Zach,
I feel that you're reading far too much into this. The DMARC
specification specifies a mechanism for interoperability - and that
between systems operated by experts - it absolutely is _*not*_ a recipe
book for beginners.
DMARC is, roughly, attempt #4 at a standardised mechanism[1] for
_*helping*_ willing (and competent) Domain Owners and Receivers to
co-operate on making spoofing _*harder*_ without dependence upon prior
agreements, whether direct or intermediated. No-one (well, no
participant) is representing DMARC as infallible nor, even when it
works, that it makes spoofing impossible. What it does do is materially
improve what can be achieved.
There is a lot to get right for all participants, results will vary with
competence. In the particular examples that you mentioned, of course
receivers should check that they're not determining authentication on
the basis of weak DNS results, test keys, short keys, ridiculously broad
SPF assertions, ... but also, they should be forming and maintaining an
opinion about every Domain Owner whose mail streams they're assessing,
both of their competence (How good a match is there between their
apparent mail-stream and what their authentication information says?
What's the user complaint rate? Do they have a years-long history of
getting all of the SPF/DKIM details right?) and their importance
(presumably a receiver isn't going to show a gold key for a single-user
mail-server which sends a total of a dozen messages a day, no matter how
good their configuration and history is). There are 100 other things
that a receiver has to get right, it appears to me that you're straining
at gnats having already swallowed quite a number of camels.
The mistaken assumptions that you mention ("p=reject is the objective!")
are exactly the same as those made about previous attempts; there is
nothing that can be done to stop people from making this assumption but
it doesn't really matter: competent receivers will form their own
opinion about whether a given Domain Owner's assertions can be trusted
(and incompetent receivers will mess up in 100 other ways anyway).
Your pleas to receivers to not make assertions about authentication are
interesting, but I'd suggest that that ship has long since sailed:
service and technology providers are generally in a far, far better
position to make these assessments than typical users are, even once you
factor in the occasions when they get it wrong. You might equally plead
with browser vendors to drop the visual cues provided for a site that's
correctly using Extended Validation Certificates.
I'd suggest that the appropriate avenue for your concerns is to
co-operate on a best-practices documentation effort and ensure that your
concerns are addressed in that forum. Over time, these documents are
likely to converge.
- Roland
1: The preceding 3 were SPF -all, DomainKeys o=- and ADSP discardable
On 10/29/2012 11:38 PM, Zachary Harris wrote:
On 10/29/2012 10:48 AM, Tim Draegen wrote:
Receivers should consider the strength of the underlying key before
attaching a "Trust Indicator".
Indeed, /when trust indicators are being used/, it would seem
appropriate to insert a SHOULD or MUST on top of RFC6376's basic
statement that "Verifier policies may use the length of the signing
key as one metric for determining whether a signature is acceptable."
But that's not the point I wished to make in the "false positives"
thread. What about DNS cache poisoning (don't forget that SPF and DKIM
are ultimately relying on a UDP link in the chain!), what about replay
attacks, what about compromised systems, what about a whole list of
things in RFC4686 (thanks for pointing me to the reference, Franck;
and thanks Jim for the hard work) which are too numerous for me
personally to have even taken the time to read through all of them?
The point is this: people could be using 8192-bit RSA private keys
("in theory", you know what I mean), and still, I would request
vendors: please don't make statements on my mom's email account that
such and such message *_IS_* from a trusted sender, because you'll
make my reminders to her about "personal responsibility on the
internet" that much more difficult!
-Zach
_______________________________________________
dmarc-discuss mailing list
[email protected]
http://www.dmarc.org/mailman/listinfo/dmarc-discuss
NOTE: Participating in this list means you agree to the DMARC Note Well terms
(http://www.dmarc.org/note_well.html)
--
Roland Turner | Director, Labs
TrustSphere Pte Ltd | 3 Phillip Street #13-03, Singapore 048693
Mobile: +65 96700022 | Skype: roland.turner
[email protected] | http://www.trustsphere.com/
_______________________________________________
dmarc-discuss mailing list
[email protected]
http://www.dmarc.org/mailman/listinfo/dmarc-discuss
NOTE: Participating in this list means you agree to the DMARC Note Well terms
(http://www.dmarc.org/note_well.html)