On Thu, Aug 4, 2022 at 7:37 AM Douglas Foster <
dougfoster.emailstanda...@gmail.com> wrote:

> RFC 9091 provides a way to detect misuse of unregistered organizations,
> one level below the PSD/Registrar level.   Use of an unregistered name is
> inherently a form of unauthorized impersonation.   Consequently, the test
> may be used whether the PSD has published a policy or not, and the default
> can reasonably be set to reject on non-existence.  Every PSD policy should
> have a NP policy, but if it is omitted, I have a hard time justifying why
> the SP policy should be used in its place.
>
> For unregistered organizations, the NP test will produce the same result
> whether the RFC5322.From address or the PSD+1 organization name is used,
> but when it is applied to registered organizatios, the choice matters.
>
> When an organization is properly registered, only the domain owner decides
> whether  RFC5322.From addresses with non-existent domains may be used.
>  Absence of a DMARC policy does not transfer that right to the PSD or
> registrar.  To properly limit the scope of the NP clause on a PSD policy,
> the non-existence test for PSD=Y policies should be based on the PSD+1
> organization name only.
>
> Within a registered organization, use of a non-existent RFC5322.From
> address is not inherently suspicious and is not uncommon.  Non-existent
> subdomains will currently authenticate for DMARC using using relaxed
> alignment.   However, a domain owner may wish to use his DMARC policy to
> announce that he never uses non-existent names within his subtree.  This is
> done by publishing a NP policy.  When this is the case, the non-existent
> test is applied to the RFC5322.From domain name.  When a DMARC policy is
> found but the NP term is omitted, all subdomains are handled equally, and
> the SP term applies.
>
> So we have a double error:   We fail to distinguish between the two types
> of tests, and we fail to distinguish between the two different default
> conditions, and we have not provided upward compatibility with RFC 9091.
>
>
I'm struggling to understand what you're trying to say here.

Below is section 4.7 from
https://www.ietf.org/archive/id/draft-ietf-dmarc-dmarcbis-15.txt. Can you
please highlight the specific text you're taking issue with and help me
understand how it maps to what you've written above?

4.7.  DMARC Policy Discovery

   For policy discovery, a DNS Tree Walk starts at the point in the DNS
   hierarchy that matches the domain in the RFC5322.From header of the
   message.  The DMARC policy to be applied to the message will be the
   record found at one of these three locations:

   *  The RFC5322.From domain

   *  The Organizational Domain (as determined by a separate DNS Tree
      Walk) of the RFC5322.From domain

   *  The Public Suffix Domain of the RFC5322.From domain

   If the DMARC policy to be applied is that of the RFC5322.From domain,
   then the DMARC policy is taken from the p= tag of the record.  If the
   DMARC policy is taken from either the Organizational Domain or the
   Public Suffix Domain and that domain is different than the
   RFC5322.From domain, then the DMARC policy is taken from the sp= tag
   (if any) if the RFC5322.From domain exists and the np= tag (if any)
   if the RFC5322.From domain does not exist.  In the absence of
   applicable sp= or np= tags, the p= tag policy is used for subdomains.

   If a retrieved policy record does not contain a valid "p" tag, or
   contains an "sp" or "np" tag that is not valid, then:

   *  If a "rua" tag is present and contains at least one syntactically
      valid reporting URI, the Mail Receiver MUST act as if a record
      containing "p=none" was retrieved, and continue processing;

   *  Otherwise, the Mail Receiver applies no DMARC processing to this
      message.

   If the set produced by the DNS Tree Walk contains no DMARC policy
   record (i.e., any indication that there is no such record as opposed
   to a transient DNS error), Mail Receivers MUST NOT apply the DMARC
   mechanism to the message.

   Handling of DNS errors when querying for the DMARC policy record is
   left to the discretion of the Mail Receiver.  For example, to ensure
   minimal disruption of mail flow, transient errors could result in
   delivery of the message ("fail open"), or they could result in the
   message being temporarily rejected (i.e., an SMTP 4yx reply), which
   invites the sending MTA to try again after the condition has possibly
   cleared, allowing a definite DMARC conclusion to be reached ("fail
   closed").

   Note: PSD policy is not used for Organizational Domains that have
   published a DMARC policy.  Specifically, this is not a mechanism to
   provide feedback addresses (rua/ruf) when an Organizational Domain
has declined to do so.

-- 

*Todd Herr * | Technical Director, Standards and Ecosystem
*e:* todd.h...@valimail.com
*m:* 703.220.4153

This email and all data transmitted with it contains confidential and/or
proprietary information intended solely for the use of individual(s)
authorized to receive it. If you are not an intended and authorized
recipient you are hereby notified of any use, disclosure, copying or
distribution of the information included in this transmission is prohibited
and may be unlawful. Please immediately notify the sender by replying to
this email and then delete it from your system.
_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to