Re: [dmarc-ietf] not really such a thing as AOL-compatible mailing lists

Hector Santos <hsantos@isdg.net> Mon, 10 April 2023 19:05 UTC

Return-Path: <hsantos@isdg.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8C507C151549 for <dmarc@ietfa.amsl.com>; Mon, 10 Apr 2023 12:05:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=isdg.net header.b="eqc453e0"; dkim=pass (1024-bit key) header.d=beta.winserver.com header.b="yAi+6OVl"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P9syXmBoJNLe for <dmarc@ietfa.amsl.com>; Mon, 10 Apr 2023 12:05:01 -0700 (PDT)
Received: from mail.winserver.com (mail.winserver.com [3.137.120.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CC90EC14CE5D for <dmarc@ietf.org>; Mon, 10 Apr 2023 12:05:00 -0700 (PDT)
DKIM-Signature: v=1; d=isdg.net; s=tms1; a=rsa-sha256; c=simple/relaxed; l=1709; t=1681153492; atps=ietf.org; atpsh=sha1; h=Received:Received:Received:Received:From:Subject:Date: Message-Id:To:Organization:List-ID; bh=R1H6/sOW4AXPBqeGaoX1wzny8 x4bcL0YkeTQQjzMSwE=; b=eqc453e07x0vq1r+z9Bv1VC406Guml1xZVPQXu/2T CqgU+DUIJLfz0swvVW6TGbp/wDgXTpbHtVyE9gwL2dMR1vtmypMs9xUhLR+FdZvt gmyu2ZWEpUsTFai10Sm7iSAIawHw25CCzehQmn25g/mG69pwchpExusQIdx0QW1L ZE=
Received: by winserver.com (Wildcat! SMTP Router v8.0.454.13) for dmarc@ietf.org; Mon, 10 Apr 2023 15:04:52 -0400
Authentication-Results: dkim.winserver.com; dkim=pass header.d=beta.winserver.com header.s=tms1 header.i=beta.winserver.com; dmarc=pass policy=reject author.d=isdg.net signer.d=beta.winserver.com (atps signer);
Received: from beta.winserver.com ([3.132.92.116]) by winserver.com (Wildcat! SMTP v8.0.454.13) with ESMTP id 1546293863.1.6500; Mon, 10 Apr 2023 15:04:51 -0400
DKIM-Signature: v=1; d=beta.winserver.com; s=tms1; a=rsa-sha256; c=simple/relaxed; l=1709; t=1681153489; h=Received:Received:From: Subject:Date:Message-Id:To:Organization:List-ID; bh=R1H6/sOW4AXP BqeGaoX1wzny8x4bcL0YkeTQQjzMSwE=; b=yAi+6OVl/hLdBh8PE0QlMfwV4waN LdU065IHZUefQbRqle41U14AHdVE1MzQXHiJyQCTQhWPfzVR9HgOTB/ZW+oqMzMp lPKm7sRv4P0SO2ZmNPQormib+kl1py5VUnKPlGTDESmwSeuFx3Hh0TE8SuRJtPvg YJtrQr2REMgBWYk=
Received: by beta.winserver.com (Wildcat! SMTP Router v8.0.454.12) for dmarc@ietf.org; Mon, 10 Apr 2023 15:04:49 -0400
Received: from smtpclient.apple ([99.122.210.89]) by beta.winserver.com (Wildcat! SMTP v8.0.454.12) with ESMTP id 1992329910.1.10000; Mon, 10 Apr 2023 15:04:48 -0400
From: Hector Santos <hsantos@isdg.net>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.400.51.1.1\))
Date: Mon, 10 Apr 2023 15:04:37 -0400
In-Reply-To: <CAL0qLwZAxRSbTS=otNbnyXgtSp0wRX271LVHy+k=JroraEoaMQ@mail.gmail.com>
Cc: dmarc@ietf.org
References: <CAAFsWK2ijsnfm5UpL-ZUKLmFuDdO2jOVmF-U2_DR_iV2Ok8TCw@mail.gmail.com> <20230410151501.E35A7BEC6F07@ary.qy> <CAL0qLwZAxRSbTS=otNbnyXgtSp0wRX271LVHy+k=JroraEoaMQ@mail.gmail.com>
Message-Id: <D9CC1C48-E4CA-497E-8211-7634C41217E5@isdg.net>
X-Mailer: Apple Mail (2.3731.400.51.1.1)
X-Comment: Missing recipient address appended by wcSMTP router.
To: dmarc@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/5DZvOUhdlU56Ej7DVpXL6_BU1KI>
Subject: Re: [dmarc-ietf] not really such a thing as AOL-compatible mailing lists
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Apr 2023 19:05:05 -0000


> On Apr 10, 2023, at 12:55 PM, Murray S. Kucherawy <superuser@gmail.com> wrote:
> 
> I think the one thing we haven't discussed is: Could the 80-20 rule apply here?  That is, if we start off with something like what draft-kucherawy-dkim-transform proposed (or even a trivial subset of it), might it make enough of a dent to get us through this stalemate, and then we can figure out what to do with the rest of it?
> 

Speaking of Pareto:

- DMARC covers only 22% of the full ranges of signature scenarios with no provision to define nor authorize 3rd party (re)signers. 

- Occam’s Razor,  the solution is often more simpler than its often appears, 80% of the time — ATPS.  Your Idea. Champion it and it will get supported by your peers.   Want to try inline method?  Fine. But explain why more complexity is better to reach same conclusion ATPS provides.  Best option; support both to cover the different admin methods.

- 80% of those who have been involved since MARID with LMAP, SPF, DKIM/, SSP, ADSP and "Super ADSP” DMARC are disillusioned why the IETF has allowed the same key cogs over 17 years to continue to perpetuate a broken protocol and problem when they never believed in SPF, ADSP and DMARC — their focus was Reputation modeling with no standard in place for an assessment lookup (opening a door for business interest).

This is not about heuristics.  We should first close the deterministic holes by providing domains a method to expose their 1st vs 3rd party expectations.  DMARC is not a protocol complete when it comes to domain policies.

Too many closes. 80%???

—
HLS