Re: [ietf-dkim] DKIM Key Sizes

"John R. Levine" <johnl@iecc.com> Sat, 29 October 2016 17:05 UTC

Return-Path: <ietf-dkim-bounces@mipassoc.org>
X-Original-To: ietfarch-ietf-dkim-archive@ietfa.amsl.com
Delivered-To: ietfarch-ietf-dkim-archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 51501129533 for <ietfarch-ietf-dkim-archive@ietfa.amsl.com>; Sat, 29 Oct 2016 10:05:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.791
X-Spam-Level:
X-Spam-Status: No, score=-1.791 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_DKIM_INVALID=0.01] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1536-bit key) reason="fail (message has been altered)" header.d=iecc.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bRJy2s6b0muf for <ietfarch-ietf-dkim-archive@ietfa.amsl.com>; Sat, 29 Oct 2016 10:05:16 -0700 (PDT)
Received: from simon.songbird.com (simon.songbird.com [72.52.113.5]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6C23412951E for <ietf-dkim-archive@ietf.org>; Sat, 29 Oct 2016 10:05:16 -0700 (PDT)
Received: from simon.songbird.com (simon.songbird.com [127.0.0.1]) by simon.songbird.com (8.14.4/8.14.4/Debian-4.1ubuntu1) with ESMTP id u9TH4xTv008810; Sat, 29 Oct 2016 10:05:00 -0700
Authentication-Results: simon.songbird.com; dkim=fail reason="verification failed; unprotected key" header.d=iecc.com header.i=@iecc.com header.b=LiSM41ji; dkim-adsp=none (unprotected policy); dkim-atps=neutral
Received: from miucha.iecc.com (miucha.iecc.com [64.57.183.18]) by simon.songbird.com (8.14.4/8.14.4/Debian-4.1ubuntu1) with ESMTP id u9TH4toT008806 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NOT) for <ietf-dkim@mipassoc.org>; Sat, 29 Oct 2016 10:04:56 -0700
Received: (qmail 83082 invoked from network); 29 Oct 2016 17:04:08 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent; s=14489.5814d688.k1610; bh=MUTjoXgK7Z36HUx1gPLcbEuJDVWaiuICxnYYH4epO/4=; b=LiSM41jiDnv5FUf55BaBibfLNbYgGMJ+QmjpSJBIgL1FdofRsfEzGobWZaKIzubelYFfpm/iqI5+DKBB0vvvc0wLjMnQgj4mJTebbnvCLO8+IxYFOmY5qwJgm20dLvMJTwEz6sPlBca/8VUDb3GuDC+ZrRuoXZqGz55D58RXBEi2hYwA28iPn7SkxFrFg+IuUDo3+BgBv5OzbpkfY+X/0kV7rYUqDpWrALU0Y4p0y7siKkK6a3msVzp+iAJIq9ZU
Received: from localhost ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTPS (TLS1.0/X.509/SHA1) via TCP6; 29 Oct 2016 17:04:08 -0000
Date: Sat, 29 Oct 2016 13:04:07 -0400
Message-ID: <alpine.OSX.2.11.1610291218430.4949@ary.qy>
From: "John R. Levine" <johnl@iecc.com>
To: Eliot Lear <lear@cisco.com>
In-Reply-To: <af9f2021-ada8-5bc6-be9f-402088465adc@cisco.com>
References: <CAOj=BA3TFzxnHHZ+-tpoMCWxhaGvOg0RREbcYbpzS9g3g8i=Qg@mail.gmail.com> <33093A9D-5406-4BEF-AE65-66696B664593@callas.org> <041f61a9-df5a-5c67-6640-6b1c05bf6c9f@cisco.com> <472e8870-b2b8-c42e-2146-ad45750e2474@sonnection.nl> <1a80d63a-4539-1fc4-9e5a-47a3d92ce89e@cisco.com> <9709551e-8158-b347-73c1-acb93e8c25a1@dcrocker.net> <af9f2021-ada8-5bc6-be9f-402088465adc@cisco.com>
User-Agent: Alpine 2.11 (OSX 23 2013-08-11)
MIME-Version: 1.0
Cc: ietf-dkim@mipassoc.org
Subject: Re: [ietf-dkim] DKIM Key Sizes
X-BeenThere: ietf-dkim@mipassoc.org
X-Mailman-Version: 2.1.16
Precedence: list
List-Id: IETF DKIM Discussion List <ietf-dkim.mipassoc.org>
List-Unsubscribe: <http://mipassoc.org/mailman/options/ietf-dkim>, <mailto:ietf-dkim-request@mipassoc.org?subject=unsubscribe>
List-Archive: <http://mipassoc.org/pipermail/ietf-dkim/>
List-Post: <mailto:ietf-dkim@mipassoc.org>
List-Help: <mailto:ietf-dkim-request@mipassoc.org?subject=help>
List-Subscribe: <http://mipassoc.org/mailman/listinfo/ietf-dkim>, <mailto:ietf-dkim-request@mipassoc.org?subject=subscribe>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: ietf-dkim-bounces@mipassoc.org
Sender: ietf-dkim <ietf-dkim-bounces@mipassoc.org>

> You're precisely correct that when we see people saying that
> somehow "John Podesta sent X" means "John Podesta said X" is not
> something that DKIM was out to solve.  DKIM CAN'T solve that problem,
> and if we attempt to architect it to do so, I'd recommend calling it
> something else, because it surely will have very little to do with
> Domain-based authentication.

The point of DKIM is to attach an identifer to messages which you can use 
in combination with the identifier's reputation to do stuff.  If the 
messages were from some random linux box, you couldn't conclude anything 
beyond the fact that the signatures are valid today. But they're not, 
they're from gmail about which we know a lot, and we also know that the 
messages were collected by spear phishing a specific account, not by 
attacking gmail's internal security.

Put together the DKIM signatures and what we know about the signer, that 
gmail is rather picky about what they sign and is very unlikely to have 
signed a backdated message, and that their internal security is quite 
good, and you can reasonably conclude that the valid gmail signatures on 
the Podesta messages mean the messages are real.

To get back to the previous argument, if you don't want people using DKIM 
to validate old messages, rotate the keys more often.  Deliberately weak 
signatures strike me as a poor alternative.  We can know exactly when a 
key was withdrawn (mine rotate monthly, with the old keys going away on 
the 10th of the following month) but we can only guess who might be able 
to crack or fake a key and even more so whether someone faked a particular 
signature.

Regards,
John Levine, johnl@iecc.com, Primary Perpetrator of "The Internet for Dummies",
Please consider the environment before reading this e-mail. https://jl.ly
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html