Re: [dmarc-ietf] Proposed rework of the wording in section 2.1 of draft-dmarc-interoperability

Eliot Lear <lear@cisco.com> Tue, 08 December 2015 18:26 UTC

Return-Path: <lear@cisco.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB86E1A1A5A for <dmarc@ietfa.amsl.com>; Tue, 8 Dec 2015 10:26:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2pSxq0_mEsBr for <dmarc@ietfa.amsl.com>; Tue, 8 Dec 2015 10:26:06 -0800 (PST)
Received: from aer-iport-3.cisco.com (aer-iport-3.cisco.com [173.38.203.53]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 51CFA1A1A90 for <dmarc@ietf.org>; Tue, 8 Dec 2015 10:26:06 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=8170; q=dns/txt; s=iport; t=1449599166; x=1450808766; h=subject:to:references:from:message-id:date:mime-version: in-reply-to; bh=e0gmjfZJd+w70yTav81JGz1iFCcvam35F/f81loRQlM=; b=EpdG94dA+eL1x83tSG8nX1AS4uivjH9EOh5iZbcPwXQjp3USCemDdHrc 4f+qM4eqNDBcdwfHRz12HXUJezuY+j7BgGM7psZAbPvyPQp/KYUg2kxxq rZEqMnEsOoDD+MxO7ql14l4xDBASI4NdVairyvKtI2yCFXul9nKmPwHUf w=;
X-Files: signature.asc : 481
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CoBABoH2dW/xbLJq1exDeCXoMwAoILAQEBAQEBgQuENQEBBCNPBhELGAkWCwICCQMCAQIBRQYBDAgBAReIFK9QkHABAQEBAQEBAwEBAQEBAQETCYtRh3eBRAEEh0+PEoJhgWKDF4VigVuHRopwiFxjgkSBQT2EWyWBIwEBAQ
X-IronPort-AV: E=Sophos;i="5.20,400,1444694400"; d="asc'?scan'208";a="607080529"
Received: from aer-iport-nat.cisco.com (HELO aer-core-2.cisco.com) ([173.38.203.22]) by aer-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 08 Dec 2015 18:26:04 +0000
Received: from [10.61.173.38] ([10.61.173.38]) by aer-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id tB8IQ3b7028783; Tue, 8 Dec 2015 18:26:03 GMT
To: "Kurt Andersen (b)" <kboth@drkurt.com>, "dmarc@ietf.org" <dmarc@ietf.org>
References: <CABuGu1pKn-nH57JzNQSqLHHxTZXe9CXWvz7bB6ynZ8PC7QOtTQ@mail.gmail.com>
From: Eliot Lear <lear@cisco.com>
X-Enigmail-Draft-Status: N1110
Message-ID: <566720BA.5080601@cisco.com>
Date: Tue, 08 Dec 2015 19:26:02 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:38.0) Gecko/20100101 Thunderbird/38.4.0
MIME-Version: 1.0
In-Reply-To: <CABuGu1pKn-nH57JzNQSqLHHxTZXe9CXWvz7bB6ynZ8PC7QOtTQ@mail.gmail.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="NRFvmrtLbkGtHwEPxMG3q9qgdOpWSjEnR"
Archived-At: <http://mailarchive.ietf.org/arch/msg/dmarc/KfF_UepPUx-jAYeui0uhBApzWhc>
Subject: Re: [dmarc-ietf] Proposed rework of the wording in section 2.1 of draft-dmarc-interoperability
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Dec 2015 18:26:08 -0000

Hi Kurt,

I need a bit more time to review this text, but I want to point out that
one of my main issues was that an example or two that highlights the
fields or the SMTP exchange would be helpful.  I am willing to toss
something together for the group's consideration if you want me to pass
the token.  Depending on their length I would drop these inline or in an
appendix.

Eliot


On 12/7/15 4:23 PM, Kurt Andersen (b) wrote:
> Rather than submit this directly as a draft update, I wanted to
> circulate my proposed change for "pre"comment to see if it addresses
> the concern with undue textual density in section 2.1, particularly
> the last paragraph about SPF identifiers. My proposed rework for
> section 2.1 follows below. I have split the section into subsections
> dealing each with the DKIM and SPF identifiers and expanded the
> discussion around the SPF identifiers.
>
> Comments welcome.
>
> --Kurt Andersen
>
> Currently, section 2.1 reads:
>
> 2.1. Identifier Alignment
>
> DMARC relies on DKIM [RFC6376] and SPF [RFC7208] to perform message
> source validation. The DMARC [RFC7489] mechanism refers to source
> domains that are validated by DKIM or SPF as Authenticated
> Identifiers. DMARC requires an Authenticated Identifier to be related
> to the domain found in the message's RFC5322.from header field
> [RFC5322]. This relationship is referred to as Identifier Alignment.
>
> DMARC allows for Identifier Alignment to be achieved in two different
> modes: strict and relaxed. Strict mode requires an exact match of
> either of the Authenticated Identifiers to the message's RFC5322.from
> header field [RFC5322]. Relaxed mode allows for Identifier Alignment
> if Authenticated Identifiers and the message's RFC5322.from header
> field [RFC5322] share the same Organizational Domain. In general,
> interoperability issues between strict and relaxed modes are the same,
> with strict mode constraining the application of possible solutions.
> The mitigations described in this document generally require a relaxed
> mode of Identifier Alignment.
>
> DKIM provides a cryptographic means for a domain identifier to be
> associated with a particular message. As a standalone technology DKIM
> identifiers are not required to be relevant to the content of a
> message. However, for a DKIM identifier to align in DMARC, the signing
> domain of a valid signature must be part of the same Organizational
> Domain as the domain in the RFC5322.from header field [RFC5322].
>
> In addition, DKIM allows for the possibility of multiple valid
> signatures. The DMARC mechanism will process Authenticated Identifiers
> that are based on DKIM signatures until an aligned Authenticated
> Identifier is found (if any). However, operational experience has
> shown that some implementations have difficulty processing multiple
> signatures. The impact on DMARC processing is clear: implementations
> that cannot process multiple DKIM signatures may incorrectly flag
> messages as "failing DMARC" and erroneously apply DMARC based policy
> to otherwise conforming messages.
>
> SPF can provide two Authenticated Identifiers. The DMARC relevant
> Authenticated Identifiers that SPF provides is the RFC7208.MAILFROM
> [RFC7208] based on the RFC5321.mailfrom [RFC5321] domain, or, if the
> RFC5321.mailfrom address is absent (as in the case of "bounce"
> messages), on the RFC5321.HELO/EHLO SMTP domain. The SPF validated
> domain in RFC7208.MAILFROM must be part of the same Organizational
> Domain as the domain in the RFC5322.from header field to be aligned.
> It is important to note that even when an SPF record exists for the
> domain in RFC5322.from [RFC5322], SPF will not authenticate it unless
> it is also the domain checked by SPF. Also note that the
> RFC7208.MAILFROM definition is different from the RFC5321.mailfrom
> [RFC5321] definition.
>
> -----------------------
> Proposed rework:
>
> 2.1. Identifier Alignment
>
> DMARC relies on DKIM [RFC6376] and SPF [RFC7208] to perform message
> source validation. The DMARC [RFC7489] mechanism refers to source
> domains that are validated by DKIM or SPF as Authenticated
> Identifiers. DMARC requires an Authenticated Identifier to be related
> to the domain found in the message's RFC5322.from header field
> [RFC5322]. This relationship is referred to as Identifier Alignment.
>
> DMARC allows for Identifier Alignment to be achieved in two different
> modes: strict and relaxed. Strict mode requires an exact match of
> either of the Authenticated Identifiers to the message's RFC5322.from
> header field [RFC5322]. Relaxed mode allows for Identifier Alignment
> if Authenticated Identifiers and the message's RFC5322.from header
> field [RFC5322] share the same Organizational Domain. In general,
> interoperability issues between strict and relaxed modes are the same,
> with strict mode constraining the application of possible solutions.
> The mitigations described in this document generally require a relaxed
> mode of Identifier Alignment.
>
> 2.1.1. DKIM Identifier(s)
>
> DKIM provides a cryptographic means for one or more domain identifier
> to be associated with a particular message. As a standalone technology
> DKIM identifiers are not required to be relevant to the content of a
> message. However, for a DKIM identifier to align in DMARC, the signing
> domain of a valid signature must be part of the same Organizational
> Domain as the domain in the RFC5322.from header field [RFC5322].
>
> In addition, DKIM allows for the possibility of multiple valid
> signatures. The DMARC mechanism will process Authenticated Identifiers
> that are based on DKIM signatures until an aligned Authenticated
> Identifier is found (if any). However, operational experience has
> shown that some implementations have difficulty processing multiple
> signatures. The impact on DMARC processing is clear: implementations
> that cannot process multiple DKIM signatures may incorrectly flag
> messages as "failing DMARC" and erroneously apply DMARC based policy
> to otherwise conforming messages.
>
> 2.1.2. SPF Identifier(s)
>
> The SPF specification [RFC7208] defines two Authenticated Identifiers
> for each message. These identifiers derive from:
>
>     a. the RFC5321.mailfrom [RFC5321] domain, and
>     b. the RFC5321.HELO/EHLO SMTP domain.
>
> In the SPF specification, the RFC7208.MAILFROM [RFC7208] value is
> defined to be based on RFC5321.mailfrom unless that value is absent
> (as in the case of "bounce" messages) in which case, the second
> (RFC5321.HELO/EHLO) identifier value is used. This "fallback"
> definition has occasionally been misunderstood by senders since
> "bounce" messages are often an "automatic" feature of MTA software.
>
> For the purposes of DMARC validation/alignment, the hybrid
> RFC7208.MAILFROM [RFC7208] identifier's domain is used if, and only
> if, it is aligned with the RFC5322.from [RFC5322] domain. The
> alignment of the validated domain is determined based on the DMARC
> record's "strict" or "relaxed" designation as described above for the
> DKIM identifiers and in [RFC7489].
>