On Mon 05/Dec/2022 23:49:11 +0100 Scott Kitterman wrote:
To the extent this is worth thinking about at all, I think it can be left to 
local policy.  If I were implementing this and was worried about it, I'd check 
DMARC for all the froms in the field and pick the most restrictive policy.


There's a lot of funny things that receivers and MUA do with multiple From: mailboxes. Certainly this spec is not the place to dig into this nook of RFC5322 compliance.


If we need to say anything at all (and I don't think we do), it should be 
something like that, not inventing new results or anything.


Leaving to local policy is the obvious outcome after we say DMARC MUST NOT treat those cases. However I think it's worth to mention the fact in Security Considerations, since it can be easily overlooked and it can become an attack vector. I copy below the example I posted on Thu, 24 Nov 2022 10:10:13 +0100[*]

    11.8  Denial of DMARC processing

    The requirement expressed in Section 5.7.1 to exempt from DMARC checking
    the messages having a multi-valued RFC5322.From header fields with multiple
    domains can be abused by an attacker by adding a second mailbox to the
    RFC5322.From.  That way, a message can prominently sport a reputed author
    domain without authentication and without incurring in DMARC policy
    restrictions.


Best
Ale
--

[*] https://mailarchive.ietf.org/arch/msg/dmarc/Nx2wAs-6sCDeTyArA2XV_oAqlEI







_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to