Re: [dmarc-ietf] Header munging, not ARC, can solve the mailing list problem

2020-06-22 Thread Douglas E. Foster
To the chairs:
It has become clear that we do not have consensus on the issue of 
content-altering mailing lists.

Despite the diversity of viewpoints the number of persons involve in the 
discussion is fairly small.
Have you identified the stakeholder groups that should be represented in the 
DMARCbis process for it to be considered sufficiently representative?
Have you made any assessment of whether all such groups are in some way 
represented in this discussion?
Do we need to do some outreach to ensure that all stakeholder groups are 
involved

Of course, adding additional voices may make the consensus problem more 
difficult.  What is your mechanism for resolving consensus problems?

Doug Foster


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Header munging, not ARC, can solve the mailing list problem

2020-06-22 Thread Jesse Thompson
On 6/22/20 6:23 AM, Alessandro Vesely wrote:
> The fact that it cannot be set by a MUA implies Sender: already lost
> its menial meaning.  So it became a Mediator sort of thing.  This list
> sets it to "dmarc" .  Does anybody use it, or
> ever happened o take a look at it?

Yes, and I assume that's partially why the OP (who I was posting on behalf of) 
brought this Sender dilemma up in the first place.

Outlook on the Web displays:

dmarc  on behalf of dcroc...@gmail.com

and for those domains that have DMARC policies

dmarc  on behalf of 
todd.herr=40valimail@dmarc.ietf.org

Jesse

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Header munging, not ARC, can solve the mailing list problem

2020-06-22 Thread Hector Santos

On 6/21/2020 3:44 PM, Douglas E. Foster wrote:

Dave Crocker writes:

 The practical problem with From: field munging by MLMs that are
 otherwise trying to relay a largely-unmodified messages, is that they
 effective destroy author information, by putting in a different email
 address.

This is helpful for identifying the three key stakeholder needs:

1) MLM's such as IETF want to alter the author's submission.

2) Authors like Hector want their submission left unmodified


List Servers has historically modified submissions, the body and 
subject line. It is part of the "package" per se.  Burned in. While 
problematic for DKIM, I doubt that will ever change.


However, my only concern has been always with the RFC5322.From address 
rewriting kludge when done in a blind way.  If the MLM is aware of 
DMARC, then it is intentional ignorant of a security protocol. While 
it may have been done in certain legacy distributions, it was not a 
common practice for List Servers to rewrite the 822/2822/5322.From 
field. What was "rewritten" was the return address for errors & 
bouncing back to the MLM list agent.


A kludge is by definition (by Google) "an ill-assorted collection of 
parts assembled to fulfill a particular purpose."  We ideally view a 
kludge as a temporary solution until a real fix is obtained. But as we 
have learned by practice, a kludge, a temporary solution left 
unaddressed, has a tendency to become permanent. So if the IETF is 
going to sanction this kludge, then we should get it officially IETF 
reviewed, documented, and not via some highly subjective wiki 
primarily authored by one person who believed this was the right thing 
to do without foreseeing the consequences.



3) Users like Dave want accurate author information in the MUA.

There is no legal corollary for "largely-unmodified".  If I use whiteout on a
signed document, spill an ink bottle on hallf of the signature, or replace the
special lawyer-only staples with standard staples, the document ceases to be
trusted and is probably unenforcable.

The nature of the changes made by the IETF mailing list renders the reverse
transformation impossible, so there is no way to validate the transformed
document against the original unless the original is obtained, yet the purpose
of the transformatiin is to hide the original.  A real solution has to eliminate
this operation.  Hector is right.


Imo, the resigner performing the rewriting, SHOULD resign using a 
secured resigner domain with the same level protection sought by the 
original author domain.


This would be consistent with the ietf.org only rewriting for domains 
with a p=reject|quarantine DMARC policy. It uses _dmarc.ietf.org for 
the rewriting domain.  Since this _dmarc.ietf.org domain only exist 
for rewriting a p=reject|quarantine domain, it would be technically 
logical for _dmarc.ietf.org to also have a p=reject|quarantine policy 
as well.   This includes using _dmarc.ietf.org for the return address 
to kept with the expected DMARC alignment. That will maintain the 
DMARC aligned protection for the original submission and resigner 
distribution.



--
Hector Santos,
https://secure.santronics.com
https://twitter.com/hectorsantos


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Header munging, not ARC, can solve the mailing list problem

2020-06-22 Thread devel2020
Hi,

Le 21/06/2020 à 21:44, Douglas E. Foster a écrit :
> 
> There is no legal corollary for "largely-unmodified".  [...]

Then what? An overwhelming majority of users need e-mail for day-to-day
communication, not for binding legal contracts. "Largely-unmodified" as
mailing-lists have been doing it for 40 years is good enough (we usually
don't hear authors complaining that they were impersonated).

People who need a high-integrity validation for each and every message
before reading it are the minority. The rest of us would rather keep our
communication possibilities unimpaired, even if it means dealing with a
bit of spam and use cryptography or out-of-band checks for important
business.

Not to say that DMARC's validation is not valuable per se. But asking
mailing-list (or other) users to jump through hoops to simply
communicate as they have for 40 years is incredibly arrogant.

Cheers,
Baptiste

P.S.: and no, "then don't use DMARC" cannot be the answer. Some time
down the road, it will be forced on us by the large mailhosts, who have
a business interest in curbing spam. So it'd better be done right.

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Mediation

2020-06-22 Thread Hector Santos

Mailman and Sympa seem to tbe the popular open source list managers.

LISTSERV is an expensive commercial product and is I gather popular
among users who have money to pay for an SLA.


Thanks, I've reached out to all three and will report back.



This exchange does not read right.

Decisions like this should not be made on the basis of open source, 
nor commercial.  The magical Pareto margin with just those three 
mentioned may not be reached. There are others out there that may not 
be represented in this group, and there are those like my own 
commercial add-on product line, Wildcat! List Server, which does come 
with an optional SLA and it should not matter if it does or not, a 
smaller entity but has been "around" far longer than most except ListServ?


https://secure.santronics.com/products/winserver/wcListServer.php

I provided a guideline to a MLS approach back in the 2006 DSAP proposal:

https://tools.ietf.org/html/draft-santos-dkim-dsap-00#section-3.3

   3.3.  Mailing List Servers

   Mailing List Servers (MLS) applications who are compliant with DKIM
   and DSAP operations, SHOULD adhere to the following guidelines:

   Subscription Controls

  MLS subscription processes should perform a DSAP check to
  determine if a subscribing email domain DSAP policy is restrictive
  in regards to mail integrity changes or 3rd party signatures.  The
  MLS SHOULD only allow original domain policies who allow 3rd party
  signatures.

   Message Content Integrity Change

  List Servers which will alter the message content SHOULD only do
  so for original domains with optional DKIM signing practices and
  it should remove the original signature if present.  If the List
  Server is not going to alter the message, it SHOULD NOT remove the
  signature, if present.

I have since then employed a very simple first item, Prevent 
Subscription, added preventing submissions from restrictive domains 
and avoided the more complex, integrity change part.


I understand there are those who want to bypass the DKIM Policy 
security to be able to blindly resign any domain regardless of the 
submission's direct mail policy. But my take is, if a MLS is going to 
"change" then we should recommend to consider the preemption approach 
by simply honoring the policy.


I hope to read from the report those 3 packages are willing to offer 
the option to prevent restrictive domains. Even if rewriting remains 
as an IETF "sanctioned" option (I hope not), the recommendation should 
suggest a SHOULD to incorporate it as an authorized permission concept 
with the subscriber:


Your domain has a restrictive DMARC policy. Here are your options:

1) Use another non-restrictive domain,
2) Prevent your domain from subscription and submission, or
3) Authorize the Rewriting of your secured domain to a secured 
resigner domain.


Thanks

--
Hector Santos,
https://secure.santronics.com
https://twitter.com/hectorsantos


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Header munging, not ARC, can solve the mailing list problem

2020-06-22 Thread Alessandro Vesely
On 2020-06-21 7:32 p.m., Dave Crocker wrote:
> On 6/18/2020 12:46 AM, Alessandro Vesely wrote:
>> "Authoring" can have subtly different acceptations, though.  The
>> exact sentence is:
>>
>>  The "From:" field specifies the author(s) of the message,
>>    that is, the mailbox(es) of the person(s) or system(s) responsible
>>    for the writing of the message.
>> [https://tools.ietf.org/html/rfc5322#section-3.6.2]
>>
>> That is not so far from real.  The term "writing" sounds ambiguous,
>> as it is not clear whether it means "typing" or "publishing", in the
>> case of public mailing lists.  Given that Sender: is dedicated to
>> the typist, I'd opt for the latter interpretation.
> 
> In simple terms, author is the creator of the content and sender is
> the agent for getting the content processed.  The latter was
> distinguished to provide a means of improving accountability if there
> were problems.  When SMTP was created, later, MailFrom was added as an
> address for sending message handling reports.
> 
> When first specified, Sender: was to cover the case of someone doing
> the online work, on behalf of  authors who weren't online, or at least
> not online for processing the message.  Back in those days, that was
> not uncommon.  Even if the author officially had an online presence,
> they often did not do the typing.
> 
> (To underscore this a bit: in most of the business world, knowing how
> to type was deemed a menial, secretarial skill and not appropriate for
> an executive. To carry this a bit further: around the time RFC733 was
> developed, in 1977, I managed to get the person in charge of
> department administration functions to authorize my getting a desk
> with a right-hand return, where a secretary's typewriter would go, and
> where I put my terminal. This was extremely unusual and the immediate,
> similar requests from all the other staff like me were rejected. Also,
> when I announced my departure, the next year, the admin was instantly
> flooded with requests for my desk...)


Thank you for sharing the above historic perspective.


> [...]
> 
> So, in abstract terms, if I go to a greeting card site and have it
> send a greeting on my behalf, the From: field should be my own email
> address and Sender: should an address at the greeting card company. 
> But I said 'abstract' because current realities mean this isn't as
> useful an arrangement as the theory intended.


Agreed.  I'd derive it's time to revise the theory, however slightly.


> I believe this is because Sender: is not reliably present. Hence, it
> literally cannot be relied upon.  The Sender field is not created
> reliably to indicate such distinctions and the receive side does not
> reliable note the distinctions.


The fact that it cannot be set by a MUA implies Sender: already lost
its menial meaning.  So it became a Mediator sort of thing.  This list
sets it to "dmarc" .  Does anybody use it, or
ever happened o take a look at it?

See below for an alternative arrangement.


>> For a newspaper, if you pardon the analogy, the masthead is more
>> visible than columnist signatures at the end of the articles.  For a
>> mailing list, publisher visibility used to be provided by subject
>> tags, leaving the From: intact.  Why?  Presumably, because it just
>> worked that way.  However, if the MLM is the system responsible for
>> writing, not modifying From: should be considered a violation.
> 
> If a Mediator makes 'substantial' changes to a message, then it can be
> considered a new and different message?  Yes, but note that we have no
> objective criteria for this.  That's why I class this reference to
> 'publisher' as a business issue rather than a technical one.  (And an
> ethical one, as some wayward journalists discover when they claim to
> be quoting someone but it turns out the reporter invented the content.)


You certainly recall the level of sophistication described in Nelson's
Literary Machines.  Email is nowhere near that precision, therefore we
/have/ to relegate such issues to ethical or business ones.

As you say, an add-on to check quotation authenticity would require
access to the whole thread, and even then it wouldn't be trivial to
get it done.


> However I think that referencing the role of an MLM as 'publisher' can
> be helpful to remind us that MLMs have their own agency and can,
> legitimately, make all sorts of changes.  Whether authors and
> recipients like those changes is a non-technical matter.
> 
> The practical problem with From: field munging by MLMs that are
> otherwise trying to relay a largely-unmodified messages, is that they
> effective destroy author information, by putting in a different email
> address.
> 
> In practical terms, today, the MLMs arguably don't have a choice.  But
> it still can be helpful to understand the problems created by this
> alternation.


IMHO, the choice is how to do rewriting given the constraint that the
domain of From:'s addr-spec must match d= in MLM's