Re: [dmarc-ietf] WGLC ARC-16 concern on Section 5.1.2 - cv=fail should sign greedily

"Murray S. Kucherawy" <superuser@gmail.com> Fri, 27 July 2018 21:25 UTC

Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D1EFC130E45 for <dmarc@ietfa.amsl.com>; Fri, 27 Jul 2018 14:25:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Sh-1L4YHWznH for <dmarc@ietfa.amsl.com>; Fri, 27 Jul 2018 14:25:32 -0700 (PDT)
Received: from mail-lf1-x129.google.com (mail-lf1-x129.google.com [IPv6:2a00:1450:4864:20::129]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3D25F12DD85 for <dmarc@ietf.org>; Fri, 27 Jul 2018 14:25:32 -0700 (PDT)
Received: by mail-lf1-x129.google.com with SMTP id b22-v6so4429169lfa.3 for <dmarc@ietf.org>; Fri, 27 Jul 2018 14:25:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=mRfECG7gwQWIjQcTKEFxu/hfQ2rpyuGOHYgcwn9DrqE=; b=BrHAHR0BM1Hm0p2MkmiDAJvG1z5UTKALQRlQDYHd6tyClq3na6648Zth1H/ggC8SO/ WnZ5dBPToJGYFqt5Dy8NX40LQBG8S383gffQR+3kpfBXhhvIhSW6naU4kcCC7XQPIgI5 lE7V/bwb/IsgFy4rdKoVf903DNfgwO/57GjnQQnrYTcCOQku6ZUtxSXU+FCxJ0RXw9IF SnetWrjx2u4J6ms/azKfxEoY3iBaftWe+cDDs+bXP7IJR6akix96C9Gqzxui0bb4GqL4 bUJuG3Gb6Mrmmr3+QGXZit3DYb3SG63wqxCDJPImjS/4f6+lIYyjfZryuiaWpQUzzIM0 kKAw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=mRfECG7gwQWIjQcTKEFxu/hfQ2rpyuGOHYgcwn9DrqE=; b=YCfrpJVXDR8fqZ4vJTg0Swc48ymSjdeO/gX+dIrJYX0Bi028hOm1MAhkT331aafbwW 4wQK5byQMbvueWtdmxEINaZP9BwJhEOKIzHOWLjYyrsQg/gYHOoTaOsQGC736XbWLDwq 0c1miFmzjlcY4X9404OlSRYcpBTckPYJHmJ+Im3UbDblZFoj2UkEw3SooBR3FH0sEU4P ua4vlcT4hN8EJDZS9lrCAitUdMXBZ0UJ9QUqM70Tv48P846Nkd/OpSqFBf4uUeXYD83m 7FblS0ZWTCzvJMbTUbn3W/6IufEm4TDoRfaU6VraTs9DW4h+aVKtgWdWDTaD8xkWzEOY GcIw==
X-Gm-Message-State: AOUpUlH5V4jUK+95YjUbSvpH5w+UqUIvyReScxzWe4EeM2jYFWFkqe3q zdoLCoac55a6RtX2ho3hiUjCptD5wpz6/8D8lYakWQ==
X-Google-Smtp-Source: AAOMgpf6O5UACQ8caQRHOA7Jf53VwFuGmzMsooZmUbrfQpVq6/UMm43R/BvCiIc5CwZ+vX+P7e+nFficmaoAlC4L3g0=
X-Received: by 2002:a19:e1cc:: with SMTP id l73-v6mr5225904lfk.102.1532726730385; Fri, 27 Jul 2018 14:25:30 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a2e:3a13:0:0:0:0:0 with HTTP; Fri, 27 Jul 2018 14:25:29 -0700 (PDT)
In-Reply-To: <CAD2i3WONSEJF+yrtzRD2hJYQJjwpaCOAFiUpRWjJyYrYSpK3-Q@mail.gmail.com>
References: <CAD2i3WMMJPaZYonS-qcz8pwOKYmS2Xe+8WBZPuAqjiGoYePzSg@mail.gmail.com> <CAL0qLwapyX3U=0OqQWzx+dDELn3W0v=N_HyzDnSw49oWQ+SE5Q@mail.gmail.com> <CAD2i3WN90JSS8pzgRxrbokuKmhZaLUrimYRWqkZwzVDBxTczng@mail.gmail.com> <CAL0qLwZ_uPh5iPkS7MKzDp3x=dAgn-hmsEunccDc3Hj2bsphpQ@mail.gmail.com> <CAD2i3WM99Yy6Y=BQE4dC=Ffm7J32My160Xdm2oxXC50Au9tXoA@mail.gmail.com> <CAL0qLwbL-oFuoyY65jH4ddyuGd6THYeFdQwyWC9f-dOpr_CN6A@mail.gmail.com> <CAD2i3WONSEJF+yrtzRD2hJYQJjwpaCOAFiUpRWjJyYrYSpK3-Q@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
Date: Fri, 27 Jul 2018 14:25:29 -0700
Message-ID: <CAL0qLwYjvm2-k4dugcFsJ7DWUca8xB245J66rtdu8mHLSWPYmA@mail.gmail.com>
To: Seth Blank <seth@sethblank.com>
Cc: IETF DMARC WG <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000004d6e76057201c009"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/kN4JOnmDlizfpAWjxiXziWED-E4>
Subject: Re: [dmarc-ietf] WGLC ARC-16 concern on Section 5.1.2 - cv=fail should sign greedily
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Jul 2018 21:25:35 -0000

On Fri, Jul 27, 2018 at 10:54 AM, Seth Blank <seth@sethblank.com> wrote:

> On Fri, Jul 27, 2018 at 10:39 AM, Murray S. Kucherawy <superuser@gmail.com
> > wrote:
>>
>> But (and I think this proves my point) I don't know if "cv=fail" refers
>> to an invalid chain or a failed chain.  I have to run the verification to
>> figure that out.  But you're saying you just stop when you see "cv=fail".
>>
>> I remain confused..
>>
>
> I don't understand what you're exploring. The algorithm in
> https://tools.ietf.org/html/draft-ietf-dmarc-arc-protocol-16#section-5.2
> is clear and the separate paths you're describing don't factor it.
>
> On validation, you grab the highest instanced ARC set (step 1), and then
> start a process to set the chain validation status of the inbound ARC Chain.
>
> If the highest instanced ARC Set has cv=fail in it, you're done (step 2).
> No cryptographic checks have even been performed at this point, because in
> either scenario the chain is dead. If the AS validates and you have
> cv=fail, then the chain state is fail. If the AS does not validate, then
> the chain state is fail.
>
> Crypto isn't checked until step 3, and we never get there. If you're doing
> analysis and want to understand what caused the chain to fail, you're now
> outside of validation and outside of matters that affect interoperability.
>

And therefore, if I'm a sealer and I've decided I'm going to mark the chain
failed, why wouldn't I just do "cv=fail" with a bogus or empty signature?
The verifier isn't going to use whatever signature I've put there anyway;
as you point out, the verifier sees "cv=fail" and stops.

And if that's all correct, then I don't understand why we're talking about
what exactly you seal if you're the one attaching "cv=fail", because it's
moot.

-MSK