Re: [dmarc-ietf] easier DKIM, DMARC2 & SPF Dependency Removal

2023-06-19 Thread Benny Pedersen

John R Levine skrev den 2023-06-20 02:25:

On Mon, 19 Jun 2023, Patrick Ben Koetter wrote:
I suggest that we do not only drop SPF, but also come up with better 
ways
(simplification, tools, exchange formats) to implement DKIM in order 
to allow

for a smooth transition.


I'm scratching my head here.  On my system I publish and rotate DKIM
keys completely automatically.  The only manual config is to edit the
list of domains when I add or remove one from my mail server.  It's
not totally trivial but it's not that hard.

I suppose we could encourage people to implement ed25519 signatures
since the keys are small and more likely to fit in a single TXT record
string for provisioning crudware that doesn't handle multiple strings,
but beyond that, what do you have in mind?


i see it as a problem, not as a solution, would we want all to be forced 
to accept new algo ?, will old be depricated ?, yes retorisk question i 
know, but be carefull, metacpan Mail::DKIM does not yet have it, but 
there is patches waiting so maybe it comes ?


imho there would be more forward to see amavisd-new do ARC-Seal/ARC-Sign 
then to see it support one more algo in dkim, i know this is maybe just 
me ?


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] easier DKIM, DMARC2 & SPF Dependency Removal

2023-06-19 Thread John R Levine

On Mon, 19 Jun 2023, Patrick Ben Koetter wrote:

I suggest that we do not only drop SPF, but also come up with better ways
(simplification, tools, exchange formats) to implement DKIM in order to allow
for a smooth transition.


I'm scratching my head here.  On my system I publish and rotate DKIM keys 
completely automatically.  The only manual config is to edit the list of 
domains when I add or remove one from my mail server.  It's not totally 
trivial but it's not that hard.


I suppose we could encourage people to implement ed25519 signatures since 
the keys are small and more likely to fit in a single TXT record string 
for provisioning crudware that doesn't handle multiple strings, but beyond 
that, what do you have in mind?


Regards,
John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail. https://jl.ly

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC2 & SPF Dependency Removal

2023-06-19 Thread Patrick Ben Koetter
* Alessandro Vesely :
> On Thu 15/Jun/2023 23:25:44 +0200 Tero Kivinen wrote:
> > 
> > I rerun the statistics and yes, there is 0.84% cases where dkim
> > failed, but spf returned either pass, softfail or neutral.
> 
> Many thanks.  That figure seems to be more or less in agreement with what
> others here have obtained on smaller samples.  However small, it may confer
> to SPF the role of a stabilizer in DMARC mail flows.

The number of IP addresses in SPF-Records published by VLMPs foils the idea of
"a controlled and limited number of host allowed to send on behalf of a
senderdomain". Given the (internal routing) challenges you face when you try
to publish a limited, dedicated IP range per tenant only, I do not see the
current problem we have with SPF, when it comes to use SPF as identity
anchor for email authentication, go away in the future. To me SPF destabilizes
email authentication. It should not be used in future version of DMARC anymore.

But why is it so many hang to SPF?

My personal experience as a consultant is many domain owners prefer SPF over
DKIM because SPF is easier to implement. They don't care about the one being
the superior identity anchor to the other. They want to send. They want
deliverability. And they want to get it done as soon as possible at the least
investment. Business. Efficency.

As long as I can think of generating and handling DKIM keys has been a pain.
There's SHA1 and SHA256, then RSA and ED25519, then there's quite a variety of
flags to publish (test mode, email usage only, ...) and even if you managed to
get all of that right you are likey to fail when it comes to publish the DNS
TXT record. It's overly long requires multiline quoting etc. pp. and I've seen
experienced DNS operators fail repeatedly to get it right at first attempt.

Many get publishing DKIM keys wrong, but that doesn't hurt them as long as SPF
passes during DMARC authentication. They can send. They get deliverability.
Why bother with DKIM problems?

If we drop SPF in DMARCv2 SPF in all its dominance will suddenly be absent and
DKIM with all its implementational problems will suddenly be fully exposed.
And people will suddenly be forced to implement DKIM and suffer from all the
pain I've described above. I do expect them to be not amused - to put it
friendly.

I suggest that we do not only drop SPF, but also come up with better ways
(simplification, tools, exchange formats) to implement DKIM in order to allow
for a smooth transition.

p@rick


-- 
[*] sys4 AG

https://sys4.de, +49 (89) 30 90 46 64
Schleißheimer Straße 26/MG,80333 München

Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Marc Schiffbauer, Wolfgang Stief
Aufsichtsratsvorsitzender: Florian Kirstein

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC2 & SPF Dependency Removal

2023-06-19 Thread Alessandro Vesely

On Sun 18/Jun/2023 23:06:59 +0200 Ken Simpson wrote:
The hosting provider has to hook up everything for them and presumably, with 
enough encouragement, we could eventually get hosting companies to implement 
DKIM signing for their customers. That is not the case today.



Domain-based authentication was conceived exactly because end users have a hard 
time trying to understand authentication mechanisms.  Hosting providers who 
cannot do DKIM, on the other hand, are certainly not professional.




Some transactional email providers provide a DKIM signing service with 
CNAME-based DKIM key hosting.



This trick is used when the signing server is detached from DNS.  They create a 
public key and publish it under their own domain, then ask the user to publish 
a CNAME pointing to it.  The user could have published the public key directly. 
 The need to resort to pointers stems from difficulties in publishing long RSA 
keys, which required to increase the maximum length of TXT data in some DNS web 
forms.



Best
Ale
--





___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc