Re: [mailop] $GOOG

2022-04-13 Thread Tobias Fiebig via mailop
heho,
thanks for bringing this up. i am currently digging a bit in the whole scape of 
centralization, especially in academia (see page 4-7 here for the perspective 
of mail-hosting in academia: https://arxiv.org/pdf/2104.09462.pdf ); things 
are... dire, especially in the us. universities used to be _the_ place 
self-hosting infrastructure.

email is a rather evolving system, and to align the design choices of the past 
with the needs of a mass Internet, the complexity of running stuff oneself is 
going up (and the number of dmarc report rua bounces from _large_ entities i 
get each night tells me that this is not limited to smaller operators...); with 
major providers intransparently deciding what to enforce (and what applies to 
them), i hear many saying 'well, if you want your mails delivered, go for 
$bigone'.

this is essentially how we lost xmpp and i fear the dice are already in the cup 
for smtp et al. (and the rest of the Internet).

with best regards,
tobias

-Original Message-
From: mailop  On Behalf Of Paul Vixie via mailop
Sent: Wednesday, 13 April 2022 23:44
To: mailop@mailop.org
Subject: [mailop] $GOOG

it's troubling me that in a recent thread asking where to host mailboxes, 
google was recommended several times, in spite of the fact that google is 
provably wrong and provably non-transarent in how they decide what inbound 
e-mail to reject.

of all constituencies, this one, mailop, is one i would have expected to know 
better than to cooperate with your oppressor.
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] [E] $GOOG

2022-04-17 Thread Tobias Fiebig via mailop
> If your friends somehow believe that Gmail is the only mail provider in the 
> world I suppose I am sorry for them but I don't understand why that is anyone 
> else's problem.

The idea is that you give away something for free, gain significant market 
share (=network effect), and then get into a position where you can first push 
standards (hello MTA-STS), and later can migrate to a walled garden, because 
the default becomes 'if you want it to work, just go to X'. _Then_ you can 
start to monetize either the product (what we see a lot with 'free' EdTech from 
google et al.) _or_ use your market position to ensure the technology develops 
along your product vision (I would argue this is what the chromium engine 
accomplished for the web).

We had this with IE back in the day, now essentially with the chromium engine; 
As I said, we have this quiet a lot with EdTech. We had this with XMPP. And I 
think there are also some bold opinions on protocol suggestions for congestion 
control coming out of google for quick.

So, in a sense, it kind of fits in a general trend of centralization, and 
centralized control; And that may indeed be a problem for people _not_ wanting 
to host their mail with one of N big providers.

And email is simply 'next'. And I don't put any 'nasty' words towards 
Google/gmail here. They just do what an independent actor working in 
self-interest trying to optimize their outcomes does in a given system. 

With best regards,
Tobias

-Original Message-
From: mailop  On Behalf Of John Levine via mailop
Sent: Sunday, 17 April 2022 05:52
To: mailop@mailop.org
Cc: p...@redbarn.org
Subject: Re: [mailop] [E] $GOOG

It appears that Paul Vixie via mailop  said:
>srsly? do you really think changing one's domain name or ISP is a 
>reasonable way forward when google isn't accepting one's e-mail?

When your domain is a cruddy free one which has earned a poor reputation, yes. 
As I have said a few times, sometimes free services are worth what they cost.

>i think you could have punctuated that sentence after "operators". but 
>google is a "shabby mail operator" (your words) who has taken my 
>friends and family as hostages. ...

What we have here appears to be reverse Stockholm syndrome.

Google gives away Gmail accounts for free. It is clear that Gmail users are 
getting at least what they've paid for, and in many cases more than that.

If your friends somehow believe that Gmail is the only mail provider in the 
world I suppose I am sorry for them but I don't understand why that is anyone 
else's problem.

R's,
John
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] [E] $GOOG

2022-04-17 Thread Tobias Fiebig via mailop
> Uh, what? Google follows public mail standards at least as well as their 
> large competitors like YahAOL and Microsoft. You do not have to like MTA-STS, 
> but it's an open IETF standard and there's a lot more providers than Google 
> that use it.

I was not arguing that google is not following mail standards. I _would_ argue 
thought that there is a discussion that _could_ be had regarding the 
sensibility of MTA-STS' design including HTTP; And what hits my rua currently 
mostly looks like google to me; But I am looking forward to reports from MS et 
al.

However, the point I actually did try to make, though, was indeed that mail is 
increasing in complexity, and 'the big ones' get things in order (well, apart 
from those mismatching DNS/EHLO setups from MS), while the tail of 
non-centralized setups does not keep up, ultimately leading to a 
mono/multipolization and aggregation of the ecosystem, essentially changing it 
from 'open' to 'something only big companies can take part in'. 

> Chromium is open source, and there are dozens of browsers built on it.  Could 
> you explain what the problem is?

Which, again, is exactly my point. Chromium, by now, drives the majority of 
browsers, in part because it is open source, and also because it is really good 
at what it does. Still, I would argue that the majority of contributions to 
that codebase comes from google employees. Or, to underline who makes product 
decissions for chromium, from the git log: "Do not revert without consulting 
chrome-...@google.com" Hence, this open source core puts google into a position 
where they could simply decide the direction into which the web goes.

Also, as a disclaimer: The core of this argument is not about whether google 
(or any other player in a comparable market position for a specific ecosystem; 
Think of Cisco in the past for networking, MS for OS in the past etc.) _would_ 
leverage their power to further their own interests, or are generally 'the bad 
ones'. I _personally_ would argue that utilizing that power to leverage their 
own interests is a reasonable expectation if they are an economically working 
actor. Independent of one's own answer to that question, though, the _real_ 
question is whether it is good for the Internet and society at large if 
individual actors get into a position where they _could_ leverage their pull on 
the ecosystem; And, to be fair, google has been using that power for good 
things as well; See, for example, the phase-out of plain http, which I would 
attribute--in large parts--to the chrom(e|ium) decissions around handling http. 
Still, the question remains; What ecosystem do we want a society to run on?

With best regards,
Tobias


-Original Message-
From: mailop  On Behalf Of John Levine via mailop
Sent: Sunday, 17 April 2022 19:42
To: mailop@mailop.org
Cc: tob...@fiebig.nl
Subject: Re: [mailop] [E] $GOOG

It appears that Tobias Fiebig via mailop  said:
>> If your friends somehow believe that Gmail is the only mail provider in the 
>> world I suppose I am sorry for them but I don't understand why that is 
>> anyone else's problem.
>
>The idea is that you give away something for free, gain significant 
>market share (=network effect), and then get into a position where you can 
>first push standards (hello MTA-STS), and later can migrate to a walled 
>garden, ...

Uh, what? Google follows public mail standards at least as well as their large 
competitors like YahAOL and Microsoft. You do not have to like MTA-STS, but 
it's an open IETF standard and there's a lot more providers than Google that 
use it.

>We had this with IE back in the day, now essentially with the chromium 
>engine;

Chromium is open source, and there are dozens of browsers built on it.  Could 
you explain what the problem is?

R's,
John
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] [E] $GOOG

2022-04-17 Thread Tobias Fiebig via mailop
Heho,
> We spent months working out the details, including why it uses HTTPS rather 
> than DANE, on public mailing lists in the IETF. (I would have preferred DANE, 
> but the choice of HTTPS was not made casually.)
To clarify, my comment did not want to pull the found consensus into question, 
and I do not doubt that there are good reasons _for_ HTTPS at this level. This 
comment relates more to issues in the operational implementation I encountered 
when I (recently) implemented MTA-STS; The most pressing one that the MTA-STS 
policy is bound to the recipient domain, which means that I can not simply roll 
it out for all my MX, iff they are accepting mail for domains where I do not 
control the DNS, and my favorit MTA not supporting MTA-STS, because they do not 
want to include an HTTP client. However, I also assume that such issues were 
indeed discussed, and a tradeoff happened.

> If this is something you care about, where were you?
This one hurts, mostly because I know where I was, and also know where I rather 
would have been, doing what. ;-)

> I have certainly run into plenty of people who've had trouble getting their 
> mail into Gmail, loudly announced that GMAIL HAS BROKEN MAIL FOR EVERYONE IN 
> THE WORLD, then I take a look and say "do you know what SPF is?"  "No, why do 
> you ask?"  Sigh.
I think this gets to the core of why centralization for many things is 
succesfull in the first place (leaving the whole good/bad/intention discussion 
out of it). Running systems is not easy; Especially for basic infrastructure 
(which email is), it should just _work_. Then again, over the past three 
decades, it also got _a lot_ more complex (see [0] for my favorit summary on 
that); There is also some work I was involved in which I hope to be able to 
share with the list by the end of the month, goin into the direction of "good 
setups" w.r.t. mail hosters, and the results align pretty much with your 
observation there.

However, it also circles back to the age old question (among people sceptical 
of centralization) of how we can have more distributed infrastructure, without 
having it a) constantly break, b) crappily maintained, and thereby c) causing 
more issues than it solves. At the moment, I sadly do not yet have a good 
answer for that, and I suspect that it won't have a technical answer at all. 

With best regards,
Tobias

[0] 
https://dataswamp.org/~solene/2021-07-09-obsolete-feeling-in-the-crossfire.html

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


[mailop] MTA-STS Key-Value Delimiter

2022-04-19 Thread Tobias Fiebig via mailop
Heho,
I recently deployed MTA-STS, but am somewhat lost with the kv delimiters in the 
policy file:

RFC8461 calls for CRLF delimited values; Errata 6253 notes that this _should_ 
have been CRLF or LF. I opted for the former, assuming that it is more likely 
people didn't read the eratta and only delimit on CRLF, while those reading the 
eratta most likely would to both:

From the report:
"policy-string":["version: STSv1\r","mode: enforce\r","mx: 
mail.aperture-labs.org\r","mx: mail2.aperture-labs.org\r","max_age: 86400\r"]

In the MTA-STS reports I am getting (from google only so far) now, I do see 
that they are delmiting on LF only, pulling the CR into the values, at least in 
the reported policy.

I am now wondering if this might cause any issues?

With best regards,
Tobias



___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] [EXTERNAL] MTA-STS Key-Value Delimiter

2022-04-20 Thread Tobias Fiebig via mailop
Heho,
Good to hear it is only cosmetic. :-)

> I do think it's reasonable to assume CRLF is the safer value. :)
Well, difficult. I'd say that the initial phrasing of the RFC might have cause 
some confusion. But one would have to gauge a lot more implementations to know 
that... 🤔 Might be a worthwhile measurement study.

With best regards,
Tobias 

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] DKIM by the third party

2022-04-21 Thread Tobias Fiebig via mailop
Heho,
Depends on what you mean here.

Option A: You use that third party mail-server as a legitimate outbound relay.
In this case, I would argue, that it makes a limited amount of sense, i.e., 
they configured sth. wrongly, maybe because you have no DKIM configuration 
coordinated with them.

Option B: You sent to an address on that server, and they forward your mail.
Here, it does make some sense, I'd, say, depending on what they do. 

For example, I do the same, i.e., providing an _additional_ dkim sig, on 
forwarded mail, because I also apply SRS to messages. So, then I add a 
signature for the new envelope from domain from SRS, and add ARC headers as 
well.

With best regards,
Tobias

-Original Message-
From: mailop  On Behalf Of Henrik S via mailop
Sent: Thursday, 21 April 2022 04:05
To: mailop@mailop.org
Subject: [mailop] DKIM by the third party

Hello

My mail is sent by the third party smtp server, and the dkim signature is made 
for the third party domain (for this case, it's pobox.com).

does this DKIM have helps to the authorization of my outgoing messages?

Thanks
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Troubleshooting MTA-STS reports

2022-04-26 Thread Tobias Fiebig via mailop
Heho,
Interestingly, Microsoft also sends TLSRPT, even when they use TLSA instead of 
MTA-STS.

With best regards,
Tobias

-Original Message-
From: mailop  On Behalf Of Jesse Hathaway via mailop
Sent: Tuesday, 26 April 2022 23:23
To: Eric Tykwinski 
Cc: mailop@mailop.org
Subject: Re: [mailop] Troubleshooting MTA-STS reports

On Tue, Apr 26, 2022 at 4:08 PM Eric Tykwinski  wrote:
> Everything looks fine to me, have you tried sending an email to a another 
> google account.
> They are the one company I know sends MTA-STS reports, others sadly don’t.

Thanks for checking, I didn't realize they were so rare.

> My guess is that Google might not be sending inter-domain reports since your 
> hosted there.
> Doesn’t make sense to me, but I’m sure if that’s the case Brandon or someone 
> else from Google will tell you.

I was wondering whether that might be part of the problem.
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


[mailop] DMARC/TLSRPT to non-existing accounts/reflection and sender reputation

2022-04-28 Thread Tobias Fiebig via mailop
Heho,
This might be a bit of a theoretical attack thing, but looking over the bounces 
for my nightly outbound DMARC reports I actually started to wonder about this;
(Mostly because I am getting scared by regularly sending DMARC reports to non
-existing accounts on a major ESP ;-)).

Maybe I am overlooking/overthinking something here, but it would be nice to 
hear what others think about it, and whether they think that this is actually a 
problem needing a solution.

Assumptions:
- Many major ESPs track a sending mailer's reputation; If a host tries to throw
  in a lot of mail for non-existing users/domains, reputation goes down.
- There are spam-traps out there with pretty much the same goal; see what flies
  in and, e.g., populate RBLs

Setup:
- I create _a lot_ of subdomains
- MX (I just set it; not sanctioned by the ESP) for the subdomains is either a 
large 
  ESP or a spam-trap.
- Create a -all SPF record and a DMARC p=reject entry and a 
rua=mailto:p@,
  as well as the _report._dmarc record for each of these sub-domains

Execution:
- I generate a lot of mails (one From: per subdomain) towards a target (ESP, 
small setup)
  that sends DMARC reports
- The target rejects my mails (spf -all) and sends a DMARC report; Based on the 
MX
  this goes to the ESP/spam-trap.
- The spam-trap/ESP get a lot of 'unknown recipient/domain' mails from my 
target; They
  don't accept them, but take note for the senders' reputation.
-> Sender reputation of the target goes down

With best regards,
Tobias

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] DMARC/TLSRPT to non-existing accounts/reflection and sender reputation

2022-04-30 Thread Tobias Fiebig via mailop
Heho,
Yes; The benefit of this is also that you do not need your target to have any 
service you can subscribe on running; They just have to follow a proper mail 
setup. But I like you suggestion.

Would be any of the larger ESPs who is doing sender reputation by IP up for a 
test? .oO( I would like to do this in coordination, as I'd use some of my own 
IPs for this, and would prefer not to permanently burn the whole network... )

With best regards,
Tobias

-Original Message-
From: mailop  On Behalf Of Ángel via mailop
Sent: Saturday, 30 April 2022 20:47
To: mailop@mailop.org
Subject: Re: [mailop] DMARC/TLSRPT to non-existing accounts/reflection and 
sender reputation

That's an interesting attack.

I initially thought you were going to describe placing a victim as your 
destination target which is something which is prevented by requiring the 
receiver to authorize them:
https://www.rfc-editor.org/rfc/rfc7489.html#section-7.1

But this is getting a spamtrap to accept emails and treating them as intruding 
attempts. The onus should be on them to detect that they are the MX of the 
target domain, and thus the sender may be playing by the rules. Quite easy to 
notice if you start seeing in DMARC reports in your spamtrap, actually.
But this doesn't mean that all spamtrap operators do that, or wouldn't be 
vulnerable to that.

Note that you could perform a similar attack by subscribing a user to a number 
of mailing lists, promotions, etc. then changing your MX to a spamtrap, which 
would then blame the sender IP.


Regards

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


[mailop] Outlook Sender Support Complaint Messages Broken With DMARC

2022-05-02 Thread Tobias Fiebig via mailop
Heho,
I signed up for the sender support (sendersupport.olc ) of Microsoft and 
activated forwarding of messages flagged by users as spam. Today I saw an email 
sent by microsoft to postmaster@ with a from of one of my domains rejected 
based on the domains DMARC policy  by my mailer.

Based on the data in my rspam log and the sendersupport site showing ~1 mail 
having been marked as spam by a user, I _suspect_ that this is the forward 
feature; However, this feature seems to break DKIM signatures and re-signs with 
hotmail.com, leading to the DMARC policy reject triggering, as neither SPF nor 
DKIM match;

Is there any good way to get into contact with them about this (as this is not 
really me having issues sending to them, but them to me ;-))/is anyone from MS 
reading on this list?

With best regards,
Tobias

 rspamd.log:2022-04-30 10:54:14 #27730(normal) <1736ea>; task; 
rspamd_task_write_log: id: <267a1c47b4bb64e17ab1633ea69b5...@engelsystem.de>, 
qid: , ip: 40.92.58.32, from: , (default: T 
(reject): [10.00/10.00] 
[NEURAL_HAM(-2.97){-0.991;},DMARC_POLICY_REJECT(2.00){engelsystem.de : SPF not 
aligned (relaxed), DKIM not aligned 
(relaxed);reject;},FORGED_RECIPIENTS(2.00){m:@outlook.de;s:postmas...@aperture-labs.org;},ARC_ALLOW(-1.00){microsoft.com:s=arcselector9901:i=1;},DATE_IN_PAST(1.00){38;},FORGED_SENDER(0.30){noreply-hamburg-hi...@engelsystem.de;st...@hotmail.com;},R_DKIM_ALLOW(-0.20){hotmail.com:s=selector1;},R_SPF_ALLOW(-0.20){+ip4:40.92.0.0/15;},MIME_GOOD(-0.10){text/plain;},MX_GOOD(-0.01){},BAYES_SPAM(0.00){39.71%;},ARC_SIGNED(0.00){aperture-labs.org:s=key01:i=2;},ASN(0.00){asn:8075,
 ipnet:40.80.0.0/12, 
country:US;},DKIM_MIXED(0.00){},DKIM_TRACE(0.00){hotmail.com:+;engelsystem.de:-;},DWL_DNSWL_NONE(0.00){hotmail.com:dkim;},FREEMAIL_ENVFROM(0.00){hotmail.com;},FREEMAIL_TO(0.00){outlook.de;},FROM_HAS_DN(0.00){},FROM_NEQ_ENVFROM(0.00){noreply-hamburg-hi...@engelsystem.de;st...@hotmail.com;},MID_RHS_MATCH_FROM(0.00){},MIME_TRACE(0.00){0:+;},RCPT_COUNT_ONE(0.00){1;},RCVD_COUNT_SEVEN(0.00){11;},RCVD_TLS_LAST(0.00){},RCVD_VIA_SMTP_AUTH(0.00){},R_DKIM_REJECT(0.00){engelsystem.de:s=es;},TO_DN_NONE(0.00){}]),
 len: 9927, time: 1357.5940132141113ms, dns req: 61, digest: 
<197fd69596e5326847617462eb097561>, rcpts: , 
mime_rcpts: <@outlook.de>, forced: reject "Action set by DMARC"; 
score=nan (set by dmarc)

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Spamhaus: Get more details about LISTING (Could a DMARC Report Address point to a spamtrap)?

2022-05-17 Thread Tobias Fiebig via mailop
Heho,
I recently described how this could actually be used by a malicious third party 
to cause a sender to be blocklisted by major mail operators (see thread titled 
"DMARC/TLSRPT to non-existing accounts/reflection and sender reputation" from 
the end of April). However, in your case it does not really sound malicious.

Still, spamhaus might have picked up expired domains to setup spam traps, and 
you may be sending to a ruf/rua on an expired domain. (Note: Wild guess)

In any case, I would be _really_ interested in hearing more in case you figure 
out the root-cause of this.

With best regards,
Tobias

-Original Message-
From: mailop  On Behalf Of Benoit Panizzon via mailop
Sent: Tuesday, 17 May 2022 10:49
To: mailop@mailop.org
Subject: [mailop] Spamhaus: Get more details about LISTING (Could a DMARC 
Report Address point to a spamtrap)?

Hopefully somebody from spamhaus is reading.

The 2nd day in a row, our main mailplattform IP address is listed and 
outlook.com blocks all emails.

Spamhaus only gives a timestamp +/- 5 minutes.

There are A LOT OF EMAILS passing our plattform in 10 Minutes.

Yesterday I found a suspect. One customer had configured his exchange server to 
relay 'bounces' via our platform. That was fixed.

Today I am looking through the logs again. No suspicious emails. But in that 
timespam, we send out DMARC reports.

Could it be, that someone publishes a DMARC Report address which points to a 
Spamhaus Spamtrap?

For the 2nd time I requestd 'more details' from Spamhaus. Is there a chance to 
get such informations?

Mit freundlichen Grüssen

-Benoît Panizzon-
-- 
I m p r o W a r e   A G-Leiter Commerce Kunden
__

Zurlindenstrasse 29 Tel  +41 61 826 93 00
CH-4133 PrattelnFax  +41 61 826 93 01
Schweiz Web  http://www.imp.ch
__
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Spamhaus: Get more details about LISTING (Could a DMARC Report Address point to a spamtrap)?

2022-05-17 Thread Tobias Fiebig via mailop
Heho,
> If they did, they would age them for at least a year before turning them into 
> traps, by which time the DMARC records would be long gone.
I generally agree with your argument, that this is a really unlikely scenario. 
Also, because the spam-trap domain would naturally lack the 
._report._dmarc. record necessary, this pretty much will not be the 
case; I overlooked that. 

However, judging from the state of DMARC reporting by the bounces hitting my 
report-from (_large_ orgs having non existent mailboxes in there etc.), I'd 
argue that the only thing that prevents ruf/rua that are stale for a decade is 
the age of RFC7489.

With best regards,
Tobias

-Original Message-
From: mailop  On Behalf Of John Levine via mailop
Sent: Tuesday, 17 May 2022 23:23
To: mailop@mailop.org
Cc: tob...@fiebig.nl
Subject: Re: [mailop] Spamhaus: Get more details about LISTING (Could a DMARC 
Report Address point to a spamtrap)?

It appears that Tobias Fiebig via mailop  said:
>Heho,
>I recently described how this could actually be used by a malicious 
>third party to cause a sender to be blocklisted by major mail operators (see 
>thread titled "DMARC/TLSRPT to non-existing accounts/reflection and sender 
>reputation" from the end of April). However, in your case it does not really 
>sound malicious.
>
>Still, spamhaus might have picked up expired domains to setup spam 
>traps, and you may be sending to a ruf/rua on an expired domain. (Note: 
>Wild guess)

If they did, they would age them for at least a year before turning them into 
traps, by which time the DMARC records would be long gone.
That's not it.

I suppose someone could set up a malicious MX to aim random junk at mail 
servers, but Spamhaus' trap servers are pretty hard to find.

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Spamhaus: Get more details about LISTING (Could a DMARC Report Address point to a spamtrap)?

2022-05-17 Thread Tobias Fiebig via mailop
Heho,
> They're just reporting what they recieve.  It shouldn't be a big surprise 
> that spamware makes up addresses, some of which happen to be in your domains.

Nah, i mean 'i receive spam with a from of $large_entity and reject due to 
DMARC failing', hence my systen tries to send a report to whatever is the rua 
in _dmarc., and it bounces for $various_reasons (mailbox 
full, mailbox does not exist, [...]).

No clue what this bouncing has to do with spamware making up addresses in some 
of my domains?

With best regards,
Tobias

-Original Message-
From: mailop  On Behalf Of John R Levine via mailop
Sent: Wednesday, 18 May 2022 01:23
To: Tobias Fiebig ; mailop@mailop.org
Subject: Re: [mailop] Spamhaus: Get more details about LISTING (Could a DMARC 
Report Address point to a spamtrap)?

On Tue, 17 May 2022, Tobias Fiebig wrote:
> However, judging from the state of DMARC reporting by the bounces 
> hitting my report-from (_large_ orgs having non existent mailboxes in 
> there etc.), I'd argue that the only thing that prevents ruf/rua that 
> are stale for a decade is the age of RFC7489.

They're just reporting what they recieve.  It shouldn't be a big surprise that 
spamware makes up addresses, some of which happen to be in your domains.

Regards,
John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY Please 
consider the environment before reading this e-mail. https://jl.ly 
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


[mailop] Paper on email delivery/standards adoption

2022-06-13 Thread Tobias Fiebig via mailop
Heho,
Quiet some time ago i asked the list for some help in an ongoing email 
measurement study; The paper is now finally out and accepted. 

An open-access preprint can be found here:  
https://pure.mpg.de/rest/items/item_3384330_2/component/file_3388008/content

I guess the most interesting result on this list is that the 'Email Camel' 
(after the DNS Camel) is more complex than... well, DNS.

Anyway, figured it might be interesting for some on the list.

With best regards,
Tobias

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Paper on email delivery/standards adoption

2022-06-14 Thread Tobias Fiebig via mailop
Heho,

Thanks, already found that. :-|

 

There is another embarrassing one later on in the paper. Sadly nothing we can 
do about the version going to Usenix anymore. :-/

 

With best regards,

Tobias

 

--

Dr.-Ing. Tobias Fiebig

T +31 616 80 98 99

M  <mailto:tob...@fiebig.nl> tob...@fiebig.nl

 

From: mailop  On Behalf Of Patrick Ben Koetter via 
mailop
Sent: Tuesday, 14 June 2022 11:41
To: mailop@mailop.org
Subject: Re: [mailop] Paper on email delivery/standards adoption

 

Typo in line 4 SMPT -> SMTP

Am 13.06.22 um 21:21 schrieb Tobias Fiebig via mailop:

Heho,
Quiet some time ago i asked the list for some help in an ongoing email 
measurement study; The paper is now finally out and accepted. 
 
An open-access preprint can be found here:  
https://pure.mpg.de/rest/items/item_3384330_2/component/file_3388008/content
 
I guess the most interesting result on this list is that the 'Email Camel' 
(after the DNS Camel) is more complex than... well, DNS.
 
Anyway, figured it might be interesting for some on the list.
 
With best regards,
Tobias
 
___
mailop mailing list
mailop@mailop.org <mailto:mailop@mailop.org> 
https://list.mailop.org/listinfo/mailop

-- 
[*] sys4 AG
 
https://sys4.de, +49 (89) 30 90 46 64
Schleißheimer Straße 26/MG,80333 München
 
Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Marc Schiffbauer, Wolfgang Stief
Aufsichtsratsvorsitzender: Florian Kirstein
 
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Someone from freenet.de on this list?

2022-06-30 Thread Tobias Fiebig via mailop
Heho,
This is indeed--to a degree--an issue. In general, I'd argue that MLs should 
pretty much behave like mail-op; I.e.: Rewrite sender; 
In addition, one might also want to strip existing DKIM and/or re-sign the 
message with one's own key.

Alternatively, you can also investigate whether there are ways to not break 
DKIM upon ML posting; I had my own endeavor with the implications of 
DMARC/DKIM/SPF and MLs recently: 
https://doing-stupid-things.as59645.net/email/mailinglists/dmarc/2022/05/19/sending-an-email.html
 

Ultimately, DMARC, DKIM, and SPF will not be going away, and if you want to 
deliver to 'the big ones' you essentially must have it in place.

So, if you want to keep providing a working service (and no judgement on the 
implications and interrelations there, and whether this makes sense; I have a 
ton of opinions on that, but that goes way beyond the scope of this ML), I 
guess there is no path that does not go through deploying SPF/DKIM/DMARC 
yourself and finding ways to make your MLs play along with sender domains that 
have it deployed as well.


With best regards,
Tobias

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


[mailop] What to do with a look-alike domain used in phishing

2022-07-18 Thread Tobias Fiebig via mailop
Heho,
~a year ago I registered a (by then) unregistered look-alike domain for a major 
European hoster, as I was receiving rather good spear-phishing from it, and it 
was, well, unregistered. (The domain is hetzners.de ). 

I setup DMARC p=reject and SPF -all, and let it be. Now, the domain keeps 
sitting around; Thing is, that dereg would most likely lead to more spam 
falling out of the domain again (or it being actually registered by some 
spammer), which is rather not so nice to the Internet as a whole. The hoster is 
not interested in receiving it from me (free of charge etc.; Offered to just 
send them the authcode). 

Now, what can I ethically do with the domain? I would kind of prefer it going 
to some org. that actually makes an effort in drying out domains used like 
this; Does somebody have a suggestion/contact whom to ask?

With best regards,
Tobias

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


[mailop] Microsoft DMARC RUA Mailbox Full

2022-08-02 Thread Tobias Fiebig via mailop
Heho,
Not sure if anyone from microsoft/microsoft.com is reading along, but your RUA 
mailbox seems to be full, and now bounces. ;-)

With best regards,
Tobias

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Disabling TLS 1.0 and 1.1 for MTA to MTA communication

2022-08-03 Thread Tobias Fiebig via mailop
Heho,

We did some measurements on this recently, see: 
https://www.usenix.org/system/files/atc22-holzbauer.pdf

 

At the moment, I’d say that you still lose _some_ destinations (and delivering 
MTAs) by forcing TLS (~10% of smaller providers). This is _any_ TLS; Numbers 
for disabling 1.0/1.1 will look worse than those 10%, even though we did not 
test that.

 

The methodology we use should be easily adjustable to also test for specific 
version support; However, recruiting a wide sample of people will be difficult. 
What you _could_ do as a large ESP is configuring multiple MXes with the same 
priority and different settings and run a large scale study that way about 
MTA’s preferences without impacting mail delivery. If you are willing to give 
that a shot, I’d be _very_ interested in collaborating.

 

Side note: I recently ran into a security research institute with whom I could 
not agree on ciphers with the OpenSMTPd default cipher list on my side… their 
choices were just a tad dusty…

 

With best regards,

Tobias 

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


[mailop] Debugging MTA-STS sending

2022-08-09 Thread Tobias Fiebig via mailop
Heho,
I am currently trying to debug a test for MTA-STS sending; The setup is a 
domain with an MX with an invalid certificate to test whether MTA-STS policies 
are honord (if they are, no mail should be received). I tested this last night 
with an ESP I know should be honoring MTA-STS; However, while the policy was 
retrieved from the webserver, the email got ultimately delivered. I also did 
not get an MTA-STS TLS-RPT, even though other domains got them from the same 
ESP today.

Could some of you who are on a setup that validates MTA-STS please try to send 
me an email to, and if it (hopefully) fails share the NDR?:

measurem...@mail-mtasts.measurement.email-security-scans.org

(Alternatively, if you see something wrong in the config, please let me know.)

With best regards,
Tobias

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Debugging MTA-STS sending

2022-08-09 Thread Tobias Fiebig via mailop
Hello Eric,
This is interesting. The certificate for tls-invalid should a) not match the 
CN, and b) be expired. The ": b'84:OK secure 
match=tls-invalid.measurement.email-security-scans.org servername=hostname,'" 
is hence a bit confusing. Also just tested it with 'openssl s_client -starttls 
smtp -crlf -connect tls-invalid.measurement.email-security-scans.org:25' just 
now, and the CN does indeed not match.

I will look into this.

With best regards,
Tobias

--
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

-Original Message-
From: Eric Tykwinski  
Sent: Tuesday, 9 August 2022 15:01
To: 'Tobias Fiebig' ; mailop@mailop.org
Subject: RE: [mailop] Debugging MTA-STS sending

Tobias,

I'm actually sort of interested now as well.

I just ran this through postfix-mta-sts-resolver 
(https://github.com/Snawoot/postfix-mta-sts-resolver)

Log for test:
2022-08-09 08:52:32 DEBUGSTS: len(self._children) = 1
2022-08-09 08:52:32 DEBUGSTS: Read: b'56:postfix 
mail-mtasts.measurement.email-security-scans.org,'
2022-08-09 08:52:32 DEBUGSTS: Enq request: b'postfix 
mail-mtasts.measurement.email-security-scans.org'
2022-08-09 08:52:32 DEBUGSTS: Got new future from queue
2022-08-09 08:52:32 DEBUGSTS: Lookup PERFORMED: domain = 
mail-mtasts.measurement.email-security-scans.org
2022-08-09 08:52:32 DEBUGRES: Got STS resolve request: 
sts_txt_domain=_mta-sts.mail-mtasts.measurement.email-security-scans.org, 
known_id=None
2022-08-09 08:52:32 DEBUGRES: Parsed STS record for domain 
'mail-mtasts.measurement.email-security-scans.org': {'v': 'STSv1', 'id': 
'2022080901'}
2022-08-09 08:52:33 DEBUGRES: Parsed policy for domain 
mail-mtasts.measurement.email-security-scans.org: {'mx': 
['tls-invalid.measurement.email-security-scans.org'], 'version': 'STSv1', 
'mode': 'enforce', 'max_age': '86400'}
2022-08-09 08:52:33 DEBUGSTS: Future await complete: data=b'84:OK secure 
match=tls-invalid.measurement.email-security-scans.org servername=hostname,'
2022-08-09 08:52:33 DEBUGSTS: Wrote: b'84:OK secure 
match=tls-invalid.measurement.email-security-scans.org servername=hostname,'
2022-08-09 08:52:33 DEBUGSTS: Client disconnected

Log for my server which is valid:
2022-08-09 08:54:09 DEBUGSTS: len(self._children) = 1
2022-08-09 08:54:09 DEBUGSTS: Read: b'20:postfix virtcolo.com,'
2022-08-09 08:54:09 DEBUGSTS: Enq request: b'postfix virtcolo.com'
2022-08-09 08:54:09 DEBUGSTS: Got new future from queue
2022-08-09 08:54:09 DEBUGSTS: Lookup PERFORMED: domain = virtcolo.com
2022-08-09 08:54:09 DEBUGRES: Got STS resolve request: 
sts_txt_domain=_mta-sts.virtcolo.com, known_id=None
2022-08-09 08:54:09 DEBUGRES: Parsed STS record for domain 'virtcolo.com': 
{'v': 'STSv1', 'id': '20220309085700'}
2022-08-09 08:54:09 DEBUGRES: Parsed policy for domain virtcolo.com: {'mx': 
['mail.virtcolo.com', '*.virtcolo.com'], 'version': 'STSv1', 'mode': 'enforce', 
'max_age': '604800'}
2022-08-09 08:54:09 DEBUGSTS: Future await complete: data=b'67:OK secure 
match=mail.virtcolo.com:.virtcolo.com servername=hostname,'
2022-08-09 08:54:09 DEBUGSTS: Wrote: b'67:OK secure 
match=mail.virtcolo.com:.virtcolo.com servername=hostname,'
2022-08-09 08:54:09 DEBUGSTS: Client disconnected

Both seem to work fine.

Sincerely,

Eric Tykwinski
TrueNet, Inc.
P: 610-429-8300

-Original Message-
From: mailop  On Behalf Of Tobias Fiebig via mailop
Sent: Tuesday, August 9, 2022 6:24 AM
To: mailop@mailop.org
Subject: [mailop] Debugging MTA-STS sending

Heho,
I am currently trying to debug a test for MTA-STS sending; The setup is a 
domain with an MX with an invalid certificate to test whether MTA-STS policies 
are honord (if they are, no mail should be received). I tested this last night 
with an ESP I know should be honoring MTA-STS; However, while the policy was 
retrieved from the webserver, the email got ultimately delivered. I also did 
not get an MTA-STS TLS-RPT, even though other domains got them from the same 
ESP today.

Could some of you who are on a setup that validates MTA-STS please try to send 
me an email to, and if it (hopefully) fails share the NDR?:

measurem...@mail-mtasts.measurement.email-security-scans.org

(Alternatively, if you see something wrong in the config, please let me know.)

With best regards,
Tobias

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop



___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Debugging MTA-STS sending

2022-08-09 Thread Tobias Fiebig via mailop
Heho,
Currently not sue why the DNS policy is missing. Will revisit the RFC, might be 
due to ttl.

dig +short TXT _mta-sts.mail-mtasts.measurement.email-security-scans.org
"v=STSv1; id=2022080902"


With best regards,
Tobias

-Original Message-
From: Luis E. Muñoz  
Sent: Tuesday, 9 August 2022 17:11
To: Tobias Fiebig 
Cc: Eric Tykwinski ; mailop@mailop.org
Subject: Re: [mailop] Debugging MTA-STS sending

On 9 Aug 2022, at 10:27, Tobias Fiebig via mailop wrote:

> This is interesting. The certificate for tls-invalid should a) not match the 
> CN, and b) be expired. The ": b'84:OK secure 
> match=tls-invalid.measurement.email-security-scans.org servername=hostname,'" 
> is hence a bit confusing. Also just tested it with 'openssl s\_client 
> -starttls smtp -crlf -connect 
> tls-invalid.measurement.email-security-scans.org:25' just now, and the CN 
> does indeed not match.

https://esmtp.email/tools/mta-sts/ also is reporting on a missing DNS policy. 
The cert is reported as expired as well.

-lem

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Debugging MTA-STS sending

2022-08-09 Thread Tobias Fiebig via mailop
Heho,
Debugging this further, "MTA-STS DNS Policy" is also marked x when the TXT 
record is present but the policy is faulty, e.g., due to a non-compliant MX. 
So, everything as it should be in this case.

With best regards,
Tobias

--
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

-Original Message-
From: mailop  On Behalf Of Tobias Fiebig via mailop
Sent: Tuesday, 9 August 2022 17:57
To: 'Luis E. Muñoz' 
Cc: mailop@mailop.org; 'Eric Tykwinski' 
Subject: Re: [mailop] Debugging MTA-STS sending

Heho,
Currently not sue why the DNS policy is missing. Will revisit the RFC, might be 
due to ttl.

dig +short TXT _mta-sts.mail-mtasts.measurement.email-security-scans.org
"v=STSv1; id=2022080902"


With best regards,
Tobias

-Original Message-
From: Luis E. Muñoz  
Sent: Tuesday, 9 August 2022 17:11
To: Tobias Fiebig 
Cc: Eric Tykwinski ; mailop@mailop.org
Subject: Re: [mailop] Debugging MTA-STS sending

On 9 Aug 2022, at 10:27, Tobias Fiebig via mailop wrote:

> This is interesting. The certificate for tls-invalid should a) not match the 
> CN, and b) be expired. The ": b'84:OK secure 
> match=tls-invalid.measurement.email-security-scans.org servername=hostname,'" 
> is hence a bit confusing. Also just tested it with 'openssl s\_client 
> -starttls smtp -crlf -connect 
> tls-invalid.measurement.email-security-scans.org:25' just now, and the CN 
> does indeed not match.

https://esmtp.email/tools/mta-sts/ also is reporting on a missing DNS policy. 
The cert is reported as expired as well.

-lem

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Debugging MTA-STS sending

2022-08-09 Thread Tobias Fiebig via mailop
Heho,
Ok, for those who are (potentially) interested, I just setup some more MTA-STS 
domains with slight deviations; Will debug the lib shared earlier a bit with 
those.

measurem...@mail-mtasts-n-iv.measurement.email-security-scans.org : MX has 
non-matching, expired certificate, policy delimited with \n
measurem...@mail-mtasts-rn-iv.measurement.email-security-scans.org : MX has 
non-matching, expired certificate, policy delimited with \r\n
measurem...@mail-mtasts-n-plain.measurement.email-security-scans.org : MX does 
not advertise starttls, policy delimited with \n
measurem...@mail-mtasts-rn-plain.measurement.email-security-scans.org : MX does 
not advertise starttls, policy delimited with \r\n
measurem...@mail-mtasts-n-mult-ivv.measurement.email-security-scans.org : Two 
MX; prio 10 has non-matching, expired certificate, prio 50 has valid TLS 
certificat, policy delimited with \n
measurem...@mail-mtasts-rn-mult-ivv.measurement.email-security-scans.org : Two 
MX; prio 10 has non-matching, expired certificate, prio 50 has valid TLS 
certificat, policy delimited with \r\n
measurem...@mail-mtasts-n-mult-ivp.measurement.email-security-scans.org : Two 
MX; prio 10  does not advertise starttls, prio 50 has non-matching, expired 
certificate, policy delimited with \n
measurem...@mail-mtasts-rn-mult-ivp.measurement.email-security-scans.org : Two 
MX; prio 10  does not advertise starttls, prio 50 has non-matching, expired 
certificate, policy delimited with \r\n

With best regards,
Tobias

-Original Message-
From: mailop  On Behalf Of Tobias Fiebig via mailop
Sent: Tuesday, 9 August 2022 19:46
To: 'Tobias Fiebig' ; 'Luis E. Muñoz' 
Cc: mailop@mailop.org; 'Eric Tykwinski' 
Subject: Re: [mailop] Debugging MTA-STS sending

Heho,
Debugging this further, "MTA-STS DNS Policy" is also marked x when the TXT 
record is present but the policy is faulty, e.g., due to a non-compliant MX. 
So, everything as it should be in this case.

With best regards,
Tobias

--
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

-Original Message-
From: mailop  On Behalf Of Tobias Fiebig via mailop
Sent: Tuesday, 9 August 2022 17:57
To: 'Luis E. Muñoz' 
Cc: mailop@mailop.org; 'Eric Tykwinski' 
Subject: Re: [mailop] Debugging MTA-STS sending

Heho,
Currently not sue why the DNS policy is missing. Will revisit the RFC, might be 
due to ttl.

dig +short TXT _mta-sts.mail-mtasts.measurement.email-security-scans.org
"v=STSv1; id=2022080902"


With best regards,
Tobias

-Original Message-
From: Luis E. Muñoz  
Sent: Tuesday, 9 August 2022 17:11
To: Tobias Fiebig 
Cc: Eric Tykwinski ; mailop@mailop.org
Subject: Re: [mailop] Debugging MTA-STS sending

On 9 Aug 2022, at 10:27, Tobias Fiebig via mailop wrote:

> This is interesting. The certificate for tls-invalid should a) not match the 
> CN, and b) be expired. The ": b'84:OK secure 
> match=tls-invalid.measurement.email-security-scans.org servername=hostname,'" 
> is hence a bit confusing. Also just tested it with 'openssl s\_client 
> -starttls smtp -crlf -connect 
> tls-invalid.measurement.email-security-scans.org:25' just now, and the CN 
> does indeed not match.

https://esmtp.email/tools/mta-sts/ also is reporting on a missing DNS policy. 
The cert is reported as expired as well.

-lem

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Debugging MTA-STS sending

2022-08-09 Thread Tobias Fiebig via mailop
Heho,
Ok, at least something that works. :-|

I am currently setting up a host to implement the postfix lib you shared 
earlier; Let's see what falls out of that.

With best regards,
Tobias


-Original Message-
From: mailop  On Behalf Of Eric Tykwinski via mailop
Sent: Tuesday, 9 August 2022 20:24
To: mailop@mailop.org
Subject: Re: [mailop] Debugging MTA-STS sending

Tobias,

No starttls definitely works for me at least:  MailCow with 
postfix-mta-sts-resolver.

__
This is the mail system at host mail.virtcolo.com.

I'm sorry to have to inform you that your message could not be delivered to one 
or more recipients. It's attached below.

For further assistance, please send mail to postmaster.

If you do so, please include this problem report. You can delete your own text 
from the attached returned message.

   The mail system

: TLS is
required, but was not offered by host
plaintext.measurement.email-security-scans.org[195.191.197.83]
__


Sincerely,

Eric Tykwinski
TrueNet, Inc.
P: 610-429-8300


___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Debugging MTA-STS sending

2022-08-09 Thread Tobias Fiebig via mailop
Heho,
I just gave https://github.com/Snawoot/postfix-mta-sts-resolver a try, and it 
works as expected for me. The only mails getting delivered are those for the 
test-cases where at least one MX is valid; And in those cases the mail flows 
through the lower-prio MX with the valid cert.

So, if you still see some other mails delivered, something might be different 
on mailcow. Giving that a shot now.  

With best regards,
Tobias

-Original Message-
From: mailop  On Behalf Of Tobias Fiebig via mailop
Sent: Tuesday, 9 August 2022 20:37
To: mailop@mailop.org
Subject: Re: [mailop] Debugging MTA-STS sending

Heho,
Ok, at least something that works. :-|

I am currently setting up a host to implement the postfix lib you shared 
earlier; Let's see what falls out of that.

With best regards,
Tobias


-Original Message-
From: mailop  On Behalf Of Eric Tykwinski via mailop
Sent: Tuesday, 9 August 2022 20:24
To: mailop@mailop.org
Subject: Re: [mailop] Debugging MTA-STS sending

Tobias,

No starttls definitely works for me at least:  MailCow with 
postfix-mta-sts-resolver.

__
This is the mail system at host mail.virtcolo.com.

I'm sorry to have to inform you that your message could not be delivered to one 
or more recipients. It's attached below.

For further assistance, please send mail to postmaster.

If you do so, please include this problem report. You can delete your own text 
from the attached returned message.

   The mail system

: TLS is
required, but was not offered by host
plaintext.measurement.email-security-scans.org[195.191.197.83]
__


Sincerely,

Eric Tykwinski
TrueNet, Inc.
P: 610-429-8300


___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Debugging MTA-STS sending

2022-08-10 Thread Tobias Fiebig via mailop
Heho,
Thanks! Looks promising or rather working. :-) 

I am currently dealing with a major ESP for some reason not finding my 
policies... Will come back to the list as soon as the web/selftest interface is 
ready. :-)

With best regards,
Tobias

-Original Message-
From: mailop  On Behalf Of Alessandro Vesely via 
mailop
Sent: Wednesday, 10 August 2022 18:55
To: mailop@mailop.org
Subject: Re: [mailop] Debugging MTA-STS sending

On Tue 09/Aug/2022 12:23:51 +0200 Tobias Fiebig via mailop wrote:
>
> I am currently trying to debug a test for MTA-STS sending; The setup is a 
> domain with an MX with an invalid certificate to test whether MTA-STS 
> policies are honord (if they are, no mail should be received). I tested this 
> last night with an ESP I know should be honoring MTA-STS; However, while the 
> policy was retrieved from the webserver, the email got ultimately delivered. 
> I also did not get an MTA-STS TLS-RPT, even though other domains got them 
> from the same ESP today.
> 
> Could some of you who are on a setup that validates MTA-STS please try to 
> send me an email to, and if it (hopefully) fails share the NDR?:
> 
> measurem...@mail-mtasts.measurement.email-security-scans.org


Here's the warning I've received thus far, using Courier-MTA:

---

  DELAYS IN DELIVERING YOUR MESSAGE

The delivery of the following E-mail message has been delayed.  This is an 
advisory notice only; it is sent only to notify you about a temporary delay in 
delivering your message.  You DO NOT need to do anything at this time.
Additional attempts to deliver your message will be made.  Some possible 
reasons for this delay:

* Network congestion or failure.

* The destination mail server is temporarily off-line.

Diagnostic information is provided below for each recipient.  If copies of this 
message were sent to additional recipients, deliveries to those addresses are 
not included in this notice.  This is an advisory notice for the following 
addresses only:

:
  tls-invalid.measurement.email-security-scans.org [195.191.197.90]:
  >>> STARTTLS
  <<< 400 Invalid peer certificate

---

If your message was also sent to additional recipients, their delivery status 
is not included in this report.  You may or may not receive other delivery 
status notifications for additional recipients.

The original message follows as a separate attachment.


--=_courier_0
Content-Type: message/delivery-status
Content-Transfer-Encoding: 7bit

Reporting-MTA: dns; wmail.tana.it
Arrival-Date: Wed, 10 Aug 2022 09:55:52 +0200
Received-From-MTA: dns; [172.25.197.111] (pcale.tana [172.25.197.111])

Final-Recipient: rfc822; 
measurem...@mail-mtasts.measurement.email-security-scans.org
Action: delayed
Status: 4.0.0
Will-Retry-Until: Wed, 17 Aug 2022 09:55:52 +0200

--=_courier_0
Content-Type: text/rfc822-headers; charset="utf-8"
Content-Transfer-Encoding: 7bit

[DELETED]

--=_courier_0--


Best
Ale
-- 






___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


[mailop] Gmail Dynamic Email / Impact on Email Ecosystem

2022-08-10 Thread Tobias Fiebig via mailop
Heho,
The gmail feature 'dynamic email' [1] just flew by me, and I was somewhat 
wondering whether this is google proprietary, or if there is some 
standardization going on (already completed?) which I missed.
From the product page it currently looks more like an integration in the google 
ecosystem;

Either way, I believe that this might be something to have a discussion on. If 
it is backed by open standards, there are some interesting discussions to be 
had re: impact of such a feature in terms of security/privacy.

If this is a google-ecosystem only feature, I'd kind of like to put on my 
doom-sayer hat and claim that this smells a bit like the death of XMPP; While 
technically still email (and currently integrated with the rest of the world), 
google is in a rather dominant market position (~15% of domains, iirc), and 
such individual-actor product decissions may actually send quiet some ripples 
through the email ecosystem as a whole (Why didn't you RSVP? I send you an RSVP 
request from my gmail?!). (Not saying that email's UX can be a tad dusty... but 
changes like this might really benefit from a really concious engagement with 
the potential implications.)

 So, apart from my rather centralization-critical gut reaction... what do you 
think about features like this being added by individual ESPs and its impact on 
how email will develop?

With best regards,
Tobias

[1] https://support.google.com/a/answer/9709409?hl=en

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Gmail Dynamic Email / Impact on Email Ecosystem

2022-08-12 Thread Tobias Fiebig via mailop
Heho,

> Brandon Long via mailop
> https://developers.google.com/gmail/ampemail is the Google developer 
> information about dynamic email, that link was about controlling the 
> content with Google Workspace.
Thanks for sharing, this has some rather interesting examples. Do I need to be 
specially vetted to send AMP email, or could I--as long as it is compliant to 
the standard--send one myself, i.e., without being a registered newsletter 
sender? The AMP page is somewhat unclear there.

> Brandon Long via mailop
> The standardization is via AMP, docs at https://amp.dev/about/email/ 
> and a pretty short list of other providers who support it.
I acknowledge that mail's UX is currently 'fresh and outstanding' and something 
will have to change. Still, change is naturally driven by those who do, 
which--in this case--is the group of organizations around AMP. However, I'd 
argue that changes will be aligned with the needs of these organizations in 
terms of providing consistent services to their customer base under their 
business model [1], which naturally inflicts on how these systems are being 
designed. This also inflicts on the governance of venues for organizing and 
coordinating such changes, as for example AMP, implementing a model that allows 
decision making to follow operational needs [2].  And, to be clear, I am not 
claiming that this is a google-specific thing, or try to pick on google, but 
instead argue that any rational actor with that scale of operations will 
ultimately operate in this way to match its objectives.

> Brandon Long via mailop
> The death of email will come from outside the eco-system, not from 
> individual attempts to extend it.
I wouldn't necessarily call AMP an individual attempt, given the market share 
of some of the involved parties.

Also, I was referring to the death of XMPP. If I remember correctly, XMPP's 
rise and fall actually started with major players [3,4] committing to XMPP 
federation.
However, over time, and with needs, roadmaps, and available features in clients 
diverging more and more, federation was discontinued by Facebook and Google [5].
At this point, the role of others being less sharing and more consuming--Page 
explicitly calling out Microsoft here [6]--certainly should also be mentioned. 
What ultimately broke the neck of XMPP was then its ill suitedness to the 
evolving User Experience on smartphones.
With its complicated protocol, and federation needs--the classical finding 
others problem--it was simply no match for centralized services using simple 
but usable identifiers (phone numbers), even if they may have been using XMPP 
'under the hood'.
That then is what gave us the current zoo of messengers we all love and like 
(if someone wants to further discuss this point, please feel free to write me 
on What'sApp, Signal, Telegram, Threema, Facebook Messenger, Skype, 
Skype4Bussiness/Lync, Google Meet, reddit, or via netcat on tcp/2342).

So, in the end, the dynamics around new features adopted by a few players 
representing a major subset of the ecosystem can have a long-lasting impact 
that may ultimately interact with, e.g., the deliverability discussions we 
regularly have. (Most recently, tightened SPF requirements by Google, and I am 
not claiming that _that_ move was necessarily a bad one; But one with 
consequences to consider that are not strictly technical in nature, but cross 
influence technology, i.e., in this case, mail.)

With best regards,
Tobias

[1] 
https://doing-stupid-things.as59645.net/burning/world/resillience/2022/06/30/propositions-part-4.html
[2] Page 78, Sec. VII.E.6, Point 206 ff 
https://www.texasattorneygeneral.gov/sites/default/files/images/admin/2020/Press/20201216%20COMPLAINT_REDACTED.pdf
  
[3] https://googletalk.blogspot.com/2006/01/xmpp-federation.html
[4] https://www.facebook.com/notes/10160197317616729/ 
[5] 
https://blogs.fsfe.org/hugo/2013/05/google-talk-discontinued-will-google-keep-its-promise-and-give-xmpp-users-a-way-out/
 
[6] 
https://www.theverge.com/2013/5/15/4334242/larry-page-to-tech-world-being-negative-is-not-how-we-make-progress

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


[mailop] Research project on SPF validation: Is your server violating RFC standards for SPF resolution?

2022-08-25 Thread Tobias Fiebig via mailop
Heho,
As the question of 'how many SPF related DNS requests is your server supposed 
to send' recently came up, I figured it might be interesting to share the 
following research project with you, for which we are looking for participants 
in our tests and also feedback on the tooling we build.

The project is led by Md. Ishtiaq Ashiq, a PhD student at Virgina Tech looking 
into various aspects of the email ecosystem supervised by Tijay. Our team would 
like to understand how the SMTP servers out in the wild verify SPF records. 
While doing so, we noticed that quite a few SMTP servers may allow an attacker 
to launch a denial-of-service attack using SPF referrals.
 
An attacker may use an infinite number of SPF referrals in their SPF setting 
and can send an email to a vulnerable mail server which would make the SMTP 
server make a whole lot of DNS queries. By exploiting this vulnerability, an 
attacker can block the SMTP queue of the server, flood the associated recursive 
resolver, or any DNS authoritative server.
 
According to RFC recommendations 
(https://datatracker.ietf.org/doc/html/rfc7208#section-4.6), a few DNS lookup 
limits exist that an SMTP server needs to maintain while resolving an SPF 
record. That is, SPF implementations MUST limit the total number of DNS queries 
to 10 and the number of void lookups to 2 to avoid unreasonable load on the DNS.
 
To measure more SMTP servers’ behavior, we setup a test website where you can 
get a report of your own MX and contribute to our dataset:

https://spf.net-measurement.net/

You can provide your email address here, allow us to send a test email, and 
queries that your server made for resolving the SPF record of the sender will 
be shown. Please find more details about the vulnerability, our SPF referral 
policy, and the data we store at the given URL. We will only store the 
recipients MX’ FQDN and behavior regarding RFC7208.

The site is still in the early phase. So, if you do encounter any bugs or 
errors, please let us know!

We would highly appreciate your participation, and discussion on this 
configuration issue. Specifically, we would like to know more about your setups 
of your MXes are not following the limits of RFC7208, specifically if this 
comes from software defaults or might even have been a conscious choice. We are 
also preparing a survey on SPF behavior, which we will share shortly.
 
With best regards,

Md. Ishtiaq Ashiq (iash...@vt.edu),
Tobias Fiebig (tfie...@mpi-inf.mpg.de / tob...@fiebig.nl)
Taejoong "Tijay" Chung (ti...@vt.edu)

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Research project on SPF validation: Is your server violating RFC standards for SPF resolution?

2022-08-25 Thread Tobias Fiebig via mailop
Heho,

> The rspamd default is 30. I'd say it works better that way in practice, 
> because people do make mistakes and vendors do modify the records customers 
> include.

Did you encounter such issues in practice and/or were you involved in the 
discussion forming that default? If so, it would be nice to get some more 
perspective on that.

With best regards,
Tobias

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Research project on SPF validation: Is your server violating RFC standards for SPF resolution?

2022-08-25 Thread Tobias Fiebig via mailop
Heho,
Ok, thanks, that clarifies that. :-)

With best regards,
Tobias

-Original Message-
From: mailop  On Behalf Of Taavi Eomäe via mailop
Sent: Thursday, 25 August 2022 14:32
To: mailop@mailop.org
Subject: Re: [mailop] Research project on SPF validation: Is your server 
violating RFC standards for SPF resolution?


> Did you encounter such issues in practice and/or were you involved in the 
> discussion forming that default? If so, it would be nice to get some more 
> perspective on that.

We see SPF records that exceed the standard's query limit fairly often, but 
weren't involved in the forming of rspamd's default. We can say with fairly 
good confidence that it's simply more robust¹ to tolerate records that are 
slightly incorrect, and more "fair" not to punish the sender instantly. 
(Considering all the poorly configured domains out there that don't have any 
SPF at all.)




[1]: https://en.wikipedia.org/wiki/Robustness_principle


___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Research project on SPF validation: Is your server violating RFC standards for SPF resolution?

2022-08-27 Thread Tobias Fiebig via mailop
Heho,
Thank you all for your feedback, and especially to Simon for pointing out the 
issue in February. This should, of course, not happen, and is part of the 
reason why we are moving this to strict opt-in measurements. I discussed your 
points with the project lead (Taejoong “tijay” Chung ), who asked 
me to share his message below with the list.

With best regards,
Tobias

Dear Simon Arlott and community members, 

This is Tijay Chung (Virginia Tech), who is the principal investigator in this 
project. Since my list registration request has not been processed yet, I've 
asked my colleague, Tobias–who joined the team for this project as a 
collaborator in June-to share this post.

First of all, I would like to thank you all for your feedback. We certainly did 
not apply proper care in executing this project, and will make sure that our 
future actions are not as intrusive as our past measurements. Furthermore, we 
do agree that the RFC should be amended; After all, part of our research 
question is finding out what a reasonable limit and recommendation would be.

Also, I want to sincerely apologize for the incident that happened in February. 
Back then, we sent out emails for randomly chosen domains with the description 
of who we are and why we are doing this, and the link for the webpage for 
further details (the email that Simon attached; And we–by now–understood that 
this is not the right way of measuring such an issue.). In the excitement of 
kicking of this project, we missed a flaw in our implementation. We had planned 
to limit the number of maximum SPF queries to around 300, but our 
implementation of the algorithm that generates SPF recursion trees kept 
creating more nodes.

Thankfully, some email administrators reported this flaw. As soon as we 
received the reports, we immediately shut it down and applied a patch ensuring 
we only serve 300 SPF records per mail at most. We now understand that we 
should have applied more care in setting up our measurement infrastructure, and 
should have followed a voluntary participation approach properly informing 
participants about the risks of the experiments as we now try to do with the 
self-measurement website. Furthermore, we also shifted towards a structured 
analysis of various SMTP server and SPF plugin/SPAM filter combinations to get 
a less intrusive picture of the problem space. Similarly, we are using passive 
DNS data to get a better picture of the practical needs in terms of the number 
of DNS lookups needed for SPF used in production. Of course we will share these 
results with the community as soon as we have compiled a report.

Regarding the website, we have received valuable feedback such as adding a 
functionality for participants to keep track of their SPF requests history, and 
providing a form of double-opt-in to ensure people actually control the email 
addresses requesting a test-mail. We are shutting the website down for a moment 
to implement them.

I would like to apologize again for what happened and thank you so much for the 
valuable feedback.

Sincerely, 
Taejoong “Tijay” Chung.

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Research project on SPF validation: Is your server violating RFC standards for SPF resolution?

2022-08-27 Thread Tobias Fiebig via mailop
Hello Bill,
> I refuse to participate in your research, as all evidence I have is that VT 
> is grossly unethical and allows incompetents to run research projects.
I hear your frustration with this, and will not defend the measurements that 
took place in February. As outlined below, we will work on limiting our 
measurements to people that clearly opted in, and would appreciate feedback on 
that.

> So, are you REALLY opt-in? Holw do  you authenticate that? Trusting what a 
> stranger types on a web page?
> 
> That would be yet another abusive and incompoetent study design.
Only trusting the address entered would be single-opt-in, and--as you 
note--insufficient.

Instead, my current plan would be the following:
- Enter email on website; 
- Receive a results URL with a random identifier
- On that page, be requested to send an email from the entered email to 
'opt-in@...'; Should be a) SPF compliant and b) Validly DKIM signed.
- If an authenticated mail is received, we send a measurement email in reply 
and start to display the results
- If an insufficiently authenticated mail is received we only display 'An 
opt-in message was received but failed SPF/DKIM/both authentication.' on the 
page without sending an email. 

The main issue I see with that design atm is that it allows any user behind an 
MTA to opt-in the whole setup; What might make more sense is restricting this 
to selected from addresses (postmaster@?). I would appreciate opinions on this.

With best regards,
Tobias

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Research project on SPF validation: Is your server violating RFC standards for SPF resolution?

2022-08-27 Thread Tobias Fiebig via mailop
Hello John,
> If it's opt-in, please identify all of the IPs that send mail or DNS or web 
> queries so those of us who have not opted in can block them.
I just started going through the setup built at VT and found several points 
where there will have to be some serious re-design of several components. As 
soon as that is done, we will:

a) Post a list of all components on the website, indicating what exactly can be 
blocked to make sure to not receive any unwanted packets from us.
b) Provide that list of addresses and domains to mailop@ before setting the 
service available again.
c) Provide an additional form to submit address ranges for exclusion from the 
study on the website.
d) Implement the opt-in mechanism outlined in my previous reply to Bill.

If you see anything else we could do to make this safer, please let me know.

With best regards,
Tobias 

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


[mailop] OpenSSL Vulnerability and SMTP

2022-11-01 Thread Tobias Fiebig via mailop
Heho,
Just as a side note/PSA in case people missed this; While the Internet is 
moving towards a 'well, that OpenSSL bug was not t bad; It would need 
either a malicious server with a _signed_ cert (or cert checks being disabled), 
OR a malicious client and the use of cert-auth' perspective...

MTAs usually do a lot of outbound TLS acting as clients to remote servers, but 
opportunistically (disabled cert validation). This might also be triggered by a 
remote entity directing an MTA to a specific server (think: Using bounces, 
DMARC/TLS RPT). ;-)

So mail might be one of the few cases where the OpenSSL bug is relevant (even 
though not many run their MTAs on Ubuntu 22.04 or similar, I guess; Docker 
world might be different, no clue what mailcow is doing).

With best regards,
Tobias

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] OpenSSL Vulnerability and SMTP

2022-11-01 Thread Tobias Fiebig via mailop
Heho,
Yes, the one Christof posted; I was somehow expecting everyone had gotten those 
notifications over the past weeks.

Referring to the Malwaretech blog, making exactly my point:

"Likelihood of exploitation
Give the fact the vulnerability is primarily client-side, requires the 
malicious certificate to be signed by a trusted CA (or the user to ignore the 
warning), and is complex to exploit, I estimate a low chance of seeing 
in-the-wild exploitation."

With best regards,
Tobias


___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] tls certificates

2022-11-22 Thread Tobias Fiebig via mailop
Heho,
I looked at that recently; See the SMTP paper recently published [1], and 
enforcing TLS certainly is indeed on the rise, and at least one of the privacy 
mail providers at least allowed their users to opt-in to TLS-Only sending for 
their mails.

We are currently also setting up a website to run our tests against one's own 
ESP/Setup (without me having to dig results out of the logs ;-)), which I'll 
hopefully be able to share soonish.

With best regards,
Tobias

[1] https://www.usenix.org/system/files/atc22-holzbauer.pdf

-Original Message-
From: mailop  On Behalf Of Slavko via mailop
Sent: Wednesday, 23 November 2022 00:13
To: mailop@mailop.org
Subject: Re: [mailop] tls certificates

Dňa 22. novembra 2022 21:00:36 UTC používateľ "Gellner, Oliver via mailop" 
 napísal:

>Also the number of MTAs that require STARTTLS is not increasing based on my 
>experIence. I haven’t seen a large ESP which enforced TLS for all incoming and 
>outgoing connections yet.

Are you aware that even change from 1 to 2 means grow?

I didn't write if requiring TLS is in most of servers, nor that is required by 
a lot of servers, but i see grow in logs (over time), where host try STARTTLS 
and when it fails, they go away without fallback to plain.

I inspect them mostly only by checking its hostname, and as they are not 
"important" for me, i mostly ignore them. But i remember one from DE, which was 
"important" and required exception from my side.

regards


--
Slavko
https://www.slavino.sk/
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] SPF (and other email security protocols) Survey

2022-11-23 Thread Tobias Fiebig via mailop
Heho,
(Excuse the footnotes; But there is a lot of tangential stuff worth mentioning, 
but not necessarily core to the thread.)

Let me weigh in here and provide some context as Tijay listed me as a 
collaborator, and he seems to be a bit delayed in replies. Tijay is a Professor 
at VT, and works on a variety of topics at the intersection of security and 
measurement. This means that he usually supervises students in pursuit of their 
PhD*.

One of the areas a PhD student currently works on is SPF. This started with 
them prodding around and finding that a) The _defined_ limits for SPF lookups 
seem to be impractical (using Bulk ESPs, Salesforce here, marketing there,... 
lots of includes), and b) Some SPF implementations are really not good at 
dealing with _very_ deep SPF trees.

This is, for better or worse, how ideas for research papers usually come 
together in this specific field of research**.

So, what is this research about now: The group found that odd behavior, and 
what you usually do then first is do some measurements. That didn't go to well, 
and shut off a couple of mailserver***, and they are currently working really 
hard at getting that measurement setup robust and in line; I am helping there a 
bit, as we built a similar setup for our mail-delivery scans (even though that 
does no potentially intrusive things, which makes stuff a lot easier in terms 
of consent etc.).

Anyway, apart from that, to get a scientific exploration of the topic, the 
question also is _why_ did this problem occur in the first place. Hence, there 
is now a survey which asks people (broadly) a) how they are implementing 
SPF/DMARC/TLS-RPT in their setup (software, limits), b) demographics about 
their setup [number of users, domains etc.], and whether they are aware of the 
(TBH, obviously outdated) limits from the standards. The survey does not 
contain mandatory fields, and tells people what to expect and that they can 
quit at any time, and can of course also have their incomplete replies (or 
complete replies if they change their mind later on!) deleted.* I think 
Laura also explained _very_ well why this is not 'human subject research'; I 
still see the issue there in terms of the IRB terminology (which is often even 
prescribed in that unhandy way; And IRBs also usually have 'limited experience 
and knowledge' when it comes to 'Internet things', especially network 
measurements; But for that, see **.)

For the survey and measurements combined, the idea is to then have empirical 
data on how things are implemented (network measurements, even though there is 
ongoing debate on how usable those earlier measurements are in a scientific 
sense), _why_ they are implemented that way (technical level; part about tools 
and implementations in the survey), and _if_ and _how_ best practices/RFCs 
should be amended to capture the actual needs of the email ecosystem (second 
part of the survey). That together then can form a publication on the observed 
challenges in SPF/DMARC reporting.

As such, the survey is for everyone involved in Email; There is no harm to [the 
research], if you are not sure if the survey is for you and you agree to 
participate, go through the survey and see if you'd be able to provide 
meaningful input on the questions.

If there are further questions, or you want to further discuss individual 
points, please let me know.

With best regards,
Tobias

* This is also the reason why I'd argue that it might be somewhat good if the 
communication style with researchers tries to keep in mind that, in the end, 
there is a human on the other side. People tend to make rather strong and 
frustratedly sounding statements from time to time, but these might be 
ultimately read by a PhD student, i.e., a very junior person. A bit of kindness 
can go a long way in communication, and for me personally is also an important 
point of being an engineer.

** We can have an awful lot of discussions about this, and there is a lot going 
on; Besides the obvious 'is it good or not' and 'is this really science?', we 
essentially deal with 'science' with all its incentives (publish or perish); 
This means trying to do research on Internet protocols that have been around 
for longer than the combined age of the PI and PhD in many cases; PhDs fall out 
of their masters before getting into such a topic, and then essentially have a 
year to know all the ins and out of a protocol that grew over the past 40 
years... because after the first year they _should_ basically have their first 
paper under submission. Certainly people that haven't run their own 
mailserver/authNSes for more than a decade. Yes, recipe for disaster.

Currently, I am actually looking into building an 'AS for Measurement 
Research', especially 'higher level protocols' (mail, DNS,... ) that is open to 
researchers; That should a) have its own ASN, /47, /23, and delegated zones, so 
people can _really_ easily block/filter it, b) Maintain a global opt-

Re: [mailop] SPF (and other email security protocols) Survey

2022-11-23 Thread Tobias Fiebig via mailop
Hey Bill,

> Do you know why his students have at least twice in the past engaged in 
> deceptive spamming to gather data?

Yes, I do, see Footnote ** of my previous mail; But to recap: It is a complex 
problem between how academia is setup, what it incentivizes, what it requires, 
what it rewards, and who does network measurement research (usually people 
without operational experience working on things technically too big for a 
single PhD). 
You can, of course, now simply tie that to Tijay, who at least starts to engage 
with the issue now, and tries to be part of a solution instead of the problem;
Then again, as I said, it is a wider problem, and there surely is a ton more 
science-y-groups that are doing similar things, but simply did not pop up on 
your radar yet.

I for one personally prefer working on fixing the underlying problem instead of 
keeping beating on a person that is actually developing awareness of the issue. 
Because academia will not go away. PhDs doing research won't. So,... well. 
Let's fix things instead.

> Frankly, there's no chance that I'll ever cooperate with that person's 
> research.

This is fine. Your choice, and also the reason I am trying to build one stable 
AS for that kind of research, so people can easily enforce never being involved 
on multiple network layers, without running the risk of, e.g., blocking IPs 
that are later used by a different entity (when using stuff like EC2, for 
example). Similarly, that's the reason why such an entity should have a board 
checking planned research that actually involves non-academics. In the end, 
well done research can be really beneficial (e.g., by figuring out changes to 
RFCs); It just MUST not cause harm, and that harm is often not apparent, 
certainly not to people usually found in IRBs, and often not even for people 
that are not actively involved in that _specific_ type of system (Say, DNSOP 
assessing Mail measurements, or MAILOP commenting on some BGP experiments, even 
though, of course, there are community overlaps).

> His tenure should be pulled. He has a pattern demonstrating ignorance of his 
> field of study.
This is not fine; At least in my personal opinion. It is essentially what I 
talked about in my previous mail when referring to rather frustrated comments 
that do not necessarily take into account that the person on the other end of 
the communication is also a, well, person.
Furthermore, it--again--does not really help in mitigating the underlying 
problem, which is a bit bigger than just one person doing research, but instead 
may even make it worse.
I would usually have this discussion off-list, but given that you posted this 
to the list as well, it might be worthwhile to talk about it somewhat openly, 
as it relates to how we want to interact with each other here.

The reason I believe that comment is not fine is that it rather directly 
attacks Tijay as a person, without considering the context of events. Your 
earlier statements in that context were even a bit stronger. In any case, this 
is certainly not in line with how I would expect a rather senior engineer to 
communicate, especially given that this message may also be read by more junior 
people directly. In the end, we are all shaping the tone in the community.

Specifically, your call for revoking tenure is relatively close to "make that 
person lose their job and prevent them from ever working in that field again". 
This is usually done when people demonstrate significant neglect of ethical 
standards and practices in their _academic field_.* The problem here, though, 
as I mentioned above are those standards and practices (or rather: Especially 
the incentive structures and requirements) in the field, which are just 
incompatible with how the Internet works (and this issue is certainly not 
restricted to mail). So, you are basically putting a lot of (kind of justified) 
frustration at academic research at large into comments towards a single person.

Furthermore, when I think about the impact of one of the measurement studies 
(crashing MXes of smaller ops running off-the-shelf frameworks), I cannot shake 
off the feeling that a reply to one of those operators posting to mailop asking 
for help with the issue (without the measurements having been tied to Tijay) 
could very well have been: "Ah, yeah. Unethical scans. But you should have 
figured that out by yourself. Maybe, if you can't debug something that simple, 
and figure out how to block it, you shouldn't be running mail-servers on the 
Internet. *shrug*" 

Which, I think, illustrates the point about tone I hinted at earlier a bit more.

Instead, I would expect clear, yet respectful, communication that takes the 
underlying problem into account and works towards a solution, making sure that 
the problem does not occur again in the future, independent from the people 
involved, while the people involved are allowed to grow. 

But that may just be me.

With best regards,
Tobias

* Note

Re: [mailop] SPF (and other email security protocols) Survey

2022-11-23 Thread Tobias Fiebig via mailop
Hello John,
> So if they were competemnt and ethical, tney would stop and find people to 
> work with who understand the issues so they can do research that is not 
> abusive and could have useful results.  Unfortunately, as we have seen, they 
> are neither.

I personally believe (and sincerely hope that my believes are not disappointed 
here) that this stopping, reflecting, and improving is currently taking place, 
and has been for some time, as signified by no new mail measurements I know of 
having hit the world from the group so far.

> Having spent my entire life in and around academia, I have no sympathy for 
> people who say that since we are so nice and our goals are virtuous it 
> excuses the stuff we are doing. No, it does not.

You are attacking a strawman here, one where I obviously (and usually quiet 
aggressively) agree with your point.

My argument was that it is hardly possible to gain a sufficient understanding 
of many protocols to be able to thoroughly design network measurements while 
accounting for all possible harms within the time available for a PhD. That is 
just as much a recipe for disaster as it is a practical reality for many people 
out there; Start your PhD, do four papers in four years, and have your first 
one submitted by the end of year 1. Learning by doing, breaking too much in the 
meantime, which is not a desirable state of affairs, especially given that with 
the standard-academia-workload no PI will be able to thoroughly vet what their 
students built.

To still be able to make a positive difference, I started my current efforts to 
build something to curb this issue; Because no matter if one extends sympathies 
to people doing harm out of ignorance (no matter whether you see the cause for 
that in an underlying system or not), the truth is also that those measurements 
will keep hitting the Internet.

I might have a bit too much of an idealistic world view here, but I believe 
established infrastructure which provides proper feedback from more experienced 
people before packets hit the fan (to which one can also point people to if 
they make mistakes) can really make a positive difference here, especially if 
people who really know what they are doing are willing to look at things before 
they are let out on the Internet.

Talking of which: John, would you be willing to be part of something like that? 
I mean, it will probably take quiet some time until I have this going, so this 
would be a commitment for an undetermined future point in time (mostly due to 
me not having a /23 v4 spare for the project; But I am working on it. And of 
course then there is the adoption thing.)... But I believe your eyes in such a 
project might actually allow quiet a lot of students to learn a lot.

With best regards,
Tobias

 

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] SPF (and other email security protocols) Survey

2022-11-23 Thread Tobias Fiebig via mailop
Heho,
> Please, give us the IP ranges these clowns are using so we can block all 
> traffic from them.
Not sure which 'clowns' you refer to; 

If this is about the sum of researchers under the mechanics of current academia 
which might release crappy measurements to the public, I sadly lack such a list;
If I manage to get the circus^Wmeasurement AS going I will certainly share the 
prefixes (and ASN) for people to block. After all, that is part of its point.

If you are referring to Tijay: Stuff is being built on EC2, and I leave it to 
Tijay if he already wants to share the IPs; 
However, as long as I can and want to give some input on that project, that SPF 
measurement setup will not originate any measurements until some issues are 
resolved. So, I am not sure how much of a point is in that at the moment, 
especially as those addresses may still change.

If and when those issues are resolved whatever IPs it will be running from will 
be first communicated, with enough time for people to take measures.

With best regards,
Tobias

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] SPF (and other email security protocols) Survey

2022-11-24 Thread Tobias Fiebig via mailop
Hello Andrew
> If VT PhD students don't have the experience needed in the topics they study, 
> then shouldn't VT change either the students or the topics ?
As I said, this is not about specific instances, people, or VT in particular.

It is more of an observation that while in 1988, you could go through 
RFC1031-1035 and have a rather complete overview of DNS (picked as an example 
here).

That changed since then, not only for DNS; Mail, TCP,... they all grew. A lot.

At the same time--sticking with DNS here--countless ways of 'holding it wrong' 
emerged in practice, far beyond RFC1537 and RFC1912. 
And to do proper measurements (in terms of 'not unethical' and imho also in 
terms of 'actually reliable') you MUST know all of this.
When I look at the people with whom I graduated my master, who went on to work 
on DNS implementations:
They spent _at least_ as much (likely more) time on DNS alone as I did on my 
whole PhD.
And a PhD comes with a lot of other things added to it (teaching, funding, 
different topics); It is more like a mixed bag of beans.
And still they will _always_ know more about DNS than me.

Which brings us to the academic-philosophical point: Technically, I would 
expect a PhD to be exactly about that: 
Having the time to _really_ dig into something, getting to the bottom of it, 
and making meaningful contributions to the state of knowledge; if it takes five 
years, a decade, or more.
But then again, as said earlier in this thread, I tend to be a bit (too) 
idealistic.
Nevertheless, from your message, I believe that we actually agree on this.

Closing the loop: Academia has grown into an output focused, measured, and 
managed ecosystem in many places*.
People have 4 (EU) to 6 (US-ish) Years for a PhD, with an expectations of 3-5 
papers in well regarded venues.
There is simply not the time for engaging sufficiently deeply with many 
technologies, and--throwing another punch here--I think many CS BSc/MSC 
programs also do not necessarily provide the right foundation for that.
Teaching is another chore many faculty run through, while all things fall of 
different corners of the plate at the same time (and far too often faculty 
members' mental health as well; Burnout in academia is a thing).

And to circle back to on-topic: The result of that is what then pops up in 
/var/log/maillog.
So it isn't about 'should VT change [something]'; It is more 'shouldn't society 
change the incentive structure and general setup around academia as a whole'?
I have quite some opinions there, boiling down to the answers 'yes' (and 
suspect most here will agree with that).
But that is not really in my power; So I try to do what I can instead 
(channeling results of the system into a more manageable frame, while trying to 
teach those students I directly work with at the institution I am at).

In any case, I believe that harsh words when something (predictably and 
repeatedly) goes wrong with that system in place will not bring us closer to a 
solution.

With best regards,
Tobias

*I am not really planning to make a full argument on why I believe that this 
approach is really detrimental to the acquisition of knowledge and education of 
students; It is beyond the scope of this ML, and I assume I'd be preaching to 
the choir. If you are more interested in this, I can recommend a (somewhat 
recent) measurement study of mine into/tangential to the topic; The discussion 
actually touches on some of these points, and provides good pointers to further 
work on it: https://arxiv.org/abs/2104.09462 

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] t-online.de

2022-11-26 Thread Tobias Fiebig via mailop
Heho,
> they mean that you must have an webpage(imprint) (on your mail-domain (fqdn 
> or domain itself)) with contact information (name, postal address, email, 
> probably phone number).
I personally have the feeling that that got a bit more relaxed over time; At 
least the last two times I interacted with them a missing imprint was not an 
issue; Then again, that may also be somewhat dependent on the IP space you come 
from.

I guess it is mostly a thing bound to the choices of the postmaster-on-duty who 
gets the ticket; In any case, they are usually 24/7 and will also mention if 
something/what is missing/preventing them from allowlisting.

With best regards,
Tobias 

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] How to delegate DMARC reporting to third-party providers for inbound mails

2022-11-29 Thread Tobias Fiebig via mailop
Heho,
As said by Alessandro; You will have to make the tool you are currently using 
for validating DKIM/SPF -> DMARC generate and send the reports.

What works well for me is rspamd [1], but there is also a tool for postfix 
(iirc; maybe somebody else can weigh in there). Similarly, there should be 
something for TLS-RPT.

What you should keep in mind when setting this up, though, is that you can 
actually run into rather loop-y behavior if you originate your dmarc reports 
from a domain that requests reports itself (best practice would be originating 
from a subdomain not requesting reports; you could also exclude originating 
reports for that domain, at least with rspamd):
- You get a mail
- You sent a report
- Other party gets a mail (the report)
- Other party sends out report (because they got a mail from you)
- You get a mail...

For my setup, that is something I still plan to fix. :-|

With best regards,
Tobias

[1] https://rspamd.com/doc/modules/dmarc.html

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] OpenDMARC

2022-12-26 Thread Tobias Fiebig via mailop
Heho,

On Mon, 2022-12-26 at 21:42 +0200, Mary via mailop wrote:
> ...
> Are there any alternatives to OpenDMARC and OpenDKIM?

I had a lot of good experiences with rspamd; Also, it felt 'easier to
hold' to reduce the influx of spam, as you can tighten things
selectively; Of course, you can also just use the signing/validation
parts and use $something_else for spam filtering.

Added bonus: Supports ARC as well, and can send DMARC reports ootb.

With best regards,
Tobias

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


[mailop] Measurement study on understanding global email configuration quality

2020-07-07 Thread Tobias Fiebig via mailop
Dear all,
I am a researcher at TU Delft in the Netherlands, looking into Network 
Security, Protocol Adoption and human factors.
My student Olamide is looking into how well _sending_ email setups are 
maintained around the globe. 
For this, we need many people, ideally from 'smaller' providers, i.e., with non 
gmail/hotmail/yahoo addresses, to send us emails.
 
Please consider participating in this study, and sharing it in your networks. 
To help us, please follow the instructions at:

 
https://www.email-security-scans.org/   

Important caveat: If your mailer validates recipient addresses before accepting 
mails for delivery, you might be unable to send to destination addresses that 
are (a) only resolvable via IPv6 only, or (b) Have broken DNSSEC, which we use 
to test DNSSEC validation. If this is the case, please just remove the 1-3 
offending addresses from the To: header. Please also note that our test setups 
will test whether the host delivering mails to us is an open relay. Also note 
that you may receive bounces from your mailserver for some of the destination 
addresses, e.g., if mails cannot be delivered via IPv6, or if your mail-setup 
validates DANE records for our DANE test domain. We do _not_ need a copy of 
those bounces.

In case you want to get results for a domain you operate or use early, please 
just drop me an email from the same domain and delivering servers after you 
participated, and I will share the data with you. :-)

Met vriendelijke groet,
 
Dr.-Ing. Tobias Fiebig,
Assistant Professor / Universitair Docent
Department Engineering Systems and Services

Informatie- en Communicatie Technologie (ICT)
 
TU Delft / Dept. ESS
Faculty of Technology, Policy and Management (TBM)
Building 31
Jaffalaan 5 - room B3.170
2628 BX  Delft
P.O.Box 5015
2600 GA Delft, The Netherlands
T +31 (0)15 27 85700
E  t.fie...@tudelft.nl

Present: Monday t/m Friday

___
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop


[mailop] Mail Sending Self-Test Platform

2023-02-27 Thread Tobias Fiebig via mailop
Heho,

after our paper on mail sending configurations some time ago [1], we
now glued that together into a self-service site: 

https://email-security-scans.org/

I'd be happy to hear your feedback, especially if things do not work as
expected (then, your test ID and ideally stored emails would be really
helpful, so i can double check what went wrong). More details below
(also see [2] for an overview of the tests we run). 

Please note that setting up the tests (as we have to configure vhosts
for some MTA-STS cases etc.) takes some time on our site. The test-site
should periodically reload and provide the status. As we use JS for
that part, please reload it manually every few minutes if you block JS.

I would also be interested to hear what you think should be included in
addition to the current tests; Some of our plans for the future below
as well.

We already found some interesting bits, like Vultr having lame v6
delegation for their AuthNS servers' domain, making their domain and
rDNS non v6-resolvable [3], or mail-in-a-box using relaxed/simple for
DKIM, which breaks signature validity on long To: headers [4].

If you want me to block certain domains/IPv(4|6) ranges or ASes for the
service to keep your users from using it, please let me know and i will
implement it asap.

# Overview

The site tests a variety of parameters about mail sending (details:
[2]), by evaluating mails a user sends us in reply to a message that
can be requested on the site. Simply requesting a message on the site
does not start any evaluation or measurements, i.e., you have to send a
reply-all to a requested message to start the evaluation. After the
test, you can also delete the test or download a copy of your data, and
if you opted to do so, a copy of the emails as we received them.

# Method

Users send emails to us (in reply-all to a message we sent, for easier
usability).Target MXes on our site are either configured in a fully RFC
compliant way, or intentionally misconfigured in a common way (broken
DNSSEC for the domain, for example, or a broken DANE record, again, see
[2] for an overview). Thereby, we can determine the
configuration/support of features by the senders' MXes.

# Possible Harm

The worst thing that should happen to mail operators is finding
specific undeliverable mails (broken DNSSEC if DNSSEC is validated, v6
only DNS if no IPv6 DNS resolution is supported) in their mail queue,
or users receiving bounces (see FAQ on the page). So far the system has
been tested with several hundred mail-setups, without encountering
issues. If you encounter other unintended side-effects, please reach
out to ab...@email-security-scans.org or me directly off-list.

# Test details

Specifically, we are testing:
- v4 Mail sending
- v6 Mail sending
- Greylisting support

- Transport encryption (Plaintext/TLS cipher strength and version
support, opportunistic encryption)
- DANE support outbound, i.e., if you honor DANE
- MTA-STS support outbound, i.e., if you honor MTA-STS (incl. whether
you prefer DANE over MTA-STS, as it should be)
- Sending of TLS reports and whether these are standard compliant, also
providing a copy of the received report (Google's are not perfect, btw.
;-))

- DNS resolvers used by the mailserver
- Whether the mailers' DNS servers resolve via IPv6
- Whether the mailers' DNS servers validate DNSSEC

- If all names relevant for email delivery resolve via IPv6
- If all names relevant for email delivery are DNSSEC signed

- Mailer-basics (ehlo=rdns=fcrdns), SPF (from/envelope)
- SPF policy size (by retrieving your policy, up to 20 referrals deep)
- DKIM (also checking key-sizes, algorithm mismatches and
canonicalization issues; These are surprisingly common, i.e., simple
being set breaking only in cases not caught by standard dkim testers)
- DMARC (policy validity, conformance of sent mails, displaying
implicit defaults)
- DMARC report deliverability by sending one(1) valid DMARC report for
a received email, including authorization of out-of-domain RUA/RUF
(also providing a copy of any bounces received)

- Full IPv6 readiness (join over three previous IPv6 tests)

- Whether any headers that should not be duplicated are duplicated
- Whether any mandatory headers are missing
- If From/Envelope match

# Planned tests

- evaluate outbound spam filtering
- evaluate received_from stripping
- test for inbound-link parsers
- cluster by provider (via MTA sets), not domain
- Add DANE checks for senders' MXes
- test for host-addresses in SPF prefixes
- add MTA-STS check for senders' domains
- add test for handling more than 5 MX with only the lowest-prio one(s)
being reachable
- requesting-domains' MX aspects (null MX, IPv4/6 addr in MX record,
non-reachable MX, broken MTA-STS/TLSA, broken DNSSEC, validation of our
setups SPF/DKIM (via DNS server logs, v6 resolvability), etc.). 

With best regards,
Tobias


[1] https://www.usenix.org/system/files/atc22-holzbauer.pdf
[2] https://www.email-security-scans.org/description.php
[3

Re: [mailop] Mail Sending Self-Test Platform

2023-02-27 Thread Tobias Fiebig via mailop

Heho,
> The inevitable questions about how bad the issues are. I.e. what
> could happen?:
> - My ip4 and ip6 reverse DNS records are not DNSSEC-signed. I could
> ask my hosting provider if they can sign them. Could there be a
> reason not to?
> - I'm not DKIM-signing the MIME-Version header (marked as minor
> issue).
Well, as long as your mail gets delivered, it is not to bad, is it?
;-)

More seriously; The indicators are more like "should improve" (stop-
shield), "could improve" (road-block), and "fun-fact" (light bulb on
'ok').

Nobody will die (or rather: Have their mails not delivered) if your
rDNS is not DNSSEC signed. But in an ideal world it should be.
Naturally, non-fcrDNS is a lot worse than that; But then again, you
should be able to interpret that when running a mail-server. ;-)

For DKIM, btw, i got poked re: my rather RFC4871-ish interpretation; I
revisited that to now only add a note (small light-bulb) if some
headers in the 'think about doing it depending on your use-case'-frame
introduced with RFC6376 are unsigned, while not signing From: now
triggers a "should improve".

> I'm happy to see my ed25519 dkim signatures are accepted by someone.
> (:
Fun story how the setup got to that, actually... during testing a
tester had an RSA key marked as ed25519 in DNS, while signing with an
actual ed25519 key; Lead to a lot more fine-grained evaluation in the
tool, incl. plausibility checks for pubkeys in the DNS.

With best regards,
Tobias

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Mail Sending Self-Test Platform

2023-02-28 Thread Tobias Fiebig via mailop
Heho,

> Looks like an useful utility for testing these things out live.
Thanks!

> One thing though, the EHLO and rDNS comparison is case-sensitive,
> there should really be no need?

No, there indeed isn't; Thanks, good catch! Already patched and will
deploy in a bit (some more bugs to address from other messages).

With best regards,
Tobias
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Mail Sending Self-Test Platform

2023-02-28 Thread Tobias Fiebig via mailop

Heho,
> Thanks for this.  I tried it a few days ago (I think because you 
> posted it to opensmtpd-misc? :-) 
Yeah, also shared it there, hoping for more motivation to implement
DANE/MTA-STS in OpenSMTPd. Next escalation step is releasing code i
wrote for other projects and threatening to send patches. ;-P


> and without doing anything my ‘score’ went from 7 to 8 since I last
> checked!  At this rate I expect a 10 by Friday.
Unlikely ;-) But i got more lenient with DKIM headers, which might have
improved your score.

> Is DNSSEC-signing PTR records common?  Will it affect delivery in 
> practice?
I doubt that it affects deliverability in any way (if, at all,
negatively, if DNSSEC breaks... which... well.) The test mostly works
from a 'perfect world' perspective, and there, of course, everything
DNS would be DNSSEC signed. ;-)

> One confusing UI thing: under ‘DMARC’, the ‘(default)’ is either 
> in error or its meaning unclear:
> 
>   adkim s (default)    (plain-text; OPTIONAL; default is "r".) 
>   …
>   aspf  s (default)    (plain-text; OPTIONAL; default is "r".) 
>   …
>   fo    1 (default)    … (plain-text; OPTIONAL; default is 
>   "0").

Thanks for catching that; Found and fixed. :-) Pushing when i am
through all the feedback.

With best regards,
Tobias
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Mail Sending Self-Test Platform

2023-02-28 Thread Tobias Fiebig via mailop

Heho,
> For DMARC, there is a parsing bug.  My DMARC record consists of three
> concatenated strings, which should be joined as usual.  The view
> shown in the report strips the leading and trailing double quotes,
> but not the intermediate ones:
> 
> v=DMARC1; p=none; " "rua=mailto:dmarca...@tana.it; "
> "ruf=mailto:dmarcf...@tana.it;
> 
> Only v= is parsed correctly; p=, rua= and ruf= result as unset.
Ok, thanks; Identified and fixed.

> For DKIM, the test requires 2048 bit keys.  RFC 8301 says "Signers
> MUST use RSA keys of at least 1024 bits for all keys.  Signers SHOULD
> use RSA keys of at least 2048 bits."  According to RFC 2119, that
> means that there may exist valid reasons in particular circumstances
> to ignore a particular item, but the full implications must be
> understood and carefully weighed before choosing a different course. 
> As I carefully weighted the decision to use a small key —0 attacks in
> several years— I'd have expected an 💡Ok, but watch notes on this.
Hm... I see your point. However, I'd go with 'Should improve', kind of
sticking with the RFC phrasing here; A (more general) issue, though is
the absence of a clear distinction between 'should' level issues, and
'must' level issues (say, missing rDNS alltogether).

What should definately be the case is skipping a warning if there is at
least one other RSA2048 or ED25519 key. Will fix that.


> Also, the diagnostic urges me to sign more header fields. 
> Specifically, it says "see RFC6376 Sec. 5.4: content-transfer-
> encoding:content-type:message-id:mime-version".  It is necessary to
> sign Content-Type: only if the sender signs a limited amount of the
> body, using l=; in that case, altering Content-Type:, a text/plain
> message can be turned into the MIME prologue of a multipart message. 
> Otherwise, signing those fields doesn't add a significant guarantee
> of message integrity.  Signing /technical/ fields, as opposed to
> semantic ones, in my experience irretrievably decrease signature
> resilience.  That is because most mailing lists and other agents
> disregard the original content of such field.  For example, I could
> not verify fiebig.nl's signature of the message I'm replying to,
> whose Content-Transfer-Encoding: was changed to base64, while I
> expect to DKIM verify this message.  See this draft[*] for the method
> to do so.
Hrm, good point. I had initially skipped the approach as in RFC6376;
Following that now, i moved all non-signed headers to '💡Ok' (except
for from: being signed.) I will spend more time on thinking about a
good way to address this.

> A test I'd like to make, somewhat more intrusive than replying to
> all, is about DMARC aggregate report correctness.  It would require
> domain owners to provide a target address at their domain.  The
> server would then send a number of messages to that address, some
> from a domain with strict DMARC policies, some from a low-reputation
> IP, some with an EICAR test attached, some from non-existent From:
> domain, and so forth.  On the next day, the diagnostic will examine
> the DMARC report received, if any, and check its correctness, both
> formal and semantic.  Fancy it?

Would be an awesome idea, and i am noting it down. However, given that
there can be a rather strong wind blowing for email measurement setups
that originate emails for measurement purposes (i feel the
implementation we have now is already a stretch with one potentially
unsolicited email being sent), i'll rather skip on that for now.

Thanks for the feedback. Will implement the better handling of multiple
DKIM signatures and then push.

With best regards,
Tobias


-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Mail Sending Self-Test Platform

2023-02-28 Thread Tobias Fiebig via mailop
Heho,
dmarcv1 is a typo in the description (i correctly check for DMARC1,
otherwise this would have shown up earlier); 

The actual complaint is psd=n; Lemme see if i can make the report more
clear re: where it complained.

Do you maybe have some context on psd=n? I can't find it in 7489.

With best regards,
Tobias 

On Tue, 2023-02-28 at 17:32 -0500, John Levine wrote:
> It appears that Tobias Fiebig via mailop  said:
> > Heho,
> > 
> > after our paper on mail sending configurations some time ago [1],
> > we
> > now glued that together into a self-service site: 
> > 
> > https://email-security-scans.org/
> > 
> > I'd be happy to hear your feedback, especially if things do not
> > work as
> > expected (then, your test ID and ideally stored emails would be
> > really
> > helpful, 
> 
> It's complaining that my DMARC record is invalid because it doesn't
> start with "v=DKIMv1".  What?
> 
> Test ID ttada96061gfwnvbuthbycansr5h34
> 
> R's,
> John

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Mail Sending Self-Test Platform

2023-02-28 Thread Tobias Fiebig via mailop
Heho,
On Tue, 2023-02-28 at 17:53 -0500, John R Levine wrote:
> > dmarcv1 is a typo in the description (i correctly check for DMARC1,
> > otherwise this would have shown up earlier);
> ??
> 
er... DKIMv1... -.-' The check checks for v=DMARC1, not DKIMv1 as the
description implies; Currently fixing that.


> It's in RFC 9091 and in the DMARC update currently in draft form at
> the IETF.  The intention was always that you could put private
> clauses in DMARC records which get ignored by clients that don't
> understand them, but the ABNF was overly clever.  That's fixed in the
> new draft too.
Will fix that part asap/tonight; Will let you know if it should behave
better.


With best regards,
Tobias
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Mail Sending Self-Test Platform

2023-02-28 Thread Tobias Fiebig via mailop

Heho,
> It's in RFC 9091 and in the DMARC update currently in draft form at
> the IETF.  The intention was always that you could put private
> clauses in DMARC records which get ignored by clients that don't
> understand them, but the ABNF was overly clever.  That's fixed in the
> new draft too.

Hrm, digging through this; dmarcbis-27 now; Indeed there are some
interesting changes; Implementing this will take some time. Also, given
key differences in record parsing (esp. the MUST in -27 2nd to last
par. of 5.3, vs. SHOULD same place in 6.3 of 7489) might have
interesting implications re: behavior in real world systems, esp. when
looking at the long tail of 'mail-in-a-docker-ish' setups glued
together with curl | sudo bash.

I guess what i will do (with a bit more time) is actually implement
both interpretations to policy parsing (7489 as written, not as
intended vs. dmarcbis-27) with scoring being at one-passing-is-enough.

John: Btw, what I am wondering; Given the last par of 6.3 in 7489,
shouldn't dmarcbis switch to DMARC2, given that there are changes to
existing tags (REQUIRED -> RECOMMENDED for p, removal of pct, rf, and
ri), or does that not constitute a change? (Quick thought; Pretty sure
there is a mail-thread on the list, though; Will dig through that
later.)

With best regards,
Tobias
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Mail Sending Self-Test Platform

2023-03-01 Thread Tobias Fiebig via mailop
Heho,

On Tue, 2023-02-28 at 22:21 -0500, John Levine wrote:
> We briefly considered that and decided against it because the vast
> majority of actual DMARC records will continue to work unchanged, and
> long experience says that if you try to change the version number,
> you end up living with the old and new versions forever.
Yeah; Maybe it's time for an RFC for next month only containing "All
IETF created protocols MUST not have a numbered version indicator."
(This is (only partially) joking; But i somehow feel like there will
never be DKIMv2, STSv2, or TLSRPTv2 ;-)) 


> Remember that unknown tags are now ignored. In practice pct turned
> out to be impossible to implement so most people didn't try. The
> required->recommended for p= is to make it consistent with the
> _report._dmarc records in section 7.1 of RFC 7489.
Hm, yeah, and introduced tags should not be an issue as per 7489
already.

Still, i am a bit wondering; Looking at the data flushed in so far (and
already multiple bugs filed against implementations)... there are a lot
of funny milters and often unmaintained software integrated in funny
docker stacks (probably preaching to the choir there, but i have a lot
of grievances with those setups), and generally a lot of awry things
(example.com. IN TXT "v=spf1 include:example.com -all" is, for example,
far more common than i'd have ever believed...).

Then again, considering how bad _my_ code usually is... i am not too
sure how well many of those libs hold up towards change.

Point being, it might be interesting to conduct a structured study into
how different implementations in different versions handle DMARC
policies with different levels of 'errors' to inform this. I have a
colleague who might still have a lab-setup of implementations around,
to see if they could quickly do that.

With that information, i could then also provide a better score for
DMARC parsing, i.e., make a statement on like "current policy would
validate in $list_of_common_implementations but not in
$hopefully_short_list_of_other_implementations".

With best regards,
Tobias

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Mail Sending Self-Test Platform

2023-03-01 Thread Tobias Fiebig via mailop

Heho,

> My system has five mail items still queued, that won't be delivered.
> Two because of broken DNSSEC, three because of invalid TLSA records.
> (It's report ppk95bat9arnakovq5nmljen4n342u, by the way.)
> 
> The consequences of this in the report could be somewhat confusing. 
> It says "Not all DANE related emails have been sent; We are lacking
> information to analyze DANE support.", and "The DNS resolver your
> email provider/server relies on, Mail for DNSSEC enabled DNS
> Resolution tests not sent; Cannot assess test. DNSSEC."  That sounds
> like something is wrong, but there really isn't, if I understand this
> correctly; you just don't have the responses that would have told you
> that my system sent you something when it shouldn't have. 
Hrm, this depends on how you sent the emails; What we do to establish
if an email to a measurement target address (see detail page) has been
sent is check all To: addresses in each email we receive. Technically,
all 29 measurement destinations should be in the To: header of all
measurement mails. 

Specific emails not arriving is actually the signal we use to
determine, e.g., DNSSEC support. But we added the To: check to
distinguish between 'DNSSEC used' and 'specific mail not sent'.

You did not check 'store my emails', though, so i cannot check how you
did it for your test. I'd suspect something along the lines of 'one
mail with one To: per measurement destination'?

If you'd like to look into this a bit more, could you maybe run another
test, but check the box for 'store my emails'?


> (Also, I think maybe that last quote needs rewording - looks like
> it's missing one or more words?)
Yeah, good catch, fixing in a second.

> Further, all the nice little icons on the report page are Unicode
> characters, which works fine on Linux, and probably Windows, but on
> my workstation, which runs NetBSD, I don't have whatever font that
> is, so I just get those little boxes with the Unicode code point
> numbers in them. I guess actual graphics would be more portably
> rendered.
Given the high portion of the measurement setup running on BSD, this is
somewhat embarrassing. ;-) I would have expected the specific fonts to
be delivered with the site. (UI stuff is somewhat difficult... and "not
my core-strength". Will see if something can be done to make this
render well on netbsd as well. Which browser are you using?
w3m/links(2) with fb rendering or something with a gui?

With best regards,
Tobias

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Mail Sending Self-Test Platform

2023-03-01 Thread Tobias Fiebig via mailop

Heho,
> Will do - have been waiting for the web site to send me another mail
> for a while, now, but it seems I'll have to leave it until morning. 
> I'm guessing it's rather busy, with lots of people wanting to try it?
Gnah... seems like i got ratelimited at LE's staging environment for
(somewhat good) reasons; Hot fixed it for now and will migrate to a
self-signed cert later. (It _would_ be cool to have actually valid LE
certs to properly test MTA-STS rpt sending; But then again...
unlikely).

If you try this again tomorrow you have to start a new test, as tests
that do not receive a reply within an hour get removed (minimizing data
storage etc.)
> 

> It's Firefox.
Hrm, will give that a shot later, iirc the fonts should come with the
site.

With best regards,
Tobias

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


[mailop] DKIM tlsrpt Service Tag

2023-03-01 Thread Tobias Fiebig via mailop
Heho,
going through results of my measurement setup, i noticed that from
three organizations that so far delivered TLS-RPT, exaclty none have
the tlsrpt DKIM service type used as SHOULD'ed in RFC8460.

Looking at the errata, Errata ID: 5889 notes that this tag was never
registered (and indeed wasn't until now), and should be registered
either using an additional document only doing the reg either through
DISPATCH or an AD sponsored doc; That was ~3y ago.

Does anyone know if this just slipped off the table somewhere, or if
there was consensus to just skip on the servicetype given it is just
'SHOULD be present' 'MAY ignore' in the RFC (given the observable
number of users of TLS-RPT so far, calling it "consensus" might be a
stretch, though ;-))?

Wondering, because dkimpy at least by default verifies the tag, and i
currenlty have this as a 'could improve' rating.

With best regards,
Tobias

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Mail Sending Self-Test Platform

2023-03-02 Thread Tobias Fiebig via mailop
Heho,

the 'issue' was indeed that you moved the addresses to Cc: instead of
To:; Us not checking there is actually somewhat of an oversight.

Fixed and pushed.

With best regards,
Tobias

On Thu, 2023-03-02 at 09:13 +0100, Tom Ivar Helbekkmo wrote:
> Tobias Fiebig via mailop  writes:
> 
> > If you try this again tomorrow you have to start a new test, as
> > tests
> > that do not receive a reply within an hour get removed (minimizing
> > data
> > storage etc.)
> 
> I just did - same results, and test ID is
> gq7oj8xk44aw452j4e4fzf7vhpu4v3.
> 
> -tih

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Mail Sending Self-Test Platform

2023-03-02 Thread Tobias Fiebig via mailop

Hello Mark,
> We got a ding on our DNSSEC score, because the PTR record isn't
> signed.  Is this really as big an issue as the explanatory test makes
> out?
The tool looks for a perfect world, which there isn't. Un-signed rDNS
is not really a bad thing (of course, a hypothetical attacker could
temper with your rDNS to make fcrDNS fail to get your mails rejected...
but that is erm... "mildly unlikely".)

Still, if i'd not deduct points for those things, everyone would get a
10. ;-)


> We also got a ding on our MTA-STS record,
> but https://esmtp.email/tools/mta-sts/ said the only problem is a
> missing CRLF at the end of our txt file; easy enough to fix.  This
> tool however just said that our system doesn't support MTA-STS.
>  After I add the CRLF I'll rerun the test; if it still fails, I'll
> report back.
Actually... you did not get anything for your MTA-STS record, because
we're not testing that. You got that for your validation of and
adherence to MTA-STS policies when _sending_ mails.

I.e.: You don't validate/follow _our_ MTA-STS policy when sending
emails.

Besides: The CRLF thing is actually a bit funny; The RFC iirc just says
'delimited by', so i am not too sure whether it really must be at the
end of the file; And then there is an errata clarifying that you can
also delimit with LF instead of CRLF as mentioned in the RFC.

With best regards,
Tobias
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] DKIM tlsrpt Service Tag

2023-03-02 Thread Tobias Fiebig via mailop
On Wed, 2023-03-01 at 22:02 -0500, John Levine via mailop wrote:
> In retrospect the service tag was a mistake. It's not widely
> implemented, so if you use anything other than s=email you will lose
> mail because recipient systems will get confused.  The MTAs that
> receive mta-sts messages generally have no idea there is supposed
> to be something special about those messags.

I am still not really sure what to make of it; Based on (the three)
TLS-RPT i have seen so far, 'not using s=tlsrpt' is actually the lived
practice. With the state of the RFC, i am not even sure whether
s=tlsrpt would be valid to set in the first place.

With the state of things missing s=tlsrpt should still give a passing
score (with note, though, listing this whole situation). What i am not
overly sure about is whether it might not make sense to set a 'could
improve' if i ever encounter the unicorn of an entity sending TLS-RPT
_and_ having that record set.

Any suggestions?

With best regards,
Tobias
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Mail Sending Self-Test Platform

2023-03-02 Thread Tobias Fiebig via mailop

Heho,
> ...and now it gives me 9 out of 10, acknowledging that my MTA
> verifies DNSSEC and honors TLSA records.
My own domain (and the sending for email-security-scans.org) scores
9/10 as well; Mostly because OpenSMTPd lacks DANE and MTA-STS
validation... and TLS-RPT sending... that is a whole nother beast.

> Of course, I'll never get a 10 out of 10.  I'll implement TLS
> reports, by and by, but MTA-STS will be supported here over my dead
> body.  :)
I share your sentiment. I am not a fan of MTA-STS, and honestly not
really sure which problem it solves.

> This is the most impressive email testing system I've ever seen.
Thanks. The todo is still long, and the code bad. ;-) But i am trying 
to get it into a robust state; It can be rather surprising how emails
look in the wild.

Newest find: Bump message storage in the DB from BLOB to LONGBLOB, 
because apparently there are 167KB(!) bounces these days... size 
mostly added by the NDR. -.-'

With best regards,
Tobias 
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Mail Sending Self-Test Platform

2023-03-02 Thread Tobias Fiebig via mailop

Heho,
> If I recall correctly, POSIX says that a line of text is not a line
> of text unless it ends in a proper line ending marker.  I'm unsure of
> the details, here, but I am sure that when, a few years ago, I dug
> deeply into this, I concluded that the last line of a UNIX text file
> absolutely has to end with an LF for the line to be unequivocally
> part of the file.

If I read RFC8461 correctly, this is not required for MTA-STS policies:

RFC8461, Sec. 3.2.
> sts-policy-record= sts-policy-field *WSP
>*(sts-policy-term sts-policy-field *WSP)
>[sts-policy-term]

;-)

With best regards,
Tobias
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] DKIM tlsrpt Service Tag

2023-03-02 Thread Tobias Fiebig via mailop
On Thu, 2023-03-02 at 14:53 -0500, John Levine via mailop wrote:
> In my experience very few DKIM verifiers know what to do with
> s=tlsrpt. I wouldn't look for it.
Well, the looking code is already there; But given this is 
essentially a unicorn i am unlikely ever to see, i'll just
go with 'Ok' for now.

If i ever see one in the wild, i'll metion it here. 

With best regards,
Tobias
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Mail Sending Self-Test Platform

2023-03-03 Thread Tobias Fiebig via mailop
Heho,

no, i at least make the assumption that the people who get themselves
to implement MTA-STS (in either direction) will also have PKIX valid
certs.

And that group of orgs is relatively small. 

In contrast, you can, e.g., just enable dane for you N-thousand
customers by adding records to _your_ MXes.

But, as said some years ago when i first complained about this: I
wasn't there to give this input when it was spec'ed; So my complaining
now also has _some_ limits. ;-)

With best regards,
Tobias
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Mail Sending Self-Test Platform

2023-03-03 Thread Tobias Fiebig via mailop
Heho,

On Fri, 2023-03-03 at 17:02 +0100, Ángel via mailop wrote:
> Note you could use a  a refresh-every-10-seconds functionality. (meta refresh could be
> blocked as well, though)
Briefly considered that; However, contrary to JS (which is often
ignored by screenreaders) the HTML manual put a warning marker on that
in terms of accessibility. So i decided to skip on that.

> I was kinda surprised that whitespace was allowed here in javascript,
> btw: “window .location.reload();”

"ups"; Fix is in staging (along with a better description for reverse
DNS being unsigned, making clear that signing that is more in the
'because we can' realm and "some _theoretical_ attacks". 

Also currently setting up an open v6 only resolver that will be
referenced for v6 only resolution. ;-)

With best regards,
Tobias


-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] [EXT] - Re: New member, trying to bring our mail server inline.

2023-03-04 Thread Tobias Fiebig via mailop

Heho,

> Check that no other filters alter those fields after signing.  Can
> you sign messages off-line?  Do Bcc: copies verify? (Use any off-line
> dkim verifier.)
You can also give https://email-security-scans.org/ a try and
(important!) select "Store my emails so I can download them later."
before requesting the test mail.

Then, when you click 'Download Data', you get the mbox files of the
messages as we received them; You can then try to further debug this
with dkimverify locally, i.e., edit the mbox file to change things, run
dkimverify, and see if that was what made the sig fail.

Of course, even if you store emails, as soon as you click 'Delete
Test', they are removed. ;-)

With best regards,
Tobias

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Mail Sending Self-Test Platform

2023-03-04 Thread Tobias Fiebig via mailop

Heho,
> Heh, it turns out that actually works, so not a big deal :-)
Not tooo sure; There were a lot of timeouting tests which looked like
'did not reload page'; Wouldn't be surprised if _some_ browsers are
fine with it, while others aren't. Anyway, for good measure, it's fixed
now. ;-)

And thanks again for finding it. :-)

With best regards,
Tobias
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Bell.ca servers disconnecting before 250 OK

2023-03-07 Thread Tobias Fiebig via mailop
On Tue, 2023-03-07 at 14:34 -0500, Bill Cole via mailop wrote:
> What is happening in that 125-second gap? Why are *you* timing out
> after 125 seconds?

To add to Bill's suggestion, given this happens after DATA: Check the
(path) MTU.

Btw, is there any hypothetical chance that your mailer might be running
on a KVM/QEMU virtualized platform and might be using rtl8139 virtual
NICs (no offense meant; this is a very wild guess, but from the looks
of it, your org. might fit the unlikely arrangement of stars and a full
moon that could lead to that.)

With best regards,
Tobias 

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] IP RBLs and large cidr blocks

2023-03-09 Thread Tobias Fiebig via mailop
> 
Heho,

> > I mentioned to Michael -- in a direct email -- that I wonder if
> > there is an opportunity to put something in parent DNS zones in the
> > .arpa sub-domains, much like DS records for DNSSEC go in parent
> > zones, so that an IP provider (or at least naming authority) can
> > specify that a range is delegated to another entity.
> 
> Usually this is ONLY done for a /24 or greater by upstream
> providers.. (While it can get done for smaller blocks, you end up
> with that ugly double PTR record, one from the provider and one from
> your DNS server)
_This_ is what the IRR system/'rwhois' is for, no? I usually put
objects for v4 i delegate into IRR, same for v6; I recall that hetzner
also does (used to do?) this for delegated networks in their dedicated
server product. At least the RIPEDB comes with an API.

ARIN even says explicitly that ISPs only have 7(!) days to submit
reassignments of v4/29 v6/56 or shorter to the database.

> > I also mentioned that miscreants would be likely to abuse this and 
> > artificially divide their IP space so that bans on some parts would
> > not effect other parts.  Hence the need to have a larger addressing
> > /naming authority provide this.
Yeah, like, the LIRs? (Granted, the bar to become a LIR in RIPE is not
that high (and an LLC not that much more difficult to get for the other
RIRs; But you can technically nuke bad-faith LIRs from orb... er
ASPATH).


With best regards,
Tobias
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Sometimes I hate Microsoft :)

2023-03-10 Thread Tobias Fiebig via mailop
heho,
i actually occasionally get NDRs from them; One of them actually broke
parsing for my funny mail measurement setup recently, because it was
way in excess of 100kb... and i thought 640kb should be enough for
everyone^Wmail. -.-'

With best regards,
Tobias
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


[mailop] vrfcanaclu03.rfcanalyzer.net / 2001:470:1f14:fa5::2 / tunnel613353-pt.tunnel.tserv11.ams1.ipv6.he.net

2023-03-11 Thread Tobias Fiebig via mailop
Heho,

i am currently looking at a weird set of (reoccurring, but i only have
a pcap of one) log events related to an SMTP connect from rDNS
tunnel613353-pt.tunnel.tserv11.ams1.ipv6.he.net with v6 IP
2001:470:1f14:fa5::2 ehlo'ing as vrfcanaclu03.rfcanalyzer.net.

It has a funny interaction with my network, which lets it descent into
a +1.5k PPS / 50mbit+ pmtud exceeded/retransmit storm (which might not
entirely be their fault, though...). Still, i'd like to get to the
bottom of things, and if this is a benign service, i'd like to get in
touch with the people running it.

Googling tied rfcanalyzer.net to a measurement system of the Dutch tax
authorities' SOC (dropped them a mail already), but given that this is
behind HE, i'd be surprised if this was _actually_ them.

So, has anyone else seen this in mail.logs/has an idea what that host
is doing?

With best regards,
Tobias

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] vrfcanaclu03.rfcanalyzer.net / 2001:470:1f14:fa5::2 / tunnel613353-pt.tunnel.tserv11.ams1.ipv6.he.net

2023-03-12 Thread Tobias Fiebig via mailop
Heho,

yeah, the two versatel addr. also have vrfcanaclu01.rfcanalyzer.net-
vrfcanaclu03.rfcanalyzer.net as fDNS. $database yielded a mix of Dutch
gov/academia IPs and random ISP stuff under rfcanalyzer.net.

For me connections are either the same, or an IO-Error/Worst case the
packet storm.

However, i just get the v6 inbound.

Let's see what their SOC says to this. 

With best regards,
Tobias

On Sat, 2023-03-11 at 20:34 -0600, Michael Rathbun via mailop wrote:
> On Sun, 12 Mar 2023 02:54:56 +0100, Tobias Fiebig via mailop
>  wrote:
> 
> > So, has anyone else seen this in mail.logs/has an idea what that
> > host
> > is doing?
> 
> The connections here attempt STARTTLS, which fails with SSL error
> 0x80090331.
> 
> These come from 87.215.108.211 and .212, in .nl.  
> 
> This behaviour has been exhibited by a number of other hosts, mostly
> originating from OVH netblocks geolocated in .fr.
> 
> mdr

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] vrfcanaclu03.rfcanalyzer.net / 2001:470:1f14:fa5::2 / tunnel613353-pt.tunnel.tserv11.ams1.ipv6.he.net

2023-03-12 Thread Tobias Fiebig via mailop
Heho,
ok, just had the confirmation in my inbox that this is a .gov
measurement/research project. Will discuss the matter of 'probe
attribution' with them.

With best regards,
Tobias
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] vrfcanaclu03.rfcanalyzer.net / 2001:470:1f14:fa5::2 / tunnel613353-pt.tunnel.tserv11.ams1.ipv6.he.net

2023-03-12 Thread Tobias Fiebig via mailop
Heho,
and a quick follow up on the root cause:

The HE tunnel host continuously sent packet-to-big messages indicating
an MTU of 1480. The packets that triggered the message had an MTU of
1476, so my openbsd just resent those packets as before (honoring
RFC8201 by the letter, i.e., reducing the MTU to the value communicated
in the ICMP packet; in this case not changing it, triggering the next
ICMP message...):

   When a node receives a Packet Too Big message, it must reduce its
   estimate of the PMTU for the relevant path, based on the value of
   the MTU field in the message.

The root cause seems to have been a pppoe link on path which dropped
the MTU to 1472 effectively, while the tunnel was still configured at
1480. I am not yet sure whether this is a sit/gif implementation issue
at HE or a general thing.

I will try to reproduce the setup next week, also to test if this is
maybe an OpenBSD only thing; Thinking about it, being able to make a
system send ~1-3GB as long as you can make it open a tcp connection to
you sounds like a rather not so fun thing.

With best regards,
Tobias


On Sun, 2023-03-12 at 12:32 +0100, Tobias Fiebig via mailop wrote:
> Heho,
> ok, just had the confirmation in my inbox that this is a .gov
> measurement/research project. Will discuss the matter of 'probe
> attribution' with them.
> 
> With best regards,
> Tobias
> ___
> mailop mailing list
> mailop@mailop.org
> https://list.mailop.org/listinfo/mailop

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


[mailop] Tightening of delivery rules for Exchange Online

2023-03-28 Thread Tobias Fiebig via mailop
Heho,
i just had this scrolling by:
https://techcommunity.microsoft.com/t5/exchange-team-blog/throttling-and-blocking-email-from-persistently-vulnerable/ba-p/3762078

As i read that, microsoft will now first throttle, and then fully stop
delivery from on-site exchange setups if these are (extremely) outdated
and/or unpatched.

While i do get the sentiment, i am somewhat worried about the box this
mechanic opens.

Are there any other thoughts on this?

With best regards,
Tobias

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] linodeusercontent.com/googleusercontent.com, I'm so done with you

2023-04-09 Thread Tobias Fiebig via mailop
Heho,

On Sat, 2023-04-08 at 17:25 -0700, Neil Anuskiewicz via mailop wrote:
> > On Apr 7, 2023, at 9:26 PM, Jarland Donnell via mailop
> >  wrote:
> > ...
> > Blocking SMTP by default makes sense, but settling on the best way
> > to handle opening it (automated? manual review?) is a discussion
> > that is very easy to get stuck in. I don't know where they're at on
> > that discussion by now, but when I left it was something I would
> > have referred to as "on the table." That to say most of the
> > stakeholders would entertain the discussion.
> > ...
> ...
> As you said mom the current path is upward sloping expenses
> undermining your price competitiveness.  I don’t think you’d lose
> many legit customers over a hoop to jump through for 25. You might
> gain some good but previously hesitant customers.
> ... 

To add on that: Hetzner recently introduced this for their cloud, with
unblocking only being possible after the first invoice has been paid
(iirc). So, at least one big competition in the .eu market already goes
this path.

If somebody from Hetzner is on the list, it would be interesting if
they could chime in how that has been holding up so far.

With best regards,
Tobias

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] [E] Re: PSL: SOA record per subdomain required?!

2023-05-09 Thread Tobias Fiebig via mailop
On Tue, 2023-05-09 at 10:19 +0200, Stefano Bagnara via mailop wrote:
> ...
> 
> #1 host -t soa e.comune.bardolino.vr.it
> e.comune.bardolino.vr.it is an alias for app.mailvox.it.
> ...
> 
> I guess it is not the missing SOA at #2 because all of our senders
> share that step and most of them show no issues.
> So maybe the issue are the missing SOA at #4/#5, but this would be
> out of control by me or my customer (che municipality of Bardolino).
It is actually the one at #1; or rather, at bardolino.vr.it, even
though adding it at e.comune.bardolino.vr.it or comune.bardolino.vr.it
should also help.

Talking to a colleague about this; What you could do is move your
current DNS setup behind powerdns frontends with a remote backend:

https://doc.powerdns.com/authoritative/backends/remote.html
https://github.com/PowerDNS/pdns/blob/master/modules/remotebackend/example.rb

You could use that with a script to programatically inject SOA/NS/DS
for names matching a specific pattern; At the same time, you could also
use that to roll out DNSSEC. ;-)

With best regards,
Tobias

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] United Airlines / mileageplus DNS/rDNS mismatch issue

2023-05-09 Thread Tobias Fiebig via mailop
Heho,

hm, not sure. Looking at the 'email-security-scans.org' data, fcrdns is
at ~95.5% of senders. For comparison:

DKIM: ~55.2%
SPF & Valid: ~91.0%
TLS: ~96.0%
Greylisting (attempting to resend): ~97.4%
IPv4: ~97.9%
IPv6 (sending): 56.2%
IPv6 (sending+auth DNS+rec DNS): ~35.7%

So even though that sample is a bit biased, i'd say that fcrDNS is more
'lived practice' than SPF. ;-)

With best regards,
Tobias 

On Tue, 2023-05-09 at 11:40 -0700, Michael Peddemors via mailop wrote:
> Hi Laura,
> 
> I think we have to disagree here.  The PTR naming is set via
> SendGrid. 
> It doesn't NEED to be the same as the A record. This is for those
> MTA's 
> that do forward/reverse matching, which isn't always successful.
> 
> Yes, doing that for a IPv6 email address to satisfy Google, go ahead.
> 
> But nothing wrong with sending an email from a PTR with a name, that 
> doens't have the FQDN forward/reverse matched.
> 
> As long as there is a URL associated with the domain name.
> 
> eg. http://mileageplus.com (Redirect to UA site URL)
> 
> Perfect forward/reverse FQDN matching is still a little aggressive
> IMHO, 
> and especially problematic.  Some people think they need 20 PTR
> records, 
> one for each A record.. (No, that is worse)
> 
> Postfix does allow forward/reverse checking, I would NOT enable that
> for 
> the IPv4 space (yet)
> 
> On 2023-05-09 10:22, Laura Atkins via mailop wrote:
> > That’s a Sendgrid IP, they likely told UA to put in a DNS record,
> > but UA 
> > never did. ¯\_(ツ)_/¯ n
> > 
> > > On 9 May 2023, at 18:01, Stephen Frost via mailop
> > >  
> > > wrote:
> > > 
> > > Greetings,
> > > 
> > > I'm getting some inbound email attempts that I believe are
> > > legitimate
> > > from United Airlines that are being rejected due to:
> > > 
> > > May  9 12:55:38 tamriel postfix/smtpd[1221960]: warning: hostname
> > > o1.email.smallbusiness.mileageplus.com does not resolve to
> > > address 
> > > 50.31.61.242
> > > 
> > > Tracking this back, near as I can tell, postfix is correct here
> > > in that
> > > 50.31.61.242 / 242.61.31.50.in-addr.arpa resolves to
> > > o1.email.smallbusiness.mileageplus.com but
> > > o1.email.smallbusiness.mileageplus.com doesn't seem to actually
> > > exist:
> > > 
> > > dig o1.email.smallbusiness.mileageplus.com a
> > > 
> > > ;o1.email.smallbusiness.mileageplus.com.IN A
> > > 
> > > ;; AUTHORITY SECTION:
> > > smallbusiness.mileageplus.com. 600 INSOA 
> > > vndcdf-fs-gma3-vip.ual.com. ualipconfig.united.com. 40 10800
> > > 3600 
> > > 2592000 600
> > > 
> > > Hopefully someone on here is from UA or knows how to get in touch
> > > with
> > > someone there who could like into fixing that.
> > > 
> > > Thanks,
> > > 
> > > Stephen
> > > ___
> > > mailop mailing list
> > > mailop@mailop.org
> > > https://list.mailop.org/listinfo/mailop
> > 
> > -- 
> > The Delivery Experts
> > 
> > Laura Atkins
> > Word to the Wise
> > la...@wordtothewise.com
> > 
> > Email Delivery Blog: http://wordtothewise.com/blog
> > 
> > 
> > 
> > 
> > 
> > 
> > 
> > ___
> > mailop mailing list
> > mailop@mailop.org
> > https://list.mailop.org/listinfo/mailop
> 
> 

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] [E] Re: PSL: SOA record per subdomain required?!

2023-05-09 Thread Tobias Fiebig via mailop
Heho,
On Tue, 2023-05-09 at 20:20 -0400, John Levine wrote:
> ...
> There are millions of domains on the Internet and only a few thousand
> in the PSL, so this is not a problem that most people need to worry
> about.

I am actually rather certain that 'not most people' approximately
evaluates to two, with both of them being on this mailing list. ;-)

That being said; Of course, just doing things correctly is (obviously)
the right solution; The 'solution' I outlined is for the specific
context of 'legacy system in place that does not do zone-breaks, how do
we get this fixed while we figure out how to properly fix our tree
because whatever set of scripts currently manages our zone(s) grew
sentient roughly two decades before ChatGPT and is really skeptical of
change'. ;-)

With best regards,
Tobias
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] verifier.port25.com

2023-05-23 Thread Tobias Fiebig via mailop
Heho,

On Tue, 2023-05-23 at 13:31 -0500, Blake Hudson via mailop wrote:
> Looks like the email verification application at verifier.port25.com 
> described in this 
> (
> https://postmarkapp.com/blog/port25s-authentication-and-spam-assassin-
> tool) 
> article may have been shut down.
> 
> Anyone have any insight into this or alternative tools for testing
> DKIM, 
> SPF, and similar in one go?

Lemme throw email-security-scans.org into the list of tools for this.
;-)

And for receiving mail, the tests over at internet.nl.

With best regards,
Tobias
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] freenet.de routing issues anyone? (Cloudflare-OVH issue?)

2024-03-08 Thread Tobias Fiebig via mailop
Moin,

to get a bit back to the networking part of things...

Poking a few people, this looks like a return path issue on Freenet's
side; So they likely fnorded something on their side.

Guess the only way to get this fixed is for them to realize the issue.
;-)

So if somebody can poke netops of AS5430,...

Will try posting to denog to see if that helps.

With best regards,
Tobias
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


[mailop] Mailbox Filling w. Opt-In/Sign-Up mails

2024-03-12 Thread Tobias Fiebig via mailop
Moin,

over the past 2-3 weeks, I saw a slightly more filled queue for email-
security-scans.org; A lot of users seemed to start tests, but never
received the corresponding test mails; In most cases, the ESP hat
shutdown delivery to these inboxes due to a sudden high volume of
inbound messages, with most addresses hosted being under @gmail.com
(and some outlook.com/yahoo.com as well).

A bit of digging found several end-user reports of the following MO:

- Get phished
- Something expensive is bought
- Mailbox is overflown right when the notification of the transaction
comes, likely in a bid to hide the illicit purchase

Naturally, there now have been some 'adjustments' to the service to
make sure it no longer contributes to that... and maybe finds some
insight into what is happening there... *loglog*

However, I'd be interested in hearing whether I had just missed some
very common spam reason here; So:

- Did somebody else stumble over this in the past and/or did i simply
miss this being a thing?
- How is this handled for, e.g., all the other tools that allow
generating "a lot" of mail only needing a request (signups in general,
ticket systems, [...])? I never saw something like this (on my own or
others systems), even when dealing with services equally easy to
motivate into mailsending.

With best regards,
Tobias

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Mailbox Filling w. Opt-In/Sign-Up mails

2024-03-13 Thread Tobias Fiebig via mailop

Moin,

> How do you prevent that abusers will enter many mail addresses and
> you send out many test mails to people who never requested them?

Now? Block-List skipping mail-sending for the most common providers and
limiting in-flight tests for other domains.

But with a sufficiently large botnet and enough different targets, you
can still make the system send out quiet some mails. Still, I believe
it should be more restrictive in that than the mailop@ ML signup form;
Furthermore, even before some tighter limits i hardly saw more than one
mail being send to one remote address.

Which is part of the reason for this mail; Are there any best practices
beyond what i did above for preventing this form of abuse (apart from
'wanna do "Captcha & Cloudflare" tonight' ? I mean, from the top of my
head i can think of a ton of services that will more conveniently send
more mails than mine; Not to speak of all the stuff you can do with
recipient delimiters to make services send more mails to the same
mailbox.

With best regards,
Tobias

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Mailbox Filling w. Opt-In/Sign-Up mails

2024-03-13 Thread Tobias Fiebig via mailop
On Tue, 2024-03-12 at 15:46 -0700, Michael Peddemors via mailop wrote:
> Tobias,
> 
> This does sound like a typical 'mail bomb', and there are even
> services you can rent to mail bomb an enemy..
> 
> Used to only see it in the gamer community, kid stuff.. but it is
> more rare than you think.. sometimes it can go on for several days..

More rare? You mean frequent; What kind of took me by surprise is the
MO described in several reddit/etc. posts, which hints at mailbombing
being used to hide other activity.


> Lot's of single sign on mailing lists, and poorly written contact
> forms are abused in a script kiddie style run..
Thing is: A single, badly implemented, contact form is kind of nice;
Big volume, many to the same mbox. Mail quickly dropped for that
sender, person complains online about bad delivery, all good.

However, the volume i saw with my previous rate-limits was around ~10
mails/day getting through. Even now, logging all rate limited requests,
what i see is around four mails an hour for the whole service (or would
be without any limits applied; those mails now just end up never being
send).

Thing is, it is incredebly hard to limit below the previous rate of
limiting, but there is still an abundance of services on the Internet
that can be motivated to send mails like that.

> Have to look at examples to be sure.. (feel free to share off list)..
What do you mean with examples? I just see target mail addresses
(which, incidentally, google finds listed with credentials in some 280-
page mail:password dump pdf on scribd.com). Btw, if anyone at google is
interested in getting those streamed, so they can take more effective
action to protect mailboxes, let me know; This is also why i was
wondering whether there is honeypotting going on for this.

> Like I said, a lot more rare than you think, but a pain when it
> happens.
So, from the current logs of 2-4 mails/day, I'd say it happens to at
least 40-80 people a day. ;-)

> 
> On 2024-03-12 11:19, Tobias Fiebig via mailop wrote:
> > Moin,
> > 
> > over the past 2-3 weeks, I saw a slightly more filled queue for
> > email-
> > security-scans.org; A lot of users seemed to start tests, but never
> > received the corresponding test mails; In most cases, the ESP hat
> > shutdown delivery to these inboxes due to a sudden high volume of
> > inbound messages, with most addresses hosted being under @gmail.com
> > (and some outlook.com/yahoo.com as well).
> > 
> > A bit of digging found several end-user reports of the following
> > MO:
> > 
> > - Get phished
> > - Something expensive is bought
> > - Mailbox is overflown right when the notification of the
> > transaction
> > comes, likely in a bid to hide the illicit purchase
> > 
> > Naturally, there now have been some 'adjustments' to the service to
> > make sure it no longer contributes to that... and maybe finds some
> > insight into what is happening there... *loglog*
> > 
> > However, I'd be interested in hearing whether I had just missed
> > some
> > very common spam reason here; So:
> > 
> > - Did somebody else stumble over this in the past and/or did i
> > simply
> > miss this being a thing?
> > - How is this handled for, e.g., all the other tools that allow
> > generating "a lot" of mail only needing a request (signups in
> > general,
> > ticket systems, [...])? I never saw something like this (on my own
> > or
> > others systems), even when dealing with services equally easy to
> > motivate into mailsending.
> > 
> > With best regards,
> > Tobias
> > 
> > ___
> > mailop mailing list
> > mailop@mailop.org
> > https://list.mailop.org/listinfo/mailop
> 
> 

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Mailbox Filling w. Opt-In/Sign-Up mails

2024-03-13 Thread Tobias Fiebig via mailop

Moin,

> Create a random generated mail address that the person needs to send
> an email to. Verify SPF/DKIM/DMARC strictly, so forging is much
> harder and reject it with a proper message, maybe with a link that
> explains the result.
Yeah. I thought about that. _Technically_ the whole thing can also be
done by just presenting links for users to click on on the web page.
However, that reduces the usability of the service a lot, as some
clients do funny things for mailto: with a lot of Cc:, and users
apparently struggled a bit with it as well. Being able to hit 'reply
all' seems to be a bit easier, in general. :-/

Concerning the strict verification mail-in before: I thought about
that; But given that this is a service to test whether you configured
spf/dkim/dmarc correctly... making that being correctly configured a
prerequisite would be kind of... difficult. ;)

> Use a captcha to make it harder for non-humans.
Actually, looking at the access logs for those requests, i am not 100%
convinced that this is automated and not some shady 'clickworking'.

> That should massively reduce the amount of unsolicited mail.
Yeah; Luckily 'disable mail sending for gmail/MS/Yahoo' already is
surprisingly effective at that (getting close to 0 mails getting
through; Even though it seems it needs a bit more fine-tuning.)

With best regards,
Tobias

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


[mailop] Debugging fwd issue meta.com to zoho.com (Help from user under meta.com needed)

2024-06-03 Thread Tobias Fiebig via mailop
Moin,

tl;dr: Could someone do https://email-security-scans.org from meta.com,
storing mails on the server and sharing the link with me to help me
debug a deliverability issue?

I just got a report in that a user's mail bounced when writing from
'@meta.com' to an alias on a domain I operate, which forwards to a
third party hosting on zoho.com.

The NDR is for a DMARC reject; In my logs, I see that:
- ARC verification already failed on inbound with a bh mismatch
- DKIM seems to have passed, though, at least according to the logs
(with a selector hinting at it being for Q4 2021)

zoho.com then rejects with "550 5.7.1 Email rejected per DMARC policy"

Given that SPF obviously fails, the question is why DMARC does no
longer validate when hitting zoho.com; I currently suspect that there
was either a tmp-error for the lookup of the DKIM key, or that
meta/outlook.com signs some headers that may be affected during a
normal forward. Also, there are no issues with other DKIM signing
p=reject domains being forwarded via the setup.

To help me debug this; Is there anyone from meta / with an account
under meta.com on the list who could do a test on
https://email-security-scans.org (ideally checking the 'store my mails'
checkbox)?

(Already asked into the direction of the user as well, but this is a
multi-hop conversation through a user of mine; And it somewhat bugs me
and i'd like to resolve this asap. ;-))

With best regards,
Tobias

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Debugging fwd issue meta.com to zoho.com (Help from user under meta.com needed)

2024-06-03 Thread Tobias Fiebig via mailop
Moin,
got it, thx.

With best regards,
Tobias

On Mon, 2024-06-03 at 21:36 +0200, Tobias Fiebig via mailop wrote:
> Moin,
> 
> tl;dr: Could someone do https://email-security-scans.org from
> meta.com,
> storing mails on the server and sharing the link with me to help me
> debug a deliverability issue?
> 
> I just got a report in that a user's mail bounced when writing from
> '@meta.com' to an alias on a domain I operate, which forwards to a
> third party hosting on zoho.com.
> 
> The NDR is for a DMARC reject; In my logs, I see that:
> - ARC verification already failed on inbound with a bh mismatch
> - DKIM seems to have passed, though, at least according to the logs
> (with a selector hinting at it being for Q4 2021)
> 
> zoho.com then rejects with "550 5.7.1 Email rejected per DMARC
> policy"
> 
> Given that SPF obviously fails, the question is why DMARC does no
> longer validate when hitting zoho.com; I currently suspect that there
> was either a tmp-error for the lookup of the DKIM key, or that
> meta/outlook.com signs some headers that may be affected during a
> normal forward. Also, there are no issues with other DKIM signing
> p=reject domains being forwarded via the setup.
> 
> To help me debug this; Is there anyone from meta / with an account
> under meta.com on the list who could do a test on
> https://email-security-scans.org (ideally checking the 'store my
> mails'
> checkbox)?
> 
> (Already asked into the direction of the user as well, but this is a
> multi-hop conversation through a user of mine; And it somewhat bugs
> me
> and i'd like to resolve this asap. ;-))
> 
> With best regards,
> Tobias
> 

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


[mailop] Contact to zoho.com

2024-06-03 Thread Tobias Fiebig via mailop
Moin,
is somebody from zoho.com here and could contact me off list?

With best regards,
Tobias
-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Debugging fwd issue meta.com to zoho.com (Help from user under meta.com needed)

2024-06-04 Thread Tobias Fiebig via mailop
Moin,

to share some closure on this with the rest of the list; What was
ultimately the issue was an RFC8616 based DKIM-Signature header, i.e.,
containing UTF-8 encoded fields (in this case, even though there were
no non-ascii characters in them). While rspamd on my machine did not
have an issue, forwarding recipients were unable to parse this.

Incidentally, it seems like dkimpy also is unable to parse such
headers, even though the email modules decodes them just fine.

I added support to test for this to email-security-scans.org, i.e., if
your DKIM header contains UTF8 encoded fields, it now shows a warning.

With best regards,
Tobias

On Mon, 2024-06-03 at 23:11 +0200, Tobias Fiebig via mailop wrote:
> Moin,
> got it, thx.
> 
> With best regards,
> Tobias
> 
> On Mon, 2024-06-03 at 21:36 +0200, Tobias Fiebig via mailop wrote:
> > Moin,
> > 
> > tl;dr: Could someone do https://email-security-scans.org from
> > meta.com,
> > storing mails on the server and sharing the link with me to help me
> > debug a deliverability issue?
> > 
> > I just got a report in that a user's mail bounced when writing from
> > '@meta.com' to an alias on a domain I operate, which forwards to a
> > third party hosting on zoho.com.
> > 
> > The NDR is for a DMARC reject; In my logs, I see that:
> > - ARC verification already failed on inbound with a bh mismatch
> > - DKIM seems to have passed, though, at least according to the logs
> > (with a selector hinting at it being for Q4 2021)
> > 
> > zoho.com then rejects with "550 5.7.1 Email rejected per DMARC
> > policy"
> > 
> > Given that SPF obviously fails, the question is why DMARC does no
> > longer validate when hitting zoho.com; I currently suspect that
> > there
> > was either a tmp-error for the lookup of the DKIM key, or that
> > meta/outlook.com signs some headers that may be affected during a
> > normal forward. Also, there are no issues with other DKIM signing
> > p=reject domains being forwarded via the setup.
> > 
> > To help me debug this; Is there anyone from meta / with an account
> > under meta.com on the list who could do a test on
> > https://email-security-scans.org (ideally checking the 'store my
> > mails'
> > checkbox)?
> > 
> > (Already asked into the direction of the user as well, but this is
> > a
> > multi-hop conversation through a user of mine; And it somewhat bugs
> > me
> > and i'd like to resolve this asap. ;-))
> > 
> > With best regards,
> > Tobias
> > 
> 

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Debugging fwd issue meta.com to zoho.com (Help from user under meta.com needed)

2024-06-05 Thread Tobias Fiebig via mailop

Hello John,

> If you're not sending SMTPUTF8 mail, the DKIM signature headers
> should be ASCII with no encoding needed. But if you are ending
> SMTPUTF8 mail, you can put UTF-8 directly in the header and it
> doesn't need any futher encoding either.

Yeah, even more odd, the actual data did not contain any UTF-8 anyway.
Meta now also fixed this.

> Can you give an example of the signature headers that caused a
> problem? They just sound wrong.

See attached. dkimpy/dkimverify failed on the original mail with:

dkim.MessageFormatError: b'=?UTF-8?Q?v=3D1'

However, when fixing the header manually, the mail correctly validates:
% cat ascii.mbox|dkimverify 
signature ok

rspamc is also able to verify the original mail:

# cat 36751.mbox| rspamc
Results for file: stdin (2.36 seconds)
[Metric: default]
Action: no action
Spam: false
Score: 1.10 / 15.00
...
Symbol: DKIM_TRACE (0.00)[meta.com:+]
Symbol: R_DKIM_ALLOW (-0.20)[meta.com:s=s2048-2021-q4]
...

My understanding, though, is that encoding _should_ be permissible
here, as it would be needed, e.g., when receiving a message from a
server with SMTPUTF8 which then must be forwarded via a server that
does not support it.

Would be nice to know, though, as that influences how I should score
such headers being there (error vs. warning) for the test-website.

With best regards,
Tobias

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

--- ascii.mbox	2024-06-04 18:52:56.213538681 +0200
+++ 36751.mbox	2024-06-03 23:44:21.342406024 +0200
@@ -13,7 +13,16 @@
 Received: from pps.filterd (m0044010.ppops.net [127.0.0.1])
 	by mx0a-00082601.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 453LCtYI010400;
 	Mon, 3 Jun 2024 14:24:06 -0700
-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=meta.com; h=content-type:date:from:in-reply-to:message-id:mime-version:references:subject:to; s=s2048-2021-q4; bh=+u8G0t/3N3vkyvfnVsE3LmLsnsfDjQZbrcpl03e4/lw=; b=b/+Or8DXaJuDThOsxHzXoSEPgs595iO+fF50NpcmYH0/FyZ7YbDAASqsssKGp3A2P0+H P9Ed7gY8QrH4kb5PydaPnO7aHOd/ggqaDszuxXqzTpwN6WYNpEsjG0Rci4J+CaMClpR4 MmDT9lkvErV1LzKBr2CeVOmjlcoY9DDXV58W7LF8ChcBolXb5jphrn/kjsT3wUNAADjC qXuiaK8XjckdThchqrAhaaqmjTrym8iFMcwmYcnxtlxdMc0vDAcj1L9OwaTJF2orIBEu gqyoY4Kp5wmXZMEMKbb4n8AphX4fbWJBSENovqYfaBAzFJZUghkfrlW+4pN7qYxf7i6d 5w==
+DKIM-Signature: =?UTF-8?Q?v=3D1;_a=3Drsa-sha256;_c=3Drelaxed/relaxed;_d=3Dmeta.com;_h=3Dc?=
+ =?UTF-8?Q?ontent-type:date:from:in-reply-to:message-id:mime-version:refer?=
+ =?UTF-8?Q?ences:subject:to;_s=3Ds2048-2021-q4;_bh=3D+u8G0t/3N3vkyvfnVsE3L?=
+ =?UTF-8?Q?mLsnsfDjQZbrcpl03e4/lw=3D;_b=3Db/+Or8DXaJuDThOsxHzXoSEPgs595iO+?=
+ =?UTF-8?Q?fF50NpcmYH0/FyZ7YbDAASqsssKGp3A2P0+H_P9Ed7gY8QrH4kb5PydaPnO7aHO?=
+ =?UTF-8?Q?d/ggqaDszuxXqzTpwN6WYNpEsjG0Rci4J+CaMClpR4_MmDT9lkvErV1LzKBr2Ce?=
+ =?UTF-8?Q?VOmjlcoY9DDXV58W7LF8ChcBolXb5jphrn/kjsT3wUNAADjC_qXuiaK8XjckdTh?=
+ =?UTF-8?Q?chqrAhaaqmjTrym8iFMcwmYcnxtlxdMc0vDAcj1L9OwaTJF2orIBEu_gqyoY4Kp?=
+ =?UTF-8?Q?5wmXZMEMKbb4n8AphX4fbWJBSENovqYfaBAzFJZUghkfrlW+4pN7qYxf7i6d_5w?=
+ =?UTF-8?Q?=3D=3D_?=
 Received: from nam12-dm6-obe.outbound.protection.outlook.com (mail-dm6nam12lp2169.outbound.protection.outlook.com [104.47.59.169])
 	by mx0a-00082601.pphosted.com (PPS) with ESMTPS id 3yhg8jtq5u-1
 	(version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT);
DKIM-Signature: 
=?UTF-8?Q?v=3D1;_a=3Drsa-sha256;_c=3Drelaxed/relaxed;_d=3Dmeta.com;_h=3Dc?=
 =?UTF-8?Q?ontent-type:date:from:in-reply-to:message-id:mime-version:refer?=
 =?UTF-8?Q?ences:subject:to;_s=3Ds2048-2021-q4;_bh=3D+u8G0t/3N3vkyvfnVsE3L?=
 =?UTF-8?Q?mLsnsfDjQZbrcpl03e4/lw=3D;_b=3Db/+Or8DXaJuDThOsxHzXoSEPgs595iO+?=
 =?UTF-8?Q?fF50NpcmYH0/FyZ7YbDAASqsssKGp3A2P0+H_P9Ed7gY8QrH4kb5PydaPnO7aHO?=
 =?UTF-8?Q?d/ggqaDszuxXqzTpwN6WYNpEsjG0Rci4J+CaMClpR4_MmDT9lkvErV1LzKBr2Ce?=
 =?UTF-8?Q?VOmjlcoY9DDXV58W7LF8ChcBolXb5jphrn/kjsT3wUNAADjC_qXuiaK8XjckdTh?=
 =?UTF-8?Q?chqrAhaaqmjTrym8iFMcwmYcnxtlxdMc0vDAcj1L9OwaTJF2orIBEu_gqyoY4Kp?=
 =?UTF-8?Q?5wmXZMEMKbb4n8AphX4fbWJBSENovqYfaBAzFJZUghkfrlW+4pN7qYxf7i6d_5w?=
 =?UTF-8?Q?=3D=3D_?=
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Debugging fwd issue meta.com to zoho.com (Help from user under meta.com needed)

2024-06-05 Thread Tobias Fiebig via mailop

Moin,
> I wouldn't verify that either.  It's just wrong.  You're not allowed
> to MIME encode strings in a DKIM-Signature header.*


Yeah, I misread 8616 there, then; My brain somewhat autoclicked to
"well, if there can be UTF8 you must be able to mime encode."

> * - I'm pretty sure that if you asked the author of RFC 8616, he'd
> say the same thing.

Yes, thank you. I am currently discussing with the author and he gave
valuable input on where I misread 8616. Based on his feedback, I'll
change the evaluation for such headers to 'error' instead of 'warning'
in the mailtest system.

> Unfortunately there is a lot of badly written mail processing code
> that tries to be helpful by MIME encoding headers without checking
> whether the headers allow it.

Well, that would then be rspamd and the python email parser; Question
is whether that would qualify as a bug, i.e., 'should not validate'; My
understanding would be more in a 'be liberal in what you accept and
conservative and what you send'-sense, though; I.e., even though not
technically allowed no harm in validating.


With best regards,
Tobias

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Debugging fwd issue meta.com to zoho.com (Help from user under meta.com needed)

2024-06-05 Thread Tobias Fiebig via mailop
Moin,
> In this case, if DKIM validators correctly rejected the invalid
> signatures, this mistake would have been caught and fixed more
> quickly.
So, back to the initial question: Would it make sense if i'd file a bug
against rspamd?

With best regards,
Tobias

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Debugging fwd issue meta.com to zoho.com (Help from user under meta.com needed)

2024-06-06 Thread Tobias Fiebig via mailop

Moin,

On Thu, 2024-06-06 at 12:44 +1000, Viktor Dukhovni via mailop wrote:
> The distinction is essential, because it would be a terrible mistake
> to, for example, RFC2047-encode the "mailbox" construct in "From",
> "To", ... headers.  An RFC2047-ignorant MUA or MTA can still
> correctly decode the addresses in those headers without caring about
> the display name encoding.

Kind of a point; However, if I got John correctly, an SMTPUTF8 mail
having to go through a system that does not support it should simply
bounce?

On Wed, 2024-06-05 at 11:00 +0200, John R Levine via mailop wrote:
> Nope.  You cannot downgrade a SMTUTF8 message to an ASCII message. 
> The experimental versions of EAI tried to do that and it never worked
> so they took it out of the standards track EAI RFCs.

To be fair... if my students working on 'normal' security stuff
complain about things being to confusing, inconsistent, and complex...
I threaten them with the proposition that they could _also_ be working
on DNS. If those working on DNS complain, I suggest they could also do
BGP instead.

Now, if the ones working on BGP complain, I threaten them with the
prospect of working on mail.

And if the ones working on mail complain... I usually just say "I'm
sorry; At least look at the bright side: It can't get worse." ;-)

(This is a joke.)

On Thu, 2024-06-06 at 12:44 +1000, Viktor Dukhovni via mailop wrote:
> It seems to me, that you may not have thought through the issues
> deeply enough.

I would, indeed, argue that this issue has a few more facets that need
to be discussed; With some of those potentially being somewhat
supportive of Vsevolod's point.

On Thu, 2024-06-06 at 12:44 +1000, Viktor Dukhovni via mailop wrote:
> On Wed, 2024-06-05 at 17:29 +0100, Vsevolod Stakhov via mailop wrote:
> > As Rspamd author, I will not change the existing logic, as it works
> > with headers as with black boxes making the following steps: unfold
> > -> rfc2047 decode -> process specific data.
> 
> This, IMNSHO, is not a reasonable stance to take...

I am not so sure, at least IMSSANSMBLAHSIDTO (in my somewhat-stupid-
and-not-so-my-but-looking-at-how-some-implementations-do-this opinion)
the sketched approach is also how, e.g., Python handles RFC2047
headers. In fact, it was somewhat messy to convince python to rewrite
an RFC2047-ized DKIM header to not mime encoded text, as the email
module would read the header correctly, print it in ASCII/UTF8, but
writes it back mime encoded (this is for email-security-scans.org; So a
specific case sometimes requiring doing weird things not advisable
anywhere else, i.e., here the rewriting.).

On Thu, 2024-06-06 at 12:44 +1000, Viktor Dukhovni via mailop wrote:
> Such willful disregard of essential interoperability requirements...

To be fair, rspamd was the _more_ interoperable mail handling software
in this case.

> I've heard "rspamd" otherwise has some appealing features, but this
> is show-stopper. :-(

It does. Especially when it comes to DKIM (ed25519 support, not
injecting funny whitespaces breaking signatures), ARC (well, it _does_
ARC, contrary to many other implementations), DMARC reporting (which
also tends to be more slim in other implementations) etcetc. And,
contrary to many other milters, it is really scalable. So, personally,
big fan of rspamd.

So, the stance, which I would abbreviate as 'in case of doubt, I do
anything to get an email reliably processed and delivered' is not only
Vsevolod's; In fact, Gmail--for example--also tends to be 'a bit more
lenient' to get an (outbound) email delivered. Including, up until
recently, 'ignore DNSSEC being broken' (even though that _does_ seem to
have changed, at least when testing this morning; Or it is attached to
a timer for a domain, i.e., if a domain has been seen with working
DNSSEC for $time, it starts to get enforced; Anyway, tangential.).

My point here is, that 'deliverability' is often more of a priority for
ESPs than 'following all documents to the letter'. Granted, for the
bigger ones, usually more like 'outbound deliverability' than 'inbound
deliverability', though.

Hence, I am not completely sure if the stance is outright unreasonable,
even if it disagrees with the documents. After all, the 'drift' between
documents and 'what is being done on the wire' has been getting larger
for some time already. And if I have the choice between 'no commits for
six years' (OpenDKIM; Good candidate for next xz, imho, btw.),
'something involving python' (dkimpy), and rspamd, I am somewhat
inclined to use rspamd, i.e., there is not that many alternatives to
recommend, when recommending people not to use rspamd.

(The last comment is observational concerning that drift, and not a
suggestion to outright change the documents, a call for rspamd to
change, or a statement in support for either direction; I am marveling
the problem, suggesting that this drift might need some discussion
(again), and ultimately, some form of approach to fix it.)

With best regard

Re: [mailop] Debugging fwd issue meta.com to zoho.com (Help from user under meta.com needed)

2024-06-06 Thread Tobias Fiebig via mailop
Moin,

On Thu, 2024-06-06 at 17:53 +1000, Viktor Dukhovni via mailop wrote:
> It is also, IIRC, a DKIM *signer* and verifier.  DKIM signing and
> verification needs to interoperate.
> ...
> To a degree, but not to the point of accepting total garbage
> (RFC2047-encoded DKIM-Signature headers), or especially, generating
> total garbage (producing RFC2047-encoded DKIM-Signature headers).

Just to clarify here: rspamd creates correct DKIM signatures when
working as a signer; The broken DKIM sig was somebody else's
accomplishment. rspamd ingested it and was ably to verify it.

With best regards,
Tobias

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Debugging fwd issue meta.com to zoho.com (Help from user under meta.com needed)

2024-06-08 Thread Tobias Fiebig via mailop
On Sat, 2024-06-08 at 12:36 +0200, Alessandro Vesely via mailop wrote:
> ... (unless bugs in email-security-scans are just decorative.)

Which ones exactly?

With best regards,
Tobias

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] heads-up: Exchange Online: validation issues with Let's Encrypt DANE

2024-06-10 Thread Tobias Fiebig via mailop
Moin,
are you sure the RRset is not inadvertently bogus? Can slip by rather
easily for a set of reasons; Old RRSIGs vor example after one of the
entries got updated?

If not; Out of personal curiosity; can you test where 'the boundary' is
to trigger the error? should be doable with like 4 test domains max
(bin-search starting at 7 RR in the set).

With best regards,
Tobias

On Mon, 2024-06-10 at 12:36 +0200, Kirill Miazine via mailop wrote:
> Apparently exchange online would provide an error to the user like
> this:
> 
> dnssec-invalid: Destination domain returned invalid DNSSEC records
> 
> https://learn.microsoft.com/en-us/exchange/troubleshoot/email-delivery/ndr/non-delivery-reports-in-exchange-online
>  
> explains what this really means:
> 
> The destination domain indicated it was DNSSEC-authentic, but
> Exchange 
> Online wasn't able to verify it as DNSSEC-authentic.
> 
> So the guess is that Exchange Online is getting in trouble when there
> are more than a few TLSA records...
> 
> • Kirill Miazine via mailop [2024-06-10 12:06]:
> > Although there are better alternatives to 2 1 1 with Let's Encrypt,
> > some 
> > still use 2 1 1, and it seems Exchange Online is not happy when
> > there 
> > are 14 TLSA records (why 14? because 
> > https://letsencrypt.org/certificates/)... A good reason to not use
> > 2 1 
> > 1
> > 
> >   ; TLSA - LE certs published at
> > https://letsencrypt.org/certificates/
> > -_le-tlsa   TLSA    2 1 1 
> > 276fe8a8c4ec7611565bf9fce6dcace9be320c1b5bea27596b2204071ed04f10 ;
> > LE E1
> > -   TLSA    2 1 1 
> > bd936e72b212ef6f773102c6b77d38f94297322efc25396bc3279422e0c89270 ;
> > LE E2
> > -   TLSA    2 1 1 
> > 8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d ;
> > LE R3
> > -   TLSA    2 1 1 
> > e5545e211347241891c554a03934cde9b749664a59d26d615fe58f77990f2d03 ;
> > LE R4
> > +_le-tlsa   TLSA    2 1 1 
> > 3586d4ecf070578cbd27aedce20b964e48bc149faeb9dad72f46b857869172b8 ;
> > LE
> > +   TLSA    2 1 1 
> > d016e1fe311948aca64f2de44ce86c9a51ca041df6103bb52a88eb3f761f57d7
> > +   TLSA    2 1 1 
> > 2bbad93ab5c79279ec121507f272cbe0c6647a3aae52e22f388afab426b4adba
> > +   TLSA    2 1 1 
> > 6ddac18698f7f1f7e1c69b9bce420d974ac6f94ca8b2c761701623f99c767dc7
> > +   TLSA    2 1 1 
> > cbbc559b44d524d6a132bdac672744da3407f12aae5d5f722c5f6c7913871c75
> > +   TLSA    2 1 1 
> > 885bf0572252c6741dc9a52f5044487fef2a93b811cdedfad7624cc283b7cdd5
> > +   TLSA    2 1 1 
> > f1440a9b76e1e41e53a4cb461329bf6337b419726be513e42e19f1c691c5d4b2
> > +   TLSA    2 1 1 
> > 919c0df7a787b597ed056ace654b1de9c0387acf349f73734a4fd7b58cf612a4
> > +   TLSA    2 1 1 
> > 025490860b498ab73c6a12f27a49ad5fe230fafe3ac8f6112c9b7d0aad46941d
> > +   TLSA    2 1 1 
> > f1647a5ee3efac54c892e930584fe47979b7acd1c76c1271bca1c5076d869888
> > +   TLSA    2 1 1 
> > 8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
> > +   TLSA    2 1 1 
> > 276fe8a8c4ec7611565bf9fce6dcace9be320c1b5bea27596b2204071ed04f10
> > +   TLSA    2 1 1 
> > e5545e211347241891c554a03934cde9b749664a59d26d615fe58f77990f2d03
> > +   TLSA    2 1 1 
> > bd936e72b212ef6f773102c6b77d38f94297322efc25396bc3279422e0c89270
> > ___
> > mailop mailing list
> > mailop@mailop.org
> > https://list.mailop.org/listinfo/mailop
> ___
> mailop mailing list
> mailop@mailop.org
> https://list.mailop.org/listinfo/mailop

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Debugging fwd issue meta.com to zoho.com (Help from user under meta.com needed)

2024-06-13 Thread Tobias Fiebig via mailop

Moin,

> What if spamd, while authenticating a malformed signature, notifies
> the error in DMARC report?  Would that "fix" spamd?

Would be somewhat pointless, though; From the top of my head I am not
sure whether there is a fitting field; And apart from that, I doubt
anyone would read those mails (or, rather, parse it into the DMARC
webif in use and display it in a way anyone would notice).

Also, there should be enough implementations out there that do not
verify DKIM there; So you _should_ already see the spike in non-passing
DKIM messages, incl. from your own senders.

With best regards,
Tobias

-- 
Dr.-Ing. Tobias Fiebig
T +31 616 80 98 99
M tob...@fiebig.nl

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


  1   2   >