Re: [domainrep] Charter going to the IESG

Douglas Otis <dotis@mail-abuse.org> Tue, 13 September 2011 19:06 UTC

Return-Path: <dotis@mail-abuse.org>
X-Original-To: domainrep@ietfa.amsl.com
Delivered-To: domainrep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 06D5521F8ACC for <domainrep@ietfa.amsl.com>; Tue, 13 Sep 2011 12:06:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.635
X-Spam-Level:
X-Spam-Status: No, score=-103.635 tagged_above=-999 required=5 tests=[AWL=-1.036, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q8INOfReRLOF for <domainrep@ietfa.amsl.com>; Tue, 13 Sep 2011 12:06:25 -0700 (PDT)
Received: from SJDC-SDIRelay3.sdi.trendmicro.com (sjdc-sdirelay3.sdi.trendmicro.com [150.70.69.27]) by ietfa.amsl.com (Postfix) with ESMTP id 3F41721F8ABB for <domainrep@ietf.org>; Tue, 13 Sep 2011 12:06:25 -0700 (PDT)
Received: from harry.mail-abuse.org (harry.mail-abuse.org [168.61.5.27]) by SJDC-SDIRelay3.sdi.trendmicro.com (Postfix) with ESMTP id 5D2336E0137 for <domainrep@ietf.org>; Tue, 13 Sep 2011 19:08:30 +0000 (UTC)
Received: from us-waynej-t42.client.us.trendnet.org (gateway1.sjc.mail-abuse.org [168.61.5.81]) by harry.mail-abuse.org (Postfix) with ESMTP id AC98FA9443C for <domainrep@ietf.org>; Tue, 13 Sep 2011 19:08:30 +0000 (UTC)
Message-ID: <4E6FAA2B.90400@mail-abuse.org>
Date: Tue, 13 Sep 2011 12:08:27 -0700
From: Douglas Otis <dotis@mail-abuse.org>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:6.0.2) Gecko/20110902 Thunderbird/6.0.2
MIME-Version: 1.0
To: domainrep@ietf.org
References: <F5833273385BB34F99288B3648C4F06F13512DFACE@EXCH-C2.corp.cloudmark.com> <4E6809C0.1010100@mail-abuse.org> <20110908010255.GF37065@shinkuro.com> <4E681B91.7060601@mail-abuse.org> <4E6A7CD0.9090305@dcrocker.net> <4E6E5BE7.9090709@mail-abuse.org> <20110912153106.5c40e400@hydrogen.roaringpenguin.com> <4E6E8020.10307@mail-abuse.org> <20110912182459.643791ac@shishi.roaringpenguin.com> <F5833273385BB34F99288B3648C4F06F13512DFBE4@EXCH-C2.corp.cloudmark.com> <4E6EA349.6050506@mail-abuse.org> <F5833273385BB34F99288B3648C4F06F13512DFBF1@EXCH-C2.corp.cloudmark.com>
In-Reply-To: <F5833273385BB34F99288B3648C4F06F13512DFBF1@EXCH-C2.corp.cloudmark.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Subject: Re: [domainrep] Charter going to the IESG
X-BeenThere: domainrep@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Domain Reputation discussion list <domainrep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/domainrep>, <mailto:domainrep-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/domainrep>
List-Post: <mailto:domainrep@ietf.org>
List-Help: <mailto:domainrep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/domainrep>, <mailto:domainrep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Sep 2011 19:06:26 -0000

On 9/12/11 9:11 PM, Murray S. Kucherawy wrote:
> > -----Original Message----- From: domainrep-bounces@ietf.org
> > [mailto:domainrep-bounces@ietf.org] On Behalf Of Douglas Otis Sent:
> > Monday, September 12, 2011 5:27 PM To: domainrep@ietf.org Subject:
> > Re: [domainrep] Charter going to the IESG
> >
> > You are free to have an overly optimistic belief the lack of
> > replay control permitted by ignoring sender and recipient won't be
> > abused. Adding this "optimism" to the charter is still not wise nor
> > necessary for such experimentation.
>
>  Indeed, just as you are free to be overly (and singularly)
>  pessimistic about the potential of the concept.
>
>  Nothing about what I said is in the charter though, except that the
>  charter doesn't preclude the idea.
>
>  As Dave said, we are all aware that you have pet peeves with SPF and
>  DKIM, but there is clear consensus that the flaws you highlight ad
>  nauseam are at best corner cases that should not deter continued
>  advancement of this work or work on those protocols.

Murray,

Sorry for the trouble.  This is only to challenge erroneous statements 
made in the charter as it relates to Security.
,--
"Various mechanisms have been developed for associating a verified 
identifier with email content, such as with SPF (RFC4408) and DKIM 
(RFC4871). ... Given the recent adoption of domain name verification for 
email, by SPF and DKIM, the most obvious initial use case for reputation 
is for email."
'--

There are several Security problems with these two statements related to 
reputation that the Repute mailing list is unwilling to discuss.  There 
is no reason to make them in the charter, where simple removal would be 
a remedy.  Alternatively, this might suggest an experiment using DANE 
with outbound MTAs and there would also not be any Security concern 
wasting our time.

The Security aspects relate to a domain's inability to defend their 
reputation when based upon either IP address authorization or signed 
messages that exclude sending domains and intended recipients.  This has 
real DoS potential.

There is no way to know whether statistical exceptions are legitimate.  
The "at best corner cases" represents every message sent from this 
mailing list or any message sent using BCC, for example.  The same 
issues occur with shared outbound MTAs where every email potentially 
falls into easily exploitable "corner cases".  Defending this requires 
that recipients refuse all exceptions.

Email reputation is challenged to respond to the introduction of IPv6.  
Already the announced prefix space (ignoring the lower 64 bits) is more 
than 56,000 times the entire IPv4 address range and growing 
exponentially.  Perhaps the prefix space alone will soon start 
flattening out at about 340,000 times that of the entire IPv4 address space.

Deployment of IPv6 over IPv4 is problematic.  The current strategy is to 
use Dual-Stack Lite.
http://tools.ietf.org/html/rfc6333
http://tools.ietf.org/html/draft-bpw-pcp-nat-pmp-interworking-00
This moves CPE NAT to the ISP or enterprise tunnel over 192.0.0.0/29.

This change in Internet infrastructure demands deprecation of IPv4 
address based verifications, and replacement with secure end-to-end 
methods.  Neither is meet by SPF or DKIM.  There is little time to waste 
so we need to be smart and use the right tools.

-Doug