Re: [dmarc-ietf] About user notification in the MUA

2020-06-07 Thread Douglas E. Foster
Stan Kalisch asks:  And you propose the average user can understand, much less 
take the time to understand, the substance?

Yes.   I believe users are worried about spam, and want to make intelligent 
decisions about whether or not email can be trusted.  Unfortunately, our 
present software denies them access to the available information needed to make 
intelligent decisions.

Dave Crocker observes:   There is no basis for believing that requests 
about MUA display will achieve meaningful support on the receive side, 
nevermind whether they would be at all useful.

I was not talking about the sender.   I was talking entirely about the 
receiving organization:its spam filter communicating to its MUA to 
communicate information to the end user based on its local policy.

Dave Crocker also observes about end-user signaling failures:   It's not 
that it 'seems to be'. It isn't nearly that soft.  It is that there have been 
multiple efforts over the years and none has demonstrated efficacy.

Then lets restate that assertion in all its ugly elitism, and put it into 
an RFC:

Incontrovertible research shows that humans will always act on malicious email, 
and cannot be taught to do otherwise.   Organizations should deploy email if 
and only if they have automated tools which provide perfect protection from 
unwanted email. End user training is useless.

I have a higher opinion about my users than that.


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC alignment conflicts with RFC 5322 on the use of the From and Sender header fields

2020-06-07 Thread Dave Crocker

On 6/7/2020 8:04 PM, Murray S. Kucherawy wrote:


 If I wanted an organization policy that controlled when Friendly
Name was displayed or DMARC status was displayed, I would have to
find and distribute plug-ins to all of these products.   As best
as I have been able to tell, no such plug-ins even exist for
Outlook and the other products do not accept extensions. There is
an opportunity here for valuable standardization.


The IETF has routinely punted, at least in the email space, on the 
idea of prescribing or proscribing user interface behaviors because we 
are protocol engineers, not human factors experts.  Are you claiming 
that's changed?


A 'friendly' amendment, or rather addition:

 The origination side of an email exchange has no authority over 
the reception side.  Different administrative authorities. Compliance 
with DMARC is voluntary -- and receiving administrations often implement 
behaviors that differ from what is requested via DMARC.


 There is no basis for believing that requests about MUA display 
will achieve meaningful support on the receive side, nevermind whether 
they would be at all useful.



d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC alignment conflicts with RFC 5322 on the use of the From and Sender header fields

2020-06-07 Thread Murray S. Kucherawy
On Sun, Jun 7, 2020 at 6:58 AM Douglas E. Foster <
fost...@bayviewphysicians.com> wrote:

> 1) The original assertion, that DMARC creates a conflict with prior
> specifications, appears to be undefended and incorrect.   For From
> Addressing, It merely establishes some boundaries that the sender and the
> recipient choose to consider appropriate.For DKIM, it creates a
> use-case for a technology that was initially defined without any use cases.
>Consequently, I think this topic is ready for closure.
>

 I claim your assertions here are contradictory.  Specifically, by
establishing "some boundaries", it is creating a conflict with prior
specifications which established none, possibly intentionally.

3) Some of the discussion has been about how to prevent soclal engineering
> of the recipient user.  This is an important topic, but not directly
> related to the project.  IETF would do well to establish some
> recommendations about how MUAs should behave, so that trust data can be
> displayed to the user.   A typical user will have access to at least three
> different email clients: one on his cell phone, a product-specific web
> page, and a desktop product like Outlook or Thunderbird.If I wanted an
> organization policy that controlled when Friendly Name was displayed or
> DMARC status was displayed, I would have to find and distribute plug-ins to
> all of these products.   As best as I have been able to tell, no such
> plug-ins even exist for Outlook and the other products do not accept
> extensions.   There is an opportunity here for valuable standardization.
>

The IETF has routinely punted, at least in the email space, on the idea of
prescribing or proscribing user interface behaviors because we are protocol
engineers, not human factors experts.  Are you claiming that's changed?

-MSK
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC bis: ticket 38: reporting the proper DKIM key(s)

2020-06-07 Thread Scott Kitterman



On June 8, 2020 2:35:28 AM UTC, John Levine  wrote:
>In article ,
>Scott Kitterman   wrote:
>>>How about saying that reports MUST include the key used to evaluate
>>>the DMARC status, if there was one, and SHOULD include all DKIM keys
>>>evaluated.
>>>
>>>The other ones can be useful, e.g., mailing lists usually resign
>their
>>>outgoing mail so if you have an idea what what lists are sending you
>>>mail, that gives you a strong hint that a DMARC failure is due to
>mail
>>>from a list.
>>
>>When you say 'include the key', do you mean put the literal public key
>in the report or the selector
>>which, in combination with the signing domain, tells one where to find
>the record in DNS?
>
>Sorry, domain and selector.

Thanks for clarifying.  I think that makes sense.

Scott K

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC bis: ticket 38: reporting the proper DKIM key(s)

2020-06-07 Thread John Levine
In article ,
Scott Kitterman   wrote:
>>How about saying that reports MUST include the key used to evaluate
>>the DMARC status, if there was one, and SHOULD include all DKIM keys
>>evaluated.
>>
>>The other ones can be useful, e.g., mailing lists usually resign their
>>outgoing mail so if you have an idea what what lists are sending you
>>mail, that gives you a strong hint that a DMARC failure is due to mail
>>from a list.
>
>When you say 'include the key', do you mean put the literal public key in the 
>report or the selector
>which, in combination with the signing domain, tells one where to find the 
>record in DNS?

Sorry, domain and selector.

R's,
John
-- 
Regards,
John Levine, jo...@taugh.com, Primary Perpetrator of "The Internet for Dummies",
Please consider the environment before reading this e-mail. https://jl.ly

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC bis: ticket 38: reporting the proper DKIM key(s)

2020-06-07 Thread Scott Kitterman



On June 8, 2020 12:02:13 AM UTC, John Levine  wrote:
>In article
>
>you write:
>>-=-=-=-=-=-
>>
>>https://trac.ietf.org/trac/dmarc/ticket/38
>>
>>The spec is ambiguous about which DKIM key needs to be reported.
>>
>>The real world problem here is that sometimes the DKIM key(s) which
>are
>>reported in a row of an aggregate report have nothing to do with the
>DKIM
>>key used to evaluate the DMARC status within the same row.
>
>How about saying that reports MUST include the key used to evaluate
>the DMARC status, if there was one, and SHOULD include all DKIM keys
>evaluated.
>
>The other ones can be useful, e.g., mailing lists usually resign their
>outgoing mail so if you have an idea what what lists are sending you
>mail, that gives you a strong hint that a DMARC failure is due to mail
>from a list.

When you say 'include the key', do you mean put the literal public key in the 
report or the selector which, in combination with the signing domain, tells one 
where to find the record in DNS?

Scott K

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC bis: ticket 66: define what is means to implement DMARC

2020-06-07 Thread John Levine
In article  
you write:
>-=-=-=-=-=-
>
>https://trac.ietf.org/trac/dmarc/ticket/66
>
>Many different entities participate in DMARC, and to each, there is a
>different definition of what is needed to "implement" or participate in
>DMARC.

I would rather put this in a separate non-normative BCP.

>The receiver/MTA:
>- partially participating: validates DMARC?

My MTA validates DMARC and then does nothing with it other than put the result
in an A-R header.  

It currently only validates ARC on mail that will be run through a mailing list.

This can be a rather deep rabbit hole.

R's,
John

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC bis: ticket 38: reporting the proper DKIM key(s)

2020-06-07 Thread John Levine
In article  
you write:
>-=-=-=-=-=-
>
>https://trac.ietf.org/trac/dmarc/ticket/38
>
>The spec is ambiguous about which DKIM key needs to be reported.
>
>The real world problem here is that sometimes the DKIM key(s) which are
>reported in a row of an aggregate report have nothing to do with the DKIM
>key used to evaluate the DMARC status within the same row.

How about saying that reports MUST include the key used to evaluate
the DMARC status, if there was one, and SHOULD include all DKIM keys
evaluated.

The other ones can be useful, e.g., mailing lists usually resign their
outgoing mail so if you have an idea what what lists are sending you
mail, that gives you a strong hint that a DMARC failure is due to mail
from a list.

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] About user notification in the MUA

2020-06-07 Thread Stan Kalisch
On Sun, Jun 7, 2020, at 7:04 PM, Douglas E. Foster wrote:
> The problem with all current notification methods is that they are relatively 
> primitive, often communicating nothing substantive about the suspicious 
> message characteristics.

And you propose the average user can understand, much less take the time to 
understand, the substance?


Stan___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC bis: ticket 38: reporting the proper DKIM key(s)

2020-06-07 Thread Seth Blank
On Sun, Jun 7, 2020 at 16:21 Scott Kitterman  wrote:

> On Sunday, June 7, 2020 5:23:12 PM EDT Seth Blank wrote:
> > https://trac.ietf.org/trac/dmarc/ticket/38
> >
> > The spec is ambiguous about which DKIM key needs to be reported.
> >
> > The real world problem here is that sometimes the DKIM key(s) which are
> > reported in a row of an aggregate report have nothing to do with the DKIM
> > key used to evaluate the DMARC status within the same row.
> >
> > In https://tools.ietf.org/html/rfc7489#section-7.2, it says:
> >
> > The report SHOULD include the following data:
> >
> > o  The identifier evaluated by DKIM and the DKIM result,
> >
> > Elizabeth Zwicky previously wrote:
> >
> > https://mailarchive.ietf.org/arch/msg/dmarc/0HnvtYeeseqopq1tLELctYte34M/
> > "is genuinely unclear. Often there are multiple identifiers. Does this
> mean
> > I can pick any one of them? (That does not actually provide sufficient
> > interoperability.) If there’s a specific one I should pick, which is it?"
> >
> > https://mailarchive.ietf.org/arch/msg/dmarc/zDALDe2zbXhqfQ-_RVeUO1BT084/
> > "I believe they MUST contain any aligned DKIM signature regardless of
> > validity and SHOULD  contain an entry for each domain, selector, result
> > triple."
> >
> > Is it desirable to clarify this language, such that it is clear which
> DKIM
> > keys are required to include in a report, and if so, how should the
> > appropriate keys be determined?
>
> In DKIM, I would have thought that the 'identifier' is the d= domain.
> Just
> based on that text, there's no need to provide the selector.  Looking
> through
> the rest of the list, I don't see anything that indicates the DKIM
> selector
> should be included in an aggregate report.
>
> That said, the selector is pretty useful.  I'd suggest it's essential for
> troubleshooting failures.
>
> Maybe there's two things here:
>
> 1.  identifier needs a better definition.
>
> 2.  Is there a backward compatible way to specify inclusion of the
> selector.


Selector is already there, it’s just OPTIONAL. There’s another ticket about
making it required.


>
> Scott K
>
>
>
> ___
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>
-- 

*Seth Blank* | VP, Standards and New Technologies
*e:* s...@valimail.com
*p:* 415.273.8818



This email and all data transmitted with it contains confidential and/or
proprietary information intended solely for the use of individual(s)
authorized to receive it. If you are not an intended and authorized
recipient you are hereby notified of any use, disclosure, copying or
distribution of the information included in this transmission is prohibited
and may be unlawful. Please immediately notify the sender by replying to
this email and then delete it from your system.
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC bis: ticket 38: reporting the proper DKIM key(s)

2020-06-07 Thread Scott Kitterman
On Sunday, June 7, 2020 5:23:12 PM EDT Seth Blank wrote:
> https://trac.ietf.org/trac/dmarc/ticket/38
> 
> The spec is ambiguous about which DKIM key needs to be reported.
> 
> The real world problem here is that sometimes the DKIM key(s) which are
> reported in a row of an aggregate report have nothing to do with the DKIM
> key used to evaluate the DMARC status within the same row.
> 
> In https://tools.ietf.org/html/rfc7489#section-7.2, it says:
> 
> The report SHOULD include the following data:
> 
> o  The identifier evaluated by DKIM and the DKIM result,
> 
> Elizabeth Zwicky previously wrote:
> 
> https://mailarchive.ietf.org/arch/msg/dmarc/0HnvtYeeseqopq1tLELctYte34M/
> "is genuinely unclear. Often there are multiple identifiers. Does this mean
> I can pick any one of them? (That does not actually provide sufficient
> interoperability.) If there’s a specific one I should pick, which is it?"
> 
> https://mailarchive.ietf.org/arch/msg/dmarc/zDALDe2zbXhqfQ-_RVeUO1BT084/
> "I believe they MUST contain any aligned DKIM signature regardless of
> validity and SHOULD  contain an entry for each domain, selector, result
> triple."
> 
> Is it desirable to clarify this language, such that it is clear which DKIM
> keys are required to include in a report, and if so, how should the
> appropriate keys be determined?

In DKIM, I would have thought that the 'identifier' is the d= domain.  Just 
based on that text, there's no need to provide the selector.  Looking through 
the rest of the list, I don't see anything that indicates the DKIM selector 
should be included in an aggregate report.

That said, the selector is pretty useful.  I'd suggest it's essential for 
troubleshooting failures.

Maybe there's two things here:

1.  identifier needs a better definition.

2.  Is there a backward compatible way to specify inclusion of the selector.

Scott K



___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC alignment conflicts with RFC 5322 on the use of the From and Sender header fields

2020-06-07 Thread Dave Crocker

On 6/7/2020 2:40 PM, John Levine wrote:

I believe the real question is*whether*  to show trust data to users
and the consensus seems to be don't bother, it only confuses them.



It's not that it 'seems to be'. It isn't nearly that soft.

It is that there have been multiple efforts over the years and none has 
demonstrated efficacy.


Anyone claiming the contrary needs to provide objective data to 
substantiate a claim of efficacy.


Adding a capability or relying one carries an affirmative obligation to 
provide a basis for knowing that the cost is justified. So far, there 
isn't one, for end-user trust notifications.



d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] About user notification in the MUA

2020-06-07 Thread Dave Crocker

On 6/7/2020 4:04 PM, Douglas E. Foster wrote:
Given that market reality, I conclude that most vendors and their 
customers believe that user-signalling is useful.   The signalling 
system does not have to prevent every mistake for the signal to be useful.



What you are describing has nothing at all to do with system-provided 
trust assertions.


d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC alignment conflicts with RFC 5322 on the use of the From and Sender header fields

2020-06-07 Thread Scott Kitterman
On Sunday, June 7, 2020 5:53:08 PM EDT Dave Crocker wrote:
> On 6/7/2020 10:53 AM, Stan Kalisch wrote:
> > Assuming this can be practically done, I would rephrase this,
> > "...[E]stablish how MUAs should display trust data to users."
> 
> Since there has been a demonstrated lack of efficacy in this sort of
> display, there needs to be an objective basis for knowing that any new
> such requirement will be useful.  Good luck with that.
> 
> On 6/6/2020 2:42 PM, Scott Kitterman wrote:
> > 1.  I think the domain displayed to the end user matters.  In my sample
> > size of 1, it matters to me.  I know I'm not the average user, but
> > independent of t
> 
> I might be wrong, but I believe the IETF does not intend to make global
> standards on the basis of possible utility for only one engineer working
> on the specification.  Or two.  Or three.
> 
> cf, above.

Conveniently, I'm not proposing any new requirements.

Scott K


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC bis: ticket 49: remove normative requirement on policy tag placement

2020-06-07 Thread Scott Kitterman
On Sunday, June 7, 2020 4:37:42 PM EDT Seth Blank wrote:
> As Chair, I'm closing ticket #49 and recording the consensus of the group
> as in favor of removing the constraint.

Thanks.  In the discussion about that ticket there was an additional 
suggestion about making p= optional which was outside the scope of that 
ticket.  I've filed:

https://trac.ietf.org/trac/dmarc/ticket/72

to capture that.

Scott K


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] About user notification in the MUA

2020-06-07 Thread Douglas E. Foster
I am trying to play by the rules and not chase topics outside the one assigned, 
but since several have jumped on my comment, I will follow up briefly.

Dave Crocker wrote
Since there has been a demonstrated lack of efficacy in this sort of display, 
there needs to be an objective basis for knowing that any new such requirement 
will be useful.

Every email filtering product that I have examined has provided a 
user-signaling system, using one or more of the following:
tagging the subject, adding text as a body header or body footerconverting the 
suspect message into an attachment of  a replacement message,soft-quarantining, 
where the user has unrestricted control to release the message from quarantine.
Given that market reality, I conclude that most vendors and their customers 
believe that user-signalling is useful.   The signalling system does not have 
to prevent every mistake for the signal to be useful.

The problem with all current notification methods is that they are relatively 
primitive, often communicating nothing substantive about the suspicious message 
characteristics.  They also work against other security mechanisms.
Any form of tagging breaks DKIM signatures, reducing the credibility of the 
message if it is auto-forwarded for any reason.

The tagging also becomes tattooed to the message and its replies, rather than 
being restricted to the trust domain that assigned the tag.   One example 
should suffice:  a message was tagged with [SPAM?] because the sender had an 
error in his SPF record and I was trying to enforce SPF.   Then when my staff 
replied, the originator treated the reply as spam because the word SPAM was 
still in the subject line when he received it!
We need a user notification mechanism that is local to the trust domain and 
does not break DKIM signatures.  You have already done the heavy lifting for 
this interoperability problem with Authentication-Results and ARC   I am not 
expecting a "Standard" that requires every implementation to notify every user 
in the same way.   I am looking for a guidance document that helps vendors to 
deliver products which permit an organization to implement a notification 
policy which they find to be effective and appropriate.   IETF is the right 
organization to take this on because the email filter, the mail system, and the 
multiple MUAs are almost always a multi-vendor configuration.

df


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC alignment conflicts with RFC 5322 on the use of the From and Sender header fields

2020-06-07 Thread Stan Kalisch
On Sun, Jun 7, 2020, at 5:40 PM, John Levine wrote:
> I believe the real question is *whether* to show trust data to users
> and the consensus seems to be don't bother, it only confuses them.

I mean, I can't dispute that that's a fair question.  Confusion obviously works 
against the goals behind showing the user the data in the first place.


Stan

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC alignment conflicts with RFC 5322 on the use of the From and Sender header fields

2020-06-07 Thread Dave Crocker

On 6/7/2020 10:53 AM, Stan Kalisch wrote:
Assuming this can be practically done, I would rephrase this, 
"...[E]stablish how MUAs should display trust data to users."


Since there has been a demonstrated lack of efficacy in this sort of 
display, there needs to be an objective basis for knowing that any new 
such requirement will be useful.  Good luck with that.



On 6/6/2020 2:42 PM, Scott Kitterman wrote:

1.  I think the domain displayed to the end user matters.  In my sample size
of 1, it matters to me.  I know I'm not the average user, but independent of
t


I might be wrong, but I believe the IETF does not intend to make global 
standards on the basis of possible utility for only one engineer working 
on the specification.  Or two.  Or three.


cf, above.


d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC alignment conflicts with RFC 5322 on the use of the From and Sender header fields

2020-06-07 Thread John Levine
In article <71cddc80-008c-4f33-bdac-71ebc029b...@www.fastmail.com> you write:
>I didn't know the history of the IETF's approach to UI, in particular, but I'm 
>aware of the research on the nastiness of
>solving the UI problem.  I mostly wanted to clarify that the problem is, 
>indeed, *how* to show that data to users, and that no
>one has actually ever been able to solve that problem.

I believe the real question is *whether* to show trust data to users
and the consensus seems to be don't bother, it only confuses them.

R's,
John

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


[dmarc-ietf] DMARC bis: ticket 51: disposition reporting in aggregate reports

2020-06-07 Thread Seth Blank
https://trac.ietf.org/trac/dmarc/ticket/51

In a DMARC aggregate report, a record with a disposition of "none" is
ambiguous, as a disposition of "none" at p=none means a different thing
(that no action was taken on the message) than a disposition of "none" if
the DMARC policy is reject or quarantine (the message passed an aligned
authentication check of either SPF or DKIM, and was therefore not subject
to policy).

It is desirable to have logically distinct disposition responses, and if
so, what should be reported in the latter case? As a straw man, "pass"
instead of "none"?

-- 

*Seth Blank* | VP, Standards and New Technologies
*e:* s...@valimail.com
*p:* 415.273.8818



This email and all data transmitted with it contains confidential and/or
proprietary information intended solely for the use of individual(s)
authorized to receive it. If you are not an intended and authorized
recipient you are hereby notified of any use, disclosure, copying or
distribution of the information included in this transmission is prohibited
and may be unlawful. Please immediately notify the sender by replying to
this email and then delete it from your system.
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


[dmarc-ietf] DMARC bis: ticket 38: reporting the proper DKIM key(s)

2020-06-07 Thread Seth Blank
https://trac.ietf.org/trac/dmarc/ticket/38

The spec is ambiguous about which DKIM key needs to be reported.

The real world problem here is that sometimes the DKIM key(s) which are
reported in a row of an aggregate report have nothing to do with the DKIM
key used to evaluate the DMARC status within the same row.

In https://tools.ietf.org/html/rfc7489#section-7.2, it says:

The report SHOULD include the following data:

o  The identifier evaluated by DKIM and the DKIM result,

Elizabeth Zwicky previously wrote:

https://mailarchive.ietf.org/arch/msg/dmarc/0HnvtYeeseqopq1tLELctYte34M/
"is genuinely unclear. Often there are multiple identifiers. Does this mean
I can pick any one of them? (That does not actually provide sufficient
interoperability.) If there’s a specific one I should pick, which is it?"

https://mailarchive.ietf.org/arch/msg/dmarc/zDALDe2zbXhqfQ-_RVeUO1BT084/
"I believe they MUST contain any aligned DKIM signature regardless of
validity and SHOULD  contain an entry for each domain, selector, result
triple."

Is it desirable to clarify this language, such that it is clear which DKIM
keys are required to include in a report, and if so, how should the
appropriate keys be determined?

-- 

*Seth Blank* | VP, Standards and New Technologies
*e:* s...@valimail.com
*p:* 415.273.8818



This email and all data transmitted with it contains confidential and/or
proprietary information intended solely for the use of individual(s)
authorized to receive it. If you are not an intended and authorized
recipient you are hereby notified of any use, disclosure, copying or
distribution of the information included in this transmission is prohibited
and may be unlawful. Please immediately notify the sender by replying to
this email and then delete it from your system.
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


[dmarc-ietf] DMARC bis: ticket 66: define what is means to implement DMARC

2020-06-07 Thread Seth Blank
https://trac.ietf.org/trac/dmarc/ticket/66

Many different entities participate in DMARC, and to each, there is a
different definition of what is needed to "implement" or participate in
DMARC.

Should the spec be clear about the different participants, and what it
means for each to participate partially and completely?

As a straw man to start conversation (assume this is all wrong):

The domain owner:
- partially participating: valid record?
- complete participation: no part of the domain hierarchy can be
spoofed by an unauthenticated sender?

The receiver/MTA:
- partially participating: validates DMARC?
- complete participation: validates DMARC and ARC, and sends aggregate
reports?

The intermediary (is this different than a receiver?):
- partially: validates DMARC?
- complete participation: validates DMARC and validates and seals ARC?


-- 

*Seth Blank* | VP, Standards and New Technologies
*e:* s...@valimail.com
*p:* 415.273.8818



This email and all data transmitted with it contains confidential and/or
proprietary information intended solely for the use of individual(s)
authorized to receive it. If you are not an intended and authorized
recipient you are hereby notified of any use, disclosure, copying or
distribution of the information included in this transmission is prohibited
and may be unlawful. Please immediately notify the sender by replying to
this email and then delete it from your system.
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC alignment conflicts with RFC 5322 on the use of the From and Sender header fields

2020-06-07 Thread Jim Fenton
On 6/7/20 6:16 AM, Douglas E. Foster wrote:
> 2) Some of the discussion appeared to resolve around the assertion
> that DMARC can have no value.   Since that view is not universal, I
> think the project can continue with those who do believe that it adds
> value.
>
That's not how it works; this working group is discussing an IETF
standards-track specification. This is based on the rough consensus of
the entire working group; you can't just go forward with a subset of
people who agree.

-Jim (with apologies to the WG chairs if I'm venturing into their territory)


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC bis: ticket 69: add JSON reporting format?

2020-06-07 Thread Seth Blank
As Chair, I'm closing ticket #69 and recording consensus as remaining with
XML for report formatting.

This consensus may be revisited if
https://trac.ietf.org/trac/dmarc/ticket/42 opens a new reporting mechanism
for which JSON is optimal, but the group's current consensus is that even
in that case, XML will be sufficient.

On Thu, May 21, 2020 at 3:38 AM Alessandro Vesely  wrote:

> On Wed 20/May/2020 22:00:34 +0200 Hector Santos wrote:
> > On 5/20/2020 2:43 PM, Alessandro Vesely wrote:
> >
> >> I mean, what is the CSV format of the following report, that I sent
> yesterday
> >> for this list:
> >
> > Sorry, if I ignored it.
> >
> > Forgetting fact that you can your report easier to read for consumers,
> these
> > would be an example of the CSV field headers.
> >
> > CSV headers:
> >
> > report_metadata.org_name, report_metadata.email,
> report_metadata.report_id,
> > report_metadata.date_range.begin, report_metadata.date_range.end
> >
> > Policy_Published.domain, Policy_Published.adkim, Policy_Published.aspf,
> > Policy_Published.p
> >
> > record.row, record.row.source_ip.record.count.
> record.row.policy_evaluated,
> > record.row.policy_evaluated.disposition,
> > record.row,policy_evaluated.disposition,
> record.row.policy_evaluated.dkim,
> > record.row.policy_evaluated.spf
> >
> > Note: You don't have to stick to redundant "name space" field names.
>
>
> You didn't include auth_results.  That's tricky because you can have zero
> or
> more dkim and spf results.  That would bring on a variable number of
> columns,
> with no hint about which is which.
>
> As Freddie noted, repeating the headers for every record may sound a
> little bit
> wasteful, but gzip may come to rescue here too.
>
> As for readability, aggregate reports are designed to be machine-readable
> to
> the extreme detriment of any kind of human readability.  The best samples
> of
> such attitude are the date_range elements.  HTML provides for a much better
> human readability.  (Indeed, it is one of the formats you mentioned, as it
> is
> supported by Google Docs).  I attach the HTML equivalent of the data I sent
> yesterday.  Posters whose From: was rewritten can easily spot their row
> —readability meaning exactly that.
>
> Let me note that such htmlization is the result of a DMARC XSLT applied by
> a
> mail filter after rua messages authentication but before delivery.  That
> way, a
> readable format of the reports is ready in the mail folder whenever I'd
> care to
> look at it, *as if it had been written in HTML in the first place*.  By
> similar
> techniques one can obtain JSON, SQL, TXT, ….  In the face of such
> flexibility,
> I'm puzzled by your asking for more.
>
>
>  ...  Can we get back to work, please?
> >>>
> >>> Sorry, but I consider a rude, disrespectful and ignorant statement, to
> be
> >>> saying that.
> >>
> >>
> >> No personal attack intended.  I'm being rude because I have the
> impression that
> >> you are not defending a concrete, well defined need, but instead find
> new
> >> arguments opportunistically to pursue a vague sense of format fashion.
> >
> > That's a personal attack. If you don't understand the proposal, you
> should back
> > off or ask for clarification.
>
>
> I /am/ asking for clarifications.  Please excuse my tone if it hurts you.
> I'll
> try and keep calm, but please restrain from technically flaky arguments
> such as
> CSV.  I think you're perfectly aware of the capabilities I'm exemplifying
> here.
>  They rest on the fact that a report consumer knows in advance the format
> of
> the data inside the received gzip.  Hence, that flexibility would be
> destroyed
> by the introduction of multiple formats, as they would come randomly at the
> mercy of the report generators, any prf= notwithstanding.  Not a great
> loss,
> given your feeling about reporting?
>
>
> >> You shifted from an asserted necessity of producers to a possible desire
> >> of consumers.>
> > I did no such thing. I won't repeat it, but it appears you didn't
> understand
> > the proposal.
>
>
> For sure, I don't understand the proposal.  Let's start over:
>
> On Sat 16/May/2020 19:48:25 +0200 Hector Santos wrote:
> > Just consider, when the spec has XML-only, then for those who use a solid
> > JSON I/O system, they are now going to be required to add XML. So for
> them,
> > its additional development complexity.  Everything they probably do JSON
> > related. The exception would be DMARC using XML. This alone can delay or
> > push aside DMARC Reporting implementation.
>
>
> Does DMARC Reporting implementation mean generation or consumption?
>
>
> On Wed 20/May/2020 02:23:37 +0200 Hector Santos wrote:
> > I suggest that there is a new tag that provides a "Preferred Report
> Format"
> > or "prf=" tag using registered acronymns for long time "standard"
> formats.
> > For example:>
> > prf=cvs,json,xml,afrf,iodef
> >
> > [...]
> >
> > The verifier will do what can it offer. The publisher is providing a
> > preference, that it may not ge

Re: [dmarc-ietf] DMARC bis: ticket 63: make p=none with no reporting URI invalid?

2020-06-07 Thread Seth Blank
As Chair, I'm closing ticket #63 and recording consensus of the group as
leaving this as-is, any guidance around this matter should be left to a BCP
or guidance document.

On Thu, May 21, 2020 at 6:10 PM Dotzero  wrote:

>
>
> On Thu, May 21, 2020 at 5:57 PM Tim Wicinski  wrote:
>
>> (with no hats)
>>
>> p=none with no reporting is fine, and we should keep it.
>>
>> One thing the WG could do is a BCP document on operational recommendations
>> where there are certain suggestions like this.
>>
>> tim
>>
>> +1
>>
>
> Michael Hammer
> ___
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>


-- 

*Seth Blank* | VP, Standards and New Technologies
*e:* s...@valimail.com
*p:* 415.273.8818



This email and all data transmitted with it contains confidential and/or
proprietary information intended solely for the use of individual(s)
authorized to receive it. If you are not an intended and authorized
recipient you are hereby notified of any use, disclosure, copying or
distribution of the information included in this transmission is prohibited
and may be unlawful. Please immediately notify the sender by replying to
this email and then delete it from your system.
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC bis: ticket 49: remove normative requirement on policy tag placement

2020-06-07 Thread Seth Blank
As Chair, I'm closing ticket #49 and recording the consensus of the group
as in favor of removing the constraint.

On Fri, May 22, 2020 at 1:03 AM Alessandro Vesely  wrote:

> On Thu 21/May/2020 23:11:54 +0200 Scott Kitterman wrote:
> > Agreed.  I don't think this is controversial.
> >
> > Also, I don't see a problem with making the p= tag optional (with an
> inferred
> > value of None if not present).  This is consistent with an existing
> SHOULD in
> > RFC 7489 and appears to be broadly supported in existing implementations.
> >
> > I'd propose we close this ticket with the following resolution:
> >
> > The requirement that the v=DMARC1 tag be first will be retained.
> >
> > The requirement that the p= tag be second and the requirement that the
> p= tag
> > is mandatory will be dropped.  If the p= tag is not present, the implied
> > policy value is None.
>
>
> Please, let's not forget to update the grammar, e.g. as proposed in
> https://mailarchive.ietf.org/arch/msg/dmarc/tRjV69kdM6XzkiIb3ceZ2T8OWK8
>
> Best
> Ale
> --
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> ___
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>


-- 

*Seth Blank* | VP, Standards and New Technologies
*e:* s...@valimail.com
*p:* 415.273.8818



This email and all data transmitted with it contains confidential and/or
proprietary information intended solely for the use of individual(s)
authorized to receive it. If you are not an intended and authorized
recipient you are hereby notified of any use, disclosure, copying or
distribution of the information included in this transmission is prohibited
and may be unlawful. Please immediately notify the sender by replying to
this email and then delete it from your system.
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC alignment conflicts with RFC 5322 on the use of the From and Sender header fields

2020-06-07 Thread Stan Kalisch
On Sun, Jun 7, 2020, at 3:52 PM, John Levine wrote:
> In article <46e045ae-9691-4f5b-86bf-142c06645...@www.fastmail.com> you write:
> >-=-=-=-=-=-
> >
> >On Sun, Jun 7, 2020, at 9:16 AM, Douglas E. Foster wrote:
> >> 3) Some of the discussion has been about how to prevent soclal engineering 
> >> of the recipient user. This is an important
> >topic, but not directly related to the project. IETF would do well to 
> >establish some recommendations about how MUAs should
> >behave, so that trust data can be displayed to the user.
> >
> >Assuming this can be practically done, I would rephrase this, 
> >"...[E]stablish how MUAs should display trust data to users."
> 
> We have decades of experience that tells us that the IETF is hopeless
> at UI design, and our intuition is usually wrong.
> 
> In particular, displaying warnings that "this may be bad" or even
> "this is extremely bad" is known not to work. No matter what you say,
> people will click through any warning to get to their kitten GIFs or
> porn or whatever.

I didn't know the history of the IETF's approach to UI, in particular, but I'm 
aware of the research on the nastiness of solving the UI problem.  I mostly 
wanted to clarify that the problem is, indeed, *how* to show that data to 
users, and that no one has actually ever been able to solve that problem.


Thanks,
Stan

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC alignment conflicts with RFC 5322 on the use of the From and Sender header fields

2020-06-07 Thread John Levine
In article <46e045ae-9691-4f5b-86bf-142c06645...@www.fastmail.com> you write:
>-=-=-=-=-=-
>
>On Sun, Jun 7, 2020, at 9:16 AM, Douglas E. Foster wrote:
>> 3) Some of the discussion has been about how to prevent soclal engineering 
>> of the recipient user. This is an important
>topic, but not directly related to the project. IETF would do well to 
>establish some recommendations about how MUAs should
>behave, so that trust data can be displayed to the user.
>
>Assuming this can be practically done, I would rephrase this, "...[E]stablish 
>how MUAs should display trust data to users."

We have decades of experience that tells us that the IETF is hopeless
at UI design, and our intuition is usually wrong.

In particular, displaying warnings that "this may be bad" or even
"this is extremely bad" is known not to work. No matter what you say,
people will click through any warning to get to their kitten GIFs or
porn or whatever.

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC alignment conflicts with RFC 5322 on the use of the From and Sender header fields

2020-06-07 Thread Stan Kalisch
On Sun, Jun 7, 2020, at 9:16 AM, Douglas E. Foster wrote:
> 3) Some of the discussion has been about how to prevent soclal engineering of 
> the recipient user. This is an important topic, but not directly related to 
> the project. IETF would do well to establish some recommendations about how 
> MUAs should behave, so that trust data can be displayed to the user.

Assuming this can be practically done, I would rephrase this, "...[E]stablish 
how MUAs should display trust data to users."

Which is a question many have struggled to answer, given the history of users 
understandably wanting to pull their hair out over trust data and warnings.


Stan
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC alignment conflicts with RFC 5322 on the use of the From and Sender header fields

2020-06-07 Thread John Levine
In article <14fe18acad53467a8027e680dfc10...@bayviewphysicians.com> you write:
>-=-=-=-=-=-
>1) The original assertion, that DMARC creates a conflict with prior 
>specifications, appears to be undefended and incorrect.

It should not be controversial that DMARC can only describe a subset
of valid Internet mail. The problem arises when people then assert
that somehow it is our fault that we are sending mail that DMARC can't
describe, typically in ways we've been using for decades, long before
anyone thought of DMARC.

>2) Some of the discussion appeared to resolve around the assertion that DMARC 
>can have no value.

It clearly has value to Verizon, and it apparently has value to banks
and Paypal. I can't see that it has much value for me or my users,
since it has screwed up all the mailing lists we use, and for whatever
reason we're not big phish targets.

R's,
John

PS: My bank chronically sends out real mail that looks like a total
phish, e.g., it says there's a dubious charge on your card, click this
button if it's real or that button if it's not, with the URL for
neither button having any connection to any domain the bank owns.
I know it's real because I know enough about the bank business to
recognize the subcontractor they use, but jeez.

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC alignment conflicts with RFC 5322 on the use of the From and Sender header fields

2020-06-07 Thread Douglas E. Foster
1) The original assertion, that DMARC creates a conflict with prior 
specifications, appears to be undefended and incorrect.   For From Addressing, 
It merely establishes some boundaries that the sender and the recipient choose 
to consider appropriate.For DKIM, it creates a use-case for a technology 
that was initially defined without any use cases.Consequently, I think this 
topic is ready for closure.

2) Some of the discussion appeared to resolve around the assertion that DMARC 
can have no value.   Since that view is not universal, I think the project can 
continue with those who do believe that it adds value.

3) Some of the discussion has been about how to prevent soclal engineering of 
the recipient user.  This is an important topic, but not directly related to 
the project.  IETF would do well to establish some recommendations about how 
MUAs should behave, so that trust data can be displayed to the user.   A 
typical user will have access to at least three different email clients: one on 
his cell phone, a product-specific web page, and a desktop product like Outlook 
or Thunderbird.If I wanted an organization policy that controlled when 
Friendly Name was displayed or DMARC status was displayed, I would have to find 
and distribute plug-ins to all of these products.   As best as I have been able 
to tell, no such plug-ins even exist for Outlook and the other products do not 
accept extensions.   There is an opportunity here for valuable standardization.


From: Alessandro Vesely 
Sent: 6/7/20 6:19 AM
To: dmarc@ietf.org
Subject: Re: [dmarc-ietf] DMARC alignment conflicts with RFC 5322 on the use of 
the From and Sender header fields
On Sun 07/Jun/2020 00:03:28 +0200 Jim Fenton wrote:
> On 6/6/20 2:42 PM, Scott Kitterman wrote:
>> On Saturday, June 6, 2020 5:26:08 PM EDT Dave Crocker wrote:
>>> On 6/6/2020 2:23 PM, Scott Kitterman wrote:
 If things like DMARC, SPF, and DKIM do nothing more than get abusers
 to use different domains than they would otherwise, I think that's a
 win.>>> The issue here is DMARC, not SPF or DKIM, since DMARC is the only 
 one of
>>> the 3 that restricts the choice of domain name.
>>>
>>> With that in mind, I'll ask you why you think the kind of change you
>>> cite is a win.
>> 1. I think the domain displayed to the end user matters. In my sample size
>> of 1, it matters to me. I know I'm not the average user, but independent of
>> the question of how many users it matters to, there are some.
> Same with me, but again I'm not the average user.

+1, but then we're mailing list subscribers (leaving aside this list's topic.)

>>
>> 2. When abusers use different domains to send mail, it adds more information
>> for filters to work on, so even if this is all about filtering, that works
>> better too.
>
> But when abusers use different domains, the DMARC policy that applies is
> controlled by them and is therefore meaningless. And the reports, if any
> (probably none), are sent back to the attacker or their designate.
>
> Filtering might be done based on the DKIM signing domain or thesimilar
> envelope-from domain if SPF is used, but neither of those require DMARC.

The From: domain was chosen because that's the field that users can see. Now
we conjecture that users don't actually see it. Oh boy. Certainly, if the
From: domain is not visible we could filter on X-Filter-On-Me: and gracefully
avoid the mailing list problem.

On closer view, we seem to be discovering that the From: domain is obscured by
the display name. We always neglected the display name. Furthermore, by
letting the mailing list problem be dodged by creative From: rewriting, such as

From: u...@example.com 

we are granting full citizenship to devious display names. Some clients (e.g.
Thunderbird) can show only display name for people in the address book.[*] A
close, perhaps formally easier, subject is the IDN homograph attack.[†]

Would it make sense to ban, say, the use of the at sign (@) in display names?

Best
Ale
--

[*]
https://support.mozilla.org/en-US/kb/names-bug-no-email-addresses-are-displayed

[†] https://en.wikipedia.org/wiki/IDN_homograph_attack

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC alignment conflicts with RFC 5322 on the use of the From and Sender header fields

2020-06-07 Thread Alessandro Vesely
On Sun 07/Jun/2020 00:03:28 +0200 Jim Fenton wrote:
> On 6/6/20 2:42 PM, Scott Kitterman wrote:
>> On Saturday, June 6, 2020 5:26:08 PM EDT Dave Crocker wrote:
>>> On 6/6/2020 2:23 PM, Scott Kitterman wrote:
 If things like DMARC, SPF, and DKIM do nothing more than get abusers
 to use different domains than they would otherwise, I think that's a
 win.>>> The issue here is DMARC, not SPF or DKIM, since DMARC is the only 
 one of
>>> the 3 that restricts the choice of domain name.
>>>
>>> With that in mind, I'll ask you why you think the kind of change you
>>> cite is a win.
>> 1.  I think the domain displayed to the end user matters.  In my sample size 
>> of 1, it matters to me.  I know I'm not the average user, but independent of 
>> the question of how many users it matters to, there are some.
> Same with me, but again I'm not the average user.


+1, but then we're mailing list subscribers (leaving aside this list's topic.)

>>
>> 2.  When abusers use different domains to send mail, it adds more 
>> information 
>> for filters to work on, so even if this is all about filtering, that works 
>> better too.
> 
> But when abusers use different domains, the DMARC policy that applies is
> controlled by them and is therefore meaningless. And the reports, if any
> (probably none), are sent back to the attacker or their designate.
> 
> Filtering might be done based on the DKIM signing domain or thesimilar
> envelope-from domain if SPF is used, but neither of those require DMARC.


The From: domain was chosen because that's the field that users can see.  Now
we conjecture that users don't actually see it.  Oh boy.  Certainly, if the
From: domain is not visible we could filter on X-Filter-On-Me: and gracefully
avoid the mailing list problem.

On closer view, we seem to be discovering that the From: domain is obscured by
the display name.  We always neglected the display name.  Furthermore, by
letting the mailing list problem be dodged by creative From: rewriting, such as

From: u...@example.com 

we are granting full citizenship to devious display names.  Some clients (e.g.
Thunderbird) can show only display name for people in the address book.[*]  A
close, perhaps formally easier, subject is the IDN homograph attack.[†]

Would it make sense to ban, say, the use of the at sign (@) in display names?


Best
Ale
-- 

[*]
https://support.mozilla.org/en-US/kb/names-bug-no-email-addresses-are-displayed

[†] https://en.wikipedia.org/wiki/IDN_homograph_attack
































___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc