On Oct 20, 2006, at 7:51 AM, Stephen Farrell wrote:
,----
|6.3.  Practice and Expectation Requirements
|
|7. The Protocol MUST NOT invent a different means of allowing
|   affiliated parties to sign on a domain's behalf.  Because
|   DKIM uses DNS to store selectors, there is always the
|   ability for a domain holder to delegate all or parts of the
|   _domainkey subdomain to an affiliated party of the domain
|   holder's choosing.  That is, the domain holder may be able to
|   set a NS record for _domainkey.example.com to, say, an email
|   provider who manages that namespace.  There is also the
|   ability for the domain holder to partition its namespace into
|   subdomains to further constrain how third parties.  For
|   example, a domain holder could delegate only
|   _domainkey.benefits.example.com to a third party to constrain
|   the third party to only be able to produce valid signatures in
|   the benefits.example.com subdomain.  Last, a domain holder can
|   even use CNAME's to delegate individual leaf nodes.
'____

When was this consensus reached? This is in conflict with several participants and should be removed.

Serious problems can not be resolved with this imposed limitation.

Policy based domain designation:

  - Ensures the domain responsible for signing the message remains
    apparent and receives the desired feedback.

  - Retains information that better affords protection for both the
    transmitting entity and the affiliated email-address domain owner.

  - Clarifies who maintains logs associated with the signing process
    and eliminates the exchange of keys.

  - Permits the email-address domain owner the discretion to indicate
    which signing domains offer assured valid email-addresses.

  - Does not necessitate any preceding administration and the prior
    exchange of account specific details published by a second party
    in DNS.  (Lowers the TCO.)

  - Incurs the same overhead as a CNAME by a different DNS.

  - Does not reduce the integrity of DKIM signing as will
    CNAME or DNS delegation.

  - Never requires of use of your private keys by third-parties.


Some envision accountability being placed onto the email-address domain owner is ideal, but an IP address assessment occurs early within the SMTP session where there may not be an opportunity to even assess DKIM signatures.

An inability to differentiate abusive replay means the IP address must be retained to assess reputations. However, associating signing domains with SMTP clients may allow abusive replay to be differentiated. This could exclude abuse caused by competitors or vandals, for example. Assessing the signing domain remains perilous without associating the signing domain with the SMTP client. This association is greatly simplified by a designation strategy.

Some have suggested the use of SPF as an association method. SPF incurs a high overhead and does not offers an extremely dangerous means for making these associations. SPF EHLO validation invokes the same scripts used for MAILFROM or the PRA. Ten or eleven SPF records can be chained, where each set may contain 10 mechanisms, each mechanism may then invoke up to 10 additional DNS transactions (10 x 10 = 100). Each name resolved using SPF may target a victim not seen anywhere within the message with 100 DNS transactions. When DKIM is validated using SPF, this means each message may invoke three or more separate evaluations, multiplied by the number of recipients, and multiplied by the delivery stages where SPF evaluation occurs. The gain of this attack can be extremely high > 70:1 even when only one name is evaluated at one instance in the message's path. When 3 names are evaluated at 2 instances for 5 recipients, the amplification can be > 2000:1. No ACLs or the implementation of BCP 38 provides any protection.

For an overview of the SPF threat see:
http://www.ietf.org/internet-drafts/draft-otis-spf-dos-exploit-01.txt

For an illustration of how policy can effectively designate different domains see:
http://www.ietf.org/internet-drafts/draft-otis-dkim-dosp-02.txt

-Doug

P.S.

When "[EMAIL PROTECTED]" is signed by "benefits.example.com", semantics to indicate the email-address is assured valid are lost. In addition, "[EMAIL PROTECTED]" is not recognized by the base draft as an affiliated email-address of the "benefits.example.com" signature (not a first-party signature). Signing messages instead as "[EMAIL PROTECTED]" is a practice that increases successful spoofing. Retaining the same email-address then exposes recipients to intra-domain spoofing where the ability to selectively indicate which email-address is assured valid is lost. Child signing also creates other vulnerabilities.


_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to