Re: [dmarc-ietf] DMARC2 & SPF Dependency Removal

Douglas Foster <dougfoster.emailstandards@gmail.com> Sat, 17 June 2023 18:25 UTC

Return-Path: <dougfoster.emailstandards@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B5BBC151545 for <dmarc@ietfa.amsl.com>; Sat, 17 Jun 2023 11:25:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.094
X-Spam-Level:
X-Spam-Status: No, score=-7.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xceTNJIHNi7w for <dmarc@ietfa.amsl.com>; Sat, 17 Jun 2023 11:25:01 -0700 (PDT)
Received: from mail-lj1-x235.google.com (mail-lj1-x235.google.com [IPv6:2a00:1450:4864:20::235]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 140D9C14CE54 for <dmarc@ietf.org>; Sat, 17 Jun 2023 11:25:01 -0700 (PDT)
Received: by mail-lj1-x235.google.com with SMTP id 38308e7fff4ca-2b466073e19so9978011fa.1 for <dmarc@ietf.org>; Sat, 17 Jun 2023 11:25:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1687026299; x=1689618299; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=N+cIuqSbw1BKSwNjhbSOclYpSNLMhspAvZGu0Dp0/vA=; b=k15/eV3BuWq5CEKp1XavoY1vv8JNAgLzYHaNN2VcsGz5TkaxDLx9lG/6Cxf6xaCkb/ xx0zMbrIequysCYkMORJmATksr9dTZKVe52PYFSwQYBv1licD+pMKzIf2/FpyPOspcQN zH48uf/op7I+uM7LckEGNgHxRDx2bNedXKBDZ92xXyLYpO3DQ1odk4Oc4wcyp69P+MBT aLZqVWzyByFQ3+54QG06yt9oUELrsf/RPY9z6l9509HTbXn5FMhMUzhfNz3y3XyaycwB 8Q8d2gta0i+vMm7bP1Nrsu6nxvPDQ8v2ayxJ3DiWDPBkn9+2VFsO/RmsACHQcUcdl7z6 ZZGw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687026299; x=1689618299; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=N+cIuqSbw1BKSwNjhbSOclYpSNLMhspAvZGu0Dp0/vA=; b=AlX8EL/fuBCC4SzDy5ZjW+VhSPAc70dGG49H96yCNSV0wUdOdIb9QG+OFvcYmw6aWs SAme19wrbrfrKik2Jb4+y8QRjkxKvka5EEs/fkOnHFm9kYmyNkXSak2cDrgSC+9WYK4H b0aUYqbjbUqzwJsZ160bUEzSQjcXWWsRRa7c+QHXiSZPUw7SxG8Ox8NzuCONosyM728u 7cAluELdIcg1wQeKh1ofjdwlq4jUZfL64HBF/rvoXM51Iv6zfoo7HUZmnjwiJGFdYEDy 3imE7aLttEtgvU9KXaR9GI2BT1lyq0VTfnsDubsSZ4ep1zjP12fCYXDlPaKVfrXHUsl/ k/5A==
X-Gm-Message-State: AC+VfDyKDGUgNnEInxvGQp+Ef87lw0NlO798UjdoqozvQoFLM9tZaJAN 8UDCGP4imChBgDedu3bxPN/VmmV0fOAirOAfdn/xP5+5Spg=
X-Google-Smtp-Source: ACHHUZ6uDNEzPmHjp52v8ic045gACwJBhfpRq0rL4n+aF6gPNkwA6GM/bO7XAgFmygsCiHrd6LsuqUCuZRWYEHGc2Mk=
X-Received: by 2002:a2e:9050:0:b0:2b3:3197:37b3 with SMTP id n16-20020a2e9050000000b002b3319737b3mr3502079ljg.44.1687026298712; Sat, 17 Jun 2023 11:24:58 -0700 (PDT)
MIME-Version: 1.0
References: <30BB83B2-B454-41B8-992B-8E2569802D9C@1und1.de> <D225D7FC-C570-4B63-A694-9F16DB1F33E1@kitterman.com> <CALaySJKwuOK-81dW2H9dtURxa5mLQDUNo+MWcs+Hho8N+yP9qg@mail.gmail.com> <2817813.dRqVH37e0G@localhost> <CALaySJJbPFBAV_7mZaARYWuMzuX+74r2Cm0jD+z92_iuFRn_MQ@mail.gmail.com> <25736.57534.195344.782189@fireball.acr.fi> <1ec42959-977a-9ce0-907a-83a5eb2b6ef2@tana.it> <25739.5435.550786.601699@fireball.acr.fi> <25739.33240.127804.524371@fireball.acr.fi> <5d9a0b0f-8777-2494-d779-376c6ab8b37d@tana.it> <7d39aa8e-dacc-05fa-eff1-2cc350d521db@inboxsys.com> <CAH48ZfwyBwfKzG_3R5uyV6tmY0yUtWy=5yAoAOEhUGn_Rz6HNw@mail.gmail.com> <47b8a0c7-6a52-a4ad-e98e-8cb2f881713e@inboxsys.com> <285f2d2e-13fd-7cdc-c816-fba759f0745b@dusatko.org>
In-Reply-To: <285f2d2e-13fd-7cdc-c816-fba759f0745b@dusatko.org>
From: Douglas Foster <dougfoster.emailstandards@gmail.com>
Date: Sat, 17 Jun 2023 14:24:47 -0400
Message-ID: <CAH48ZfzhyZK3RQHXH-PPk=sqY9gOtpA85vV-Myyo_RrEvOGu-Q@mail.gmail.com>
To: Jan Dušátko <jan=40dusatko.org@dmarc.ietf.org>
Cc: dmarc@ietf.org
Content-Type: multipart/alternative; boundary="00000000000042f72905fe576b12"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/brniG4ROpwwil2IsKBserLFhIdg>
Subject: Re: [dmarc-ietf] DMARC2 & SPF Dependency Removal
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 17 Jun 2023 18:25:05 -0000

In general, message recipients lack the expertise needed to distinguish
between legitimate and fraudulent identities.    Most users do not know how
to read message headers or how to make sense of them if shown.   Whenour
automated evaluation systems and administrative quarantine cannot resolve
an ambiguity, users cannot be expected to do better with less information.
Domain-specific tolerance for risk needs to be implemented with
domain-specific policies, but not with end-user discretion.

DMARC has limited scope.  In its purest form, it only blocks impersonations
when the domain has a DMARC policy, the policy specifies enforcement
(quarantine or reject), and the policy is detected correctly (absence of
PSL errors and absence of in-transit changes).   Only a subset of domains
have a DMARC policy, and only a subset of those domains have enforcement.
So only a small percentage of impersonation attacks can be protected by
DMARC.  For that very limited defense to work, domain owners and evaluators
need a high level of confidence in a PASS result.  Eliminating the PSL
increases the confidence in PASS even if it creates some increase in false
failures.   Eliminating SPF will have the same effect, and is desirable for
the same reason.   Our assumption is that DMARC-enforcing domain owners are
highly motivated and will reconfigure as necessary to ensure DMARC PASS
results.

This same logic raises questions about whether relaxed authentication
remains necessary or appropriate.  With SPF, relaxed authentication seems
necessary because changing the MailFrom domain to match a desired From
domain is complex.   For DKIM, I see no important obstacles which prevent
the signature domain  from exactly matching the From domain.

ARC addresses the one problem that domain owners cannot prevent, which is
forwarding with in-transit changes.

Evaluators and recipients have a much larger problem.  They need to protect
themselves from all impersonation attacks, which DMARC does not attempt.
Their defenses must be implemented within the limits of information
available at evaluation time.   If the message has a relevant DKIM
signature but no DMARC policy, the DKIM PASS is still a valid indication
that the message is not impersonated.   Similarly, if the message has no
signature but produces SPF PASS with exact alignment, the SPF PASS result
indicates that the message is probably not impersonated.   Conversely, SPF
FAIL and SPF NONE service to increase the suspicion of an impersonation.

Evaluators use sender authentication to perform a three-way split on
messages:
- Messages from verified and highly trusted senders are allowed to bypass
some or all content filtering.
- Messages from unwanted senders are unconditionally blocked prior to
content filtering.
- Messages from all other senders are accepted if they pass content
filtering.

The more effective your sender authentication, the less you need perfect
content filtering.   Similarly, the more perfect your content filtering,
the less you need optimal sender authentication.

In summary, your instincts are correct, SPF has a long term role in your
defenses, even if it is not part of the DMARC specification.

Doug Foster

On Sat, Jun 17, 2023 at 8:28 AM Jan Dušátko <jan=
40dusatko.org@dmarc.ietf.org> wrote:

> Hi
>
> I would like to know your opinion on the options currently available to
> the system administrator. If it is trying to define a policy that allows
> recipients to authenticate emails, its options are, in my opinion, limited.
> - The issue of SPF and cloud systems mentioned, or including over
> networks with mask /8 or /16 is extremely inappropriate
> - It is not possible to set up the enforcement of DKIM signatures
> because DomainKey and its policies are not related to DKIM and there is
> no similar technology for DKIM (ADSP is not used)
> - If I am the administrator of hundreds or thousands of domains, it is
> in my interest to provide the recipient with information about the
> sender's authentication options. For example, all emails use DKIM, all
> emails use ARC, all emails use SPF ... and if not, you can discard them.
> But I do not have this option with DMARC.
> I understand that this is in the middle of what DMARC2 is supposed to
> address. But could there be a possibility for the DMARC2 record
> administrator to define a policy for domains and provide relevant
> information for recipients? It is the recipient's decision whether to do
> this verification, but it is also the sender's decision to offer this
> information. Unfortunately, at this point, either the signature is
> valid, or wrong, or it is not. If it is not possible to accept the
> e-mail, but the recipient does not have the option of verifying whether
> the sender's domain enforces this signature. It is similar with SPF. And
> DMARC2 seems to me to be a good place for these definitions. But I would
> like to avoid of forced removal of SPF, please let it for administrator
> decision.
>
> Regards
>
> Jan
>
> Dne 16. 6. 2023 v 13:28 Sebastiaan de Vos napsal(a):
> > The need for separate DKIM failure codes to be able to separate
> > between in-transit changes and public key errors is more than just
> > valid and I don't consider SPF worthless in general, but I just find
> > it disturbing how the obviously misplaced confidence in SPF currently
> > weakens the whole DMARC standard.
> >
> > Is it not in our best interest to encourage and motivate in particular
> > the less sophisticated senders to use the higher confidence mechanisms?
> >
> >
> > On 16.06.23 13:02, Douglas Foster wrote:
> >> RFC 7489 takes 8 different authentication mechanisms and lumps them
> >> into a single PASS result:
> >> DKIM or SPF, each with up to four types of alignment:  same domain,
> >> parent->child, child->parent, and sibling->sibling
> >>
> >> These eight mechanisms all provide some level of confidence that the
> >> message is not impersonated, but they do not provide an equal level
> >> of confidence.
> >>
> >> Unsophisticated senders have little incentive to use the higher
> >> confidence mechanisms because any PASS result is still PASS.  The
> >> solution is not to pretend that SPF is worthless, because that is an
> >> overstatement.   The solution is to talk about the differences in
> >> confidence provided by the different authentication methods, and note
> >> that evaluators have reason to distrust some of them.   That distrust
> >> could cause a weakly authenticated message to be distrusted by some
> >> evaluators.
> >>
> >> Similarly, needs multiple types of FAIL.   Since the data indicates
> >> that missing (or invalid) public keys are a significant portion of
> >> all failures, it needs a separate failure code from "normal" failures
> >> which suggest in-transit changes.  The DKIM group needs to define the
> >> result code but this group would need to integrate it into our
> >> aggregate reports.
> >
> >
>
> --
> -- --- ----- -
> Jan Dušátko
>
> Tracker number: +420 602 427 840
> e-mail:         jan@dusatko.org
> GPG Signature:  https://keys.dusatko.org/E535B585.asc
> GPG Encrypt:    https://keys.dusatko.org/B76A1587.asc
>
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>