RE: dmarc damage, was gmail users read on... [bozo subtopic]

"MH Michael Hammer (5304)" <MHammer@ag.com> Fri, 12 September 2014 17:46 UTC

Return-Path: <MHammer@ag.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CCE741A802A for <ietf@ietfa.amsl.com>; Fri, 12 Sep 2014 10:46:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.4
X-Spam-Level:
X-Spam-Status: No, score=0.4 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MANGLED_SPAM=2.3, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p5mAovHgQgZJ for <ietf@ietfa.amsl.com>; Fri, 12 Sep 2014 10:46:21 -0700 (PDT)
Received: from agwhqht.amgreetings.com (agwhqht.amgreetings.com [207.58.192.31]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 34E3D1A7113 for <ietf@ietf.org>; Fri, 12 Sep 2014 10:46:21 -0700 (PDT)
Received: from USCLES544.agna.amgreetings.com ([fe80::f5de:4c30:bc26:d70a]) by USCLES533.agna.amgreetings.com ([::1]) with mapi id 14.03.0158.001; Fri, 12 Sep 2014 13:46:20 -0400
From: "MH Michael Hammer (5304)" <MHammer@ag.com>
To: Wei Chuang <weihaw@google.com>
Subject: RE: dmarc damage, was gmail users read on... [bozo subtopic]
Thread-Topic: dmarc damage, was gmail users read on... [bozo subtopic]
Thread-Index: AQHPzV9Xm91w9FvYQ0mNkqeWLfUyt5voHk2AgBJ73YCAAJzQAIABA5iAgAAKD4CAAC+fAIAABbgAgACR5nCAAJbkoIAAYSaA//++KgA=
Date: Fri, 12 Sep 2014 17:46:19 +0000
Message-ID: <CE39F90A45FF0C49A1EA229FC9899B0525E806C5@USCLES544.agna.amgreetings.com>
References: <20140911202058.3327.qmail@joyce.lan> <541208F6.1010302@dougbarton.us> <bb48b8f170074ddeb25cbb213f613892@DM2PR0301MB0655.namprd03.prod.outlook.com> <CE39F90A45FF0C49A1EA229FC9899B0525E804C0@USCLES544.agna.amgreetings.com> <CAAFsWK0os6Var4K9g+MLvhR5__4bGfH+kg-0uQh7ZE5V6A-fxg@mail.gmail.com>
In-Reply-To: <CAAFsWK0os6Var4K9g+MLvhR5__4bGfH+kg-0uQh7ZE5V6A-fxg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.144.15.216]
x-kse-antivirus-interceptor-info: scan successful
x-kse-antivirus-info: Clean
Content-Type: multipart/alternative; boundary="_000_CE39F90A45FF0C49A1EA229FC9899B0525E806C5USCLES544agnaam_"
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/ietf/He5_T6hv3pikz0USCWyJvQ96Kww
Cc: "ietf@ietf.org" <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Sep 2014 17:46:25 -0000


From: Wei Chuang [mailto:weihaw@google.com]
Sent: Friday, September 12, 2014 1:20 PM
To: MH Michael Hammer (5304)
Cc: Christian Huitema; Doug Barton; ietf@ietf.org
Subject: Re: dmarc damage, was gmail users read on... [bozo subtopic]



On Fri, Sep 12, 2014 at 8:35 AM, MH Michael Hammer (5304) <MHammer@ag.com<mailto:MHammer@ag.com>> wrote:


> -----Original Message-----
> From: ietf [mailto:ietf-bounces@ietf.org<mailto:ietf-bounces@ietf.org>] On Behalf Of Christian Huitema
> Sent: Friday, September 12, 2014 1:34 AM
> To: Doug Barton; ietf@ietf.org<mailto:ietf@ietf.org>
> Subject: RE: dmarc damage, was gmail users read on... [bozo subtopic]
>
> >>>> I've collected all of the DMARC workarounds I know on the ASRG wiki:
> >>>>
> http://wiki.asrg.sp.am/wiki/Mitigating_DMARC_damage_to_third_party_
> >>>> mail
> >
> > Two responses to that, in no particular order of importance:
> >
> > 1. So you said, and yet the mere existence of that page out on the
> > intertubez has (oddly enough) not yet spurred the secretariat into action.
>
> The big change with DMARC is a deprecation of the Sender/From
> differentiation, effectively requiring that these two will be the same. It
> seems that big systems have voted that the differentiation causes more
> harm (spam, phish) than good (remailers).
>

This is actually not quite true. If the Sender and the From are in the same domain then there is no problem. It becomes an issue when the Sender and the From are different domains. DMARC does not care about the LHS of the email address (whether it is DKIM signing or SPF validation).

Agreed, but just wanted to add one thing- doesn't the details of the whether the sender has to align or not depends on whether SPF or DKIM is used as the authentication method?  (SPF w/DMARC will force the envelope sender to agree with from.)  Also I wanted to add to mix that there must be something by which to lookup the "sender's" DMARC policy, and the DMARC authors choose for various reasons the FROM domain by which the authentication methods will enforce "alignment" upon.

MH: Because (DMARC) alignment is required in either case it really isn't an issue whether SPF or DKIM is used for DMARC validation. Looking up the "sender's" policy is what PRA attempted in SenderID. I and others showed that it was rather trivial to game PRA to at least get a neutral status for a message. There is no reasonable way to establish that the Sender is truly representing the From, and that problematic when one is talking security/authorization models. There have been some discussions about how to implement an "authorization" for Sender but I haven't seen anything that makes sense to me.

The FROM domain was chosen for DMARC because it is what is generally used in the MUA (visible to the user). One could just as easily have argued for MailFrom as long as alignment between the two is required. Six of one half a dozen of the other.



> Of the responses listed, the one that clearly works is to ask forwarders to
> forward messages, what the wiki calls "message wrapping." It works in the
> sense that the mail system sees consistent headers that pass all verifications,
> and represent the actual action of the remailer while not relying on
> Sender/From differences.
>
> At that point, the issue is mostly with the UI. If my reader did recognize the
> "simple forwarding" case from "authorized remailers," then the message
> wrapping solution would be just fine. The good thing is that it is very much
> under my control

I also just wanted to bring another high level idea to the table- rather than discuss which work arounds to mandate (and all have problems), why not revisit the authentication methods?  In particular the current DKIM method, while very powerful in the security sense, is very restrictive.  Any changes to the signed message parts will cause the authentication to fail.   For example if a mailing lists modifies the subject or body even if done so in some sanctioned way, it will fail DKIM.  (And then since the message is resent, fail SPF)  At the broader IETF community level, perhaps it might be good to see about improving those RFC's?

MH: There is always the potential to consider other authentication methods and this has been discussed. Initially it is a complexity issue and real world experience showed that for most use cases (I'm waiting for someone to jump in and wag their finger at me about MLMs) the combination of aligned SPF and DKIM validation is extremely effective (although somewhat restrictive). I'm personally not against someone(s) doing some testing for other authentication methods to see what the outcomes would be - all you need is at least a participating sender and receiver. I know that there has been some discussion of DKIM signing individual MIME parts in addition to an overall signature so that one could see which parts were modified. This coupled with a signature by the list/forwarder might be an interesting approach. On the other hand it might represent too much complexity. Some folks advocate reputation of the forwarder as the solution. I'm not a big fan of reputation (For me it falls into the category of "What have you done to me lately" rather than "you've been a good actor for the last 5 years" - would you accept crap from a good domain gone bad just because they used to be good?)

For example there are some ideas about improving DKIM out there.  I've made a general but heavy-handed conceptual proposal early on in the DMARC WG, and I know there is another one by Murry Kucherawy (list-cannon) that IMO is a very good direction.  I think there's an opportunity of taking these approaches and simplifying them to make them palatable to the mailing-list operators.

MH: I'm agnostic on this. Some advocate changes to accommodate mailing-list operators - that's fine with me as long as there is still a decent security model. Others argue that mailing-list operators must change. That may or may not be true. The mail streams I'm responsible for are typically transactional and do not go through lists so while  have an opinion I've been hanging back from that "discussion". I'm gratified that there appears to be more serious discussion in this space though.

-Wei

Mike