Re: [dmarc-ietf] Additions to draft - Security Considerations

Alessandro Vesely <vesely@tana.it> Tue, 26 April 2022 16:51 UTC

Return-Path: <vesely@tana.it>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87011C13A8C2 for <dmarc@ietfa.amsl.com>; Tue, 26 Apr 2022 09:51:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.953
X-Spam-Level:
X-Spam-Status: No, score=-8.953 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-1.857, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=tana.it header.b=+cE+kfXA; dkim=pass (1152-bit key) header.d=tana.it header.b=CqKCaq2m
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j10giEZ2jugY for <dmarc@ietfa.amsl.com>; Tue, 26 Apr 2022 09:51:50 -0700 (PDT)
Received: from wmail.tana.it (wmail.tana.it [62.94.243.226]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ADEA2C13A8D4 for <dmarc@ietf.org>; Tue, 26 Apr 2022 09:50:15 -0700 (PDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=tana.it; s=epsilon; t=1650991809; bh=uUbR1MzRHaA8JM+fTtuxpLTDifQyzWW810vG72Opqzk=; h=Date:Subject:To:References:From:In-Reply-To; b=+cE+kfXA++bF4FG5/9ULcWkf7PYspZAPVZAM8QrwOZH5FtogAUpqnjhspy7hAHI0M Etv7u5hS9PZsai5c2+kDg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tana.it; s=delta; t=1650991809; bh=uUbR1MzRHaA8JM+fTtuxpLTDifQyzWW810vG72Opqzk=; h=Date:To:References:From:In-Reply-To; b=CqKCaq2muYdJamcEnNfHDqO6rczGt8JAHZf7SZAoBZBc+gOOTdfz3sZ3Bz/zTEqib 4Zr90JHXikaabsTaj04HFRjV4Mm9X42QBwU+JBLV2wdiH+NhmgFo8S+BCaGVwgYamu YVLFTc5Gjxe0ptNnsOqI+ieVuTuMQ5JVUvysWL1azwALm1zg/uVatljbrWcTW
Author: Alessandro Vesely <vesely@tana.it>
Received: from [172.25.197.111] (pcale.tana [172.25.197.111]) (AUTH: CRAM-MD5 uXDGrn@SYT0/k, TLS: TLS1.3, 128bits, ECDHE_RSA_AES_128_GCM_SHA256) by wmail.tana.it with ESMTPSA id 00000000005DC0D1.00000000626822C0.00003BE4; Tue, 26 Apr 2022 18:50:08 +0200
Message-ID: <f56d41a4-86e0-e195-dd0c-32189fca61c8@tana.it>
Date: Tue, 26 Apr 2022 18:50:08 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.7.0
Content-Language: en-US
To: dmarc@ietf.org
References: <CAH48Zfz5MWDuQa1DJQE_YK9gAUL4P-se4CeGAGYCf+c6D0ysaA@mail.gmail.com> <2934216.d6BrxOLGqM@zini-1880> <83b5228b-adca-3a5d-3056-3ec5befa634b@tana.it> <FC08B97A-500B-4341-AF45-B9D93F432786@kitterman.com>
Authentication-Results: tana.it; auth=pass (details omitted)
From: Alessandro Vesely <vesely@tana.it>
In-Reply-To: <FC08B97A-500B-4341-AF45-B9D93F432786@kitterman.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/J04g2H0X7y4ammwQosDEyLs95TE>
Subject: Re: [dmarc-ietf] Additions to draft - Security Considerations
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2022 16:51:56 -0000

On Tue 26/Apr/2022 14:53:27 +0200 Scott Kitterman wrote:
> On April 26, 2022 8:06:50 AM UTC, Alessandro Vesely <vesely@tana.it> wrote:
>>On Mon 25/Apr/2022 05:56:46 +0200 Scott Kitterman wrote:
>>> 
>>> How about something like this:
>>> 
>>> 9.7 Determination of the Organizational Domain For Relaxed Alignment
>>> 
>>> DMARC evaluation for relaxed alignment is highly sensitive to errors in the
>>> determination of the organizational domain if the RFC5322.From domain does not
>>> have a published policy.  If an incorrectly selected organizational domain is
>>> a parent of the correct organizational domain, then relaxed alignment could
>>> potentially allow a malicious sender to obtain DMARC PASS.  This potential
>>> exists for both the legacy [RFC 7489] and current [Section 4.8] methods for
>>> determining the organizational domain.
>>
>>
>>I object that this text undermines the robustness of the protocol and may sound like a campaign for strict alignment.  Relaxed alignment is safer from a flexibility POV, as it accounts for occasional @hostname.example.com.  It has played a relevant role in DMARC success, and it's not by chance the default.
>>
>>Here's an alternative text:
>>
>>    DMARC evaluation for relaxed alignment is sensitive to errors in the
>>    determination of the organizational domain due to erroneous DNS settings by
>>    either the organizational domain or its PSD parent.  If the PSD parent is
>>    incorrectly selected as organizational domain, then relaxed alignment can
>>    potentially allow a malicious sender to obtain DMARC PASS while
>>    impersonating the relevant organization.  This potential exists for both
>>    the legacy [RFC 7489] and current [Section 4.8] methods for determining the
>>    organizational domain.
>>
>>
>>> This issue is completely avoided by use of strict alignment and publishing
>>> DMARC records for all domains/sub-domains used as RFC5322.From domain in an
>>> organization's email.
>>
>>
>>   or by publishing psd=n.
>>
>>
>>> For cases where strict alignment is not appropriate, this issue can be
>>> mitigated by periodically checking the DMARC records, if any, of PSDs above
>>> the organization's domains in the DNS tree and (for legacy [RFC 7489] checking
>>> that appropriate PSL entries remain present).  If a PSD domain publishes a
>>> DMARC record without the appropriate psd=y tag, organizational domain owners
>>> can add psd=n to their organizational domain's DMARC record so that the PSD
>>> record will not be incorrectly evaluated to be the organizational domain.
>>
>>
>>The latter alternative is obviously easier than monitoring the DNS settings of the PSD parent, and has to be carried out anyway in case.
> 
> What specifically do you object to?


A quick skim through your text seems to be summarizable as "DMARC has a defect 
but you can overcome it by using strict alignment".  I know that's not what you 
meant, but it sounds quite like that.


> Do you think it's inaccurate that this concern is limited to relaxed alignment?


No, I think it's wrong to blame relaxed alignment.


> The specific suggestion you added (or by publishing psd=n) is already in the text later on, so I'm not understanding what you think the problem is or what you want to do about it?


The alternative text above differs slightly from the first paragraph of the 
text you proposed, in an attempt at watering down that meaning.


Best
Ale
--