Re: [dmarc-ietf] PSD Related Privacy Considerations For Aggregate Reporting Draft

Douglas Foster <dougfoster.emailstandards@gmail.com> Fri, 03 February 2023 08:35 UTC

Return-Path: <dougfoster.emailstandards@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC722C15C528 for <dmarc@ietfa.amsl.com>; Fri, 3 Feb 2023 00:35:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.094
X-Spam-Level:
X-Spam-Status: No, score=-2.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YTMiGOtrOHt4 for <dmarc@ietfa.amsl.com>; Fri, 3 Feb 2023 00:35:32 -0800 (PST)
Received: from mail-lj1-x229.google.com (mail-lj1-x229.google.com [IPv6:2a00:1450:4864:20::229]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CFF68C15C509 for <dmarc@ietf.org>; Fri, 3 Feb 2023 00:35:31 -0800 (PST)
Received: by mail-lj1-x229.google.com with SMTP id bf19so4522716ljb.6 for <dmarc@ietf.org>; Fri, 03 Feb 2023 00:35:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=7KqhOS1/HQGl3LdF6s1kl0HtrbCVH9E+F3DuXdk5dKc=; b=CWbMM0zkN8flvB7e58DuNRqKODN8ANQPQifmPiMBZkcbfBD3dKufH1Gn4ZXEKEos9S V/sdH1Wvnd8+jmOGwB8v2U0lYeLZMpEV7X/xGOZ4oJ1HTNIKzSc+FNOoS+dlivGXqiPp 6si+BboTYG596f9XCf38OaYy1tNLVCuUh6lpTwymBLtjaWF67bAeddmrdnyvGqEzSveu zeN76xPik+vx5isJH3AH+Qmj6LFyJHkuNFWF8X5aviHbV7AokpxJe+AMouQkxcQRuLLF yQjOZe3OHCPpQNqD/oSDnTipCYSueKTX7iB443uK6gMigduQzmIfxIEBktV/jhn1pvAU grlA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=7KqhOS1/HQGl3LdF6s1kl0HtrbCVH9E+F3DuXdk5dKc=; b=lRE20K0+MukwD59axAHocL1YuFNLOPhcPM8aH9/N2CKxxVjXHaF/u3Yai9IsDAU7hF HqF9suBIFGSn+IkTxX6P4nhX+tJumFqj+7VS270vwH9GbHziCCl0zETj2Bmm5LdMktAr 4VbjjMNe1ldDb6mCQICA4vFm4BoG5G8P49ND5Ph++Arnux3CE1LNF5h2KTCuzPgNJMw4 VnPjYTY149dcYhkii1LuNWFDj9bJ1CLy/pmzFSkBlU2sWmQJRrCQmpU6+h5d5lOEPjbX PGwp280p7Ohmp+ZkR97ZKmJNp2Cj+cMe75N1xxO3L6bUFPJWDBHaFHExdsuRFO18DZeW 87Gg==
X-Gm-Message-State: AO0yUKW9/8JQQlk16A0oQjOdOJujjPl1dSHc+AUlIq35E61W5lSTU9Xf 5w3e52UcpDH57MZghnyjMUaLMcif6/5lSpmCDwo=
X-Google-Smtp-Source: AK7set+tA2+4E7cSwzLCFJTglZ6axMyimogPWiamtH5+O86gzItbyE0mQKH3Klu0dScGrB8J9H4Pj4dtKnN+ofdVM+E=
X-Received: by 2002:a2e:5317:0:b0:28e:2a48:ca7d with SMTP id h23-20020a2e5317000000b0028e2a48ca7dmr1231212ljb.205.1675413329491; Fri, 03 Feb 2023 00:35:29 -0800 (PST)
MIME-Version: 1.0
References: <11529029.Y877iPkkNG@zini-1880> <MN2PR11MB43510C0C3C2B94846144F102F7EA9@MN2PR11MB4351.namprd11.prod.outlook.com> <CABZJ8k=Rkh9+AoDA+N2tawU+GkizNRS-MG14sRayYHWBmFP62A@mail.gmail.com> <CAH48Zfy8eqoXhqEZCe8GGSDvTccYiBi0ETipfWRMvNuTEqy-_w@mail.gmail.com> <CAHej_8=mDe15Soyt-VN7Sb_==8ggXQPJ=8a9vkdC1-PYJS-PWg@mail.gmail.com> <CAH48ZfxKY7ZPo0K=SBQxr1frMPvijjR1wuw+xGZ7wbjNjvYZrg@mail.gmail.com>
In-Reply-To: <CAH48ZfxKY7ZPo0K=SBQxr1frMPvijjR1wuw+xGZ7wbjNjvYZrg@mail.gmail.com>
From: Douglas Foster <dougfoster.emailstandards@gmail.com>
Date: Fri, 03 Feb 2023 03:35:19 -0500
Message-ID: <CAH48Zfyn0gckyrjwmSjF_hMMVhJuCK0ipWq=7pUVzmwzRSfS9w@mail.gmail.com>
To: Todd Herr <todd.herr=40valimail.com@dmarc.ietf.org>
Cc: IETF DMARC WG <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000005b39ec05f3c79020"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/rCr-dm3_fdYocTQxymHvk0nctKw>
Subject: Re: [dmarc-ietf] PSD Related Privacy Considerations For Aggregate Reporting Draft
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Feb 2023 08:35:35 -0000

Time to eat crow.

You are right, the RFC5322.From address is the default Reply-To.   The rest
of the argument stands.

So let's do a simple test on real mail:    Somebody implement the proposed
NP test to detect non-existent subdomains of legitimate mail.   Don't count
messages that are rejected because of NXDOMAIN on the SPF policy lookup.
 Don't count messages that are rejected because of DMARC QUARANTINE or
REJECT.   That leaves messages with these characteristics:
- MailFrom domain exists
- From organization domain exists
- From domain does not exist based on your NP language, or any other
non-replyable rule you want to use.

Process between 1000 and 1,000,000 messages and review the ones that are
flagged by your test.   Report (a) number of messages flagged as suspicious
based on your  rule, and (b) number of unwanted messages flagged within
that group.    My testing indicates that the (a) group will be small and
the (b) group will be very close to zero.

The reality is that attackers have very little reason to attack a
non-existent subdomain, because they always have existent subdomains that
will be more promising targets because they are real.    If they do start
attacking non-existent subdomains, there are existing options to defend:

- To protect non-existent subdomains only, without affecting mailing
lists:   use domain-level p=none policies on all subdomains that send mail,
and sp=reject on the organization domain.

- To protect all subdomains:  use sp=reject on the organization domain.

Maybe somebody can produce different results than my testing, since
everyone's mailstream is different.   I look forward to your evidence.

Doug Foster



On Thu, Feb 2, 2023 at 11:36 PM Douglas Foster <
dougfoster.emailstandards@gmail.com> wrote:

> Please give me credit for having thought about non-existent domains when
> everyone else was insisting that the MX-A-AAA test will work for
> RFC5322.From, simply because it works for the RFC5321.MailFrom.
>
> As for non-existent subdomains, I have documented all of this previously:
>
> - RFC5322.From has nothing to do with the ability to reply to a message.
>  Replies are determined by RFC5321.MailFrom or the Reply-To header.
>  Additionally, a high percentage of mass mailings are sent with some
> version of a NOREPLY name, and are accepted as a matter of course.  There
> is even a NOREPLY.COM domain that is used for this purpose by some of my
> correspondents.
>
> - DMARC relaxed alignment can be used to authenticate a non-existent
> RFC5322.From domain using an existent and verified MailFrom or DKIM domain.
>
> - Real senders send legitimate messages from non-existent RFC5322.From
> domains.  I do not have a particularly large incoming mail flow, but when I
> tested for the condition, I was averaging about one message in 1000 were
> from non-existent subdomains of existent parent domains.  It added nothing
> to my filtering effectiveness so I turned off the test after documenting my
> results to the group.
>
> All domains must be registered with a PSO, therefore a non-existent
> organization is fraudulent, and it is in the legitimate interest of the PSO
> to inhibit such fraud by any means possible.   Non-existent domains of a
> registered domain are in internal matter at not the business of the PSO.
>  If a contractual relationship between the PSO and the domain owner has
> stricter requirements, it is not something that can be enforced by an
> evaluator who is not a party to the contract.
>
> The current language says what you intend, and what you intend is a
> mistake.  Again.
>
> DF
>
> On Thu, Feb 2, 2023 at 9:13 AM Todd Herr <todd.herr=
> 40valimail.com@dmarc.ietf.org> wrote:
>
>> On Wed, Feb 1, 2023 at 7:14 PM Douglas Foster <
>> dougfoster.emailstandards@gmail.com> wrote:
>>
>>>
>>> What does matter is that the NP policy should only apply when the
>>> organization domain is non-existent.   Existing domains have the right to
>>> send using a non-existent subdomain.
>>>
>>
>> I disagree with both statements here.
>>
>> A policy record containing an 'np' tag cannot exist in the DNS at
>> _dmarc.domain without the name 'domain' existing in the DNS, so I can't
>> even really parse your first statement. Can you clarify what you mean here,
>> please?
>>
>> Beyond that, the np tag is currently defined (correctly, in my opinion)
>> thusly:
>>
>> Indicates the message handling preference of the Domain Owner or PSO for
>> mail using non-existent subdomains of the domain queried. It applies only
>> to non-existent subdomains of the domain queried and not to either existing
>> subdomains or the domain itself.
>>
>>
>> As for the claim that existing domains have the right to send using a
>> non-existent subdomain, while such sending practices are outside the scope
>> of DMARC, those domains should have no expectation that such mail will be
>> accepted, on the grounds that the RFC5322.From domain being non-existent
>> means that the message cannot be replied to, and is therefore not worthy of
>> acceptance.
>>
>> --
>>
>> *Todd Herr * | Technical Director, Standards and Ecosystem
>> *e:* todd.herr@valimail.com
>> *m:* 703.220.4153
>>
>> This email and all data transmitted with it contains confidential and/or
>> proprietary information intended solely for the use of individual(s)
>> authorized to receive it. If you are not an intended and authorized
>> recipient you are hereby notified of any use, disclosure, copying or
>> distribution of the information included in this transmission is prohibited
>> and may be unlawful. Please immediately notify the sender by replying to
>> this email and then delete it from your system.
>> _______________________________________________
>> dmarc mailing list
>> dmarc@ietf.org
>> https://www.ietf.org/mailman/listinfo/dmarc
>>
>