On 9/27/2020 11:44 PM, Dave Crocker wrote:
On 9/27/2020 11:22 AM, Scott Kitterman wrote:
This seems to me to be an odd view because no RFC is needed to use From and
it's relationship to either DKIM signing domain or SPF validated Mail From.

The DKIM d= value establishes no relationship with any other
identifer, such as the From: field.  At all.  None.

DKIM has a single signature binding requirement, the 5322.From

DMARC establishes the relationship.

I don't read it that way.

DKIM binds the signer d= domain and the from.domain with no enforcement on it nor any indication that they are related when they not the same (the missing link). But if they are the same domain, then they are viewed as self-signed and 100% related.

But who cares? A blind receiver will not know the actual relationship until it sees your DMARC record, if any, and we chose that to be based off the 5322.From domain -- the anchor field.

The DKIM POLICY augmented (add-on) technologies published (via DNS) a protocol expectation for a direct or indirect relationship. DMARC describes a specific rule for a direct relationship. SSP had its rules, DSAP had its rules, and ADSP had its rules. But all of them had one thing in common -- an option to publish a public policy describing a direct and exclusive 1 to 1 relationship and a strong action is authorized when there is a deviation. That was always the power of all this and why we are still here 15+ years. Without it, imo, we would not be here. SPF would not be here if it didn't have a -ALL policy with strong authorization to reject with no questions asked.

To reiterate: Among currently published specifications, without DMARC
there is no relationship between DKIM's d= value and the rfc5322.From
domain name.

To give you credit, you have been preaching this for at least a decade or more, always trying to establish non-binding relationship when the fact is, it is already burned into the DKIM protocol - the only header you MUST bind is 5322.From. So how can it be said there is no strong relationship between the two identities embedded in the DKIM protocol? You might be seeing this from a 3rd party list service where it doesn't wish to care what domains are using. It doesn't care. It doesn't honor DMARC domains with restrictive policies.

DKIM policy protocol was always about providing the "authorizing" and "enforcement" protocol to act/respond to negative deviations from the published expectation for the published DKIM Mail policy. If the publisher makes a public statement "I expect you to see XYZ" But the receiver sees ABC, the DKIM Policy provides the receiver guidance as to what action is suggested. In the case of DMARC, we have:

p=reject (you can permanently reject)
p=quarantine (accept but put into spam box)
p=none (maybe you shouldn't judge based on DMARC deviations)

The problem, in my view, it is protocol incomplete. There are other scenarios not covered by the DMARC protocol syntax and language. We need an extended language for Domain Owners to communicate with DMARC processors in dealing with the deviation is a 3rd party signer domain.

So I need to see how using Sender fits into the equation. What can the DMARC domain owner "describe" via the 5322.From policy statement that says

"Please look at the Sender address using Dave's protocol steps before looking at the Author address"

Example, maybe using a tag.

DMARC p=reject sender=1

This offers backward compatibility. This could tell the receiver to consider using Dave's Sender protocol for DMARC before falling back to DMARC original logic. Don't try to ram Sender down DmarcBis's throat without some extended switch. If you want to explore an extension, a tag such as sender=1 could be used to trigger the a newer exploratory logic.

BTW, what are those steps? can it be outlined in itemized steps?

--
Hector Santos,
https://secure.santronics.com
https://twitter.com/hectorsantos


_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to