Re: [dmarc-ietf] non-mailing list use case for differing header domains

Alessandro Vesely <vesely@tana.it> Mon, 10 August 2020 08:41 UTC

Return-Path: <vesely@tana.it>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6A49E3A1546 for <dmarc@ietfa.amsl.com>; Mon, 10 Aug 2020 01:41:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.047
X-Spam-Level:
X-Spam-Status: No, score=-3.047 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.949, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1152-bit key) header.d=tana.it
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MGCbDVPlOduv for <dmarc@ietfa.amsl.com>; Mon, 10 Aug 2020 01:41:29 -0700 (PDT)
Received: from wmail.tana.it (wmail.tana.it [62.94.243.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C5BE73A14AC for <dmarc@ietf.org>; Mon, 10 Aug 2020 01:41:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tana.it; s=delta; t=1597048873; bh=eEtkGOQQLSRU1Xb7t5pDa4lPMcJ0ap1e7TgNtrJ20mE=; l=2953; h=To:References:From:Date:In-Reply-To; b=DZ0w5YVaDZMF2mbsRyvISTvBaGkPEfK71ZczpQqEBa3S93J3Yd1vba+EDc+D3dpun 5tq29WuaxA7sxU7pKhfIvnzQc6VsrF+9O/sCwsI+9JVDAKgXIlC1dpNHTEomsNtn3i 5nJh0FBy34Wd69Bi3O209lSAIa5jzx778a12qBVrah1LVQ72QxnoikMvm5XQI
Authentication-Results: tana.it; auth=pass (details omitted)
Received: from [192.168.1.102] ([5.171.36.35]) (AUTH: CRAM-MD5 uXDGrn@SYT0/k, TLS: TLS1.3, 128bits, ECDHE_RSA_AES_128_GCM_SHA256) by wmail.tana.it with ESMTPSA id 00000000005DC013.000000005F310828.000039C6; Mon, 10 Aug 2020 10:41:12 +0200
To: dmarc@ietf.org
References: <f82ecb18-0de8-0e36-6b76-7b937399d964@dcrocker.net> <C0FE9C52-8050-41BE-B79C-C905F9C26F93@iki.fi> <FB6E5DC4-03CF-440B-A760-B676A7850F72@iki.fi> <fefffa48-39aa-2ef5-6928-db266a403ee3@cert.ee>
From: Alessandro Vesely <vesely@tana.it>
Message-ID: <c23f7897-b7b1-cbbf-e089-92a8c5b09bc6@tana.it>
Date: Mon, 10 Aug 2020 10:41:10 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <fefffa48-39aa-2ef5-6928-db266a403ee3@cert.ee>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/1g3MPokhimnwFyANQ4qUJhfhf0s>
Subject: Re: [dmarc-ietf] non-mailing list use case for differing header domains
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Aug 2020 08:41:31 -0000

On 2020-08-09 6:54 p.m., Tõnu Tammer wrote:
> 
> DMARC relies on SPF and DKIM. The latter is particularly important for
> the mailing lists to ensure that DMARC works. And when I read the cases
> it is clear that the issue is not of DMARC but of DKIM.


Indeed, one of the proposed workarounds, Recognized Transformations of 
Messages, addresses DKIM verification algorithm.  Yet, it is being 
discussed on this list rather than ietf-dkim.  I hope it becomes a WG 
draft soon.


> RFC for DKIM says very clearly in the introductory part that and I
> quote "Message transit from author to recipient is through relays
> that typically make no substantive change to the message content
> and thus preserve the DKIM signature." If this is not the case, the
> relay is actually violating DKIM standard.

As Dave said, MLMs may need to carry out some transformations while 
usual relays don't —except those which add **SPAM** subject tags or 
antivirus footers.

The l= tag is one of the early envisaged provisions to address footer 
additions.  It was deprecated because of the possibility to add 
malicious footers.  Of course, adding a footer /is/ a substantive change.

However tight we define recognized transformations, they have to allow 
the addition of a few lines and a URL.  Hence, they can be malicious. 
  Therefore, we need to differentiate two classes of domain owners, 
those who can afford such risk and those who want top strictness.


> The lists we manage, we have made sure they follow the RFC and there is
> no issue of DKIM preservation.


https://wiki.asrg.sp.am/wiki/Mitigating_DMARC_damage_to_third_party_mail#Turn_off_all_message_modifications


> Some lists, however, have taken a different approach and to make
> sure we have delivery there also, we've looked at the elements
> which are used for DKIM calculation. We realise that not including
> the content into hash calculation can have a drawback but given
> that non-DKIM compliant lists do with content what they wish 
> anyway, it's not much of a drawback. At the same time, prevention 
> against spoofing and misuse is retained, which is the key for
> DMARC.


That only works if you trust the MLM.  We cannot rely on trust, 
because there is no widespread common reputation system.  DMARC does 
provide for "trusted_forwarder" and "mailing_list" policy override types:

    However, before this action is taken, the Mail Receiver can consult
    external information to override the Domain Owner's policy.  For
    example, if the Mail Receiver knows that this particular email came
    from a known and trusted forwarder (that happens to break both SPF
    and DKIM), then the Mail Receiver may choose to ignore the Domain
    Owner's policy.

However, that kind of hush hush is not deterministic, since the 
protocol does not define the "external information".  Providing for a 
URL pointing to such external source might help.


Best
Ale
--