Message Authentication Signature Standards (MASS) BOF. Jim Fenton <fenton@cisco.com> Nathaniel Borenstein <nsb@guppylake.com>



Similar documents
Forging Digital Signatures

Open letter to the Federal Trade Commission

DKIM last chance for mail service? TFMC2 01/2006

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

Network Virtualization Overlays (NVO3)

A Noval Approach for S/MIME

DKIM Enabled Two Factor Authenticated Secure Mail Client

Marketing Glossary of Terms

. Daniel Zappala. CS 460 Computer Networking Brigham Young University

IronPort Authentication

Why should I get someone else to send my campaign when my CRM/IT Team/web host/can do it?

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

DomainKeys Identified Mail (DKIM): Using Digital Signatures for Domain Verification

MULTILINGUILIZATION STANDARD. Wael Nasr Director, I-DNS.Net

Adding digital forensic readiness to electronic communication using a security monitoring tool

to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007

Security. Raj Jain. Washington University in St. Louis

Trust in Begins with Authentication

DomainKeys Identified Mail DKIM authenticates senders, message content

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

Malicious Mitigation Strategy Guide

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam .

Internet Standards. Sam Silberman, Constant Contact

COSC 472 Network Security

BITS SECURITY TOOLKIT:

Collax Mail Server. Howto. This howto describes the setup of a Collax server as mail server.

Security. Michael E. Locasto University of Calgary

Delivery Simplified White Paper

Secured Mail through PGP Mail Gateway

DMA s Authentication Requirement: FAQs and Best Practices

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices

Supplement 113 Transport

SESA Securing with Cisco Security Appliance Parts 1 and 2

SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1

Sonian Getting Started Guide October 2008

International Journal of Computer Trends and Technology- March to April Issue 2011

Evolving threats and counter technology

Spam, Spam and More Spam. Spammers: Cost to send

DomainKeys Identified Mail (DKIM) Service Overview

s and anti-spam Page 1

The What, Why, and How of Authentication

DomainKeys Identified Mail (DKIM): Introduction and Overview. Eric Allman Chief Science Officer Sendmail, Inc.

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

EAI Status. ( Address Internationalization)

e-shot Unique Deliverability

Electronic Mail Security

Access Webmail, Collaboration Tools, and Sync Mobile Devices from Anywhere

Cisco IronPort X1070 Security System

Blackbaud Communication Services Overview of Delivery and FAQs

POP3 Connector for Exchange - Configuration

Electronic Mail Security. Security. is one of the most widely used and regarded network services currently message contents are not secure

Intercept Anti-Spam Quick Start Guide

Exim4U. Server Solution For Unix And Linux Systems

CipherMail Gateway Quick Setup Guide

SCORECARD MARKETING. Find Out How Much You Are Really Getting Out of Your Marketing

Best Practices and Considerations for Financial Institutions

Ciphermail Gateway Administration Guide

Webinar: Reputation Services The first line of defense. July 26, 2005

DNS-based Sender Authentication Mechanisms: a Critical Review

TAG s Security Subgroup Cooperative Security Practices

IronPort X1000 Security System

escan Anti-Spam White Paper

HIPAA: Briefing for Healthcare IT Security Personnel. Market Overview: HIPAA: Privacy Security and Electronic Transaction Standards

The Marketers Guide to Accreditation, Reputation and Authentication Resources

Protect your brand from phishing s by implementing DMARC 1

Instructions Microsoft Outlook Express Page 1

Taxonomy of Security Protocol

Security. Guevara Noubir Network Security Northeastern University

Libra Esva. Whitepaper. Glossary. How Really Works. Security Virtual Appliance. May, It's So Simple...or Is It?

eprism Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

Envelope (SMTP) Journaling for Microsoft Exchange 2007 and 2010

Ciphermail Gateway Administration Guide

Anti-Spam Technical Alliance Technology and Policy Proposal

Djigzo encryption. Djigzo white paper

security

Questionnaire for bulk mailers

Case 2:08-cv ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

Correlation and Phishing

What is a Mail Gateway?... 1 Mail Gateway Setup Peering... 3 Domain Forwarding... 4 External Address Verification... 4

SMTPSWITCH MAILER V6 FEATURES

An Introduction to Secure . Presented by: Addam Schroll IT Security & Privacy Analyst

Security 1 / 43

Marketing Workshop

CHAPTER 2: CASE STUDY SPEAR-PHISHING CAMPAIGN GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Comprehensive Filtering. Whitepaper

Envelope (SMTP) Journaling for Microsoft Exchange 2007 and 2010

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

Analysis One Code Desc. Transaction Amount. Fiscal Period

Post-Send Vetting Techniques... 6 Methodology... 6

APPENDIX D. Two Proxies

Continuous compliance through good governance

FortiMail Filtering Course 221-v2.2 Course Overview

Serial Deployment Quick Start Guide

Anchor s Marketing Glossary and Common Terms

AntiSpam. Administrator Guide and Spam Manager Deployment Guide

Chapter 6 Electronic Mail Security

Options for encrypted communication with AUDI AG Version of: 31 May 2011

Transcription:

Message Authentication Signature Standards (MASS) BOF Jim Fenton <fenton@cisco.com> Nathaniel Borenstein <nsb@guppylake.com>

Agenda Introductions and Agenda Bashing (10 min) Scribe?? Overview of existing signing proposals: (5 min each) Identified Internet Mail DomainKeys E-mail Postmarks Entity-to-entity S/MIME MTA Signatures Bounce Address Tag Validation Proposed WG goals/non-goals (15 min) Proposed WG charter (15 min) Proposed WG Deliverables/Schedule (15 min) Discussion /Summary (30 min)

WG Goals Facilitate automated signing of outgoing messages by any SMTP-initiating entity Provide a reliable basis for classifying messages based on sender address and message signature Minimize required impact on low-end clients Minimize computational and transactional overhead for high-volume email servers Preserve anonymity if desired by the sender Don t break e-mail

WG non-goals Accreditation/reputation Force server or client flag day Determine the intent of an e-mail message Infer anything other than the identity Non-repudiation Message encryption Break e-mail

MASS relationship to MARID MARID: Authorization based on IP address Authorization records stored in DNS Cryptographic approaches out-of-scope MASS: Message authentication based on cryptographic signature Authorization of key (and often key itself) May be stored in DNS May be a separate server

Potential commonalities between MASS and MARID Definition of Purportedly Responsible Address (PRA) Message marking to indicate successful/unsuccessful verification Eventual use of accreditation infrastructure Although what s being accredited may differ

Representative proposals DomainKeys draft-delany-domainkeys-core-00 Identified Internet Mail draft-fenton-identified-mail-00 E-mail Postmarks http://www.lessspam.org/emailpostmarks.pdf Entity-to-entity S/MIME draft-hallambaker-entity-00 MTA Signatures http://www.elan.net/~william/asrg/mta_signatures.html Bounce Address Tag Validation http://brandenburg.com/specifications/draft-crocker-marid-batv-00-06dc.html

DomainKeys See: DK-ietf60.pdf

Identified Internet Mail See: IIM-MASS.pdf

E-mail Postmarks See: EMailPostmarks040805.pdf

Entity-to-Entity S/MIME See: Entity-to-Entity.pdf

MTA Signatures See: IETF60-MTA_Signatures-Brief.pdf

Bounce Address Tag Validation See: Strivers-BATV.pdf

Issues for WG to resolve Signature encapsulation Signatures in headers S/MIME Key management, revocation, duration Canonicalization What s required to avoid signature breakage? Treatment of headers, character sets Behavior through mailing lists

WG Name? MASS Message Authentication Signature Standards STRIVERS Signatures for Transport Recognition of Imposture in Viral Email and Repugnant Spam HUM??

Charter Message recipients need the ability to reliably determine the source of incoming messages as a tool in countering spam and phishing attacks, which are frequently characterized by spoofed return addresses. One approach to this problem is the inclusion of digital signatures in email messages. Past attempts at widespread deployment of digital signatures have met only very limited adoption, and only a small fraction of today s email messages are cryptographically authenticated in any way. Several proposals have recently been published for simple and automatic mechanisms by which outgoing messages may offer limited proof of potentially-verifiable identity. Although there are already more than a few mechanisms for attaching a digital signature to an email message, none meet the particular set of constraints for this problem. The ideal signing mechanism for this problem would: Facilitate automated signing of outgoing messages by any SMTP-initiating entity Minimize computational and transactional overhead for high-volume email servers Permit a high degree of anonymity when desired by the sender

Deliverables In conjunction with responsible WGs, extensions (where required) to SMTP, RFC 2822, and/or MIME that will enable any SMTP-sending entity to: Convey the fact that a cryptographic signature is associated with the message being delivered Convey the identity and public key of the signing entity Identify the precise message contents being signed (notably which headers) Deliver the signature along with the message A mechanism by which a message recipient may verify the public key of an SMTP sender

Strawman Timeline DONE Establishment of mailing list Aug 04 BOF meeting at San Diego IETF. Selection of WG leaders Aug-Oct 04 Requirements formulation Oct 04 Interim meeting. Finalization of requirements Nov 04 Publish signature syntax proposals for discussion Nov 04 WG meeting at Washington IETF Mar 05 Publish first drafts of "consensus" documents Mar 05 WG meeting at IETF conference Apr 05 Publish more drafts of "consensus" documents Jun 05 Publish more drafts of "consensus" documents WG Last Call Jul 05 WG meeting at IETF conference Aug 05 Publication of RFC(s) as Proposed Standard. Aug 06 Publication of RFC(s) as Draft Standard. Aug 07 Publication of RFC(s) as Full Standard.

Mailing List Mailing list: <ietf-mailsig@imc.org> Archive at http://www.imc.org/ietf-mailsig/ Subscribe in the usual way