[dmarc-ietf] Re: Citation where a Proposed Standard cannot rely on an Experimental document

2024-11-04 Thread Douglas Foster
cliff once the DKIM TTLs were at > 24 hours. > > This also seems to apply to SPF as well. > > - Mark Alley > On 11/4/2024 5:31 PM, Douglas Foster wrote: > > Surprisingly, for email, DNS errors are not rare. I have been collecting > data from three sources: > > - The inc

[dmarc-ietf] Re: Citation where a Proposed Standard cannot rely on an Experimental document

2024-11-04 Thread Douglas Foster
42 +0100 Douglas Foster wrote: > > The other problem is that the Tree Walk makes the entire document > > experimental. Tree Walk is a great tool for batch-mode detection of > > PSL errors, but it has multiple problems as a real-time tool. > > > > - It disa

[dmarc-ietf] Re: Citation where a Proposed Standard cannot rely on an Experimental document

2024-11-03 Thread Douglas Foster
The other problem is that the Tree Walk makes the entire document experimental. Tree Walk is a great tool for batch-mode detection of PSL errors, but it has multiple problems as a real-time tool. - It disables best-guess DMARC based on default policy. Instead of disabling best-guess D

[dmarc-ietf] Re: Sender Authentication for Indirect Mail Flows

2024-10-28 Thread Douglas Foster
4 at 9:05 AM Richard Clayton wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > In message il.com>, Douglas Foster writes > > >SPF is designed > > for clarity I am not addressing your comments on DKIM in this response > > >for the situation whe

[dmarc-ietf] Re: Discussion Thread for Issue 155

2024-10-27 Thread Douglas Foster
When studying indirect mail, I noticed that some forwarders change SPF, some do not. Some organizations add auth result data and some do not. Some mailing lists are real and some are gimmicks to distribute spam. The only way to evaluate correctly is to have a profile for each indirect flow. Doe

[dmarc-ietf] Re: What do do with ARC, Re: Discussion Thread

2024-10-27 Thread Douglas Foster
I would observe that Outlook.com evaluates SPF/DKIM/DMARC, documents the test results, ignores the failed results, and then continues processing. And it has never registered it's private registries in the PSL (and no one else can do it for them.) So I do not include Microsoft in a list of infrast

[dmarc-ietf] Sender Authentication for Indirect Mail Flows

2024-10-27 Thread Douglas Foster
This is my analysis of what is possible, based on research that I have been pursuing on this subject for the last few months. Doug Foster -- The purpose of Sender Authentication is to confirm that the purported author of a message, as indicated by the RFC5322.From address, is the actual author.

[dmarc-ietf] Re: Discussion Thread for Issue 155

2024-10-25 Thread Douglas Foster
or should do to keep malicious impersonation out of their network. If they choose "p=reject means malicious" or "I have no idea", then the document has failed. Doug On Thu, Oct 24, 2024 at 10:54 AM Murray S. Kucherawy wrote: > On Thu, Oct 24, 2024 at 4:34 AM Dou

[dmarc-ietf] Re: Discussion Thread for Issue 155

2024-10-25 Thread Douglas Foster
The necessary first step is to acknowledge that RFC7489 is a heuristic, and like all heuristics, it will make mistakes. So the interesting work is determining how to detect and correct mistakes. >From a security standpoint, authentication is a binary Pass/Fail issue. There are not 4 types of fa

[dmarc-ietf] Re: Discussion Thread for Issue 155

2024-10-24 Thread Douglas Foster
I can speak from first-hand study of ARC: 1) When present, it is very useful for analyzing complex flows. When it is not present, I fallback to Results-SPF and Authentication-Results fields. 2) ARC Sets are inserted by some message originators. In general ARC Sets are used differently by differen

[dmarc-ietf] Re: Discussion Thread for Issue 155

2024-10-23 Thread Douglas Foster
It makes no sense for people who despise DMARC, for its damage to mailing lists, to sign off on a document that ratifies everything that is problematic about RFC7489. The engineering issues are abundantly clear, but have been ignored for too long. - The most information that a domain owner can

[dmarc-ietf] Tree Walk statistics?

2024-10-20 Thread Douglas Foster
How many Tree Walk pilot implementations do we have? How do those implementations handle DNS errors during the Tree Walk? How do those implementations plan to implement overrides if the Tree Walk does not return the optimal organizational domain? How much volume has been evaluated using the Tree Wa

[dmarc-ietf] Re: AD Evaluation for draft-ietf-dmarc-dmarcbis-33

2024-10-16 Thread Douglas Foster
> domain? > > It does not. Please refer to the first part of this message. > > > Fix these problems, and I will be happy to stop objecting to this > document. > > I may be wrong, but those problems are not part of the Working Group > charter ? > C.F Murray's email:

[dmarc-ietf] Re: AD Evaluation for draft-ietf-dmarc-dmarcbis-33

2024-10-16 Thread Douglas Foster
forcing sender authentication has been a huge win to my network security. DMARC has the right idea, but it takes shortcuts that make it unsuitable as a general tool. The solution is not to minimize reject policies, as DMARCbis suggests. The solution is to put effort into evaluating DMARC results. D

[dmarc-ietf] Re: AD Evaluation for draft-ietf-dmarc-dmarcbis-33

2024-10-14 Thread Douglas Foster
It is not about fixing the text, it is about fixing the design. Authentication has only 2 states: - Authenticated, therefore judged free of impersonation risk - Unauthenticated, therefore possibly an impersonation and possibly a malicious impersonation. The Unauthenticated result can oc

[dmarc-ietf] Re: AD Evaluation for draft-ietf-dmarc-dmarcbis-33

2024-10-10 Thread Douglas Foster
he current document because it misleads in the same way as RFC7489, calcifying all that was wrong with it On Tue, Oct 8, 2024, 7:41 AM Alessandro Vesely wrote: > On Tue 08/Oct/2024 13:14:23 +0200 Douglas Foster wrote: > > > > The proper use of DMARC is something that is not fully

[dmarc-ietf] Re: AD Evaluation for draft-ietf-dmarc-dmarcbis-33

2024-10-08 Thread Douglas Foster
About "does it reach this goal?" RFC7489 provided this outcome: "A simplistic and fully automated technique that blocks a small but insufficient subset of malicious impersonation, in exchange for blocking a small but important subset of legitimate mail." DMARCbis has this charter: "A simplistic a

[dmarc-ietf] Dave Crocker was (partly) right

2024-09-28 Thread Douglas Foster
Five years ago, Dave Crocker launched a powerful challenge against DMARC. I will paraphrase his concepts in this way: "RFC7489, as typically implemented, causes more harm than good." Five years ago, I doubted the premise. Today, I substantially agree with it. Five years ago, much of this grou

[dmarc-ietf] Re: Aggregate Report: Include ARC chain verification status

2024-09-13 Thread Douglas Foster
024 5:59 PM, Douglas Foster wrote: > > We have a significant problem with broken ARC chains, and it is caused by > email security providers.I think the only way to get the issue > addressed is to give it visibility, by including an ARC chain verification > option in the DMARC

[dmarc-ietf] Aggregate Report: Include ARC chain verification status

2024-09-13 Thread Douglas Foster
We have a significant problem with broken ARC chains, and it is caused by email security providers.I think the only way to get the issue addressed is to give it visibility, by including an ARC chain verification option in the DMARC aggregate reports. Here is the triggering scenario: Outlook.c

[dmarc-ietf] Re: DKIM upgrade

2024-09-12 Thread Douglas Foster
gt; Are you proposing a text change? Working Group Last Call closed some time > ago. > > On Thu, Sep 12, 2024 at 4:29 AM Douglas Foster < > dougfoster.emailstanda...@gmail.com> wrote: > >> A DKIM signature acts like a notary public, "This person, who is well >&g

[dmarc-ietf] DKIM upgrade

2024-09-12 Thread Douglas Foster
A DKIM signature acts like a notary public, "This person, who is well known to me, can be reliably associated with this document." Signing works for DMARC only when the DKIM signer has actually validated the entity before adding the signature. Therefore, when a signature is applied by an outbound

[dmarc-ietf] Recipient impersonation

2024-08-17 Thread Douglas Foster
I suspect my experience is typical of many businesses: The most common target of impersonation is my own domain, by both good and evil actors. The good guys feel free to impersonate me because they know that they are the good guys. They assume that I will know that they are the good guys and wil

[dmarc-ietf] Re: Inconsistent Organizational Domain definition

2024-06-20 Thread Douglas Foster
Psd=n is the best evidence that the walk has ended in the right place and that the domain owner has embraced DmarcBis. Without it, we have swapped one risk for an equivalent one. RFC7489 is at risk of false alignment caused by missing PSL entries, while DMARCbis is at risk of false alignment from

[dmarc-ietf] Re: The null sender inconsistency

2024-06-16 Thread Douglas Foster
ut if we want to stick with SPF alignment for everyone, we need to deal with the auto-reply problem. Doug On Sun, Jun 9, 2024 at 1:32 PM Richard Clayton wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > In message w...@mail.gmail.com>, Douglas Foster > writes >

[dmarc-ietf] Re: Proxy signatures to combat SPF upgrade?

2024-06-10 Thread Douglas Foster
es, so the concept is not likely to scale up But it works for me. Doug On Mon, Jun 10, 2024, 9:55 PM Neil Anuskiewicz wrote: > > > On Jun 7, 2024, at 1:14 AM, Richard Clayton > wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > In message il.com>, D

[dmarc-ietf] Re: I-D Action: draft-ietf-dmarc-dmarcbis-31.txt

2024-06-09 Thread Douglas Foster
I would be interested in starting an independent discussion leading to an informational document about disposition notification. Rejection can be considered the entry point into a stimulus-response sequence. The decision to reject is a probabilistic decision with variable certainty. The origin

[dmarc-ietf] Re: The null sender inconsistency

2024-06-09 Thread Douglas Foster
On Sun, Jun 9, 2024 at 1:32 PM Richard Clayton wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > In message w...@mail.gmail.com>, Douglas Foster > writes > > >I would be happy to have you or anyone else explain to me > >(a) What data indicates

[dmarc-ietf] Re: The null sender inconsistency

2024-06-07 Thread Douglas Foster
sage il.com>, Douglas Foster writes > > >Here is an example of the real problem: > > > >Example.com is hosted on Outlook.com > > > >The user's mailbox is full, so > > so hopefully you get a 4xx or 5xx to that effect and your own server > tells you o

[dmarc-ietf] Re: Proxy signatures to combat SPF upgrade?

2024-06-07 Thread Douglas Foster
I have 1603 messages from google.com servers that are not signed by the >From domain. These are all domains other than Gmail. All but 18 messages are proxy signed with a d= of the form {domain}.{digits}.gappssmtp.com. At least some of the exceptions are known to be forwarded messages where a pro

[dmarc-ietf] Re: The null sender inconsistency

2024-06-06 Thread Douglas Foster
They will, if the client domain provides them with a scope ID and a private key.. My discussion about null sender is about the many senders that do not or cannot configure DKIM signing. On Thu, Jun 6, 2024, 6:02 PM A. Schulze wrote: > > Douglas Foster: > > > Here is an exam

[dmarc-ietf] Proxy signatures to combat SPF upgrade?

2024-06-05 Thread Douglas Foster
Google applies annotation signatures from .. gappsstmpt.com, with periods replaced in the domain name. Microsoft applies proxy signatures from .onmicrosoft.com In both cases, the signatures appear to be an assertion by the hosting service that the message was processed by a particular client of th

[dmarc-ietf] Re: The null sender inconsistency

2024-06-03 Thread Douglas Foster
Doug On Mon, Jun 3, 2024 at 1:08 AM Richard Clayton wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > In message il.com>, Douglas Foster writes > > >Richard, you miss my point. I know what RFC 7208 says to do with null > >sender, but we rightly

[dmarc-ietf] Re: The null sender inconsistency

2024-06-02 Thread Douglas Foster
On Wed, May 29, 2024 at 8:29 AM Richard Clayton wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > In message il.com>, Douglas Foster writes > > >Consider the case of an environment with a single server, properly > >configured with SPF but without

[dmarc-ietf] The null sender inconsistency

2024-05-29 Thread Douglas Foster
Consider the case of an environment with a single server, properly configured with SPF but without DKIM: - Original messages from this server are considered authenticated based on SPF Pass with alignment, but - Bounce messages from this server are considered unauthenticated because mes

[dmarc-ietf] Re: New attack leveraging DMARC None

2024-05-08 Thread Douglas Foster
The solution is to eliminate the forwarding step. There are many good reasons why organizations should not allow forwarding to their personal email accounts. Among other reasons, given that employees are missing these alarms, it is likely that they are losing other messages also. But for the b

Re: [dmarc-ietf] Thoughts on choosing N

2024-04-21 Thread Douglas Foster
Huh? The design is fine: check the exact match domain and then move up to N if more than N labels. The N applies to both original and secondary walks I have legitimate messages with exact match on 6 labels, so there is no reason to disavow the ability to put a policy at that level or to disav

Re: [dmarc-ietf] Thoughts on choosing N (choose 6)

2024-04-16 Thread Douglas Foster
A look at my data was helpful. Organizational alignment means that N labels match exactly. Relaxed alignment means that at least one of the names is longer than N. Those rules are easy to check on my historical data. I have examples of mismatched domains with 4 matching labels. I also have e

Re: [dmarc-ietf] Thoughts on choosing N

2024-04-15 Thread Douglas Foster
4, 10:02 AM Todd Herr wrote: > On Mon, Apr 15, 2024 at 7:58 AM Scott Kitterman > wrote: > >> >> >> On April 15, 2024 11:43:08 AM UTC, Alessandro Vesely >> wrote: >> >On Mon 15/Apr/2024 13:16:50 +0200 Douglas Foster wrote: >> >> Our orig

Re: [dmarc-ietf] Thoughts on choosing N

2024-04-15 Thread Douglas Foster
024 13:16:50 +0200 Douglas Foster wrote: > > Our original choice of N was based on the PSL.The PSL could not > detect > > organizational boundaries could not boundaries below level 5, because it > had no > > entries longer than 5 labels, and we determined that the 5-label

Re: [dmarc-ietf] Thoughts on choosing N

2024-04-15 Thread Douglas Foster
Our original choice of N was based on the PSL.The PSL could not detect organizational boundaries could not boundaries below level 5, because it had no entries longer than 5 labels, and we determined that the 5-label entries were not used for mail.Therefore, any increase in N is new capabili

[dmarc-ietf] Performance and reliability concerns

2024-04-10 Thread Douglas Foster
I am concerned that the Tree Walk will have poorer performance and poorer reliability than implementations based on RFC 7489 The boundary between organizational domains and their registries is very stable, which is why it is highly suitable for a static reference like a locally-implemented PSL.

Re: [dmarc-ietf] DMARCbis WGLC - Issue 141 DMARC and What To Say About SPF -all

2024-04-07 Thread Douglas Foster
We can complain about people treating SPF Fail as definitive, but DMARC perpetuates the very same myth, which is: “If Sender Authentication test X produces FAIL, then the message is malicious and should be blocked.” It does not matter whether "X" is SPF Fail, DKIM Fail, ADSP Fail, DMARC Fail, or

Re: [dmarc-ietf] Overall last-call comments on DMARC

2024-04-04 Thread Douglas Foster
Sender reputation is in use everywhere. What is lacking is an omniscient data source, but I have no hope of finding one. Small senders will always be at a disadvantage because sender reputation is entirely based on past experience, and smaller senders have less experience to draw upon. ARC doe

Re: [dmarc-ietf] Overall last-call comments on DMARC

2024-04-04 Thread Douglas Foster
Murray, I was hoping your proposal to advance ARC was serious. Google has solved the problem of limited ARC deployment. To my mind, this means that we cannot revoke the experiment and we cannot do much to change it, so we might as well advance it to standards track. It became a de-facto standard

Re: [dmarc-ietf] Overall last-call comments on DMARC

2024-04-03 Thread Douglas Foster
In response to Ale's comment that we describe the mailing list problem without defining a path forward, I suggest the text below. Doug Foster Some legitimate messages are sent on behalf of an individual account, based on an established relationship between the sender and the account owner, but w

Re: [dmarc-ietf] Standards Track? Yes or No.

2024-04-01 Thread Douglas Foster
As a concept, DMARC is a powerful tool for detecting and blocking malicious senders. As a document it does much less. DMARCbis perpetuates the known problems in RFC 7489, thereby ensuring a continuation of negative outcomes. Both documents define an imaginary evaluator who follows the senders ad

Re: [dmarc-ietf] WGLC editorial review of draft-ietf-dmarc-dmarcbis-30

2024-03-31 Thread Douglas Foster
On SPF, our document should say simply, " a DMARC-compliant evaluator MUST NOT reject a message, based on SPF result, prior to receiving the Data section and checking for aligned and verifiable signatures." Of course, evaluators may still reject early base on known-bad server or known-bad Mail Fro

Re: [dmarc-ietf] DMARCbis WGLC - Issue 135 - What To Say About Too-Permissive/Third-Party SPF and Where To Say It?

2024-03-17 Thread Douglas Foster
But if we have no advice on how to detect a false Pass, how is this useful? Are we helping evaluators or just giving ourselves cover that "your disaster is not our fault because we warned you"? On Sun, Mar 17, 2024, 10:59 AM Scott Kitterman wrote: > > > On March 17, 2024 11:11:04 AM UTC, Aless

[dmarc-ietf] DMARC exceptions

2024-03-14 Thread Douglas Foster
DMARC is an imperfect tool, as evidenced by the mailing list problem, among others. DMARCbis has failed to integrate RFC7489 with RFC 7960, because it provides no discussion of the circumstances where an evaluator should override the DMARC result. I believe DMARCbis needs a discussion about the a

Re: [dmarc-ietf] Problem with multiple policies, different alignment

2024-03-14 Thread Douglas Foster
Wed, Mar 13, 2024 at 6:24 AM Douglas Foster < > dougfoster.emailstanda...@gmail.com> wrote: > >> My unsuccessful attempt to implement to the specification has reminded me >> of my past concerns. >> >> Our document gives primacy to the Tree Walk, as if it will b

Re: [dmarc-ietf] Problem with multiple policies, different alignment

2024-03-13 Thread Douglas Foster
are in the sub1.example.com subtree (including exact match or child) DF On Wed, Mar 13, 2024, 7:18 AM Alessandro Vesely wrote: > On Wed 13/Mar/2024 11:23:43 +0100 Douglas Foster wrote: > > > > The reality is that the Tree Walk is an inefficient and unreliable way of > > ob

Re: [dmarc-ietf] Problem with multiple policies, different alignment

2024-03-13 Thread Douglas Foster
My unsuccessful attempt to implement to the specification has reminded me of my past concerns. Our document gives primacy to the Tree Walk, as if it will be used on every >From domain, SPF domain, and DKIM domain. The Tree Walk algorithm is explained in detail before any discussion of how it is

Re: [dmarc-ietf] Fwd: Break SPF response: DKIM Only

2024-03-12 Thread Douglas Foster
Neil, to your question about mitigating false SPF PASS: There are three possible mitigations by senders: - Drop the SPF policy so that messages evaluate to SPF None. A few domains do this. - Change the SPF Policy to return SPF Neutral for cloud services, as currently proposed. -

[dmarc-ietf] Problem with multiple policies, different alignment

2024-03-12 Thread Douglas Foster
I have been building a DMARC implementation, starting with a simple function: TreeWalk(domain) which returns: - Policy found or not found indicator - Policy Domain - Organizational Domain - Policy record My thought was that the Tree Walk result was independent of the domain identifier

[dmarc-ietf] Don't trivialize psd=n

2024-03-10 Thread Douglas Foster
Both of these statements seem unnecessarily weak, bordering on apologetic. 5.3.General Record Format PSD ("n") ."... There is no need to put psd=n in a DMARC record, except in the very unusual case of a parent PSD publishing a DMARC record without the requisite psd=y tag." 11.8 Determination of t

Re: [dmarc-ietf] Break SPF response: DKIM Only

2024-02-29 Thread Douglas Foster
unrelated recipients suffer the consequences. The wrong people take the hit.We need to provide a way to mitigate the harm caused by unjustified trust in SPF. Doug On Thu, Feb 29, 2024, 1:29 PM Scott Kitterman wrote: > > > On February 29, 2024 6:15:37 PM UTC, Benny Pedersen wrote

[dmarc-ietf] Break SPF response: DKIM Only

2024-02-29 Thread Douglas Foster
I am surprised at the lack of feedback about Barry's research link. It is a devastating attack on our ability to trust SPF when shared infrastructure is involved. As a result of that document, I have switched camps and believe that we MUST provide a DKIM-only option for DMARC. The proposed wor

Re: [dmarc-ietf] DMARC with multi-valued RFC5322.From

2024-02-10 Thread Douglas Foster
I have been thinking about the other way that an attacker could have two >From addresses: by having two From headers.Not a problem as long as the evaluator rejects the message based on standards violation. But what if the evaluator does not test for dual headers because the configuration is s

Re: [dmarc-ietf] DMARC with multi-valued RFC5322.From

2024-02-05 Thread Douglas Foster
The volume of current attacks should not be a consideration, and speculation about future risks is vacuous. The industry routinely raises C.V.Es against newly discovered and not-yet-exploited security holes, and we should act the same way. The evidence from Google is that multi-valued From DOES

Re: [dmarc-ietf] DMARC with multi-valued RFC5322.From

2024-02-04 Thread Douglas Foster
I see no conflict. A domain with DMARC enforcement asserts that it sends only authenticated messages. Since multiple-From messages cannot be fully authenticated, such messages are inconsistent with the domain owner's stated practices Therefore, the domain owner's published Failure disposition re

Re: [dmarc-ietf] DMARC with multi-valued RFC5322.From

2024-02-04 Thread Douglas Foster
Even in the unlikely event that all From addresses can be authenticated with DKIM, the result still cannot be trusted. It would be easy for an attacker to anticipate signatures that will be added in transit, and use those signatures to create false authentication. RFC 7489 treats a multiple-doma

Re: [dmarc-ietf] DMARC with multi-valued RFC5322.From

2024-01-31 Thread Douglas Foster
Ale is right, the document needs to address the problem. I agree with Google that multiple-From has no important use-case, and therefore a wise evaluator should simply reject the message. For the same reason, I believe the RFC5322.bis group should have deprecated the feature.But since that i

Re: [dmarc-ietf] DMARC with multi-valued RFC5322.From

2024-01-27 Thread Douglas Foster
Assume this RFC5322 header: From: user@attackdomain, presid...@whitehouse.gov For messages like this: - Verifying one identity (e.g. "user@attackdomain") does nothing to say that the unverified identity is used with authorization. - Technical issues mean that it will be rare, nearl

Re: [dmarc-ietf] DMARC with multi-valued RFC5322.From

2024-01-17 Thread Douglas Foster
As with the mailing list problem, when the recipient expects authentication but the sender cannot provide it, the sender is disadvantaged. Nor an I concerned about the limitations of a particular MSA product. However, we know that mailing list posts almost always start as authorized messages, so

Re: [dmarc-ietf] DMARC with multi-valued RFC5322.From

2024-01-16 Thread Douglas Foster
The purpose of DMARC is to demonstrate that the purported author (From) is either the actual author or the authorized agent of the actual author. Because of practical difficulties, this is an indirect process: DMARC PASS demonstrates that a specific sending domain is authorized to speak on behal

Re: [dmarc-ietf] DMARC marketing on NPR

2023-11-24 Thread Douglas Foster
Douglas Foster < dougfoster.emailstanda...@gmail.com> wrote: > If this implied solution was working, we would not have a mailing list > problem 10 years running. > > > > On Thu, Nov 23, 2023, 10:41 AM Dotzero wrote: > >> >> >> On

Re: [dmarc-ietf] DMARC marketing on NPR

2023-11-24 Thread Douglas Foster
If this implied solution was working, we would not have a mailing list problem 10 years running. On Thu, Nov 23, 2023, 10:41 AM Dotzero wrote: > > > On Thu, Nov 23, 2023 at 10:19 AM Douglas Foster < > dougfoster.emailstanda...@gmail.com> wrote: > >> The gap between

Re: [dmarc-ietf] DMARC marketing on NPR

2023-11-23 Thread Douglas Foster
does not even try. Doug Foster On Wed, Nov 22, 2023 at 5:58 PM Seth Blank wrote: > Is there a point to this thread, that affects the text in the DMARCbis > document under charter criteria? > > Seth, as Chair > > -mobile > > > On Wed, Nov 22, 2023 at 07:13 Douglas Foster

Re: [dmarc-ietf] DMARC marketing on NPR

2023-11-22 Thread Douglas Foster
RFC 7489 and DMARCbis are written as algorithms without exception conditions. That silence leads product developers and mail administrators to conclude that the algorithm can be implemented without allowing for exceptions. Why would we expect a different result? Withheld information can deceive

[dmarc-ietf] RFC 9091 vs Tree Walk

2023-11-19 Thread Douglas Foster
I reviewed the list of DMARC-publishing PSL entries and realized that the 10-fold increase in PSL DMARC participation was due to the success of RFC 9091. Private registries are deploying policies to protect their sub-registry clients. It is indeed unfortunate that concerns about PSL accuracy were

Re: [dmarc-ietf] Dmarcbis way forward

2023-11-15 Thread Douglas Foster
MUST NOT or SHOULD NOT make little difference. Both are the Crocker Proposal revived and simplified: "The solution to authentication problems MUST be LESS AUTHENTICATION!"If you can convince nearly all senders to use p=NONE, and if you can convince nearly all evaluators to enforce only when

Re: [dmarc-ietf] Server Controls

2023-11-14 Thread Douglas Foster
, server operators are the most important part of this protocol. Doug On Tue, Nov 14, 2023, 7:07 AM Richard Clayton wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > In message j...@mail.gmail.com>, Douglas Foster > writes > > >Our document needs a

[dmarc-ietf] Server Controls

2023-11-14 Thread Douglas Foster
Our document needs a section on server controls. Impersonation requires a server that allows impersonation messages to be created.This means that impersonation usually comes from attacker-owned servers. Legitimate infrastructure services should, and usually do, implement controls which preven

[dmarc-ietf] The mailing list catch-22

2023-11-07 Thread Douglas Foster
Axioms: (1) Most lists are legitimate (2) Mailing list posts have characteristics that make them readily distinguishable from other traffic. Charter Goal: The protocol will cause Evaluators to accept mailing list posts without From munging (as long as the list is a legitimate operator) The first

Re: [dmarc-ietf] DMARCbis way forward: Do we need our session at IETF 118

2023-10-30 Thread Douglas Foster
tes: > > On Sun, Oct 29, 2023 at 12:35 PM Douglas Foster < > > dougfoster.emailstanda...@gmail.com> wrote: > > > > By contrast, the new tag cannot be effective until DMARCbis is > published > > and filtering software updated. This involves years. Even the

Re: [dmarc-ietf] DMARCbis way forward: Do we need our session at IETF 118

2023-10-29 Thread Douglas Foster
it's solution needs to be laid out in our document because I am one of those who did not understand it as a possible strategy Doug On Sun, Oct 29, 2023, 2:03 PM Richard Clayton wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > In message f...@mail.gmail.com>

Re: [dmarc-ietf] DMARCbis way forward: Do we need our session at IETF 118

2023-10-29 Thread Douglas Foster
I have become persuaded to Scott's approach, as long as it is documented clearly. For DMARC-enabled evaluators: - auth=DKIMOnly requires that the domain owner have high confidence that every message source is applying DKIM signatures. - ?include=hostingservice only requires knowledge tha

Re: [dmarc-ietf] DMARCbis way forward: Do we need our session at IETF 118

2023-10-26 Thread Douglas Foster
Like Ale, I thought the group had agreed to implement an auth=DKIM-only option of some type. I understood the motivation to be false pass created by malicious forwarding through a legitimate hosting platform. Therefore SPF precision is an unrelated issue. Doug On Thu, Oct 26, 2023, 5:46 PM Ter

Re: [dmarc-ietf] Best of all possible documents?

2023-10-25 Thread Douglas Foster
: > On Tue, Oct 24, 2023 at 5:34 PM Douglas Foster < > dougfoster.emailstanda...@gmail.com> wrote: > >> In short, I am not part of the presumed consensus on this document. I >> will vigorously oppose any document which does not discuss malicious >> impersonation defen

Re: [dmarc-ietf] Best of all possible documents?

2023-10-25 Thread Douglas Foster
nd make their own determination of intent, blocking messages with malicious intent and allowing acceptable messages. Doug Foster On Tue, Oct 24, 2023 at 11:30 PM Murray S. Kucherawy wrote: > On Tue, Oct 24, 2023 at 5:34 PM Douglas Foster < > dougfoster.emailstanda...@gmail.com&g

Re: [dmarc-ietf] Best of all possible documents?

2023-10-24 Thread Douglas Foster
My working assumption is that this document, if approved, will be the last statement, for a long time to come, on matters of sender authentication and malicious impersonation defenses. That assumption raises the question, "Is this the best possible statement of how to defend against malicious imp

Re: [dmarc-ietf] DMARC policy discovery and invalid tag exception.

2023-10-20 Thread Douglas Foster
Offlist Do you support the notion that DMARC evaluation is only possible if a record is found? Doug Foster On Fri, Oct 20, 2023, 11:16 AM OLIVIER HUREAU < olivier.hur...@univ-grenoble-alpes.fr> wrote: > Hi, > > > The correct solution is that the person responsible for creating the > problem re

Re: [dmarc-ietf] Tree Walk impact

2023-10-18 Thread Douglas Foster
Then, Seth, I am confused. We have a non-trivial number of PSL entries that have DMARC policies which either specify relaxed alignment or specified nothing and acquired relaxed alignment by default. Are these organizations that have been victimized by PSL errors, or are the PSLs that are enablin

Re: [dmarc-ietf] Why Relaxed Alignment?

2023-10-17 Thread Douglas Foster
Why do we need to support relaxed alignment at all? When a domain is suddenly harmed by a PSL error, the necessary fix is to implement same-domain policies with same-domain signatures. The appropriate technique to prevent that problem, before it happens, is exactly the same configuration. This

Re: [dmarc-ietf] Tree Walk impact

2023-10-16 Thread Douglas Foster
Neil, this is a delayed reply to your earlier email about my implementation efforts, and whether I am on-board with the Tree Walk. The response has been delayed while I investigated the algorithm. I began by building a cache of DMARC policies using the PSL and my mail stream as input. The first

Re: [dmarc-ietf] Tree Walk impact

2023-10-13 Thread Douglas Foster
2023 at 7:18 AM Neil Anuskiewicz wrote: > > > > On Oct 13, 2023, at 3:59 AM, Douglas Foster < > dougfoster.emailstanda...@gmail.com> wrote: > > > >  > > The first step in my research has been to do DMARC policy lookups on the > PSL domains About 400 of

Re: [dmarc-ietf] Tree Walk impact

2023-10-13 Thread Douglas Foster
Tue 10/Oct/2023 19:16:10 +0200 Todd Herr wrote: > >>> On Tue, Oct 10, 2023 at 6:14 AM Alessandro Vesely > wrote: > >>> On Tue 10/Oct/2023 00:19:56 +0200 Douglas Foster wrote: > >>>> Both approaches have problems. Stop-at-last enables the walk to > e

Re: [dmarc-ietf] Tree Walk impact

2023-10-09 Thread Douglas Foster
Great question. On Feb 23rd, I had this exchange which John settled: It appears that Douglas Foster said: >-=-=-=-=-=- > >I seem to have missed this redesign. I thought the plan had always been >to take the top-most policy not flagged as PSD=Y. The current design has been

Re: [dmarc-ietf] Tree Walk impact

2023-10-09 Thread Douglas Foster
200 Douglas Foster wrote: > > Attached it is a spreadsheet with the problems from my data set. > > I see no blocking. For example, the list shows From: bayer.com, > d=crm.bayer.com, the latter deemed blocking. Both domains feature a > DMARC > record and (unsurprisin

Re: [dmarc-ietf] Tree Walk impact

2023-10-08 Thread Douglas Foster
ange to an inferior trust state. Whether the best number is 7% or 7.9%, the error rate is too high to ignore. Doug On Sat, Oct 7, 2023 at 10:00 PM Douglas Foster < dougfoster.emailstanda...@gmail.com> wrote: > Attached it is a spreadsheet with the problems from my data set. If it

Re: [dmarc-ietf] Tree Walk impact

2023-10-07 Thread Douglas Foster
Attached it is a spreadsheet with the problems from my data set. If it is dropped during the forwarding process, let me know and I will re-post it in the body of the message. The WG needs to prove that "The Tree Walk will cause no significant disruption".We should have understood that trying

Re: [dmarc-ietf] Tree Walk impact

2023-10-07 Thread Douglas Foster
: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > In message hgv...@mail.gmail.com>, Douglas Foster com> writes > > >So initially, I am asking for a compsrison between my results and > >the data used to justify the asserted consensus. > > if you publishe

Re: [dmarc-ietf] Tree Walk impact

2023-10-07 Thread Douglas Foster
Chair > > On Fri, Oct 6, 2023 at 19:49 Douglas Foster < > dougfoster.emailstanda...@gmail.com> wrote: > >> I have only recently implemented all of the tools needed to be able to >> test PSL vs Tree Walk. >> >> I looked at messages which had passed reputat

[dmarc-ietf] Tree Walk impact

2023-10-06 Thread Douglas Foster
I have only recently implemented all of the tools needed to be able to test PSL vs Tree Walk. I looked at messages which had passed reputation filtering and content filtering, to isolate messages where DMARC alone could be determinative. Within that group, 75% of the messages did not need tree wa

Re: [dmarc-ietf] Some Gmail comments on DMARCbis version 28

2023-09-17 Thread Douglas Foster
ad already promised to go away, but then I felt Barry misrepresented my perspective, and then you responded to the group twice. Doug Foster On Sun, Sep 17, 2023 at 6:20 PM Murray S. Kucherawy wrote: > On Sun, Sep 17, 2023 at 2:47 PM Douglas Foster < > dougfoster.emailstanda...@gmail.com>

Re: [dmarc-ietf] Some Gmail comments on DMARCbis version 28

2023-09-17 Thread Douglas Foster
For those who have implemented to the specification, "No Result" means "Content Filtering must carry the whole load," which it cannot do. So I reject the notion that "No Result" is harmless. Doug Foster On Sun, Sep 17, 2023 at 5:29 PM Murray S. Kucherawy wrote

Re: [dmarc-ietf] Some Gmail comments on DMARCbis version 28

2023-09-17 Thread Douglas Foster
the DMARCbis and reporting documents and get them published. > > Barry > > On Sat, Sep 16, 2023 at 6:56 AM Douglas Foster > wrote: > > > > Yes, I suspected awhile back that I was the only one in the world > implementing mandatory authentication. This group has confirm

Re: [dmarc-ietf] Some Gmail comments on DMARCbis version 28

2023-09-16 Thread Douglas Foster
Yes, I suspected awhile back that I was the only one in the world implementing mandatory authentication. This group has confirmed it. But I hold out hope thst others will see the opportunity that it provides. Perhaps someone will read my Best Practices draft and sponsor it as an individual contr

Re: [dmarc-ietf] Some Gmail comments on DMARCbis version 28

2023-09-15 Thread Douglas Foster
malicious senders. Doug Foster On Wed, Sep 13, 2023, 9:32 PM Richard Clayton wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > In message czy...@mail.gmail.com>, Douglas Foster com> writes > > >The coverage problem is aggravated if we assume rational at

  1   2   3   4   5   6   7   8   >