Now that the documents are complete, some feedback:

DMARC is designed to protect domain owners and their brands from
impersonation.   It does not attempt to solve the Recipient's problem,
which is to detect and block all impersonation.    RFC 7960 documents some
of the problems that have occurred because this difference has not been
well understood.

When authentication results are matched to an omniscient viewpoint, we
observe four possible outcomes:

   1. Correct authorship and Verified result
   2. Correct authorship with Unverified result
   3. Fraudulent authorship with Unverified result
   4. Fraudulent authorship with Verified result

DMARC detects the first case.  The fourth case is rare and will be ignored
for the purposes of this document.   The middle two cases represent the
core weakness of DMARC, because DMARC cannot distinguish between these two
outcomes.

While addressing the ambiguity caused by unverifiable authorship, it is
useful to segment the mail stream into these groups:

   1. Messages where the Mail From domain and the From domain are aligned.
   This represents the vast majority of all incoming mail [In my mail stream,
   about 90%]
   2. Messages where the Mail From domain and the From domain are not
   aligned. [The other 10%]

Messages with Aligned Domains

When the two domains are aligned, both addresses are verified at the same
time, whether the verification method is SPF Pass on the Mail From domain,
or aligned DKIM Pass on the message From domain.   Because the vast
majority of senders implement SPF, the volume of unauthenticated messages
is surprisingly low.   If these messages are routed to quarantine, the
authentication problems can be quickly resolved:

   - If the authorship is judged to be correct and the mail stream
   represented by this message is judged to be acceptable, then future
   messages can be given alternate authentication using an SPF-like rule,
   based on verified host name or IP address, plus the Mail From domain.
   - If the authorship is judged to be correct but the mailstream
   represented by this message is judged to be unacceptable, the author or his
   domain is given a block rule.
   - If the authorship is judged to be fraudulent, the identifiers which
   are responsible for the fraud must be inferred, so that those identifiers
   can be given a block rule.
   - If the message source is determined to be a forwarder that does not
   rewrite Mail From addresses, the forwarder is handled similarly to
   auto-forwarders who do rewrite Mail From.

Messages with Unaligned Domains

A message containing unaligned domains is an implicit assertion that the
Mail From domain is authorized to act as agent for other domains, of which
the current message's From address is only an example.  Therefore, the
evaluator needs to focus on the question of whether the agent is acceptable
or unacceptable, before considering the disposition of any specific
message.  These types of agency are known to occur in a typical mail stream:

   - Email Service Providers (ESPs) send messages on behalf of clients.
   - Software-As-A-Service (SaaS) providers are a special category of Email
   Service Provider, where many clients share one application platform, and
   the platform sends email on behalf of its clients.
   - Mailing Lists
   - Automatic Forwarders

The reputation and operating practices of the agent become very important
for disposition of its messages.   Consider the expected characteristics of
each type of agent:

   - ESPs and SaaS providers can generally be trusted to present correct
   From addresses, because their operating practices require a transaction to
   be authenticated before any email is sent as a result of that transaction.
     This operating practice is necessary for correct billing and to sustain
   the trust of their clients.   DKIM signing practices will vary widely among
   agents; some ESPs will only accept clients who provide a DKIM signing
   scope, others will use a DKIM scope if provided, and some will never
   request or apply a client signature.

   - Mailing Lists typically restrict posting to authorized accounts, so
   the risk of impersonation is low, even if the list does not perform full
   authentication of each posting message.    An impersonator would need to
   know the identity of an account that is allowed to post, and perceive the
   list subscribers as desirable targets.   List feedback is likely to limit
   the ability to launch more than one attack, further limiting the
   attractiveness of the list as an impersonation target.

   - Automatic Forwarders have the least basis for trust.   An evaluator
   can assume that the forwarder makes some attempt to filter out unwanted
   messages, which will include some impersonated messages.  The actual risk
   will depend on the filtering skills of the forwarding organization, which
   may vary widely.

Regardless of the operating practices of the agent, the evaluator's options
are limited.

   - He can block all messages from the agent, after determining that both
   past and potential future messages are expected to be unwanted.
   - He can accept all messages from the agent, with or without verified
   authorship, then rely on content filtering to catch unwanted messages.
   - He can quarantine any message from the agent which fails
   authentication, knowing that this strategy is likely to impose an excessive
   workload onto the quarantine review process.
   - He can attempt to parse the email header chain to assess whether the
   message was verifiably authentic when it was presented to the agent.   This
   may be feasible in specific cases, particularly when the agent applies an
   ARC Set or other headers to document the prior state of the message.
   Unfortunately, this technique is expected to be infeasible in the general
   case.

Finally, we need to consider whether attackers are likely to use a
configuration where the domains are unaligned.

   - If the attacker has full control of the server, he has no incentive to
   identify himself accurately in the Mail From address while fraudulently
   impersonating the message From address.    Operational experience has
   confirmed that these attacks use a single impersonated domain for both
   addresses.

   - If the attacker is using an email hosting service which requires him
   to be identified correctly in either address, he will typically have
   difficulty using a fraudulent From address as well.   Experience has shown
   that these attacks use fraudulent content and fraudulent Friendly Name,
   rather than fraudulent From addresses.

Collectively, this analysis indicates that evaluators should concentrate
their efforts on messages which cannot validate the Mail From domain.
Doing so will maximize filtering of fraudulent identities, minimize
quarantine review effort, and minimize harm to mailing lists and ESPs.

Doug Foster
_______________________________________________
dmarc mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to