Re: [dmarc-ietf] ARC questions
Brandon Long <blong@google.com> Tue, 24 November 2020 00:13 UTC
Return-Path: <blong@google.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 8D22F3A1290
for <dmarc@ietfa.amsl.com>; Mon, 23 Nov 2020 16:13:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.699
X-Spam-Level:
X-Spam-Status: No, score=-15.699 tagged_above=-999 required=5
tests=[DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5,
HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001,
URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5,
USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key)
header.d=google.com
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id Ckv9ppY3YE-J for <dmarc@ietfa.amsl.com>;
Mon, 23 Nov 2020 16:13:47 -0800 (PST)
Received: from mail-vs1-xe34.google.com (mail-vs1-xe34.google.com
[IPv6:2607:f8b0:4864:20::e34])
(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id B386F3A1260
for <dmarc@ietf.org>; Mon, 23 Nov 2020 16:13:47 -0800 (PST)
Received: by mail-vs1-xe34.google.com with SMTP id y73so10145484vsc.5
for <dmarc@ietf.org>; Mon, 23 Nov 2020 16:13:47 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025;
h=mime-version:references:in-reply-to:from:date:message-id:subject:to
:cc; bh=mIxYqMmNyfnAkxhYRypfwo8kqBymTALQHqVqwTHgeeA=;
b=p9wbUWqF4Cnfr04hBUOf7lc8CWyHqRUY8X1KiqOWNynwxP2PUmWspOODkvhp9yTF1d
qHVHZhXcVS3WinVNbK4MmDJ+qtrbTY/sqfsXR0pOTkRcoz6CUonXvy0o0ok33xKKQ8BH
DgCLwYZ1Bimc1rGuuRVWrMI/8FcAndSYTqKwDUiY42n6d9Rhw1u21SKmsUZL+J7otaKg
RhM561RxJdlmRgSYTabFFpXhOsKX/P0dqwin44eliwMIcUFBUZaZZhRxQb7OwHU/1lpO
ZX0vji+VSl8/3S/EXaha7Kiq2T2jozl2yMHXAIhLcOLMo/+mTm2sKc6JDutXou6gH5QX
tmFw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20161025;
h=x-gm-message-state:mime-version:references:in-reply-to:from:date
:message-id:subject:to:cc;
bh=mIxYqMmNyfnAkxhYRypfwo8kqBymTALQHqVqwTHgeeA=;
b=CI4DWVi+v70W5PExFWv5Ssg2C3oHkr9+0wS8s7gsWdjeWkp2zDgEAF1umulcfHP3HJ
AweSk6EaSJLihryBGmYxCvafOZ9HVyOcA65r7ZphhExj3wlK7AvBofAmLqQwqg7vTXQe
FsSDdyv10qSLWOMFYXzAej0mNO+mt4BYPXvS3CthlXXdPXuP0pfRFy9BRhnPqYq9r+dF
oS4QOl1O2vUvF4DGVckLlibVNU8fmxj2tYGtBGarDVaoMNgxWgyOVoYnnZU21yR2g9oG
hzFUTzHF1nHRoRR21YjvpvBMX7c4kveXXRsku1UcHWj8ydJ821k4l/PJi+DUp3+EgzgS
t5+w==
X-Gm-Message-State: AOAM530dUrHRZvv0kLDTycZwyEX0lP6XVMMcTNtAVDUuTtwGc/UkT1az
B10o5tmEcrBFik9tSipPqmEEBOx2hkem8aeyC3IDnbFzVD6a
X-Google-Smtp-Source: ABdhPJx2IwjrevwiPVykyebICdcntzRc3csfjE4oUyU6FFV/lkO70Aqmb+lcpe7MMO087MAyuOBF+gKDQnDzk7LhbVw=
X-Received: by 2002:a67:fb87:: with SMTP id n7mr1839379vsr.58.1606176826444;
Mon, 23 Nov 2020 16:13:46 -0800 (PST)
MIME-Version: 1.0
References: <dcc265f9-a143-5093-eba0-94ee059c7cc7@mtcc.com>
<20201122021417.B5E6E27B3E59@ary.qy>
<CABuGu1pX=5ZC4RLsv19qrosRN9nCrPdeSk5Xg4O7ViEZit6dnA@mail.gmail.com>
<453c4db4-fc62-dc76-5b15-707623d66f9f@mtcc.com>
<64f18b-ae8-8c15-3d33-ff2d864c35bc@taugh.com>
<884541e6-5076-7f8f-d1d2-d68ea9c5a2bc@mtcc.com>
<CABa8R6u_K=KEQv3vmkVwEuYon350NEkd62eOovhq+gv9wonSnA@mail.gmail.com>
<f28b76e5-2855-985e-ece5-960aa68e2846@dcrocker.net>
<CABa8R6s+CoKv69g+Csu83e+vMac83rm85cFJXE09_H6TiYJB6Q@mail.gmail.com>
<40aa3391-84fb-bd2d-92ab-e268c674d4a4@gmail.com>
<CABa8R6u42VOJQDoUpdTC_8nAmEE3m0Y+D4xMFyCAaTRfyLj39w@mail.gmail.com>
<7dbd9d27-83c9-2dc1-1ab9-8b585c9b87cb@gmail.com>
In-Reply-To: <7dbd9d27-83c9-2dc1-1ab9-8b585c9b87cb@gmail.com>
From: Brandon Long <blong@google.com>
Date: Mon, 23 Nov 2020 16:13:31 -0800
Message-ID: <CABa8R6sOO_5RHZ0SHijLoASSz-HQbjvZkFLuHuXZ5yBXrKg5CA@mail.gmail.com>
To: Dave Crocker <dcrocker@gmail.com>
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000003033a405b4cf2fb3"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/T5uZtkd5covUZG8leCwJ-ZBGK6Y>
Subject: Re: [dmarc-ietf] ARC questions
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting,
and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>,
<mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>,
<mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Nov 2020 00:13:57 -0000
On Mon, Nov 23, 2020 at 12:48 PM Dave Crocker <dcrocker@gmail.com> wrote: > On 11/23/2020 12:15 PM, Brandon Long wrote: > > On Mon, Nov 23, 2020 at 11:53 AM Dave Crocker <dcrocker@gmail.com> wrote: > >> > Yes, of course, a handling agent can do it, but there are plenty of >> reasons >> > why they shouldn't. >> >> Please enumerate and explain. If it's that dangerous, we should >> document it, especially I don't recall that constraint being in any of >> the design or standardization discussions. >> > > DKIM often ties a domain to reputation and other anti-spam features. If > you > forward spam to another host and sign it while forwarding, then the other > host > will think you send spam. > > Well, ummm... errrr... yes. That's because, in such circumstances, you do. > > More significantly, the signature makes sure that such as an assessment > will only be made accurately, rather than penalizing you for problematic > mail that is attributed to you but that you did not handle. > If the result is marking all of the mail from that mailing list as spam, then you've likely done your users a disservice. Being able to differentiate is useful. Also, forwarders often don't have all of the signals that the user's mailbox does.. not the least of which is that different recipients have different judgements on what is spam, and the "this is spam" signal rarely makes it back to the forwarder. > DMARC ties DKIM to the From header and at least is interpreted as being an > anti-phishing feature. DKIM signing mail that you forward could mean > upgrading > a phishing message to passing DMARC. > > I don't understand. The first sentence makes sense to me, but the second > doesn't. > > "Upgrading...to passing DMARC only applies if a) the signature matches the > From: field domain, and b) that domain has an associated DMARC record. But > if you don't watch DMARC to apply in that case, what is the DMARC record > there fore? > I send a phishing message to a mailing list or alias at a domain with a >From header of that domain, and the list blindly re-signs all mail sent to the list, I've now "authenticated" the spoofed message, and it will now "pass" DMARC. Perhaps it upgraded from a quarantine to none, since the mailing list doesn't have the concept of a spam folder, or perhaps the sales@ team has decided they want all of the forwarded messages, even if probably spam, so that they can go through them to make sure... but it lost the quarantine disposition on the forward when it gained authentication. This recent article also goes into things that DKIM signatures imply: > > https://blog.cryptographyengineering.com/2020/11/16/ok-google-please-publish-your-dkim-secret-keys/ > > The level of condescension, ignorance, and error throughout that article > is impressive. Given that it was written by someone whose profession > requires extreme care about complex matters, the level of carelessness in > the article is especially unfortunate. > > Conveniently, he put his biggest error in bold font: > > "*DKIM provides a life-long guarantee of email authenticity that > anyone can use to cryptographically verify the authenticity of stolen > emails, even years after they were sent."* > > DKIM does no such thing. > > and this was quickly followed by the normal-font: > > "The key design goal of DKIM was to prevent spammers from forging > emails *while in transit*. " > > This, too, is not what DKIM does. DKIM provides a noise-free channel for > assessing signers, not for detecting spammers. The difference is > important; and I claim fundamental. > > ps. making sure that DKIM signature become invalid relatively soon -- I > think that removing the keys is simpler and just as effective as publishing > the private keys -- seems like a reasonable suggestion. > > > Perhaps this all means that DKIM has been used for more than it was > intended for. > > "More than" suggests that the use has legitimacy. It doesn't. > We don't always have control over how our work is used. If I proposed extending a standard in a new direction that would be perfectly fine with the original intent of the standard, and that clashed with how the standard had come to be used in practice, my extension is DOA. > > > Intermediaries don't want to take ownership of the message in that >> > > sense, though there >> > > are some mailing lists that do. >> > >> > Signing with DKIM does not take 'ownership'. >> > >> > >> > Yes, responsibility is the proper word. My point survives the word >> change. >> >> I disagree. >> >> >> > DKIM says the domain takes responsibility for the message, while ARC >> says >> > the domain takes responsibility for evaluating the status of the >> message >> > when >> > they received and forwarded it. >> >> This implies that the word 'some' is irrelevant. It isn't. And it was >> included intentionally. >> > > Automated systems can't really tell how much responsibility an > intermediary was > intending to take for the message. > > People who write them can. > > > OTOH, they typically are using it only for a certain > purpose, so they assume that the intermediary took responsibility in the > sense that they > want... or rather, the people who wrote the code do. Or the journalist > writing the story. > > ARC was specified to have a more specific responsibility, > > Forgive me but I think that: > > Authenticated Received Chain (ARC) creates a mechanism for individual > Internet Mail Handlers to add their authentication assessment to a > message's ordered set of handling results. > > > specifies a nature and responsibility pretty much identical to what DKIM > claims. The enhancements are a) chaining, and b) carriage of earlier > assessments. But in terms of 'responsibility', this reads the same as DKIM. > I don't see how "claim some responsibility" is the same as "add their authentication assessment". I guess they are claiming responsibility for the assessment, but that's a very specific thing, and not the "some [unknown] responsibility" > and as different from DKIM so > that it wasn't mistaken for the uses that people were already using DKIM > for. > > Oh? > This was definitely a topic of discussion during the initial meetings where we went from XOAR to ARC. Brandon
- [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions John Levine
- Re: [dmarc-ietf] ARC questions Kurt Andersen (b)
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions John R Levine
- Re: [dmarc-ietf] ARC questions Douglas E. Foster
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions John R Levine
- Re: [dmarc-ietf] ARC questions John Levine
- Re: [dmarc-ietf] ARC questions Douglas E. Foster
- Re: [dmarc-ietf] ARC questions Joseph Brennan
- Re: [dmarc-ietf] ARC questions Todd Herr
- Re: [dmarc-ietf] ARC questions Dave Crocker
- Re: [dmarc-ietf] ARC questions Doug Foster
- Re: [dmarc-ietf] ARC questions Dave Crocker
- Re: [dmarc-ietf] ARC questions Todd Herr
- Re: [dmarc-ietf] ARC questions Dave Crocker
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions John R Levine
- Re: [dmarc-ietf] ARC questions Brandon Long
- Re: [dmarc-ietf] ARC questions Dave Crocker
- Re: [dmarc-ietf] ARC questions Brandon Long
- Re: [dmarc-ietf] ARC questions Brandon Long
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions Brandon Long
- Re: [dmarc-ietf] ARC questions Dave Crocker
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions Brandon Long
- Re: [dmarc-ietf] ARC questions Brandon Long
- Re: [dmarc-ietf] ARC questions John R Levine
- Re: [dmarc-ietf] ARC questions Brandon Long
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions John R Levine
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions Dave Crocker
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions John Levine
- Re: [dmarc-ietf] ARC questions John Levine
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions Dave Crocker
- Re: [dmarc-ietf] ARC questions John R Levine
- Re: [dmarc-ietf] ARC questions Dave Crocker
- Re: [dmarc-ietf] ARC questions John R Levine
- Re: [dmarc-ietf] ARC questions Dave Crocker
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions Brandon Long
- Re: [dmarc-ietf] ARC questions Dave Crocker
- Re: [dmarc-ietf] ARC questions John Levine
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions Seth Blank
- Re: [dmarc-ietf] ARC questions Brandon Long
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions Brandon Long
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions John R Levine
- Re: [dmarc-ietf] ARC questions Douglas Foster
- Re: [dmarc-ietf] ARC questions Murray S. Kucherawy
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions Murray S. Kucherawy
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions Murray S. Kucherawy
- Re: [dmarc-ietf] ARC questions Alessandro Vesely
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions John Levine
- Re: [dmarc-ietf] ARC questions Brandon Long
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions John R Levine
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions John R Levine
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions John R Levine
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions John R Levine
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions Michael Thomas
- Re: [dmarc-ietf] ARC questions Benny Pedersen
- Re: [dmarc-ietf] ARC questions Brandon Long
- Re: [dmarc-ietf] ARC questions Brandon Long
- Re: [dmarc-ietf] ARC questions Michael Thomas