On May 29, 2007, at 8:36 PM, Scott Kitterman wrote:
On Tuesday 29 May 2007 17:53, Douglas Otis wrote:

SPF does not scale well and creates a significant DDoS concern.

FWIW, the SPF project did a serious analysis of Doug's concerns and found that Doug's concerns are overblown with the processing limits in RFC 4408. SPF does not present any unique DDoS concerns. I realize this is OT for a DKIM list, but I'm getting tired of it. I've sat back and said nothing about this nonsense for some time, but the DDoS concern is one that only Doug seems to have. SPF has a number of arguments against it, but this isn't one of them.

http://www.openspf.org/draft-otis-spf-dos-exploit_Analysis

Analysis by the SPF project is not surprisingly biased. It ignores several important aspects. Problems related to NS record transactions are orthogonal to SPF, and can be addressed solely by affected DNS servers. SPF is not within the realm controlled by DNS protocol, except by having DNS drop SPF records entirely. It might come to that.

For example, their analysis ignores the impact of the SPF local-part macro capability. How this mechanism might be utilized is demonstrated in the spf-dos exploit draft. This "feature" provides a resource-free means for staging a DDoS attack in conjunction with _any_ typical spam run. Many spam runs employ millions of SMTP clients. Amplifications noted in the spf-dos exploit draft are generous to SPF, as these figures should not include spam traffic. When spam traffic is discounted as a given, the resulting amplifications better clarify benefits bad-actors obtain exploiting SPF. Consumption of an attacker's resources are eliminated! The same SPF cached record is able to induce an _infinite_ number of transactions against _any_ innocent domain, making such attacks directed anywhere virtually free. No one is safe. Perhaps the spf- dos draft needs to be updated.

The name-path draft was to illustrate that safe alternatives can be devised. The name-path draft was not intended as a marketing ploy or self promotion, as their analysis suggests. Am I making myself popular discussing this issue?

Statements that SPF only increases the number of existing transactions by 10 is wrong. Libraries in accord with RFC4408 exceed 100 new and directed transactions. A vast number of poorly written libraries will not impose _any_ subsequent address resolution limits, a detail their analysis also ignores. 40+ pages in the spf-dos exploit draft represents a redacted trace of just _one_ call to an RFC 4408 compliant library resolving _one_ email-address. The trace clearly illustrates a much greater number of transactions are generated. Adding limits for the number of "no domain" responses would only make SPF more unreliable when so many records might legitimately be involved. Early termination of the SPF script process defeats congestion avoidance, making SPF a serious threat indeed. Even with tighter limits, an SPF DDoS attack remains free. Many spam runs are more than wide enough to cause considerable damage, even when fewer transactions are permitted. Preventing or filtering the attack will be impossible.

Doug, this really isn't the forum to be discussing the merits of SPF. It attempts to solve a different problem than DKIM and that's probably enough for this list.

Jim Fenton himself suggested SPF could be used in conjunction with DKIM to resolve possible replay problems. Corporate marketing is busy promoting Sender-ID. Whether it is DKIM or Sender-ID, SPF works like a script which must be "run" to obtain an answer. As such, each additional domain MUST invoke a full set of SPF related transactions which only adds to the loathsome DDoS gains possible.

The DKIM WG is free to ignore likely problems caused by replay abuse caused by reputations based upon DKIM domains. Problems likely to disrupt several valid email use scenarios. Even per-user key with a TTL of zero is unlikely to dissuade abusive replays. Abusive replays, even for a few hours, greatly exceeds volumes otherwise permitted by constraints normally in place. And what level of DNS instability is acceptable?

Ending with a happy and on topic note, an authorization By-Name scheme, used in conjunction with DKIM, can also allow MAIL FROM addresses to be authorized. This would provide a safe means to curtail a DKIM bounce with a "broken" signature exploit. A message with an authorized MAIL FROM might even be more likely accepted on that basis alone, as it would not add to the backscatter problem when it gets bounced. Much like Google increases the ranks of web pages referenced elsewhere, an authorization By-Name scheme provides a new type of reputation based upon those trusting the domain to handle their email.

-Doug




_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to