DKIM WG IETF-67 DKIM Originating Signing Policy Douglas Otis

Slides:



Advertisements
Similar presentations
SeND Hash Threat Analysis CSI WG Ana Kukec, Suresh Krishnan, Sheng Jiang.
Advertisements

Managing Users. Overview for School Admin Users Define Users Users Module Add Users Importing Users and Groups Manually adding users Search for Users.
Authentication Approaches Phillip Hallam-Baker VeriSign Inc.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
Draft-lemonade-imap-submit-01.txt “Forward without Download” Allow IMAP client to include previously- received message (or parts) in or as new message.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
DNSOP WG IETF-67 SPF/Sender-ID DNS & Internet Threat Douglas Otis
DomainKeys Identified Mail (DKIM): Introduction and Overview Eric Allman Chief Science Officer Sendmail, Inc.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
1 Internet Networking Spring 2006 Tutorial 8 DNS and DHCP as UDP applications.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Sender policy framework. Note: is a good reference source for SPFhttp://
Domain Name System Security Extensions (DNSSEC) Hackers 2.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
DomainKeys Identified Mail (DKIM) D. Crocker ~ bbiw.net dkim.org  Consortium spec Derived from Yahoo DomainKeys and Cisco Identified Internet Mail  IETF.
DomainKeys Identified Mail (DKIM) D. Crocker Brandenburg InternetWorking mipassoc.org/mass  Derived from Yahoo DomainKeys and Cisco.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
Pilot project proposal: AffiL Affiliated domain names for trust Dave Crocker Brandenburg InternetWorking bbiw.net
Applicability Statement v1.1 Feedback: DirectTrust May 5, 2015.
© 2007 Convio, Inc. Implementation of Yahoo DomainKeys Bill Pease, Chief Scientist Convio.
Information-Centric Networks03a-1 Week 3 / Paper 1 What DNS is not –Paul Vixie –CACM, December 2009, vol. 52, no. 12 Main point –“DNS is many things to.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 17 Domain Name System (DNS)
DNS-based Message-Transit Authentication Techniques D. Crocker Brandenburg InternetWorking D. Crocker Brandenburg InternetWorking.
Defending DKIM IETF 65 Threats and Strategies Douglas Otis
May 20, 2004MARID WG Interim Meeting1 DNS Considerations for the MARID WG (esp., why TXT is bad) Edward Lewis
Module 9 Configuring Messaging Policy and Compliance.
A Trust Overlay for Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg.
MASS / DKIM BOF IETF – Paris 4 Août 2005 dkim.org  mipassoc.org/mass IETF – Paris 4 Août 2005 dkim.org  mipassoc.org/mass MIPA.
Bounce Address Tag Validation (BATV) D. Crocker IETF J. Levine San Diego Sam Silberman 2004 Tony Finch MASS BOF D. Crocker IETF J. Levine San Diego Sam.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
IETF 65, Dallas, TX1 Introduction to SSP Jim Fenton 22 March 2006.
Slide 1 © 2004 Reactivity The Gap Between Reliability and Security Eric Gravengaard Reactivity.
SPF/Sender-ID DNS & DDoS Threats Operations Analysis and Research Center for the Internet Douglas Otis November 3, 2007
A Retrospective on Future Anti-Spam Standards Internet Society of China Beijing – September, 2004 Dave Crocker Brandenburg InternetWorking
Management Advisory and Compliance Services Towson University Management Advisory and Compliance Services Internal Controls.
Accredited DomainKeys: A Service Architecture for Improved Validation Accredited DomainKeys: A Service Architecture for Improved Validation.
SPF/Sender-ID DNS & DDoS Threats Internet Security Operations and Intelligence II Douglas Otis
Module 7 Planning and Deploying Messaging Compliance.
Peering: A Minimalist Approach Rohan Mahy IETF 66 — Speermint WG.
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
Module 8 DNS Tools & Diagnostics. Dig always available with BIND (*nix) and windows Nslookup available on windows and *nix Dig on windows – unpack zip,
S/MIME (Secure/Multipurpose Internet Mail Extensions) security enhancement to MIME – original Internet RFC822 was text only – MIME provided.
Sender policy framework. Note: is a good reference source for SPFhttp://
HIT Policy Committee Meeting Nationwide Health Information Network Governance June 25, 2010 Mary Jo Deering, PhD ONC, Office of Policy and Planning NHIN.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
Enumservice VOID draft-stastny-enum-void-00 Richard Stastny Lawrence Conroy IETF60 San Diego.
DKIM Policy Proposals. 3 Proposals ‘A La Carte’ Discovery Mechanism RISC Policy Description –Its (almost) all in the Key Records RISC Policy Description.
Validation Working Group: Proposed Revisions to
Draft-lemonade-imap-submit-00.txt “Forward without Download” Allow IMAP client to include previously- received message (or parts) in or as new message.
DHCP-DNS Interaction Bernie Volz IETF-61, DHC WG.
ADDRESS INTERNATIONALIZATION ( EAI ) ICANN-55 Mar 06, 2016 TF-AIDN Member 35+ Min : 10- Min ( Q & A )
DOTS Requirements Andrew Mortensen November 2015 IETF 94 1.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
sender policy framework
DNS Security Issues SeongHo Cho DPNM Lab., POSTECH
draft-lemonade-imap-submit-01.txt “Forward without Download”
S/MIME T ANANDHAN.
Internal Controls Towson University
NAAS 2.0 Features and Enhancements
NET 536 Network Security Lecture 8: DNS Security
NET 536 Network Security Lecture 6: DNS Security
Slides Credit: Sogand Sadrhaghighi
MASS BOF IETF63, Paris 4 August 2005
Presentation transcript:

DKIM WG IETF-67 DKIM Originating Signing Policy Douglas Otis

2 2 What Does DKIM-Base Not Accomplish? Accountability for unsolicited bulk Safe white-listing with independent envelopes Authorizations outside the signing domain Validation of rfc2821 MailFrom addresses or SMTP clients Autonomous administration of provider relationships Independent vanity -address domain authorization Minimized number of DKIM keys Correlation of the signing domain with the SMTP client

3 3 What can “Domain Associations” Accomplish? Eliminate any reason to: –Exchange DKIM private keys –Use CNAMEs at key/selector leafs –Delegate DNS zones to providers –Deprecate -addresses beyond signing domain Allows safe white-listing Assures rfc2821 MailFrom address for DSNs Policy & authorizations can extend beyond signing domain Relationships with providers are autonomously managed Freedom to authorize vanity -domains independently

4 4 What Associated Identities are Assured? Is the -address valid or trustworthy? rfc2822 From ('F' & 'LF' annotation) rfc2822 Resent-* & Sender ('O' & 'LO' annotation) rfc2821 MailFrom ('M' protects DSNs) rfc2821 Ehlo ('E' protects white-list signing-domains) Annotation or DSN Protection:._DKIM-x. -domain._DKIM-Lx. -domain White-listing Protections:._DKIM-E.signing-domain (Label confirmed by element in answer.)

5 5 Rare Association Hash Collision Fix Flag wildcard records as “Default” ('D') Return confirmation of label validity When not confirmed nor default record, query “_default” Confirmation wildcards permit use of CNAMEs Example Association Records: *._DKIM-x TXT “v=0.0; f=A:D;” (never sends mail) s5qs7wwt62yx6yowseuzjntou633vtez._DKIM-x TXT “v=0.0; a=example.com; f=A;” (always signs)

6 6 Suggested Policies DKIM-F & DKIM-LF rfc2822.From DKIM-0 & DKIM-LO rfc2822.Resent-* or Sender DKIM-M rfc2821.MailFrom DKIM-E rfc2821.Ehlo d= domain-list not assuring valid -address a= domain-list assuring valid -address l= local-part f= flags: A - All initial messages signed by listed domains D – Default record L - Local-Part policy is published N - Not signing O - Only compliant services employed T - Trusted Designated Local-Parts V - Valid Designated Local-Parts

7 7 Why Use an Association Mechanism? -providers won't require customer's private DKIM keys DNS delegation or external CNAME records never needed All originating domains can leverage single DKIM signature Protects signing-domains used for white-listing Assures rfc2821.MailFrom domain for DSNs Far safer and more reliable than address-path registration Permits annotation of messages signed by other domains Permits trust based on UTF-8 (EAI) local-part addresses Permits autonomous management with large-scale use Minimizes use of DNS resources (replaces separate keys) Better retains: –Choice of providers –Authorization of vanity -domains with different providers

8 8 Strong/Weak Points of DOSP Strong: –All originating domains can assert separate policies –Unlimited scalability with minimal DNS transactions –Private Key sharing completely avoided –Prevents abuse of signing-domains when used to white-list –Autonomous management of domain associations –Deterministic DNS lookups and labels –Indicates when stringent compliance can be expected –Indicates when message can be trusted based upon domain –Indicates when -address is valid within different domains –Safe use of TXT Resource Records without added overhead –Exceeds SSP-Req-02 except the 6.3 (7) prohibition Weak: –NXDomain will not end a search for policy (fixed by incorporating _DKIM-x within SHA1 hash & new RR)

9 9 Questions?