Re: [dmarc-ietf] Understanding Ale's Abuse research

Douglas Foster <dougfoster.emailstandards@gmail.com> Fri, 07 April 2023 11:09 UTC

Return-Path: <dougfoster.emailstandards@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 096AFC14CE36 for <dmarc@ietfa.amsl.com>; Fri, 7 Apr 2023 04:09:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.094
X-Spam-Level:
X-Spam-Status: No, score=-2.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DGQgvhVqor-o for <dmarc@ietfa.amsl.com>; Fri, 7 Apr 2023 04:09:02 -0700 (PDT)
Received: from mail-lj1-x236.google.com (mail-lj1-x236.google.com [IPv6:2a00:1450:4864:20::236]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4F940C151535 for <dmarc@ietf.org>; Fri, 7 Apr 2023 04:09:02 -0700 (PDT)
Received: by mail-lj1-x236.google.com with SMTP id q14so43227366ljm.11 for <dmarc@ietf.org>; Fri, 07 Apr 2023 04:09:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; t=1680865739; x=1683457739; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=fj3An71OkzDxPO9s6LRbz5DAwg8uSz2eH8QXgaRzz2I=; b=GGUcaNpdsLq/wllPUm9ilN+pTzKbL91g6CcGAPqn+wYm9bd9StuEOPDRHT8+swuN0a 6ojudzYRqo/GnzN1io5vvXEgSwyY8ePL69BK7WUmfBFZA/tLa30P5kEq6khECAULskC9 +LkBu3VP9GiuJ++qa0sg1FohIyW4opfY2BPuqFQOlknfJNqoCi5+kIGgG+0OIYW2ebl0 Wm6sr9TwQPuTD0kWd5WCLLfzP3tkoIGxMe2o/CviwvUhX3UE1uexF7n2Bmt5ZBPGvDT0 I1trBNnX7fUYwzN/NxvNJNgH9DoAn7m5Xe9igTCpSh/PkfN/lLu94U65RMiHxB/ztKE8 tBaA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680865739; x=1683457739; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=fj3An71OkzDxPO9s6LRbz5DAwg8uSz2eH8QXgaRzz2I=; b=S/uVW4/3cQBdvawETc9bPJeREtk2whdMmR8CSq+SiqvX9Td150ZFbwR1PAeNX6HTUA 2CABoAIG6/WkrCGVd/XUgjjzEr6RORi42cff1TwV20KKJ6Cc/hqSDsRzHph+5DxZ1S0e BoxcbRU9f212YYLvHADsJ8c6aH2qnhiEHruLWoUdaaTL26iNurA4wWwzvk/q0iyT8UEq dvWStcialGKajt0h+oxW2n2ylGs+5PknPVddcttEgvd2GEuRJ9XiXperwo9Aoa971jSs yvxG8wrBZAFXpqu3Hbimo5v61i2d2PUSskwS321emNcE9SHJ1AL/cDVVWvD87vYZSTjq MBsQ==
X-Gm-Message-State: AAQBX9caL8HvAvMK2PszM9WKetPhwo1aL5b7ZwivupohWcvWtWnBN+CZ ypxTfynpXl7OfjnOFzOOdCU+RZjy7LJqTdsTaWdugvtp
X-Google-Smtp-Source: AKy350atF6Dm9mCnpCh/fkBa7ym4Dh+PzEDSnfgGWSZgsnAACFJBC+ps41tnpTDhakzYI1UsTZf6MfGr4qVHfcCNGs4=
X-Received: by 2002:a2e:8541:0:b0:2a5:fa58:cac2 with SMTP id u1-20020a2e8541000000b002a5fa58cac2mr486438ljj.1.1680865739168; Fri, 07 Apr 2023 04:08:59 -0700 (PDT)
MIME-Version: 1.0
References: <MN2PR11MB43519A6CD95E5C80AA1EC2CFF7899@MN2PR11MB4351.namprd11.prod.outlook.com>
In-Reply-To: <MN2PR11MB43519A6CD95E5C80AA1EC2CFF7899@MN2PR11MB4351.namprd11.prod.outlook.com>
From: Douglas Foster <dougfoster.emailstandards@gmail.com>
Date: Fri, 07 Apr 2023 07:08:48 -0400
Message-ID: <CAH48ZfxuW3XLUx-5gkXVdKiWsrw6gRuCm3Os4O-EVU3vcADk2w@mail.gmail.com>
To: IETF DMARC WG <dmarc@ietf.org>, Wei Chuang <weihaw@google.com>
Content-Type: multipart/alternative; boundary="0000000000004c600705f8bd0db0"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/mra8ILjOcSz4WJ0RlKD70zFGjRM>
Subject: Re: [dmarc-ietf] Understanding Ale's Abuse research
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Apr 2023 11:09:09 -0000

No, Scott.   We do not get angry at white-hat researchers.   We try to
learn from them before the black-hat researchers learn to do the same and
begin deployment.

Ale's message was a very impressive fake, and it obviously did not take
nation-state resources to produce it.   This is alarming.   Among the
problems:

1) I thought IETF had best practices for secure list management.   On my
original account, I would get a challenge-response sequence.   After every
post, I would get a "did you send this message".   I never knew for sure
what made it go away, but it did.   Was it DMARC-related?    Was it
participation-related?   Or was it because my old account used a MailFrom
address with the Barracuda version of BATV?    Whatever the reason, it
becomes clear that IETF does not protect us from impersonated posts.

2) As Wei Chang reminded us recently, SPF is vulnerable to a shared-tenancy
attack.   With huge hosting service like Outlook.com and Gsuite, SPF is a
very weak form of authentication unless the hosting service can prevent
tenants from impersonating each other.   Of course, if the hosting service
allows forwarding without MailFrom rewrite, they may not be able to protect
against the shared-tenancy attack disguised as a forward.

3) The Authentication-Results header mislead when used outside of the
organization that creates it, so those headers are supposed to be discarded
upon entry to a new organization.   This clearly was not done.   IETF did
not strip the Microsoft results, and Google did not strip the IETF results.

4) The Microsoft ARC set indicates that the message produced SPF PASS, but
it does not tell us the IP address which was tested.   When I check SPF on
the combination of "comcast.com" and the previous Recevied address of
(2603:10b6:208:193::31), I get SPF FAIL, not SPF PASS.  The only other
earlier received entry was fe80::5acd:7431:27b0:8d40, which I think is also
a IPV6 private IP.   So Ale's deception appears to be aggravated by
Microsoft's deception.

5) IETF does not document the From and MailFrom addresses that it saw
before it performed rewrite on both, so I don't know what identifiers IETF
saw, which means that I don't understand how the attack was accomplished or
why IETF was duped.

6) Apparently the  headers prior to "tana.it" were fraudulent, having been
inserted from an actual message received previously.   They effectively
confuse the question of where did the message originate.   Did IETF trust
information in those fake headers, or are they merely there to confuse
human readers like me?

7) Is this attack unique to mailing lists, or is it symptomatic of a bunch
of other vulnerabilities that can occur with header manipulation.

In short, I want to know how to defend this attack because defending
against attacks is my job.    Pretending that it will not happen in the
real world does not work for me.

Doug Foster



On Thu, Apr 6, 2023 at 12:54 PM Brotman, Alex <Alex_Brotman=
40comcast.com@dmarc.ietf.org> wrote:

> I hope Alex won't get offended by this innocent DMARC test.
>
> Are we sure that it is all right for mailing lists to allow spoofs and
> impersonation?  I don't think Comcast has p=reject to safeguard Alex's
> contribution to this list, but what if he can't stand being impersonated?
> What
> else is he supposed to do besides setting p=reject?
>
> THIS LIST TAKES ALL OF THE BAD OF DMARC, NONE OF THE GOOD.
>
> Best
> Ale
>
>
>
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>