Re: [dmarc-ietf] Ticket #55 - Clarify legal and privacy implications of failure reports

Douglas Foster <dougfoster.emailstandards@gmail.com> Sun, 03 January 2021 19:57 UTC

Return-Path: <dougfoster.emailstandards@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B6F73A113C for <dmarc@ietfa.amsl.com>; Sun, 3 Jan 2021 11:57:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.197
X-Spam-Level:
X-Spam-Status: No, score=-0.197 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7Cafq0Nx6yPQ for <dmarc@ietfa.amsl.com>; Sun, 3 Jan 2021 11:57:10 -0800 (PST)
Received: from mail-vk1-xa2d.google.com (mail-vk1-xa2d.google.com [IPv6:2607:f8b0:4864:20::a2d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C15D53A113B for <dmarc@ietf.org>; Sun, 3 Jan 2021 11:57:10 -0800 (PST)
Received: by mail-vk1-xa2d.google.com with SMTP id m145so5729155vke.7 for <dmarc@ietf.org>; Sun, 03 Jan 2021 11:57:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=MiaGd1kYgKCXzGzxEUeP2fSujSXP19rjm0iOzk/fs2Y=; b=r/uLcDWno/7VwRRT3+1cjJq2oA+kZdkhwf3hH61vq1d/j3UwyQLdBGWZRJ5d+SFMFQ s/p6Zr+DpONMH3vlaNrXf2+P2n+erGspD4miEKJ8LKjqPqRC9g41J67JIJQhKJYgzQE4 LRPorJCWqQpmLJeQr4W0uLf6OcYKcZlmD/qdpXfN/nMIUoMYBzFuI0kJEwircMddMlLT AbDuVxyRL/+zxXkYpM4Gzvmj+PJuRQRZRxEafI1rM6D2H0jNDWpls6qTED/qkaOtXxhQ 2Rk2X1q783axwobcF1y3WbrbGPVUc2ODHJ+1h3bLciMuW/jlK+PClOcmMz8Lkdi7lwi7 4ZNA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=MiaGd1kYgKCXzGzxEUeP2fSujSXP19rjm0iOzk/fs2Y=; b=V9adgaFPJE/EcgQe8m+mB2055YAFD37KMSgE941Hssk0v31/myCzS0Y9TMo974M0Iz zu0VyuYLt2zHR/W3il3QF9fQ1JfRqegLgUPAHruGip76GgOYLTLIX+7uC+PD8HGlTdiz YsPSfja31byWryvGeuNu2ZPXrv1+PTSsAV6fgWbJfFjGYnLvA4v2sWarx1pjmiDjz06j FLTBT8Yix1jMS2CbdaMNMGXz3eBhWhacSiZSkLhkWocWV9MUnfi85E/2BuJ6K/ATWFqE Vkn0s1LbKVQKYekLCO7SH5iSoaEZpMTXZUx73zpZZyJBmG48ss/1aqZ3tnPUWq5rzbI7 HUGw==
X-Gm-Message-State: AOAM533eaNAXXQQL9a9WrQzl9GP+MoshVmYZRWz5VHZOvVEcR+zsF+vx dj8mVkSM7f970ghZOXz7ZETDzNBTVcAlVEqHSTHdxI1oFbs=
X-Google-Smtp-Source: ABdhPJw3KlntQy4K8IYPUnPQMdQKW7ffxdJMeJlbasvyC/3pllvfvJfLti/nYvMoBKbo0frLL3kiaGF91xFzHFmie3E=
X-Received: by 2002:a1f:20d1:: with SMTP id g200mr42637771vkg.25.1609703829534; Sun, 03 Jan 2021 11:57:09 -0800 (PST)
MIME-Version: 1.0
References: <20201231160030.20AFB3EE7AD7@ary.qy> <4bd444a4-0c34-467a-cfcb-a8f7c14b723d@tana.it> <b030d1f-44d4-4330-eb17-c930eb968be2@taugh.com> <CAH48ZfzDkz4iS2k-+8_-zW-y4m+c1dhRMvPQZmpbLLG2KY0eGA@mail.gmail.com> <64c4ebd3-4e06-e12e-d072-7ae2562cf4e1@tana.it> <CAH48ZfzVkO_oxY1SjeWTqH9oUxHJaAsU2XKBZx-CQ9U0Ba8N0w@mail.gmail.com>
In-Reply-To: <CAH48ZfzVkO_oxY1SjeWTqH9oUxHJaAsU2XKBZx-CQ9U0Ba8N0w@mail.gmail.com>
From: Douglas Foster <dougfoster.emailstandards@gmail.com>
Date: Sun, 03 Jan 2021 14:56:59 -0500
Message-ID: <CAH48Zfwkxbi7pmmY15DKSRyCgc82jEUJ8hHRtvAQ9J3yJHy6_A@mail.gmail.com>
To: IETF DMARC WG <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000f3fb0005b80460bd"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/-B-jhg1Fe-qOexZmQOwb9LYrZuo>
Subject: Re: [dmarc-ietf] Ticket #55 - Clarify legal and privacy implications of failure reports
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Jan 2021 19:57:13 -0000

You can disagree about whether this wording is appropriate, but there
should be no disagreement about the scope problem.   We do not have a
protocol which can handle all situations, and much of our discussion is
caused by those who apply DMARC to situations where it does not work.

Lets define "legitimate mail" as used in my proposed text to mean "delivery
is desired by the intended recipient and the message contains nothing that
threatens the interest of the user, the interest of the user's network, or
the policies of the user's organization."   Perhaps this is too
restrictive, because it  excludes advertising which is harmless in its
intent but unwanted by the recipient.

What is clear is that by this definition, mailing list messages are
legitimate, and yet are incompatible with DMARC.  Similarly, messages which
are tagged with informational content by a spam filter and then forwarded
at the request of the primary recipient are also legitimate.  In both
cases, specific messages may be unwanted or hostile, but the class of
messages is wanted.

My exception language is still incomplete, because we have another class of
senders who ignore DMARC but are too important to block.    My list in that
category includes a U.S. government agency and two vendors of cloud-based
products for secure web relay.

We need to set appropriate expectations for product developers, email
gateway operators, and domain owners.    Otherwise we end up with wrong
assumptions which lead to products which mindlessly apply a disposition
without providing adequate exception mechanisms.

Address rewriting is NOT the optimal answer to the problem, because it
hides the forwarding operation without addressing the complications that
forwarding creates for correctly evaluating email reputation.

Email evaluation products need to handle all possible scenarios.  This
includes
- forwarded and not forwarded
- with and without SMTP rewrite
- with and without modification.
- with and without From rewrite
- with and without ARC sets
- whether the email header chain is accurately documented or fraudulently
fabricated.

The only way to handle all of these scenarios is for the email filter to
examine the entire chain of Received headers and other headers.   There is
no simple algorithm for performing this analysis.   There is an opportunity
for IETF to provide ways for legitimate MTAs to facilitate this process,
and ARC is a step in the right direction, but only a first step.

We may be able to promote DMARC adoption by overselling its capabilities,
but I do not see that as a good thing.

DF


On Sun, Jan 3, 2021 at 7:48 AM Douglas Foster <
dougfoster.emailstandards@gmail.com> wrote:

> But we do not have a comprehensive protocol, so we need to set appropriate
> expectations.
>
> I will define "legitimate mail" as used in my proposed text to mean
> "delivery is desired by the intended recipient and the message contains
> nothing that threatens the interest of the user, the interest of the user's
> network, or the policies of the user's organization."
>
> Either mailing list messages, as a class are legitimate, or not -- and we
> have concluded that they are.   (Indvidual messages could be in either
> category.)    Messages that are tagged by a spam filter and then forwarded
> to the recipients alternate mailbox are also legitimate.  We need to set
> appropriate expectations for product developers, email gateway operators,
> and domain owners. My exception language is actually still incomplete,
> because we have the category of senders who ignore DMARC but are too
> important to block.    My list in that category includes a U.S. government
> agency and two vendors of cloud-based email filtering software.
>
> DMARC FAIL can at best provide a data point for a filtering algorithm, as
> was stated in my interchange with Todd.   Claiming more than that will only
> result in misuse of DMARC concepts.
>
> There are real security issues to consider with forwarded mail.   Address
> rewriting hides some of them without solving the problems.   We need an
> in-depth assessment of how to evaluate forwarded mail.   Is this group the
> one to do it or is it assigned somewhere else?
>
> Doug Foster
>
> On Sun, Jan 3, 2021 at 5:50 AM Alessandro Vesely <vesely@tana.it> wrote:
>
>> On Sat 02/Jan/2021 19:53:41 +0100 Douglas Foster wrote:
>> > Regarding this section:
>> >
>> >     Experience with DMARC has revealed some issues of interoperability
>> >     with email in general that require due consideration before
>> >     deployment, particularly with configurations that can cause mail to
>> >     be rejected.  These are discussed in Section 9.
>> >
>> > I suggest replacing it with a scope statement, such as this:
>> >
>> > DMARC checks are applicable when a message is received directly from
>> > the domain owner, or received indirectly from a mediator without
>> > in-transit modification.  As discussed in Section 9, these two
>> > criteria do not cover all legitimate email flows.   When a message is
>> > received indirectly with modification, DMARC cannot produce a usable
>> > result, and the message should be evaluated using alternate criteria.
>> >   When messages may have been forwarded with modifications, the
>> > algorithm for distinguishing between authorized and unauthorized
>> > messages becomes difficult to define.
>>
>>
>> I disagree.  Limiting the applicability of DMARC is not going to boost
>> its
>> actionable usage.  The above wording boils down to suggesting a sequence
>> of
>> operations as follows:
>>
>> 1:  check SPF.  If not pass then the message is indirect.
>>
>> 2:  check DKIM.  If not pass then the message is with modification.
>> Hence
>> DMARC results are not usable.
>>
>>
>> That would nullify the whole protocol.
>>
>>
>> Best
>> Ale
>> --
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> _______________________________________________
>> dmarc mailing list
>> dmarc@ietf.org
>> https://www.ietf.org/mailman/listinfo/dmarc
>>
>