Re: [dmarc-ietf] ARC-Seal is meaningless security theatre

Brandon Long <blong@fiction.net> Fri, 18 August 2017 18:51 UTC

Return-Path: <blong@fiction.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C7CE81321A1 for <dmarc@ietfa.amsl.com>; Fri, 18 Aug 2017 11:51:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fiction.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A0dmbt-HoDII for <dmarc@ietfa.amsl.com>; Fri, 18 Aug 2017 11:51:43 -0700 (PDT)
Received: from mail-vk0-x235.google.com (mail-vk0-x235.google.com [IPv6:2607:f8b0:400c:c05::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D6E09126CB6 for <dmarc@ietf.org>; Fri, 18 Aug 2017 11:51:42 -0700 (PDT)
Received: by mail-vk0-x235.google.com with SMTP id r199so35058619vke.4 for <dmarc@ietf.org>; Fri, 18 Aug 2017 11:51:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fiction.net; s=google; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=wijAY5HgF6TtlfpCzWG5TdkPIRIFUJychXLSS1ilC2E=; b=J+ZgCMBQbDmGX+/n+dv4cbs3rf+ygMs0xFKMeaGJVyjLC23nnALCVym/tNccuP7hfn Mhaf62fRLI0su43UySO6kSsQMq96AWbykIAtyB80mG6vw3N1UVmCc6DzM+tf+E7GVg3O QjJ5aCXyl41n/vj8xwQx+f/tGTPLJGBUaja1/hNKNzp34OiztQeudDLL3I6P3dm6uNU/ hGvMPt9mJnDir7CcQaS1++mpRjffQxB8Fx4xZH+lMkEE6BAZ4ZTnikhULG7+PZpmaor0 t0ebZWClQZM3oDvx7hlTTkczco65tm2qN7/YeC5b/YjbDdJkDvTlyScrecapUhAwKeJA kZdA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=wijAY5HgF6TtlfpCzWG5TdkPIRIFUJychXLSS1ilC2E=; b=Xayhz1UYJtmOCsoO2ULbuoTHQtRmNtOscVPwn2KlWOuMuNvT0h66BBtIgOa6aCLthR 4sew2rcA1RRjJ+F2LpvoFSaTkqkm8F/aKsPpOd/tE5L/Mlfx+K2cagrfD7A4PEjB8kFt PnkcZAwunf27/mUh5SnErswGQOBF0v+nr9XZGvO29bLV+/b/x5BJm7Pou4bSUsDcC29+ aFtn8Xqg6sZE6w32Abc61KSMq2T1LWjMOxSH8qmSDgUe7eQ4k2Zg1arYp7Js78IGmh5+ uEdzqKSEEr1eOqbUuor/MsU/3MRVzcKW6lBISZuDpsiXi5Tc7iihKeCzkBJ3w+rZ2UA0 Qblg==
X-Gm-Message-State: AHYfb5gXfVPVWTSd7tThN/EE1MOSqn4EFzYI7dORmWPIK8uENWPXahRs cJ7QtT2DejXiqMqQ+dM=
X-Received: by 10.31.58.138 with SMTP id h132mr6109074vka.105.1503082301791; Fri, 18 Aug 2017 11:51:41 -0700 (PDT)
Received: from mail-vk0-f41.google.com (mail-vk0-f41.google.com. [209.85.213.41]) by smtp.gmail.com with ESMTPSA id o85sm1312414vkd.24.2017.08.18.11.51.40 for <dmarc@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 18 Aug 2017 11:51:41 -0700 (PDT)
Received: by mail-vk0-f41.google.com with SMTP id j189so35058257vka.0 for <dmarc@ietf.org>; Fri, 18 Aug 2017 11:51:40 -0700 (PDT)
X-Received: by 10.31.14.146 with SMTP id 140mr5980890vko.69.1503082300652; Fri, 18 Aug 2017 11:51:40 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.103.135.139 with HTTP; Fri, 18 Aug 2017 11:51:39 -0700 (PDT)
In-Reply-To: <CAD2i3WPuiMw6Gbdw0E+Gh=yNDfNjECMrqLHKPUspq_h6dnpbnA@mail.gmail.com>
References: <1502083287.2191248.1065195288.7CDC7FF3@webmail.messagingengine.com> <CABuGu1oTMbuLd4yTwecu5sKFnsmH+HiwT1FG=JpySYHzpMTx_w@mail.gmail.com> <1502200759.3946686.1066841264.607B4D0B@webmail.messagingengine.com> <2720431.u3G7bbkkxK@kitterma-e6430> <1502317564.1935379.1068588344.040173AF@webmail.messagingengine.com> <a08c7590-ded3-1642-4ffc-07848b3c6cd2@gmail.com> <e14f2130-6f00-4ef1-485b-850a4cc1c48c@gmail.com> <1502495646.4099176.1070896040.2B09B1F8@webmail.messagingengine.com> <166070f0-4ba1-70da-1f73-885b4a7f7640@gmail.com> <1502497178.4103451.1070917304.23DD466D@webmail.messagingengine.com> <598F9484.7020700@isdg.net> <CABuGu1p=oLfLRkuoaDHoz3Cv3_FrURdsFPzkac7jNzBpqBmiSg@mail.gmail.com> <599484FB.9050908@isdg.net> <1502929303.4038704.1075868960.5D80A788@webmail.messagingengine.com> <CAD2i3WN_bmDgmQBw3pnyu7vWJJM2Kzwgru87VhK=NA_H91B+og@mail.gmail.com> <1502930858.4042926.1075890568.5069945B@webmail.messagingengine.com> <CABuGu1ofdkP6Gdsfin6KfpiTJW39gXz8Fa0iAAmXfcvyWGZxdA@mail.gmail.com> <CAD2i3WPuiMw6Gbdw0E+Gh=yNDfNjECMrqLHKPUspq_h6dnpbnA@mail.gmail.com>
From: Brandon Long <blong@fiction.net>
Date: Fri, 18 Aug 2017 11:51:39 -0700
X-Gmail-Original-Message-ID: <CABa8R6u_U8Z5nkPkUMWTg5jWBXKASnq6Z4z+v=nOZr7unKKhuQ@mail.gmail.com>
Message-ID: <CABa8R6u_U8Z5nkPkUMWTg5jWBXKASnq6Z4z+v=nOZr7unKKhuQ@mail.gmail.com>
To: Seth Blank <seth@sethblank.com>
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="001a1145512099e25605570b9e42"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/KLUY9mq3Oi9LdFkQdJ0S0j46k2k>
Subject: Re: [dmarc-ietf] ARC-Seal is meaningless security theatre
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Aug 2017 18:51:46 -0000

On Fri, Aug 18, 2017 at 10:00 AM, Seth Blank <seth@sethblank.com> wrote:

> On Thu, Aug 17, 2017 at 11:46 PM, Kurt Andersen <kurta@drkurt.com> wrote:
>
>> So I was able to retrace our design steps which led to the 3-piece model
>> (AAR + AMS + AS) and the reasoning for the AS, signing just the ARC header
>> sequence was to provide the verifiable chain of custody trace (though, of
>> course, only from participating intermediaries). Some of the recent tweaks
>> to the spec to deal with malformed sets of ARC header fields have weakened
>> that original idea.
>>
>> In keeping with Bron's general idea to simplify, I'd suggest that having
>> an AAR + [optional AMS] + AS would be a close approach for handling steps
>> which do not break the ingress signature. Skipping the AMS would be a sign
>> to downstream intermediaries that the prior DKIM or AMS was still valid
>> upon egress. (certain details would have to be worked out)
>>
>> Does that help the conversation?
>>
>
> No, I think this is a huge step in the wrong direction.
>
> Right now, we've got deployed code that we know works and improves the
> landscape. Everything else is - rightly or wrongly - conjecture.
>
> Let's keep the tech stable and move to experimentation.
>
> If anything, this is an excellent question for receivers - when evaluating
> AMS/AS, were there any situations where you required both signatures to
> truly validate a chain and make a delivery decision, or with the added ARC
> payload is now just having one sufficient?
>

I'm leary that removing the AMS on certain hops is the right choice, here.
Without the AMS, the extra AAR/AS is not tied to this message directly, so
I'm unsure how to handle any assertions made in the AAR.  This also feels
like the opposite of what Bron is asking for.

I also proposed a month or so back some simplifying changes which were
largely met with radio silence, that would have partially mitigated some of
Bron's operational concerns, notably to either require the s/d be the same
on AS/AMS or to eliminate the signature and s/d on AMS completely,
switching the AMS to a hash that would then be covered by the AS.  That
doesn't reduce the number of crypto ops as much as his AMS only based
proposal (which presumably would halt at the first broken AMS).

Another option would be to change our expectations, that is to say that
signing by non-modifying hops is optional.

Brandon