Re: [dmarc-ietf] Ticket #1 - SPF alignment

Scott Kitterman <sklist@kitterman.com> Fri, 12 February 2021 18:01 UTC

Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B7BC3A1858 for <dmarc@ietfa.amsl.com>; Fri, 12 Feb 2021 10:01:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=kitterman.com header.b=Z/MmmFIP; dkim=pass (2048-bit key) header.d=kitterman.com header.b=lbWQ3ysk
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hW84PlmeaYZi for <dmarc@ietfa.amsl.com>; Fri, 12 Feb 2021 10:01:45 -0800 (PST)
Received: from interserver.kitterman.com (interserver.kitterman.com [64.20.48.66]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E78A13A1844 for <dmarc@ietf.org>; Fri, 12 Feb 2021 10:01:44 -0800 (PST)
Received: from interserver.kitterman.com (interserver.kitterman.com [64.20.48.66]) by interserver.kitterman.com (Postfix) with ESMTPS id AECADF80271 for <dmarc@ietf.org>; Fri, 12 Feb 2021 13:01:43 -0500 (EST)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903e; t=1613152903; h=from : to : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type : from; bh=JTOcIAHyqI4UkqTN88g8rSjUhb3JfpkIH4PmLcJ/jdU=; b=Z/MmmFIPgjHZjzbBo4Ogueb5r28jpBcxZaYVHMFOmfamqGMtNUBggIrlKFc2fFNGNPSPd 329X2JaEFdq0fwDBw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903r; t=1613152903; h=from : to : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type : from; bh=JTOcIAHyqI4UkqTN88g8rSjUhb3JfpkIH4PmLcJ/jdU=; b=lbWQ3yskJ28Eer8IOiWf9fah5YWEHkCy6L6Xe+WVHcJH3kGsXv7r+evEnd/EuRRsSk7lW kpr2ftrAmcvL1DOMNJ13fYIPoRx3JbA0vJyErooxcYFe39YGKPjMWD41/JoSq/YZcNORinb VUr+zG5hZqbPnPMe1kGFYuJ6XAMvF5FCv9J0fiUeeQOU/bHPp1ZuuwGMFg7avhfH5cdbGB1 vY9Bm8yfyuLweiDtrqOL4asyn1i+TRIU1JsUug/GJlgNmR8kE8MTUwWxWRuUkvjOGcKnfM/ OX22vFrsAtz7DLi2Nz6fGOJ76NdW6PedyTxvGas4tEQpnQiIuchKwyVQJEog==
Received: from zini-1880.localnet (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) by interserver.kitterman.com (Postfix) with ESMTP id 69A19F80218 for <dmarc@ietf.org>; Fri, 12 Feb 2021 13:01:43 -0500 (EST)
From: Scott Kitterman <sklist@kitterman.com>
To: dmarc@ietf.org
Date: Fri, 12 Feb 2021 13:01:43 -0500
Message-ID: <3044649.0BfFdxGTVy@zini-1880>
In-Reply-To: <CAH48ZfwyMGCam8Mdk=vrYcFaEU6z0RMUoY9LD8n8JWeNi_hCLg@mail.gmail.com>
References: <20210203181226.9AB746D51182@ary.qy> <5450463.gl6gDTMLP0@zini-1880> <CAH48ZfwyMGCam8Mdk=vrYcFaEU6z0RMUoY9LD8n8JWeNi_hCLg@mail.gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/ry6EkjdURjvXIyHl_R3M40195x8>
Subject: Re: [dmarc-ietf] Ticket #1 - SPF alignment
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Feb 2021 18:01:54 -0000

I didn't miss it.  I don't think it's meaningful.

In the real world, outside the IETF one of three things happens:

1.  Everything works fine.

2.  Someone depends on HELO evaluation of SPF and discovers from evaluating 
the feedback reports that's it's a problem and then doesn't to that anymore.

3.  Someone depends on HELO evaluation of SPF and doesn't discover it's a 
problem because they don't look at their feedback reports.

For case 1 and 2, there's no issue.

Case 3 doesn't care if their mail gets delivered, so its fine.

This excessive focus on irrelevant minutia is harmful to the IETF.  It makes 
participation less interesting for technically capable contributors and 
reduces the overall value of the discourse.

Many people have suggested we move on.  My prediction is you won't, but this 
is my last email on the topic.

Scott K

On Thursday, February 11, 2021 11:24:16 PM EST Douglas Foster wrote:
> You missed my main point.   I will restate it, and then address your threat
> question.
> 
> If there are N ways to establish authentication, then a recipient only
> needs to choose one of them, but a sender who wants to be validated by all
> recipients must implement all of them.   One purpose of the specification
> is to constrain that complexity.
> 
> So the convenient solution would be to say that SPF HELO must be ignored,
> except for null sender, because doing so reduces the number of variables
> that must be considered by senders.   It is also probably consistent with
> the logic of many current implementations.   I just do not believe that it
> is justified to tell recipients that they MUST NOT evaluate SPF HELO when
> MAILFROM is present.
> 
> An alternative would be to say that SPF HELO and SPF MAILFROM should both
> be evaluated.   In the long run, this is arguably the best theoretical
> solution, but the fear of short-term pain from false positives probably
> makes this unattractive.
> 
> So, I am back to the only solution that seems justifiable:    Senders
> SHOULD comply with both MAILFROM and HELO policies because SOME recipients
> may evaluate both criteria, but many will only evaluate MAILFROM because
> the incremental theoretical benefit seems less than the incremental cost.
> 
> - - -
> 
> To your point about threat vectors:  DMARC alignment is based on nested
> layers of trust, and the trust is broken if you skip layers.  The server
> operator provides a mail server environment to a mail domain, and the mail
> domain provides delivery services for an author.
> 
> SPF proves that the mail domain (indicated by the MAILFROM address) really
> uses the services of the server domain, and therefore the server (indicated
> by IP address, HELO, and possibly ReverseDNS) is authorized to send
> messages on behalf of the mail domain.
> 
> DMARC proves that the source server for the message was authorized to speak
> on behalf of the author (indicated by the From address).
> 
> You suggest that if SPF HELO passes, and aligns with FROM, then we have
> established that the server is authorized to speak for the author.   This
> is true, but it does not establish that the mail domain in the MAILFROM
> address has that right.
> 
> When the MAILFROM domain is different from the HELO domain, this implies
> that that MAILFROM domain is a client of the server domain.   The server
> domain has the right to emit messages for the client, but the client domain
> does not have the right to email messages claiming to be from the server
> domain.
> 
> - - -
> 
> It can be asserted that the server domain should be able to use its
> firewall to prevent unauthorized servers from emitting mail, and should be
> able to use its outbound gateway to prevent client domains from emitting
> messages from the server domain, other clients, or any unrelated domain.
> These commonly implemented measures could eliminate the need for checking
> SPF HELO.   Why should others check what the sender should be able to do
> for themselves?
> Are we prepared to make this argument?   If so, then the existing wording
> stands, but needs a solid justification.
> 
> DF
> 
> On Thu, Feb 11, 2021 at 8:50 AM Scott Kitterman <sklist@kitterman.com>
> 
> wrote:
> > What problem are you purporting to solve?
> > 
> > By problem, I mean a case were a bad actor can get a DMARC pass result if
> > SPF
> > HELO results are allowed to be used that they couldn't already get with a
> > mail
> > from result.
> > 
> > I don't think such a case exists which is why I think this entire line of
> > argument is a waste of time.
> > 
> > Scott K
> > 
> > On Thursday, February 11, 2021 6:35:49 AM EST Douglas Foster wrote:
> > > Applying SPF to DMARC could become out of scope, if we choose to remove
> > 
> > SPF
> > 
> > > from DMARC and make it dependent only on DKIM.   Until then, we need to
> > > have a shared understanding of how SPF is applied.  This question asks
> > > whether that shared understanding exists.
> > > 
> > > SPF involves two tests, which can be used together.   This WG can insist
> > > 
> > > that for DMARC purposes, only one can be used:
> > >     "When the sender is not null, DMARC-evaluation only considers the
> > >     SPF
> > > 
> > > evaluation of the MAILFROM Address.   SPF evaluation of HELO MUST NOT be
> > > considered for DMARC purposes."
> > > 
> > > This wording seems implied by the current language, and by those who
> > > want
> > > to leave it untouched.  Implication is different from specification, so
> > 
> > our
> > 
> > > document should make this explicit.   Unfortunately, an explicit MUST
> > > NOT
> > > requirement is hard to justify.   When two domains are involved, and
> > > both
> > > domains have published policy information, what justification exists for
> > > ignoring some of the available security-related information?
> > > 
> > > If we back away from MUST NOT, then we have to consider that some
> > > recipients MAY evaluate SPF HELO and SPF MAILFROM together, just as the
> > 
> > SPF
> > 
> > > RFC expected them to be used, and as outlined in one of my examples.
> > 
> > If
> > 
> > > some recipients MAY evaluate HELO, then senders SHOULD take care to
> > 
> > ensure
> > 
> > > that HELO will generate a PASS.   Our language becomes something like
> > 
> > this:
> > >     "When the sender is not null, DMARC-evaluation always uses the SPF
> > > 
> > > evaluation of the MAILFROM Address.   Some recipients may evaluate SPF
> > 
> > HELO
> > 
> > > as well.   To maximize recipient trust, senders SHOULD publish an SPF
> > > policy which ensures that both MAILFROM and HELO will produce SPF PASS
> > > results."
> > > 
> > > DF
> > > 
> > > On Wed, Feb 10, 2021 at 6:29 PM Dave Crocker <dcrocker@gmail.com> wrote:
> > > > On 2/10/2021 3:24 PM, Douglas Foster wrote:
> > > > > Huh?  Are you asserting that SPF MAILFROM and SPF HELO are
> > > > > interchangeable?   They are not, but they can work together.
> > > > 
> > > > Perhaps I misread, but I thought I saw that this really is out of
> > > > scope
> > > > for this working group.
> > > > 
> > > > 
> > > > d/
> > > > 
> > > > --
> > > > Dave Crocker
> > > > dcrocker@gmail.com
> > > > 408.329.0791
> > > > 
> > > > Volunteer, Silicon Valley Chapter
> > > > American Red Cross
> > > > dave.crocker2@redcross.org
> > 
> > _______________________________________________
> > dmarc mailing list
> > dmarc@ietf.org
> > https://www.ietf.org/mailman/listinfo/dmarc