Re: [dmarc-ietf] Response to a claim in draft-crocker-dmarc-author-00 security considerations

2020-07-17 Thread Dave Crocker on behalf of Kurt Andersen
In article  you write:
>> I'd counter by personal anecdote that we have had to undertake 
>> security remediations because of messages which were forwarded by our 
>> CEO to other employees for responses which happened to contain malware 
>> and/or bad links. ...

>Except that the problem isn't the email address, especially since almost 
>no one sees those any more.  And the display name isn't protected.

Do we have any recent numbers on how many users see the From address rather
than or in addition to the display name?

Signed,
uh, someone

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC threat analysis needed

2020-07-17 Thread Doug Foster
Hector, I think I am reading RFC 5016 section 5.3 differently from you.   My
paraphrase:

This SSP assertion is allowed:
"Example.com says:  Example.com messages can be considered authorized if and
only if they have a signature from our domain."

This SSP assertion is not allowed:
"Example.com says:  Example.com messages can be considered authorized if and
only if they have a signature from our domain, and DO NOT have a signature
from OtherGuy.com domain"

The second assertion is not allowed because Example.com should not be
"impugning" the validity of a signature from OtherGuy.com.   Example.com is
not empowered to be a reputation service for unrelated entities.

However, the language of this section directly supports the DMARC
implementation. 

To solve the MLM problem, you need to explain how MLMs become authorized by
the author domain to send on behalf of the author, without authorizing
spammers to send on behalf of the author.

It seems that we have an architectural problem because the current
infrastructure assumes a single author. In reality, we have multiple
situations that involve multiple authors.   For example, this message
includes your entire note, and your note includes part of Jim's note.   But
those notes no longer have valid digital signatures, so there is no proof
that I have represented you correctly, and it is technically possible for me
to rewrite your comments entirely.

A similar problem occurs if my spam filter adds content to a message as it
arrives into my domain, content that is really intended for "internal use
only".   The additions will break incoming signatures, although this is
tolerable because signatures are not checked again, as long as the message
remains internal.   But if a message is  auto-forwarded to another domain,
the additions are probably inappropriate and the message no longer passes
Sender Authentication.   I would like to be able to preserve the original
signature throughout, and remove the internal spam filter content when the
message leaves the internal domain.

Consequently, I am dreaming about an architecture that allows mediators to
add content under their own signature without voiding the signature of other
sections.   The concept is a combination of John's ARC project, which uses
nested signatures , and Murray's tagged content, which acts as a change log.
It would allow an MUA to clearly identify the content contributed by the
different authors, and it would contribute to solving the MLM problem.It
is easier to imagine how it could be used to identify additions, such as a
message footer, then to identify alternations, such as a URL rewrite.   And
the whole thing may be too complicated to implement in a way that is upward
compatible with the present architecture.   But it would be a better model
of reality.

Doug Foster



-Original Message-
From: dmarc [mailto:dmarc-boun...@ietf.org] On Behalf Of Hector Santos
Sent: Friday, July 17, 2020 12:02 PM
To: dmarc@ietf.org
Subject: Re: [dmarc-ietf] DMARC threat analysis needed

On 7/15/2020 8:14 PM, Jim Fenton wrote:
> Unburying this from a different thread.
>
> I'm really struggling to understand what problem(s) DMARC is trying to 
> solve. The most common answer I have heard says something about 
> "defending brand identity", which is a marketing, not a technical 
> consideration.
>
> IMO we need a threat analysis, ala RFC 4686 or RFC 5016, to define the 
> technical requirements. I am NOT volunteering to do this.

Jim, if we review both RFC4686 and RC5016, I believe we might find there is
not much to be changed. However, imo, something will have to be done
regarding RFC5016 section 5.3 item:

   https://tools.ietf.org/html/rfc5016#section-5.3
   5.3.  Practice and Expectation Requirements

   10. SSP MUST NOT provide a mechanism that impugns the existence of
   non-first party signatures in a message.  A corollary of this
   requirement is that the protocol MUST NOT link practices of first
   party signers with the practices of third party signers.

INFORMATIVE NOTE: the main thrust of this requirement is that
practices should only be published for that which the publisher
has control, and should not meddle in what is ultimately the
local policy of the receiver.

This provision with strict protocol language "MUST NOT" prohibits any DKIM
Policy protocol, formally called SSP "Sender Signing Practices" 
and now today, DMARC, from impugning on 3rd party policies such as how a MLM
operator via local policy exceptions can ignorantly and blinding destroy the
integrity and resign the mail instead of just honoring it.

This language would have be updated or removed and just leave the implicit
idea that local policy always prevails in all SMTP situations.

Have a good weekend, be safe.

--
Hector Santos,
https://secure.santronics.com
https://twitter.com/hectorsantos


___
dmarc mailing list
dmarc@ietf.org
https://w

Re: [dmarc-ietf] Response to a claim in draft-crocker-dmarc-author-00 security considerations

2020-07-17 Thread Dave Crocker

On 7/17/2020 11:30 AM, Kurt Andersen (IETF) wrote:

Dave writes:

However, for all of the real and serious demonstration of users' being 
tricked by deceptive or false content in a message, there is no evidence that 
problematic content in a field providing information about message's author 
directly contributes to differential and problematic behavior by the end user.

I'd counter by personal anecdote that we have had to undertake 
security remediations because of messages which were forwarded by our 
CEO to other employees for responses which happened to contain malware 
and/or bad links. Presumably, the cachet which was carried along with 
"important person says look into this" overcame whatever native 
caution or skepticism might have prevented them from falling prey 
otherwise.



Except that the problem isn't the email address, especially since almost 
no one sees those any more.  And the display name isn't protected.


I'm not quite motivated enough, or I'd have had this message contain:

   Kurt Anderson 

and it would have passed the necessary tests...

In other words, when we talk about threats and we talk about 
mitigations, we need to be careful that they align properly.


(I suspect there's some irony in my choosing 'align' but it was not 
intentional, though I'll take the extra point for noting it.)


--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


[dmarc-ietf] Response to a claim in draft-crocker-dmarc-author-00 security considerations

2020-07-17 Thread Kurt Andersen (IETF)
Dave writes:

However, for all of the real and serious demonstration of users' being
tricked by deceptive or false content in a message, there is no
evidence that problematic content in a field providing information
about message's author directly contributes to differential and
problematic behavior by the end user.

I'd counter by personal anecdote that we have had to undertake security
remediations because of messages which were forwarded by our CEO to other
employees for responses which happened to contain malware and/or bad links.
Presumably, the cachet which was carried along with "important person says
look into this" overcame whatever native caution or skepticism might have
prevented them from falling prey otherwise.

--Kurt
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC threat analysis needed

2020-07-17 Thread Hector Santos

On 7/15/2020 8:14 PM, Jim Fenton wrote:

Unburying this from a different thread.

I'm really struggling to understand what problem(s) DMARC is trying to
solve. The most common answer I have heard says something about
"defending brand identity", which is a marketing, not a technical
consideration.

IMO we need a threat analysis, ala RFC 4686 or RFC 5016, to define the
technical requirements. I am NOT volunteering to do this.


Jim, if we review both RFC4686 and RC5016, I believe we might find 
there is not much to be changed. However, imo, something will have to 
be done regarding RFC5016 section 5.3 item:


  https://tools.ietf.org/html/rfc5016#section-5.3
  5.3.  Practice and Expectation Requirements

  10. SSP MUST NOT provide a mechanism that impugns the existence of
  non-first party signatures in a message.  A corollary of this
  requirement is that the protocol MUST NOT link practices of first
  party signers with the practices of third party signers.

   INFORMATIVE NOTE: the main thrust of this requirement is that
   practices should only be published for that which the publisher
   has control, and should not meddle in what is ultimately the
   local policy of the receiver.

This provision with strict protocol language "MUST NOT" prohibits any 
DKIM Policy protocol, formally called SSP "Sender Signing Practices" 
and now today, DMARC, from impugning on 3rd party policies such as how 
a MLM operator via local policy exceptions can ignorantly and blinding 
destroy the integrity and resign the mail instead of just honoring it.


This language would have be updated or removed and just leave the 
implicit idea that local policy always prevails in all SMTP situations.


Have a good weekend, be safe.

--
Hector Santos,
https://secure.santronics.com
https://twitter.com/hectorsantos


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc