Re: [dmarc-ietf] Give up on SPF alone

Douglas Foster <dougfoster.emailstandards@gmail.com> Sat, 15 April 2023 15:27 UTC

Return-Path: <dougfoster.emailstandards@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 70412C151551 for <dmarc@ietfa.amsl.com>; Sat, 15 Apr 2023 08:27:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F3Geb_Pau1we for <dmarc@ietfa.amsl.com>; Sat, 15 Apr 2023 08:27:45 -0700 (PDT)
Received: from mail-lf1-x12e.google.com (mail-lf1-x12e.google.com [IPv6:2a00:1450:4864:20::12e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2EA61C151532 for <dmarc@ietf.org>; Sat, 15 Apr 2023 08:27:45 -0700 (PDT)
Received: by mail-lf1-x12e.google.com with SMTP id 2adb3069b0e04-4ec8148f73eso454370e87.1 for <dmarc@ietf.org>; Sat, 15 Apr 2023 08:27:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1681572462; x=1684164462; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=+6nNY4DJVZzDWwA3Xlp0VsbG0lxo4iom62V1IroDDqM=; b=S6PUKv9tuDn9ogiW6ePSjdkzM4WsTWq9+Zh2JgK9JVpTkkxGg9G/0mT1YT3NX/fFdh RJI3A9x8qYh1Sge8bBJ+gDf0t+EMzCGu4oEYK2R6Jy8ruRIt0wNYGD0O9gfWjC1/mGPx RRbu0psCG5/7uBxVS4esuH8EwB5WPwykREFKJHLE0960y++7MpT8zM4+/uYfySE0gq1a pg9X2f65TfOfzxHQxEBXphh2UA4o90B4CDILijhcJP6WCcGD7NuHr2xnqH6pevusTaQt pW9VqKnb5vCymEHlBNgnO1qYmDLLYti7LvvdkpxcVBwfWrVDVtfupBQBlHSvLE8JMLuN uk/g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1681572462; x=1684164462; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=+6nNY4DJVZzDWwA3Xlp0VsbG0lxo4iom62V1IroDDqM=; b=bTf6I8VPMKQLXzBVFANs6Go5Og2pzdGggWEEJfrHqL3+0Fsu0luoT+Vt9Y4weHdyIB 50/AjO65DOOG59jjgdzugM9Wx4vm9r92Qsk4WuJnFE4FUD2/iH5/jzL17ZVrPKEuf7j5 yqPT343OQUnZX1kb/XlbfaCLtKuJ8fod3ud8bBl67teWr0kvr+dqp6DU5LBYxREt5CI3 le66CUDkXlK5RTRH04OFE+ZRznBUY7tIgFb1xDK9kho67aH/kes5UjKme3RSCUNvAwlU mvySkzK5fjTmUG5VpL3AKMWh6S+031rQeuQ8+1Y+r0ii/3fZMkAOr7Z7qIUjAYob5tN5 bAdg==
X-Gm-Message-State: AAQBX9cBfIzN9JzMoeDUx4D22j1+9VMDkIXv4HQr1xCd/wcuN1fyDTYL HYw2U5OXfwtvB22TtujvPozHICzpyrGy9s+dF6M/gC2T
X-Google-Smtp-Source: AKy350a92+iDLCugpeF0bqMcSLyBjds6EKADVzglhzDAkK5UWxomBcDNouCAJAxmRPFXi+UKCqfGGwgUN06Z8vY3HdE=
X-Received: by 2002:ac2:46f1:0:b0:4ec:85f6:5bf7 with SMTP id q17-20020ac246f1000000b004ec85f65bf7mr684529lfo.5.1681572462446; Sat, 15 Apr 2023 08:27:42 -0700 (PDT)
MIME-Version: 1.0
References: <CAL0qLwZc2X7tyP+_8vvL3Yb7uJk6td3XGbsXUB68BNUEMhV4yQ@mail.gmail.com> <8d970e6b-8fa7-da85-5c47-d485abbc43be@crash.com> <CAL0qLwZJjBq0T8kODJifTT10ttJJE2Bof5kJZACRTwyauzwQ6A@mail.gmail.com> <CAJ4XoYcHeFe0kS9QHz4fP5TbOMOiW8mJaiNYx+Yk8keZYW-yDQ@mail.gmail.com> <b6a2b444-de02-9833-fe7b-fc9ad542f900@tana.it> <CAL0qLwYwcXTBzqd=3sKwtZJUsEYO5kfv9V-CZtVHz2TQ78v=0g@mail.gmail.com> <909C826B-2745-4BE8-AD16-920E6DE86D1C@kitterman.com> <329db752-fdeb-7633-ede1-06e435db1c0e@tana.it> <CAL0qLwa=cA7426zgNJQFDBBqOKA6KXyBGAE4TOy=C+c9+JUY3A@mail.gmail.com> <168596BD-B688-4AF6-87E8-B25F9D2BD663@isdg.net> <CAH48Zfx0yXefioHoQi_Jq6hbMotcQZsDAhD5cXuBTRSxn2wXbA@mail.gmail.com> <C134972F-EAEA-4FA4-B65A-24B53338E5DD@isdg.net> <CAJ4XoYf4Oac61J41FaSi4PCNwpFiOhWm90TwasNvrp91yeW1UQ@mail.gmail.com> <5DAE096A-B547-4569-A3C6-34ED9EC91B2D@isdg.net>
In-Reply-To: <5DAE096A-B547-4569-A3C6-34ED9EC91B2D@isdg.net>
From: Douglas Foster <dougfoster.emailstandards@gmail.com>
Date: Sat, 15 Apr 2023 11:27:32 -0400
Message-ID: <CAH48ZfwDwNkN1_8JtVNv134SK4_HWt=LRtxS-kB81TDE2t2WeA@mail.gmail.com>
To: IETF DMARC WG <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000049cc8005f9619959"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/BiczeauOV8L1eMNUPYHY6_LR7yE>
Subject: Re: [dmarc-ietf] Give up on SPF alone
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 15 Apr 2023 15:27:47 -0000

Sorry Hector, but you are wrong on the theory and off topic.   DMARC and
SPF authenticate different things.  DMARC is designed to override SPF Fail
to handle the case of forwarding without SRS, which would be optimal if all
messages were signed.

Bandwidth optimization was an issue when we were on dial-up, but now we
size capacity to need, and use other defenses for DDoS attacks that
saturate bandwidth.

Discarding DMARC is not feasible, because you cannot revoke an RFC and you
cannot make people stop knowing what they already know

DF

On Sat, Apr 15, 2023, 10:52 AM Hector Santos <hsantos@isdg.net> wrote:

>
>
> On Apr 14, 2023, at 7:31 PM, Dotzero <dotzero@gmail.com> wrote:
>
> On Fri, Apr 14, 2023 at 5:55 PM Hector Santos <hsantos@isdg.net
> <40isdg.net@dmarc.ietf.org>> wrote:
>
> Yes, it is simple DeMorgan’s Theorem where you use short-circuiting logic.
>>
>> DMARC says that any FAIL calculated via SPF or DKIM is an overall DMARC
>> failure.  In standard boolean logic is it an OR condition:
>>
>> IF SPF FAILS or DKIM FAILS Then Reject.
>>
>
> You have it absolutely backwards.
>
> DMARC says if either (aligned) SPF validates or (aligned) DKIM validates,
> it passes.
>
>
> Hi Mike,
>
> Appreciate your comment.
>
> This OR gate logic will short-circuit DKIM with SPF validating.
> Optimizing means not processing the payload and just issue a 250 which is
> ‘absolutely' not what we want. In fact, DMARC logic is an AND gate of two
> protocols; one standard, one informational with some controversial
> constraints (alignment).  I think you maybe meant:
>
> SPF predates ADSP/DMARC. It is a 5321 level technology.  It is not a
> payload 5322 technology.   Interestingly, you might be thinking in terms of
> SenderID which was a 5322 technology which offers SPF with the PRA
> (5322.From) as a new identity to evaluate.
>
> I know it’s hard to believe for many but there is still a good percentage
> of domains that do not do ADSP or DMARC and maybe not even DKIM.  Just
> consider platforms using Integrated Mail Bots to automate things and they
> who don’t need the overhead. SPF is good enough.
>
> Using Pareto, SPF is the only thing needed for hard reject policy (-ALL).
> DMARC is useless at this point unless you want it to override SPF hardfail
> rejects and record and send reports,  That would be a local policy.  An
> implementation detail.
>
> Over 88% of the time, when SPF fails, DKIM/ADSP/DMARC, if available would
> also fail.  So the payoff is high to short-circuit and lowered when you
> needless transfer a potential large and harmful payload.
>
> But for SPF soft failures (~ALL), that is when the interest of coupling
> SPF soft fail results  with ADSP results got traction.
>
> SPF verifiers will pass SPF weaker policy results in meta-header data and
> that meant the payload protocol can help here.  Microsoft explored this
> method and had a secret source to determine how soft failures can be
> coupled with ADSP results.
>
> DMARC never considered partial results. DMARC see SPF as a pass not
> soft-fail.  So if DKIM passes and all four (4) domain identities are
> aligned, the transaction passes.  That’s an AND gate and you don’t need to
> even to process SPF or do DKIM validation if the domains do not align.
>
> —
> HLS
>
>
>
>
>