My two cents.

1) What has changed since 2012 is DMARC, including the ability through DMARC to 
obtain feedback.  "New ATPS" would have to be implemented as a DMARC option, 
not a new thing.

2) A lot of organizations seem to be stick at p=none.   Maybe that means they 
want it that way.   Maybe it means that they are being courteous to mailing 
lists.   But maybe it means something about DMARC is too hard.   I am assuming 
that all of the problems with DMARC are related to third-party authorization, 
and something needs to be done to make it easier.

3) Delegation with an ATPS-type email entry seems functionally equivalent to 
DKIM scope delegation, with several benefits:
Easier and cheaper for the third-party to implement.   The third-party only 
needs to apply its own domain's signature.   Simpler means quicker 
implementation.  Private keys are never exchanged.

Third-party is only responsible for its own key.    A big organization like 
Constant Contact or SendGrid could end up holding hundreds of thousands of DKIM 
keys, and that becomes an attractive target for attackers.  If a delegated DKIM 
key store is stolen from a third party, the attacker knows every domain that 
has been compromised.   If an ATPS-delegated third party has a corporate DKIM 
key stolen, the attacker knows that he has struck pay-dirt, but he does not 
have an immediate enumeration of compromised organizations..   That enumeration 
will require an additional data collection process, which might buy time for 
the affected organizations to take evasive measures.

An ATPS-type scope delegation could be designated for a specific user, which I 
assume will represents an application. ("SMTP address must be 
applicationname@vendordomain").   This information is something that the 
receiving system can enforce and report.   It is a weak enforcement tool, but 
limiting scope of delegation seems likely to satisfy some of the auditor 
concerns associated with any third-party delegation.  This is also a new ideas 
relative to the original ATPS.   Of course, a domain level delegation should 
also be an option for situations that the authorizing domain deems appropriate. 
 ("SMTP address must be *@vendordomain")

ATPS-type delegations could be given a pre-defined expire date (if specified 
with that feature).  This would be particularly appropriate where a third-party 
authorization is linked to a time-limited contract.   When the contract lapses, 
the authorization lapses, unless both the contract and the DNS entry are 
renewed.   This limits risk associated with the possibility of 
delegated-but-forgotten authorizations.   DKIM delegations are always 
good-til-cancelled (by removing the DNS public key).

Both DKIM and ATPS can be revoked easily, subject only to the limits of DNS 
propagation.

DKIM delegation becomes impossible if the third-party is not cooperative.   
ATPS-type delegation can be done unilaterally by the owning domain.    I am 
thinking of Proofpoint in particular.   They violate my DMARC policy when my 
users, who are non-clients, respond to a secure message from one of their 
clients.   Author self-copies arrive at my gateway looking like spoof, but I 
can fix this with local policy.   When my user uses reply-all to a message with 
many recipients, those other domains will see my p=reject, which may mean that 
messages are not delivered and my user does not know that it happened.   Maybe 
all those other domains will have a Proofpoint exception as well, impossible to 
say.   Maybe Proofpoint will begin header munging, but they have not done so 
yet.
So the big benefit for DKIM is the i= clause, but I think the sender-limiting 
potential with ATPS is superior to the impersonation-limiting capability of 
DKIM.   Besides, it seems generally agreed that i= has very limited use.   On 
all other risk-management concerns, an ATPS -type signature seems preferable.

Implementation obstacles and notes:

When a domain implements an ATPS signature, it must set the corresponding DMARC 
policy to p=none.  Otherwise, sites that are DMARC-aware but ATPS-blind will 
block ATPS-authoized transactions.   Consequently, this option will only 
interest organizations that are currently at p=none or that have no DMARC 
policy.

If a new feature such as ATPS is implemented, senders have a problem knowing 
whether their recipients understand it or not.   This dilemma would be helped 
if recipients published a DNS token to indicate that they understand the new 
feature.   Some will consider this inappropriate information disclosure, 
although I am currently having a hard time seeing the risk in the release of 
that information.    By and large, senders will want confidence that the new 
feature is widely deployed before they will begin depending on it for outbound 
delivery.    In the absence of recipient reporting, change may never happen.

Doug Foster

----------------------------------------
From: "Murray S. Kucherawy" <[email protected]>
Sent: 8/19/20 2:38 PM
To: "Kurt Andersen (b)" <[email protected]>
Cc: "[email protected]" <[email protected]>, Alessandro Vesely <[email protected]>
Subject: Re: [dmarc-ietf] third party authorization, not, was non-mailing list
On Wed, Aug 19, 2020 at 10:11 AM Kurt Andersen (b) <[email protected]> wrote:
On Wed, Aug 19, 2020 at 1:34 AM Alessandro Vesely <[email protected]> wrote:
On Tue 18/Aug/2020 01:21:33 +0200 Murray S. Kucherawy wrote:
> The industry in general, and the IETF in particular, have chosen not
> to pursue widespread use of any kind of standards-based third party
> domain signature policy or reputation system. . .

> Both ATPS (individual submission, experimental, February 2012) and the
> REPUTE series of documents (working group, standards track, late 2013)
> saw nearly zero adoption after publication even when free reference
> implementations were provided.  They differ from basic DKIM in that
> they require non-trivial upkeep, and that appears to be a step
> function inhibiting adoption among operators.

We can still try again.  In particular, the non-trivial upkeep seems
to be a valid diagnosis.

Is there anything which has materially changed between 2012-13 and 2020 which 
would indicate that the anticipated results for such effort would be any 
different?

+1.  If anyone has some kind of creativity in this space that they've been 
hiding, now's the time.

-MSK


_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to