Re: [dmarc-ietf] Summary: Search for some consensus, was: Proposed text for p=reject and indirect mail flows

Douglas Foster <dougfoster.emailstandards@gmail.com> Sat, 29 April 2023 20:43 UTC

Return-Path: <dougfoster.emailstandards@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 54CDCC151711 for <dmarc@ietfa.amsl.com>; Sat, 29 Apr 2023 13:43:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AxT6t-6VtwPZ for <dmarc@ietfa.amsl.com>; Sat, 29 Apr 2023 13:43:13 -0700 (PDT)
Received: from mail-lj1-x22d.google.com (mail-lj1-x22d.google.com [IPv6:2a00:1450:4864:20::22d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 60B78C15170B for <dmarc@ietf.org>; Sat, 29 Apr 2023 13:43:13 -0700 (PDT)
Received: by mail-lj1-x22d.google.com with SMTP id 38308e7fff4ca-2a8bb726210so9833761fa.1 for <dmarc@ietf.org>; Sat, 29 Apr 2023 13:43:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1682800991; x=1685392991; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=/9enKLk3Jhj3Lw4uS+6THM+kbt3+Y87simFGvUKoKTY=; b=Eq6rmQl0viejNnl/0rLfsUn1KUnWHpDolMaly9+cKzsTnnWlmn6nropfZI884gEJ68 iYVBt4pXvRWW9TifyCzOxaFbnE/+UFUGPaZy9TTlOVJzCAJQmTwhl/vps5AHy2FIgNGi gTr53Da3r+wL9YMyesTtFgRXtQ8PwZAn2aL4bKfXFEIAZsQXdbEbYiLEA1bJE0PMIPSv 6f6biqITj8zATo0yWX+6kTIEXU5zOVjPPFkjGCbzT3lb/3BDPZ4+YHgIyHPr342ELFLf KvBtpOakfpeJb8J4nMCVY+5sJS1Fhfpq2tvkIiifBDaNWaY9N0tCtjmTXqAZqMITarKj i36A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682800991; x=1685392991; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=/9enKLk3Jhj3Lw4uS+6THM+kbt3+Y87simFGvUKoKTY=; b=kjXBZ+I7Zc2J4RGx5y8FlbASPtawPxyETETg3R2/o5kc6sn5/xjmItMNo8z2n+EIvf /g5b+vOT4r0obS2xQkw16YH0zDzWOqobV5QwTZ3ZwbcTKjTfPLIMhTBRg6N8EddTUCfh ehShBGuPA8CGo6mCfZcRc4BFFga/fe8QD/nC/0GYajwu8hUuhfaKIk70pa5v1XaWkwyz YpEh/QM5jASidrem67ZKqJd6EHK+JujfTnBW4Hb0ObkZgWfTZfSxCl8L2begal12Ebt6 qZtRkG6HZ5UbyO54AmTctO7TNuls4R3otN20qFnrTg51Y6cUKkRZElMxNOuuO94wR84W CT1A==
X-Gm-Message-State: AC+VfDykzPX4J9kfLR0GZwyez0uvzUa8SN1IKTtsmnnNH/kJEB1kkNiC 0jf/vjVLuF7FJL3NuL1u7V1V4SPsT6FQmEUCbtVc/VVr
X-Google-Smtp-Source: ACHHUZ7+YYsj9OcZ8lMCTeewgeXbnKGCsu2tm6pNdGe7oanWXCWeCYMG7QK07YnuZ4sabx75HAvOUdASk1NLv9MMpSE=
X-Received: by 2002:a2e:9802:0:b0:2a9:fa39:236c with SMTP id a2-20020a2e9802000000b002a9fa39236cmr2743203ljj.9.1682800991002; Sat, 29 Apr 2023 13:43:11 -0700 (PDT)
MIME-Version: 1.0
References: <CALaySJ+NBg9vzqa0_t-sBf7EKXQ3A=DTyy-Vc7M-ZK9-vfJxmw@mail.gmail.com> <29216533.CRhL9lMF2B@localhost> <3141092.K83ThNGNZP@zini-1880> <CAH48ZfzS+MCC4-Dk3mZhF_bwc9hzWowApgPG3am14bjB9ZDz3Q@mail.gmail.com> <630A8A65-E04D-4C48-AE80-516F610EB93A@isdg.net>
In-Reply-To: <630A8A65-E04D-4C48-AE80-516F610EB93A@isdg.net>
From: Douglas Foster <dougfoster.emailstandards@gmail.com>
Date: Sat, 29 Apr 2023 16:42:59 -0400
Message-ID: <CAH48ZfzmQJBb3xNSvVn84wpwf5SK2F0RSNQnSNObtxKfdHaY1w@mail.gmail.com>
To: IETF DMARC WG <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000004be39605fa7fa3d8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/A8ocOQIOvabRbwauMitEXG5bT7k>
Subject: Re: [dmarc-ietf] Summary: Search for some consensus, was: Proposed text for p=reject and indirect mail flows
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 29 Apr 2023 20:43:14 -0000

I mentioned you to acknowledge authorship, not to isolate.   Your text
focused on the mailing list response, which is a separate section from the
domain owner warning that Barry raised and Scott developed.   As I said, I
think both perspectives need to be addressed, because domain owners will
ignore the caution and mailing lists will have to decide how to respond.
Evaluators need to be addressed because
they are the ones that ultimately block messages that their users want
delivered.

But I need to clarify whether I understand your point.   What I am hearing
is:

   - For the short term, mailing lists should refuse postings from
   DMARC-enforcing domains.   That position can be relaxed only if all
   participating domains have agreed to ignore DMARC Fail for messages from
   the list  (Ale floated some ideas about that approach.)
   - For the longer term, we need a non-DKIM method for delegating rights
   to a third party.

We have a "mailing list problem" because mailing lists have been unwilling
to operate with that limitation.   It is perceived as, "Sorry that you lost
half your user base, you just need to buck up and accept the new reality."
  I agree that it solves the problem, but I have to acknowledge that the
solution has been repudiated by most of those who would need to embrace
it.   You may be the exception.

You talk about "incomplete protocol" as if this is a commonly understood
and accepted term.  I interpret it to mean a third-party authentication
method other than DKIM.  DKIM does serve for third-party authentication
where it has been embraced and deployed.   So the issue is that it has not
been practical for many situations and we do need another option.

For the longer haul, I agree that we need a new authentication method.  The
method needs to match the context, which means that the delegation should
be user-to-domain.   List subscriptions are a user-level activity, and a
user-level delegation does not undermine domain-level DMARC, while it
continues to protect the user from impersonation by anyone other the list
domain.   Original ATSP is too much like DKIM, but ATSP extended to the
user level represents new functionality.    What remains to be seen is
whether a viable design can be produced.

Any new authentication protocol requires a way for receivers to indicate
participation, or it encounters the same problems we have with ARC, which
is the continued use of From Rewrite because lists do not know that Rewrite
is not required.

Doug



On Sat, Apr 29, 2023, 11:02 AM Hector Santos <hsantos=
40isdg.net@dmarc.ietf.org> wrote:

>
> > Given that lists are expected to (A) continue making content changes,
> and (B) continue accepting all comers, I think we need to embrace From
> Rewrite as a necessary consequence of A and B.    Unlike Hector, I don't
> have a problem with From Rewrite because the act of altering the content
> makes it a new message, and the modifying entity becomes responsible for
> the whole thing.   So we need a caveat to list owners which lays out the
> real risks and the better alternatives.
>
>
> Douglas,
>
> Just a few points.
>
> It is more accurate to state, "Unlike others," because I am not the only
> one who has a problem with altered mail authorship, and worse, when done
> for the purpose of a security teardown it potentially introduces a new
> security threat with Display Name attacks.  I believe I am “IETF” correct
> to raise this security concern where IETF security folks would agree.
>
> It is often stated that it is unfair to MLS/MLM folks who have worked
> unchanged for over 30+ years to be required to change.  Please understand I
> have a commercial MLS product since 1996 and I don’t like changes just like
> the next MLS developer. I’ve extremely conservative but I do adapt when
> necessary. My MLS is a legacy product but it is still actively supported.
>
> Well, for the MLS or MLM refusal to adopt the protocol, the refusal to
> adopt measures known to resolve the DKIM secured with Policy mail stream,
> caused an immediate need by one MLM to create a hack to alter list
> submissions from restrictive domains. It resolved the immediate problem.
> The MLM could have adopted subscription/submission controls as outlined in
> 2006 and discussed many times in the WGs. It  was not  unknown. These
> correct methods would have pushed the burden back to the domain seeking
> exclusive mail security once they began to publish and honor p=reject. The
> MLM could have supported any of the many ADID::SDID association
> authorization proposals too, but it did not. So here we are with the DMARC
> rewrite problem where in my view, needs to be explained and corrected.
>
> The "new message" angle is one view, but not the definitive one to suggest
> it is okay to alter list submission copyrighted authorships. It is not a
> normal thing to do, but what you can do as an MLS/MLM developer depends
> widely on the type of list distribution. If you are just broadcasting to a
> list of people as a read-only list, then the preparation of required
> headers is a legitimate instance where it completes a new secured message
> with the proper secured business addresses.
>
>
> —
> HLS
>
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>