last chance for mail service ? DKIM TFMC2 01/2006 Mail service - - PDF document

last chance for mail service dkim
SMART_READER_LITE
LIVE PREVIEW

last chance for mail service ? DKIM TFMC2 01/2006 Mail service - - PDF document

last chance for mail service ? DKIM TFMC2 01/2006 Mail service status More and more spam, fishing, spoofing, virus More and more energy in spam fighting More and more messages lost because : Imperfect automatic filtering


slide-1
SLIDE 1

DKIM last chance for mail service ?

TFMC2 01/2006

slide-2
SLIDE 2

01/2006 2

Mail service status

  • More and more spam, fishing, spoofing, virus
  • More and more energy in spam fighting
  • More and more messages lost because :

– Imperfect automatic filtering – User error while removing spam – Delivery report unusable (too many return for spoofed email)

  • Trust in mail service is low now.
slide-3
SLIDE 3

01/2006 3

Authentication

  • Authentication is not the ultimate solution

but a pre-requisite to dissuade from many abuse.

  • PGP and S/MIME in a wide area are in

defeat :

– too complex for users – need to deploy private keys to end users – S/MIME : expensive PKI, sharing trusted CA model is only commercial, …

slide-4
SLIDE 4

01/2006 4

Sender Policy Framework

  • A kind of « reverse MX ».
  • Do not authenticate message itself but the

message server origin.

  • Altered by forwarders so require one of :

– SRS (Sender Rewriting Scheme) srs0+yf09=Cw=orig.org=alice@forwarder.org – SMTP Responsible Submitter extension : MAIL FROM:<ann@orig.org> SIZE=1000 SUBMITTER=<bob@forwarder.org>

slide-5
SLIDE 5

01/2006 5

DKIM

  • Signs message with asymmetric

cryptography (similar to PGP and S/MIME)

  • Neither certificate authority nor “web of

trust". Trust being based on the domain administrative delegation model. Public keys are published using DNS.

  • In most case messages are signed by the

MSA : so private keys are stored by that MTA, no distribution to end user

slide-6
SLIDE 6

01/2006 6

DKIM

  • Signs body and some headers
  • New header DKIM-Signature :
  • Public key stored in DNS

–_domainkey subdomain –selector subdomain –DKK new RR type, fall back to TXT

slide-7
SLIDE 7

01/2006 7

Example

DKIM-Signature: a=rsa-sha1; q=dns;

d=example.com; i=user@example.com; s=jun2005; c=nowsp; l=12345 t=1117574938; x=1118006938; h=from:to:subject:date; b=dzdVyOfAKCdLXdJOc9G2q8LoXSlEniSb av+yuU4zGeeruD00lszZVoG4ZHRNiYzR

Query DNS for : jun2005._domainkey.example.com

The signature algorithme Acces method to the public key Headers part of the signature Canonicalization algorithm B64 encoded signature value Validity period Length of body used for signature The signer

slide-8
SLIDE 8

01/2006 8

Sender Signing Policy 1/2

  • If a message contain a valid DKIM

signature and if sender and signer are the same, the message is valid.

  • What happens else ?
  • SSP is a way for the sender to publish

information so the signature verifier can decide if the message is suspicious or not

slide-9
SLIDE 9

01/2006 9

SSP2/2

  • Use DNS (DKP or TXT RR)
  • Result is one of

– Some message of this entity may not be signed – Any message must be signed by the originator – Any message must be signed by originator or behalf a third party (mailing list,

  • utsourcing,…)

– Check individual level – Sender never signs message

slide-10
SLIDE 10

01/2006 10

DKIM versus S/MIME

  • Not any expensive PKI deployment needed
  • Depend on DNS security
  • Not designed for end user to end user signature
  • No private key for end user
  • No change on existing MUA
  • Signature validation by one of the receiving MTA
  • Headers part of the signature
  • Sender Signing Policy

C1

slide-11
SLIDE 11

Diapositive 10 C1 DKIM signature can't prove the signer agreement on content because private key is not under exclusive control of the signer. In fact S/MIME as real difficulties to be deployed. That's why some firms propose a virtual smart card key server to centralize keys and S/MIME verification

  • proxy. In such configuration the S/MIME architecture is not so far from DKIM, isn't it ?

CRU; 30/01/2006

slide-12
SLIDE 12

01/2006 11

DKIM threats analysis

  • Discussion about DKIM are huge because

needs and implications concern all the Internet.

  • A lot of critics about DKIM along the

mailing list archive

  • DKIM threats is a draft that summarize it :

http://www.ietf.org/internet-drafts/draft- fenton-dkim-threats-02.txt

slide-13
SLIDE 13

01/2006 12

Some identified limits

  • DNS pollution
  • Exploit body length limit
  • Canonicalization abuse
  • Use of revoked key
  • Signed message replay
  • DOS attack against DNS or signer verifier
  • Compromise of MTA signing server
  • Look-alike domain names (O/0 l/1, ….)
  • Short time domain names
slide-14
SLIDE 14

01/2006 13

DKIM and ML

  • Still an open discussion because no RFC

specifies what’s a ML.

– Some says a MLM is forwarder – Some says a MLM is a remailer

  • A forwarder must just preserve existing

signature

  • Forwarder is simple but may ease replay attacks

and don’t solve the question of “ML reputation”.

  • A remailer may remove existing signature and

apply its own one.

  • DKIM in a remailer is very complex
slide-15
SLIDE 15

01/2006 14

Message service architecture

  • Signature added by the MSA require any

mail received to be authenticated first.

  • SMTP-AUTH (port 587) should be used for

roaming and non roaming users.

  • It make logs more valuable
  • It can block botnet/Virus
  • Must not block outgoing access to port 587

(is this specified in eduroam ?)

  • Internet draft : Email Submission: Access

and Accountability

http://mipassoc.org/spamops/draft-hutzler-spamops-05.txt

slide-16
SLIDE 16

01/2006 15

Mail service architecture and DKIM

MX MX Output MTA Output MTA MSA (port 587) MSA (port 587) UA UA Add DKIM signature Add DKIM signature SMTP auth SMTP auth Signature and SSP check Signature and SSP check UA UA Filtering service Filtering service SMTP auth SMTP auth MSA (no auth,) MSA (no auth,) script script

slide-17
SLIDE 17

01/2006 16

packages

  • Opensource :

– libdkim W32 from ALT-N – Dkim-milter from sendmail – Dkimproxy from Jason Long

  • Commercial

– Mdaemon ALT-N – powerMta port 25 – Strongmail strongmail

slide-18
SLIDE 18

01/2006 17

Question ?