Re: [spfbis] RFC6147 and RFC7208 interoperability issues

Klaus Frank <klaus.frank@posteo.de> Sun, 06 February 2022 20:21 UTC

Return-Path: <klaus.frank@posteo.de>
X-Original-To: spfbis@ietfa.amsl.com
Delivered-To: spfbis@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CCF993A0D02 for <spfbis@ietfa.amsl.com>; Sun, 6 Feb 2022 12:21:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=posteo.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PLWZ7ma3jLW4 for <spfbis@ietfa.amsl.com>; Sun, 6 Feb 2022 12:21:47 -0800 (PST)
Received: from mout02.posteo.de (mout02.posteo.de [185.67.36.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EC76F3A0CFD for <spfbis@ietf.org>; Sun, 6 Feb 2022 12:21:46 -0800 (PST)
Received: from submission (posteo.de [185.67.36.169]) by mout02.posteo.de (Postfix) with ESMTPS id A6EFC240107 for <spfbis@ietf.org>; Sun, 6 Feb 2022 21:21:42 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=posteo.de; s=2017; t=1644178903; bh=D+RmdGd8IwwKwR4bmFnCeYOrd7rNL3boxYx/p/fpbW8=; h=Date:Subject:To:Cc:From:From; b=pwJAqIu3FuOA+CPl7jebFsnEgpc5EwR2956kqnW8GsrkVjjfFRIV7zgNcsRpsYmWu 8xpYbC759FD8Vgvu7/+5ksYOBAILe0/JsPKKBS23NKFsOeaz51Sd92BVfi7BX9TvHg Nj+j4kGacrw8EcR9TNPITw5/xdPWpvkdyGdRFgT23zhe5eyWD0D3cmVrn77vbhOqPr ZWHAcY59PsdZnV4Cm5JXfLG8SDB5l5B9s4JuG22ejeNf28Tu0pscKpBj2hOmQN/B+X b3evcakWwuvEhBngGdFku4x+U0mtDWdhiEhUALCPbabCyaatFfaUsmXXpR/euA3qaO MtAMLWZqFS+bA==
Received: from customer (localhost [127.0.0.1]) by submission (posteo.de) with ESMTPSA id 4JsLK14yXbz9rxD; Sun, 6 Feb 2022 21:21:41 +0100 (CET)
Message-ID: <6745ef81-3b55-de02-b6c7-def2d6d33e61@posteo.de>
Date: Sun, 06 Feb 2022 20:21:40 +0000
MIME-Version: 1.0
Content-Language: en-US
To: william@leibzon.org
Cc: spfbis@ietf.org
References: <45e423cc-4095-cca2-bf8c-aa15e977b19c@posteo.de> <2098569.QsC3VX2HWt@localhost> <d606050e47c4ae22b53448e56ff29ad2@leibzon.org> <7683f14e-113c-e339-f499-bc75bc1644a0@posteo.de> <5f14e191ab8239dd5dae0e4fbac7d223@leibzon.org>
From: Klaus Frank <klaus.frank@posteo.de>
In-Reply-To: <5f14e191ab8239dd5dae0e4fbac7d223@leibzon.org>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-512"; boundary="------------ms070502040707040902050507"
Archived-At: <https://mailarchive.ietf.org/arch/msg/spfbis/KOR_Jvzc1SsVa5Ss93GIrdAQbX8>
Subject: Re: [spfbis] RFC6147 and RFC7208 interoperability issues
X-BeenThere: spfbis@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SPFbis discussion list <spfbis.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spfbis>, <mailto:spfbis-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spfbis/>
List-Post: <mailto:spfbis@ietf.org>
List-Help: <mailto:spfbis-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spfbis>, <mailto:spfbis-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Feb 2022 20:21:53 -0000

But if I see that correctly that's a list that the admin of the 
recipient side has under his control and could update, right? Therefore 
the same entity that deploys DNS64 would just have to make sure to also 
update the list of IPs within their SIEVE configuration, right?

If so a possible migration would be to duplicate these sections with the 
corresponding NAT64 addresses and after NAT64+DNS64 is deployed for the 
mail infrastructure to decommission the ipv4 only ones.

This doesn't look like a hard/RFC limitation (like the SPF record thing) 
to me. Or am I missing something?

On 2022-02-06 21:10, william@leibzon.org wrote:
>
>
> In regards to SIEVE take a look at examples in 
> http://www.delegate.org/ietf/rfc-html/rfc6134.shtml
>
> There are a lot of various types of ip address validation going on 
> that is not documented by IETF or any other authority but is in 
> practice done using various unix utilities. Most of these is just to 
> separate local and external networks but there are real ip address 
> blocks of large sties - both at the router/network and at the local 
> host level. Some companies limit what sites their employees can visit 
> and there are many ways it is done.
>
> And of course for email ip address block lists still exists and in use 
> as well. In some cases DNS is used, in others ip lists are received as 
> files and synced.
>
> NAT64 is bound to run into all sorts of issues like this when it 
> begins to be more widely used. And I do think this is positive step 
> towards IPv6 world. Its just going to take quite some time to work all 
> these issues out.
>
> On 2022-02-06 11:13, Klaus Frank wrote:
>
>> I'm not aware that SIEVE would use the source ip address. Also when 
>> looking over the main RFCs for it I couldn't find anything that 
>> specifies ip validation. ATM only the EHLO (which uses the PTR-RR) 
>> and the SPF validation rely on IP to DNS mapping.
>>
>> On 2022-02-06 19:55, william@leibzon.org wrote:
>>>
>>>
>>> This is like NAT where entirety of DNS is re-written to make 
>>> internet appear to be IPV6 only. So yes, SPF records would be an 
>>> issue then.
>>>
>>> There is more than one way to solve it. The proposal to re-write SPF 
>>> is probably the most correct way within context of NAT64-DNS64. The 
>>> other option would be to update SPF specifying that validating 
>>> servers on IPv6 only network can use IPv4 spf records for validation 
>>> if the ip address of connecting mail server is a mapped IPv4->IPv6. 
>>> That is far less elegant though.
>>>
>>> BTW, I bet SPF is not going to be the only protocol with these types 
>>> of issues. How about SIEVE? Have you checked how well NAT64 
>>> inter-operates with that?
>>>
>>> On 2022-02-06 10:25, Scott Kitterman wrote:
>>>
>>>> On Sunday, February 6, 2022 1:09:13 PM EST Klaus Frank wrote:
>>>>> Hi,
>>>>>
>>>>> we had some issues with SPF and a mail server that was behind
>>>>> NAT64+DNS64. I at first thought that it was just a misconfiguration. But
>>>>> after the DNS64 server seamed to work as intended I went to the
>>>>> implementation and the RFC. Thereby while reading RFC6147 I stumbled
>>>>> across section 5.3.3 which says "All other RRs MUST be returned
>>>>> unchanged." which is the cause of my issues. This section is basically
>>>>> ignoring SPF records (RFC7208 section 5.6) and also preventing DNS64
>>>>> implementations from addressing this limitation.
>>>>>
>>>>> Would it be possible to create an extension to RFC6147 that mandates SPF
>>>>> record rewrites as well? Otherwise Mail servers behind NAT64+DNS64 in
>>>>> IPv6 only environments won't be able to work as expected.
>>>>>
>>>>> Like:
>>>>> If the DNS64 server receives a SPF-record (within either the TXT-RR or
>>>>> the SPF-RR [RFC4408]) containing the "ip4" mechanism it MUST rewrites
>>>>> the ipv4 address according to the same rules as A-records are and
>>>>> synthesizes a new SPF record within the response that contains
>>>>> additional "ip6" entries. The original "ip4" should not be removed from
>>>>> the response.
>>>>
>>>> What's preventing the SPF record publisher from solving this 
>>>> problem by adding
>>>> the ip6: mechanisms themselves?  Perhaps I don't understand the 
>>>> issue you are
>>>> raising.  Would you please clarify what it is you're asking be done 
>>>> that an
>>>> administrator can't do on their own?
>>>>
>>>> Scott K
>>>>
>>>>
>>>> _______________________________________________
>>>> spfbis mailing list
>>>> spfbis@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/spfbis
>>>
>>> _______________________________________________
>>> spfbis mailing list
>>> spfbis@ietf.org
>>> https://www.ietf.org/mailman/listinfo/spfbis
>>
>> _______________________________________________
>> spfbis mailing list
>> spfbis@ietf.org
>> https://www.ietf.org/mailman/listinfo/spfbis