Big Internet Players Propose DMARC Anti-Phishing Protocol 92
judgecorp writes "Google, Microsoft, PayPal, Facebook and others have proposed DMARC, or Domain-based Message Authentication, Reporting and Conformance, an email authentication protocol to combat phishing attacks. Authentication has been proposed before; this group of big names might get it adopted." Adds reader Trailrunner7, "The specification is the product of a collaboration among the large email receivers such as AOL, Gmail, Yahoo Mail and Hotmail, and major email senders such as Facebook, Bank of America and others, all of whom have a vested interest in either knowing which emails are legitimate or being able to prove that their messages are authentic. The DMARC specification is meant to be a policy layer that works in conjunction with existing mail authentication systems such as DKIM (DomainKeys Identified Mail) and SPF (Sender Policy Framework)."
Obligatory (Score:2, Informative)
Had to be done. Someone else can fill it out, I don't have time.
Your post advocates a
( ) technical ( ) legislative ( ) market-based ( ) vigilante
approach to fighting spam. Your idea will not work. Here is why it won't work. (One or more of the following may apply to your particular idea, and it may have other flaws which used to vary from state to state before a bad federal law was passed.)
( ) Spammers can easily use it to harvest email addresses
( ) Mailing lists and other legitimate email uses would be af
Re: (Score:3)
approach to fighting spam
GAME OVER ! The topic is *not* about SPAM, but about make sure it's impossible to forge a fake From (I should write "envelope-from", but you don't seem to be a technical person, so I wont confuse you too much...), when you don't own the domain. This, DKIM and DMARC (and I'd add: with DNSSEC) really can do it now. Please try to understand the topic before writing too much about it and exposing yourself. Maybe also, next time, you'll read the title of the slashdot headline? Because it clearly is about phishin
Comment removed (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
Hmm... You could set her up with the moral equivalent of a "Live CD," i.e. the core OS files are read-only, with maybe a UnionFS-type of writeable store overlaid on top. All her data files would be on normal read-write partitions. Thus, if she infects her machine, all that's required is a reboot. Naturally, installing new software would require administrative intervention, but honestly, other than OS updates, how many times does she need to install something?
You could also put her machine in a DMZ on
Re: (Score:2)
> ... the only way to kill malware would also kill FOSS deader than
> Dixie because you'd have to switch all the users to locked down
> iShiny or Wintabs where they have ZERO rights to do anything
> but what the corps tell them to, and to turn the net into an oversized
> home shopping network. Personally i like having control over my
> machines...
It's not an either/or situation. Apple just had their biggest quarter ever, selling tens of millions of iDevices.... did your personal computers disap
And the downside is? (Score:1)
Re:And the downside is? (Score:4, Funny)
Well, there is a certain minor downside...... [xkcd.com]
Re: (Score:1, Redundant)
The downside is that they're tying it to DNS, which is totally wrong. user1@example.com and user2@example.com are different identities. example.com can't, and shouldn't, be able to attest that something was said by user1.
At most, example.com ought to be able to attest that an email came through their server. That's something, I'll admit, but decades behind the state of the art.
Re: (Score:2)
Re: (Score:2)
Sending from not DKIM/SPF authenticated servers will be somewhat deprecated. Some uses (like mail forwarding) will become a bit more complex, and so the requirements for putting a "working" (by their definition) mail server on internet.
Is not a "think on the children" (at least, not yet), but a "think on all those scammed people around". Some honest mails will become rejected, and some scamming will remain anyway.
With all the multinational unilateral laws coming from US like NDAA, catching scammers/spamme
Re: (Score:2)
Sending from not DKIM/SPF authenticated servers will be somewhat deprecated.
Wake up. IT IS already deprecated. Try for example to send a mail to Yahoo without using DKIM... It's been years it's like that by the way, and there for, it's been years I maintain the dkimproxy package in Debian for that reason...
Why a new protocol? (Score:3)
What's wrong with PGP?
Re: (Score:2)
It's too 'open' and therefore, easily crackable.
Can't tell if trolling or just stupid.
That's true. If it's open, you don't need to crack it since you can take a peek inside and grab whatever the squirrel left over.
Re:Why a new protocol? (Score:5, Insightful)
Because average users have issues with it and they are people this proposal are trying to protect.
If any security is going to happen for average user, it must be forced upon them. Otherwise, "it's too hard"
Re: (Score:2)
Well for one most people (users) don't care and can't be made to???
This is one of those cases where technology is the superior alternative, everybody uses email, and it's :
1. fix the problem
2. train everybody to work around the problem
seems like a fairly simple choice to me.
On that note, this is a lame solution. Imho we need to implement pgp properly on a large scale basis or something like it. DNS has proven unreliable in authentication over the past few decades.
Re: (Score:2)
seems like a fairly simple choice to me.
You honestly believe that a) this will perfectly eliminate all forms of phishing and won't just create an arms race, and b) people who currently fall for these (usually blatantly obvious) phishing scams won't fall for some other trick that will become the new trend when phishing is perfectly eliminated?
You really must enjoy games of whack-a-mole.
Re: (Score:2)
I'm talking about stuff like man in the middle + spyware / malware / virus type stuff. In regards to phishing scams, there's already a decent set of preventive measures like mxlogic and spam black lists. Don't always work, but we don't live in a perfect world, IT even less so. User training is ok at best, we've tried it, a year later we had enough new people where we had to do it again after a couple of incidents. You can't 100% stop it, but if you get 99% your above the curve.
Re: (Score:1)
Yeah good thing the police are always right there preventing those murders that don't happen every single day.
Re: (Score:2)
Yeah good thing the police are always right there preventing those murders that don't happen every single day.
Yeah, and I'll add one thing: we all know that someone using force to murder another person is exactly, precisely, in every conceivable way, just like asking them to trust someone who is not trustworthy and wouldn't pass even the most cursory smell-test.
No, unlike murder, this crime requires the "victim's" active cooperation. Anyone who doesn't recognize that difference is simply not being honest. If GP has to be deceptive to argue against my position, it reinforces my position.
Re: (Score:2)
Yeah good thing the police are always right there preventing those murders that don't happen every single day.
Yeah, and I'll add one thing: we all know that someone using force to murder another person is exactly, precisely, in every conceivable way, just like asking them to trust someone who is not trustworthy and wouldn't pass even the most cursory smell-test. No, unlike murder, this crime requires the "victim's" active cooperation. Anyone who doesn't recognize that difference is simply not being honest. If GP has to be deceptive to argue against my position, it reinforces my position.
NO. most murder victims actively cooperate in their demise by compromising their personal safety in some way, usually as the result of ignorance, laziness, or simple bad judgement. Ditto victims of phishing, who out of ignorance, laziness, or simple bad judgment get hacked. The difference you note is one of degree, not kind.
Re: (Score:2)
It also effectively breaks email if the other side doesn't have it installed, while great for internal communications, creates an administrative nightmare quickly and without fail. You need a real damn good reason to invest the IT cost in PGP, and some have it that use it. This one's not simple to force on the user, you have to understand domains, internet vs intranet, as well as the additional UI steps to begin. PGP is a poor implementation of something that should parallel ssl in it's usage, maybe the
Re: (Score:2)
Re: (Score:2)
Re:Why a new protocol? (Score:4, Insightful)
PGP/gpg is ideal because it sits atop of everything else. However, most people wouldn't be bothered to generate and store securely a private key, much less build a usable WoT and making sure not just just absent-mindedly sign everyone's key that passes by.
I use PGP but... (Score:3)
Users' failure to understand what they are protecting themselves from when they use PGP is the biggest pro
Re: (Score:2)
We already have email authentication (Score:5, Informative)
Sign your emails. The tech has been out there for two decades. Decades, and that's real world time, not "internet time."
Everybody sign your emails, so that email from fuck-knows-who sticks out like a sore thumb. This would strike a great blow to phishing, and spam in general.
And best of all, people don't need new software for it. You don't need a new standard because there are already two competing standards (PGP vs S/MIME) -- why add a third? Just start using what you've already got.
Re:We already have email authentication (Score:5, Insightful)
The problem with PGP/signed-emails is that you're putting the burden on the user. I'm a pretty technical guy, and I don't even want to bother with it. There's no way that the average person it going to take the time to understand and implement PGP.
The proposed solution puts the burden entirely on the system and the providers, so is more likely to be adopted and actually used (and therefore, successful in its end-purpose of stopping phishing attacks).
Re:We already have email authentication (Score:5, Interesting)
There are also issues with PGP and webmail used by probably the majority of home users, as well as the multitude of devices people now have for email.
You need to sync keys between devices securely, and with webmail you pretty much need to have a browser plugin take over the signing part, unless you want to entrust your private key to a third party.
Simply checking mail onan untrusted web terminal then becomes problematic - sure you can read signed but not encrypted email, but if you tell people it's okay to trust that sometimes, they won't bother checking at other times.
Re: (Score:2)
Is there no easy tool that exists that will essentially do this for you? Why isn't there an application that automatically handles all of the PGP stuff on your computer so you don't even have to think about it?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
S/MIME is a compromise in this department. Signed E-mails will show that they are signed properly in Outlook, Thunderbird, and a number of web based E-mail readers.
Of course, the ideal would be PGP/gpg validation of mails automatically because PGP wouldn't rely on CAs, as opposed to a WoT, but it would be better than nothing.
Re:We already have email authentication (Score:5, Interesting)
The problem with PGP/signed-emails is that you're putting the burden on the user.
Okay, I'll bite. (not TOO hard, mind)
So lets use PGP and still put the burden on the ISP / email provider / Facebook / anyone but the user
Lastly if someone savvy enough wants to use their own PGP key they can. Just get it signed by their email provider or some other such proof that they control that email address. PGP has this sort of thign already, very nice! https://keyserver.pgp.com/ [pgp.com]
Bonus points to PGP: since it already has the idea of a web of trust it can be used to GREAT effect. The email client could regognize that you seem to work with this person or email them a lot and ask, "Do you know this person in real life? Do you trust that this email is from them?" and sign keys that way. In this way one could have direct evidence that an email comes from someone that they can trust rather than just Google's big red rubber stamp. How novel!
We could really make this work with popular social media sites like facebook (I'm not a member, but lotsa people are) and show where this person is on your social graph (if they are at all)
So that is how we can use PGP, have it be as good AND BETTER than something new and not make the users do it. Sure there are more than a few flaws in the above but that is the basic outline.
Re: (Score:1)
So, basically, you want an asymmetric algorithm for signing where your provider would store your private key.
Then, to authentify an email, your client would ask the announced server of your contact for the public key.
The server can be authentified by its certificate and the transaction would be secure over ssl.
This way, it would be transparente to the user because all the asymmetric complex part is done by your provider and you trust him thanks to its certificate.
But, wait a minute, remind me what is in the
Re: (Score:1)
Existing protocols are about getting or sending emails. They have nothing about feeding custom settings to client. You also missed two major part of signing emails. User must know private key password and private key must be private as in "available
Re: (Score:2)
The problem with PGP/signed-emails is that you're putting the burden on the user.
How? All these clowns want is for the user to be able to recognize the bank. The bank recognizes the user by password, so as long as the user isn't giving out the password to phishers, the account is secure. The only "hard" part of using GPG with email is maintaining your own identity, but here it's not needed. They just have to make their clients display S/MIME and PGP/MIME and then distribute in a secure way a list of public keys of all their buddies.
But companies like Microsoft want a lot more pie than
Re: (Score:2)
Key management is more of a bitch than it needs be, for sure.
Frankly, I'd rather rely on OpenID providers to authenticate sent e-mails somehow. Nonces, probably.
Oh, I claim prior art on this idea, by the way...
Re: (Score:2)
I used PGP to sign my emails. I stopped because too many people were pissing and whining about "all the extra crap" in my emails and they didn't know what it was for and dammit will you just stop it you're confusing my little brain. Granted, that was a couple of years ago so I don't know if mail clients have gotten smarter about presenting the messages without the PGP signing info (but you can damn well guarantee they know how to render HTML in the client).
Re:We already have email authentication (Score:5, Interesting)
I'm an American studying in Switzerland. I bank with PostFinance, the post office-run financial institution.
Any electronic documents or messages from the bank are digitally signed: PDFs are signed and time-stamped using the built-in PDF signature methods. Emails, even the general informative newsletter containing no account-related information at all, are signed with S/MIME. Any account related communications take place using the internal messaging system on their secure website (which requires the user have access to their bank-issued smartcard and offline calculator-like challenge-response device). The instructions that came with the bank card and calculator device make it very clear how to verify that one is actually on the bank's website.
It's trivial to verify that documents and emails are actually issued by the bank, and the login method for the bank's website makes phishing much more difficult.
Compared to USAA, one of the more clueful US banks, this is excellent. Emails from USAA have the last four digits of the account number in the top-right of the message so as to "authenticate" that the message came from the bank. Of course, this is trivial to reproduce and offers no real validation. It's a shame, really.
If more banks (and indeed, more senders in general) signed their messages, that'd be a major improvement. If the big webmail providers (Gmail, Yahoo, and Hotmail) verified S/MIME signatures and displayed a suitable indicator to users, that'd be even better.
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3)
Here is how the conversation usually goes, assuming that you get as far as convincing them that signing is something worth the time to do:
Cry
Re:We already have email authentication (Score:4, Interesting)
You're way behind the times. Go read up on email authentication and DKIM. You will find that a significant fraction of all email on the internet is being signed automatically - that is how DKIM works. The difference is, it's signed with the email providers keys instead of the users keys. But this is good enough to stop phishing because if an email claims to be from info@paypal.com or sloppy@gmail.com, the signature proves it came from PayPal or Gmail and you can then trust that they won't sign such mail unless it really did come from that address.
DMARC solves a problem that real world DKIM deployments have - merely signing your mail is not enough. You need to tell people what to do if signature checks fail. And you need a way to learn about failing signature checks, because large organizations often have incredibly complex mail streams, including mail they know nothing about because some random guerilla marketing team contracted a third party provider and told them to send as "campaign@foo.com", even though it's not being sent via foo.coms servers. This has made real deployments of DKIM quite tricky and ad-hoc affairs. DMARC will standardize this and make deployment feasible even for smaller organizations.
DKIM has other problems, like the number of mail relays that think it's OK to modify mail in transit whilst claiming it comes from the original sender, but those are all issues you get with retrofitting digital signatures onto an existing infrastructure./p
Re: (Score:3)
DMARC solves a problem that real world DKIM deployments have - merely signing your mail is not enough. You need to tell people what to do if signature checks fail.
Note only that. With DKIM, when you receive a mail, basically, its header are telling that the mail is signed, and that you can go ahead and check the DNS for the key. But if there's no such thing in the email, then no further check will be made. With DMARC, you will finally have a way to tell if a domain requires DKIM or SPF checks, which wasn't in the specs before.
some random guerilla marketing team contracted a third party provider and told them to send as "campaign@foo.com", even though it's not being sent via foo.coms servers
DMARC will force M. marketing to send his emails correctly, because now it's going to be really impossible to send emails without the foo.fr se
Re: (Score:2)
As an experiment (and desire to use it) I tried signing my emails, but I got a LOT of complaints from people using Microsoft Outlook etc. What MS email package did was just append the text code of the signature to the email, making it look very long, and full of nonsense text. Other packages understood what to do and just displayed the email as normal, with a padlock which you could click to read the signature.
I haven't used a signature since as too many use Microsoft Outlook... although maybe it has been f
Re: (Score:2)
Re: (Score:2)
Where is that fixed font check box post? (Score:3)
Re: (Score:2)
Wonder what happened to him.
Looks like he beat you to it.
http://yro.slashdot.org/comments.pl?sid=2645355&cid=38866049 [slashdot.org]
Re: (Score:2)
That checklist is for address spam, not phishing
Here is it if you want to try adapting from it: http://craphound.com/spamsolutions.txt [craphound.com]
Re:Where is that fixed font check box post? (Score:5, Funny)
Re:Where is that fixed font check box post? (Score:4, Funny)
http://www.youtube.com/watch?v=7mUC-262Xr4 [youtube.com]
Re: (Score:2)
LOL, you just beat him by one comment! Scroll down...
You're proposing (Score:5, Funny)
Your post advocates a
(x) technical ( ) legislative (x) market-based ( ) vigilante
approach to fighting spam. Your idea will not work. Here is why it won't work. (One or more of the following may apply to your particular idea, and it may have other flaws which used to vary from state to state before a bad federal law was passed.)
( ) Spammers can easily use it to harvest email addresses
(x) Mailing lists and other legitimate email uses would be affected
( ) No one will be able to find the guy or collect the money
( ) It is defenseless against brute force attacks
( ) It will stop spam for two weeks and then we'll be stuck with it
( ) Users of email will not put up with it
( ) Microsoft will not put up with it
( ) The police will not put up with it
( ) Requires too much cooperation from spammers
(x) Requires immediate total cooperation from everybody at once
(x) Many email users cannot afford to lose business or alienate potential employers
( ) Spammers don't care about invalid addresses in their lists
( ) Anyone could anonymously destroy anyone else's career or business
Specifically, your plan fails to account for
( ) Laws expressly prohibiting it
(x) Lack of centrally controlling authority for email
( ) Open relays in foreign countries
( ) Ease of searching tiny alphanumeric address space of all email addresses
(x) Asshats
( ) Jurisdictional problems
( ) Unpopularity of weird new taxes
( ) Public reluctance to accept weird new forms of money
(x) Huge existing software investment in SMTP
( ) Susceptibility of protocols other than SMTP to attack
( ) Willingness of users to install OS patches received by email
(x) Armies of worm riddled broadband-connected Windows boxes
( ) Eternal arms race involved in all filtering approaches
( ) Extreme profitability of spam
(x) Joe jobs and/or identity theft
( ) Technically illiterate politicians
(x) Extreme stupidity on the part of people who do business with spammers
(x) Dishonesty on the part of spammers themselves
( ) Bandwidth costs that are unaffected by client filtering
( ) Outlook
and the following philosophical objections may also apply:
(x) Ideas similar to yours are easy to come up with, yet none have ever
been shown practical
( ) Any scheme based on opt-out is unacceptable
( ) SMTP headers should not be the subject of legislation
( ) Blacklists suck
( ) Whitelists suck
( ) We should be able to talk about Viagra without being censored
( ) Countermeasures should not involve wire fraud or credit card fraud
( ) Countermeasures should not involve sabotage of public networks
(x) Countermeasures must work if phased in gradually
( ) Sending email should be free
(x) Why should we have to trust you and your servers?
(x) Incompatiblity with open source or open source licenses
( ) Feel-good measures do nothing to solve the problem
( ) Temporary/one-time email addresses are cumbersome
( ) I don't want the government reading my email
( ) Killing them that way is not slow and painful enough
Furthermore, this is what I think about you:
( ) Sorry dude, but I don't think it would work.
(x) This is a stupid idea, and you're a stupid person for suggesting it.
( ) Nice try, assh0le! I'm going to find out where you live and burn your
house down!
Re: (Score:2)
Still have to fight layers of stupidity (Score:5, Interesting)
Random fun fact: Yahoo uses something domain keys to authenticate their email. I can send myself a short message (like, just a URL) and it winds up in my spam folder.
Yeah... (Score:3)
"Spam will be a thing of the past in two years' time."
Darmok? (Score:2)
Re: (Score:2)
I think that spam is sovled by the 24th Century. That, and it looks like email is out too.
Why can't free mail services PGP-sign everything? (Score:2)
Re: (Score:2)
$origin _domainkey.example.com.
postfix TXT "k=rsa\;p=an-rsa-key-that-slashdot-dont-let-me-post"
would simply be trust-able. So, DKIM + DMARC + DNSSEC == authenticated From: domain. If you need the user@ part
um... (Score:2, Interesting)
To me, this just seems like an attempt by big spammers to eliminate little spammers.
Re:um... (Score:5, Informative)
The majority of your spam SAYS it comes from [insert provider here]. This is intended to stop that.
USEPO (Score:2)
Re: (Score:1)
Re: (Score:2)
What exactly does this do to stop all of that spam
It's not an anti-spam tool, so you are right: nothing. But ...
or that the spam didn't come from Yahoo when it most clearly did?
... DMARC does something for that.
How does this stop phishing? (Score:2)
User-Level DKIM Verification (Score:2)
About a year ago, when I was trying to figure out why notices from BofA were crashing my Moto RAZR, I did a little reading up on DKIM, and found it rather interesting. What I found even more interesting is that all the DKIM support I could locate operated at the MTA level (sendmail, postfix, etc.). I couldn't find any client-side tools that would verify DKIM signatures.
Has this situation changed (or did I miss something)? Are there any tools I could plug in to, say, 'mutt' to verify DKIM signatures?
Sc