14
A Trust Overlay for Email A Trust Overlay for Email Operations: Operations: DKIM and Beyond DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006

A Trust Overlay for Email Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg

Embed Size (px)

Citation preview

Page 1: A Trust Overlay for Email Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg

A Trust Overlay for Email A Trust Overlay for Email Operations: Operations: DKIM and BeyondDKIM and Beyond

A Trust Overlay for Email A Trust Overlay for Email Operations: Operations: DKIM and BeyondDKIM and Beyond

Dave CrockerBrandenburg Internet Working

bbiw.net

Apricot / Perth 2006

Dave CrockerBrandenburg Internet Working

bbiw.net

Apricot / Perth 2006

Page 2: A Trust Overlay for Email Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg

D. Crocker Apricot 2006 / Trust Overlay22

We all know the problem…We all know the problem…We all know the problem…We all know the problem…

“Bad Actors” send spam, phishing, etc. Detecting them is a continuing battle We are stuck with a permanent arms race Existing tools are pretty good, but are not enough

Need an effort to identify “Good Actors” They try to follow reasonable rules They fix problems, when they make errors

“Bad Actors” send spam, phishing, etc. Detecting them is a continuing battle We are stuck with a permanent arms race Existing tools are pretty good, but are not enough

Need an effort to identify “Good Actors” They try to follow reasonable rules They fix problems, when they make errors

Page 3: A Trust Overlay for Email Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg

D. Crocker Apricot 2006 / Trust Overlay33

Trust OverlayTrust OverlayTrust OverlayTrust Overlay

Upgrade, without changing basic email Easy, open, direct communications still possible Permit spontaneous contact (no prior arrangement)

Add special procedures for Good Actors1. Identify “responsible” participant2. If they conform to community standards, then…3. Give their mail “streamlined” delivery processing

Upgrade, without changing basic email Easy, open, direct communications still possible Permit spontaneous contact (no prior arrangement)

Add special procedures for Good Actors1. Identify “responsible” participant2. If they conform to community standards, then…3. Give their mail “streamlined” delivery processing

Page 4: A Trust Overlay for Email Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg

D. Crocker Apricot 2006 / Trust Overlay44

1. Identify “Responsible” 1. Identify “Responsible” ParticipantParticipant1. Identify “Responsible” 1. Identify “Responsible” ParticipantParticipant

Types of identifiers IP Address of host or network operator Domain Name of user or operator Email address or author

Responsible for… Content – The author Message stream – An operator

Viable choices today IP Address SPF, Sender-ID (…) DKIM <http://dkim.org>

Types of identifiers IP Address of host or network operator Domain Name of user or operator Email address or author

Responsible for… Content – The author Message stream – An operator

Viable choices today IP Address SPF, Sender-ID (…) DKIM <http://dkim.org>

Page 5: A Trust Overlay for Email Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg

D. Crocker Apricot 2006 / Trust Overlay55

2a. Community Standards2a. Community Standards2a. Community Standards2a. Community Standards

Each receiver can have own preferences Tailor receive-side filtering criteria

Independent third-parties create own set

White-/Black- list services

Broad community consensus Laws (well, maybe…) Industry “best practises” (if we can agree)

Each receiver can have own preferences Tailor receive-side filtering criteria

Independent third-parties create own set

White-/Black- list services

Broad community consensus Laws (well, maybe…) Industry “best practises” (if we can agree)

Page 6: A Trust Overlay for Email Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg

D. Crocker Apricot 2006 / Trust Overlay66

2b. 2b. ConformConform to community to community standardsstandards2b. 2b. ConformConform to community to community standardsstandards

Pre-receipt assessment Build the lists (accreditation, reputation)

Receipt-time enforcement Integrate into filtering engine [Add special flag to user-visible display of

message]

Post-receipt correction Everyone makes mistakes, so compliance is

an ongoing challenge

Pre-receipt assessment Build the lists (accreditation, reputation)

Receipt-time enforcement Integrate into filtering engine [Add special flag to user-visible display of

message]

Post-receipt correction Everyone makes mistakes, so compliance is

an ongoing challenge

Page 7: A Trust Overlay for Email Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg

D. Crocker Apricot 2006 / Trust Overlay77

FilterFilter

The Pieces of TrustThe Pieces of TrustThe Pieces of TrustThe Pieces of Trust

ID / Signature VerificationID / Signature VerificationID / Signature VerificationID / Signature Verification

ID / Signature CreationID / Signature CreationID / Signature CreationID / Signature Creation

ID / Signer EvaluationID / Signer EvaluationID / Signer EvaluationID / Signer Evaluation

ID / Key QueryID / Key Query

Sender Signing PracticesSender Signing Practices

Sender AssessmentSender Assessment

MessagMessagee

MessagMessagee

MessageMessageMessageMessage

Internet

Administrative Domain

Administrative DomainOther TestsOther TestsOther TestsOther Tests

okok

not oknot ok

Page 8: A Trust Overlay for Email Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg

88

DomainKeys Identified Mail DomainKeys Identified Mail (DKIM) Overview: (DKIM) Overview: <http://dkim.org><http://dkim.org>

DomainKeys Identified Mail DomainKeys Identified Mail (DKIM) Overview: (DKIM) Overview: <http://dkim.org><http://dkim.org>

Lets an organization take responsibility for a message

Their reputation is basis for evaluating whether to deliver

Adds digital signature to a message, associating it with a domain name

Lets an organization take responsibility for a message

Their reputation is basis for evaluating whether to deliver

Adds digital signature to a message, associating it with a domain name

Multi-vendor specification

Derived from Yahoo DomainKeys and Cisco Identified Internet Mail

Stable signing specs available now!

Implementations, now!

IETF working group(!)

Refine and standardize

Multi-vendor specification

Derived from Yahoo DomainKeys and Cisco Identified Internet Mail

Stable signing specs available now!

Implementations, now!

IETF working group(!)

Refine and standardize

Page 9: A Trust Overlay for Email Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg

D. Crocker Apricot 2006 / Trust Overlay99

DKIM GoalsDKIM GoalsDKIM GoalsDKIM Goals

Msg header authentication

DNS identifiers Public keys in DNS

End-to-end Between

origin/receiver administrative domains.

Not path-based

Msg header authentication

DNS identifiers Public keys in DNS

End-to-end Between

origin/receiver administrative domains.

Not path-based

Transparent to end users

No client User Agent upgrades required

But extensible to per-user

Allow sender delegation

Outsourcing

Low development, deployment, use costs

No new, trusted third parties (except DNS)

Transparent to end users

No client User Agent upgrades required

But extensible to per-user

Allow sender delegation

Outsourcing

Low development, deployment, use costs

No new, trusted third parties (except DNS)

Page 10: A Trust Overlay for Email Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg

D. Crocker Apricot 2006 / Trust Overlay1010

Technical High-pointsTechnical High-pointsTechnical High-pointsTechnical High-points

Signs body and selected parts of header Signature transmitted in DKIM-Signature header

Public key stored in DNS In _domainkey subdomain New RR type planned, with fall-back to TXT

Domain Names sub-divided using “selectors” Allows multiple keys for aging, delegation, etc.

Sender Signing Practices Signer can publish its rules, such as requiring signing Allows lookup for missing or improper signature

Signs body and selected parts of header Signature transmitted in DKIM-Signature header

Public key stored in DNS In _domainkey subdomain New RR type planned, with fall-back to TXT

Domain Names sub-divided using “selectors” Allows multiple keys for aging, delegation, etc.

Sender Signing Practices Signer can publish its rules, such as requiring signing Allows lookup for missing or improper signature

Page 11: A Trust Overlay for Email Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg

D. Crocker Apricot 2006 / Trust Overlay1111

DKIM-Signature headerDKIM-Signature headerDKIM-Signature headerDKIM-Signature header

Example:DKIM-Signature: a=rsa-sha1; q=dns;d=example.com;[email protected];s=jun2005.eng; c=relaxed/simple;t=1117574938; x=1118006938;h=from:to:subject:date;b=dzdVyOfAKCdLXdJOc9G2q8LoXSlEniSb

av+yuU4zGeeruD00lszZVoG4ZHRNiYzR

DNS query will be made to:jun2005.eng._domainkey_domainkey.example.com

Example:DKIM-Signature: a=rsa-sha1; q=dns;d=example.com;[email protected];s=jun2005.eng; c=relaxed/simple;t=1117574938; x=1118006938;h=from:to:subject:date;b=dzdVyOfAKCdLXdJOc9G2q8LoXSlEniSb

av+yuU4zGeeruD00lszZVoG4ZHRNiYzR

DNS query will be made to:jun2005.eng._domainkey_domainkey.example.com

Page 12: A Trust Overlay for Email Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg

D. Crocker Apricot 2006 / Trust Overlay1212

Status and PleaStatus and PleaStatus and PleaStatus and Plea

Deployment is happening (slowly) http://mipassoc.org/deploy Open source versions, with more coming

DNS administration is difficult We hope to create tools to make it easier

Plea(s) Please join http://mipassoc.org/supporters.html list Please try available versions Please encourage progress in IETF working group

Deployment is happening (slowly) http://mipassoc.org/deploy Open source versions, with more coming

DNS administration is difficult We hope to create tools to make it easier

Plea(s) Please join http://mipassoc.org/supporters.html list Please try available versions Please encourage progress in IETF working group

Page 13: A Trust Overlay for Email Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg

D. Crocker Apricot 2006 / Trust Overlay1313

Discussion…Discussion…Discussion…Discussion…

Page 14: A Trust Overlay for Email Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg

D. Crocker Apricot 2006 / Trust Overlay1414

DeploymentDeploymentDeploymentDeployment