TOC 
DKIM Working GroupD. Otis
Internet-DraftTrend Micro, NSSG
Intended status: Standards TrackSeptember 05, 2008
Expires: March 9, 2009 


DKIM Author Domain Signing Practices (ADSP) Security Issues
draft-otis-dkim-adsp-sec-issues-02

Status of this Memo

By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”

The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.

The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.

This Internet-Draft will expire on March 9, 2009.

Abstract

The proposed [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) defines DNS records that advertise the extent to which a domain employs [RFC4871] (Allman, E., Callas, J., Delany, M., Libbey, M., Fenton, J., and M. Thomas, “DomainKeys Identified Mail (DKIM) Signatures,” May 2007.) to sign [RFC2822] (Resnick, P., “Internet Message Format,” April 2001.) messages, and defines how other hosts can access these advertisements. Its laudable goal is to allow domains control over the use of the From header field. When a message is not adequately signed, advertised assertions, referenced by a domain in the From header field, assist in resolving the message's intended disposition.

However, [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) fails to discern that restricted identities imposed upon remote signing agents require additional control be afforded the domain, irrespective of the domain's advertised practices. [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) employs a flawed two-stage signature validation process that occurs in conjunction with advertised practices. The two-stage approach impairs the range of authentication assertions and related security tactics. Advertised practices not only determine whether a signature should be expected, they may constrain the "on-behalf-of" identity applied by signing agents that are not otherwise so restricted. By constraining the "on-behalf-of" identity for all signing agents, the draft neglects the predominate role of the domain as a point of trust, and incorrectly assumes the signature is limited to supporting assertions regarding the identity of the author. In addition, the only directly actionable practice is defined using a term that is likely to negatively impact the integrity of delivery status.

[I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) impairs security in other ways as well, but fortunately minor changes to the definition of a valid signature can significantly remedy the most critical security issue.

Requirements Language

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119] (Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” March 1997.).



Table of Contents

1.  Introduction
2.  Errors and Omissions
    2.1.  Factual Errors
    2.2.  Factual Omissions
3.  DKIM and SMTP's transition to IPv6
4.  Recommended Changes
    4.1.  3.2 ADSP Usage
    4.2.  2.7. Author Signature
    4.3.  Section 4.1. DNS Representation
    4.4.  3.1. ADSP Applicability
    4.5.  4.2.1. Record Syntax
5.  IANA Considerations
6.  Security Considerations
    6.1.  Considerations not managed by draft-ietf-dkim-ssp
7.  References
    7.1.  References - Normative
    7.2.  References - Informative
§  Author's Address
§  Intellectual Property and Copyright Statements




 TOC 

1.  Introduction

Both [RFC4871] (Allman, E., Callas, J., Delany, M., Libbey, M., Fenton, J., and M. Thomas, “DomainKeys Identified Mail (DKIM) Signatures,” May 2007.) and [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) would benefit from a general requirement for signatures with keys that restrict a remote signing agent's "on-behalf-of" identity, where this identity must also match against the From header field before being considered valid. This change to the definition of a valid signature would significantly remedy what is likely to become critical security issues.

[RFC4871] (Allman, E., Callas, J., Delany, M., Libbey, M., Fenton, J., and M. Thomas, “DomainKeys Identified Mail (DKIM) Signatures,” May 2007.) makes a statement that is emblematic of how the signature's role can be distorted. This statement can not be applied as a basis for message acceptance, does not acknowledge that restricted identities for remote signing agents require greater control be afforded the domain, and ignores the predominate role of the domain by assuming the DKIM signature is to make assertions regarding the identity of the author. In section 6.3 paragraph 5,

"If the message is signed on behalf of any address other than that in the From: header field, the mail system SHOULD take pains to ensure that the actual signing identity is clear to the reader."

At best, DKIM might make a weak assertion regarding the identity of the author. However, these assertions lack a wide range of supporting conventions where reliance upon an author identity would be unsafe. To sustain delivery integrity, whether the signature is valid must remain clear. The "on-behalf-of" identity may be opaque whenever the key employed by the signing agent can sign on behalf of the entire domain. Signing agents, afforded unrestricted keys, can be considered able to verify the entire message's compliance with the domain's practices. The established trust is with the signing domain, and can never be based upon a dubious identity within the From header field.

Conceptually, receiving hosts verify a DKIM signature by obtaining the corresponding public key. A valid signature confirms the message is attested to by a party in possession of the private key, and in control of a portion of the domain publishing the public key. An important missing check is needed to repair [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.). The check should be applied whenever a key restricts the "on-behalf-of" identity for remote signing agents. For the domain to control the From header field with remote signing agents, a restricted "on-behalf-of" identity must then be required to also match against the From header field before considering the signature to be valid. The From header field requirement for a restricted "on-behalf-of" identity should be consistent at every stage in the process.

Ideally, [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) should only introduce practices that ensure the From header field domains are within their signing domain, and ensure the signing domain is able to control the From header field for remote signing agents in all cases. Keys that restrict the "on-behalf-of" identity being signed are likely to be employed by mobile users having limited access to the domain's outbound signing servers.

When a key restricts identities, the signature is then required to include a matching "on-behalf-of" identity. Currently, there is no general requirement that the restricted identity also match against the From header field. Since these keys are prone to theft and are easily abused, no signature should be considered valid when a restricted identity does not match against the From header field.

[I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) fails to stipulate that signatures using identity restricted keys should be considered invalid when the identity does not match against the From header field. These signatures are only considered invalid when the domain is able to advertise a restrictive practice at the domain or subdomain in question. Ensuring that a restricted identity match against the From header field should not depend upon the recipient discovering and the domain being able to assert a restrictive advertised practice. Not relying upon restrictive advertised practices becomes even more necessary when restrictive advertised practices potentially harm the integrity of delivery status. When delivery integrity is important, the use of restrictive advertised practices may need to be avoided.

As providers block SMTP's public port 25 for a growing number of IP addresses, compromised systems, often containing account information, are prevalently being used by bad actors to gain access to larger domains. Blocking the combined outbound messages from larger domains often proves impractical. Ordinarily, larger domains are either unwilling or unable to affirm the identity in the From header field and, as a result, end up leaving the "on-behalf-of" identity tag and value blank. Leaving the identity tag value blank severely limits a recipient's defence from replay abuse, and as such, should be considered a bad practice. The "on-behalf-of" identity tag and value should always reflect the element that was authenticated, even when this value is opaque and dynamic.

The constraints imposed by [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) make it impractical for the "on-behalf-of" identity to always indicate what was authenticated, as intended in [RFC4871] (Allman, E., Callas, J., Delany, M., Libbey, M., Fenton, J., and M. Thomas, “DomainKeys Identified Mail (DKIM) Signatures,” May 2007.). Ironically, an ability to always indicate an authenticated identity was lost as a result of optimizing a two-stage signature validation scheme that considered signatures with a restricted "on-behalf-of" identity, that does not match against the From header field, to be initially valid. Schemes that consider signatures valid when a restricted "on-behalf-of" identity fails to match against the From header field places recipients in significant peril. Signature headers, which are seldom visible, contain the "on-behalf-of" identity. Any annotation or handling of signatures that also have a restricted "on-behalf-of" identity that does not match against the From header field as being valid, would leaves the From header field open to exploitation.

Detecting inappropriate use of an identity restricted key should occur quickly and prior to message acceptance. The fix for [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) is to preclude signatures from being considered valid which might permit an unverifiable use of a domain within the From header field by remote signing agents. This check is not prefaced upon discovering whether the domain advertises practices. In other words, in addition to restrictions on the "on-behalf-of" identity within the signature for remote signing agents, for SMTP, the From header field should also match against the key's local-part restrictions as well.

Currently, [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) advertised practices may affect messages that lack signatures, or where the From header field address is not within the signing domain, or where the "on-behalf-of" identity does not match against the From header field. The impact of an advertised practice and the resulting "on-behalf-of" identity requirement occurs irrespective of the type of signing agent and key used. This creates a security vulnerability that may encourage DNS attack, and unnecessarily limits the practical utility of the DKIM signature.

When a restricted identity fails to match against the From header field, and is considered to provide a valid signature, [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) may subsequently invalidate the signature whenever a practice advertisement by the domain is discovered. Unfortunately, the two-stage conditional valid signature requirement unnecessarily affects all signing agents. Signature validity is dependent upon the success of advertisement discovery, where this two-stage process is likely to negatively impact both delivery integrity and security. Limitations imposed on the "on-behalf-of" identity within the second stage may alter what is considered valid by [RFC4871] (Allman, E., Callas, J., Delany, M., Libbey, M., Fenton, J., and M. Thomas, “DomainKeys Identified Mail (DKIM) Signatures,” May 2007.). When the signing agent employs unrestricted keys, this change is wholly without merit.

To control remote signing agents, keys may restrict the "on-behalf-of" identity being signed. However, [RFC4871] (Allman, E., Callas, J., Delany, M., Libbey, M., Fenton, J., and M. Thomas, “DomainKeys Identified Mail (DKIM) Signatures,” May 2007.) imposes no requirement for restricted identity placement within the message. In addition, [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) incorrectly assumes reliable advertisement discovery, and fails to impose restricted identity placement for remote signing agents as well. Although remote signing agents may have keys that restrict identity signing, the domain is unable to control whether a restricted "on-behalf-of" identity is also assured to match with the From header field, except by publishing advertised practices at every existing subdomain.

Per [RFC4871] (Allman, E., Callas, J., Delany, M., Libbey, M., Fenton, J., and M. Thomas, “DomainKeys Identified Mail (DKIM) Signatures,” May 2007.), the "on-behalf-of" identity is not required to be that of a message author, and may even indicate authentication of a system or an access account. This distinction is important since predominately compromised systems, rather than individuals, are the source of abuse. Unfortunately, [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) places constraints on what may be placed within the "on-behalf-of" identity. It is unrealistic to suggest the impractical use of multiple signatures as a solution, since this doubles the overhead related to signatures and signature validation. [RFC4871] (Allman, E., Callas, J., Delany, M., Libbey, M., Fenton, J., and M. Thomas, “DomainKeys Identified Mail (DKIM) Signatures,” May 2007.) has already defined an "on-behalf-of" identity. There is no reason to reinvent the meaning of the "on-behalf-of" identity in support of a flawed, two-stage, conditional, valid signature definition.



 TOC 

2.  Errors and Omissions



 TOC 

2.1.  Factual Errors

Section 3.2 of [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) makes a factual error in stating that a valid signature by an Author Domain is already known to be compliant with any possible ADSP for that domain. Compliance with ADSP currently requires an Author Signature, not just a signature by the Author domain.

The Author Signature requires the "on-behalf-of" identity to match against the author's address. A valid signature by the Author Domain per [RFC4871] (Allman, E., Callas, J., Delany, M., Libbey, M., Fenton, J., and M. Thomas, “DomainKeys Identified Mail (DKIM) Signatures,” May 2007.) will not impose this limitation, where the [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) Author Signature requirements limit interchange without justification.

For example, office administrators might submit messages authored by their managers. The authenticated DKIM signature "on-behalf-of" identity could be that of the office administrator whose email-address was placed within the Sender header field as permitted by [RFC2822] (Resnick, P., “Internet Message Format,” April 2001.). When a signing domain's practice permits office administrators to send messages on behalf of managers, a manager's email-address could be placed within the From header field to signify the manager's role as author.

A valid signature, verified with a key that lacks identity restrictions, clearly indicates the signature was applied by a trusted signing agent. A trusted signing agent can sign on behalf of the entire domain and should ensure message conformance prior to signing. A signature by the Author domain, with a key that lacks identity restrictions, is sufficient to ensure the domain's ability to fully control the use of the From header field, and to assert any sundry list of message conformance requirements.

A valid signature applied by the Author Domain using a key that lacks identity restrictions should be considered compliant with any possible ADSP. However, the current Author Signature definition, in conjunction with the discovery of a practice, may cause a valid signature to become invalid when assessing ADSP compliance where the "on-behalf-of" identity does not match against the author's address.



 TOC 

2.2.  Factual Omissions

[I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) attempts to define practices used by a domain, but then fails to specify which public transport protocol or protocols meet the advertised practice. Misapplication of practice compliance assessments could lead to interchange problems when only a portion of the possible [RFC2822] (Resnick, P., “Internet Message Format,” April 2001.) related transports employ [RFC4871] (Allman, E., Callas, J., Delany, M., Libbey, M., Fenton, J., and M. Thomas, “DomainKeys Identified Mail (DKIM) Signatures,” May 2007.).

Omitting public transport specifics might seem reasonable, since there are many possible protocol gateways into SMTP provided by various third-parties. However, remaining silent on the relevant transport will lead to various ad-hoc methods for dealing with protocol gateways. As a result of the omission, [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) fails to warn of potential problems, such as various NNTP messages being dropped, for example.

Omitting transport specifics has lead to the general requirement in [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) Section 4.3 that any ADSP related transport will use DNS at the domain of the address. The lack of transport agility results from there not being any ADSP parameter that makes a specific public transport assertion to clarify where and what resources are available.



 TOC 

3.  DKIM and SMTP's transition to IPv6

As IPv4 addresses become less available, a demand is growing for the acceptance of IPv6 SMTP clients over port 25. IPv6 supports 340,000 decillion (340,000 x 10^33) unique addresses that operate over dual-stacks, IPv6/IPv4 gateways, and tunnels. Currently, protective services defend MTAs from abusive clients by processing logs that resolve on the order of 200 million unique IPv4 addresses every few minutes. These protective services are time sensitive while providing a dynamic shield against sporadic, and often high levels of abuse, when these sources are aggregated.

The resources consumed, and cost expended, in providing protective services is not insignificant. A desire to use IPv6 addresses with SMTP happens at a time where companies are striving to reduce their expenditures. There is some justification in cutting back on SMTP specific protections. Surveys indicate email represents a small and falling percentage of one's direct exposure to malware. The browser, rather than the MUA, offers a greater target of opportunity for bad actors.

Although DKIM has a potential for replay abuse, combining the signing domain with the "on-behalf-of" identity, can better establish a defensible basis for acceptance, as opposed to a virtually unlimited IPv6 address space that might also represent a mixture of good and bad actors. Using the DKIM domain and "on-behalf-of" identity tuple to tracking tens of millions of opaque accounts within hundreds of thousands of large domains represents a manageable dataset of about 6 billion.

This dataset represents an increase of about 30,000 times over the dataset now defending IPv4. Even with this sizable increase, DKIM still offers a simpler, more reliable, and much smaller dataset than what is likely needed to track a more complex range of IPv6 addresses that extend well beyond a human comprehensible scale.

For DKIM to provide a defensible basis for acceptance, the signing domain needs to offer valid "on-behalf-of" identities that track the elements authenticated by the signing domain. A domain, that can be trusted to offer opaque identifiers of what they authenticate, provides a safe basis for acceptance. These identifiers might represent that of an account, an IP address within a network, or a system's certificate, and not that of an email-address found within the From header field.

Most abuse is enabled by compromised accounts or systems that are seldom directly associated with a From email-address. Since ADSP is unlikely to alter what a domain authenticates, DKIM is can be far more effective against abuse wrought by compromised systems by allowing the "on-behalf-of" identity to represent an account or system as well. Unfortunately, [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) requires a bad practice where the "on-behalf-of" must be blank when it does not represent that of the From header field. The imposition of a bad practice results from the failure of [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) to differentiate between remote and trusted signing agents. [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) prevents the good practice of always indicating the element authenticated. [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) also fails to satisfy a goal of controlling the From header field when remote signing agents are used.



 TOC 

4.  Recommended Changes



 TOC 

4.1.  3.2 ADSP Usage

CHANGE:

If a message has a Valid Signature from an Author Domain, ADSP provides no benefit relative to that domain since the message is already known to be compliant with any possible ADSP for that domain.

TO:

If a message has a Valid Signature from an Author Domain, an additional consideration must be applied. When a key used to validate the signature imposes a restrictive template on the local-part of the "on-behalf-of" identity, this template and the signature's domain should also match against an address contained within the From header field, or the signature should not be considered valid.

A match is determined by the construction of a template composed of the key's "g=" tag and value, and the domain as denoted in the signature's "d=" tag and value in the form:

<g value | * >@[*.]<d value>

The default for the key's local-part template value, when it is not present, is "*", in which case no From header field comparison will be required.



 TOC 

4.2.  2.7. Author Signature

CHANGE:

An "Author Signature" is any Valid Signature where the identity of the user or agent on behalf of which the message is signed (listed in the "i=" tag or its default value from the "d=" tag) matches an Author Address in the message. When the identity of the user or agent includes a Local-part, the identities match if the Local-parts are the same string, and the domains are the same string.

TO:

An "Author Signature" is any Valid Signature per section 3.2, where an Author Address domain is within the signature's "d=" tag and value domain.



 TOC 

4.3.  Section 4.1. DNS Representation

CHANGE:

_adsp._domainkey.

TO:

_adsp. (preferably adopt a specific resource record instead).

There is no practice that asserts no email is signed, so the presence of the "_domainkey." subdomain at every existing node creates a misleading appearance of DKIM support at each node. The absence of the "_domainkey." subdomain clarifies that the domain does not support DKIM.


 TOC 

4.4.  3.1. ADSP Applicability

CHANGE:

ADSP as defined in this document is bound to DNS.

TO:

ADSP as defined in this document is bound to DNS and SMTP.



 TOC 

4.5.  4.2.1. Record Syntax

CHANGE TERMS:

Discardable and discard

TO:

Dismissable and dismiss

Even for the example cases sighted in the DKIM mailing list, arrangements are being made to offer feedback to the sender so they can determine the level of abuse. The term discardable is likely to thwart adoption when the integrity of the delivery status is also important. If the mechanism proves effective, the level of abuse should also dramatically wane.


 TOC 

5.  IANA Considerations

This document requires no IANA consideration.



 TOC 

6.  Security Considerations



 TOC 

6.1.  Considerations not managed by draft-ietf-dkim-ssp

DKIM keys with a restrictive local-part template in the g= tag and value are likely to be employed by remote signing agents beyond the direct control of the signing domain. As a result, additional consideration is required when a restrictive local-part template does not match against the From header field. Signatures should not be considered valid whenever a restrictive local-part key g= tag and value, and the signature d= tag and value, do not match against a From header field address.

Signatures by keys lacking a restrictive local-part template are only safely used when the signing agent is able to directly evaluate the signed header fields and content. Recognition of signing agents able to apply policy over the entire message improves security in several ways:

Discerns potentially deceptive signatures, independent of advertised signing practice discovery.
Permits an accurate indication of on whose behalf the signature was added, even when not on behalf of the author's address.
Permits the "on behalf of" identity to be derived from an account, instead of being left blank, when a signing domain is unable or unwilling to affirm the identity of the author's address.
Permits the identity to track either the author or the account used. In response to a growing portion of the IP address space being blocked, bot-nets increasingly send their mail through a provider's outbound server after obtaining access to valid accounts. Being able to track the element granted access by a domain is most useful to third-parties wanting to implement a safe basis for refusing problematic accounts. Blocking problematic accounts will likely isolate bot-net 0wned systems.

[I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) should state that a valid DKIM signature does not safely provide an assertion of the author's identity, and that only the domain contained within the signature will have been verified by DKIM signature validation. In addition, when the "on-behalf-of" identity signing is restricted, and does not match against the From header field, the signature should not be considered valid.



 TOC 

6.1.1.  Lack of transport specificity

[I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) fails to signal which transport protocol implements an advertised practice. As such, it also fails to indicate which DNS resource, if any, supports the transport. Although verifying a domain's existence might query resource records specified by [RFC2821] (Klensin, J., “Simple Mail Transfer Protocol,” April 2001.), the associated transport is never specified, where only returned query errors are meaningful.

Since the goal is to control use of a domain in the From header field, a DNS error will then likely require a message to be refused, because the proposed methods are unable to resolve practices over a domain hierarchy. [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) also never specifies a transport or related resource records. This means any wildcard resource record within the domain will thereby allow domain spoofing. Any domain that uses wildcards will permit any synthesized domain appear to lack advertised practice assertions.

Contrary to the MUST NOT use wildcards mandate, a solution for covering the entire domain hierarchy or for coping with wildcard resources will likely be wildcard TXT resource records containing restrictive practice assertions. The sanctioned alternative would be to publish separate resource records at each existing domain node. As if a per node alternative was not bad enough, this alternative is made even less attractive by requiring more entries and by consuming more resources than otherwise required had a specific resource record been defined for ADSP, or had just a single prefix been used.

The additional DNS overhead occurs with the use of two prefixed subdomain labels locating the TXT resource record. Instead of just the 6 byte "_adsp.", the additional "_domainkey." label introduces an additional 11 bytes and subdomain for every DNS node protected. The logic for having any label was to accommodate typical web-based commodity provider tools that often do not support new resource record types.

Justification for the second label is likely based upon a false assumption that the delegation of the "_domainkey." subdomain will also facilitate the typical needs of third-party providers that advertise practices at only the domain supporting the transport.

There are transport protocols in wide use that employ [RFC2822] (Resnick, P., “Internet Message Format,” April 2001.) messages, but that might not utilize DNS. There are also cases where a domain contained within a message is intentionally not found in DNS. Such domains may be used to deal with a different name space, or to ensure the related email address is not exploited by spammers. Without any transport or related resources being defined, [I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) fails offer a practical a means to deal with messages that might conflict with its strategy that depends upon the lack of DNS errors as a basis for acceptance.

[I‑D.ietf‑dkim‑ssp] (field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” May 2009.) should recommend that recipients be advised to use automated folder placement for trusted signing domains to reduce deceptions that utilize domain look-alike and subdomain based tactics.



 TOC 

6.1.2.  DNS Wildcards and specifying SMTP as the transport

With the exception of wildcard MX records, wildcards within a domain that also publish ADSP records should not pose a significant problem. Although referencing SMTP related records will not provide NXDOMAIN results when a domain contains a wildcard, SMTP discovery records, such as MX or A records, still offer evidence of SMTP support. Whether AAAA records, absent MX or A records, can be considered evidence of SMTP support has not withstood the widespread use of AAAA only servers.

For security reasons, SMTP should also adopt an MX resource record mandate for the acceptance of public exchanges. This would then mean advertised practice discovery could be limited to subdomains containing MX records, and ensure failure of a single transaction obtaining an MX record would curtail all other message related transactions. An MX resource record mandate would thereby shelter domains not publishing MX records from the additional assortment of transactions often associated with any number of spoofed email-addresses and DKIM signatures that might be generated per message.



 TOC 

7.  References



 TOC 

7.1. References - Normative

[I-D.ietf-dkim-ssp] field, h., Domain, A., error, r., Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” draft-ietf-dkim-ssp-10 (work in progress), May 2009 (TXT).


 TOC 

7.2. References - Informative

[RFC1034] Mockapetris, P., “Domain names - concepts and facilities,” STD 13, RFC 1034, November 1987 (TXT).
[RFC2119] Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” BCP 14, RFC 2119, March 1997 (TXT, HTML, XML).
[RFC2181] Elz, R. and R. Bush, “Clarifications to the DNS Specification,” RFC 2181, July 1997 (TXT, HTML, XML).
[RFC2606] Eastlake, D. and A. Panitz, “Reserved Top Level DNS Names,” BCP 32, RFC 2606, June 1999 (TXT).
[RFC2782] Gulbrandsen, A., Vixie, P., and L. Esibov, “A DNS RR for specifying the location of services (DNS SRV),” RFC 2782, February 2000 (TXT).
[RFC2821] Klensin, J., “Simple Mail Transfer Protocol,” RFC 2821, April 2001 (TXT).
[RFC2822] Resnick, P., “Internet Message Format,” RFC 2822, April 2001 (TXT).
[RFC4033] Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose, “DNS Security Introduction and Requirements,” RFC 4033, March 2005 (TXT).
[RFC4034] Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose, “Resource Records for the DNS Security Extensions,” RFC 4034, March 2005 (TXT).
[RFC4686] Fenton, J., “Analysis of Threats Motivating DomainKeys Identified Mail (DKIM),” RFC 4686, September 2006 (TXT).
[RFC4871] Allman, E., Callas, J., Delany, M., Libbey, M., Fenton, J., and M. Thomas, “DomainKeys Identified Mail (DKIM) Signatures,” RFC 4871, May 2007 (TXT).
[RFC5016] Thomas, M., “Requirements for a DomainKeys Identified Mail (DKIM) Signing Practices Protocol,” RFC 5016, October 2007 (TXT).
[RFC5234] Crocker, D. and P. Overell, “Augmented BNF for Syntax Specifications: ABNF,” STD 68, RFC 5234, January 2008 (TXT).


 TOC 

Author's Address

  Douglas Otis
  Trend Micro, NSSG
  10101 N. De Anza Blvd
  Cupertino, CA 95014
  USA
Phone:  +1.408.257-1500
Email:  doug_otis@trendmicro.com


 TOC 

Full Copyright Statement

Intellectual Property