Re: [dmarc-ietf] Another p=reject text proposal

2023-07-08 Thread Murray S. Kucherawy
On Fri, Jul 7, 2023 at 6:14 AM Douglas Foster <
dougfoster.emailstanda...@gmail.com> wrote:

> Malicious impersonation creates a need for authentication.   If the list
> makes changes that disable the originator's authentication, then it is the
> list's problem to find a way to convince the recipient that the message is
> not a malicious impersonation.  ARC and Munging together are the best
> available way to do so, because no other options are on the table.
>

I continue to disagree with this line of thinking.  Lists have been
behaving a particular way, with important operational benefits to users
(unrelated to authentication), for a very long time.  That they should
suddenly be told by senders that the Internet works a different way
starting now and those behaviors are wrong and must be fixed, to me, defies
reason.

If you want to blame someone for the list problem, blame the criminals.
>

Here, we agree.

-MSK, participating
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Another p=reject text proposal

2023-07-08 Thread Murray S. Kucherawy
On Fri, Jul 7, 2023 at 6:35 PM Douglas Foster <
dougfoster.emailstanda...@gmail.com> wrote:

> Consequently, the problem remains: How does an evaluator distinguish
> between a legitimate list and a malicious attack?
>

If we had a reliable answer to that, this would've been over ages ago.
Unfortunately, any mechanism we create for lists to distinguish their
traffic can be trivially co-opted by bad actors.


> My answer:  Lists need to use From munging to avoid DMARC FAIL, and hope
> that sophisticated evaluators will use ARC data to un-mung before delivery.
>

Someone else asserted that lists have been dealing with DMARC damage by,
among other things, rewriting From fields for some years now.  Let me pose
a couple of questions to list operators and developers and those friendly
to those audiences:

1) Are list operators and developers tolerating this situation,
temporarily, because they think this crew is going to come up with a less
disruptive permanent solution to which they expect to migrate one day?

2) If not, have they resigned themselves to such things as From rewriting
as the way of the future?

3) If so, how big (or small) is the set of DMARC accommodations on which
they seem to be converging?

-MSK, participating
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Another p=reject text proposal

2023-07-08 Thread Tero Kivinen
Scott Kitterman writes:
> You can equally argue that these receivers are merely following the
> policy advice provided by the sending domain (it has reject right in
> the name) and this problem is entirely generated by sender's
> inappropriate use of p=reject. 

True, thats why the proposed text also says you SHOULD NOT put
p=reject... :-)

> I don't think engineering the location where the blame lands is the
> right place to focus. I've done plenty of blame avoidance
> engineering in my day, but I don't think it's what the IETF should
> be doing.

It would be much better when people would really remember that having
valid or not valid DMARC/DKIM/SPF for email does not tell anything
whether the email is bad/spam/unwanted.

Regardless whether the DMARC/DKIM/SPF is valid you always need to use
other methods to filter emails, so as you need to do that anyways
while receiving emails, there is no problems of using same things also
for p=reject messages. You can use the failed dmarc with p=reject as
one of the inputs to feed your actual email filtering system, the
dmarc p=reject SHOULD NOT BE your only email filtering system.
-- 
kivi...@iki.fi

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Another p=reject text proposal

2023-07-08 Thread Scott Kitterman



On July 8, 2023 6:16:46 PM UTC, Tero Kivinen  wrote:
>Brotman, Alex writes:
>> I suspect the portion that instructs receivers to not act solely on
>> p=reject may be ignored by a fair set of receivers.  I'm not
>> necessarily opposed to the language below, just that it seems odd to
>> create language that we know will be ignored.
>
>If receivers ignore that, then at least we can complain to them and
>say that you should not do that, as the RFC says you should use other
>information too if they want to get important forwarded emails
>through. For example we in iki.fi have been regularly been helping
>people with their broken spf etc records which break forwarding, and
>several times we have actually managed to explain the situation and
>they have change their settings. Quite often those people simply
>follow whatever some consultant etc suggested, and they did not
>understood at all that they at the same time broke other things.
>
>Quite often they do want to reduce the amoung of support calls, and if
>they get support calls every time some forwarded email from mailing
>list or from forwarding gets rejected, they most likely will notice
>that and fix their setup. 
>
>> Additionally, I find it odd that we won't tell forwarders how to
>> munge messages to avoid this situation, but we will tell receivers
>> how to avoid this situation.
>
>There is no good way for forwards to mungle message in such way that
>return path/DKIM/user expectations stays intact. I myself for example
>find the From address mangling done by this mailing list really
>annoying as I need to use extra time to parse the =40 addresses to
>find out domain name of the sender.
>
>For mailing list this is just annoying but you can do that, but for
>regular forwarding you can't do that as you want to keep the DKIM
>signature intact.
>
>And this problem is not generated by forwarders, it is generated by
>the receivers who only use DMARC and no other information while
>rejecting emails. So there is no point of asking forwarders to fix
>things that was broken by DMARC...

You can equally argue that these receivers are merely following the policy 
advice provided by the sending domain (it has reject right in the name) and 
this problem is entirely generated by sender's inappropriate use of p=reject.

I don't think engineering the location where the blame lands is the right place 
to focus.  I've done plenty of blame avoidance engineering in my day, but I 
don't think it's what the IETF should be doing.

Scott K

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Another p=reject text proposal

2023-07-08 Thread Tero Kivinen
Brotman, Alex writes:
> I suspect the portion that instructs receivers to not act solely on
> p=reject may be ignored by a fair set of receivers.  I'm not
> necessarily opposed to the language below, just that it seems odd to
> create language that we know will be ignored.

If receivers ignore that, then at least we can complain to them and
say that you should not do that, as the RFC says you should use other
information too if they want to get important forwarded emails
through. For example we in iki.fi have been regularly been helping
people with their broken spf etc records which break forwarding, and
several times we have actually managed to explain the situation and
they have change their settings. Quite often those people simply
follow whatever some consultant etc suggested, and they did not
understood at all that they at the same time broke other things.

Quite often they do want to reduce the amoung of support calls, and if
they get support calls every time some forwarded email from mailing
list or from forwarding gets rejected, they most likely will notice
that and fix their setup. 

> Additionally, I find it odd that we won't tell forwarders how to
> munge messages to avoid this situation, but we will tell receivers
> how to avoid this situation.

There is no good way for forwards to mungle message in such way that
return path/DKIM/user expectations stays intact. I myself for example
find the From address mangling done by this mailing list really
annoying as I need to use extra time to parse the =40 addresses to
find out domain name of the sender.

For mailing list this is just annoying but you can do that, but for
regular forwarding you can't do that as you want to keep the DKIM
signature intact.

And this problem is not generated by forwarders, it is generated by
the receivers who only use DMARC and no other information while
rejecting emails. So there is no point of asking forwarders to fix
things that was broken by DMARC...
-- 
kivi...@iki.fi

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Another p=reject text proposal

2023-07-08 Thread John Levine
It appears that Richard Clayton   said:
>They then moved on to just using random identities from the same domain
>as the recipient. This led a great many Yahoo users to believe that a
>great many other Yahoo users had been compromised, leading to a
>significant loss of faith in the integrity of the platform.

We get that, but why did they have to inflict DMARC policy on the
world rather than just adjusting their own mail software to filter out
incoming mail with Yahoo return addresses from other places? I assume
the answer was that the DMARC code was already written so it was
cheaper.

>strong, mailing lists (and other forwarders that mangle email) have been
>coping with p=reject for nearly a decade -- so that trying
>(ineffectually in practice) to make their lives easier at this point is
>a snare and a delusion.

There seem to be a fair number of people working on ARC who disagree.

R's,
John

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Another p=reject text proposal

2023-07-08 Thread Hector Santos

*Note: The following is a general rule of thumb for me.*

From my functional specification protocol language coding standpoint:

MUST --> NO OPTION. Technically enabled with no switch to disable.
SHOULD -> OPTIONAL, Default is ON, enabled
MAY -->  OPTIONAL, Default is ON or OFF depending on implementation

With the special RFC documentation format designed/written for a very 
wide audience from managers, system admins, coders, engineers, etc, it 
offers semantics with lower and upper case guidelines. sometimes 
purposely ambiguous (to keep it open ended) and in the IETF  RFC, we 
have used the UPPER CASE language as a way to create code especially 
with standard track items.


Those who choose to ignore the UPPER CASE interop advice often risk 
having the proverbial book thrown at them.


With lower case semantics, this has been my overall implementation 
methods:


may, should --> may be implemented as options as with upper case

must --> may be implemented and enabled with hidden option to disable.

--
HLS


On 7/8/2023 12:49 PM, Richard Clayton wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

In message, Murray S. Kucherawy  writes


Some of my IETF mentors (ahem) taught me some stuff about the use
of SHOULD [NOT] that have stuck with me, and I'm going to pressure
test this against that advice.� Let's see how this goes.� :-)

"SHOULD" leaves the implementer with a choice.� You really ought to
do what it says in the general case, but there might be
circumstances where you could deviate from that advice, with some
possible effect on interoperability.

I noted that one of the earlier messages which endorsed MUST NOT said
that of course some people might know better -- which is what I always
understood SHOULD NOT was for !


  � If you do that, it is
expected that you fully understand the possible impact you're about
to have on the Internet before proceeding.� To that end, we like
the use of SHOULD [NOT] to be accompanied by some prose explaining
when one might deviate in this manner, such as an example of when
it might be okay to do so.

not so much "OK" as "necessary".  Yahoo's original statement (I'm
prepared to name names rather than pussyfoot around this) on the
deployment of p=reject is discussed here:

  https://wordtothewise.com/2014/04/yahoo-statement-dmarc-policy/

and I believe it is widely understood that it was particularly deployed
to counter the "address book spammers" of the time. These bad guys
originally persuaded people to open their email by forging it to appear
to come from their friends (having compromised relevant address books).

They then moved on to just using random identities from the same domain
as the recipient. This led a great many Yahoo users to believe that a
great many other Yahoo users had been compromised, leading to a
significant loss of faith in the integrity of the platform.


Does anyone have such an example in mind that could be included
here?� Specifically: Can we describe a scenario where (a) a sender
publishes p=reject (b) with users that post to lists (c) that the
community at large would be willing to accept/tolerate?

So the example you seek might be phrased along the lines of when failing
to set p=reject means that significant quantities of forged email will
be delivered and this will cause damage.

Personally (not a $DAYJOB$ opinion) I think SHOULD NOT is still too
strong, mailing lists (and other forwarders that mangle email) have been
coping with p=reject for nearly a decade -- so that trying
(ineffectually in practice) to make their lives easier at this point is
a snare and a delusion.

- -- 
richard   Richard Clayton


Those who would give up essential Liberty, to purchase a little temporary
Safety, deserve neither Liberty nor Safety. Benjamin Franklin 11 Nov 1755




--
Hector Santos,
https://santronics.com
https://winserver.com


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Another p=reject text proposal

2023-07-08 Thread Richard Clayton
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

In message , Murray S. Kucherawy  writes

>Some of my IETF mentors (ahem) taught me some stuff about the use 
>of SHOULD [NOT] that have stuck with me, and I'm going to pressure 
>test this against that advice.  Let's see how this goes.  :-)
>
>"SHOULD" leaves the implementer with a choice.  You really ought to 
>do what it says in the general case, but there might be 
>circumstances where you could deviate from that advice, with some 
>possible effect on interoperability.

I noted that one of the earlier messages which endorsed MUST NOT said
that of course some people might know better -- which is what I always
understood SHOULD NOT was for !

>    If you do that, it is 
>expected that you fully understand the possible impact you're about 
>to have on the Internet before proceeding.  To that end, we like 
>the use of SHOULD [NOT] to be accompanied by some prose explaining 
>when one might deviate in this manner, such as an example of when 
>it might be okay to do so.

not so much "OK" as "necessary".  Yahoo's original statement (I'm
prepared to name names rather than pussyfoot around this) on the
deployment of p=reject is discussed here:

 https://wordtothewise.com/2014/04/yahoo-statement-dmarc-policy/

and I believe it is widely understood that it was particularly deployed
to counter the "address book spammers" of the time. These bad guys
originally persuaded people to open their email by forging it to appear
to come from their friends (having compromised relevant address books).

They then moved on to just using random identities from the same domain
as the recipient. This led a great many Yahoo users to believe that a
great many other Yahoo users had been compromised, leading to a
significant loss of faith in the integrity of the platform.

>Does anyone have such an example in mind that could be included 
>here?  Specifically: Can we describe a scenario where (a) a sender 
>publishes p=reject (b) with users that post to lists (c) that the 
>community at large would be willing to accept/tolerate?

So the example you seek might be phrased along the lines of when failing
to set p=reject means that significant quantities of forged email will
be delivered and this will cause damage.

Personally (not a $DAYJOB$ opinion) I think SHOULD NOT is still too
strong, mailing lists (and other forwarders that mangle email) have been
coping with p=reject for nearly a decade -- so that trying
(ineffectually in practice) to make their lives easier at this point is
a snare and a delusion.

- -- 
richard   Richard Clayton

Those who would give up essential Liberty, to purchase a little temporary 
Safety, deserve neither Liberty nor Safety. Benjamin Franklin 11 Nov 1755

-BEGIN PGP SIGNATURE-
Version: PGPsdk version 1.7.1

iQA/AwUBZKmTft2nQQHFxEViEQJ4zACfUiVCRzGjK68phKi73kl0kg0CKnAAnjAB
ft3PPkV73wIPjvYs7tCjrCsm
=EUgy
-END PGP SIGNATURE-

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] Another p=reject text proposal

2023-07-08 Thread Alessandro Vesely

On Sat 08/Jul/2023 02:44:19 +0200 Murray S. Kucherawy wrote:

On Thu, Jul 6, 2023 at 7:55 AM Barry Leiba  wrote:


  It is therefore critical that domains that host users who might
  post messages to mailing lists SHOULD NOT publish p=reject.
  Domains that choose to publish p=reject SHOULD implement
  policies that their users not post to Internet mailing lists.


Some of my IETF mentors (ahem) taught me some stuff about the use of SHOULD
[NOT] that have stuck with me, and I'm going to pressure test this against
that advice.  Let's see how this goes.  :-)

"SHOULD" leaves the implementer with a choice.  You really ought to do what
it says in the general case, but there might be circumstances where you
could deviate from that advice, with some possible effect on
interoperability.  If you do that, it is expected that you fully understand
the possible impact you're about to have on the Internet before
proceeding.  To that end, we like the use of SHOULD [NOT] to be accompanied
by some prose explaining when one might deviate in this manner, such as an
example of when it might be okay to do so.

Does anyone have such an example in mind that could be included here?
Specifically: Can we describe a scenario where (a) a sender publishes
p=reject (b) with users that post to lists (c) that the community at large
would be willing to accept/tolerate?



The preceding, non-indented paragraph seems to devise a tolerance boundary in 
the future:


   Domains that have general users who send routine email are
   particularly likely to create interoperability issues if they
   publish p=reject.  For example, domains that serve as mailbox hosts
   and give out email addresses to the general public are best advised
   to delay adoption of p=reject until the authentication ecosystem
   becomes more mature and deliverability issues are better resolved.

/More/ mature and /better/ resolved might still be obscure.  For the time 
being, IME, the ecosystem is mature enough to resolve the mailing list 
interoperability issues by From: munging.  I agree it might become more mature 
and find out better ways.  Yet, the current level might seem enough to permit 
p=reject where it is necessary —unless there are situations (unknown to me) 
where the damage is still serious or substantial.



Best
Ale
--




___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc