Re: [dmarc-ietf] Response to a claim in draft-crocker-dmarc-author-00 security considerations

2020-07-26 Thread Dotzero
On Sun, Jul 26, 2020 at 9:42 AM Dave Crocker  wrote:

> On 7/21/2020 12:32 PM, Dotzero wrote:
>
> The original DMARC effort was, in fact, to detect actual cases of
>> spoofing, namely unauthorized use of a domain name by outside actors.
>>
>> Different problem.
>>
>
> Actually, part of the effort was to enable Sending domains to identify
> their own mail that was being sent without aligned DKIM signing or from
> places not authorized through SPF - in other words, not properly authorized
> but legitimate, hence feedback loops.
>
>
> As I recall, this was /not/ part of the original purpose of DMARC, which
> was discussed strictly in terms of mail from bulk senders.
>
> What you describe was,  rather, the basis for the later use, which is what
> then started causing problems for mail going through Mediators.
>

Notice I didn't use the word "users" Many of the sending domains in the
original effort had/have a complex number of mail streams for transactional
mail from multiple domains (in some cases thousands), including through
multiple 3rd parties. This is what I was referring to.

Michael Hammer.
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Response to a claim in draft-crocker-dmarc-author-00 security considerations

2020-07-26 Thread Douglas E. Foster
The link provided by Laura Atkins on 7/21 is relevant and worth 
reading.Sent from my Verizon, Samsung Galaxy smartphone

 Original message 
From: Dave Crocker  Date: 
7/26/20  2:35 PM  (GMT-05:00) To: hsan...@isdg.net 
Cc: dmarc@ietf.org Subject: Re: [dmarc-ietf] Response 
to a claim in draft-crocker-dmarc-author-00 security considerations 

On 7/26/2020 11:29 AM, Hector Santos wrote:
> Dave, for a number of years of practice, depending in the system or 
> service, users have been provided with trust-related decisions . Do 
> you need real examples? 


There is a difference between providing a signal, versus its getting 
received and use.

Please provide objective data that these signals are being perceived and 
used effectively by end users.

d/

-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Response to a claim in draft-crocker-dmarc-author-00 security considerations

2020-07-26 Thread Hector Santos

On 7/26/2020 2:34 PM, Dave Crocker wrote:

On 7/26/2020 11:29 AM, Hector Santos wrote:

Dave, for a number of years of practice, depending in the system or
service, users have been provided with trust-related decisions . Do
you need real examples?



There is a difference between providing a signal, versus its getting
received and use.

Please provide objective data that these signals are being perceived
and used effectively by end users.


Dave, I made a mistake to preempt the remaining comment by saying  "Do 
you need real examples?"  I thought I had removed it.  It was rude. Sorry.


Please read the remaining part in my previous message with my input 
explaining how GMAIL provides Trust-Related decision options to the 
layman user mail reader.


There is a lot more to this and I need to go.   I think you are 
correct in suggesting the user has no input in the protocols are are 
looking for.   Its the deterministic vs subjective/learning/heuristics 
protocols issue again.  In reality, we don't have the latter (IETF 
public domain standard for a non-deterministic filtering engine). 
Unless we want to include SpamAssasin as the Default EmailCore AVS 
Engine, it has been a long time missing, desirable part of the total 
picture.  With that engine, users would be a natural part of the 
equation. Unfortunately, we are not there.  But with the former, I 
always thought these deterministic protocols were targeted for 
unsolicited, anonymous transactions where only the AUTHOR DOMAIN, the 
self-signing domain, is the only trusted source.  Not the user or even 
the sender unless IFF there is an Author::Sender association established.


Have a good day, off to relax at the safe-distancing pool.

--
Hector Santos,
https://secure.santronics.com
https://twitter.com/hectorsantos


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Response to a claim in draft-crocker-dmarc-author-00 security considerations

2020-07-26 Thread Dave Crocker

On 7/26/2020 11:29 AM, Hector Santos wrote:
Dave, for a number of years of practice, depending in the system or 
service, users have been provided with trust-related decisions . Do 
you need real examples? 



There is a difference between providing a signal, versus its getting 
received and use.


Please provide objective data that these signals are being perceived and 
used effectively by end users.


d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Response to a claim in draft-crocker-dmarc-author-00 security considerations

2020-07-26 Thread Hector Santos

On 7/26/2020 12:12 PM, Dave Crocker wrote:>

My comment was about observable behavior, not philosophical anything.

The issue isn't about was is available to users, but what they
actually do.  Behavior.


Dave, for a number of years of practice, depending in the system or 
service, users have been provided with trust-related decisions . Do 
you need real examples?


Gmail moves spam into Spam box.

If you user do not look into their spam box, their inaction is used to 
give spam weight to false positives.   If the user is looking for 
something, finds it in the spam box, it will see something like this:


   "What is this message in spam? (specific or vague reason)"
   "REPORT NOT SPAM"

Clicking "REPORT NOT SPAM" it doesn't guarantee it will be moved to an 
area you can see it.  It's been reported as lost, you just can't find 
it.  So it is sent again.  The next time another message of the same 
type is received, it will also be placed in the spam box but this time 
it says:


   "What is this message in spam? it is similar to messages 
identified as spam in past"

   "REPORT NOT SPAM"

Clicking "REPORT NOT SPAM" it doesn't guarantee the next transaction 
will not be moved into the spam box the next time.   There are 
properly other behaviors the user must make before the message source 
is "white listed."


I am not sure if we can model this behavior based on the different 
ways it may be done, but let me outline what I have observed with users:


- May never check spam box
- May check if expecting a message unexpectedly delayed.
- Ignore it, it gets weighted as spam.
- Click Report not Spam. Cross finger you can see it in-box.
- Next similar messages are still moved to spam box

It is the last behavior that is concerning because when you are 
dealing with layman users who may see an message in a spam box but 
leave it there, it appears GMAIL will keep adding weight to it as a 
spam, negatively impacting the source identities of the mail.


In the end, the positive of SPAM box are lost because now you are 
forcing the user to scrutinize the Spam Box opening the door to 
reading and accidental clicks. if REPORT NOT SPAM does not clear it 
up, there is even more confusion for the purpose of that button or any 
similar AI learning logic that may be employed.




-- Hector Santos,
https://secure.santronics.com
https://twitter.com/hectorsantos


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Response to a claim in draft-crocker-dmarc-author-00 security considerations

2020-07-26 Thread Douglas E. Foster
Recipient domains determine what messages they will accept or reject.Fairness 
and precedence are not necessarily applicable.I suggest that the DMARC 
standards track be placed on hold for at least a year.   It is not clear to me, 
from this group's membership, that DMARC implementers feel an urgent need for 
standard status, so a delay should be tolerable to them.A Mailing List 
Protection WG should be formed to develop his ideas into an informational or 
experimental RFC.   Then that RFC can be promoted to see if it wins over any 
current users of DMARC Sent from my Verizon, Samsung Galaxy smartphone

 Original message 
From: Dave Crocker  Date: 
7/26/20  9:50 AM  (GMT-05:00) To: Brandon Long  
Cc: IETF DMARC WG , Dotzero  
Subject: Re: [dmarc-ietf] Response to a claim in 
draft-crocker-dmarc-author-00 security considerations 
On 7/21/2020 1:42 PM, Brandon Long wrote:
> Stricter validation is not an uncommon addition to protocols over the
> last 45 years.


If there are examples of adding stricter validation in a way that
essentially requires changing the semantics of the payload, in order for
the payload to survive, I can't think of any. Not TLS, not DNSSec, not
S/MIME or PGP.

DMARC essentially enforces a semantic on the From: field as a handling
identifier, rather than an author identifier.

When activity that has a long history of semantic validity and a
continued desire for operation is forced to break the denotational
source of authoring information, in order to get the mail delivered,
then we are in new territory.

d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Response to a claim in draft-crocker-dmarc-author-00 security considerations

2020-07-26 Thread Dave Crocker

On 7/26/2020 10:10 AM, Jim Fenton wrote:


On 7/26/20 6:42 AM, Dave Crocker wrote:


On 7/21/2020 12:32 PM, Dotzero wrote:


The original DMARC effort was, in fact, to detect actual cases of
spoofing, namely unauthorized use of a domain name by outside
actors.

Different problem.


Actually, part of the effort was to enable Sending domains to 
identify their own mail that was being sent without aligned DKIM 
signing or from places not authorized through SPF - in other words, 
not properly authorized but legitimate, hence feedback loops.


As I recall, this was /not/ part of the original purpose of DMARC, 
which was discussed strictly in terms of mail from bulk senders.


What you describe was,  rather, the basis for the later use, which is 
what then started causing problems for mail going through Mediators.


Just identifying their own mail their own email that was sent...: Yes, 
that's always been part of the original purpose of DMARC, and is the 
purpose of the reporting mechanisms. Yes,




Looking over the original I-D posted for DMARC -- which was written 
after DMARC was already functioning, from work outside the IETF -- I'm 
unclear where this goal of "identify[ing] their own mail that was being 
sent without aligned DKIM signing" is clearly explained.(*)


Rather, note:


2.  Introduction



This memo defines Domain-based Message Authentication, Reporting and
Compliance (DMARC), a mechanism by which email operators leverage
existing authentication and policy advertisement technologies to
enable both message-stream feedback and enforcement of policies
against unauthenticated email.


and


3.1.  High-Level Requirements

At a high level, DMARC is designed to satisfy the following
requirements:

o  Minimize false positives.



o  Reduce the amount of successfully delivered phish.



(Caveat: None of the text I've excised explicity supports this claimed 
use.  To the extent someone thinks it or any other text in this draft 
does demonstrate that intended use, please explain how that 
interpretation is clear from the text in the draft.)



d/


(*) 
https://datatracker.ietf.org/doc/draft-kucherawy-dmarc-base/00/?include_text=1


--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Response to a claim in draft-crocker-dmarc-author-00 security considerations

2020-07-26 Thread Jim Fenton
On 7/26/20 6:42 AM, Dave Crocker wrote:

> On 7/21/2020 12:32 PM, Dotzero wrote:
>>
>> The original DMARC effort was, in fact, to detect actual cases of
>> spoofing, namely unauthorized use of a domain name by outside actors.
>>
>> Different problem.
>>
>>
>> Actually, part of the effort was to enable Sending domains to
>> identify their own mail that was being sent without aligned DKIM
>> signing or from places not authorized through SPF - in other words,
>> not properly authorized but legitimate, hence feedback loops.
>
>
> As I recall, this was /not/ part of the original purpose of DMARC,
> which was discussed strictly in terms of mail from bulk senders.
>
> What you describe was,  rather, the basis for the later use, which is
> what then started causing problems for mail going through Mediators.
>

Just identifying their own mail their own email that was sent...: Yes,
that's always been part of the original purpose of DMARC, and is the
purpose of the reporting mechanisms. Yes, the reports will contain
information on many mediators, but that's just noise in the reports. It
also contains information when, for example, the product XYZ marketing
department decided to use a new mail sending partner without telling
anyone. That's useful.

It's the policy mechanism (or more specifically its use by other than
transactional domains) that's causing the problem here.

-Jim


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Response to a claim in draft-crocker-dmarc-author-00 security considerations

2020-07-26 Thread Dave Crocker



My wording was not careful enough.  What I /meant/ was: end-users are
not relevant to the /trust-related decision making/ that is the goal
of these protection mechanisms.


This may be a philosophical theory, but in reality, in lieu of having 
deterministic mechanisms, we do have mail systems who do allow the 
user to make these type of trust decisions.  If a trust-related 
question is answered wrong by the user, the true victim is the honest 
sender.


My comment was about observable behavior, not philosophical anything.

The issue isn't about was is available to users, but what they actually 
do.  Behavior.



d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Response to a claim in draft-crocker-dmarc-author-00 security considerations

2020-07-26 Thread Hector Santos

On 7/26/2020 7:40 AM, Dave Crocker wrote:


My wording was not careful enough.  What I /meant/ was: end-users are
not relevant to the /trust-related decision making/ that is the goal
of these protection mechanisms.


This may be a philosophical theory, but in reality, in lieu of having 
deterministic mechanisms, we do have mail systems who do allow the 
user to make these type of trust decisions.  If a trust-related 
question is answered wrong by the user, the true victim is the honest 
sender.


--
Hector Santos,
https://secure.santronics.com
https://twitter.com/hectorsantos


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Response to a claim in draft-crocker-dmarc-author-00 security considerations

2020-07-26 Thread Dave Crocker

On 7/21/2020 1:42 PM, Brandon Long wrote:
Stricter validation is not an uncommon addition to protocols over the 
last 45 years.



If there are examples of adding stricter validation in a way that 
essentially requires changing the semantics of the payload, in order for 
the payload to survive, I can't think of any. Not TLS, not DNSSec, not 
S/MIME or PGP.


DMARC essentially enforces a semantic on the From: field as a handling 
identifier, rather than an author identifier.


When activity that has a long history of semantic validity and a 
continued desire for operation is forced to break the denotational 
source of authoring information, in order to get the mail delivered, 
then we are in new territory.


d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Response to a claim in draft-crocker-dmarc-author-00 security considerations

2020-07-26 Thread Dave Crocker

On 7/21/2020 12:32 PM, Dotzero wrote:


The original DMARC effort was, in fact, to detect actual cases of
spoofing, namely unauthorized use of a domain name by outside actors.

Different problem.


Actually, part of the effort was to enable Sending domains to identify 
their own mail that was being sent without aligned DKIM signing or 
from places not authorized through SPF - in other words, not properly 
authorized but legitimate, hence feedback loops.



As I recall, this was /not/ part of the original purpose of DMARC, which 
was discussed strictly in terms of mail from bulk senders.


What you describe was,  rather, the basis for the later use, which is 
what then started causing problems for mail going through Mediators.



d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Response to a claim in draft-crocker-dmarc-author-00 security considerations

2020-07-26 Thread Dave Crocker

On 7/20/2020 3:05 PM, Jesse Thompson wrote:

On 7/19/20 1:33 PM,dcroc...@gmail.com  wrote:

The essential point that needs to be made is that standards like this MUST NOT 
be cast in terms of what end users will do.  In practical terms, this work has 
nothing to do with end users.  Really.  Nothing.

To the extent that anyone wants to make an affirmative claim that 
end-users/are/  relevant to this work, they need to lay that case out clearly, 
carefully, and with material that provides objective support.(*)

I'll take a shot (admittedly, I'm having trouble keeping up with all of the 
points that have been made):

We're migrating 30,000 lists, of various types/use cases, from a MLM provider 
that is DMARC-



** We have had many complaints from users about the From munging **



My wording was not careful enough.  What I /meant/ was: end-users are 
not relevant to the /trust-related decision making/ that is the goal of 
these protection mechanisms.


They certainly /are/ relevant to the sorting/searching/presentation 
issues that are disrupted by having mail authored by the same person 
contain different From: field data.


d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Response to a claim in draft-crocker-dmarc-author-00 security considerations

2020-07-26 Thread Dave Crocker

On 7/20/2020 1:44 AM, Alessandro Vesely wrote:

On Sun 19/Jul/2020 20:33:46 +0200 Dave Crocker wrote:
The essential point that needs to be made is that standards like this 
MUST NOT be cast in terms of what end users will do.  In practical 
terms, this work has nothing to do with end users. Really.  Nothing.

[...]
(*) I've seen one posting here or somewhere else that noted that 
letting bad mail through can lead to end-users being deceived. I'll 
claim that while true, it is not relevant, since the behavior happens 
after DMARC, and the like, are relevant.  That is, DMARC, etc., do 
not inform the end-user behavior.


Aren't those two paragraphs self-contradictory?


No.

A specification defines a field of activity.  (A sandbox.) Things 
outside that field are not relevant to the specification, even though 
they might be highly relevant from a larger perspective. There is a 
constant desire to have a specification that involves security-related 
decision-making include the (human) recipient be an actor within the 
scope of the specification. The first paragraph, quoted above, is a 
reminder that we need to resist that desire.


The second paragraph, quoted above, is a reminder about a specific 
example of this, namely about the DMARC specification. It acknowledges 
that, in general, recipients can be deceived, for the specific From: 
field protection that DMARC provides, the recipient is not a relevant actor.



If DMARC were dependable, maybe users would learn to trust From:. Or 
maybe not.  Avoiding end user considerations cuts both ways. Yet, we 
can trust that if we do a well-defined, clear job, then the whole 
system will work better.


It is expensive and highly risky to create an international standard 
that relies on such a tenuous hope about future behavior, especially in 
the face of consistent empirical evidence that it won't happen.


d/


--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Fwd: Agenda requests for Madrid IETF

2020-07-26 Thread Alessandro Vesely

On Sun 26/Jul/2020 04:00:40 +0200 Dotzero wrote:

On Sat, Jul 25, 2020 at 9:48 AM Murray S. Kucherawy wrote:

On Fri, Jul 24, 2020 at 12:05 PM Dotzero wrote:


I would like to see an agenda item as to whether work around "Display
Name" changes are in scope or out of scope for this effort and this working
group. It would seem to me that any such efforts are more appropriate for
the emailcore working group.



A quick read of the current charters suggests to me that it's in scope for
neither.  That seems to be especially true for emailcore.

Do you have such a change to propose?


I was hoping for a ruling that such an effort be ruled out of scope for the 
DMARC effort/working group and further discussions be limited by the Chairs.

As "Not Douglas E. Foster" (John Levine)  noted, it is a free form field.


Although out of scope, I'd still propose that display name abuse be explicitly 
mentioned in one of the specs as an out-of-scope problem that has to be solved 
at a different level.




DMARC has been intended from the start to mitigate direct domain
abuse by 3rd parties. I'm hoping that the working group will make better
progress by focusing on issues specific to DMARC and not try boiling the
ocean by trying to "fix" all forms of abuse through this effort. Display
Name abuse is a broader problem that DMARC simply is not in a position to
address. This is especially true as most current implementations are at the
MTA and MUA providers are not visible among the participants in this
working group. My opinion is that trying to address this problem space in
this working group is somewhat like trying to push on a rope.



Let me add that, for the sake of Murray's dkim-transform, unlike subject tag 
and footer additions which only need a couple of bits to be undone, display 
name removal would require the full original header field, as in a (partial) z= 
tag.


BTW, dkim-transform, along with From: rewriting, using To:, using Author:, and 
giving up any modifications make for an effective solution of the MLM problem. 
 None of them belongs specifically to DMARC, albeit the spec could mention them.


Dkim-transform, in particular, looks like an update to RFC 6376.  Yet, it might 
be practical for this WG to adopt it.  Shall we discuss that F2F?



Best
Ale
--






























___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc