Re: [ietf-dkim] chained signatures, was l= summary

2009-06-09 Thread Stephen Farrell

I think Murray's point is a fair one. This thread isn't
really progressing in terms of what to in/exclude from
4871bis as far as I can see so let's leave it there.

Stephen.

Doug Otis wrote:
 On Jun 8, 2009, at 3:37 PM, Murray S. Kucherawy wrote:
 
 The use of the DKIM l=,  z= and x= features provide a means for  
 recipients to separately evaluate DKIM signatures without reliance  
 on intermediary assessors.  In addition, the A-R header does not  
 capture the IP address when assessing path registration protocols,  
 which means that safe recipient reassessment might only be possible  
 in the case of DKIM or reverse DNS.
 [...]
 Could we please not re-re-re-rehash these A-R issues on ietf-dkim?
 
 
 This was in response Charles making the statement:
 
 For such forensic investigations, removing useful information (aka  
 dumbing down) is always a dumb thing.
 
 These headers represent an active and potentially hazardous component  
 used in email annotation.  Unless the border MTA is willing to assert  
 the A-R headers not removed are safe, the A-R headers should be  
 removed.  The point of rehashing information excluded from the A-R  
 header was to emphasize the point that these headers were not intended  
 to play a role in forensics.  Otherwise, the source of a message would  
 have been important.
 
 -Doug 
 ___
 NOTE WELL: This list operates according to 
 http://mipassoc.org/dkim/ietf-list-rules.html
 

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-09 Thread Charles Lindsey
On Mon, 08 Jun 2009 19:30:38 +0100, Doug Otis doug.mtv...@gmail.com  
wrote:

 On Jun 8, 2009, at 3:24 AM, Charles Lindsey wrote:

 For sure, individual recipients may wish to check signatures etc.
 for themselves, espeicially if they have doubts about the policies
 applied by their local assessors. If the local assessor has
 unnecessarily removed some A-R that is actually covered by the
 signature, then that becomes impossible.

 The use of the DKIM l=,  z= and x= features provide a means for
 recipients to separately evaluate DKIM signatures without reliance on
 intermediary assessors.  In addition, the A-R header does not capture
 the IP address when assessing path registration protocols, which means
 that safe recipient reassessment might only be possible in the case of
 DKIM or reverse DNS.

I accept that my remarks concerning the retention of A-R headers are  
directed at the case where those headers are confirming the analysis of  
some DKIM signature. Different considerations may well apply when the A-R  
is reporting on some other security mechanism.

 The safest solution would be to remove _all_ A-R pre-existing A-R
 headers from different environments ...

 But that's not what the standard says.

 Wrong.  See RFC 5451 section 5, complete removal is suggested for
 maximum security.  It also suggests:

When you first made your claim, you were relying on Section 4.1. Now I  
have shot that one down, you have transferred to Section 5.

But section 5 merely says you MAY remove A-R headers, but then immediately  
goes on to warn you of two situations where this might be counter  
productive. Both of those situations arise in the scenarios I have been  
discussing.

-- 
Charles H. Lindsey -At Home, doing my own thing
Tel: +44 161 436 6131   
   Web: http://www.cs.man.ac.uk/~chl
Email: ...@clerew.man.ac.uk  snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9  Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-09 Thread Charles Lindsey
On Mon, 08 Jun 2009 23:37:50 +0100, Murray S. Kucherawy  
m...@cloudmark.com wrote:

 The use of the DKIM l=,  z= and x= features provide a means for
 recipients to separately evaluate DKIM signatures without reliance on
 intermediary assessors.  In addition, the A-R header does not capture
 the IP address when assessing path registration protocols, which means
 that safe recipient reassessment might only be possible in the case of
 DKIM or reverse DNS.
 [...]

 Could we please not re-re-re-rehash these A-R issues on ietf-dkim?  They  
 were already covered on mail-vet-discuss more times than I can count.   
 The archives of that list are public in case anyone really needs to go  
 through them all again.

Actually, this discussion is a spin-off of the thread on the usefulness of  
the l= tag, which is definitely on topic for this group.

What I think it makes clear that we are in serious need of some document  
to provide Best Practice for how mailing list expanders should handle  
DKIM, and I think that is something that this WG needs to take on board.

-- 
Charles H. Lindsey -At Home, doing my own thing
Tel: +44 161 436 6131   
   Web: http://www.cs.man.ac.uk/~chl
Email: ...@clerew.man.ac.uk  snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9  Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-08 Thread Charles Lindsey
On Fri, 05 Jun 2009 18:27:06 +0100, Doug Otis doug.mtv...@gmail.com  
wrote:

 On Jun 5, 2009, at 6:36 AM, Charles Lindsey wrote:

 No, that is NOT what section 1.6 of RFC 5451 says. It requires
 removal of any pre-existing A-R header claiming to be valid with in
 its [the ADMD's] boundaries, which essentially means (AIUI) any A-R
 header that might be mistaken for one that might/would/should have
 been created within that same ADMD.

 By selecting specific A-R headers to remove, header content might be
 processed post delivery, and then appear to match against some trusted
 domain.

For sure, individual recipients may wish to check signatures etc. for  
themselves, espeicially if they have doubts about the policies applied by  
their local assessors. If the local assessor has unnecessarily removed  
sone A-R that is actually covered by the signature, then that becomes  
impossible.

And if they have doubts about the policies of sone earlier mailing list  
expander, they might wish to see exactly what that expander had actually  
done to the message. For such forensic investigations, removing useful  
information (aka dumbing down) is always a dumb thing.

 The safest solution would be to remove _all_ A-R pre-existing A-R
 headers from different environments ...

But that's not what the standard says.

 Note that Appendix B.6 of RFC 5451 contains an example exactly
 equivalent to the one I have just given, including the retention of
 A_1 (and even S_1).

 IMHO, appendix B.6 is overly optimistic for today's environment.

Maybe so, but that document is a proposed standard, and unless you have  
plans to get it revised, we must try and work with it as it stands.  
Nothing in that example is contrary to what that standard says normatively.

-- 
Charles H. Lindsey -At Home, doing my own thing
Tel: +44 161 436 6131   
   Web: http://www.cs.man.ac.uk/~chl
Email: ...@clerew.man.ac.uk  snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9  Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-08 Thread Murray S. Kucherawy
  By selecting specific A-R headers to remove, header content might be
  processed post delivery, and then appear to match against some trusted
  domain.

I believe the Security Considerations of RFC5451 covers this adequately.

 For sure, individual recipients may wish to check signatures etc. for
 themselves, espeicially if they have doubts about the policies applied by
 their local assessors. If the local assessor has unnecessarily removed
 sone A-R that is actually covered by the signature, then that becomes
 impossible.

+1

  The safest solution would be to remove _all_ A-R pre-existing A-R
  headers from different environments ...
 
 But that's not what the standard says.

+1

  IMHO, appendix B.6 is overly optimistic for today's environment.

Have you seen actual attacks like this in the wild already?

 Maybe so, but that document is a proposed standard, and unless you have
 plans to get it revised, we must try and work with it as it stands.
 Nothing in that example is contrary to what that standard says
 normatively.

+1

(BTW, does this still qualify as being on topic for this list?)

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-08 Thread Doug Otis

On Jun 8, 2009, at 3:24 AM, Charles Lindsey wrote:

 On Fri, 05 Jun 2009 18:27:06 +0100, Doug Otis doug.mtv...@gmail.com
 wrote:

 On Jun 5, 2009, at 6:36 AM, Charles Lindsey wrote:

 By selecting specific A-R headers to remove, header content might  
 be processed post delivery, and then appear to match against some  
 trusted domain.

 For sure, individual recipients may wish to check signatures etc.  
 for themselves, espeicially if they have doubts about the policies  
 applied by their local assessors. If the local assessor has  
 unnecessarily removed some A-R that is actually covered by the  
 signature, then that becomes impossible.

The use of the DKIM l=,  z= and x= features provide a means for  
recipients to separately evaluate DKIM signatures without reliance on  
intermediary assessors.  In addition, the A-R header does not capture  
the IP address when assessing path registration protocols, which means  
that safe recipient reassessment might only be possible in the case of  
DKIM or reverse DNS.

 And if they have doubts about the policies of sone earlier mailing  
 list expander, they might wish to see exactly what that expander had  
 actually done to the message. For such forensic investigations,  
 removing useful information (aka dumbing down) is always a dumb  
 thing.

Removal of foreign A-R headers provides better security.  Since A-R  
header fails to capture source IP addresses for path registration  
schemes, the forensic value of this header is very limited, to the  
point of being dangerous.

Reliance upon the A-R header offers providers permission to modify  
messages.  Some providers offer their services free, however there  
remains a profit motive where their security may overlook embedded  
iFRAMEs referencing malware injected into one of their third-party ad  
servers.   A-R header may indicate to recipients that the message  
originated from Big-Bank, but ads might appear from a different  
entity.  In this case, the goal of DKIM is has been lost.
Unfortunately, the introduction of ads is fairly common, and the  
authserv-ids may not offer a means to consolidate or identify who is  
being trusted.  There are significant risks and problems created when  
dealing with A-R headers.  DKIM without A-R headers does not invite  
questionable practices likely to create many duped victims.   An  
appearance of a message being from someone trusted can be worse than a  
message with an unknown status when the content source is in doubt.

 The safest solution would be to remove _all_ A-R pre-existing A-R  
 headers from different environments ...

 But that's not what the standard says.

Wrong.  See RFC 5451 section 5, complete removal is suggested for  
maximum security.  It also suggests:

A more robust border MTA could allow a specific list of  
authenticating MTAs whose information should be let in, removing all  
others.

 Note that Appendix B.6 of RFC 5451 contains an example exactly  
 equivalent to the one I have just given, including the retention  
 of A_1 (and even S_1).

 IMHO, appendix B.6 is overly optimistic for today's environment.

 Maybe so, but that document is a proposed standard, and unless you  
 have plans to get it revised, we must try and work with it as it  
 stands.  Nothing in that example is contrary to what that standard  
 says normatively.

No.  Nor does the RFC warn of encoded headers or header reordering.   
Headers may be altered during handling.  In addition, the Trust  
Environment  can use any type of token, and not just those derived  
from a host name.  The lack of uniformity or standardized means of  
ensuring uniqueness means little should be assumed regarding any A-R  
header not generated by the receiving MTA.

-Doug


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-08 Thread Murray S. Kucherawy
 The use of the DKIM l=,  z= and x= features provide a means for
 recipients to separately evaluate DKIM signatures without reliance on
 intermediary assessors.  In addition, the A-R header does not capture
 the IP address when assessing path registration protocols, which means
 that safe recipient reassessment might only be possible in the case of
 DKIM or reverse DNS.
 [...]

Could we please not re-re-re-rehash these A-R issues on ietf-dkim?  They were 
already covered on mail-vet-discuss more times than I can count.  The archives 
of that list are public in case anyone really needs to go through them all 
again.


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-08 Thread Doug Otis

On Jun 8, 2009, at 3:37 PM, Murray S. Kucherawy wrote:

 The use of the DKIM l=,  z= and x= features provide a means for  
 recipients to separately evaluate DKIM signatures without reliance  
 on intermediary assessors.  In addition, the A-R header does not  
 capture the IP address when assessing path registration protocols,  
 which means that safe recipient reassessment might only be possible  
 in the case of DKIM or reverse DNS.
 [...]

 Could we please not re-re-re-rehash these A-R issues on ietf-dkim?


This was in response Charles making the statement:

For such forensic investigations, removing useful information (aka  
dumbing down) is always a dumb thing.

These headers represent an active and potentially hazardous component  
used in email annotation.  Unless the border MTA is willing to assert  
the A-R headers not removed are safe, the A-R headers should be  
removed.  The point of rehashing information excluded from the A-R  
header was to emphasize the point that these headers were not intended  
to play a role in forensics.  Otherwise, the source of a message would  
have been important.

-Doug 
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-05 Thread Charles Lindsey
On Thu, 04 Jun 2009 20:19:34 +0100, Douglas Otis do...@mail-abuse.org  
wrote:

 On Jun 4, 2009, at 5:20 AM, Charles Lindsey wrote:

 On Wed, 03 Jun 2009 17:13:02 +0100, Murray S. Kucherawy

 You're not required to sign them, but it's not a bad idea.

 Then why are people on this list not trying to enocourage that good
 practice? Indeed, why are they so vociferously trying to DIScourage
 it?

 Before A-R headers can be trusted, A-R headers MUST be removed by
 incoming border MTAs.  See section 1.6 of RFC 5451.

No, that is NOT what section 1.6 of RFC 5451 says. It requires removal of  
any pre-existing A-R header claiming to be valid with in its [the ADMD's]  
boundaries, which essentially means (AIUI) any A-R header that might be  
mistaken for one that might/would/should have been created within that  
same ADMD.

BUT the cases we are considering are where, in the course of its travels,  
a message has picked up two signatures, S_1 and S_2, but where S_1 has  
(possibly) been invalidated by some change at an intermediate site  
(typically a mailing list expander) en route, and even where S_1 has been  
removed at some point. So there are at least three ADMDs involved:

|sending ADMD   |   Mail List ADMD|   Receiving  
ADMD |
| orig MUA orig MTA | |Recv MTA Recv  
MUA |
|M --- M+S_1 --+- M+S_1+A_1 - M*+A_1+S_2 --+- M*+A_1+S_2+A_2  
-- |

A_1 was added by a validator/assessor on the strength of S_!
A_2 was added by a validator/assessor on the strength of S_2
Observe that M was transmogrified into M* at some point, breaking S_!.

If some helpful MTA, somewhere between the Mail List and Receiving  
ADMDs, had also added an A_2, then THAT is the one that should be removed  
by Recv MTA, before inserting its own (which it obviously would not do if  
S_2 covered A_1, and A_1 was no longer there).

What Recv MTA passes on to Recv MUA is entirely a matter to be decided  
within the Receiving ADMD, but I hope it would be everything that was  
available (even S_1 if it were still available).

Note that Appendix B.6 of RFC 5451 contains an example exactly equivalent  
to the one I have just given, including the retention of A_1 (and even  
S_1).

-- 
Charles H. Lindsey -At Home, doing my own thing
Tel: +44 161 436 6131   
   Web: http://www.cs.man.ac.uk/~chl
Email: ...@clerew.man.ac.uk  snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9  Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-05 Thread Doug Otis

On Jun 5, 2009, at 6:36 AM, Charles Lindsey wrote:

 On Thu, 04 Jun 2009 20:19:34 +0100, Douglas Otis do...@mail- 
 abuse.org
 wrote:

 On Jun 4, 2009, at 5:20 AM, Charles Lindsey wrote:

 On Wed, 03 Jun 2009 17:13:02 +0100, Murray S. Kucherawy

 You're not required to sign them, but it's not a bad idea.

 Then why are people on this list not trying to enocourage that  
 good practice? Indeed, why are they so vociferously trying to  
 DIScourage it?

 Before A-R headers can be trusted, A-R headers MUST be removed by  
 incoming border MTAs.  See section 1.6 of RFC 5451.

 No, that is NOT what section 1.6 of RFC 5451 says. It requires  
 removal of any pre-existing A-R header claiming to be valid with in  
 its [the ADMD's] boundaries, which essentially means (AIUI) any A-R  
 header that might be mistaken for one that might/would/should have  
 been created within that same ADMD.

By selecting specific A-R headers to remove, header content might be  
processed post delivery, and then appear to match against some trusted  
domain.

The safest solution would be to remove _all_ A-R pre-existing A-R  
headers from different environments or not since they may not have  
been treated as trace headers or are encoded in some fashion.  It is  
hard enough to decide whether A-R headers that appear to be from the  
incoming domain can be trusted.  To better ensure trustworthiness of A- 
R headers, it seems wise to remove _all_ preexisting A-R headers.   
Until A-R handling has demonstrated consistent safety, and not just  
safe most of the time, it seems imprudent to trust foreign A-R  
headers.  YMMV.

 BUT the cases we are considering are where, in the course of its  
 travels,  a message has picked up two signatures, S_1 and S_2, but  
 where S_1 has (possibly) been invalidated by some change at an  
 intermediate site  (typically a mailing list expander) en route, and  
 even where S_1 has been removed at some point. So there are at least  
 three ADMDs involved:

 |sending ADMD   |   Mail List ADMD|   Receiving  
 ADMD |
 | orig MUA orig MTA | |Recv MTA  
 Recv MUA |
 |M --- M+S_1 --+- M+S_1+A_1 - M*+A_1+S_2 --+- M*+A_1+S_2+A_2
 -- |

 A_1 was added by a validator/assessor on the strength of S_1
 A_2 was added by a validator/assessor on the strength of S_2
 Observe that M was transmogrified into M* at some point, breaking S_1.

 If some helpful MTA, somewhere between the Mail List and Receiving  
 ADMDs, had also added an A_2, then THAT is the one that should be  
 removed by Recv MTA, before inserting its own (which it obviously  
 would not do if S_2 covered A_1, and A_1 was no longer there).

 What Recv MTA passes on to Recv MUA is entirely a matter to be  
 decided within the Receiving ADMD, but I hope it would be everything  
 that was available (even S_1 if it were still available).

 Note that Appendix B.6 of RFC 5451 contains an example exactly  
 equivalent to the one I have just given, including the retention of  
 A_1 (and even S_1).

IMHO, appendix B.6 is overly optimistic for today's environment.

-Doug


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-04 Thread Charles Lindsey
On Wed, 03 Jun 2009 14:58:06 +0100, John Levine jo...@iecc.com wrote:

 The most common use of A-R will likely involve a secure channel
 between the place where it's applied and the place where it's
 interpreted, e.g., it's applied at a border MTA and it's interpreted
 in a downstream MTA or MUA within the same network.  In that case, you
 don't need a signature.

Agreed, but that is not the situation of concern.

 If you imagine that there are strangers elsewhere in the world who
 would be impressed by your opinion of a message you were forwarding,
 you might want to sign it, but as I've noted before, if you're
 forwarding it and mutating it enough that recipients wouldn't use an
 incoming signature (i.e., you're a mailing list) you'd best take care
 to send and sign only mail that recipients are likely to want.

A competent mailing list admin would reject all messages from dubious  
sources. But it would be foolish to assume that all such admins are as  
competent as we would wish. So the mere fact that they (re)sign messages  
does not prove their origin, except insofar as you are prepared to have  
confidence in their competence.

If they try to bolster your confidence in them by offering an A-R header  
to show their diligence in eliminating dubious messages, then that is well  
and good, but if they are unwilling to put their signature where their  
mouth is, then why should I be impressed? I don't see why you would choose  
to regard me, as a member of your mailing list, as some stranger  
elsewhere in the world.

-- 
Charles H. Lindsey -At Home, doing my own thing
Tel: +44 161 436 6131   
   Web: http://www.cs.man.ac.uk/~chl
Email: ...@clerew.man.ac.uk  snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9  Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-04 Thread Charles Lindsey
On Wed, 03 Jun 2009 17:13:02 +0100, Murray S. Kucherawy  
m...@cloudmark.com wrote:

 WTF is the point of inserting an A-R header if you are not willing to
 take responsibility for what you have done by signing it?

 And why should anyone else believe your A-R if you have omitted that
 elementary step?

 Because, if you've followed the RFC defining it, the border MTA has  
 removed any others present that could possibly be misinterpreted by  
 internal agents.

Yes, but that is the MTA at MY border. I would expect the assessor at MY  
border to have indicated some degree of suspicion if the A_R header it was  
about to remove (before substituting its own) was not included in the  
signature that accompanied it.

 You're not required to sign them, but it's not a bad idea.

Then why are people on this list not trying to enocourage that good  
practice? Indeed, why are they so vociferously trying to DIScourage it?

-- 
Charles H. Lindsey -At Home, doing my own thing
Tel: +44 161 436 6131   
   Web: http://www.cs.man.ac.uk/~chl
Email: ...@clerew.man.ac.uk  snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9  Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-04 Thread Michael Thomas
Charles Lindsey wrote:
 On Wed, 03 Jun 2009 17:13:02 +0100, Murray S. Kucherawy  
 m...@cloudmark.com wrote:
 
 WTF is the point of inserting an A-R header if you are not willing to
 take responsibility for what you have done by signing it?

 And why should anyone else believe your A-R if you have omitted that
 elementary step?
 Because, if you've followed the RFC defining it, the border MTA has  
 removed any others present that could possibly be misinterpreted by  
 internal agents.
 
 Yes, but that is the MTA at MY border. I would expect the assessor at MY  
 border to have indicated some degree of suspicion if the A_R header it was  
 about to remove (before substituting its own) was not included in the  
 signature that accompanied it.

The cases, IMO, of when a ar-header is useful from a foreign domain
are vanishingly small, so removing it is just a matter of good hygiene.
If capturing its essence is important, I suppose that we'll first see
border mta software using it for something. To my knowledge, nobody is.
(foreign a-r that is).

 You're not required to sign them, but it's not a bad idea.
 
 Then why are people on this list not trying to enocourage that good  
 practice? Indeed, why are they so vociferously trying to DIScourage it?

Because it's a marginal case. At Cisco, the only thing that I'm aware*
that we were using a-r for was generating gross statistics, where what
even a trusted foreign verifier -- which we had none -- were useless for
what we were using it for. Maybe we were outliers, but I doubt it.

[*] yes a couple of us were using ar to color messages in our muas, but
we were a pretty self-selected, self-interested population

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-04 Thread Douglas Otis

On Jun 4, 2009, at 5:20 AM, Charles Lindsey wrote:

 On Wed, 03 Jun 2009 17:13:02 +0100, Murray S. Kucherawy
 m...@cloudmark.com wrote:

 WTF is the point of inserting an A-R header if you are not willing  
 to take responsibility for what you have done by signing it?

 And why should anyone else believe your A-R if you have omitted  
 that elementary step?

 Because, if you've followed the RFC defining it, the border MTA  
 has  removed any others present that could possibly be  
 misinterpreted by  internal agents.

 Yes, but that is the MTA at MY border. I would expect the assessor  
 at MY border to have indicated some degree of suspicion if the A_R  
 header it was about to remove (before substituting its own) was not  
 included in the signature that accompanied it.

 You're not required to sign them, but it's not a bad idea.

 Then why are people on this list not trying to enocourage that good   
 practice? Indeed, why are they so vociferously trying to DIScourage  
 it?

Before A-R headers can be trusted, A-R headers MUST be removed by  
incoming border MTAs.  See section 1.6 of RFC 5451.

Border MTAs may exchange messages with internal servers that might  
process filters where internal routes are influenced by message  
content.  Whenever removing A-R headers is done on a conditional  
basis, this creates gaps in security, especially when trust is placed  
upon A-R headers added by a subsequent filtering process.  Only  
removing A-R headers at the border exactly matching those added by the  
receiving domain invites trouble.  There are many three-step tricks  
that thwart matching techniques, where these headers might appear  
differently at some later stage.  The safest approach for handling A-R  
headers would be to remove _all_ of them as they arrive.  After  
filtering messages, incoming MTA can decide what they wish to do with  
the message.  When a filtering process decides to reject a message,  
this should be done prior to adding A-R headers, perhaps even after  
removing existing A-R headers.  A safe process must ensure there is no  
overlap between where incoming A-R headers are removed, and where the  
incoming receivers add A-R headers to messages.

The issue of A-R headers being trusted only when signed by DKIM runs  
counter to their intended use.  When it is concluded that MUAs should  
independently check DKIM signatures that include A-R headers, this  
suggests A-R headers are not very trustworthy, which might be the  
case.  Whatever leak that allows a bad actor's A-R header to appear  
could also find itself inadvertently signed by the incoming domain.   
Just check originating DKIM signatures, and ignore A-R headers would  
be the safest solution.  Use of A-R headers allow providers a means to  
visibly modify messages without the recipient being aware that the  
visible content had been added by the provider.  In general, this  
seems like a bad idea with respect to DKIM.

-Doug

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-04 Thread Murray S. Kucherawy
 The issue of A-R headers being trusted only when signed by DKIM runs
 counter to their intended use.

That's not necessarily true.

You're making hard assertions about a fuzzy situation.  DKIM signing might work 
just fine in certain installations.  That's why RFC5451 suggests doing this 
without requiring it.

 Whatever leak that allows a bad actor's A-R header to appear
 could also find itself inadvertently signed by the incoming domain.

I agree that this is a security consideration, but it doesn't mean signing A-R 
headers is a waste of effort.  At some sites it's probably the ideal solution.

 Just check originating DKIM signatures, and ignore A-R headers would
 be the safest solution.  Use of A-R headers allow providers a means to
 visibly modify messages without the recipient being aware that the
 visible content had been added by the provider.  In general, this
 seems like a bad idea with respect to DKIM.

I disagree with in general.  There seems to have been enough consensus to put 
A-R up to proposed standard status, and that seems to fly in the face of your 
claim that it's not useful.

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-03 Thread Charles Lindsey
On Tue, 02 Jun 2009 14:24:43 +0100, Michael Thomas m...@mtcc.com wrote:

 Wietse Venema wrote:
 Charles Lindsey:
 On Mon, 01 Jun 2009 15:49:28 +0100, Barry Leiba  
 barryle...@computer.org
 wrote:

 I think it's a terrible idea to (1) leave signatures in a message
 after you break them, (2) add A-R without removing any already there,
 or (3) add A-R without a signature covering it.

 A signature covering it? That's quite a new requirement for a-r and
 one that nobody that I'm aware is following.

It is such a blatantly obvious necessity that I am surprised it is  
occasioning such surprise.

WTF is the point of inserting an A-R header if you are not willing to take  
responsibility for what you have done by signing it?

And why should anyone else believe your A-R if you have omitted that  
elementary step?

 In any case, removing signatures seriously sucks from a forensics
 standpoint. The DKIM rule is that if they're broken, they're equivalent
 to not existing. Leaving signatures in hurts *nothing*, and
 provides a lot of feedback to the original sender if needed to
 diagnose why signatures failed.

+1. That is exact;y the point I was trying to make.

 This shit happens in the real world. Often.

-- 
Charles H. Lindsey -At Home, doing my own thing
Tel: +44 161 436 6131   
   Web: http://www.cs.man.ac.uk/~chl
Email: ...@clerew.man.ac.uk  snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9  Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-03 Thread John Levine
WTF is the point of inserting an A-R header if you are not willing to take  
responsibility for what you have done by signing it?

And why should anyone else believe your A-R if you have omitted that  
elementary step?

The most common use of A-R will likely involve a secure channel
between the place where it's applied and the place where it's
interpreted, e.g., it's applied at a border MTA and it's interpreted
in a downstream MTA or MUA within the same network.  In that case, you
don't need a signature.

If you imagine that there are strangers elsewhere in the world who
would be impressed by your opinion of a message you were forwarding,
you might want to sign it, but as I've noted before, if you're
forwarding it and mutating it enough that recipients wouldn't use an
incoming signature (i.e., you're a mailing list) you'd best take care
to send and sign only mail that recipients are likely to want.

I'm with Mike here -- signing A-R isn't important, because chained
signatures won't be useful in practice.

R's,
John


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-03 Thread Murray S. Kucherawy
 WTF is the point of inserting an A-R header if you are not willing to
 take responsibility for what you have done by signing it?
 
 And why should anyone else believe your A-R if you have omitted that
 elementary step?

Because, if you've followed the RFC defining it, the border MTA has removed any 
others present that could possibly be misinterpreted by internal agents.

You're not required to sign them, but it's not a bad idea.


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-03 Thread Douglas Otis

On Jun 3, 2009, at 9:13 AM, Murray S. Kucherawy wrote:

 WTF is the point of inserting an A-R header if you are not willing  
 to take responsibility for what you have done by signing it?

 And why should anyone else believe your A-R if you have omitted  
 that elementary step?

 Because, if you've followed the RFC defining it, the border MTA has  
 removed any others present that could possibly be misinterpreted by  
 internal agents.

 You're not required to sign them, but it's not a bad idea.


ISPs seem unlikely sign incoming messages because they include their A- 
R headers.  A-R headers are expected to be removed at border MTAs, so  
when forwarding, signatures intended to protect A-R headers will  
normally become invalid.  One would not be able to tell whether these  
signature were being spoofed by the ISPs outbound server, or whether  
the signature represents a failed attempt to protect A-R headers.
Should DKIM signatures not include missing A-R headers?

-Doug

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-02 Thread Charles Lindsey
On Mon, 01 Jun 2009 15:49:28 +0100, Barry Leiba barryle...@computer.org  
wrote:

 I think it's a terrible idea to (1) leave signatures in a message
 after you break them, (2) add A-R without removing any already there,
 or (3) add A-R without a signature covering it.

And I, on the contrary, believe it is a terrible idea EVER to remove a  
signature or an A-R header. There is never anything to be gained by  
throwing away information that someone more perceptive than yourself might  
find useful.

-- 
Charles H. Lindsey -At Home, doing my own thing
Tel: +44 161 436 6131   
   Web: http://www.cs.man.ac.uk/~chl
Email: ...@clerew.man.ac.uk  snail: 5 Clerewood Ave, CHEADLE, SK8 3JU, U.K.
PGP: 2C15F1A9  Fingerprint: 73 6D C2 51 93 A0 01 E7 65 E8 64 7E 14 A4 AB A5
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-02 Thread Wietse Venema
Charles Lindsey:
 On Mon, 01 Jun 2009 15:49:28 +0100, Barry Leiba barryle...@computer.org  
 wrote:
 
  I think it's a terrible idea to (1) leave signatures in a message
  after you break them, (2) add A-R without removing any already there,
  or (3) add A-R without a signature covering it.
 
 And I, on the contrary, believe it is a terrible idea EVER to remove a  
 signature or an A-R header. There is never anything to be gained by  
 throwing away information that someone more perceptive than yourself might  
 find useful.

Except, of course, when the bad guys use this to have their bogus
signatures and their bogus A-R headers laundered by naive signers.

Wietse
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-02 Thread Paul Russell
On 6/2/2009 08:05, Wietse Venema wrote:
 Charles Lindsey:
 On Mon, 01 Jun 2009 15:49:28 +0100, Barry Leiba barryle...@computer.org  
 wrote:

 I think it's a terrible idea to (1) leave signatures in a message
 after you break them, (2) add A-R without removing any already there,
 or (3) add A-R without a signature covering it.
 And I, on the contrary, believe it is a terrible idea EVER to remove a  
 signature or an A-R header. There is never anything to be gained by  
 throwing away information that someone more perceptive than yourself might  
 find useful.
 
 Except, of course, when the bad guys use this to have their bogus
 signatures and their bogus A-R headers laundered by naive signers.


I agree.  DKIM is supposed to make it easier for recipients to recognize the
few legitimate messages in the flood of unwanted, if not intentionally
malicious, messages that are presented to our servers.  I see little, if any,
value in leaving broken signatures and the matching A-R headers in a message,
and a great deal of potential for problems resulting from the flawed assumption
that the signature must have been valid at some point in time, or it and its
matching A-R headers would not be present.

-- 
Paul Russell, Senior Systems Administrator
OIT Messaging Services Team
University of Notre Dame

Just because you're paranoid doesn't mean they aren't out to get you.
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-02 Thread Michael Thomas
Wietse Venema wrote:
 Charles Lindsey:
 On Mon, 01 Jun 2009 15:49:28 +0100, Barry Leiba barryle...@computer.org  
 wrote:

 I think it's a terrible idea to (1) leave signatures in a message
 after you break them, (2) add A-R without removing any already there,
 or (3) add A-R without a signature covering it.

A signature covering it? That's quite a new requirement for a-r and
one that nobody that I'm aware is following.

 And I, on the contrary, believe it is a terrible idea EVER to remove a  
 signature or an A-R header. There is never anything to be gained by  
 throwing away information that someone more perceptive than yourself might  
 find useful.
 
 Except, of course, when the bad guys use this to have their bogus
 signatures and their bogus A-R headers laundered by naive signers.

People who use bogus information to make go/no-go decisions quite
literally get what they deserve. Why single out DKIM?

In any case, removing signatures seriously sucks from a forensics
standpoint. The DKIM rule is that if they're broken, they're equivalent
to not existing. Leaving signatures in hurts *nothing*, and
provides a lot of feedback to the original sender if needed to
diagnose why signatures failed.

This shit happens in the real world. Often.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-02 Thread Jon Callas
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


On Jun 2, 2009, at 5:05 AM, Wietse Venema wrote:

 Charles Lindsey:
 On Mon, 01 Jun 2009 15:49:28 +0100, Barry Leiba barryle...@computer.org 
 
 wrote:

 I think it's a terrible idea to (1) leave signatures in a message
 after you break them, (2) add A-R without removing any already  
 there,
 or (3) add A-R without a signature covering it.

 And I, on the contrary, believe it is a terrible idea EVER to  
 remove a
 signature or an A-R header. There is never anything to be gained by
 throwing away information that someone more perceptive than  
 yourself might
 find useful.

 Except, of course, when the bad guys use this to have their bogus
 signatures and their bogus A-R headers laundered by naive signers.

I agree with Wietse on the basic principle here.

If one is providing an email service where one is *processing* a  
message, then removing old signatures and resigning is the best thing.

For example, a mailing list server processes the message in that it  
takes incoming messages and then resends them in some similar-to- 
identical form. I believe it is ideal in this case to remove the old  
signature and resign.

I as the ultimate receiver, filter and process those messages based  
upon the mailing list, not based upon the original sender. I'm on a  
number of lists with many of you and I want them organized by mailing  
list, not sending person. DKIM should be similar.

However, if someone implemented a mailing list server that did its  
best to be invisible, I wouldn't say it was doing the wrong thing,  
either.

The bad case is where I have a message that is signed by both parties  
and one signature is broken. That puts the message into some weird  
state. It's less weird when the person's signature is broken and the  
list signature isn't. The broken signature now just creates confusion.  
The other case is even more confusing, but yet the message is still  
cryptographically intact.

That's why if I were the author of the list server, I'd strip and  
resign (or resend while preserving the signature).

Jon



-BEGIN PGP SIGNATURE-
Version: PGP Universal 2.6.3
Charset: US-ASCII

wj8DBQFKJZ5ssTedWZOD3gYRApmsAJ98y9PBd4AZinARHBHJsziUqeK3pgCff4QM
zlbWthOHQspF35EhqHvchyk=
=BRdV
-END PGP SIGNATURE-

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-01 Thread MH Michael Hammer (5304)


 -Original Message-
 From: ietf-dkim-boun...@mipassoc.org [mailto:ietf-dkim-
 boun...@mipassoc.org] On Behalf Of John R. Levine
 Sent: Friday, May 29, 2009 5:22 PM
 To: Barry Leiba
 Cc: DKIM List
 Subject: Re: [ietf-dkim] chained signatures, was l= summary
 
  DKIM is too complicated as it is, and it strikes me as an extremely
 poor
  idea to add yet more cruft to work around perverse situations that
are
 as
  yet (and probably always) entirely hypothetical.
 
  I don't understand what cruft you think I'm talking about.
 
 Telling people that it is reasonable to add a chain of A-R headers to
 messages with broken signatures, and expecting recipients to apply
some
 ill defined algorithm to decide how much they believe each level of
 alleged signature.
 
 I would really like to remove l= from DKIM to make it clear that it is
not
 a good idea to even try to guess the history of a message based on
 signatures that don't verify and cover the whole messag.
 
 R's,
 John


+1

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-01 Thread Barry Leiba
On Fri, May 29, 2009 at 5:22 PM, John R. Levine jo...@iecc.com wrote:
 I don't understand what cruft you think I'm talking about.

 Telling people that it is reasonable to add a chain of A-R headers to
 messages with broken signatures, and expecting recipients to apply some ill
 defined algorithm to decide how much they believe each level of alleged
 signature.

What part of my message makes you think that's what I'm suggesting?
Surely not the part where I say, Chaining isn't the point..  And it
certainly can't be the part where I say, remove all previous sigs AND
all previous A-R.

I think it's a terrible idea to (1) leave signatures in a message
after you break them, (2) add A-R without removing any already there,
or (3) add A-R without a signature covering it.

Or are you just trolling?

 I would really like to remove l= from DKIM to make it clear that it is not a
 good idea to even try to guess the history of a message based on signatures
 that don't verify and cover the whole messag.

Yes, that seems to be the consensus, and I agree with that.

Barry, as participant
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-06-01 Thread Paul Russell
On 6/1/2009 10:49, Barry Leiba wrote:
 On Fri, May 29, 2009 at 5:22 PM, John R. Levine jo...@iecc.com wrote:
 I would really like to remove l= from DKIM to make it clear that it is not a
 good idea to even try to guess the history of a message based on signatures
 that don't verify and cover the whole messag.
 
 Yes, that seems to be the consensus, and I agree with that.
 
 Barry, as participant

It appears that you either missed or chose to ignore recent messages from
individuals who do not agree that l= should be removed.  I have been reading
the arguments on both sides of this issue and lean towards leaving it in the
spec.

-- 
Paul Russell, Senior Systems Administrator
OIT Messaging Services Team
University of Notre Dame
pruss...@nd.edu


___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-05-29 Thread Barry Leiba
 DKIM is too complicated as it is, and it strikes me as an extremely poor
 idea to add yet more cruft to work around perverse situations that are as
 yet (and probably always) entirely hypothetical.

I don't understand what cruft you think I'm talking about.  Nothing
in my message needs anything added to DKIM, and no one is suggesting
removing anything from DKIM that will invalidate what my message said.

Barry
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-05-29 Thread Michael Thomas
Barry Leiba wrote:
 DKIM is too complicated as it is, and it strikes me as an extremely poor
 idea to add yet more cruft to work around perverse situations that are as
 yet (and probably always) entirely hypothetical.
 
 I don't understand what cruft you think I'm talking about.  Nothing
 in my message needs anything added to DKIM, and no one is suggesting
 removing anything from DKIM that will invalidate what my message said.

Anybody who says that DKIM is too complicated has no perspective
on internet protocols. SMTP, SIP, IKEv1 qualify as too complicated.
Would that all internet protocols were as complicated as DKIM.

Mike
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-05-29 Thread John R. Levine
 DKIM is too complicated as it is, and it strikes me as an extremely poor
 idea to add yet more cruft to work around perverse situations that are as
 yet (and probably always) entirely hypothetical.

 I don't understand what cruft you think I'm talking about.

Telling people that it is reasonable to add a chain of A-R headers to 
messages with broken signatures, and expecting recipients to apply some 
ill defined algorithm to decide how much they believe each level of 
alleged signature.

I would really like to remove l= from DKIM to make it clear that it is not 
a good idea to even try to guess the history of a message based on 
signatures that don't verify and cover the whole messag.

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-05-28 Thread Barry Leiba
 Chaining signatures with Authentication-Results is unlikely to work,
 since with two or more levels of chaining, there is no reliable way to
 tell which A-R header goes with which signature.

Chaining isn't the point.  And mailing lists aren't the only
forwarders (I agree with what you say about mailing lists).

My address, at computer.org, is a forwarder.  When the mail gets to my
real mail server, it doesn't filter based on computer.org, but based
on the original sender, of course.  Now, computer.org won't break any
DKIM sig that's already there, so there's no worry.  But suppose it
did.

The model is this:

If you're going to send a message on and are not going to break the
signature, you do one of these:
1. do nothing to A-R or DKIM-Sig records that are there, and do not
sign yourself, OR
2. do nothing to A-R or DKIM-Sig records that are there, and add your
own sig.  Your sig does NOT cover A-R.

If you're going to send a message on and ARE going to break the
signature, you do this:
1. verify all previous sigs, creating your own A-R in the process, then
2. remove all previous sigs AND all previous A-R, then
3. put in your own A-R, then
4. DKIM-sign the message, having the sig cover your A-R.

If the process works like that, the verifier has exactly one signature
that covers the authentication results, so it knows where they came
from.  It can use that extra information or not, as it chooses.

We can argue about whether the information is useful in that case, but
it's the verifier's choice.  And it means that you don't leave
signatures around that YOU broke, so if I get one good signature and
a bunch of broken signatures, it means the signatures were broken for
some other reason.  (I probably don't care about that, I'm just
saying)

 A-R can be useful in some very narrow circumstances, where the channel
 between the agent that applies the header and the agent that uses it
 is secure.  The most likely setup is that it's applied as the message
 is dropped into a mailbox on a server, and it's used by a MUA or local
 filtering proxy that picks up the message via POP or IMAP.

As I describe things above, A-R can be useful in more situations than
that.  If you (the verifier, the MUA, whatever) trusts the signer that
signed the A-R, you have information you can use.

Barry, as participant

___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-05-28 Thread John R. Levine
 If you're going to send a message on and are not going to break the
 signature, you do one of these:

Sign or don't sign, it works fine either way.

 If you're going to send a message on and ARE going to break the
 signature, you do this:

You're a mailing list, so filter, sign and earn your own reputation.

DKIM is too complicated as it is, and it strikes me as an extremely poor 
idea to add yet more cruft to work around perverse situations that are as 
yet (and probably always) entirely hypothetical.

How likely is it that a mail setup that break signatures will add all 
sorts of code to support DKIM, check incoming signatures, add A-R headers, 
and resign them, but won't filter and sign like a mailing list does? 
This is the kind of arcane situation for which the correct advice is 
don't do that.

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html


Re: [ietf-dkim] chained signatures, was l= summary

2009-05-25 Thread John Levine
But it wasn't. The FUD was actually increased, because the DKIM-Signature  
that was added doesn't cover the Authentication-Results header.

Chaining signatures with Authentication-Results is unlikely to work,
since with two or more levels of chaining, there is no reliable way to
tell which A-R header goes with which signature.

But since it is a Fundamentally Bad Idea, it doesn't matter, and there
is no security issue to fix.  If a message has one good signature and
a bunch of broken signatures, as will generally be the case here, you
ignore the broken ones and use the good one to evaluate the message.

Everybody I know filters list mail based on the identity of the list,
not the identity of the contributors, they have ever since there has
been mail filtering, and there is no reason to expect that to change
in the future.  I am baffled that people have wasted so much effort on
broken non-solutions to a non-existent problem.

A-R can be useful in some very narrow circumstances, where the channel
between the agent that applies the header and the agent that uses it
is secure.  The most likely setup is that it's applied as the message
is dropped into a mailbox on a server, and it's used by a MUA or local
filtering proxy that picks up the message via POP or IMAP.

R's,
John
___
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html