On Friday, October 29, 2021 7:06:18 AM EDT Douglas Foster wrote:
> PSL entries are imputed with four important characteristics:
> - name not valid for MAILFROM
> - name not valid for FROM
> - name not valid for DKIM
> - name not valid as an alignment point for mismatched names.
> 
> For non-PSL names, the reverse is assumed by default - any name is valid
> for any of these purposes.
> 
> It is important to note that the PSL covers all possible names -- if a name
> prefix is not in the PSL, we assume it is a fake name.    Experience also
> indicates that it is trusted as accurate.  We have not spent any time
> talking about a need for PSL override rules.
> 
> Finding the first available DMARC policy, as John suggests, does not come
> close to replacing the PSL.
> 
> - First, DMARC policies do not cover all possible names, which is a
> rather critical problem.
> 
> - Secondly, even when they are present, the first-match DMARC policy does
> not define all valid alignment points.   Consider unit2.example.com and
> unit1.example.com.   Each unit may have its own DMARC policy, but the
> parent domain may still be a valid alignment point.
> 
> I can test alignment without a DMARC policy, but I cannot test alignment
> without a PSL or a comparable replacement.   We could define DNS flags to
> cover the four PSL characteristics listed above, and those flags have
> potential use cases outside of the PSL   But we have already concluded that
> we cannot reliably expect every PSL to configure DNS entries to meet our
> needs, so the DNS-based PSL would lack the necessary trust that we have in
> the current PSL.

Have you looked at the PSL?  I mean the actual content?

In the public names section of the PSL, here are the entries with three or 
more dots:

schools.nsw.edu.au
pvt.k12.ma.us
chtr.k12.ma.us
paroch.k12.ma.us

I think it was a mistake for RFC 7489 not to specify that the private domains 
section of the PSL shouldn't be used.  Using the private ones doesn't change 
the equation much, but I don't think these merit any special consideration.  
It does get you one more dot.  Here's the four dot private names:

*.compute.amazonaws.com.cn
cn-north-1.eb.amazonaws.com.cn
cn-northwest-1.eb.amazonaws.com.cn
*.elb.amazonaws.com.cn
s3.cn-north-1.amazonaws.com.cn
s3.dualstack.ap-northeast-1.amazonaws.com
s3.dualstack.ap-northeast-2.amazonaws.com
s3.dualstack.ap-south-1.amazonaws.com
s3.dualstack.ap-southeast-1.amazonaws.com
s3.dualstack.ap-southeast-2.amazonaws.com
s3.dualstack.ca-central-1.amazonaws.com
s3.dualstack.eu-central-1.amazonaws.com
s3.dualstack.eu-west-1.amazonaws.com
s3.dualstack.eu-west-2.amazonaws.com
s3.dualstack.eu-west-3.amazonaws.com
s3.dualstack.sa-east-1.amazonaws.com
s3.dualstack.us-east-1.amazonaws.com
s3.dualstack.us-east-2.amazonaws.com
app.os.stg.fedoraproject.org
users.scale.virtualcloud.com.br
it1.eur.aruba.jenv-aruba.cloud
cloud.jelastic.open.tim.it

If you include the private names, the organizational domain for 
example.s3.dualstack.ap-northeast-1.amazonaws.com is example.s3.dualstack.ap-
northeast-1.amazonaws.com, not amazonaws.com (RFC 7489 3.2 Step 3 specifies the 
longest match).  That can't be what we would want.

As John has suggested, DNS is pretty flat and there are solutions for fakes 
that are deep in the tree that don't need the PSL.  If paroch.k12.ma.us were 
to publish a DMARC record that caused a problem for a parochial school in the 
US state of Massachusetts, then I think it's fair to say that the school 
should take that up with the operator of paroch.k12.ma.us.  It's enough of a 
corner case that it's not worth giving up the benefit of not being dependent on 
the PSL.

Keep in mind, even if you're assessment were correct and we agreed it's 
important, it would only describe the PSL as it exists today with an 
assumption it's accurate.  If you look in the comments of the PSL it's clear 
that it is incomplete, known to be incomplete by the PSL maintainers, and will 
remain that way.

Even if we liked the idea of email being dependent on an external list, it's 
not clear that the PSL is really a complete enough answer to that question.  
It got DMARC out the door to start, but let's not pretend it's more than it 
is.

Scott K




_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to