On October 25, 2015 4:48:03 PM EDT, Franck Martin <fmar...@linkedin.com> wrote:
>On Sun, Oct 25, 2015 at 7:39 AM, Scott Kitterman via dmarc-discuss <
>dmarc-discuss@dmarc.org> wrote:
>
>>
>>
>> On October 24, 2015 6:42:46 AM EDT, "J. Gomez via dmarc-discuss" <
>> dmarc-discuss@dmarc.org> wrote:
>> >On Saturday, October 24, 2015 4:54 AM [GMT+1=CET], Scott Kitterman
>via
>> >dmarc-discuss wrote:
>> >
>> >> On October 23, 2015 8:37:06 PM EDT, John Levine <jo...@taugh.com>
>> >> wrote:
>> >> > > From a DMARC perspective, if you know the sender is
>trustworthy,
>> >> > > you do a local override.  ARC doesn't
>> >> > > seem to be needed for that.
>> >> >
>> >> > I have many of the same questions you do, but it is my
>impression
>> >> > that a surprising number of lists behave fine for a long time,
>then
>> >> > some bad guy starts pumping spam through it by impersonating one
>of
>> >> > the subscribers.
>> >> >
>> >> > ARC should be helpful in that perhaps non-exotic situation.
>> >>
>> >> Could be.  I certainly don't claim it's not potentially useful. 
>My
>> >> concern is that it seems to be marketed as a solution to the DMARC
>> >> mailing list problem and as far as I can tell, its potential
>utility
>> >> is orthogonal to that.
>> >
>> >Ok, you said "from a DMARC perspective, if you know the sender is
>> >trustworthy, you do a local override". But imagine big ESP "A" with
>> >hundreds of thousands of users who may subscribe to all kinds of
>> >mailing lists of which mailing lists you --as big ESP "B"-- had no
>> >previous knowledge and on which you have no a-priori trust.
>> >
>> >In that scenario, when you as big ESP "B" receive email from such
>> >mailing lists addressed to your users, you don't know whether the
>> >sender (i.e., the mailing list) is trustworthy because you didn't
>know
>> >anything about him until now, so you cannot do a local override of
>> >DMARC in an automated and safe way.
>> >
>> >But if the big ESP "A" user sent a DKIM signed message to that list,
>> >and that list added a ARC seal to the message when it forwarded said
>> >message to the list's subscribers, then you --as big ESP "B" and as
>> >recipient of said message-- could verify that it is true that said
>user
>> >from big ESP "A" indeed sent that original email addressed to the
>list,
>> >and if the ARC chain is verifiable and goes back to someone you
>trust
>> >then you could begin to put some trust also in the other end of the
>ARC
>> >chain (on its latest iteration), and therefore do a local override
>of
>> >DMARC in an automated and safe way even with email received from
>> >senders your didn't know were trustworthy.
>> >
>> >Am I too off base?
>>
>> As described in the drafts, the ARC stamp is applied by the
>intermediary,
>> not the originator, so I don't think that works.
>>
>> Even if it did, it's still just another variant of whitelisting,
>which is
>> unlikely to scale very well.  Also, it could really only work for big
>> domains. Us little guys don't generate enough traffic to register in
>the
>> big guys reputation systems.
>>
> And this is fine too, you don't need a reputation, you just need to
> not have a negative reputation.

So the idea is that arbitrary data added from an untrusted sender (unknown 
reputation) is sufficient to override DMARC p=reject?

Scott K
_______________________________________________
dmarc-discuss mailing list
dmarc-discuss@dmarc.org
http://www.dmarc.org/mailman/listinfo/dmarc-discuss

NOTE: Participating in this list means you agree to the DMARC Note Well terms 
(http://www.dmarc.org/note_well.html)

Reply via email to