Re: [dmarc-ietf] Rethinking DMARC for PSDs

2019-04-08 Thread Tim Wicinski
+1 on moving the discussion elsewhere Tim On Mon, Apr 8, 2019 at 10:27 PM Murray S. Kucherawy wrote: > > > On Mon, Apr 8, 2019 at 5:27 PM Douglas E. Foster < > fost...@bayviewphysicians.com> wrote: > >> Scott, you misunderstand what this type of standard would look like. It >> would defines

Re: [dmarc-ietf] Rethinking DMARC for PSDs

2019-04-08 Thread Murray S. Kucherawy
On Mon, Apr 8, 2019 at 5:27 PM Douglas E. Foster < fost...@bayviewphysicians.com> wrote: > Scott, you misunderstand what this type of standard would look like. It > would defines Use Cases that the device should address, with some > acknowledgement to the tradeoffs between perceived risk and p

Re: [dmarc-ietf] Rethinking DMARC for PSDs

2019-04-08 Thread Scott Kitterman
No, I think you seriously misunderstand what the IETF does. It doesn't do product specifications, it does interoperability specifications. This is seriously off-topic for the DMARC working group list anyway. Scott K P.S. There are open source components to accomplish all the requirements you l

Re: [dmarc-ietf] Rethinking DMARC for PSDs

2019-04-08 Thread Douglas E. Foster
Scott, you misunderstand what this type of standard would look like. It would defines Use Cases that the device should address, with some acknowledgement to the tradeoffs between perceived risk and perceived difficulty of implementation. Implementation suggestions may be part of the use

Re: [dmarc-ietf] Rethinking DMARC for PSDs

2019-04-08 Thread Douglas E. Foster
Let's pursue the use cases for this information. Existing DMARC feedback has three uses, after interpretation: Compromised accounts: "Account appears to be comprised and sending spam. Please shut it down." Configuration errors: "We may have blocked legitimate mail, indicating th

Re: [dmarc-ietf] Rethinking DMARC for PSDs

2019-04-08 Thread John Levine
In article you write: >This neglects the benefit to the domain operators of receiving the reports >about abuse of their domain space. For the end recipient of the bogus >traffic, there is no difference. I agree that the reports are useful, regardless of the policy. I just wish we could figure o

Re: [dmarc-ietf] Rethinking DMARC for PSDs

2019-04-08 Thread Scott Kitterman
On April 8, 2019 11:08:30 PM UTC, "Kurt Andersen (b)" wrote: >On Mon, Apr 8, 2019 at 3:55 PM Douglas E. Foster < >fost...@bayviewphysicians.com> wrote: > >> I don't know how to express my shock at today's conversations. One >of >> the shocks comes from this: >> >> We have consensus that the b

Re: [dmarc-ietf] Rethinking DMARC for PSDs

2019-04-08 Thread Kurt Andersen (b)
On Mon, Apr 8, 2019 at 3:55 PM Douglas E. Foster < fost...@bayviewphysicians.com> wrote: > I don't know how to express my shock at today's conversations. One of > the shocks comes from this: > > We have consensus that the better email filters do not need the DMARC for > PSDs standard, because th

Re: [dmarc-ietf] Rethinking DMARC for PSDs

2019-04-08 Thread Dotzero
What part of that do you need an explanation for? It seems pretty clear to me. If you disagree with the statement then you should explain the rationale for your disagreement. Michael Hammer On Mon, Apr 8, 2019 at 6:55 PM Douglas E. Foster < fost...@bayviewphysicians.com> wrote: > I don't know ho

Re: [dmarc-ietf] Rethinking DMARC for PSDs

2019-04-08 Thread Douglas E. Foster
I don't know how to express my shock at today's conversations. One of the shocks comes from this: We have consensus that the better email filters do not need the DMARC for PSDs standard, because they are already blocking non-existent domains. The inferior email filters are not expected t

Re: [dmarc-ietf] Rethinking DMARC for PSDs

2019-04-08 Thread Ken O'Driscoll
On Mon, 2019-04-08 at 09:50 -0400, Douglas E. Foster wrote: [...snip...] > My focus is on defining a framework for discussing product capabilities, > while leaving room for vendors to add value above the minimum > configuration. That sounds more like what organisations such as Gartner are there fo

Re: [dmarc-ietf] Rethinking DMARC for PSDs

2019-04-08 Thread Douglas E. Foster
RBLs are alive and well. I understand the risk of helping the bad guys, but I think the evidence is that silence is hurting the good guys more than the bad guys. My focus is on defining a framework for discussing product capabilities, while leaving room for vendors to add value above the

Re: [dmarc-ietf] Rethinking DMARC for PSDs

2019-04-08 Thread John R Levine
Since bad email filters are the problem, why is there no IETF working group to define the expected behavior of email filters?More importantly, can we start one NOW? It's kind of outside the IETF's expertise -- there are people in the IETF (not in this WG) who believe that DNSBLs were a fail

Re: [dmarc-ietf] Rethinking DMARC for PSDs

2019-04-08 Thread Douglas E. Foster
Your question confirms my core argument: We do not have consensus around email filter requirements because IETF has focused on sender behavior rather than recipient behavior. To the specifics: By "secure email relay", I am referring to Zixmail-type functioinality. It is complex c

Re: [dmarc-ietf] Rethinking DMARC for PSDs

2019-04-08 Thread Jeremy Harris
On 08/04/2019 12:02, Douglas E. Foster wrote: > I had only these rudimentary requirements: > [...] A secure-email method for outbound messages with sensitive > content Rudimentary? How secure; what's your threat model? Those two things often don't go together. (I should declare an int

Re: [dmarc-ietf] Rethinking DMARC for PSDs

2019-04-08 Thread Douglas E. Foster
Have the national CIRT groups made an issue about needing to block non-existent domains? Because a spammer can create a non-existent government agency like "irs.audit.gov", this email weakness becomes a national security issue and should be handled as a CVE.This should get the vendors mo

Re: [dmarc-ietf] Rethinking DMARC for PSDs

2019-04-08 Thread Douglas E. Foster
Mr Levine brings up the valid point that there are a lot of mail filters with inadequate capabilities. I determined that my two products have inexcusable weaknesses, so I went shopping. I had only these rudimentary requirements: IP filteringReverse DNS filtering Multi-factor w