On 6/12/2019 9:37 AM, Laura Atkins wrote:

On 12 Jun 2019, at 14:28, Hector Santos

 (o) Reject with 55x before DATA state

Given that the 5322.from is crucial for DMARC, and the 5322.from is
transmitted after DATA, how can you evaluate DMARC before DATA?


When SPF is taking into account. But yes, overall, my comment was more about the whole "rejection" issue whether it was with SPF or with the DATA payload technologies since MARID; SenderID, Domainkeys, DKIM, then ADSP, now DMARC. The "To Reject or Not Reject" question was always there.

With SPF and DMARC, for example, if the receiver was made aware of the 5322.From before the DATA state, this would preempt the need to receive the payload in order to get reporting information or perhaps get DMARC overriding deposition, i.e. p=quarantine overrides SPF -ALL rejection.

How?

Well today, we had the PRA/SUBMITTER protocol used to pass the Purported Responsible Address via MAIL FROM:

   C: MAIL FROM:<return-path> SUBMITTER=pra

Many clients do use SUBMITTER. Enable it and they will pop up. Since we deprecated submitter when SPF was made standard track, imto, it may be a good idea to explore leveraging this protocol to support DMARC at SMTP.

I know this is just an optimization. But I would prefer this optimization over the idea of accepting a potentially large payload of a SPF -ALL failure just to find out if there is a DMARC record because the operator may want to see such SPF only failures.


--
HLS


_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to