On 11/24/20 4:56 PM, Brandon Long wrote:


On Tue, Nov 24, 2020 at 3:57 PM Michael Thomas <m...@mtcc.com <mailto:m...@mtcc.com>> wrote:


    Our experience also showed that more than one hop is quite common
    in enterprise deployments,
    and those are also the places where the most complexity arises. 
    Others shared our experience
    as well.

    That's more than one modifying intermediary in *separate*
    administrative domains? Within your own administrative domain
    there shouldn't be an issue of trust since you can trust your own
    servers auth-res and that they are not maliciously trying to forge
    an auth-res for better treatment. and course it's best to stop a
    bad message as soon as possible in the mail pipeline if for no
    other reason than why waste the resources.

The administrative domain in practice tends to be per-vendor and multi-tenant.  Ie, gsuite/gmail is on google.com <http://google.com>, various third party anti-spam gateways also different, on-premise being also separate.  Passing that trust between domains is one of the things that ARC can handle.

One of the failings of many, many ietf documents is to not tell the story of what exactly the problem is and why the protocol is needed. It's really frustrating to the reader to not have the context of endless wg list discussions distilled so that an outsider can understand the design tradeoffs. I still don't understand why a DKIM signature was a "poor choice". That's especially true when something is an experiment that assumedly has yes/no endpoint.

So mtcc.com is now hosted by gsuite (::sigh::), so you're saying that it would run into problems? I haven't put up a DMARC policy, but if I did I might run into issues with false positives? Like I said, I'm trying to get my head around what the actual problems are, and this is coming from a person who stressed mightily from the very beginning about the mailing list problem.



    Well sure, I'm sure it can happen but is it common enough to worry
    about? And I'm still not convinced that figuring out who signed
    what and which auth-res it belonged to is in insurmountable
    problem. for one, there are received headers which better not be
    getting out of order to help correlate with the messages' path
    through intermediary verifiers too.

So, we do have some Received header walking code, and allow admins to set up the list of IPs that are considered "internal" (beyond private addresses)... but O365 uses public IPs internally and has a huge and unpublished ranges of them, making it nearly impossible for admins to maintain a list.  Obviously we can all add code to handle Microsoft specially... and whichever other ones come up.


But can't you trust the received headers once you have possession of the message within your domain? I'm sorry if I'm being dense here but received headers are definitely ordered and if you loan out a message to be processed by a different domain and they aren't trustworthy, that's the least of your problems. That's part of the overall problem though: it's really hard to understand what the problem here actually is. Explain it like I'm five :)

Mike

_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to