[dmarc-ietf] Re: New attack leveraging DMARC None

2024-05-08 Thread Douglas Foster
The solution is to eliminate the forwarding step. There are many good reasons why organizations should not allow forwarding to their personal email accounts. Among other reasons, given that employees are missing these alarms, it is likely that they are losing other messages also. But for the

Re: [dmarc-ietf] Thoughts on choosing N

2024-04-21 Thread Douglas Foster
Huh? The design is fine: check the exact match domain and then move up to N if more than N labels. The N applies to both original and secondary walks I have legitimate messages with exact match on 6 labels, so there is no reason to disavow the ability to put a policy at that level or to

Re: [dmarc-ietf] Thoughts on choosing N (choose 6)

2024-04-16 Thread Douglas Foster
A look at my data was helpful. Organizational alignment means that N labels match exactly. Relaxed alignment means that at least one of the names is longer than N. Those rules are easy to check on my historical data. I have examples of mismatched domains with 4 matching labels. I also have

Re: [dmarc-ietf] Thoughts on choosing N

2024-04-15 Thread Douglas Foster
:02 AM Todd Herr wrote: > On Mon, Apr 15, 2024 at 7:58 AM Scott Kitterman > wrote: > >> >> >> On April 15, 2024 11:43:08 AM UTC, Alessandro Vesely >> wrote: >> >On Mon 15/Apr/2024 13:16:50 +0200 Douglas Foster wrote: >> >> Our origi

Re: [dmarc-ietf] Thoughts on choosing N

2024-04-15 Thread Douglas Foster
024 13:16:50 +0200 Douglas Foster wrote: > > Our original choice of N was based on the PSL.The PSL could not > detect > > organizational boundaries could not boundaries below level 5, because it > had no > > entries longer than 5 labels, and we determined that the 5-label

Re: [dmarc-ietf] Thoughts on choosing N

2024-04-15 Thread Douglas Foster
Our original choice of N was based on the PSL.The PSL could not detect organizational boundaries could not boundaries below level 5, because it had no entries longer than 5 labels, and we determined that the 5-label entries were not used for mail.Therefore, any increase in N is new

[dmarc-ietf] Performance and reliability concerns

2024-04-10 Thread Douglas Foster
I am concerned that the Tree Walk will have poorer performance and poorer reliability than implementations based on RFC 7489 The boundary between organizational domains and their registries is very stable, which is why it is highly suitable for a static reference like a locally-implemented PSL.

Re: [dmarc-ietf] DMARCbis WGLC - Issue 141 DMARC and What To Say About SPF -all

2024-04-07 Thread Douglas Foster
We can complain about people treating SPF Fail as definitive, but DMARC perpetuates the very same myth, which is: “If Sender Authentication test X produces FAIL, then the message is malicious and should be blocked.” It does not matter whether "X" is SPF Fail, DKIM Fail, ADSP Fail, DMARC Fail,

Re: [dmarc-ietf] Overall last-call comments on DMARC

2024-04-04 Thread Douglas Foster
Sender reputation is in use everywhere. What is lacking is an omniscient data source, but I have no hope of finding one. Small senders will always be at a disadvantage because sender reputation is entirely based on past experience, and smaller senders have less experience to draw upon. ARC

Re: [dmarc-ietf] Overall last-call comments on DMARC

2024-04-04 Thread Douglas Foster
Murray, I was hoping your proposal to advance ARC was serious. Google has solved the problem of limited ARC deployment. To my mind, this means that we cannot revoke the experiment and we cannot do much to change it, so we might as well advance it to standards track. It became a de-facto

Re: [dmarc-ietf] Overall last-call comments on DMARC

2024-04-03 Thread Douglas Foster
In response to Ale's comment that we describe the mailing list problem without defining a path forward, I suggest the text below. Doug Foster Some legitimate messages are sent on behalf of an individual account, based on an established relationship between the sender and the account owner, but

Re: [dmarc-ietf] Standards Track? Yes or No.

2024-04-01 Thread Douglas Foster
As a concept, DMARC is a powerful tool for detecting and blocking malicious senders. As a document it does much less. DMARCbis perpetuates the known problems in RFC 7489, thereby ensuring a continuation of negative outcomes. Both documents define an imaginary evaluator who follows the senders

Re: [dmarc-ietf] WGLC editorial review of draft-ietf-dmarc-dmarcbis-30

2024-03-31 Thread Douglas Foster
On SPF, our document should say simply, " a DMARC-compliant evaluator MUST NOT reject a message, based on SPF result, prior to receiving the Data section and checking for aligned and verifiable signatures." Of course, evaluators may still reject early base on known-bad server or known-bad Mail

Re: [dmarc-ietf] DMARCbis WGLC - Issue 135 - What To Say About Too-Permissive/Third-Party SPF and Where To Say It?

2024-03-17 Thread Douglas Foster
But if we have no advice on how to detect a false Pass, how is this useful? Are we helping evaluators or just giving ourselves cover that "your disaster is not our fault because we warned you"? On Sun, Mar 17, 2024, 10:59 AM Scott Kitterman wrote: > > > On March 17, 2024 11:11:04 AM UTC,

[dmarc-ietf] DMARC exceptions

2024-03-14 Thread Douglas Foster
DMARC is an imperfect tool, as evidenced by the mailing list problem, among others. DMARCbis has failed to integrate RFC7489 with RFC 7960, because it provides no discussion of the circumstances where an evaluator should override the DMARC result. I believe DMARCbis needs a discussion about the

Re: [dmarc-ietf] Problem with multiple policies, different alignment

2024-03-14 Thread Douglas Foster
13, 2024 at 6:24 AM Douglas Foster < > dougfoster.emailstanda...@gmail.com> wrote: > >> My unsuccessful attempt to implement to the specification has reminded me >> of my past concerns. >> >> Our document gives primacy to the Tree Walk, as if it will be used on

Re: [dmarc-ietf] Problem with multiple policies, different alignment

2024-03-13 Thread Douglas Foster
IM domains that are in the sub1.example.com subtree (including exact match or child) DF On Wed, Mar 13, 2024, 7:18 AM Alessandro Vesely wrote: > On Wed 13/Mar/2024 11:23:43 +0100 Douglas Foster wrote: > > > > The reality is that the Tree Walk is an inefficient and unreliable way of > > ob

Re: [dmarc-ietf] Problem with multiple policies, different alignment

2024-03-13 Thread Douglas Foster
My unsuccessful attempt to implement to the specification has reminded me of my past concerns. Our document gives primacy to the Tree Walk, as if it will be used on every >From domain, SPF domain, and DKIM domain. The Tree Walk algorithm is explained in detail before any discussion of how it is

Re: [dmarc-ietf] Fwd: Break SPF response: DKIM Only

2024-03-12 Thread Douglas Foster
Neil, to your question about mitigating false SPF PASS: There are three possible mitigations by senders: - Drop the SPF policy so that messages evaluate to SPF None. A few domains do this. - Change the SPF Policy to return SPF Neutral for cloud services, as currently proposed. -

[dmarc-ietf] Problem with multiple policies, different alignment

2024-03-12 Thread Douglas Foster
I have been building a DMARC implementation, starting with a simple function: TreeWalk(domain) which returns: - Policy found or not found indicator - Policy Domain - Organizational Domain - Policy record My thought was that the Tree Walk result was independent of the domain

[dmarc-ietf] Don't trivialize psd=n

2024-03-10 Thread Douglas Foster
Both of these statements seem unnecessarily weak, bordering on apologetic. 5.3.General Record Format PSD ("n") ."... There is no need to put psd=n in a DMARC record, except in the very unusual case of a parent PSD publishing a DMARC record without the requisite psd=y tag." 11.8 Determination of

Re: [dmarc-ietf] Break SPF response: DKIM Only

2024-02-29 Thread Douglas Foster
unrelated recipients suffer the consequences. The wrong people take the hit.We need to provide a way to mitigate the harm caused by unjustified trust in SPF. Doug On Thu, Feb 29, 2024, 1:29 PM Scott Kitterman wrote: > > > On February 29, 2024 6:15:37 PM UTC, Benny Pedersen wrote

[dmarc-ietf] Break SPF response: DKIM Only

2024-02-29 Thread Douglas Foster
I am surprised at the lack of feedback about Barry's research link. It is a devastating attack on our ability to trust SPF when shared infrastructure is involved. As a result of that document, I have switched camps and believe that we MUST provide a DKIM-only option for DMARC. The proposed

Re: [dmarc-ietf] DMARC with multi-valued RFC5322.From

2024-02-10 Thread Douglas Foster
I have been thinking about the other way that an attacker could have two >From addresses: by having two From headers.Not a problem as long as the evaluator rejects the message based on standards violation. But what if the evaluator does not test for dual headers because the configuration is

Re: [dmarc-ietf] DMARC with multi-valued RFC5322.From

2024-02-05 Thread Douglas Foster
The volume of current attacks should not be a consideration, and speculation about future risks is vacuous. The industry routinely raises C.V.Es against newly discovered and not-yet-exploited security holes, and we should act the same way. The evidence from Google is that multi-valued From DOES

Re: [dmarc-ietf] DMARC with multi-valued RFC5322.From

2024-02-04 Thread Douglas Foster
I see no conflict. A domain with DMARC enforcement asserts that it sends only authenticated messages. Since multiple-From messages cannot be fully authenticated, such messages are inconsistent with the domain owner's stated practices Therefore, the domain owner's published Failure disposition

Re: [dmarc-ietf] DMARC with multi-valued RFC5322.From

2024-02-04 Thread Douglas Foster
Even in the unlikely event that all From addresses can be authenticated with DKIM, the result still cannot be trusted. It would be easy for an attacker to anticipate signatures that will be added in transit, and use those signatures to create false authentication. RFC 7489 treats a

Re: [dmarc-ietf] DMARC with multi-valued RFC5322.From

2024-01-31 Thread Douglas Foster
Ale is right, the document needs to address the problem. I agree with Google that multiple-From has no important use-case, and therefore a wise evaluator should simply reject the message. For the same reason, I believe the RFC5322.bis group should have deprecated the feature.But since that

Re: [dmarc-ietf] DMARC with multi-valued RFC5322.From

2024-01-27 Thread Douglas Foster
Assume this RFC5322 header: From: user@attackdomain, presid...@whitehouse.gov For messages like this: - Verifying one identity (e.g. "user@attackdomain") does nothing to say that the unverified identity is used with authorization. - Technical issues mean that it will be rare,

Re: [dmarc-ietf] DMARC with multi-valued RFC5322.From

2024-01-17 Thread Douglas Foster
As with the mailing list problem, when the recipient expects authentication but the sender cannot provide it, the sender is disadvantaged. Nor an I concerned about the limitations of a particular MSA product. However, we know that mailing list posts almost always start as authorized messages, so

Re: [dmarc-ietf] DMARC with multi-valued RFC5322.From

2024-01-16 Thread Douglas Foster
The purpose of DMARC is to demonstrate that the purported author (From) is either the actual author or the authorized agent of the actual author. Because of practical difficulties, this is an indirect process: DMARC PASS demonstrates that a specific sending domain is authorized to speak on

Re: [dmarc-ietf] DMARC marketing on NPR

2023-11-24 Thread Douglas Foster
Douglas Foster < dougfoster.emailstanda...@gmail.com> wrote: > If this implied solution was working, we would not have a mailing list > problem 10 years running. > > > > On Thu, Nov 23, 2023, 10:41 AM Dotzero wrote: > >> >> >> On

Re: [dmarc-ietf] DMARC marketing on NPR

2023-11-24 Thread Douglas Foster
If this implied solution was working, we would not have a mailing list problem 10 years running. On Thu, Nov 23, 2023, 10:41 AM Dotzero wrote: > > > On Thu, Nov 23, 2023 at 10:19 AM Douglas Foster < > dougfoster.emailstanda...@gmail.com> wrote: > >> The gap betw

Re: [dmarc-ietf] DMARC marketing on NPR

2023-11-23 Thread Douglas Foster
n try. Doug Foster On Wed, Nov 22, 2023 at 5:58 PM Seth Blank wrote: > Is there a point to this thread, that affects the text in the DMARCbis > document under charter criteria? > > Seth, as Chair > > -mobile > > > On Wed, Nov 22, 2023 at 07:13 Douglas Foster < >

Re: [dmarc-ietf] DMARC marketing on NPR

2023-11-22 Thread Douglas Foster
RFC 7489 and DMARCbis are written as algorithms without exception conditions. That silence leads product developers and mail administrators to conclude that the algorithm can be implemented without allowing for exceptions. Why would we expect a different result? Withheld information can

[dmarc-ietf] RFC 9091 vs Tree Walk

2023-11-19 Thread Douglas Foster
I reviewed the list of DMARC-publishing PSL entries and realized that the 10-fold increase in PSL DMARC participation was due to the success of RFC 9091. Private registries are deploying policies to protect their sub-registry clients. It is indeed unfortunate that concerns about PSL accuracy

Re: [dmarc-ietf] Dmarcbis way forward

2023-11-15 Thread Douglas Foster
MUST NOT or SHOULD NOT make little difference. Both are the Crocker Proposal revived and simplified: "The solution to authentication problems MUST be LESS AUTHENTICATION!"If you can convince nearly all senders to use p=NONE, and if you can convince nearly all evaluators to enforce only when

Re: [dmarc-ietf] Server Controls

2023-11-14 Thread Douglas Foster
, server operators are the most important part of this protocol. Doug On Tue, Nov 14, 2023, 7:07 AM Richard Clayton wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > In message j...@mail.gmail.com>, Douglas Foster > writes > > >Our document needs a

[dmarc-ietf] Server Controls

2023-11-14 Thread Douglas Foster
Our document needs a section on server controls. Impersonation requires a server that allows impersonation messages to be created.This means that impersonation usually comes from attacker-owned servers. Legitimate infrastructure services should, and usually do, implement controls which

[dmarc-ietf] The mailing list catch-22

2023-11-07 Thread Douglas Foster
Axioms: (1) Most lists are legitimate (2) Mailing list posts have characteristics that make them readily distinguishable from other traffic. Charter Goal: The protocol will cause Evaluators to accept mailing list posts without From munging (as long as the list is a legitimate operator) The first

Re: [dmarc-ietf] DMARCbis way forward: Do we need our session at IETF 118

2023-10-30 Thread Douglas Foster
tes: > > On Sun, Oct 29, 2023 at 12:35 PM Douglas Foster < > > dougfoster.emailstanda...@gmail.com> wrote: > > > > By contrast, the new tag cannot be effective until DMARCbis is > published > > and filtering software updated. This involves years. Even the

Re: [dmarc-ietf] DMARCbis way forward: Do we need our session at IETF 118

2023-10-29 Thread Douglas Foster
and it's solution needs to be laid out in our document because I am one of those who did not understand it as a possible strategy Doug On Sun, Oct 29, 2023, 2:03 PM Richard Clayton wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > In message f...@mail.gmail.com>, Do

Re: [dmarc-ietf] DMARCbis way forward: Do we need our session at IETF 118

2023-10-29 Thread Douglas Foster
I have become persuaded to Scott's approach, as long as it is documented clearly. For DMARC-enabled evaluators: - auth=DKIMOnly requires that the domain owner have high confidence that every message source is applying DKIM signatures. - ?include=hostingservice only requires knowledge

Re: [dmarc-ietf] DMARCbis way forward: Do we need our session at IETF 118

2023-10-26 Thread Douglas Foster
Like Ale, I thought the group had agreed to implement an auth=DKIM-only option of some type. I understood the motivation to be false pass created by malicious forwarding through a legitimate hosting platform. Therefore SPF precision is an unrelated issue. Doug On Thu, Oct 26, 2023, 5:46 PM

Re: [dmarc-ietf] Best of all possible documents?

2023-10-25 Thread Douglas Foster
: > On Tue, Oct 24, 2023 at 5:34 PM Douglas Foster < > dougfoster.emailstanda...@gmail.com> wrote: > >> In short, I am not part of the presumed consensus on this document. I >> will vigorously oppose any document which does not discuss malicious >> impersonation defen

Re: [dmarc-ietf] Best of all possible documents?

2023-10-25 Thread Douglas Foster
nd make their own determination of intent, blocking messages with malicious intent and allowing acceptable messages. Doug Foster On Tue, Oct 24, 2023 at 11:30 PM Murray S. Kucherawy wrote: > On Tue, Oct 24, 2023 at 5:34 PM Douglas Foster < > dougfoster.emailstanda...@gma

Re: [dmarc-ietf] Best of all possible documents?

2023-10-24 Thread Douglas Foster
My working assumption is that this document, if approved, will be the last statement, for a long time to come, on matters of sender authentication and malicious impersonation defenses. That assumption raises the question, "Is this the best possible statement of how to defend against malicious

Re: [dmarc-ietf] DMARC policy discovery and invalid tag exception.

2023-10-20 Thread Douglas Foster
Offlist Do you support the notion that DMARC evaluation is only possible if a record is found? Doug Foster On Fri, Oct 20, 2023, 11:16 AM OLIVIER HUREAU < olivier.hur...@univ-grenoble-alpes.fr> wrote: > Hi, > > > The correct solution is that the person responsible for creating the > problem

Re: [dmarc-ietf] Tree Walk impact

2023-10-18 Thread Douglas Foster
Then, Seth, I am confused. We have a non-trivial number of PSL entries that have DMARC policies which either specify relaxed alignment or specified nothing and acquired relaxed alignment by default. Are these organizations that have been victimized by PSL errors, or are the PSLs that are

Re: [dmarc-ietf] Why Relaxed Alignment?

2023-10-17 Thread Douglas Foster
Why do we need to support relaxed alignment at all? When a domain is suddenly harmed by a PSL error, the necessary fix is to implement same-domain policies with same-domain signatures. The appropriate technique to prevent that problem, before it happens, is exactly the same configuration. This

Re: [dmarc-ietf] Tree Walk impact

2023-10-16 Thread Douglas Foster
Neil, this is a delayed reply to your earlier email about my implementation efforts, and whether I am on-board with the Tree Walk. The response has been delayed while I investigated the algorithm. I began by building a cache of DMARC policies using the PSL and my mail stream as input. The

Re: [dmarc-ietf] Tree Walk impact

2023-10-13 Thread Douglas Foster
2023 at 7:18 AM Neil Anuskiewicz wrote: > > > > On Oct 13, 2023, at 3:59 AM, Douglas Foster < > dougfoster.emailstanda...@gmail.com> wrote: > > > >  > > The first step in my research has been to do DMARC policy lookups on the > PSL domains About 400 of

Re: [dmarc-ietf] Tree Walk impact

2023-10-13 Thread Douglas Foster
Tue 10/Oct/2023 19:16:10 +0200 Todd Herr wrote: > >>> On Tue, Oct 10, 2023 at 6:14 AM Alessandro Vesely > wrote: > >>> On Tue 10/Oct/2023 00:19:56 +0200 Douglas Foster wrote: > >>>> Both approaches have problems. Stop-at-last enables the walk to > e

Re: [dmarc-ietf] Tree Walk impact

2023-10-09 Thread Douglas Foster
Great question. On Feb 23rd, I had this exchange which John settled: It appears that Douglas Foster said: >-=-=-=-=-=- > >I seem to have missed this redesign. I thought the plan had always been >to take the top-most policy not flagged as PSD=Y. The current design has been

Re: [dmarc-ietf] Tree Walk impact

2023-10-09 Thread Douglas Foster
200 Douglas Foster wrote: > > Attached it is a spreadsheet with the problems from my data set. > > I see no blocking. For example, the list shows From: bayer.com, > d=crm.bayer.com, the latter deemed blocking. Both domains feature a > DMARC > record and (unsurprisin

Re: [dmarc-ietf] Tree Walk impact

2023-10-08 Thread Douglas Foster
change to an inferior trust state. Whether the best number is 7% or 7.9%, the error rate is too high to ignore. Doug On Sat, Oct 7, 2023 at 10:00 PM Douglas Foster < dougfoster.emailstanda...@gmail.com> wrote: > Attached it is a spreadsheet with the problems from my data set. If it

Re: [dmarc-ietf] Tree Walk impact

2023-10-07 Thread Douglas Foster
Attached it is a spreadsheet with the problems from my data set. If it is dropped during the forwarding process, let me know and I will re-post it in the body of the message. The WG needs to prove that "The Tree Walk will cause no significant disruption".We should have understood that trying

Re: [dmarc-ietf] Tree Walk impact

2023-10-07 Thread Douglas Foster
: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > In message hgv...@mail.gmail.com>, Douglas Foster com> writes > > >So initially, I am asking for a compsrison between my results and > >the data used to justify the asserted consensus. > > if you publi

Re: [dmarc-ietf] Tree Walk impact

2023-10-07 Thread Douglas Foster
r > > On Fri, Oct 6, 2023 at 19:49 Douglas Foster < > dougfoster.emailstanda...@gmail.com> wrote: > >> I have only recently implemented all of the tools needed to be able to >> test PSL vs Tree Walk. >> >> I looked at messages which had passed reputation f

[dmarc-ietf] Tree Walk impact

2023-10-06 Thread Douglas Foster
I have only recently implemented all of the tools needed to be able to test PSL vs Tree Walk. I looked at messages which had passed reputation filtering and content filtering, to isolate messages where DMARC alone could be determinative. Within that group, 75% of the messages did not need tree

Re: [dmarc-ietf] Some Gmail comments on DMARCbis version 28

2023-09-17 Thread Douglas Foster
, but then I felt Barry misrepresented my perspective, and then you responded to the group twice. Doug Foster On Sun, Sep 17, 2023 at 6:20 PM Murray S. Kucherawy wrote: > On Sun, Sep 17, 2023 at 2:47 PM Douglas Foster < > dougfoster.emailstanda...@gmail.com> wrote: > >>

Re: [dmarc-ietf] Some Gmail comments on DMARCbis version 28

2023-09-17 Thread Douglas Foster
those who have implemented to the specification, "No Result" means "Content Filtering must carry the whole load," which it cannot do. So I reject the notion that "No Result" is harmless. Doug Foster On Sun, Sep 17, 2023 at 5:29 PM Murray S. Kucherawy wrote: &g

Re: [dmarc-ietf] Some Gmail comments on DMARCbis version 28

2023-09-17 Thread Douglas Foster
is and reporting documents and get them published. > > Barry > > On Sat, Sep 16, 2023 at 6:56 AM Douglas Foster > wrote: > > > > Yes, I suspected awhile back that I was the only one in the world > implementing mandatory authentication. This group has confirmed

Re: [dmarc-ietf] Some Gmail comments on DMARCbis version 28

2023-09-16 Thread Douglas Foster
Yes, I suspected awhile back that I was the only one in the world implementing mandatory authentication. This group has confirmed it. But I hold out hope thst others will see the opportunity that it provides. Perhaps someone will read my Best Practices draft and sponsor it as an individual

Re: [dmarc-ietf] Some Gmail comments on DMARCbis version 28

2023-09-15 Thread Douglas Foster
malicious senders. Doug Foster On Wed, Sep 13, 2023, 9:32 PM Richard Clayton wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > In message czy...@mail.gmail.com>, Douglas Foster com> writes > > >The coverage problem is aggravated if we assume rational at

Re: [dmarc-ietf] Some Gmail comments on DMARCbis version 28

2023-09-15 Thread Douglas Foster
Foster On Fri, Sep 15, 2023 at 7:23 AM Alessandro Vesely wrote: > On Thu 14/Sep/2023 16:39:49 +0200 Murray S. Kucherawy wrote: > > On Wed, Sep 13, 2023 at 6:01 PM Douglas Foster wrote: > > > >> Our assumed reference model is a fully automated, by-the-spec > &g

Re: [dmarc-ietf] Some Gmail comments on DMARCbis version 28

2023-09-13 Thread Douglas Foster
13, 2023 at 5:29 PM Hector Santos wrote: > On Sep 11, 2023, at 9:24 AM, Dotzero chastised > Douglas Foster > > Absolutely incorrect. DMARC is a deterministic pass|fail approach based on > validation through DKIM or SPF pass (or if both pass). It says nothing > about the acce

Re: [dmarc-ietf] Some Gmail comments on DMARCbis version 28

2023-09-11 Thread Douglas Foster
We are still trying to fix an evaluator problem by changing domain owner behavior. No harm in giving domain owners the warning, but changing evaluator behavior would be much better. Presumably, the evaluator behavior that we have today is the result of RFC 7489 wording, so we may be able to

Re: [dmarc-ietf] Some Gmail comments on DMARCbis version 28

2023-09-10 Thread Douglas Foster
ing hole in our security model. Doug Foster On Sat, Sep 9, 2023 at 10:22 PM Murray S. Kucherawy wrote: > On Sat, Sep 9, 2023 at 11:16 AM Douglas Foster < > dougfoster.emailstanda...@gmail.com> wrote: > >> I understand the phased roll-out goal, but phased rollout and p

Re: [dmarc-ietf] Some Gmail comments on DMARCbis version 28

2023-09-09 Thread Douglas Foster
ep 9, 2023 at 12:20 PM Murray S. Kucherawy wrote: > I'm not looking to change the WG's mind on this matter, but: > > On Sat, Sep 9, 2023 at 3:54 AM Douglas Foster < > dougfoster.emailstanda...@gmail.com> wrote: > >> There are many percentages mixed up together in this issue

Re: [dmarc-ietf] Some Gmail comments on DMARCbis version 28

2023-09-09 Thread Douglas Foster
that they try p=quarantine pct=0, I already know how to filter their current traffic correctly. Doug Foster On Sat, Sep 9, 2023 at 12:20 PM Murray S. Kucherawy wrote: > I'm not looking to change the WG's mind on this matter, but: > > On Sat, Sep 9, 2023 at 3:54 AM Dougl

Re: [dmarc-ietf] Some Gmail comments on DMARCbis version 28

2023-09-09 Thread Douglas Foster
I objected strongly to the RFC 7489 language which provides disposition instructions based on the PCT clause, and still do. A brief review: There are many percentages mixed up together in this issue: - The percentage of domain message sources which provide proper authentication at

Re: [dmarc-ietf] Fixing false SPF PASS

2023-08-28 Thread Douglas Foster
it was not well handled. Doug On Mon, Aug 28, 2023, 5:21 AM Alessandro Vesely wrote: > On Sun 27/Aug/2023 20:49:26 +0200 Douglas Foster wrote: > > I am much discouraged by the recent discussion about false DMARC PASS > > based on false SPF PASS or malicious mDKIM replay.

[dmarc-ietf] Fixing false SPF PASS

2023-08-27 Thread Douglas Foster
I am much discouraged by the recent discussion about false DMARC PASS based on false SPF PASS or malicious mDKIM replay. When combined with the discussion about false DMARC FAIL for mailing lists, it seems like we have a very unimpressive standards proposal. We have proposed defending against

Re: [dmarc-ietf] p=interoperability p=compliance p=orgname:policyname

2023-08-23 Thread Douglas Foster
don't know that obtaining different information from the domain owner will fix this. Doug Fosster On Tue, Aug 22, 2023 at 11:40 PM Jesse Thompson wrote: > On Mon, Jul 24, 2023, at 1:03 PM, Neil Anuskiewicz wrote: > > > > > On Jul 19, 2023, at 3:21 PM, Douglas Foster < >

Re: [dmarc-ietf] Proposal for additional Security Considerations for SPF Upgrade in draft-ietf-dmarc-dmarcbis

2023-08-06 Thread Douglas Foster
I am reluctant to consider DMARCbis ready to button-up unless we have at least a rough idea of how an evaluator uses it safely and appropriately in the real world. Doug On Sun, Aug 6, 2023, 2:38 PM Scott Kitterman wrote: > On Sunday, August 6, 2023 2:10:35 PM EDT Hector Santos wrote: > > >

Re: [dmarc-ietf] Reflections on IETF 117 Conference and DMARC Meeting

2023-08-02 Thread Douglas Foster
A nit on whitelisting. I suggest that we use the term "Alternate Authentication" rather than "Whitelisting". In my experience, whitelisting often implies exemption from both authentication checks and content checks.When an administrator simultaneous disables both types of defenses, his

Re: [dmarc-ietf] Interoperability sections

2023-07-31 Thread Douglas Foster
ent point in message processing. Additionally, we need to state that, to be considered minimally useful, an ARC set should include at least MailFrom, From, SourceIP, and Helo. Doug Foster On Mon, Jul 31, 2023 at 2:59 PM Murray S. Kucherawy wrote: > On Mon, Jul 31, 2023 at

Re: [dmarc-ietf] Interoperability sections

2023-07-31 Thread Douglas Foster
Does "Trusted Attestation" have any envisioned implementation other than an ARC Set? Murray has said that we cannot impose obligations on mailing lists, because he does not perceive them as DMARC participants. But to my mind, "Trusted Attestation" means that the mailing list SHOULD provide an

Re: [dmarc-ietf] How did DMARC go wrong, and how does our document fix it?

2023-07-24 Thread Douglas Foster
the notification that I would want. Doug On Mon, Jul 24, 2023 at 11:57 AM Neil Anuskiewicz wrote: > > > On Jul 23, 2023, at 9:39 PM, Douglas Foster < > dougfoster.emailstanda...@gmail.com> wrote: > >  > Neil, this is about whether to block first and ask questions later: >

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-24 Thread Douglas Foster
I have stumbled into the same position as Barry, or maybe a more extreme one. I send no bounce messages, and very few 5xx responses. In my environment, one of the more common causes of non-delivery is a terminated employee. It has not seemed like automated messages sources pay much attention

Re: [dmarc-ietf] How did DMARC go wrong, and how does our document fix it?

2023-07-23 Thread Douglas Foster
Also, isn’t it best to block first and ask questions > later to mitigate damage while you investigate? I guess I’m saying the two > ideas aren’t mutually exclusive. > > Neil > > > On Jul 15, 2023, at 4:27 AM, Douglas Foster < > dougfoster.emailstanda...@gmail.com> wro

Re: [dmarc-ietf] How did DMARC go wrong, and how does our document fix it?

2023-07-22 Thread Douglas Foster
ated email is likely to be high payback Doug On Fri, Jul 21, 2023, 2:53 PM Jan Dušátko wrote: > > > Dne 21. 7. 2023 v 16:34 Murray S. Kucherawy napsal(a): > > On Wed, Jul 19, 2023 at 6:31 PM Douglas Foster < > > dougfoster.emailstanda...@gmail.com> wrote: > >

Re: [dmarc-ietf] Eliminating From Munging from this list

2023-07-20 Thread Douglas Foster
It is not at all clear that my goals for this effort match with others, so I will state mine: My goal is to develop documents that help evaluators make better disposition decisions, to save civilization from as much malicious content as possible. An inference from my piece of reality is that

Re: [dmarc-ietf] How did DMARC go wrong, and how does our document fix it?

2023-07-19 Thread Douglas Foster
. We need to find words in our document that begin to fix this, to obtain the products and evaluator behavior that we both want and their users need. Doug On Wed, Jul 19, 2023, 8:07 PM Dotzero wrote: > > > On Wed, Jul 19, 2023 at 6:21 PM Douglas Foster < > dougfoster.emails

Re: [dmarc-ietf] How did DMARC go wrong, and how does our document fix it?

2023-07-19 Thread Douglas Foster
line is that the domain owner's preference is of no interest to my filtering decision, but the DMARC result is. Doug On Wed, Jul 19, 2023, 8:07 PM Dotzero wrote: > > > On Wed, Jul 19, 2023 at 6:21 PM Douglas Foster < > dougfoster.emailstanda...@gmail.com> wrote: > >> P

Re: [dmarc-ietf] How did DMARC go wrong, and how does our document fix it?

2023-07-19 Thread Douglas Foster
Perhaps you can clarify what you think DMARC is. Apparently a significant number of evaluators think that "DMARC Fail with p=reject always means unwanted mail". Or to use Michael Hammer's language, "DMARC Fail with p=reject means the domain owner wants it rejected so I will reject it."These

Re: [dmarc-ietf] Eliminating From Munging from this list

2023-07-19 Thread Douglas Foster
entication to become the norm when the concept scales upward. Disclosure statements only work when they are not announcing vulnerabilities. Doug Foster On Wed, Jul 19, 2023 at 2:20 AM Murray S. Kucherawy wrote: > On Tue, Jul 18, 2023 at 4:27 AM Douglas Foster < > dougfoster.email

Re: [dmarc-ietf] Eliminating From Munging from this list

2023-07-18 Thread Douglas Foster
The question was about this list, because Murray has advised that every specification needs a working prototype. Barry has said that we will not bloat DMARCbis with advice to mailing lists, but it could be in a companion document. The topic is closely tied to DMARCbis so there is no other

Re: [dmarc-ietf] How did DMARC go wrong, and how does our document fix it?

2023-07-16 Thread Douglas Foster
ganizations started to break > away from the IETF and RFC7489 in particular. > You only have to look at the inconsistencies between what is suggested and > stated in the RFC and what happens in reality to understand why it went > wrong. > > > Best, > Olivier Hureau > > --

Re: [dmarc-ietf] Eliminating From Munging from this list

2023-07-16 Thread Douglas Foster
< devel2...@baptiste-carvello.net> wrote: > Hi, > > Le 15/07/2023 à 12:22, Douglas Foster a écrit : > > [...] > > Track 2: Exception Request > > [...] > > Track 2 benefits: > > [...] > > - Elimination of From munging is potentially availabl

[dmarc-ietf] How did DMARC go wrong, and how does our document fix it?

2023-07-15 Thread Douglas Foster
Murray recently observed, correctly, that something went horribly wrong with the DMARC rollout, because it caused (continues to cause) many safe and wanted messages to be blocked. My assessment was in a recent post: Something about the language of RFC 7489 caused implementers to focus on

Re: [dmarc-ietf] Eliminating From Munging from this list

2023-07-15 Thread Douglas Foster
We have two tracks that we can pursue for eliminating From munging from this list: They can be pursued in parallel: Track 1: Downgrade Request We identify the small number of domains and subscribers who participate from p=reject domains, and consequently have their submissions munged. We

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-13 Thread Douglas Foster
12, 2023 at 6:20 AM Douglas Foster < > dougfoster.emailstanda...@gmail.com> wrote: > >> Does anyone believe that things will change if we publish an RFC which >> says "Verizon Media MUST change to p=none"? I don't. >> > > It would be absurd to mak

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-12 Thread Douglas Foster
Does anyone believe that things will change if we publish an RFC which says "Verizon Media MUST change to p=none"? I don't. Lists have been hurt by the move to authenticated email. Point taken. However, the world is not going back to the good old days,. There is no hope for a list solution to

Re: [dmarc-ietf] Protocols All The Way Down (long - sorry)

2023-07-11 Thread Douglas Foster
So we disable SPF when the sender tells us to do so., but leave it enabled by defaultThat makes a lot of sense to me. When the domain passes SPF on a shared server farm, but provides no DKIM signatures, I currently have no choice other than to consider the message to be authenticated. The

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-11 Thread Douglas Foster
:14 AM Murray S. Kucherawy wrote: > On Fri, Jul 7, 2023 at 6:14 AM Douglas Foster < > dougfoster.emailstanda...@gmail.com> wrote: > >> Malicious impersonation creates a need for authentication. If the list >> makes changes that disable the originator's authenticatio

Re: [dmarc-ietf] a detour into lists, Another p=reject text proposal

2023-07-09 Thread Douglas Foster
Unsophisticated administration will be mediated when/if software developers make the necessary features available out-of-the-box. At least one reason that we have undesirable DMARC dispostioning is software that implements reject-on-fail without a test mode and without a usable override process.

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-09 Thread Douglas Foster
now that the traffic is wanted and will be accepted. So we need more than From munging and ARC-derived un-munging. But this combination is a start. Doug On Sun, Jul 9, 2023, 12:27 AM Murray S. Kucherawy wrote: > On Fri, Jul 7, 2023 at 6:35 PM Douglas Foster < > dougfoster.emailstanda...@gmai

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-07 Thread Douglas Foster
Start with the underlying objective: Evaluators SHOULD accept mailing list traffic. Google's requirement: Given whatever standards-track DMARCbis rules we produce, these rules MUST be something that can be fully automated. Consequently, the problem remains: How does an evaluator distinguish

  1   2   3   4   5   6   7   >