Re: [dmarc-ietf] ARC-Seal is meaningless security theatre

Hector Santos <hsantos@isdg.net> Sat, 19 August 2017 05:23 UTC

Return-Path: <hsantos@isdg.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9D985132454 for <dmarc@ietfa.amsl.com>; Fri, 18 Aug 2017 22:23:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=isdg.net header.b=HhYsdFL1; dkim=pass (1024-bit key) header.d=beta.winserver.com header.b=FSMtVRZK
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MznR4UyHktT0 for <dmarc@ietfa.amsl.com>; Fri, 18 Aug 2017 22:23:57 -0700 (PDT)
Received: from listserv.winserver.com (ftp.catinthebox.net [76.245.57.69]) by ietfa.amsl.com (Postfix) with ESMTP id 1B96613241B for <dmarc@ietf.org>; Fri, 18 Aug 2017 22:23:57 -0700 (PDT)
DKIM-Signature: v=1; d=isdg.net; s=tms1; a=rsa-sha1; c=simple/relaxed; l=1579; t=1503120235; atps=ietf.org; atpsh=sha1; h=Received:Received:Received:Received:Message-ID:Date:From: Organization:To:Subject:List-ID; bh=CGGH0Hhp8fQH/mcYi8llsa5awFk=; b=HhYsdFL1TxrbUhFAVYGuXzaHloo2+KzozzZOBMfS8C8qe48Fv9y7iiVMvg/4wK EavhYBnVpaTgYmKmPDqn07E2LULVVoAH1K+Z6vKTS2UBUDuklRhGvUmXISYKi+aF HmXH27tga8TiPBs81aFEXKNVbykDqiqJMbu1dfEhBl+NA=
Received: by winserver.com (Wildcat! SMTP Router v7.0.454.6) for dmarc@ietf.org; Sat, 19 Aug 2017 01:23:55 -0400
Authentication-Results: dkim.winserver.com; dkim=pass header.d=beta.winserver.com header.s=tms1 header.i=beta.winserver.com; adsp=pass policy=all author.d=isdg.net asl.d=beta.winserver.com;
Received: from beta.winserver.com ([76.245.57.74]) by winserver.com (Wildcat! SMTP v7.0.454.6) with ESMTP id 3184089177.1.2920; Sat, 19 Aug 2017 01:23:55 -0400
DKIM-Signature: v=1; d=beta.winserver.com; s=tms1; a=rsa-sha256; c=simple/relaxed; l=1579; t=1503120193; h=Received:Received: Message-ID:Date:From:Organization:To:Subject:List-ID; bh=9Sgj8zN JxDUZhEsTPTNRuztwbax0mDkee87epCHl6LA=; b=FSMtVRZKI/ceaFKMSRG/Xma Sh3z4G3npjZ+Rm+FgOFlTqSpY/66GKMjsWt5SwYFUM2nf9goaljA7EMT5s6giz61 jameDr+pS8vRJOl1XB7HAe8Y/7GqBFQhN9boxfaZ5Iv4VLDmwWMmSa/7JvkTBAvs JphvjbgW2nuslEZLDezk=
Received: by beta.winserver.com (Wildcat! SMTP Router v7.0.454.6) for dmarc@ietf.org; Sat, 19 Aug 2017 01:23:13 -0400
Received: from [192.168.1.68] ([99.121.5.8]) by beta.winserver.com (Wildcat! SMTP v7.0.454.6) with ESMTP id 68073062.9.3572; Sat, 19 Aug 2017 01:23:12 -0400
Message-ID: <5997CB6E.80905@isdg.net>
Date: Sat, 19 Aug 2017 01:23:58 -0400
From: Hector Santos <hsantos@isdg.net>
Organization: Santronics Software, Inc.
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.8.1
MIME-Version: 1.0
To: dmarc@ietf.org
References: <1502083287.2191248.1065195288.7CDC7FF3@webmail.messagingengine.com> <a08c7590-ded3-1642-4ffc-07848b3c6cd2@gmail.com> <e14f2130-6f00-4ef1-485b-850a4cc1c48c@gmail.com> <1502495646.4099176.1070896040.2B09B1F8@webmail.messagingengine.com> <166070f0-4ba1-70da-1f73-885b4a7f7640@gmail.com> <1502497178.4103451.1070917304.23DD466D@webmail.messagingengine.com> <598F9484.7020700@isdg.net> <CABuGu1p=oLfLRkuoaDHoz3Cv3_FrURdsFPzkac7jNzBpqBmiSg@mail.gmail.com> <599484FB.9050908@isdg.net> <1502929303.4038704.1075868960.5D80A788@webmail.messagingengine.com> <CAD2i3WN_bmDgmQBw3pnyu7vWJJM2Kzwgru87VhK=NA_H91B+og@mail.gmail.com> <1502930858.4042926.1075890568.5069945B@webmail.messagingengine.com> <CABuGu1ofdkP6Gdsfin6KfpiTJW39gXz8Fa0iAAmXfcvyWGZxdA@mail.gmail.com> <CAD2i3WPuiMw6Gbdw0E+Gh=yNDfNjECMrqLHKPUspq_h6dnpbnA@mail.gmail.com> <f62ca9fc-e73c-82e7-173c-5cdc3c761dd6@gmail.com> <CAL0qLwZRfEEZ=Vz4tWAYEn97H9uvMzSyYe2+-Ak762qpvDmm3g@mail.gmail.com>
In-Reply-To: <CAL0qLwZRfEEZ=Vz4tWAYEn97H9uvMzSyYe2+-Ak762qpvDmm3g@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/AqyIrCiCFwQntq3EUSky6PvrCaA>
Subject: Re: [dmarc-ietf] ARC-Seal is meaningless security theatre
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 19 Aug 2017 05:23:59 -0000

On 8/18/2017 2:10 PM, Murray S. Kucherawy wrote:

> Of course, the danger of proceeding along that line is that we do
> establish a deployed base, however small, that will be difficult to
> change later.

+1

> I don't know the answer to that question immediately,
> and admittedly I'm only going to be on the periphery of cleaning up
> whatever mess results.

Well, we should know this by now.  Are we in a project research or 
product research phase here?  We are well beyond the proof of concepts 
here.  We all know what the problems are when a DKIM Policy Model 
offers a method to handle strong, exclusive, restrictive polices 
whether it was SSP/DomainKeys o=-, ADSP DISCARDable and now DMARC 
p=reject.

IMO, there is nothing new added to the table other than more overhead, 
a ARC chain, across the transport path. Highly sensitive to breakage, 
until the originating domain says something about it, I don't see how 
it resolves the original problem.

I suggest the simplest solution is to augment ARC with an extended 
DMARC tag that informs receivers that its "OK" to relax p=reject only 
under X% ARC seal conditions  It could be 100% or it be partial, 
fuzzy, "SoftFail" concept, whatever.  Let the Originating Author 
Domain decide.

This would offer a reason to support ARC, to explore the 
experimentation, and best of all, we won't have the design change 
pressures to deal with the borderline "illegal," "unethical" 5222.From 
rewriting methods/kludges.  Lets remember it remains to be the only 
hash binding header requirement by DKIM.

-- 
HLS