Re: [Uta] Genart last call review of draft-ietf-uta-smtp-tlsrpt-17

"Brotman, Alexander" <Alexander_Brotman@comcast.com> Tue, 27 March 2018 00:40 UTC

Return-Path: <Alexander_Brotman@comcast.com>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 369D0127871 for <uta@ietfa.amsl.com>; Mon, 26 Mar 2018 17:40:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Level:
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bAewXFgTloTK for <uta@ietfa.amsl.com>; Mon, 26 Mar 2018 17:40:38 -0700 (PDT)
Received: from vaadcmhout01.cable.comcast.com (vaadcmhout01.cable.comcast.com [96.114.28.75]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5C1FA126BF7 for <uta@ietf.org>; Mon, 26 Mar 2018 17:40:38 -0700 (PDT)
X-AuditID: 60721c4b-a28749e00000619d-82-5ab993058bf6
Received: from VAADCEX15.cable.comcast.com (vaadcmhoutvip.cable.comcast.com [96.115.73.56]) (using TLS with cipher AES256-SHA256 (256/256 bits)) (Client did not present a certificate) by vaadcmhout01.cable.comcast.com (SMTP Gateway) with SMTP id DA.0E.24989.50399BA5; Mon, 26 Mar 2018 20:40:37 -0400 (EDT)
Received: from COPDCEX20.cable.comcast.com (147.191.124.151) by VAADCEX15.cable.comcast.com (147.191.102.82) with Microsoft SMTP Server (TLS) id 15.0.1365.1; Mon, 26 Mar 2018 20:40:36 -0400
Received: from COPDCEX19.cable.comcast.com (147.191.124.150) by COPDCEX20.cable.comcast.com (147.191.124.151) with Microsoft SMTP Server (TLS) id 15.0.1365.1; Mon, 26 Mar 2018 18:40:35 -0600
Received: from COPDCEX19.cable.comcast.com ([fe80::3aea:a7ff:fe36:8380]) by COPDCEX19.cable.comcast.com ([fe80::3aea:a7ff:fe36:8380%19]) with mapi id 15.00.1365.000; Mon, 26 Mar 2018 18:40:35 -0600
From: "Brotman, Alexander" <Alexander_Brotman@comcast.com>
To: Jim Fenton <fenton@bluepopcorn.net>, "uta@ietf.org" <uta@ietf.org>
Thread-Topic: [Uta] Genart last call review of draft-ietf-uta-smtp-tlsrpt-17
Thread-Index: AQHTtyy/XxGm8RCZGEuRPY2vGC5O96PHcqQAgAADxgCACCZ3AIAA+u+AgBLAGbA=
Date: Tue, 27 Mar 2018 00:40:35 +0000
Message-ID: <37ca4a6de9d647308225b7cc2b6a43a9@COPDCEX19.cable.comcast.com>
References: <152054808275.11187.13276762980596133506@ietfa.amsl.com> <0423F6BE-6CF5-4DBA-A241-56142268D067@dukhovni.org> <5960ef77-8310-0b05-6c89-46b35023f314@joelhalpern.com> <f5a3f45961fa4f46bf8e8cd269936451@COPDCEX19.cable.comcast.com> <460f8482-841d-c6ba-b7d9-a840f93bfbae@bluepopcorn.net>
In-Reply-To: <460f8482-841d-c6ba-b7d9-a840f93bfbae@bluepopcorn.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [96.114.156.9]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Forward
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrCIsWRmVeSWpSXmKPExsWSUOxpocs6eWeUwbaZMhbfOmcxW5w62szo wOTxdNUrJo8lS34yBTBFcdmkpOZklqUW6dslcGUcn5VR0Ctfsb/lCXMD42zJLkYODgkBE4ml i1y6GLk4hAS2M0k0vVjFDuEcZJRYdGA3E4RziFHi6/YbzBDOSUaJF8cvAzmcHGwCVhJv/7eD 2SICbhLzJj5nB7GFBbwlju09xQIR95G42DaFEWSdiICfxKRnIiBhFgFVidsb+xhBbF4BL4mJ r59AbV7LJDH/xUM2kASngLPE9O3/weYzCohJfD+1hgnEZhYQl7j1ZD6YLSEgILFkz3lmCFtU 4uXjf6wQtoHE1qX7WCBsBYn3/06xQfTqSCzY/QnK1pZYtvA1M8QRghInZz4BqxcS0JLYe2MX 1BxxicNHdrBOYJSchWT1LCSjZiEZNQvJqAWMLKsYeSzN9AwNTfSMLPTMTTcxguKuSMZ7B+O6 n+6HGAU4GJV4eG807owSYk0sK67MBYY0B7OSCC/f/B1RQrwpiZVVqUX58UWlOanFhxilOViU xHlnhgBVC6QnlqRmp6YWpBbBZJk4OKUaGHkCwmX2+lxnn5W9++Ixnfq/jow6dyK3nFyy92Hg 1f0r3vy4JZQ7Q+fW+uxtV6rExH1uNjHu3XStkeGrg2RXJ8uab05OG1YVs/0zO3rNcbHwO8tG dxXGtWF/qkxLC6bqMXqtFLs0NXevJNO+u+8yZm2v9XFz6KrYahL4RVVeKXjXBx62mMPXmpVY ijMSDbWYi4oTAZAr+JG3AgAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/uta/w861lIboCSstKLu8eR9hAy3hu2A>
Subject: Re: [Uta] Genart last call review of draft-ietf-uta-smtp-tlsrpt-17
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Mar 2018 00:40:40 -0000

So, we'd need to create a new Service Type (I see only  * and email currently), correct?  Could we alternately use the "n=" field and require that the note be set to "tlsrpt"?  If we do add this, and the receiving party is unable to find the appropriate s= or n= for the key, should they then discard the report?

--
Alex Brotman
Sr. Engineer, Anti-Abuse
Comcast


-----Original Message-----
From: Uta [mailto:uta-bounces@ietf.org] On Behalf Of Jim Fenton
Sent: Wednesday, March 14, 2018 4:13 PM
To: uta@ietf.org
Subject: Re: [Uta] Genart last call review of draft-ietf-uta-smtp-tlsrpt-17

Requiring that the selector have a particular name or name prefix associates semantics with selector names, of which there is none. It also requires the management (e.g., rotation) of more keys per domain.

There is a better way to do this. The s= tag on the key record (service
type) can be used to distinguish keys that are only supposed to sign normal mail from those that may sign TLS reports (or those that may be used for either). The default is "*", that the key can be used for any service. For domains that are concerned that users may sign spoofed TLSRPT messages, they can specify s=email for keys intended for normal use and s=tlsrpt (I'd propose) for those that may sign TLSRPT messages.
This way TLSRPT only complicates the key management when the is potential for abuse. Then require that it only accept TLSRPT messages when signed with a key permiting the appropriate service

See RFC 6376 section 3.6.1, description of s= tag.

-Jim


On 3/14/18 4:21 AM, Brotman, Alexander wrote:
> I don't see any reason a specific DKIM selector wouldn't be possible.
>
> We'll see if we can get some language added to address the clarifications you've requested.
>
> --
> Alex Brotman
> Sr. Engineer, Anti-Abuse
> Comcast
>
> -----Original Message-----
> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Sent: Thursday, March 08, 2018 6:47 PM
> To: Viktor Dukhovni <ietf-dane@dukhovni.org>
> Cc: gen-art@ietf.org; uta@ietf.org; 
> draft-ietf-uta-smtp-tlsrpt.all@ietf.org; ietf@ietf.org
> Subject: Re: [Uta] Genart last call review of 
> draft-ietf-uta-smtp-tlsrpt-17
>
> A reasonable perspective.  Could that be added to the document?
>
> Yours,
> Joel
>
> On 3/8/18 6:33 PM, Viktor Dukhovni wrote:
>>
>>> On Mar 8, 2018, at 5:28 PM, Joel Halpern <jmh@joelhalpern.com> wrote:
>>>
>>>     It is surprising in Section 3 Bullet 4 that reporting via email requires
>>>     that the report submitted use DKIM.  Particularly while ignoring any
>>>     security errors in communicating with the recipient domain.
>> Actually, this is not surprising.  The main security risk here is 
>> report spam, that will drown the true signal in noise, making it 
>> impossible to notice real validation failures or operate the service.
>>
>> Therefore, the report origin domain must be authenticated via DKIM.  
>> I'd be tempted to go further and require a particular "selector" 
>> prefix that is specifically chosen for "tlsrpt", so that with domains 
>> such as "gmail", where anyone can get an email account, just being a 
>> user on the sending system is not enough to be able to forge a DKIM authenticated report.
>> But that would create significant complications for the sender to 
>> make it so, and so is probably not needed.
>>
>> In summary, when sending reports the party that needs to be 
>> authenticated is the sender domain, while the receiving domain is 
>> presumed operationally compromised, and so should be exempt from any authentication requirements.
>>
> _______________________________________________
> Uta mailing list
> Uta@ietf.org
> https://www.ietf.org/mailman/listinfo/uta


_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta