Re: [ietf-822] Aptness of DKIM for MLs

Hector Santos <hsantos@isdg.net> Fri, 09 May 2014 17:05 UTC

Return-Path: <hsantos@isdg.net>
X-Original-To: ietf-822@ietfa.amsl.com
Delivered-To: ietf-822@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 346B61A0303 for <ietf-822@ietfa.amsl.com>; Fri, 9 May 2014 10:05:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.002
X-Spam-Level:
X-Spam-Status: No, score=-102.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5dnh3Wt8GYXm for <ietf-822@ietfa.amsl.com>; Fri, 9 May 2014 10:05:35 -0700 (PDT)
Received: from winserver.com (winserver.com [208.247.131.9]) by ietfa.amsl.com (Postfix) with ESMTP id 3BE5D1A02FB for <ietf-822@ietf.org>; Fri, 9 May 2014 10:05:34 -0700 (PDT)
DKIM-Signature: v=1; d=isdg.net; s=tms1; a=rsa-sha1; c=simple/relaxed; l=4276; t=1399655127; h=Received:Received: Received:Received:Message-ID:Date:From:Organization:To:Subject: List-ID; bh=i96okaNF4pGu2K6vE+94HMiuGmI=; b=vs6FDw2ssAJkTqyBC+nu gcej+FrJh2pYJqje3nskNkNV30i5Q2H82BTyvzNXpHtu2dfXAOo4JHGn1M+jY/o3 kiqS6OIs78rLiZt+tCDrq/KGQE4LFY2SN4jpxJQ57QmleGfM0K1MHY3z1OIlrYL1 ULI0E/mSr4Wv4ZN4bwzQQNk=
Received: by winserver.com (Wildcat! SMTP Router v7.0.454.4) for ietf-822@ietf.org; Fri, 09 May 2014 13:05:27 -0400
Authentication-Results: dkim.winserver.com; dkim=pass header.d=beta.winserver.com header.s=tms1 header.i=beta.winserver.com; adsp=pass policy=all author.d=isdg.net asl.d=beta.winserver.com;
Received: from opensite.winserver.com (hector.wildcatblog.com [208.247.131.23]) by winserver.com (Wildcat! SMTP v7.0.454.4) with ESMTP id 2763680328.5746.2244; Fri, 09 May 2014 13:05:26 -0400
DKIM-Signature: v=1; d=beta.winserver.com; s=tms1; a=rsa-sha256; c=simple/relaxed; l=4276; t=1399655016; h=Received:Received: Message-ID:Date:From:Organization:To:Subject:List-ID; bh=ZASK9XC D0tTa3q+RDZWCU5WLu0/KyjQ4r8BRAxQbyH0=; b=Cv1MujW19By5Fc1ttwoD4FJ PiDIEzsFrQH0aIDPyTrKBiYBvyCiRv0LKgwNswGeLnKM4GGjqMR9+dGTItUTTy7d Hsnql++iiGrq3VF8pBHMEdDwN9BnTIOt0ClSGeU7hYfF1aX96cHLr2PgWSPj9yA5 44V3x6G3KCLEJPxiqbk4=
Received: by beta.winserver.com (Wildcat! SMTP Router v7.0.454.4) for ietf-822@ietf.org; Fri, 09 May 2014 13:03:36 -0400
Received: from [192.168.1.2] ([99.121.4.27]) by beta.winserver.com (Wildcat! SMTP v7.0.454.4) with ESMTP id 2783192359.9.16492; Fri, 09 May 2014 13:03:35 -0400
Message-ID: <536D0AD7.5070800@isdg.net>
Date: Fri, 09 May 2014 13:05:27 -0400
From: Hector Santos <hsantos@isdg.net>
Organization: Santronics Software, Inc.
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.5.0
MIME-Version: 1.0
To: Alessandro Vesely <vesely@tana.it>, ietf-822@ietf.org
References: <20140506171238.28535.qmail@joyce.lan> <536A05B2.9060805@tana.it> <6.2.5.6.2.20140508104525.0c42ac38@resistor.net> <536CAC9C.6080807@tana.it>
In-Reply-To: <536CAC9C.6080807@tana.it>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/ietf-822/nkca0VczSC70RQRvJHywapXxyB4
Subject: Re: [ietf-822] Aptness of DKIM for MLs
X-BeenThere: ietf-822@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of issues related to Internet Message Format \[RFC 822, RFC 2822, RFC 5322\]" <ietf-822.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-822>, <mailto:ietf-822-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-822/>
List-Post: <mailto:ietf-822@ietf.org>
List-Help: <mailto:ietf-822-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-822>, <mailto:ietf-822-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 May 2014 17:05:39 -0000

Alessandro,   I believe what SM meant, is that every list developer 
has its own level of change needs and for the most part, in my view, 
you really don't want to make big changes to your mail framework when 
adding DKIM.  Its complex. But for an integrated system when you  have 
more controls of all the part, its doable. Take a look at our wcDKIM 
integration with our wcListServer component.

    http://www.winserver.com/public/files/wcdkim-ssi.png

But in general, the main reason there is a general issue/problem with 
the general LS is because DKIM was added at the edge so it can 
"blindly" sign all the outbound mail.  The key word here is "Blindly."

Overall,  the MLS change requirements to make the MLS more "fitting" 
with the blind DKIM signer component is:

1) Subscription controls for restrictive domains,
2) Submission controls for restrictive domains, and
3) "Meta" information to tell the signer not to sign a particular list.

Where and how those things are done will vary.  Unless the MLS 
developer does it himself, it will be asking much of list operators to 
handle this complexity themselves.  So makes you understand why is far 
easier for the LSP (List Service Provider) and/or resigner market to 
just ignore all Author Domain Signing Practice protocol and just allow 
for a complete open ended DKIM signing network when perhaps the only 
signature that matters most, is that last one in the transport chain 
and as long as the receiver trust the last signer, it really doesn't 
matter what the author does or the previous resigners had done.

Unfortunately, its a GOOD versus BAD framework.  With the signer 
trust, you can only look for the GOOD. It doesn't know how to handle 
the BAD and that is what the author domain signing protocols attempts 
to address and the trust folks keep forgetting or don't wish to deal 
with -- the bad legacy spoofing/phishing mail that Trust people can't 
do anything about.

-- 
HLS

On 5/9/2014 6:23 AM, Alessandro Vesely wrote:
> Hi SM,
>
> On Thu 08/May/2014 19:59:19 +0200 S Moonesamy wrote:
>> At 03:06 07-05-2014, Alessandro Vesely wrote:
>>> to "standardize" its syntax.[3]  It seems to me that eliminating some
>>> of such gratuitous changes is the solution to DMARC-for-MLs which
>>> minimizes the alterations in MLM software.  Are you sure it won't
>>> work?
>>
>> This mailing list breaks the DKIM Signature.
>
> No, it doesn't.  It broke elandsys' signature, but check tana's
> signature on this message.  (I send this to ietf-822 only, to avoid
> any confusion.)
>
> So it seems I could publish a strict DMARC policy right now, and cause
> minimal disruptions.  However, some verifiers (NetEase) consider
> tana's h= inadequate, see "objection" below.
>
>> Gratuitous changes to a mailing list message is a matter of
>> opinion.
>
> Well, not exactly.
>
> For corrections, section 6.4 of RFC 5321 is rather clear that
> submission servers MAY, while intermediate relays MUST NOT, apply
> certain changes.  So the range where opinions may vary is whether an
> MLM is to be considered akin to submission servers or relays.
>
> By /gratuitous/ changes, such as adding/removing double quote marks, I
> mean unnecessary embellishments that were already disputable before
> DKIM took root.
>
>> I suggest reading the past discussions first if you are interested
>> in trying to make it work.
>
> Yes, much of this discussion was recited at the time of ADSP, for
> example http://mipassoc.org/pipermail/ietf-dkim/2010q3/013829.html
>
> The most relevant objection to weak signatures is why would domains so
> concerned about security as to publish a strong policy weaken their
> DKIM signatures?  A solution is to do so for ML messages only.
>
> To recap, assume a domain has a DB of (user, mailing list) pairs which
> defines ML traffic.  Messages to ML are then sent in separate SMTP
> transactions and weakly signed.  MLMs sign those messages in turn,
> using strong signatures.  Verifiers derive the validity of MLM domains
> by comparing d= against To: or Cc: mailboxes.
>
> Besides minor refinements, the major bar is to build that DB.  I
> proposed to do it manually for starting, and then find out how to
> automate its maintenance.
>
> Ale
>