Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?
2005-08-18 17:04:05
On Aug 18, 2005, at 1:02 PM, Earl Hood wrote:
On August 18, 2005 at 09:57, Douglas Otis wrote:
1- Employs DKIM
2- Employs DKIM universally
3- Allows TP signing
4- Allows sub-domain TP signing
5- Disallows all TP signing
6- Never sends email
It would seem counter productive to for assertion 5 to be the default
taken as this would greatly discourage larger ISP from universally
signing all outbound mail.
Why sign messages when there will be no value in doing so?
DKIM provides significant value beyond implementing a weak and
uncertain anti-spoofing mechanism. MUAs are not designed to ensure
the identity of the author or sender. As a result, MUAs often fail
to show headers intended to indicate this information. In addition,
MUAs also often fail to show underlying email addresses in favor of
"pretty names." This makes for a poor foundation upon which to build
any anti-spoofing mechanism without major renovations.
I would even suggest without displaying the "accountable domain,"
DKIM results should not be exposed to the recipient simply out of
concerns this may provide inappropriate assurances. There is a
hierarchy MUAs may use with respect to what gets prominently
displayed. Suggestions that the From takes precedence with respect
to domain-wide assertions is based upon often false expectations this
header is being "properly" displayed, where the information checked
is also the information viewed.
There is concern among larger ISPs where any changes to what is being
displayed will require an inordinate amount of support explaining
such changes. DKIM's greatest value is limited to actions done
behind the scenes. Either the message is rejected or accepted as
perhaps the _only_ method of communication to the recipient.
If someone wishes to re-submit an email using proper and valid
headers clearly indicating the intent of their action, should a From-
domain administrator be able to prevent this action through a domain-
wide assertion? If so, this will likely cause support issues at
other's great expense. Already DKIM can inhibit the use of Sender
and Resent-* headers when done by non-DKIM clients or list servers,
even though absolutely _nothing_ dishonest is being done.
All of this havoc under the guise of an anti-spoofing mechanism? A
majority of recipients can still be spoofed, and there are less
disruptive approaches. I know I am in the minority by saying that
anti-spoofing and anti-phishing should be considered out of scope for
DKIM. I know this has been used as a major selling point for DKIM
and previously Sender-ID, but this goal is dubious and likely to fail.
There is tremendous value obtained when receiving a DKIM signed
message. Once an anti-replay mechanism is in place, the signing
domain will have control over their domain name's reputation.
Phishing can be addressed by publishing a list of compliant
institutions that agree to certain DKIM and header practices. Such a
list should be offered at no cost to the recipient. Both free and
subscription based reputation services will become more effective at
selectively eliminating abusers with less impact upon uninvolved
domain owners. Will DKIM enable safe methods facilitating the
identification of zombie systems within larger domain? I only hope so.
While the emphasis remains on spoofing and phishing (which DKIM can
not really prevent), the non-disruptive and highly beneficial value
of DKIM remains ignored. Worse. While ignoring these "other"
values, simple techniques to prevent likely abuse remain ignored as
well.
The OA is important here, and automatically signing messages without
explicit permission from the OA is not playing nice.
Should the re-submitter be allowed to add a Resent-* header? What if
they can not? Should they then send it without even acknowledging
who is doing the resubmission?
Your concerns narrowly relate only to a goal where DKIM is considered
just an anti-spoofing mechanism. Bad idea in my view. Even when
there is _no_ indications added at the MUA as a result of DKIM
processing, the naive user still benefits from a system where abuse
can be traced and handled behind the scenes. Without impacting the
current email architectures, DKIM allows substantial improvements to
the way messages are processed. The goals should place a high value
on not disrupting how users interact with email. Otherwise, any
systemic disruptions will likely lead to the dropping of the DKIM
mechanism.
Except, if DKIM signatures were not limited to OA SSP binding, then an
ISP could blindly sign messages, making the assertion, "this what I
got before I sent it out."
Signatures that naturally bind to From, and others that bind to
Resent-Sender? Would these Resent-Sender signatures stack just like
the Resent-Sender headers? Would this create added susceptibilities
with respect to DoS tactics? You want any number of domains searched
for domain-wide assertions, then any number of signatures checked to
validate the entire path of the message? Just as the last hop is
important with respect to IP address reputations, the last signature
should be what is important for name reputations. Perhaps this is a
report of abusive email. As I said, attempts to classify what is a
"spoof" versus what is a "normal" message should be out of scope for
DKIM.
For ISPs servicing multiple domains, they should only sign if the
domain owner allows it, creating a 1st-party signing relationship
versus a TP one. Note, domain owner does not necessarily equal
domain administrator.
(Note, any first-party relationship will probably need to have
a legal basis.)
IMO, from the OA perspective, enabling TP signing is bad policy from
a security perspective. OA will not care if other entities sign a
message (for traceability purposes) as long as they are not claiming
a 1st-party association.
Side Note, I think it would be useful if the OA SSP allowed for
an OA to designate a list of allowable signers.
It seems you want contracts signed before any message can be re-
submitted. Does this really scale or will this be overly
disruptive? Will email still function? You seem to think no domains
should permit re-submission. Why exactly? If all the proper headers
are added, is this really a problem? Should the system attempt to
protect the naive user when there will still be methods available
that will just as easily fool them?
For those where this would matter, then
making the assertion should be required.
You are assuming that a domain owner is aware of DKIM. When DKIM is
deployed, you cannot require all domain owners to set up SSP records
immediately.
Being able to assert universal compliance to DKIM would permit a
means to reject messages outright when presented as a first-party
message. There is also a means to block headers when the message is
not resigned. This simply leaves blocking third-party signatures. I
would argue that this should be done on an exceptional basis (as in
an industry-wide listing) and not provided as a standard DKIM
feature. Otherwise, should this be used widely, it will be too
disruptive.
Eventually, the better solution would be to expose the "accountable
domain." Pretty name or no, this would still indicate who is being
trusted when the message is being viewed.
Exactly. Are you suggesting that the default should be:
(1) Treat any signature from the OA (example.org) with suspicion, or
(2) Treat any signature on a message from the OA with suspicion ?
If it's (2), it means that domains that haven't deployed DKIM that
send through mailing lists to domains that are checking SSP would
have those messages marked as suspicious.
Here the trade-off is rather clear. The restrictions on TP
signatures is related to combating phishing exploits which affect
only a minority of domains. The majority of domains should be
willing to allow their messages to be "spoofed" (third-party
signatures) out of sheer convenience.
There is no "willing" for domains that do not know of DKIM or have
yet to adopt it. DKIM must not facilitate spoofing.
This was said to illustrate how absurd attempts to prevent spoofing
become. I want to take this even further and not even allow DKIM to
assert this restriction. Already you offer a mode that will be
highly disruptive. DKIM must not care about spoofing. DKIM should
only ensure the validity of the signing domain's signature. Leave
everything else as second semester work.
Clearly those domains under attack require additional protections.
By listing those domains and using deterministic conventions (DKIM as
example), this problem could be better abated without resorting to
binding headers with domain-wide assertions through a stack of what
is and is not allowed. In the end, expect even "no holds barred"
efforts to result in only partial success. The phishing problem is
multifaceted. Ensuring the From address is not enough. This problem
involves embedded links within HTML messages as much as it does email
addresses. Treat this problem separately and take it off the DKIM
table.
Another view would be for the mailing-list to leave all signed
messages intact. There would then be no added overhead groping for
SSPs. The mailing-list may adopt a convention where new headers
replace the technique of message modification.
The List-* headers are well-defined, but many MUAs probably do
not display them (by default).
How is this a problem? The message provides an immediate
"accountable domain" in the case where the signed message is not
altered. I would also assume the signature would permit the list's
header to be added.
What is seen by the recipient is well beyond DKIM's control. Even
binding headers does little to improve upon this. Start with small
steps. Get the "accountable domain" in place first. In time, it
will become more apparent what the next steps should be. The
"accountable domain" is more than enough for now.
-Doug
_______________________________________________
ietf-dkim mailing list
http://dkim.org
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, (continued)
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Earl Hood
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?,
Douglas Otis <=
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Earl Hood
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Earl Hood
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Scott Kitterman
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Scott Kitterman
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Scott Kitterman
- Re: [ietf-dkim] DKIM SSP: Security vulnerability when SSP record does not exist?, Douglas Otis
|
|
|