[dmarc-ietf] dmarc - Requested session has been scheduled for IETF 110

2021-02-12 Thread "IETF Secretariat"
Dear Alexey Melnikov,

The session(s) that you have requested have been scheduled.
Below is the scheduled session information followed by
the original request. 


dmarc Session 1 (1:00 requested)
Wednesday, 10 March 2021, Session II 1530-1630
Room Name: Room 2 size: 502
-


iCalendar: https://datatracker.ietf.org/meeting/110/sessions/dmarc.ics

Request Information:


-
Working Group Name: Domain-based Message Authentication, Reporting  
Conformance
Area Name: Applications and Real-Time Area
Session Requester: Alexey Melnikov


Number of Sessions: 1
Length of Session(s):  1 Hour
Number of Attendees: 76
Conflicts to Avoid: 
 Chair Conflict: dnsop dprive cfrg kitten emailcore
 Technology Overlap: saag uta extra jmap cbor






People who must be present:
  Alexey Melnikov
  Murray Kucherawy
  Seth Blank
  Tim Wicinski

Resources Requested:

Special Requests:
  
-


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] [EXTERNAL] Re: Ticket #64 - Contained Data PII Concerns

2021-02-12 Thread Seth Blank
Yes, very true. Again as an individual, I think it's worth calling out
explicitly in the draft, simply because it does seem to cause friction with
implementations.

On Fri, Feb 12, 2021 at 1:23 PM John R Levine  wrote:

> > In the data itself, there are summaries of IP addresses and
> authentication
> > statuses of mail that fall into three categories: 1) mail that is
> > authenticated by the domain, 2) mail that fails to authenticate as the
> > domain, and 3) mail that is wholly unauthenticated. From a domain owner
> > perspective, this means they get reports of mail that is 1) authorized by
> > them, 2) not authorized by them, or 3) broken by forwarding or other
> > rewriting by an intermediary. ...
>
> All true, but more to the point, the reports include IP addresses and
> domain names of mail servers and DKIM signers, not IP or e-mail addresses
> of individual users.  There's no PII other than in the extreme case that
> the domain has only a single user so all of the mail can be attributed to
> that user.
>
> R's,
> John
>
> PS: updated the ticket title to say aggregate reports
>
> PPS: that extreme case lets me tell things like how many NANOG subscribers
> get their mail at gmail.
>


-- 

*Seth Blank* | VP, Standards and New Technologies
*e:* s...@valimail.com
*p:* 415.273.8818

`

This email and all data transmitted with it contains confidential and/or
proprietary information intended solely for the use of individual(s)
authorized to receive it. If you are not an intended and authorized
recipient you are hereby notified of any use, disclosure, copying or
distribution of the information included in this transmission is prohibited
and may be unlawful. Please immediately notify the sender by replying to
this email and then delete it from your system.
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] [EXTERNAL] Re: Ticket #64 - Contained Data PII Concerns

2021-02-12 Thread John R Levine

In the data itself, there are summaries of IP addresses and authentication
statuses of mail that fall into three categories: 1) mail that is
authenticated by the domain, 2) mail that fails to authenticate as the
domain, and 3) mail that is wholly unauthenticated. From a domain owner
perspective, this means they get reports of mail that is 1) authorized by
them, 2) not authorized by them, or 3) broken by forwarding or other
rewriting by an intermediary. ...


All true, but more to the point, the reports include IP addresses and 
domain names of mail servers and DKIM signers, not IP or e-mail addresses 
of individual users.  There's no PII other than in the extreme case that 
the domain has only a single user so all of the mail can be attributed to 
that user.


R's,
John

PS: updated the ticket title to say aggregate reports

PPS: that extreme case lets me tell things like how many NANOG subscribers 
get their mail at gmail.


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] [EXTERNAL] Re: Ticket #64 - Contained Data PII Concerns

2021-02-12 Thread Seth Blank
As an individual, part of the reason for this ticket is that some receivers
do not send aggregate reports, as they're unclear on whose data is being
provided to whom (which then spirals into issues of legalities). While the
IETF cannot weigh in on legalities, it can make clear the intention of
whose data is being transmitted in the report. I believe clarifying this
will enable more reports to flow. My thoughts, quickly, with less precision
than I'd like, but as a starting point:

For aggregate reports, the data is intended for the domain owner to
understand what is being sent in its name, as seen by the receiver. The
intention is that this data is aggregated on behalf of the domain owner by
the receiver, and sent if the domain owner publishes a reporting record.

In the data itself, there are summaries of IP addresses and authentication
statuses of mail that fall into three categories: 1) mail that is
authenticated by the domain, 2) mail that fails to authenticate as the
domain, and 3) mail that is wholly unauthenticated. From a domain owner
perspective, this means they get reports of mail that is 1) authorized by
them, 2) not authorized by them, or 3) broken by forwarding or other
rewriting by an intermediary. In all cases, this is valuable information
for a domain owner to have, and any PII (IP addresses specifically) either
belong to the domain owner getting the report, are threat attempting to act
as the domain owner, or are intermediaries being used by the domain owner.
In all cases, there is nothing here that leaks or exposes someone else's
PII to a domain owner, just things explicitly that are theirs or attempting
to be seen as them.

Seth

On Fri, Feb 12, 2021 at 12:50 PM Brotman, Alex  wrote:

> Apologies, this is for aggregate reports.  I'm would imagine the Failure
> reports draft would have its own section as the questions there may be
> different.
>
> --
> Alex Brotman
> Sr. Engineer, Anti-Abuse & Messaging Policy
> Comcast
>
> > -Original Message-
> > From: John Levine 
> > Sent: Friday, February 12, 2021 3:46 PM
> > To: dmarc@ietf.org
> > Cc: Brotman, Alex 
> > Subject: [EXTERNAL] Re: [dmarc-ietf] Ticket #64 - Contained Data PII
> Concerns
> >
> > In article
> >  > 11.prod.outlook.com> you write:
> > >Hello folks,
> > >
> > >In ticket #64
> > >(https://urldefense.com/v3/__https://trac.ietf.org/trac/dmarc/ticket/64
> > >__;!!CQl3mcHX2A!TwDVjWOh08AOGCxPZ0IKR8IxgdUb6u3LDW1Po0KbrzIgXW
> > wlVm53NUB
> > >Q6gqZ8IbIjUjG$ ), it was suggested that a Privacy Considerations
> section may
> > alleviate some concerns about the ownership of the data.  I created an
> initial
> > attempt, and thought to get some feedback.  I didn't think we should go
> too far
> > in depth, or raise corner cases.  Felt like doing so could lead down a
> rabbit hole
> > of trying to cover all cases. This would go within a "Privacy
> Considerations"
> > section.
> > >
> > >* Data Contained Within Reports (#64)
> > >
> > >Within the reports is contained an aggregated body of anonymized data
> > >pertaining to the sending domain.  The data is meant to aid the report
> > >processors and domain holders in verifying sources of messages
> > >pertaining to the 5322.From Domain.  The data should not contain any
> > >identifying characteristics about individual senders or receivers.  An
> > >entity sending reports should not be concerned with the data contained
> > >as it should not contain PII (NIST reference for PII definition), such
> > >as email addresses or usernames.
> > >
> > >Does this seem a reasonable start?  Thanks for your time.
> >
> > It's not clear which kind of report this is talking about.
> >
> > If it's aggregate reports, they contain IP addresses of mail servers and
> domain
> > names of SPF and DKIM identifiers, but nothing about the e-mail address
> or IP of
> > the original senders.
> >
> > If it's failure reports, they contain as much or as little as the
> reporter includes,
> > possibly an entire message sent by someome who may or may not be
> connected
> > to the domain that receives the report.
> >
>
> ___
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>


-- 

*Seth Blank* | VP, Standards and New Technologies
*e:* s...@valimail.com
*p:* 415.273.8818

`

This email and all data transmitted with it contains confidential and/or
proprietary information intended solely for the use of individual(s)
authorized to receive it. If you are not an intended and authorized
recipient you are hereby notified of any use, disclosure, copying or
distribution of the information included in this transmission is prohibited
and may be unlawful. Please immediately notify the sender by replying to
this email and then delete it from your system.
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] [EXTERNAL] Re: Ticket #64 - Contained Data PII Concerns

2021-02-12 Thread Brotman, Alex
Apologies, this is for aggregate reports.  I'm would imagine the Failure 
reports draft would have its own section as the questions there may be 
different.

--
Alex Brotman
Sr. Engineer, Anti-Abuse & Messaging Policy
Comcast

> -Original Message-
> From: John Levine 
> Sent: Friday, February 12, 2021 3:46 PM
> To: dmarc@ietf.org
> Cc: Brotman, Alex 
> Subject: [EXTERNAL] Re: [dmarc-ietf] Ticket #64 - Contained Data PII Concerns
>
> In article
>  11.prod.outlook.com> you write:
> >Hello folks,
> >
> >In ticket #64
> >(https://urldefense.com/v3/__https://trac.ietf.org/trac/dmarc/ticket/64
> >__;!!CQl3mcHX2A!TwDVjWOh08AOGCxPZ0IKR8IxgdUb6u3LDW1Po0KbrzIgXW
> wlVm53NUB
> >Q6gqZ8IbIjUjG$ ), it was suggested that a Privacy Considerations section may
> alleviate some concerns about the ownership of the data.  I created an initial
> attempt, and thought to get some feedback.  I didn't think we should go too 
> far
> in depth, or raise corner cases.  Felt like doing so could lead down a rabbit 
> hole
> of trying to cover all cases. This would go within a "Privacy Considerations"
> section.
> >
> >* Data Contained Within Reports (#64)
> >
> >Within the reports is contained an aggregated body of anonymized data
> >pertaining to the sending domain.  The data is meant to aid the report
> >processors and domain holders in verifying sources of messages
> >pertaining to the 5322.From Domain.  The data should not contain any
> >identifying characteristics about individual senders or receivers.  An
> >entity sending reports should not be concerned with the data contained
> >as it should not contain PII (NIST reference for PII definition), such
> >as email addresses or usernames.
> >
> >Does this seem a reasonable start?  Thanks for your time.
>
> It's not clear which kind of report this is talking about.
>
> If it's aggregate reports, they contain IP addresses of mail servers and 
> domain
> names of SPF and DKIM identifiers, but nothing about the e-mail address or IP 
> of
> the original senders.
>
> If it's failure reports, they contain as much or as little as the reporter 
> includes,
> possibly an entire message sent by someome who may or may not be connected
> to the domain that receives the report.
>

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Ticket #64 - Contained Data PII Concerns

2021-02-12 Thread John Levine
In article 

 you write:
>Hello folks,
>
>In ticket #64 (https://trac.ietf.org/trac/dmarc/ticket/64), it was suggested 
>that a Privacy Considerations section may alleviate
>some concerns about the ownership of the data.  I created an initial attempt, 
>and thought to get some feedback.  I didn't think
>we should go too far in depth, or raise corner cases.  Felt like doing so 
>could lead down a rabbit hole of trying to cover all
>cases. This would go within a "Privacy Considerations" section.
>
>* Data Contained Within Reports (#64)
>
>Within the reports is contained an aggregated body of anonymized data 
>pertaining
>to the sending domain.  The data is meant to aid the report processors
>and domain holders in verifying sources of messages pertaining to the
>5322.From Domain.  The data should not contain any identifying
>characteristics about individual senders or receivers.  An entity
>sending reports should not be concerned with the data contained as
>it should not contain PII (NIST reference for PII definition), such as email 
>addresses or
>usernames.
>
>Does this seem a reasonable start?  Thanks for your time.

It's not clear which kind of report this is talking about.

If it's aggregate reports, they contain IP addresses of mail servers and domain 
names 
of SPF and DKIM identifiers, but nothing about the e-mail address or IP of the 
original senders.

If it's failure reports, they contain as much or as little as the reporter 
includes, possibly
an entire message sent by someome who may or may not be connected to the domain 
that receives the report.



___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Ticket #1 - SPF alignment

2021-02-12 Thread John Levine
In article  
you write:
>-=-=-=-=-=-
>
>As an individual, +1000 to Scott.

I've closed this ticket.  One down, a zillion to go.

R's,
John

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


[dmarc-ietf] Ticket #64 - Contained Data PII Concerns

2021-02-12 Thread Brotman, Alex
Hello folks,

In ticket #64 (https://trac.ietf.org/trac/dmarc/ticket/64), it was suggested 
that a Privacy Considerations section may alleviate some concerns about the 
ownership of the data.  I created an initial attempt, and thought to get some 
feedback.  I didn't think we should go too far in depth, or raise corner cases. 
 Felt like doing so could lead down a rabbit hole of trying to cover all cases. 
This would go within a "Privacy Considerations" section.

* Data Contained Within Reports (#64)

Within the reports is contained an aggregated body of anonymized data pertaining
to the sending domain.  The data is meant to aid the report processors
and domain holders in verifying sources of messages pertaining to the
5322.From Domain.  The data should not contain any identifying
characteristics about individual senders or receivers.  An entity
sending reports should not be concerned with the data contained as
it should not contain PII (NIST reference for PII definition), such as email 
addresses or
usernames.

Does this seem a reasonable start?  Thanks for your time.

--
Alex Brotman
Sr. Engineer, Anti-Abuse & Messaging Policy
Comcast

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Ticket #1 - SPF alignment

2021-02-12 Thread Seth Blank
As an individual, +1000 to Scott.

As Chair, this thread is unproductive, and two months passed due date to
resolve. Consensus seems clear that there isn't an issue here. If there's a
clear use case that hasn't been communicated, share it now or move on.

Seth

On Fri, Feb 12, 2021 at 10:02 AM Scott Kitterman 
wrote:

> I didn't miss it.  I don't think it's meaningful.
>
> In the real world, outside the IETF one of three things happens:
>
> 1.  Everything works fine.
>
> 2.  Someone depends on HELO evaluation of SPF and discovers from
> evaluating
> the feedback reports that's it's a problem and then doesn't to that
> anymore.
>
> 3.  Someone depends on HELO evaluation of SPF and doesn't discover it's a
> problem because they don't look at their feedback reports.
>
> For case 1 and 2, there's no issue.
>
> Case 3 doesn't care if their mail gets delivered, so its fine.
>
> This excessive focus on irrelevant minutia is harmful to the IETF.  It
> makes
> participation less interesting for technically capable contributors and
> reduces the overall value of the discourse.
>
> Many people have suggested we move on.  My prediction is you won't, but
> this
> is my last email on the topic.
>
> Scott K
>
> On Thursday, February 11, 2021 11:24:16 PM EST Douglas Foster wrote:
> > You missed my main point.   I will restate it, and then address your
> threat
> > question.
> >
> > If there are N ways to establish authentication, then a recipient only
> > needs to choose one of them, but a sender who wants to be validated by
> all
> > recipients must implement all of them.   One purpose of the specification
> > is to constrain that complexity.
> >
> > So the convenient solution would be to say that SPF HELO must be ignored,
> > except for null sender, because doing so reduces the number of variables
> > that must be considered by senders.   It is also probably consistent with
> > the logic of many current implementations.   I just do not believe that
> it
> > is justified to tell recipients that they MUST NOT evaluate SPF HELO when
> > MAILFROM is present.
> >
> > An alternative would be to say that SPF HELO and SPF MAILFROM should both
> > be evaluated.   In the long run, this is arguably the best theoretical
> > solution, but the fear of short-term pain from false positives probably
> > makes this unattractive.
> >
> > So, I am back to the only solution that seems justifiable:Senders
> > SHOULD comply with both MAILFROM and HELO policies because SOME
> recipients
> > may evaluate both criteria, but many will only evaluate MAILFROM because
> > the incremental theoretical benefit seems less than the incremental cost.
> >
> > - - -
> >
> > To your point about threat vectors:  DMARC alignment is based on nested
> > layers of trust, and the trust is broken if you skip layers.  The server
> > operator provides a mail server environment to a mail domain, and the
> mail
> > domain provides delivery services for an author.
> >
> > SPF proves that the mail domain (indicated by the MAILFROM address)
> really
> > uses the services of the server domain, and therefore the server
> (indicated
> > by IP address, HELO, and possibly ReverseDNS) is authorized to send
> > messages on behalf of the mail domain.
> >
> > DMARC proves that the source server for the message was authorized to
> speak
> > on behalf of the author (indicated by the From address).
> >
> > You suggest that if SPF HELO passes, and aligns with FROM, then we have
> > established that the server is authorized to speak for the author.   This
> > is true, but it does not establish that the mail domain in the MAILFROM
> > address has that right.
> >
> > When the MAILFROM domain is different from the HELO domain, this implies
> > that that MAILFROM domain is a client of the server domain.   The server
> > domain has the right to emit messages for the client, but the client
> domain
> > does not have the right to email messages claiming to be from the server
> > domain.
> >
> > - - -
> >
> > It can be asserted that the server domain should be able to use its
> > firewall to prevent unauthorized servers from emitting mail, and should
> be
> > able to use its outbound gateway to prevent client domains from emitting
> > messages from the server domain, other clients, or any unrelated domain.
> > These commonly implemented measures could eliminate the need for checking
> > SPF HELO.   Why should others check what the sender should be able to do
> > for themselves?
> > Are we prepared to make this argument?   If so, then the existing wording
> > stands, but needs a solid justification.
> >
> > DF
> >
> > On Thu, Feb 11, 2021 at 8:50 AM Scott Kitterman 
> >
> > wrote:
> > > What problem are you purporting to solve?
> > >
> > > By problem, I mean a case were a bad actor can get a DMARC pass result
> if
> > > SPF
> > > HELO results are allowed to be used that they couldn't already get
> with a
> > > mail
> > > from result.
> > >
> > > I don't think such a case exists which is 

Re: [dmarc-ietf] Ticket #1 - SPF alignment

2021-02-12 Thread Scott Kitterman
I didn't miss it.  I don't think it's meaningful.

In the real world, outside the IETF one of three things happens:

1.  Everything works fine.

2.  Someone depends on HELO evaluation of SPF and discovers from evaluating 
the feedback reports that's it's a problem and then doesn't to that anymore.

3.  Someone depends on HELO evaluation of SPF and doesn't discover it's a 
problem because they don't look at their feedback reports.

For case 1 and 2, there's no issue.

Case 3 doesn't care if their mail gets delivered, so its fine.

This excessive focus on irrelevant minutia is harmful to the IETF.  It makes 
participation less interesting for technically capable contributors and 
reduces the overall value of the discourse.

Many people have suggested we move on.  My prediction is you won't, but this 
is my last email on the topic.

Scott K

On Thursday, February 11, 2021 11:24:16 PM EST Douglas Foster wrote:
> You missed my main point.   I will restate it, and then address your threat
> question.
> 
> If there are N ways to establish authentication, then a recipient only
> needs to choose one of them, but a sender who wants to be validated by all
> recipients must implement all of them.   One purpose of the specification
> is to constrain that complexity.
> 
> So the convenient solution would be to say that SPF HELO must be ignored,
> except for null sender, because doing so reduces the number of variables
> that must be considered by senders.   It is also probably consistent with
> the logic of many current implementations.   I just do not believe that it
> is justified to tell recipients that they MUST NOT evaluate SPF HELO when
> MAILFROM is present.
> 
> An alternative would be to say that SPF HELO and SPF MAILFROM should both
> be evaluated.   In the long run, this is arguably the best theoretical
> solution, but the fear of short-term pain from false positives probably
> makes this unattractive.
> 
> So, I am back to the only solution that seems justifiable:Senders
> SHOULD comply with both MAILFROM and HELO policies because SOME recipients
> may evaluate both criteria, but many will only evaluate MAILFROM because
> the incremental theoretical benefit seems less than the incremental cost.
> 
> - - -
> 
> To your point about threat vectors:  DMARC alignment is based on nested
> layers of trust, and the trust is broken if you skip layers.  The server
> operator provides a mail server environment to a mail domain, and the mail
> domain provides delivery services for an author.
> 
> SPF proves that the mail domain (indicated by the MAILFROM address) really
> uses the services of the server domain, and therefore the server (indicated
> by IP address, HELO, and possibly ReverseDNS) is authorized to send
> messages on behalf of the mail domain.
> 
> DMARC proves that the source server for the message was authorized to speak
> on behalf of the author (indicated by the From address).
> 
> You suggest that if SPF HELO passes, and aligns with FROM, then we have
> established that the server is authorized to speak for the author.   This
> is true, but it does not establish that the mail domain in the MAILFROM
> address has that right.
> 
> When the MAILFROM domain is different from the HELO domain, this implies
> that that MAILFROM domain is a client of the server domain.   The server
> domain has the right to emit messages for the client, but the client domain
> does not have the right to email messages claiming to be from the server
> domain.
> 
> - - -
> 
> It can be asserted that the server domain should be able to use its
> firewall to prevent unauthorized servers from emitting mail, and should be
> able to use its outbound gateway to prevent client domains from emitting
> messages from the server domain, other clients, or any unrelated domain.
> These commonly implemented measures could eliminate the need for checking
> SPF HELO.   Why should others check what the sender should be able to do
> for themselves?
> Are we prepared to make this argument?   If so, then the existing wording
> stands, but needs a solid justification.
> 
> DF
> 
> On Thu, Feb 11, 2021 at 8:50 AM Scott Kitterman 
> 
> wrote:
> > What problem are you purporting to solve?
> > 
> > By problem, I mean a case were a bad actor can get a DMARC pass result if
> > SPF
> > HELO results are allowed to be used that they couldn't already get with a
> > mail
> > from result.
> > 
> > I don't think such a case exists which is why I think this entire line of
> > argument is a waste of time.
> > 
> > Scott K
> > 
> > On Thursday, February 11, 2021 6:35:49 AM EST Douglas Foster wrote:
> > > Applying SPF to DMARC could become out of scope, if we choose to remove
> > 
> > SPF
> > 
> > > from DMARC and make it dependent only on DKIM.   Until then, we need to
> > > have a shared understanding of how SPF is applied.  This question asks
> > > whether that shared understanding exists.
> > > 
> > > SPF involves two tests, which can be used together.