Internet DRAFT - draft-fosterd-dmarc-spf-best-practices

draft-fosterd-dmarc-spf-best-practices







DMARC                                                   D.E. Foster, Ed.
Internet-Draft                                                      Self
Intended status: Informational                               13 May 2023
Expires: 14 November 2023


                  Sender Authentication Best Practices
               draft-fosterd-dmarc-spf-best-practices-00

Abstract

   Sender Authentication contributes to the goal of detecting and
   blocking maliciously impersonated email identifiers.  Sender Policy
   Framework (SPF) (RFC 7208) validates the RFC5321.MailFrom address,
   and Domain-based Message Authentication, Reporting, and Conformance
   (DMARC) (RFC 7489) validates the RFC5322.From header address.  Both
   techniques may produce a result other than PASS on a message that the
   recipient considers acceptable and wanted.  This document describes
   best practices for integrating SPF and DMARC into an email filtering
   strategy.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 14 November 2023.

Copyright Notice

   Copyright (c) 2023 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components



Foster                  Expires 14 November 2023                [Page 1]

Internet-Draft          Sender Authentication BCP               May 2023


   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Email Filtering Reference Model . . . . . . . . . . . . . . .   3
     2.1.  Overview  . . . . . . . . . . . . . . . . . . . . . . . .   3
     2.2.  Privileged Mode Messages  . . . . . . . . . . . . . . . .   4
     2.3.  Unwanted Messages . . . . . . . . . . . . . . . . . . . .   4
     2.4.  Non-privileged Messages with Content Filtering Fail . . .   4
     2.5.  Non-privileged Messages with Sender Authentication FAIL and
           Content Filtering PASS  . . . . . . . . . . . . . . . . .   5
     2.6.  Non-privileged Messages with Sender Authentiction PASS and
           Content Filtering PASS  . . . . . . . . . . . . . . . . .   5
     2.7.  Non-privileged Messages with Sender Authentiction Unknown
           and Content Filtering PASS  . . . . . . . . . . . . . . .   5
   3.  Alternate Authentication  . . . . . . . . . . . . . . . . . .   6
   4.  DMARC Authentication Types and Confidence Levels  . . . . . .   7
   5.  Forwarding Considerations . . . . . . . . . . . . . . . . . .   8
   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  11
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .  11
   8.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  11
     8.1.  Normative References  . . . . . . . . . . . . . . . . . .  11
     8.2.  Informative References  . . . . . . . . . . . . . . . . .  12
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .  12

1.  Introduction

   Sender Authentication contributes to the goal of detecting and
   blocking maliciously impersonated email identifiers.  Sender Policy
   Framework (SPF) [RFC7208] validates the RFC5321.MailFrom address, and
   Domain-based Message Authentication, Reporting, and Conformance
   (DMARC) [RFC7489] validates the RFC5322.From header address.  For
   both techniques, a result of PASS indicates that the message is
   judged to be free of impersonation, and therefore free of malicious
   impersonation risk.  Any message that does not produce PASS can
   therefore be considered at risk of possible impersonation.  From a
   risk standpoint, the evaluator has little reason to distinguish
   between results of NOPOLICY, PERMERROR, SOFTFAIL, or FAIL.  However,
   malicious impersonation is only one of many reasons that a message
   does not produce PASS, and therefore malicious impersonation can only
   be concluded after all other possibilities have been ruled out.







Foster                  Expires 14 November 2023                [Page 2]

Internet-Draft          Sender Authentication BCP               May 2023


2.  Email Filtering Reference Model

2.1.  Overview

   A typical email filtering solution has two primary components, sender
   filtering and content filtering.  Sender filtering evaluates the
   identifiers in a message to assign a reputation to the sender of the
   message.  Upon completion of sender filtering, the message has three
   possible dispositons:

   *  Privileged: The message is from a highly trusted sender and is
      exempted from some or all content filtering checks.  Sender
      Authenticaton PASS is required for Privileged mode to be granted
      safely.  Great harm could result if a malicious impersonation is
      granted privileged mode, allowing it to bypass both sender filters
      and content filters.

   *  Normal: The message sender is not rejected, but the messages must
      pass all content filtering checks to be allowed.

   *  Unwanted: The message is blocked based on sender identity and
      reputation alone.  For purposes of this document, no distinction
      is made whether the message is blocked with notification via an
      SMTP reject result, blocked with notification via a Non-Delivery
      Report, or silentlty discarded without notification.

   A basic assumption is that unwanted and malicious email originates
   from unwanted and malicious email senders.  While content filtering
   and sender authentication will flag or block single messages that are
   suspicious, their greatest benefit accrues when they are used to
   identify malicious message sending entities, so that all messages
   from that sender can be blocked.  Consider the situation where a
   message is identified as malicious and blocked, but no follow-up
   action is taken.  When the attacker changes techniques, and a
   subsequent attack succeeds, the system administrator will appear
   negligent.  This document assumes a continuous improvement process
   with these characteristics:

   *  Content filtering or sender authentication identify a set of one
      or more suspicious messages with common characteristics.

   *  The message set is reviewed in depth to assess whether the
      messages are wanted or unwanted.

   *  If the message set is determined to be unwanted, the message
      sender is identified and a local policy is implemented to block
      messages from that sender.




Foster                  Expires 14 November 2023                [Page 3]

Internet-Draft          Sender Authentication BCP               May 2023


   *  If the message set is determined to be acceptable, but was flagged
      as suspicious by content filtering, then a local policy is
      implemented to give the message sender Privileged mode.

   *  If the message set is determined to be acceptable, but was flagged
      as suspicious because of sender authentication failure, then a
      local policy is implemented to provide alternate authentication
      for that message set.  Note that alternate authentication is
      different from exemption.  Exemption from sender authentication
      provides exemption for both intented and impersonation messages.
      Alternate authentication maintains a distinction between the
      intended messages and their impersonators.

   *  When all other explanations have been exhausted, Sender
      Authentication failure alone may provide evidence of malicious
      intent.  The difficulty is ruling out all other possible
      explanations.

2.2.  Privileged Mode Messages

   Because any message may require Priviledged mode processing, any
   message must be verifiable, using either SPF and DMARC or a local
   policy which provides equivalent results.  Local policy extends SPF
   to define acceptable relationships between a verfied server
   identifier and the RFC5321.MailFrom domain, and extends DMARC to
   define acceptable relationships between a verified RFC5321.MailFrom
   and the RFC5322.From domain.  The supplemental authentication
   techniques for this purpose are explained later in this document.

2.3.  Unwanted Messages

   Some messages will be categorized as unwanted because of previously
   configured rules or trusted reference sources.  These messages are
   blocked, but content may be preserved for subsequent review or other
   purposes.

2.4.  Non-privileged Messages with Content Filtering Fail

   Messages which fail Content Filtering are blocked.  A subsequent
   review is used to determine if content filtering needs to be updated,
   if a sender block rule is needed for specific senders, or if a
   Privilege Mode exemption is needed for trusted senders.

   When a message set is determined to be unwanted, an analysis is
   necessary to identify the identifiers which correctly represent the
   source of the attack.  In most cases, one or more identifiers can be
   found which represent the source of the attack, and a single-
   attribute block rule is created for each such identifier.  In less



Foster                  Expires 14 November 2023                [Page 4]

Internet-Draft          Sender Authentication BCP               May 2023


   common situations, a system manager may determine that an identifier
   was fraudulent, but the underlying identifiers are not wholly
   malicious.  If this occurs, a multiple-attribute block rule is needed
   to block the specific combination of identifiers.  In either
   configuration, verification of the identifiers is not necessary to
   the purposes of a block rule.

2.5.  Non-privileged Messages with Sender Authentication FAIL and
      Content Filtering PASS

   Messages which produce an authentication FAIL result will carry the
   highest presumption of malicious impersonation, but exceptions will
   occur.  Content Filtering will provide additional insight into the
   nature of the message, so disposition should be delayed until this
   data has been collected.  For messages that pass Content Filtering, a
   sufficient defense is to quarantine these messages and prioritize
   them for review and categorization.  Confirmed malice will justify a
   local policy to block all messages from the malicious source.
   Acceptable messages will be granted a local policy to provide
   alternate authentication.

2.6.  Non-privileged Messages with Sender Authentiction PASS and Content
      Filtering PASS

   Messages which pass both Sender Authentication and Content Filtering
   have no detected risk and are consequently released to the user.
   User complaints could cause the sender to be reviewed and content
   filtering rules to be enhanced.

2.7.  Non-privileged Messages with Sender Authentiction Unknown and
      Content Filtering PASS

   Some messages will produce neither PASS nor FAIL, because of missing,
   misconfigured, or non-enforcing domain owner policies.  These
   messages will be forwarded to content filtering, and may be blocked
   on that basis.  The remainder will be messages that have no detected
   risk, but may have undetected impersonation.  The evaluator must
   decide whether to release such messages to the user or quarantine
   them for prior review.  The sheer volume of such messages will often
   cause an organization to release such messages to the final
   recipient, while retaining the option of after-the-fact review.  The
   risk of doing so is proportional to the effectiveness of the content
   filtering system.  As after-the-fact review identifies additional
   message sources to be blocked and additional messages sources to be
   granted local authentication policies, the volume of ambiguous
   results will steadily decline.  When the ambiguous volume is
   sufficiently controlled, the evaluator can switch from after-the-fact
   review to quarantine with prior review.



Foster                  Expires 14 November 2023                [Page 5]

Internet-Draft          Sender Authentication BCP               May 2023


3.  Alternate Authentication

   SPF and DMARC only provide results if the domain owner has published
   a policy.  The policy is generally considered actionable if the
   policy returns a result of DMARC FAIL, or SPF FAIL without DMARC
   PASS.  Even then, the FAIL result can be misleading if the domain
   owner's implementation is not consistent with its policy, or if the
   message transit has caused the message to lose authentication.  For
   additional discussion of these issues, refer to Interoperability
   Issues between Domain-based Message Authentication, Reporting, and
   Conformance (DMARC) and Indirect Email Flows [RFC7960].

   RFC 7208 and RFC 7489 provide no guidance for evaluators to cope with
   incorrect, ambiguous, or No Policy results.  Without exception
   management, Sender Authentication dies as soon as an exception is
   necessary.  A poorly designed exception process may enable the very
   impersonations that Sender Authentication is intended to prevent.  To
   handle exceptions appropriately, and to ensure that any acceptable
   message can be configured as authenticated, additional authentication
   techniques are needed:

   *  DMARC using a local alignment policy: When a DMARC policy is not
      provided, DMARC-equivalent verification can be applied using an
      alignment rule configured by local policy to produce an equivalent
      PASS or FAIL result.

   *  DKIM with alternate allignment: When a verified DKIM [RFC6376]
      signature is available, and the From domain is not DMARC-aligned,
      but the From address is determined to have an acceptable
      relationship to the DKIM domain, the message is considered
      equivalent to DMARC PASS.  SPF PASS is optional when the From
      address is authenticated by a DKIM signature.

   *  SPF with alternate alignment: When the RFC5321.MailFrom domain is
      verified with SPF PASS, and the From domain is not DMARC-aligned,
      but is determined to have an acceptable relationship to the
      MailFrom domain, the message is considered equivalent to DMARC
      PASS.

   *  SPF with alternate server: When a message does not produce SPF
      PASS, but the RFC5321.MailFrom domain is determined to have an
      acceptable relationship to the server organization, equivalence to
      SPF PASS can be established using the Source IP, a forward-
      confirmed HELO name that represents the server organization, or a
      forward-confirmed Reverse DNS name which represents the server
      organization.  The SPF-equivalent PASS result can then be used to
      test the RFC5321.From domain for DMARC-equivalent PASS.




Foster                  Expires 14 November 2023                [Page 6]

Internet-Draft          Sender Authentication BCP               May 2023


4.  DMARC Authentication Types and Confidence Levels

   DMARC combines eight different authentiction types into a single
   result, but the eight types do not provide equal confidence.
   Evaluators should be aware of the possibility of false PASS, and
   consider that risk when developing local policies, especially local
   alignment policies.

   DKIM and SPF are the two underlying authentication techniques for
   DMARC, and within each technique there are four possible alignment
   methods: Self authenticates self, parent authenticates child, child
   authenticates parent, and sibling authenticates sibling,

   When a message is sent from a multi-tenant server, SPF assumes that
   the server owner has administrative controls which prevent clients
   from impersonating each other, or that all clients are well behaved.
   DKIM, by contrast, has the much simpler expectation that the server
   owner is able to ensure that each client's private key data is kept
   private to themselves, out of reach from other clients in the same
   environment.  Consequently, DKIM PASS always conveys a higher level
   of confidence than SPF PASS.  Of course, a DKIM signature also
   ensures that authentication is preserved during forwarding (when done
   without content changes), so DKIM also provides confidence to a
   broader range of evaluators.  In short, domain owners who wish to
   promote maximum trust by evaluators should ensure that all of their
   messages have verifiable DKIM signatures.

   Similarly, the different types of alignment provide different levels
   of confidence.  When the authenticating domain exactly matches the
   authenticated domain, trust in the result is maximized.  The three
   varieties of relaxed alignment depend on correctly identifying the
   organizational domain.  The Public Suffix List from publicsuffix.org
   is the reference used by most organizations, but it is not an
   authoritative source, is modified on a continuing basis, is developed
   for cross-site-scripting defenses rather than email defensies, and
   has detectable errors and omisssions.  While the frequency of errors
   may be low, the impact of an error may be significant.  If the PSL
   lands too low, the evaluator may not see a DMARC policy at all, or
   may see the wrong policy.  If the PSL lands too high, the evaluator
   may authenticate sibling organizations as if they were sibling
   domains within a single organization.  The impact of a PSL error
   varies with the type of authentication:

   *  Parent-authenticates-child is the most trustworthy form of relaxed
      alignment.  DNS is managed hierarchically, so a parent domain has
      unlimited control over a child domain if they choose to seize such
      control.  Most organizations also operate on hierarchical control,
      so the DNS structure is consistent with the real world that it is



Foster                  Expires 14 November 2023                [Page 7]

Internet-Draft          Sender Authentication BCP               May 2023


      modelling.  The risk of a registry domain impersonating a
      registered client is assumed to be inherently low, but is within
      the rights of a parent domain.  Consequently, a parent-
      authenticates-child relationship carries a high level of
      confidence, nearly equivalent to strict alignment.

   *  Child-authenticates-parent is a little less intuitive, because it
      is not consistent with the heirarchical way that organizations
      operate.  Curiously, it is the most commonly observed form of
      relaxed alignment.  An evaluator can assume that if a child domain
      is improperly used to impersonate a parent domain, the response
      from the parent domain will be swift and harsh.  Consequently, a
      child-authenticates-parent relationship retains a significant
      degree of confidence.

   *  Sibling-authenticates-sibling does not have an intuitive
      relationship to the control mechanisms of hierarchical
      organizations.  More importantly, sibling authentication is
      vulnerable to PSL errors used for malicious purposes.
      Consequently, it is the least trustworthy from of relaxed
      authentication.

   Domain owners who seek to maximize evaluator trust should utilize
   those authentication types which provide the highest confidence to
   evaluators.  When configuring local authentication policies,
   evaluators have the option of applying any of four confidence levels,
   to obtain their desired balance between maximizing policy coverage
   and maximizing confidence in a PASS result.

5.  Forwarding Considerations

   Forwarding creates significant challengers for the evaluator seeking
   to eliminate impersonation.  The evaluator needs to assess the
   reputation of both the originator and the forwarder, but in most
   cases, the greater concern applies to the originator.  The process of
   forwarding:

   *  obscures the originating organization behind the forwarding
      organization,

   *  will either invalidate SPF PASS on the original RFC5321.MailFrom
      domain, or replace it completely to obtain SPF PASS on the
      forwarder domain,

   *  may involve content changes that invalidate DKIM signatures, and

   *  may alter the RFC5322.From header to evade DMARC problems on
      altered messages.



Foster                  Expires 14 November 2023                [Page 8]

Internet-Draft          Sender Authentication BCP               May 2023


   Consequently, an ideal evaluation process needs to include:

   *  identifying that one or more forwarding operations occurred,

   *  verifying through administrative measures that the recipient wants
      the forwarded stream,

   *  deciding how much filtering trust can be delegated to the
      forwarder,

   *  inferring, as much as possible, the identity of the originating
      server organization, RFC5321.MailFrom address, and RFC5322.From
      address,

   *  applying a reputation based on all of the above, and

   *  applying a disposition based on the reputation and the results of
      content filtering.

   Forwarding may be easier to detect in aggregate than on single
   messages, because a forwarding configuration will produce a stream of
   messages from a single server organization, on behalf of a wide
   variety of RFC5322.From domains.  Within a single message, these data
   sources may be available to help detect forwarding:

   *  An ARC Chain can be parsed to extract prior identifiers and their
      prior verification state.

   *  Received headers containing a "for user@domain" clause may reveal
      the original destination address.  An MX lookup on that domain may
      permit determination of the Received entry which indicates arrival
      at the forwarding organization's MX server.

   *  The sequence of organization changes and private knowlehdge can be
      used to identify organization roles: submitting agent domain,
      mailstore domain, outbound gateway domain, or forwarding domain.
      Organizational changes are inferred when the Received header chain
      transits between public and private IP addresses, and when two
      adjacent public IP addresses are identified as belonging to
      different server domains.

   *  An RFC5322.To address list which does not contain the
      RFC5321.RcptTo address can indicate many things, one of which is a
      forwarding operation.







Foster                  Expires 14 November 2023                [Page 9]

Internet-Draft          Sender Authentication BCP               May 2023


   *  An RFC5321.MailFrom address that is encoded using the Sender
      Rewriting Scheme (SRS) can be decoded to reveal the prior
      RFC5321.MailFrom address or addresses.  However, SRS encoding is
      also used by some servers upon origination, to detect invalid
      bounce messages.

   *  Forwarding without RFC5321.MailFrom rewrite is one of many reasons
      that a message will fail to produce SPF PASS.

   While these are potentially useful clues, this document does not
   attempt to provide an algorithm for optimal interpretation of these
   clues.  Evaluators must consider that Received headers may be forged
   and ARC Sets may mislead.  Consequently, header parsing is most
   reliable when it is used to identify messages that are unwanted
   because of detected identifiers with an unacceptable reputation.

   Evaluators who wish to choose to accept forwarded mail, but cannot
   perform detailed header parsing, will need to authenticate based on
   the forwarder identity alone.  For messages forwarded without
   RFC5321.MailFrom rewrite, this requires a local policy to provide
   alternate authentication for the RFC5321.MailFrom address.  The
   policy would need to specify that any MailFrom domain is acceptable
   as long as the forwarding server identity matches the expected Source
   IP or the server host domain matches the expected domain name and is
   forward confirmed.  For messages forwarded with RFC5321.MailFrom
   rewrite to provide SPF PASS based on the forwarder's domain, the
   local policy would need to specify that all RFC5322.From domains are
   acceptable as long as the RFC5321.MailFrom domain has the expected
   value and is confirmed by SPF PASS or a local policy equivalent.  In
   either case, the evaluator is implicitly assuming that either the
   forwarder will intercept and block malicious impersonation, or that
   the evaluator's content filtering will be strong enough to intercept
   and block any malicious impersonation in the forwarded stream.

   Forwarders should consider that many evaluators will not attempt to
   navigate the complexity of originator detection.  Instead, any
   unacceptable messages will be assigned to the reputation of the
   forwarder, which could lead to obstruction of messages unrelated to
   the forwarded stream.  Consequently, forwarders should apply the same
   rigorous filtering to forwarded messages as they use to protect their
   own domain.

   Additionally, forwarders should be aware of the impact that content-
   altering spam filters will have on forwarded mail.  An increasing
   number of spam filters add disclaimers to distinguish external mail
   from internal mail, or rewrite embedded links to provide click-time
   protection.  Any such change will invalidate the originator's DKIM
   signatures, causing an authentication problem if the message is



Foster                  Expires 14 November 2023               [Page 10]

Internet-Draft          Sender Authentication BCP               May 2023


   forwarded in its altered state.  Consequently, organizations that use
   content-altering spam filters should not forward mail, and
   organizations that routinely forward mail should not use content-
   altering featues of their spam filter.

6.  IANA Considerations

   This memo includes no request to IANA.

7.  Security Considerations

   The goal of sender authentication is to separate well-identified
   messages from potentially-impersonated messages.  Successful sender
   authentication is a necessary pre-requisite to privileged-mode
   handling of a document, but it is not a reason to grant that
   privilege.  Sender authentication simply ensures that any reputation
   information, obtianed by other methods, can be applied correctly.

   Evaluators must remember that both sender infrastructure and sender
   reputation can change over time and therefore they must remain
   vigilant.  Previously trusted sources may become compromised or even
   retired and reassigned to other, less trustworthy, uses.  Similarly,
   a previously untrusted source may have earned that designation
   because of an infection which has been subsequntly corrected.  Coping
   with these sources of variability is outside the scope of this
   document.

   Becuase of the additional risk associated with sibling relationships,
   evaluators may wish to treat authentication based on sibling
   alignment more carefully than other forms of relaxed alignment.

8.  References

8.1.  Normative References

   [RFC6376]  Crocker, D., Ed., Hansen, T., Ed., and M. Kucherawy, Ed.,
              "DomainKeys Identified Mail (DKIM) Signatures", STD 76,
              RFC 6376, DOI 10.17487/RFC6376, September 2011,
              <https://www.rfc-editor.org/info/rfc6376>.

   [RFC7208]  Kitterman, S., "Sender Policy Framework (SPF) for
              Authorizing Use of Domains in Email, Version 1", RFC 7208,
              DOI 10.17487/RFC7208, April 2014,
              <https://www.rfc-editor.org/info/rfc7208>.







Foster                  Expires 14 November 2023               [Page 11]

Internet-Draft          Sender Authentication BCP               May 2023


   [RFC7489]  Kucherawy, M., Ed. and E. Zwicky, Ed., "Domain-based
              Message Authentication, Reporting, and Conformance
              (DMARC)", RFC 7489, DOI 10.17487/RFC7489, March 2015,
              <https://www.rfc-editor.org/info/rfc7489>.

8.2.  Informative References

   [RFC7960]  Martin, F., Ed., Lear, E., Ed., Draegen, T., Ed., Zwicky,
              E., Ed., and K. Andersen, Ed., "Interoperability Issues
              between Domain-based Message Authentication, Reporting,
              and Conformance (DMARC) and Indirect Email Flows",
              RFC 7960, DOI 10.17487/RFC7960, September 2016,
              <https://www.rfc-editor.org/info/rfc7960>.

Author's Address

   Douglas Foster (editor)
   Self
   Virginia Beach, VA 23464
   United States of America
   Email: dougfoster.emailstandards@gmail.com






























Foster                  Expires 14 November 2023               [Page 12]