Re: [dmarc-ietf] ARC-Seal is meaningless security theatre

Bron Gondwana <brong@fastmailteam.com> Fri, 18 August 2017 23:00 UTC

Return-Path: <brong@fastmailteam.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B7E8A13214D for <dmarc@ietfa.amsl.com>; Fri, 18 Aug 2017 16:00:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.72
X-Spam-Level:
X-Spam-Status: No, score=-2.72 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fastmailteam.com header.b=h5U3jiFH; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=F1r/E8WH
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jNCIOJ44qetR for <dmarc@ietfa.amsl.com>; Fri, 18 Aug 2017 16:00:26 -0700 (PDT)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6979C1321EF for <dmarc@ietf.org>; Fri, 18 Aug 2017 16:00:23 -0700 (PDT)
Received: from compute6.internal (compute6.nyi.internal [10.202.2.46]) by mailout.nyi.internal (Postfix) with ESMTP id EC6A821A15 for <dmarc@ietf.org>; Fri, 18 Aug 2017 19:00:11 -0400 (EDT)
Received: from web4 ([10.202.2.214]) by compute6.internal (MEProxy); Fri, 18 Aug 2017 19:00:11 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= fastmailteam.com; h=content-transfer-encoding:content-type:date :from:in-reply-to:message-id:mime-version:references:subject:to :x-me-sender:x-me-sender:x-sasl-enc; s=fm1; bh=rdTYmgcIlcQYn/oAb 6dohBdejV7DWcmOhvSfOnkljEk=; b=h5U3jiFHamXlfKfb7Vd8M/Q6kx/xNAQ26 5kigh0fKZ/B7jmaNTCCX/DEKa0a4lQLJzqpUChF9yWQteJs2OC7zZ1d3ePKaaBgI 2SAVZhDaNWlBNUcKipc+aAEGCnTUgY0evWyUmbBfyHijSJfpJj6BFqAc4lS91pR5 yEJ9oE/lCf6DecugK7DvmG8GfSe8elEgjCVQJ3j6svkFuZuIhjixvAFyD7v9VCqB LAjVFApeAvt4VLe8W6XhhSdvhBkpKio9B8Gt05rQVjXoAj1HNeOCgVhTbIMBJv+/ ogvTZJ0RtZK376SN5Jb711MAxq+7fvvMQOlC+PDbK4NTkRZuMkNmA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-sender:x-me-sender:x-sasl-enc; s=fm1; bh=rdTYmg cIlcQYn/oAb6dohBdejV7DWcmOhvSfOnkljEk=; b=F1r/E8WHsPehfi4ONc7f/M UF7AM+G72wv5ersZoP7tfenR7tGUZLs5UGd94czgjE8yfmiQ09yRR1JDtNVH3QEM fYE1Zl3loJrWlJJLNCtSYi2a/mpLLROQ/6Y/EQXzqPo6Tb4nwO4iEljI+0Nic7La u6aRlLGicILvNI88zf5PYC2jTB+VC6YSCQrKzkojoeCS0+WWmJWxwLpio3oVi1dR DQ1r3qLcudKPifVLPpBykCWK1L+pCHZW3/+tnUf8J3FcQMFxwKsaNOMQ3BjiR19K JsKPDgwTlgUSBqklovvgymKlOv7nCjAzZcOnfqyScpkZskdm59ahBpyQ47iJLr3w ==
X-ME-Sender: <xms:e3GXWcEib4KFy-V2BXTuVqS7o4MgkgYfCXmMDeUKHUMXc3fSRDRCXA>
Received: by mailuser.nyi.internal (Postfix, from userid 99) id B5051BAB71; Fri, 18 Aug 2017 19:00:11 -0400 (EDT)
Message-Id: <1503097211.2660113.1078081592.5E09F4F1@webmail.messagingengine.com>
From: Bron Gondwana <brong@fastmailteam.com>
To: dmarc@ietf.org
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: multipart/alternative; boundary="_----------=_150309721126601131"
X-Mailer: MessagingEngine.com Webmail Interface - ajax-21c69044
Date: Sat, 19 Aug 2017 09:00:11 +1000
References: <1502083287.2191248.1065195288.7CDC7FF3@webmail.messagingengine.com> <CABuGu1oTMbuLd4yTwecu5sKFnsmH+HiwT1FG=JpySYHzpMTx_w@mail.gmail.com> <1502200759.3946686.1066841264.607B4D0B@webmail.messagingengine.com> <2720431.u3G7bbkkxK@kitterma-e6430> <1502317564.1935379.1068588344.040173AF@webmail.messagingengine.com> <a08c7590-ded3-1642-4ffc-07848b3c6cd2@gmail.com> <e14f2130-6f00-4ef1-485b-850a4cc1c48c@gmail.com> <1502495646.4099176.1070896040.2B09B1F8@webmail.messagingengine.com> <166070f0-4ba1-70da-1f73-885b4a7f7640@gmail.com> <1502497178.4103451.1070917304.23DD466D@webmail.messagingengine.com> <598F9484.7020700@isdg.net> <CABuGu1p=oLfLRkuoaDHoz3Cv3_FrURdsFPzkac7jNzBpqBmiSg@mail.gmail.com> <599484FB.9050908@isdg.net> <1502929303.4038704.1075868960.5D80A788@webmail.messagingengine.com> <CAD2i3WN_bmDgmQBw3pnyu7vWJJM2Kzwgru87VhK=NA_H91B+og@mail.gmail.com> <1502930858.4042926.1075890568.5069945B@webmail.messagingengine.com> <CABuGu1ofdkP6Gdsfin6KfpiTJW39gXz8Fa0iAAmXfcvyWGZxdA@mail.gmail.com>
In-Reply-To: <CABuGu1ofdkP6Gdsfin6KfpiTJW39gXz8Fa0iAAmXfcvyWGZxdA@mail.gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/tfhd2uGhZQfmNIMZ9cQyEzBNOtc>
Subject: Re: [dmarc-ietf] ARC-Seal is meaningless security theatre
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Aug 2017 23:00:29 -0000

On Fri, 18 Aug 2017, at 16:46, Kurt Andersen wrote:
> So I was able to retrace our design steps which led to the 3-piece
> model (AAR + AMS + AS) and the reasoning for the AS, signing just the
> ARC header sequence was to provide the verifiable chain of custody
> trace (though, of course, only from participating intermediaries).
> Some of the recent tweaks to the spec to deal with malformed sets of
> ARC header fields have weakened that original idea.
The problem with the verifiable chain of custody trace is that isn't
actually verifiable, because anybody can break an old chain at any point
and mint a new link that looks as if the message was sent to them.
You can take an email that went

A => B => C => D => E with an intact ARC chain and chop the top off,
edit everything and create:
A => B => X => Y

If you're X, and there's no way to tell from the ARC headers that B
didn't originally send a message to X.
> In keeping with Bron's general idea to simplify, I'd suggest that
> having an AAR + [optional AMS] + AS would be a close approach for
> handling steps which do not break the ingress signature. Skipping the
> AMS would be a sign to downstream intermediaries that the prior DKIM
> or AMS was still valid upon egress. (certain details would have to be
> worked out)> 
> Does that help the conversation?

 On this I agree with Seth.  removing AMS breaks AS, and I see even less
 value in keeping AS if it doesn't even keep verifying all the way back
 to the start.

Bron.--
  Bron Gondwana, CEO, FastMail Pty Ltd
  brong@fastmailteam.com