[ietf-dkim] Re: draft-dkim-pcon

Douglas Otis <dotis@mail-abuse.org> Fri, 16 June 2006 17:36 UTC

Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1FrIFb-000881-GG for ietf-dkim-archive@lists.ietf.org; Fri, 16 Jun 2006 13:36:55 -0400
Received: from sb7.songbird.com ([208.184.79.137]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FrIFN-0004Yw-JN for ietf-dkim-archive@lists.ietf.org; Fri, 16 Jun 2006 13:36:43 -0400
Received: from sb7.songbird.com (sb7.songbird.com [127.0.0.1]) by sb7.songbird.com (8.12.11.20060308/8.12.11) with ESMTP id k5GHa84P009547; Fri, 16 Jun 2006 10:36:09 -0700
Received: from a.mail.sonic.net (a.mail.sonic.net [64.142.16.245]) by sb7.songbird.com (8.12.11.20060308/8.12.11) with ESMTP id k5GHZwGY009525 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-dkim@mipassoc.org>; Fri, 16 Jun 2006 10:35:58 -0700
Received: from [168.61.10.151] (SJC-Office-DHCP-151.Mail-Abuse.ORG [168.61.10.151]) (authenticated bits=0) by a.mail.sonic.net (8.13.6/8.13.3) with ESMTP id k5GHZR3l025768 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NO); Fri, 16 Jun 2006 10:35:28 -0700
In-Reply-To: <198A730C2044DE4A96749D13E167AD37B55D32@MOU1WNEXMB04.vcorp.ad.vrsn.com>
References: <198A730C2044DE4A96749D13E167AD37B55D32@MOU1WNEXMB04.vcorp.ad.vrsn.com>
Mime-Version: 1.0 (Apple Message framework v750)
Content-Type: text/plain; charset="US-ASCII"; delsp="yes"; format="flowed"
Message-Id: <04320A17-D646-4EAB-986E-39C0291671C3@mail-abuse.org>
Content-Transfer-Encoding: 7bit
From: Douglas Otis <dotis@mail-abuse.org>
Date: Fri, 16 Jun 2006 10:35:26 -0700
To: "Hallam-Baker, Phillip" <pbaker@verisign.com>
X-Mailer: Apple Mail (2.750)
X-Songbird: Clean, Clean
Cc: IETF-DKIM <ietf-dkim@mipassoc.org>
Subject: [ietf-dkim] Re: draft-dkim-pcon
X-BeenThere: ietf-dkim@mipassoc.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IETF DKIM Discussion List <ietf-dkim.mipassoc.org>
List-Unsubscribe: <http://mipassoc.org/mailman/listinfo/ietf-dkim>, <mailto:ietf-dkim-request@mipassoc.org?subject=unsubscribe>
List-Archive: <http://mipassoc.org/pipermail/ietf-dkim>
List-Post: <mailto:ietf-dkim@mipassoc.org>
List-Help: <mailto:ietf-dkim-request@mipassoc.org?subject=help>
List-Subscribe: <http://mipassoc.org/mailman/listinfo/ietf-dkim>, <mailto:ietf-dkim-request@mipassoc.org?subject=subscribe>
Sender: ietf-dkim-bounces@mipassoc.org
Errors-To: ietf-dkim-bounces@mipassoc.org
X-SongbirdInformation: support@songbird.com for more information
X-Songbird-From: ietf-dkim-bounces@mipassoc.org
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 8fbbaa16f9fd29df280814cb95ae2290

On Jun 16, 2006, at 7:34 AM, Hallam-Baker, Phillip wrote:

>> Would you agree, as it currently stands, a wildcard is not  
>> practical for ensuring any sub-zone has a policy?  Changing the  
>> way DNS works also seems out of scope for this WG.
>
> Read the draft. It solves every requirement

In addition to usurping the use of the PTR record, this solution  
requires placement of a wildcard domain name containing a PTR RR at  
every label.  DNSsec indicates the synthesized labels needed for  
checking the signature.  Complete coverage with wildcard domain names  
will tend to expose existing labels.  This seems rather impractical.

Not that this appears to be practical, rather than usurping the PTR  
record, perhaps a CNAME might be a practical solution.

See:
http://www.ietf.org/internet-drafts/draft-ietf-dnsext-wcard- 
clarify-11.txt

-------
3.3.3 Type Matching

      RFC 1034 concludes part 'c' with this:

#            If the "*" label does not exist, check whether the name
#            we are looking for is the original QNAME in the query
#            or a name we have followed due to a CNAME.  If the name
#            is original, set an authoritative name error in the
#            response and exit.  Otherwise just exit.
#
#            If the "*" label does exist, match RRs at that node
#            against QTYPE.  If any match, copy them into the answer
#            section, but set the owner of the RR to be QNAME, and
#            not the node with the "*" label.  Go to step 6.

     The final paragraph covers the role of the QTYPE in the lookup
     process.

     Based on implementation feedback and similarities between step
     'a' and step 'c' a change to this passage has been made.

     The change is to add the following text to step 'c' prior to the
     instructions to "go to step 6":

              If the data at the source of synthesis is a CNAME, and
              QTYPE doesn't match CNAME, copy the CNAME RR into the
              answer section of the response changing the owner name
              to the QNAME, change QNAME to the canonical name in the
              CNAME RR, and go back to step 1.
------


> The DNS wildcard mechanism is not defined in a manner that is ideal  
> for the type of administration we need.
>
> Changing the DNS protocol is outside scope, changing the DNS  
> infrastructure is something we have done already.

Agree on both points.


>> You mentioned the use of a URL, but to what type of server?
>
> HTTP, all else is noise.

RFC2821 meets RFC2616. : )

Is the response determined by a specific URI namespace?  Overlooking  
zone delegations, as DKIM currently does, it also seems this service  
might also define sub-zone policies and develop a parallel  
structure. : O


>>> No it can't. The attacker can strip out the signature entirely.
>>
>> A message with only a deprecated signature should be considered  
>> not signed, thus any non-deprecated signature "striped out" would  
>> nullify a deprecated signature.  Once both signer and verifier  
>> upgrade, the downgrade attack is eliminated.  Until the verifier  
>> upgrades, a down grade attack is not an issue.  Messages with a  
>> signature using an unknown service should be marked with a red flag.
>
> You don't understand the issue.

Would you care to elaborate?  Provided the underlying services are  
not altered, confirmation of a newer version being offered by the  
signing domain remains possible.  Lacking this confirmation should  
impose some type of warning, and under no circumstance should a  
deprecated version be accepted without the presence of a non- 
deprecated version from the same signing domain.  While not perfect,  
this should prevent a downgrade attack where both the signing and  
verifying domain have upgraded.  Once the verifier is upgraded to  
understand the new service, the warning is removed.  These types of  
warnings should motivate an upgrade or act as a valuable alert  
without adding any additional dependencies.


>>> This mechanism is already possible today, just make  
>>> ldap.verisign.com your root for downloading policy data.
>>
>> This was not a suggestion for that type of service.  Of the  
>> millions of domains, a relatively small percentage of  
>> transactional domains are being attacked.  A community effort  
>> similar to http:// adblock.mozdev.org/ could construct a user  
>> modifiable list of popular transactional domains.
>
> Community projects don't do boring jobs. What you propose would be  
> tedious beyond description.

Blocking ads is exciting?  At least there is a clearer imperative  
when blocking phish.

 From our efforts, this seems to be an overstatement.  Once a trusted  
list provision becomes part of an email message annotation  
application, whether at the MUA or MTA, there are several  
organizations likely willing to contribute.  Perhaps organizations  
such as the APWG would be a good starting point.

> Much better to give network admins the tools to describe their  
> policy themselves than this bizare ad-hoc scheme you are proposing.

An ad-hoc list from a trusted community could still greatly assist  
the network admin with this otherwise tedious task.  : )

-Doug
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html