Re: [dmarc-ietf] indeterminisim of ARC-Seal b= value

"John Levine" <johnl@taugh.com> Fri, 24 March 2017 21:23 UTC

Return-Path: <johnl@taugh.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 18CD5127F0E for <dmarc@ietfa.amsl.com>; Fri, 24 Mar 2017 14:23:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xu0kRKxk8N2n for <dmarc@ietfa.amsl.com>; Fri, 24 Mar 2017 14:23:28 -0700 (PDT)
Received: from miucha.iecc.com (abusenet-1-pt.tunnel.tserv4.nyc4.ipv6.he.net [IPv6:2001:470:1f06:1126::2]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B9F6B129504 for <dmarc@ietf.org>; Fri, 24 Mar 2017 14:23:27 -0700 (PDT)
Received: (qmail 74505 invoked from network); 24 Mar 2017 21:23:26 -0000
Received: from unknown (64.57.183.18) by mail1.iecc.com with QMQP; 24 Mar 2017 21:23:26 -0000
Date: Fri, 24 Mar 2017 21:23:04 -0000
Message-ID: <20170324212304.85346.qmail@ary.lan>
From: John Levine <johnl@taugh.com>
To: dmarc@ietf.org
Cc: gene@valimail.com
In-Reply-To: <CANtLugO_D1Mz_v_341pc5O1mZ7RhOTrFA3+Ob5-onp72+5uRfA@mail.gmail.com>
Organization:
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset="utf-8"
Content-transfer-encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/TqxI-W5oncP8NajP5tQhGcaUcGI>
Subject: Re: [dmarc-ietf] indeterminisim of ARC-Seal b= value
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Mar 2017 21:23:32 -0000

In article <CANtLugO_D1Mz_v_341pc5O1mZ7RhOTrFA3+Ob5-onp72+5uRfA@mail.gmail.com> you write:
>The issue is that its possible for two separate arc implementations, given
>the exact same message inputs, keys, timestamps, etc to be generating two
>different, but equally valid ARC seal hashes.

DKIM does the same thing.  The order of fields in a DKIM-Signature
header is arbitrary, and the b= hash includes that header, so there
are lots of different equivalent DKIM signatures for the same message
and same selector and key.  Verifiers use the DKIM-Signature header in
the message so they get the same answer as the signer, which I would
think would work the same way in ARC-Seal.

Can you explain why you think this is a problem?

R's,
John