On Sun, Jul 29, 2018 at 3:59 PM, Bron Gondwana <br...@fastmailteam.com>
wrote:
>
> I'm not sure what you mean by "the veracity of the header field data".
> Can you give an example of a cv=fail where there's useful information still
> trustworthy in the message, because I don't see it.  To use the "chain of
> custody" analogy, if you have a bag of evidence and it's been unsupervised
> in the hands of an unknown party, the contents have no evidentiary value
> any more.
>
> There's two types of fail - fail on AMS, which could just be a
> modification by somebody, and a fail on an AS, which means there's
> definitely either buggy software or somebody screwing with the chain.
>
> But even a single AMS fail means that an unknown intermediary could have
> changed every single header that's covered by the AMS.  There's no way to
> know what they changed.  Ditto the body.  It could be a totally different
> message and there's no way to know because the chain of evidence is broken.
>
> So again - all that you can know when you see a broken AMS is that
> somebody got their hands on a message which had followed the existing chain.
>

There are two premises to keep in mind:

1) For the first chunk of ARC's life, there will be a significant amount of
ARC breakage due to intermediaries who do not properly or yet implement
ARC. Some of the data ARC collects may in isolating these intermediaries
and helping them properly adopt ARC.

2) we don't know what data is valuable yet, and would rather collect extra
data than throw out potentially useful data (Section 11.3.3)

Given these, it is worthwhile to capture the chain information even in
failing states (i.e. cv=fail should sign greedily), especially when you
consider the three major failure scenarios:

1) A good actor improperly Sealing

ALL the data in the Chain is valuable, including the breakage, because it
isolates the issue and allows that improper Sealer to get feedback and fix
their systems. Realistically, there will be a lot of work done here, as
intermediaries deploying ARC for the first time may get it wrong.

2) A good actor not Sealing

Again, ALL the data in the Chain is valuable, as it would isolate where the
breaking intermediary is and allow outreach. This will probably be the most
prevalent ARC failure we see in the wild in the near term - mailing lists
that do not yet Seal.

3) A bad actor modifying the chain

Sure, the Chain is garbage. But if all the AS's validate, then the bad
actor's been forced down two paths: either a) they are forced to extend or
replay a valid chain, or b) they must create a garbage chain using only
domains they have DNS control over. If the AS's don't need to validate,
then there are numerous malicious paths an attacker can take to modify the
chain in subtle ways.
_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to