Macro Expansion (was: Last Call: <draft-ietf-spfbis-4408bis-19.txt> (Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1) to Proposed Standard)

S Moonesamy <sm+ietf@elandsys.com> Mon, 16 September 2013 16:05 UTC

Return-Path: <sm@elandsys.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2724311E82E5; Mon, 16 Sep 2013 09:05:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.552
X-Spam-Level:
X-Spam-Status: No, score=-102.552 tagged_above=-999 required=5 tests=[AWL=0.047, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 52E8og5o+lKI; Mon, 16 Sep 2013 09:04:56 -0700 (PDT)
Received: from mx.ipv6.elandsys.com (mx.ipv6.elandsys.com [IPv6:2001:470:f329:1::1]) by ietfa.amsl.com (Postfix) with ESMTP id 0BCF111E8127; Mon, 16 Sep 2013 09:02:53 -0700 (PDT)
Received: from SUBMAN.elandsys.com ([197.224.146.145]) (authenticated bits=0) by mx.elandsys.com (8.14.5/8.14.5) with ESMTP id r8GG2G85011670 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 16 Sep 2013 09:02:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=opendkim.org; s=mail2010; t=1379347355; bh=TUgWM+on/TxAY26GEe5jZtR1nxfw9oWUIGRm13KK3X0=; h=Date:To:From:Subject:Cc:In-Reply-To:References; b=iUD6fKc1cMSGSGnLutJBTApaC/nVUVDbg6XPC5UUOBNXOFvdPCKLkBs8emzi30ZWk IZU3KPreJ091i3SrGHnSP+fSy5rvw0jE6Dl5rpkyFfJkApCsHVO+MBBUCcHCH8LJwx 0IMK+2JP+0XXA1YeNgelTLIyNnI8ddcuwJQMGa7c=
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=elandsys.com; s=mail; t=1379347355; i=@elandsys.com; bh=TUgWM+on/TxAY26GEe5jZtR1nxfw9oWUIGRm13KK3X0=; h=Date:To:From:Subject:Cc:In-Reply-To:References; b=Yd7DiYssq1aQR9C+dsSZPyW2wuQNnC4AX8UDPaLoE2RPQwIZjIwalLgmdcYXdWZZZ UyGOd0l3G9kU07I850kUhwUeD98kFxeX6YaLPwYO1JAUlednUkwt74mhL3Yez9BdUS utnTmB64rBSPyTxLkJWycGPAJ+3xMIFbG/81MXH8=
Message-Id: <6.2.5.6.2.20130916014542.0b496658@elandnews.com>
X-Mailer: QUALCOMM Windows Eudora Version 6.2.5.6
Date: Mon, 16 Sep 2013 09:00:22 -0700
To: Douglas Otis <doug.mtview@gmail.com>
From: S Moonesamy <sm+ietf@elandsys.com>
Subject: Macro Expansion (was: Last Call: <draft-ietf-spfbis-4408bis-19.txt> (Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1) to Proposed Standard)
In-Reply-To: <6FC7A544-0AB5-4BC0-A0BF-D0D8D740D3B8@gmail.com>
References: <6FC7A544-0AB5-4BC0-A0BF-D0D8D740D3B8@gmail.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Cc: spfbis@ietf.org, spfbis-chairs@tools.ietf.org, Pete Resnick <presnick@qti.qualcomm.com>, ietf@ietf.org, Scott Kitterman <spf2@kitterman.com>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Sep 2013 16:05:13 -0000

Hi Doug,
At 21:55 11-09-2013, Douglas Otis wrote:
>Add to:
>11.5.3.  Macro Expansion
>,---
>It is not within SPF's purview whether IPv6 or DNSSEC is being 
>used.  IPv6 (RFC2460) increased the minimum MTU size to 1280 
>octets.  DNSSEC is deployed with EDNS0 (RFC6891) to avoid TCP 
>fallback.  EDNS0 suggests an MTU increase between 1280 and 1410 
>octets offers a reasonable result starting from a request of 4096 
>octets.  A 1410 MTU offers a 2.4 times payload increase over the 
>assumed MTU of 576 octets and is widely supported by Customer 
>Premise Equipment.  With increased MTUs being used with DNS over 
>UDP, network amplification concerns increase accordingly.
>
>SPF macros can utilize SPF parameters derived from email messages 
>that can modulate the names being queried in several ways without 
>publishing additional DNS resources.  The SPF macro feature permits 
>malefactors a means to covertly orchestrate directed DDoS attacks 
>from an array of compromised systems while expending little of their 
>own resources.
>
>Since SPF does not make use of a dedicated resource record type or 
>naming convention, this leaves few solutions available to DNS 
>operations in offering a means to mitigate possible abuse.  This 
>type of abuse becomes rather pernicious when used in conjunction 
>with synthetic domains now popular for tracking users without using 
>web cookies.
>
>However, email providers can mitigate this type of abuse by ignoring 
>SPF records containing macros.  Very few domains make use of macros, 
>and ignoring these records result in neutral handling.  Some large 
>providers have admitted they make use of this strategy without 
>experiencing any notable problem.  AOL began their support of SPF by 
>saying they would use SPF to construct whitelists prior to receipt 
>of email.  Clearly, such whitelisting practices tends to preclude 
>benefits derived from macro use.
>'---

As background information I read 
draft-otis-spfbis-macros-nixed-01.  I read the messages where EDNS0 
was mentioned [1].  I read the messages on the thread starting with 
msg-id: 9884B9CD-0ED3-4D89-A100-58D05EA4BC98@gmail.com.  I have 
followed the discussions about macros ever since the SPFBIS WG was chartered.

The above suggestion is to add text in the Security Considerations 
section of the draft.  The problem being pointed out is, in simple 
terms, DNS amplification.  The first (quoted) paragraph argues that 
there can be an acute problem because of EDNS0 as specified in the 
Internet Standard.

The second paragraph starts with SPF macros can utilize SPF 
parameters derived from email messages".  I do not understand 
that.  From what I understand the rest of the second (quoted) 
paragraph argues that the SPF macro feature permits evildoers to use 
it as an attack vector.

The argument in the third (quoted) paragraph is that it is not 
possible to mitigate possible (DNS) abuse due to the SPF as it does 
not have a dedicated resource record type.

The fourth (quoted) paragraph argues that macros should be 
ignored.  That paragraph also mentions that some large providers 
admitted to using that strategy.  I am not aware of any public 
reports about that.

I read draft-otis-spfbis-macros-nixed-01 again to try and understand 
the problem.  It seems to be the:

   '{%l}._spf.{%d} or exists:{%i}_spf.{%d} can  be used in "specialized"
    DNS servers able to understand encrypted local-parts'

which is discussed in Appendix E of draft-ietf-spfbis-4408bis-20.

Arthur Thisell commented about the "specialized DNS server".  He 
mentioned that at the time that text was written two people came 
forward to say that they were doing that.  During the SPFBIS 
discussions nobody stated that he or she has implemented or is using 
a "specialized" DNS server.

I'll ask the person editing draft-ietf-spfbis-4408bis or the SPFBIS 
WG to provide some publicly verifiable cases where these examples are used.

I assume that the SPFBIS WG and the Responsible Area Director have 
understood the mathematics relating to EDNS0 and DNS 
amplification.  Anyone who has not understood that part is welcome to 
raise the issue on the SPFBIS mailing list.

The discussion about the "dedicated resource record type" has led to 
agreement.  I'll describe the agreement as something people can live 
with.  In my opinion it is better not to start another discussion about that.

I hope that what I wrote above clearly explains what I have 
understood and what I have not understood.

Regards,
S. Moonesamy (as document shepherd)

1. message-id of messages:

4EF10B1F.5050406@mail-abuse.org
4F0E7154.4080208@isdg.net
29fba028-5881-4a04-95d4-227582a3801e@email.android.com
Pine.GSO.4.62.1201121350550.3388@spaz.oit.wmich.edu
20120425152326.GE60024@mail.yitter.info
1545953.Y9VaoKsXxF@scott-latitude-e6320
20120704015156.GB12452@crankycanuck.ca
1977893.MDoye0cYQa@scott-latitude-e6320
20130122231357.GA6921@mx1.yitter.info
3896517.k8tBVMT4Fi@scott-latitude-e6320
CD246081.BBD2F%fmartin@linkedin.com
20130123010120.GC7073@crankycanuck.ca
271785100.KEZggNLeh1@scott-latitude-e6320
CAL0qLwaW1-dQg-NhwBNWAppXjfsoacO1Q8gHdPPvEGDssEpJQA@mail.gmail.com
20130125143603.GA11573@mx1.yitter.info
7ab574aa-d13c-44e2-968e-4946bd05808c@email.android.com
20130430103940.GB32695@besserwisser.org
517FBBCD.3010001@tana.it
20130624212511.GB44803@crankycanuck.ca
686233851.4iQopu4Yll@scott-latitude-e6320
24624534.FuUVENZpXd@scott-latitude-e6320
24624534.FuUVENZpXd@scott-latitude-e6320
B8983E88-14A1-4741-99ED-F43962B2497A@gmail.com
BA4D9B3E-F9A6-46AF-BBA7-D6AD463020CA@gmail.com
5129719.PDZTiHcDZ6@scott-latitude-e6320
BD926F72-A6C3-4F0B-BBFB-A18668C9E4AF@gmail.com
38312086.HKzMeyOO04@scott-latitude-e6320
2137735.9LNiMWPY5V@scott-latitude-e6320