On Sunday, August 6, 2023 2:10:35 PM EDT Hector Santos wrote:
> > On Aug 5, 2023, at 5:37 PM, Scott Kitterman <skl...@kitterman.com> wrote:
> > 
> > On Saturday, August 5, 2023 3:59:02 PM EDT John Levine wrote:
> >> It appears that Scott Kitterman  <skl...@kitterman.com> said:
> >>>> When receivers apply the "MUST NOT reject" in Section 8.6 to accept
> >>>> unauthenticated messages as quarantined messages, receivers SHOULD
> >>>> carefully review how they forward mail traffic to prevent additional
> >>>> security risk.  That is, this downgrade can enable spoofed messages
> >>>> that
> >>>> are SPF DMARC authenticated with a fraudulent From identity despite
> >>>> having
> >>>> an associated strong DMARC policy of "p=reject". ...
> >> 
> >> We all realize that SPF has problems, but I really do not want to fill
> >> up the DMARC document with text that says "you can authenticate with
> >> SPF, hahaha no just kidding."
> >> 
> >> The way to fix Microsoft's forwarding SPF problem is for Microsoft to put
> >> the forwarding user's bounce address on the message, not for us to tell
> >> the entire world to use kludgy workarounds.
> > 
> > I agree.  We need to be careful to solve protocol problems in the protocol
> > and leave fixing implementation problems to implementers.  We aren't
> > going to protocol our way out of bad implementation decisions.
> 
> Taken within the good-intention, protocol-compliant implementations, which
> one do we add as “Implementations Notes?”  Which or rather What are
> “Current Practice”behavior can we note?

I think best current practice goes in a different document.  Maybe we do that 
after DMARCbis is buttoned up?

Scott K


_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to