Re: [Bimi] Fwd: bimi Digest, Vol 10, Issue 2

"Brotman, Alex" <Alex_Brotman@comcast.com> Fri, 30 July 2021 13:19 UTC

Return-Path: <Alex_Brotman@comcast.com>
X-Original-To: bimi@ietfa.amsl.com
Delivered-To: bimi@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC50F3A29EF for <bimi@ietfa.amsl.com>; Fri, 30 Jul 2021 06:19:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.496
X-Spam-Level:
X-Spam-Status: No, score=-1.496 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URI_NOVOWEL=0.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=comcast.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s8DtAB_FyHNu for <bimi@ietfa.amsl.com>; Fri, 30 Jul 2021 06:19:11 -0700 (PDT)
Received: from mx0a-00143702.pphosted.com (mx0a-00143702.pphosted.com [148.163.145.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 017E63A29F0 for <bimi@ietf.org>; Fri, 30 Jul 2021 06:19:10 -0700 (PDT)
Received: from pps.filterd (m0156893.ppops.net [127.0.0.1]) by mx0a-00143702.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 16UDCtqu019477; Fri, 30 Jul 2021 09:19:09 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcast.com; h=from : to : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=20190412; bh=j/yOxFeDvSIrwMQaOpXxWVAnx0fWpESgaVgjKHHCM88=; b=B7oC6CXMOBeWsqCcFYyrHCz91MbPrH/C4xduTPreUz2JLuJn0NjFG9niobRA357gA90M vE4XZm0ZBo05H8XygLvN9MmiFYiRKBSyxw3E5kHyJZ7kGg0SZ/NT8iXqK+YXsOaAQ3UD xT7gPMt2mnSGFZYF2LbEca3JuQ3+VqwlIttA34cWsQwhoZuxbOiPeoknvv2wKQMtawrO YugwlteEqdA7MKYKSpACra3TmH/HmwU8l76cvtgCjmXwDK8xe2yE2wKt299ppYP3vkmH yXSClf7FKVlS/xCswX+PPkuRJvc8Vywss1hBL2ZXN0t/zJj01RHdnlOEJvUaBhW/7Qvu pw==
Received: from pacdcex56.cable.comcast.com (dlppfpt-wc-1p.slb.comcast.com [96.99.226.136]) by mx0a-00143702.pphosted.com with ESMTP id 3a3v1chf29-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Fri, 30 Jul 2021 09:19:08 -0400
Received: from PACDCEXOP03.cable.comcast.com (24.40.1.150) by PACDCEX56.cable.comcast.com (24.40.2.155) with Microsoft SMTP Server (TLS) id 15.0.1497.23; Fri, 30 Jul 2021 09:19:07 -0400
Received: from pacdcexedge02.cable.comcast.com (68.87.38.198) by PACDCEXOP03.cable.comcast.com (24.40.1.150) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.858.5 via Frontend Transport; Fri, 30 Jul 2021 09:19:07 -0400
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (104.47.58.173) by webmail.comcast.com (68.87.38.198) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.858.15; Fri, 30 Jul 2021 09:19:06 -0400
Received: from MN2PR11MB4351.namprd11.prod.outlook.com (2603:10b6:208:193::31) by BL0PR11MB3427.namprd11.prod.outlook.com (2603:10b6:208:7b::30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4373.24; Fri, 30 Jul 2021 13:19:04 +0000
Received: from MN2PR11MB4351.namprd11.prod.outlook.com ([fe80::cddd:25b1:344d:8818]) by MN2PR11MB4351.namprd11.prod.outlook.com ([fe80::cddd:25b1:344d:8818%5]) with mapi id 15.20.4373.022; Fri, 30 Jul 2021 13:19:04 +0000
From: "Brotman, Alex" <Alex_Brotman@comcast.com>
To: Marcel Bokhorst <marcel@faircode.eu>, "bimi@ietf.org" <bimi@ietf.org>
Thread-Topic: [Bimi] Fwd: bimi Digest, Vol 10, Issue 2
Thread-Index: AQHXhR7o//s7Kc4LTkyTzDhbcM2+U6tbfzTw
Date: Fri, 30 Jul 2021 13:19:04 +0000
Message-ID: <MN2PR11MB435147F86056FB81D919657EF7EC9@MN2PR11MB4351.namprd11.prod.outlook.com>
References: <mailman.3635.1627587941.6855.bimi@ietf.org> <CAFLkOerrax+qYyaR_u1SJH6xQH_asxqbzd=rb4AWKwYudZodCw@mail.gmail.com>
In-Reply-To: <CAFLkOerrax+qYyaR_u1SJH6xQH_asxqbzd=rb4AWKwYudZodCw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: faircode.eu; dkim=none (message not signed) header.d=none;faircode.eu; dmarc=none action=none header.from=comcast.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 312099c2-9977-429b-89cf-08d9535c9aa0
x-ms-traffictypediagnostic: BL0PR11MB3427:
x-microsoft-antispam-prvs: <BL0PR11MB3427ACB6069E2D6C9E9C8995F7EC9@BL0PR11MB3427.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR11MB4351.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(39860400002)(346002)(396003)(376002)(136003)(366004)(966005)(86362001)(8936002)(9686003)(5660300002)(55016002)(83380400001)(38100700002)(110136005)(478600001)(33656002)(122000001)(76116006)(71200400001)(186003)(52536014)(316002)(166002)(8676002)(7696005)(66946007)(66476007)(2906002)(64756008)(66556008)(38070700005)(53546011)(66446008)(6506007); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=iB7LLZ9DdtX2hdhhdUxbTTC4yIi8A//HPMMsGLMo9FYIi5cr+Tx679PhrR55IeyMG6pamkfo8KTPxkX9u/7jEDoVpu32JxH2gdNW3S39PLh2BatcTIc65dTPiGjIR+StqIu5NJ7cQ3TCsr0tSQRfkoNT+gm+QDW1H+obXVwDI4REPQHK5NcTKyRPo2YFEcwo/PHrSfuARgxGcYKP4NjrcCA+rQmWHlFMjm2vmaa7cLQGHDIcIiH8RRsRAqtZ/D+sADN5R/w54q1MD59xdU5e0J3pJBW3K5iIL2iGg41e1CA6bQmtbpKsMbRUX6jy2pl8ApLi0D/8qpQetBCgWKl8eA==
arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=a2UHjXPa5gAqw2M6rrQOjT5PsJ9u20YnQjuAnrTev8A=; b=fk0ijjmSp8SjmZqM0Af0Eyy/RM1KXvdM1oE5W7N9GnrKNk2TbYj4tL2FbD4bnzOgff+OGzSbr6EQo1P9OLFNojoeKV+2eMsgvGAWmbM+EPwMw2BvOTy2nJJd6WXNcWos46h11IofxzskBTZXVoelQj30/HBRCQ1iuXodOQTaVokqRJ1RuRs3ukx5IhOz2q8Q3Tuv5VICJHM+y7/FniTWj9dWQ/n550Le9QqpPJDZvwfI9Fe2aqocxq4DQyvr6/yrlCjVTwwzNWEwAv62R+XDohXtAwAf63SeKerjtBDXPZwVziFRYOB4NjXHTcbCi+gdulOmDEezKLfoJTg9CiEmLw==
arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=comcast.com; dmarc=pass action=none header.from=comcast.com; dkim=pass header.d=comcast.com; arc=none
x-ms-exchange-crosstenant-authas: Internal
x-ms-exchange-crosstenant-authsource: MN2PR11MB4351.namprd11.prod.outlook.com
x-ms-exchange-crosstenant-network-message-id: 312099c2-9977-429b-89cf-08d9535c9aa0
x-ms-exchange-crosstenant-originalarrivaltime: 30 Jul 2021 13:19:04.4025 (UTC)
x-ms-exchange-crosstenant-fromentityheader: Hosted
x-ms-exchange-crosstenant-id: 906aefe9-76a7-4f65-b82d-5ec20775d5aa
x-ms-exchange-crosstenant-mailboxtype: HOSTED
x-ms-exchange-crosstenant-userprincipalname: sYfo80Y4sKlleI6Lop3VmbXpQkrjPeLS4s+2wbOk0llZYJ4BpHRnJIH3AXOd33m83SgZgp6EV6GpGtTVWKP7VlgrOiSYZkCSM5M+YtIyyoE=
x-ms-exchange-transport-crosstenantheadersstamped: BL0PR11MB3427
x-originatororg: comcast.com
Content-Type: multipart/alternative; boundary="_000_MN2PR11MB435147F86056FB81D919657EF7EC9MN2PR11MB4351namp_"
MIME-Version: 1.0
X-CFilter-Loop: Forward AAETWZ
X-Proofpoint-ORIG-GUID: AUCRRhRFaWhqHMv1Ofh8Fu968FEZGL0Z
X-Proofpoint-GUID: AUCRRhRFaWhqHMv1Ofh8Fu968FEZGL0Z
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-07-30_05:2021-07-30, 2021-07-30 signatures=0
X-Proofpoint-Spam-Reason: safe
Archived-At: <https://mailarchive.ietf.org/arch/msg/bimi/iFOoEzWL4ah7og6p0fgm34vacN0>
Subject: Re: [Bimi] Fwd: bimi Digest, Vol 10, Issue 2
X-BeenThere: bimi@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Brand Indicators for Message Identification <bimi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bimi>, <mailto:bimi-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bimi/>
List-Post: <mailto:bimi@ietf.org>
List-Help: <mailto:bimi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bimi>, <mailto:bimi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Jul 2021 13:19:16 -0000

Consider “emails.xfinity.com”.  We didn’t want BIMI on “xfinity.com”, but just that sub-domain (for now).  There is no BIMI record at “xfinity.com”, though it does exist at “emails.xfinity.com”.  I believe this is covered in the drafts.

The flag could be nice, but again, that only covers IMAP.  What about POP (or MAPI) users?  The cryptographic solution may be more intensive, but seems like it may make BIMI more available (but yes, at the expense of mobile CPU).

Could you elaborate on the “everything checks out” from your section about evaluation?

--
Alex Brotman
Sr. Engineer, Anti-Abuse & Messaging Policy
Comcast

From: bimi <bimi-bounces@ietf.org> On Behalf Of Marcel Bokhorst
Sent: Friday, July 30, 2021 3:57 AM
To: bimi@ietf.org
Subject: [Bimi] Fwd: bimi Digest, Vol 10, Issue 2

FairEmail will not rely on the BIMI-Location header because this requires support from the email server. Instead, FairEmail will use the logo in the VMC and fallback to the DNS record logo location if needed (logo missing in the VMC, etc). The logo will always be shown, but the verified sender icon (a double check mark before the sender's name) will be shown only when everything checks out.

I think it would be a good idea to summarize the steps to follow to fetch/decode/check BIMI because I think it will make it easier for developers to implement BIMI and to do this in the right way.

The BIMI TXT record is always being fetched from the top level domain (example.org<https://urldefense.com/v3/__http:/example.org__;!!CQl3mcHX2A!QOleDIsQOkjN3HXlKrItrq62gf5-G3hak8l7aDR3RAX6gQqWqTVXcLfIwcPA3DMVHSX2WGk$>). I hope this is correct.

An IMAP flag would be nice, but I guess it will take quite some time until all email servers are supporting this. Something like a signed authentication results header would be nice, as long as it can be checked in a simple and efficient way. For example heavy cryptographic operations and looking up DNS records (for certificates, etc) would result in slow downs and increased battery usage when downloading many messages.

Currently, the authentication header inserted by the email server is just being trusted, but this relies on either inserting the header by the receiving email server or removing previous headers of intermediate email servers.

FairEmail will cache the logo for two weeks, which is the same as for favicons. IMHO this is a reasonable default, preventing logos from being fetched too often and still allowing to change the logo by the sender (which I guess won't happen too often).

I hope this clarifies things, else feel free to reply.

Marcel Bokhorst (author of FairEmail)


---------- Forwarded message ----------
From: "Brotman, Alex" <Alex_Brotman@comcast.com<mailto:Alex_Brotman@comcast.com>>
To: Trent Adams <tadams=40proofpoint.com@dmarc.ietf.org<mailto:40proofpoint.com@dmarc.ietf.org>>, "bimi@ietf.org<mailto:bimi@ietf.org>" <bimi@ietf.org<mailto:bimi@ietf.org>>
Cc:
Bcc:
Date: Thu, 29 Jul 2021 19:45:04 +0000
Subject: Re: [Bimi] Independent BIMI-capable Email Client
I do have that app, but I haven’t yet pointed it at a platform utilizing BIMI.  I’ll make a note to give it a try.

From below:


  *   They aren't entirely clear on how (or why) to evaluate a logo referenced by the BIMI record and the one retrieved from a VMC.

What about the BIMI-Location header instance, if present? (assuming you want to trust that header, etc).  After that, I’d probably use the VMC if present.  Should we add an evaluation path to the core document?


  *   It's also not all that clear where to retrieve the BIMI logo when the email is sent from a subdomain, and match that up with the DMARC results.

I’m not sure I follow the issue here.  Is there some example that shows the questionable path?


  *   There's also the question about whether or not an independent client can/should trust the authentication results performed by the mailbox provider when deciding to display the BIMI logo.

If you go back to -00 of the core spec, there was an IMAP flag that was meant to be set (Section 8.6).  That was removed in -01.  I don’t recall the justification, but may have had to do with MUA workload.  Seems like the IMAP flag could be reintroduced (POP3 would be an issue though).  Or perhaps something akin to a DKIM signature signed by the inbound MTA that could be verified by the MUA.  The latter could potentially be reused though?


  *   There is a non-zero addition of processing required by the client to handle BIMI, leading to the question about what impact this may have on a client... and what efficiencies can be introduced with local caching (if any).

I’d think at least equivalent to the TTL of the BIMI DNS record, perhaps even up to the expiration of the VMC (though I could understand where a domain holder could refresh their VMC and change logos, etc).  I’m sure there’s a better answer somewhere in between.


--
Alex Brotman
Sr. Engineer, Anti-Abuse & Messaging Policy
Comcast

From: bimi <bimi-bounces@ietf.org<mailto:bimi-bounces@ietf.org>> On Behalf Of Trent Adams
Sent: Friday, July 23, 2021 5:36 PM
To: bimi@ietf.org<mailto:bimi@ietf.org>
Subject: [Bimi] Independent BIMI-capable Email Client


Since Gmail's announcement, more companies are starting to play around with BIMI (no surprise there).  And, as expected, the increased attention is helping to put more eyeballs on the experiment.

And while some of the major mailbox providers are adding BIMI support to their own mobile clients, I ran into a FOSS project run by a developer in the Netherlands who has already added BIMI to their independent mobile mail client.

If you get a chance, I'd suggest taking a look at their FairEmail implementation as they made some interesting choices:

https://email.faircode.eu/<https://urldefense.com/v3/__https:/email.faircode.eu/__;!!CQl3mcHX2A!UUyJEN3_Ay0ac-Ux9txqVoPDIfnSSmOT5S-OCXjjRVeXJEEqrPRjGUg2a_oFLJHfdsADeC4$>

The current Android client package can be downloaded from their GitHub repository:

https://github.com/M66B/FairEmail/releases<https://urldefense.com/v3/__https:/github.com/M66B/FairEmail/releases__;!!CQl3mcHX2A!UUyJEN3_Ay0ac-Ux9txqVoPDIfnSSmOT5S-OCXjjRVeXJEEqrPRjGUg2a_oFLJHf2gwnAj4$>


So far, they've already found some useful results from their experiment.  And now we're finally at a point where we can test the architecture (and pressure-test the specifications) beyond the handful of usual suspects.

For example, here're a few issues this work as already surfaced when interpreting the specifications [1] [2] [3]:


  *   They aren't entirely clear on how (or why) to evaluate a logo referenced by the BIMI record and the one retrieved from a VMC.
  *   It's also not all that clear where to retrieve the BIMI logo when the email is sent from a subdomain, and match that up with the DMARC results.
  *   There's also the question about whether or not an independent client can/should trust the authentication results performed by the mailbox provider when deciding to display the BIMI logo.
  *   There is a non-zero addition of processing required by the client to handle BIMI, leading to the question about what impact this may have on a client... and what efficiencies can be introduced with local caching (if any).

What I found most interesting was how the specifications assume a tight coupling between the client and the mailbox provider.  It definitely opens the question of whether it's possible (or recommended) for an independent client to support BIMI even for email received by mailbox providers that don't support it.  It's real-world interop testing like this that I hope will highlight issues that need to be discussed as the experiment continues.

Also, if anyone would be willing to test the FairEmail client, I'd be keen to hear if you think that the way it leverages BIMI matches your expectations.  Also, are there any others out there that might contribute their learnings to the conversation?

Anyway, thanks for any feedback you may have.  It'll be useful to hash out ideas for improvements and next steps on the list.

Cheers,
Trent

[1] https://datatracker.ietf.org/doc/html/draft-blank-ietf-bimi-02<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-blank-ietf-bimi-02__;!!CQl3mcHX2A!UUyJEN3_Ay0ac-Ux9txqVoPDIfnSSmOT5S-OCXjjRVeXJEEqrPRjGUg2a_oFLJHfVUyABq4$>
[2] https://datatracker.ietf.org/doc/html/draft-fetch-validation-vmc-wchuang-00<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-fetch-validation-vmc-wchuang-00__;!!CQl3mcHX2A!UUyJEN3_Ay0ac-Ux9txqVoPDIfnSSmOT5S-OCXjjRVeXJEEqrPRjGUg2a_oFLJHfIMZn7Z8$>
[3] https://datatracker.ietf.org/doc/html/draft-brotman-ietf-bimi-guidance-03<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-brotman-ietf-bimi-guidance-03__;!!CQl3mcHX2A!UUyJEN3_Ay0ac-Ux9txqVoPDIfnSSmOT5S-OCXjjRVeXJEEqrPRjGUg2a_oFLJHfQyodXbk$>


--
J. Trent Adams
Director, Ecosystem Security
Proofpoint

tadams@proofpoint.com<mailto:tadams@proofpoint.com>

bimi mailing list
bimi@ietf.org<mailto:bimi@ietf.org>
https://www.ietf.org/mailman/listinfo/bimi<https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/bimi__;!!CQl3mcHX2A!QOleDIsQOkjN3HXlKrItrq62gf5-G3hak8l7aDR3RAX6gQqWqTVXcLfIwcPA3DMVB8lC6MU$>