Nicely done. Reads like a diligent effort and seems to indeed cover
things nicely. Not that changes won't help -- as the thread already
suggests -- but has a good template and good content.
As for possible changes...
I agree that it needs to be cast primarily as a DKIM value-added
mechanism, where reference to DMARC is limited. Not zero, but not
wholly dependent.
As for 'experiment', again, the template here casts things useful in
that regard. Whether the community will engage with the necessary due
diligence is always an issue.
But as I've noted before, basing delivery decisions on the
authentication information done by intermediaries is new territory and
since it would seem to be an invitation to spoofing, we should treat its
initial use as needing very careful analysis. Errr... experimentation.
To the details...
On 11/22/2017 9:34 PM, Seth Blank wrote:
Since we're aiming for an Experimental document, it was discussed that
it makes sense to define that experiment. I'm proposing the following
section, and suggest it be the final section after Security
Considerations but before References.
For this section, I'm taking the stance "the best way to get the right
answer online is to give the wrong answer online." The one thing I know
is that what I've proposed below is wrong. It's just a matter of how,
why, and to what degree.
I'm also certain I'm missing critical design decisions, and the success
criteria probably needs some hard watermark (like 90% of mail that
fails/was subject to override now passes due to ARC alone).
Anyway, let's attack this straw man to figure out what the right form of
this section should be.
Seth
--------
16 Experimental Considerations
[[ NOTE TO WORKING GROUP: Should this section be for the IESG only to be
removed by the document editor, or should it stay with the document as
long as it’s experimental? ]]
Not sure what is typical. Having this text in the document means it
will require reissuing the document when it transitions from
Experimental to Standards track. Theoretically, a change in status
doesn't require a new RFC. However it's almost always true that the
document benefits from other changes over that sort of time, so there
isn't any negative of having the text in the base document. The
benefit, of course, is that it is more accessible, to more people.
It must be demonstrated that ARC actually solves the problem it is
supposed to - mainly, that ARC provides an effective signal to a Final
Receiver that allows messages indirectly delivered to properly be
rescued after a DMARC failure.
It must be demonstrated that ARC provides utility in recovering
from a validation failure for a DKIM signature by an originator. That
is, can a final receiver perform useful validation of the message
handling, to determine delivery disposition? This is especially
relevant for DMARC processing when the DKIM d= value is aligned with the
rfc5322.From author domain.
Tossing in a distinct statement about DMARC acknowledged the issue that
motivated this work, without putting it into the critical path for ARC. /d
This section defines what success and failure look like, the protocol
design decisions that influence those criteria, and open issues that the
experiment should shine light on.
16.1 Design Decisions
16.1.1 Trace information is valuable
Because it is unclear exactly what information will be meaningful to
Final Receivers to make delivery decisions, it was decided that the
protocol would lean towards providing more information than less.
Simple, useful bit of design background. Nice. /d
16.1.2 Chains can’t be restarted
Originally, it was expected that ARC Chains would be restartable.
However, this turned out to be a deeply complicated and implementation
dependent mechanism, for a use case that wasn’t clear would ever occur.
The ARC-Seal was necessary when restarting a chain to guarantee that the
restarter knew everyone who had been involved in the chain previously.
The ARC-Seal might prove to be unnecessary. It is provided to
provide additional analysis by the final receiver.
The issue of restarting, per se, seems a distraction here. Useful
history, but not really relevant to this section. /d
16.2 Success Criteria
Currently, many receivers have heuristic based overrides in place to
attempt to rescue mail from DMARC failures that they believe have been
delivered indirectly so as not to reject or junk mail their users
legitimately wish to receive.
Currently, some receivers apply heuristics to augment the handling
of DKIM-related validation failures. ARC is intended to permit more
reliable and accurate handling of such cases. So the primary criterion
for ARC success will be demonstrating a good cost/benefit result for
that improvement.
ARC will be a success if, for ARC Sealed messages, receivers show equal
or better delivery rates than achieved through their overrides.
16.3 Failure Criteria
The intent of ARC is to be at most value-add and at worst benign. If ARC
opens up new vectors for abuse - beyond DKIM replay attacks and other
known issues (see:Security Considerations) inherent in the mail
protocols ARC is built upon - then ARC will be a failure.
Having 'failure criteria' is interesting. Hadn't occurred to me but
seems useful for the template and the explicit reference to ARC possibly
making a new attack surface seems appropriate. /d
16.4 Open Questions
Questions To Be Resolved By The Experiment
I agree with Murray's suggestion, which means also dropping the
following paragraph. /d
The following open questions are academic and have no clear answer at
the time of the writing of this document. However, the ARC experiment
should gather the necessary data to conclusively answer some or all of them.
16.4.1 Value of ARC Seal
Because the ARC Seal was initially intended to provide context when
restarting a chain, now that restarting the chain is not something ARC
attempts to do, the value of the ARC Seal appears limited.
I think the above paragraph isn't needed. /d
As part of the ARC experiment, data should be collected to show if the
ARC Seal provides value beyond the ARC Message Signature for either
making delivery decisions or catching malicious actors trying to craft
or replay malicious chains.
Data should be collected to show whether the ARC Seal provides
significant value, beyond that of the ARC Message Signauture or, for
that matter, beyond simple DKIM signing.
taking Murray's point. /d
16.4.2 DNS Overhead
The longer an ARC Chain, the more queries that are needed to retrieve
keys to validate the Chain. It is not believed this will be a security
issue (see Security Considerations:DNS Attacks), but it is unclear how
much overhead will truly be added.
A longer ARC Chain requires more queries for key retrieval. It is
believed this will not be a security issue...
As part of the ARC experiment, data should be collected to better
understand the DNS impact of ARC Chains.
DNS impact of -> DNS-related costs of creating an evaluating
16.4.3 What trace information is valuable
There are several edge cases where the information in the AAR can make
the difference between message delivery or rejection. For example, if
there is a well known mailing list that ARC Seals but doesn’t do its own
initial DMARC checks, a Final Receiver with this knowledge could make a
delivery decision based upon the authentication information it sees in
AAR[1].
Certain trace information in the AAR is useful in the construction of
DMARC reports.
Furthermore, certain large receivers believe the entire set of trace
information would be valuable to feed into machine learning system to
shine light on fraud or determine other signals related to message delivery.
Given the proprietary nature of such value-added processing, it is
likely that the only public reporting on this aspect of the experiment
will be some form of yes/no assertion by these receivers.
However, it is unclear what trace information will be consistently
valuable for all receivers, regardless of size.
As part of the ARC experiment, data should be collected on what trace
information receivers are using that provide signal that affects
deliverability, and what portions of the trace data are left untouched
or provide no useful information.
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc