Re: [dmarc-ietf] DMARCbis WGLC - Issue 135 - What To Say About Too-Permissive/Third-Party SPF and Where To Say It?

Alessandro Vesely <vesely@tana.it> Tue, 19 March 2024 09:24 UTC

Return-Path: <vesely@tana.it>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5421FC1519AE for <dmarc@ietfa.amsl.com>; Tue, 19 Mar 2024 02:24:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.108
X-Spam-Level:
X-Spam-Status: No, score=-2.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=tana.it header.b="1S1payk6"; dkim=pass (1152-bit key) header.d=tana.it header.b="AkUqN9wc"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lGDl42q4Y4KR for <dmarc@ietfa.amsl.com>; Tue, 19 Mar 2024 02:24:03 -0700 (PDT)
Received: from wmail.tana.it (wmail.tana.it [94.198.96.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DF809C14F6A2 for <dmarc@ietf.org>; Tue, 19 Mar 2024 02:23:58 -0700 (PDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=tana.it; s=epsilon; t=1710840233; bh=vxWxykCe2fvLto8LAbhNBlZojCldJ125d4APh4Nb7J4=; h=Author:Date:Subject:To:References:From:In-Reply-To; b=1S1payk6pT1eCaGD7Xu+Mb+N/Y5y3LpmgWmsz7MfMCLpIUiK5qQAwE+VRrWIe4P1p j9OSktTV+oS7Qs0mo3fCg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tana.it; s=delta; t=1710840233; bh=vxWxykCe2fvLto8LAbhNBlZojCldJ125d4APh4Nb7J4=; h=Date:Subject:To:References:From:In-Reply-To; b=AkUqN9wcdEMibSyTU4z3YROxhwX2dGUPQRSKc15WMtk6GCMXvr8qvNH779cPz7lVT b10RSZnLQAIiPaTvTyP3qolT+sBcHJrLcyIszZv+cRtumpod7lSWpvwp5ON1uib/HG UI8v0gLVJGZsqgtB+HtNdcIQ+FUEd4G3MqBXF0iRA6sjKdo5B3u4Y+7LpO7NW
Original-Subject: Re: [dmarc-ietf] DMARCbis WGLC - Issue 135 - What To Say About Too-Permissive/Third-Party SPF and Where To Say It?
Author: Alessandro Vesely <vesely@tana.it>
Received: from [172.25.197.120] (pcale.tana [172.25.197.120]) (AUTH: CRAM-MD5 uXDGrn@SYT0/k, TLS: TLS1.3, 128bits, ECDHE_RSA_AES_128_GCM_SHA256) by wmail.tana.it with ESMTPSA id 00000000005DC0EF.0000000065F959A9.00002F64; Tue, 19 Mar 2024 10:23:53 +0100
Message-ID: <1ba8ef82-5c9a-412a-9586-4d84cf5ab416@tana.it>
Date: Tue, 19 Mar 2024 10:23:52 +0100
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Content-Language: en-US, it-IT
To: dmarc@ietf.org
References: <2068150.yCtiIVWOOC@zini-1880> <20240318013630.455118593233@ary.qy> <CAJ4XoYcoJFqYoAt_jq6jfsSjqtjaifiUzaqY-zkg7R3o5Bio0A@mail.gmail.com> <810a3322-4ba3-ac67-5c7b-0118028aeb34@taugh.com> <CAJ4XoYfCgo6DrD0HLMrL3+xT=K0TebQJdKjsUh3e+d-1ND3uUQ@mail.gmail.com> <40acfc56-8d00-4be1-b3fb-c5f2670b0b88@tana.it> <97F2B58E-587D-4AC1-AC1B-F4A14EAFDC03@kitterman.com>
Authentication-Results: tana.it; auth=pass (details omitted)
From: Alessandro Vesely <vesely@tana.it>
In-Reply-To: <97F2B58E-587D-4AC1-AC1B-F4A14EAFDC03@kitterman.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/lqO_3knWQ2g6EuwNei3fSY98tr8>
Subject: Re: [dmarc-ietf] DMARCbis WGLC - Issue 135 - What To Say About Too-Permissive/Third-Party SPF and Where To Say It?
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Mar 2024 09:24:10 -0000

On Mon 18/Mar/2024 21:37:02 +0100 Scott Kitterman wrote:
> On March 18, 2024 6:40:54 PM UTC, Alessandro Vesely <vesely@tana.it> wrote:
>>On Mon 18/Mar/2024 09:14:26 +0100 Dotzero wrote:
>>> On Mon, Mar 18, 2024 at 2:38 AM John R Levine <johnl@taugh.com> wrote:
>>>> On Sun, 17 Mar 2024, Dotzero wrote:
>>>>>> Whenever mail is sent, there is a risk that an overly permissive source
>>>>>> may send mail which will receive a DMARC pass result that was not, in
>>>>>> fact, authorized by the Domain Owner. These false positives may lead
>>>>>> to issues when systems interpret DMARC pass results to indicate
>>>>>> a message is in some way authentic. They also allow such unauthorized
>>>>>> senders to evade the Domain Owner's requested message handling for
>>>>>> authentication failures.
>>>> 
>>>>> I have a problem with this 2nd paragraph and believe it is factually incorrect. The Domain Owner has in fact authorized the message(s) as a result of an overly permissive approach. I would suggest that in fact any resulting DMARC pass is technically NOT a false positive because it is authorized by the overly permissive approach..
>>>> 
>>>> Seems to me we it depends on what you think "authorized" means.  My sense is I told you it's OK to send the message, yours seme to be that any host on an IP in the SPF record or anyone who steals your DKIM key is authorized by definition.
>>>> 
>>>> Is there some other wording that can make the difference clear?
>>> 
>>> Here's a quick stab at some modified wording for the second paragraph:
>>> 
>>> Whenever mail is sent, there is a risk that an overly permissive source
>>> may send mail which will receive a DMARC pass result that was not, in
>>> fact, intended by the Domain Owner. These results may lead
>>> to issues when systems interpret DMARC pass results to indicate
>>> a message is in some way authentic. They also allow such unauthorized
>>> senders to evade the Domain Owner's intended message handling for
>>> authentication failures.
>>
>>
>>That's better.  At least it's formally correct.  Still, it is rather obscure for an average reader.
>>
>>The attempt to make this issue general, in the sense that it is valid for SPF and DKIM alike, makes no sense.  Stealing a DKIM key is not comparable to an overly permissive SPF record.
>>
>>The text should be terser and clearer, possibly with an example.
>
> No one said anything about stealing a DKIM key.


"anyone who steals your DKIM key is authorized by definition"
https://mailarchive.ietf.org/arch/msg/dmarc/h_ytb51KHHkQTyCMfGMs9NPXmQo


Best
Ale
--