Re: Last Call: <draft-kucherawy-marf-source-ports-03.txt> (Source Ports in ARF Reports) to Proposed Standard

Douglas Otis <dotis@mail-abuse.org> Tue, 08 May 2012 15:08 UTC

Return-Path: <dotis@mail-abuse.org>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5FCCE11E809B for <ietf@ietfa.amsl.com>; Tue, 8 May 2012 08:08:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.502
X-Spam-Level:
X-Spam-Status: No, score=-102.502 tagged_above=-999 required=5 tests=[AWL=0.097, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5cmTaO4rqoij for <ietf@ietfa.amsl.com>; Tue, 8 May 2012 08:08:26 -0700 (PDT)
Received: from mailserv.mail-abuse.org (mailserv.mail-abuse.org [150.70.98.118]) by ietfa.amsl.com (Postfix) with ESMTP id 88AFF11E8091 for <ietf@ietf.org>; Tue, 8 May 2012 08:08:26 -0700 (PDT)
Received: from US-DOUGO-MAC.local (unknown [10.31.37.9]) by mailserv.mail-abuse.org (Postfix) with ESMTPSA id 0BA711740216 for <ietf@ietf.org>; Tue, 8 May 2012 15:08:26 +0000 (UTC)
Message-ID: <4FA936E9.2050705@mail-abuse.org>
Date: Tue, 08 May 2012 08:08:25 -0700
From: Douglas Otis <dotis@mail-abuse.org>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:12.0) Gecko/20120428 Thunderbird/12.0.1
MIME-Version: 1.0
To: ietf@ietf.org
Subject: Re: Last Call: <draft-kucherawy-marf-source-ports-03.txt> (Source Ports in ARF Reports) to Proposed Standard
References: <20120507195025.19948.3410.idtracker@ietfa.amsl.com> <1755826.2gyQD9Uvee@scott-latitude-e6320> <9452079D1A51524AA5749AD23E003928118C04@exch-mbx901.corp.cloudmark.com> <a80ed582-27a1-4669-acf5-782b4f342b04@email.android.com> <9452079D1A51524AA5749AD23E003928118D24@exch-mbx901.corp.cloudmark.com>
In-Reply-To: <9452079D1A51524AA5749AD23E003928118D24@exch-mbx901.corp.cloudmark.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 May 2012 15:08:27 -0000

On 5/7/12 11:23 PM, Murray S. Kucherawy wrote:
>> -----Original Message-----
>> From: ietf-bounces@ietf.org [mailto:ietf-bounces@ietf.org] On Behalf Of Scott Kitterman
>> Sent: Monday, May 07, 2012 10:49 PM
>> To: ietf@ietf.org
>> Subject: RE: Last Call:<draft-kucherawy-marf-source-ports-03.txt>  (Source Ports in ARF Reports) to Proposed Standard
>>
>>> If all one is doing is figuring out why something like a DKIM signature
>>> failed on an otherwise legitimate message, then I agree the source port
>>> isn't a useful input to that work.  In fact, as far as DKIM goes, the
>>> source IP address is probably not useful either.
>>>
>>> If, however, one is trying to track down the transmission of fraudulent
>>> email such as phishing attacks, source ports can be used to identify
>>> the perpetrator more precisely when compared to logs.  Support for this
>>> latter use case is why I believe RECOMMENDED is appropriate.
>> Which is exactly the case (abuse report) the second to last paragraph
>> takes care of.  I agree RECOMMENDED is appropriate there and you have
>> it there.
>>
>> For auth failure analysis I read you as agreeing it's not needed.
>> There are some authorization methods that use IP address, so I don't
>> think that for auth failure reports inclusion of IP address and source
>> port are comparable.
>>
>> Based on your response, I don't understand your objection to dropping
>> the RECOMMENDS for auth failure reports and keeping it  for abuse
>> reports?
> I don't think it's possible for software to identify correctly a case of an accidental authentication failure versus detected fraud.  If it were, then I'd agree that for the simple authentication failure case the source port isn't useful.
>
> In the absence of that capability, isn't it better to give the investigating user as much information as possible to use in correlation of logs and such?
Dear Murray,

This is not about individual submissions or retaining privacy.  This is 
about retaining the only (weakly) authenticated piece of information 
within public SMTP exchanges.  All other SMTP elements are easily 
spoofed and worthless at positively identifying compromised systems for 
the purpose of subsequent isolation.   Attempts to track ports in the 
presence of LSN overlooks the highly transitory translations.  However, 
the LSN scheme provides a means to determine the source IP address.

Regards,
Douglas Otis