Re: [dmarc-ietf] The DMARC WG has placed draft-crocker-dmarc-sender in state "Call For Adoption By WG Issued"

Doug Foster <fosterd@bayviewphysicians.com> Wed, 12 August 2020 21:37 UTC

Return-Path: <btv1==4930061004f==fosterd@bayviewphysicians.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 664CF3A0BEB for <dmarc@ietfa.amsl.com>; Wed, 12 Aug 2020 14:37:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=bayviewphysicians.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ROI63PKXPdNN for <dmarc@ietfa.amsl.com>; Wed, 12 Aug 2020 14:37:27 -0700 (PDT)
Received: from mail.bayviewphysicians.com (mail.bayviewphysicians.com [216.54.111.133]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AB24F3A0BEA for <dmarc@ietf.org>; Wed, 12 Aug 2020 14:37:27 -0700 (PDT)
X-ASG-Debug-ID: 1597267443-11fa311da69cf90001-K2EkT1
Received: from webmail.bayviewphysicians.com (smartermail4.bayviewphysicians.com [192.168.1.49]) by mail.bayviewphysicians.com with ESMTP id woDoHDmQA8n71E1P (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NO); Wed, 12 Aug 2020 17:24:03 -0400 (EDT)
X-Barracuda-Envelope-From: fosterd@bayviewphysicians.com
X-Barracuda-RBL-Trusted-Forwarder: 192.168.1.49
X-SmarterMail-Authenticated-As: fosterd@bayviewphysicians.com
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bayviewphysicians.com; s=s1025; h=message-id:subject:to:from; bh=xMaBp9XF/s8Xcqn3DfWhCTHkVvv2BJs/KYa4Ta7mI+o=; b=WJBQDyeW5fJOukkyhqyeWKr8Zj4LZ6oqgRwliAKF/pZ+AAhfxrIdPvsJqHsCeZcoX Unhhhf3gqVTyQ33NW8Zfba7G/Sns44k8UDonc4m5UUC2BwgVySTx1pjjVYI5+6h1v mwrb34sJ+g58Try08xx/yopN8jwMz00yk5tLqPkdE=
Received: from MSA189 (UnknownHost [192.168.2.194]) by webmail.bayviewphysicians.com with SMTP (version=TLS\Tls12 cipher=Aes256 bits=256); Wed, 12 Aug 2020 17:23:57 -0400
From: Doug Foster <fosterd@bayviewphysicians.com>
X-Barracuda-RBL-IP: 192.168.2.194
To: 'IETF Secretariat' <ietf-secretariat-reply@ietf.org>, draft-crocker-dmarc-sender@ietf.org, dmarc-chairs@ietf.org, dmarc@ietf.org
References: <159708630567.25939.3916026035849808234@ietfa.amsl.com>
In-Reply-To: <159708630567.25939.3916026035849808234@ietfa.amsl.com>
Date: Wed, 12 Aug 2020 17:23:57 -0400
X-ASG-Orig-Subj: RE: [dmarc-ietf] The DMARC WG has placed draft-crocker-dmarc-sender in state "Call For Adoption By WG Issued"
Message-ID: <000001d670ee$e38f8750$aaae95f0$@bayviewphysicians.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQLoc8w3YCX9iOF58uRWoNGn4EyX7acQ89gw
Content-Language: en-us
X-Exim-Id: 000001d670ee$e38f8750$aaae95f0$
X-Barracuda-Connect: smartermail4.bayviewphysicians.com[192.168.1.49]
X-Barracuda-Start-Time: 1597267443
X-Barracuda-Encrypted: ECDHE-RSA-AES256-SHA384
X-Barracuda-URL: https://mail.bayviewphysicians.com:443/cgi-mod/mark.cgi
X-Virus-Scanned: by bsmtpd at bayviewphysicians.com
X-Barracuda-Scan-Msg-Size: 9972
X-Barracuda-BRTS-Status: 1
X-Barracuda-Spam-Score: 0.00
X-Barracuda-Spam-Status: No, SCORE=0.00 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=9.0 tests=
X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.83863 Rule breakdown below pts rule name description ---- ---------------------- --------------------------------------------------
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/Ki83gk1hvKRCzii6S2fsFWIvCvU>
Subject: Re: [dmarc-ietf] The DMARC WG has placed draft-crocker-dmarc-sender in state "Call For Adoption By WG Issued"
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Aug 2020 21:37:29 -0000

-1
A vote against the proposal in the strongest possible  terms.

About the Analysis:

Quote
Internet mail defines the RFC5322.From field to indicate the author of the
message's content and the RFC5322.Sender field to indicate who initially
handled the message...  This was not a problem, until development of
stringent protections on use of the RFC5322.From field.  It has prompted
Mediators, such as mailing lists, to modify the RFC5322.From field, to
circumvent mail rejection caused by those protections.

Comment
The author fails to recognize that we have a single-author email
architecture.  Consequently, the last entity to alter the message IS the
author.  An altered message can be compared to a Hollywood movie that is
"inspired by real events."   The delivered message probably has a connection
to what the originator wrote, but the nature of that connection is unknown
to the recipient.   DMARC forces the true author (the mailing list) to take
ownership of its work by using a From address in its own domain. 

Quote
This affects end-to-end behavior of email, between the author and the final
recipients, because mail from the same author is not treated the same,
depending on what path it followed.  In effect, the RFC5322.From field has
become dominated by its role as a handling identifier.

Comment
This is factually wrong.  The path that a message follows has always been of
interest, because the reputation of each handler is relevant to the risk
associated with the received document.  DKIM signatures provided a
technology to address this problem.   If and only if a DKIM signature can be
verified, then the receiver can conclude that the path is irrelevant to
message risk.   For the problem at hand, messages are assumed to originate
with a valid signature, so path would not matter if the document was not
altered.   It is the mailing list action to alter the message which alters
the risk profile of the message, not the path followed. 

Document alteration is an inherently untrusted activity.  The ability to
make constructive changes is also the ability to make malicious changes.
The ability to make changes is also the ability to create entirely new
messages, because a new message could be fabricated to look like a forwarded
message if it was advantageous to an attacker to do so.   Mailing lists want
recipient systems to conclude that the mailing list will only make
constructive changes.   This is an administrative decision which cannot be
obtained from the document itself.   It must be obtained using an
out-of-band process, and it must be obtained from each recipient, or from
the originator domain using a process that each recipient domain will trust.
   
This document proposes a way for recipient domains to authorize exactly what
mailing lists wish to do.  The proposed protocol would grant that trust if
both originating and sending domains choose to participate.   But the stated
path sensitivity is a misrepresentation of the situation.

Quote
The current specification augments use of the RFC5322.From field, by
enhancing DMARC to also use the RFC5322.Sender field.  This preserves the
utility of RFC5322.From field while also preserving the utility of DMARC.

Comment
As we shall see, this proposal has the effect of rolling back DMARC, not
preserving it, for any domains that choose to enroll in it.

Quote
Because the current email protection behavior involves the RFC5322.From
field, and pertain to the human author, it is common to think that the
issue, in protecting the field's content, is behavior of the human
recipient.  However there is no indication that the enforced values in the
RFC5322.From field alter end-user behavior.  In fact there is a long train
of indication that it does not.  Rather, the meaningful protections actually
operate at the level of the receiving system's mail filtering engine, which
decides on the
disposition of received mail.

Comment
This assertion is based on the author's inability or unwillingness to
distinguish between an author identifier and a trust indicator about
authorship identifier.  The From address is an identifier which indicates
the entity which is supposedly responsible for the content.  The reliability
of that assertion is affected by whether the connection between the author
and the document can be verified by a mechanism such as DMARC.   A trust
indicator is a symbol or text phrase which indicates whether verification
has been successful or not.   As discussed in the WG, trust indicators have
some effect on user behavior, but not the dramatic effect one might hope
would occur.  This means that the user tends to believe that the From
address is valid, whether the trust indicator is present or not.  It does
not mean that the From address has no relevance to the user.   In general,
the user expects that the From address will be the Reply-To recipient.  A
user would be surprised and alarmed to reply to a message using the From
address, and then learn that the reply made no sense because the original
did not originate from the stated From address.

Just as importantly, the assertion is hypocritical.   The end-goal of this
proposal is to allow a mailing list to set the From address to a particular
value of its choosing, because the value of the From address is perceived as
very important to their user base.   Therefore, the reader is requested to
believe that the From address is, and should be, very important to mailing
list subscribers, while it is not, and should not be, important to anyone
else.


About the Proposed Protocol:

The proposal implements an unrestricted third-party signature delegation
mechanism.    

The proposal language obscures the fact that the original document's DMARC
validation occurs against the originator's domain, while the enhanced DMARC
validates only against the resender domain.  This change of reference is
necessary to achieve the intended goal for mailing lists, because the
list-altered message can only be authenticated using the mailing list
domain.   Since this arrangement is contrary to the design of DMARC or the
intent of the participating domain owner, it is not preserving the benefits
of DMARC at all.

Once a domain owner agrees to participate in this "enhanced" DMARC, anyone
can send messages "From" that domain, as long as the sender authenticates
itself using the Sender field and a corresponding DKIM signature.   These
requirements are trivial, and can be satisfied with minimal effort by any
sender, whether legitimate or malicious.    The combination of this
protocol, along with the enabling DNS entry, provides a guidebook to
spammers about how to successfully spoof the participating domain. 

Consequently, this configuration produces a result which is inferior to
operating with DMARC disabled.   Without DMARC, the receiving system
observes an "Not Verified" result, which tends to encourage a rigorous risk
assessment.   With this "enhanced" DMARC, the receiving system receives an
"Authorized" result, which tends to encourage a less skeptical risk
assessment.   In reality, an authorization which is available for us by
everyone is of no value to anyone at all.

Given that the "enhanced" DMARC removes the benefit that DMARC is designed
to provide, there is no reason for a domain owner to enroll in the enhanced
process, and no reason for a message recipient to accept the recommendations
produced by the enhanced process, since the enhanced process is inferior to
no process.   

In the working group, participants indicated that prior attempts to
implement controlled third-party signature delegation have been ignored or
rejected by domain owners.   If domain owners are uninterested in controlled
third-party signature delegation, why would they be interested in one that
has no controls?


About the Intended Benefits to the Mailing List

As if all of this were not enough, this proposal will not solve the Mailing
List problem even if it is implemented widely.   The proposal does not
provide a way for mailing lists to know if the recipient system has embraced
the "enhanced" DMARC or not.   As long as the implementation question is in
doubt, the mailing list would have to proceed on the defensive assumption
that DMARCv1 is still enforced.    This might produce the worst of all
possible results:   malicious sources use brute-force techniques to find and
attack those domains which accept the enhanced DMARC, while mailing lists
remain afraid to utilize the new scheme which they hoped would solve their
problem.


About Defending the Mailing List Identity

Mailing List Domains SHOULD implement DMARC to protect their subscribers.
Mailing lists such as the present one are easily spoofed, since the list is
only identified to the user by the list footer and the subject tag, both of
which are easily duplicated.    Any malicious source which has this
formatting information can produce a fake posting, apply a non-DMARC value
in the From address, and send it to any known subscribers.    The subscriber
will have no visible clues to indicate that it is not a legitimate post, and
the incoming email gateway would have no discernible reason to require that
the message come from an IETF server.  The spoof would succeed as long as
the malicious message was not blocked by a blacklist rule in the incoming
email gateway.

If Mailing List domains implement DMARC, replacing spoofed From addresses
with a list domain address, all submissions would become DMARC-verifiable
upon delivery, whether submitted by a DMARC-participating domain or not. 

There are several options for identifying the originator despite using the
list domain in the From address.   Some of these have been discussed in the
Working Group.


Summary

The proposal is without merit.

Doug Foster