Re: [dmarc-ietf] DMARC2 & SPF Dependency Removal

Douglas Foster <dougfoster.emailstandards@gmail.com> Fri, 09 June 2023 00:46 UTC

Return-Path: <dougfoster.emailstandards@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 33D27C14CF0C for <dmarc@ietfa.amsl.com>; Thu, 8 Jun 2023 17:46:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.093
X-Spam-Level:
X-Spam-Status: No, score=-2.093 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0DLNqAu7N84W for <dmarc@ietfa.amsl.com>; Thu, 8 Jun 2023 17:46:16 -0700 (PDT)
Received: from mail-lf1-x12c.google.com (mail-lf1-x12c.google.com [IPv6:2a00:1450:4864:20::12c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 68F79C14CEF9 for <dmarc@ietf.org>; Thu, 8 Jun 2023 17:46:16 -0700 (PDT)
Received: by mail-lf1-x12c.google.com with SMTP id 2adb3069b0e04-4effb818c37so1516063e87.3 for <dmarc@ietf.org>; Thu, 08 Jun 2023 17:46:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1686271574; x=1688863574; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=aZblsavABHCLN6PTuVIDNyHv/cbeEEqkvax35rdmv/Q=; b=p9Kc1xAv9vVHg1fp9yZgyQfTktciidP4i8knIowe76tY02dZ56ht7BdNDOHf5lXJNf U9LK2fAByz80E2XrrY5wxERgroMV2YuGN5VfxRkYIJXUC5tMvCbMYYWUg085+Ff9ZsZs HqPzSlvmLJX0Polll2sL7be3TLPk0/DIO/b30QRQXG62vcHJO/1rPGrhX5qBZZviiit3 oCXMP50mc9LhjwUY0KDk+edN4T5f20tjxBtG5yra8C6lP5xwUlFUZUL9MsODJfi3oMQ7 N0UkRCL/tS/vccYO6WEd0UIwcQMeph8v0iXD15/3pcW3WG7B6WBfTZHICed88fO5f5N+ yBfg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1686271574; x=1688863574; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=aZblsavABHCLN6PTuVIDNyHv/cbeEEqkvax35rdmv/Q=; b=Rcp41NkvVk0xfwcvEowySAVdV7CGnw8efOG2Ln4NS7Ov98eS4s0+3BAW6S+69fIlK1 t4hZZQSf2/ttTtbINN2qzI1ZtrHfiSipaq9gKAjwgPck0URRpeTamFgbkShZ/Dd7qmVW p8Nb3LYYIawgJ//ecxlaiU+Qbqraz3aKGP54/l0lSyoJpVzRiGdleIBJR/X8B7pneBej acUKN5rxhXTJBI/A6GxuuLSn4hKX04sB0nG4V18o/O40Ocvjh8yMOwxdo5Z+di8NmDVH KFolMjA/8ttbyndx0notTF9jTNv0gbWK5YXT94HVGucTRzetEKkRRusw9B64BY843ZVD u/6w==
X-Gm-Message-State: AC+VfDyg8ZZqwrNjHifk78NQLlT5WnBfFNeHWAY9UYfXviMMnB1dHuSt CLqwV0vXAA/KdYvqeIsIOaejvSsa6Ac3eHuuKiqb9A+DmIM=
X-Google-Smtp-Source: ACHHUZ6Oxt8vpr5how8MRDIC6oCFlwmnYp2vwEUK8+ItjmMvQRvTSjrk9Za6+m8CX+P20N6e+vLbZFm0mXUAewucf8Y=
X-Received: by 2002:a19:ab11:0:b0:4ed:bfcf:3109 with SMTP id u17-20020a19ab11000000b004edbfcf3109mr301980lfe.56.1686271573571; Thu, 08 Jun 2023 17:46:13 -0700 (PDT)
MIME-Version: 1.0
References: <30BB83B2-B454-41B8-992B-8E2569802D9C@1und1.de> <CAL0qLwbx6Y=kmB5pQZx8gNqD=rLBYz1vLOX6ngL=wUHHUm0Hjw@mail.gmail.com>
In-Reply-To: <CAL0qLwbx6Y=kmB5pQZx8gNqD=rLBYz1vLOX6ngL=wUHHUm0Hjw@mail.gmail.com>
From: Douglas Foster <dougfoster.emailstandards@gmail.com>
Date: Thu, 08 Jun 2023 20:45:28 -0400
Message-ID: <CAH48Zfz3jo6Jy7ByfS9EM8Luy5atEtuTMtvDfYuo56Gj9ryRcw@mail.gmail.com>
To: IETF DMARC WG <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000233d8105fda7b2fb"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/75W7NIWcIiMVNpBMx0vQnTec78I>
Subject: Re: [dmarc-ietf] DMARC2 & SPF Dependency Removal
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Jun 2023 00:46:17 -0000

My Data:

Data set: 360,000 messages.
Scope notes:
1) Data is based on messages that passed successfully through sender
filtering.   I don't' care whether a sender authenticates when I know that
I don't want his messages at all.
2) A DMARC-inspired authenticate test is applied to all messages, so this
data is not limited to policy-publishing domains

Successful Verification Rates based on verification method
---------------------------------------------------------------------------------
DKIM & SPF : 54.6%
DKIM-only: 14.5%
SubTotal : 69.1% have DKIM-verified FROM addresses.  This is consistent
with Tobias's data

SPF-aligned: 14.5%   This is much higher than what Tobias reported, but his
data probably includes a mix of spam and non-spam
SubTotal : 83.6%  (Messages with a verified FROM address using SPF and DKIM
together)

SPF-local:  8.5% (SPF Pass but not aligned, yet FROM is trusted using local
policy)
Total      92.1% of all messages have a FROM address that  I consider
acceptably verified.

I had an experience where dual-authentication was useful.  A software
update caused my MTA to "forget" its DKIM configuration.    The fix
required generating a new key pair, publishing the public key, and hoping
that DNS propagated quickly to those who needed it.    I was glad for
SPF-aligned authentication during the interim between when the problem was
introduced and the fix was propagated.

We have two topics intermixed:  (a) should we deprecate SPF for DMARC
purposes, and (b) should we deprecate SPF completely.   We should
definitely not deprecate SPF completely.    In my experience, filtering
software collects all of its data before making any decisions, rather than
interleaving the data collection process with the filtering process for the
purpose of minimizing data collection effort.   DMARC reporting and ARC
Sets seem to depend on filters behaving in this way.  So, even if DMARC
drops SPF, I don't think there will be a measurable benefit to DNS
workload, because SPF is useful for other purposes.

I do think readers would benefit from a frank discussion about the SPF
risks associated with shared tenancy and excessive inclusion.   They should
understand that removing SPF policies, and depending on DMARC alone, can be
a successful way to manage those risks.

Doug Foster


On Thu, Jun 8, 2023 at 10:21 AM Murray S. Kucherawy <superuser@gmail.com>
wrote:

> On Thu, Jun 8, 2023 at 6:00 AM Tobias Herkula <tobias.herkula=
> 401und1.de@dmarc.ietf.org> wrote:
>
>> My team recently concluded an extensive study on the current use and
>> performance of DMARC. We analyzed a staggering 3.2 billion emails, and the
>> insights drawn are quite enlightening. Of these, 2.2 billion emails
>> (approximately 69%) passed the DMARC check successfully. It's quite an
>> achievement, reflective of our collective hard work in fostering a safer,
>> more secure email environment.
>>
>>
>>
>> However, upon further analysis, it's evident that a mere 1.6% (or
>> thirty-six million) of these DMARC-passed emails relied exclusively on the
>> Sender Policy Framework (SPF) for validation. This is a remarkably low
>> volume compared to the overall DMARC-passed traffic, raising questions
>> about SPF's relevancy and the load it imposes on the DNS systems.
>>
>>
>>
>> Given the current use case scenarios and the desire to optimize our
>> resources, I propose that we explore the possibility of removing the SPF
>> dependency from DMARC. This step could result in a significant reduction in
>> DNS load, increased efficiency, and an accurate alignment with our
>> predominant use cases.
>>
>> [...]
>>
>
> Does anyone have consonant (or dissonant) data?
>
> -MSK, participating
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>