I remain unconvinced. Mail is nearly free to the sender, but expensive and risky for the recipient and his organization. Anything unwanted message that gets through the spam filter consumes a person's time, which is a non-trivial opportunity cost. Asking me to accept extra cost to provide "nice to have" data is too much.
Your first scenario is mostly about what an evaluator can do. I think there is an opportunity and need to discuss all the ways that an evaluator can obtain acceptable authentication on a message that fails SPF or DKIM, but the chairs have been clear that doing so is "not DMARC" and out of scope. I don't see is how the aggregate report contents facilitate or hinder your un-munging algorithm. I am not a mass mailer with a complicated identity structure, so I am willing to be educated about the wonderful things that can be learned from aggregate reports. Based on my current knowledge, the use cases seem few, and do not need unaligned results. 1) A server is sending legitimate mail and is correctly configured with both SPF and DKIM. The feedback from non-forwarded recipients confirms this fact. 2) A server is sending legitimate mail on behalf of the domain owner, but has a configuration error: no signature, invalid signature, or using a server not in SPF record. SPF results from non-forwarded recipients will identify the problem so that it can be corrected. 3) A signature has been compromised and an unauthorized source is sending authenticated mail. SPF FAIL with DMARC PASS provides the alarm trigger. 4) A server is using a delegated signature for an unauthorized purpose. Nothing in the reports is likely to indicate this problem. If it is detected from other sources, the correction involves revoking the public key and terminating the offending organization. 5) Some mail is failing authentication after forwarding without MailFrom rewrite or forwarding with changes. The IP address and MailFrom address help to identify the problem but the domain owner has no ability to correct the problem. He can use p=none to limit the consequences. 6) Some mail is failing authentication because it originates from an illegitimate source. The IP address and MailFrom address help to identify the problem but the domain owner has no ability to correct the problem. He can use p=reject to limit the consequences. Case 5 and Case 6 are distinguishable only by the reputation of the server or MailFrom address. Malicious senders are unlikely to add a signature to prove their identity, so perhaps a signature suggests case 5 rather than case 6. But a competent forwarder will be doing MailFrom rewrite, so the forwarder identity will be present whether a signature is added or not. These use cases do not deal with authentication failures after multiple forwards. An abundance of signature data might allow the domain owner to reconstruct the forwarding path, but is that something he needs to do,? I don't think so. As for the duplicate signature issue, my rule would detect support for the new signature algorithm if it appears first. I would be happy to hear a case summary which indicates how a real problem was solved, and was only solvable using non-aligned results. Doug Foster On Fri, Oct 21, 2022 at 4:11 AM Alessandro Vesely <ves...@tana.it> wrote: > On Fri 21/Oct/2022 00:53:56 +0200 Douglas Foster wrote: > > > > Aligned DKIM PASS > > When an aligned DKIM result is PASS, I don't see that the domain owner > needs > > any more data collection performed. The verifiable DKIM scope ID > should tell > > him where the message originated, and the source IP and HELO name tell > the last > > place it landed before delivery. I cannot see why a domain owner > would spend > > a lot of time trying to analyze success results, unless his interests > have > > transitioned from assuring identity to analyzing marketing impacts. We > are > > not trying to provide marketing data, and any successful use of DMARC > for that > > purpose seems like an encroachment on the privacy concerns that we want > to > > minimize. > > > Non-aligned signatures can be meaningful for various reasons. In that > case, > the result of their evaluation is also meaningful. For an example, the > original author's domain signature, before From: was munged, is > meaningful. If > it fails, it can be retried after undoing MLM transformation, possibly > leading > to secure recognition of the true author. Is that worth its carbon > footprint? > > And for scope, one may wonder whether the recognized, or failed to be > securely > recognized original author's domain deserves a copy of the report. People > prone to set p=quarantine; pct=0 in order to avoid receiving "errors" > would > clearly dislike a copy of the report. Others may want it, in order to > tune > their DKIM signing configuration. > > > > Duplicates: > > If an aligned domain has multiple DKIM signatures and one passes, I > suggest > > that the PASS is the only one that needs to be reported. If an aligned > domain > > has multiple DKIM signatures and none pass, I suggest that the first one > found > > (from the top) is the most important, because it is the last one > applied. If > > duplicates are reported, disaggregation is increased, so why report data > that > > is not useful? > > > Currently, putting 2 signatures, one rsa and one ed25519, is the way to > monitor > who supports the latter. > > > Best > Ale > -- > > > > > > > > > _______________________________________________ > dmarc mailing list > dmarc@ietf.org > https://www.ietf.org/mailman/listinfo/dmarc >
_______________________________________________ dmarc mailing list dmarc@ietf.org https://www.ietf.org/mailman/listinfo/dmarc