On 8/23/25 15:52, Murray S. Kucherawy wrote:
As promised, this is what Trent and I propose as a replacement to the current Section 7, to enhance privacy considerations about failure reports based on accumulated experience.

Comments welcome, of course.  A diff is not provided as this is a wholesale replacement, though there is clearly some text preserved from the version currently in the datatracker.

Thank you - I think I'm just going to work from the proposed text.


7.2. Report Recipients
...
Moreover, some implementers and consumers of failure reports have attempted to use them for purposes such as deep threat hunting, malware inspection, or content analysis. While technically feasible, such uses exceed the scope of DMARC’s reporting intent and amplify privacy exposure by treating user communications as telemetry data. DMARC reporting is designed for authentication failure diagnostics, not for generalized message content analysis.

I have to agree with Mike here re: the "exceed the scope [and] intent" language - the frequent use of "forensic reports" in earlier documents was not accidental. During pre- and past-IETF work, the use of failure reports for threat analysis, etc, was definitely a use case that was both wanted and used.

As for whether it is still done, I shared on this list in March[1] that Fortra (I didn't name them at the time) was still directing their clients to send failure reports to them, and saying that their clients benefit from this arrangement. I accept that the group may discount or ignore this, given that Fortra didn't make the time to participate here and say that for themselves, and other industry participants with differing opinions on the matter did make the time.


The paragraph really reads like it's more about appropriate uses than "Report Recipients," though I wouldn't hold the document up over that. But either way I'd suggest the following.

EXISTING: "Moreover, some implementers and consumers of failure reports have attempted to use them for purposes such as deep threat hunting, malware inspection, or content analysis. While technically feasible, such uses exceed the scope of DMARC’s reporting intent and amplify privacy exposure by treating user communications as telemetry data. DMARC reporting is designed for authentication failure diagnostics, not for generalized message content analysis."

SUGGESTED: "Some implementers and consumers of failure reports have used them for threat identification and mitigation, malware collection, and other types of analysis. This is still possible, but many have stopped due to the decline in participating report generators, and the types of data exposure concerns outlined in the previous section."



7.3. Additional Damage

The risks associated with failure reports are compounded by volume and content distribution concerns. In high-volume domains, these reports may propagate large amounts of spam, phishing messages, or malware samples, inadvertently increasing the spread of abusive content.

I would suggest the following in place of the second sentence.

EXISTING: "In high-volume domains, these reports may propagate large amounts of spam, phishing messages, or malware samples, inadvertently increasing the spread of abusive content."

SUGGESTED: "Partially or unredacted reports may propagate large amounts of spam, phishing, or malware content, all of which may require special handling by Report Consumers or other recipients to avoid incidents. This underscores the need to avoid misconfiguration of the destinations in the "ruf=" reporting URIs, and the suggestions for redaction in this document. And all of these concerns are heightened for high-volume domains."


And I have no objection to including Mike's suggested mitigation measures here or elsewhere in the document.



[1] https://mailarchive.ietf.org/arch/msg/dmarc/Z50mslAFMOxmVPImy7EXkuqzpdI/


--S.


_______________________________________________
dmarc mailing list -- dmarc@ietf.org
To unsubscribe send an email to dmarc-le...@ietf.org

Reply via email to