Re: [dmarc-ietf] Additions to draft - Security Considerations

Scott Kitterman <sklist@kitterman.com> Tue, 26 April 2022 17:23 UTC

Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D1C06C13A8F2 for <dmarc@ietfa.amsl.com>; Tue, 26 Apr 2022 10:23:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=kitterman.com header.b=3fm9QAXK; dkim=pass (2048-bit key) header.d=kitterman.com header.b=prdtkED7
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uX2O_oeeJv_w for <dmarc@ietfa.amsl.com>; Tue, 26 Apr 2022 10:23:07 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [64.20.48.66]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AA1CEC13A8ED for <dmarc@ietf.org>; Tue, 26 Apr 2022 10:23:07 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [IPv6:2604:a00:6:1039:225:90ff:feaa:b169]) by interserver.kitterman.com (Postfix) with ESMTPS id 61CB4F8029B; Tue, 26 Apr 2022 13:23:05 -0400 (EDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903e; t=1650993785; h=date : from : to : subject : in-reply-to : references : message-id : mime-version : content-type : content-transfer-encoding : from; bh=sw+TvlmKBCIgsz2y2SMWoaGa2Q3bwC+9ChtjR1AXNhs=; b=3fm9QAXK97lvMA4UrPx3Zc2WH2y7L6Zs29BKR1olebUjDrkP2234p41RL1BqVQf4ldA5l My5tWjUWbDU3aHcAA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903r; t=1650993785; h=date : from : to : subject : in-reply-to : references : message-id : mime-version : content-type : content-transfer-encoding : from; bh=sw+TvlmKBCIgsz2y2SMWoaGa2Q3bwC+9ChtjR1AXNhs=; b=prdtkED718EmdYzIg5cx6MZNcHzZd/veKJoRw51S6vFXwEjbvGjmEOSGIYG4Ey2g1Ihq9 DbUj11xu7pWACQ0ai23NLKha8SnfwFU+cSTOPKW3lmjR1CyglHC2QB7VwZIIlRkWtj/sZ2x k1J9TaTKa8yF9lwG1R0tNUelEvPbIPAv+YHQ0ZGuJWCAcPf9yQVjDmF1o79L09s49T6w78H 9ppw+EBwXYqrMIT0RRdWaKU5M+kplRuqmdbtKL4HVIaKKWLSLjKoTzsV1kmwDCPV1a3eO7J IASXqFuJimxcTvKTE1Ezyoi57V60BeTfr/UbKUYvf4LN9/3iawOM/a88lU1g==
Received: from [127.0.0.1] (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) by interserver.kitterman.com (Postfix) with ESMTPSA id 102B9F80226; Tue, 26 Apr 2022 13:23:05 -0400 (EDT)
Date: Tue, 26 Apr 2022 17:23:06 +0000
From: Scott Kitterman <sklist@kitterman.com>
To: dmarc@ietf.org
In-Reply-To: <f56d41a4-86e0-e195-dd0c-32189fca61c8@tana.it>
References: <CAH48Zfz5MWDuQa1DJQE_YK9gAUL4P-se4CeGAGYCf+c6D0ysaA@mail.gmail.com> <2934216.d6BrxOLGqM@zini-1880> <83b5228b-adca-3a5d-3056-3ec5befa634b@tana.it> <FC08B97A-500B-4341-AF45-B9D93F432786@kitterman.com> <f56d41a4-86e0-e195-dd0c-32189fca61c8@tana.it>
Message-ID: <7BF2E6F5-FBDA-4DF9-B533-B39080BF6F69@kitterman.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/nMigTeWIKzwYipQHdC_Bht1FZ7A>
Subject: Re: [dmarc-ietf] Additions to draft - Security Considerations
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Apr 2022 17:23:11 -0000


On April 26, 2022 4:50:08 PM UTC, Alessandro Vesely <vesely@tana.it> wrote:
>On Tue 26/Apr/2022 14:53:27 +0200 Scott Kitterman wrote:
>> On April 26, 2022 8:06:50 AM UTC, Alessandro Vesely <vesely@tana.it> wrote:
>>> On Mon 25/Apr/2022 05:56:46 +0200 Scott Kitterman wrote:
>>>> 
>>>> How about something like this:
>>>> 
>>>> 9.7 Determination of the Organizational Domain For Relaxed Alignment
>>>> 
>>>> DMARC evaluation for relaxed alignment is highly sensitive to errors in the
>>>> determination of the organizational domain if the RFC5322.From domain does not
>>>> have a published policy.  If an incorrectly selected organizational domain is
>>>> a parent of the correct organizational domain, then relaxed alignment could
>>>> potentially allow a malicious sender to obtain DMARC PASS.  This potential
>>>> exists for both the legacy [RFC 7489] and current [Section 4.8] methods for
>>>> determining the organizational domain.
>>> 
>>> 
>>> I object that this text undermines the robustness of the protocol and may sound like a campaign for strict alignment.  Relaxed alignment is safer from a flexibility POV, as it accounts for occasional @hostname.example.com.  It has played a relevant role in DMARC success, and it's not by chance the default.
>>> 
>>> Here's an alternative text:
>>> 
>>>    DMARC evaluation for relaxed alignment is sensitive to errors in the
>>>    determination of the organizational domain due to erroneous DNS settings by
>>>    either the organizational domain or its PSD parent.  If the PSD parent is
>>>    incorrectly selected as organizational domain, then relaxed alignment can
>>>    potentially allow a malicious sender to obtain DMARC PASS while
>>>    impersonating the relevant organization.  This potential exists for both
>>>    the legacy [RFC 7489] and current [Section 4.8] methods for determining the
>>>    organizational domain.
>>> 
>>> 
>>>> This issue is completely avoided by use of strict alignment and publishing
>>>> DMARC records for all domains/sub-domains used as RFC5322.From domain in an
>>>> organization's email.
>>> 
>>> 
>>>   or by publishing psd=n.
>>> 
>>> 
>>>> For cases where strict alignment is not appropriate, this issue can be
>>>> mitigated by periodically checking the DMARC records, if any, of PSDs above
>>>> the organization's domains in the DNS tree and (for legacy [RFC 7489] checking
>>>> that appropriate PSL entries remain present).  If a PSD domain publishes a
>>>> DMARC record without the appropriate psd=y tag, organizational domain owners
>>>> can add psd=n to their organizational domain's DMARC record so that the PSD
>>>> record will not be incorrectly evaluated to be the organizational domain.
>>> 
>>> 
>>> The latter alternative is obviously easier than monitoring the DNS settings of the PSD parent, and has to be carried out anyway in case.
>> 
>> What specifically do you object to?
>
>
>A quick skim through your text seems to be summarizable as "DMARC has a defect but you can overcome it by using strict alignment".  I know that's not what you meant, but it sounds quite like that.
>
>
>> Do you think it's inaccurate that this concern is limited to relaxed alignment?
>
>
>No, I think it's wrong to blame relaxed alignment.
>
>
>> The specific suggestion you added (or by publishing psd=n) is already in the text later on, so I'm not understanding what you think the problem is or what you want to do about it?
>
>
>The alternative text above differs slightly from the first paragraph of the text you proposed, in an attempt at watering down that meaning.

Okay.  Explain how the issue occurs when alignment is strict?

Scott K