[dmarc-ietf] Fwd: Summary: Search for some consensus, was: Proposed text for p=reject and indirect mail flows

2023-07-06 Thread Scott Kitterman
As you prepare for the meeting, I'm reposting the attached summary from April 
when I tried to explore where there might be some consensus on the 
interoperability question.  In it, I tried out the generic formulation:

> [some appropriate description] domains MUST NOT publish restrictive DMARC
> policies due to interoperability issues

I think Barry's new suggestion is broadly aligned to this approach, although 
less concise.  Personally, I think the details need work, but I could 
generally live with it.

We also need to address the subordinate protocol data reliability question and 
I still intend to write something up on that, but not today.

Finally, we now have an Interoperability Issues section followed immediately 
by an Interoperability Considerations section.  Maybe you could workshop 
different terms for one or both of those on the hallway track.

Scott K

--- Begin Message ---
On Tuesday, April 25, 2023 2:27:18 PM EDT Scott Kitterman wrote:
> On Tuesday, March 28, 2023 4:15:04 AM EDT Barry Leiba wrote:
> > I raised this issue in the DMARC session in Vienna, and have let it
> > sit for a while so as not to derail other discussion.  As we're pretty
> > close to finished with the DMARCbis document, I'd like to raise it
> > again, this time with specific proposed text for us to discuss.
> > 
> > And so:
> > 
> > OLD
> > 
> >5.5.6.  Decide If and When to Update DMARC Policy
> >
> >Once the Domain Owner is satisfied that it is properly authenticating
> >all of its mail, then it is time to decide if it is appropriate to
> >change the p= value in its DMARC record to p=quarantine or p=reject.
> >Depending on its cadence for sending mail, it may take many months of
> >consuming DMARC aggregate reports before a Domain Owner reaches the
> >point where it is sure that it is properly authenticating all of its
> >mail, and the decision on which p= value to use will depend on its
> >needs.
> > 
> > NEW
> > 
> >5.5.6.  Decide If and When to Update DMARC Policy
> >
> >Once the Domain Owner is satisfied that it is properly authenticating
> >all of its mail, then it is time to decide if it is appropriate to
> >change the p= value in its DMARC record to p=quarantine or p=reject.
> >Depending on its cadence for sending mail, it may take many months of
> >consuming DMARC aggregate reports before a Domain Owner reaches the
> >point where it is sure that it is properly authenticating all of its
> >mail, and the decision on which p= value to use will depend on its
> >needs.
> >
> >It is important to understand that many domains may never use
> >policies of “quarantine” or “reject”, and that these policies are
> >intended not as goals, but as policies available for use when they
> >are appropriate.  In particular, “reject” is not intended for
> >deployment in domains with users who send routine email, and its
> >deployment in such domains can disrupt indirect mail flows and cause
> >damage to operation of mailing lists and other forwarding services.
> >This is discussed in [RFC7960] and in Section 5.8, below.  The
> >“reject” policy is best reserved for domains that send only
> >transactional email that is not intended to be posted to mailing
> >lists.
> >
> >To be explicitly clear: domains used for general-purpose email MUST
> >NOT deploy a DMARC policy of p=reject.
> > 
> > END
> > 
> > I'm well aware that the MUST will *not* be followed by everyone, and
> > that some domain owners will feel that they need to use p=reject,
> > regardless.  I think that's fine: the standard should specify what's
> > right for interoperability, and I believe that improper use of
> > p=reject is extremely harmful to interoperability... so "MUST" is
> > correct here.  And no one will be arrested or fined for choosing not
> > to follow it.  We should still say it, nonetheless.
> > 
> > OK, have at it.
> 
> I'm going to take another stab at this, starting back at the top of the
> thread since things went off the rails.
> 
> This is an attempt to see if we can focus in on getting some agreement on a
> path forward on this question.  If I may generalize for a moment, it seemed
> to me that there are roughly two sets of perspectives on this (with
> considerable variation within each set, of course).  One set is from people
> primarily focused on the security benefits associated with use of
> restrictive DMARC policies such as p=reject.  The other set is from people
> primarily focused on the interoperability impacts associated with some
> domains using such restrictive policies.
> 
> For many, the security benefit is the primary purpose of DMARC.  Without it,
> it's relatively pointless.  On the other hand, interoperability is a
> significant reason the IETF exists.  Without interoperability, the IETF is
> relatively pointless.  I am starting from the assumption that people are
> prioritizing different thin

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Todd Herr
On Thu, Jul 6, 2023 at 3:00 PM Barry Leiba  wrote:

> That's fine, as long as we're all understanding that it's still just a
> proposal and we'll be discussing it at IETF 117 and on the mailing list.
>

Absolutely. I just wanted to have a fresh draft in place before the cut off
date, and today was as good a time for that as any.

-- 

*Todd Herr * | Technical Director, Standards & Ecosystem
*e:* todd.h...@valimail.com
*p:* 703-220-4153
*m:* 703.220.4153

This email and all data transmitted with it contains confidential and/or
proprietary information intended solely for the use of individual(s)
authorized to receive it. If you are not an intended and authorized
recipient you are hereby notified of any use, disclosure, copying or
distribution of the information included in this transmission is prohibited
and may be unlawful. Please immediately notify the sender by replying to
this email and then delete it from your system.
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Barry Leiba
As I've said before, I think we should specify what we think is right,
and allow implementers to make their decisions.  We can't and won't
police them.

b

On Thu, Jul 6, 2023 at 2:59 PM Brotman, Alex  wrote:
>
> I suspect the portion that instructs receivers to not act solely on p=reject 
> may be ignored by a fair set of receivers.  I'm not necessarily opposed to 
> the language below, just that it seems odd to create language that we know 
> will be ignored.  Additionally, I find it odd that we won't tell forwarders 
> how to munge messages to avoid this situation, but we will tell receivers how 
> to avoid this situation.
>
> --
> Alex Brotman
> Sr. Engineer, Anti-Abuse & Messaging Policy
> Comcast
>
>
> > -Original Message-
> > From: dmarc  On Behalf Of Barry Leiba
> > Sent: Thursday, July 6, 2023 10:55 AM
> > To: IETF DMARC WG 
> > Subject: [dmarc-ietf] Another p=reject text proposal
> >
> > I had some off-list discussions with Seth, who was very much against my 
> > original
> > proposed text, and he suggested an alternative organization that would be 
> > more
> > palatable to him.  I've attempted to set that out below.  The idea is to 
> > remove the
> > normative requirements about using p=reject from Sections 5.5.6 and 5.8, and
> > instead put a broader discussion of the issues, along with the normative
> > requirements, into a new "Interoperability Considerations" section.
> > This makes it explicitly clear that any MUST/SHOULD stuff with regard to 
> > using
> > and honoring p=reject is an issue of interoperating with existing Internet 
> > email
> > features.  I can accept that mechanism also, and so, below is my attempt at
> > writing that proposal up.
> >
> > Barry
> >
> > -
> >
> > — Section 5.5.6 —
> >
> > ADD
> >In making this decision it is important to understand the
> >interoperability issues involved and problems that can result for
> >mailing lists and for deliverability of legitimate mail. Those
> >issues are discussed in detail in the Interoperability
> >Considerations section [see Section x.x].
> > END
> >
> > — Section 5.8 —
> >
> > OLD
> >Mail Receivers MAY choose to accept email that fails the DMARC
> >mechanism check even if the published Domain Owner Assessment Policy
> >is "reject".  In particular, because of the considerations discussed
> >in [RFC7960], it is important that Mail Receivers SHOULD NOT reject
> >messages solely because of a published policy of "reject", but that
> >they apply other knowledge and analysis to avoid situations such as
> >rejection of legitimate messages sent in ways that DMARC cannot
> >describe, harm to the operation of mailing lists, and similar.
> > NEW
> >Mail Receivers MAY choose to accept email that fails the DMARC
> >mechanism check even if the published Domain Owner Assessment Policy
> >is "reject".  In particular, because of the considerations discussed
> >in [RFC7960] and in the Interoperability Considerations section of
> >this document [see Section x.x], it is important that Mail Receivers
> >not reject messages solely because of a published policy of "reject",
> >but that they apply other knowledge and analysis to avoid situations
> >such as rejection of legitimate messages sent in ways that DMARC
> >cannot describe, harm to the operation of mailing lists, and similar.
> > END
> >
> > — New section —
> >
> > ADD
> > x.x Interoperability Considerations
> >
> >As discussed in “Interoperability Issues between DMARC and Indirect
> >Email Flows [RFC7960], use of p=reject can be incompatible with and
> >cause interoperability problems to indirect message flows such as
> >“alumni forwarders”, role-based email aliases, and mailing lists
> >across the Internet.
> >
> >Even a domain that expects to send only targeted messages to
> >account holders — a bank, for example — could have account
> >holders using addresses such as jo...@alumni.example.edu (an
> >address that relays the messages to another address with a real
> >mailbox) or finance@association.example (a role-based address that
> >does similar relaying for the current head of finance at the
> >association).  When such mail is delivered to the actual recipient
> >mailbox, it will necessarily fail SPF checks, as the incoming
> >IP address will be that of example.edu or association.example, and
> >not an address authorized for the sending domain.  DKIM signatures
> >will generally remain valid in these relay situations.
> >
> >   It is therefore critical that domains that publish p=reject
> >   MUST NOT rely solely on SPF, and MUST apply valid DKIM signatures
> >   to their messages.
> >
> >Domains that have general users who send routine email are
> >particularly likely to create interoperability issues if they
> >publish p=reject

[dmarc-ietf] I-D Action: draft-ietf-dmarc-dmarcbis-28.txt

2023-07-06 Thread internet-drafts


A New Internet-Draft is available from the on-line Internet-Drafts
directories. This Internet-Draft is a work item of the Domain-based Message
Authentication, Reporting & Conformance (DMARC) WG of the IETF.

   Title   : Domain-based Message Authentication, Reporting, and 
Conformance (DMARC)
   Authors : Todd M. Herr
 John Levine
   Filename: draft-ietf-dmarc-dmarcbis-28.txt
   Pages   : 72
   Date: 2023-07-06

Abstract:
   This document describes the Domain-based Message Authentication,
   Reporting, and Conformance (DMARC) protocol.

   DMARC permits the owner of an email author's domain name to enable
   verification of the domain's use, to indicate the Domain Owner's or
   Public Suffix Operator's message handling preference regarding failed
   verification, and to request reports about the use of the domain
   name.  Mail receiving organizations can use this information when
   evaluating handling choices for incoming mail.

   This document obsoletes RFCs 7489 and 9091.

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-dmarc-dmarcbis/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-dmarc-dmarcbis-28.html

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-ietf-dmarc-dmarcbis-28

Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Barry Leiba
That's fine, as long as we're all understanding that it's still just a
proposal and we'll be discussing it at IETF 117 and on the mailing list.

Barry


On Thu, Jul 6, 2023 at 2:07 PM Todd Herr  wrote:

> I'll prepare a new rev incorporating this proposed text (and some other
> unrelated stuff that's been lying fallow for a few months) and release it
> today.
>
> On Thu, Jul 6, 2023 at 12:02 PM John Levine  wrote:
>
>> It appears that Barry Leiba   said:
>> >This makes it explicitly clear that any MUST/SHOULD stuff with regard
>> >to using and honoring p=reject is an issue of interoperating with
>> >existing Internet email features.  I can accept that mechanism also,
>> >and so, below is my attempt at writing that proposal up.
>>
>> This seems about as good as we're going to get.
>>
>> I agree that advice about From: munging and anything else about how
>> forwarders might rewrite messages to circumvent DMARC is wildly out of
>> scope.  We currently don't mention ARC at all.  Dunno if it's worth
>> a non-normative pointer somewhere.
>>
>> R's,
>> John
>>
>> ___
>> dmarc mailing list
>> dmarc@ietf.org
>> https://www.ietf.org/mailman/listinfo/dmarc
>>
>
>
> --
>
> *Todd Herr * | Technical Director, Standards & Ecosystem
> *e:* todd.h...@valimail.com
> *p:* 703-220-4153
> *m:* 703.220.4153
>
> This email and all data transmitted with it contains confidential and/or
> proprietary information intended solely for the use of individual(s)
> authorized to receive it. If you are not an intended and authorized
> recipient you are hereby notified of any use, disclosure, copying or
> distribution of the information included in this transmission is prohibited
> and may be unlawful. Please immediately notify the sender by replying to
> this email and then delete it from your system.
> ___
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Brotman, Alex
I suspect the portion that instructs receivers to not act solely on p=reject 
may be ignored by a fair set of receivers.  I'm not necessarily opposed to the 
language below, just that it seems odd to create language that we know will be 
ignored.  Additionally, I find it odd that we won't tell forwarders how to 
munge messages to avoid this situation, but we will tell receivers how to avoid 
this situation.

-- 
Alex Brotman
Sr. Engineer, Anti-Abuse & Messaging Policy
Comcast
 

> -Original Message-
> From: dmarc  On Behalf Of Barry Leiba
> Sent: Thursday, July 6, 2023 10:55 AM
> To: IETF DMARC WG 
> Subject: [dmarc-ietf] Another p=reject text proposal
> 
> I had some off-list discussions with Seth, who was very much against my 
> original
> proposed text, and he suggested an alternative organization that would be more
> palatable to him.  I've attempted to set that out below.  The idea is to 
> remove the
> normative requirements about using p=reject from Sections 5.5.6 and 5.8, and
> instead put a broader discussion of the issues, along with the normative
> requirements, into a new "Interoperability Considerations" section.
> This makes it explicitly clear that any MUST/SHOULD stuff with regard to using
> and honoring p=reject is an issue of interoperating with existing Internet 
> email
> features.  I can accept that mechanism also, and so, below is my attempt at
> writing that proposal up.
> 
> Barry
> 
> -
> 
> — Section 5.5.6 —
> 
> ADD
>In making this decision it is important to understand the
>interoperability issues involved and problems that can result for
>mailing lists and for deliverability of legitimate mail. Those
>issues are discussed in detail in the Interoperability
>Considerations section [see Section x.x].
> END
> 
> — Section 5.8 —
> 
> OLD
>Mail Receivers MAY choose to accept email that fails the DMARC
>mechanism check even if the published Domain Owner Assessment Policy
>is "reject".  In particular, because of the considerations discussed
>in [RFC7960], it is important that Mail Receivers SHOULD NOT reject
>messages solely because of a published policy of "reject", but that
>they apply other knowledge and analysis to avoid situations such as
>rejection of legitimate messages sent in ways that DMARC cannot
>describe, harm to the operation of mailing lists, and similar.
> NEW
>Mail Receivers MAY choose to accept email that fails the DMARC
>mechanism check even if the published Domain Owner Assessment Policy
>is "reject".  In particular, because of the considerations discussed
>in [RFC7960] and in the Interoperability Considerations section of
>this document [see Section x.x], it is important that Mail Receivers
>not reject messages solely because of a published policy of "reject",
>but that they apply other knowledge and analysis to avoid situations
>such as rejection of legitimate messages sent in ways that DMARC
>cannot describe, harm to the operation of mailing lists, and similar.
> END
> 
> — New section —
> 
> ADD
> x.x Interoperability Considerations
> 
>As discussed in “Interoperability Issues between DMARC and Indirect
>Email Flows [RFC7960], use of p=reject can be incompatible with and
>cause interoperability problems to indirect message flows such as
>“alumni forwarders”, role-based email aliases, and mailing lists
>across the Internet.
> 
>Even a domain that expects to send only targeted messages to
>account holders — a bank, for example — could have account
>holders using addresses such as jo...@alumni.example.edu (an
>address that relays the messages to another address with a real
>mailbox) or finance@association.example (a role-based address that
>does similar relaying for the current head of finance at the
>association).  When such mail is delivered to the actual recipient
>mailbox, it will necessarily fail SPF checks, as the incoming
>IP address will be that of example.edu or association.example, and
>not an address authorized for the sending domain.  DKIM signatures
>will generally remain valid in these relay situations.
> 
>   It is therefore critical that domains that publish p=reject
>   MUST NOT rely solely on SPF, and MUST apply valid DKIM signatures
>   to their messages.
> 
>Domains that have general users who send routine email are
>particularly likely to create interoperability issues if they
>publish p=reject.  For example, domains that serve as mailbox hosts
>and give out email addresses to the general public are best advised
>to delay adoption of p=reject until the authentication ecosystem
>becomes more mature and deliverability issues are better resolved.
> 
>In particular, if users in p=reject domains post messages to
>mailing lists on the Internet, those messages can cause operat

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Todd Herr
I'll prepare a new rev incorporating this proposed text (and some other
unrelated stuff that's been lying fallow for a few months) and release it
today.

On Thu, Jul 6, 2023 at 12:02 PM John Levine  wrote:

> It appears that Barry Leiba   said:
> >This makes it explicitly clear that any MUST/SHOULD stuff with regard
> >to using and honoring p=reject is an issue of interoperating with
> >existing Internet email features.  I can accept that mechanism also,
> >and so, below is my attempt at writing that proposal up.
>
> This seems about as good as we're going to get.
>
> I agree that advice about From: munging and anything else about how
> forwarders might rewrite messages to circumvent DMARC is wildly out of
> scope.  We currently don't mention ARC at all.  Dunno if it's worth
> a non-normative pointer somewhere.
>
> R's,
> John
>
> ___
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>


-- 

*Todd Herr * | Technical Director, Standards & Ecosystem
*e:* todd.h...@valimail.com
*p:* 703-220-4153
*m:* 703.220.4153

This email and all data transmitted with it contains confidential and/or
proprietary information intended solely for the use of individual(s)
authorized to receive it. If you are not an intended and authorized
recipient you are hereby notified of any use, disclosure, copying or
distribution of the information included in this transmission is prohibited
and may be unlawful. Please immediately notify the sender by replying to
this email and then delete it from your system.
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread John Levine
It appears that Barry Leiba   said:
>This makes it explicitly clear that any MUST/SHOULD stuff with regard
>to using and honoring p=reject is an issue of interoperating with
>existing Internet email features.  I can accept that mechanism also,
>and so, below is my attempt at writing that proposal up.

This seems about as good as we're going to get.

I agree that advice about From: munging and anything else about how
forwarders might rewrite messages to circumvent DMARC is wildly out of
scope.  We currently don't mention ARC at all.  Dunno if it's worth
a non-normative pointer somewhere.

R's,
John

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Questions regarding RFC 8617

2023-07-06 Thread Marcello
Hey Douglas,

Thank you for your response. Full disclosure this is the subject of my talk 
I’ll be presenting at defcon next month, I thought I’d reach out cause the more 
I dig into this the more nuance I find.

Just to clarify, is it possible having this “bad” ARC header is skewing the 
final spam score of the email when it hits the final email service provider ?

I don’t see anything in the RFC on how email services should use ARC in 
relation to calculating the spam score of an email.

From my understanding It seems ARC will pass as long as the chains integrity 
isn’t compromised *not* because of bad values in a header like this correct?

On Thu, Jul 6, 2023 at 05:02, Douglas Foster 
<[dougfoster.emailstanda...@gmail.com](mailto:On Thu, Jul 6, 2023 at 05:02, 
Douglas Foster < wrote:

> "Cloudfare" is not qualified, so it does not credibly mean "This message was 
> submitted by user Cloudfare with his correct password.". This guess can be 
> validated by checking where the ARC set appears relative to the Received 
> chain.
>
> Since we know that Cloudfare is a large hosting service, I suspect the sender 
> is asserting, "I am sending this messages through Cloudfare after logging 
> into their server with a username and password." This is a misuse of ARC and 
> this initial ARC set should be ignored.
>
> Doug
>
> On Wed, Jul 5, 2023, 10:15 PM Marcello  
> wrote:
>
>> Hey there,
>>
>> I was hoping to run a few questions by the authors of the ARC protocol.
>>
>> Long story short, I've discovered an email transaction service that always 
>> claims "auth=pass" in it's AAR header, see the following example:
>>
>> ARC-Authentication-Results: i=1; rspamd-9fcc56855-j2crh;
>> auth=pass smtp.auth=cloudflare smtp.mailfrom=t...@example.com
>> This is how their AAR header always​ looks like regardless of the senders 
>> domain SPF/DMARC/DKIM record. My questions here are:
>>
>> - is "auth=pass" a valid property in the AAR header? RFC 8617 seems to 
>> indicate you can technically put anything you want but all the examples I've 
>> seen are different and actually have SPF/DMARC/DKIM check results. (e.g. 
>> spf=pass etc..)
>> - Can an ARC chain be considered valid in the case where the first hop (i=1) 
>> has the above AAR header and doesn't actually check SPF/DMARC/DKIM of the 
>> sender domain?
>> - How should the final Email service provider treat an email with an AAR 
>> header like the above?
>> - Should not having SPF/DMARC/DKIM checks in the AAR header result in an 
>> arc=fail?
>>
>> Thank you for your time.
>> Marcello
>>
>> ___
>> dmarc mailing list
>> dmarc@ietf.org
>> https://www.ietf.org/mailman/listinfo/dmarc___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Barry Leiba
I don't think this is the place to tell mailing lists what to do, and
that's all discussed in Section 4.1.3 of RFC 7960.

Barry

On Thu, Jul 6, 2023 at 11:48 AM Alessandro Vesely  wrote:
>
> Hi,
>
> the only issue I'd put about the new section is that it doesn't mention From:
> munging.  Isn't that practice widespread enough that it deserves being 
> considered?
>
>
> Best
> Ale
>
>
> On Thu 06/Jul/2023 16:55:02 +0200 Barry Leiba wrote:
> > I had some off-list discussions with Seth, who was very much against
> > my original proposed text, and he suggested an alternative
> > organization that would be more palatable to him.  I've attempted to
> > set that out below.  The idea is to remove the normative requirements
> > about using p=reject from Sections 5.5.6 and 5.8, and instead put a
> > broader discussion of the issues, along with the normative
> > requirements, into a new "Interoperability Considerations" section.
> > This makes it explicitly clear that any MUST/SHOULD stuff with regard
> > to using and honoring p=reject is an issue of interoperating with
> > existing Internet email features.  I can accept that mechanism also,
> > and so, below is my attempt at writing that proposal up.
> >
> > Barry
> >
> > -
> >
> > — Section 5.5.6 —
> >
> > ADD
> > In making this decision it is important to understand the
> > interoperability issues involved and problems that can result for
> > mailing lists and for deliverability of legitimate mail. Those
> > issues are discussed in detail in the Interoperability
> > Considerations section [see Section x.x].
> > END
> >
> > — Section 5.8 —
> >
> > OLD
> > Mail Receivers MAY choose to accept email that fails the DMARC
> > mechanism check even if the published Domain Owner Assessment Policy
> > is "reject".  In particular, because of the considerations discussed
> > in [RFC7960], it is important that Mail Receivers SHOULD NOT reject
> > messages solely because of a published policy of "reject", but that
> > they apply other knowledge and analysis to avoid situations such as
> > rejection of legitimate messages sent in ways that DMARC cannot
> > describe, harm to the operation of mailing lists, and similar.
> > NEW
> > Mail Receivers MAY choose to accept email that fails the DMARC
> > mechanism check even if the published Domain Owner Assessment Policy
> > is "reject".  In particular, because of the considerations discussed
> > in [RFC7960] and in the Interoperability Considerations section of
> > this document [see Section x.x], it is important that Mail Receivers
> > not reject messages solely because of a published policy of "reject",
> > but that they apply other knowledge and analysis to avoid situations
> > such as rejection of legitimate messages sent in ways that DMARC
> > cannot describe, harm to the operation of mailing lists, and similar.
> > END
> >
> > — New section —
> >
> > ADD
> > x.x Interoperability Considerations
> >
> > As discussed in “Interoperability Issues between DMARC and Indirect
> > Email Flows [RFC7960], use of p=reject can be incompatible with and
> > cause interoperability problems to indirect message flows such as
> > “alumni forwarders”, role-based email aliases, and mailing lists
> > across the Internet.
> >
> > Even a domain that expects to send only targeted messages to
> > account holders — a bank, for example — could have account
> > holders using addresses such as jo...@alumni.example.edu (an
> > address that relays the messages to another address with a real
> > mailbox) or finance@association.example (a role-based address that
> > does similar relaying for the current head of finance at the
> > association).  When such mail is delivered to the actual recipient
> > mailbox, it will necessarily fail SPF checks, as the incoming
> > IP address will be that of example.edu or association.example, and
> > not an address authorized for the sending domain.  DKIM signatures
> > will generally remain valid in these relay situations.
> >
> >It is therefore critical that domains that publish p=reject
> >MUST NOT rely solely on SPF, and MUST apply valid DKIM signatures
> >to their messages.
> >
> > Domains that have general users who send routine email are
> > particularly likely to create interoperability issues if they
> > publish p=reject.  For example, domains that serve as mailbox hosts
> > and give out email addresses to the general public are best advised
> > to delay adoption of p=reject until the authentication ecosystem
> > becomes more mature and deliverability issues are better resolved.
> >
> > In particular, if users in p=reject domains post messages to
> > mailing lists on the Internet, those messages can cause operational
> > problems for the m

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Alessandro Vesely

Hi,

the only issue I'd put about the new section is that it doesn't mention From: 
munging.  Isn't that practice widespread enough that it deserves being considered?



Best
Ale


On Thu 06/Jul/2023 16:55:02 +0200 Barry Leiba wrote:

I had some off-list discussions with Seth, who was very much against
my original proposed text, and he suggested an alternative
organization that would be more palatable to him.  I've attempted to
set that out below.  The idea is to remove the normative requirements
about using p=reject from Sections 5.5.6 and 5.8, and instead put a
broader discussion of the issues, along with the normative
requirements, into a new "Interoperability Considerations" section.
This makes it explicitly clear that any MUST/SHOULD stuff with regard
to using and honoring p=reject is an issue of interoperating with
existing Internet email features.  I can accept that mechanism also,
and so, below is my attempt at writing that proposal up.

Barry

-

— Section 5.5.6 —

ADD
In making this decision it is important to understand the
interoperability issues involved and problems that can result for
mailing lists and for deliverability of legitimate mail. Those
issues are discussed in detail in the Interoperability
Considerations section [see Section x.x].
END

— Section 5.8 —

OLD
Mail Receivers MAY choose to accept email that fails the DMARC
mechanism check even if the published Domain Owner Assessment Policy
is "reject".  In particular, because of the considerations discussed
in [RFC7960], it is important that Mail Receivers SHOULD NOT reject
messages solely because of a published policy of "reject", but that
they apply other knowledge and analysis to avoid situations such as
rejection of legitimate messages sent in ways that DMARC cannot
describe, harm to the operation of mailing lists, and similar.
NEW
Mail Receivers MAY choose to accept email that fails the DMARC
mechanism check even if the published Domain Owner Assessment Policy
is "reject".  In particular, because of the considerations discussed
in [RFC7960] and in the Interoperability Considerations section of
this document [see Section x.x], it is important that Mail Receivers
not reject messages solely because of a published policy of "reject",
but that they apply other knowledge and analysis to avoid situations
such as rejection of legitimate messages sent in ways that DMARC
cannot describe, harm to the operation of mailing lists, and similar.
END

— New section —

ADD
x.x Interoperability Considerations

As discussed in “Interoperability Issues between DMARC and Indirect
Email Flows [RFC7960], use of p=reject can be incompatible with and
cause interoperability problems to indirect message flows such as
“alumni forwarders”, role-based email aliases, and mailing lists
across the Internet.

Even a domain that expects to send only targeted messages to
account holders — a bank, for example — could have account
holders using addresses such as jo...@alumni.example.edu (an
address that relays the messages to another address with a real
mailbox) or finance@association.example (a role-based address that
does similar relaying for the current head of finance at the
association).  When such mail is delivered to the actual recipient
mailbox, it will necessarily fail SPF checks, as the incoming
IP address will be that of example.edu or association.example, and
not an address authorized for the sending domain.  DKIM signatures
will generally remain valid in these relay situations.

   It is therefore critical that domains that publish p=reject
   MUST NOT rely solely on SPF, and MUST apply valid DKIM signatures
   to their messages.

Domains that have general users who send routine email are
particularly likely to create interoperability issues if they
publish p=reject.  For example, domains that serve as mailbox hosts
and give out email addresses to the general public are best advised
to delay adoption of p=reject until the authentication ecosystem
becomes more mature and deliverability issues are better resolved.

In particular, if users in p=reject domains post messages to
mailing lists on the Internet, those messages can cause operational
problems for the mailing lists and for the subscribers to those
lists, as explained below and in [RFC7960].

   It is therefore critical that domains that host users who might
   post messages to mailing lists SHOULD NOT publish p=reject.
   Domains that choose to publish p=reject SHOULD implement
   policies that their users not post to Internet mailing lists.

As noted in [Section 5.8], receiving domains need to apply more
analysis than just DMARC evaluation in their disposition of
incoming messages.  An example of

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Douglas Foster
Whatever works within our constraints.   It is certainly an
interoperability consideration, and evaluators will have a hard time
reverse engineering why the signature fails verification.

df

On Thu, Jul 6, 2023, 11:25 AM Barry Leiba  wrote:

> > This language works well for me.
>
> Excellent; thanks.
>
> > I suggest adding some language about why MTAs should not rearrange
> message headers or MIME
> > sections, even though earlier documents grant permission to do so.
> >
> > Additionally, when adding headers, an MTA must add them at the top if
> (a) the header type is
> > included in any verifiable signature, (b) the header is officially
> labelled a trace header, or (c) the
> > MTA chooses not to match the added header type to existing signatures
> (ARC or DKIM)
>
> If you're talking about something related to the sending domain not
> doing that after DKIM signing, we could say that as part of the "use
> DKIM and do it correctly" part.  If you're talking about MTAs further
> along the path, that's out of scope here, at least in a normative
> sense.  We could say, informatively, that those practices break DKIM
> signatures and thus hurt DMARC.  But we can't place normative
> requirements on MTAs that are not implementing DMARC.
>
> Barry
>
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Barry Leiba
> This language works well for me.

Excellent; thanks.

> I suggest adding some language about why MTAs should not rearrange message 
> headers or MIME
> sections, even though earlier documents grant permission to do so.
>
> Additionally, when adding headers, an MTA must add them at the top if (a) the 
> header type is
> included in any verifiable signature, (b) the header is officially labelled a 
> trace header, or (c) the
> MTA chooses not to match the added header type to existing signatures (ARC or 
> DKIM)

If you're talking about something related to the sending domain not
doing that after DKIM signing, we could say that as part of the "use
DKIM and do it correctly" part.  If you're talking about MTAs further
along the path, that's out of scope here, at least in a normative
sense.  We could say, informatively, that those practices break DKIM
signatures and thus hurt DMARC.  But we can't place normative
requirements on MTAs that are not implementing DMARC.

Barry

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DMARC session agenda for IETF 117

2023-07-06 Thread Barry Leiba
> For clarity:  When you say, "AD will call consensus on this issue", you mean 
> after the results of the discussion
> are brought to the list and reviewed by the working group, not at the 
> meeting, right?

Yes, correct.  I wanted to make it clear that Seth and I both have a
conflict on this, and neither of us can be the one calling consensus.
(I honestly think that either of us would actually do it fairly, but
we really do need to stay away from that...)

> Also, I expect to have a proposal on protocol reliability related to the 
> "drop SPF" discussion, in the next day or three.

Excellent; thanks!

Barry

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Douglas Foster
This language works well for me.

I suggest adding some language about why MTAs should not rearrange message
headers or MIME sections, even though earlier documents grant permission to
do so.

Additionally, when adding headers, an MTA must add them at the top if (a)
the header type is included in any verifiable signature, (b) the header is
officially labelled a trace header, or (c) the MTA chooses not to match the
added header type to existing signatures (ARC or DKIM)

df

On Thu, Jul 6, 2023, 10:55 AM Barry Leiba  wrote:

> I had some off-list discussions with Seth, who was very much against
> my original proposed text, and he suggested an alternative
> organization that would be more palatable to him.  I've attempted to
> set that out below.  The idea is to remove the normative requirements
> about using p=reject from Sections 5.5.6 and 5.8, and instead put a
> broader discussion of the issues, along with the normative
> requirements, into a new "Interoperability Considerations" section.
> This makes it explicitly clear that any MUST/SHOULD stuff with regard
> to using and honoring p=reject is an issue of interoperating with
> existing Internet email features.  I can accept that mechanism also,
> and so, below is my attempt at writing that proposal up.
>
> Barry
>
>
> -
>
> — Section 5.5.6 —
>
> ADD
>In making this decision it is important to understand the
>interoperability issues involved and problems that can result for
>mailing lists and for deliverability of legitimate mail. Those
>issues are discussed in detail in the Interoperability
>Considerations section [see Section x.x].
> END
>
> — Section 5.8 —
>
> OLD
>Mail Receivers MAY choose to accept email that fails the DMARC
>mechanism check even if the published Domain Owner Assessment Policy
>is "reject".  In particular, because of the considerations discussed
>in [RFC7960], it is important that Mail Receivers SHOULD NOT reject
>messages solely because of a published policy of "reject", but that
>they apply other knowledge and analysis to avoid situations such as
>rejection of legitimate messages sent in ways that DMARC cannot
>describe, harm to the operation of mailing lists, and similar.
> NEW
>Mail Receivers MAY choose to accept email that fails the DMARC
>mechanism check even if the published Domain Owner Assessment Policy
>is "reject".  In particular, because of the considerations discussed
>in [RFC7960] and in the Interoperability Considerations section of
>this document [see Section x.x], it is important that Mail Receivers
>not reject messages solely because of a published policy of "reject",
>but that they apply other knowledge and analysis to avoid situations
>such as rejection of legitimate messages sent in ways that DMARC
>cannot describe, harm to the operation of mailing lists, and similar.
> END
>
> — New section —
>
> ADD
> x.x Interoperability Considerations
>
>As discussed in “Interoperability Issues between DMARC and Indirect
>Email Flows [RFC7960], use of p=reject can be incompatible with and
>cause interoperability problems to indirect message flows such as
>“alumni forwarders”, role-based email aliases, and mailing lists
>across the Internet.
>
>Even a domain that expects to send only targeted messages to
>account holders — a bank, for example — could have account
>holders using addresses such as jo...@alumni.example.edu (an
>address that relays the messages to another address with a real
>mailbox) or finance@association.example (a role-based address that
>does similar relaying for the current head of finance at the
>association).  When such mail is delivered to the actual recipient
>mailbox, it will necessarily fail SPF checks, as the incoming
>IP address will be that of example.edu or association.example, and
>not an address authorized for the sending domain.  DKIM signatures
>will generally remain valid in these relay situations.
>
>   It is therefore critical that domains that publish p=reject
>   MUST NOT rely solely on SPF, and MUST apply valid DKIM signatures
>   to their messages.
>
>Domains that have general users who send routine email are
>particularly likely to create interoperability issues if they
>publish p=reject.  For example, domains that serve as mailbox hosts
>and give out email addresses to the general public are best advised
>to delay adoption of p=reject until the authentication ecosystem
>becomes more mature and deliverability issues are better resolved.
>
>In particular, if users in p=reject domains post messages to
>mailing lists on the Internet, those messages can cause operational
>problems for the mailing lists and for the subscribers to those
>lists, as explained below and in [RFC7960].
>
>   It is therefore critical th

Re: [dmarc-ietf] DMARC session agenda for IETF 117

2023-07-06 Thread Scott Kitterman
For clarity:  When you say, "AD will call consensus on this issue", you mean 
after the results of the discussion are brought to the list and reviewed by the 
working group, not at the meeting, right?

Also, I expect to have a proposal on protocol reliability related to the "drop 
SPF" discussion, in the next day or three.

Scott K

On July 6, 2023 3:00:23 PM UTC, Barry Leiba  wrote:
>Below is the agenda I am posting for the session at IETF 117.
>Comments, changes, and additions are welcome; please post them here.
>
>Barry
>
>---
>
>DMARC working group session at IETF 117
>Friday, 28 July, 2023 — 12:00-13:30 PDT (UTC-7)
>
>- Introduction and administration
>- Document status
>
>- Discussion of p=reject:
>  - What’s needed to deal with the indirect mail flow problems?
>  - Options currently open:
>- No change to current text
>- Move ARC to Standards Track (need more data)
>- Scott Kitterman’s proposed text
>- Barry Leiba’s proposed text (new Interoperability Considerations section)
>  - AD will call consensus on this issue
>
>- Discussion of SPF use in DMARC
>  - There was a proposal to remove SPF from DMARC
>  - The proposal is *only* related to use of SPF *in DMARC*
>  - Options currently open:
>- No change to current text
>- Simply remove SPF from DMARC consideration
>- Add a DMARC record tag to specify use of SPF, DKIM, or either
>  - Do we also add “both must align”?
>
>- Any other business
>
>---
>
>___
>dmarc mailing list
>dmarc@ietf.org
>https://www.ietf.org/mailman/listinfo/dmarc

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


[dmarc-ietf] DMARC session agenda for IETF 117

2023-07-06 Thread Barry Leiba
Below is the agenda I am posting for the session at IETF 117.
Comments, changes, and additions are welcome; please post them here.

Barry

---

DMARC working group session at IETF 117
Friday, 28 July, 2023 — 12:00-13:30 PDT (UTC-7)

- Introduction and administration
- Document status

- Discussion of p=reject:
  - What’s needed to deal with the indirect mail flow problems?
  - Options currently open:
- No change to current text
- Move ARC to Standards Track (need more data)
- Scott Kitterman’s proposed text
- Barry Leiba’s proposed text (new Interoperability Considerations section)
  - AD will call consensus on this issue

- Discussion of SPF use in DMARC
  - There was a proposal to remove SPF from DMARC
  - The proposal is *only* related to use of SPF *in DMARC*
  - Options currently open:
- No change to current text
- Simply remove SPF from DMARC consideration
- Add a DMARC record tag to specify use of SPF, DKIM, or either
  - Do we also add “both must align”?

- Any other business

---

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


[dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Barry Leiba
I had some off-list discussions with Seth, who was very much against
my original proposed text, and he suggested an alternative
organization that would be more palatable to him.  I've attempted to
set that out below.  The idea is to remove the normative requirements
about using p=reject from Sections 5.5.6 and 5.8, and instead put a
broader discussion of the issues, along with the normative
requirements, into a new "Interoperability Considerations" section.
This makes it explicitly clear that any MUST/SHOULD stuff with regard
to using and honoring p=reject is an issue of interoperating with
existing Internet email features.  I can accept that mechanism also,
and so, below is my attempt at writing that proposal up.

Barry

-

— Section 5.5.6 —

ADD
   In making this decision it is important to understand the
   interoperability issues involved and problems that can result for
   mailing lists and for deliverability of legitimate mail. Those
   issues are discussed in detail in the Interoperability
   Considerations section [see Section x.x].
END

— Section 5.8 —

OLD
   Mail Receivers MAY choose to accept email that fails the DMARC
   mechanism check even if the published Domain Owner Assessment Policy
   is "reject".  In particular, because of the considerations discussed
   in [RFC7960], it is important that Mail Receivers SHOULD NOT reject
   messages solely because of a published policy of "reject", but that
   they apply other knowledge and analysis to avoid situations such as
   rejection of legitimate messages sent in ways that DMARC cannot
   describe, harm to the operation of mailing lists, and similar.
NEW
   Mail Receivers MAY choose to accept email that fails the DMARC
   mechanism check even if the published Domain Owner Assessment Policy
   is "reject".  In particular, because of the considerations discussed
   in [RFC7960] and in the Interoperability Considerations section of
   this document [see Section x.x], it is important that Mail Receivers
   not reject messages solely because of a published policy of "reject",
   but that they apply other knowledge and analysis to avoid situations
   such as rejection of legitimate messages sent in ways that DMARC
   cannot describe, harm to the operation of mailing lists, and similar.
END

— New section —

ADD
x.x Interoperability Considerations

   As discussed in “Interoperability Issues between DMARC and Indirect
   Email Flows [RFC7960], use of p=reject can be incompatible with and
   cause interoperability problems to indirect message flows such as
   “alumni forwarders”, role-based email aliases, and mailing lists
   across the Internet.

   Even a domain that expects to send only targeted messages to
   account holders — a bank, for example — could have account
   holders using addresses such as jo...@alumni.example.edu (an
   address that relays the messages to another address with a real
   mailbox) or finance@association.example (a role-based address that
   does similar relaying for the current head of finance at the
   association).  When such mail is delivered to the actual recipient
   mailbox, it will necessarily fail SPF checks, as the incoming
   IP address will be that of example.edu or association.example, and
   not an address authorized for the sending domain.  DKIM signatures
   will generally remain valid in these relay situations.

  It is therefore critical that domains that publish p=reject
  MUST NOT rely solely on SPF, and MUST apply valid DKIM signatures
  to their messages.

   Domains that have general users who send routine email are
   particularly likely to create interoperability issues if they
   publish p=reject.  For example, domains that serve as mailbox hosts
   and give out email addresses to the general public are best advised
   to delay adoption of p=reject until the authentication ecosystem
   becomes more mature and deliverability issues are better resolved.

   In particular, if users in p=reject domains post messages to
   mailing lists on the Internet, those messages can cause operational
   problems for the mailing lists and for the subscribers to those
   lists, as explained below and in [RFC7960].

  It is therefore critical that domains that host users who might
  post messages to mailing lists SHOULD NOT publish p=reject.
  Domains that choose to publish p=reject SHOULD implement
  policies that their users not post to Internet mailing lists.

   As noted in [Section 5.8], receiving domains need to apply more
   analysis than just DMARC evaluation in their disposition of
   incoming messages.  An example of the consequences of honoring
   p=reject without further anaysis is that rejecting messages that
   have been relayed by a mailing list can cause your own users to
   have their subscriptions to that mailing list cancelled by the
   list software’s automated handling of such rejections — it l

Re: [dmarc-ietf] Questions regarding RFC 8617

2023-07-06 Thread Douglas Foster
"Cloudfare" is not qualified, so it does not credibly mean "This message
was submitted by user Cloudfare with his correct password.". This guess can
be validated by checking where the ARC set appears relative to the Received
chain.

Since we know that Cloudfare is a large hosting service, I suspect the
sender is asserting, "I am sending this messages through Cloudfare after
logging into their server with a username and password."   This is a misuse
of ARC and this initial ARC set should be ignored.

Doug

On Wed, Jul 5, 2023, 10:15 PM Marcello 
wrote:

> Hey there,
>
> I was hoping to run a few questions by the authors of the ARC protocol.
>
> Long story short, I've discovered an email transaction service that always
> claims "auth=pass"  in it's AAR header, see the following example:
>
> ARC-Authentication-Results: i=1; rspamd-9fcc56855-j2crh;
> auth=pass smtp.auth=cloudflare
> smtp.mailfrom=t...@example.com
>
>
> This is how their AAR header *always*​ looks like regardless of the
> senders domain SPF/DMARC/DKIM record. My questions here are:
>
>
>1. is "auth=pass" a valid property in the AAR header? RFC 8617 seems
>to indicate you can technically put anything you want but all the examples
>I've seen are different and actually have SPF/DMARC/DKIM check results.
>(e.g. spf=pass etc..)
>2. Can an ARC chain be considered valid in the case where the first
>hop (i=1) has the above AAR header and doesn't actually check
>SPF/DMARC/DKIM of the sender domain?
>3. How should the final Email service provider treat an email with an
>AAR header like the above?
>4. Should not having SPF/DMARC/DKIM checks in the AAR header result in
>an arc=fail?
>
>
> Thank you for your time.
>
> Marcello
>
> ___
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc