Re: [dmarc-ietf] Is From spoofing an interoperability issue or not?

Hector Santos <hsantos@isdg.net> Thu, 20 April 2023 19:05 UTC

Return-Path: <hsantos@isdg.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CEDD5C152D86 for <dmarc@ietfa.amsl.com>; Thu, 20 Apr 2023 12:05:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=isdg.net header.b="butEkRRk"; dkim=pass (1024-bit key) header.d=beta.winserver.com header.b="nAy3FxNj"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fSB3nPNvTxtS for <dmarc@ietfa.amsl.com>; Thu, 20 Apr 2023 12:05:43 -0700 (PDT)
Received: from mail.winserver.com (mail.winserver.com [3.137.120.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 60D78C1516F3 for <dmarc@ietf.org>; Thu, 20 Apr 2023 12:05:43 -0700 (PDT)
DKIM-Signature: v=1; d=isdg.net; s=tms1; a=rsa-sha256; c=simple/relaxed; l=6861; t=1682017532; atps=ietf.org; atpsh=sha1; h=Received:Received:Received:Received:From:Message-Id:Subject: Date:To:Organization:List-ID; bh=OxikhvueANWKLK5ilAXl/WwmtmwbQnc N1Ob0NkO9v/A=; b=butEkRRkRyQ9QCOdUG2sEopgv+7Pht/rxTQWrD7qJp73W7b iPl04qjhkmaK3lxZO2UVEPFJU3h4MugC0/VocaKfZiZjKfdZ9wVIyq35n1ynfbCs fCXzaI201KoVr13Kz3Be1azZcId+qE9igaANGhdFmUhE8hpy+jIdWv0O2YFk=
Received: by winserver.com (Wildcat! SMTP Router v8.0.454.13) for dmarc@ietf.org; Thu, 20 Apr 2023 15:05:32 -0400
Authentication-Results: dkim.winserver.com; dkim=pass header.d=beta.winserver.com header.s=tms1 header.i=beta.winserver.com; adsp=none author.d=isdg.net signer.d=beta.winserver.com; dmarc=pass policy=reject author.d=isdg.net signer.d=beta.winserver.com (atps signer);
Received: from beta.winserver.com ([3.132.92.116]) by winserver.com (Wildcat! SMTP v8.0.454.13) with ESMTP id 2410320113.1.8672; Thu, 20 Apr 2023 15:05:31 -0400
DKIM-Signature: v=1; d=beta.winserver.com; s=tms1; a=rsa-sha256; c=simple/relaxed; l=6861; t=1682017529; h=Received:Received:From: Message-Id:Subject:Date:To:Organization:List-ID; bh=OxikhvueANWK LK5ilAXl/WwmtmwbQncN1Ob0NkO9v/A=; b=nAy3FxNjHiaZRf5Vqwq0LQ//9N/j FxnCmHgYfSHxF/KPclsWmvLex20OSvMqmmH4iGnc6Yus9ZE4n4Xyv6+nBfhuf4uw Jp2LiSE4/Bx1td4+coIFFcdGWD85IZ62EpWfqYrp3N/0cq6ZnuMoKoszMMytP0V/ ZF+fA1pHJIrJVQ8=
Received: by beta.winserver.com (Wildcat! SMTP Router v8.0.454.12) for dmarc@ietf.org; Thu, 20 Apr 2023 15:05:29 -0400
Received: from smtpclient.apple ([99.122.210.89]) by beta.winserver.com (Wildcat! SMTP v8.0.454.12) with ESMTP id 2856356566.1.16048; Thu, 20 Apr 2023 15:05:27 -0400
From: Hector Santos <hsantos@isdg.net>
Message-Id: <1B06314A-9D8C-44C8-B685-CD5EC09BF35B@isdg.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_6464E3E8-B6CC-4265-B503-4A8E64B528DE"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.400.51.1.1\))
Date: Thu, 20 Apr 2023 15:05:25 -0400
In-Reply-To: <f99522bf-3802-4a9d-b098-683be77de67c@app.fastmail.com>
Cc: IETF DMARC WG <dmarc@ietf.org>
To: Jesse Thompson <zjt@fastmail.com>
References: <20230419132048.50E0CC01C901@ary.qy> <CF4A2AA2-7EAC-4525-844F-530A12DEC065@wordtothewise.com> <0abf9711-ca1c-bfcf-afb2-15e16b9de149@tana.it> <f99522bf-3802-4a9d-b098-683be77de67c@app.fastmail.com>
X-Mailer: Apple Mail (2.3731.400.51.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/JJ73sXaNn-GQDnvmgFcZm33gGnY>
Subject: Re: [dmarc-ietf] Is From spoofing an interoperability issue or not?
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Apr 2023 19:05:47 -0000


> On Apr 19, 2023, at 10:29 PM, Jesse Thompson <zjt@fastmail.com> wrote:
> 
> The choice for both the mailing list and mail-service company is to:
> 
> 1) ignore DMARC and continue to emit mail as the original author intended (the author might be ignorant of DMARC too) and assume the mailbox providers are smart enough to understand that, like mailing lists, mail-service companies and their mail emitting authors shouldn't be caught up by a DMARC misdeployment by the domain owner

This will cause the list bounce problem.  This was seen immediately in the IETF list when it 100% ignorance of DKIM.  Signatures broke.  

Solution: Support DKIM and resign as 3rd party
Problem: Policy does not allow a resigner.

No one honored broken signatures, policies. Recorded as fail but no lost until YAHOO shook the world and began to honor p=reject policies.  Bounce problem.


> 2) be cognisant of DMARC's effects, and in the interest of keeping the author's mail flowing, use a different domain and put the author's address in the friendly from or similar, or just refuse to accept the messages, until delegation can be set up

> I can say, anecdotally, that people really really want #1 to be true, but they eventually learn #2 leads to a better long term outcome. I'd like that "learning" to be less painful by having something unambiguous to point at in DMARCbis.
> 

We allowed a protocol incomplete to take off without dealing with the known potential problem.  No one will honor DKIM policy stuff.

Now its broken.

As a Mailing List Server developer, we need a migration path to a 3rd option (ATPS concept) which using #2 temporarily.   Ideally no From destruction is the goal.  For now, I use #2 restrictions on subscription and submissions 

—
HLS