Re: [dmarc-ietf] Revisiting the Race Condition in draft-crocker-dmarc-sender-01

2020-08-18 Thread John Levine
In article  
you write:
>This is just wrong. While I appreciate the enthusiasm for using the Sender
>field, unless there is a mechanism for establishing a relationship between
>the From domain and the Sender domain then we have basically broken DMARC.
>Using what has been described above, any malicious actor can bypass the
>wishes of the From domain and send whatever they want.

Aw, come on.  Surely you of all people know that DMARC aligned doesn't mean
it's not spam.

the whole reason we're here is that we have abundant evidence that at
least where mailing lists are involved, the policy published in DMARC
often doesn't express the actual wishes of the domain publishing it.

R's,
John

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Revisiting the Race Condition in draft-crocker-dmarc-sender-01

2020-08-18 Thread Dotzero
On Tuesday, August 18, 2020, Dave Crocker  wrote:

> On 8/18/2020 12:48 PM, Todd Herr wrote:
>
>> The race condition here is in item 5, "Emails that fail the DMARC
>> mechanism check are disposed of in accordance with the discovered DMARC
>> policy of the Domain Owner", specifically when both the Sender and From
>> headers are present, the domains are different, both publish DMARC
>> policies, and only one of the two domains passes DMARC validation checks
>> for that message. In that case, the question of "Which policy to apply?",
>> or more precisely, "Which validation check should be honored?" will really
>> matter to the disposition of the message; if, for example, the From domain
>> is at p=reject and fails, while the Sender domain publishes a policy with
>> the required "snd" tag and passes, should the message be rejected or
>> accepted?
>>
>
>
> So, yeah, the text for that needs significant changes.  Thanks for raising
> this.
>
> I was under some time pressure and merely copied that from the existing
> DMARC spec.  In fact, I think that text in the DMARC spec isn't very good,
> so this would be a nice excuse for thinking through reasonable language
> carefully.
>
> The basic issue, which creates the language challenge, is the receivers
> actually can and do do whatever they want.  Language that pretends to
> dictate receiver action for this is unrealistic.
>
> So the language should be cast in terms of the semantics of the
> information it is tossing into the receiver's analysis engine, rather than
> claiming to dictate receiver disposition of the message.  IMO.
>
> d/
>
> --
> Dave Crocker
> Brandenburg InternetWorking
> bbiw.net
>
>
This is just wrong. While I appreciate the enthusiasm for using the Sender
field, unless there is a mechanism for establishing a relationship between
the From domain and the Sender domain then we have basically broken DMARC.
Using what has been described above, any malicious actor can bypass the
wishes of the From domain and send whatever they want. I fail to see how
this would be considered a feature. It is precisely why I proposed a
separate signature of the Sender field by the From domain to at least
provide a way to show a relationship between the Two domains.

There currently is no race condition because Sender is not currently a part
of DMARC. It appears that people want to introduce the same problem that
existed in SenderID and PRA. Please don't.

Michael Hammer
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Revisiting the Race Condition in draft-crocker-dmarc-sender-01

2020-08-18 Thread Dave Crocker

On 8/18/2020 12:48 PM, Todd Herr wrote:
The race condition here is in item 5, "Emails that fail the DMARC 
mechanism check are disposed of in accordance with the discovered 
DMARC policy of the Domain Owner", specifically when both the Sender 
and From headers are present, the domains are different, both publish 
DMARC policies, and only one of the two domains passes DMARC 
validation checks for that message. In that case, the question of 
"Which policy to apply?", or more precisely, "Which validation check 
should be honored?" will really matter to the disposition of the 
message; if, for example, the From domain is at p=reject and fails, 
while the Sender domain publishes a policy with the required "snd" tag 
and passes, should the message be rejected or accepted?



So, yeah, the text for that needs significant changes.  Thanks for 
raising this.


I was under some time pressure and merely copied that from the existing 
DMARC spec.  In fact, I think that text in the DMARC spec isn't very 
good, so this would be a nice excuse for thinking through reasonable 
language carefully.


The basic issue, which creates the language challenge, is the receivers 
actually can and do do whatever they want.  Language that pretends to 
dictate receiver action for this is unrealistic.


So the language should be cast in terms of the semantics of the 
information it is tossing into the receiver's analysis engine, rather 
than claiming to dictate receiver disposition of the message.  IMO.


d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Revisiting the Race Condition in draft-crocker-dmarc-sender-01

2020-08-18 Thread John Levine
In article  
you write:
>[What to do when From and Sender DMARC have different results ?]
>
>When I first posed this, the answers I got were along the lines of
>"Receivers will do what they want, like they've always done", and that's
>certainly true if the behavior isn't mandated in the RFC (and maybe even if
>it is). That's cool and all, but doesn't "Receiver's Choice" risk
>continued, or perhaps even worse, breakage of the primary problem that this
>document is trying to fix?

You're right, the sender tweak only makes sense if the sender result
is preferred. Otherwise a sender result can only make it less likely
that a message is delivered, and that wouldn't be very useful.

As always, a successful result doesn't mean not spam, it just means it
didn't fail DMARC. I expect some non-normative advice would be
helpful, pointing out that this is useful for third party senders, and recipient
systems will have to come up with their own idea about which third parties are
credible.

It occurs to me it's likely to be the same list of third parties whose ARC seals
are credible.

R's,
John

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


[dmarc-ietf] Revisiting the Race Condition in draft-crocker-dmarc-sender-01

2020-08-18 Thread Todd Herr
Greetings.

I want to revisit something that was originally discussed in the
"non-mailing list use case for differing header domains" thread, because I
don't think there was any sort of consensus reached, and because I think
it's pretty important in determining whether or not the proposed document
will achieve any level of successful adoption. If this topic was discussed
in a different thread, please forgive me for beating what I'm sure must be
a dead horse.

Section 5.2, Determine Handling Policy, reads in part:

The steps are as follows:

   1.

   Sender:   Extract the RFC5322.Sender domain from the message.

  Query the DNS for a DMARC policy record.

  Perform remaining, numbered steps, if one is found and it
  contains an "snd" tag.

   AND

   From:   Extract the RFC5322.From domain from the message.

  Query the DNS for a DMARC policy record

  Perform remaining, numbered steps, if one is found.

   Terminate:   Otherwise terminate DMARC evaluation.

   2.  Perform DKIM signature verification checks.  A single email could
   contain multiple DKIM signatures.  The results of this step are
   passed to the remainder of the algorithm and MUST include the
   value of the "d=" tag from each checked DKIM signature.
Crocker Expires January 28, 2021[Page
6]Internet-DraftDMARCJuly
2020

   3.  Perform SPF validation checks.  The results of this step are
   passed to the remainder of the algorithm and MUST include the
   domain name used to complete the SPF check.

   4.  Conduct Identifier Alignment checks.  With authentication checks
   and policy discovery performed, the Mail Receiver checks to see
   if Authenticated Identifiers fall into alignment.  If one or more
   of the Authenticated Identifiers align with the RFC5322.From (or
   with the RFC5322.Sender field, if permitted by the domain owner)
   domain, the message is considered to pass the DMARC mechanism
   check.  All other conditions (authentication failures, identifier
   mismatches) are considered to be DMARC mechanism check failures.

   5.  Apply policy.  Emails that fail the DMARC mechanism check are
   disposed of in accordance with the discovered DMARC policy of the
   Domain Owner.  See Section 6.3 for details.


The race condition here is in item 5, "Emails that fail the DMARC mechanism
check are disposed of in accordance with the discovered DMARC policy of the
Domain Owner", specifically when both the Sender and From headers are
present, the domains are different, both publish DMARC policies, and only
one of the two domains passes DMARC validation checks for that message. In
that case, the question of "Which policy to apply?", or more precisely,
"Which validation check should be honored?" will really matter to the
disposition of the message; if, for example, the From domain is at p=reject
and fails, while the Sender domain publishes a policy with the required
"snd" tag and passes, should the message be rejected or accepted?

When I first posed this, the answers I got were along the lines of
"Receivers will do what they want, like they've always done", and that's
certainly true if the behavior isn't mandated in the RFC (and maybe even if
it is). That's cool and all, but doesn't "Receiver's Choice" risk
continued, or perhaps even worse, breakage of the primary problem that this
document is trying to fix?

Unless I'm misunderstanding things, a primary idea behind the Sender header
with the DMARC policy is to make things easier for intermediaries, like
this mailing list. I'm posting to this list from a domain that publishes a
p=reject policy, and so to allow my post to make it to all subscribers, the
MLM rewrites the From address something that looks kind of VERP-ish
(todd.herr=40valimail@dmarc.ietf.org), DKIM signs it using the ietf.org
domain, and sends it along with a MAIL FROM domain ending in ietf.org.

If this change becomes standard, then I imagine that future mail sent
through this MLM will look something like this:

  From: todd.h...@valimail.com
  Sender: l...@dmarc.ietf.org
  DKIM-Signature domain (d=ietf.org)
  Return-Path domain: ietf.org

There may still be a DKIM signature header with d=valimail.com attached to
the message, but DMARC for valimail.com won't validate because of the
footer attached to the message, and so we'll be in a situation at best
where the Sender DMARC check passes and the From DMARC check fails, with
the From domain being at p=reject.

What if the receiver bounces the message because of this failure of DMARC
validation on the From field? We're playing "Receiver's Choice" here, so
there's nothing to stop them from doing so, right?

If the spec doesn't mandate behavior in cases where there are conflicting
DMARC validation results, then it doesn't seem to achieve the goal it set
out to accomplish:

  If:

  * 

Re: [dmarc-ietf] draft-crocker-dmarc-author-00 ?

2020-08-18 Thread Jesse Thompson
On 8/17/20 3:00 PM, Luis E. Muñoz wrote:
> DMARC can be quite useful even with p=none.

Agreed.  People commonly request that we accept-list their IP/domain from 
inbound spam scanning.  We now tell them to send DMARC-aligned mail (SPF or 
DKIM pass, aligned with From), and we'll use that as criteria to accept mail 
from the domain, regardless of what policy they actually publish.

Jesse

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] draft-crocker-dmarc-author-00 ?

2020-08-18 Thread Jesse Thompson
On 8/13/20 4:53 PM, dotz...@gmail.com wrote:
> Wrong answer. If the vendor is uncooperative then fire the vendor. 4-5 years 
> ago it was difficult to find vendors who were willing to deal with DKIM and 
> able to do a good job in implementing. The common mantra was "how does this 
> fit into my business model". These days I would consider it table stakes.

DKIM, DMARC policy conformance, or any practical email functionality are rarely 
considered in procurement decisions.  Only recently did I manage to get some of 
these requirements into our organization's RFP templates.  It really hasn't 
made any impact on procurement decisions, which are made by people who don't 
understand the nuances of email to the extend that they can tell if the vendor 
actually meets the requirements.  Even if I were included on the evaluation 
team for every procurement (a job I do not want) it would be rare that lack of 
DKIM support would be enough to weigh negatively on a decision.

People like me only get called in after the system is deployed in production 
and they run into problems getting email delivered.  For one recently-procured 
(inventory management software) vendor, I had to coach a poor sysadmin through 
how to set up Postfix to relay-rewrite their own application's email so that it 
wasn't able to outright spoof (for lack of a better term) the address of any 
end-user-free-hand-inputted address.  Their own app dev team didn't feel like 
it was important enough to learn about DKIM/SPF/DMARC and kept confusing the 
changes they needed to make for email authentication with TLS 1.0 deprecation.  
"It's in our next release" they kept saying.  

Companies like that will just check the "we support DMARC" on the procurement 
form because they don't know enough to understand that they don't.

Jesse

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Time for a change

2020-08-18 Thread Murray S. Kucherawy
On Mon, Aug 17, 2020 at 6:09 PM Dave Crocker  wrote:

>  DKIM was a synthesis within the IETF of two things (DomainKeys and IIM)
> that started outside.  It underwent significant evolution in the IETF --
> not once, but twice.
>
> Actually, it wasn't.
>
> The constituent parts were separately proposed, during the same initial
> IETF discussions, and the IETF said to go away and come back after
> reconciliation.  That work was done by an ad hoc industry team and there
> was a complete spec and initial implementations before the IETF was again
> approached.
>
Yep, I still have the t-shirt.

> https://tools.ietf.org/html/draft-allman-dkim-base-00
>
> (and note that in the working group field on the title page, it says
> "pre-MASS"...)
>
> The work in the IETF was a refinement of a complete, integrated spec.
>
But it was quite a bit of refinement -- I would even say 'evolution" -- in
comparison to how little SPF and DMARC changed before publication.

-MSK
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] non-mailing list use case for differing header domains

2020-08-18 Thread Jesse Thompson
On 8/18/20 3:54 AM, Alessandro Vesely wrote:
> On Tue 18/Aug/2020 01:39:16 +0200 Jesse Thompson wrote:
>> On 8/7/20 9:32 PM, John Levine wrote:
 We need spoofing protection for all of our domains without being told 
 we're misdeploying.
>>>
>>> I would be interested to better undertstand the meaning of "need"
>>> here. It is my impression that most people vastly overestimate how
>>> much of a phish target they are. Paypal and big banks certainly are,
>>> other places, a lot less so.
>>
>> (Sorry, I was on a much-needed vacation.)
> 
> 
> Much *needed*?  Oh, well...

Anecdotally.  My family can attest, if that helps ;-)


>> Ok, that's fair, I should have realized that one was over-stated.  *Need* 
>> would imply that domain-spoofing is more common than it is in reality.
> 
> 
> Yes, domain spoofing is common.  You don't need to be PayPal to be spoofed.  
> Then, one can say it's an innocuous kind of abuse.  Since you're not PayPal, 
> it's just noise.  Yet, in a perfect word, I'd opt to avoid it.

Yes, I just can't prove it to the extent that the people saying we're 
"misdeploying" DMARC would expect me to.  How do I tell the difference between 
a faculty member innocently using Gmail to send from their personal address 
within our domain vs. a bad actor doing the same to send spear phishing to a 
peer at another university?  In my mind, I should just assume that it's a 
problem, or is potentially a problem, so I'd rather nip it in the bud by 
deploying DMARC on domains used by users.


>> Cybersecurity-minded folk in EDU tend to equate observed inbound phishing 
>> with spoofing (even though most phishing is spoofing the display name and 
>> message bodies, not the domain) and conclude that they *need* DMARC without 
>> really understanding the nuances.  Given the opportunity that DMARC 
>> marketing promises, they definitely *want* inbound DMARC enforcement for 
>> domain-spoofing of inbound mail (they'll defer to the email-minded folk to 
>> figure out the local policy exemptions, ARC, etc), as well as *want* domain 
>> policies that prevent the potential domain spoofing scenarios of owned 
>> domains (again, the email-minded folk will figure out how to actually 
>> "misdeploy" DMARC).  To them, it's just a checkmark towards some "maturity" 
>> benchmark that they use to compare to their peers.
> 
> 
> Nice synthesis.  They believe DMARC works as advertised.  What does it take 
> to believe that DMARC /could/ work as advertised?

It seems like we're close.  I am glad that you are pushing back (in the other 
thread) on the notion that DMARC shouldn't be useful for all types of domains.


>> Email-minded folk in EDU, knowing that DMARC doesn't really have much 
>> practical application to phishing, like having the observability that DMARC 
>> provides, as well as the hammer that moving past p=none provides as a way to 
>> coerce their complex, decentralized institution into a more sustainable 
>> operation:
>>
>> * Departments sending transactional email - move them to dedicated 
>> subdomains (this is where really complex institutions would benefit from 
>> walking the domain tree instead of always inheriting from the org domain)
> 
> 
> This is a good idea even without DMARC concerns.

Yes, and those departments that we have converted to subdomains seem to be 
happy with the result.  It usually takes some convincing, however.  People tend 
to have a strong preference to associate with the brand of the org domain 
(which is where we have our users).


>> * People sending user email from random places - move them to authenticated 
>> submission (preferably OAuth - since basic authentication is the reason why 
>> so many passwords are exposed)
> 
> 
> This sound just like an email-client configuration problem.  It shouldn't be 
> so hard.

Gmail is the most common "client" allowing users to submit mail outside of our 
supported submission pathways.  In theory, Google could make some improvements 
to Gmailify (to support more OAuth scenarios) and actively transition their 
legacy users to reconfigure their Gmail settings to properly use our domain, 
but it's not a high priority for Google (paraphrasing Brandon; hopefully 
accurately)

It's not much different than people innocently using any random ESP to send 
newsletters from their personal address.  Because all of these "clients" allow 
non-authenticated submission of our domain, users have come to expect it to 
work and they don't want to be told otherwise.


>> The latter scenario is interesting because a single user sending from a 
>> random place doesn't really show up in DMARC aggregate reports.
> 
> 
> Why not?  If they send to DMARC-compliant receivers, their aggregate reports 
> should show records without the right MSA signature, not even failed, and 
> foreign domain authentications only.  That doesn't tell which users 
> misconfigured their client, but gives a good idea of the level of user 
> education one has achieved.

Right, you onl

Re: [dmarc-ietf] draft-crocker-dmarc-author-00 ?

2020-08-18 Thread Neil Anuskiewicz
On Mon, Aug 17, 2020 at 1:00 PM Luis E. Muñoz  wrote:

> On 14 Aug 2020, at 12:47, Neil Anuskiewicz wrote:
> >  Under 50% of companies have any DMARC record. Of those who deploy
> > DMARC,
> > about ~2% have p=quarantine and ~5% p=reject, though some industries
> > such
> > as finance it looks like it's closer to 15% p=reject. I'm sure these
> > numbers aren't perfect but what you have likely isn't radically
> > different.
>
> My numbers are inverted regarding quarantine vs reject, as I posted on
> this list:
>
> On 30 Jul 2020, at 18:01, Luis E. Muñoz wrote:
> >
> > I am currently observing ~215.5 million domain names. Out of those,
> > ~64  million have a seemingly _valid_ SPF record and ~113 million with
> > at least one MX record.
> >
> > This is a current breakdown of the (valid) DMARC records I am
> > observing over the general domain population above. This amounts to an
> > adoption rate of ~1.7%.
> >
> > |p   |  count  |
> > | :- | --: |
> > | none   | 2715614 |
> > | quarantine |  238584 |
> > | reject |  726045 |
>
> Numbers have moved a bit since then, but not much. I'm seeing 3:1 reject
> to quarantine ratio across the board.
>
> > Why is adoption low? Is that a big problem? Why so few aggressive
> > policies?
> > Is that a big problem?
>
> DMARC can be quite useful even with p=none. This use case provides
> insight on what's going on and sometimes, that's all that is wanted.
> Moving to more aggressive policies require a degree of control on the
> mail flows that not all organizations are prepared to exercise, IMO.
>
> Yes, I completely agree, p=none is useful. It's helped me help the client
(I'm basically an IT freelancer) make sure all their email sources' DKIM
and SPF's squared away. More interesting, DMARC's found things that have
surprised clients. Wait, who's using ESP X? Some detective work and a few
days later... Okay, it's the such and such office or sometimes even
individuals. And there's oh right we do use Y. Let's get that authenticated..

So it's legit sources that need to be authenticated, semi-legit sources
that either need to be authenticated and viewed as fully legit or told to
stop and there's sources that are legit but have been running on autopilot.
Let's think about whether we need this or what changes we can make to it.
This aspect serves as a sort of internal audit of email sources and
authentication. DMARC's been very, very useful for that.

Then there's discovering spoofing sometimes, of course.

Neil
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] finer grained org domain

2020-08-18 Thread Seth Blank
There is a ticket for tree walk: https://trac.ietf.org/trac/dmarc/ticket/68

Please hold the conversation until the chairs open that thread.

Seth, as Chair

On Tue, Aug 18, 2020 at 9:49 AM Dave Crocker  wrote:

> On 8/18/2020 9:43 AM, Tim Wicinski wrote:
>
> I do think the tree walk deserves another look.   Years back when it was
> brought up,
> there was lots of talk of overloading resolvers. But as someone who spent
> the past
> several years looking at the DNS query data of good sized SaaS domains,
> DMARC lookups
> (or even DMARC NXDOMAINs) were on the low end of the spectrum.  Nowadays,
> all web
> properties point to CDNs, et al with 30 second TTLs.
>
> To be entirely obvious:
>
>  badactor.a.b.c.d.e.f.g.h.i.j.k.l.m.n.o.p.yougetheidea.example.com
>
> produces a possible denial of service attack.  hence, no tree-walking.
>
> d/
>
> --
> Dave Crocker
> Brandenburg InternetWorkingbbiw.net
>
> ___
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>


-- 

*Seth Blank* | VP, Standards and New Technologies
*e:* s...@valimail.com
*p:* 415.273.8818


This email and all data transmitted with it contains confidential and/or
proprietary information intended solely for the use of individual(s)
authorized to receive it. If you are not an intended and authorized
recipient you are hereby notified of any use, disclosure, copying or
distribution of the information included in this transmission is prohibited
and may be unlawful. Please immediately notify the sender by replying to
this email and then delete it from your system.
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] finer grained org domain

2020-08-18 Thread Dave Crocker

On 8/18/2020 9:43 AM, Tim Wicinski wrote:
I do think the tree walk deserves another look.   Years back when it 
was brought up,
there was lots of talk of overloading resolvers. But as someone who 
spent the past
several years looking at the DNS query data of good sized SaaS 
domains, DMARC lookups
(or even DMARC NXDOMAINs) were on the low end of the spectrum.  
Nowadays, all web

properties point to CDNs, et al with 30 second TTLs.


To be entirely obvious:

badactor.a.b.c.d.e.f.g.h.i.j.k.l.m.n.o.p.yougetheidea.example.com

produces a possible denial of service attack.  hence, no tree-walking.

d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] finer grained org domain

2020-08-18 Thread Dave Crocker

On 8/18/2020 9:39 AM, John R Levine wrote:
We've spun our wheels a lot trying to figure out a better way to find 
the organizational domain than for everyone to download the Mozilla 
PSL, but not about changing it to a tree walk.


If we could come up with a better way for domains to publish their own 
boundaries (see https://github.com/jrlevine/bound) then that would be 
easy. 


And for completeness:

    DNS Perimeter Overlay

https://tools.ietf.org/id/draft-dcrocker-dns-perimeter-01.html

(John thinks it's the same as his, but it's not...)

d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] finer grained org domain

2020-08-18 Thread Tim Wicinski
Speaking not as a chair...

I do think the tree walk deserves another look.   Years back when it was
brought up,
there was lots of talk of overloading resolvers. But as someone who spent
the past
several years looking at the DNS query data of good sized SaaS domains,
DMARC lookups
(or even DMARC NXDOMAINs) were on the low end of the spectrum.  Nowadays,
all web
properties point to CDNs, et al with 30 second TTLs.

tim


On Tue, Aug 18, 2020 at 12:39 PM John R Levine  wrote:

> On Tue, 18 Aug 2020, Autumn Tyr-Salvia wrote:
> > * Departments sending transactional email - move them to dedicated
> subdomains (this is where really complex institutions would benefit from
> walking the domain tree instead of always inheriting from the org domain)
> >
> > Is inheritance walking the domain tree a topic that has already been
> discussed ad nauseam? This seems like an interesting point of discussion,
> but I also haven't been participating on this list for ten years and don't
> want to get into it if this is a topic everyone is tired of or that has no
> possibility of change.
>
> We've spun our wheels a lot trying to figure out a better way to find the
> organizational domain than for everyone to download the Mozilla PSL, but
> not about changing it to a tree walk.
>
> If we could come up with a better way for domains to publish their own
> boundaries (see https://github.com/jrlevine/bound) then that would be
> easy.
>
> Regards,
> John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY
> Please consider the environment before reading this e-mail. https://jl.ly
>
> ___
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] finer grained org domain

2020-08-18 Thread John R Levine

On Tue, 18 Aug 2020, Autumn Tyr-Salvia wrote:

* Departments sending transactional email - move them to dedicated subdomains 
(this is where really complex institutions would benefit from walking the 
domain tree instead of always inheriting from the org domain)

Is inheritance walking the domain tree a topic that has already been discussed 
ad nauseam? This seems like an interesting point of discussion, but I also 
haven't been participating on this list for ten years and don't want to get 
into it if this is a topic everyone is tired of or that has no possibility of 
change.


We've spun our wheels a lot trying to figure out a better way to find the 
organizational domain than for everyone to download the Mozilla PSL, but 
not about changing it to a tree walk.


If we could come up with a better way for domains to publish their own 
boundaries (see https://github.com/jrlevine/bound) then that would be 
easy.


Regards,
John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail. https://jl.ly

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC failure scenarios

2020-08-18 Thread Dotzero
On Tue, Aug 18, 2020 at 6:49 AM Douglas E. Foster  wrote:

> You cannot make sense of it, John.   I understand the difference between
> submssion and SMTP.
>
> The asserted increase in complexity is not from adding a single signature,
> it is the requirement to apply a different signature to every message
> depending on the generated From domain.
>
>- Are applications like the one the Alessandro mentioned readily
>available and easily implemented, so that conditional signatures are no
>hindrance to DMARC compliance?
>- If so, is third-party cooperation easily achieved and no obstacle to
>DMARC implementation?
>
> These are questions for the consultants who have done a lot of this work.
>
> DF
>

Not as a 3rd party, but we were  doing ad-hoc signing for a large number of
domains (hundreds) at our outbound border MTAs at scale -10s of millions of
messages an hour, with the ability to scale much much larger for holiday
peaks. This was done with both Ironport and MessgeSystems implementations.
It's literally a very little bit of logic and code. As long as you have the
private keys it's as simple as choosing the path to the correct signing key
based on having the From domain. This was at various points done in Python
and Lua.

Michael Hammer
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC failure scenarios

2020-08-18 Thread Douglas E. Foster
You cannot make sense of it, John.   I understand the difference between 
submssion and SMTP.

The asserted increase in complexity is not from adding a single signature, it 
is the requirement to apply a different signature to every message depending on 
the generated From domain.
Are applications like the one the Alessandro mentioned readily available and 
easily implemented, so that conditional signatures are no hindrance to DMARC 
compliance?   If so, is third-party cooperation easily achieved and no obstacle 
to DMARC implementation?
These are questions for the consultants who have done a lot of this work.

DF


From: "John Levine" 
Sent: 8/17/20 10:12 PM
To: dmarc@ietf.org
Cc: fost...@bayviewphysicians.com
Subject: Re: [dmarc-ietf] DMARC failure scenarios
In article <0762f9ada48c4c9eaef06e16a49a2...@bayviewphysicians.com> you write:
>-=-=-=-=-=-
>
>Does this scenario correctly characterize how organizations may be unable to 
>move past p=none with breaking things?

As far as I can made sense of it, no.

>a) A vendor application detects an event, looks up in a database for sender 
>name (client contact) and recipient list.
>
>b) The application connects to a mail server via IMAP, and sends the message 
>using something like application@vendordomain
>for the SMTP from and cllentcontact@clientdomain as the Message from. The 
>client domain becomes especially important if
>the recipients are in a different domain than the client. An example might be 
>an HVAC system operated by a vendor, on
>behalf of the building manager, which needs to communicate with the building 
>tenants. ...

Again, no. You're confusing submission with SMTP. I have a printer
that sends me e-mail when it's out of paper, which it does by sending
mail to my submission server, not directly to me. If I were checking DMARC
on the messages, they would easily pass since the submission server adds
DKIM signatures.

>Then the client wants to implement DMARC
>--
>
>d) The client develops a list of all of its third-party mailers and tells the 
>third parties to begin applying the client's
>DKIM signature to their messages. This adds a boatload of complexity to the 
>vendor's application, since he needs a
>different applied signature for each client. It requires either major changes 
>to the application, a more sophisticated
>mail server, or a special box simply to sit in front of the mail server to 
>detect and apply the correct signature. None of
>these seem like generic off-the-shelf solutions. I would not know where to buy 
>that capability if I needed it today.

Again, no. I believe that devices that send mail do what they've
always done, send it to a submission server for further delivery. The
"special box" has been there all along.

R's,
John


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC failure scenarios

2020-08-18 Thread Alessandro Vesely

On Tue 18/Aug/2020 03:56:12 +0200 Douglas E. Foster wrote:

d) The client develops a list of all of its third-party mailers and 
tells the third parties to begin applying the client's DKIM signature 
to their messages.   This adds a boatload of complexity to the 
vendor's application, since he needs a different applied signature for 
each client.   It requires either major changes to the application, a 
more sophisticated mail server, or a special box simply to sit in 
front of the mail server to detect and apply the correct signature. 
  None of these seem like generic off-the-shelf solutions.   I would 
not know where to buy that capability if I needed it today.





It doesn't have to add much complexity.  My DKIM filter[*] looks up 
the signing domain in a configured folder where it can find the 
selector and the private key —actually a symbolic link.  The signing 
domain can be configured to be the domain of the From: field.


The app just has to use the client's domain for both the envelop and 
the header, which is actually simpler than the pre-DMARC case.


The client must publish the public key supplied by the vendor and 
include the vendor's SPF stuff in its record.  That's not automated, 
AFAIK, although dynamic DNS and suitable scripts could do.



Best
Ale
--

[*] http://www.tana.it/sw/zdkimfilter/zdkimfilter.html#signing

























___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] non-mailing list use case for differing header domains

2020-08-18 Thread Autumn Tyr-Salvia
I have seen Jesse mention something along these lines a couple of times:

* Departments sending transactional email - move them to dedicated subdomains 
(this is where really complex institutions would benefit from walking the 
domain tree instead of always inheriting from the org domain)

Is inheritance walking the domain tree a topic that has already been discussed 
ad nauseam? This seems like an interesting point of discussion, but I also 
haven't been participating on this list for ten years and don't want to get 
into it if this is a topic everyone is tired of or that has no possibility of 
change.



Thanks,

Autumn Tyr-Salvia
atyrsal...@agari.com
Agari Principal Customer Success Engineer


From: dmarc  on behalf of Jesse Thompson 

Sent: Monday, August 17, 2020 4:39 PM
To: John Levine ; dmarc@ietf.org 
Subject: Re: [dmarc-ietf] non-mailing list use case for differing header domains

On 8/7/20 9:32 PM, John Levine wrote:
>> We need spoofing protection for all of our domains without being told we're 
>> misdeploying.
>
> I would be interested to better undertstand the meaning of "need"
> here. It is my impression that most people vastly overestimate how
> much of a phish target they are. Paypal and big banks certainly are,
> other places, a lot less so.

(Sorry, I was on a much-needed vacation.)

Ok, that's fair, I should have realized that one was over-stated.  *Need* would 
imply that domain-spoofing is more common than it is in reality.

Cybersecurity-minded folk in EDU tend to equate observed inbound phishing with 
spoofing (even though most phishing is spoofing the display name and message 
bodies, not the domain) and conclude that they *need* DMARC without really 
understanding the nuances.  Given the opportunity that DMARC marketing 
promises, they definitely *want* inbound DMARC enforcement for domain-spoofing 
of inbound mail (they'll defer to the email-minded folk to figure out the local 
policy exemptions, ARC, etc), as well as *want* domain policies that prevent 
the potential domain spoofing scenarios of owned domains (again, the 
email-minded folk will figure out how to actually "misdeploy" DMARC)..  To 
them, it's just a checkmark towards some "maturity" benchmark that they use to 
compare to their peers.

Email-minded folk in EDU, knowing that DMARC doesn't really have much practical 
application to phishing, like having the observability that DMARC provides, as 
well as the hammer that moving past p=none provides as a way to coerce their 
complex, decentralized institution into a more sustainable operation:

* Departments sending transactional email - move them to dedicated subdomains 
(this is where really complex institutions would benefit from walking the 
domain tree instead of always inheriting from the org domain)

* People sending user email from random places - move them to authenticated 
submission (preferably OAuth - since basic authentication is the reason why so 
many passwords are exposed)

The latter scenario is interesting because a single user sending from a random 
place doesn't really show up in DMARC aggregate reports.  It may show up in 
forensic reports, but it is easily lost in the noise.  (SPF macros might be 
another way to get fine-grained observability, but that's a privacy leakage 
IMO.)

In the end, it still results in:
* That person wouldn't end up on our radar for communication
* That person wouldn't understand what the message is about, even if we did 
communicate with them
* That person wouldn't comply, even if they understood
* Once enforcement is in place, that person will complain and leverage every 
ounce of their political influence to resist.  (It's really fun when your own 
users threaten lawsuits against you - that doesn't happen in Corporate IT.)

I'm kind of rambling now, I see.  Hope you find it enlightening, regardless!

Jesse

___
dmarc mailing list
dmarc@ietf.org
https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fdmarc&data=02%7C01%7Catyrsalvia%40agari.com%7C07fe631db10e49cfa46508d84306d0b9%7C05773123385e420d844ef01aee5e37ab%7C0%7C0%7C637333043846011888&sdata=GEKpu8y3KvA7Zkt0VJmeKz4KPwvSay51cj5SDniQAUo%3D&reserved=0
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] non-mailing list use case for differing header domains

2020-08-18 Thread Alessandro Vesely
On Tue 18/Aug/2020 01:39:16 +0200 Jesse Thompson wrote:
> On 8/7/20 9:32 PM, John Levine wrote:
>>> We need spoofing protection for all of our domains without being told we're 
>>> misdeploying.
>>
>> I would be interested to better undertstand the meaning of "need"
>> here. It is my impression that most people vastly overestimate how
>> much of a phish target they are. Paypal and big banks certainly are,
>> other places, a lot less so.
> 
> (Sorry, I was on a much-needed vacation.)


Much *needed*?  Oh, well...


> Ok, that's fair, I should have realized that one was over-stated.  *Need* 
> would imply that domain-spoofing is more common than it is in reality.


Yes, domain spoofing is common.  You don't need to be PayPal to be spoofed.  
Then, one can say it's an innocuous kind of abuse.  Since you're not PayPal, 
it's just noise.  Yet, in a perfect word, I'd opt to avoid it.


> Cybersecurity-minded folk in EDU tend to equate observed inbound phishing 
> with spoofing (even though most phishing is spoofing the display name and 
> message bodies, not the domain) and conclude that they *need* DMARC without 
> really understanding the nuances.  Given the opportunity that DMARC marketing 
> promises, they definitely *want* inbound DMARC enforcement for 
> domain-spoofing of inbound mail (they'll defer to the email-minded folk to 
> figure out the local policy exemptions, ARC, etc), as well as *want* domain 
> policies that prevent the potential domain spoofing scenarios of owned 
> domains (again, the email-minded folk will figure out how to actually 
> "misdeploy" DMARC).  To them, it's just a checkmark towards some "maturity" 
> benchmark that they use to compare to their peers.


Nice synthesis.  They believe DMARC works as advertised.  What does it take to 
believe that DMARC /could/ work as advertised?


> Email-minded folk in EDU, knowing that DMARC doesn't really have much 
> practical application to phishing, like having the observability that DMARC 
> provides, as well as the hammer that moving past p=none provides as a way to 
> coerce their complex, decentralized institution into a more sustainable 
> operation:
> 
> * Departments sending transactional email - move them to dedicated subdomains 
> (this is where really complex institutions would benefit from walking the 
> domain tree instead of always inheriting from the org domain)


This is a good idea even without DMARC concerns.


> * People sending user email from random places - move them to authenticated 
> submission (preferably OAuth - since basic authentication is the reason why 
> so many passwords are exposed)


This sound just like an email-client configuration problem.  It shouldn't be so 
hard.


> The latter scenario is interesting because a single user sending from a 
> random place doesn't really show up in DMARC aggregate reports.


Why not?  If they send to DMARC-compliant receivers, their aggregate reports 
should show records without the right MSA signature, not even failed, and 
foreign domain authentications only.  That doesn't tell which users 
misconfigured their client, but gives a good idea of the level of user 
education one has achieved.

It should also show which domains users tend to use for submission, in case an 
organization wants to automate third-party authorization...


Best
Ale
-- 























___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc