Re: [dmarc-ietf] ARC-Seal is meaningless security theatre

Seth Blank <seth@sethblank.com> Fri, 18 August 2017 17:00 UTC

Return-Path: <seth@sethblank.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD8EE13231E for <dmarc@ietfa.amsl.com>; Fri, 18 Aug 2017 10:00:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sethblank-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vFlCEcx21aID for <dmarc@ietfa.amsl.com>; Fri, 18 Aug 2017 10:00:49 -0700 (PDT)
Received: from mail-vk0-x235.google.com (mail-vk0-x235.google.com [IPv6:2607:f8b0:400c:c05::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BD9EF1321EA for <dmarc@ietf.org>; Fri, 18 Aug 2017 10:00:49 -0700 (PDT)
Received: by mail-vk0-x235.google.com with SMTP id r199so34148902vke.4 for <dmarc@ietf.org>; Fri, 18 Aug 2017 10:00:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sethblank-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to; bh=6+NWSJoag3Eg70L7mqFjQ6hkpehKLVzMwA8+ls+4B/Q=; b=DRfkoAzNrQ7KEaGO+FvgA07dHm9/jQlCtd0rquDIgSkrQyoubpSs9x5ZiPK41Dwvj3 txNBpJgA/e6pET1dEgob9MTjKPcqubEYDkt5PkPzlNdVeEZ+llx+xpyw6qrFxzZg7kH3 QZpfByySXzXHnoyyK/IIP4YD2VHJtHOZb/4qzzLN115DorQsRDmf6yGx1Um7yWAmn/M+ 2CT+jK8EUZcw8zP2d+TliQZBrbtwPfJQYkyF+OKWqnw1t4jCc+pEfGCK3Jfdak0lyNpD ssICyhdRjs+B/sRQSZeHyRosIomV1uD9CAsONYbNwGp/cWZwOiWOBJxsLRgoc2eLvGxb LoBA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=6+NWSJoag3Eg70L7mqFjQ6hkpehKLVzMwA8+ls+4B/Q=; b=A2bo6phNA0tk6PUslIlwzF4jFFDxbtlku20L8qjste6euN5ZmpMmCXlVDrBUtTYXz7 Ou/3Vqr343fcfwsZc2MsWojjXdgOSmyUi95CStq3lobr41det9WEOOxCfQan+df3BGaf Y8TGG6s0rQTZMCFMDJCfEFRx5A2s4/Ok2mfzLQUk2KZ7MWgHcFxkqJEmvGqiPJ1MiUxB 0VJ/6Ryck57mDzyHSx8qwWMQg8g+FxoMVwGpGa2qxsn6g6jfIikHhRauWMDQl6LVLdx9 hS5g2s+ezdCChXpQIyHMI7VHLru1pLg3L1Y7Dsb2oE6MTumtlfpMXy8obpqqLmHqQ8em dQbg==
X-Gm-Message-State: AHYfb5gYgjMUjAWjmKhY3at+d4Qd9Fem5dIpvLyHTZ5L7TyqDNsm9jvw 0auG6x370XPVELQ1ZUv6AYinOYF6PCwaCDw=
X-Received: by 10.31.3.205 with SMTP id f74mr263186vki.163.1503075648537; Fri, 18 Aug 2017 10:00:48 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.103.89.22 with HTTP; Fri, 18 Aug 2017 10:00:27 -0700 (PDT)
In-Reply-To: <CABuGu1ofdkP6Gdsfin6KfpiTJW39gXz8Fa0iAAmXfcvyWGZxdA@mail.gmail.com>
References: <1502083287.2191248.1065195288.7CDC7FF3@webmail.messagingengine.com> <CABuGu1oTMbuLd4yTwecu5sKFnsmH+HiwT1FG=JpySYHzpMTx_w@mail.gmail.com> <1502200759.3946686.1066841264.607B4D0B@webmail.messagingengine.com> <2720431.u3G7bbkkxK@kitterma-e6430> <1502317564.1935379.1068588344.040173AF@webmail.messagingengine.com> <a08c7590-ded3-1642-4ffc-07848b3c6cd2@gmail.com> <e14f2130-6f00-4ef1-485b-850a4cc1c48c@gmail.com> <1502495646.4099176.1070896040.2B09B1F8@webmail.messagingengine.com> <166070f0-4ba1-70da-1f73-885b4a7f7640@gmail.com> <1502497178.4103451.1070917304.23DD466D@webmail.messagingengine.com> <598F9484.7020700@isdg.net> <CABuGu1p=oLfLRkuoaDHoz3Cv3_FrURdsFPzkac7jNzBpqBmiSg@mail.gmail.com> <599484FB.9050908@isdg.net> <1502929303.4038704.1075868960.5D80A788@webmail.messagingengine.com> <CAD2i3WN_bmDgmQBw3pnyu7vWJJM2Kzwgru87VhK=NA_H91B+og@mail.gmail.com> <1502930858.4042926.1075890568.5069945B@webmail.messagingengine.com> <CABuGu1ofdkP6Gdsfin6KfpiTJW39gXz8Fa0iAAmXfcvyWGZxdA@mail.gmail.com>
From: Seth Blank <seth@sethblank.com>
Date: Fri, 18 Aug 2017 10:00:27 -0700
Message-ID: <CAD2i3WPuiMw6Gbdw0E+Gh=yNDfNjECMrqLHKPUspq_h6dnpbnA@mail.gmail.com>
To: "dmarc@ietf.org" <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="001a1142870c1a1c5105570a121d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/0PE63GQIaLZKmdK_9oFizSYyVp8>
Subject: Re: [dmarc-ietf] ARC-Seal is meaningless security theatre
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Aug 2017 17:00:52 -0000

On Thu, Aug 17, 2017 at 11:46 PM, Kurt Andersen <kurta@drkurt.com> wrote:

> So I was able to retrace our design steps which led to the 3-piece model
> (AAR + AMS + AS) and the reasoning for the AS, signing just the ARC header
> sequence was to provide the verifiable chain of custody trace (though, of
> course, only from participating intermediaries). Some of the recent tweaks
> to the spec to deal with malformed sets of ARC header fields have weakened
> that original idea.
>
> In keeping with Bron's general idea to simplify, I'd suggest that having
> an AAR + [optional AMS] + AS would be a close approach for handling steps
> which do not break the ingress signature. Skipping the AMS would be a sign
> to downstream intermediaries that the prior DKIM or AMS was still valid
> upon egress. (certain details would have to be worked out)
>
> Does that help the conversation?
>

No, I think this is a huge step in the wrong direction.

Right now, we've got deployed code that we know works and improves the
landscape. Everything else is - rightly or wrongly - conjecture.

Let's keep the tech stable and move to experimentation.

If anything, this is an excellent question for receivers - when evaluating
AMS/AS, were there any situations where you required both signatures to
truly validate a chain and make a delivery decision, or with the added ARC
payload is now just having one sufficient?

Seth