Re: [ietf-dkim] DKIM Key Sizes

Roland Turner <roland@rolandturner.com> Sun, 30 October 2016 10:12 UTC

Return-Path: <ietf-dkim-bounces@mipassoc.org>
X-Original-To: ietfarch-ietf-dkim-archive@ietfa.amsl.com
Delivered-To: ietfarch-ietf-dkim-archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A43E12949E for <ietfarch-ietf-dkim-archive@ietfa.amsl.com>; Sun, 30 Oct 2016 03:12:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.11
X-Spam-Level:
X-Spam-Status: No, score=0.11 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_DKIM_INVALID=0.01] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (public key: not available)" header.d=rolandturner.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PS0TTB1zrfCL for <ietfarch-ietf-dkim-archive@ietfa.amsl.com>; Sun, 30 Oct 2016 03:12:35 -0700 (PDT)
Received: from simon.songbird.com (simon.songbird.com [72.52.113.5]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B2D23126B6D for <ietf-dkim-archive@ietf.org>; Sun, 30 Oct 2016 03:12:35 -0700 (PDT)
Received: from simon.songbird.com (simon.songbird.com [127.0.0.1]) by simon.songbird.com (8.14.4/8.14.4/Debian-4.1ubuntu1) with ESMTP id u9UACO75006123; Sun, 30 Oct 2016 03:12:25 -0700
Authentication-Results: simon.songbird.com; dkim=permerror reason="key not found" header.d=rolandturner.com header.i=@rolandturner.com header.b=VnM7OxlZ; dkim-adsp=none (unprotected policy); dkim-atps=neutral
Received: from sg.rolandturner.com (sg.rolandturner.com [175.41.138.242]) by simon.songbird.com (8.14.4/8.14.4/Debian-4.1ubuntu1) with ESMTP id u9UACKXb006119 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NOT) for <ietf-dkim@mipassoc.org>; Sun, 30 Oct 2016 03:12:22 -0700
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=rolandturner.com; s=0.rolandturner.com; h=Content-Type:In-Reply-To:MIME-Version:Date:Message-ID:To:From:References:Subject; bh=VUnqkDiuwedhL/YZJrhJZBfknS3Ti4j2W4QeHJqe3oY=; b=VnM7OxlZRelRxWcYxgHBTjUnRxRtmWL4D5TY/4mJRl101cZudwKacgS76Pg0LbTNrEN9Eryzp6QjivbJwTkhpFbZ1HvDah5DK5ZU2CQmwtV5Q6FPjDcKL5RsRCT5tQwSBjmckOpcKzAQZv1p7TZE+VqqOlmUbT2qm9nSqOG8FqA=;
Received: from [118.200.2.49] (port=42068 helo=[192.168.1.154]) by sg.rolandturner.com with esmtpsa (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:16) (Exim 4.76) (envelope-from <roland@rolandturner.com>) id 1c0n5M-0005CE-2g for ietf-dkim@mipassoc.org; Sun, 30 Oct 2016 10:11:28 +0000
References: <CAOj=BA3TFzxnHHZ+-tpoMCWxhaGvOg0RREbcYbpzS9g3g8i=Qg@mail.gmail.com> <33093A9D-5406-4BEF-AE65-66696B664593@callas.org> <041f61a9-df5a-5c67-6640-6b1c05bf6c9f@cisco.com> <472e8870-b2b8-c42e-2146-ad45750e2474@sonnection.nl> <1a80d63a-4539-1fc4-9e5a-47a3d92ce89e@cisco.com> <9709551e-8158-b347-73c1-acb93e8c25a1@dcrocker.net> <af9f2021-ada8-5bc6-be9f-402088465adc@cisco.com> <alpine.OSX.2.11.1610291218430.4949@ary.qy>
From: Roland Turner <roland@rolandturner.com>
To: ietf-dkim@mipassoc.org
Message-ID: <6de76f4f-3b1c-22aa-52c6-8b2e3c531ff7@rolandturner.com>
Date: Sun, 30 Oct 2016 18:11:27 +0800
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:45.0) Gecko/20100101 Thunderbird/45.4.0
MIME-Version: 1.0
In-Reply-To: <alpine.OSX.2.11.1610291218430.4949@ary.qy>
Subject: Re: [ietf-dkim] DKIM Key Sizes
X-BeenThere: ietf-dkim@mipassoc.org
X-Mailman-Version: 2.1.16
Precedence: list
List-Id: IETF DKIM Discussion List <ietf-dkim.mipassoc.org>
List-Unsubscribe: <http://mipassoc.org/mailman/options/ietf-dkim>, <mailto:ietf-dkim-request@mipassoc.org?subject=unsubscribe>
List-Archive: <http://mipassoc.org/pipermail/ietf-dkim/>
List-Post: <mailto:ietf-dkim@mipassoc.org>
List-Help: <mailto:ietf-dkim-request@mipassoc.org?subject=help>
List-Subscribe: <http://mipassoc.org/mailman/listinfo/ietf-dkim>, <mailto:ietf-dkim-request@mipassoc.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0459898477789899541=="
Errors-To: ietf-dkim-bounces@mipassoc.org
Sender: ietf-dkim <ietf-dkim-bounces@mipassoc.org>

On 10/30/2016 01:04 AM, John R. Levine wrote:

> To get back to the previous argument, if you don't want people using 
> DKIM to validate old messages, rotate the keys more often.

I'd suggest that as security services and political operatives have now 
been alerted to the potential value of DKIM in validating leaks[1], any 
realistic threat model now has to assume that the adversary/ies have 
access to a complete DKIM public key history - at least for any sizeable 
sender. Indeed:

  * this may already have been happening for some time; and, depending
    upon their means of information gathering[2]
  * passive DNS operators may already have this capability as a
    side-effect of what they've always done.


Those who are serious about plausible deniability can always use a 
separate keypair per message and retire the public key after a long 
enough interval for any likely delivery to take (60s? 2 minutes?), 
thereby defeating all subsequent analysis, at least until/unless 
ARC-signing by receivers becomes widespread. Whether this is a workable 
approach, or whether the objective is even a good idea, appears to be a 
long way out of scope for the DKIM specification.

> Deliberately weak signatures strike me as a poor alternative.

Agreed. Worse still, trying to simultaneously pursue the "long enough to 
support abuse prevention" and "short enough to support non-repudiation" 
creates either of two unworkable situations:

  * If we're "lucky", the former is shorter than the latter and we can
    tweak the recommended key length to stay within the gap on a regular
    basis until the end of time.
  * If we're unlucky, the former is longer than the latter and we've
    taken on an impossible objective.

In practice, neither length is likely to be able to be determined with 
sufficient precision to support realistic decision-making.

- Roland

1: not to a forensic standard perhaps, but certainly to make real-world 
determinations about whether a leaked document has been tampered with

2: collecting cached DNS data vs. crawling the DNS

_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html