On 4/20/2023 6:34 AM, Douglas Foster wrote:
If a vendor wants to serve a customer, he needs to provide a product that the customer can use. I don't see that it is IETFs problem to worry about a vendor with an inadequate email platform, especially since DMARC has been around awhile.

But I have been thinking further about the constrained delegation issue. The general goal, at least for a single mailing is:
User2@Domain2 needs to be authorized to email for User1@Domain1.

DKIM authorizes anyone with the private key to email for anyuser@Domain1. The domain owner has to worry about multiple things:

  * Unauthorized Use For:   Will domain2 will use the key for any
    messages other then User1@Domain1?
  * Unauthorized Use By:   Will Others@Domain2 use the key for
    User2@Domain2?
  * Theft:  Will be stolen and used by HostileUser@HostileDomain.

Adjusting delegation:

* Hector's ATSP proposal limits the delegation to Domain2. @HostileDomain cannot steal the delegation, because the
    delegation only works if a domain is authenticated by @domain1
    and has signed the message.  For a high-sensitivity domain
    like @WhiteHouse.Gov, they may want to require both:   @Domain2
    must have a DKIM private key for @Domain1 AND @Domain2 must have
    an ATSP delegation from @Domin1.

  * DKIMs "I=" clause can be used to limit the "Use For".  A
    signature configured with "d=domain1; i=user1@domain1" should
    only authenticate messages with "From: user1@domain1".   This is
    an upward-compatible change in the way DMARC interprets DKIM,
not a layer violation of DKIM. This could be used two ways: (a) possession of the private key permits use to send on behalf
    of "user1@domain1", and (b) ATSP could provide user-level
    delegation to only messages counter-signed by user2@domain2.

  * Subdomains can be used to limit scope:   Issuing a key for
    @subdomain1.domain1 is more limited risk than issuing a key for
    @domain1.
  * Subdomains with p=none can be used to allow a subset of messages
    to be sent unauthenticated.  In some cases,
    allowing @subdomain.domain1 to operate unauthenticated may be
    perceived as lower risk than issuing a DKIM private key.


The UseF


On Wed, Apr 19, 2023 at 10:30 PM Jesse Thompson <z...@fastmail.com <mailto:z...@fastmail.com>> wrote:

    On Wed, Apr 19, 2023, at 12:35 PM, Alessandro Vesely wrote:
    On Wed 19/Apr/2023 15:37:25 +0200 Laura Atkins wrote:
    > To me it’s not so much the company can’t delegate authentication - it’s 
how
    > many SaaS providers (some of which are ESPs and some of which are 3rd 
parties
    > that send through ESPs) are incapable of supporting DMARC alignment. Not 
it’s
    > hard, not it’s challenging, but simply … can’t. They cannot sign with 
foreign
    > DKIM domains, and they cannot support different domains for SPF 
authentication.
    >
    > Should DMARCbis make the recommendation that if you are providing mail 
services
    > that you SHOULD be able to support corporate customers using DMARC?


    IMHO at least an appendix should say that if you can't do
    anything better you
    have to rewrite From: with examples of legitimate
    display-phrase, expanding a
    bit the first bullet in Section 11.4.  That can also be a good
    place to explain
    the kind of damage DMARC causes.

    That's what I'm getting at. I don't really see any difference
    between a mailing list and someone providing mail services (I
    won't use the word ESP since that seems to be a loaded term) for
    corporate customers (I would also add government customers, who
    are adhering to BOD 18-01 in droves and they are also adopting
    said companies providing mail services)

    The choice for both the mailing list and mail-service company is to:

    1) ignore DMARC and continue to emit mail as the original author
    intended (the author might be ignorant of DMARC too) and assume
    the mailbox providers are smart enough to understand that, like
    mailing lists, mail-service companies and their mail emitting
    authors shouldn't be caught up by a DMARC misdeployment by the
    domain owner

    2) be cognisant of DMARC's effects, and in the interest of
    keeping the author's mail flowing, use a different domain and
    put the author's address in the friendly from or similar, or
    just refuse to accept the messages, until delegation can be set up.

    I can say, anecdotally, that people really really want #1 to be
    true, but they eventually learn #2 leads to a better long term
    outcome. I'd like that "learning" to be less painful by having
    something unambiguous to point at in DMARCbis.

    Jesse



The only technical requirement for the "i=" tag is for the User Agent Identity (UAID) to equal the ADID (Author Domain) (don't recall without looking at code).

The assessment equation extractable by reading DKIM-BASE is:

    Assessment = ASSESSOR(SDID, UAID="")

where the UAID is optional.

I argued during the drafting of DKIM-BASE to add back ADID by passing the ADID with SDID which is how the original DKIM modeled it:

    Assessment = ASSESSOR(ADID, SDID, UAID="")

Unfortunately, I was the only DKIM Policy advocate objecting to DKIM-BASE trying to, as its abstract says:

   DKIM separates the question of the identity
   of the Signer of the message from the purported author of the
   message.  Assertion of responsibility is validated through a
   cryptographic signature and by querying the Signer's domain directly
   to retrieve the appropriate public key.


So not even this backward compatible assessment was acceptable to have in the DKIM-BASE standard.

    Assessment = ASSESSOR(SDID, UAID="", ADID="")

For many here, the reputation of the signer trumps everything. I don't think the DKIM Policy advocates ever disputed the need for reputation but as a final layer, not the first layer.

This is why we have had 17 years of a DKIM Policy vs DKIM Reputation modeling conflicts in the DKIM-related working groups. Just keep in mind we have no public domain, not proposed method to do a SDID only assessment. But we certainly do have a several ADID::SDID assessment proposals!

We can't totally separate the ADID from the any SDID assessment. The Author ADID, From: header, is the only required header to be hashed bound to DKIM-Signature. It is impossible to be separated from consideration, and the irony is, if the assessment of the signer is negative, it is the Author address, its MTA, its delivery agent (return-path) who gets hurt.

ADID can not be separated. It is a complex situation when you are dealing with unsolicited mail when ADID does not equal SDID. This is why DMARC can only focus with a ADID=SDID policy.

Now throw in the UAID and we have additional, complex, extended policies to deal with. We don't know how to use it, optimally, especially for a mailing list where thousands of emails need to be signed. Do you sign 1 list distribution for all or do you sign each list outbound message? Those are big scaling optimization considerations.

For the most exclusive policy, via DMARC:

p=reject; adkim=s; aspf=s

everything must match.

for:

p=reject; adkim=r; aspf=r

A little more relaxed for subdomains.

I think what is there is enough for this limited policy which does not care for users using the domain outside the main stream.

--
Hector Santos,
https://santronics.com
https://winserver.com





_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to