Proposal for a Pilot Project: Using DKIM to Create a Email Trust Channel Dave Crocker Brandenburg InternetWorking bbiw.net Dave Crocker Brandenburg InternetWorking.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Use Case Diagrams.
RPKI Standards Activity Geoff Huston APNIC February 2010.
Service Oriented Architecture Reference Model
Lousy Introduction into SWITCHaai
PKCS-11 Protocol for Enterprise Key Management
Delivery Methods forIPP Event Notifications 1 Internet Printing Protocol (IPP) Delivery Methods for IPP Event Notifications.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Fighting Abuse with Trust: Enhancing the paradigm Dave Crocker Trusted Domain Project (trusteddomain.org) Brandenburg InternetWorking (bbiw.net) FCC ~
1 Contract Inactivation & Replacement Fly-in Action ( Continue to Page Down/Click on each page…) Electronic Document Access (EDA)
Rfc4474bis-01 IETF 89 (London) STIR WG Jon & Cullen.
© 2012 Eloqua, Inc. Confidential 1 Deliverability and IP Warming Overview and Implementation Using Eloqua.
Reputation Discussion Panels: Seeking a Common Understanding Dave Crocker Brandenburg Internet Working bbiw.net MAAWG / S.F Dave Crocker Brandenburg.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E IEPG March 2000 APNIC Certificate Authority Status Report.
SO- You Have a Protocol- What ’ s NEXT? Bob Ensor and Dana York 1.
Off-the-Record Communication, or, Why Not To Use PGP
State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
SIP issues with S/MIME and CMS Rohan Mahy SIP, SIPPING co-chair.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
How Will Authentication Reduce Global Spam? OECD Anti-Spam Task Force Pusan – September, 2004 Dave Crocker Brandenburg InternetWorking OECD Anti-Spam Task.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
D. CrockerIntroduction to BATV 1 MIPA Bounce Address Tag Validation (BATV) “Was use of the bounce address authorized?” D. Crocker Brandenburg InternetWorking.
DomainKeys Identified Mail (DKIM): Introduction and Overview Eric Allman Chief Science Officer Sendmail, Inc.
CS470, A.Selcuk Security1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Chapter 30 Electronic Mail Representation & Transfer
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
DomainKeys Identified Mail (DKIM) D. Crocker ~ bbiw.net dkim.org  Consortium spec Derived from Yahoo DomainKeys and Cisco Identified Internet Mail  IETF.
DomainKeys Identified Mail (DKIM) D. Crocker Brandenburg InternetWorking mipassoc.org/mass  Derived from Yahoo DomainKeys and Cisco.
 ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Pilot project proposal: AffiL Affiliated domain names for trust Dave Crocker Brandenburg InternetWorking bbiw.net
1 The Business Case for DomainKeys Identified Mail.
03/09/05Oregon State University X-Sig: An Signing Extension for the Simple Mail Transport Protocol (SMTP) Robert Rose 03/09/05.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
DNS-based Message-Transit Authentication Techniques D. Crocker Brandenburg InternetWorking D. Crocker Brandenburg InternetWorking.
Prof. John A. Copeland fax Office: Klaus
Certified Server Validation (CSV) “ An MTA is talking to me directly. Are they OK?” D. Crocker Brandenburg InternetWorking mipassoc.org/csv 10/8/2015 6:36.
A Trust Overlay for Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg.
Cryptography, Authentication and Digital Signatures
MASS / DKIM BOF IETF – Paris 4 Août 2005 dkim.org  mipassoc.org/mass IETF – Paris 4 Août 2005 dkim.org  mipassoc.org/mass MIPA.
1 Dr. David MacQuigg, President Open-mail.org Stopping Abuse – An Engineer’s Perspective University of Arizona ECE 596c August 2006.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
A Retrospective on Future Anti-Spam Standards Internet Society of China Beijing – September, 2004 Dave Crocker Brandenburg InternetWorking
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
DIGITAL SIGNATURE.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Proposal for DKIM Pilot Project: Making Authentication Useful Dave Crocker Brandenburg InternetWorking Dave Crocker Brandenburg InternetWorking.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
© MMII JW RyderCS 428 Computer Networks1 Electronic Mail  822, SMTP, MIME, POP  Most widely used application service  Sometimes only way a person ever.
K. U. Khimani Asst. Prof. IT Dept. VVP Engineering College
Project Management: Messages
Other DKIM-Related Drafts
Secure Sockets Layer (SSL)
S/MIME T ANANDHAN.
Overview What is Spoofing Types of Spoofing
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
William Stallings Data and Computer Communications
The Application Layer: SMTP, FTP
Murray S. Kucherawy REPUTE Extra Topics Murray S. Kucherawy
draft-ietf-dtn-bpsec-06
Presentation transcript:

Proposal for a Pilot Project: Using DKIM to Create a Trust Channel Dave Crocker Brandenburg InternetWorking bbiw.net Dave Crocker Brandenburg InternetWorking bbiw.net

2 2 © 2008, D. Crocker RoadmapRoadmap Trust with domain names: Why do DKIM? DKIM authentication basics Reputation layer above signature layer A modest publishing proposal Trust with domain names: Why do DKIM? DKIM authentication basics Reputation layer above signature layer A modest publishing proposal

3 3 © 2008, D. Crocker Reputation Using IP vs. Domain IP Pros Can be at SMTP time Lots of existing practice High granularity Cons Dynamic Not portable Shared among senders Tied to machine, not org.IP Pros Can be at SMTP time Lots of existing practice High granularity Cons Dynamic Not portable Shared among senders Tied to machine, not org. Domain Names Pros Aligns better with org Long-term stability Less long-term admin Can be delegated Cons Must wait for message header to be transmitted More complex software

4 4 © 2008, D. Crocker Mistrust and Trust are Different Mistrust Actor is typically hidden and unaccountable Look for bad behavior Heuristic results – with false positives Trust Actor is accountable and collaborative Presumes good intent Problems are errors, not abuse Mistrust Actor is typically hidden and unaccountable Look for bad behavior Heuristic results – with false positives Trust Actor is accountable and collaborative Presumes good intent Problems are errors, not abuse

5 5 © 2008, D. Crocker Trust is a separate channel FilterFilter FilterFilter FilterFilter Mistrust Trust Mistrust versus…

6 6 © 2008, D. Crocker DKIM – Identify a Responsible Party Goals Compatible/transparent with existing infrastructure Minimal new infrastructure Implemented independently of MUA clients Deployed incrementally Permit delegation of signing to third parties (non-authors)Goals Compatible/transparent with existing infrastructure Minimal new infrastructure Implemented independently of MUA clients Deployed incrementally Permit delegation of signing to third parties (non-authors) Non-Goals No assertions about behaviors of signing identity Not directions to receivers No protection after signature verification. No re-play protection Transit intermediary or a recipient can re-post the message

7 7 © 2008, D. Crocker DKIM Core Technology – RFC 4871 Authenticated identity DKIM-specific parameter From:, Sender:, intermediary, mailing list, other… Authentication mechanism Cryptographic signing Signer chooses header fields to include [+ body] DNS query mechanism Identity + selector defines query string Produces public key Authenticated identity DKIM-specific parameter From:, Sender:, intermediary, mailing list, other… Authentication mechanism Cryptographic signing Signer chooses header fields to include [+ body] DNS query mechanism Identity + selector defines query string Produces public key Effort to add to origination Private key Signing module Effort to add to reception Public key Validation module Limitations Minimal robustness against mailing lists Relaying can break signature

8 8 © 2008, D. Crocker Sample DKIM Signed Message Received: from mercury.example.net (HELO mercury.example.net) ([ ]) by mail.example.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 01 Oct :11: DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=example.net; s=dorrington; t= ; bh=HOVyUZdDUFeesnM3UIalZgPhdeJQS6N061IKw s=dorrington; t= ; bh=HOVyUZdDUFeesnM3UIalZgPhdeJQS6N061IKw 7iUjZ4=; h=Message-ID:Date:From:MIME-Version:To:Subject: 7iUjZ4=; h=Message-ID:Date:From:MIME-Version:To:Subject: Content-Type:Content-Transfer-Encoding; b=kp3vRZo7CiYpOz8lQtlOTZ+W Gl+Cd+te3KPLzFVopncaLnmfyNE0XToxOqSo9FZFz7an9B25gxfjZpZ80LpXmaZmtxx tikwSp0gdDJOWHUtGD2zs1osjDbRKT6KyNYb7 Message-ID: Date: Wed, 01 Oct :11: From: Alice Smith MIME-Version: 1.0 To: Bob Brown Subject: Tomorrow's meeting Content-Type: text/plain; charset=ISO Content-Transfer-Encoding: 7bit Authentication-Results: mail.example.com; dkim=pass ( sig from example.net/dorrington verified; ); sig from example.net/dorrington verified; ); Bob, Received: from mercury.example.net (HELO mercury.example.net) ([ ]) by mail.example.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 01 Oct :11: DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=example.net; s=dorrington; t= ; bh=HOVyUZdDUFeesnM3UIalZgPhdeJQS6N061IKw s=dorrington; t= ; bh=HOVyUZdDUFeesnM3UIalZgPhdeJQS6N061IKw 7iUjZ4=; h=Message-ID:Date:From:MIME-Version:To:Subject: 7iUjZ4=; h=Message-ID:Date:From:MIME-Version:To:Subject: Content-Type:Content-Transfer-Encoding; b=kp3vRZo7CiYpOz8lQtlOTZ+W Gl+Cd+te3KPLzFVopncaLnmfyNE0XToxOqSo9FZFz7an9B25gxfjZpZ80LpXmaZmtxx tikwSp0gdDJOWHUtGD2zs1osjDbRKT6KyNYb7 Message-ID: Date: Wed, 01 Oct :11: From: Alice Smith MIME-Version: 1.0 To: Bob Brown Subject: Tomorrow's meeting Content-Type: text/plain; charset=ISO Content-Transfer-Encoding: 7bit Authentication-Results: mail.example.com; dkim=pass ( sig from example.net/dorrington verified; ); sig from example.net/dorrington verified; ); Bob,

9 9 © 2008, D. Crocker StatusStatus dkim.org/#deployment 20(!) at interop event 18 software; 5 service Steady adoption rate Relatively minor early- stage rough edges Some confusion about identity to evaluate DKIM has two identity parameters (d= and I=) dkim.org/#deployment 20(!) at interop event 18 software; 5 service Steady adoption rate Relatively minor early- stage rough edges Some confusion about identity to evaluate DKIM has two identity parameters (d= and I=) Further work ADSP – publish signing practices to detect messages that should be signed Authentication-Results – header from signature validator to identity assessor …

10 © 2008, D. Crocker Authentication is Useless… … by itself We all say this, but do we appreciate what it really means? We often say: If you have a validated name, you can make simple decisions for folks you know. After all, you already know that Im a great guy… But this means really means youve gone beyond simple authentication… into reputation. This added layer is a barrier to adoption of authentication! Must have a reputation step, before an adopter gets value. Potential adopters of authentication are waiting for compelling and immediate utility that is turnkey. Potential adopters of authentication are waiting for compelling and immediate utility that is turnkey. … by itself We all say this, but do we appreciate what it really means? We often say: If you have a validated name, you can make simple decisions for folks you know. After all, you already know that Im a great guy… But this means really means youve gone beyond simple authentication… into reputation. This added layer is a barrier to adoption of authentication! Must have a reputation step, before an adopter gets value. Potential adopters of authentication are waiting for compelling and immediate utility that is turnkey. Potential adopters of authentication are waiting for compelling and immediate utility that is turnkey.

11 © 2008, D. Crocker Can a simple project help? Some utility, based on authentication Without prior sender/receiver arrangement Without prior sender/receiver arrangement Goals Simple, useful Not compete with reputation services… Possibly serve as a template for others Proposal Published Member List (PML) Published Member List (PML) Some utility, based on authentication Without prior sender/receiver arrangement Without prior sender/receiver arrangement Goals Simple, useful Not compete with reputation services… Possibly serve as a template for others Proposal Published Member List (PML) Published Member List (PML)

12 © 2008, D. Crocker Published Member List (PML) Pilot project Create an trust domain among member institutions to permit streamlined filter handling. Demonstrate utility of validated membership lists Publish a list of a groups members Membership can be a meaningful indication of Goodness Might publish related attributes, like type of institution Assessor might interpret favorably, but not give message a free pass Could be template for other organizations Banks, Airlines, Governments, Political Parties… Pilot project Create an trust domain among member institutions to permit streamlined filter handling. Demonstrate utility of validated membership lists Publish a list of a groups members Membership can be a meaningful indication of Goodness Might publish related attributes, like type of institution Assessor might interpret favorably, but not give message a free pass Could be template for other organizations Banks, Airlines, Governments, Political Parties…

13 © 2008, D. Crocker Project Details Write charter for project Define expected use by assessment engine Agree on list semantics Evaluate legal implications Document and publish it Write charter for project Define expected use by assessment engine Agree on list semantics Evaluate legal implications Document and publish it Obtain agreements to publish Define DNS/VBR* query format Begin operation Document the project Recruit spamassassin and other users of list * VBR: Vouch by Reference * VBR: Vouch by Reference

14 © 2008, D. Crocker Attributes in an Entry Domain name Associated name of institution Member attributes, such as Type of institution …? Domain name Associated name of institution Member attributes, such as Type of institution …?

15 © 2008, D. Crocker Audience Survey Interest? Idea of membership lists Participation in pilot project Concerns? Interest? Idea of membership lists Participation in pilot project Concerns?