On 10/28/2012 06:02, Benny Pedersen wrote:
John Levine skrev den 28-10-2012 04:31:

Consider how hard it is to make up some fake letterhead in your
favorite word processor, print out a fake letter, put it in an
envelope with a fake return address, put a real stamp on it, and put
it in a mailbox.

and ask the postman to get paid on delivery from the recipient ?

If you insist on extending this metaphor, assume that John's hypothetical imposter printed up an equally convincing response card or form and return envelope, with postage attached, and included it with the letter. If the recipient fills it out and returns it, that would be the equivalent of clicking on the link included in a phishing message...


Getting back to the larger points -- no, DMARC is not a magic bullet, but I think it does offer a significant improvement over the current situation. You can see benefit for the organizations being spoofed and having to deal with their customers being exploited. You can see benefit for the organizations providing mailboxes to consumers, who lose them when too much crap reaches the inbox. Hopefully you can even see benefit to the end-user, when the most dangerous phishing messages should fail to reach them (e.g. Using a domain they already trust successfully, etc).

I'm puzzled when people suggest redesigning email - which sounds great in theory - because you still come back to the fundamental problem of identity assertions at scale, that can be trusted without prior arrangement. P2P web-of-trust hasn't worked very well at scale, a la PGP. Certificate authorities haven't been too bad, perhaps because there were easier attack vectors, but we've still seen more than a dozen have to revoke batches of their CA certificates because of "CA Compromise" (cf. Burns and Eckersley). But hey, perhaps those closer to the subject feel this is a solved problem. Or perhaps they hope that the recent disclosure of 3.6MM Social Security Numbers in South Carolina (link <http://www.theverge.com/2012/10/26/3560140/south-carolina-cyber-attack-3-6-million-social-security-numbers>) will finally spur the US government into action...

Anything you do with crypto is not best left ignored in a corner for 5+ years. As Mr. Harris got a lot of ink for pointing out indirectly: you have to execute well, revisit your assumptions and review the situation periodically. Sloppiness and crypto do not mix very well...

But while people usually "get" the importance of TLS and include annual reviews of certificates and key strengths at many organizations, I don't think DKIM ever got the same kind of awareness and thus didn't receive the same kind of attention. And despite the fact that old keys, weak keys, and testing flags had been mentioned periodically for literally years, they persisted. So if it took a few slick photos of Mr. Harris and 15 minutes of fame courtesy Conde Nast, I'm all for it if it means large organizations will take email authentication more seriously going forward.

--Steve.

_______________________________________________
dmarc-discuss mailing list
[email protected]
http://www.dmarc.org/mailman/listinfo/dmarc-discuss

NOTE: Participating in this list means you agree to the DMARC Note Well terms 
(http://www.dmarc.org/note_well.html)

Reply via email to