Re: [dmarc-ietf] PSD simplification

"John R Levine" <johnl@taugh.com> Wed, 12 December 2018 17:47 UTC

Return-Path: <johnl@taugh.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAF291288EB for <dmarc@ietfa.amsl.com>; Wed, 12 Dec 2018 09:47:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=JahHMRLx; dkim=pass (1536-bit key) header.d=taugh.com header.b=wVZDAfkA
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DZVNUdxgQqHA for <dmarc@ietfa.amsl.com>; Wed, 12 Dec 2018 09:47:19 -0800 (PST)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3FD031277BB for <dmarc@ietf.org>; Wed, 12 Dec 2018 09:47:19 -0800 (PST)
Received: (qmail 58319 invoked from network); 12 Dec 2018 17:47:16 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent; s=e3cb.5c1149a4.k1812; bh=I0BQvEzsM6P/GEGrO+Fk/H7vdAA/OhO9MnbohL35s6s=; b=JahHMRLxmppVGFjIMtlNMcJG23VT3xOOMVEi/XcGUUq9Xd9bSA3CNaC3EfmzgFr2vex7nEcssRSCPV1H9rlfO0LgOAgIJFIFET3TkNh9bIXrtsFLBxgouz/wcti309jwp4LadqMlMONb+XTC496b23qLys1mHWOOKgwnVTQt3AcDg3eP81f5TBOcSvlhH/Qh+i/fv2OFWClmhS2jTM/6tB7x4fdj2CtkPhKXPj8Hx5fMuVk1lI++4lrwgL6PLmgp
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent; s=e3cb.5c1149a4.k1812; bh=I0BQvEzsM6P/GEGrO+Fk/H7vdAA/OhO9MnbohL35s6s=; b=wVZDAfkA+PYdQ1RMRs1jErna9C/nzcHCh3kNwQYDhxU98AnGydszIKZa2GaQQCLEIIfj2nLfrpZDcbmuE8azyw91LE3UtS8laR5VM64AM2M/Nz+Vy4H/51p0jCTvz0CfYq3Hli9ralXBeiu+glFH0pXxKrSoAxewRoskEIWH1nA+NwxpCG0uI1j2GdEIrGwOEdXS1CM0l6ix6/cG3Ayk6Jc4ycIsqe4/JIT9HmQppAfb4ztYWN5plpraL2TVyVN3
Received: from localhost ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTPS (TLS1.2/X.509/AEAD) via TCP6; 12 Dec 2018 17:47:16 -0000
Date: Wed, 12 Dec 2018 12:47:16 -0500
Message-ID: <alpine.OSX.2.21.1812121239060.8453@ary.qy>
From: John R Levine <johnl@taugh.com>
To: dcrocker@bbiw.net
Cc: dmarc@ietf.org
In-Reply-To: <67d0e491-9e87-0219-cb94-e8e897daeff9@dcrocker.net>
References: <20181212165914.36A76200B6363D@ary.qy> <67d0e491-9e87-0219-cb94-e8e897daeff9@dcrocker.net>
User-Agent: Alpine 2.21 (OSX 202 2017-01-01)
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"; format="flowed"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/3GyIL2bCrZUEjzL8VQnuDWjQXRo>
Subject: Re: [dmarc-ietf] PSD simplification
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Dec 2018 17:47:22 -0000

On Wed, 12 Dec 2018, Dave Crocker wrote:
>>  we used a DNS scheme like my DBOUND one, whoever runs the DNS policy
>>  server can see all the queries and will have some idea of the mail
>>  traffic from various names.  This approach doesn't have that problem.
>
> 1. Doesn't the query to the registry suffer the same risk?
>
> 2. I'm not sure what a "DNS policy server" is.  I'm guessing it's meant as a 
> DNS server that contains the dbound-ish records?

For #2, that's right.  For #1, my DBOUND scheme does a lookup which 
includes the full name, e,g, if you're checking the boundary for 
foo.bar.com it looks up foo.bar._dbound.com.  It will likely be 
matched by a wildcard *._dbound.com, but the query's in the logs.  With 
your scheme it just looks up _dmarc.com.

> 3. Given queries for MX record, don't we already have massive exposure of 
> this privacy-related info in DNS activity?  How would this be so much more 
> (and/or worse)?

Particularly with large passive DNS databases, you're right.  I believe 
that Scott's point was that we can try not to make it worse.

>>  a lot of mail.  (Real mail, they're the county govermnent.)  This is
>>  easily addressed by clients ignoring the report advice in the OD
>>  parent record.
>
> What does it mean for a /client/ to ignore the advice in the OD parent 
> record?  I thought that record was for servers.

I meant the DNS client, which is likely to be the mail server receiving a 
message.

> This invites an exercise at writing a policy directive to characterize the 
> types of TLDs that are good candidates for saying yes and those that are good 
> candidates for saying no.  The most useful part of such a document would be 
> charactizing 'types' of registries...

That's already done.  Some limit registrations to identified members of a 
community, some don't.  You can argue how well those limits are enforced 
(what am I doing with names in .aero and .travel?) but the principle is 
clear enough.

Regards,
John Levine, johnl@taugh.com, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail. https://jl.ly