Re: [dmarc-ietf] DMARCbis Privacy Considerations was: Re: I-D Action: draft-ietf-dmarc-dmarcbis-17.txt

Alessandro Vesely <vesely@tana.it> Thu, 01 September 2022 16:08 UTC

Return-Path: <vesely@tana.it>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F1D2AC14F724 for <dmarc@ietfa.amsl.com>; Thu, 1 Sep 2022 09:08:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.406
X-Spam-Level:
X-Spam-Status: No, score=-4.406 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=tana.it header.b=mNOm87Cf; dkim=pass (1152-bit key) header.d=tana.it header.b=CIeuohyP
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9p0GmhFp7NF4 for <dmarc@ietfa.amsl.com>; Thu, 1 Sep 2022 09:08:34 -0700 (PDT)
Received: from wmail.tana.it (wmail.tana.it [62.94.243.226]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6DC8FC14F6E7 for <dmarc@ietf.org>; Thu, 1 Sep 2022 09:08:31 -0700 (PDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=tana.it; s=epsilon; t=1662048508; bh=Xmam8dVdr77N8AieYVte7eKDcBOOrqZq7RwA+9lHWWQ=; h=Date:Subject:To:References:From:In-Reply-To; b=mNOm87CfuXpP7LVomGqwZFr8F5llii66pYWQmqvBPiBOJ51QIDq7lyeh9xiwIim4H tVMrALqEV2WKGyKiLYpDw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tana.it; s=delta; t=1662048508; bh=Xmam8dVdr77N8AieYVte7eKDcBOOrqZq7RwA+9lHWWQ=; h=Date:To:References:From:In-Reply-To; b=CIeuohyPfN79H/TzCCI5UeLoftnkB/XvqBpAWMKagKur43+8oH84pdUSSGW9DlPxb nubRadssHeJi1Cp+20AOAFqrQQoXJdDrwyxuYoFEGOdjuhc05svPR6yEJQdXxm2qLI L+opbxX64ZuL4UN9O/3aWwavu4A76Kqxzf0UshLSErHcY3ApWWOh6LGsRHU2L
Author: Alessandro Vesely <vesely@tana.it>
Received: from [172.25.197.111] (pcale.tana [172.25.197.111]) (AUTH: CRAM-MD5 uXDGrn@SYT0/k, TLS: TLS1.3, 128bits, ECDHE_RSA_AES_128_GCM_SHA256) by wmail.tana.it with ESMTPSA id 00000000005DC042.000000006310D8FC.00002065; Thu, 01 Sep 2022 18:08:28 +0200
Message-ID: <8bf28b84-8d4a-7a90-37c4-5c16d18897a3@tana.it>
Date: Thu, 01 Sep 2022 18:08:28 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.13.0
Content-Language: en-US
To: dmarc@ietf.org
References: <166178507559.47631.2900016221052924761@ietfa.amsl.com> <4015891.JFzxAWuYz4@zini-1880> <2969398.fzCzL4EFEC@zini-1880> <4933355.f5WRtcxpSY@zini-1880>
Authentication-Results: tana.it; auth=pass (details omitted)
From: Alessandro Vesely <vesely@tana.it>
In-Reply-To: <4933355.f5WRtcxpSY@zini-1880>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/IlNJvb1-GwG1dZ2wSSf7Cp7t7Vw>
Subject: Re: [dmarc-ietf] DMARCbis Privacy Considerations was: Re: I-D Action: draft-ietf-dmarc-dmarcbis-17.txt
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Sep 2022 16:08:44 -0000

On Tue 30/Aug/2022 23:34:18 +0200 Scott Kitterman wrote:
> On Monday, August 29, 2022 12:27:11 PM EDT Scott Kitterman wrote:
>> 
>> RFC 9091 Privacy Considerations (which are currently incorporated by 
>> reference in DMARCbis) say that for PSDs, feedback MUST be limited to 
>> Aggregate Reports.
>>
>> I think it would be appropriate that DMARCbis have a short Privacy 
>> Considerations section which points out that putting an rua or ruf tag in 
>> your DMARC record may have privacy implications for organizations with 
>> pointers to the reporting drafts for details.  I would include something 
>> like if psd=y, MUST NOT also have an ruf= value in DMARCbis.


I oppose that point, as explained below.


> I've prepared an update in git (that I will shortly submit as a PR).  The 
> bulk of it is to add a new Privacy Considerations section.  That's provided 
> below. > [...]
> ## Failure Report Considerations {#failure-report-considerations}
> 
> Failure reports do provide insight into email sending patterns, including
> specific users.  If requesting failure reports, data management controls
> are needed to support appropriate management of this information.  The
> additional detail available through failure reports (relative to aggregate
> reports) can drive a need for additional controls.  As an example, a
> company may be legally restricted from receiving data related to a specific
> subsidiary.  Before requesting failure reports, any such data spillage risks
> have to be addressed through data management controls or publishing DMARC
> records for relevant sub-domains to prevent reporting on data related to
> their emails.
> 
> Out of band agreements between failure report senders and receivers may be
> required to address privacy concerns.
> 
> DMARC records for multi-organizational PSDs MUST NOT include the ruf= tag.


Dmarcbis allows PSDs to send messages.  Indeed the tree walk sections provide 
for cases where the first domain searched has psd=y.  PSDs should be able to 
get failure reports for the messages they send.  Publishing a ruf= tag is key 
to having a chance to get them.

The privacy consideration should prevent report generators from /sending/ 
failure reports for messages that were sent from a child domain of a PSD.  That 
is, an authentication failure in a message where the org domain is determined 
to be PSD+1 and the policy record is the PSD (because the org domain publishes 
no DMARC record) MUST NOT be reported.


Best
Ale
--