Re: [dmarc-ietf] Is From spoofing an interoperability issue or not?

Douglas Foster <dougfoster.emailstandards@gmail.com> Mon, 17 April 2023 13:23 UTC

Return-Path: <dougfoster.emailstandards@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 14673C15171E for <dmarc@ietfa.amsl.com>; Mon, 17 Apr 2023 06:23:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Kh7Wl3E6aI4R for <dmarc@ietfa.amsl.com>; Mon, 17 Apr 2023 06:23:20 -0700 (PDT)
Received: from mail-lj1-x230.google.com (mail-lj1-x230.google.com [IPv6:2a00:1450:4864:20::230]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F2154C15155B for <dmarc@ietf.org>; Mon, 17 Apr 2023 06:23:19 -0700 (PDT)
Received: by mail-lj1-x230.google.com with SMTP id 38308e7fff4ca-2a8aea2a610so13621871fa.3 for <dmarc@ietf.org>; Mon, 17 Apr 2023 06:23:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1681737797; x=1684329797; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=PVa6lnFjrDd2E8R1Av5zaS/skd/zoL0qre0XxIj+V94=; b=SSwQNdJnEewBjYmOR1/VgKA/4BouJP+dNwnmKzkpVfHHWzDJoR4ARGGefSJXvYf5Ws 9nRY1b3zBEurri4L+y+fzT0YGP9q0CxIZMZLqmNsirqKCPpoSa2gt5QCaCjf7zzRV96Z RkTspm0ok9cTZDzzwhMD083aBYEwPkRt5yQVECdukyBQkr4cE4W06UfCLDEYAwvXpDZk ZznoEzdy4wcjpB2X8r4b4KYPl0fNEIQb7hlUlNtsRis0qe/9M1xOIWVGVBo85Fg8E7OL JSlEugVsjZqgjGHJitBs7S5ajeXM0w/+z9/HdlU/fUIAc/GChKV/42iN3EtZ30aBaj0W 6ElA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1681737797; x=1684329797; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=PVa6lnFjrDd2E8R1Av5zaS/skd/zoL0qre0XxIj+V94=; b=BZ5lfsyLVvre8MiTECHuvb5EuT0rtzU6j3VVwYXVinwaQZVw1IDYoP6Q62GRMF9N6L y/Rlr9yMVeEEoDCcG9zexG9BCj1wRskPGy3hGxN9tUvQ8/RWiz1tLJ0xwSjzkTK6JaC8 7+zEBj6Fs7YH0WExWl3RBezrldzbHi47Vyb+8yaXsoKjaQ1bpWwOVjKVmxd2lnRsQHHT kBvbow+hO27V2zDR8nalbw2HENnYiEL1OElD/F6HtzchphN+veqCm2P4pnVyD9sjha32 XcN9D2KrXJKgsxJCqnxv92Z94MnArA9XT4bXKJt6kLwJqh3ocBnR6VcBn/ldwPyxhxfj hqyw==
X-Gm-Message-State: AAQBX9fK1/nqrhWi/C4IBdYdZ1sbf3ZdBgy/jse764lJn1/JeHZFQ8zY +5ghVBd+0ziavmFUektqYGkiyXSXWMI7nihE7cCNbM6t
X-Google-Smtp-Source: AKy350azcB9dQIDIb1ecym5GT8purjMk/vOrbiQ9rlTF12oCakKzdGaAvc7L+QQhz6giaXdhZKJmIKQBNPYx4TEmz7s=
X-Received: by 2002:ac2:5181:0:b0:4e8:5371:c884 with SMTP id u1-20020ac25181000000b004e85371c884mr2173728lfi.5.1681737797300; Mon, 17 Apr 2023 06:23:17 -0700 (PDT)
MIME-Version: 1.0
References: <4FD1C711-7A7D-40E5-88DE-95CDD248F92B@wordtothewise.com> <CAJ4XoYfQtuavs28FwNrsbD5hBGxnTyVo=E334wJ1QZ-ATfihYg@mail.gmail.com>
In-Reply-To: <CAJ4XoYfQtuavs28FwNrsbD5hBGxnTyVo=E334wJ1QZ-ATfihYg@mail.gmail.com>
From: Douglas Foster <dougfoster.emailstandards@gmail.com>
Date: Mon, 17 Apr 2023 09:23:07 -0400
Message-ID: <CAH48ZfywnwQmTAYnm8TQX1fnuzxHx==d-i0pXsFr5x4iHmcodQ@mail.gmail.com>
To: IETF DMARC WG <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000003758505f9881888"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/ABssYxNz0XQzOT9KUHGnE00LdZo>
Subject: Re: [dmarc-ietf] Is From spoofing an interoperability issue or not?
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Apr 2023 13:23:24 -0000

The only real fix for Friendly Name fraud is to strip it away, except for
trusted domains that have been verified with DMARC PASS.

Major vendors are trying lesser solutions by preventing friendly name
impersonation of key executives, but the problem is much greater.

This topic is material for a subsequent document, but may have to be done
outside of IETF since Friendly Name fraud prevention is not a protocol.

Doug

On Mon, Apr 17, 2023, 9:01 AM Dotzero <dotzero@gmail.com> wrote:

>
>
> On Mon, Apr 17, 2023 at 4:30 AM Laura Atkins <laura@wordtothewise.com>
> wrote:
>
>> Reading through the various discussions about how to document the harm
>> DMARC causes for general purpose domains, I started thinking.One way that a
>> lot of major SaaS providers have chose to deal with DMARC is spoofing their
>> customer’s in the 5322.from Comment string. There are numerous examples of
>> this: Paypal, Docusign, Sage, Intuit are 4 big examples I can think of off
>> the top of my head.
>>
>> All of these companies send out financial or business mail on behalf of
>> their customers, some of whom do use p=reject on their own domains. Some of
>> them also use restrictive DMARC policies for this mail, others don’t.
>>
>> Is this another issue we should document and make recommendations about?
>> I was thinking along the line that transactional SaaS providers should
>> fully support DMARC and should not allow companies using p=reject in their
>> business mail to access the service?
>>
>
> Let's throw the baby out with the bath water. There are ways a
> (transactional) domain owner can enable a vendor to generate/send email on
> their behalf without the vendor "spoofing" the domain. A subdomain can be
> delegated, private DKIM signing keys can be provided. Another approach is
> routing outbound email from the vendor through the customer's mail
> servers.  In addition, dedicated sending IPs can be required by the
> customer. My personal favorite is delegating a subdomain because all of the
> obligations can easily be specified contractually. In the past when
> potential vendors have said "we don't do that" or "we can't do that" and
> I've said "then we can't consider you in our vendor election process", it's
> amazing how quickly they figure out how to do things if there is enough
> money on the table. I speak from experience.
>
> If enough people insist then vendors will productize these approaches into
> their offerings more generally. It's a competitive differentiator until
> enough vendors have offerings, at which time it will become the ante to
> play in the game. So no, suggesting that the only solution is vendors
> rejecting business from customers who publish p=reject is pretty much a
> non-starter.
>
>
>>
>> I keep going back and forth that this is not an interoperability issue -
>> the mail works fine even when the business is spoofed in the 5322.from
>> comment string. But on a practical level it looks exactly like phishing
>> mail because it’s financial (or contractual) docs from a particular company
>> coming from a random domain. I keep ending up this isn’t an
>> interoperability issue, it’s just an end run around DMARC and it’s not the
>> IETF’s place to comment on that.
>>
>
> I could see a discussion in a BCP as to why it's a bad practice. I don't
> see it having a place in a standard.
>
> Michael Hammer
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>