Re: [dmarc-ietf] Second WGLC for draft-ietf-dmarc-psd: Definition of NP

"Douglas E. Foster" <fosterd@bayviewphysicians.com> Sat, 21 November 2020 23:12 UTC

Return-Path: <btv1==594755e43be==fosterd@bayviewphysicians.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8EAD73A0992 for <dmarc@ietfa.amsl.com>; Sat, 21 Nov 2020 15:12:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=bayviewphysicians.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d5zIvfdmtUzi for <dmarc@ietfa.amsl.com>; Sat, 21 Nov 2020 15:12:34 -0800 (PST)
Received: from mail.bayviewphysicians.com (mail.bayviewphysicians.com [216.54.111.133]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7218C3A0991 for <dmarc@ietf.org>; Sat, 21 Nov 2020 15:12:34 -0800 (PST)
X-ASG-Debug-ID: 1606000348-11fa313c0128540001-K2EkT1
Received: from webmail.bayviewphysicians.com (webmail.bayviewphysicians.com [192.168.1.49]) by mail.bayviewphysicians.com with ESMTP id HyGGM9asIXPZBxhV (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NO) for <dmarc@ietf.org>; Sat, 21 Nov 2020 18:12:29 -0500 (EST)
X-Barracuda-Envelope-From: fosterd@bayviewphysicians.com
X-Barracuda-RBL-Trusted-Forwarder: 192.168.1.49
X-SmarterMail-Authenticated-As: fosterd@bayviewphysicians.com
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bayviewphysicians.com; s=s1025; h=message-id:reply-to:subject:to:from; bh=ugb+59zLRk0SxzBa+s8qGHNk08bbTLW+FN8bJLQ/oYc=; b=HTclz90SKaZViiC6I7LiXXHCg12isEQpW3QjGbgnzqlrWCVDwYiojcpCiwD1EN/00 CR2w19gMbEvtaJg1BhhTnMZ5Dg51BOecnQWBHvwVxhL06RfBHEfy87PX1v301joDq LU6RHD822xgZw9W69geF73QmHfo9GalOcXAtILoYo=
From: "Douglas E. Foster" <fosterd@bayviewphysicians.com>
To: "dmarc@ietf.org" <dmarc@ietf.org>
Date: Sat, 21 Nov 2020 18:12:22 -0500
X-ASG-Orig-Subj: Re: [dmarc-ietf] Second WGLC for draft-ietf-dmarc-psd: Definition of NP
Reply-To: fosterd@bayviewphysicians.com
Message-ID: <52963338956e4396b746beccd2f0b78f@bayviewphysicians.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="bdb369a70840487b874da643964f1745"
In-Reply-To: <CAL0qLwYmRWwLOB7wnPBbChX-fZ3B2xFH5C_Bzh6qLZ9LiTzy5Q@mail.gmail.com>
References: <553D43C8D961C14BB27C614AC48FC03128116494@UMECHPA7D.easf.csd.disa.mil> <20201120040420.B3F4727A02FB@ary.qy> <553D43C8D961C14BB27C614AC48FC03128116528@UMECHPA7D.easf.csd.disa.mil> <000001d6bf45$0f62cc30$2e286490$@bayviewphysicians.com> <b6f2bf756f9146daafa717c2645ed58d@bayviewphysicians.com> <CAL0qLwYmRWwLOB7wnPBbChX-fZ3B2xFH5C_Bzh6qLZ9LiTzy5Q@mail.gmail.com>
X-Exim-Id: 52963338956e4396b746beccd2f0b78f
X-Barracuda-Connect: webmail.bayviewphysicians.com[192.168.1.49]
X-Barracuda-Start-Time: 1606000349
X-Barracuda-Encrypted: ECDHE-RSA-AES256-SHA384
X-Barracuda-URL: https://mail.bayviewphysicians.com:443/cgi-mod/mark.cgi
X-Barracuda-BRTS-Status: 1
X-Virus-Scanned: by bsmtpd at bayviewphysicians.com
X-Barracuda-Scan-Msg-Size: 20595
X-Barracuda-Spam-Score: 0.00
X-Barracuda-Spam-Status: No, SCORE=0.00 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=9.0 tests=HTML_MESSAGE
X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.86032 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- 0.00 HTML_MESSAGE BODY: HTML included in message
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/FYlmEWEphs9I44zv_DqxkEI2pd4>
Subject: Re: [dmarc-ietf] Second WGLC for draft-ietf-dmarc-psd: Definition of NP
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Nov 2020 23:12:37 -0000

What are the complications to DMARC of tolerating unregistered domains?

- If unregistered domains are tolerated, PSD for DMARC helps address the problem of a unauthorized domains underneath a public suffix, such as "example.uk".  But what DMARC policy will solve the problem of an invalid TLD, such as "example.q"?

- If unregistered domains are tolerated, then a limited-scope tree walk becomes unusable.   A spammer would be able to  fabricate a few levels of non-existent subdomains, and suddenly PayPal.com becomes a domain tree with no detectable DMARC policy.   Besides, a scope-limited tree walk conflicts with the requirements of PSD for DMARC.   An unlimited-scope tree walk has performance risks to both the evaluator and the DNS infrastructure.

Doug Foster

----------------------------------------

From: "Murray S. Kucherawy" <superuser@gmail.com>
Sent: 11/21/20 2:12 PM
To: Doug Foster <fosterd@bayviewphysicians.com>
Cc: Doug Foster <fosterd=40bayviewphysicians.com@dmarc.ietf.org>, IETF DMARC WG <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Second WGLC for draft-ietf-dmarc-psd: Definition of NP

On Sat, Nov 21, 2020 at 9:02 AM Douglas E. Foster <fosterd=40bayviewphysicians.com@dmarc.ietf.org> wrote:

Restating what we all know:
- The Internet is dependent on the reliable operation of the DNS name system.
- The DNS name system is dependent on the reliable operation of the name registration processes.
- The registrars are given ownership of all unregistered domain names within their portion of the hierarchy.
- The public evidence of registration is the existence of a DNS entry, and a NS record is always the first one configured. 

Conclusions
- Unregistered use of any domain name is an attack on the architecture of the Internet.
- PSD for DMARC is asking us to give public suffix operators what they are supposed to already have:   control over unregistered names.
- We should implement new and universal policies:- Unregistered names used as SMTP addresses MUST generate SPF FAIL and SHOULD be rejected.

That is certainly a defensible assertion, but I would claim it is out of scope for DMARC.  You're talking about a detail of SPF or perhaps of SMTP in general, although one could also even argue that this is a local policy decision and outside the scope of those protocols.  I suspect the SMTP greybeards would claim that this is not part of SMTP, but rather an enforcement choice made by implementations.

I believe this falls within the realm of what the IETF calls an Applicability Statement, which would be a standards track document (if you could get consensus for it).  You could also include this in the DMARC usage document, or as non-normative advice in DMARC itself with an explanation of why it's a good idea, if you can develop consensus to do so.

You also need to account for transient DNS outages.  If your resolver temporarily thinks "gmail.com" doesn't exist, you will bounce all mail coming from that domain, and you might seriously piss off your users.  There's a backscatter problem here too: If I send mail to a list you're on and you temporarily think my domain doesn't exist and you bounce mail coming from me, the list will unsubscribe you.
- Unregistered names used as message From header addresses MUST generate DMARC FAIL and SHOULD be rejected.

This is more in scope for DMARC discussions, though also arguably outside of the protocol itself, for the same reasons.  I would suggest that it's a viable discussion for the DMARC usage document, whenever we get around to working on that again.  But you could certainly test the working group opinion on this point.

Protecting the integrity of the name registration system is not an optional activity to be implemented by a few organizations with the most sophisticated implementations of the DMARC specification.   It should be a mandatory duty of every legitimate participant on the network.

Starting from the assumption that unregistered domains might be allowable creates many problems when trying to design solutions for protecting the names that are registered.   This assumption needs to be rejected.

These are both probably true statements, but is DMARC the right place to wage this battle?  For example, isn't it also true for TCP connections for which PTR records make false claims (or no claim)?

Addressing some straw-man questions:
Q:  The idea is fine for public suffixes, but my organization doesn't need to do that for subdomains under its control.
A:  Every level of the DNS tree needs coordination of name usage.    Publishing an NS record for an organization subdomain proves that the organization's process has been followed.   Besides, the boundary between public suffixes and organizational domains is imprecise, so recipients cannot be expected to apply differential expectations.

I still don't understand what the presence or absence of NS tells you that the presence or absence of MX/A/AAAA doesn't.  If you have a message that fails the latter test but passes the former, does that change your handling decision?  If not, why do it?

Q. How do we get all incoming filters to change to default block for unregistered domain names?
A.  I would suggest using the CVE/CCE process.

That seems like a big hammer, and certainly outside of the IETF's purview.  We're not the protocol police.  You might try having this discussion in a context like M3AAWG though; many large operators congregate there to discuss stuff like this.

-MSK