Re: [dmarc-ietf] DMARC2 & SPF Dependency Removal

Douglas Foster <dougfoster.emailstandards@gmail.com> Sun, 18 June 2023 17:56 UTC

Return-Path: <dougfoster.emailstandards@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7715DC14CE5D for <dmarc@ietfa.amsl.com>; Sun, 18 Jun 2023 10:56:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.085
X-Spam-Level:
X-Spam-Status: No, score=-2.085 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wKHtYwKOcUT1 for <dmarc@ietfa.amsl.com>; Sun, 18 Jun 2023 10:56:29 -0700 (PDT)
Received: from mail-lj1-x22f.google.com (mail-lj1-x22f.google.com [IPv6:2a00:1450:4864:20::22f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ED037C14CEFC for <dmarc@ietf.org>; Sun, 18 Jun 2023 10:56:28 -0700 (PDT)
Received: by mail-lj1-x22f.google.com with SMTP id 38308e7fff4ca-2b47bfd4e45so282671fa.0 for <dmarc@ietf.org>; Sun, 18 Jun 2023 10:56:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1687110987; x=1689702987; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=8VzSYk+g244TwP5ANOy4gF4RD1X/Fh4ABSSrap1u9D4=; b=FekfO0LyeEBVYU+snBrMVHe2JEoNCAX4SxFl3v1VVsi17+6iCa6CTwOPBpKHJIlVC8 Zy4z0KzAfjONbGnBqGE4FZM64BLe/78NH1W7VjjAtzyU69NYS/7MoiAtoLPTyxtDAPSo 5r/UVU1yir6/vK1jzU4fYj5NQ5+FPqOEGGxk80uMx699CUcESFKKCU8/4HBZnvvGtWfP rJoOx++6yDvmmZ9Cgtmt1SWonY87XVX4GidXYlrPGwfHAnofqeoxAsxEgSAQK42Rp5zy UOaWh2o0wIKhOUoqn86GcA+hADm+Hgr9JGgaO7rWUQfoJxzI+JRqYThZ50LM5X+gc/MD zjfA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687110987; x=1689702987; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=8VzSYk+g244TwP5ANOy4gF4RD1X/Fh4ABSSrap1u9D4=; b=VHaWKJI8MM5J662Juq36mdnHg5GLlWo4I/Aonsh31vhG9agl2jbJ9xivriI9iUY2hW Oqn4a2+6X60FkElUMTygIr4yzMxTpUTRUttnSnplk0PBHhgCr716WbrMa+yG53p3ceIx tnT6Nu9RIYxIYSx8yNUStSS59sn5Xi7655pe0i5WpDAj6HFZfAzprRwR3ceSyCHVUzPx 12/8RertfZu3WUBmsST3CHaAd5CpyShI4l2u+hTRj/pUthq3gENFwzNOeqlm18r51U/n OVt18qr7JFkHKJCxJ8OGaYapCilhFmKaQeS6eoT3JyHlvI6bWyeVG4pHywCneYyJn1zX INvg==
X-Gm-Message-State: AC+VfDyLGEVU6Zx6pjxPWKYHT8ht5iJlrN+HQSUsXnTNlTp2HrlIt34f klsvGx9vx/YDljEaw01aif0iHo7RgUce73IfZlola+lf
X-Google-Smtp-Source: ACHHUZ6XkXoP35r5LMQYV2Vou5kBD4xD5vtjcjFhXUzoiZX6Bm5yudmoPqeYVOEWOqcII96Azj9aK2OQZQM+9Bym3cM=
X-Received: by 2002:a05:6512:465:b0:4f4:cd03:cec8 with SMTP id x5-20020a056512046500b004f4cd03cec8mr3804092lfd.51.1687110986356; Sun, 18 Jun 2023 10:56:26 -0700 (PDT)
MIME-Version: 1.0
References: <30BB83B2-B454-41B8-992B-8E2569802D9C@1und1.de> <D225D7FC-C570-4B63-A694-9F16DB1F33E1@kitterman.com> <CALaySJKwuOK-81dW2H9dtURxa5mLQDUNo+MWcs+Hho8N+yP9qg@mail.gmail.com> <2817813.dRqVH37e0G@localhost> <CALaySJJbPFBAV_7mZaARYWuMzuX+74r2Cm0jD+z92_iuFRn_MQ@mail.gmail.com> <25736.57534.195344.782189@fireball.acr.fi> <1ec42959-977a-9ce0-907a-83a5eb2b6ef2@tana.it> <25739.5435.550786.601699@fireball.acr.fi> <25739.33240.127804.524371@fireball.acr.fi> <5d9a0b0f-8777-2494-d779-376c6ab8b37d@tana.it> <7d39aa8e-dacc-05fa-eff1-2cc350d521db@inboxsys.com> <CAH48ZfwyBwfKzG_3R5uyV6tmY0yUtWy=5yAoAOEhUGn_Rz6HNw@mail.gmail.com> <47b8a0c7-6a52-a4ad-e98e-8cb2f881713e@inboxsys.com> <285f2d2e-13fd-7cdc-c816-fba759f0745b@dusatko.org> <CAH48ZfzhyZK3RQHXH-PPk=sqY9gOtpA85vV-Myyo_RrEvOGu-Q@mail.gmail.com> <CAEYhs4F9=GDsCuQ9pAi8z-MBNHUJ9jZCwipT3Qe_YjaD65s9mA@mail.gmail.com>
In-Reply-To: <CAEYhs4F9=GDsCuQ9pAi8z-MBNHUJ9jZCwipT3Qe_YjaD65s9mA@mail.gmail.com>
From: Douglas Foster <dougfoster.emailstandards@gmail.com>
Date: Sun, 18 Jun 2023 13:56:15 -0400
Message-ID: <CAH48Zfz-GRvXhOAWYn_mAypyoWm4L3=BKBxJad6X5NSFDD83yQ@mail.gmail.com>
To: Ken Simpson <ksimpson@mailchannels.com>
Cc: Jan Dušátko <jan=40dusatko.org@dmarc.ietf.org>, dmarc@ietf.org
Content-Type: multipart/alternative; boundary="00000000000009dd3305fe6b23c6"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/r5EtvgwAidveVf-HPECzFCa1Xvs>
Subject: Re: [dmarc-ietf] DMARC2 & SPF Dependency Removal
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 18 Jun 2023 17:56:33 -0000

I suspect that many domain owners have not considered the possibility of
using DKIM with SPF NONE.

Then there is the concern about evaluators that understand SPF but do not
understand DMARC.   Do they treat SPF NONE as acceptable or suspicious?

For your situation Ken, do your clients have the ability to connect their
web-generated email to a DKIM signing server?   If not, do you envision
providing that service (with SPF AUTH login to ensure clients are kept
separate from each other))?

DF

On Sat, Jun 17, 2023 at 5:39 PM Ken Simpson <ksimpson@mailchannels.com>
wrote:

> FWIW, I'd like to chuck my hat in the ring on the side of removing SPF
> from the next iteration of DMARC. As the operator of an email delivery
> service with tens of millions of primarily uncontrolled senders on web
> hosting servers, it would be *great* if domain owners could assert via
> their DMARC record that receivers should only trust DKIM-signed email.
> While one option would be to allow the specification within the DMARC
> record of acceptable authentication methods, removing SPF altogether would
> be more straightforward.
>
> Domain owners constantly struggle to keep their SPF records up to date.
> Errors are easy to make, and the consequences of a mistake can be grave,
> particularly for domains that are a frequent target of phishing gangs.
>
> At least with DKIM, domain owners can take charge of their authentication
> rather than delegating any part of it to third parties (for instance, via
> spf include records).
>
> Regards,
> Ken
>
> On Sat, Jun 17, 2023 at 11:25 AM Douglas Foster <
> dougfoster.emailstandards@gmail.com> wrote:
>
>> In general, message recipients lack the expertise needed to distinguish
>> between legitimate and fraudulent identities.    Most users do not know how
>> to read message headers or how to make sense of them if shown.   Whenour
>> automated evaluation systems and administrative quarantine cannot resolve
>> an ambiguity, users cannot be expected to do better with less information.
>> Domain-specific tolerance for risk needs to be implemented with
>> domain-specific policies, but not with end-user discretion.
>>
>> DMARC has limited scope.  In its purest form, it only blocks
>> impersonations when the domain has a DMARC policy, the policy specifies
>> enforcement (quarantine or reject), and the policy is detected correctly
>> (absence of PSL errors and absence of in-transit changes).   Only a subset
>> of domains have a DMARC policy, and only a subset of those domains have
>> enforcement. So only a small percentage of impersonation attacks can be
>> protected by DMARC.  For that very limited defense to work, domain owners
>> and evaluators need a high level of confidence in a PASS result.
>> Eliminating the PSL increases the confidence in PASS even if it creates
>> some increase in false failures.   Eliminating SPF will have the same
>> effect, and is desirable for the same reason.   Our assumption is that
>> DMARC-enforcing domain owners are highly motivated and will reconfigure as
>> necessary to ensure DMARC PASS results.
>>
>> This same logic raises questions about whether relaxed authentication
>> remains necessary or appropriate.  With SPF, relaxed authentication seems
>> necessary because changing the MailFrom domain to match a desired From
>> domain is complex.   For DKIM, I see no important obstacles which prevent
>> the signature domain  from exactly matching the From domain.
>>
>> ARC addresses the one problem that domain owners cannot prevent, which is
>> forwarding with in-transit changes.
>>
>> Evaluators and recipients have a much larger problem.  They need to
>> protect themselves from all impersonation attacks, which DMARC does not
>> attempt.   Their defenses must be implemented within the limits of
>> information available at evaluation time.   If the message has a relevant
>> DKIM signature but no DMARC policy, the DKIM PASS is still a valid
>> indication that the message is not impersonated.   Similarly, if the
>> message has no signature but produces SPF PASS with exact alignment, the
>> SPF PASS result indicates that the message is probably not impersonated.
>> Conversely, SPF FAIL and SPF NONE service to increase the suspicion of an
>> impersonation.
>>
>> Evaluators use sender authentication to perform a three-way split on
>> messages:
>> - Messages from verified and highly trusted senders are allowed to bypass
>> some or all content filtering.
>> - Messages from unwanted senders are unconditionally blocked prior to
>> content filtering.
>> - Messages from all other senders are accepted if they pass content
>> filtering.
>>
>> The more effective your sender authentication, the less you need perfect
>> content filtering.   Similarly, the more perfect your content filtering,
>> the less you need optimal sender authentication.
>>
>> In summary, your instincts are correct, SPF has a long term role in your
>> defenses, even if it is not part of the DMARC specification.
>>
>> Doug Foster
>>
>> On Sat, Jun 17, 2023 at 8:28 AM Jan Dušátko <jan=
>> 40dusatko.org@dmarc.ietf.org> wrote:
>>
>>> Hi
>>>
>>> I would like to know your opinion on the options currently available to
>>> the system administrator. If it is trying to define a policy that allows
>>> recipients to authenticate emails, its options are, in my opinion,
>>> limited.
>>> - The issue of SPF and cloud systems mentioned, or including over
>>> networks with mask /8 or /16 is extremely inappropriate
>>> - It is not possible to set up the enforcement of DKIM signatures
>>> because DomainKey and its policies are not related to DKIM and there is
>>> no similar technology for DKIM (ADSP is not used)
>>> - If I am the administrator of hundreds or thousands of domains, it is
>>> in my interest to provide the recipient with information about the
>>> sender's authentication options. For example, all emails use DKIM, all
>>> emails use ARC, all emails use SPF ... and if not, you can discard them.
>>> But I do not have this option with DMARC.
>>> I understand that this is in the middle of what DMARC2 is supposed to
>>> address. But could there be a possibility for the DMARC2 record
>>> administrator to define a policy for domains and provide relevant
>>> information for recipients? It is the recipient's decision whether to do
>>> this verification, but it is also the sender's decision to offer this
>>> information. Unfortunately, at this point, either the signature is
>>> valid, or wrong, or it is not. If it is not possible to accept the
>>> e-mail, but the recipient does not have the option of verifying whether
>>> the sender's domain enforces this signature. It is similar with SPF. And
>>> DMARC2 seems to me to be a good place for these definitions. But I would
>>> like to avoid of forced removal of SPF, please let it for administrator
>>> decision.
>>>
>>> Regards
>>>
>>> Jan
>>>
>>> Dne 16. 6. 2023 v 13:28 Sebastiaan de Vos napsal(a):
>>> > The need for separate DKIM failure codes to be able to separate
>>> > between in-transit changes and public key errors is more than just
>>> > valid and I don't consider SPF worthless in general, but I just find
>>> > it disturbing how the obviously misplaced confidence in SPF currently
>>> > weakens the whole DMARC standard.
>>> >
>>> > Is it not in our best interest to encourage and motivate in particular
>>> > the less sophisticated senders to use the higher confidence mechanisms?
>>> >
>>> >
>>> > On 16.06.23 13:02, Douglas Foster wrote:
>>> >> RFC 7489 takes 8 different authentication mechanisms and lumps them
>>> >> into a single PASS result:
>>> >> DKIM or SPF, each with up to four types of alignment:  same domain,
>>> >> parent->child, child->parent, and sibling->sibling
>>> >>
>>> >> These eight mechanisms all provide some level of confidence that the
>>> >> message is not impersonated, but they do not provide an equal level
>>> >> of confidence.
>>> >>
>>> >> Unsophisticated senders have little incentive to use the higher
>>> >> confidence mechanisms because any PASS result is still PASS.  The
>>> >> solution is not to pretend that SPF is worthless, because that is an
>>> >> overstatement.   The solution is to talk about the differences in
>>> >> confidence provided by the different authentication methods, and note
>>> >> that evaluators have reason to distrust some of them.   That distrust
>>> >> could cause a weakly authenticated message to be distrusted by some
>>> >> evaluators.
>>> >>
>>> >> Similarly, needs multiple types of FAIL.   Since the data indicates
>>> >> that missing (or invalid) public keys are a significant portion of
>>> >> all failures, it needs a separate failure code from "normal" failures
>>> >> which suggest in-transit changes.  The DKIM group needs to define the
>>> >> result code but this group would need to integrate it into our
>>> >> aggregate reports.
>>> >
>>> >
>>>
>>> --
>>> -- --- ----- -
>>> Jan Dušátko
>>>
>>> Tracker number: +420 602 427 840
>>> e-mail:         jan@dusatko.org
>>> GPG Signature:  https://keys.dusatko.org/E535B585.asc
>>> GPG Encrypt:    https://keys.dusatko.org/B76A1587.asc
>>>
>>> _______________________________________________
>>> dmarc mailing list
>>> dmarc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dmarc
>>>
>> _______________________________________________
>> dmarc mailing list
>> dmarc@ietf.org
>> https://www.ietf.org/mailman/listinfo/dmarc
>>
>
>
> --
>
> Ken Simpson
>
> CEO, MailChannels
> <https://www.mailchannels.com/?utm_source=Email%20Signature&utm_medium=Ken%20Simpson&utm_campaign=Website>
>
>
> Facebook <http://bit.ly/2dnoP3K>  |  Twitter <http://bit.ly/2ehoWni>  |
> LinkedIn <http://bit.ly/2dw87lU> |  Help Center
> <https://mailchannels.zendesk.com/hc/en-us?utm_source=Email%20Signature&utm_medium=Ken%20Simpson&utm_campaign=Help%20Center>
>
> Our latest case study video: watch here!
> <https://www.youtube.com/watch?v=psb41xDIL9k>
>