Re: [dmarc-ietf] PSD Related Privacy Considerations For Aggregate Reporting Draft

Todd Herr <todd.herr@valimail.com> Fri, 03 February 2023 14:31 UTC

Return-Path: <todd.herr@valimail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D96E8C19E112 for <dmarc@ietfa.amsl.com>; Fri, 3 Feb 2023 06:31:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.095
X-Spam-Level:
X-Spam-Status: No, score=-7.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=valimail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lzw6F-teVzwK for <dmarc@ietfa.amsl.com>; Fri, 3 Feb 2023 06:31:49 -0800 (PST)
Received: from mail-pj1-x102c.google.com (mail-pj1-x102c.google.com [IPv6:2607:f8b0:4864:20::102c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8E1E7C14F724 for <dmarc@ietf.org>; Fri, 3 Feb 2023 06:31:49 -0800 (PST)
Received: by mail-pj1-x102c.google.com with SMTP id nm12-20020a17090b19cc00b0022c2155cc0bso5119051pjb.4 for <dmarc@ietf.org>; Fri, 03 Feb 2023 06:31:49 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=valimail.com; s=google2048; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=O9FknKh7qE1uKIkBTecg5m/G6+5OwBDumdIz8puMgRM=; b=QZk+AS53ep0Zp8SVZ8ePbd5llzfEo/V2OktodILrKhsPwCKyHlEiIV2iP2QLX76/nS l8cxn1AvzQQ7BCWHYIn/5PM8lJ6DIkf1wZS0DGvdIR20e8JVv7ub41kR+urZ8DRByygC jj6z2jE0W8sW02ZM5cfiV5PPaUiLaI+Ck5aE12pzj42kN3IEnLA0M2hOgqVu4RWIHCJI zNc7H+f9VsE6ovbKHjTPJNnxx8CY6FzLZVdcMWqv4MwJuBgGCfMPvZVO7AEH7E1z0qIP fIVfuateqVVdlSrzHBVK+mVxy3JWSlsqrf8+twS2LYh/PwU/SoW1QHUPv1UCqt05um58 /8JQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=O9FknKh7qE1uKIkBTecg5m/G6+5OwBDumdIz8puMgRM=; b=7qq4NH2775IMJCHdwCN7R4RN/J8IgsWEOX2x8kmN31IWtoAYYVeFJSp0cagv7tyTPU jOZW/Hm22cdU/ioaq6ZTj/ZtB8nNktS9Hc5Mr++ePkt3dADKGPCiyzyDh78QxXZY8OeA 3zv2b3mEx8NAUOKxpS0AMb2JwI0lvG1A54RyIaxIE9SQompTprDhb+3nd8YVxBNBAIq7 2fxRj5eNn/Uw3br4SmK+YMwysXWCww2WYTrTRCE2DeHpHC6x90cp/K1WhpuzQAQSj+hb rMAtale22JXSU4V+ROjn0z58E1Zxdg8b8PQYp/7o9PxBak/sG8oQROR6CW6uD8tTBavU MCKQ==
X-Gm-Message-State: AO0yUKU2vf45jDyQ0PTfPbmlE8XwGtNPmmcVf5DL1etG6Drjxzf41Xt/ S3b1FlmH3xdTfFqGaJ3uLU6mW+UMJFJiMhoXp7BzwPWKKh72JtmI
X-Google-Smtp-Source: AK7set+6voaCog1n2OWdqQ7nfXSktjQU4O/7b1blGmmdJsfvwliOsXC+FgodQzdXRbu+ICgZUrOCSgaV+6dASPV+zWA=
X-Received: by 2002:a17:90b:3749:b0:22c:9a8a:42b8 with SMTP id ne9-20020a17090b374900b0022c9a8a42b8mr1442562pjb.11.1675434708615; Fri, 03 Feb 2023 06:31:48 -0800 (PST)
MIME-Version: 1.0
References: <11529029.Y877iPkkNG@zini-1880> <MN2PR11MB43510C0C3C2B94846144F102F7EA9@MN2PR11MB4351.namprd11.prod.outlook.com> <CABZJ8k=Rkh9+AoDA+N2tawU+GkizNRS-MG14sRayYHWBmFP62A@mail.gmail.com> <CAH48Zfy8eqoXhqEZCe8GGSDvTccYiBi0ETipfWRMvNuTEqy-_w@mail.gmail.com> <CAHej_8=mDe15Soyt-VN7Sb_==8ggXQPJ=8a9vkdC1-PYJS-PWg@mail.gmail.com> <CAH48ZfxKY7ZPo0K=SBQxr1frMPvijjR1wuw+xGZ7wbjNjvYZrg@mail.gmail.com> <CAH48Zfyn0gckyrjwmSjF_hMMVhJuCK0ipWq=7pUVzmwzRSfS9w@mail.gmail.com>
In-Reply-To: <CAH48Zfyn0gckyrjwmSjF_hMMVhJuCK0ipWq=7pUVzmwzRSfS9w@mail.gmail.com>
From: Todd Herr <todd.herr@valimail.com>
Date: Fri, 03 Feb 2023 09:31:32 -0500
Message-ID: <CAHej_8nZnFdM04Ss6kN+9BkGbB2gnLC4jn69xBKkoJv6Khk_Qw@mail.gmail.com>
To: IETF DMARC WG <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000a6e95d05f3cc8ad3"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/4kEjSWNvzyQimpkyV3bsCFrGT80>
Subject: Re: [dmarc-ietf] PSD Related Privacy Considerations For Aggregate Reporting Draft
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Feb 2023 14:31:53 -0000

On Fri, Feb 3, 2023 at 3:35 AM Douglas Foster <
dougfoster.emailstandards@gmail.com> wrote:

> Time to eat crow.
>
> You are right, the RFC5322.From address is the default Reply-To.   The
> rest of the argument stands.
>

I'm at a bit of a loss to understand what argument you're making here. I'm
going to answer on the assumption that your argument is "People send mail
with non-existent RFC5322.From domains all the time, and that mail is
wanted mail, and also the np tag shouldn't exist."

Apologies if that's not your argument. If that's the case, please describe
your argument and I'll reply again.

>
> So let's do a simple test on real mail:    Somebody implement the proposed
> NP test to detect non-existent subdomains of legitimate mail.   Don't count
> messages that are rejected because of NXDOMAIN on the SPF policy lookup.
>  Don't count messages that are rejected because of DMARC QUARANTINE or
> REJECT.   That leaves messages with these characteristics:
>

I don't understand your use of the phrase "NP test to detect non-existent
subdomains of legitimate mail". The np tag is defined as a policy assertion
for non-existent subdomains of the domain publishing a DMARC record, one
that should be applied to messages using non-existent subdomains that fail
DMARC validation checks. As I've stated before, I don't believe messages
using a non-existent domain as their RFC5322.From domain (or RFC5321.From
domain, for that matter) don't deserve the privilege of being accepted, but
I haven't had a say in such matters since 2010. For the purposes of this
message, I'll agree to the stipulation that I'm wrong on this topic, and
that messages using non-existent domains in either From header are worthy
of being accepted.

> - MailFrom domain exists
> - From organization domain exists
> - From domain does not exist based on your NP language, or any other
> non-replyable rule you want to use.
>

Section 3.2.6 of DMARCbis, titled "Non-existent Domains", reads in its
entirety:

"For DMARC purposes, a non-existent domain is consistent with the term's
meaning as described in [RFC8020 <https://www.rfc-editor.org/info/rfc8020>].
That is, if the response code received for a query for a domain name is
NXDOMAIN, then the domain name and all the names under it do not exist."

That's not my language.

So, we're at a state where the RFC5322.From domain does not exist, and the
DMARC policy to be used for this message must come from a domain above it
in the DNS hierarchy, because _dmarc.RFC5322.From.domain cannot exist based
on RFC8020.

Process between 1000 and 1,000,000 messages and review the ones that are
> flagged by your test.   Report (a) number of messages flagged as suspicious
> based on your  rule, and (b) number of unwanted messages flagged within
> that group.    My testing indicates that the (a) group will be small and
> the (b) group will be very close to zero.
>
> The reality is that attackers have very little reason to attack a
> non-existent subdomain, because they always have existent subdomains that
> will be more promising targets because they are real.    If they do start
> attacking non-existent subdomains, there are existing options to defend:
>
> - To protect non-existent subdomains only, without affecting mailing
> lists:   use domain-level p=none policies on all subdomains that send mail,
> and sp=reject on the organization domain.
>

This option cannot be implemented, as one cannot publish a domain-level
p=none policy on a non-existent subdomain that sends mail.
_dmarc.RFC5322.From.domain cannot exist if RFC5322.From.domain does not
exist in the DNS. This would require that the 'sp' tag be applied to the
non-existent subdomain, and sp=reject would only apply to those messages
that fail DMARC authentication checks. In your scenario, I'm presuming that
the message would pass DMARC authentication checks, because there's a DMARC
policy published at the org domain, and either the MailFrom domain or the
DKIM signing domain aligns with the non-existent RFC5322.From domain and
SPF or DKIM passes. Is my understanding of your scenario correct?

Understand too that "p=none" even if it could be published for this
non-existent domain is not a guarantee that a message will be accepted even
if it fails DMARC authentication checks. "p=none" effectively means "Don't
take the DMARC authentication results into account as part of your message
disposition decision, which doubtless include many factors other than the
DMARC validation results. I understand that that decision can still be
'deliver to spam', 'reject', or anything you deem appropriate, based on
those many other factors."

>
> - To protect all subdomains:  use sp=reject on the organization domain.
>

This is the only option that will apply to non-existent subdomains in the
absence of an np tag. Again though, sp=reject would only apply to those
messages using a non-existent RFC5322.From domain if those messages don't
pass DMARC validation checks.
-- 

*Todd Herr * | Technical Director, Standards and Ecosystem
*e:* todd.herr@valimail.com
*m:* 703.220.4153

This email and all data transmitted with it contains confidential and/or
proprietary information intended solely for the use of individual(s)
authorized to receive it. If you are not an intended and authorized
recipient you are hereby notified of any use, disclosure, copying or
distribution of the information included in this transmission is prohibited
and may be unlawful. Please immediately notify the sender by replying to
this email and then delete it from your system.