Re: [dmarc-ietf] Tickets 98 and 99 -- fake reports are not a problem and if they were authentication would not help

Michael Thomas <mike@mtcc.com> Mon, 25 January 2021 17:22 UTC

Return-Path: <mike@fresheez.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B294F3A15C4 for <dmarc@ietfa.amsl.com>; Mon, 25 Jan 2021 09:22:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.15
X-Spam-Level:
X-Spam-Status: No, score=0.15 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.249, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mtcc.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9qSLdIksfsRr for <dmarc@ietfa.amsl.com>; Mon, 25 Jan 2021 09:22:32 -0800 (PST)
Received: from mail-pj1-x102f.google.com (mail-pj1-x102f.google.com [IPv6:2607:f8b0:4864:20::102f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0E65B3A15C6 for <dmarc@ietf.org>; Mon, 25 Jan 2021 09:22:29 -0800 (PST)
Received: by mail-pj1-x102f.google.com with SMTP id j12so8807812pjy.5 for <dmarc@ietf.org>; Mon, 25 Jan 2021 09:22:29 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mtcc.com; s=fluffulence; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language; bh=0LS4pTj4o50sqlVIdi4GnvCEwdSBh6mxUNN0/iIpZss=; b=a9AWiay+EPruvb7MQ/2FT0BiTAMSr7oWqbxpvxrn1JY0Uyi+FbYhcvTq5L4vhYHBxZ /p/SewMqQr2EhLJT3v/wt14Vf7n1fun/AMtLUFG3Af3Xra3X9NkMFqOEmuSgSoOq6OM1 IWfQafhF5oYGOuYTZ69Yv5vFViz1dgBh0EO4n/z+ux/phZ7Z0zEXoiVXyiGNzIAqXAVo lom62bWFk+M21bQenfc9zPT+TbACLq2TC19ejoRPSbN+7Cu54AKGCcTL6GHCBMYt36n7 8gcA8m7hCSjjA6M+wwHqRYAEopPGXEM/JUB1ubBkd/ovqklD9x5z7u1mEX0a7Vwj+rUj cLJw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language; bh=0LS4pTj4o50sqlVIdi4GnvCEwdSBh6mxUNN0/iIpZss=; b=HqjiKHv59r51B++6k3V1LeM4lY0Bf1ugZf+igAe6qPiVCg2fLrHpk1cBqDPYh16T0e 0HkuX66YSFYzU0R3IWC16l83wBJXtEkqMAggRcQ0QUxIc3cPniEFXlApDgQBgWZRRki6 vZPqF9J42bw6A9Hf6EkaLdP2Jw3t7p7Be+acfF+Bd8VhEPPtVKBbH1hzmfB6tSv4+Jom zHsoTFDchPQRFSxvf3GS8sCga0HZxuC0W2WW+VfFjyQQR2S57fGfWkLoUojK+ernVas4 K6b/++r+ZfVXXIPfFOKkSoyXC//8QD9QzPwKdx+egMi905JQae6qxC7wMYC+DA+hIfQm IIiw==
X-Gm-Message-State: AOAM530PS9THOHBYQuHC+ohppm/edznLpNmgfVYCrQ5sVcM6s4RZndm5 A5oZReVy19LPqK2xdZG1Z3RH+Q==
X-Google-Smtp-Source: ABdhPJxoe79Xy/wG+FA8GO4Dquhq/DERdzIEk0pR5B/fXEPcAdbpEZmDY99r5jIvp8kESadPydWysA==
X-Received: by 2002:a17:902:9b90:b029:e0:6c0:df4f with SMTP id y16-20020a1709029b90b02900e006c0df4fmr1705536plp.60.1611595349281; Mon, 25 Jan 2021 09:22:29 -0800 (PST)
Received: from mike-mac.lan (107-182-35-22.volcanocom.com. [107.182.35.22]) by smtp.gmail.com with ESMTPSA id w66sm17160980pfd.48.2021.01.25.09.22.27 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 25 Jan 2021 09:22:28 -0800 (PST)
To: Seth Blank <seth@valimail.com>, IETF DMARC WG <dmarc@ietf.org>
Cc: Douglas Foster <dougfoster.emailstandards@gmail.com>
References: <34317129-8225-fb38-4ad3-e1b9ffed21fb@iecc.com> <9c84fa50-d23c-a794-fc62-09788ac383a9@mtcc.com> <CAHej_8mTaFo7aESFk4pHjbqbheriYPoAy6f+HhcE6ASVJSyViA@mail.gmail.com> <df867378-5da0-b912-2a0f-b2081d1f2437@mtcc.com> <CAHej_8kfCC1H89pRjgxXK=+BizJHFdKgnr7Gxh_2wWq8P7L-0Q@mail.gmail.com> <a94cb6c0-0a32-da8d-4bd5-9c7ab2866c82@mtcc.com> <CAH48ZfxkQ9g-gmBOPdDsxr4RDvXOi56EaX=aJVDbuL_g7kR+xQ@mail.gmail.com> <CAOZAAfOB93fpYRjwxgQNkG-ydVHLtvgUp0LLROvv-F-amJVy4w@mail.gmail.com>
From: Michael Thomas <mike@mtcc.com>
Message-ID: <b9e8da8e-f46a-49c0-4196-1d50ed94d526@mtcc.com>
Date: Mon, 25 Jan 2021 09:22:27 -0800
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.6.0
MIME-Version: 1.0
In-Reply-To: <CAOZAAfOB93fpYRjwxgQNkG-ydVHLtvgUp0LLROvv-F-amJVy4w@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------8E3CC247D68B014F6C3E8E13"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/fAmw7gy6AnXkts-f7N9H5I2wbOM>
Subject: Re: [dmarc-ietf] Tickets 98 and 99 -- fake reports are not a problem and if they were authentication would not help
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Jan 2021 17:22:34 -0000

Taking in information from unauthenticated sources and acting on it is 
an operational problem per se. Have we learned nothing in the last 30 years?

Mike

On 1/25/21 9:19 AM, Seth Blank wrote:
> What operational problem are we solving here? Absent evidence of a 
> problem and strong consensus on the solution, let's close these 
> tickets and move on.
>
> On Mon, Jan 25, 2021 at 9:10 AM Douglas Foster 
> <dougfoster.emailstandards@gmail.com 
> <mailto:dougfoster.emailstandards@gmail.com>> wrote:
>
>     Since the status quo is unauthenticated, I wonder if adding a
>     signing requirement will help.
>     Will recipients discad unsigned messages, or accept whatever is
>     available to maximize their information capture?  I suspect they
>     will conrinye to accept everything.
>
>     I think we would need an identified threat before recipients would
>     be motivated to discard.
>
>     But what about John's problems with receiving reports that should
>     not have gone to him?   I did not understand the root cause, but I
>     would hope there is something that can be done.  Would signing
>     help receiving sites, those with less sophistication than he has,
>     be able to sort out noise more effectively?
>
>
>     On Mon, Jan 25, 2021, 11:51 AM Michael Thomas <mike@mtcc.com
>     <mailto:mike@mtcc.com>> wrote:
>
>
>         On 1/25/21 8:44 AM, Todd Herr wrote:
>>         On Mon, Jan 25, 2021 at 10:18 AM Michael Thomas
>>         <mike@mtcc.com <mailto:mike@mtcc.com>> wrote:
>>
>>
>>             The main thing I've learned over the years of dealing
>>             with security is to not underestimate what a motivated
>>             attacker can do. Your imagination is not the same as
>>             their imagination. Closing #98 in particular is
>>             absolutely ridiculous: the report should already have a
>>             DKIM signature or SPF so it's just a matter of making
>>             sure its valid. Why would you *not* want to insure that?
>>             The amount of justification for *not* having the receiver
>>             authenticate it is a mountain. The amount of effort to
>>             authenticate it is trivial for mail. Levine's dismissal
>>             of security concerns because he has anecdotal "evidence"
>>             from a backwater domain carries no weight at all.
>>
>>
>>         That's all well and good, but you haven't answered the
>>         question I asked.
>>
>>         What threats do you have in mind? Put another way, how do you
>>         envision an attacker exploiting the lack of authentication in
>>         a DMARC report to his or her gain?
>>
>         No, sorry, the onus is on the people who don't think it can be
>         gamed. A bald assertion that it can't be gamed is very
>         unconvincing. You need to lay out a miles long case for why it
>         cannot be gamed. And to what end? #98 has a simple piece of
>         text that should be added to DMARC to eliminate the
>         possibility of forgery. You'd need a 10 page threat I-D to
>         explain why it's not necessary. What is the point of that? For
>         email, it's trivial to prevent forgeries. Why would anybody
>         argue against that?
>
>         Mike
>
>         _______________________________________________
>         dmarc mailing list
>         dmarc@ietf.org <mailto:dmarc@ietf.org>
>         https://www.ietf.org/mailman/listinfo/dmarc
>         <https://www.ietf.org/mailman/listinfo/dmarc>
>
>     _______________________________________________
>     dmarc mailing list
>     dmarc@ietf.org <mailto:dmarc@ietf.org>
>     https://www.ietf.org/mailman/listinfo/dmarc
>     <https://www.ietf.org/mailman/listinfo/dmarc>
>
>
>
> -- 
> *Seth Blank*| VP, Standards and New Technologies
> *e:*seth@valimail.com <mailto:seth@valimail.com>
> *p:*415.273.8818
>
>
> This email and all data transmitted with it contains confidential 
> and/or proprietary information intended solely for the use of 
> individual(s) authorized to receive it. If you are not an intended and 
> authorized recipient you are hereby notified of any use, disclosure, 
> copying or distribution of the information included in this 
> transmission is prohibited and may be unlawful. Please immediately 
> notify the sender by replying to this email and then delete it from 
> your system.
>