[secdir] Secdir last call review of draft-ietf-dmarc-psd-08

Sandra Murphy via Datatracker <noreply@ietf.org> Thu, 09 April 2020 15:04 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id BB86D3A0943; Thu, 9 Apr 2020 08:04:54 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Sandra Murphy via Datatracker <noreply@ietf.org>
To: <secdir@ietf.org>
Cc: dmarc@ietf.org, draft-ietf-dmarc-psd.all@ietf.org, last-call@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.125.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <158644469471.21209.9811712342867228933@ietfa.amsl.com>
Reply-To: Sandra Murphy <sandy@tislabs.com>
Date: Thu, 09 Apr 2020 08:04:54 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/53q6fJsmM98smRbNlC3HRoYrfyc>
Subject: [secdir] Secdir last call review of draft-ietf-dmarc-psd-08
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Apr 2020 15:04:55 -0000

Reviewer: Sandra Murphy
Review result: Has Nits

This is a secdir review of draft-ietf-dmarc-psd-08 (DMARC (Domain-based Message
Authentication, Reporting, and Conformance) Extension For PSDs (Public Suffix
Domains))

I have reviewed this document as part of the security directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the security area directors.
Document editors and WG chairs should treat these comments just like any other
last call comments.

This document presents an extension to DMARC for Public Suffix Domains (PSD)
(and their operators (PSO)), which are domains that are not organizational
domains and are not subject to DMARC processing.  In DMARC, these PSD domains
can not publish policy or receive feedback for subdomains.  The extension
allows PSDs to express policy for organizational domain that are not themselves
implementing policy.  It also provides a new tag that covers non-existing
subdomains.

I find the document to be well written and well laid out (even in the face of a
few comments below).

Note:  I am not conversant with DMARC and have only read the underlying
normative references to the extent necessary to review this document.  Consider
the source in reading these comments.

The security considerations section states that it does not change the security
considerations of the base DMARC specification RFC7489.  That is common in
extensions to existing protocols.  But the authors, to their credit, note that
this extension increases some of the risks identified in the security
considerations of rFC7489.  I wish more authors of extensions to existing
protocols did similar analysis.

The security considerations section points in particular to Section 12.5 of
RFC7489, which describes the risks of external reporting addresses.  Section 4
of this document describes the privacy concerns of feedback reports leaking
information outside an organizational domain.  Section 12.5 of RFC7489 of
RFC7489 points to a verification mechanism in Section 7.1 of RFC7489.  Section
7.1 presents a detailed procedure to verify that a feedback reporting address
is safe to report to, particularly for rua or ruf tags.  Question to the
authors:  has the correctness of that procedure in the presence of this
extension been considered?  I can't tell.

Some wordsmithing comments:

Section 4.1 page 9

   o  Multi-organization PSDs (e.g., ".com") that do not mandate DMARC
      usage: Privacy risks for Organizational Domains that have not
      deployed DMARC within such PSDs are significant.  For non-DMARC
      Organizational Domains, all DMARC feedback will be directed to the
      PSO.  PSD DMARC is opt-out (by publishing a DMARC record at the
      Organizational Domain level) vice opt-in, which would be the more
      desirable characteristic.  This means that any non-DMARC
      organizational domain would have its feedback reports redirected
      to the PSO.  The content of such reports, particularly for
      existing domains, is privacy sensitive.

The sentences
                                                          "For non-DMARC
      Organizational Domains, all DMARC feedback will be directed to the
      PSO.
and
                                "This means that any non-DMARC
      organizational domain would have its feedback reports redirected
      to the PSO."
seem to say the same thing.  Are they redundant?  Or is there a difference
there that I am not seeing?

Section A page 11

              If the experiment shows that PSD DMARC solves a real
   problem and can be used at a large scale, the results could prove to
   be useful in removing constraints outside of the IETF that would
   permit broader deployment.

I would read "removing constraints ... that would permit broader deployment" as
meaning constraints that permit deployment are being removed.  The "that" would
in ordinary reading refer to "contraints".  I think the intended meaning is
"removing constraints ... where those constraints hamper broader deployment" or
"removing constraints ... thereby permitting broader deployment"

And I'm not sure whether "outside of the IETF" means that the removing occurs
outside the IETF or that the constraints exist outside the IETF.  I suspect
both, but I don't know that it makes much difference.

Section A.1 page 12

This section concerns the privacy concerns arising from the external reporting
described in Section 4.1.  In Section 4.1, the privacy risk exists for
"non-DMARC organizational domains" under a multi-organizational PSD (presumably
PSD DMARC participating, right?) that does not mandate DMARC usage for its
registrants.

Section A.1 states that knowing which PSDs do not present this risk would be
beneficial and describes an experiment to produce that knowledge.

Desirable attributes for such a mechanism includes the following:

   o  List PSDs that either mandate DMARC for their registrants or for
      which all lower level domains are controlled by the PSO and that
      the relevant PSO has indicated a desire for the PSD to participate
      in PSD DMARC

I get the "mandate DMARC" part - the risk exists in the case the PSD does not
mandate DMARC - if the PSD mandates DMARC, it does not produce the privacy risk.

I do not get the next part:
                                                               or for
      which all lower level domains are controlled by the PSO and that
      the relevant PSO has indicated a desire for the PSD to participate
      in PSD DMARC"

I do not see how the desire of the PSO that the PSD should participate in PSD
DMARC would help alleviate the privacy risk for the PSD's registrant
organizational domains.  In the first place, what does the PSO's desire got to
do with alleviating risk?  In the second place, this mechanism is supposed to
produce a list of PSDs that do not produce the risk.  The risk in Section 4.1
assumes (or so I thought) that the PSD participates in PSD DMARC.  So if the
PSD is not participating in PSD DMARC, then it is therefore not producing risk,
but it obeys the PSO desire, then the PSD becomes in the category of producing
the risk, not alleviating risk.

I suspect I am just confused here.

--Sandy Murphy