Re: [dmarc-ietf] Proposing an extension to DMARC to optionally require SPF and DKIM

Terry Zink <tzink@exchange.microsoft.com> Tue, 02 April 2013 16:18 UTC

Return-Path: <tzink@exchange.microsoft.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA14B21F86E3 for <dmarc@ietfa.amsl.com>; Tue, 2 Apr 2013 09:18:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.999
X-Spam-Level:
X-Spam-Status: No, score=-102.999 tagged_above=-999 required=5 tests=[AWL=-0.400, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H902esnRCAcs for <dmarc@ietfa.amsl.com>; Tue, 2 Apr 2013 09:18:30 -0700 (PDT)
Received: from na01-sn2-obe.outbound.o365filtering.com (na01-sn2-obe.ptr.o365filtering.com [157.55.158.28]) by ietfa.amsl.com (Postfix) with ESMTP id EEEF521F86DE for <dmarc@ietf.org>; Tue, 2 Apr 2013 09:18:29 -0700 (PDT)
Received: from BL2SR01MB605.namsdf01.sdf.exchangelabs.com (10.255.109.167) by BL2SR01MB606.namsdf01.sdf.exchangelabs.com (10.255.109.168) with Microsoft SMTP Server (TLS) id 15.0.670.5; Tue, 2 Apr 2013 16:18:28 +0000
Received: from BL2SR01MB605.namsdf01.sdf.exchangelabs.com ([169.254.8.123]) by BL2SR01MB605.namsdf01.sdf.exchangelabs.com ([169.254.8.123]) with mapi id 15.00.0670.000; Tue, 2 Apr 2013 16:18:28 +0000
From: Terry Zink <tzink@exchange.microsoft.com>
To: "dmarc@ietf.org" <dmarc@ietf.org>
Thread-Topic: [dmarc-ietf] Proposing an extension to DMARC to optionally require SPF and DKIM
Thread-Index: AQHOL2X0wTz1NBkoXUCF8zORG9m6EJjDGmrQ
Date: Tue, 02 Apr 2013 16:18:27 +0000
Message-ID: <bf5414a7edcf4d899882fecd898c4d82@BL2SR01MB605.namsdf01.sdf.exchangelabs.com>
References: <55b1222360ab4215a09a54da800d261b@BL2SR01MB605.namsdf01.sdf.exchangelabs.com> <515A02DB.2010309@gmail.com> <CE39F90A45FF0C49A1EA229FC9899B05633D4E@USCLES544.agna.amgreetings.com> <9b3745d8976d42df8fc9521e7f4c4b49@BL2SR01MB605.namsdf01.sdf.exchangelabs.com> <CE39F90A45FF0C49A1EA229FC9899B05633F90@USCLES544.agna.amgreetings.com> <3cc1dd69471d4f059fff49ecd3c6f45d@BL2SR01MB605.namsdf01.sdf.exchangelabs.com> <CE39F90A45FF0C49A1EA229FC9899B0563403A@USCLES544.agna.amgreetings.com> <CD3757DA7F9B46888C89CB10FF032227@fgsr.local> <CAL0qLwaCuaDY=HV6i5kpspar+P3Kd0m80W3XEPhWBgTu3cWOCw@mail.gmail.com>
In-Reply-To: <CAL0qLwaCuaDY=HV6i5kpspar+P3Kd0m80W3XEPhWBgTu3cWOCw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.255.157.4]
x-forefront-antispam-report: SFV:SKI; SFS:; DIR:OUT; SFP:; SCL:-1; SRVR:BL2SR01MB606; H:BL2SR01MB605.namsdf01.sdf.exchangelabs.com; LANG:en;
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: DuplicateDomain-6c178e33-aecb-4786-8220-9afceeddbaf3.exchange.microsoft.com
Subject: Re: [dmarc-ietf] Proposing an extension to DMARC to optionally require SPF and DKIM
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Apr 2013 16:18:30 -0000

> The fact that a proposed change doesn't receive favourable response 
> doesn't mean it didn't get considered, does it?

While I don't really agree with the reasons for the unfavorable response, I do acknowledge that this proposal has met with strong resistance. There's probably a better way to solve this. For example, if an organization behind a cloud-based service wants to prevent spoofing, it could say "The domain example.com always DKIM signs its mail" and then any unsigned mail would be rejected (or rerouted). This is a private ADSP.


> If in Terry's application "require both" is an acceptable outcome, 
> then his customer base was either prepared to delegate DKIM or do it 
> themselves anyway.

I did use myself and the company I work for as an example, but the scenario extends to many cloud-based providers of email.

A better forum may be a working-group session at MAAWG, or a set of Best-Practices. 

-- Terry


From: dmarc-bounces@ietf.org [mailto:dmarc-bounces@ietf.org] On Behalf Of Murray S. Kucherawy
Sent: Monday, April 01, 2013 10:50 PM
To: J. Gomez
Cc: dmarc@ietf.org
Subject: Re: [dmarc-ietf] Proposing an extension to DMARC to optionally require SPF and DKIM

On Mon, Apr 1, 2013 at 7:44 PM, J. Gomez <jgomez@seryrich.com> wrote:

So, you want the public to aknowledge a private practice as a public standard, and at the same time you don't want input from the public but blind adhesion, because, you know, it has been working fine in our private club?

In contrast, you're expecting that any suggestion made in this more public venue automatically has to be accepted?  But either way we're getting ahead of ourselves; there isn't even a working group yet.

As has already been pointed out, DMARC hasn't been private for quite some time.  The point here is indeed to subject the specification to even more open and rigorous review that it's already received.  There's been a public (albeit external to the IETF) mailing list for a long while now.  The fact that a proposed change doesn't receive favourable response doesn't mean it didn't get considered, does it?
As for actual technical arguments, I find John's and Scott's points compelling.  Neither DKIM nor SPF are useful defenses if you can't control the content they authorize or authenticate.  In effect, in the attack scenario Terry provided, SPF is giving what the victim domain perceives as false positives.  Sticking with that scenario, the solution appears to be to remove SPF from the equation by neutralizing its "pass" response when coming from those IP addresses.  I keep coming back to a Venn Diagram showing SPF pass and DKIM pass plus their overlap, which is the DMARC pass space; if you don't want DMARC to pass for the case where SPF passed but DKIM failed, then DMARC pass is now logically equivalent to DKIM pass.  To enact that, just turn off SPF and sign all your mail.

On the flipside, if the victim domain's signing keys were compromised, one could generate spam signed as them from any IP address, rendering DKIM meaningless but SPF effective (probably).

I don't find the argument that delegating DKIM is hard to be believable.  If in Terry's application "require both" is an acceptable outcome, then his customer base was either prepared to delegate DKIM or do it themselves anyway.
Where is the danger? You don't have the need?, well then go with the more relaxed default.

I don't believe anyone's calling the proposal "dangerous", but the reasons for the resistance have already been laid out.
 

> I use shared IPs across domains
> but I DKIM sign those domains and each of the domains has similar
> security implementations. So from my perspective it is possible to
> do.... I've been doing it for years.
So what? Good for you. The world is wide. One size does not fit all, yada yada...

That doesn't mean this is the right place for all solutions to all configurations, does it?
 

Again, is the proposed optional extension damaging to DMARC's goals? Are DMARC's goals those of a private club, or those of the non-spoofing email community at large?

The latter, but don't conflate that goal with a requirement to be all-inclusive either.  We couldn't alter DKIM to make it work seamlessly with all mailing list configurations, so we stopped trying.  That doesn't mean DKIM had a private set of requirements; rather, it had realistic ones.

-MSK