Re: [dmarc-ietf] Fwd: New Version Notification for draft-srose-dkim-ecc-00.txt

Terry Zink <tzink@microsoft.com> Fri, 07 April 2017 18:39 UTC

Return-Path: <tzink@microsoft.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 410F4129531 for <dmarc@ietfa.amsl.com>; Fri, 7 Apr 2017 11:39:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.02
X-Spam-Level:
X-Spam-Status: No, score=-2.02 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GrGv6bqAqqup for <dmarc@ietfa.amsl.com>; Fri, 7 Apr 2017 11:39:32 -0700 (PDT)
Received: from NAM01-BN3-obe.outbound.protection.outlook.com (mail-bn3nam01on0111.outbound.protection.outlook.com [104.47.33.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6239012420B for <dmarc@ietf.org>; Fri, 7 Apr 2017 11:39:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=T2lJELYG//xTnommfZKxH214ZxF4kEqj9X4Q02hTlzQ=; b=gMNSJrYjt6rM7xzPLrufS1TZZV5X91glCq79uGE/fIxWdJUHL3JLYCCqXj0bDW6CN19VN3+2uFdNNzNYQysIg6shiQSwUZQa06YsBv2Fhon70P8X3A5Ejg2IacFn6aHHClQffztu71JcdoNMntyA7Qy8tUDw3sAgrrfWxDK5S9w=
Received: from CO2PR00MB0120.namprd00.prod.outlook.com (10.166.215.146) by CO2PR00MB0085.namprd00.prod.outlook.com (10.166.215.143) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1040.0; Fri, 7 Apr 2017 18:39:28 +0000
Received: from CO2PR00MB0120.namprd00.prod.outlook.com ([fe80::8c90:54be:9fcd:6b3]) by CO2PR00MB0120.namprd00.prod.outlook.com ([fe80::8c90:54be:9fcd:6b3%17]) with mapi id 15.01.1047.000; Fri, 7 Apr 2017 18:39:28 +0000
From: Terry Zink <tzink@microsoft.com>
To: dmarc <dmarc@ietf.org>
Thread-Topic: [dmarc-ietf] Fwd: New Version Notification for draft-srose-dkim-ecc-00.txt
Thread-Index: AQHSrvvOyQ+FrKz9u02ZIuxAV1lyN6G422kAgAAp7oCAAQVbAIAAMfzA
Date: Fri, 07 Apr 2017 18:39:28 +0000
Message-ID: <CO2PR00MB01203E4C66FD0D68137CAB91A30C0@CO2PR00MB0120.namprd00.prod.outlook.com>
References: <d91de205-05b4-0b59-b3a3-568fc0f57375@corp.mail.ru> <20170406235815.47843.qmail@ary.lan> <CAOj=BA2P5e1o-QsZGAxGCV6rM1D=sNiL_ciL4BDtMkbQU1tSXA@mail.gmail.com>
In-Reply-To: <CAOj=BA2P5e1o-QsZGAxGCV6rM1D=sNiL_ciL4BDtMkbQU1tSXA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=microsoft.com;
x-originating-ip: [131.107.159.204]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; CO2PR00MB0085; 7:AS9Db6hEMO47ogQyTVuzyqAOqWPoWNewUL9TzSZ5VR7Lqnsx3pNT57omv5I2KDxEhnJVRlFZeiqmMw4CbqWo+07Nuh5kdTnP1A/1uhWm6hTO+fa5xnIQRC4EUTCm5Z4pwCEVe/xuKIOFZH1VLL6yWn39idH2+7M3jEkjvBOx4CVYBPQhnRFEJnDbrtyVI/28fY/7a5C7f2tMZXlrvhVOWaJdOHn4m/P4cXv+kOhCPBapQNHLpWp7+Qle0zjtpnEiQFOM8E2t6VUrXt9HjgX9jJsKQGKLtFRqCX25lJFJJ7kiteSCisIJJhXCBzH5CIVRpA5jQPwdHu+z82w5kcK7XxHiNI43LDCZUxwfj0XkL0Q=
x-ms-office365-filtering-correlation-id: 7180ae13-e0ba-4377-ab78-08d47de56c3d
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254075)(48565401081)(201703131423075)(201703031133081)(201702281549075); SRVR:CO2PR00MB0085;
x-o365ent-eop-header: Message processed by - O365_ENT: Allow from ranges (Engineering ONLY)
x-microsoft-antispam-prvs: <CO2PR00MB008504297DAE669EBC2FD560A30C0@CO2PR00MB0085.namprd00.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(268704632989789)(120376859493423)(259971544884247)(21748063052155);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(61425038)(6040450)(601004)(2401047)(8121501046)(5005006)(10201501046)(93006095)(93001095)(3002001)(6055026)(61426038)(61427038)(6041248)(20161123564025)(20161123562025)(20161123560025)(20161123555025)(201703131423075)(201702281528075)(201703061421075)(6072148); SRVR:CO2PR00MB0085; BCL:0; PCL:0; RULEID:; SRVR:CO2PR00MB0085;
x-forefront-prvs: 0270ED2845
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39400400002)(39410400002)(39450400003)(39850400002)(39840400002)(39860400002)(24454002)(377454003)(3905003)(66066001)(230783001)(53546009)(5660300001)(110136004)(38730400002)(25786009)(10710500007)(2906002)(10090500001)(5250100002)(5005710100001)(10290500002)(189998001)(3280700002)(790700001)(6436002)(6116002)(3846002)(3660700001)(102836003)(606005)(76176999)(54356999)(6506006)(50986999)(733005)(6916009)(2950100002)(7696004)(7736002)(86362001)(236005)(53936002)(7906003)(6246003)(74316002)(6306002)(9686003)(54896002)(33656002)(86612001)(55016002)(99286003)(8936002)(15650500001)(2420400007)(19609705001)(8676002)(81166006)(53330200001); DIR:OUT; SFP:1102; SCL:1; SRVR:CO2PR00MB0085; H:CO2PR00MB0120.namprd00.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_CO2PR00MB01203E4C66FD0D68137CAB91A30C0CO2PR00MB0120namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Apr 2017 18:39:28.0834 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO2PR00MB0085
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/wTlc5PM5SE7FPIkFH5G6kt1yBak>
Subject: Re: [dmarc-ietf] Fwd: New Version Notification for draft-srose-dkim-ecc-00.txt
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Apr 2017 18:39:35 -0000

One reason transitions are difficult because of implementation and deprecation ambiguity. If there’s no reason to move other than best practice, then no one will (or not enough will move).

Maybe we can build timelines into the updates. By Jan 1, 2019, receivers SHOULD (MUST?) no longer support the following key sizes or algorithms. That way, if anyone complains that a particular DKIM-signature is not considered valid, we can always say it’s RFC non-compliant.

For example, for supported TLS ciphers, Microsoft Office 365 publishes what algorithms are supported, along with timelines for deprecation: https://technet.microsoft.com/en-us/library/dn569286.aspx. If senders have problems with TLS connections, we point them to that documentation. Not everyone reads the documentation, but it is the way we advertise to the world what we do and don’t support.

--Terry

From: dmarc [mailto:dmarc-bounces@ietf.org] On Behalf Of Peter Goldstein
Sent: Friday, April 7, 2017 8:34 AM
To: John Levine <johnl@taugh.com>
Cc: dmarc <dmarc@ietf.org>; Vladimir Dubrovin <dubrovin@corp.mail.ru>
Subject: Re: [dmarc-ietf] Fwd: New Version Notification for draft-srose-dkim-ecc-00.txt

John,

Really glad to see this.

Does this initiative include an intention to update the cryptographic guidance from RFC 6376 sections 3.3 and 3.3.3 ?  The proposed charter speaks of adding new algorithms, but doesn't discuss deprecating/removing old ones.

Some specific concerns are:

1. Expressly forbidding RSA keys < 1024 bits in size - While the fact that some major receivers ignore such keys has made this a de facto standard, it would be good for the RFCs to reflect best practice here.  And as we saw with the ARC discussion, using the DKIM spec as a reference can inadvertently result in new standards supporting known insecure practices.

2. Eliminating SHA-1 - Even at the time of publication RFC 6376 recommended that signers avoid the use of SHA-1.  Despite this, a simple check of my inbox shows that quite a few senders - including a number of large, sophisticated ESPs - still use SHA-1 in preference to SHA-256.  While the recent developed PDF collision attack against SHA-1 is not entirely on point, it seems to be further evidence that SHA-1 should not be used.  And given the widespread support for SHA-256, this seems like it's mostly a configuration issue for senders.

If these items don't belong in the charter for the new group, do they have a different natural home for discussion?

Thanks.

Best,

Peter
[https://t.yesware.com/t/d51e63df483c4f1bf32b47229814ba3f3b13fe44/32a480a2a05d0065fe5ce922b6d2d032/spacer.gif][http://t.yesware.com/t/d51e63df483c4f1bf32b47229814ba3f3b13fe44/32a480a2a05d0065fe5ce922b6d2d032/spacer.gif]

On Thu, Apr 6, 2017 at 4:58 PM, John Levine <johnl@taugh.com<mailto:johnl@taugh.com>> wrote:
>1. produce 2 different DKIM-Signatures with 2 different selectors:
>slector1  with SHA-1 + RSA and selector2 one with  SHA-512 + ECDSA

Of course.

>2. add an additional field to either selector1 DKIM DNS record (need to
>consult RFC if it's allowed) or to DKIM-Signature with selector1 (it's
>allowed but probably is not enough to protect against downgrade) to
>indicate the selector is legacy-only, e.g. o=sha512/eccp256 to indicate
>this selector should be ignored if verifier supports sha-512 and eccp256.

No.  If the verifier is smart enough to understand new algorithms, it
is smart enough to figure out which signature to prefer.  Also keep in
mind that the legacy crypto is sha256/rsa1024 which is plenty strong
for the forseeable future.

R's,
John