On 2020-08-09 6:54 p.m., Tõnu Tammer wrote:

DMARC relies on SPF and DKIM. The latter is particularly important for
the mailing lists to ensure that DMARC works. And when I read the cases
it is clear that the issue is not of DMARC but of DKIM.


Indeed, one of the proposed workarounds, Recognized Transformations of Messages, addresses DKIM verification algorithm. Yet, it is being discussed on this list rather than ietf-dkim. I hope it becomes a WG draft soon.


RFC for DKIM says very clearly in the introductory part that and I
quote "Message transit from author to recipient is through relays
that typically make no substantive change to the message content
and thus preserve the DKIM signature." If this is not the case, the
relay is actually violating DKIM standard.

As Dave said, MLMs may need to carry out some transformations while usual relays don't —except those which add **SPAM** subject tags or antivirus footers.

The l= tag is one of the early envisaged provisions to address footer additions. It was deprecated because of the possibility to add malicious footers. Of course, adding a footer /is/ a substantive change.

However tight we define recognized transformations, they have to allow the addition of a few lines and a URL. Hence, they can be malicious. Therefore, we need to differentiate two classes of domain owners, those who can afford such risk and those who want top strictness.


The lists we manage, we have made sure they follow the RFC and there is
no issue of DKIM preservation.


https://wiki.asrg.sp.am/wiki/Mitigating_DMARC_damage_to_third_party_mail#Turn_off_all_message_modifications


Some lists, however, have taken a different approach and to make
sure we have delivery there also, we've looked at the elements
which are used for DKIM calculation. We realise that not including
the content into hash calculation can have a drawback but given
that non-DKIM compliant lists do with content what they wish anyway, it's not much of a drawback. At the same time, prevention against spoofing and misuse is retained, which is the key for
DMARC.


That only works if you trust the MLM. We cannot rely on trust, because there is no widespread common reputation system. DMARC does provide for "trusted_forwarder" and "mailing_list" policy override types:

   However, before this action is taken, the Mail Receiver can consult
   external information to override the Domain Owner's policy.  For
   example, if the Mail Receiver knows that this particular email came
   from a known and trusted forwarder (that happens to break both SPF
   and DKIM), then the Mail Receiver may choose to ignore the Domain
   Owner's policy.

However, that kind of hush hush is not deterministic, since the protocol does not define the "external information". Providing for a URL pointing to such external source might help.


Best
Ale
--





















_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to