Re: [dmarc-ietf] Proposal to Enhance Email Trustworthiness via RFC 8617 Modification - ARC

2024-04-22 Thread John R. Levine
Since nobody else responded, here's my tl;dr -- interesting proposal, but no. The first problem is that there is no appetite to change ARC at this point. The other is that most if not all of the things you propose are not new. I proposed a chained DKIM signaure that lets the signer say who's

Re: [dmarc-ietf] DMARCbis WGLC - Issue 141 DMARC and What To Say About SPF -all

2024-04-07 Thread John R Levine
On Sun, 7 Apr 2024, Neil Anuskiewicz wrote: This WG should have finished a year ago. Unless you think something is so broken that it's worth more months of delay, forget it. To be clear I was suggesting considering deprecating the hardfail modifier only as it’s archaic. I was not saying

Re: [dmarc-ietf] the long march, WGLC editorial review of draft-ietf-dmarc-dmarcbis-30

2024-04-07 Thread John R. Levine
On Sat, 6 Apr 2024, Scott Kitterman wrote: As a side effect of the switch to the tree walk approach in DMARCbis, this is no longer true. For any subdomain without a DMARC record, the domains above it in the tree are also checked, so you can specify a different policy/ reporting address for

Re: [dmarc-ietf] DMARCbis WGLC - Issue 141 DMARC and What To Say About SPF -all

2024-04-07 Thread John R Levine
On Sun, 7 Apr 2024, Neil Anuskiewicz wrote: I think clear statement and supporting text explaining clearly that SPF is no longer the policy layer would be a good idea. While it might be slightly out of scope, I have encountered people who think best practice is to enforce with -ALL. We had

Re: [dmarc-ietf] There is no pony, Overall last-call comments on DMARC

2024-04-04 Thread John R. Levine
No might about it -- ARC is only useful with domain reputation. Of course, DKIM is only useful with domain reputation, as were Domainkeys and IIM, so I don't see why it's a problem now. Much of the objective of DomainKeys/IIM/DKIM was to provide a reliable domain identifier that could be

Re: [dmarc-ietf] There is no pony, Overall last-call comments on DMARC

2024-04-04 Thread John R. Levine
I don’t think it’s scope creep at all. The WG charter puts “Review and refinement of the DMARC specification” in phase III, after “Specification of DMARC improvements to support indirect mail flows”. It seems clear to me that standards-track DMARC needs to incorporate those improvements. IESG

Re: [dmarc-ietf] Overall last-call comments on DMARC

2024-04-01 Thread John R. Levine
On Sun, 31 Mar 2024, Jim Fenton wrote: Based on the above problems, I do not think DMARC-bis should be published as a standards track document by IETF. This reminds me of the NAT wars in the 1990s. We all understand that DMARC has a lot of problems, but it's far more widely used than many of

Re: [dmarc-ietf] WGLC review of draft-ietf-dmarc-dmarcbis-30

2024-03-31 Thread John R. Levine
I’m probably being pedantic here: is “gov” a domain? Yup, it's a domain. I stand corrected on that. Anything that meets the DNS spec is a domain namen, e.g., argle.bargle.parp is a domain name. If and how particular names might be resolved is a topic to which the IETF and ICANN have given

Re: [dmarc-ietf] WGLC review of draft-ietf-dmarc-dmarcbis-30

2024-03-31 Thread John R. Levine
Our advice is not to publish a DMARC policy if you want to use mailing lists. We have a lot of experience with message rewriting and I think we have all found that the options range from pretty bad to really bad, so there's nothing to recommend. “Our advice” seems not to be followed by many

Re: [dmarc-ietf] WGLC review of draft-ietf-dmarc-dmarcbis-30

2024-03-30 Thread John R. Levine
Entities other than domains: Public suffixes aren’t (necessarily) domains, Of course they're domains. What else could they be? The things that are out of scope are IP addresses, ASNs, magic tokens in the messages, stuff like that. I’m probably being pedantic here: is “gov” a domain?

Re: [dmarc-ietf] WGLC review of draft-ietf-dmarc-dmarcbis-30

2024-03-30 Thread John R. Levine
I concur with Jim that rewriting strategies are in scope for the WG according to its charter, especially if we have something to recommend going forward. Our advice is not to publish a DMARC policy if you want to use mailing lists. We have a lot of experience with message rewriting and I

Re: [dmarc-ietf] WGLC review of draft-ietf-dmarc-dmarcbis-30

2024-03-30 Thread John R. Levine
Below is a number of “minor issues and editorial comments” on dmarcbis-30. I have a larger issue regarding the draft as a whole that I have yet to write up and will post separately. Thanks for the review even though I disagree with a fair amount of it. 2.1 High level goals

Re: [dmarc-ietf] Fwd: [Technical Errata Reported] RFC7489 (7865)

2024-03-26 Thread John R Levine
 ::00::12.34.56.78  0:0:0:0:0:0::012.034.056.078 The latter yields failure running the example program in the inet_pton(3) man page. See e.g. https://www.man7.org/linux/man-pages/man3/inet_pton.3.html#EXAMPLES That's yet another reason not to change the XML spec. Please stop.

Re: [dmarc-ietf] Fwd: [Technical Errata Reported] RFC7489 (7865)

2024-03-25 Thread John R Levine
Apologies, which format should be used. I'm not sure if I should revert to the one from 7489, or some other prior version. The one that's in the draft now is fine. Don't add the line with f{4} which is an insufficiently general special case. Regards, John Levine, jo...@taugh.com,

Re: [dmarc-ietf] Fwd: [Technical Errata Reported] RFC7489 (7865)

2024-03-25 Thread John R Levine
On Mon, 25 Mar 2024, Alessandro Vesely wrote: How about: "(:::)?(([01]?\d?\d|2[0-4]\d|25[0-5])\.){3}([01]?\d?\d|2[0-4]\d|25[0-5])"/> Testing yielded a correct fix: "(::[Ff]{4}:)?(([01]?\d?\d|2[0-4]\d|25[0-5])\.){3}([01]?\d?\d|2[0-4]\d|25[0-5])"/> There are lots of other ways to write

Re: [dmarc-ietf] no DMARC result for DKIM testing and policy

2024-03-22 Thread John R. Levine
On Fri, 22 Mar 2024, Benny Pedersen wrote: to confusion about DMARC and DKIM test flags. This document is already too long and too late. Unless there is an actual problem to solve here, let's close the issue and finish up. why is dkim fail here Because the mailing list modified the

Re: [dmarc-ietf] of course no DMARC result for DKIM testing and policy

2024-03-22 Thread John R. Levine
While I generally agree, DMARC for the last decade didn't have a testing flag. That's new in DMARCbis, so I don't think that's really germane. This particular thing is on us as a working group. RFC 6376 makes it quite clear on page 28 that DKIM verifiers ignore signatures with a t=y flag,

Re: [dmarc-ietf] DMARCbis WGLC - Issue 135 - What To Say About Too-Permissive/Third-Party SPF and Where To Say It?

2024-03-18 Thread John R Levine
Now with Mike's tweak: Add this to 11.1 Authentication Methods Both of the email authentication methods that underlie DMARC provide some assurance that an email was transmitted by an MTA which is authorized to do so. SPF policies map domain names to sets of authorized MTAs [ref to RFC 7208,

Re: [dmarc-ietf] DMARCbis WGLC - Issue 135 - What To Say About Too-Permissive/Third-Party SPF and Where To Say It?

2024-03-18 Thread John R Levine
On Mon, 18 Mar 2024, Alessandro Vesely wrote: The text should be terser and clearer, possibly with an example. I would be happy to remove the whole thing, since it's only distantly related to defining or implementing DMARC. Regards, John Levine, jo...@taugh.com, Taughannock Networks,

Re: [dmarc-ietf] DMARCbis WGLC - Issue 135 - What To Say About Too-Permissive/Third-Party SPF and Where To Say It?

2024-03-18 Thread John R Levine
On Sun, 17 Mar 2024, Dotzero wrote: Whenever mail is sent, there is a risk that an overly permissive source may send mail which will receive a DMARC pass result that was not, in fact, authorized by the Domain Owner. These false positives may lead to issues when systems interpret DMARC pass

Re: [dmarc-ietf] Problem with multiple policies, different alignment

2024-03-14 Thread John R. Levine
Some universities' resolvers return NOERROR instead of NXDOMAIN (samba4 server used as AD, and resolvers) They still do that? Wow. At least that won't screw up DMARC evaluators too much. In any event, I don't think it's our job to redesign our specs for the benefit of people who've

Re: [dmarc-ietf] DMARCbis WGLC Issue - Description of rua and ruf Tags

2024-03-01 Thread John R Levine
On Fri, 1 Mar 2024, Seth Blank wrote: It seems OK but I would say that at this point that mailto: URI are the only ones currently defined. Participating, to this point. Throwing out an idea, that may be spectacularly bad: mailto: is the only function that's ever been used. We even discussed

Re: [dmarc-ietf] dmarc-dmarcbis: add "req=dkim"

2024-02-08 Thread John R. Levine
Together with DMARC p=none as DKIM signature-presence is ignored and thus any email can pass. I don't understand. Me neither. I still don't see any reason to revisit this issue. Nothing has changed since the last time we argued about it. R's, John PS: About RFC 5617 At that time,

Re: [dmarc-ietf] (no subject)

2023-11-08 Thread John R. Levine
On Mon, 6 Nov 2023, Douglas Foster wrote: Since IETF cannot protect its own lists from conspicuous impersonation, it seems poorly qualified to tell anyone else how to do so. Actually, that message had nothing whatsoever to do with impersonation, and everything to do with an obscure

Re: [dmarc-ietf] p=interoperability p=compliance p=orgname:policyname

2023-08-23 Thread John R Levine
Please, no. This WG has already run a year past its sell-by date. Stuff like this will just tell the world that we'll never finish. Apologies. I wasn't trying to disrupt dmarcbis finishing. Ever since I saw consensus start to form, I started citing dmarcbis whenever explaining how DMARC

Re: [dmarc-ietf] Proposal for additional Security Considerations for SPF Upgrade in draft-ietf-dmarc-dmarcbis

2023-08-06 Thread John R Levine
1) a receiver that will forward quarantined messages, and do so without changing the bounce address. Solution: Don't Do That. That's a confounding issue but not the root problem I think. Even if Microsoft were to implement keeping the bounce address, it just means that the spammer has to

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-07 Thread John R Levine
I do like your suggestion of silent discard rather than bounce, and I would want to see that change made -- perhaps with a note that aggregate reports will still include information about those discards. Having thought about it for a minute, I have a better question. We already know that sites

Re: [dmarc-ietf] easier DKIM, DMARC2 & SPF Dependency Removal

2023-06-23 Thread John R Levine
ig fuzzy SPF record. R's, John Barry On Fri, Jun 23, 2023 at 1:54 PM John R Levine wrote: My understanding is that if `auth=dkim` then SPF would be ignored from the perspective of DMARC. So if a receiver sees DKIM is not DMARC aligned and only SPF is DMARC aligned then it would still be tre

Re: [dmarc-ietf] easier DKIM, DMARC2 & SPF Dependency Removal

2023-06-23 Thread John R Levine
My understanding is that if `auth=dkim` then SPF would be ignored from the perspective of DMARC. So if a receiver sees DKIM is not DMARC aligned and only SPF is DMARC aligned then it would still be treated as a DMARC fail. That's my understanding. It would be a way for senders to say "yes I

Re: [dmarc-ietf] easier DKIM, DMARC2 & SPF Dependency Removal

2023-06-23 Thread John R Levine
On Thu, 22 Jun 2023, Emanuel Schorsch wrote: I agree with John's point that dkim+spf doesn't make sense in the context of strict DMARC enforcement (I think it provides value for p=none domains Since the aggregate reports tell you what authentication worked, I don't even see that as a benefit.

Re: [dmarc-ietf] easier DKIM, DMARC2 & SPF Dependency Removal

2023-06-19 Thread John R Levine
On Mon, 19 Jun 2023, Patrick Ben Koetter wrote: I suggest that we do not only drop SPF, but also come up with better ways (simplification, tools, exchange formats) to implement DKIM in order to allow for a smooth transition. I'm scratching my head here. On my system I publish and rotate DKIM

Re: [dmarc-ietf] PSD flag vs Version bump

2023-06-10 Thread John R Levine
Why not say "SHOULD use tree walk", and then document, as explanation for "SHOULD" instead of "MUST", non-normative reasons why you might not? I don't think that will fly with the VLMPs. The mandatory PSD seems relatively easy to implement, just add it to the template you use for everything.

Re: [dmarc-ietf] Third party signatures

2023-05-06 Thread John R Levine
It is not a commitment at this time. That said, we are interested in solving this problem and welcome collaboratively figuring out the right way to do this. It seems to me that ARC provides the useful parts of third party signatures and, while rather complicated, has the benefit of actually

Re: [dmarc-ietf] [EXTERNAL] Re: I-D Action: draft-ietf-dmarc-aggregate-reporting-09.txt

2023-04-25 Thread John R Levine
6.1. Data Exposure Considerations Aggregate reports are limited in scope to DMARC policy and disposition results, to information pertaining to the underlying authentication mechanisms, and to the domain-level identifiers involved in DMARC validation. Aggregate reports may expose

Re: [dmarc-ietf] I-D Action: draft-ietf-dmarc-aggregate-reporting-09.txt

2023-04-25 Thread John R. Levine
Since the only mechanism is mail and nobody's going to S/MIME encrypt their reports, I suggest just deleting it. TLS vs not TLS. I suppose, but that's not up to the report sender. If I say "rua=mailto:rep...@cruddy.org;, and the MX for cruddy.org doesn't do STARTTLS, what are you going to

Re: [dmarc-ietf] I-D Action: draft-ietf-dmarc-aggregate-reporting-09.txt

2023-04-24 Thread John R. Levine
I removed the small section that faced objections. I updated the ridtxt definition and discovered that mmark was making a mess of those asterisks. When there are more than one/some on a single line, it believes you would like some subset to be defined as "" things. Looks pretty good. Minor

Re: [dmarc-ietf] list history, Signaling MLMs

2023-04-15 Thread John R Levine
I'm assuming that the "long list of stinky possible workarounds" are the existing "whatever" mitigations, and rewriting seems to be acceptable enough as a mitigation to convince large [enterprise] mail systems to move forward with restrictive policies. ... I think you are greatly

Re: [dmarc-ietf] Signaling forwarders, not just MLMs

2023-04-13 Thread John R Levine
I’ve talked about this before. I ran into a utility company that I conversed with that explicitly didn’t want to use DKIM because they felt their messages should not be forwarded to another provider. I didn’t quite understand the logic, but it was their decision. I believe it, but needless

Re: [dmarc-ietf] DMARC is designed to break mail, Example of Indirect Mail Flow Breakage with p=reject?

2023-04-13 Thread John R Levine
On Thu, 13 Apr 2023, Dotzero wrote: It also isn't that " IT DOES NOT MATTER IF YOUR MAIL GETS LOST". It matters but there is a calculus regarding the tradeoffs of a very small percentage (in the case of my former a very small fraction of a percent) of email not getting delivered vs the damage

Re: [dmarc-ietf] Signaling forwarders, not just MLMs

2023-04-13 Thread John R Levine
Anyone who does forwarding is damaged by DMARC because there are a lot of people who do DMARC on the cheap with SPF only. This brings up another issue, I think: that there should also be stronger advice that using DKIM is critical to DMARC reliability, and using SPF only, without DKIM, is

Re: [dmarc-ietf] THIS IS ABUSE (it might be)

2023-04-12 Thread John R Levine
On Wed, 12 Apr 2023, Eric D. Williams wrote: No, it's a DMARC problem. DKIM didn't cause any problems for mailing lists ... mailing lists the real answer is ARC not DMARC, that's what I'm saying. It's a failure with DKIM signature invalidation as a result of relaying via mailing lists. My

Re: [dmarc-ietf] DMARC is designed to break mail, Example of Indirect Mail Flow Breakage with p=reject?

2023-04-12 Thread John R Levine
I note that you didn't write "MUST NOT". I heartily concur with "shouldn't" or SHOULD NOT. I still have issues with "MUST NOT". Keep in mind that MUST NOT doesn't mean "do this and you will die", it means "do this and you won't interoperate" which seems exactly correct here. SHOULD NOT

Re: [dmarc-ietf] DMARC is designed to break mail, Example of Indirect Mail Flow Breakage with p=reject?

2023-04-12 Thread John R Levine
On Tue, 11 Apr 2023, Neil Anuskiewicz wrote: If DMARC can protect domains from spoofing which I believe ends up costing over $14 billion per year. Forget about the $14 billion and think how this crime spree affects people’s view But it obviously can't do that, and what it does do happens

Re: [dmarc-ietf] THIS IS ABUSE (it might be)

2023-04-10 Thread John R Levine
On Mon, 10 Apr 2023, Alessandro Vesely wrote: On Sat 08/Apr/2023 15:59:30 +0200 John Levine wrote: It appears that Eric D. Williams said: -=-=-=-=-=- I think the reliance upon list operators is properly placed on that role. It's not a DMARC problem, it's a DKIM problem, I think. No, it's

Re: [dmarc-ietf] Treewalk causing changes

2023-02-23 Thread John R. Levine
I haven’t done extensive research but here is a live example where treewalk will cause a result change. From: is in the domain Ret.bmcc.cuny.edu which has no DMARC record. _dmarc.bmcc.cuny.edu.300INTXT"v=DMARC1; p=quarantine; fo=1;

Re: [dmarc-ietf] Not Security considerations - Aggregate reports

2022-11-16 Thread John R. Levine
On Tue, 15 Nov 2022, Douglas Foster wrote: If a server farm hosts DomainA and DomainB, and I only get DMARC aggregate reports when I send to DomainA, then I can conclude that DomainB is not evaluating DMARC and is therefore more vulnerable to impersonation attacks than DomainA. You can

Re: [dmarc-ietf] DMARCbis Privacy Considerations was: Re: I-D Action: draft-ietf-dmarc-dmarcbis-17.txt

2022-09-02 Thread John R. Levine
I will agree with Ale somewhat.  While we should say that PSDs MUST NOT publish a ruf= tag, it would be prudent also to say that reporters MUST ignore a PSD's ruf= tag in case one is there anyway.  Belt and suspenders. How about SHOULD NOT? No. We have already wasted too much time on this

Re: [dmarc-ietf] DMARCbis Privacy Considerations was: Re: I-D Action: draft-ietf-dmarc-dmarcbis-17.txt

2022-09-01 Thread John R Levine
So the question: Does anyone *really* think we *do* have to close out these edge cases at the risk of complexity, incompatibility, or other down-sides? ... It can be worse, as in this case where trying to fix the corner case makes things worse for everyone else. I will agree with Ale

Re: [dmarc-ietf] I-D Action: draft-ietf-dmarc-dmarcbis-17.txt

2022-08-29 Thread John R. Levine
I took a look and it looks to me like all the section references are there. Which ones are missing? According to the diff provided on the web site [1], quite a few in the following hunks of the diff: The section numbers are all there in the markdown and the XML, so it's a rendering problem

Re: [dmarc-ietf] I-D Action: draft-ietf-dmarc-dmarcbis-17.txt

2022-08-29 Thread John R. Levine
Why did you remove the specific paragraph pointers for the references? Is that the norm in IETF documents? It seems to me it makes things less clear. I took a look and it looks to me like all the section references are there. Which ones are missing? Regards, John Levine, jo...@taugh.com,

[dmarc-ietf] Today's pull request

2022-08-28 Thread John R. Levine
Scott's changes about when and how to apply policy Neil's typos cleaned up references to the other I-D's Please review the changes before accepting it. Regards, John Levine, jo...@taugh.com, Primary Perpetrator of "The Internet for Dummies", Please consider the environment before reading this

Re: [dmarc-ietf] dmarcbis-16 - some minor corrections

2022-08-27 Thread John R Levine
If you're feeling really enterprising you can do a github pull request, but sending the suggested changes to this list is fine. On Sat, 27 Aug 2022, Neil Anuskiewicz wrote: Cool! I'll proofread the whole document within two weeks unless there's a tighter timeline. I've heard talk on the list

[dmarc-ietf] Review comments and issues

2022-08-25 Thread John R. Levine
I made a git pull request which is intended to include the changes that Barry and Scott recently proposed. I also did a little editorial cleanup on the way clearing up some grammar and tagging the **MUST** and **SHOULD** R's, John PS: if you see some odd looking git commits, I accidentally

Re: [dmarc-ietf] Mailing List message authentication

2022-08-22 Thread John R. Levine
On Mon, 22 Aug 2022, Wei Chuang wrote: I agree with the OP's premise that there needs to be a better authentication method that works with mailing lists. ... Google seems pretty enthusiastic about ARC. Since large mail systems already know where the mailing lists are, I asked why not just

Re: [dmarc-ietf] now with marldownI-D Action: draft-ietf-dmarc-failure-reporting-04.txt

2022-08-20 Thread John R. Levine
On Fri, 19 Aug 2022, Alessandro Vesely wrote: Todd and I have found it much easier to edit the markdown version of dmarcbis than hand twiddle the XML codes, and I have twiddled more than my share of XML. I made a pull request with the -04 version converted to markdown and a makefile to

Re: [dmarc-ietf] I-D Action: draft-ietf-dmarc-failure-reporting-04.txt

2022-08-18 Thread John R. Levine
Done on Github copy. I was surprised to see that the markdown version of the draft has disappeared from the github repo. Todd and I have found it much easier to edit the markdown version of dmarcbis than hand twiddle the XML codes, and I have twiddled more than my share of XML. Regards,

Re: [dmarc-ietf] Would this list add an Author: header field? Nope.

2022-08-18 Thread John R. Levine
This proposal is completely out of scope for this WG. On Thu, 18 Aug 2022, Alessandro Vesely wrote: Hi all, I rewrote this I-D to add the simple method to de-munge From: header fields upon reception, which was briefly discussed on list last week (Girl Scout troops):

Re: [dmarc-ietf] I-D Action: draft-ietf-dmarc-failure-reporting-04.txt

2022-08-18 Thread John R Levine
On Wed, 17 Aug 2022, Murray S. Kucherawy wrote: I can't remember if this was discussed previously. I was just responding to the proposed change. Understood, but I am concerned that we are spinning our wheels on changes proposed by individuals that have no support from anyone else. It would

Re: [dmarc-ietf] Collecting message metadata, was Time to work on failure reporting

2022-08-17 Thread John R Levine
Most receivers don’t provide failure reports but sometimes failure reports (when available) can be useful. I realize there are privacy and regulatory concerns. Would it be possible to reduce the scope of the failure report in general to address the privacy concerns so that they’re more widely

Re: [dmarc-ietf] Time to work on failure reporting

2022-08-16 Thread John R Levine
I re-read the I-D and applied some more substantive changes. I don't find the changes improve clarity, but whatever. How about if you fix the markdown so it has the current contents of the draft, and you add a Makefile that can turn the markdown into XML and the XML into text and HTML one

Re: [dmarc-ietf] Time to work on failure reporting

2022-08-14 Thread John R Levine
It does, it looks like someone did a quick cut and paste to make the markdown. But it's not that long, you're the editor, how about fixing the md so it's useful for editing? It must have been me. I recalled; I searched again for something to generate the md and again found only

Re: [dmarc-ietf] Time to work on failure reporting

2022-08-13 Thread John R Levine
I'd rather it be more general, to show where all of the plausible parts go. Message/rfc822 is not more general, is just different. If I implemented failure reporting, I'd choose text/rfc822-headers (and heavy redaction) to reduce PII leakage as much as possible. The point of the example is

Re: [dmarc-ietf] Girl Scout troops vs MLM problems (#70)

2022-08-12 Thread John R Levine
On Fri, 12 Aug 2022, Alessandro Vesely wrote: When Dave proposed the Author header, part of the idea was that DMARC could use it rather than From. IIRC that was the Sender: field. No, DMARC decided not to use Sender back when DMARC was new. Dave suggested using Author to work around the

Re: [dmarc-ietf] Time to work on failure reporting

2022-08-12 Thread John R Levine
The Source-Port field is non-standard so I'd take it out. Defined by RFC 6692. So it is. ARF is such a mess. I'd change text/rfc822-headers to message/rfc822 and add ther a message body or something like [ Message body was here ] Why? I chose a body-less example as it looks more

Re: [dmarc-ietf] Time to work on failure reporting

2022-08-11 Thread John R Levine
On Thu, 11 Aug 2022, Alessandro Vesely wrote: I added an example, see https://github.com/ietf-wg-dmarc/draft-ietf-dmarc-failure-reporting/blob/main/draft-ietf-dmarc-failure-reporting-04.txt#L528 I omit diffs, as the only difference is Appendix A.3 (and I removed an antique Acknowledgments

Re: [dmarc-ietf] Girl Scout troops vs MLM problems (#70)

2022-08-11 Thread John R Levine
On Thu, 11 Aug 2022, Murray S. Kucherawy wrote: It only works if all or most lists add Author (none do today, and it would take a long time to get this rolled out if they started), and no other software co-opts and mutates it for whatever reason. Those are big enough conditions that I'm a bit

Re: [dmarc-ietf] Collecting message metadata, was Time to work on failure reporting

2022-08-10 Thread John R Levine
On Tue, 9 Aug 2022, Murray S. Kucherawy wrote: I agree with John, I think, that the amount of time we should spend improving failure reporting should be proportional to how much it's used, or how much the community is asking us to do so. ... My small mail system gets failure reports every day,

Re: [dmarc-ietf] Girl Scout troops vs MLM problems (#70)

2022-08-10 Thread John R Levine
On Wed, 10 Aug 2022, Barry Leiba wrote: Yeh, I have to take serious issue with this: It's not a "tantrum" to say that it's not reasonable to require all mailing list software and every mailing list in the world to change what's worked for decades in order to work around a problem caused by use

Re: [dmarc-ietf] Time to work on failure reporting

2022-08-09 Thread John R. Levine
Keeping it as-is for backwards compatibility is probably the best option. I'm not sure that it's necessary to keep it as is for backward compatibility. Both RFC 7489 and DMARCbis contain the phrase "unknown tags MUST be ignored" in the General Record Format text, so even if DMARCbis were to

Re: [dmarc-ietf] Girl Scout troops vs MLM problems (#70)

2022-08-09 Thread John R Levine
Not quite. Lists are already screwed up, AFAICS. Right. Lists were fine until DMARC screwed them up. Because there are more ways for a forwarder to change a message than you or I can describe. That critic applies to my draft, not to unmunging in general. The only change we care about

Re: [dmarc-ietf] Girl Scout troops vs MLM problems (#70)

2022-08-08 Thread John R Levine
Actually, small receivers can simply trust selected, DMARC-aligned mailing lists and restore the original From: in the cases where MLM saved it (w/o ARC). This kind of hack could be set up really quick. > Please please can we stop doing this.  Trying to unmunge rewritten From: headers is

Re: [dmarc-ietf] Collecting message metadata, was Time to work on failure reporting

2022-08-08 Thread John R Levine
On Mon, 8 Aug 2022, Alessandro Vesely wrote: It also misses the fact that "already reported characteristics" is undefined. Right, that's to be defined. Clearly, the criteria differ between SPF and DKIM. We could also define fuzzy criteria. Mike and I just provided separate reasons why

Re: [dmarc-ietf] Girl Scout troops vs MLM problems (#70)

2022-08-07 Thread John R Levine
Moving this back to the main list: I said: Even if I agreed that it would be a good idea for every mailing list in the world to rewrite From lines so it's harder to tell who the messages are from and you can't reply reliably, there's no way that would survive last call. Remember that a few large

Re: [dmarc-ietf] Collecting message metadata, was Time to work on failure reporting

2022-08-07 Thread John R Levine
By remembering failure reports issued in the past, new failures having already reported characteristics (e.g. same forwarder) can be silently ignored. That would greatly reduce noise. This is a horrible idea. It presupposes that failures from the same origin (e.g. same forwarder) at different

Re: [dmarc-ietf] Collecting message metadata, was Time to work on failure reporting

2022-08-06 Thread John R Levine
I don't understand what you mean by "no data collection." It is true that you can send a failure report immediately without saving anything for later. “Those who cannot remember the past are condemned to repeat it.” – George Santayana, The Life of Reason, 1905. Perhaps I'm unusually dense

Re: [dmarc-ietf] It's verified, but pretend that it is not...

2022-08-05 Thread John R Levine
On Fri, 5 Aug 2022, Alessandro Vesely wrote: On Fri 05/Aug/2022 04:44:21 +0200 John Levine wrote: DMARC uses available information to produce a result of "Authenticated" or "Not Authenticated". Sometimes, the message can be reliably categorized as "Authenticated" or "Not Authenticated"

Re: [dmarc-ietf] no zone cuts, no Shortcuts

2022-08-04 Thread John R. Levine
I think that Ale's expression that he had difficulty understanding the description of the tree walk as written is a strong sign we still need to improve the language. Of the people involved in this specific discussion, as far as I know, he's the only one who's first language isn't English.

Re: [dmarc-ietf] Time to work on failure reporting

2022-08-04 Thread John R Levine
That's the reason people set p=quarantine; pct=0; t=y. Indeed, if there is a failure, one would want to fix something. I suggested that, we'll see. This morning on Twitter @mnot noted with alarm that failure reports about list messages give you a pretty good idea about who some of the list

Re: [dmarc-ietf] no zone cuts, no Shortcuts

2022-08-03 Thread John R Levine
I still don't see any value in adding text like this. The description of the tree walk is clear enough. On Wed, 3 Aug 2022, Alessandro Vesely wrote: On Tue 02/Aug/2022 14:33:21 +0200 Barry Leiba wrote: I think it is useful to include a brief explanation of why we moved away from the PSL,

Re: [dmarc-ietf] no zone cuts, no Shortcuts

2022-08-02 Thread John R Levine
How about this: In general, it is not possible to determine the cut points in DNS where a change of management occurs. However, DMARC users define DMARC records at their Organizational Domain, so it is possible to discover them based on that. I'm with Barry. I see no reason to

Re: [dmarc-ietf] no zone cuts, no Shortcuts

2022-08-01 Thread John R Levine
I didn't use zone cut /instead of/ organizational domain. The paragraph I wrote was meant to introduce readers to the network topology onto which organizational domains are defined, so as to justify the algorithm. But zone cuts are irrelevant to the tree walk and have nothing to do with the

Re: [dmarc-ietf] Shortcuts: parent-child allows shorter tree walks

2022-07-31 Thread John R Levine
On Sun, 31 Jul 2022, Murray S. Kucherawy wrote: You could make the argument that you "usually" find DMARC records at zone cuts, but that's relying on convention or happenstance rather than a standards-quality framework. Right, we went through all of this in the failed DBOUND discussion. If it

Re: [dmarc-ietf] no zone cuts, no Shortcuts

2022-07-30 Thread John R Levine
Sorry, but this is just wrong. DMARC and the tree walk have nothing, and I emphasize nothing, to do with zone cuts. I thought a zone cut marked the boundary where an organization delegates control to another one. No, it's the place where one set of name servers delegates part of their DNS

[dmarc-ietf] Updated PSD example

2022-07-28 Thread John R Levine
I made a pull request that changes the PSD example to show how names under a PSD are and aren't aligned, It uses giant.bank.example and mega.bank.example, with bank.example having psd=y. https://github.com/ietf-wg-dmarc/draft-ietf-dmarc-dmarcbis/pull/95 Regards, John Levine, jo...@taugh.com,

[dmarc-ietf] Agenda for meeting on Thursday?

2022-07-26 Thread John R Levine
Is there an agenda for our session? I don't see one its slot on the 114 website. R's, John ___ dmarc mailing list dmarc@ietf.org https://www.ietf.org/mailman/listinfo/dmarc

Re: [dmarc-ietf] premature optimizations, Shortcuts: parent-child allows shorter tree walks

2022-07-24 Thread John R Levine
I hope you agree that .com is a domain. The spec says that in order to discover the Organizational Domain for a domain, I can perform the DNS Tree Walk as needed for any of the domains in question. That way, the domain in question, .com, is the Organizational Domain of itself. That is wrong

Re: [dmarc-ietf] new pull request, PSDs aren't important, was mustard

2022-07-20 Thread John R. Levine
I made another pass over the draft to clean up some of the descriptions. The discussion of PSDs is shorter and clearer, and I made a few small changes in the tree walk to make it clearer. I think we need to make clear that the RFC5322.From domain, the RFC5321.MailFrom domain, and the DKIM d=

Re: [dmarc-ietf] Tree Walk Examples pull request

2022-07-17 Thread John R. Levine
I made a pull request from Scott's examples, lightly edited. Also added a few lines to the makefile to make a diff between the current and previous versions. Regards, John Levine, jo...@taugh.com, Primary Perpetrator of "The Internet for Dummies", Please consider the environment before

Re: [dmarc-ietf] what to document about the tree walk

2022-07-15 Thread John R. Levine
On Fri, 15 Jul 2022, Alessandro Vesely wrote: +1 from me too. Note, though, that the (current) DNS is accidentally correct most of the time, as far as our Tree Walk is concerned. No, it's not an accident. We designed the tree walk based on our knowledge of the way people publish DMARC

Re: [dmarc-ietf] mustard, was I-D Action: draft-ietf-dmarc-dmarcbis-12.txt

2022-07-15 Thread John R Levine
On Fri, 15 Jul 2022, Alessandro Vesely wrote: Organizational Domains are defined as PSD+1, and can have DMARC records I think this would be a good time to review the way relaxed alignment works in sections 4.5 through 4.8 of the draft. Perhaps 0.01% of the time, a tree walk will find a

Re: [dmarc-ietf] what to document about the tree walk

2022-07-14 Thread John R Levine
On Thu, 14 Jul 2022, Scott Kitterman wrote: In my view, standardizing two ways to do policy discovery and alignment would be a substantial danger to interoperability and we'd be stuck with it approximately forever. I agree, it's a self-evidently terrible idea. "Temporary" transition periods

Re: [dmarc-ietf] mustard, was I-D Action: draft-ietf-dmarc-dmarcbis-12.txt

2022-07-13 Thread John R Levine
On Wed, 13 Jul 2022, John Levine wrote: It appears that Murray S. Kucherawy said: Speaking as an AD now, you should expect me to complain about the "SHOULD" in Section 4.7. I went through and looked at all of the "must" and "should", in both upper and lower case. A lot of the lower case

Re: [dmarc-ietf] what to document about the tree walk

2022-07-12 Thread John R Levine
A.6 seems to be dealing with a different subject. I can still sketch some text to be added there, though. I attach the diff. I realize this is getting repetitive but: -- PSDs are very, very rare, and users will generally never see them -- long discussions of PSDs will just confuse people --

Re: [dmarc-ietf] what to document about the tree walk

2022-07-11 Thread John R Levine
On Mon, 11 Jul 2022, Alessandro Vesely wrote: We are proposing an alternative to the PSL without having any experience of it. I think a Proposed Standard should give full explanations of design choices, so that possible, future amendments can be thoughtful and considered. Could you explain,

Re: [dmarc-ietf] "psd=" tag early assignment

2022-07-10 Thread John R Levine
I changed it in a pull request a few weeks ago. If you don't stop on the first psd=y that is not the original domain, you get the wrong result if there are DMARC records above the psd=y. I sent this example on June 21, link is

Re: [dmarc-ietf] "psd=" tag early assignment

2022-07-08 Thread John R Levine
The description of the tree walk should be clear enough. Yeah, /should/! The very fact that you yourself changed your mind about how it works, without going into the hassle of explaining your reasoning, ... Um, what? Scott and I went through some rounds of debugging to be sure the tree

Re: [dmarc-ietf] Final, I hope, tweaks to the tree walk

2022-06-29 Thread John R Levine
On Wed, 29 Jun 2022, Alessandro Vesely wrote: Would you please show an example, realistic or not, where not stopping for psd=y in step 2 leads to a useful result? Keeping in mind that this is an arcane corner case that affects perhaps a few hundred of the 100,000 domains that are likely to

Re: [dmarc-ietf] Final, I hope, tweaks to the tree walk

2022-06-28 Thread John R Levine
What can one find continuing the walk after psd=y? I have looked at every domain in the PSL that publishes a DMARC record and other than the three that are in Scott's PSD list, what I found was totally random. Some looked reasonable, some looked broken. In practice I think the details are

Re: [dmarc-ietf] Final, I hope, tweaks to the tree walk

2022-06-27 Thread John R Levine
Please recall what you said in April: How about if we say that if the initial domain has psd=y, that's the org domain and you don't look anywhere else. That is easy to explain and I don't think we are likely to find anything that better matches the expectations of people who send

[dmarc-ietf] Final, I hope, tweaks to the tree walk

2022-06-25 Thread John R. Levine
I made a pull requests with a few tweaks to the tree walk so it will get the right answer even with psd tags at multiple levels. https://github.com/ietf-wg-dmarc/draft-ietf-dmarc-dmarcbis/pull/47 One question is what do you do if the DMARC record for your original From: domain has psd=y. My

  1   2   3   4   5   >