Well, I see the suggestion as more than this. Say I outsource salary processing to a 3rd party. They would want to send mail from main.com - Subdomains is one way to fix this (give them salary.main.com ), but they would have to have keys /settings for all their customers (well, could be the same all customers creates CNAMES to).
But I instead created a DNS record like selector.3rdparty.com._domainkey.main.com or selector.3rdparty.com._domainkey.salary.main. Then I could allow them to send mail on behalf of our company without that company having to manage different keys. They would just use 3rdparty.com dkim for all outgoing. Would simplify it for them as well. And would probably make it easier for the small companies performing services for multiple companies. Just sign everything with the same key. I don't see it as complicating things, and it could fix more than the on-behalf-of. But of course it would take time to get deployed. I could probably make a pull request for some OSS software, as this change is trivial. Getting Microsoft to implement a new a new X-behalf-header in the installed base will take many years. I think the on-behalf-of should be rethought, and maybe get it implemented in some SMTP or mail header RFC. But I still feel the dmarc change would be good. Officially Microsoft is supporting dmarc, but we are having issues / a learning curve. Latest is mails sent to distribution groups expanded in the cloud (best gues for now) are "reborn" as new mails, and this is where we get the newly born mails with protection.outlook.com. The distribution group has an internal address, so no dkim. So when it is reborn outside our tenant, it also has no dkim. All headers say it comes from the Internet, so no dkim, and unaligned spf => dmarc=fail. I can handle it somehow in filtering (transport rules), saying anything with smtp.helo = protection.outlook.com and SPF=pass should be allowed, but there is a potential this would allow spoofed mails as I see it. But they would have to come from a Microsoft customer. To get more orgs to implement dmarc, it is important that large providers as Google and Microsoft makes it relative painless. It has been a steep learning curve, especially for our operation architects to really understand how it works. And every single special-case will make the project seem almost impossible. I have 5-6 more domains for daughter companies (in our tenant) I will implement it on very soon with p=quarantine. Here we don't have cross-domain issues I think, but the SPFs might not be updated. But the issues with reborn mails with no dkim is almost a showstopper for full quarantine implementation. As it looks for now, Exchange Online at least raises uncertainty about if we can implement dmarc policy on outgoing mails. For the cross-domain stuff, we will change the identified main.com shared mailboxes to subbrand.com For those that needs to be real cross-domain, we have to dictate that no sendonbehalfof, only sendAs. Microsoft probably has identified the problem, as for shared mailboxes there is no SendOnBehalfOf in the GUI, has to be set using powershell. We use it since we came from Lotus Notes, and are used to it from there. So it is almost considered legacy. -----Oprindelig meddelelse----- Fra: dmarc-discuss [mailto:dmarc-discuss-boun...@dmarc.org] På vegne af Terry Zink via dmarc-discuss Sendt: 30. juni 2016 18:18 Til: Povl Hessellund Pedersen via dmarc-discuss <dmarc-discuss@dmarc.org> Emne: Re: [dmarc-discuss] SendOnBehalfOf in O365 > This is implemented by Microsoft by using header.from = > sha...@main.com - And then they use Sender: u...@subbrand.com and > picks the subbrand.com domain for dkim signature. Smtp.from is also > u...@subbrand.com To clarify, Office 365 requires the message to be attributed to a particular tenant (either a fully hosted mailbox, or attributed to a customer using a connector [TLS-cert based or IP-based]). If so, it uses the domain in the SMTP MAIL FROM to assign the d= domain in the DKIM signature. If it is <>, it uses the domain in the header.from. So in your case, you have: SMTP MAIL FROM: u...@subbrand.com From: sha...@main.com Sender: u...@subbrand.com DKIM-Signature: d=subbrand.com Appears in Outlook as "From: u...@subbrand.com on behalf of sha...@main.com" Appears in most other clients as "From: sha...@main.com" I'm not that familiar with the architecture of shared mailboxes, but rather than changing how DMARC works (and getting industry adoption), more likely Office 365 will play around with the From/Sender/Reply-To/Display Name to get SPF/DKIM/DMARC alignment. -- Terry -----Original Message----- From: dmarc-discuss [mailto:dmarc-discuss-boun...@dmarc.org] On Behalf Of Povl Hessellund Pedersen via dmarc-discuss Sent: Thursday, June 30, 2016 12:33 AM To: 'dmarc-discuss@dmarc.org' Subject: [dmarc-discuss] SendOnBehalfOf in O365 Hi, We are using O365, with multiple domains, call them main.com and subbrand.com - in the same tenant + AD domain. We have people in subbrand.com sending mail "onBehalfOn" of the sha...@main.com mailbox. The advantage of this is, that the recipient can see the name of the consultant who answered. This is implemented by Microsoft by using header.from = sha...@main.com - And then they use Sender: u...@subbrand.com and picks the subbrand.com domain for dkim signature. Smtp.from is also u...@subbrand.com The result is, that spf is valid but unaligned, and dkim is valid but unaligned. By giving u...@subbrand.com SendAs permission on the shared mailbox, all u...@subbrand.com identity information I stripped, and we get correct aligned spf and dkim. But the recipient can't see who was original sender. To fix this, and support the SendOnBehalf I suggest that a feature is added to DMARC / DMARC validators. Have it lookup the subbrand selector on the main domain if there is a signature. Say I get a subbrand.com signature, but RFC5322.from is main.com, then looking up the selector1.subbrand.com._domainkey.main.com and validating that would solve our issues with multiple domains. It would work for this case, and could still be limited to the one DNS lookup, as DMARC would see the DKIM does not match the RFC5322.From, so before even validating it would lookup in main.com domain, using the joined s+d as a new selector. Would also make it easier to outsource other mail processing. Example of mail that could be dmarc validated this way. From: Logistik - Shared Mailbox < logis...@main.com> DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=subbrand.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=/7WJf8aDqzLc+Rk1lvDhG/l0uAPN+ _______________________________________________ dmarc-discuss mailing list dmarc-discuss@dmarc.org https://na01.safelinks.protection.outlook.com/?url=http%3a%2f%2fwww.dmarc.org%2fmailman%2flistinfo%2fdmarc-discuss&data=01%7c01%7ctzink%40exchange.microsoft.com%7c7e31ed10a4784499ce9f08d3a0b96ad4%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=00jZ2v1ProjUbMRzA0R6WHJD28l%2bwa7eAvkdSWYi2BQ%3d NOTE: Participating in this list means you agree to the DMARC Note Well terms (https://na01.safelinks.protection.outlook.com/?url=http%3a%2f%2fwww.dmarc.org%2fnote_well.html&data=01%7c01%7ctzink%40exchange.microsoft.com%7c7e31ed10a4784499ce9f08d3a0b96ad4%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=oeMFM%2biC0TeWTu%2bUCrV%2bMlFPivGqqKihiChlWslG9DQ%3d) _______________________________________________ dmarc-discuss mailing list dmarc-discuss@dmarc.org http://www.dmarc.org/mailman/listinfo/dmarc-discuss NOTE: Participating in this list means you agree to the DMARC Note Well terms (http://www.dmarc.org/note_well.html) _______________________________________________ dmarc-discuss mailing list dmarc-discuss@dmarc.org http://www.dmarc.org/mailman/listinfo/dmarc-discuss NOTE: Participating in this list means you agree to the DMARC Note Well terms (http://www.dmarc.org/note_well.html)