Re: [ietf-822] Aptness of DKIM for MLs

Douglas Otis <doug.mtview@gmail.com> Sat, 07 June 2014 22:46 UTC

Return-Path: <doug.mtview@gmail.com>
X-Original-To: ietf-822@ietfa.amsl.com
Delivered-To: ietf-822@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B6DC41A023D for <ietf-822@ietfa.amsl.com>; Sat, 7 Jun 2014 15:46:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1jg6ogkNNb9d for <ietf-822@ietfa.amsl.com>; Sat, 7 Jun 2014 15:46:28 -0700 (PDT)
Received: from mail-wi0-x22b.google.com (mail-wi0-x22b.google.com [IPv6:2a00:1450:400c:c05::22b]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D8D1A1A023A for <ietf-822@ietf.org>; Sat, 7 Jun 2014 15:46:27 -0700 (PDT)
Received: by mail-wi0-f171.google.com with SMTP id cc10so2600821wib.10 for <ietf-822@ietf.org>; Sat, 07 Jun 2014 15:46:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=lb5qz+J1JF5Z2+0mUjqASYtf3hz0Yz9XYKMcp/Gg8A8=; b=GWxbNzpO0rLMGEPoa1lXy2TjDS0592/2dP8PJ0j4JEpPxbg49aTjhTen6Oz4zUI59y VT1BXqrT7Wcmhb83itXRY5f4bl21fqKfWAuZ4YaGWmVG5eTwhQYa8syF1Z5PItrbXoAx njsvzHJ+903p6sPHhG40yiZx5OIbBMqKWQoM0M+Tu2sDMvFoVcSJ+eMTB/ZCduhj2crY tx66c1ShLsWEPKRVhxAlZbfskaxaQSCVhABOUKQUBp5MAVD6pwKQrzooLvmvIOgC+NS5 iQhsTLl+WXURu6SVPsWwrRV4a1Pp2M4BhRDVIkJhl0JutA2MmKZwryZwXFiMY6tJHC+2 Te9w==
X-Received: by 10.180.19.233 with SMTP id i9mr16660773wie.38.1402181179475; Sat, 07 Jun 2014 15:46:19 -0700 (PDT)
Received: from [10.128.84.219] (87-198-224-122.static.ptr.magnet.ie. [87.198.224.122]) by mx.google.com with ESMTPSA id e11sm5411941wiw.19.2014.06.07.15.46.13 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Sat, 07 Jun 2014 15:46:18 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.2\))
From: Douglas Otis <doug.mtview@gmail.com>
In-Reply-To: <53919B90.8000003@tana.it>
Date: Sat, 07 Jun 2014 23:46:02 +0100
Content-Transfer-Encoding: quoted-printable
Message-Id: <92D28769-A969-48C1-A407-0F791AC039E7@gmail.com>
References: <20140506171238.28535.qmail@joyce.lan> <536A05B2.9060805@tana.it> <6.2.5.6.2.20140508104525.0c42ac38@resistor.net> <536CAC9C.6080807@tana.it> <E3F12910-586E-4A55-9394-8146FCB5FABF@gmail.com> <53919B90.8000003@tana.it>
To: Alessandro Vesely <vesely@tana.it>
X-Mailer: Apple Mail (2.1878.2)
Archived-At: http://mailarchive.ietf.org/arch/msg/ietf-822/AfaHDNfemiBep0D2J_84gWdx_sk
Cc: ietf-822@ietf.org
Subject: Re: [ietf-822] Aptness of DKIM for MLs
X-BeenThere: ietf-822@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of issues related to Internet Message Format \[RFC 822, RFC 2822, RFC 5322\]" <ietf-822.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-822>, <mailto:ietf-822-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-822/>
List-Post: <mailto:ietf-822@ietf.org>
List-Help: <mailto:ietf-822-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-822>, <mailto:ietf-822-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 07 Jun 2014 22:46:29 -0000

On Jun 6, 2014, at 11:44 AM, Alessandro Vesely <vesely@tana.it> wrote:

> Hi,
> 
> On Thu 05/Jun/2014 20:34:06 +0200 Doug Otis wrote:
>> On May 9, 2014, at 3:23 AM, Alessandro Vesely <vesely@tana.it> wrote:
>>> 
>>> To recap, assume a domain has a DB of (user, mailing list) pairs which
>>> defines ML traffic.  Messages to ML are then sent in separate SMTP
>>> transactions and weakly signed.  MLMs sign those messages in turn,
>>> using strong signatures.  Verifiers derive the validity of MLM domains
>>> by comparing d= against To: or Cc: mailboxes.
>>> 
>>> Besides minor refinements, the major bar is to build that DB.  I
>>> proposed to do it manually for starting, and then find out how to
>>> automate its maintenance.
>> 
>> How can sending domains select the signature scheme?  For example,
>> often there are other destinations cc'd.
> 
> An MTA can sign the message differently for different recipients.  If
> all recipients are trusted, there is no need to do so.

Agreed.

>> Conveying an alignment exception method to all parties is the
>> intent behind TPA-Labels.  This avoids the need to apply weak
>> signatures that can be maliciously replayed.  After all, DKIM does
>> not constrain possible recipients.
> 
> Agreed.  I added TPA-Labels to the picture I posted on the ietf list
> on May 14.  All three methods serve the same purpose, but they have
> different pros and cons.  Roughly, TPA-Labels can aggregate domains
> into federations, so they seem to be better for well established
> lists.

> Weak signatures provide for per-message control at the sender,
> and are compatible with vanilla DKIM at the receiver.  For redundancy,
> a sender can apply both of them at the same time.

If there is a problem, OAR can ensure messages have been issued by the domain requesting DMARC compliance even when DMARC is not directly applied by the third-party service. DKIM modifications will not add much since TPA-Label already involves reliable information.  Weak signatures only invite abuse IMHO. TPA-Label is also able to respond after a message has been signed unlike potential floods caused by an exploited DKIM signature where they will then soon be ignored as a method.

>> Good mailing lists are fairly keen at confirming subscriptions and
>> do not represent a source of abuse.
> 
> Confirming subscriptions is part of the "manual process" in the
> picture.  That seems to be the most difficult problem at this time.
> DMARC reports can hardly be used to create a DB, IMHO.  However, a
> sender could use reports from trusted receivers to verify it (that's
> the yellow question mark in the picture).  Just mumbling...

It would be nice to have a subscription process communicate with a DMARC domain.  Perhaps there could be a message structure defined.  This would better ensure initial messages are not lost prior to  DMARC feedback or user complaints that indicate the need. 

>> If a spear-phishing problem is confronted, authorizations could
>> require an ORA header be added. An easy feature to add to this
>> scheme.
> 
> If the spear-phisher can authenticate, I don't see how a possibly
> spoofed ORA can help the receiver.

Making an OAR requirement of TPA-Label authorization should add a conditional review of a separate DMARC review one-level removed. If the OAR headers are shown forged by a validated TPA-Label authorized domain in a abuse report, its authorization should be denied and require a remediation process before there is a change in status.  Such policy better ensures OARs are protected from forgery.

The general goal is to establish accountability using available validation methods.

Regards,
Douglas Otis