Re: [Bimi] Independent BIMI-capable Email Client

"Brotman, Alex" <Alex_Brotman@comcast.com> Thu, 29 July 2021 19:45 UTC

Return-Path: <Alex_Brotman@comcast.com>
X-Original-To: bimi@ietfa.amsl.com
Delivered-To: bimi@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 68AC73A1A90; Thu, 29 Jul 2021 12:45:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.996
X-Spam-Level:
X-Spam-Status: No, score=-1.996 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=comcast.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zYD9XJDBYdwV; Thu, 29 Jul 2021 12:45:26 -0700 (PDT)
Received: from mx0b-00143702.pphosted.com (mx0b-00143702.pphosted.com [148.163.141.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7C4113A198B; Thu, 29 Jul 2021 12:45:11 -0700 (PDT)
Received: from pps.filterd (m0184890.ppops.net [127.0.0.1]) by mx0b-00143702.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 16TJaoCG011224; Thu, 29 Jul 2021 15:45:09 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcast.com; h=from : to : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=20190412; bh=WQ/G14M0LX55yk0dqyHCQ/c82trHev9wb4Lun+R0l+g=; b=GNnIIdDZ7E7b2sVDgmo8aURlxpTK3g3aVYS0on/8I8m7jW6kg5zLyhMzv0ZB41jMduo0 wWTUEIcUm8n75rX/rJNUenUHPjopuqHqGHI63Semd5tJkgXR63OnH2/VrxW/yzf2p+62 5NJleHPxTVM6tyOSXRd06PoRHlvr2HyOKIOSkiYFXFycnmIQFY86tvDcoyKqT2MD/zJz SuoxhRodV+RUR64yGjg2F1dnN+1GRd9IRNSPFuOraScqaMHdJpaQWb57gpUdJVcCCe1w XBebSQ6QUfqcBNfREhAiFBKL7PB0ZlY7Bf3OCkv3Df8RAvp55PyPo5mFtKVEHTEnIS9i 6A==
Received: from copdcexop02.cable.comcast.com (dlppfpt-po-1p.slb.comcast.com [96.99.226.137]) by mx0b-00143702.pphosted.com with ESMTP id 3a3ry0d67a-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Thu, 29 Jul 2021 15:45:09 -0400
Received: from copdcexc33.cable.comcast.com (147.191.125.132) by COPDCEXOP02.cable.comcast.com (147.191.124.157) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.2.858.5; Thu, 29 Jul 2021 12:45:08 -0700
Received: from COPDCEXEDGE01.cable.comcast.com (96.114.158.213) by copdcexc33.cable.comcast.com (147.191.125.132) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2242.12 via Frontend Transport; Thu, 29 Jul 2021 13:45:07 -0600
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (104.47.58.173) by webmail.comcast.com (96.114.158.213) with Microsoft SMTP Server (TLS) id 15.0.1497.23; Thu, 29 Jul 2021 13:45:06 -0600
Received: from MN2PR11MB4351.namprd11.prod.outlook.com (2603:10b6:208:193::31) by MN2PR11MB4742.namprd11.prod.outlook.com (2603:10b6:208:26b::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4373.21; Thu, 29 Jul 2021 19:45:05 +0000
Received: from MN2PR11MB4351.namprd11.prod.outlook.com ([fe80::cddd:25b1:344d:8818]) by MN2PR11MB4351.namprd11.prod.outlook.com ([fe80::cddd:25b1:344d:8818%5]) with mapi id 15.20.4373.022; Thu, 29 Jul 2021 19:45:04 +0000
From: "Brotman, Alex" <Alex_Brotman@comcast.com>
To: Trent Adams <tadams=40proofpoint.com@dmarc.ietf.org>, "bimi@ietf.org" <bimi@ietf.org>
Thread-Topic: Independent BIMI-capable Email Client
Thread-Index: AQHXgAq033cwP/0NfUCQ5FMqvSV4WataXbjQ
Date: Thu, 29 Jul 2021 19:45:04 +0000
Message-ID: <MN2PR11MB43516C9DFBD27BEDCD6B1296F7EB9@MN2PR11MB4351.namprd11.prod.outlook.com>
References: <2C1CE07A-2FC9-4278-8F00-4613E4966F1F@proofpoint.com>
In-Reply-To: <2C1CE07A-2FC9-4278-8F00-4613E4966F1F@proofpoint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dmarc.ietf.org; dkim=none (message not signed) header.d=none; dmarc.ietf.org; dmarc=none action=none header.from=comcast.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0a08e5b5-4695-44dd-3362-08d952c95ce1
x-ms-traffictypediagnostic: MN2PR11MB4742:
x-microsoft-antispam-prvs: <MN2PR11MB4742440223AFD5F12932742FF7EB9@MN2PR11MB4742.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR11MB4351.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(376002)(346002)(136003)(39860400002)(396003)(66476007)(76116006)(66556008)(66446008)(966005)(66946007)(64756008)(110136005)(3480700007)(316002)(478600001)(186003)(52536014)(2906002)(33656002)(8936002)(86362001)(5660300002)(55016002)(71200400001)(6506007)(53546011)(166002)(8676002)(7696005)(122000001)(38070700005)(9686003)(38100700002)(83380400001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZlM2yzNlZbbXaqo+6pP/uofkEM5gkdEm7OkKME66aylAmJUMf2KrLp3iUAFgA3NEc5WfsYeM+bs3EpfF/AUucCN4ZWJD75eAK5feRaVxz+xp3aWxkIgQBKZPfDH44P91xX+5QVOdc9T/fLRQy94W2ePoFc8SCmyJLFGewxr5CW26n6bYLOiZ0Z90FRDNj92PJif2VCY8AjfT5XJEGg2kxsxQ55Km76qDZCWwu5Fpnr1VOWoPP5NvLuzO26W8A1xWAVTcZ61i2M2pZRyEkyRmYLSfQLJ05xuoNhsEMRNHLsNxn7W7jeSR6bbLIAsamATyBoTEQfzht0XZ7pugs7s5Yw==
arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=LEhiwQ49TwCLG5pFM6xCnoWc7q/bauIWX85QwlT7XaY=; b=Ysko1ywkQPg8PirYwgNfEmOrhXEsaHSWFuoja/NGOs+3qYtw+fBQPFbtt4Hq2+OGwI0iis72JpPFd60TXfn3ZZ78rfbE+qKQI0ZqS0gT9xqFe1zMzqgYg7FEFvp/gNubMvYIaltlWDAC9xgLTvLIXNtgGiQfUe1QwQKM74lY5QOhziiMpCbAbTatpQ0jvTLdIkrnVBFlrgVITAkHSId4gLq73NrdK9fl/RuMk5FSRSapmhMscg0AjTAJ11kGoqlxxAzS0hGSBCUIRS38PHWFYm37w8VDofpUGlSfS4nNtPUpdBI+/yOa09xf4SoiURHqFW5nrvPZg5AJku5yGoJQ/g==
arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=comcast.com; dmarc=pass action=none header.from=comcast.com; dkim=pass header.d=comcast.com; arc=none
x-ms-exchange-crosstenant-authas: Internal
x-ms-exchange-crosstenant-authsource: MN2PR11MB4351.namprd11.prod.outlook.com
x-ms-exchange-crosstenant-network-message-id: 0a08e5b5-4695-44dd-3362-08d952c95ce1
x-ms-exchange-crosstenant-originalarrivaltime: 29 Jul 2021 19:45:04.7453 (UTC)
x-ms-exchange-crosstenant-fromentityheader: Hosted
x-ms-exchange-crosstenant-id: 906aefe9-76a7-4f65-b82d-5ec20775d5aa
x-ms-exchange-crosstenant-mailboxtype: HOSTED
x-ms-exchange-crosstenant-userprincipalname: q8M4HMY8xV3AkNiFPEl1Ffno6f2o9ydAgmOoEFi/Y6MMEShHabGRPNa/aY7Is35MAgWNBn2m93XZ3xrl8fIPPOY8spcaR/U6MIgE3Zqha6U=
x-ms-exchange-transport-crosstenantheadersstamped: MN2PR11MB4742
x-originatororg: comcast.com
Content-Type: multipart/alternative; boundary="_000_MN2PR11MB43516C9DFBD27BEDCD6B1296F7EB9MN2PR11MB4351namp_"
MIME-Version: 1.0
X-CFilter-Loop: Forward AAETWC
X-Proofpoint-GUID: oxGpiR8SdYHB_GohfbRUaryPy2U54V6z
X-Proofpoint-ORIG-GUID: oxGpiR8SdYHB_GohfbRUaryPy2U54V6z
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-07-29_16:2021-07-29, 2021-07-29 signatures=0
X-Proofpoint-Spam-Reason: safe
Archived-At: <https://mailarchive.ietf.org/arch/msg/bimi/kKUqBc4tk7zwHsJ5iaCLLLm_Ox8>
Subject: Re: [Bimi] Independent BIMI-capable Email Client
X-BeenThere: bimi@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Brand Indicators for Message Identification <bimi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bimi>, <mailto:bimi-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bimi/>
List-Post: <mailto:bimi@ietf.org>
List-Help: <mailto:bimi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bimi>, <mailto:bimi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Jul 2021 19:45:39 -0000

I do have that app, but I haven’t yet pointed it at a platform utilizing BIMI.  I’ll make a note to give it a try.

From below:


  *   They aren't entirely clear on how (or why) to evaluate a logo referenced by the BIMI record and the one retrieved from a VMC.

What about the BIMI-Location header instance, if present? (assuming you want to trust that header, etc).  After that, I’d probably use the VMC if present.  Should we add an evaluation path to the core document?


  *   It's also not all that clear where to retrieve the BIMI logo when the email is sent from a subdomain, and match that up with the DMARC results.

I’m not sure I follow the issue here.  Is there some example that shows the questionable path?


  *   There's also the question about whether or not an independent client can/should trust the authentication results performed by the mailbox provider when deciding to display the BIMI logo.

If you go back to -00 of the core spec, there was an IMAP flag that was meant to be set (Section 8.6).  That was removed in -01.  I don’t recall the justification, but may have had to do with MUA workload.  Seems like the IMAP flag could be reintroduced (POP3 would be an issue though).  Or perhaps something akin to a DKIM signature signed by the inbound MTA that could be verified by the MUA.  The latter could potentially be reused though?


  *   There is a non-zero addition of processing required by the client to handle BIMI, leading to the question about what impact this may have on a client... and what efficiencies can be introduced with local caching (if any).

I’d think at least equivalent to the TTL of the BIMI DNS record, perhaps even up to the expiration of the VMC (though I could understand where a domain holder could refresh their VMC and change logos, etc).  I’m sure there’s a better answer somewhere in between.


--
Alex Brotman
Sr. Engineer, Anti-Abuse & Messaging Policy
Comcast

From: bimi <bimi-bounces@ietf.org> On Behalf Of Trent Adams
Sent: Friday, July 23, 2021 5:36 PM
To: bimi@ietf.org
Subject: [Bimi] Independent BIMI-capable Email Client


Since Gmail's announcement, more companies are starting to play around with BIMI (no surprise there).  And, as expected, the increased attention is helping to put more eyeballs on the experiment.

And while some of the major mailbox providers are adding BIMI support to their own mobile clients, I ran into a FOSS project run by a developer in the Netherlands who has already added BIMI to their independent mobile mail client.

If you get a chance, I'd suggest taking a look at their FairEmail implementation as they made some interesting choices:

https://email.faircode.eu/<https://urldefense.com/v3/__https:/email.faircode.eu/__;!!CQl3mcHX2A!UUyJEN3_Ay0ac-Ux9txqVoPDIfnSSmOT5S-OCXjjRVeXJEEqrPRjGUg2a_oFLJHfdsADeC4$>

The current Android client package can be downloaded from their GitHub repository:

https://github.com/M66B/FairEmail/releases<https://urldefense.com/v3/__https:/github.com/M66B/FairEmail/releases__;!!CQl3mcHX2A!UUyJEN3_Ay0ac-Ux9txqVoPDIfnSSmOT5S-OCXjjRVeXJEEqrPRjGUg2a_oFLJHf2gwnAj4$>


So far, they've already found some useful results from their experiment.  And now we're finally at a point where we can test the architecture (and pressure-test the specifications) beyond the handful of usual suspects.

For example, here're a few issues this work as already surfaced when interpreting the specifications [1] [2] [3]:


  *   They aren't entirely clear on how (or why) to evaluate a logo referenced by the BIMI record and the one retrieved from a VMC.
  *   It's also not all that clear where to retrieve the BIMI logo when the email is sent from a subdomain, and match that up with the DMARC results.
  *   There's also the question about whether or not an independent client can/should trust the authentication results performed by the mailbox provider when deciding to display the BIMI logo.
  *   There is a non-zero addition of processing required by the client to handle BIMI, leading to the question about what impact this may have on a client... and what efficiencies can be introduced with local caching (if any).

What I found most interesting was how the specifications assume a tight coupling between the client and the mailbox provider.  It definitely opens the question of whether it's possible (or recommended) for an independent client to support BIMI even for email received by mailbox providers that don't support it.  It's real-world interop testing like this that I hope will highlight issues that need to be discussed as the experiment continues.

Also, if anyone would be willing to test the FairEmail client, I'd be keen to hear if you think that the way it leverages BIMI matches your expectations.  Also, are there any others out there that might contribute their learnings to the conversation?

Anyway, thanks for any feedback you may have.  It'll be useful to hash out ideas for improvements and next steps on the list.

Cheers,
Trent

[1] https://datatracker.ietf.org/doc/html/draft-blank-ietf-bimi-02<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-blank-ietf-bimi-02__;!!CQl3mcHX2A!UUyJEN3_Ay0ac-Ux9txqVoPDIfnSSmOT5S-OCXjjRVeXJEEqrPRjGUg2a_oFLJHfVUyABq4$>
[2] https://datatracker.ietf.org/doc/html/draft-fetch-validation-vmc-wchuang-00<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-fetch-validation-vmc-wchuang-00__;!!CQl3mcHX2A!UUyJEN3_Ay0ac-Ux9txqVoPDIfnSSmOT5S-OCXjjRVeXJEEqrPRjGUg2a_oFLJHfIMZn7Z8$>
[3] https://datatracker.ietf.org/doc/html/draft-brotman-ietf-bimi-guidance-03<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-brotman-ietf-bimi-guidance-03__;!!CQl3mcHX2A!UUyJEN3_Ay0ac-Ux9txqVoPDIfnSSmOT5S-OCXjjRVeXJEEqrPRjGUg2a_oFLJHfQyodXbk$>


--
J. Trent Adams
Director, Ecosystem Security
Proofpoint

tadams@proofpoint.com<mailto:tadams@proofpoint.com>