Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-22 Thread Douglas Foster
I am ready to embrace NXDOMAIN as the preferred test, based on two
assumptions which I am hoping the group can endorse.

Scope
The PSD case is a special case of not-valid-for-mail names, and I was
interested in trying to address more than that one case.   A complete list
seems to be:
- Fictitious TLDs
- PSD names, because they do not send mail
- Unregistered and therefore fictitious organization domains, and their
descendants
- Fictitious additions to the set of names used for an organization domain
- Use of names that are only used for non-mail purposes
- Use of names that are used for SMTP but not for RFC5322.From

A first question is whether the domain owner is the only arbiter of what
names are real or fictitious within his space.   This is necessary because
DMARC Fail occurs on messages that I want and allow, even though I know
that they did not originate from the domain owner.   Some US Government web
sites and some email security services are important enough to break the
rules and get away with it.   However, these "acceptable impersonations"
are always using an actual email address.   Similarly, mailing list
messages may produce DMARC Fail, but the subscriber is a valid member of a
valid domain.   So my first assumption is, "Yes, the domain owner has
official control over the definition of valid names within his
organization"

Not all RFC5322.From domains exist in DNS, and not all DNS names are valid
as RFC5322.From domains.  "Valid" becomes a nebulous concept based on the
intent of the domain owner.  While NXDOMAIN is certainly a solution to the
PSD problem, it is not obvious that it is a sufficient solution to the
general problem.

My second assumption is that as an evaluator, I am unlikely to gain any
benefit from checking for invalid names underneath an organization domain.
  If a domain owner ensures that both mail-enabled and non-mail names are
protected using SP=REJECT, then an attacker gains no advantage from
choosing an invalid name over a valid one.   Similarly, if the domain owner
leaves both mail-enabled and non-mail names unprotected using SP=NONE, then
the attacker has no advantage from choosing an invalid name over a valid
one.   To the contrary, it seems advantageous for the attacker to use a
valid name when one is available.Using an invalid name becomes
advantageous only if the domain owner protects all mail-enabled names with
P=REJECT, but leaves non-mail names unprotected using SP=NONE.  This
configuration seems bizarre to me, and therefore unimportant.
Nonetheless, it still might be useful if all non-mail names could be
determined with confidence, but this requires near-perfect information to
be useful, and experience shows that this is unlikely.

If the second assumption is accepted, then the last three scope topics
disappear.   For the remaining three

- For unregistered and therefore fictitious organization domains. NXDOMAIN
is the simplest and most appropriate test.  We block based on NP=REJECT in
the PSD's DMARC policy when a TXT (or any) name lookup returns NXDOMAIN.
 Organizations within that PSD can avoid false positives easily:  either
publish their own DMARC policy without NP=REJECT, or ensure that all of
their RFC5322.From domains do exist in DNS, even if the entry is as trivial
as Type=TXT, DATA="I Exist".

- For PSDs, we block if the PSD has a DMARC record with the PSD flag.   If
that test is considered insufficient, we block by consulting the
publicsuffix.org list and block names from that list that the evaluator
considers applicable.

- For fictitious TLDS, we have an undiscussed topic.   If all valid TLDs
now participate in DNS SEC, then a DNS lookup on valid TLDs will return
DATA or NOERROR, while fictitious TLDS will always return NXDOMAIN.If
the PSD flag becomes ubiquitous, then a tree walk which does not produce a
DMARC policy could also be evidence of an invalid TLD.   If PSD Flag usage
is not universal, then a DNS query on the TLD name should be used as a
follow-up to the tree walk.   If some valid TLDs do not participate in DNS
SEC and do not publish the PSD flag, then we are back to consulting a list.

Doug




On Wed, Dec 22, 2021 at 2:29 AM Murray S. Kucherawy 
wrote:

> On Tue, Dec 21, 2021 at 11:32 AM John Levine  wrote:
>
>> The DNS has had a formal definition of non-existence for over 30
>> years. You look up a name, if it returns records or NOERROR it exists,
>> if it returns NXDOMAIN it doesn't. There is no reason for us to invent
>> something new and incompatible.
>>
>> >I don't remember exactly why we settled on A/ / MX, but the lack of
>> a clear, actionable definition is why we included one.
>>
>> See above.  I don't remember where the text in A.4 came from, but it is
>> wrong.
>> If we are telling people to test whether a domain exists, they should do
>> it
>> the way the DNS does it.  The correct test happens to be cheaper than A.4,
>> one query rather than three.
>>
>
> We're talking about two different things here, I think.  

Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-21 Thread Murray S. Kucherawy
On Tue, Dec 21, 2021 at 11:32 AM John Levine  wrote:

> The DNS has had a formal definition of non-existence for over 30
> years. You look up a name, if it returns records or NOERROR it exists,
> if it returns NXDOMAIN it doesn't. There is no reason for us to invent
> something new and incompatible.
>
> >I don't remember exactly why we settled on A/ / MX, but the lack of a
> clear, actionable definition is why we included one.
>
> See above.  I don't remember where the text in A.4 came from, but it is
> wrong.
> If we are telling people to test whether a domain exists, they should do it
> the way the DNS does it.  The correct test happens to be cheaper than A.4,
> one query rather than three.
>

We're talking about two different things here, I think.  The DNS definition
of "nonexistent" is as cited above while the DMARC definition matches the
well established SMTP algorithm that figures out where the next hop for a
particular recipient is.  If there is no next hop, then for email purposes,
the domain doesn't "exist".  The logic goes something like: If this message
fails DMARC, and a bounce has nowhere to go, then I'm pretty sure I don't
want to deliver it.

We're free to change our minds about what test is appropriate here, but
that was the genesis of A.4.

-MSK
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-21 Thread Murray S. Kucherawy
On Tue, Dec 21, 2021 at 4:31 AM Scott Kitterman 
wrote:

> I don't remember exactly why we settled on A/ / MX, but the lack of a
> clear, actionable definition is why we included one. Lack of DNS records
> related to email authentication only means lack of email authentication,
> which is in no way required.  Given the way most systems are typically
> architected, by the time you are doing email authentication, A or  and
> MX will already be in the local cache, so this is a pretty inexpensive
> thing to check.
>

It comes from SMTP itself.  RFC 5321 and its antecedent(s) specify that to
identify the next hop for a message needing routing, you look up the MX for
the recipient's domain.  If that's missing, you try the A/ for that
same name.  If that's also missing, the message is undeliverable.

Since that test has worked well for SMTP for rather a long time, DMARC
adopted it.

-MSK
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-21 Thread Dave Crocker

On 12/18/2021 10:17 AM, Phillip Hallam-Baker wrote:
Mailing lists are not well supported by SMTP and never will be. Any 
discussion of how to make mailing lists work better has to begin with 
the acceptance that they will never work very well which is what most 
people have been arguing in this thread.


SMTP is a transfer protocol.  It does not know about mailing lists and 
doesn't need to.  (There is text in the SMTP spec about mailing lists, 
but really the text has nothing to do with SMTP, per se, and not a lot 
to do with the operation of mailing lists.


Mailing lists are user-level processes that sit at a layer above SMTP.


Rather than seeing mailing lists as they work today as the pinnacle of 
evolution, we should see them for what they are, a rather disgusting 
hack that we never got round to fixing.


Can't say I've ever noticed anyone suggesting that mailing lists are the 
pinnacle of anything.  On the other hand, efforts to produce more 
interesting capabilities that aren't centralized have not gotten much 
traction.  One keeps hoping, but field experience is not encouraging.





Why is it assumed that the input to a mailing list is an SMTP email? 
That seems to me to be a rather narrow assumption.


Not everyone makes that assumption.

That said, where is the spec for the alternative and who supports that spec?


Once we recognize that the inputs and outputs from 'mailing lists' can 
be through other transports than SMTP, all arguments about preserving 
'original' headers collapse. This is not an interaction between an 
SMTP sender and receiver, the mailing list itself is a principal.


When playing in the sandbox of a particular set of specifications, then 
it's fine -- actually it's essential -- to specify requirements such as 
information preservation.


If the point is that mail can transit heterogeneous environments, with 
different semantics, then the fact of that difference ensures 
information loss.  Absent that assurance, why shouldn't the information 
be preserved, no matter how it is transported?  That is, after all, one 
of the benefits of distinguish the message object specification from the 
message transport specification.


Apologies. I've probably entirely missed your point.


d/

--
Dave Crocker
dcroc...@gmail.com
408.329.0791

Volunteer, Silicon Valley Chapter
Information & Planning Coordinator
American Red Cross
dave.crock...@redcross.org
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-21 Thread Scott Kitterman
On Tuesday, December 21, 2021 2:32:12 PM EST John Levine wrote:
> It appears that Scott Kitterman   said:
> >>> What definition are you wondering why we didn't stick to?
> >>
> >>Real non-existence.  I'm not sure how to define it formally, ...
> 
> The DNS has had a formal definition of non-existence for over 30
> years. You look up a name, if it returns records or NOERROR it exists,
> if it returns NXDOMAIN it doesn't. There is no reason for us to invent
> something new and incompatible.
> 
> >I don't remember exactly why we settled on A/ / MX, but the lack of a
> >clear, actionable definition is why we included one.
> See above.  I don't remember where the text in A.4 came from, but it is
> wrong. If we are telling people to test whether a domain exists, they
> should do it the way the DNS does it.  The correct test happens to be
> cheaper than A.4, one query rather than three.

Fair enough.  I can't remember why we thought RFC 8020[1] wasn't adequate when 
we did RFC 9091.  I think we should modify the DMARC text to just refer to it.

Scott K

[1] https://www.rfc-editor.org/rfc/rfc8020.txt


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-21 Thread John Levine
It appears that Scott Kitterman   said:
>>> What definition are you wondering why we didn't stick to?
>>
>>Real non-existence.  I'm not sure how to define it formally, ...

The DNS has had a formal definition of non-existence for over 30
years. You look up a name, if it returns records or NOERROR it exists,
if it returns NXDOMAIN it doesn't. There is no reason for us to invent
something new and incompatible.

>I don't remember exactly why we settled on A/ / MX, but the lack of a 
>clear, actionable definition is why we included one.

See above.  I don't remember where the text in A.4 came from, but it is wrong.
If we are telling people to test whether a domain exists, they should do it
the way the DNS does it.  The correct test happens to be cheaper than A.4,
one query rather than three.

R's,
John

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-21 Thread Scott Kitterman



On December 21, 2021 12:05:35 PM UTC, Alessandro Vesely  wrote:
>On Mon 20/Dec/2021 18:41:25 +0100 Scott Kitterman wrote:
>> On Monday, December 20, 2021 12:39:15 PM EST Alessandro Vesely wrote:
>>> On Sun 19/Dec/2021 21:42:16 +0100 Scott Kitterman wrote:
>>> > If the domain owner has suggested that you reject mail from a sub-domain
>>> > that has none of A, , or MX records, why would you not do that?
>>> Are we sure that's what the domain owner meant to suggest?
>>> 
>>> An organization can use sp= on its root domain record, or it can define a
>>> DMARC record at some subdomains.  So far so good.
>>> 
>>> Then it turns out that one can also define DMARC record at some non-existing
>>> sub domains, possibly as an alternative to using np=...  Now this begins to
>>> look puzzling.
>>> 
>>> The reason to introduce np= was to select domains that really don't exist. 
>>> Why don't we stick to that definition?
>> 
>> What definition are you wondering why we didn't stick to?
>
>
>Real non-existence.  I'm not sure how to define it formally, because it would 
>be exorbitant to require to try everything.  On the other hand an application 
>probably tried to authenticate SPF, DKIM, and DMARC already.  If any of those 
>record was found, then it's silly to even lookup A/ / MX for the purpose 
>to 
>determine if the domain exists.

I don't remember exactly why we settled on A/ / MX, but the lack of a 
clear, actionable definition is why we included one. Lack of DNS records 
related to email authentication only means lack of email authentication, which 
is in no way required.  Given the way most systems are typically architected, 
by the time you are doing email authentication, A or  and MX will already 
be in the local cache, so this is a pretty inexpensive thing to check.

Scott K

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-21 Thread Alessandro Vesely

On Mon 20/Dec/2021 18:41:25 +0100 Scott Kitterman wrote:

On Monday, December 20, 2021 12:39:15 PM EST Alessandro Vesely wrote:

On Sun 19/Dec/2021 21:42:16 +0100 Scott Kitterman wrote:
> If the domain owner has suggested that you reject mail from a sub-domain
> that has none of A, , or MX records, why would you not do that?
Are we sure that's what the domain owner meant to suggest?

An organization can use sp= on its root domain record, or it can define a
DMARC record at some subdomains.  So far so good.

Then it turns out that one can also define DMARC record at some non-existing
sub domains, possibly as an alternative to using np=...  Now this begins to
look puzzling.

The reason to introduce np= was to select domains that really don't exist. 
Why don't we stick to that definition?


What definition are you wondering why we didn't stick to?



Real non-existence.  I'm not sure how to define it formally, because it would 
be exorbitant to require to try everything.  On the other hand an application 
probably tried to authenticate SPF, DKIM, and DMARC already.  If any of those 
record was found, then it's silly to even lookup A/ / MX for the purpose to 
determine if the domain exists.



Best
Ale
--





___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-20 Thread John Levine
It appears that Alessandro Vesely   said:
>On Sun 19/Dec/2021 21:42:16 +0100 Scott Kitterman wrote:
>> If the domain owner has suggested that you reject mail from a sub-domain 
>> that has none of A, , or MX records, why would you not do that?

>Then it turns out that one can also define DMARC record at some non-existing 
>sub domains, possibly as an alternative to using np=...  Now this begins to 
>look puzzling.

Only if you misunderstand the way the DNS works. If there is a txt
record for _dmarc.foo.bar, that means the name foo.bar exists. It may
not have any records, but it exists. That's the difference between a
DNS NXDOMAIN response for a non-existent domain and NOERROR for one
with no records. The difference is not an accident, not a mistake, and
is not going to change. See for example RFC 8020.


>The reason to introduce np= was to select domains that really don't exist.  
>Why 
>don't we stick to that definition?

Yes indeed, why don't we, and end this pointless argument?

R's
John

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-20 Thread Scott Kitterman
On Monday, December 20, 2021 12:39:15 PM EST Alessandro Vesely wrote:
> On Sun 19/Dec/2021 21:42:16 +0100 Scott Kitterman wrote:
> > If the domain owner has suggested that you reject mail from a sub-domain
> > that has none of A, , or MX records, why would you not do that?
> Are we sure that's what the domain owner meant to suggest?
> 
> An organization can use sp= on its root domain record, or it can define a
> DMARC record at some subdomains.  So far so good.
> 
> Then it turns out that one can also define DMARC record at some non-existing
> sub domains, possibly as an alternative to using np=...  Now this begins to
> look puzzling.
> 
> The reason to introduce np= was to select domains that really don't exist. 
> Why don't we stick to that definition?

What definition are you wondering why we didn't stick to?

Scott K


___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-20 Thread Alessandro Vesely

On Sun 19/Dec/2021 21:42:16 +0100 Scott Kitterman wrote:

If the domain owner has suggested that you reject mail from a sub-domain that 
has none of A, , or MX records, why would you not do that?



Are we sure that's what the domain owner meant to suggest?

An organization can use sp= on its root domain record, or it can define a DMARC 
record at some subdomains.  So far so good.


Then it turns out that one can also define DMARC record at some non-existing 
sub domains, possibly as an alternative to using np=...  Now this begins to 
look puzzling.


The reason to introduce np= was to select domains that really don't exist.  Why 
don't we stick to that definition?



Best
Ale
--




___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-20 Thread Scott Kitterman
In an organization of non-trivial size the chance that the person making the 
decision about what to put in DNS can reliably answer the question "used for 
RC5322.From addressing" is vanishingly small.  They can, however, be very 
confident about if they have set up A//MX records.  At best you are trading 
one kind of uncertainty for another.

Scott K

On Monday, December 20, 2021 7:12:34 AM EST Douglas Foster wrote:
> Scott asked some questions along the lines of "since no test is perfect,
> why don't we just run with the easily-understood MX/A/AAA test.   I had not
> responded to that part of the question previously.
> 
> I have two major problems with the MX/A/ test:
> 
> - If we are only testing for "Does this domain send out SMTP mail?", then
> SPF must be included in the criteria.  SPF speaks to what the domain sends,
> while MX speaks to what the domain receives, and A/ speaks to what the
> domain might receive.   If we are testing for send behavior, we need to
> examine the send authentication attribute.   Any test which is based on
> SMTP and other things should include SPF for the same reason.
> 
> - Since we are not testing exclusively for SMTP behavior, we need to think
> about how to avoid false positives, and how a domain owner changes a test
> result from Fail to Pass.   I have been calling this action "compliance
> measures", hoping that the term was clear.For the MX/A/ test, with
> or without SPF, the only way to indicate compliance is to publish false
> information about SMTP configurations that do not apply to this domain.
>  Such false information has the potential for changing the behavior of SMTP
> participants, and cannot be acceptable in a standards-track document.
> 
> I have suggested feature-specific DNS flags, to indicate that a particular
> domain does or does not participate in FROM addressing, or does not
> participate in SMTP addressing.   These have the advantage of being very
> specific, but they depend on domain owners publishing new information.
>  A test which minimizes publishing new data has a better chance of being
> usable, with confidence, by evaluators.   So I suggested an exact-match
> DMARC policy as an indicator to mean "used for RC5322.From addressing."
> I am not entirely happy with that workaround, as it may have unwanted side
> effects about how reporting occurs back to the domain owner.
> 
> DF
> 
> 
> 
> On Sun, Dec 19, 2021 at 3:42 PM Scott Kitterman 
> 
> wrote:
> > If the domain owner has suggested that you reject mail from a sub-domain
> > that has none of A, , or MX records, why would you not do that?  Just
> > as with any DMARC policy it's on the sender to ensure authorized email
> > conforms to the policy.  My impression is that you think that rejecting
> > mail from such sub-domains is inherently risky somehow?
> > 
> > My view is that it's substantially less risky than for more usual
> > sub-domains.  Note that I don't claim it's risk free.  No filtering
> > decision is risk free, so I don't find suggestions that it's not totally
> > free of uncertainty particularly useful.
> > 
> > My sense is that you are still searching for something that the np= tag
> > was never meant to be.  It might be more fruitful to try and specify what
> > problem you are trying to solve and how we might go about it independent
> > of
> > the non-existent domain definition.  Maybe you can propose a totally new
> > tag that addresses the issues you are concerned about.  If this new tag
> > gets support from the group then we could look at if np= is still needed
> > or
> > if it's redundant.
> > 
> > Scott K
> > 
> > On December 19, 2021 7:35:30 PM UTC, Douglas Foster <
> > 
> > dougfoster.emailstanda...@gmail.com> wrote:
> > >What I said was that reception of NDRmessages is only a requirement for
> > 
> > the
> > 
> > >SMTP From address, so they are only required for the RFC5322.From address
> > >when the two From addresses match.   For msiling list messages, tbe two
> > >do
> > >not match.
> > >
> > >My topic was about the ability or inability to detect a never-valid
> > 
> > RFC5322
> > 
> > >>From address.   I am not engaged in any effort to change mailing lists.
> > >>
> > > NP=reject MUST never reject mailing list traffic.  If we cannot do that,
> > >
> > >NP is useless.
> > >
> > >But we can meet that requirement, if we construct the right test.   I can
> > >support several different variations of the test, which differences in
> > >strictness and complexity.   I just cannot support the MX-A- test.
> > >
> > >Doug
> > >
> > >Doug
> > >
> > >On Sat, Dec 18, 2021, 12:15 PM John Levine  wrote:
> > >> It appears that Jeremy Harris   said:
> > >> >On 18/12/2021 03:47, Douglas Foster wrote:
> > >> >> MX checks are a valid tool for assessing SMTP MailFrom addresses,
> > 
> > since
> > 
> > >> the
> > >> 
> > >> >> sender is supposed to be ready to accept non-delivery reports and
> > 
> > other
> > 
> > >> >> automated messages.   Of course, 

Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-20 Thread Douglas Foster
Scott asked some questions along the lines of "since no test is perfect,
why don't we just run with the easily-understood MX/A/AAA test.   I had not
responded to that part of the question previously.

I have two major problems with the MX/A/ test:

- If we are only testing for "Does this domain send out SMTP mail?", then
SPF must be included in the criteria.  SPF speaks to what the domain sends,
while MX speaks to what the domain receives, and A/ speaks to what the
domain might receive.   If we are testing for send behavior, we need to
examine the send authentication attribute.   Any test which is based on
SMTP and other things should include SPF for the same reason.

- Since we are not testing exclusively for SMTP behavior, we need to think
about how to avoid false positives, and how a domain owner changes a test
result from Fail to Pass.   I have been calling this action "compliance
measures", hoping that the term was clear.For the MX/A/ test, with
or without SPF, the only way to indicate compliance is to publish false
information about SMTP configurations that do not apply to this domain.
 Such false information has the potential for changing the behavior of SMTP
participants, and cannot be acceptable in a standards-track document.

I have suggested feature-specific DNS flags, to indicate that a particular
domain does or does not participate in FROM addressing, or does not
participate in SMTP addressing.   These have the advantage of being very
specific, but they depend on domain owners publishing new information.
 A test which minimizes publishing new data has a better chance of being
usable, with confidence, by evaluators.   So I suggested an exact-match
DMARC policy as an indicator to mean "used for RC5322.From addressing."
I am not entirely happy with that workaround, as it may have unwanted side
effects about how reporting occurs back to the domain owner.

DF



On Sun, Dec 19, 2021 at 3:42 PM Scott Kitterman 
wrote:

> If the domain owner has suggested that you reject mail from a sub-domain
> that has none of A, , or MX records, why would you not do that?  Just
> as with any DMARC policy it's on the sender to ensure authorized email
> conforms to the policy.  My impression is that you think that rejecting
> mail from such sub-domains is inherently risky somehow?
>
> My view is that it's substantially less risky than for more usual
> sub-domains.  Note that I don't claim it's risk free.  No filtering
> decision is risk free, so I don't find suggestions that it's not totally
> free of uncertainty particularly useful.
>
> My sense is that you are still searching for something that the np= tag
> was never meant to be.  It might be more fruitful to try and specify what
> problem you are trying to solve and how we might go about it independent of
> the non-existent domain definition.  Maybe you can propose a totally new
> tag that addresses the issues you are concerned about.  If this new tag
> gets support from the group then we could look at if np= is still needed or
> if it's redundant.
>
> Scott K
>
> On December 19, 2021 7:35:30 PM UTC, Douglas Foster <
> dougfoster.emailstanda...@gmail.com> wrote:
> >What I said was that reception of NDRmessages is only a requirement for
> the
> >SMTP From address, so they are only required for the RFC5322.From address
> >when the two From addresses match.   For msiling list messages, tbe two do
> >not match.
> >
> >My topic was about the ability or inability to detect a never-valid
> RFC5322
> >>From address.   I am not engaged in any effort to change mailing lists.
> > NP=reject MUST never reject mailing list traffic.  If we cannot do that,
> >NP is useless.
> >
> >But we can meet that requirement, if we construct the right test.   I can
> >support several different variations of the test, which differences in
> >strictness and complexity.   I just cannot support the MX-A- test.
> >
> >Doug
> >
> >Doug
> >
> >On Sat, Dec 18, 2021, 12:15 PM John Levine  wrote:
> >
> >> It appears that Jeremy Harris   said:
> >> >On 18/12/2021 03:47, Douglas Foster wrote:
> >> >> MX checks are a valid tool for assessing SMTP MailFrom addresses,
> since
> >> the
> >> >> sender is supposed to be ready to accept non-delivery reports and
> other
> >> >> automated messages.   Of course, this has applicability if (but only
> if)
> >> >> the RFC5322.From domain is the same as the RFC5321.MailFrom domain.
> >> >
> >> >I disagree.  It is well-established practice for a mailing list manager
> >> >to accept and process NDRs accepted on the 5321.mailfrom (which differs
> >> >from the 5322.from).
> >>
> >> Jeremy is right. Mailing lists always, and I mean always, put their
> >> own 5321 bounce address on the messages so they can do bounce
> >> management. If you look at the mail from this list, the bounce address
> >> is dmarc-boun...@ietf.org.
> >>
> >> I have to say I am dismayed that we are spending time dealing with such
> >> utterly basic misconceptions here.
> >>

Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-19 Thread Douglas Foster
Yes, "Acceptable" is in the eye of the evaluator.   I was not taking a
position about what should be acceptable.

I grudgingly accept messages that violate my DMARC policy, from some
sources.   Their messages are simply too important.

My point is that RFC 7960 issues will ONLY occur on actual user accounts,
not for accounts on non-mail domain names.   A domain name that has never
been authorized or used for email purposes will never have users and will
never be "acceptable".   "Never" means that I have opportunity to eliminate
ambiguity.  This is the mail that I want to block.

Doug


On Sun, Dec 19, 2021 at 8:56 PM tjw ietf  wrote:

> I have seen many cases of an actual user generating an “acceptable
> iMpersonation”, but the Organization wanted those ruled Invalid because it
> was Not approved.
>
> Also please be more precise when using the term “domain” around DNS
> people. To us every label separated by a ‘.’ is a domain.
>
> Tim
>
> Sent from my iPhone
>
> On Dec 19, 2021, at 20:18, Douglas Foster <
> dougfoster.emailstanda...@gmail.com> wrote:
>
> 
> Yes, I am looking for a high degree of certainty, comparable to what I get
> with DMARC PASS.   (For example, the DKIM private key might have been
> compromised, but I choose not to worry about that possibility.)
>
> As I have said several times recently, DMARC FAIL is an ambiguous result,
> and it is desirable to partition the set of all failures to see if
> certainty can be obtained for some of them.   ARC is an attempt to solve
> uncertainty for a subset of messages by providing a new authentication
> method which says ARC-satisfactory messages are definitely not malicious
> impersonations.   NP is, at least to my mind, is an attempt to solve
> uncertainty in the opposite direction by identifying a subset of failures
> that can only be malicious impersonations.
>
> When acceptable impersonation occurs, it is always on behalf of an actual
> user.   If there is no actual user, impersonation can only be malicious.
> For simplicity, and of necessity, we ignore risks associated with the
> local-part and focus on the domain name.   We ask whether an entire domain
> can be categorized as never-valid, so that messages to that domain can be
> moved from unverified-with-uncertain-risk to unverified-with-confirmed-risk.
>
> At minimum, to satisfy the PSD goal, we need to be able to say that
> "DoesNotExist.tld" is invalid because the organization is not registered
> with a PSD.   For that to work, we also need to not block messages from
> valid names.   The NXDOMAIN test is sufficient to solve the PSD problem, so
> the only issue for registered domains is to ensure that valid domains do
> not return NXDOMAIN.  A more complex rule can block more non-mail names
> from impersonation attacks, but they increase the compliance issues.
>
> DF
>
>
>
> On Sun, Dec 19, 2021 at 3:42 PM Scott Kitterman 
> wrote:
>
>> If the domain owner has suggested that you reject mail from a sub-domain
>> that has none of A, , or MX records, why would you not do that?  Just
>> as with any DMARC policy it's on the sender to ensure authorized email
>> conforms to the policy.  My impression is that you think that rejecting
>> mail from such sub-domains is inherently risky somehow?
>>
>> My view is that it's substantially less risky than for more usual
>> sub-domains.  Note that I don't claim it's risk free.  No filtering
>> decision is risk free, so I don't find suggestions that it's not totally
>> free of uncertainty particularly useful.
>>
>> My sense is that you are still searching for something that the np= tag
>> was never meant to be.  It might be more fruitful to try and specify what
>> problem you are trying to solve and how we might go about it independent of
>> the non-existent domain definition.  Maybe you can propose a totally new
>> tag that addresses the issues you are concerned about.  If this new tag
>> gets support from the group then we could look at if np= is still needed or
>> if it's redundant.
>>
>> Scott K
>>
>> On December 19, 2021 7:35:30 PM UTC, Douglas Foster <
>> dougfoster.emailstanda...@gmail.com> wrote:
>> >What I said was that reception of NDRmessages is only a requirement for
>> the
>> >SMTP From address, so they are only required for the RFC5322.From address
>> >when the two From addresses match.   For msiling list messages, tbe two
>> do
>> >not match.
>> >
>> >My topic was about the ability or inability to detect a never-valid
>> RFC5322
>> >>From address.   I am not engaged in any effort to change mailing lists.
>> > NP=reject MUST never reject mailing list traffic.  If we cannot do that,
>> >NP is useless.
>> >
>> >But we can meet that requirement, if we construct the right test.   I can
>> >support several different variations of the test, which differences in
>> >strictness and complexity.   I just cannot support the MX-A- test.
>> >
>> >Doug
>> >
>> >Doug
>> >
>> >On Sat, Dec 18, 2021, 12:15 PM John Levine  wrote:
>> >
>> >> It appears 

Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-19 Thread John Levine
It appears that Scott Kitterman   said:
>If the domain owner has suggested that you reject mail from a sub-domain that 
>has none of A, , or MX records, why would you not do that?  Just as with 
>any DMARC policy it's on
>the sender to ensure authorized email conforms to the policy.  My impression 
>is that you think that rejecting mail from such sub-domains is inherently 
>risky somehow?

I may not have been clear enough -- I agree that sp= and np= let you say things 
about non-existent subdomains of a domain that does exist.

But if a domain does not exist, and is not a subdomain of one that publishes a 
sp= or np= policy, DMARC has nothing to say about it.

As I said, there may be other reasons to reject the mail, but they're not DMARC.

R's,
John

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-19 Thread Scott Kitterman
If the domain owner has suggested that you reject mail from a sub-domain that 
has none of A, , or MX records, why would you not do that?  Just as with 
any DMARC policy it's on the sender to ensure authorized email conforms to the 
policy.  My impression is that you think that rejecting mail from such 
sub-domains is inherently risky somehow?

My view is that it's substantially less risky than for more usual sub-domains.  
Note that I don't claim it's risk free.  No filtering decision is risk free, so 
I don't find suggestions that it's not totally free of uncertainty particularly 
useful.

My sense is that you are still searching for something that the np= tag was 
never meant to be.  It might be more fruitful to try and specify what problem 
you are trying to solve and how we might go about it independent of the 
non-existent domain definition.  Maybe you can propose a totally new tag that 
addresses the issues you are concerned about.  If this new tag gets support 
from the group then we could look at if np= is still needed or if it's 
redundant.

Scott K 

On December 19, 2021 7:35:30 PM UTC, Douglas Foster 
 wrote:
>What I said was that reception of NDRmessages is only a requirement for the
>SMTP From address, so they are only required for the RFC5322.From address
>when the two From addresses match.   For msiling list messages, tbe two do
>not match.
>
>My topic was about the ability or inability to detect a never-valid RFC5322
>>From address.   I am not engaged in any effort to change mailing lists.
> NP=reject MUST never reject mailing list traffic.  If we cannot do that,
>NP is useless.
>
>But we can meet that requirement, if we construct the right test.   I can
>support several different variations of the test, which differences in
>strictness and complexity.   I just cannot support the MX-A- test.
>
>Doug
>
>Doug
>
>On Sat, Dec 18, 2021, 12:15 PM John Levine  wrote:
>
>> It appears that Jeremy Harris   said:
>> >On 18/12/2021 03:47, Douglas Foster wrote:
>> >> MX checks are a valid tool for assessing SMTP MailFrom addresses, since
>> the
>> >> sender is supposed to be ready to accept non-delivery reports and other
>> >> automated messages.   Of course, this has applicability if (but only if)
>> >> the RFC5322.From domain is the same as the RFC5321.MailFrom domain.
>> >
>> >I disagree.  It is well-established practice for a mailing list manager
>> >to accept and process NDRs accepted on the 5321.mailfrom (which differs
>> >from the 5322.from).
>>
>> Jeremy is right. Mailing lists always, and I mean always, put their
>> own 5321 bounce address on the messages so they can do bounce
>> management. If you look at the mail from this list, the bounce address
>> is dmarc-boun...@ietf.org.
>>
>> I have to say I am dismayed that we are spending time dealing with such
>> utterly basic misconceptions here.
>>
>> R's,
>> John
>>
>> ___
>> dmarc mailing list
>> dmarc@ietf.org
>> https://www.ietf.org/mailman/listinfo/dmarc
>>

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-19 Thread Douglas Foster
What I said was that reception of NDRmessages is only a requirement for the
SMTP From address, so they are only required for the RFC5322.From address
when the two From addresses match.   For msiling list messages, tbe two do
not match.

My topic was about the ability or inability to detect a never-valid RFC5322
>From address.   I am not engaged in any effort to change mailing lists.
 NP=reject MUST never reject mailing list traffic.  If we cannot do that,
NP is useless.

But we can meet that requirement, if we construct the right test.   I can
support several different variations of the test, which differences in
strictness and complexity.   I just cannot support the MX-A- test.

Doug

Doug

On Sat, Dec 18, 2021, 12:15 PM John Levine  wrote:

> It appears that Jeremy Harris   said:
> >On 18/12/2021 03:47, Douglas Foster wrote:
> >> MX checks are a valid tool for assessing SMTP MailFrom addresses, since
> the
> >> sender is supposed to be ready to accept non-delivery reports and other
> >> automated messages.   Of course, this has applicability if (but only if)
> >> the RFC5322.From domain is the same as the RFC5321.MailFrom domain.
> >
> >I disagree.  It is well-established practice for a mailing list manager
> >to accept and process NDRs accepted on the 5321.mailfrom (which differs
> >from the 5322.from).
>
> Jeremy is right. Mailing lists always, and I mean always, put their
> own 5321 bounce address on the messages so they can do bounce
> management. If you look at the mail from this list, the bounce address
> is dmarc-boun...@ietf.org.
>
> I have to say I am dismayed that we are spending time dealing with such
> utterly basic misconceptions here.
>
> R's,
> John
>
> ___
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-18 Thread Phillip Hallam-Baker
My analysis is rather different but comes to a stronger statement of John's
point.

Mailing lists are not well supported by SMTP and never will be. Any
discussion of how to make mailing lists work better has to begin with the
acceptance that they will never work very well which is what most people
have been arguing in this thread.

That does not mean that we should not attempt to make changes but it does
mean that any changes should be considered through two lenses, not just
one. First 'will this make mailing lists a bit more tolerable', Second,
'will this help a successor technology work better'.


Rather than seeing mailing lists as they work today as the pinnacle of
evolution, we should see them for what they are, a rather disgusting hack
that we never got round to fixing.

Why is it assumed that the input to a mailing list is an SMTP email? That
seems to me to be a rather narrow assumption.

I am typing this into Gmail, why assume that my HTTP transaction must be
mediated by an SMTP transaction to reach a mailing list user? Why should
'mailing list' necessarily involve SMTP at all?

Once we recognize that the inputs and outputs from 'mailing lists' can be
through other transports than SMTP, all arguments about preserving
'original' headers collapse. This is not an interaction between an SMTP
sender and receiver, the mailing list itself is a principal.


I am of course aware that you can read IETF lists via IMAP, NNTP etc. In
the short term, those efforts are being hobbled by the lack of decent
clients. If the Web 4.0 folk get somewhere with a new generation of user
centric social media, that might change.


On Sat, Dec 18, 2021 at 12:15 PM John Levine  wrote:

> It appears that Jeremy Harris   said:
> >On 18/12/2021 03:47, Douglas Foster wrote:
> >> MX checks are a valid tool for assessing SMTP MailFrom addresses, since
> the
> >> sender is supposed to be ready to accept non-delivery reports and other
> >> automated messages.   Of course, this has applicability if (but only if)
> >> the RFC5322.From domain is the same as the RFC5321.MailFrom domain.
> >
> >I disagree.  It is well-established practice for a mailing list manager
> >to accept and process NDRs accepted on the 5321.mailfrom (which differs
> >from the 5322.from).
>
> Jeremy is right. Mailing lists always, and I mean always, put their
> own 5321 bounce address on the messages so they can do bounce
> management. If you look at the mail from this list, the bounce address
> is dmarc-boun...@ietf.org.
>
> I have to say I am dismayed that we are spending time dealing with such
> utterly basic misconceptions here.
>
> R's,
> John
>
> ___
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-18 Thread John Levine
It appears that Jeremy Harris   said:
>On 18/12/2021 03:47, Douglas Foster wrote:
>> MX checks are a valid tool for assessing SMTP MailFrom addresses, since the
>> sender is supposed to be ready to accept non-delivery reports and other
>> automated messages.   Of course, this has applicability if (but only if)
>> the RFC5322.From domain is the same as the RFC5321.MailFrom domain.
>
>I disagree.  It is well-established practice for a mailing list manager
>to accept and process NDRs accepted on the 5321.mailfrom (which differs
>from the 5322.from).

Jeremy is right. Mailing lists always, and I mean always, put their
own 5321 bounce address on the messages so they can do bounce
management. If you look at the mail from this list, the bounce address
is dmarc-boun...@ietf.org.

I have to say I am dismayed that we are spending time dealing with such
utterly basic misconceptions here.

R's,
John

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-18 Thread Jeremy Harris

On 18/12/2021 03:47, Douglas Foster wrote:

MX checks are a valid tool for assessing SMTP MailFrom addresses, since the
sender is supposed to be ready to accept non-delivery reports and other
automated messages.   Of course, this has applicability if (but only if)
the RFC5322.From domain is the same as the RFC5321.MailFrom domain.


I disagree.  It is well-established practice for a mailing list manager
to accept and process NDRs accepted on the 5321.mailfrom (which differs
from the 5322.from).
--
Cheers,
  Jeremy

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-17 Thread Douglas Foster
This is a useful point for discussion.

MX checks are a valid tool for assessing SMTP MailFrom addresses, since the
sender is supposed to be ready to accept non-delivery reports and other
automated messages.   Of course, this has applicability if (but only if)
the RFC5322.From domain is the same as the RFC5321.MailFrom domain. As far
as I know, DMARC is the only established tool for evaluating the
RFC5322.From address when it differs from the RFC5321.MailFrom address.  So
to my thinking, the NP test is new territory without precedent.

I am looking for a test that says decisively, "The domain owner has never
authorized the use of this name for any mail-related purposes." There
are many reasons why an acceptable message may fail DMARC verification.
 One of those reasons is that the message is an impersonation, but the
impersonation is acceptable, typically because it is sent for the benefit
of an account user.   But acceptable messages will always use a domain name
that is already in use by the domain owner, never one that they invented.
  The use of a never-authorized name will always be an unacceptable form of
impersonation, and should be blocked.   I thought that the whole WG had
consensus on this point.

The question then becomes, "How do we construct a decisive test?"   We need
a test that has very little possibility of a false positive that would
cause a message to be blocked.   My primary target is the educational
segment, where everyone assumes that they will always use P/SP=NONE.
because they never want their legitimate messages, including mailing list
messages to be blocked.   They should be willing to use NP=Reject if they
are confident that NP will never block a legitimate message.

A weak algorithm is acceptable if it blocks some but not all messages from
never-used domains;   false negatives are undesirable but tolerable.   A
result of DMARC FAIL with NP=FALSE will leave the evaluator in the same
risk posture as if the NP test had not been performed.

The only method we have for evaluating NP is the DNS, so the weakest
possible rule is to block on NXDOMAIN.   Unfortunately, even that test
returns false positives.   They occurs when messages sent by email service
providers use the provider's SMTP address, and this is the norm.  For these
mailings, the only constraints on the RFC5322.From address are the ones
imposed by the provider (you will not impersonate my other clients) and by
the client itself (via DMARC).   With relaxed alignment, the client can
invent and use domain names that are not in DNS.Consequently, any NP
test will likely require a participating organization to implement some
compliance measures, such as creating DNS entries for those that do not
exist at present.   Those measures should be as simple and error-free as
possible, or the risk-averse organization will simply not participate.

To implement the NP tests, we devise DNS queries which indicate that the
name exists.   When a DATA result is not obtained by any of those queries,
we return NP=TRUE.To minimize false positives, we want to use an
expansive set of DNS queries.   MX+A+ gives one set of in-use names.
 Adding SPF will add another set of in-use names.   Adding exact-match
DMARC and DKIM will add another set of in-use names.  The only reason to
omit these tests is if you can demonstrate that one of them is always
superfluous because it will only include names obtained from other sources,
or because it misleads.

A+ may belong because it adds to the inclusive list, but it weakens the
rule a lot.  So I ask whether an acceptable result can be produced without
it, a direct challenge to my previous sentence.   This is a tricky one, and
best left for another stage in the analysis.

Doug

On Fri, Dec 17, 2021 at 7:01 PM Scott Kitterman 
wrote:

>
>
> On December 17, 2021 11:26:38 PM UTC, Douglas Foster <
> dougfoster.emailstanda...@gmail.com> wrote:
> ..
> >A year after raising my concerns, I am still trying to get a collaborative
> >discussion started about what the optimal test looks like.  In a
> >collaborative discussion, those who are happy with the status quo convince
> >the skeptics to come on board, listen to their concerns, acknowledge them,
> >and do what they can to accommodate those concerns so that consensus can
> be
> >achieved.I am willing to be convinced, but I am skeptical and I am
> >looking for some collaboration.
> >
> It may be that this is a cultural issue then.  In the IETF, where there is
> an established consensus (rough or not), the burden is on those seeking to
> overturn the consensus to convince people.  If you think about it, if a
> working group were obligated to rehash things whenever new people show up,
> it would be difficult to accomplish anything in an open environment where
> new people can show up anytime.
>
> I suspect you might have more luck if you first consulted Chesterton's
> Fence.  I think you'd have more luck with questions about why things are
> the way 

[dmarc-ietf] IETF Process/Culture was Re: 3.2.6 The meaning of non-existence

2021-12-17 Thread Scott Kitterman



On December 17, 2021 11:26:38 PM UTC, Douglas Foster 
 wrote:
..
>A year after raising my concerns, I am still trying to get a collaborative
>discussion started about what the optimal test looks like.  In a
>collaborative discussion, those who are happy with the status quo convince
>the skeptics to come on board, listen to their concerns, acknowledge them,
>and do what they can to accommodate those concerns so that consensus can be
>achieved.I am willing to be convinced, but I am skeptical and I am
>looking for some collaboration.
>
It may be that this is a cultural issue then.  In the IETF, where there is an 
established consensus (rough or not), the burden is on those seeking to 
overturn the consensus to convince people.  If you think about it, if a working 
group were obligated to rehash things whenever new people show up, it would be 
difficult to accomplish anything in an open environment where new people can 
show up anytime.

I suspect you might have more luck if you first consulted Chesterton's Fence.  
I think you'd have more luck with questions about why things are the way they 
are than immediate assertions that they are wrong.

Scott K

P.S. At least as I understand it.  I'm relatively new too.

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc