Re: [dmarc-ietf] Another p=reject text proposal

2023-08-13 Thread Jesse Thompson
On Sat, Aug 12, 2023, at 11:48 AM, John Levine wrote: > It appears that Jesse Thompson said: > >> This of course requires that the recipient SMTP server can't simply > >> reject the incoming email after the MAIL FROM because SPF checks do > >> not match, they actually need to receive the email so

Re: [dmarc-ietf] Another p=reject text proposal

2023-08-12 Thread John Levine
It appears that Jesse Thompson said: >> This of course requires that the recipient SMTP server can't simply >> reject the incoming email after the MAIL FROM because SPF checks do >> not match, they actually need to receive the email so they can check >> ARC and DKIM headers... > >During my 19 ye

Re: [dmarc-ietf] Another p=reject text proposal

2023-08-11 Thread Jesse Thompson
I'm woefully behind on this list. Apologies if these points have already been made. On Wed, Jul 19, 2023, at 4:42 PM, Tero Kivinen wrote: > Wei Chuang writes: > > 2) The proposed language calls out "“alumni forwarders”, role-based email > > aliases, and mailing lists" for consideration by receive

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-24 Thread Douglas Foster
I have stumbled into the same position as Barry, or maybe a more extreme one. I send no bounce messages, and very few 5xx responses. In my environment, one of the more common causes of non-delivery is a terminated employee. It has not seemed like automated messages sources pay much attention t

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-24 Thread Alessandro Vesely
On Sun 23/Jul/2023 22:12:55 +0200 Barry Leiba wrote: Without bounces the sender is in the dark. Yes, if the sender is a human. Not so, if the sender is a mailing list and that sender will then unsubscribe the intended recipient. Also not so, if the sender is a malfeasant who may use the bounce

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-23 Thread Neil Anuskiewicz
Yes sir, I’m convinced. Some of my more conservative customers who take security deadly serious won’t even bounce a DMARC failure with a helpful message. It’s discard. I respect the person I’m thinking of who hates bouncing. He’s appropriately paranoid for a InfoSec manager. > On Jul 23, 2023,

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-23 Thread Barry Leiba
> Without bounces the sender is in the dark. Yes, if the sender is a human. Not so, if the sender is a mailing list and that sender will then unsubscribe the intended recipient. Also not so, if the sender is a malfeasant who may use the bounce message for bad purposes. It's very clear to me that

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-23 Thread Neil Anuskiewicz
> On Jul 7, 2023, at 8:48 AM, John Levine wrote: > > It appears that Barry Leiba said: >> I, too, prefer MUST to SHOULD there, but it was clear to me that we >> will not reach rough consensus on MUST, but that we can reach rough >> consensus on SHOULD. >> >> I do like your suggestion of sil

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-23 Thread Neil Anuskiewicz
> On Jul 6, 2023, at 12:04 PM, Barry Leiba wrote: > > As I've said before, I think we should specify what we think is right, > and allow implementers to make their decisions. We can't and won't > police them. No way. It wouldn’t be possible even if we all made it our life’s work to be stand

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-21 Thread Alessandro Vesely
On Fri 21/Jul/2023 17:18:50 +0200 Scott Kitterman wrote: On July 21, 2023 3:14:58 PM UTC, Alessandro Vesely wrote: Maybe one day there will be a DMARC with batteries included, where implementers ship default configurations which are effective out of the box. While I don't know how to get th

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-21 Thread Scott Kitterman
On July 21, 2023 3:14:58 PM UTC, Alessandro Vesely wrote: >On Fri 21/Jul/2023 10:22:06 +0200 Matthäus Wander wrote: >> Murray S. Kucherawy wrote on 2023-07-08 02:44: >>> "SHOULD" leaves the implementer with a choice.  You really ought to do what >>> it says in the general case, but there might

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-21 Thread Alessandro Vesely
On Fri 21/Jul/2023 10:22:06 +0200 Matthäus Wander wrote: Murray S. Kucherawy wrote on 2023-07-08 02:44: "SHOULD" leaves the implementer with a choice.  You really ought to do what it says in the general case, but there might be circumstances where you could deviate from that advice, with some p

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-21 Thread Murray S. Kucherawy
On Fri, Jul 21, 2023 at 1:22 AM Matthäus Wander wrote: > > "SHOULD" leaves the implementer with a choice. You really ought to do > > what it says in the general case, but there might be circumstances where > > you could deviate from that advice, with some possible effect on > > interoperability.

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-21 Thread Matthäus Wander
Murray S. Kucherawy wrote on 2023-07-08 02:44: "SHOULD" leaves the implementer with a choice.  You really ought to do what it says in the general case, but there might be circumstances where you could deviate from that advice, with some possible effect on interoperability.  If you do that, it i

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-20 Thread Alessandro Vesely
On Wed 19/Jul/2023 23:42:55 +0200 Tero Kivinen wrote: Wei Chuang writes: 2) The proposed language calls out "“alumni forwarders”, role-based email aliases, and mailing lists" for consideration by receivers.  How should receivers be aware that traffic failing authentication should be reconsidere

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-19 Thread Tero Kivinen
Wei Chuang writes: > 2) The proposed language calls out "“alumni forwarders”, role-based email > aliases, and mailing lists" for consideration by receivers.  How should > receivers be aware that traffic failing authentication should be reconsidered? >   Mailing-lists sometimes uses RFC2919 List-id

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-15 Thread Wei Chuang
FWIW I think this language is an improvement over the prior language but I would like to point out two concerns: 1) Specifying receivers with "MUST NOT reject" in Section 8.6 "Interoperability Considerations" presumably to to downgrade a p=reject to quarantine with does carry new security risk. I

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-13 Thread Barry Leiba
> The issue is not about lists being second class. What lists do to a message > is a privileged function, because > modifying a message can be done maliciously as easily as it can be done > innocently. So the real problem > is that DMARC demoted them from privileged to non-privileged by exposi

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-13 Thread Murray S. Kucherawy
On Thu, Jul 13, 2023 at 6:11 AM Douglas Foster < dougfoster.emailstanda...@gmail.com> wrote: > I did not say "life isn't fair" to be rude, but as a call to acknowledge > the reality that exists rather than the reality you wish you had. > So what I'm hearing, again, is "Lists should get with the t

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-13 Thread Douglas Foster
I did not say "life isn't fair" to be rude, but as a call to acknowledge the reality that exists rather than the reality you wish you had. We know that a large portion of email is unsolicited, unwanted, or malicious. Consequently, there is no right or certainty of delivery. To get delivery, yo

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-13 Thread Alessandro Vesely
On Thu 13/Jul/2023 10:20:00 +0200 Murray S. Kucherawy wrote: On Wed, Jul 12, 2023 at 6:20 AM Douglas Foster wrote: Does anyone believe that things will change if we publish an RFC which says "Verizon Media MUST change to p=none"? I don't. It would be absurd to make such a directed statemen

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-13 Thread Murray S. Kucherawy
On Wed, Jul 12, 2023 at 6:20 AM Douglas Foster < dougfoster.emailstanda...@gmail.com> wrote: > Does anyone believe that things will change if we publish an RFC which > says "Verizon Media MUST change to p=none"? I don't. > It would be absurd to make such a directed statement. I trust you're sim

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-12 Thread Douglas Foster
Does anyone believe that things will change if we publish an RFC which says "Verizon Media MUST change to p=none"? I don't. Lists have been hurt by the move to authenticated email. Point taken. However, the world is not going back to the good old days,. There is no hope for a list solution to a

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-12 Thread Baptiste Carvello
Hi, Le 07/07/2023 à 23:58, John R Levine a écrit : > > Why is it up to the recipient systems (the ones that do not care) to > make life easier for lists?  Mailing list packages already do lots of > analysis of bounce messages.  How about if they fix their bounce > processing to recognize DMARC fa

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-12 Thread Baptiste Carvello
Hi, Le 08/07/2023 à 20:24, Scott Kitterman a écrit : > > You can equally argue that these receivers are merely following the policy > advice provided by the sending domain (it has reject right in the name) and > this problem is entirely generated by sender's inappropriate use of p=reject. > >

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-12 Thread Baptiste Carvello
Hi, Le 07/07/2023 à 21:09, Scott Kitterman a écrit : > Doesn't sieve happen during delivery, after the message has been accepted? > Is so, I don't think it's a useful comparison to make. > > The lack of bounce/rejection messages results in messages that vanish and > undermines the reliability

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-11 Thread Barry Leiba
It's actually not even enough to check when you subscribe, though that will help keep the user from being surprised later. But you also have to check every time a message is posted to the list, because anyone's domain could have changed to p=reject recently. And anyway, yes, the IETF considered t

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-11 Thread Tero Kivinen
Barry Leiba writes: > > 2) As others have observed, the mailing list problem is > > exclusively an evaluator error. An evaluator's job is to allow > > safe and wanted messages while blocking unsafe or unwanted > > messages. > > I disagree. As I and others have observed, those creating the problem

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-11 Thread Barry Leiba
> To Murray's observation about fairness, my thoughts: I don't see any use of the word "fair" in the message from Murray that you quote. > 1) Life is not fair. This is impolitely dismissive. Please don't do that. > 2) As others have observed, the mailing list problem is exclusively an > evalu

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-11 Thread Douglas Foster
To Murray's observation about fairness, my thoughts: 1) Life is not fair. 2) As others have observed, the mailing list problem is exclusively an evaluator error. An evaluator's job is to allow safe and wanted messages while blocking unsafe or unwanted messages. 3) The problem can be solved by s

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-10 Thread Alessandro Vesely
On Mon 10/Jul/2023 17:50:54 +0200 John Levine wrote: FYI, the IETF's mail relay for role accounts like WG chairs breaks DKIM signatures. It's a bug, but it took quite a while to realize what the problem was, since some signatures get through OK. It's an old python library helpfully tidying up th

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-10 Thread Barry Leiba
> Another consideration is that a non-standard, internal blocking would have > been > effective only for their users. Perhaps they though they were doing the rest > of the world a favor by following standard protocols. Had that MUST NOT been > in place then, /perhaps/ we'd have spared ourselves

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-10 Thread John Levine
It appears that Barry Leiba said: >> Is “generally” true here? I think I have seen exceptions to DKIM signatures >> being valid on relayed >> messages, although I can’t dig up any examples right now. > >You seem to be answering the question you're asking. I know of none >of these relays that br

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-10 Thread Alessandro Vesely
On Sat 08/Jul/2023 20:13:44 +0200 John Levine wrote: It appears that Richard Clayton said: They then moved on to just using random identities from the same domain as the recipient. This led a great many Yahoo users to believe that a great many other Yahoo users had been compromised, leading t

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-10 Thread Barry Leiba
> I’m one of those people who prefer for “xxx considerations” sections to be a > descriptive discussion > of the xxx issues and not contain new normative requirements. I disagree, and certainly the Security Considerations sections are normative and often use BCP 14 key words. > the statement abo

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-09 Thread Tero Kivinen
Murray S. Kucherawy writes: > On Fri, Jul 7, 2023 at 6:35 PM Douglas Foster < > dougfoster.emailstanda...@gmail.com> wrote: > > Consequently, the problem remains: How does an evaluator distinguish > between a legitimate list and a malicious attack? > > If we had a reliable answer to that,

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-09 Thread Barry Leiba
The point isn't to place blame. The point is to specify how to maintain interoperability, and in the case of DMARC p-reject there are two places where we can lessen the interop problems: telling the senders not to use p=reject in inappropriate conditions, and telling the receivers to consider the

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-09 Thread Hector Santos
On 7/8/2023 3:22 PM, Tero Kivinen wrote: Scott Kitterman writes: You can equally argue that these receivers are merely following the policy advice provided by the sending domain (it has reject right in the name) and this problem is entirely generated by sender's inappropriate use of p=reject. T

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-09 Thread Douglas Foster
Our solution approach is binary: either we fix the list problem by doing less authentication, which is Barry's proposal, or we fix the list problem by doing alternate authentication.Alternate authentication is the one we need to pursue, because the other approach has already been rejected by

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-08 Thread Murray S. Kucherawy
On Fri, Jul 7, 2023 at 6:14 AM Douglas Foster < dougfoster.emailstanda...@gmail.com> wrote: > Malicious impersonation creates a need for authentication. If the list > makes changes that disable the originator's authentication, then it is the > list's problem to find a way to convince the recipie

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-08 Thread Murray S. Kucherawy
On Fri, Jul 7, 2023 at 6:35 PM Douglas Foster < dougfoster.emailstanda...@gmail.com> wrote: > Consequently, the problem remains: How does an evaluator distinguish > between a legitimate list and a malicious attack? > If we had a reliable answer to that, this would've been over ages ago. Unfortuna

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-08 Thread Tero Kivinen
Scott Kitterman writes: > You can equally argue that these receivers are merely following the > policy advice provided by the sending domain (it has reject right in > the name) and this problem is entirely generated by sender's > inappropriate use of p=reject. True, thats why the proposed text al

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-08 Thread Scott Kitterman
On July 8, 2023 6:16:46 PM UTC, Tero Kivinen wrote: >Brotman, Alex writes: >> I suspect the portion that instructs receivers to not act solely on >> p=reject may be ignored by a fair set of receivers. I'm not >> necessarily opposed to the language below, just that it seems odd to >> create lan

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-08 Thread Tero Kivinen
Brotman, Alex writes: > I suspect the portion that instructs receivers to not act solely on > p=reject may be ignored by a fair set of receivers. I'm not > necessarily opposed to the language below, just that it seems odd to > create language that we know will be ignored. If receivers ignore that

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-08 Thread John Levine
It appears that Richard Clayton said: >They then moved on to just using random identities from the same domain >as the recipient. This led a great many Yahoo users to believe that a >great many other Yahoo users had been compromised, leading to a >significant loss of faith in the integrity of the

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-08 Thread Hector Santos
*Note: The following is a general rule of thumb for me.* From my functional specification protocol language coding standpoint: MUST --> NO OPTION. Technically enabled with no switch to disable. SHOULD -> OPTIONAL, Default is ON, enabled MAY --> OPTIONAL, Default is ON or OFF depending on implem

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-08 Thread Richard Clayton
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 In message , Murray S. Kucherawy writes >Some of my IETF mentors (ahem) taught me some stuff about the use >of SHOULD [NOT] that have stuck with me, and I'm going to pressure >test this against that advice.  Let's see how this goes.  :-

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-08 Thread Alessandro Vesely
On Sat 08/Jul/2023 02:44:19 +0200 Murray S. Kucherawy wrote: On Thu, Jul 6, 2023 at 7:55 AM Barry Leiba wrote: It is therefore critical that domains that host users who might post messages to mailing lists SHOULD NOT publish p=reject. Domains that choose to publish p=reject S

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-07 Thread Douglas Foster
Start with the underlying objective: Evaluators SHOULD accept mailing list traffic. Google's requirement: Given whatever standards-track DMARCbis rules we produce, these rules MUST be something that can be fully automated. Consequently, the problem remains: How does an evaluator distinguish be

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-07 Thread Murray S. Kucherawy
Still no hat on. I can see the compromise in language that's been proposed here, and I appreciate the effort by the chairs. Two things I'd like to raise. First: On Thu, Jul 6, 2023 at 7:55 AM Barry Leiba wrote: > It is therefore critical that domains that host users who might > po

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-07 Thread John R Levine
I do like your suggestion of silent discard rather than bounce, and I would want to see that change made -- perhaps with a note that aggregate reports will still include information about those discards. Having thought about it for a minute, I have a better question. We already know that sites

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-07 Thread Scott Kitterman
Doesn't sieve happen during delivery, after the message has been accepted? Is so, I don't think it's a useful comparison to make. The lack of bounce/rejection messages results in messages that vanish and undermines the reliability of the email ecosystem. I agree that silent discard between MT

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-07 Thread Barry Leiba
It's not a question of the bounces being annoying: it's a question of the bounces harming mailing list operation by causing unsubscribes. Given the choice of "breaking 5321" (which I don't buy, as Sieve already has a silent discard option, for example) and "breaking normal mailing list operation",

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-07 Thread Hector Santos
Barry, I did a quick review and comparison for changes. Overall, it appears this document is more clear in key specific areas but also more complex. At this point, DMARCbis is about Local Policy, System Administrative choices and suggested guidelines, codified and/or new. As such, I don’

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-07 Thread John Levine
It appears that Barry Leiba said: >I, too, prefer MUST to SHOULD there, but it was clear to me that we >will not reach rough consensus on MUST, but that we can reach rough >consensus on SHOULD. > >I do like your suggestion of silent discard rather than bounce, and I >would want to see that change

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-07 Thread Barry Leiba
I, too, prefer MUST to SHOULD there, but it was clear to me that we will not reach rough consensus on MUST, but that we can reach rough consensus on SHOULD. I do like your suggestion of silent discard rather than bounce, and I would want to see that change made -- perhaps with a note that aggregat

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-07 Thread Douglas Foster
Baptiste, Your comments assume uniform agreement that mailing lists have no role in the problem or it's solution. I do not agree. Malicious impersonation creates a need for authentication. If the list makes changes that disable the originator's authentication, then it is the list's problem to f

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-07 Thread Baptiste Carvello
Hi, I consider this a step backwards. The MUST requirement on the author domain finally made it clear, after a lost decade, *who* is responsible for solving the breakage of indirect mailflows. Problem solving starts with acknowledging one's responsibilities. This proposal goes back to a muddy sha

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-07 Thread Douglas Foster
Barry, in my previous note, I used MTA generically, but was particularly thinking of forwarders. I assume that senders and their outbound filtering services will be smart enough to not undermine their own signatures. I have tried unsuccessfully to accept your assertion that a forwarder is not a p

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Todd Herr
On Thu, Jul 6, 2023 at 3:00 PM Barry Leiba wrote: > That's fine, as long as we're all understanding that it's still just a > proposal and we'll be discussing it at IETF 117 and on the mailing list. > Absolutely. I just wanted to have a fresh draft in place before the cut off date, and today was

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Barry Leiba
s to avoid this situation, but we will tell receivers how > to avoid this situation. > > -- > Alex Brotman > Sr. Engineer, Anti-Abuse & Messaging Policy > Comcast > > > > -Original Message- > > From: dmarc On Behalf Of Barry Leiba > > Sent: Thursday

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Barry Leiba
That's fine, as long as we're all understanding that it's still just a proposal and we'll be discussing it at IETF 117 and on the mailing list. Barry On Thu, Jul 6, 2023 at 2:07 PM Todd Herr wrote: > I'll prepare a new rev incorporating this proposed text (and some other > unrelated stuff that

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Brotman, Alex
y 6, 2023 10:55 AM > To: IETF DMARC WG > Subject: [dmarc-ietf] Another p=reject text proposal > > I had some off-list discussions with Seth, who was very much against my > original > proposed text, and he suggested an alternative organization that would be more > palatable t

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Todd Herr
I'll prepare a new rev incorporating this proposed text (and some other unrelated stuff that's been lying fallow for a few months) and release it today. On Thu, Jul 6, 2023 at 12:02 PM John Levine wrote: > It appears that Barry Leiba said: > >This makes it explicitly clear that any MUST/SHOULD

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread John Levine
It appears that Barry Leiba said: >This makes it explicitly clear that any MUST/SHOULD stuff with regard >to using and honoring p=reject is an issue of interoperating with >existing Internet email features. I can accept that mechanism also, >and so, below is my attempt at writing that proposal u

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Barry Leiba
I don't think this is the place to tell mailing lists what to do, and that's all discussed in Section 4.1.3 of RFC 7960. Barry On Thu, Jul 6, 2023 at 11:48 AM Alessandro Vesely wrote: > > Hi, > > the only issue I'd put about the new section is that it doesn't mention From: > munging. Isn't that

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Alessandro Vesely
Hi, the only issue I'd put about the new section is that it doesn't mention From: munging. Isn't that practice widespread enough that it deserves being considered? Best Ale On Thu 06/Jul/2023 16:55:02 +0200 Barry Leiba wrote: I had some off-list discussions with Seth, who was very much ag

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Douglas Foster
Whatever works within our constraints. It is certainly an interoperability consideration, and evaluators will have a hard time reverse engineering why the signature fails verification. df On Thu, Jul 6, 2023, 11:25 AM Barry Leiba wrote: > > This language works well for me. > > Excellent; than

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Barry Leiba
> This language works well for me. Excellent; thanks. > I suggest adding some language about why MTAs should not rearrange message > headers or MIME > sections, even though earlier documents grant permission to do so. > > Additionally, when adding headers, an MTA must add them at the top if (a)

Re: [dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Douglas Foster
This language works well for me. I suggest adding some language about why MTAs should not rearrange message headers or MIME sections, even though earlier documents grant permission to do so. Additionally, when adding headers, an MTA must add them at the top if (a) the header type is included in a

[dmarc-ietf] Another p=reject text proposal

2023-07-06 Thread Barry Leiba
I had some off-list discussions with Seth, who was very much against my original proposed text, and he suggested an alternative organization that would be more palatable to him. I've attempted to set that out below. The idea is to remove the normative requirements about using p=reject from Sectio