summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc4686.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc4686.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc4686.txt')
-rw-r--r--doc/rfc/rfc4686.txt1627
1 files changed, 1627 insertions, 0 deletions
diff --git a/doc/rfc/rfc4686.txt b/doc/rfc/rfc4686.txt
new file mode 100644
index 0000000..fb9ee5e
--- /dev/null
+++ b/doc/rfc/rfc4686.txt
@@ -0,0 +1,1627 @@
+
+
+
+
+
+
+Network Working Group J. Fenton
+Request for Comments: 4686 Cisco Systems, Inc.
+Category: Informational September 2006
+
+
+ Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)
+
+Status of This Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (2006).
+
+Abstract
+
+ This document provides an analysis of some threats against Internet
+ mail that are intended to be addressed by signature-based mail
+ authentication, in particular DomainKeys Identified Mail. It
+ discusses the nature and location of the bad actors, what their
+ capabilities are, and what they intend to accomplish via their
+ attacks.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Fenton Informational [Page 1]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+Table of Contents
+
+ 1. Introduction ....................................................3
+ 1.1. Terminology and Model ......................................3
+ 1.2. Document Structure .........................................5
+ 2. The Bad Actors ..................................................6
+ 2.1. Characteristics ............................................6
+ 2.2. Capabilities ...............................................6
+ 2.3. Location ...................................................8
+ 2.3.1. Externally-Located Bad Actors .......................8
+ 2.3.2. Within Claimed Originator's Administrative Unit .....8
+ 2.3.3. Within Recipient's Administrative Unit ..............9
+ 3. Representative Bad Acts .........................................9
+ 3.1. Use of Arbitrary Identities ................................9
+ 3.2. Use of Specific Identities ................................10
+ 3.2.1. Exploitation of Social Relationships ...............10
+ 3.2.2. Identity-Related Fraud .............................11
+ 3.2.3. Reputation Attacks .................................11
+ 3.2.4. Reflection Attacks .................................11
+ 4. Attacks on Message Signing .....................................12
+ 4.1. Attacks against Message Signatures ........................12
+ 4.1.1. Theft of Private Key for Domain ....................13
+ 4.1.2. Theft of Delegated Private Key .....................13
+ 4.1.3. Private Key Recovery via Side Channel Attack .......14
+ 4.1.4. Chosen Message Replay ..............................14
+ 4.1.5. Signed Message Replay ..............................16
+ 4.1.6. Denial-of-Service Attack against Verifier ..........16
+ 4.1.7. Denial-of-Service Attack against Key Service .......17
+ 4.1.8. Canonicalization Abuse .............................17
+ 4.1.9. Body Length Limit Abuse ............................17
+ 4.1.10. Use of Revoked Key ................................18
+ 4.1.11. Compromise of Key Server ..........................18
+ 4.1.12. Falsification of Key Service Replies ..............19
+ 4.1.13. Publication of Malformed Key Records
+ and/or Signatures .................................19
+ 4.1.14. Cryptographic Weaknesses in Signature Generation ..20
+ 4.1.15. Display Name Abuse ................................21
+ 4.1.16. Compromised System within Originator's Network ....21
+ 4.1.17. Verification Probe Attack .........................21
+ 4.1.18. Key Publication by Higher-Level Domain ............22
+ 4.2. Attacks against Message Signing Practices .................23
+ 4.2.1. Look-Alike Domain Names ............................23
+ 4.2.2. Internationalized Domain Name Abuse ................23
+ 4.2.3. Denial-of-Service Attack against Signing
+ Practices ..........................................24
+ 4.2.4. Use of Multiple From Addresses .....................24
+ 4.2.5. Abuse of Third-Party Signatures ....................24
+ 4.2.6. Falsification of Sender Signing Practices Replies ..25
+
+
+
+Fenton Informational [Page 2]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+ 4.3. Other Attacks .............................................25
+ 4.3.1. Packet Amplification Attacks via DNS ...............25
+ 5. Derived Requirements ...........................................26
+ 6. Security Considerations ........................................26
+ 7. Informative References .........................................27
+ Appendix A. Acknowledgements ......................................28
+
+1. Introduction
+
+ The DomainKeys Identified Mail (DKIM) protocol is being specified by
+ the IETF DKIM Working Group. The DKIM protocol defines a mechanism
+ by which email messages can be cryptographically signed, permitting a
+ signing domain to claim responsibility for the use of a given email
+ address. Message recipients can verify the signature by querying the
+ signer's domain directly to retrieve the appropriate public key, and
+ thereby confirm that the message was attested to by a party in
+ possession of the private key for the signing domain. This document
+ addresses threats relative to two works in progress by the DKIM
+ Working Group, the DKIM signature specification [DKIM-BASE] and DKIM
+ Sender Signing Practices [DKIM-SSP].
+
+ Once the attesting party or parties have been established, the
+ recipient may evaluate the message in the context of additional
+ information such as locally-maintained whitelists, shared reputation
+ services, and/or third-party accreditation. The description of these
+ mechanisms is outside the scope of the IETF DKIM Working Group
+ effort. By applying a signature, a good player enables a verifier to
+ associate a positive reputation with the message, in hopes that it
+ will receive preferential treatment by the recipient.
+
+ This effort is not intended to address threats associated with
+ message confidentiality nor does it intend to provide a long-term
+ archival signature.
+
+1.1. Terminology and Model
+
+ An administrative unit (AU) is the portion of the path of an email
+ message that is under common administration. The originator and
+ recipient typically develop trust relationships with the
+ administrative units that send and receive their email, respectively,
+ to perform the signing and verification of their messages.
+
+ The origin address is the address on an email message, typically the
+ RFC 2822 From: address, which is associated with the alleged author
+ of the message and is displayed by the recipient's Mail User Agent
+ (MUA) as the source of the message.
+
+
+
+
+
+Fenton Informational [Page 3]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+ The following diagram illustrates a typical usage flowchart for DKIM:
+
+ +---------------------------------+
+ | SIGNATURE CREATION |
+ | (Originating or Relaying AU) |
+ | |
+ | Sign (Message, Domain, Key) |
+ | |
+ +---------------------------------+
+ | - Message (Domain, Key)
+ |
+ [Internet]
+ |
+ V
+ +---------------------------------+
+ +-----------+ | SIGNATURE VERIFICATION |
+ | | | (Relaying or Delivering AU) |
+ | KEY | | |
+ | QUERY +--->| Verify (Message, Domain, Key) |
+ | | | |
+ +-----------+ +----------------+----------------+
+ | - Verified Domain
+ +-----------+ V - [Report]
+ | SENDER | +----------------+----------------+
+ | SIGNING | | |
+ | PRACTICES +--->| SIGNER EVALUATION |
+ | QUERY | | |
+ | | +---------------------------------+
+ +-----------+
+
+ DKIM operates entirely on the content (body and selected header
+ fields) of the message, as defined in RFC 2822 [RFC2822]. The
+ transmission of messages via SMTP, defined in RFC 2821 [RFC2821], and
+ such elements as the envelope-from and envelope-to addresses and the
+ HELO domain are not relevant to DKIM verification. This is an
+ intentional decision made to allow verification of messages via
+ protocols other than SMTP, such as POP [RFC1939] and IMAP [RFC3501]
+ which an MUA acting as a verifier might use.
+
+ The Sender Signing Practices Query referred to in the diagram above
+ is a means by which the verifier can query the alleged author's
+ domain to determine their practices for signing messages, which in
+ turn may influence their evaluation of the message. If, for example,
+ a message arrives without any valid signatures, and the alleged
+ author's domain advertises that they sign all messages, the verifier
+ might handle that message differently than if a signature was not
+ necessarily to be expected.
+
+
+
+
+Fenton Informational [Page 4]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+1.2. Document Structure
+
+ The remainder of this document describes the problems that DKIM might
+ be expected to address, and the extent to which it may be successful
+ in so doing. These are described in terms of the potential bad
+ actors, their capabilities and location in the network, and the bad
+ acts that they might wish to commit.
+
+ This is followed by a description of postulated attacks on DKIM
+ message signing and on the use of Sender Signing Practices to assist
+ in the treatment of unsigned messages. A list of derived
+ requirements is also presented, which is intended to guide the DKIM
+ design and review process.
+
+ The sections dealing with attacks on DKIM each begin with a table
+ summarizing the postulated attacks in each category along with their
+ expected impact and likelihood. The following definitions were used
+ as rough criteria for scoring the attacks:
+
+ Impact:
+
+ High: Affects the verification of messages from an entire domain
+ or multiple domains
+
+ Medium: Affects the verification of messages from specific users,
+ Mail Transfer Agents (MTAs), and/or bounded time periods
+
+ Low: Affects the verification of isolated individual messages
+ only
+
+ Likelihood:
+
+ High: All email users should expect this attack on a frequent
+ basis
+
+ Medium: Email users should expect this attack occasionally;
+ frequently for a few users
+
+ Low: Attack is expected to be rare and/or very infrequent
+
+
+
+
+
+
+
+
+
+
+
+
+Fenton Informational [Page 5]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+2. The Bad Actors
+
+2.1. Characteristics
+
+ The problem space being addressed by DKIM is characterized by a wide
+ range of attackers in terms of motivation, sophistication, and
+ capabilities.
+
+ At the low end of the spectrum are bad actors who may simply send
+ email, perhaps using one of many commercially available tools, that
+ the recipient does not want to receive. These tools typically allow
+ one to falsify the origin address of messages, and may, in the
+ future, be capable of generating message signatures as well.
+
+ At the next tier are what would be considered "professional" senders
+ of unwanted email. These attackers would deploy specific
+ infrastructure, including Mail Transfer Agents (MTAs), registered
+ domains and networks of compromised computers ("zombies") to send
+ messages, and in some cases to harvest addresses to which to send.
+ These senders often operate as commercial enterprises and send
+ messages on behalf of third parties.
+
+ The most sophisticated and financially-motivated senders of messages
+ are those who stand to receive substantial financial benefit, such as
+ from an email-based fraud scheme. These attackers can be expected to
+ employ all of the above mechanisms and additionally may attack the
+ Internet infrastructure itself, including DNS cache-poisoning attacks
+ and IP routing attacks.
+
+2.2. Capabilities
+
+ In general, the bad actors described above should be expected to have
+ access to the following:
+
+ 1. An extensive corpus of messages from domains they might wish to
+ impersonate
+
+ 2. Knowledge of the business aims and model for domains they might
+ wish to impersonate
+
+ 3. Access to public keys and associated authorization records
+ associated with the domain
+
+ and the ability to do at least some of the following:
+
+ 1. Submit messages to MTAs and Message Submission Agents (MSAs) at
+ multiple locations in the Internet
+
+
+
+
+Fenton Informational [Page 6]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+ 2. Construct arbitrary message header fields, including those
+ claiming to be mailing lists, resenders, and other mail agents
+
+ 3. Sign messages on behalf of domains under their control
+
+ 4. Generate substantial numbers of either unsigned or apparently-
+ signed messages that might be used to attempt a denial-of-service
+ attack
+
+ 5. Resend messages that may have been previously signed by the
+ domain
+
+ 6. Transmit messages using any envelope information desired
+
+ 7. Act as an authorized submitter for messages from a compromised
+ computer
+
+ As noted above, certain classes of bad actors may have substantial
+ financial motivation for their activities, and therefore should be
+ expected to have more capabilities at their disposal. These include:
+
+ 1. Manipulation of IP routing. This could be used to submit
+ messages from specific IP addresses or difficult-to-trace
+ addresses, or to cause diversion of messages to a specific
+ domain.
+
+ 2. Limited influence over portions of DNS using mechanisms such as
+ cache poisoning. This might be used to influence message routing
+ or to falsify advertisements of DNS-based keys or signing
+ practices.
+
+ 3. Access to significant computing resources, for example, through
+ the conscription of worm-infected "zombie" computers. This could
+ allow the bad actor to perform various types of brute-force
+ attacks.
+
+ 4. Ability to eavesdrop on existing traffic, perhaps from a wireless
+ network.
+
+ Either of the first two of these mechanisms could be used to allow
+ the bad actor to function as a man-in-the-middle between author and
+ recipient, if that attack is useful.
+
+
+
+
+
+
+
+
+
+Fenton Informational [Page 7]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+2.3. Location
+
+ Bad actors or their proxies can be located anywhere in the Internet.
+ Certain attacks are possible primarily within the administrative unit
+ of the claimed originator and/or recipient domain have capabilities
+ beyond those elsewhere, as described in the below sections. Bad
+ actors can also collude by acting from multiple locations (a
+ "distributed bad actor").
+
+ It should also be noted that with the use of "zombies" and other
+ proxies, externally-located bad actors may gain some of the
+ capabilities of being located within the claimed originator's or
+ recipient's administrative unit. This emphasizes the importance of
+ appropriate security measures, such as authenticated submission of
+ messages, even within administrative units.
+
+2.3.1. Externally-Located Bad Actors
+
+ DKIM focuses primarily on bad actors located outside of the
+ administrative units of the claimed originator and the recipient.
+ These administrative units frequently correspond to the protected
+ portions of the network adjacent to the originator and recipient. It
+ is in this area that the trust relationships required for
+ authenticated message submission do not exist and do not scale
+ adequately to be practical. Conversely, within these administrative
+ units, there are other mechanisms such as authenticated message
+ submission that are easier to deploy and more likely to be used than
+ DKIM.
+
+ External bad actors are usually attempting to exploit the "any to
+ any" nature of email that motivates most recipient MTAs to accept
+ messages from anywhere for delivery to their local domain. They may
+ generate messages without signatures, with incorrect signatures, or
+ with correct signatures from domains with little traceability. They
+ may also pose as mailing lists, greeting cards, or other agents that
+ legitimately send or resend messages on behalf of others.
+
+2.3.2. Within Claimed Originator's Administrative Unit
+
+ Bad actors in the form of rogue or unauthorized users or malware-
+ infected computers can exist within the administrative unit
+ corresponding to a message's origin address. Since the submission of
+ messages in this area generally occurs prior to the application of a
+ message signature, DKIM is not directly effective against these bad
+ actors. Defense against these bad actors is dependent upon other
+ means, such as proper use of firewalls, and Message Submission Agents
+ that are configured to authenticate the author.
+
+
+
+
+Fenton Informational [Page 8]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+ In the special case where the administrative unit is non-contiguous
+ (e.g., a company that communicates between branches over the external
+ Internet), DKIM signatures can be used to distinguish between
+ legitimate externally-originated messages and attempts to spoof
+ addresses in the local domain.
+
+2.3.3. Within Recipient's Administrative Unit
+
+ Bad actors may also exist within the administrative unit of the
+ message recipient. These bad actors may attempt to exploit the trust
+ relationships that exist within the unit. Since messages will
+ typically only have undergone DKIM verification at the administrative
+ unit boundary, DKIM is not effective against messages submitted in
+ this area.
+
+ For example, the bad actor may attempt to spoof a header field
+ indicating the results of verification. This header field would
+ normally be added by the verifier, which would also detect spoofed
+ header fields on messages it was attempting to verify. This could be
+ used to falsely indicate that the message was authenticated
+ successfully.
+
+ As in the originator case, these bad actors can be dealt with by
+ controlling the submission of messages within the administrative
+ unit. Since DKIM permits verification to occur anywhere within the
+ recipient's administrative unit, these threats can also be minimized
+ by moving verification closer to the recipient, such as at the Mail
+ Delivery Agent (MDA), or on the recipient's MUA itself.
+
+3. Representative Bad Acts
+
+ One of the most fundamental bad acts being attempted is the delivery
+ of messages that are not intended to have been sent by the alleged
+ originating domain. As described above, these messages might merely
+ be unwanted by the recipient, or might be part of a confidence scheme
+ or a delivery vector for malware.
+
+3.1. Use of Arbitrary Identities
+
+ This class of bad acts includes the sending of messages that aim to
+ obscure the identity of the actual author. In some cases, the actual
+ sender might be the bad actor, or in other cases might be a third-
+ party under the control of the bad actor (e.g., a compromised
+ computer).
+
+ Particularly when coupled with sender signing practices that indicate
+ the domain owner signs all messages, DKIM can be effective in
+ mitigating against the abuse of addresses not controlled by bad
+
+
+
+Fenton Informational [Page 9]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+ actors. DKIM is not effective against the use of addresses
+ controlled by bad actors. In other words, the presence of a valid
+ DKIM signature does not guarantee that the signer is not a bad actor.
+ It also does not guarantee the accountability of the signer, since
+ DKIM does not attempt to identify the signer individually, but rather
+ identifies the domain that they control. Accreditation and
+ reputation systems and locally-maintained whitelists and blacklists
+ can be used to enhance the accountability of DKIM-verified addresses
+ and/or the likelihood that signed messages are desirable.
+
+3.2. Use of Specific Identities
+
+ A second major class of bad acts involves the assertion of specific
+ identities in email.
+
+ Note that some bad acts involving specific identities can sometimes
+ be accomplished, although perhaps less effectively, with similar
+ looking identities that mislead some recipients. For example, if the
+ bad actor is able to control the domain "examp1e.com" (note the "one"
+ between the p and e), they might be able to convince some recipients
+ that a message from admin@examp1e.com is really from
+ admin@example.com. Similar types of attacks using internationalized
+ domain names have been hypothesized where it could be very difficult
+ to see character differences in popular typefaces. Similarly, if
+ example2.com was controlled by a bad actor, the bad actor could sign
+ messages from bigbank.example2.com, which might also mislead some
+ recipients. To the extent that these domains are controlled by bad
+ actors, DKIM is not effective against these attacks, although it
+ could support the ability of reputation and/or accreditation systems
+ to aid the user in identifying them.
+
+ DKIM is effective against the use of specific identities only when
+ there is an expectation that such messages will, in fact, be signed.
+ The primary means for establishing this is the use of Sender Signing
+ Practices (SSP), which will be specified by the IETF DKIM Working
+ Group.
+
+3.2.1. Exploitation of Social Relationships
+
+ One reason for asserting a specific origin address is to encourage a
+ recipient to read and act on particular email messages by appearing
+ to be an acquaintance or previous correspondent that the recipient
+ might trust. This tactic has been used by email-propagated malware
+ that mail themselves to addresses in the infected host's address
+ book. In this case, however, the author's address may not be
+ falsified, so DKIM would not be effective in defending against this
+ act.
+
+
+
+
+Fenton Informational [Page 10]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+ It is also possible for address books to be harvested and used by an
+ attacker to post messages from elsewhere. DKIM could be effective in
+ mitigating these acts by limiting the scope of origin addresses for
+ which a valid signature can be obtained when sending the messages
+ from other locations.
+
+3.2.2. Identity-Related Fraud
+
+ Bad acts related to email-based fraud often, but not always, involve
+ the transmission of messages using specific origin addresses of other
+ entities as part of the fraud scheme. The use of a specific address
+ of origin sometimes contributes to the success of the fraud by
+ helping convince the recipient that the message was actually sent by
+ the alleged author.
+
+ To the extent that the success of the fraud depends on or is enhanced
+ by the use of a specific origin address, the bad actor may have
+ significant financial motivation and resources to circumvent any
+ measures taken to protect specific addresses from unauthorized use.
+
+ When signatures are verified by or for the recipient, DKIM is
+ effective in defending against the fraudulent use of origin addresses
+ on signed messages. When the published sender signing practices of
+ the origin address indicate that all messages from that address
+ should be signed, DKIM further mitigates against the attempted
+ fraudulent use of the origin address on unsigned messages.
+
+3.2.3. Reputation Attacks
+
+ Another motivation for using a specific origin address in a message
+ is to harm the reputation of another, commonly referred to as a
+ "joe-job". For example, a commercial entity might wish to harm the
+ reputation of a competitor, perhaps by sending unsolicited bulk email
+ on behalf of that competitor. It is for this reason that reputation
+ systems must be based on an identity that is, in practice, fairly
+ reliable.
+
+3.2.4. Reflection Attacks
+
+ A commonly-used tactic by some bad actors is the indirect
+ transmission of messages by intentionally mis-addressing the message
+ and causing it to be "bounced", or sent to the return address (RFC
+ 2821 envelope-from address) on the message. In this case, the
+ specific identity asserted in the email is that of the actual target
+ of the message, to whom the message is "returned".
+
+ DKIM does not, in general, attempt to validate the RFC2821.mailfrom
+ return address on messages, either directly (noting that the mailfrom
+
+
+
+Fenton Informational [Page 11]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+ address is an element of the SMTP protocol, and not the message
+ content on which DKIM operates), or via the optional Return-Path
+ header field. Furthermore, as is noted in Section 4.4 of RFC 2821
+ [RFC2821], it is common and useful practice for a message's return
+ path not to correspond to the origin address. For these reasons,
+ DKIM is not effective against reflection attacks.
+
+4. Attacks on Message Signing
+
+ Bad actors can be expected to exploit all of the limitations of
+ message authentication systems. They are also likely to be motivated
+ to degrade the usefulness of message authentication systems in order
+ to hinder their deployment. Both the signature mechanism itself and
+ declarations made regarding use of message signatures (referred to
+ here as Sender Signing Practices or SSP) can be expected to be the
+ target of attacks.
+
+4.1. Attacks against Message Signatures
+
+ The following is a summary of postulated attacks against DKIM
+ signatures:
+
+ +---------------------------------------------+--------+------------+
+ | Attack Name | Impact | Likelihood |
+ +---------------------------------------------+--------+------------+
+ | Theft of private key for domain | High | Low |
+ | Theft of delegated private key | Medium | Medium |
+ | Private key recovery via side channel attack| High | Low |
+ | Chosen message replay | Low | M/H |
+ | Signed message replay | Low | High |
+ | Denial-of-service attack against verifier | High | Medium |
+ | Denial-of-service attack against key service| High | Medium |
+ | Canonicalization abuse | Low | Medium |
+ | Body length limit abuse | Medium | Medium |
+ | Use of revoked key | Medium | Low |
+ | Compromise of key server | High | Low |
+ | Falsification of key service replies | Medium | Medium |
+ | Publication of malformed key records and/or | High | Low |
+ | signatures | | |
+ | Cryptographic weaknesses in signature | High | Low |
+ | generation | | |
+ | Display name abuse | Medium | High |
+ | Compromised system within originator's | High | Medium |
+ | network | | |
+ | Verification probe attack | Medium | Medium |
+ | Key publication by higher-level domain | High | Low |
+ +---------------------------------------------+--------+------------+
+
+
+
+
+Fenton Informational [Page 12]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+4.1.1. Theft of Private Key for Domain
+
+ Message signing technologies such as DKIM are vulnerable to theft of
+ the private keys used to sign messages. This includes "out-of-band"
+ means for this theft, such as burglary, bribery, extortion, and the
+ like, as well as electronic means for such theft, such as a
+ compromise of network and host security around the place where a
+ private key is stored.
+
+ Keys that are valid for all addresses in a domain typically reside in
+ MTAs that should be located in well-protected sites, such as data
+ centers. Various means should be employed for minimizing access to
+ private keys, such as non-existence of commands for displaying their
+ value, although ultimately memory dumps and the like will probably
+ contain the keys. Due to the unattended nature of MTAs, some
+ countermeasures, such as the use of a pass phrase to "unlock" a key,
+ are not practical to use. Other mechanisms, such as the use of
+ dedicated hardware devices that contain the private key and perform
+ the cryptographic signature operation, would be very effective in
+ denying export of the private key to those without physical access to
+ the device. Such devices would almost certainly make the theft of
+ the key visible, so that appropriate action (revocation of the
+ corresponding public key) can be taken should that happen.
+
+4.1.2. Theft of Delegated Private Key
+
+ There are several circumstances where a domain owner will want to
+ delegate the ability to sign messages for the domain to an individual
+ user or a third party associated with an outsourced activity such as
+ a corporate benefits administrator or a marketing campaign. Since
+ these keys may exist on less well-protected devices than the domain's
+ own MTAs, they will in many cases be more susceptible to compromise.
+
+ In order to mitigate this exposure, keys used to sign such messages
+ can be restricted by the domain owner to be valid for signing
+ messages only on behalf of specific addresses in the domain. This
+ maintains protection for the majority of addresses in the domain.
+
+ A related threat is the exploitation of weaknesses in the delegation
+ process itself. This threat can be mitigated through the use of
+ customary precautions against the theft of private keys and the
+ falsification of public keys in transit. For example, the exposure
+ to theft can be minimized if the delegate generates the keypair to be
+ used, and sends the public key to the domain owner. The exposure to
+ falsification (substitution of a different public key) can be reduced
+ if this transmission is signed by the delegate and verified by the
+ domain owner.
+
+
+
+
+Fenton Informational [Page 13]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+4.1.3. Private Key Recovery via Side Channel Attack
+
+ All popular digital signature algorithms are subject to a variety of
+ side channel attacks. The most well-known of these are timing
+ channels [Kocher96], power analysis [Kocher99], and cache timing
+ analysis [Bernstein04]. Most of these attacks require either
+ physical access to the machine or the ability to run processes
+ directly on the target machine. Defending against these attacks is
+ out of scope for DKIM.
+
+ However, remote timing analysis (at least on local area networks) is
+ known to be feasible [Boneh03], particularly in server-type platforms
+ where the attacker can inject traffic that will immediately be
+ subject to the cryptographic operation in question. With enough
+ samples, these techniques can be used to extract private keys even in
+ the face of modest amounts of noise in the timing measurements.
+
+ The three commonly proposed countermeasures against timing analysis
+ are:
+
+ 1. Make the operation run in constant time. This turns out in
+ practice to be rather difficult.
+
+ 2. Make the time independent of the input data. This can be
+ difficult, but see [Boneh03] for more details.
+
+ 3. Use blinding. This is generally considered the best current
+ practice countermeasure, and while not proved generally secure is
+ a countermeasure against known timing attacks. It adds about
+ 2-10% to the cost of the operation and is implemented in many
+ common cryptographic libraries. Unfortunately, Digital Signature
+ Algorithm (DSA) and Elliptic Curve DSA (ECDSA) do not have
+ standard methods though some defenses may exist.
+
+ Note that adding random delays to the operation is only a partial
+ countermeasure. Because the noise is generally uniformly
+ distributed, a large enough number of samples can be used to average
+ it out and extract an accurate timing signal.
+
+4.1.4. Chosen Message Replay
+
+ Chosen message replay refers to the scenario where the attacker
+ creates a message and obtains a signature for it by sending it
+ through an MTA authorized by the originating domain to
+ himself/herself or an accomplice. They then "replay" the signed
+ message by sending it, using different envelope addresses, to a
+ (typically large) number of other recipients.
+
+
+
+
+Fenton Informational [Page 14]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+ Due to the requirement to get an attacker-generated message signed,
+ chosen message replay would most commonly be experienced by consumer
+ ISPs or others offering email accounts to clients, particularly where
+ there is little or no accountability to the account holder (the
+ attacker in this case). One approach to solving this problem is for
+ the domain to only sign email for clients that have passed a vetting
+ process to provide traceability to the message originator in the
+ event of abuse. At present, the low cost of email accounts (zero)
+ does not make it practical for any vetting to occur. It remains to
+ be seen whether this will be the model with signed mail as well, or
+ whether a higher level of trust will be required to obtain an email
+ signature.
+
+ A variation on this attack involves the attacker sending a message
+ with the intent of obtaining a signed reply containing their original
+ message. The reply might come from an innocent user or might be an
+ automatic response such as a "user unknown" bounce message. In some
+ cases, this signed reply message might accomplish the attacker's
+ objectives if replayed. This variation on chosen message replay can
+ be mitigated by limiting the extent to which the original content is
+ quoted in automatic replies, and by the use of complementary
+ mechanisms such as egress content filtering.
+
+ Revocation of the signature or the associated key is a potential
+ countermeasure. However, the rapid pace at which the message might
+ be replayed (especially with an army of "zombie" computers), compared
+ with the time required to detect the attack and implement the
+ revocation, is likely to be problematic. A related problem is the
+ likelihood that domains will use a small number of signing keys for a
+ large number of customers, which is beneficial from a caching
+ standpoint but is likely to result in a great deal of collateral
+ damage (in the form of signature verification failures) should a key
+ be revoked suddenly.
+
+ Signature revocation addresses the collateral damage problem at the
+ expense of significant scaling requirements. At the extreme,
+ verifiers could be required to check for revocation of each signature
+ verified, which would result in very significant transaction rates.
+ An alternative, "revocation identifiers", has been proposed, which
+ would permit revocation on an intermediate level of granularity,
+ perhaps on a per-account basis. Messages containing these
+ identifiers would result in a query to a revocation database, which
+ might be represented in DNS.
+
+ Further study is needed to determine if the benefits from revocation
+ (given the potential speed of a replay attack) outweigh the
+ transactional cost of querying a revocation database.
+
+
+
+
+Fenton Informational [Page 15]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+4.1.5. Signed Message Replay
+
+ Signed message replay refers to the retransmission of already-signed
+ messages to additional recipients beyond those intended by the author
+ or the original poster of the message. The attacker arranges to
+ receive a message from the victim, and then retransmits it intact but
+ with different envelope addresses. This might be done, for example,
+ to make it look like a legitimate sender of messages is sending a
+ large amount of spam. When reputation services are deployed, this
+ could damage the author's reputation or that of the author's domain.
+
+ A larger number of domains are potential victims of signed message
+ replay than chosen message replay because the former does not require
+ the ability for the attacker to send messages from the victim domain.
+ However, the capabilities of the attacker are lower. Unless coupled
+ with another attack such as body length limit abuse, it isn't
+ possible for the attacker to use this, for example, for advertising.
+
+ Many mailing lists, especially those that do not modify the content
+ of the message and signed header fields and hence do not invalidate
+ the signature, engage in a form of signed message replay. The use of
+ body length limits and other mechanisms to enhance the survivability
+ of messages effectively enhances the ability to do so. The only
+ things that distinguish this case from undesirable forms of signed
+ message replay is the intent of the replayer, which cannot be
+ determined by the network.
+
+4.1.6. Denial-of-Service Attack against Verifier
+
+ While it takes some computing resources to sign and verify a
+ signature, it takes negligible computing resources to generate an
+ invalid signature. An attacker could therefore construct a "make
+ work" attack against a verifier, by sending a large number of
+ incorrectly-signed messages to a given verifier, perhaps with
+ multiple signatures each. The motivation might be to make it too
+ expensive to verify messages.
+
+ While this attack is feasible, it can be greatly mitigated by the
+ manner in which the verifier operates. For example, it might decide
+ to accept only a certain number of signatures per message, limit the
+ maximum key size it will accept (to prevent outrageously large
+ signatures from causing unneeded work), and verify signatures in a
+ particular order. The verifier could also maintain state
+ representing the current signature verification failure rate and
+ adopt a defensive posture when attacks may be under way.
+
+
+
+
+
+
+Fenton Informational [Page 16]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+4.1.7. Denial-of-Service Attack against Key Service
+
+ An attacker might also attempt to degrade the availability of an
+ originator's key service, in order to cause that originator's
+ messages to be unverifiable. One way to do this might be to quickly
+ send a large number of messages with signatures that reference a
+ particular key, thereby creating a heavy load on the key server.
+ Other types of DoS attacks on the key server or the network
+ infrastructure serving it are also possible.
+
+ The best defense against this attack is to provide redundant key
+ servers, preferably on geographically-separate parts of the Internet.
+ Caching also helps a great deal, by decreasing the load on
+ authoritative key servers when there are many simultaneous key
+ requests. The use of a key service protocol that minimizes the
+ transactional cost of key lookups is also beneficial. It is noted
+ that the Domain Name System has all these characteristics.
+
+4.1.8. Canonicalization Abuse
+
+ Canonicalization algorithms represent a tradeoff between the survival
+ of the validity of a message signature and the desire not to allow
+ the message to be altered inappropriately. In the past,
+ canonicalization algorithms have been proposed that would have
+ permitted attackers, in some cases, to alter the meaning of a
+ message.
+
+ Message signatures that support multiple canonicalization algorithms
+ give the signer the ability to decide the relative importance of
+ signature survivability and immutability of the signed content. If
+ an unexpected vulnerability appears in a canonicalization algorithm
+ in general use, new algorithms can be deployed, although it will be a
+ slow process because the signer can never be sure which algorithm(s)
+ the verifier supports. For this reason, canonicalization algorithms,
+ like cryptographic algorithms, should undergo a wide and careful
+ review process.
+
+4.1.9. Body Length Limit Abuse
+
+ A body length limit is an optional indication from the signer of how
+ much content has been signed. The verifier can either ignore the
+ limit, verify the specified portion of the message, or truncate the
+ message to the specified portion and verify it. The motivation for
+ this feature is the behavior of many mailing lists that add a
+ trailer, perhaps identifying the list, at the end of messages.
+
+
+
+
+
+
+Fenton Informational [Page 17]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+ When body length limits are used, there is the potential for an
+ attacker to add content to the message. It has been shown that this
+ content, although at the end, can cover desirable content, especially
+ in the case of HTML messages.
+
+ If the body length isn't specified, or if the verifier decides to
+ ignore the limit, body length limits are moot. If the verifier or
+ recipient truncates the message at the signed content, there is no
+ opportunity for the attacker to add anything.
+
+ If the verifier observes body length limits when present, there is
+ the potential that an attacker can make undesired content visible to
+ the recipient. The size of the appended content makes little
+ difference, because it can simply be a URL reference pointing to the
+ actual content. Receiving MUAs can mitigate this threat by, at a
+ minimum, identifying the unsigned content in the message.
+
+4.1.10. Use of Revoked Key
+
+ The benefits obtained by caching of key records opens the possibility
+ that keys that have been revoked may be used for some period of time
+ after their revocation. The best examples of this occur when a
+ holder of a key delegated by the domain administrator must be
+ unexpectedly deauthorized from sending mail on behalf of one or more
+ addresses in the domain.
+
+ The caching of key records is normally short-lived, on the order of
+ hours to days. In many cases, this threat can be mitigated simply by
+ setting a short time-to-live (TTL) for keys not under the domain
+ administrator's direct control (assuming, of course, that control of
+ the TTL value may be specified for each record, as it can with DNS).
+ In some cases, such as the recovery following a stolen private key
+ belonging to one of the domain's MTAs, the possibility of theft and
+ the effort required to revoke the key authorization must be
+ considered when choosing a TTL. The chosen TTL must be long enough
+ to mitigate denial-of-service attacks and provide reasonable
+ transaction efficiency, and no longer.
+
+4.1.11. Compromise of Key Server
+
+ Rather than by attempting to obtain a private key, an attacker might
+ instead focus efforts on the server used to publish public keys for a
+ domain. As in the key theft case, the motive might be to allow the
+ attacker to sign messages on behalf of the domain. This attack
+ provides the attacker with the additional capability to remove
+ legitimate keys from publication, thereby denying the domain the
+ ability for the signatures on its mail to verify correctly.
+
+
+
+
+Fenton Informational [Page 18]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+ In order to limit the ability to sign a message to entities
+ authorized by the owner of a signing domain, a relationship must be
+ established between the signing address and the location from which a
+ public key is obtained to verify the message. DKIM does this by
+ publishing either the public key or a reference to it within the DNS
+ hierarchy of the signing domain. The verifier derives the location
+ from which to retrieve the public key from the signing address or
+ domain. The security of the verification process is therefore
+ dependent on the security of the DNS hierarchy for the signing
+ domain.
+
+ An attacker might successfully compromise the host that is the
+ primary key server for the signing domain, such as the domain's DNS
+ master server. Another approach might be to compromise a higher-
+ level DNS server and change the delegation of name servers for the
+ signing domain to others under the control of the attacker.
+
+ This attack can be mitigated somewhat by independent monitoring to
+ audit the key service. Such auditing of the key service should occur
+ by means of zone transfers rather than queries to the zone's primary
+ server, so that the addition of records to the zone can be detected.
+
+4.1.12. Falsification of Key Service Replies
+
+ Replies from the key service may also be spoofed by a suitably
+ positioned attacker. For DNS, one such way to do this is "cache
+ poisoning", in which the attacker provides unnecessary (and
+ incorrect) additional information in DNS replies, which is cached.
+
+ DNSSEC [RFC4033] is the preferred means of mitigating this threat,
+ but the current uptake rate for DNSSEC is slow enough that one would
+ not like to create a dependency on its deployment. In the case of a
+ cache poisoning attack, the vulnerabilities created by this attack
+ are both localized and of limited duration, although records with
+ relatively long TTL may persist beyond the attack itself.
+
+4.1.13. Publication of Malformed Key Records and/or Signatures
+
+ In this attack, the attacker publishes suitably crafted key records
+ or sends mail with intentionally malformed signatures, in an attempt
+ to confuse the verifier and perhaps disable verification altogether.
+ This attack is really a characteristic of an implementation
+ vulnerability, a buffer overflow or lack of bounds checking, for
+ example, rather than a vulnerability of the signature mechanism
+ itself. This threat is best mitigated by careful implementation and
+ creation of test suites that challenge the verification process.
+
+
+
+
+
+Fenton Informational [Page 19]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+4.1.14. Cryptographic Weaknesses in Signature Generation
+
+ The cryptographic algorithms used to generate mail signatures,
+ specifically the hash algorithm and digital signature generation and
+ verification operations, may over time be subject to mathematical
+ techniques that degrade their security. At this writing, the SHA-1
+ hash algorithm is the subject of extensive mathematical analysis that
+ has considerably lowered the time required to create two messages
+ with the same hash value. This trend can be expected to continue.
+
+ One consequence of a weakness in the hash algorithm is a hash
+ collision attack. Hash collision attacks in message signing systems
+ involve the same person creating two different messages that have the
+ same hash value, where only one of the two messages would normally be
+ signed. The attack is based on the second message inheriting the
+ signature of the first. For DKIM, this means that a sender might
+ create a "good" message and a "bad" message, where some filter at the
+ signing party's site would sign the good message but not the bad
+ message. The attacker gets the good message signed, and then
+ incorporates that signature in the bad message. This scenario is not
+ common, but could happen, for example, at a site that does content
+ analysis on messages before signing them.
+
+ Current known attacks against SHA-1 make this attack extremely
+ difficult to mount, but as attacks improve and computing power
+ becomes more readily available, such an attack could become
+ achievable.
+
+ The message signature system must be designed to support multiple
+ signature and hash algorithms, and the signing domain must be able to
+ specify which algorithms it uses to sign messages. The choice of
+ algorithms must be published in key records, and not only in the
+ signature itself, to ensure that an attacker is not able to create
+ signatures using algorithms weaker than the domain wishes to permit.
+
+ Because the signer and verifier of email do not, in general,
+ communicate directly, negotiation of the algorithms used for signing
+ cannot occur. In other words, a signer has no way of knowing which
+ algorithm(s) a verifier supports or (due to mail forwarding) where
+ the verifier is. For this reason, it is expected that once message
+ signing is widely deployed, algorithm change will occur slowly, and
+ legacy algorithms will need to be supported for a considerable
+ period. Algorithms used for message signatures therefore need to be
+ secure against expected cryptographic developments several years into
+ the future.
+
+
+
+
+
+
+Fenton Informational [Page 20]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+4.1.15. Display Name Abuse
+
+ Message signatures only relate to the address-specification portion
+ of an email address, while some MUAs only display (or some recipients
+ only pay attention to) the display name portion of the address. This
+ inconsistency leads to an attack where the attacker uses a From
+ header field such as:
+
+ From: "Dudley DoRight" <whiplash@example.org>
+
+ In this example, the attacker, whiplash@example.org, can sign the
+ message and still convince some recipients that the message is from
+ Dudley DoRight, who is presumably a trusted individual. Coupled with
+ the use of a throw-away domain or email address, it may be difficult
+ to hold the attacker accountable for using another's display name.
+
+ This is an attack that must be dealt with in the recipient's MUA.
+ One approach is to require that the signer's address specification
+ (and not just the display name) be visible to the recipient.
+
+4.1.16. Compromised System within Originator's Network
+
+ In many cases, MTAs may be configured to accept and sign messages
+ that originate within the topological boundaries of the originator's
+ network (i.e., within a firewall). The increasing use of compromised
+ systems to send email presents a problem for such policies, because
+ the attacker, using a compromised system as a proxy, can generate
+ signed mail at will.
+
+ Several approaches exist for mitigating this attack. The use of
+ authenticated submission, even within the network boundaries, can be
+ used to limit the addresses for which the attacker may obtain a
+ signature. It may also help locate the compromised system that is
+ the source of the messages more quickly. Content analysis of
+ outbound mail to identify undesirable and malicious content, as well
+ as monitoring of the volume of messages being sent by users, may also
+ prevent arbitrary messages from being signed and sent.
+
+4.1.17. Verification Probe Attack
+
+ As noted above, bad actors (attackers) can sign messages on behalf of
+ domains they control. Since they may also control the key service
+ (e.g., the authoritative DNS name servers for the _domainkey
+ subdomain), it is possible for them to observe public key lookups,
+ and their source, when messages are verified.
+
+
+
+
+
+
+Fenton Informational [Page 21]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+ One such attack, which we will refer to as a "verification probe", is
+ to send a message with a DKIM signature to each of many addresses in
+ a mailing list. The messages need not contain valid signatures, and
+ each instance of the message would typically use a different
+ selector. The attacker could then monitor key service requests and
+ determine which selectors had been accessed, and correspondingly
+ which addressees used DKIM verification. This could be used to
+ target future mailings at recipients who do not use DKIM
+ verification, on the premise that these addressees are more likely to
+ act on the message contents.
+
+4.1.18. Key Publication by Higher-Level Domain
+
+ In order to support the ability of a domain to sign for subdomains
+ under its administrative control, DKIM permits the domain of a
+ signature (d= tag) to be any higher-level domain than the signature's
+ address (i= or equivalent). However, since there is no mechanism for
+ determining common administrative control of a subdomain, it is
+ possible for a parent to publish keys that are valid for any domain
+ below them in the DNS hierarchy. In other words, mail from the
+ domain example.anytown.ny.us could be signed using keys published by
+ anytown.ny.us, ny.us, or us, in addition to the domain itself.
+
+ Operation of a domain always requires a trust relationship with
+ higher-level domains. Higher-level domains already have ultimate
+ power over their subdomains: they could change the name server
+ delegation for the domain or disenfranchise it entirely. So it is
+ unlikely that a higher-level domain would intentionally compromise a
+ subdomain in this manner. However, if higher-level domains send mail
+ on their own behalf, they may wish to publish keys at their own
+ level. Higher-level domains must employ special care in the
+ delegation of keys they publish to ensure that any of their
+ subdomains are not compromised by misuse of such keys.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Fenton Informational [Page 22]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+4.2. Attacks against Message Signing Practices
+
+ The following is a summary of postulated attacks against signing
+ practices:
+
+ +---------------------------------------------+--------+------------+
+ | Attack Name | Impact | Likelihood |
+ +---------------------------------------------+--------+------------+
+ | Look-alike domain names | High | High |
+ | Internationalized domain name abuse | High | High |
+ | Denial-of-service attack against signing | Medium | Medium |
+ | practices | | |
+ | Use of multiple From addresses | Low | Medium |
+ | Abuse of third-party signatures | Medium | High |
+ | Falsification of Sender Signing Practices | Medium | Medium |
+ | replies | | |
+ +---------------------------------------------+--------+------------+
+
+4.2.1. Look-Alike Domain Names
+
+ Attackers may attempt to circumvent signing practices of a domain by
+ using a domain name that is close to, but not the same as, the domain
+ with signing practices. For instance, "example.com" might be
+ replaced by "examp1e.com". If the message is not to be signed, DKIM
+ does not require that the domain used actually exist (although other
+ mechanisms may make this a requirement). Services exist to monitor
+ domain registrations to identify potential domain name abuse, but
+ naturally do not identify the use of unregistered domain names.
+
+ A related attack is possible when the MUA does not render the domain
+ name in an easily recognizable format. If, for example, a Chinese
+ domain name is rendered in "punycode" as xn--cjsp26b3obxw7f.com, the
+ unfamiliarity of that representation may enable other domains to more
+ easily be mis-recognized as the expected domain.
+
+ Users that are unfamiliar with internet naming conventions may also
+ mis-recognize certain names. For example, users may confuse
+ online.example.com with online-example.com, the latter of which may
+ have been registered by an attacker.
+
+4.2.2. Internationalized Domain Name Abuse
+
+ Internationalized domain names present a special case of the look-
+ alike domain name attack described above. Due to similarities in the
+ appearance of many Unicode characters, domains (particularly those
+ drawing characters from different groups) may be created that are
+ visually indistinguishable from other, possibly high-value domains.
+ This is discussed in detail in Unicode Technical Report 36 [UTR36].
+
+
+
+Fenton Informational [Page 23]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+ Surveillance of domain registration records may point out some of
+ these, but there are many such similarities. As in the look-alike
+ domain attack above, this technique may also be used to circumvent
+ sender signing practices of other domains.
+
+4.2.3. Denial-of-Service Attack against Signing Practices
+
+ Just as the publication of public keys by a domain can be impacted by
+ an attacker, so can the publication of Sender Signing Practices (SSP)
+ by a domain. In the case of SSP, the transmission of large amounts
+ of unsigned mail purporting to come from the domain can result in a
+ heavy transaction load requesting the SSP record. More general DoS
+ attacks against the servers providing the SSP records are possible as
+ well. This is of particular concern since the default signing
+ practices are "we don't sign everything", which means that SSP
+ failures result in the verifier's failure to heed more stringent
+ signing practices.
+
+ As with defense against DoS attacks for key servers, the best defense
+ against this attack is to provide redundant servers, preferably on
+ geographically-separate parts of the Internet. Caching again helps a
+ great deal, and signing practices should rarely change, so TTL values
+ can be relatively large.
+
+4.2.4. Use of Multiple From Addresses
+
+ Although this usage is never seen by most recipients, RFC 2822
+ [RFC2822] permits the From address to contain multiple address
+ specifications. The lookup of Sender Signing Practices is based on
+ the From address, so if addresses from multiple domains are in the
+ From address, the question arises which signing practices to use. A
+ rule (say, "use the first address") could be specified, but then an
+ attacker could put a throwaway address prior to that of a high-value
+ domain. It is also possible for SSP to look at all addresses, and
+ choose the most restrictive rule. This is an area in need of further
+ study.
+
+4.2.5. Abuse of Third-Party Signatures
+
+ In a number of situations, including mailing lists, event
+ invitations, and "send this article to a friend" services, the DKIM
+ signature on a message may not come from the originating address
+ domain. For this reason, "third-party" signatures, those attached by
+ the mailing list, invitation service, or news service, frequently
+ need to be regarded as having some validity. Since this effectively
+ makes it possible for any domain to sign any message, a sending
+
+
+
+
+
+Fenton Informational [Page 24]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+ domain may publish sender signing practices stating that it does not
+ use such services, and accordingly that verifiers should view such
+ signatures with suspicion.
+
+ However, the restrictions placed on a domain by publishing "no
+ third-party" signing practices effectively disallows many existing
+ uses of email. For the majority of domains that are unable to adopt
+ these practices, an attacker may with some degree of success sign
+ messages purporting to come from the domain. For this reason,
+ accreditation and reputation services, as well as locally-maintained
+ whitelists and blacklists, will need to play a significant role in
+ evaluating messages that have been signed by third parties.
+
+4.2.6. Falsification of Sender Signing Practices Replies
+
+ In an analogous manner to the falsification of key service replies
+ described in Section 4.1.12, replies to sender signing practices
+ queries can also be falsified. One such attack would be to weaken
+ the signing practices to make unsigned messages allegedly from a
+ given domain appear less suspicious. Another attack on a victim
+ domain that is not signing messages could attempt to make the
+ domain's messages look more suspicious, in order to interfere with
+ the victim's ability to send mail.
+
+ As with the falsification of key service replies, DNSSEC is the
+ preferred means of mitigating this attack. Even in the absence of
+ DNSSEC, vulnerabilities due to cache poisoning are localized.
+
+4.3. Other Attacks
+
+ This section describes attacks against other Internet infrastructure
+ that are enabled by deployment of DKIM. A summary of these
+ postulated attacks is as follows:
+
+ +--------------------------------------+--------+------------+
+ | Attack Name | Impact | Likelihood |
+ +--------------------------------------+--------+------------+
+ | Packet amplification attacks via DNS | N/A | Medium |
+ +--------------------------------------+--------+------------+
+
+4.3.1. Packet Amplification Attacks via DNS
+
+ Recently, there has been an increase in denial-of-service attacks
+ involving the transmission of spoofed UDP DNS requests to openly-
+ accessible domain name servers [US-CERT-DNS]. To the extent that the
+ response from the name server is larger than the request, the name
+ server functions as an amplifier for such an attack.
+
+
+
+
+Fenton Informational [Page 25]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+ DKIM contributes indirectly to this attack by requiring the
+ publication of fairly large DNS records for distributing public keys.
+ The names of these records are also well known, since the record
+ names can be determined by examining properly-signed messages. This
+ attack does not have an impact on DKIM itself. DKIM, however, is not
+ the only application that uses large DNS records, and a DNS-based
+ solution to this problem will likely be required.
+
+5. Derived Requirements
+
+ This section lists requirements for DKIM not explicitly stated in the
+ above discussion. These requirements include:
+
+ The store for key and SSP records must be capable of utilizing
+ multiple geographically-dispersed servers.
+
+ Key and SSP records must be cacheable, either by the verifier
+ requesting them or by other infrastructure.
+
+ The cache time-to-live for key records must be specifiable on a
+ per-record basis.
+
+ The signature algorithm identifier in the message must be one of
+ the ones listed in a key record for the identified domain.
+
+ The algorithm(s) used for message signatures need to be secure
+ against expected cryptographic developments several years in the
+ future.
+
+6. Security Considerations
+
+ This document describes the security threat environment in which
+ DomainKeys Identified Mail (DKIM) is expected to provide some
+ benefit, and it presents a number of attacks relevant to its
+ deployment.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Fenton Informational [Page 26]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+7. Informative References
+
+ [Bernstein04] Bernstein, D., "Cache Timing Attacks on AES",
+ April 2004.
+
+ [Boneh03] Boneh, D. and D. Brumley, "Remote Timing Attacks are
+ Practical", Proc. 12th USENIX Security Symposium,
+ 2003.
+
+ [DKIM-BASE] Allman, E., "DomainKeys Identified Mail (DKIM)
+ Signatures", Work in Progress, August 2006.
+
+ [DKIM-SSP] Allman, E., "DKIM Sender Signing Practices", Work in
+ Progress, August 2006.
+
+ [Kocher96] Kocher, P., "Timing Attacks on Implementations of
+ Diffie-Hellman, RSA, and other Cryptosystems",
+ Advances in Cryptology, pages 104-113, 1996.
+
+ [Kocher99] Kocher, P., Joffe, J., and B. Yun, "Differential Power
+ Analysis: Leaking Secrets", Crypto '99, pages 388-397,
+ 1999.
+
+ [RFC1939] Myers, J. and M. Rose, "Post Office Protocol - Version
+ 3", STD 53, RFC 1939, May 1996.
+
+ [RFC2821] Klensin, J., "Simple Mail Transfer Protocol",
+ RFC 2821, April 2001.
+
+ [RFC2822] Resnick, P., "Internet Message Format", RFC 2822,
+ April 2001.
+
+ [RFC3501] Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL -
+ VERSION 4rev1", RFC 3501, March 2003.
+
+ [RFC4033] Arends, R., Austein, R., Larson, M., Massey, D., and
+ S. Rose, "DNS Security Introduction and Requirements",
+ RFC 4033, March 2005.
+
+ [US-CERT-DNS] US-CERT, "The Continuing Denial of Service Threat
+ Posed by DNS Recursion".
+
+ [UTR36] Davis, M. and M. Suignard, "Unicode Technical Report
+ #36: Unicode Security Considerations", UTR 36,
+ July 2005.
+
+
+
+
+
+
+Fenton Informational [Page 27]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+Appendix A. Acknowledgements
+
+ The author wishes to thank Phillip Hallam-Baker, Eliot Lear, Tony
+ Finch, Dave Crocker, Barry Leiba, Arvel Hathcock, Eric Allman, Jon
+ Callas, Stephen Farrell, Doug Otis, Frank Ellermann, Eric Rescorla,
+ Paul Hoffman, Hector Santos, and numerous others on the ietf-dkim
+ mailing list for valuable suggestions and constructive criticism of
+ earlier versions of this document.
+
+Author's Address
+
+ Jim Fenton
+ Cisco Systems, Inc.
+ MS SJ-9/2
+ 170 W. Tasman Drive
+ San Jose, CA 95134-1706
+ USA
+
+ Phone: +1 408 526 5914
+ EMail: fenton@cisco.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Fenton Informational [Page 28]
+
+RFC 4686 DKIM Threat Analysis September 2006
+
+
+Full Copyright Statement
+
+ Copyright (C) The Internet Society (2006).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
+ ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
+ INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
+ INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at
+ ietf-ipr@ietf.org.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is provided by the IETF
+ Administrative Support Activity (IASA).
+
+
+
+
+
+
+
+Fenton Informational [Page 29]
+