ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] 5 outstanding issues with the threat review

2006-03-15 15:48:14

On Mar 15, 2006, at 12:37 PM, J.D. Falk wrote:

On 2006-03-14 20:48, Douglas Otis wrote:

1) Access in the Signing-Domain's Administrative Unit

Somebody inside your network can do bad things inside your network!

Conventions established with DKIM where third-parties can isolate accounts or internal sources for reporting and remediation, even when an account has been compromised, as many are. This represents a substantial portion of the abuse dismissed in the threat review as being beyond the purview of DKIM. It should not be.


2) Chosen Message Replay (High impact)

An edge case that we've known about since day 0 is still an edge case!

Viewed from the aspect of establishing trust or preventing a Denial of Services due to high levels of abuse, DKIM can still offer defensive strategies beyond ineffectual key revocation.


3) Increased Threats Due to Expedient Assessments (Why replay abuse has a HIGH impact)

Edge cases in SPF might reveal obscure problems with DNS!

DKIM remains prone to attack as does SPF which provides an ideal vehicle. There is no sanctuary found relying upon SPF for protection which can target 100 DNS transactions for each domain-name evaluated at each location where an evaluation occurs. There is a possible solution verifying the HELO and using forward reference PTR lists to associate the DKIM signature with the HELO. Verifying the HELO and delayed acceptance can defeat most attack scenarios. There is nothing in the threat view that provides a concept how DKIM is to be defended. It seems there should be a more holistic view of security.


4) Risks of Confusion Using Sub-domains

Users are confused by things they don't understand!

Trust can not be established using sub-domains. Not all email from a domain should be trusted, even when it is signed. The signing domain can greatly improve upon trust by marking which keys are for trustworthy sources within their domain. Yahoo.com signatures, in general, should not receive any assurances. A special case can be made when special keys are used. Admin(_at_)yahoo(_dot_)com when used with a special key could be qualified as trustworthy, for example.


5) Preventing Spoofs from Untrusted Sources (Signing roles needed)

Bad MUA design is bad!

When not all signed messages are to be considered trustworthy, sorting through the remainder will involve a user interface. The number of prompts needed to administer trust locally must be minimized or security is diminished. Signing Roles improves the MUA interface for administrating local trust.

-Doug

_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html