Open jorritfolmer opened 6 years ago
I believe this processor should not be the primary location to combat most denial-of-service, false reports, or malformed reports. Addressing malformed reports is still appropriate, but denial-of-service and false reports are better handled elsewhere where additional context is available.
Deliberate malformed reports
High-volume denial-of-service attacks
Deliberate false reports
Updated matrix with your feedback
Threat | Mitigation | Rationale |
---|---|---|
Denial-of-service attacks | ||
GZ bombs | Yes. Decompressions limits | |
ZIP bombs | Yes. Decompressions limits | |
XML bombs | Yes. Defused XML library | |
Large numbers of files in a ZIP | TODO | 1000 files that remain below the decompression limit are still a DOS. |
Large numbers of reports | None | Best managed primarily by email security devices and hosting providers, not the RUA parser |
Reports with large numbers of records | None | |
RUA parser DNS lookups | None | RUA parser DNS lookups (IP & domain) might degrade arpa or other provider DNS services. DNS amplification attacks aren't likely: an attacker doesn't control the source address, and can only perform A or PTR lookups. |
Malformed reports | ||
Invalid XML | Yes. XML parser check | |
Valid XML but invalid DMARC report | Yes. XSD validation | |
Valid XML, valid DMARC report but invalid field values | TODO | XSD validation does not validate XML string values, which could target the Splunk server or a user |
False reports | ||
Mail Receiver spoofing | TODO | The add-on should add email metadata to the JSON object. This enables creation of rules in a Splunk app or dashboard. |
Fake Mail Receiver | TODO | The add-on should add email metadata to the JSON object. This enables creation of rules in a Splunk app or dashboard. |
False reports from a legitimate Mail Receiver | None | Based on the mail and report metadata we cannot determine if records or metadata have been added, removed or modified. |
RFC7489 mentions a number of threats against DMARC reporting URI's in chapter 12.2. Below is a short discussion of the current mitigation scope.
Any other threats we should address?