Re: [dmarc-ietf] Ticket #61 - Define and add a simplified (redacted) failure report

Jesse Thompson <jesse.thompson@wisc.edu> Wed, 09 December 2020 23:48 UTC

Return-Path: <jesse.thompson@wisc.edu>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 82CE63A0651 for <dmarc@ietfa.amsl.com>; Wed, 9 Dec 2020 15:48:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, MSGID_FROM_MTA_HEADER=0.001, NICE_REPLY_A=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=wisc.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u5ICU2kUv6Kg for <dmarc@ietfa.amsl.com>; Wed, 9 Dec 2020 15:48:18 -0800 (PST)
Received: from wmauth1.doit.wisc.edu (wmauth1.doit.wisc.edu [144.92.197.141]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 80A2E3A064A for <dmarc@ietf.org>; Wed, 9 Dec 2020 15:48:18 -0800 (PST)
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (mail-bn7nam10lp2103.outbound.protection.outlook.com [104.47.70.103]) by smtpauth1.wiscmail.wisc.edu (Oracle Communications Messaging Server 8.0.2.4.20190812 64bit (built Aug 12 2019)) with ESMTPS id <0QL3000SKJGGLW30@smtpauth1.wiscmail.wisc.edu> for dmarc@ietf.org; Wed, 09 Dec 2020 17:48:17 -0600 (CST)
X-Wisc-Env-From-B64: amVzc2UudGhvbXBzb25Ad2lzYy5lZHU=
X-Spam-PmxInfo: Server=avs-1, Version=6.4.7.2805085, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2020.12.9.233918, AntiVirus-Engine: 5.79.0, AntiVirus-Data: 2020.11.17.5790001, SenderIP=[104.47.70.103]
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ig+0YbQH6OSk29tUqd+2ISAcFN/v6YFBZmr15mJq1gByRZr61KZZTe9t5O/Fr+Zjb7wQ8Bfa39nbIv6+Rsecn39BKFzASJC2FxNv3C7bYjmopvJlmMps/jf06QbASF4rZGF/2A/9pPCsKj6Zb5bOcIFpeCfkE4N+fB9pug09CCDYuo/u7zMzuGDxHbFlm3m1feDC5qBc9Mtw6UCe1VN/BKOq0cMhIUWCcIU1cRBAh2Cwoomn6zO5Kc39UaOJ8gK7CwIr3kGMWZXSrc7bSbXK0B7RHi0ecMV6QWF5TcWMJgxQD/VpsTCy4RVjV4rjezBkCAFcQCnkiTeF+lAUkm0k4w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=j3PTzX2Y0cqjNICgonblMb67wdMl+2EntP0N3F7obIo=; b=QbUCkN9MD6pspn7qOmJ4sIgaYFfkJAppUGntUS2u1C10cKZQ0Ei+6axXX4IF+6W79bVQhX5aIvyAttOMsaCToWKXAww4tJFDMJP75yMgRs0OtzWoaGziy4TRVM+96gFcwj746fyNiWDg16Uquvui7/z2lXfGM74D2zfA4sKV+wn6RSYRKKSUIDKwyBhmsSHdzCK+2RpK47ABQI6Ij+fB825eUrTwcJQSBjW5R/vHY+zI1wpniUrETGogxcwy1aGUDjZVWp0F9GDzdKOKfZ0dWVFfY4qQSYyOHrN30LFtfxK8L1FFajAdSVRolP/EAoXkKPjHFKeyDlyAiUzuPlYLoA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=wisc.edu; dmarc=pass action=none header.from=wisc.edu; dkim=pass header.d=wisc.edu; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=wisc.edu; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=j3PTzX2Y0cqjNICgonblMb67wdMl+2EntP0N3F7obIo=; b=RdynMT5dKb2+eZYGtdd3EjlprUwYYdbsNE0zxgtiS3XqCyOziQ1YqlPgY57SI+UrqdfyJMRAUsQtnj6y/wC4nmbySYOmI0mF2sxP38nRpKi6AOdQTfm8iya1QtAwW0AHQWfcGiKZdkcxJ1IKBRKjrAH6EiCjtqjOtRXeYv6ECb0=
Received: from PH0PR06MB7061.namprd06.prod.outlook.com (2603:10b6:510:21::8) by PH0PR06MB7654.namprd06.prod.outlook.com (2603:10b6:510:53::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.12; Wed, 9 Dec 2020 23:48:15 +0000
Received: from PH0PR06MB7061.namprd06.prod.outlook.com ([fe80::51ec:c9cd:3511:1bcc]) by PH0PR06MB7061.namprd06.prod.outlook.com ([fe80::51ec:c9cd:3511:1bcc%6]) with mapi id 15.20.3632.021; Wed, 9 Dec 2020 23:48:15 +0000
To: dmarc@ietf.org
References: <609e1c9b-cc4d-d7d1-0fa8-79f515c1eee4@tana.it>
From: Jesse Thompson <jesse.thompson@wisc.edu>
Message-id: <5b50a8ee-8f35-8ca1-b03d-eb4f8e697108@wisc.edu>
Date: Wed, 09 Dec 2020 17:48:12 -0600
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.5.0
In-reply-to: <609e1c9b-cc4d-d7d1-0fa8-79f515c1eee4@tana.it>
Content-type: text/plain; charset="utf-8"
Content-language: en-US
Content-transfer-encoding: 8bit
X-Originating-IP: [47.12.96.133]
X-ClientProxiedBy: CH2PR14CA0044.namprd14.prod.outlook.com (2603:10b6:610:56::24) To PH0PR06MB7061.namprd06.prod.outlook.com (2603:10b6:510:21::8)
MIME-version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
Received: from [10.0.2.111] (47.12.96.133) by CH2PR14CA0044.namprd14.prod.outlook.com (2603:10b6:610:56::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.12 via Frontend Transport; Wed, 9 Dec 2020 23:48:14 +0000
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: dfb1b734-604e-4902-f511-08d89c9ce5c6
X-MS-TrafficTypeDiagnostic: PH0PR06MB7654:
X-Microsoft-Antispam-PRVS: <PH0PR06MB76544588AE92D7F8F02B2EBFF6CC0@PH0PR06MB7654.namprd06.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:9508;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: EUZxmYfAEg356Fq1uPLXHUD8lCpq6KG5MgQNQPvnt15E68YukgqXWNsTfy3AZMJUd/OO0ji8JKVeapwiZXh0m357NZDqqZPqvAGydQgDABht4VLtRF7TcWPNwmgXpXPhZgJvAZ5+X7xs12hfKeztCAliBtgouio9T82Tr+7SphBM/pTxXZDIhWNbfcEl3yHMvIqJJOVrpsO4tXx4jx4Buj1N6oX8FBvbZATG7PTZ+2vHycTHwytO8FqBFwC0IEIQ75Q5M6QHo1iy0o2oG6byA9+TgU1ZA7dsrNA0+jCH1wlv4UjbktQv5txB+1+kIdTDR4lSXAU7zhiZprr7uui+eBxVRtsadvwOJjRygIbZov9ExB/Cchp4ca6PydINhIhbpLXwThT/QjawsgihGIf6jENUwHSKUM2WNCcYnD6W/HM=
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR06MB7061.namprd06.prod.outlook.com; PTR:; CAT:NONE; SFS:(376002)(346002)(136003)(366004)(186003)(26005)(2906002)(86362001)(16526019)(36756003)(75432002)(2616005)(66556008)(66476007)(956004)(66946007)(31696002)(31686004)(5660300002)(8936002)(6486002)(44832011)(8676002)(6916009)(786003)(508600001)(66574015)(16576012)(53546011)(83380400001)(45980500001)(43740500002); DIR:OUT; SFP:1101;
X-MS-Exchange-AntiSpam-MessageData: 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
X-OriginatorOrg: wisc.edu
X-MS-Exchange-CrossTenant-AuthSource: PH0PR06MB7061.namprd06.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Dec 2020 23:48:15.5244 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 2ca68321-0eda-4908-88b2-424a8cb4b0f9
X-MS-Exchange-CrossTenant-Network-Message-Id: dfb1b734-604e-4902-f511-08d89c9ce5c6
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: mcQA43bcx+43n40R1lGRSNOaW4TOKJweBivEYLv7ztiHHGfxqTExVtqzFZ6g/L/xWRuVYzxm05ugQBMGteUpXg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR06MB7654
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/EAFWES2J0536ccQ_AGDnLnijXVI>
Subject: Re: [dmarc-ietf] Ticket #61 - Define and add a simplified (redacted) failure report
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Dec 2020 23:48:21 -0000

On 12/9/20 11:07 AM, Alessandro Vesely wrote:
> We would like to close this ticket by Dec 23, two weeks from now, so please get on it.
> 
> The ticket text is:
> 
>     It has been asked for a new report type (perhaps a subset of failure
>     reports) that provides minimal data from the email (specifically, the
>     initial ask is for the to: and from: email addresses only) in order to aid
>     identification of the email's destination (and hence, the owner who can
>     help with getting it authenticated) without providing other PII.
> 
>     This is a significant use case for large organizations, where the
>     departments or other sub-organizations run their own emailing
>     infrastructure. This has been specifically requested by multiple
>     universities.
> 
> 
> DMARC failure reporting is based on Authentication Failure Reporting Using the Abuse Reporting Format (RFC 6591), which in turn is based on An Extensible Format for Email Feedback Reports (RFC 5965).  DMARC adds five fields for the second MIME part of the report.  The third part can be either the full message of just the rfc822-headers.  The latter is defined in The Multipart/Report Media Type for the Reporting of Mail System Administrative Messages (RFC 6522), which mentions that Received: fields can also be useful for diagnosing failures.  In any case, private data such as the local part of email addresses can be redacted according to Redaction of Potentially Sensitive Data from Mail Abuse Reports (RFC 6590).
> 
> In order to be useful, reports should contain enough data to discern whether the failed message was abusive, and what stream does it belong to if it wasn't.  Should DMARC Failure Reporting (our document) include some guidance about what parts of the failed message to include and which ones to redact?

During our DMARC deployment (and even today) I was frustrated that I could see from aggregate reports that an ESP (or some other type of hosting provider whereby the IP address alone wasn't identifiable enough) was using our domain, but I didn't know who within our organization was a customer of the ESP.  Ultimately, I wanted to reach out to the customer and set them up with a subdomain to use with the ESP so they could send branded and DMARC SPF&DKIM-aligned email.  Asking the ESP who they're allowing to use our domain was a dead-end because they considered that private customer information (irony!) and they're naturally inclined to make their customers happy by tolerating the use of the domain without complicating matters that may result in possibly losing the customer.

Forensic reports are a useful mechanism to find examples of these messages and subsequently track down the customer on our end.  Usually, seeing the local part of the address used in the From header (maybe coupled with the Subject) was enough information.  I did struggle with the needle-haystack problem with these reports.  It was challenging to find what I was looking for, and it was challenging to create a process for going through all of the reports in any meaningful way.  Perhaps I didn't really find the right tool for the job, or perhaps the problem wasn't large enough for me to justify finding/developing the right tool.

Alternatives:

- Assuming that all ESPs were cooperative to inquiries from domain owners, and there was a consistently-used internal identifier that could be referenced that doesn't directly disclose publicly identifiable information about the customer, then that might be all of the forensic information that I would need.  But fall back to From/Subject, otherwise.  

- SPF macros can be constructed such that the envelope information is sent back to the domain owner via DNS queries.  This tactic is handy only if there is something identifiable in the local part of the return path.  The downside to this tactic is that you're spraying unencrypted identifiable information across the internet.

I guess that I'm leaning towards encouraging redacted reports with some minimally identifiable information.  The reporters still have the option to not send reports (or redact however they see fit), and domain owners have the option to not request reports if they are concerned about privacy.  

The potential downside to not having failure reports at all is that potentially less secure/private mechanisms may be adopted due to demand (such as SPF macros, sketchy data warehousers, etc). 

I did purposefully ignore the use case for using DMARC failure reports to track direct domain abuse, which I assume is a valid use case and should be considered in more depth.  I just don't have a direct experience using that data in any meaningful way.  Perhaps it could be used in a way that articulates the *actual* amount of direct domain spoofing being used by malicious actors, as opposed to aggregate reports which only gives you IP addresses (which may be enough if cross referenced with reputation lists).  Obviously, if you rely on the full details of the failure report to build anti-spam heuristics, then you wouldn't want the reports redacted.  But if you are in that business, I assume that spam traps work better anyway.

>From the original ticket, I am failing to completely understand why "aid identification of the email's destination" is more useful than identifying the [true] origin.  I suppose it could be useful for organizations who want to validate the use case (make sure they aren't sending unsolicited messages, etc) before adding another server to SPF (without talking to them?).  That's just not something we do, since we have a Holy Roman Empire and let people do whatever they want with their own subdomains.

Jesse