On Wed 19/Apr/2023 15:50:54 +0200 Benny Pedersen wrote:
Alessandro Vesely skrev den 2023-04-19 11:09:

if all maillist did arc on incoming mails before mailman scraped dkim then all will be good, only left is dmarc is not in all places tests arc results

It is all too easy to spoof an ARC chain offering false authentication
results.

ARC chains is untrusted by default, where is the problem ?


Just pointing out that "if all maillist did arc on incoming mails before mailman scraped dkim" then that is not enough.


Allowing ARC to override DMARC result requires the ARC
signer to be whitelisted.

whitelisted is not right word for it, its either trusted or untrusted


Yes, I meant to say a site can make a list of all the ARC-sealers they trust and call it a whitelist.


Now, one can object that whitelisting could be done by DKIM, by SPF,
by DNSWL, without the need to introduce a new, long-winded protocol.
However, ARC brings a couple of advantages:

1) In case of multiple forwarding steps, ARC delivers an ordered and
cohesive chain which is easier to verify than a messy mass of DKIM
signatures.

recipients should only care of dmarc, not dkim/arc/spf fails

to make this work dmarc must trust arc


Here a lost you. DMARC is a protocol. It cannot give credence or believe. It can pass or fail. It is receivers who can trust an ARC chain and override DMARC results; that is, allow the message even if dmarc=fail and p=reject.


Best
Ale
--



_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to