Re: [spfbis] RFC6147 and RFC7208 interoperability issues

william@leibzon.org Sun, 06 February 2022 20:44 UTC

Return-Path: <william@leibzon.org>
X-Original-To: spfbis@ietfa.amsl.com
Delivered-To: spfbis@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8C04D3A0D48 for <spfbis@ietfa.amsl.com>; Sun, 6 Feb 2022 12:44:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NEPY21yThQ_f for <spfbis@ietfa.amsl.com>; Sun, 6 Feb 2022 12:44:38 -0800 (PST)
Received: from relay5.hostedemail.com (relay5.hostedemail.com [64.99.140.40]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 95DBB3A0D47 for <spfbis@ietf.org>; Sun, 6 Feb 2022 12:44:38 -0800 (PST)
Received: from omf15.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay09.hostedemail.com (Postfix) with ESMTP id DF99822855; Sun, 6 Feb 2022 20:44:36 +0000 (UTC)
Received: from [HIDDEN] (Authenticated sender: william@leibzon.org) by omf15.hostedemail.com (Postfix) with ESMTPA id 8D46B1E; Sun, 6 Feb 2022 20:44:18 +0000 (UTC)
MIME-Version: 1.0
Date: Sun, 06 Feb 2022 12:44:36 -0800
From: william@leibzon.org
To: Klaus Frank <klaus.frank@posteo.de>
Cc: spfbis@ietf.org
In-Reply-To: <6745ef81-3b55-de02-b6c7-def2d6d33e61@posteo.de>
References: <45e423cc-4095-cca2-bf8c-aa15e977b19c@posteo.de> <2098569.QsC3VX2HWt@localhost> <d606050e47c4ae22b53448e56ff29ad2@leibzon.org> <7683f14e-113c-e339-f499-bc75bc1644a0@posteo.de> <5f14e191ab8239dd5dae0e4fbac7d223@leibzon.org> <6745ef81-3b55-de02-b6c7-def2d6d33e61@posteo.de>
Message-ID: <d766a8ec819493fefb89d60c3180d8e3@leibzon.org>
X-Sender: william@leibzon.org
Content-Type: multipart/alternative; boundary="=_a649f8b754ccf4f91ecaa20c331ee951"
X-Stat-Signature: 9j557e3d37yfwj67zqu4mgeebaemi5kb
X-Rspamd-Server: rspamout04
X-Rspamd-Queue-Id: 8D46B1E
X-Session-Marker: 77696C6C69616D406C6569627A6F6E2E6F7267
X-Session-ID: U2FsdGVkX1+BCBsdXVe0PEIZoeVzo96AITgJmFj+134=
X-HE-Tag: 1644180258-850650
Archived-At: <https://mailarchive.ietf.org/arch/msg/spfbis/a5LxuGx7lgFGTMbrVqG1fU2Y2Oc>
Subject: Re: [spfbis] RFC6147 and RFC7208 interoperability issues
X-BeenThere: spfbis@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SPFbis discussion list <spfbis.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spfbis>, <mailto:spfbis-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spfbis/>
List-Post: <mailto:spfbis@ietf.org>
List-Help: <mailto:spfbis-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spfbis>, <mailto:spfbis-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Feb 2022 20:44:45 -0000


These are closer to implementation, yes. But how SIEVE is used is that a 
mail server operator can be on one network and they have users on other 
networks that use this protocol to tell the operator what their mail 
filtering preferences are. So mail server operator (if they were behind 
NAT64) would have to do this re-writing or re-interpretation of SIEVE 
rules. This may require knowledge of how IPv4 is mapped to IPv6 for 
them. And it is not much different than trying to re-interpret SPF 
records when on IPv6 only network.

One of the ways of solving issues like this is special IPv4 in-addr like 
dns map and lookup which would allow hosts behind NAT64 to find what 
IPv4->IPv6 translation for their site is when they have an IPv4 address 
from some filtering system or protocol and they need to locally 
re-interpret it. This is not as elegant as DNS64 rewriting but I think 
its going to be needed in the end anyway for various cases (maybe as 
interim solution).

On 2022-02-06 12:21, Klaus Frank wrote:

> But if I see that correctly that's a list that the admin of the 
> recipient side has under his control and could update, right? Therefore 
> the same entity that deploys DNS64 would just have to make sure to also 
> update the list of IPs within their SIEVE configuration, right?
> 
> If so a possible migration would be to duplicate these sections with 
> the corresponding NAT64 addresses and after NAT64+DNS64 is deployed for 
> the mail infrastructure to decommission the ipv4 only ones.
> 
> This doesn't look like a hard/RFC limitation (like the SPF record 
> thing) to me. Or am I missing something?
> 
> On 2022-02-06 21:10, william@leibzon.org wrote:
> 
> In regards to SIEVE take a look at examples in 
> http://www.delegate.org/ietf/rfc-html/rfc6134.shtml
> 
> There are a lot of various types of ip address validation going on that 
> is not documented by IETF or any other authority but is in practice 
> done using various unix utilities. Most of these is just to separate 
> local and external networks but there are real ip address blocks of 
> large sties - both at the router/network and at the local host level. 
> Some companies limit what sites their employees can visit and there are 
> many ways it is done.
> 
> And of course for email ip address block lists still exists and in use 
> as well. In some cases DNS is used, in others ip lists are received as 
> files and synced.
> 
> NAT64 is bound to run into all sorts of issues like this when it begins 
> to be more widely used. And I do think this is positive step towards 
> IPv6 world. Its just going to take quite some time to work all these 
> issues out.
> 
> On 2022-02-06 11:13, Klaus Frank wrote:
> 
> I'm not aware that SIEVE would use the source ip address. Also when 
> looking over the main RFCs for it I couldn't find anything that 
> specifies ip validation. ATM only the EHLO (which uses the PTR-RR) and 
> the SPF validation rely on IP to DNS mapping.
> 
> On 2022-02-06 19:55, william@leibzon.org wrote:
> 
> This is like NAT where entirety of DNS is re-written to make internet 
> appear to be IPV6 only. So yes, SPF records would be an issue then.
> 
> There is more than one way to solve it. The proposal to re-write SPF is 
> probably the most correct way within context of NAT64-DNS64. The other 
> option would be to update SPF specifying that validating servers on 
> IPv6 only network can use IPv4 spf records for validation if the ip 
> address of connecting mail server is a mapped IPv4->IPv6. That is far 
> less elegant though.
> 
> BTW, I bet SPF is not going to be the only protocol with these types of 
> issues. How about SIEVE? Have you checked how well NAT64 inter-operates 
> with that?
> 
> On 2022-02-06 10:25, Scott Kitterman wrote:
> 
> On Sunday, February 6, 2022 1:09:13 PM EST Klaus Frank wrote: Hi,
> 
> we had some issues with SPF and a mail server that was behind
> NAT64+DNS64. I at first thought that it was just a misconfiguration. 
> But
> after the DNS64 server seamed to work as intended I went to the
> implementation and the RFC. Thereby while reading RFC6147 I stumbled
> across section 5.3.3 which says "All other RRs MUST be returned
> unchanged." which is the cause of my issues. This section is basically
> ignoring SPF records (RFC7208 section 5.6) and also preventing DNS64
> implementations from addressing this limitation.
> 
> Would it be possible to create an extension to RFC6147 that mandates 
> SPF
> record rewrites as well? Otherwise Mail servers behind NAT64+DNS64 in
> IPv6 only environments won't be able to work as expected.
> 
> Like:
> If the DNS64 server receives a SPF-record (within either the TXT-RR or
> the SPF-RR [RFC4408]) containing the "ip4" mechanism it MUST rewrites
> the ipv4 address according to the same rules as A-records are and
> synthesizes a new SPF record within the response that contains
> additional "ip6" entries. The original "ip4" should not be removed from
> the response.
> What's preventing the SPF record publisher from solving this problem by 
> adding
> the ip6: mechanisms themselves?  Perhaps I don't understand the issue 
> you are
> raising.  Would you please clarify what it is you're asking be done 
> that an
> administrator can't do on their own?
> 
> Scott K
> 
> _______________________________________________
> spfbis mailing list
> spfbis@ietf.org
> https://www.ietf.org/mailman/listinfo/spfbis

_______________________________________________
spfbis mailing list
spfbis@ietf.org
https://www.ietf.org/mailman/listinfo/spfbis
_______________________________________________
spfbis mailing list
spfbis@ietf.org
https://www.ietf.org/mailman/listinfo/spfbis
_______________________________________________
spfbis mailing list
spfbis@ietf.org
https://www.ietf.org/mailman/listinfo/spfbis