> On 14 Dec 2020, at 15:11, Douglas Foster 
> <dougfoster.emailstanda...@gmail.com> wrote:
> 
> I called that a third-party message, since the RFC5321.MailFrom domain is 
> different from the RFC5322.From domain.

No, you didn’t.

Third-party direct messages ( RFC5321.MailFrom domain = RFC5322.From domain )

I think ‘first party’ and ’third-party’ are problematic definitions in any case 
and I’m not sure I understand what your goal is here. Who are you considering 
‘party’?

laura

> I am open to revisions of how the boundaries should be defined, but as I said 
> in my reply just now to Michael Hammer, we need to define those boundaries in 
> a way that both sender and receiver understand.  This is the full problem 
> description:
> 
> We have these three types of senders:
> - first-party senders

> - third-party senders
> - spoofers
> 
> We have these four verification states at initial transmission:
> - none
> - spf only
> - dkim only
> - spf and dkim
> 
> We have these 9 routing scenarios:
> - direct (1)
> - indirect (8)
>     with and without SMTP rewrite
>     with and without FROM rewrite
>     with and without content modifications
> 
> Upon receipt, we have these verification states:
> - Not verified
> - SPF only
> - DKIM only
> - SPF and DKIM
> 
> For messages that do not verify, the evaluator uses sender policy (none, 
> quarantine, reject) to categorize the message as either "verifiably spoofed" 
> or "uncertain".   What is the algorithm for doing so?
> 
> DF
> 
> 
> On Mon, Dec 14, 2020 at 5:05 AM Laura Atkins <la...@wordtothewise.com 
> <mailto:la...@wordtothewise.com>> wrote:
> 
> 
>> On 13 Dec 2020, at 21:44, Douglas Foster 
>> <dougfoster.emailstanda...@gmail.com 
>> <mailto:dougfoster.emailstanda...@gmail.com>> wrote:
>> 
>> Based on this discussion, it seems evident that p=reject should include 
>> language about in-transit modifications which are outside the control of the 
>> source domain, and consequently outside the ability of DMARC to guide 
>> recipients.    Extending from that, I thought it would be helpful to specify 
>> some shared assumptions between sender and evaluator to make the 
>> interpretation of the settings less subjective.   I call this the "Minimum 
>> expected implementation at pct=100".
> 
> What about messages which do not have SPF verification but do have DKIM 
> verification? A significant number of email platforms use their own domains 
> in the 5321.from address but have the customer sign with DKIM. In many cases, 
> DKIM signing is actually free, whereas making the SPF align is a paid 
> service. 
> 
>> p=none
>> Minimum expected implementation at pct=100:    
>> All first-party direct messages (RFC5321.MailFrom domain = RFC5322.From 
>> domain) are verifiable using SPF, but may not have a DKIM signature.
>> Third-party direct messages ( RFC5321.MailFrom domain = RFC5322.From domain 
>> ) may or may not have DKIM signatures.
>> Consequently, indirect messages are often not verifiable using DMARC.
> 
>> p=quarantine
>> Minimum expected implementation at pct=100:    
>> All first-party direct messages (RFC5321.MailFrom domain = RFC5322.From 
>> domain) are verifiable using SPF, but may not have a DKIM signature.
>> Third-party direct messages ( RFC5321.MailFrom domain = RFC5322.From domain 
>> ) are verifiable using DKIM signatures.
>> Consequently, indirect messages may or may not be verifiable, depending 
>> whether the forwarded message included a signature.
>> 
>> p=reject
>> Minimum expected implementation at pct=100:    
>> All first-party direct messages (RFC5321.MailFrom domain matches 
>> RFC5322.From domain) are verifiable using SPF and DKIM.
>> Third-party direct messages ( RFC5321.MailFrom domain does not match 
>> RFC5322.From domain ) are verifiable using DKIM signatures.
>> Indirect messages which are not modified in transit are verifiable using 
>> DKIM signatures.
>> Indirect messages which are modified in transit are outside the scope of 
>> DMARC and must be evaluated by other criteria available to the recipient 
>> system.
>> 
>> Having defined the policies/categories in these terms, the logical next step 
>> would be a best practices document which discusses how an evaluator might 
>> distinguish between direct messages, indirect unmodified messages, and 
>> indirect modified messages.   ARC obviously plays a role in making these 
>> distinctions easier to determine and less error-prone.
>> 
>> Doug Foster
>>  
>> 
>> On Sat, Dec 12, 2020 at 1:42 PM Dave Crocker <dcroc...@gmail.com 
>> <mailto:dcroc...@gmail.com>> wrote:
>> On 12/11/2020 9:37 AM, John Levine wrote:
>> > In article <1ac986ff-507b-4917-9c6d-d84e9337f...@wordtothewise.com 
>> > <mailto:1ac986ff-507b-4917-9c6d-d84e9337f...@wordtothewise.com>> you write:
>> > aligned is not authorized by the domain owner and may be discarded or 
>> > rejected by the recipient.
>> > Naah.
>> >
>> > p=reject: all mail sent from this domain should be aligned in a DMARC
>> > compliant way. We believe that unaligned mail is from unauthorized
>> > senders so we ask receivers to reject it, even though that might mean
>> > some of our authorized senders' mail is rejected too.
>> 
>> 
>> As soon as this specification text, here, contains language about how 
>> this information is to be used, should be used, or could be used, it 
>> crosses over into creating confusion about expectations of receiver 
>> handling.
>> 
>> It encourages misguided language such as the receiver 'overriding' 
>> sender policy.  The sender has no policies about receiver behavior, 
>> because there is no relationship between them. Using milder language 
>> here doesn't help, because readers typically do not read like legal or 
>> technical scholars.
>> 
>> DMARC provides information, not direction.
>> 
>> The spec already contains misguided perspective by talking about 
>> 'policy' records and, even worse, "policy enforcement considerations".
>> 
>> If the document must contain language about receiver choices in message 
>> disposition, move it to an overtly non-normative discussion section that 
>> legitimately covers a wide range of things that receivers do or don't do 
>> (cast as things they might or might not do.)  And make sure none of the 
>> language hints at sender 'policy', overrides, or the like.
>> 
>> 
>> d/
>> 
>> -- 
>> Dave Crocker
>> dcroc...@gmail.com <mailto:dcroc...@gmail.com>
>> 408.329.0791
>> 
>> Volunteer, Silicon Valley Chapter
>> American Red Cross
>> dave.crock...@redcross.org <mailto:dave.crock...@redcross.org>
>> 
>> _______________________________________________
>> dmarc mailing list
>> dmarc@ietf.org <mailto:dmarc@ietf.org>
>> https://www.ietf.org/mailman/listinfo/dmarc 
>> <https://www.ietf.org/mailman/listinfo/dmarc>
>> _______________________________________________
>> dmarc mailing list
>> dmarc@ietf.org <mailto:dmarc@ietf.org>
>> https://www.ietf.org/mailman/listinfo/dmarc 
>> <https://www.ietf.org/mailman/listinfo/dmarc>
> 
> -- 
> Having an Email Crisis?  We can help! 800 823-9674 
> 
> Laura Atkins
> Word to the Wise
> la...@wordtothewise.com <mailto:la...@wordtothewise.com>
> (650) 437-0741                
> 
> Email Delivery Blog: https://wordtothewise.com/blog 
> <https://wordtothewise.com/blog>  
> 
> 
> 
> 
> 
> 
> 
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org <mailto:dmarc@ietf.org>
> https://www.ietf.org/mailman/listinfo/dmarc 
> <https://www.ietf.org/mailman/listinfo/dmarc>
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc

-- 
Having an Email Crisis?  We can help! 800 823-9674 

Laura Atkins
Word to the Wise
la...@wordtothewise.com
(650) 437-0741          

Email Delivery Blog: https://wordtothewise.com/blog     







_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to