Re: [dmarc-ietf] Organizational domains, threat or menage, was On splitting documents and DBOUND

"Douglas E. Foster" <fosterd@bayviewphysicians.com> Fri, 13 November 2020 18:31 UTC

Return-Path: <btv1==58644fd05fa==fosterd@bayviewphysicians.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5FAFE3A1020 for <dmarc@ietfa.amsl.com>; Fri, 13 Nov 2020 10:31:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=bayviewphysicians.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DH15qjSRpmzj for <dmarc@ietfa.amsl.com>; Fri, 13 Nov 2020 10:31:47 -0800 (PST)
Received: from mail.bayviewphysicians.com (mail.bayviewphysicians.com [216.54.111.133]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A54CD3A1014 for <dmarc@ietf.org>; Fri, 13 Nov 2020 10:31:47 -0800 (PST)
X-ASG-Debug-ID: 1605292303-11fa3148027f990001-K2EkT1
Received: from webmail.bayviewphysicians.com (smartermail4.bayviewphysicians.com [192.168.1.49]) by mail.bayviewphysicians.com with ESMTP id 0IJdXmviIxv3Ze34 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NO) for <dmarc@ietf.org>; Fri, 13 Nov 2020 13:31:43 -0500 (EST)
X-Barracuda-Envelope-From: fosterd@bayviewphysicians.com
X-Barracuda-RBL-Trusted-Forwarder: 192.168.1.49
X-SmarterMail-Authenticated-As: fosterd@bayviewphysicians.com
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bayviewphysicians.com; s=s1025; h=message-id:reply-to:subject:to:from; bh=GPo3fKwg4bozukhNToDRv3xOdKhAJECRioBxvpbDAhg=; b=eADpNcSAZh86GxWQkeAshM0z1qbKssDYYt/zF+phwykUlD/2iehhC1xyoXLW44ag2 ra57RLJsB/CfQJF2zh4IXQ817E/ZovOjROyi+SFCMZbTU7vb3Ed9DYOgh+YIC3NqG ZzZzbPSJM1S7WJ+rO8Up57+ObmLjkSPU1OlqR2IuA=
From: "Douglas E. Foster" <fosterd@bayviewphysicians.com>
To: IETF DMARC WG <dmarc@ietf.org>
Date: Fri, 13 Nov 2020 13:31:36 -0500
X-ASG-Orig-Subj: Re: [dmarc-ietf] Organizational domains, threat or menage, was On splitting documents and DBOUND
Reply-To: fosterd@bayviewphysicians.com
Message-ID: <b35710ccf8944ef99cc7a0d7b4e8c348@bayviewphysicians.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="d4a2c237d5e14e57891f75b65f232300"
In-Reply-To: <CAMSGcLCOUG_a13kwgU==HdpHG+ZpMO5caO2tXKqk3TH=N7-8XA@mail.gmail.com>
References: <20201111181837.79128262943F@ary.qy> <f1eabf10-0278-a6cc-997b-333e89446c16@dcrocker.net> <6fd681e2-cabe-2fb0-61f4-9019ce98458e@taugh.com> <c18f2987-84d6-9ef4-b57d-912094e3031c@dcrocker.net> <CAMSGcLCOUG_a13kwgU==HdpHG+ZpMO5caO2tXKqk3TH=N7-8XA@mail.gmail.com>
X-Exim-Id: b35710ccf8944ef99cc7a0d7b4e8c348
X-Barracuda-Connect: smartermail4.bayviewphysicians.com[192.168.1.49]
X-Barracuda-Start-Time: 1605292303
X-Barracuda-Encrypted: ECDHE-RSA-AES256-SHA384
X-Barracuda-URL: https://mail.bayviewphysicians.com:443/cgi-mod/mark.cgi
X-Virus-Scanned: by bsmtpd at bayviewphysicians.com
X-Barracuda-Scan-Msg-Size: 13223
X-Barracuda-BRTS-Status: 1
X-Barracuda-Spam-Score: 0.00
X-Barracuda-Spam-Status: No, SCORE=0.00 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=9.0 tests=HTML_MESSAGE
X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.85850 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- 0.00 HTML_MESSAGE BODY: HTML included in message
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/hiG39H7cxWTp-0cK3SN9JdWPOUs>
Subject: Re: [dmarc-ietf] Organizational domains, threat or menage, was On splitting documents and DBOUND
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2020 18:31:52 -0000

I beleive that we can and should address the Columbia University problem.  Here are some thoughts:

Policy Types
------------=---
We have three types of policies:

- "p=" policy for a specific domain
- "sp=" policy for subdomains that do not enumerate their own
- "sp=" policy for non-existent subdomains

Deploying a specific "p=" to every node will provide granular control for subdomains that exist, but it does not solve the problem for non-existent subdomains.   

Non-Existent Domains
------------------------------
In almost every case, the policy for non-existent subdomains should be stricter than the one for existent subdomains, so sharing one policy for both purposes is problematic.   I created ticket #83 last night with a proposal to define a policy option for non-existent domains.

Roll-up Policy
------------------
When rolling a security policy up from leaf nodes upward toward higher level nodes, the weakest policy is the one that has to forwarded upward, unless there is a mid-tree override mechanism.  By allowing a lower-level subtree to apply a different policy than the parent, we allow the stricter policy to flow upward while the weak subtree retains its carve-out exception.

If a subtree needs a weak policy and that setting can only be accomplished at the top of the domain, then the entire organizaiton's security is weakened for the sake of the problematic leaf node.   This is exactly the situation that causes sp=none to persist indefinitely.

Inheritance
---------------
For subdomains that actually exist, one has to ask whether it is reasonable to expect an organization to implement a DMARC policy at every node of its domain tree.   In the event that a reporting address changes, the organization has a lot of changes needed to propagate that change everywhere.     We would benefit from providing an ability to inherit from an upper-level entry using syntax like "inherit=N", where N is an integer number of domain levels.    The evaluator determines the values for sp, rua, and ruf at the referenced domain, and uses the sp result for p and sp on the referencing subdomain.   Similarly, the rua and ruf values from the referenced domain are used to supply those values if they are not specified on the referencing subdomain DMARC record.   Since the flow is only upward, the maximum number of iterations is limited, even if nested inheritance is allowed.   However, nested inheritance could be limited to a maximum number or disaloowed completely.  This approach allows subtrees to configure different reporting than the top-level of the organization.  

Inheritance provides a more efficient method of walking up the domain tree, as compared to sequential iteration, for subdomains that actually exist and have an inheritance record defined..

QueryDown
----------------------
Walking down the tree has some possibilities as well.    

Assume that the top of the organization is located using the PSL, but as in the Columbia University example, the sp policy at that level is not necessarily determinative.    A  token of the form "querydown=1" instructs the evaluator to accept the sp policy at this level as a candidate policy, but to check the next level down to see if an override applies.   If the token is missing or 0, then this record is determinative and the search stops.  

- If the next level down is the original domain, then of course the process stops because this domain has already been checked for a p policy and been found lacking.
- If the next level down produces a DMARC record, the sp at this level becomes the new candidate policy, subject to checking for another querydown token.   
- If the next level down does not have a DMARC record, the search stops and the last candidate policy is the effective policy.   
In most cases, this process will end quickly because it will either exhaust the domain string, encounter a missing DMARC record, or encounter a DMARC record with querydown=0 (or missing).

If the querydown parameter is larger than one, the evaluator can jump down that many levels, eliminating intermediate ones.   Again, if this positions the match at or below the original domain or below, then the search stops and the last candidate policy is applied.

Again, a limit on the number of downward iterations would be applicable.   If an "inherit=n" token is being used to walk up the  tree, then the querydown parameter would be ignored.

Hope this helps,

Doug Foster

----------------------------------------

From: Joseph Brennan <brennan@columbia.edu>
Sent: 11/12/20 9:24 AM
To: IETF DMARC WG <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Organizational domains, threat or menage, was On splitting documents and DBOUND

On Wed, Nov 11, 2020 at 4:21 PM Dave Crocker <dhc@dcrocker.net> wrote:
Just to invoke a bit of ancient history, here, you are saying that if
there was the domain name:

engineering.sun.com

people would be surprised that the organization domain is

oracle.com

As another case, would people be surprised that email for the medical center cumc.columbia.edu is a separate system managed by a separate IT group from columbia.edu, and that any authentication for one should not be applied to the other?  I don't think this is unique in large decentralized universities. The real email world is a complicated place.

--

Joseph Brennan
Lead, Email and Systems Applications
Columbia University Information Technology