Re: [ietf-822] Aptness of DKIM for MLs

Alessandro Vesely <vesely@tana.it> Fri, 09 May 2014 10:23 UTC

Return-Path: <vesely@tana.it>
X-Original-To: ietf-822@ietfa.amsl.com
Delivered-To: ietf-822@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B6BA1A023A for <ietf-822@ietfa.amsl.com>; Fri, 9 May 2014 03:23:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.073
X-Spam-Level:
X-Spam-Status: No, score=-3.073 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HELO_EQ_IT=0.635, HOST_EQ_IT=1.245, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.651, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YVgOsc6vK8n6 for <ietf-822@ietfa.amsl.com>; Fri, 9 May 2014 03:23:33 -0700 (PDT)
Received: from wmail.tana.it (www.tana.it [62.94.243.226]) by ietfa.amsl.com (Postfix) with ESMTP id 6CC901A018C for <ietf-822@ietf.org>; Fri, 9 May 2014 03:23:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tana.it; s=beta; t=1399631004; bh=lN4bwIPyeE2QiPzr5+K+HglNqq8NMz1/CLZ1RCxRHcM=; l=2184; h=Date:From:To:References:In-Reply-To; b=LETQknVHhz4jvhHzB/Vi6R+RAbeSOphuYUts+dCAJMsWoSivflWedsxFTPoseHvdl cCkxlrwYcxyro4Vw1TlOL/0nALaH2Iyvbo+yUQjjh3t3pszkAHyjr0FczJcOAVyOyH 3o8S4jyXDi1mogMv5mEuazLTPwJNBAcszuTXPF9U=
Authentication-Results: tana.it; auth=pass (details omitted)
Received: from [172.25.197.88] (pcale.tana [172.25.197.88]) (AUTH: CRAM-MD5 uXDGrn@SYT0/k) by wmail.tana.it with ESMTPA; Fri, 09 May 2014 12:23:24 +0200 id 00000000005DC039.00000000536CAC9C.00004689
Message-ID: <536CAC9C.6080807@tana.it>
Date: Fri, 09 May 2014 12:23:24 +0200
From: Alessandro Vesely <vesely@tana.it>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Icedove/24.4.0
MIME-Version: 1.0
To: ietf-822@ietf.org
References: <20140506171238.28535.qmail@joyce.lan> <536A05B2.9060805@tana.it> <6.2.5.6.2.20140508104525.0c42ac38@resistor.net>
In-Reply-To: <6.2.5.6.2.20140508104525.0c42ac38@resistor.net>
X-Enigmail-Version: 1.6
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/ietf-822/U6VP_BHrMQbzF7zHNRqQx-CouUA
Subject: Re: [ietf-822] Aptness of DKIM for MLs
X-BeenThere: ietf-822@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of issues related to Internet Message Format \[RFC 822, RFC 2822, RFC 5322\]" <ietf-822.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-822>, <mailto:ietf-822-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-822/>
List-Post: <mailto:ietf-822@ietf.org>
List-Help: <mailto:ietf-822-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-822>, <mailto:ietf-822-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 May 2014 10:23:35 -0000

Hi SM,

On Thu 08/May/2014 19:59:19 +0200 S Moonesamy wrote:
> At 03:06 07-05-2014, Alessandro Vesely wrote:
>> to "standardize" its syntax.[3]  It seems to me that eliminating some
>> of such gratuitous changes is the solution to DMARC-for-MLs which
>> minimizes the alterations in MLM software.  Are you sure it won't
>> work?
> 
> This mailing list breaks the DKIM Signature.

No, it doesn't.  It broke elandsys' signature, but check tana's
signature on this message.  (I send this to ietf-822 only, to avoid
any confusion.)

So it seems I could publish a strict DMARC policy right now, and cause
minimal disruptions.  However, some verifiers (NetEase) consider
tana's h= inadequate, see "objection" below.

> Gratuitous changes to a mailing list message is a matter of
> opinion.

Well, not exactly.

For corrections, section 6.4 of RFC 5321 is rather clear that
submission servers MAY, while intermediate relays MUST NOT, apply
certain changes.  So the range where opinions may vary is whether an
MLM is to be considered akin to submission servers or relays.

By /gratuitous/ changes, such as adding/removing double quote marks, I
mean unnecessary embellishments that were already disputable before
DKIM took root.

> I suggest reading the past discussions first if you are interested
> in trying to make it work.

Yes, much of this discussion was recited at the time of ADSP, for
example http://mipassoc.org/pipermail/ietf-dkim/2010q3/013829.html

The most relevant objection to weak signatures is why would domains so
concerned about security as to publish a strong policy weaken their
DKIM signatures?  A solution is to do so for ML messages only.

To recap, assume a domain has a DB of (user, mailing list) pairs which
defines ML traffic.  Messages to ML are then sent in separate SMTP
transactions and weakly signed.  MLMs sign those messages in turn,
using strong signatures.  Verifiers derive the validity of MLM domains
by comparing d= against To: or Cc: mailboxes.

Besides minor refinements, the major bar is to build that DB.  I
proposed to do it manually for starting, and then find out how to
automate its maintenance.

Ale