trust at MUA level, then use a

> PKI-based solution.



This goes back to the original point that this issue needs due diligence

and documentation.







> I believe the goal should be to avoid as much as possible some future

> MTA-level implementation with the hypothetical

> "Always_show_BIMI_logo_regardless = true;" configuration option. I

> think that best way to work towards that goal is for the

> specification to clearly articulate the conditions, limitations, and

> considerations for implementing BIMI at MUA level.



+1



d/





--

Dave Crocker

Brandenburg InternetWorking

bbiw.net