> On Jun 15, 2019, at 9:25 PM, Дилян Палаузов <dilyan.palau...@aegee.org> wrote:
> 
> Hello,
> 
> p=reject; pct=0 is equivalent to p=quarantine; pct=0.

I've not been following this thread too closely so I might be missing 
something, but under current
DMARC spec I don't think that's so - see section 6.6.4.

If I've missed the point ... never mind, carry on.

Cheers,
  Steve

> 
> The rest of this email is about (against) handling p=reject and p=quarantine 
> differently.  Namely, where a server
> rejects on p=reject and “quarantines” on p=quarantine.
> 
> There are more examples, all under the category p=quarantine, where the spam 
> filter does not think a message is spam and
> DMARC fails (e.g. missing DKIM-Signature):
> 
> — an autoresponder.  The incoming email will be delivered as non-spam, as the 
> spam filter does not classify the email as
> spam.  Would you suppress the autorespond (out-of-office/vacation) message, 
> or will you take the risk to send bad
> backscatters, risking lowering your IP reputation.  Is it up to the domain 
> owner of the original message decide on you
> sending backscatters, by publishing slightly different dmarc policies?  If 
> you handle quarantine as reject there is no
> such risk of getting bad IP reputation (under these concrete conditions).  If 
> no auto-responder is sent and the mail is
> not classified as spam, the user will rely on the fact, that an autoresponder 
> was sent… big fuzz.
> 
> — an 1:1 alias to a different server.  If your server thinks the email is not 
> spam, but the server to which the alias is
> redirected thinks the message is spam, or if the user marks it as spam, your 
> IP reputation gets worse.  If you handle
> quarantine as reject there is no such risk.
> 
> — a MLM (1:many alias), where anybody can send messages - same problem as 
> above, just bigger damage.
> 
> p=reject and p=quarantine both communicate, that all messages from a domain 
> must have aligned, valid dkim signature or
> aligned, valid spf result and that for messages from the domain failing 
> DMARC, there must be some penalty.
> 
> How many distinct penalty levels does a sending domain owner need?
> 
> One, or more than one?  Are two penalty levels enough?  Is there 
> justification for two penalty levels?  Can the same 
> justification be used to introduce a third penalty level?  What does the 
> domain owner/sending domain want do
> communicate, by using the first, second, or third penalty level?
> 
> Currently the decisions on handling quarantine/reject in different ways are 
> taken by:
> * domain owners, who own a domain
> * spammers, who use the domain of the domain owner, and let's say are 
> distinct from the domain owners
> * mailbox operators
> 
> Not taken into account are the users.  Why shall a user want to have more 
> messages in its spam folder (assuming that the
> quarantined message was at the end classified as spam and the email operator 
> handles Reject and Quarantine differently)
> versus handling p=quarantine as p=reject and having less Spam to pay 
> attention for?
> 
> About the costs, Quarantine meaning neither deliver, not reject, but 
> something different, can be implemented in this
> way: the operator does not deliver the emails failing DMARC for a domain with 
> p=querantine to the users, but arranges
> staff, to decide what to do.  The costs for that staff, are the extra costs 
> for having distinct handling of
> Reject/Quarantine.  If there is no such staff, and the decisions are taken by 
> the users, then the costs are the same,
> these just are shifted to the users.
> 
> Finally, while DMARC can be used to communicate that all emails from a domain 
> must PASS DMARC rules, why there is a need
> to communicate what to do with emails that fail DMARC from: the domain?  The 
> DMARC specification can be simplified, by
> leaving the hanlding of such emails ultimately up to the receiving host and 
> then there is no need to iterate the options
> at protocol level for the sending domain. (The option, that all emails from a 
> domain must have aligned DKIM signatures,
> but it is up to the recipient what to do with messages without valid 
> dkim-signature or spf result is anyway missing)j
> 
> Regards
>  Дилян
> 
> On Sat, 2019-06-15 at 13:11 -0400, Hector Santos wrote:
>> On 6/14/2019 5:58 PM, Дилян Палаузов wrote:
>>> Hello Ken,
>>> 
>>> effectively I proposed handling p=reject and p=quarantine the same way.
>>> 
>>> ..
>>> 
>>> Lets have an example for p=quaranite:
>>> majordomo@domain is an address where commands are sent and the software 
>>> receiving the
>>> command always sends an answer, even if the command is unclear.  An email 
>>> is sent
>>> to majordomo@domain.  The sending domain has published policy Quarantine.  
>>> This address
>>> has no spam/junk folder attached to it.  The options for an email are:
>>>  * reject the email during the SMTP dialog
>>>  * accept the email and let majordomo send an answer to it
>>>  * arrange a human to decide which emails to discard (handle an imaginary 
>>> Spam folder for the account).
>> 
>> Oh I see your concern/point/proposal now.
>> 
>> Yes, I highlighted this basic issue in years past in regards to the 
>> handling semantics debates. Even with SPF,  how -ALL (FAIL) was 
>> interpreted and handled was questioned. Some believed a -ALL FAIL 
>> policy is more like a quarantine because "no one actually rejects."
>> 
>> But overall, this would be an implementation consideration, not a 
>> protocol design consideration. The protocol is correct to have a 
>> handling semantics describing both ideas - reject and quarantine.
>> 
>> All we can do is highlight the existence of backend mail storage 
>> designs and legacy MUA protocol(s) that can not handle a quarantine 
>> safely. So at best, you can basically highlight the security design 
>> concerns and possible requirements to implement a quarantine concept.
>> 
>> There is much mail design history and evolution to consider. The 
>> concept of quarantine came with the integrated mail design premise that:
>> 
>> - The backend offers user folders or separate mail streams for normal 
>> in-box mail and quarantine, spam, junk mail separations. While this is 
>> common today for ESPs, this was not always the case for all backend 
>> designs.  It was often proprietary in nature.  No standard here unless 
>> we assume everyone using an "Microsoft Exchange" (MAPI) concept or 
>> IMAP which is not reality. This coincides with the premise,
>> 
>> - The broad range of online and offline MUAs all support the 
>> multi-folders provided by the backend.  This is again not reality and 
>> not always the case.
>> 
>> I'll give you a perfect example -- POP3.
>> 
>> POP3 is a single mail stream pick up protocol standard. So for a 
>> backend that provides POP3 service available to its customers and for 
>> the user using MUA with POP3 support, the backend POP3 server MUST NOT 
>> merge any suspicious, spam, junk or quarantine mail with the user's 
>> normal in-box mail pick up stream.
>> 
>> While an advanced POP3 backend server can emulate a single stream 
>> consolidation of multi-user folders, it would a major security loop 
>> hole to expose POP3 users to quarantined mail merged into the user's 
>> pop3 mail stream.  For this to work securely, this advanced POP3 
>> server must assume the MUAs are advanced enough or users are advanced 
>> enough to write MUA scripts that will separate the single pop3 stream 
>> into spam, junk and quarantine folders again.
>> 
>> All we can do is highlight how "rejects" can be interpreted 
>> differently.  After much discussion with SPF, while it didn't provide 
>> an specific example using POP3, it was generically described under 
>> Local Policy Considerations:
>> 
>>    https://tools.ietf.org/html/rfc7208#appendix-G.2
>> 
>> It should also be highlighted for DMARC-bis, if not already.
>> 
> 
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc

_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to