Re: [dmarc-ietf] not really such a thing as AOL-compatible mailing lists

2023-04-10 Thread Hector Santos


> On Apr 10, 2023, at 12:55 PM, Murray S. Kucherawy  wrote:
> 
> I think the one thing we haven't discussed is: Could the 80-20 rule apply 
> here?  That is, if we start off with something like what 
> draft-kucherawy-dkim-transform proposed (or even a trivial subset of it), 
> might it make enough of a dent to get us through this stalemate, and then we 
> can figure out what to do with the rest of it?
> 

Speaking of Pareto:

- DMARC covers only 22% of the full ranges of signature scenarios with no 
provision to define nor authorize 3rd party (re)signers. 

- Occam’s Razor,  the solution is often more simpler than its often appears, 
80% of the time — ATPS.  Your Idea. Champion it and it will get supported by 
your peers.   Want to try inline method?  Fine. But explain why more complexity 
is better to reach same conclusion ATPS provides.  Best option; support both to 
cover the different admin methods.

- 80% of those who have been involved since MARID with LMAP, SPF, DKIM/, SSP, 
ADSP and "Super ADSP” DMARC are disillusioned why the IETF has allowed the same 
key cogs over 17 years to continue to perpetuate a broken protocol and problem 
when they never believed in SPF, ADSP and DMARC — their focus was Reputation 
modeling with no standard in place for an assessment lookup (opening a door for 
business interest).

This is not about heuristics.  We should first close the deterministic holes by 
providing domains a method to expose their 1st vs 3rd party expectations.  
DMARC is not a protocol complete when it comes to domain policies.

Too many closes. 80%???

—
HLS












___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] not really such a thing as AOL-compatible mailing lists

2023-04-10 Thread Hector Santos

> On Apr 10, 2023, at 12:55 PM, Murray S. Kucherawy  wrote:
>> 
> I think the one thing we haven't discussed is: Could the 80-20 rule apply 
> here?  That is, if we start off with something like what 
> draft-kucherawy-dkim-transform proposed (or even a trivial subset of it), 
> might it make enough of a dent to get us through this stalemate, and then we 
> can figure out what to do with the rest of it?
> 
> -MSK, participating

Please consider the overall goal and the various methods to get to the same 
conclusion:

- Inline ADID::SDID authorization (2nd signatures, new tags, complexity)
- DNS lookup ADID::SDID authorization (plug and plug)

The later is the more optimized method for plug and play implementation.

I would rather not have to change SPF, DKIM to support a protocol incomplete 
ADSP/DMARC proposal. We can begin to fix this with the proper add-ons or 
replacement of DMARC (which is not a good idea. We want to piggyback off the 
lookups).

DSAP provides domains a method to expose what is expected, unexpected and 
optional.  

Cover the boundary conditions to close loop holes that exist.

Too many holes.

—
HLS

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] not really such a thing as AOL-compatible mailing lists

2023-04-10 Thread Wei Chuang
On Mon, Apr 10, 2023 at 9:55 AM Murray S. Kucherawy 
wrote:

> On Mon, Apr 10, 2023 at 8:15 AM John Levine  wrote:
>
>> > For certain
>> >constrained but hopefully reasonable scenarios of mailing list
>> >modifications, we might be able to distinguish the sources of content.
>>
>> People have been suggesting this forwver, but it really doesn't scale.
>> There are a lot more list hosts with a lot more configurations that
>> any of us have individually ever seen. In many cases they add or
>> rewrite MIME parts which is extremely hard to unwind enough to see if
>> a DKIM signature would have been valid.
>>
>
> I have to agree.  For as many times as this notion has been proposed, it's
> never been given serious consideration, and this is the reason: We can't
> possibly describe all the MLM mutations that exist, even if the mechansim
> for doing so is made extensible.
>
> I think the one thing we haven't discussed is: Could the 80-20 rule apply
> here?
>

+1


> That is, if we start off with something like what
> draft-kucherawy-dkim-transform proposed (or even a trivial subset of it),
> might it make enough of a dent to get us through this stalemate, and then
> we can figure out what to do with the rest of it?
>

+1 I think that's a good start or some subset.
-Wei


>
> -MSK, participating
> ___
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>


smime.p7s
Description: S/MIME Cryptographic Signature
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] not really such a thing as AOL-compatible mailing lists

2023-04-10 Thread Wei Chuang
On Mon, Apr 10, 2023 at 8:15 AM John Levine  wrote:

> It appears that Wei Chuang   said:
> >1) We know that a sender intends to send a message down some path that may
> >include a mailing list, that got to me safely.  This is to avoid DKIM
> >replay and FROM spoofing attacks.
>
> I think we can do that by looking at the To/Cc addresses to check if
> they include the list that forwarded the mail.
>

+1 One approach might be to chain together recipients/sender pairs across
forwarders, and sign the recipients. (Another approach might be to tie
together SMTP transactions between sending-service/receiving-service pairs)


>
> >2) That we can identify the contributors to the content of the message in
> >that path to distinguish malicious vs benign contributors.
>
> Isn't that what ARC is for? You can look back through the list headers
> to see what the state of the message was like on the way in. While I
> am not a fan of applying DMARC policies to the output of forwarders
> like mailing lists, they work to filter inbound mail to a list.


With ARC and a modifying mailing list, we hopefully will see that an
expected DKIM-signature fails and hopefully at least a terminating
ARC-Message-Signature that passes.  With these tools, the receiver isn't
able to see which part of the message was contributed by the sender vs the
mailing list.   If there's spammy content, the receiver can't distinguish
which party contributed to that content, then so has to attribute that
spammy content to both parties, but at the cost of harming the innocent
one.  Despite that issue I should mention that ARC/DMARC still helps us in
knowing who your sender is, which is helpful.

-Wei


>
> > For certain
> >constrained but hopefully reasonable scenarios of mailing list
> >modifications, we might be able to distinguish the sources of content.
>
> People have been suggesting this forwver, but it really doesn't scale.
> There are a lot more list hosts with a lot more configurations that
> any of us have individually ever seen. In many cases they add or
> rewrite MIME parts which is extremely hard to unwind enough to see if
> a DKIM signature would have been valid.
>
> R's,
> John
>


smime.p7s
Description: S/MIME Cryptographic Signature
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] not really such a thing as AOL-compatible mailing lists

2023-04-10 Thread Murray S. Kucherawy
On Mon, Apr 10, 2023 at 8:15 AM John Levine  wrote:

> > For certain
> >constrained but hopefully reasonable scenarios of mailing list
> >modifications, we might be able to distinguish the sources of content.
>
> People have been suggesting this forwver, but it really doesn't scale.
> There are a lot more list hosts with a lot more configurations that
> any of us have individually ever seen. In many cases they add or
> rewrite MIME parts which is extremely hard to unwind enough to see if
> a DKIM signature would have been valid.
>

I have to agree.  For as many times as this notion has been proposed, it's
never been given serious consideration, and this is the reason: We can't
possibly describe all the MLM mutations that exist, even if the mechansim
for doing so is made extensible.

I think the one thing we haven't discussed is: Could the 80-20 rule apply
here?  That is, if we start off with something like what
draft-kucherawy-dkim-transform proposed (or even a trivial subset of it),
might it make enough of a dent to get us through this stalemate, and then
we can figure out what to do with the rest of it?

-MSK, participating
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] not really such a thing as AOL-compatible mailing lists

2023-04-10 Thread John Levine
It appears that Wei Chuang   said:
>1) We know that a sender intends to send a message down some path that may
>include a mailing list, that got to me safely.  This is to avoid DKIM
>replay and FROM spoofing attacks.

I think we can do that by looking at the To/Cc addresses to check if
they include the list that forwarded the mail.

>2) That we can identify the contributors to the content of the message in
>that path to distinguish malicious vs benign contributors.

Isn't that what ARC is for? You can look back through the list headers
to see what the state of the message was like on the way in. While I
am not a fan of applying DMARC policies to the output of forwarders
like mailing lists, they work to filter inbound mail to a list.

> For certain
>constrained but hopefully reasonable scenarios of mailing list
>modifications, we might be able to distinguish the sources of content.

People have been suggesting this forwver, but it really doesn't scale.
There are a lot more list hosts with a lot more configurations that
any of us have individually ever seen. In many cases they add or
rewrite MIME parts which is extremely hard to unwind enough to see if
a DKIM signature would have been valid.

R's,
John

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc