On Mon 05/Dec/2022 23:49:11 +0100 Scott Kitterman wrote:
To the extent this is worth thinking about at all, I think it can be left to local policy. If I were implementing this and was worried about it, I'd check DMARC for all the froms in the field and pick the most restrictive policy.
There's a lot of funny things that receivers and MUA do with multiple From: mailboxes. Certainly this spec is not the place to dig into this nook of RFC5322 compliance.
If we need to say anything at all (and I don't think we do), it should be something like that, not inventing new results or anything.
Leaving to local policy is the obvious outcome after we say DMARC MUST NOT treat those cases. However I think it's worth to mention the fact in Security Considerations, since it can be easily overlooked and it can become an attack vector. I copy below the example I posted on Thu, 24 Nov 2022 10:10:13 +0100[*]
11.8 Denial of DMARC processing The requirement expressed in Section 5.7.1 to exempt from DMARC checking the messages having a multi-valued RFC5322.From header fields with multiple domains can be abused by an attacker by adding a second mailbox to the RFC5322.From. That way, a message can prominently sport a reputed author domain without authentication and without incurring in DMARC policy restrictions. Best Ale -- [*] https://mailarchive.ietf.org/arch/msg/dmarc/Nx2wAs-6sCDeTyArA2XV_oAqlEI _______________________________________________ dmarc mailing list dmarc@ietf.org https://www.ietf.org/mailman/listinfo/dmarc