On 5/29/2014 4:28 PM, J. Gomez wrote:
On Wednesday, May 28, 2014 10:13 PM [GMT+1=CET], Tim Draegen wrote:

I don't believe TPA-Label hits the mark between "solving a big hurt"
and "simple".  IOW, it's too complicated for the amount of pain it
would resolve.  Just my opinion, take care,

I'm of the same opinion as above.

In my own words, I would say the TPA-label draft Otis posted reads like 
perfectly polished Klingon to me.

Id est, overly too complex for very little gain.


Mr. Gomez,

TPA has a wider scope and an overly described functional specification.

But the main idea should not be thrown away due to lack of fundamentally understanding the long time problem and proposed solutions.

In its simplest terms, the idea is to lookup a 3rd party domain for authorization to sign or resign originating author domain mail.

The earliest suggestions like in the 2006 DSAP proposal used an Allowed Signer List (ASL) "asl=" tag in the policy records. So applying this simpler idea to DMARC, an example policy for your domain, seryrich.com, might be

  _dmarc.seryrich.com  TXT ("v=dmarc1; p=reject; asl=ietf.org; ...")

This would expose to the world the policy that says:

      Only domains seryrich.com and ietf.org are
      authorized to sign mail for seryrich.com.
      If you see anything else, reject it.

Simple idea. No extra lookup beyond the DMARC lookup. The problem with ASL is that it works for the shorter list domains. It would not scale for the larger domains, i.e. can't fit Yahoo's 30K potential authorization list. I think its an optimization idea for the majority of domains who are smaller than YAHOO.

This is where Doug's TPA (Third Party Authorization) and Murray's simpler version of TPA called ATPS (Authorized Third Party Signer, RFC6541) comes into play.

TPA and ATPS is basically the same when it comes to the lookup formula, which is to combine the signer domain as a subdomain zone of the author domain. I have implemented ATPS but its basically the same as TPA with a query formula of:

   BASE64(SHA1(signer-domain))+"."+author-domain

So for you, your DMARC and ATPS subdomain records for seryrich.com zone would be:

_dmarc TXT ("v=dmarc1; p=reject; atps=y;")
PQ6XADOZSI47RLUIQ5YOHG2HY3MVJYOO._atps  TXT ("v=atps01; d=ietf.org;")

So the ideas has been worked out. The problem has been to get the IETF List Operators and Administrators to support this.

So why not? Note, we also develop list software, so I have no problem doing what is necessary to get it all to work right.

The main problem is that list operators prefer to use a TRUST model by looking up the signer domain. Not the author domain.

They currently do neither, but they prefer to use the signer domain and this was the DKIM standard suggestion. Use the SIGNER domain. Forget about the author domain. Again, I am just looking for a total mail integrated solution between all parts. So lets go ahead and lookup the signer domain.

What's the problem then?

Well, what happens when any of these simple use cases occur:

  a) The signature does not exist in the message. Its missing.

  b) Signature exist, but it doesn't hash verify. Its broken.

  c) Signature exist and its valid, but its not your signature.
     Its some unknown signer that wants to tell the world its
     signing on your behalf.

So the basic argument against depending on a signer domain only is that may not exist nor be valid. It can be completely fake. Now, Levine's VBR was a step in the right direction with the "combo" author and signer lookup but again, what happens when the signature is missing or invalid so that there is no signer domain to lookup? The trust advocates don't have an answer for these simple first level security issues that are easily detectable as failure.

In summary, this has been examine all ways and the best and original idea was looking up the author domain because its the single identity that MUST exist in the message. It is the most important header of them all, the 5322.From header. This is the reason it is also the only header that MUST be hash bound to the signature. No other header is required to be hashed to the signature.

But the resigners don't want to look it up. They want the freedom to resign mail. The policy advocates wants a more flexible 1st and 3rd party resigner framework, but one with options to lock down the 3rd party signers.

I believe the latter is the more protocol strong solution. Its require more wider support and it will clamp down on the laissez-faire resigners who want to resign and don't wish to even check to see if its valid.

Yes, there is the problem of the legacy users that has long used public, but also highly spam polluted big email brand domain. The Yahoos are not the only one who domains are polluted and they wish to finally take control and increase its security quality value.

The IETF need to stop trying to make policy itself on what parts of the mail market it wishes to support. Its not just about resigners.

Hope the above makes sense.

--
HLS


_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to