Re: [dmarc-ietf] ARC-Seal is meaningless security theatre

Hector Santos <hsantos@isdg.net> Sat, 12 August 2017 23:51 UTC

Return-Path: <hsantos@isdg.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3BD75132439 for <dmarc@ietfa.amsl.com>; Sat, 12 Aug 2017 16:51:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.335
X-Spam-Level: *
X-Spam-Status: No, score=1.335 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_SBL_CSS=3.335, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=isdg.net header.b=aGCiYmrn; dkim=pass (1024-bit key) header.d=beta.winserver.com header.b=MlPnYb97
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YgzNWE0Y5U1H for <dmarc@ietfa.amsl.com>; Sat, 12 Aug 2017 16:51:33 -0700 (PDT)
Received: from demo.winserver.com (secure.winserver.com [76.245.57.69]) by ietfa.amsl.com (Postfix) with ESMTP id EB3E0132443 for <dmarc@ietf.org>; Sat, 12 Aug 2017 16:51:32 -0700 (PDT)
DKIM-Signature: v=1; d=isdg.net; s=tms1; a=rsa-sha1; c=simple/relaxed; l=2424; t=1502581885; atps=ietf.org; atpsh=sha1; h=Received:Received:Received:Received:Message-ID:Date:From: Organization:To:Subject:List-ID; bh=p0/5sDhrw6TWwYjeVhqzJg7VLs4=; b=aGCiYmrnpkAmfuk5iB8R2StHwU9WedcxUepTykkEzaihfavmrQO8/45TZjq2ks HGDlugk/lOKOSoV7pt5I7/ODl5c2D0+oZBgAx2Ji+iWgrKa4+ZM5fA6Tb17aig7V P7FMgKpF9OJgUFvcvtQpCILev7hWMgRTdi+l3cr8qLu3g=
Received: by winserver.com (Wildcat! SMTP Router v7.0.454.6) for dmarc@ietf.org; Sat, 12 Aug 2017 19:51:25 -0400
Authentication-Results: dkim.winserver.com; dkim=pass header.d=beta.winserver.com header.s=tms1 header.i=beta.winserver.com; adsp=pass policy=all author.d=isdg.net asl.d=beta.winserver.com;
Received: from beta.winserver.com ([76.245.57.74]) by winserver.com (Wildcat! SMTP v7.0.454.6) with ESMTP id 2645745202.1.4180; Sat, 12 Aug 2017 19:51:24 -0400
DKIM-Signature: v=1; d=beta.winserver.com; s=tms1; a=rsa-sha256; c=simple/relaxed; l=2424; t=1502581855; h=Received:Received: Message-ID:Date:From:Organization:To:Subject:List-ID; bh=ESYGuP1 7nDSHOQgZlWShROwynA2aU9N+sCL3O9/C7A4=; b=MlPnYb97mMqG0VZz+kh26FF pU9z5ML7YhhprowkU/oObhPJhkSq2HN8Ae6hzOgtUVWr4GpXjBwU8fgqwKjlgx5/ sGyJEiPVcjJQKKXxZY848Fa+La4M1wC6qb5xcdP7Mr50rdIOuwxYJ4bibqBwcdHv iC6QgL9DnPxGKWfXJ/qs=
Received: by beta.winserver.com (Wildcat! SMTP Router v7.0.454.6) for dmarc@ietf.org; Sat, 12 Aug 2017 19:50:55 -0400
Received: from [192.168.1.68] ([99.121.5.8]) by beta.winserver.com (Wildcat! SMTP v7.0.454.6) with ESMTP id 3188252815.9.638828; Sat, 12 Aug 2017 19:50:54 -0400
Message-ID: <598F9484.7020700@isdg.net>
Date: Sat, 12 Aug 2017 19:51:32 -0400
From: Hector Santos <hsantos@isdg.net>
Organization: Santronics Software, Inc.
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.8.1
MIME-Version: 1.0
To: Bron Gondwana <brong@fastmailteam.com>, dmarc@ietf.org
References: <1502083287.2191248.1065195288.7CDC7FF3@webmail.messagingengine.com> <CABuGu1oTMbuLd4yTwecu5sKFnsmH+HiwT1FG=JpySYHzpMTx_w@mail.gmail.com> <1502200759.3946686.1066841264.607B4D0B@webmail.messagingengine.com> <2720431.u3G7bbkkxK@kitterma-e6430> <1502317564.1935379.1068588344.040173AF@webmail.messagingengine.com> <a08c7590-ded3-1642-4ffc-07848b3c6cd2@gmail.com> <e14f2130-6f00-4ef1-485b-850a4cc1c48c@gmail.com> <1502495646.4099176.1070896040.2B09B1F8@webmail.messagingengine.com> <166070f0-4ba1-70da-1f73-885b4a7f7640@gmail.com> <1502497178.4103451.1070917304.23DD466D@webmail.messagingengine.com>
In-Reply-To: <1502497178.4103451.1070917304.23DD466D@webmail.messagingengine.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/mHmDpYQrsslWtrCwJ-R6LosDVqM>
Subject: Re: [dmarc-ietf] ARC-Seal is meaningless security theatre
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Aug 2017 23:51:34 -0000

On 8/11/2017 8:19 PM, Bron Gondwana wrote:
> On Sat, 12 Aug 2017, at 10:04, Dave Crocker wrote:

>> by 'strategy DKIM uses' what do you mean exactly?  I'm guessing you mean
>> having the signature cover more of the header and all of the body, but
>> please confirm or clarify.
>
> Sorry - yes, to clarify...
>
> DKIM signs the entire body plus parts of the header.
>
> In the strategy I am proposing, site "X" modifying a message in
> transit (e.g. a mailing list) would add their own DKIM-like header
> (ARC-Message-Signature is a perfectly fine name for it) which signed
> the new "body and parts of the header", including a statement that
> site "X" had verified the message authentication before modifying it
> (ARC-Authentication-Results is a perfectly fine name for that statement).
>
> That gives a complete chain of custody.

Its a great idea.... but it still suffers from the long time 3rd party 
signature registration problem.   This is why we are here.  All the 
DKIM policy models, including DMARC with a p=reject policy) suffered 
this issue.  ARC is suppose to save 3rd party signed indirect messages.

The "Arc-Authentication-Results" header can claim this but it still be 
phishing, forged mail -- no trust at the downlink receiver level 
and/or MUA client when DMARC p=reject rejection results are seen.

What is needed is the Originating Domain making this claim that 
authorizes X as a legitimate modifier.  We can either lookup that 
information (ATPS, https://tools.ietf.org/html/rfc6541) or we pass it 
as a new DKIM-signature. Levine had a DKIM Conditional proposal that 
does this. It wasn't a lookup concept, which I prefer, but Levine's 
idea was the next best option that touches base with a "3rd Party 
Authorization" concept:

    https://tools.ietf.org/html/draft-levine-dkim-conditional-02
    Abstract

    This experimental specification proposes a modification to DomainKeys
    Identified Mail (DKIM) allowing advertisement of third-party
    signature authorizations that are to be interpreted as equivalent to
    a signature added by the administrative domain of the message's
    author.

I'm not against ARC other than it seems like complex, overhead that 
doesn't address the main issue of authorized 3rd party routes.   If we 
even have a DMARC ARC Policy concept, than that may be enough to begin 
pursuing the high cost of experimentation and development here.

-- 
HLS