Re: [dmarc-ietf] Two basic Issues to address to help complete DMARCbis

2023-04-23 Thread Hector Santos


> On Apr 23, 2023, at 4:17 PM, Dotzero  wrote:
> 
> On Sun, Apr 23, 2023 at 1:20 PM Hector Santos 
> mailto:40isdg@dmarc.ietf.org>> wrote:
>> 
>> With each year, that "temporary hack" becomes the new normal and it 
>> will be harder to clean up. It is not the right way and I don't  its 
>> too late to reverse.  However, it has been 17 years and DMARCbis is 
>> not finished without some clean up in this area.
> 
> It HAS NOT been 17 years for either DMARC (first published in 2011  and first 
> submitted to IETF as informational in 2015) or DMARCbis. Let's at least use 
> publicly available data points for time frames rather than time frames pulled 
> out of thin air.

Wow.  I’ll apologize for the confusion. Allow me to paraphrase it:

“However, it has been 17 years since the evolution of SSP, DSAP, ADSP, ATPS and 
now DMARCbis and unfortunately it is not finished without some clean up in this 
area.”

A little better, I hope.

I see all of the as a DKIM Policy Model and DMARC just happens to be current 
rendition of the concept.  I have worked with all of them and before that, we 
did a real security analysis and requirements work.  Not sure if you 
participated in this early DKIM wg work.

>> 
>> I can understand why DMARCbis's editor does not want to document  
>> rewrite, but imto, can't be ignored anymore.   The details of a 
>> rewrite can be quickly outlined.  To help the RFC process, maybe 
>> DMARCbis could refer to the Functional Specifications of SSP (RFC5016) 
>> Section 5.3, Item 10 which basically reinforces the idea that local 
>> policy ALWAYS prevails and it is quite possible there will be 
>> undesirable tearing down of secured submissions.  One possible 
>> mitigation is to replaced it with a secured rewriter with a p=reject 
>> policy.
> 
> SSP is long gone and failed. Referencing something which failed to gain 
> support many years ago is also not a path to go down. 


I referenced the Functional Specification for SSP (RFC5016), not the SSP itself 
which was still only in draft form.  
https://datatracker.ietf.org/doc/html/draft-allman-dkim-ssp-02

The development and point of RFC4866 and RFC5016 was to help Eric and Jim 
create SSP and thats when Levine’s ADSP stepped in.  From a software 
engineering standpoint, the documents provided the security analysis and 
requirements to make a "SSP” protocol.  It does not change the original 
analysis or requirements. 

Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)
https://datatracker.ietf.org/doc/html/rfc4686

Requirements for a DomainKeys Identified Mail (DKIM) Signing Practices Protocol
https://datatracker.ietf.org/doc/html/rfc5016

Please review these, especially Section 5.3 of RFC5016.  I was sort of helping 
DMARCbis.  It can refer that provision to maybe justify the rewrite.  After 
all, it was a game changer in all this when it was added.

—
HLS

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Two basic Issues to address to help complete DMARCbis

2023-04-23 Thread Dotzero
On Sun, Apr 23, 2023 at 1:20 PM Hector Santos  wrote:

> On 4/23/2023 6:10 AM, Alessandro Vesely wrote:
> >
> > Meanwhile, digressions about ATPS and similar schemes can help
> > casting some light on future evolution.  From: rewriting cannot be
> > the final solution; it is a temporary hack.  Digressions don't slow
> > down the publication, as discussions about actual text quickly
> > prevail.  They are just a mean to help convergence toward a common
> > vision of the future.
>
> With each year, that "temporary hack" becomes the new normal and it
> will be harder to clean up. It is not the right way and I don't  its
> too late to reverse.  However, it has been 17 years and DMARCbis is
> not finished without some clean up in this area.
>

It HAS NOT been 17 years for either DMARC (first published in 2011  and
first submitted to IETF as informational in 2015) or DMARCbis. Let's at
least use publicly available data points for time frames rather than time
frames pulled out of thin air.

>
> First, Section 4.4.3 should have text on using extended tag methods to
> provide 3rd party authorization methods.  Just add the RFC 6541
> abstract or version of it:
>

No! Supporting and referencing an experimental specification which has
never gotten significant traction is the wrong way to go. If you believe
that ATPS is the right path then YOU should work to attract a wider range
of participants to use ATPS and then provide data back to IETF, whether
through an ATPS working group or a DKIM working group that is chartered to
undertake that work.

>
>  ATPS [RFC6541] is an experimental specification proposed which
> adds a extended tag "atps=" allowing
>  advertisement of third-party signature authorizations that are to
> be interpreted as equivalent to a signature
>  added by the administrative domain of the message's author. ATPS
> was designed for ADSP.  There is interest to
>  apply this tag to DMARC to help deal with unchecked but
> authorized resigners false positives.
>

You don't even need a working group at this point to validate that ATPS
works and that it can scale in a workable manner. It has not been shown
that ATPS scales with regard to adds and deletes of individual tags. As you
quite rightly point out, ATPS was designed for ADSP, not DMARC. I have no
problem if you and others wish to experiment but you should do your
experiment first and then seek agreement from the wider community before it
gets embedded in another specification. Why should ATPS be granted special
consideration vs other proposals out there? It shouldn't.

>
> Second, there are possible outcomes with members using restrictive
> domains:
>
> 1) Legacy MLS/MLM, unaware of protocol, unchanged author domain,
> submission mail integrity is broken due to long time practice of body
> and subject changes, can cause members of a list to be
> auto-unsubscribed when their receivers begin to honor p=reject and
> reject mail integrity DKIM failures.
>
> 2) Protocol Awareness, honoring the policy, constraining subscription
> and submissions to unsecured submissions.  Restrictive domains not
> acceptable for list submissions.  Note: It is possible to allow a
> Read-Only List Member concept.
>
> 3) Protocol Awareness, not honoring policy and tearing down the author
> security, replacing with unsecured distribution.
>
> The correct way for any protocol is to close security  loopholes. In
> this case, recommend #2 using Subscription and Submission controls.
> Let the author domain figure it out.  DMARCbis MUST recognize if the
> intent of the domain is to clean up their brand, by implementing hard
> failure rejects at both SPF and DMARC, then it should recommend
> handlers SHOULD honor the policy of the domain or be prepared for the
> possible false positives.
>
> I can understand why DMARCbis's editor does not want to document
> rewrite, but imto, can't be ignored anymore.   The details of a
> rewrite can be quickly outlined.  To help the RFC process, maybe
> DMARCbis could refer to the Functional Specifications of SSP (RFC5016)
> Section 5.3, Item 10 which basically reinforces the idea that local
> policy ALWAYS prevails and it is quite possible there will be
> undesirable tearing down of secured submissions.  One possible
> mitigation is to replaced it with a secured rewriter with a p=reject
> policy.
>

SSP is long gone and failed. Referencing something which failed to gain
support many years ago is also not a path to go down.


> I don't think the above will take long to do and I believe will help
> resolve the conflict.
>

It doesn't resolve the conflict. As I stated above, if you believe in ATPS
then you need to attract a wider range of participants for your experiment,
including sending domains, receiving domains and intermediaries (and not
just mailing lists). Repeating "this solves the problem" is not data.

Michael Hammer
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailma

[dmarc-ietf] Two basic Issues to address to help complete DMARCbis

2023-04-23 Thread Hector Santos

On 4/23/2023 6:10 AM, Alessandro Vesely wrote:


Meanwhile, digressions about ATPS and similar schemes can help 
casting some light on future evolution.  From: rewriting cannot be 
the final solution; it is a temporary hack.  Digressions don't slow 
down the publication, as discussions about actual text quickly 
prevail.  They are just a mean to help convergence toward a common 
vision of the future.


With each year, that "temporary hack" becomes the new normal and it 
will be harder to clean up. It is not the right way and I don't  its 
too late to reverse.  However, it has been 17 years and DMARCbis is 
not finished without some clean up in this area.


First, Section 4.4.3 should have text on using extended tag methods to 
provide 3rd party authorization methods.  Just add the RFC 6541 
abstract or version of it:


ATPS [RFC6541] is an experimental specification proposed which 
adds a extended tag "atps=" allowing
advertisement of third-party signature authorizations that are to 
be interpreted as equivalent to a signature
added by the administrative domain of the message's author. ATPS 
was designed for ADSP.  There is interest to
apply this tag to DMARC to help deal with unchecked but 
authorized resigners false positives.


Second, there are possible outcomes with members using restrictive 
domains:


1) Legacy MLS/MLM, unaware of protocol, unchanged author domain, 
submission mail integrity is broken due to long time practice of body 
and subject changes, can cause members of a list to be 
auto-unsubscribed when their receivers begin to honor p=reject and 
reject mail integrity DKIM failures.


2) Protocol Awareness, honoring the policy, constraining subscription 
and submissions to unsecured submissions.  Restrictive domains not 
acceptable for list submissions.  Note: It is possible to allow a 
Read-Only List Member concept.


3) Protocol Awareness, not honoring policy and tearing down the author 
security, replacing with unsecured distribution.


The correct way for any protocol is to close security  loopholes. In 
this case, recommend #2 using Subscription and Submission controls.  
Let the author domain figure it out.  DMARCbis MUST recognize if the 
intent of the domain is to clean up their brand, by implementing hard 
failure rejects at both SPF and DMARC, then it should recommend 
handlers SHOULD honor the policy of the domain or be prepared for the 
possible false positives.


I can understand why DMARCbis's editor does not want to document 
rewrite, but imto, can't be ignored anymore.   The details of a 
rewrite can be quickly outlined.  To help the RFC process, maybe 
DMARCbis could refer to the Functional Specifications of SSP (RFC5016) 
Section 5.3, Item 10 which basically reinforces the idea that local 
policy ALWAYS prevails and it is quite possible there will be 
undesirable tearing down of secured submissions.  One possible 
mitigation is to replaced it with a secured rewriter with a p=reject 
policy.


I don't think the above will take long to do and I believe will help 
resolve the conflict.


--
Hector Santos,
https://santronics.com
https://winserver.com



___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Receiver-side authorization, was Delegated authentication for Gmail

2023-04-23 Thread Alessandro Vesely
NOTE:  This thread is clearly off-topic with respect to publication.  Yet, it 
may help convergence toward a community vision of the possible future of DMARC, 
which, in turn, can help finding out a statement about today's limits of DMARC, 
its interoperability damage, and From: rewriting.



On Sat 22/Apr/2023 15:53:40 +0200 Jesse Thompson wrote:

On 4/22/2023 6:20 AM, Alessandro Vesely wrote:

Those kinds of sender-side authorization schemes seem to be designed for 
ESP-like businesses, where a domain owner delegates Domain2 to send messages on 
its behalf.  Using such schemes for mailing lists, thereby going down to 
per-user records sounds improper and bloats the amount of DNS stuff.


Does it bloat DNS more than DNSBLs do? Would it make more sense if it were done 
via HTTPS?



The local part of an email address has always been something that can be 
understood only inside the domain it belongs to.  Then, it is true that the 
 pair can be used as a globally unique identifier. 
However, publishing lists thereof, so as to allow their global interpretation 
breaks the premise.




Here's what I see in the real world:
* Organization's policy dictates "use a subdomain" for non-general-purpose use 
cases.



Some organization choose cousin domains instead of subdomains, e.g. yahoo-inc.



* Legacy non-general-purpose use of the org domain is tolerated because there 
is no easy migration path.
* People within the organization instinctively want to use the org domain.
* They're very confused how it works technically, they try to pull strings to 
get what they want.
* Eventually a person high enough in the organization intervenes.
* So, the domain owner has no choice but to authorize the ESP to use the entire 
org domain, yet again.



Sometimes a subdomain is used for functional requirements, such as using 
different mail servers.  Other times it can be categorized as DMARC damage.




Why is it improper for a domain owner to have an ability to delegate per-user? 
I understand that it may be technically infeasible, but why is it improper?

I'm still not certain why ESPs are fundamentally different than mailing lists.
ESP: A message author confirms their identity with the ESP and asks the ESP to 
emit mail with their rfc5322.From address
MLM: A message author confirms their identity with the MLM and asks the MLM to 
emit mail with their rfc5322.From address



The substantial difference is that every MLM subscriber can post, while ESP 
communication is one way.  In addition, even it both ESPs and MLMs presuppose 
user's opt-in, verification mechanisms usually differ.




To address mailing list and forwarding for address portability, I'd rather 
devise receiver-side schemes, whereby the final receiver acknowledges that the 
email address of a user of its has been written to a file that produces mailing 
list of forwarding effects, while the author domain is not involved at all.  A 
very rough idea here:
https://datatracker.ietf.org/doc/draft-vesely-email-agreement/


A scheme like this seems just as applicable to ESPs as it does mailing lists, 
insofar as mutual consensus of confirmed opt-in can be achieved between all 3 
parties.



Yes, it is applicable.  But ESPs are also characterized by featuring an 
appointment by the domain owner.  Sender-side authorizations, for example 
publishing the ESP's public key in a purposely created appointer's subdomain, 
take advantage of that.




"Upon user confirmation, that MTA itself confirms the subscription to the MLM."


Since you mentioned this enables address portability: If the user changes 
mailbox providers, how do they communicate all of their prior confirmed 
subscriptions to the MTA? How does the MLM know if the confirmed subscriptions 
have not been back-filled?



Interesting point.  Address portability by forwarding does not actually change 
the subscription address, so you end up with two agreements.  The first is the 
former domain agreeing to trust a ML where the user subscribed.  The second, 
more critical, agrees to trust MLM messages that the former forwards.  These 
are likely failing DMARC, possibly having a sensible From: domain.  In that 
case, the final receivers could face an ARC chain of two sets, having:


Arc-Authentication-Results: i=2; former-isp; dmarc=fail ...

That way the former ISP has a permit to send real phishing.  The final mailbox 
provider must really trust the first.  Perhaps, the ability to recover a 
percentage of the author's domain DKIM signatures, albeit not a reliable tool, 
can play a role in reinforcing that trust.



Best
Ale
--





___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Is From spoofing an interoperability issue or not?

2023-04-23 Thread Alessandro Vesely

On Fri 21/Apr/2023 18:43:30 +0200 Scott Kitterman wrote:

On April 21, 2023 3:57:54 PM UTC, Alessandro Vesely  wrote:

On Fri 21/Apr/2023 05:41:03 +0200 Scott Kitterman wrote:

On April 20, 2023 4:18:08 PM UTC, Dotzero  wrote:

On Thu, Apr 20, 2023 at 11:38 AM John Levine  wrote:

It appears that Alessandro Vesely   said:


IMHO at least an appendix should say that if you can't do anything better you have to 
rewrite From: with examples of legitimate display-phrase, expanding a bit the first 
bullet in Section 11.4. That can also be a good place to explain the kind of damage 
DMARC causes. >>>

Absolutely not. This sort of thing is utterly outside the scope of our job and 
wasting time on it just further delays our already extremely late work.


+1

There are many things John and I may disagree on but he clearly understands why 
avoiding scope creep (and bad ideas) is important.


Definitely agree with both of you on this.


Eeeh, what an uprising!  I just proposed a couple of paragraphs, not a new 
rocket science theory.

As for the badness, why wouldn't a concise but detailed explanation be better 
than obscure forbiddings and dark forebodings, such as MUST NOT be used by 
humans or interoperability will break down?

BTW, what's the outcome of that discussion?


That, specifically is a question for the chairs, so no idea.



My recollection is that Barry said a Proposed Standard can get away without 
MUST NOT.  Had we been we aiming at full standard directly before?




There are a nearly infinite set of few paragraphs we could write that would 
make things clearer.  If we ever want to finish this, some of them need to be 
out of scope.



Fully agreed.  However, I think we must select out of that "nearly infinite 
set" the paragraphs that explain the MLM issue and other interoperability 
damage, which includes From: rewriting.


Meanwhile, digressions about ATPS and similar schemes can help casting some 
light on future evolution.  From: rewriting cannot be the final solution; it is 
a temporary hack.  Digressions don't slow down the publication, as discussions 
about actual text quickly prevail.  They are just a mean to help convergence 
toward a common vision of the future.



Best
Ale
--






___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


[dmarc-ietf] Messages from the dmarc list for the week ending Sun Apr 23 06:00:04 2023

2023-04-23 Thread John Levine
   Count|  Bytes |  Who
++---
 74 ( 100%) | 827411 ( 100%) | Total
 16 (21.6%) | 249185 (30.1%) | Hector Santos 
 10 (13.5%) | 160009 (19.3%) | Douglas Foster 

  8 (10.8%) |  49381 ( 6.0%) | Alessandro Vesely 
  8 (10.8%) |  47318 ( 5.7%) | John Levine 
  7 ( 9.5%) |  46834 ( 5.7%) | Scott Kitterman 
  5 ( 6.8%) |  28925 ( 3.5%) | Benny Pedersen 
  4 ( 5.4%) |  68582 ( 8.3%) | Laura Atkins 
  4 ( 5.4%) |  52917 ( 6.4%) | Jesse Thompson 
  4 ( 5.4%) |  48559 ( 5.9%) | Dotzero 
  4 ( 5.4%) |  45337 ( 5.5%) | Neil Anuskiewicz 
  2 ( 2.7%) |  10058 ( 1.2%) | Jim Fenton 
  1 ( 1.4%) |  10325 ( 1.2%) | Murray S. Kucherawy 
  1 ( 1.4%) |   9981 ( 1.2%) | Mark Alley 

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc