I had been working on proposed language to strengthen section 5, which has a 
very weak justification of the use of the From address, because the prior 
discussion has left the issue hanging.    The current text is followed by my 
proposed replacement text.   Perhaps the group and the chairs are ready to 
address issue 73?

Doug Foster

Current language:

5.  Use of RFC5322.From

One of the most obvious points of security scrutiny for DMARC is the

choice to focus on an identifier, namely the RFC5322.From address,

which is part of a body of data that has been trivially forged

throughout the history of email.

Several points suggest that it is the most correct and safest thing

to do in this context:

*  Of all the identifiers that are part of the message itself, this

is the only one guaranteed to be present.

*  It seems the best choice of an identifier on which to focus, as

most MUAs display some or all of the contents of that field in a

manner strongly suggesting those data as reflective of the true

originator of the message.

The absence of a single, properly formed RFC5322.From field renders

the message invalid.  Handling of such a message is outside of the

scope of this specification.

Since the sorts of mail typically protected by DMARC participants

tend to only have single Authors, DMARC participants generally

operate under a slightly restricted profile of RFC5322 with respect

to the expected syntax of this field.  See Section 6.6 for details.

Proposed

5.  Use of RFC5322.From

DMARC's use of the RFC5322.From address has been challenged as arbitrary, 
especially since many MUAs display it only upon request.    However, the 
RFC5322.From has consistently been understood to represent the person or other 
entity who is the author of the content and for whom responsibility should be 
attributed, so the integrity of RFC5322.From is critical to the credibility of 
the content.  If the content is to be reliably attributed, the FC5322.From 
address needs to be reliably verified.   Only the RFC5322.From address can 
serve this purpose.

The RFC5322.From has all of the necessary characteristics for the purpose of 
attribution.  First, it is a globally unique identifier.   Secondly, it is 
stable over time.  Because it is unique, it distinguishes this author from all 
other authors with similar names.   Additionally, because many users have 
multiple email addresses for different purposes, the RFC5322.From address also 
distinguishes between different roles taken by a single individual.   For all 
of these reasons, it is very useful for searching and sorting.  The 
RFC5322.From address is the only identifier that is presented to the user which 
can be verified.  The RFC5322.From address is the value which the user expects 
will be used for replies to the message.

A successful spoof of the RFC5322.From address permits the attacker to "put 
words in the mouth" of the spoofed individual, an action which could cause 
great harm to the sender's reputation.   If the recipient of the spoof replies 
to the spoofed originator, the recipient might also suffer significant 
embarrassment.

By comparison, the Friendly Name provides no uniqueness, has no settled format, 
has no verifiability, and has no permanence.    Since the Friendly Name is 
usually configured in the MUA, the Friendly Name may change randomly based on 
the MUA currently being used by the sender, and the sender can alter it at any 
time to any value for any reason.   Attackers have been known to mimic the 
Friendly Name of someone known to the recipient to increase the effectiveness 
of the attack.  When a user sees suspicious content from a trusted Friendly 
Name, one appropriate response is to compare the Friendly Name to the 
RFC5322.From address to test for logical consistency.  Often, this is 
sufficient to detect the deception.

The value of the RFC5322.From address has been established by two disparate 
groups:  users of mailing lists and criminal actors.  Neither of these groups 
can be considered supporters of DMARC.  Mailing list users have complained 
vigorously because DMARC enforcement has caused mailing lists to alter the 
RFC5322.From address in ways that make sorting, searching, and other actions 
more problematic for them.    Criminal actors have responded to DMARC by using 
look-alike domains that seek to impersonate the identity of a well-known domain 
without being subject to DMARC controls.   This action demonstrates that the 
criminal subculture, which DMARC seeks to restrict, knows that a successful 
spoof of the RFC5322.From address will be beneficial to their efforts.

----------------------------------------

From: listsebby=40me....@dmarc.ietf.org
Sent: 9/17/20 6:10 PM
To: dmarc@ietf.org
Subject: Re: [dmarc-ietf] DMARC as Signal to MLMs for Rewrites (or not)

On 17 Sep 2020, at 20:59, Jesse Thompson 
<jesse.thompson=40wisc....@dmarc.ietf.org> wrote:
> On 9/17/20 2:11 PM, Sabahattin Gucukoglu wrote:
>> Wouldn't it be nice if you could ask for MLMs to transform, just using a 
>> DMARC policy, even p=none,
>
> It is possible via p=quarantine pct=0.
>
> I think it makes sense to consider codifying beyond this defacto standard 
> hack. Isn't this part of DMARCbis? It was discussed, anyway. Which ones are 
> active? https://trac.ietf.org/trac/dmarc/report/1

These tickets seem to be relevant:
#22 (Perverse incentives to use p!=none & pct=0): 
https://trac.ietf.org/trac/dmarc/ticket/22
#73 (Need decision on importance of From domain): 
https://trac.ietf.org/trac/dmarc/ticket/73
#63 (Make p=none with no reporting URI invalid-Closed): 
https://trac.ietf.org/trac/dmarc/ticket/63

I did not realise that this "hack" had become widespread. I agree that it 
should be codified, or else p=none explicitly needs to support it (and in that 
case reporting must remain optional). I can't speak to the pct parameter, 
because my sites are too small to really benefit from it.

Cheers,
Sabahattin

_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc
_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to