Re: [dmarc-ietf] DMARCbis WGLC - Issue 135 - What To Say About Too-Permissive/Third-Party SPF and Where To Say It?

Dotzero <dotzero@gmail.com> Mon, 18 March 2024 03:08 UTC

Return-Path: <dotzero@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 83733C14F6AE for <dmarc@ietfa.amsl.com>; Sun, 17 Mar 2024 20:08:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H7NaIA0Qf-wO for <dmarc@ietfa.amsl.com>; Sun, 17 Mar 2024 20:08:11 -0700 (PDT)
Received: from mail-ua1-x936.google.com (mail-ua1-x936.google.com [IPv6:2607:f8b0:4864:20::936]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 191D6C14F6A4 for <dmarc@ietf.org>; Sun, 17 Mar 2024 20:08:11 -0700 (PDT)
Received: by mail-ua1-x936.google.com with SMTP id a1e0cc1a2514c-7e05d687218so62012241.3 for <dmarc@ietf.org>; Sun, 17 Mar 2024 20:08:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1710731290; x=1711336090; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=x4pegCYx5aHuaTsvDNXwKtO4qjAMApeOKPaHA1sMXBs=; b=S1YwvLQnkaROx7lZ7xUKp27d5Xdms4gX67+7GNjjCx9DEl1tjP9NDzLYhB/UfhSCIU 3lTkJIxknFdXpqczNBM2HLmSDj70b4xwFZv+/7+tmvZvj+c/A/fCS4HUGHB6C4hObQqM XazhEw005B80ffsYOcb+5s2ge5K0gXwyMwm66NSQSfU0FgCwXD+aEzpMPE2R7Cl2BOvx 3Wm0WItvxPVSv1llk/O7gLvqMVeJz92FiXaSUzPewXJ17vsDJijizWBBFj2hrs0LbST/ 9X6uQMb+5n7YdxlOo6djt4uYopZT64spTZKqxXhrRJ5fdy6zYElUOYFZh3nOM4YVQMi8 WggQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1710731290; x=1711336090; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=x4pegCYx5aHuaTsvDNXwKtO4qjAMApeOKPaHA1sMXBs=; b=JBUYmC8WZ6nRQdSpnC1/SvXXH6u8O8cKXIb3UKFoCz+6navOZqnsXzfZvzgmdUmbQh ulLqTbxBq+NRbl/Wwq7X7eyaPiC2Nj7+nt171uaYK/GABPJVNtG2OFAS7APIRW7ByK5g I2ayykL1kUyypHDUSxzzsU71NubBgivujqLZjLYZooDdZVou4B7offwKNgnYvgaiq6/U UZN9+t56WeBm8ZCpLIUchHMGP1X9NtUHMptq5f6QIs5r9I/OR8CbzqTD9uAs4P1GAkCB 7lhBZccvo8Pfzym+FKS0p0L8DxTxA1r1eh0o/s8c+YzNlzki0ZtdopBILtnPpZ1SPyLl XRIg==
X-Gm-Message-State: AOJu0YxBYIsL4vjd8fdDo51fsIdLWD5SqbXWveYN73W4KRoKbKzfQVth xzAZP6ue0cJdypfFMQ3ceu3ewRrgdHukHTkcXXZu/WzDGTpZ+MQmD7j57+UvlwcWOSPTy9caqa0 6ilApABPlD/JqOsaqz4nSTgQpvKDBy9/B
X-Google-Smtp-Source: AGHT+IEZ6mjIjAnGPrhG9FIwYvmPnfSoHjp/kl2wLZz3Ru3g3ZAVnyCMKjjNqlmnifnqN8Zga36ozE7x5eyaNTla0rs=
X-Received: by 2002:a05:6122:d0:b0:4d4:b89:bd2a with SMTP id h16-20020a05612200d000b004d40b89bd2amr5841749vkc.3.1710731289832; Sun, 17 Mar 2024 20:08:09 -0700 (PDT)
MIME-Version: 1.0
References: <2068150.yCtiIVWOOC@zini-1880> <20240318013630.455118593233@ary.qy>
In-Reply-To: <20240318013630.455118593233@ary.qy>
From: Dotzero <dotzero@gmail.com>
Date: Sun, 17 Mar 2024 23:07:58 -0400
Message-ID: <CAJ4XoYcoJFqYoAt_jq6jfsSjqtjaifiUzaqY-zkg7R3o5Bio0A@mail.gmail.com>
To: John Levine <johnl@taugh.com>
Cc: dmarc@ietf.org, sklist@kitterman.com
Content-Type: multipart/alternative; boundary="000000000000d635f90613e6aa62"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/E4zVdkwBQN1BHH-9bhhwL5fUoO0>
Subject: Re: [dmarc-ietf] DMARCbis WGLC - Issue 135 - What To Say About Too-Permissive/Third-Party SPF and Where To Say It?
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Mar 2024 03:08:11 -0000

On Sun, Mar 17, 2024 at 9:36 PM John Levine <johnl@taugh.com> wrote:

> Tightened up a little, reworded in view of the fact that your own
> mail provider (M*r*s*ft) may let people spoof you through shared IP ranges.
>
>
> >11.X  External Mail Sender Cross-Domain Forgery
>
> Add this to 11.1 Authentication Methods
>
>
> Both of the email authentication methods that underlie DMARC provide
> some assurance that an email was transmitted by an MTA which is
> authorized to do so. SPF policies map domain names to sets of
> authorized MTAs [ref to RFC 7208, section 11.4]. Verified DKIM
> signatures indicate that an email was transmitted by an MTA with
> access to a private key that matches the published DKIM key record.
>
> Whenever mail is sent, there is a risk that an overly permissive source
> may send mail which will receive a DMARC pass result that was not, in
> fact, authorized by the Domain Owner. These false positives may lead
> to issues when systems interpret DMARC pass results to indicate
> a message is in some way authentic. They also allow such unauthorized
> senders to evade the Domain Owner's requested message handling for
> authentication failures.
>

I have a problem with this 2nd paragraph and believe it is factually
incorrect. The Domain Owner has in fact authorized the message(s) as a
result of an overly permissive approach. I would suggest that in fact any
resulting DMARC pass is technically NOT a false positive because it is
authorized by the overly permissive approach..

Michael Hammer