Re: The Value of Reputation (was Re: [ietf-dkim] Re: WG Review: Domain Keys Identified Mail (dkim))

2005-12-30 Thread John Leslie
Nathaniel Borenstein [EMAIL PROTECTED] wrote:
 On Dec 24, 2005, at 4:09 PM, Douglas Otis wrote:

 Reputation remains the only solution able to abate the bulk of abuse.
 
 ... I think most of us pretty much agree about the critical role of
 reputation.

   I've noticed a lot of what I call lip service about the critical
role of reputation. To say this differently, many folks seem to think
you can choose a reputation system almost at random, and it's sure
to improve your signal/noise ratio, unless you've chosen the wrong one.
(which, I suppose, is a tautology...)

   But, in my view, we have no basis to choose the right one unless
we have a good understanding of what it measures and a workable idea
of how to end run when it falsely rejects good messages.

 I see the cycle as going like this:  We need at least one
 standardized, moderately-useful system for weakly authenticating
 the sources of messages.  Once we have that, we have the minimal
 data that a reputation system will require to be able to start
 doing something at least mildly useful.

   A lot depends on what we mean by weakly authenticating.
   
   People who take security seriously always call the authentication
inherent in an established TCP connection weak authentication; but
in fact it represents a pretty-darn-good correlation. Thus blacklists
based on IP address alone have an excellent correlation to sending
SMTP clients which have, at some time, sent abusive email. (Their
problems lie elsewhere.)

   OTOH we have schemes running which don't claim correlation much
above 60%, and offer no assurance the correlation will remain that
high. These, IMHO, don't qualify as useful authentication, but
it's hard to argue they fail to be weak authentication.

 Once we have *that*, we will have (in our reputation systems) a
 built in market for additional systems for (perhaps less weakly)
 authenticating the desirability (not necessarily solely due to the
 source) of incoming messages.

   I don't agree with Nat here.

   As a practical matter, _many_ folks will prefer sorting through
100 spams to losing one good email. I see darn little market for
anything which can't get it 99% right. What I think we're seeing is
folks that design a system for their own use, achieve an accuracy
of sorting sufficient for their needs, and offer it to others
because they see their marginal cost (per new customer) as
essentially zero.

   Further, until the customer abandons an existing method, the
barrier to adopting an additional method is pretty close to 99%
correct identification of email which passed the existing method(s).
This is _not_ an encouraging situation for entrepreneurs.
   
 To some extent, there's a chicken-and-egg problem with
 authentication and reputation technologies.  My hope for DKIM
 is that it will give us one good enough egg to produce a chicken,
 which can then (in much the manner that Cain and Abel found their
 wives, I guess) facilitate a whole new generation of authentication
 technology eggs.

   I find the challenge of designing a reputation system based in
DKIM a bit overwhelming. DKIM offers assurance that a domain has
taken part in the transmission of an email message containing
certain headers (which the recipient probably never sees), but no
assurance that anything else hasn't been changed since then.
There's no assurance that the message isn't a replay attack, nor
is there assurance that the original hasn't been lost. This is _not_ 
an attractive base upon which to build reputation.

 When reputation is applied against an authorization as an
 identifier, innocent email-address domain owners will be
 seriously harmed. Abusers will find acceptance methods for an  
 authorization scheme.

   Doug is complaining about the difficulty of designing a useful
reputation system on such a base. I entirely agree with him there.

   But I wish it to be clear I am not complaining about reputation  
services being out-of-scope in the DKIM charter. I prefer it that   
way: otherwise I'd be facing a serious challenge trying to cobble
on a useful reputation heuristic, with really no hope of meeting
the charter deadlines.
   
   I'm really not complaining at all: I'm just trying to bring
some sense of reality to what we should expect of DKIM-based
reputation systems.

 Yes, every one of these schemes will be flawed.  That is why we
 need to understand
 A) the role of weak authentication (weeding out some but not
all of the bad guys at any point in time, and using multiple
sources of information to judge the desirability of a message)

   Expressed this vaguely, there's nothing to understand. We'd
need useful estimates of what fraction of bad guys will be weeded
out and what fraction of good guys are (wrongly) weeded out. I'm
not sure any useful estimates of that can be found.

and
 B) the need for a continually evolving set of (ever-stronger,
we hope) mechanisms for proving that a message is desirable
to the recipient.
 
   This 

The Value of Reputation (was Re: [ietf-dkim] Re: WG Review: Domain Keys Identified Mail (dkim))

2005-12-27 Thread Nathaniel Borenstein

On Dec 24, 2005, at 4:09 PM, Douglas Otis wrote:


On Fri, 2005-12-23 at 17:27 -0500, Nathaniel Borenstein wrote:


Far from trying to leave only one authorization method, the DKIM
effort is an attempt to show, by example, how an arbitrary number of
such methods might eventually be elaborated and standardized.


There is danger viewing any abuse control mechanism as representing a
authorization scheme.  The control method should strive to identify
the source of abuse, and not just whether the message has been
authorized.  The DKIM signature provides a fairly strong indication of
the message source, with a normal potential for abusive replay as with
any cryptographic method.


I'm sorry, the authorization method was an echo of the term used in 
the mail I was replying to (which is why it was in quotes).  I was 
really trying to generalize to a whole range of technologies without 
making my wording too awkward.  Perhaps I should have replaced such 
methods with antimalware technologies or abuse control mechanisms. 
 In any event, I fully agree that the term authorization, in this 
context, is both A) insufficiently generalized, and B) troublesome  on 
countless philosophical grounds.



Reputation remains the only solution able to abate the bulk of abuse.


The word only makes me cringe a bit in any discussion like this (a 
global fascist state, for example, is another possible solution), but I 
think most of us pretty much agree about the critical role of 
reputation.  I see the cycle as going like this:  We need at least one 
standardized, moderately-useful system for weakly authenticating the 
sources of messages.  Once we have that, we have the minimal data that 
a reputation system will require to be able to start doing something at 
least mildly useful.  Once we have *that*, we will have (in our 
reputation systems) a built in market for additional systems for 
(perhaps less weakly) authenticating the desirability (not necessarily 
solely due to the source) of incoming messages.  To some extent, 
there's a chicken-and-egg problem with authentication and reputation 
technologies.  My hope for DKIM is that it will give us one good enough 
egg to produce a chicken, which can then (in much the manner that Cain 
and Abel found their wives, I guess) facilitate a whole new generation 
of authentication technology eggs.



When
reputation is applied against an authorization as an identifier,
innocent email-address domain owners will be seriously harmed.  Abusers
will find acceptance methods for an authorization scheme.


Yes, every one of these schemes will be flawed.  That is why we need to 
understand A) the role of weak authentication (weeding out some but 
not all of the bad guys at any point in time, and using multiple 
sources of information to judge the desirability of a message) and B) 
the need for a continually evolving set of (ever-stronger, we hope) 
mechanisms for proving that a message is desirable to the recipient.  
Some of those mechanisms will also involve (ever-stronger, we hope) 
sender authentication, but others could eventually involve technologies 
as unrelated to authentication as anonymous payment.  -- Nathaniel



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: The Value of Reputation (was Re: [ietf-dkim] Re: WG Review: Domain Keys Identified Mail (dkim))

2005-12-27 Thread Douglas Otis


On Dec 27, 2005, at 7:33 AM, Nathaniel Borenstein wrote:


I'm sorry, the authorization method was an echo of the term used  
in the mail I was replying to (which is why it was in quotes).  I  
was really trying to generalize to a whole range of technologies  
without making my wording too awkward.  Perhaps I should have  
replaced such methods with antimalware technologies or abuse  
control mechanisms.  In any event, I fully agree that the term  
authorization, in this context, is both A) insufficiently  
generalized, and B) troublesome  on countless philosophical grounds.


The response was specifically against the use of authorization.   
With respect to SPF/Sender-ID or SSP, these are indeed email-address  
authorization schemes.  With Sender-ID, authorization has been  
incorrectly described as form of authentication, and much like  
Sender-ID, SSP appeared more by way of introduction rather than  
discussion.  All of these authorization schemes, especially SSP,  
will disrupt the delivery of legitimate email.  This authorization  
scheme also proposes untold numbers of DNS lookups for perhaps any  
number of From addresses and signatures.  The art of open-ended  
authorizations (burden shifting) in SSP will soon include  
authorized signature lists.  SSP also considers itself a weak  
form of authentication by directing complaints to email-address  
rather than the signer. : (




Reputation remains the only solution able to abate the bulk of abuse.


The word only makes me cringe a bit in any discussion like this  
(a global fascist state, for example, is another possible  
solution), but I think most of us pretty much agree about the  
critical role of reputation.


Some view a closed system, rather than a system open to tens of  
millions of email-address domains, as an alternative to reputation.   
Even in that austere system however, each would consider their access  
contingent upon their reputation for good behavior.  Reputation is an  
unpleasant reality where identifying those culpable for abuse _must_  
_not_ be taken lightly.



I see the cycle as going like this:  We need at least one  
standardized, moderately-useful system for weakly authenticating  
the sources of messages.


I see the base DKIM draft forming a solid basis to identify email  
sources.  The ill considered SSP draft will seriously hinder the DKIM  
effort.  Serious problems are already being handled by way of burden- 
shifting, rather than considering real solutions.  The related  
expense associated with an imposition of a disruptive email-address  
authorization scheme does not justify this component's inclusion  
within the DKIM charter.  With far less overhead, spoofing attempts  
can be thwarted without email-address authorizations.  Many of the  
serious crimes depend upon embedded links rather than use of an email- 
address (which are never seen by the majority of recipients).  A  
solid basis for the source of an email-address will significantly  
enhance protective strategies.  It is a dangerously false premise  
that an authorization scheme offers protection, as any assurance in  
that regard will increase the success rate of criminal fraud.



Once we have that, we have the minimal data that a reputation  
system will require to be able to start doing something at least  
mildly useful.


Please note authentication does _not_ include SSP.


Once we have *that*, we will have (in our reputation systems) a  
built in market for additional systems for (perhaps less weakly)  
authenticating the desirability (not necessarily solely due to the  
source) of incoming messages.  To some extent, there's a chicken- 
and-egg problem with authentication and reputation technologies.   
My hope for DKIM is that it will give us one good enough egg to  
produce a chicken, which can then (in much the manner that Cain and  
Abel found their wives, I guess) facilitate a whole new generation  
of authentication technology eggs.


Agreed.  Do not let the ill conceived SSP derail DKIM.


When reputation is applied against an authorization as an  
identifier, innocent email-address domain owners will be seriously  
harmed.  Abusers will find acceptance methods for an authorization  
scheme.


Yes, every one of these schemes will be flawed.  That is why we  
need to understand A) the role of weak authentication (weeding  
out some but not all of the bad guys at any point in time, and  
using multiple sources of information to judge the desirability of  
a message) and B) the need for a continually evolving set of (ever- 
stronger, we hope) mechanisms for proving that a message is  
desirable to the recipient.  Some of those mechanisms will also  
involve (ever-stronger, we hope) sender authentication, but others  
could eventually involve technologies as unrelated to  
authentication as anonymous payment.


To ensure email does not self-destruct, use of reputation against  
authorizations _must_ be avoided as imposing highly unfair