Mailing List Archive

Post-IPocalyptic SPF
One slowly emerging story I've been following is the "IPocalypse" -- the
exhaustion of IPv4 internet addresses. This will almost certainly be
the first year in which reasonable (by previous years' standards)
requests for new IP addresses will be denied due to shortage.

This will probably affect e-mail more strongly than other protocols,
because this very scarcity makes spam-fighting easier -- if
reputation-burned IP addresses cannot be replaced, then blacklists will
both have a greater immediate effect, and cause more pain to lax ISPs.
In turn, that means even e-mail servers with a working IPv6 connection
may find it profitable to only accept mail over IPv4.

So, any entity that wishes to send mail will have to obtain at least one
public IPv4 address, far into the future. As this becomes harder, they
will have to share.

Now ideally this sharing would take place via a dualstack smarthost
server that can recognize each individual client organization (via SPF on
IPv6, TLS, DKIM, whatever) and stop them from forging each other. But
they may only be able to get a laxly maintained smarthost, or even just a
NAT/PAT box.

For such an organization, the correct SPFv1 record would be something
like:

example.com SPF "v=spf1 ?a:six-to-four.example.net -all"

which would be less definite than we'd like.


To fix this, we should add one or more flags to indicate other indicia
than the IP address.

One obvious one, which I have suggested before (but as a
forwarding-problem solution), is a modifier that indicates all
legitimate mail bears a DKIM signature against the envelope sender.
(This would be orthogonal to the DKIM project's own ADSP, which is
concerned with the From: address. From: and MAIL FROM: aren't always the
same.)

Another approach is a flag to require a TLS certificate. This has the
advantage over DKIM of allowing forged connections to be rejected at
RCPT or earlier -- DKIM must go to DATA to be inspected. But it would
only help with NAT/PAT sharing, not with actual smarthosts.

---- Michael Deutschmann <michael@talamasca.ocis.net>


-------------------------------------------
Sender Policy Framework: http://www.openspf.org [http://www.openspf.org]
Modify Your Subscription: http://www.listbox.com/member/ [http://www.listbox.com/member/]

Archives: https://www.listbox.com/member/archive/735/=now
RSS Feed: https://www.listbox.com/member/archive/rss/735/1311532-17d8a1ba
Modify Your Subscription: https://www.listbox.com/member/?member_id=1311532&id_secret=1311532-f2ea6ed9
Unsubscribe Now: https://www.listbox.com/unsubscribe/?member_id=1311532&id_secret=1311532-bdbb122a&post_id=20110306032607:614872B2-47CB-11E0-95E8-917A24E42A5B
Powered by Listbox: http://www.listbox.com
Re: Post-IPocalyptic SPF [ In reply to ]
On Sun, 6 Mar 2011, Michael Deutschmann wrote:

> Another approach is a flag to require a TLS certificate. This has the
> advantage over DKIM of allowing forged connections to be rejected at
> RCPT or earlier -- DKIM must go to DATA to be inspected. But it would
> only help with NAT/PAT sharing, not with actual smarthosts.

I like that idea. Stays within the SMTP envelope domain that SPF covers,
and makes sending email from a NAT connection able to be authenticated.
Would the modifer specify the domain expected in the TLS certificate?

Is this what you are thinking?

v=spf1 ?a:mail.6to4.com tls=smtp.example.com -all

--
Stuart D. Gathman <stuart@bmsi.com>
Business Management Systems Inc. Phone: 703 591-0911 Fax: 703 591-6154
"Confutatis maledictis, flammis acribus addictis" - background song for
a Microsoft sponsored "Where do you want to go from here?" commercial.


-------------------------------------------
Sender Policy Framework: http://www.openspf.org [http://www.openspf.org]
Modify Your Subscription: http://www.listbox.com/member/ [http://www.listbox.com/member/]

Archives: https://www.listbox.com/member/archive/735/=now
RSS Feed: https://www.listbox.com/member/archive/rss/735/1311532-17d8a1ba
Modify Your Subscription: https://www.listbox.com/member/?member_id=1311532&id_secret=1311532-f2ea6ed9
Unsubscribe Now: https://www.listbox.com/unsubscribe/?member_id=1311532&id_secret=1311532-bdbb122a&post_id=20110306142612:96BDF456-4827-11E0-8D5A-9613524EA42E
Powered by Listbox: http://www.listbox.com
Re: Post-IPocalyptic SPF [ In reply to ]
On Sun, 6 Mar 2011, Stuart D. Gathman wrote:
> Is this what you are thinking?
>
> v=spf1 ?a:mail.6to4.com tls=smtp.example.com -all

Something like that, yes. Although it would probably need a bit more
complexity to be secure.

If we just use a domain name as a selector and rely on the same
certificate distribution as web browsers use, then we become vulnerable to
false certificates.

I remember (but can't seem to find online) a recent case where a
Repressive Regime forced a local ISP which happened to be an intermediate
CA, to issue false certificates so they could snoop connections to
various international sites.

To pull that off for the Web requires both the false certificate and the
capacity to be a man-in-the-middle at the IP level, and the latter is
harder to achieve. (TLS is still useful as a defense against entities
that can spy on but not alter traffic.)

But since we'd be doing this to compensate for a non-unique IP address,
the network-layer MITM isn't needed for a successful forgery.


In contrast, DKIM would give us the key management for free. A MITM that
could defeat DKIM (by inserting the attacker's key into the DNS results)
could also trivially defeat vanilla SPFv1 (by changing the SPF lookup to
"v=spf1 +all").

---- Michael Deutschmann <michael@talamasca.ocis.net>


-------------------------------------------
Sender Policy Framework: http://www.openspf.org [http://www.openspf.org]
Modify Your Subscription: http://www.listbox.com/member/ [http://www.listbox.com/member/]

Archives: https://www.listbox.com/member/archive/735/=now
RSS Feed: https://www.listbox.com/member/archive/rss/735/1311532-17d8a1ba
Modify Your Subscription: https://www.listbox.com/member/?member_id=1311532&id_secret=1311532-f2ea6ed9
Unsubscribe Now: https://www.listbox.com/unsubscribe/?member_id=1311532&id_secret=1311532-bdbb122a&post_id=20110308013150:BF273930-494D-11E0-BAE7-C8F4BD341941
Powered by Listbox: http://www.listbox.com