[dmarc-ietf] Report from the IETF99 hackathon on ARC

"Kurt Andersen (b)" <kboth@drkurt.com> Sun, 16 July 2017 19:52 UTC

Return-Path: <kurta@drkurt.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3178C129AFF for <dmarc@ietfa.amsl.com>; Sun, 16 Jul 2017 12:52:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=drkurt.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WLeBhyq5k9WQ for <dmarc@ietfa.amsl.com>; Sun, 16 Jul 2017 12:52:40 -0700 (PDT)
Received: from mail-ua0-x22a.google.com (mail-ua0-x22a.google.com [IPv6:2607:f8b0:400c:c08::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 47125127978 for <dmarc@ietf.org>; Sun, 16 Jul 2017 12:52:40 -0700 (PDT)
Received: by mail-ua0-x22a.google.com with SMTP id z22so75983130uah.1 for <dmarc@ietf.org>; Sun, 16 Jul 2017 12:52:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=drkurt.com; s=20130612; h=mime-version:sender:from:date:message-id:subject:to; bh=6Sj3Z6DbB7Du3GPHEm7G5rs2qMzEmLyxjFtQ8ylH7Ac=; b=TXqAkHpJ112NABVNvLCaQVCYY1EblC4hqdRkxUfVIyJ6J2w8VVYHJv5oj/we7lkZK8 rI0FWiHazSDdKiKpD1UCAiY9T0IUQx1C5D5vbKEzU6XJQS6bJe3ZhPj+q84mkWj+tD0Y LijdwHV4wlr7iXu3YcAU2EI2WmbTuQv4G55pc=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:from:date:message-id:subject :to; bh=6Sj3Z6DbB7Du3GPHEm7G5rs2qMzEmLyxjFtQ8ylH7Ac=; b=M8I4MYijt0tsPS3PZE8zm/aVd3DcRnSL+JocPA9oZNq3WVHOFDYOr0+jBEVhrUD2Uq Z4lvDROzcWvhslVX4xLNfLleKIeXgTSzhhaLc01cj5FqcF0Npf6nYIp6eeAo5rMKX+Rb z/ghXjbhoeDoeOS8CQdkkKTMvPV6bXpJuKaLlzqygQ6GTxFirSFfVL1EkrOOMijl9tml lkC4l/QbkW86JWYGqM1/Is1IPGNiw4oQvgcG4UrPNxia0RvWgR7wjekMFzsTmpA+86t6 pLA2dF6+1nruilH40OMxBBPo0/fKyqJkjxiR+OYZGjrhzZvcjAn9PQnoevItE+HQTLWO VPDA==
X-Gm-Message-State: AIVw11265cV4RcqmCcWqdmBXgDeVzwy6ikaqC7pKKu5pP/9lbf/Ii7vk VRt8NoMzj3r8oG85i6Ev4edNwZtN4Eu99Kh24A==
X-Received: by 10.31.33.16 with SMTP id h16mr10331417vkh.103.1500234758881; Sun, 16 Jul 2017 12:52:38 -0700 (PDT)
MIME-Version: 1.0
Sender: kurta@drkurt.com
Received: by 10.176.26.39 with HTTP; Sun, 16 Jul 2017 12:52:38 -0700 (PDT)
From: "Kurt Andersen (b)" <kboth@drkurt.com>
Date: Sun, 16 Jul 2017 21:52:38 +0200
X-Google-Sender-Auth: sBv2lWjehdTfcvExOMKCK6QPFgI
Message-ID: <CABuGu1q+VptVCZKM_pFrMhDBs1bTom0BEmAniNofBs4QpFwv9A@mail.gmail.com>
To: "dmarc@ietf.org" <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="001a11c0436ae216e50554749f41"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/CnIGMxYfiyuquzvr_KZ_uCvRW8I>
Subject: [dmarc-ietf] Report from the IETF99 hackathon on ARC
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 16 Jul 2017 19:52:43 -0000

We had 6-8 people through the weekend working on various interoperability
things:

   - Andreas Schulze was able to obtain openarc.org and has stood up a
   forwarder using OpenARC to process the mail both with verification on the
   way in and sealing on the way out, but the AMS which are generated fail
   signature validation :-( but the ARC-Seal headers are good!
   - Steven Jones worked with getting OpenARC to build on FreeBSD and Debian
   - Juri Haberland contributed patches and pull requests to fix various
   issues in the OpenARC repo (working remotely)
   - Barry Lieba provided moral support and kept tabs on the overall work
   effort
   - Chris Newman worked on building an independent implementation for DKIM
   and ARC that can be used within the Oracle messaging suite (I'm sure it has
   some more official name)
   - Kurt Andersen worked on testing interoperability between Google, AOL,
   dkimpy, OpenARC, MailerQ, and Rspamd
   - Bron Gondwana and one of the other FastMail guys (sorry that I didn't
   catch the name) worked on adding ARC analysis to their PERL
   Mail::Milter::Authentication module (
   https://github.com/fastmail/authentication_milter/). At the end of the
   hackathon, they had something that would evaluate the validity of ARC
   chains working!
   - Alexey Melnikov dropped by just before the hackathon presentations
   kicked off - he is building an independent C-based ARC implementation.

You can see more details and various notes from the participants in the
interop at https://bit.ly/arc-interop7 . My apologies to anyone that I've
left out of the participation list. Please chime in with any other notable
findings or questions.

--Kurt Andersen