Re: [dmarc-ietf] non-mailing list use case for differing header domains

2020-08-07 Thread Dave Crocker

On 8/7/2020 7:32 PM, John Levine wrote:

I would be interested to better undertstand the meaning of "need"
here. It is my impression that most people vastly overestimate how
much of a phish target they are. Paypal and big banks certainly are,
other places, a lot less so.



I suspect the calculus is less in the pragmatic terms of asking how big 
this threat is and more in terms of wishing for some version of 
protection and thinking this helps to achieve it.


The degree to which so many folk embrace does not appear to have that 
much empirical basis, but rather a sense of feeling a need to do 
something and at first blush this seems to be something.


d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] non-mailing list use case for differing header domains

2020-08-07 Thread John Levine
In article <78fd8b26-0bed-ac36-842d-a851ec04d...@wisc.edu> you write:
>On 8/7/20 2:12 PM, John Levine wrote:
>> My guess is that MIT figured Microsoft will host this for free, that's
>> great, totally unaware that some of its users' mail would silently
>> break.
>
>Customers of Microsoft don't like to call things bundled in an expensive 
>package "free".

I have no idea what their pricing ie. My university uses Gmail for the
alumni service and I believe that actually is free.

>Maybe it was inflicted by the domain owner onto the person maintaining the 
>mailing list.  (In my experience, this is
>where people realize that no one has been maintaining/patching the mailing 
>list, unaware of DMARC, etc.)

The IETF is entirely aware of DMARC, and their main mailing lists use
a version of my dmarc.fail hack. This one's off in a corner, on the list of 
things
to be cleaned up.

>My peeve in recent years is that universities were essentially coerced 
>(economically) into being the customers of
>Microsoft/Google and then the email admins are told to sit down and let the 
>adults talk about what they think customers
>need from DMARC, ARC, etc.  It's why I'm constantly sticking my foot in my 
>mouth here and M3AAWG; trying to assert a
>voice.

If it's not obvious, we do appreciate it.  Way too many of them say whew, we 
can blame the vendor
and not worry about it.

>We need faculty/alumni/emeriti forwarding to work without being told that 
>Microsoft can't do it without breaking DMARC.

Yup.

>We need spoofing protection for all of our domains without being told we're 
>misdeploying.

I would be interested to better undertstand the meaning of "need"
here. It is my impression that most people vastly overestimate how
much of a phish target they are. Paypal and big banks certainly are, 
other places, a lot less so.

R's,
John

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] non-mailing list use case for differing header domains

2020-08-07 Thread John Levine
In article <10c441a53dec4277a3153ed8d89d3...@bayviewphysicians.com> you write:
>-=-=-=-=-=-
>
>Murray, I  have most recently used this link at AOL/Yahoo:  
>https://postmaster.verizonmedia.com/sender-request 
>
>I have considered using the more complete "Complaint Feedback Loop", 
>https://postmaster.verizonmedia.com/cfl-request 
>but have never completed the process.

Complaint feedback loops just mean you say (perhaps with verification)
that you're the contact for this range of IPs or domain names, and if
a user presses the Junk button, the system can send you a copy of the
report. It's not whitelisting, and it only covers about the first
quarter inch of the long tail.

Some years back people kept asking Spamhaus to set up a whitelist, so
they hired me to do it. Technically it worked fine, but it soon became
apparent that the only people who were interested weren't people who
we'd want to whitelist. The good quality senders get their mail
delivered already, the terrible ones didn't bother, and all we heard
from were people who sometimes sent some spam along with the good mail
but assured us they were nice people. (Many universities fall into
this category.) I think you'll find that all of the existing whitelist
like things are a sideshow to the company's real business of
deliverability consulting.

For DMARC, it would be nice if there were a shared list of credible
forwarders, not to automatically accept their mail, but just to say
they're good enough that you can believe what's in their ARC seals
when you're doing the usual spam filtering. You can't just let people
sign themselves up for a list like that, since every dodgy bulk mailer
will figure this will get them an extra 2% delivery, and we've never
gotten past a vague hope that we could canvass people we know to make
a combined set of mailing lists hosts we know.

R's,
John

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] non-mailing list use case for differing header domains

2020-08-07 Thread Douglas E. Foster
Murray, I  have most recently used this link at AOL/Yahoo:  
https://postmaster.verizonmedia.com/sender-request

I have considered using the more complete "Complaint Feedback Loop", 
https://postmaster.verizonmedia.com/cfl-request  but have never completed the 
process.

Maybe they are the last to offer this type of feature.  Or maybe my memory is 
imagining things   Now that you have pressed me, I cannot remember whether I 
have had success with other services or not.

My heart is not in prior registration either, but I was trying to lay out the 
next-best alternative for those who want an alternative to using the MLM domain 
identity.

The goal of DMARC is to end spoofing, which requires everyone to send using 
their own domain, even when performing a favor for someone in another domain.   
A recipient domain owner has the right to define the rules for getting into its 
network.Those who want into that network should play by the rules of that 
network, whether the rules are liked or disliked.

An incoming email is a take-it-or-leave-it proposition for most recipients.   
My domain does not have the market power to alter sender behavior.   When I 
receive a spoofed message that the recipient actually wants, I end up creating 
an exception to allow the spoof.   Spoofing senders are counting on their 
ability to force me to do that.   However, Microsoft is powerful enough to 
engage in a standoff.Those who want to send to Microsoft destinations will 
need to not violate DMARC.   I hope and expect that they will win this battle.

DMARC is not new.   Products that have not become DMARC-aware are as obsolete 
as WindowsXP.   Unfortunately, that does include a lot of products.

Over a year ago, I was about to recommend Proofpoint as our new email filtering 
vendor.   But the next morning I realized that their secure email service will 
spoof the identity of non-clients when they respond to a message from a client. 
  I had a real problem with a vendor promoting their ability to enforce DMARC 
on incoming mail, while also violating DMARC on their secure email service.   
Then I saw that Cisco Ironport did the same thing.   I raised CIRT issues with 
both vendors, but nothing has changed.   Maybe Microsoft will be able to change 
their attitudes.
DF


From: "Murray S. Kucherawy" 
Sent: 8/7/20 7:16 PM
To: Doug Foster 
Cc: Dave Crocker , IETF DMARC WG 
Subject: Re: [dmarc-ietf] non-mailing list use case for differing header domains
On Sun, Aug 2, 2020 at 5:44 PM Douglas E. Foster 
 wrote:
Murray took server too literally.   I have expressed before that a system could 
do a sender authentication lookup on List-ID as easily as on From.   In this 
respect, it is similar to Dave's proposal, without the added complexity of 
additional identifiers.   So think "Registerd List-ID plus DKIM signature (or 
SPF, but DKIM seems both sufficient and preferable.)

If we take "server" to mean a tuple made up of a List-ID value and a "d=" value 
from a validated DKIM signature, which I believe is what you're saying here, 
the first occurrence of this necessarily has no internal value (or history) 
attached to it.  That means the operator has to develop meaning for it over 
time, which doesn't tell it how to handle the first N such messages.  Err on 
the side of openness and you have a spam or attack vector; err on the side of 
defense and you irritate your users by denying them some list traffic until a 
reputation can develop.

And it's probably actually a three-tuple, with the third part being the 
recipient.  Otherwise, I could register (or trigger the auto-registration of) 
any two-tuple I want and thus intentionally let in my preferred list streams, 
good or bad, which affects every other user.

Plus, you're trusting users to get this right.  For a manual registration 
scheme, every time they get it wrong by entering the wrong data or failing to 
even do it at all, you've got a failure mode to deal with, usually in the form 
of user complaints which require other humans to resolve.  That makes it 
relatively expensive.

And finally, lists change once in a while, maybe to a new signing domain, maybe 
to a new name, maybe both.  Every time that happens, the process has to start 
over.  Naturally lists won't want to do this because of the sterling 
reputations they've developed, but the pain reappears whenever the process 
needs to be repeated for whatever reason.

I'm not saying such a system can't or won't work.  I'm also not saying I have a 
better idea.  I am saying there's multi-faceted pain in every direction in this 
space, and this is no exception.  Whatever path we choose to deploy here has to 
account for those choices and their side effects, and the ways they might be 
gamed.

I am not sure what "Internet Scale" means to you.   Most of the major 
recipients have bulk mailer registration systems.   It does not guarantee 
whitelisting, but it tends to produce that effect.  

Re: [dmarc-ietf] non-mailing list use case for differing header domains

2020-08-07 Thread Jesse Thompson
On 8/7/20 2:12 PM, John Levine wrote:
> In article 
> 
>  you write:
>> I feel like what is happening sometimes is that central university IT is 
>> trying to drag their whole institutions into a
>> more secure posture before anybody in a position to stop them fully 
>> understands what's going on lest they be told to
>> stop because it might make things a little inconvenient.
> 
> I was with you up until that sentence, since it trivializes the real
> problems that overly strict DMARC policies cause.

Maybe Autumn was reflecting the reality that the industry has already 
trivialized DMARC problems for these "misdeployments".  

 
> Just yesterday I was sorting out a problem with people trying to
> finish editing a revised IETF standard about real-time web
> applications. Some of the authors' messages were disappearing,
> apparently at random. I saw what the problem was, one of the authors
> is at a big company whose IT department insists on p=reject (and has
> blown off complaints from fairly senior people about the problems it
> causes), the other uses an MIT alumni address that recently moved its
> hosting to Microsoft without telling anyone that the new host enforces
> DMARC policy while the old one didn't.
> 
> My guess is that MIT figured Microsoft will host this for free, that's
> great, totally unaware that some of its users' mail would silently
> break.

Customers of Microsoft don't like to call things bundled in an expensive 
package "free".

My peeve in recent years is that universities were essentially coerced 
(economically) into being the customers of Microsoft/Google and then the email 
admins are told to sit down and let the adults talk about what they think 
customers need from DMARC, ARC, etc.  It's why I'm constantly sticking my foot 
in my mouth here and M3AAWG; trying to assert a voice.

We need faculty/alumni/emeriti forwarding to work without being told that 
Microsoft can't do it without breaking DMARC.

We need spoofing protection for all of our domains without being told we're 
misdeploying.

We know that we need advanced local policy controls for DMARC enforcement and 
we don't want to be blamed when the vendor doesn't give us those controls (to 
your MIT example) 


> I told them as a workaround they needed to directly cc each other when
> they send anything to the group list, but the whole thing is a
> self-inflicted wound.

Maybe it was inflicted by the domain owner onto the person maintaining the 
mailing list.  (In my experience, this is where people realize that no one has 
been maintaining/patching the mailing list, unaware of DMARC, etc.)

Again, I think MLM header munging is here to stay, and list recipients needs to 
get used to it (I'd like p=quarantine pct=0 be the default behavior so that 
domains choosing to misdeploy DMARC aren't second class).  

I'd like to see a way to un-munge mail from trusted intermediaries, but that 
sounds impractical.  

I think ARC has promise but it has some challenges that I hope can be overcome; 
notably a mechanism for the receiver to indicate trust to the intermediary (so 
that it knows it doesn't need to munge).

At that point, I can start to figure out how to deal with the mailbox-level 
forwarded mail for faculty/alumni/emeriti...

Jesse

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] non-mailing list use case for differing header domains

2020-08-07 Thread Murray S. Kucherawy
On Sun, Aug 2, 2020 at 5:44 PM Douglas E. Foster <
fost...@bayviewphysicians.com> wrote:

> Murray took server too literally.   I have expressed before that a system
> could do a sender authentication lookup on List-ID as easily as on From.
> In this respect, it is similar to Dave's proposal, without the added
> complexity of additional identifiers.   So think "Registerd List-ID plus
> DKIM signature (or SPF, but DKIM seems both sufficient and preferable.)
>

If we take "server" to mean a tuple made up of a List-ID value and a "d="
value from a validated DKIM signature, which I believe is what you're
saying here, the first occurrence of this necessarily has no internal value
(or history) attached to it.  That means the operator has to develop
meaning for it over time, which doesn't tell it how to handle the first N
such messages.  Err on the side of openness and you have a spam or attack
vector; err on the side of defense and you irritate your users by denying
them some list traffic until a reputation can develop.

And it's probably actually a three-tuple, with the third part being the
recipient.  Otherwise, I could register (or trigger the auto-registration
of) any two-tuple I want and thus intentionally let in my preferred list
streams, good or bad, which affects every other user.

Plus, you're trusting users to get this right.  For a manual registration
scheme, every time they get it wrong by entering the wrong data or failing
to even do it at all, you've got a failure mode to deal with, usually in
the form of user complaints which require other humans to resolve.  That
makes it relatively expensive.

And finally, lists change once in a while, maybe to a new signing domain,
maybe to a new name, maybe both.  Every time that happens, the process has
to start over.  Naturally lists won't want to do this because of the
sterling reputations they've developed, but the pain reappears whenever the
process needs to be repeated for whatever reason.

I'm not saying such a system can't or won't work.  I'm also not saying I
have a better idea.  I am saying there's multi-faceted pain in every
direction in this space, and this is no exception.  Whatever path we choose
to deploy here has to account for those choices and their side effects, and
the ways they might be gamed.

I am not sure what "Internet Scale" means to you.   Most of the major
> recipients have bulk mailer registration systems.   It does not guarantee
> whitelisting, but it tends to produce that effect.   I have had occasion to
> register with most of them.   So "does not scale" is not obvious to me.
>

"Internet Scale" means millions or billions of users, like GMail or Yahoo
or AOL or Microsoft have.  Since they have the bulk of the inboxes, a
solution needs to at least consider that size of use case, or explain why
those cases don't need to be considered.

I've never seen this manual registration process to which you refer.  Where
can I find it, for example, on GMail?

Even more to the point, check out this link:
>
> https://blog.postmaster.verizonmedia.com/post/616023179026202624/increasing-relevance-performance-through-vto
>
>
> Verizon appears to be offering a service (probably for extra cost) which
> is based on:
> (a) a well-defined mail stream from a known sender, and
> (b) a mailbox user identifying that mail stream as subscribed, and
> therefore desirable.
>
> It appears that the target senders are retailers who want to ensure that
> their sale announcements are read before the sale is over.   It is an
> "Internet scale" application of the type of registration I was suggesting:
>   Well-identified senders, coupled with end-user endorsement, receive
> preferred treatment.
>

Is there a technical description someplace of the mechanism behind what
they're doing?

As to the transparency question, it should be clear that there will be no
> simple solution to the ML problem.
>

Indeed.

[...] But the only way to establish an acceptable reputation is to either
> register with the receiver directly, or register with the sender in a way
> that the receiver will honor.
>

This needs to scale, from both ends:

1) If I as a new list operator want my list traffic to get accepted, how
could I possibly go about registering with all (or even most) mailbox
providers in a way they will trust?

2) If I as a mailbox provider want to give my users quality service and
also spam filtering, what way can I offer list operators to identify
themselves that can't be spoofed, and will only be exploited by good
actors?  Putting this burden on my users doesn't feel tenable.

-MSK
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] non-mailing list use case for differing header domains

2020-08-07 Thread John Levine
In article 

 you write:
>I feel like what is happening sometimes is that central university IT is 
>trying to drag their whole institutions into a
>more secure posture before anybody in a position to stop them fully 
>understands what's going on lest they be told to
>stop because it might make things a little inconvenient.

I was with you up until that sentence, since it trivializes the real
problems that overly strict DMARC policies cause.

Just yesterday I was sorting out a problem with people trying to
finish editing a revised IETF standard about real-time web
applications. Some of the authors' messages were disappearing,
apparently at random. I saw what the problem was, one of the authors
is at a big company whose IT department insists on p=reject (and has
blown off complaints from fairly senior people about the problems it
causes), the other uses an MIT alumni address that recently moved its
hosting to Microsoft without telling anyone that the new host enforces
DMARC policy while the old one didn't.

My guess is that MIT figured Microsoft will host this for free, that's
great, totally unaware that some of its users' mail would silently
break.

I told them as a workaround they needed to directly cc each other when
they send anything to the group list, but the whole thing is a
self-inflicted wound.

R's,
John

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] non-mailing list use case for differing header domains

2020-08-07 Thread Autumn Tyr-Salvia
What I find very interesting about this email from Jesse, and Mike's response 
is that I hear these words coming from two very different experiences of 
deploying DMARC.

In my role doing onboarding at Agari, I have worked with many different 
organizations on their DMARC projects. I have worked with numerous corporate 
groups, as well as governmental organizations, nonprofits, and universities. 
Universities operate with a somewhat different set of expectations than other 
groups in ways that make DMARC additionally challenging.

Here are a few things I have learned implementing DMARC for multiple 
universities:

  *   Universities have a significantly higher degree of user and use case 
turnover than other organizations, by a lot. There are new students and staff 
every term, and many more of them will use their email address to send out 
email over various third party tools. In the corporate world, sure there are 
employees coming and going all the time, and new projects, but there is a much 
greater degree of stability in terms of systems sending out email.
  *   University IT has much less control over their users than corporate IT. 
In corporate IT, it is not unusual for IT leadership to make decisions on what 
applications will and will not be supported, and to have general support for 
this from the top. In higher education, IT teams seem to frequently be told 
that they must support whatever their users request, and have very little 
authority.
  *   Most universities serve a greater breadth of use cases than most other 
organizations. Consider an organization that is a fundraising nonprofit, 
scientific research group in multiple disciplines, hospital, mental health 
clinic, employer with HR tools, housing coordinator, childcare coordinator, 
gym, sports arena, transportation system, provider of continuing education to 
certified professionals, press agency, mailing list provider, forwarder, etc. 
all in one. There are a lot of niche tools that can send email in each of these 
different use cases, but universities are the only place I see so many of them 
all together.
  *   Universities are highly decentralized. It seems like every major school 
inside a university (school of public health, school of humanities, etc.) has 
its own policies and culture, and sometimes its own IT staff.
  *   Universities tend to have more legacy technology than other organizations 
(except government).

The reason I mention all this stuff is that I feel like some of what is being 
suggested here misses this reality.

Mike said, "You need buy-in from senior management for any email authentication 
efforts. When you add up the costs of customer support contacts for dealing 
with fraudulent email claiming to be from your organization, reputation damage, 
etc., management becomes more willing to buy into a comprehensive strategy." - 
in the higher education world, I don't see it working like this. IT staff can 
get enough buy-in to decide to work on DMARC as a project, but the costs of 
support contacts are likely spread out over multiple groups in a way that is 
very hard to quantify at a higher level, and even if they were to consider 
that, they would still be more likely to say that a comprehensive strategy is 
good and all, but it still matters more to them that good old Professor 1984 
can still use his favorite application even though it doesn't conform to modern 
security standards.

I feel like what is happening sometimes is that central university IT is trying 
to drag their whole institutions into a more secure posture before anybody in a 
position to stop them fully understands what's going on lest they be told to 
stop because it might make things a little inconvenient. Many universities do 
not attempt DMARC at all, so I think any work we can do to make it easier on 
them would encourage greater adoption.


Thanks,

Autumn Tyr-Salvia
atyrsal...@agari.com
Agari Principal Customer Success Engineer




From: dmarc  on behalf of Dotzero 
Sent: Wednesday, August 5, 2020 12:52 PM
To: Jesse Thompson 
Cc: IETF DMARC WG 
Subject: Re: [dmarc-ietf] non-mailing list use case for differing header domains



On Wed, Aug 5, 2020 at 12:39 PM Jesse Thompson 
mailto:40wisc@dmarc.ietf.org>> 
wrote:
On 8/4/20 11:52 AM, Alessandro Vesely wrote:
> On 2020-08-04 6:10 p.m., Dotzero wrote:
>> On Tue, Aug 4, 2020 at 11:39 AM Jim Fenton 
>> mailto:fen...@bluepopcorn.net>> wrote:
>>> On 8/2/20 5:43 PM, Douglas E. Foster wrote:
 As to the transparency question, it should be clear that there will be
 no simple solution to the ML problem.
>>>
>>> Actually, there is: If your domain has users that use mailing lists,
>>> don't publish 'reject' or 'quarantine' policies. Generally this means to
>>> just use those policies for domains used for transactional email.
>>>
>>> Unfortunately we seem to be focused on very complex technical solutions
>>> to a misdeployment problem.

I've never heard this