On 11/23/20 12:29 PM, John R Levine wrote:
1) A mailing list creates an auth-res on the incoming mail to the list

2) It modified the message

3) It resigns the message with DKIM

4) It is then delivered to the subscriber's mail server

5) The destination mail server can look at the incoming message including the mailing list's auth-res and decide whether to trust it or not just like ARC.

It seems to me this covers the vast majority of cases. What are the other cases where this is not sufficient and how significant are they in reality?

Two or more levels of forward are quite common, particularly in large mail systems.  Look at mail coming out of Google and Microsoft's hosted mail and you'll see a lot of ARC headers.

Considering that the ARC RFC was published over a year ago, and it is implemented all over the place, could you explain what the point of this discussion is?  The people who designed ARC are not idiots.  If we could have fixed the mailing list problem with existing DKIM signatures, we would have.

Then why is it not standards track? And am I to understand that I'm not allowed to comment on an experiment? Perhaps the working group chairs or AD can clarify that.

In any case, if this all boils down to whether I trust the intermediary who resigned the message, then that is a previously solved problem: you can base the reputation check based on the resigned signature. I'm not entirely sure what the value of  the previous auth-res is. If I recall correctly, the document was sort of short on what the specific utility is, but I may have missed it.

Mike

_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to