Re: [dmarc-ietf] DMARC as Signal to MLMs for Rewrites (or not)

2020-09-20 Thread Alessandro Vesely

On Fri 18/Sep/2020 15:17:53 +0200 Joseph Brennan wrote:

or don't use p=quarantine and p=rejectKeep it simple



Publishing an actionable policy is not just a question of simplicity.  It 
conditions the very semantics of DMARC.


OTOH, MLM transformations break signatures irrespective of From: rewriting. 
Perhaps, we should make it more clear whether the "MLM problem" consists of the 
inconvenience of having From: rewritten rather than the inability of verifying 
the original author domain signature.


At any rate, the two drafts referenced below propose methods to validate the 
original domain.  At that point, the original From: can safely be restored.


Considering that both methods have to rely on additional stuff passed in the 
message header, the two methods can be viewed as strikingly similar to each other.



Best
Ale




On Fri, Sep 18, 2020 at 5:47 AM Alessandro Vesely  wrote:

On Thu 17/Sep/2020 21:11:42 +0200 Sabahattin Gucukoglu wrote:


Wouldn’t it be nice if you could ask for MLMs to transform, just using a
DMARC policy, even p=none, so that you could test with a live environment
containing MLMs that work around DMARC policy? Or you could ask for *no*
transform, even for p=quarantine or p=reject, so that your DMARC policy can
be used to legitimately restrict usage to directly-sent email?



It may be practical to place the asking in the message header, rather than
in the DMARC record.  That way, senders can specify their wish on a
per-message basis, presumably based on message recipients.  Note that a
request to transform can include information about how to reliably undo the
transformation, thereby verifying the original DKIM signature as described
in dkim-transform[*].  Possible strategies that senders might use could be
similar to those for putting weak signatures[†].


Best
Ale
--
[*] https://tools.ietf.org/html/draft-kucherawy-dkim-transform
[†]
https://tools.ietf.org/html/draft-levine-dkim-conditional-04#section-4.1
























___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc





___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc



___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC as Signal to MLMs for Rewrites (or not)

2020-09-18 Thread Joseph Brennan
or don't use p=quarantine and p=rejectKeep it simple







On Fri, Sep 18, 2020 at 5:47 AM Alessandro Vesely  wrote:

> On Thu 17/Sep/2020 21:11:42 +0200 Sabahattin Gucukoglu wrote:
> >
> > Wouldn’t it be nice if you could ask for MLMs to transform, just using a
> DMARC policy, even p=none, so that you could test with a live environment
> containing MLMs that work around DMARC policy? Or you could ask for *no*
> transform, even for p=quarantine or p=reject, so that your DMARC policy can
> be used to legitimately restrict usage to directly-sent email?
>
>
> It may be practical to place the asking in the message header, rather than
> in the DMARC record.  That way, senders can specify their wish on a
> per-message basis, presumably based on message recipients.  Note that a
> request to transform can include information about how to reliably undo the
> transformation, thereby verifying the original DKIM signature as described
> in dkim-transform[*].  Possible strategies that senders might use could be
> similar to those for putting weak signatures[†].
>
>
> Best
> Ale
> --
> [*] https://tools.ietf.org/html/draft-kucherawy-dkim-transform
> [†]
> https://tools.ietf.org/html/draft-levine-dkim-conditional-04#section-4.1
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> ___
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>


-- 
Joseph Brennan
Lead, Email and Systems Applications
Columbia University Information Technology
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC as Signal to MLMs for Rewrites (or not)

2020-09-18 Thread Alessandro Vesely
On Thu 17/Sep/2020 21:11:42 +0200 Sabahattin Gucukoglu wrote:
> 
> Wouldn’t it be nice if you could ask for MLMs to transform, just using a 
> DMARC policy, even p=none, so that you could test with a live environment 
> containing MLMs that work around DMARC policy? Or you could ask for *no* 
> transform, even for p=quarantine or p=reject, so that your DMARC policy can 
> be used to legitimately restrict usage to directly-sent email?


It may be practical to place the asking in the message header, rather than in 
the DMARC record.  That way, senders can specify their wish on a per-message 
basis, presumably based on message recipients.  Note that a request to 
transform can include information about how to reliably undo the 
transformation, thereby verifying the original DKIM signature as described in 
dkim-transform[*].  Possible strategies that senders might use could be similar 
to those for putting weak signatures[†].


Best
Ale
-- 
[*] https://tools.ietf.org/html/draft-kucherawy-dkim-transform
[†] https://tools.ietf.org/html/draft-levine-dkim-conditional-04#section-4.1
























___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC as Signal to MLMs for Rewrites (or not)

2020-09-17 Thread Douglas E. Foster
I had been working on proposed language to strengthen section 5, which has a 
very weak justification of the use of the From address, because the prior 
discussion has left the issue hanging.The current text is followed by my 
proposed replacement text.   Perhaps the group and the chairs are ready to 
address issue 73?

Doug Foster

Current language:

5.  Use of RFC5322.From

One of the most obvious points of security scrutiny for DMARC is the

choice to focus on an identifier, namely the RFC5322.From address,

which is part of a body of data that has been trivially forged

throughout the history of email.

Several points suggest that it is the most correct and safest thing

to do in this context:

*  Of all the identifiers that are part of the message itself, this

is the only one guaranteed to be present.

*  It seems the best choice of an identifier on which to focus, as

most MUAs display some or all of the contents of that field in a

manner strongly suggesting those data as reflective of the true

originator of the message.

The absence of a single, properly formed RFC5322.From field renders

the message invalid.  Handling of such a message is outside of the

scope of this specification.

Since the sorts of mail typically protected by DMARC participants

tend to only have single Authors, DMARC participants generally

operate under a slightly restricted profile of RFC5322 with respect

to the expected syntax of this field.  See Section 6.6 for details.

Proposed

5.  Use of RFC5322.From

DMARC's use of the RFC5322.From address has been challenged as arbitrary, 
especially since many MUAs display it only upon request.However, the 
RFC5322.From has consistently been understood to represent the person or other 
entity who is the author of the content and for whom responsibility should be 
attributed, so the integrity of RFC5322.From is critical to the credibility of 
the content.  If the content is to be reliably attributed, the FC5322.From 
address needs to be reliably verified.   Only the RFC5322.From address can 
serve this purpose.

The RFC5322.From has all of the necessary characteristics for the purpose of 
attribution.  First, it is a globally unique identifier.   Secondly, it is 
stable over time.  Because it is unique, it distinguishes this author from all 
other authors with similar names.   Additionally, because many users have 
multiple email addresses for different purposes, the RFC5322.From address also 
distinguishes between different roles taken by a single individual.   For all 
of these reasons, it is very useful for searching and sorting.  The 
RFC5322.From address is the only identifier that is presented to the user which 
can be verified.  The RFC5322.From address is the value which the user expects 
will be used for replies to the message.

A successful spoof of the RFC5322.From address permits the attacker to "put 
words in the mouth" of the spoofed individual, an action which could cause 
great harm to the sender's reputation.   If the recipient of the spoof replies 
to the spoofed originator, the recipient might also suffer significant 
embarrassment.

By comparison, the Friendly Name provides no uniqueness, has no settled format, 
has no verifiability, and has no permanence.Since the Friendly Name is 
usually configured in the MUA, the Friendly Name may change randomly based on 
the MUA currently being used by the sender, and the sender can alter it at any 
time to any value for any reason.   Attackers have been known to mimic the 
Friendly Name of someone known to the recipient to increase the effectiveness 
of the attack.  When a user sees suspicious content from a trusted Friendly 
Name, one appropriate response is to compare the Friendly Name to the 
RFC5322.From address to test for logical consistency.  Often, this is 
sufficient to detect the deception.

The value of the RFC5322.From address has been established by two disparate 
groups:  users of mailing lists and criminal actors.  Neither of these groups 
can be considered supporters of DMARC.  Mailing list users have complained 
vigorously because DMARC enforcement has caused mailing lists to alter the 
RFC5322.From address in ways that make sorting, searching, and other actions 
more problematic for them.Criminal actors have responded to DMARC by using 
look-alike domains that seek to impersonate the identity of a well-known domain 
without being subject to DMARC controls.   This action demonstrates that the 
criminal subculture, which DMARC seeks to restrict, knows that a successful 
spoof of the RFC5322.From address will be beneficial to their efforts.



From: listsebby=40me@dmarc.ietf.org
Sent: 9/17/20 6:10 PM
To: dmarc@ietf.org
Subject: Re: [dmarc-ietf] DMARC as Signal to MLMs for Rewrites (or not)

On 17 Sep 2020, at 20:59, Jesse Thompson 
 wrote:
> On 9/17/20 2:11 PM, Sabahattin Gucukoglu wrote:
>> Wouldn't it be nice if you

Re: [dmarc-ietf] DMARC as Signal to MLMs for Rewrites (or not)

2020-09-17 Thread Jesse Thompson
On 9/17/20 5:09 PM, Sabahattin Gucukoglu wrote:
> On 17 Sep 2020, at 20:59, Jesse Thompson 
>  wrote:
>> On 9/17/20 2:11 PM, Sabahattin Gucukoglu wrote:
>>> Wouldn’t it be nice if you could ask for MLMs to transform, just using a 
>>> DMARC policy, even p=none,
>>
>> It is possible via p=quarantine pct=0.  
>>
>> I think it makes sense to consider codifying beyond this defacto standard 
>> hack.  Isn't this part of DMARCbis?  It was discussed, anyway.  Which ones 
>> are active?  https://trac.ietf.org/trac/dmarc/report/1
> 
> These tickets seem to be relevant:
> #22 (Perverse incentives to use p!=none & pct=0): 
> https://trac.ietf.org/trac/dmarc/ticket/22
> #73 (Need decision on importance of From domain): 
> https://trac.ietf.org/trac/dmarc/ticket/73
> #63 (Make p=none with no reporting URI invalid—Closed): 
> https://trac.ietf.org/trac/dmarc/ticket/63
> 
> I did not realise that this “hack” had become widespread. I agree that it 
> should be codified, or else p=none explicitly needs to support it (and in 
> that case reporting must remain optional). I can’t speak to the pct 
> parameter, because my sites are too small to really benefit from it.

I can't say how widespread it is in practice, but the concept has been 
discussed occasionally in various contexts.  Those of us who choose to 
[mis]deploy DMARC for user domains may find it useful.  The tactic was helpful 
to identify some of the DMARC-unaware MLMs in use.  

...

I don't want to overlook your other idea about advertising the ask for *no* 
transform.  

Is the idea that the domain owner can decide when they feel like there is 
adequate adoption of ARC, and a suitable reputation system, so that the 
intermediaries aren't saddled with that uncertainty into eternity?  

On one hand, I worry that domain owners will never actually know that ARC is 
ready until they actually ask intermediaries to stop transforming (and observe 
what breaks).  

On the other hand, it puts control for ARC adoption into the hands of the 
community.  It also gives us something to measure ARC adoption in a more 
meaningful way.

Jesse

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC as Signal to MLMs for Rewrites (or not)

2020-09-17 Thread Sabahattin Gucukoglu
On 17 Sep 2020, at 20:59, Jesse Thompson 
 wrote:
> On 9/17/20 2:11 PM, Sabahattin Gucukoglu wrote:
>> Wouldn’t it be nice if you could ask for MLMs to transform, just using a 
>> DMARC policy, even p=none,
> 
> It is possible via p=quarantine pct=0.  
> 
> I think it makes sense to consider codifying beyond this defacto standard 
> hack.  Isn't this part of DMARCbis?  It was discussed, anyway.  Which ones 
> are active?  https://trac.ietf.org/trac/dmarc/report/1

These tickets seem to be relevant:
#22 (Perverse incentives to use p!=none & pct=0): 
https://trac.ietf.org/trac/dmarc/ticket/22
#73 (Need decision on importance of From domain): 
https://trac.ietf.org/trac/dmarc/ticket/73
#63 (Make p=none with no reporting URI invalid—Closed): 
https://trac.ietf.org/trac/dmarc/ticket/63

I did not realise that this “hack” had become widespread. I agree that it 
should be codified, or else p=none explicitly needs to support it (and in that 
case reporting must remain optional). I can’t speak to the pct parameter, 
because my sites are too small to really benefit from it.

Cheers,
Sabahattin

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC as Signal to MLMs for Rewrites (or not)

2020-09-17 Thread Jesse Thompson
On 9/17/20 2:11 PM, Sabahattin Gucukoglu wrote:
> Wouldn’t it be nice if you could ask for MLMs to transform, just using a 
> DMARC policy, even p=none,

It is possible via p=quarantine pct=0.  

I think it makes sense to consider codifying beyond this defacto standard hack. 
 Isn't this part of DMARCbis?  It was discussed, anyway.  Which ones are 
active?  https://trac.ietf.org/trac/dmarc/report/1

This trick also helps you find all of the receivers that ignore pct (treating 
your policy as p=quarantine pct=100)  This was annoyingly unexpected for us, 
but it happened to be an accidental graceful rollout mechanism that, I feel, 
worked better than ramping up the pct as designed.

Jesse

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


[dmarc-ietf] DMARC as Signal to MLMs for Rewrites (or not)

2020-09-17 Thread Sabahattin Gucukoglu
AFAIK, at the moment, MLMs doing transforms on headers to make messages 
DMARC-safe have no reliable way of knowing whether sender domains intended them 
to do so or not: there’s a heuristic that just says that in general, a DMARC 
domain enforcing an active quarantine or reject policy probably wants 
transforms.

Wouldn’t it be nice if you could ask for MLMs to transform, just using a DMARC 
policy, even p=none, so that you could test with a live environment containing 
MLMs that work around DMARC policy? Or you could ask for *no* transform, even 
for p=quarantine or p=reject, so that your DMARC policy can be used to 
legitimately restrict usage to directly-sent email?

For me the first is more important: I could make the case for DMARC much more 
strongly if I could rely on MLMs to implement a reliable workaround, under 
sender control, so DMARC-sceptics could challenge themselves to the actual 
consequences of the policy, without their enforcement, or continue to support 
traditional forwarding and/or mailing lists as neutral actors while positively 
impacting DMARC-safe mail. Without the workarounds being guaranteed, the 
current state of play, there’s no DMARC-safe future that works for everybody, 
IMO.

It’s reasonable to argue that these workarounds are horrible and I would. It’s 
also, unfortunately, everyday reality nowadays with two long-standing freemails 
using DMARC and all the major MLMs with support, and I have since been induced 
by practical experience to believe that, honestly, what matters for most MLM 
users is utility over functional purity. I have had at least one subscriber 
tell me that they _prefer_ the Mailman 2.16+ workaround because now they get 
the list name in the display name instead of the Subject making it easier to 
scan, and they can whitelist the list address to avoid the spam box or get 
notifications for list mail. I can’t even make myself care that Reply-to-all is 
broken—because that’s inevitably what people want for most lists, anyway. 
Heresy, I’m sure. :)

I still think DMARC’s use of the From: header is its biggest failing. Far 
better would have been to take the high road and use a dedicated 
Authenticated-Sender: (or likewise) header. MUAs would change, to explicitly 
distinguish authorship from “sendership”. But we are where we are. I could not 
call myself a fan of DMARC; I just think it’s inevitable.

Cheers,
Sabahattin

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc