Re: [dmarc-ietf] ARC-Seal is meaningless security theatre

Dave Crocker <dcrocker@gmail.com> Fri, 11 August 2017 17:23 UTC

Return-Path: <dcrocker@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7CE23124234 for <dmarc@ietfa.amsl.com>; Fri, 11 Aug 2017 10:23:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RmnCYULgsjIs for <dmarc@ietfa.amsl.com>; Fri, 11 Aug 2017 10:23:01 -0700 (PDT)
Received: from mail-oi0-x230.google.com (mail-oi0-x230.google.com [IPv6:2607:f8b0:4003:c06::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B9EF2132192 for <dmarc@ietf.org>; Fri, 11 Aug 2017 10:23:01 -0700 (PDT)
Received: by mail-oi0-x230.google.com with SMTP id e124so39338952oig.2 for <dmarc@ietf.org>; Fri, 11 Aug 2017 10:23:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:from:to:references:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=ScjwJNLr0f5fb9sWE/Gh/hJNOiktiNPbKPIZRyuw9fI=; b=ukxNMOOj9uNCbNNU7rM1JUFEpzNPi51I1WL4ZbISZlNM8nokKfWf2FDQ04Gp3zWdvv q70xfl75HVY6ntfWiYpNfaiupadGH5z8CsQ3YcMXa+L+RggEE1v8OpUXaGOLNAwiNlw8 yM9GfiKJNHZ5fy1Wc+G9Abn9IFF/zcd473Lkoes4QQcWeVnDkwcpTGQ4KzqYO5WzFvhm io0hCbVaKdeYctrkA5OeYOAGVWHMUUrjq7pHZW6VsHSdgXwKK/DhYJ7Tk26mwwnLyXb8 BNjPddCBhb5PUrLoa13LkL05ZFqCT30lAiEvaK7z0QwtsVIWqhah/FEqhY0/qnOOMoM+ KCPA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:from:to:references:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=ScjwJNLr0f5fb9sWE/Gh/hJNOiktiNPbKPIZRyuw9fI=; b=PdTHKZ4uULWxAA64bO5cwFcoyMBEqoE8TX3UKX6IT0IYOobX0UK5ktKx5BZSLa5I9f mn76Z1+c7b09vImVjzKqtCCePV5HxKe7SFDrQlRgEh2LwVell8DCn/zDeIEsSh2u4Bej YZXOoXFDvIpXfttes8F/SPo15nMNcwr7wmdnGaxjvtuikNVNRyMgG5D3IdRVdNDf45y0 MI1gOLyPQcbn+Db/IVaoukv2Rk3LcolIGzqdG7+nEyV59yWgeehd6g9Y8eBJTcrXKR/T 8SsVPtfFv2AoUb96jYLNdillWgsdaSZj52cK2+l9cckjqLbadRfnFPzyNouS2HxE2jvI nRXA==
X-Gm-Message-State: AHYfb5hNCsqElJNtgODb0U7GQQLLBltqm1nJLbgYJR4v4RSpS6XBFq35 m+JTvRtvhCiwV3Q97zY=
X-Received: by 10.202.242.2 with SMTP id q2mr15800508oih.71.1502472180781; Fri, 11 Aug 2017 10:23:00 -0700 (PDT)
Received: from ?IPv6:2602:304:cda0:8800:d17e:7fe3:9cb7:7c98? ([2602:304:cda0:8800:d17e:7fe3:9cb7:7c98]) by smtp.gmail.com with ESMTPSA id x23sm1184983oix.51.2017.08.11.10.22.59 for <dmarc@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 11 Aug 2017 10:22:59 -0700 (PDT)
From: Dave Crocker <dcrocker@gmail.com>
To: dmarc@ietf.org
References: <1502083287.2191248.1065195288.7CDC7FF3@webmail.messagingengine.com> <CABuGu1oTMbuLd4yTwecu5sKFnsmH+HiwT1FG=JpySYHzpMTx_w@mail.gmail.com> <1502200759.3946686.1066841264.607B4D0B@webmail.messagingengine.com> <2720431.u3G7bbkkxK@kitterma-e6430> <1502317564.1935379.1068588344.040173AF@webmail.messagingengine.com> <a08c7590-ded3-1642-4ffc-07848b3c6cd2@gmail.com>
Message-ID: <e14f2130-6f00-4ef1-485b-850a4cc1c48c@gmail.com>
Date: Fri, 11 Aug 2017 10:22:58 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1
MIME-Version: 1.0
In-Reply-To: <a08c7590-ded3-1642-4ffc-07848b3c6cd2@gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/aq8Io5pOMi-0U7s5l102OFrcxj0>
Subject: Re: [dmarc-ietf] ARC-Seal is meaningless security theatre
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Aug 2017 17:23:03 -0000

On 8/11/2017 9:26 AM, Dave Crocker wrote:
> Here's the task I see:
> 
> *  Talk about ARC in non-technical terms, describing not just its 
> abstract goal but the nature of how it achieves those goals, in terms
> of threats it is responding to, capabilities that it is responding
> to, and limitations to those capabilities.
> 
> *  This needs to include reference to the concept of 'trust' as an 
> operational attribute.
> 
> *  There also needs to be statements about the operational history 
> upon which ARC builds -- that is, what is it doing that is
> well-founded -- and what it is doing that is new.
> 
> *  For the parts that are 'new', there needs to be statements the 
> provide explain why it is reasonable to be optimistic that deployment
>  and use will be safe and useful.


Possibly-useful examples that already showed up in this thread:


On 8/7/2017 4:22 PM, Seth Blank wrote:
> ARC is about maintaining a chain of custody so that a final receiver
> can be certain of which domains modified a message in transit. Like
> DMARC, DKIM, and SPF, we're trying to ascertain if the message was
> handled by the domain it said it was handled by - we're not passing
> judgement on the contents of the messages itself.



On 8/7/2017 4:22 PM, Seth Blank wrote:
> When validating an ARC signed message, one verifies the latest AMS 
> (which must validate), and *the entire chain* of ARC Seals, not only
> the latest. This guarantees you a list of all message signatories -
> the chain of custody we're talking about.
> 
> When evaluating the chain for final receipt, there are two states to 
> worry about as a matter of local policy: 1) you trust all the
> signatories on the chain 2) there is an untrusted signatory on the
> chain
> 
> In state #1, you're done - if you trust the signatories then you
> trust they're not playing games with the AMS and AAR contents or
> manipulating the message in malicious ways. Now you can make a
> delivery decision as local policy dictates.
> 
> In state #2, you're also done - if you don't trust all the
> signatories, then there are a multitude of routes for the message to
> be garbage, including but not limited to everything you've outlined
> above.
> 
> The critical thing about the ARC Seal is that it guarantees this 
> behavior in state #1 - if you trust all the d= values in the ARC
> Seals, they all validate, and you have cv=pass, then you know for
> certain everyone who has manipulated the message (and maybe some who
> handled but did not modify).
> 
> Without the ARC Seal this determination is not possible and there is
> no way to evaluate the ARC chain for delivery as a final receiver.



On 8/7/2017 7:41 PM, John Levine wrote:
> Since it only makes sense to look at the ARC chain on mail that
> comes from senders that are generally reliable, I've asked why you
> don't just whitelist those senders and be done with it.
> 
> The answer, at least at very large mail systems, is that a mailing 
> list sends nice clean mail, but then it starts forwarding lots of 
> spam.  I've seen this on some of the ICANN lists where someone got
> his address book stolen that had both the lists and individuals' 
> addresses, so we're now getting mail through the lists with faked 
> addresses of a frequent participant.  ARC passes along info from 
> previous hops so the recipient can retroactively do filtering that
> the mailing list didn't.



d/
-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net