On 11/25/20 4:14 PM, Murray S. Kucherawy wrote:
On Wed, Nov 25, 2020 at 11:03 AM Michael Thomas <m...@mtcc.com <mailto:m...@mtcc.com>> wrote:


    That's been known for over 15 years. I'm still trying to
    understand the assertion that DKIM signatures are a "bad fit". I
    just looked at a random message off of this thread and they look
    identical except for the i= field. another field could trivially
    be added to DKIM and auth-res -- since unknown fields are supposed
    to be ignored -- if this binding property is absolutely needed,
    which I remain unconvinced by as well.

I'm not sure about "bad fit".  The original plan was to have an Authentication-Results (AR) clone called Original-Authentication-Results (OAR) which was specifically the AR content generated at the first non-submission MTA. There was some friction (mostly from me, as I recall) about having two header fields with identical syntax and nearly identical semantics.  There was further complication in the fact that one ADMD could apply multiple ARs on a single message (for multiple methods, or multiple instances of the same method, or a combination of those), or they could be reordered, etc.  To make it more resilient, things like instance numbers were added.  The work was eventually generalized to be a "chain of custody" sort of model, and in doing that I think the decision was made to make a new name to ensure ARC and DKIM would be processed differently.


But what about DKIM? And why do they need to be processed differently? When I first saw this, I looked at the ARC-Signature which looks identical to a DKIM signature (i didn't notice the i= at the time), and am like what is this? The i= counter could be trivially be grafted onto DKIM if it were needed, which I'm still sort of dubious (though it is a nice to have feature, I admit). That way you only need a single DKIM signature with the OAR's signed. As far as I can tell, that would fall back gracefully for non-implementing DKIM verifiers. Do you disagree?


    If you ask me, part of the experiment should be able to show use
    cases that DKIM + auth-res (or maybe old-auth-res if needed)
    CANNOT address that ARC can, and most especially what percentage
    of email traffic we're actually talking here. As far as I can see
    ARC doesn't bring anything especially new for the mailing list
    kind of use cases since it really easy to see who the
    intermediary was that broke the signature. I have been told there
    are some vague other kinds of use cases but is unclear whether
    those use cases actually happen before or after the message
    arrives at the front door of the final receiving domain. Yes, i
    read section 7, but it doesn't tell me why this can't be handled
    with current technology.

Obviously it's too late to include this in RFC 8617, but those would indeed be interesting data to have.


Yeah, quantifying the problems kinda seems like the first order of business if you ask me. I mean, how many of these scenarios are in reality goofy self-inflicted wounds? I can't say but there seems to be a lot more "this can happen" than "this is how often this happens" from what I've see thus far on this thread.


When you say "easy to see", do you mean for software or for humans?


Software. Only software can pry apart that ball of header spaghetti. But I think with the simple a mailing list it is pretty easy to determine, which now that I think about it I actually did back in the day when I was experimenting with recovering mailing list modifications. It didn't occur to me that that was supposed to be hard.


    It seems to me that the lynchpin is whether I trust the domain
    that broke the signature and resigned. That's either a previously
    solved or unsolved problem depending on your perspective. If I
    trust the intermediary domain to not send me spam via reputation,
    I forward it along to be delivered and ignore the DMARC record.
    Why do I care whether it originally validated from the sending
    domain or not? If you ask me, that's the intermediary domain's
    problem since they have an incentive to keep their reputation and
    not send spam through.

Suppose you're sending to a list that I'm on, I enforce DMARC, I trust that MLM not to send spam via reputation, you have a good reputation, and you publish a DMARC "reject" policy.  That means if a bad actor sends a message to the list as you but doesn't sign it at all, I'll still accept it because I trust that MLM even though according to your policy request, I should bounce it.  ARC provides the missing data I need to enforce your request.

Sure, but the easier answer: to use my mailing list, you must have either DKIM, SPF or both. Sounds like a good way to not be essentially an open relay. Don't mailing lists have those sorts of policies these days? I would say that ones that don't probably shouldn't have good reputations since they are, in effect... open relays.

Mike

PS: it's been, what, 15 years since our interop, partner? :)


_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to