On Sun, Mar 17, 2024 at 9:36 PM John Levine <jo...@taugh.com> wrote:

> Tightened up a little, reworded in view of the fact that your own
> mail provider (M*r*s*ft) may let people spoof you through shared IP ranges.
>
>
> >11.X  External Mail Sender Cross-Domain Forgery
>
> Add this to 11.1 Authentication Methods
>
>
> Both of the email authentication methods that underlie DMARC provide
> some assurance that an email was transmitted by an MTA which is
> authorized to do so. SPF policies map domain names to sets of
> authorized MTAs [ref to RFC 7208, section 11.4]. Verified DKIM
> signatures indicate that an email was transmitted by an MTA with
> access to a private key that matches the published DKIM key record.
>
> Whenever mail is sent, there is a risk that an overly permissive source
> may send mail which will receive a DMARC pass result that was not, in
> fact, authorized by the Domain Owner. These false positives may lead
> to issues when systems interpret DMARC pass results to indicate
> a message is in some way authentic. They also allow such unauthorized
> senders to evade the Domain Owner's requested message handling for
> authentication failures.
>

I have a problem with this 2nd paragraph and believe it is factually
incorrect. The Domain Owner has in fact authorized the message(s) as a
result of an overly permissive approach. I would suggest that in fact any
resulting DMARC pass is technically NOT a false positive because it is
authorized by the overly permissive approach..

Michael Hammer
_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to