Re: [dmarc-ietf] Signaling MLMs

Douglas Foster <dougfoster.emailstandards@gmail.com> Sat, 15 April 2023 16:35 UTC

Return-Path: <dougfoster.emailstandards@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 02ED9C15154C for <dmarc@ietfa.amsl.com>; Sat, 15 Apr 2023 09:35:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.094
X-Spam-Level:
X-Spam-Status: No, score=-2.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tqjt14ab-UE7 for <dmarc@ietfa.amsl.com>; Sat, 15 Apr 2023 09:35:26 -0700 (PDT)
Received: from mail-lj1-x22b.google.com (mail-lj1-x22b.google.com [IPv6:2a00:1450:4864:20::22b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2A627C151522 for <dmarc@ietf.org>; Sat, 15 Apr 2023 09:35:26 -0700 (PDT)
Received: by mail-lj1-x22b.google.com with SMTP id k15so4152511ljq.4 for <dmarc@ietf.org>; Sat, 15 Apr 2023 09:35:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1681576524; x=1684168524; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=5pT/1ZvuN9d05xnRlvG0wlwUFcTVTnBBLLrplC5vdiE=; b=VJzINee6xi8FDc03ROM0f+nRqGWFbpNv9zp+VAC643akv8TdV63X4Qj0xdg/QVetmH v8xWeJxUD6K/O9Rty0eS2E2Ty/b9r8xMKlr5voYsXpewSgR5TEAVs+dwrLMnDLw0EU9r 7rqkkWCZVMmdMWpkEboZVEY0T1P58vkwPcfzvAYISq8CE1zwDvxa7GY3pPdrRcSLpCf5 +LuUvXSH7lVoprXFAhhKXSq4Dayi+BByrLdmzbQhcsZcQlFOXnShPyBD2Hss7DVhEMNu QHc4oaxiw4Vb3A7i4wNRZV9y4UYhxVGBZplv/G5es3w51mIM+Ec5CIkLpr6iW0cQlqMz JHcQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1681576524; x=1684168524; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=5pT/1ZvuN9d05xnRlvG0wlwUFcTVTnBBLLrplC5vdiE=; b=ZL0yGkOngs8P500LBOLdlG7M7goHf54WeOiqmmGkSolV9qZfoSAGTSuXKNCps0/1l+ aXpopIB6cW/PsKyeJJj77aAWZComQQdAvmTfxL+BT7Y33Om+0YRXFWuqQU4ltRA70NH4 M70UFsZjVS8oGyLaBjuCW96fk5P+0VzGNit4uvndIf5tYPrKhb5aAizLYGwc8gFEoGat PVOq8FUVf7RWQjn0SYZRVKTvQ8GjzPg2VSYwMPNrxLhJYYYFeDjOdSIrmkbG2Ud9DifW dgOpguuna6rQa+7WOa2f5TgFEXJ5p78fT2LhVuxPIbjV+od2i+e3NIhQ3fsuBJOAFZBF 3dxg==
X-Gm-Message-State: AAQBX9f0Q3Co0HAgoUIR1b9zsWWI05y0PkCN5SnQd3uLQLdj1tb1lEkI 0tHPfgcIKgCtZjbYFCOkHNa6PbBrlBUYHWNDZ3OvJRxG
X-Google-Smtp-Source: AKy350YJDZV1tjpbib2RIbby666B84GHcVVmhpnIISdmuB0SRKdU4X2A7jPIct5v7gh6MCmeQDWccaVvSJfLYE9iJMg=
X-Received: by 2002:a2e:9811:0:b0:299:a9db:95 with SMTP id a17-20020a2e9811000000b00299a9db0095mr3058381ljj.1.1681576523661; Sat, 15 Apr 2023 09:35:23 -0700 (PDT)
MIME-Version: 1.0
References: <CAL0qLwZc2X7tyP+_8vvL3Yb7uJk6td3XGbsXUB68BNUEMhV4yQ@mail.gmail.com> <5C458C5C-0C20-4B4D-9887-160B3048BD4B@kitterman.com> <25563237-24d2-9e4f-c468-4daf8e2c339c@tana.it> <3671459.v085TlSqb9@localhost>
In-Reply-To: <3671459.v085TlSqb9@localhost>
From: Douglas Foster <dougfoster.emailstandards@gmail.com>
Date: Sat, 15 Apr 2023 12:35:12 -0400
Message-ID: <CAH48Zfyq3JSa8G3nJRd3L1ixeDR735V5=BbQ1e_uYJkW5sjAyw@mail.gmail.com>
To: IETF DMARC WG <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000005b068505f9628ba8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/5bBSte5yvCfPNXvh5XuzUx0sZe8>
Subject: Re: [dmarc-ietf] Signaling MLMs
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 15 Apr 2023 16:35:30 -0000

RFC 5321 restrictions on forwarding cease to be applicable when the message
is modified.   Once the MLM changes the message, the ML domain owns it,
which is why the MLM-created message SHOULD use the ML domain on the new
message.

Additionally:
- The recipient may not trust the author domain, for any number of
reasons.   This is overcome when the ML domain takes responsibility for the
message.
- The list visual appearance is easily impersonated, so the list members
can be deceived without the fake message transiting the list at all.   This
is also overcome if list messages use a From in the list domain and protect
it with DMARC.

There is no alchemy that will cause an evaluator to trust the list until
the list takes responsibility for the message by using its own domain in
the From address.

On other active topics:

   - The strategy of providing a p=none domain is not likely to be
   embraced.   Assume that "example.com" uses "p=reject", but "
   insecure.example.com" uses "p=none".    Any system admin will understand
   that the organization remains at risk as long as "insecure.example.com"
   is allowed to operate on the corporate backbone.

   - The strategy of rejecting subscriptions from "p=reject" domains has
   not been embraced, and I doubt it will be in the future.   Rejecting
   subscriptions requires disclosures that serve to embarrass the list:.   "Im
   sorry, your subscription cannot be accepted because your domain protects
   your email identity from impersonation, which obstructs our ability to add
   our highly-valued subject tags and footer information to every message.
   Please resubscribe using a domain that allows us to modify your messages
   and allows spammers to use your identity to mislead your family, friends,
   church, employer, community group, medical providers, and municipal
   government."   I don't think lists will ever be willing to do full
   disclosure.




DF

On Sat, Apr 15, 2023 at 12:10 PM Scott Kitterman <sklist@kitterman.com>
wrote:

> On Saturday, April 15, 2023 11:45:34 AM EDT Alessandro Vesely wrote:
> > On Sat 15/Apr/2023 16:42:32 +0200 Scott Kitterman wrote:
> > > On April 15, 2023 1:55:59 PM UTC, Jesse Thompson <zjt@fastmail.com>
> wrote:
> > >>And the "If a mailing list would like to provide the best customer
> > >>experience...MUST rewrite" suggestion seems like a reasonable way out
> of
> > >>this "interoperability vs reality" standoff.  How about if I soften it
> up
> > >>further:
> > >>
> > >>"Any sender (mailing list, forwarder, ESP, or otherwise) which is
> tasked
> > >>to send unauthenticated email from an address within a
> > >>p=reject|quarantine domain it MUST refuse to send the message or send
> the
> > >>message using an RFC5322.from address in a different domain.">>
> > > That kind of customer experience guidance isn't what goes in an IETF
> > > protocol specification with normative language.  There can, and
> probably
> > > should be, some discussion about that in an appendix, but without the
> > > MUSTard.
> > >
> > > As I recently mentioned in another thread, the From rewriting trick is
> > > explicitly contrary to MUST NOT language in RFC 5321 on mailing lists.
> > > We should quit pretending it's in scope as a component of DMARCbis and
> > > move on.
> > I hope they amend that passage.  There are several shortcomings in that
> > section.  By the same argument, MLMs shouldn't add List-* header field
> > either.
>
> Perhaps, but I don't think the fact that when RFC 2321 was updated, they
> didn't make explicit provisions for RFC 2919 and perhaps should have,
> gives us
> any wiggle room around the fact that From is the one field in the header
> that
> is specifically called out as not being changed.
>
> Scott K
>
>
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>