On 5/7/15 8:29 AM, Hector Santos wrote:
>> On May 6, 2015, at 4:45 PM, Douglas Otis <doug.mtv...@gmail.com>
>> wrote:
>>
>> Defending against DDoS is very difficult, but that was
not the
>> concern.  Collateral damage would be of legitimate messages
>> inadvertently blocked when removing a common DKIM signature.
>
> What do you mean by remove?  You mean destroy, invalidate
existing
> signatures?

Removing signature information from DNS prevents an
associated signature to validate as a feckless means to
respond to signature delegation chain abuse.

> Keep in mind this MAY be desirable, in fact the DKIM STD76 theory is
> that resigners can occur blindly anywhere with the mail path.  You
> don't have destroy the original integrity during resign, 
yet that
> transaction may be illegal (per policy) with the fact it
has been
> resigned.

The concern relates to "delegating" with a DKIM signature
fragment, where, when valid, authorizes signatures of a
third-party.  Even a "short" expiry likely covers several
days or delivery may become fragile. It seems any delivery
period would permit a sizable phishing campaign well beyond
the control of a DMARC domain.  TPA-Label provides a method
to react to abuse while also minimizing collateral damage to
other message streams that utilized the same DNS resources
for their DKIM signatures.  Of course TPA-Label could impose
a similar list of no-change headers as found in a DKIM
signature delegation.  By leveraging a DKIM process, perhaps
you might see that as simpler and offering more bang for the
buck.

>> There is also the challenge of managing a double-signature
>> re-signing process where it must be assumed not all
destinations
>> receive a signature delegation.  Even this double signing
process
>> may prove problematic when it goes beyond SQL query rates.
>
> SQL? <g>. Some folks are more optimized using ISAM/BTREE
databases!

Any interim per message special signing process is likely to
encounter scaling issues especially when third-parties are
handling tens of thousands of first party domains.  Again,
the TPA-Label approach does not introduce new signatures nor
alter DKIM signature processing. It simply offers low
frequency exceptions based on an asserted relationship
between the From and third-party domain that can be
instantly withdrawn by the From domain upon the detection of
abuse.

>> There is also another concern regarding any phishing campaign
>> permitted by effectively signing unknown content.  Only
by removing
>> DKIM signatures from DNS would a DMARC domain be able to
squelch a
>> phishing attack it inadvertently authorized.  TPA-Label
allows
>> authorization removal to be based on the destination
domain and
>> even a specific list-id.  TPA-Label would not impact any
existing
>> DKIM signing process since authorization by destination
is managed
>> by TPA-Label zones.
>
> Doug, we know a positive result of a DNS lookup will work. I
> believe you wish to add more complex semantics on the
parsing of
> the lookup results, I believe that's ok. But we need a
basic yes/no
> query. Maybe it can be sold if we offer more bang for the
buck on
> each call but overall, it needs to be very simple.

TPA-Label is simpler because it does not require third-party
processes to be interspersed between each step of message
handling.  It involves only sender assertions and recipient
exceptions.  Instances requiring a reaction respond to abuse
which TPA-Label can handle both promptly and with minimal
collateral disruption.

BTW, SPF -all was seldom used since it offered >1% false
positive rates and with DMARC, it is even best considered
~all to allow DKIM a chance to rescue messages from
rejection or spam folder placement.

Regards,
Douglas Otis

_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to