On Mon, Jan 25, 2021 at 3:18 PM Michael Thomas <m...@mtcc.com> wrote:

>
> On 1/25/21 12:08 PM, Todd Herr wrote:
>
> On Mon, Jan 25, 2021 at 2:56 PM Michael Thomas <m...@mtcc.com> wrote:
>
>>
>> On 1/25/21 11:52 AM, John Levine wrote:
>> > In article <
>> cah48zfwejx1pho7x1bjjtyyehxzwmuq3jrhfjzahwfy1jq+...@mail.gmail.com> you
>> write:
>> >> -=-=-=-=-=-
>> >>
>> >> DMARC alignment on the report seems of limited value unless it is
>> aligned
>> >> to the domain being reported. ...
>> > I'm getting the impression that some of us have not looked at any DMARC
>> reports.
>> >
>> > Aggregate reports contain the domain of the reporter, and the domain
>> > of the sender to whom they are sending the report. They do NOT have
>> > the domains to which the messages were sent or where they were
>> > received, which are often different for forwarded or mailing list mail.
>> >
>> > For at least the third time, there is no "domain being reported". When
>> > I get reports from Google or any other multi-tenant mail provider,
>> > they do not say to which of their gazillion hosted domains the mail
>> > was sent. That is not a bug, and it's been like that for a decade.
>> >
>> Sounds like a bug to me and an issue should be opened. Just because it's
>> a 10 year old bug doesn't mean it's not a bug.
>>
>>
> I disagree.
>
> Authentication results should not differ at a given provider based solely
> on the destination domain, so there is no reason to report results
> separately for each destination domain. Further, there's no value to the
> report generators, especially at large sites like Google, to expend the
> resources necessary to generate and send X reports when one will do.
>
> So you're saying I should be free to spoof any domain I want because
> Google might be inconvenienced?
>
>
> I'm not at all following your point here. Let me explain what I'm trying
to say, then perhaps you can explain what you're trying to say in a way
that might make a dent in my seemingly-addled brain, and then we can move
forward.

As a domain owner who publishes a DMARC policy record, a DMARC aggregate
report tells me the results of authentication checks done by a given
reporter for mail claiming to be from my domain during a specified period
of time. These aggregate reports group the information by source IP,
telling me how many messages were seen from a given IP by that reporter,
what the policy evaluation results were, what the header from was, and what
the results of the "pure" authentication checks were.

If I were an owner of a domain of any reasonable size generating
non-trivial amounts of traffic on a daily basis, I would expect that some
of the traffic in a given aggregate report was stuff I'd sent, and some
would be stuff others had sent.

When it comes to a hosting provider, such as Google or any provider hosting
more than one domain, I do not expect that the authentication results
reported by the hosting provider about my domain will differ based on the
domain hosted by that provider to which the traffic was sent. If Google
reported mail from foo.com (my domain), I would expect that all mail I sent
from a given IP would show the same authentication results regardless of
whether it was sent to bar.org, baz.net, someotherdomain.com, whatever
domains Google might be hosting. I would further expect that any mail that
I didn't send would show in the report as failing authentication checks
(assuming I've got my authentication stuff set up correctly) regardless of
what domain it was sent to at Google.

The reasons for these expectations are several:

   1. SPF checks are based on the domain in the RFC5321.MailFrom header, or
   sometimes on the domain in the RFC5321.HELO; the destination domain has
   nothing to do with the success or failure of SPF
   2. DKIM checks are based on the DKIM-Signature header(s) in the message;
   the destination domain for the message has no role in the DKIM validation
   effort, as the public key is published by the signer
   3. DMARC checks are based on the From domain (which publishes the DMARC
   policy) and the results of the SPF and DKIM checks (did either pass, and
   does the domain that passed align with the From domain?). Again,
   destination domain doesn't play a role in the DMARC check

So, based on my understanding of how DMARC works and the information that
an aggregate report contains, I do not see how the lack of the destination
domain in an aggregate report gives one freedom to spoof any domain.

Can you please explain your position that the lack of destination domains
in aggregate reports gives one freedom to spoof any domain, and further can
you please specify which domain(s) in this scenario might be free to be
spoofed?

-- 

*Todd Herr* | Sr. Technical Program Manager
*e:* todd.h...@valimail.com
*p:* 703.220.4153


This email and all data transmitted with it contains confidential and/or
proprietary information intended solely for the use of individual(s)
authorized to receive it. If you are not an intended and authorized
recipient you are hereby notified of any use, disclosure, copying or
distribution of the information included in this transmission is prohibited
and may be unlawful. Please immediately notify the sender by replying to
this email and then delete it from your system.
_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to