That is should be expected when people monkey around with long time mail infrastructure. Its a bad idea and sets a terrible precedent by alluding to the idea "its normal." No its not normal. It will be exploited and probably its too late to put this one back if a few mailing list packages are already doing it. If isolated, fine, but it can't be IETF endorsed in any way.

YAHOO does not want people to use their domain without permission. Period and the big gorilla has set the action in motion for many others to follow suit with strong policies that with DMARC will bring things because it lacks the definition for wider use cases. So we need the fastest way to get this resolution out there -- a POLICY LOOKUP METHOD with expanding use cases definitions that was long envisioned since the git-go.

We been battling this for a long time and its really about what domain (1st or 3rd party) do we want to receivers to lookup?

Well, one side wants receivers to look up some 3rd party trust entity (ala SSL) and the other side says, fine, but we also want the self-signing authority lookup as well - the ownership domain. There are conflicts between the two because the 3rd party guy does not want the 1st party guy to have any say over any its mail changes or tampering and/or forwarding. This "corollary" was unfortunately written into RFC5016.

   10. SSP MUST NOT provide a mechanism that impugns the existence of
       non-first party signatures in a message.  A corollary of this
       requirement is that the protocol MUST NOT link practices of first
       party signers with the practices of third party signers.

         INFORMATIVE NOTE: the main thrust of this requirement is that
         practices should only be published for that which the publisher
         has control, and should not meddle in what is ultimately the
         local policy of the receiver.

         Refs: Deployment Consideration, Section 4.3.


Unfortunately, this is still a strong desire. Which is fine, but they don't want to even bother to ask the 1st party domain what does the correct or bad transaction is expected to LOOK like. It is this separation that the DKIM wants to maintain that has long held back the resolution to this problem.

Keep it simple.


--
HLS


On 9/9/2014 1:50 PM, Steve Atkins wrote:

On Sep 9, 2014, at 1:39 AM, Stephen J. Turnbull <step...@xemacs.org> wrote:

Kelley, John writes:

1. Auto Forwards, principally where the email is munged in some way
causing DKIM to fail.
2. Mailing lists; although the big ones seem to be rewriting the From
(thanks).

 From what I've seen on Mailman Project lists[1], your users may not feel
the same way, though.  There have been complaints to list owners that
they're getting singled out (a popular Mailman feature, for example,
checks DMARC policy and munges From or wraps the message only if it's
p=reject).


Some of the changes that have been made to mailing lists to work
around DMARC have made them significantly less useful.

It unavoidably breaks the ability to search for emails or filter inbound
mail by author email address.

It also makes it hard / impossible to reply to the
author, or see what domain the author is associated with - though
that may be because the changes made by the mailing list operators
aren't as well done as they could be rather than something
unavoidable.

Cheers,
   Steve

_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc



--
HLS


_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to