It was suggested that some additional context may help the conversation a bit.

In the email world, typically a valid A/MX for the 5321.From Domain is required 
for delivery (the envelope sender).  Typically, you'll see these as 
"alex_brot...@comcast.com" in a valid/good message.  There have been two 
instances lately where using a wildcard has led to abuse.

First example:

thisisawildcardresponse.ph. 3600 IN     A       45.79.222.138

As you may imagine, you can create an innumerable number of domains with a 
wildcard at the TLD.  They also attempted to leverage *.co.com and *.br.com, 
and I'm sure others.

Some time ago, there was also an attempt to leverage this with SPF records.  
With SPF records, you can create a macro, and using metadata about the 
connection/message, attempt to understand if the IP is permitted to send on 
behalf of a given domain.  If the A record response is 127.0.0.2 (or any A 
record), it's considered a permitted IP.

example.com TXT "v=spf1 exists:%{i}.spf.example.com -all"

Which is great until a wildcard is deployed at the *.spf.example.com, which 
leads to 

1.2.3.4.spf.example.com A 127.0.0.2
alsoValid.spf.example.com A 127.0.0.2

Coding can be done to discover these, but thought I'd ask if there were 
something inherent in the protocol that could disclose when a wildcard match 
was responsible for the result.  Seems like in most cases, there is no such 
mechanism.

Thanks

-- 
Alex Brotman
Sr. Engineer, Anti-Abuse & Messaging Policy
Comcast
 

> -----Original Message-----
> From: Brotman, Alex <alex_brot...@comcast.com>
> Sent: Monday, January 6, 2025 4:46 PM
> To: Mark Andrews <ma...@isc.org>
> Cc: dnsop@ietf.org
> Subject: RE: [DNSOP] Flag for Wildcard Responses
> 
> These are zones I do not control.  I assume the recursive I'm using (which 
> does
> support DNSSEC) is of no help here.
> 
> I'd be happier if everyone would sign, for a bunch of reasons.  I'm sure many
> would be.
> 
> --
> Alex Brotman
> Sr. Engineer, Anti-Abuse & Messaging Policy Comcast
> 
> 
> > -----Original Message-----
> > From: Mark Andrews <ma...@isc.org>
> > Sent: Monday, January 6, 2025 4:43 PM
> > To: Brotman, Alex <alex_brot...@comcast.com>
> > Cc: dnsop@ietf.org
> > Subject: Re: [DNSOP] Flag for Wildcard Responses
> >
> > Sign the zone. Wildcard responses are visible in the DNSSEC records.  The 
> > RRSIG
> > label count is different and there will be NSEC/NSEC3 records that show
> whether
> > the wild card response is valid or not.
> > --
> > Mark Andrews
> >
> > > On 7 Jan 2025, at 08:04, Brotman, Alex
> > <Alex_Brotman=40comcast....@dmarc.ietf.org> wrote:
> > >
> > > Looking at something relating to the day job, and I'm curious if there's 
> > > any
> > method declared in the IETF world where the query side of the interaction 
> > can
> > understand that the response was fulfilled by a wildcard record.  I've 
> > asked a
> few
> > folks, and I haven't gotten anything that suggests as though this is 
> > possible.  No
> > one knew of any RFC or similar document that suggested this was an option.  
> > I
> > was curious if we're all missing something that could indicate this type of
> > response.  If not, is it something that should exist?
> > >
> > > (and if I'm in the wrong place, please be gentle)
> > >
> > > --
> > > Alex Brotman
> > > Sr. Engineer, Anti-Abuse & Messaging Policy Comcast
> > >
> > >
> > > _______________________________________________
> > > DNSOP mailing list -- dnsop@ietf.org
> > > To unsubscribe send an email to dnsop-le...@ietf.org

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to