Re: [dmarc-ietf] Proposing an extension to DMARC to optionally require SPF and DKIM

"Murray S. Kucherawy" <superuser@gmail.com> Tue, 02 April 2013 05:50 UTC

Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 099D921F96EC for <dmarc@ietfa.amsl.com>; Mon, 1 Apr 2013 22:50:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level:
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gG4i+6fMYBwB for <dmarc@ietfa.amsl.com>; Mon, 1 Apr 2013 22:50:13 -0700 (PDT)
Received: from mail-wg0-f43.google.com (mail-wg0-f43.google.com [74.125.82.43]) by ietfa.amsl.com (Postfix) with ESMTP id 87C6721F9434 for <dmarc@ietf.org>; Mon, 1 Apr 2013 22:49:39 -0700 (PDT)
Received: by mail-wg0-f43.google.com with SMTP id f12so45545wgh.34 for <dmarc@ietf.org>; Mon, 01 Apr 2013 22:49:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; bh=xXkDCgdR2ah2TZfIxrB6NXT4kC/3DKv+dyKRE0W2KHo=; b=Mb4AjOJb6QDLY+xxX7CshgJkLcVhx3o8gRj8nvNd8kp4FhHGZHI1WEm9whYWuwRVc/ VOtfXCshZtdOhjniCcp5JDADEmAnAO5XogfUK2Fed73+aTJLrbCoYPEYxzF/Zf02t0BQ QNBDgb2YHRuvAtNcjgts89vY3rd90hPElfxZa5ugedWKUjhZ8HIf8GOVwiSCOJCSSm8p E+45bp8cRC0IkKF113p2VeURME2fwN7HXGBTIZkIHRBzu+MHzWkOQ6TK7w7DhB0zqziS ZhVl+2nNauNr97mt1VRoi8ruzHa1mhAq5GUKru7Dtog3M1Vf+//4DGFf+e7uv9Gi1g6d /PXg==
MIME-Version: 1.0
X-Received: by 10.194.242.163 with SMTP id wr3mr19085710wjc.35.1364881778505; Mon, 01 Apr 2013 22:49:38 -0700 (PDT)
Received: by 10.180.13.71 with HTTP; Mon, 1 Apr 2013 22:49:38 -0700 (PDT)
In-Reply-To: <CD3757DA7F9B46888C89CB10FF032227@fgsr.local>
References: <55b1222360ab4215a09a54da800d261b@BL2SR01MB605.namsdf01.sdf.exchangelabs.com> <515A02DB.2010309@gmail.com> <CE39F90A45FF0C49A1EA229FC9899B05633D4E@USCLES544.agna.amgreetings.com> <9b3745d8976d42df8fc9521e7f4c4b49@BL2SR01MB605.namsdf01.sdf.exchangelabs.com> <CE39F90A45FF0C49A1EA229FC9899B05633F90@USCLES544.agna.amgreetings.com> <3cc1dd69471d4f059fff49ecd3c6f45d@BL2SR01MB605.namsdf01.sdf.exchangelabs.com> <CE39F90A45FF0C49A1EA229FC9899B0563403A@USCLES544.agna.amgreetings.com> <CD3757DA7F9B46888C89CB10FF032227@fgsr.local>
Date: Mon, 01 Apr 2013 22:49:38 -0700
Message-ID: <CAL0qLwaCuaDY=HV6i5kpspar+P3Kd0m80W3XEPhWBgTu3cWOCw@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: "J. Gomez" <jgomez@seryrich.com>
Content-Type: multipart/alternative; boundary="089e013d1da8917f6504d95a4d22"
Cc: dmarc@ietf.org
Subject: Re: [dmarc-ietf] Proposing an extension to DMARC to optionally require SPF and DKIM
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Apr 2013 05:50:15 -0000

On Mon, Apr 1, 2013 at 7:44 PM, J. Gomez <jgomez@seryrich.com> wrote:

> So, you want the public to aknowledge a private practice as a public
> standard, and at the same time you don't want input from the public but
> blind adhesion, because, you know, it has been working fine in our private
> club?
>

In contrast, you're expecting that any suggestion made in this more public
venue automatically has to be accepted?  But either way we're getting ahead
of ourselves; there isn't even a working group yet.

As has already been pointed out, DMARC hasn't been private for quite some
time.  The point here is indeed to subject the specification to even more
open and rigorous review that it's already received.  There's been a public
(albeit external to the IETF) mailing list for a long while now.  The fact
that a proposed change doesn't receive favourable response doesn't mean it
didn't get considered, does it?

As for actual technical arguments, I find John's and Scott's points
compelling.  Neither DKIM nor SPF are useful defenses if you can't control
the content they authorize or authenticate.  In effect, in the attack
scenario Terry provided, SPF is giving what the victim domain perceives as
false positives.  Sticking with that scenario, the solution appears to be
to remove SPF from the equation by neutralizing its "pass" response when
coming from those IP addresses.  I keep coming back to a Venn Diagram
showing SPF pass and DKIM pass plus their overlap, which is the DMARC pass
space; if you don't want DMARC to pass for the case where SPF passed but
DKIM failed, then DMARC pass is now logically equivalent to DKIM pass.  To
enact that, just turn off SPF and sign all your mail.

On the flipside, if the victim domain's signing keys were compromised, one
could generate spam signed as them from any IP address, rendering DKIM
meaningless but SPF effective (probably).

I don't find the argument that delegating DKIM is hard to be believable.
If in Terry's application "require both" is an acceptable outcome, then his
customer base was either prepared to delegate DKIM or do it themselves
anyway.

Where is the danger? You don't have the need?, well then go with the more
> relaxed default.
>

I don't believe anyone's calling the proposal "dangerous", but the reasons
for the resistance have already been laid out.


>
> > I use shared IPs across domains
> > but I DKIM sign those domains and each of the domains has similar
> > security implementations. So from my perspective it is possible to
> > do.... I've been doing it for years.
>
> So what? Good for you. The world is wide. One size does not fit all, yada
> yada...
>

That doesn't mean this is the right place for all solutions to all
configurations, does it?


>
> Again, is the proposed optional extension damaging to DMARC's goals? Are
> DMARC's goals those of a private club, or those of the non-spoofing email
> community at large?
>

The latter, but don't conflate that goal with a requirement to be
all-inclusive either.  We couldn't alter DKIM to make it work seamlessly
with all mailing list configurations, so we stopped trying.  That doesn't
mean DKIM had a private set of requirements; rather, it had realistic ones.

-MSK