Doug,

>>>
A few of us hope to be publishing a draft aimed at safely extending third-party 
authorizations in a highly scalable fashion that answers these questions.  
Replace the l= with tpa=(yes, no);  The tpa entry can then apply additional 
restrictions in the hashed-accessed resource record used to authorize a 
third-party domain.  This might involve list-id header alignment, etc.  Since 
this scheme can be generalized, it seems the "{hash-label}._tpa" resource 
should include related protocols as well
<<<

How would this work in real life? Would Yahoo need to publish in DNS a list of 
all the mailing lists their users subscribe to?

-- Terry

-----Original Message-----
From: Douglas Otis [mailto:doug.mtv...@gmail.com] 
Sent: Tuesday, May 6, 2014 6:00 PM
To: Terry Zink
Cc: J. Gomez; dmarc-discuss@dmarc.org
Subject: Re: [dmarc-discuss] DMARC woes - forwarding signed / encrypted e-mail


On May 6, 2014, at 5:30 PM, Terry Zink <tz...@exchange.microsoft.com> wrote:

>> What do you think about this proposal to extend DMARC to 
>> account for the failure case of DMARC with mailing lists: 
>> http://www.ietf.org/mail-archive/web/dmarc/current/
>> msg00167.html
> 
> I remember this thread from a year ago and that it didn't get a lot of 
> support. I suppose an example record is the following:
> 
> _dmarc.example.com "v=DMARC1; p=reject; pct=100; rua=...; ruf=...; l=yes"
> 
> The idea is for mailing lists to avoid getting filtered by DMARC (since it 
> does spoof the From but legitimately) but it needs to be thought out 
> end-to-end. I have a couple of questions:
> 
> 1. The tag value for l=no isn't required. This means "I don't participate in 
> mailing lists and therefore you should enforce my p=reject action." But this 
> is the same as l=dunno (empty) which is the same as today's behavior. So, you 
> would only need l=yes.
> 
> 2. How would a receiver know that the email comes from a mailing list? Would 
> it just look for something like a List-Unsubscribe or List-Subscribe header? 
> Or something similar?
> 
> 3. Would the expected behavior be that if the email comes from a mailing list 
> yet fails DMARC, do not enforce DMARC's p=reject action nor the p=quarantine 
> action?
> 
> 4. What about a large domain prone to spoofing? Yahoo publishes a p=reject, 
> and plenty of its users use mailing lists. What is stopping a spammer from 
> putting the same mailing list tags into the message and spoofing From: Yahoo? 
> That seems like a very easy workaround for the spammer. A counter argument is 
> to not blindly trust what appears to be a mailing list but also apply some 
> other heuristic to it (e.g., domain or IP reputation). But if you're going to 
> apply IP or domain reputation to suppress the DMARC action, then you don't 
> need to pay attention to the l=yes tag at all. 
> 
> That is, if condition X can let you know whether or not to do p=reject, then 
> there's no reason to do condition X and condition Y, making condition Y 
> redundant. Right?

Dear Terry, 

A few of us hope to be publishing a draft aimed at safely extending third-party 
authorizations in a highly scalable fashion that answers these questions.  
Replace the l= with tpa=(yes, no);  The tpa entry can then apply additional 
restrictions in the hashed-accessed resource record used to authorize a 
third-party domain.  This might involve list-id header alignment, etc.  Since 
this scheme can be generalized, it seems the "{hash-label}._tpa" resource 
should include related protocols as well.  In this way, if there is any abuse, 
the Author-Domain from DMARC's perspective will not enable just any message 
with a list-id header or those purporting to be from a mailing-list.  This also 
removes replay concerns, since the Author-Domain is able to delist any 
third-party domain failing to respond to reports of abuse. 

There would be an additional benefit beyond restoring use of third-party 
services.  When requested policies are used in conjunction with user accounts, 
the fact that their account has been disabled to prevent delisting would act as 
a type of notification that the user's account or system has become 
compromised.  Just as your organization does, we also offer free cleanup tools 
to assist when their system is affected.  Otherwise users should be able to 
simply change their account passwords and security information.  Perhaps we 
could even standardize the forwarding of cleanup results to help facilitate 
service restorations. 

Regards,
Douglas Otis



_______________________________________________
dmarc-discuss mailing list
dmarc-discuss@dmarc.org
http://www.dmarc.org/mailman/listinfo/dmarc-discuss

NOTE: Participating in this list means you agree to the DMARC Note Well terms 
(http://www.dmarc.org/note_well.html)

Reply via email to