Sorry, no. From a security standpoint they are identical problems so if you're making an argument against l= then you are also making an argument against anything else that allows you to know how to reconstruct the original signature. The receiver in both cases needs to consider the mutations and whether they are acceptable and potentially consider it the light of who made those mutations and their reputation.

In fact, I would argue that a more complex mutation algebra would be even more dangerous than the simple minded l= which just allows appending content. For example, suppose it allowed in-body changes (eg, ostensibly for MIME changes), evil.com could add a hyperlink to text in the body of the original message:

<a href=evil.com>Click here for free money!</a>

which you can't do with l=.

But the larger point is that if you indict l=, you are indicting any other scheme that allows reconstruction of the original message. Full stop. Receivers in both cases will need to consider any modifications differently and apply scrutiny and reputation to the different parts of the message. To your point of taking ownership of changes, you can already do that with DKIM. The mailing list, for example, can always resign the outgoing message (and should).

The main advantage of the entity making mutations annotating them is they actually know the sort of mutations they are making so they can be much more accurate. Back then, it wasn't reasonable to think that mailing lists would pay any attention to DKIM considerations, so z= and l= were the best I could hope for. I doubt any changes proposed here will be adopted anytime soon either, but at least it would be possible.

Mike

On 1/26/25 9:24 PM, Wei Chuang wrote:
Regarding RFC6376 l= tag, I was hoping that Taavi Eomäe who sometimes posts on this list would answer directly as he and his team wrote a blog post <https://www.zone.eu/blog/2024/05/17/bimi-and-dmarc-cant-save-you/> about the dangerous vulnerability the DKIM body length feature introduces.  As noted in May 2024, the authors found many infrastructurally important senders' emails had DKIM with body length, and with these emails it was possible to completely rewrite the user visible content yet would indicate a DKIM pass.  That result could then indicate a DMARC and BIMI pass as their example illustrated.  On this public list I'm going to leave up to the imagination of the reader what a malicious party could do here with that malicious content, but I would agree with the blog authors that consequences could be rather bad. And like the authors suggest, it isn't just a few confused senders.  While percentages are small, the importance of the senders, presumed sophistication and consequence of spoofing those emails would be surprising to many having looked at the data on who the senders that use this feature are. (see the blog post for examples)  There was a long mail thread <https://mailarchive.ietf.org/arch/browse/ietf-dkim/?q=dkim%20body%20length> on this list (ietf-dkim@) to draw attention to this vulnerability.  Since then a bunch of us in industry have been coming together to make improvements and some of that work is described in draft-gondwana-dkim2-modification-alegbra <https://datatracker.ietf.org/doc/draft-gondwana-dkim2-modification-alegbra/>. There are other ideas too but are waiting for this working group to kick off due to prohibition on technical discussion until then.  The key difference between RFC6376 l= and Bron's draft is that the forwarder making the modification takes ownership of the modification and this provides attribution.  With RFC6376 l=, anyone can make the change without attribution which lets a malicious party slip right in.  A second difference noted by the draft is identifying the changes in a reversible, verifiable way.  A third point is around the suggestion later in this thread about incremental changes to RFC6376 vs a new authentication mechanism.  The problem with incremental changes is that they are inherently optional, and very soon you'll have many combinations of features in use that hurts interop.  And once optional it will take a very long time if at all to go away.   I still see DKIM body length being used yet at a lower rate, having dropped by half after Taavi's May 2024 blog post but some decline after that but definitely not trending towards zero. Fourth, going back to RFC6376 l= tag, the security section <https://datatracker.ietf.org/doc/html/rfc6376#section-8.2> 8.2 "Misuse of Body Length Limits ("l=" Tag)" says to "To avoid this attack, Signers should be extremely wary of using this tag..."   Yet here we are where it's being used despite the vulnerability being known back 2011.  We need a new authentication technique where such obvious footguns aren't possible.
-Wei

On Sat, Jan 25, 2025 at 2:14 PM Michael Thomas <m...@mtcc.com> wrote:


    On 1/25/25 10:10 AM, Richard Clayton wrote:
    > > There are additional needs.  They are new.  Or, at least, they
    were not
    > > previously a priority.  Since they were not needs when DKIM was
    > developed, they
    > > are not 'shortcomings'.
    >
    > they may not have been perceived to be shortcomings then -- they are
    > now, which is why a number of people wish to improve things for the
    > people whose email they handle

    Fwiw, mailing list traversal was always a shortcoming of DKIM from
    the
    very beginning. That some people dismissed it at the time doesn't
    alter
    the fact that it was -- and is -- a shortcoming. Our original
    intent at
    Cisco was to address the internal spear-phishing problem for us, but
    given Cisco's widespread use of mailing lists -- both internal and
    external -- that made it a hard goal to achieve. z= and l= were an
    attempt to be "good enough" on my part even though there was a lot of
    hostility at the time (they actually worked pretty well in practice).
    That's especially true of l= since the objection was that it was
    "insecure", but any new mechanism which records what changes an
    intermediary made has the exact same "insecurity" in that the message
    will differ from the originating signature's signed canonical text
    whose
    changes may or may not be benign. Frankly, that's up for the
    receiver to
    figure out which I think they are capable given spam/scam filters,
    etc
    and the reputation that you can assess from the intermediaries making
    the mutations. I even wrote a patent app about that which I don't
    think
    was issued probably because it was too obvious.

    Mike


    _______________________________________________
    Ietf-dkim mailing list -- ietf-dkim@ietf.org
    To unsubscribe send an email to ietf-dkim-le...@ietf.org
_______________________________________________
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org

Reply via email to