Re: [dmarc-ietf] ARC-Seal is meaningless security theatre

Bron Gondwana <brong@fastmailteam.com> Sat, 12 August 2017 00:19 UTC

Return-Path: <brong@fastmailteam.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C9628132466 for <dmarc@ietfa.amsl.com>; Fri, 11 Aug 2017 17:19:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fastmailteam.com header.b=RKBXjFvd; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=kTFtvF/G
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Vwq-FJZFS1Av for <dmarc@ietfa.amsl.com>; Fri, 11 Aug 2017 17:19:39 -0700 (PDT)
Received: from out3-smtp.messagingengine.com (out3-smtp.messagingengine.com [66.111.4.27]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 514D6132460 for <dmarc@ietf.org>; Fri, 11 Aug 2017 17:19:39 -0700 (PDT)
Received: from compute6.internal (compute6.nyi.internal [10.202.2.46]) by mailout.nyi.internal (Postfix) with ESMTP id B842D20DC6 for <dmarc@ietf.org>; Fri, 11 Aug 2017 20:19:38 -0400 (EDT)
Received: from web4 ([10.202.2.214]) by compute6.internal (MEProxy); Fri, 11 Aug 2017 20:19:38 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= fastmailteam.com; h=content-transfer-encoding:content-type:date :from:in-reply-to:message-id:mime-version:references:subject:to :x-me-sender:x-me-sender:x-sasl-enc; s=fm1; bh=3/Q8cDyVnIu+kpYSp 7scRPCAU0ALlrtr/mhvWgp7bCU=; b=RKBXjFvd4oZBu7l+bd64tNdfVVJUkGRCf X8Wzrxv6E50xx589mia43BIKK8SLJGOq/tyxoXRa6qRv8+fp0HYDW511Xo6BFj2W AbEA4gOOe1++5Q5qTrYbHD6ylM79QMqxrBB2BY1sY5FPVAArM3wz/EE/DMfqAvIo JZIAhqLgfu81+e3Mv1NVxuPMLhYmEBU7Ckv9UqKXseL6oW0P8LvY0544IZ+E2VNu NYgUBtvSqCKBg5k2hv7Czk5S+at8Cyd6i9pTAWDoQH4nTJq6WKqrFGF9Rj5EPJb9 +9X9JZK/bIQydSj1D+cofGGlp6BlPa5b9LFTVx38a4GKlsMwKiikw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-sender:x-me-sender:x-sasl-enc; s=fm1; bh=3/Q8cD yVnIu+kpYSp7scRPCAU0ALlrtr/mhvWgp7bCU=; b=kTFtvF/GGGWFhhkH3ssoZP hbS4GAqf768X5Wx30yyDeE2LE/cA0NXwVSq8L/nK0eFi/WlnCXfHj3YW0h/qECjT DX4NZNOzkyo9MSm1xKix+hGemHwWQ9Wz/H0/21/wEaMCEostZcClyya6Ib8umiyL nz8mZbFvviFNy35hUg5z5ctdJ6XDcJQKaW5NXFU2W7g4CzZjHSwPAekOo0J09zUz uPOr+kGeiZtEcunvlNV2KPfFs5jujl352O+/VBSAVeVeAVtmRqaN/U/IYZTY/vSI 6EbqMAOhHh2DDlnR/uZQr9AkA+WOB5tOc8khPkigF6o5NfuBIcLRi5g3n6gTG89w ==
X-ME-Sender: <xms:mkmOWaLt63jhnQDZIUbpzUOMzq-IM-VSPysI8iPVeeD57j4Gxgyr4Q>
Received: by mailuser.nyi.internal (Postfix, from userid 99) id 91090BAB71; Fri, 11 Aug 2017 20:19:38 -0400 (EDT)
Message-Id: <1502497178.4103451.1070917304.23DD466D@webmail.messagingengine.com>
From: Bron Gondwana <brong@fastmailteam.com>
To: dmarc@ietf.org
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: multipart/alternative; boundary="_----------=_150249717841034510"
X-Mailer: MessagingEngine.com Webmail Interface - ajax-33d44821
In-Reply-To: <166070f0-4ba1-70da-1f73-885b4a7f7640@gmail.com>
Date: Sat, 12 Aug 2017 10:19:38 +1000
References: <1502083287.2191248.1065195288.7CDC7FF3@webmail.messagingengine.com> <CABuGu1oTMbuLd4yTwecu5sKFnsmH+HiwT1FG=JpySYHzpMTx_w@mail.gmail.com> <1502200759.3946686.1066841264.607B4D0B@webmail.messagingengine.com> <2720431.u3G7bbkkxK@kitterma-e6430> <1502317564.1935379.1068588344.040173AF@webmail.messagingengine.com> <a08c7590-ded3-1642-4ffc-07848b3c6cd2@gmail.com> <e14f2130-6f00-4ef1-485b-850a4cc1c48c@gmail.com> <1502495646.4099176.1070896040.2B09B1F8@webmail.messagingengine.com> <166070f0-4ba1-70da-1f73-885b4a7f7640@gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/yQd16mcRKYnjvpI2pnqRkt9mbP4>
Subject: Re: [dmarc-ietf] ARC-Seal is meaningless security theatre
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Aug 2017 00:19:41 -0000

On Sat, 12 Aug 2017, at 10:04, Dave Crocker wrote:
> On 8/11/2017 4:54 PM, Bron Gondwana wrote:
>> On Sat, 12 Aug 2017, at 03:22, Dave Crocker wrote:
>> 
>> I'm just picking out the key quote here:
>> 
>>> On 8/7/2017 4:22 PM, Seth Blank wrote:
>>> 
>>>   When validating an ARC signed message, one verifies the latest AMS>>>   (which must validate), and *the entire chain* of ARC Seals, not
>>>   only>>>   the latest. This guarantees you a list of all message
>>>   signatories ->>>   the chain of custody we're talking about.
>> 
>> Yes, I follow this bit, but then...
>> 
>>>   When evaluating the chain for final receipt, there are two
>>>   states to>>>   worry about as a matter of local policy: 1) you trust all the
>>>   signatories on the chain 2) there is an untrusted signatory on the>>>   chain
>> 
>> Which is why it's a bad idea to sign if you're not modifying, because>> then everybody has to trust you or their chain breaks, even
>> though you>> didn't do anything which required signing.
> 
> I don't have an opinion about whether this conclusion is correct, but> I'm quite certain it a type of consideration that needs to be
> fundamental, to recommendations about usage.  Who should do what, and> why?  What are the upsides of their doing or not?  Downsides?
> 
> 
> 
>>>   Without the ARC Seal this determination is not possible and
>>>   there is>>>   no way to evaluate the ARC chain for delivery as a final receiver.>> 
>> And this is the crux of our disagreement.  Seth thinks it's
>> necessary to>> do more than signing a statement that you believed the message was
>> authenticated when you got it, in a way that the next hop can verify>> your signature over your own Authentication Results plus the
>> content of>> the message.  I disagree.
>> 
>> I'm proposing exactly the same stragety DKIM uses, just with
>> series of>> signed "chain of custody" statements rather than the DKIM signature
>> having to align with the sender domain.
> 
> by 'strategy DKIM uses' what do you mean exactly?  I'm guessing
> you mean> having the signature cover more of the header and all of the body, but> please confirm or clarify.

Sorry - yes, to clarify...

DKIM signs the entire body plus parts of the header.

In the strategy I am proposing, site "X" modifying a message in transit
(e.g. a mailing list) would add their own DKIM-like header (ARC-Message-
Signature is a perfectly fine name for it) which signed the new "body
and parts of the header", including a statement that site "X" had
verified the message authentication before modifying it (ARC-Authentication-
Results is a perfectly fine name for that statement).
That gives a complete chain of custody.

Bron.

--
  Bron Gondwana, CEO, FastMail Pty Ltd
  brong@fastmailteam.com