On Fri, Jul 27, 2018 at 08:24 Murray S. Kucherawy <superu...@gmail.com>
wrote:

>  covering the ARC header fields in the failing chain, all the data in the
>> failed chain can be modified as it is not covered under the latest
>> signature.
>>
>
> I think it's weird that the body of content that gets hashed by the sealer
> in this case varies from what would normally happen.  A verifier might have
> to try two different verification algorithms if, for example, it doesn't
> determine that the chain is structurally invalid.
>
> If I receive a chain that was apparently valid at the last sealer and
> determine that it is no longer so, could we simply decline to re-seal it at
> all?
>
> -MSK
>
The verification algorithm is straightforward. If you receive a chain that
ends with cv=fail stop your evaluation, you’re done. There’s no separate
validation path here.

Additionally, I worry about the security implications of passing along a
known bad chain without terminating it. Right now, worst case, one
intermediary needs to evaluate and terminate a maliciously formed chain. If
it’s simply not Sealed, then everyone in the path must perform the
evaluation. I don’t know what new vectors this opens up, but I could
foresee some cascading issues.
_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to