On Tue, Aug 25, 2020 at 2:13 PM John R Levine <jo...@taugh.com> wrote:

> On Tue, 25 Aug 2020, Dotzero wrote:
> >>> I would expect there to be multiple potential approaches to identifying
> >>> acceptable intermediaries.
> >>
> >> The harder part is to decide which intermediary gets to re-sign which
> >> message at the time you apply the weak signature.
> >
> > It would have be the domain in the "To" field.  It wouldn't work with
> > random unknown intermediaries. It would address the MLM issue as long as
> > the MLM domain is the same as the "To" domain when the message was
> > originally sent. It could also presumably work for vanity domains if they
> > DKIM sign. It wouldn't work for forwards on the receiver side that the
> > sender is unaware of.
>
> If the list is somel...@lists.foo.org, does the signature have to be
> d=lists.foo.org?  How about d=foo.org?
>

This is something that would have to be thought through and discussed. I
want to lean towards exact match but I could be convinced that the base
organization signature would be acceptable as a starting point. I would
recommend anyone coding this for signing to use a flag to easily switch
between the two. I'd recommend that any intermediary doing signing consider
using the CNAME approach so that all their lists can easily be signed with
an exact match signature. This is one of the areas where implementation and
operational considerations may differ from standards considerations.

>
> On the flip side, do you put a weak signature on all of your outgoing
> mail, which seems like a bad idea, or just mail that you expect to go
> through list modification?  In the latter case, how do you tell?  These
> are the scaling problems that I fear make this unworkable.
>

I think only putting the weak signature on mail you expect to be modified
would be the way to go. As I indicated in my previous post, there are
multiple ways to address identifying which mail is likely to go through an
intermediary.  Large mail providers/data gatherers probably already have an
awareness in this space. Others could probably create lists which could be
checked realtime or updated/downloaded once or twice a day. Organizations
could also enable self registration of intermediary use by their users. It
might also be a combination of these approaches. I don't see this as an
issue that makes scaling unworkable. There are plenty of folks checking for
blocklists, how does this differ significantly either operationally or in
scale?

Michael Hammer
_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to