I believe I read that thread, and don’t believe I saw a consensus that this should change.
https://mailarchive.ietf.org/arch/msg/dmarc/uAcbvK49M8qI5o36qnJnyg_hULY/ Reviewing that again still suggests no consensus, perhaps even leaning toward “no”. Scott said “not a forensic document” and “not related to DMARC”. -- Alex Brotman Sr. Engineer, Anti-Abuse & Messaging Policy Comcast From: dmarc <dmarc-boun...@ietf.org> On Behalf Of Douglas Foster Sent: Thursday, January 5, 2023 6:36 AM To: IETF DMARC WG <dmarc@ietf.org> Subject: Re: [dmarc-ietf] Aggregate Reporting draft 7 - Server identity Alex, I was referring to the discussion,which you apparently missed, not the prior draft. HELO and Reverse DNS names should be requested in our report format, along with the Source IP. They can (must) be optional for upward compatibility. The reasons for including HELO and RevDNS are so obvious to me that I am surprised it was omitted by RFC 7489. If a report row requires corrective action, it needs to be resolved to a responsible organization and a responsible server. Source IP alone gives you neither. ReverseDNS is a starting point, but it can either represent the ISP client or the ISP itself, depending on SWIP status. Even if you get an organization from that, it only tells you the server when there is one-to-one NAT or no NAT. That leaves a lot of problems: 1) A machine is sending unauthorized messages, possibly because it is infected. Source IP tells you the firewall NAT address that is allowing the traffic out, not the infected machine. HELO will tell you the specific machine(s) that are involved. 2) A group of machines are used for sending legitimate messages on a send-only basis using a shared IP. One of the machines has a configuration error and is not applying DKIM signatures correctly. Source IP reporting tells you that you have a problem because less than 100% of messages from the IP are signed. HELO tells you which machine has the signature problem. 3) You want to know if an unexpected IP address represents a forwarder or an unauthorized message originator. The HELO and ReverseDNS together give you a high confidence about which domain represents the sender. Then you check your outbound message history to see if you are sending messages to that domain. If not, the server is probably a message originator. If yes, the server is probably a forwarder. The conclusion is tentative and ambiguous, but it gets you started. 4) Some HELO and ReverseDNS names provide a clue that the server is malicious. For example, an IP address in brackets is an allowed format for HELO, and it is in use on actual mail, but in my experience this always indicates that the server is a spam source. 5) Both HELO and ReverseDNS can be checked for validity by checking to see if the names can be resolved back to the Source IP address. In most cases, one or both will validate and indicate the server owner. Validation status can provide a clue about whether the server is legitimate or not. 6) Since DNS results can change with time and geography, it seems better to ask the reporting system to supply the Reverse DNS name, rather than waiting until the report is received by the domain owner. I am assuming that most report senders will capture HELO and ReverseDNS as part of their evaluation process, so I see it as a very reasonable data request with very little incremental cost to the evaluator. But for those who see it as a problem, the data is optional. When HELO is multi-valued because multiple machines are behind a single IP address, some disaggregation will occur. This strikes me as a benefit, not a disadvantage. Doug Foster On Wed, Jan 4, 2023 at 6:49 PM Brotman, Alex <alex_brot...@comcast.com<mailto:alex_brot...@comcast.com>> wrote: Which section are you referring to? Can you show where this has changed from -06 (or RFC7489)? -- Alex Brotman Sr. Engineer, Anti-Abuse & Messaging Policy Comcast From: dmarc <dmarc-boun...@ietf.org<mailto:dmarc-boun...@ietf.org>> On Behalf Of Douglas Foster Sent: Wednesday, January 4, 2023 6:35 AM To: IETF DMARC WG <dmarc@ietf.org<mailto:dmarc@ietf.org>> Subject: [dmarc-ietf] Aggregate Reporting draft 7 - Server identity The new draft only asks for IP address, not HELO or Reverse DNS name. HELO is valuable forensic information that cannot be obtained any other way. Server identity becomes particularly important when the MailFrom identity fails SPF or matches the RFC5322.>From domain. Why was these fields omitted? Doug Foster
_______________________________________________ dmarc mailing list dmarc@ietf.org https://www.ietf.org/mailman/listinfo/dmarc