Re: [dmarc-ietf] ARC questions

Dave Crocker <dcrocker@gmail.com> Tue, 24 November 2020 01:09 UTC

Return-Path: <dcrocker@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2CB493A14D0 for <dmarc@ietfa.amsl.com>; Mon, 23 Nov 2020 17:09:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.198
X-Spam-Level:
X-Spam-Status: No, score=-0.198 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4klbwNT-1GgL for <dmarc@ietfa.amsl.com>; Mon, 23 Nov 2020 17:09:47 -0800 (PST)
Received: from mail-pg1-x535.google.com (mail-pg1-x535.google.com [IPv6:2607:f8b0:4864:20::535]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EB9B63A14C9 for <dmarc@ietf.org>; Mon, 23 Nov 2020 17:09:46 -0800 (PST)
Received: by mail-pg1-x535.google.com with SMTP id s63so6049835pgc.8 for <dmarc@ietf.org>; Mon, 23 Nov 2020 17:09:46 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language; bh=RhHnxozRh9cw5KciwtkQmLhmmw2/eEzZOYcptwjiwA4=; b=NKC55EoVULy3ty2U7Csga43VcBIgLJuQ7IXa269zgq+qi5HSKWlYXfoGH5xllDSTVs GrGGFqWVb8bXt1nwxyZoQAFAKdiPzEE0rlkWiGoMBHpvGCdLMIusfyB4mlHiY1eRSaKs AVvlAXzbi/nqQz1QC+R1q/k0/870iSWVDsuwXOGNcJiZTTgQLIgx0lcioabMA5wc40U2 IbKSMZmbKjxoiZ8V9jlMHqMdEsGxt1L30ah0+O5xJrmHW2WMXGEudWqYCB/VYz99EE2m gRetF8mp02pKCL2PcT/cqTRCX4+B9/dAae9vXO6PGdzo7agbYFA5fXXfvUHqszjxiv0M PmZg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language; bh=RhHnxozRh9cw5KciwtkQmLhmmw2/eEzZOYcptwjiwA4=; b=tTMDggfOgJU2GxEqodgYgSJvGaREnHjeHgBrysHTT9hKtHfp0nWSZ2fT1NMDIaSCJe OfVdbZyUmitFMkEGpg3cOsiDvHMZSbOQpfSUFWR2oh8NUxuwtDbBjmJmoDeRQHXvQePz kECN7JNBxRSzJg76ST+gWILJwnjM5RxKwhEN0ij7uXdsLfXWNqoWcceHrK2e+JWRmbbt BySIRbQiz4ak39rggVlPqQWSla/kxv1wpq/UZYQVha68MNj30qfcGmeYIVfjnjOQj9Gf AkNosWKUqiVnkBYE59LzNj9RXAGYYLf/XJDhbig8Lwzoka1WmVYg2xG2H3+lkqhJyUqg vmwg==
X-Gm-Message-State: AOAM532S1SG0T/+bil2ZuK+3wm9OCZImTAgKBYI6TdpDhzP07/Spf0Vc 1Xnae9E4P+Xo/aSa24rvKORUDXYR3to=
X-Google-Smtp-Source: ABdhPJyxxzp+YF520Jvh0Z6UCG0LkDMuSRuNJPLdTq7QJVg8Izd9OJXbg9WEs3aruKtdi70rJt3icw==
X-Received: by 2002:a17:90b:4a0c:: with SMTP id kk12mr1738506pjb.205.1606180186273; Mon, 23 Nov 2020 17:09:46 -0800 (PST)
Received: from [192.168.0.109] (c-24-130-62-181.hsd1.ca.comcast.net. [24.130.62.181]) by smtp.gmail.com with ESMTPSA id c6sm599156pjr.55.2020.11.23.17.09.44 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 23 Nov 2020 17:09:45 -0800 (PST)
To: Brandon Long <blong@google.com>
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
References: <dcc265f9-a143-5093-eba0-94ee059c7cc7@mtcc.com> <20201122021417.B5E6E27B3E59@ary.qy> <CABuGu1pX=5ZC4RLsv19qrosRN9nCrPdeSk5Xg4O7ViEZit6dnA@mail.gmail.com> <453c4db4-fc62-dc76-5b15-707623d66f9f@mtcc.com> <64f18b-ae8-8c15-3d33-ff2d864c35bc@taugh.com> <884541e6-5076-7f8f-d1d2-d68ea9c5a2bc@mtcc.com> <CABa8R6u_K=KEQv3vmkVwEuYon350NEkd62eOovhq+gv9wonSnA@mail.gmail.com> <f28b76e5-2855-985e-ece5-960aa68e2846@dcrocker.net> <CABa8R6s+CoKv69g+Csu83e+vMac83rm85cFJXE09_H6TiYJB6Q@mail.gmail.com> <40aa3391-84fb-bd2d-92ab-e268c674d4a4@gmail.com> <CABa8R6u42VOJQDoUpdTC_8nAmEE3m0Y+D4xMFyCAaTRfyLj39w@mail.gmail.com> <7dbd9d27-83c9-2dc1-1ab9-8b585c9b87cb@gmail.com> <CABa8R6sOO_5RHZ0SHijLoASSz-HQbjvZkFLuHuXZ5yBXrKg5CA@mail.gmail.com>
From: Dave Crocker <dcrocker@gmail.com>
Message-ID: <cce52b44-a08d-dced-6dd9-869134d023d3@gmail.com>
Date: Mon, 23 Nov 2020 17:09:43 -0800
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.5.0
MIME-Version: 1.0
In-Reply-To: <CABa8R6sOO_5RHZ0SHijLoASSz-HQbjvZkFLuHuXZ5yBXrKg5CA@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------7719A0518F02E57CDBC66F2F"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/DpRtvWORzISIbW9WmRAr3VFgsA0>
Subject: Re: [dmarc-ietf] ARC questions
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Nov 2020 01:09:49 -0000

On 11/23/2020 4:13 PM, Brandon Long wrote:
>
>
> On Mon, Nov 23, 2020 at 12:48 PM Dave Crocker <dcrocker@gmail.com 
> <mailto:dcrocker@gmail.com>> wrote:
>
>     On 11/23/2020 12:15 PM, Brandon Long wrote:
>>     On Mon, Nov 23, 2020 at 11:53 AM Dave Crocker <dcrocker@gmail.com
>>     <mailto:dcrocker@gmail.com>> wrote:
>>     DKIM often ties a domain to reputation and other anti-spam
>>     features.  If you
>>     forward spam to another host and sign it while forwarding, then
>>     the other host
>>     will think you send spam.
>
>     Well, ummm... errrr... yes.  That's because, in such
>     circumstances, you do.
>
>     More significantly, the signature makes sure that such as an
>     assessment will only be made accurately, rather than penalizing
>     you for problematic mail that is attributed to you but that you
>     did not handle.
>
> If the result is marking all of the mail from that mailing list as 
> spam, then you've likely done your users a disservice.

Why would you put forward a hypothetical that might reasonably be 
characterized as unreasonable, especially given that you also make clear 
why it is unreasonable? (*)


> Being able to differentiate is useful.  Also, forwarders often don't 
> have all of
> the signals that the user's mailbox does.. not the least of which is 
> that different recipients have different judgements on what is spam, 
> and the "this is spam" signal rarely makes it back to the forwarder.

Except that mailing lists are also recipients, notably including likely 
history from authors, and possibly more history than a final recipient?

There are, of course, possible signals a final recipient might have 
about an author, that the mailing list won't have. Equally there might 
be others the list has that the final recipient doesn't, such as knowing 
about other mail from the author, to other lists the mailing list system 
operates...


>>     DMARC ties DKIM to the From header and at least is interpreted as
>>     being an
>>     anti-phishing feature.  DKIM signing mail that you forward could
>>     mean upgrading
>>     a phishing message to passing DMARC.
>
>     I don't understand.  The first sentence makes sense to me, but the
>     second doesn't.
>
>     "Upgrading...to passing DMARC only applies if a) the signature
>     matches the From: field domain, and b) that domain has an
>     associated DMARC record.  But if you don't watch DMARC to apply in
>     that case, what is the DMARC record there fore?
>
> I send a phishing message to a mailing list or alias at a domain with 
> a From header of that domain, and the list blindly
> re-signs all mail sent to the list, I've now "authenticated" the 
> spoofed message, and it will now "pass" DMARC.

There are so many different ways this represents really poor mailing 
list setup, operation and possibly design, I again wonder at your 
offering it as an example of any point relevant to this exchange.

It's not that what you suggest hasn't happened, it's that the fact that 
it represents multiple problems also suggests it can -- and probably 
should -- have multiple solutions.


> Perhaps it
> upgraded from a quarantine to none, since the mailing list doesn't 
> have the concept of a spam folder, or perhaps the sales@ team
> has decided they want all of the forwarded messages, even if probably 
> spam, so that they can go through them to make sure...
> but it lost the quarantine disposition on the forward when it gained 
> authentication.

More problematic hypotheticals, all of which arguably represent poor 
services, just as originators can be poorly run services.


>>     Perhaps this all means that DKIM has been used for more than it
>>     was intended for.
>
>     "More than" suggests that the use has legitimacy.  It doesn't.
>
> We don't always have control over how our work is used.

No, but we do have control over a) how we write about it, b) how we talk 
about it, and c) what we do about misuses of the work.

You appear to be taking the view that however others choose to interpret 
a specification is what the specification is for and how it operates.  
Except that that is only one -- and I'd argue highly problematic -- 
approach to misuses of a specification.


> If I proposed extending a standard in a new direction that would
> be perfectly fine with the original intent of the standard, and that 
> clashed with how the standard had come to be used in
> practice, my extension is DOA.

Possibly.  But not automatically.

For reference, note that 90+% of email is spam.  Does that mean that a 
proposal to counter that (inappropriate) use of email is DOA?  That 
seems to be the logic you've applied.


>     Forgive me but I think that:
>
>>         Authenticated Received Chain (ARC) creates a mechanism for individual
>>         Internet Mail Handlers to add their authentication assessment to a
>>         message's ordered set of handling results.
>
>     specifies a nature and responsibility pretty much identical to
>     what DKIM claims.  The enhancements are a) chaining, and b)
>     carriage of earlier assessments.  But in terms of
>     'responsibility', this reads the same as DKIM.
>
>
> I don't see how "claim some responsibility" is the same as "add their 
> authentication assessment".  I guess they are claiming
> responsibility for the assessment, but that's a very specific thing, 
> and not the "some [unknown] responsibility"

I cited assessment as a difference.  And yes, that's the only difference 
in responsibility.  Otherwise, it's just an authentication of having 
processed the message.


>>     and as different from DKIM so
>>     that it wasn't mistaken for the uses that people were already
>>     using DKIM for.
>     Oh?
>
>
> This was definitely a topic of discussion during the initial meetings 
> where we went from XOAR to ARC.

Sorry, I don't recall that.


d/


(*) https://en.wikipedia.org/wiki/Straw_man

-- 
Dave Crocker
dcrocker@gmail.com
408.329.0791

Volunteer, Silicon Valley Chapter
American Red Cross
dave.crocker2@redcross.org