Rather than approaching the topic based on the degree of completeness that has 
been achieved, I prefer to approach it from the perspective of functional 
components that should be implemented jointly.   I propose six function groups. 
  The grouping and the justification for that grouping appear below.

Doug Foster

Sender:  Capabilities required prior to publishing a DMARC policy

- Sender should assume that some recipients may uplift from p=none to 
p=quarantine or uplift p<100 to p=100.   To minimize the risk of blocked 
messages, known mail sources should be configured with DKIM signatures before a 
DMARC policy is published.

- Sender should assume that, on initial implementation, the domain will have 
some legitimate but not-verifiable messages.   Therefore an rua=address 
destination must be configured in the policy to become aware of those problems. 
  Recipients which detect a DMARC policy without any rua=address can assume 
that the sender is not serious and the policy is not trustworthy.

- Sender should have a process in place for reviewing DMARC reports to detect 
and correct errors that cause DMARC verification failures.

Sender / Mediator:   Capabilities required for a DMARC-aware outbound gateway

- Sender / Mediator should be aware that transmitting messages which fail DMARC 
verification could lead to reputation problems, ranging from individual 
messages being rejected to the source domain's servers being blacklisted.

- Therefore, outbound traffic should be handled as follows:- Determine whether 
each message's source domain has a DMARC-enforcing policy.  - If required, 
implement one of these compliance measures:- Ensure that a valid DKIM signature 
is present, based on a known-good configuration flow or based on a test 
verification.- Add a valid DKIM signature if one is not present and a DKIM key 
is available.- Rewrite the From address to the local domain, and preferably add 
a DKIM signature for the local domain, so that the message will pass DMARC when 
it is received.- Reject the message as undeliverable.

Recipient:  Capabilities required for a DMARC-aware incoming gateway.

- Recipient should assume that some legitimate senders will have configuration 
errors, even if sender policy asks for enforcement.    Any DMARC-enforcing 
implementation should have an exception mechanism for overriding p=quarantine 
or p=reject for specific MailFrom + From combinations.

- Recipient should consider that whitelisting a trusted sender is only safe if 
spoofing risk has been ruled out.   DMARC-verified combinations of Mail>From + 
From provides the recipient with the spoof-safe information needed to support 
whitelisting when whitelisting is desired.   Any DMARC-enforcing implementation 
should allow DMARC verification status to be included in a whitelisting policy 
rule.

Recipient:   Capabilities required for an incoming gateway with DMARC "rua" 
reporting

- Incoming gateway must accurately test incoming messages for DMARC policy 
compliance
- Incoming messages and their DMARC status must be logged into a database that 
supports reporting.
- An automated process must be in place to parse the database to generate the 
DMARC "rua" reports on the required schedule.
- An automated submission process must be in place to transmit the generated 
"rua" reports when they are generated.

Recipient:   Capabilities required for an incoming gateway with DMARC "ruf" 
reporting

- Incoming gateway must integrate DMARC-policy checking with message threat 
assessment.
- Incoming gateway must provide configuration mechanism to specify whether or 
not a specific ruf-requesting domain should actually be given such notices.   
The reporting policy will depend on the recipient's perception of the source's 
good administrative intentions.
- Incoming gateway must provide configuration mechanisms to specify which types 
of undesired messages will trigger an "ruf" report.
- Incoming gateway must be able to generate and transmit an "ruf" report in a 
timely manner after a problem message has been received.
- Incoming gateway must provide throttle controls to avoid backscatter from 
excessive "ruf" reporting.   This must include, but need not be limited to, any 
throttling rules provided in the DMARC specification.

Sender:  Capabilities required for receiving "ruf" reports

- Sender must provide an "ruf" destination mailbox.
- "ruf" mailbox must be integrated into a security monitoring and alarming 
environment, so that corrective action begins in a timely manner after an alarm 
is received.
- "ruf" mailbox management must be prepared to cope with high message rates 
because an infected account might generate a high rate of objectionable 
messages, which may in turn generate a high rate of "ruf" reports.

----------------------------------------

From: seth=40valimail....@dmarc.ietf.org
Sent: 9/23/20 5:50 PM
To: IETF DMARC WG <dmarc@ietf.org>
Subject: [dmarc-ietf] DMARC bis: revisiting ticket 66

As Chairs, we'd like to push for more discussion of this topic.

I've heard some discussion that this distinction belongs in a BCP, not the base 
spec, but regardless of where text lands (and it certainly shouldn't be 
normative language) the Chairs strongly believe that having rough consensus on 
clear definitions is key to progressing the bis effort effectively. We strongly 
agree with Dave Crocker's position here: 
https://mailarchive.ietf.org/arch/msg/dmarc/XXE3r5FUozl6LVohv8rTkn5QG4E/

Original thread: 
https://mailarchive.ietf.org/arch/msg/dmarc/8f3AMoQ_7e3i7zEFTTtK-KnDgzI/
Follow up thread from Todd Herr: 
https://mailarchive.ietf.org/arch/msg/dmarc/zHti6fc5Rs4SmfMB3jVK_DQnemA/

To repaste the original context for this conversation:

Many different entities participate in DMARC, and to each, there is a different 
definition of what is needed to "implement" or participate in DMARC.

Should the spec be clear about the different participants, and what it means 
for each to participate partially and completely?

As a straw man to start conversation (assume this is all wrong):

The domain owner:- partially participating: valid record?- complete 
participation: no part of the domain hierarchy can be spoofed by an 
unauthenticated sender?

The receiver/MTA:- partially participating: validates DMARC?- complete 
participation: validates DMARC and ARC, and sends aggregate reports?

The intermediary (is this different than a receiver?):- partially: validates 
DMARC?- complete participation: validates DMARC and validates and seals ARC?

Seth

--

Seth Blank | VP, Standards and New Technologies
e: s...@valimail.com
p: 415.273.8818

This email and all data transmitted with it contains confidential and/or 
proprietary information intended solely for the use of individual(s) authorized 
to receive it. If you are not an intended and authorized recipient you are 
hereby notified of any use, disclosure, copying or distribution of the 
information included in this transmission is prohibited and may be unlawful. 
Please immediately notify the sender by replying to this email and then delete 
it from your system.
_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to