Re: [dmarc-ietf] Ticket #55 - Clarify legal and privacy implications of failure reports

Michael Thomas <mike@mtcc.com> Tue, 05 January 2021 20:11 UTC

Return-Path: <mike@fresheez.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 27A133A11B1 for <dmarc@ietfa.amsl.com>; Tue, 5 Jan 2021 12:11:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.012
X-Spam-Level:
X-Spam-Status: No, score=-2.012 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.248, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.262, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mtcc.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Sbrr4rV--oVa for <dmarc@ietfa.amsl.com>; Tue, 5 Jan 2021 12:11:57 -0800 (PST)
Received: from mail-pj1-x1036.google.com (mail-pj1-x1036.google.com [IPv6:2607:f8b0:4864:20::1036]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA6A13A11B0 for <dmarc@ietf.org>; Tue, 5 Jan 2021 12:11:57 -0800 (PST)
Received: by mail-pj1-x1036.google.com with SMTP id l23so310652pjg.1 for <dmarc@ietf.org>; Tue, 05 Jan 2021 12:11:57 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mtcc.com; s=fluffulence; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language; bh=GOHPWyZkUia3teNcb4Oeq1EEb6JqaPUWVvn9Q3ZTa1c=; b=kduuk53V7QC0RT26kTHdugnkVC1XYUHd4xcoSzPel1n39Fu5oXBzfKLAbyz7GKP7Yi GC8aCCvUiVmSDatkDS8pzVo+sB/TZ9DiRREb4H6UZUZClsQPxQeGi8JgtLOxdSSRhMoe /geNTyXPABnF0xvPIAVvV456cC4l+aWDnPYGUPXRMZEZ7LbucTp+93vE4V3PM1OPBeTz axAh258bcnKtL2M4q8wqmCxEeYRX1w0Mw8H0ugWmFPJyuh2lG+LWlTDDYF/i+lbCOTHL EvhBQYdrPCIOMQ35Zc++kwv2D1VSlQxRCZu9UdIyb4CA2nyStRycsbijugqkdj+B5uCg WYtA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language; bh=GOHPWyZkUia3teNcb4Oeq1EEb6JqaPUWVvn9Q3ZTa1c=; b=As6u9HtR8IrxIyGCqWO4G2fswad7H5GY8t1kIBxwcsBLoKmkjMVwNTaYhGP/CJn2x4 tyfgUg05TQUGYWFsLIyGMOeefRYZsP4bMIpwFVJFrFIaiWbTznOZYYAbxvjwDutXKpYK nD+At17bgtivS6cLXbqOJ5ueMC9jEayIn8ah2b20RrGOYwU2EOr/lRKxapdOfwFD5xce 1CJJZYi0wfpqoAuDNkvgM+jgCqnPe9KqN0AAuWnVz9Mon9xHs9yiDDSVGsCLs/f27GRb frMG0+iq6B/0WfGJr5SvVjxqYGFDySjnICtF2WS0GZ8V/TXcWTU0iOfqzl+m9Qa7Z+DC pp4g==
X-Gm-Message-State: AOAM531jiNwFXDHLcRYg+w8lxe50HxKjBVTqsnEFLZL0jTQ5vSfpfZWq 2R5G2Na+Fl/ZbQ2lZ6RyxEzit0AMM06Y3g==
X-Google-Smtp-Source: ABdhPJzCGrZScXT8r2+5vKkLKhjnYTl+vg1RECPQ6lTpQ2ZxcK+ZXRzm6sMdky6W2IaQI6p5agu0Sg==
X-Received: by 2002:a17:902:a983:b029:dc:2564:91f2 with SMTP id bh3-20020a170902a983b02900dc256491f2mr1195083plb.46.1609877515466; Tue, 05 Jan 2021 12:11:55 -0800 (PST)
Received: from mike-mac.lan (107-182-39-88.volcanocom.com. [107.182.39.88]) by smtp.gmail.com with ESMTPSA id i13sm43038pgd.32.2021.01.05.12.11.54 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 05 Jan 2021 12:11:54 -0800 (PST)
To: Dave Crocker <dcrocker@gmail.com>, dmarc@ietf.org
References: <20210104174623.2545154CFF9F@ary.qy> <FD45F9FC-46B0-40A9-ADC6-DDD7650D62F2@bluepopcorn.net> <ae77d9f-6f63-16ca-903a-7cb463a7b58d@taugh.com> <CABuGu1o2t7WaEOh+nsx3_MRUGgGHqKHzQ9302FM9-HL0GxvJvA@mail.gmail.com> <f15c8f53-8075-99a1-83c7-f687200e6a94@gmail.com> <f640ee95-ba0a-6aa7-1a14-2af1db151e27@mtcc.com> <050e8614-c088-a165-a733-35c5eee52eed@gmail.com>
From: Michael Thomas <mike@mtcc.com>
Message-ID: <cd3a41e8-cc4f-05eb-5c86-47b0047e8d08@mtcc.com>
Date: Tue, 05 Jan 2021 12:11:53 -0800
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.6.0
MIME-Version: 1.0
In-Reply-To: <050e8614-c088-a165-a733-35c5eee52eed@gmail.com>
Content-Type: multipart/alternative; boundary="------------B2A10F661D2B1C6569BB110A"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/NNs4q7p1zXuKtukGT7a2Sm5TWLg>
Subject: Re: [dmarc-ietf] Ticket #55 - Clarify legal and privacy implications of failure reports
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Jan 2021 20:11:59 -0000

On 1/5/21 12:04 PM, Dave Crocker wrote:
> On 1/5/2021 11:34 AM, Michael Thomas wrote:
>> On 1/5/21 11:22 AM, Dave Crocker wrote:
>>> From: header field rewriting demonstrates that DMARC is, indeed, 
>>> trivial to defeat (or rather, to route around.)  Also, receiver 
>>> filtering engines are all that matter.  Real-time actions by 
>>> recipients are demonstrably irrelevant to DMARC (and all other 
>>> anti-abuse) utility.
>>>
>> That's not the conclusion of the paper that Doug Foster linked to the 
>> other day.
>
>
> 1. I've looked back over his postings to this mailing list and am not 
> finding the link you refer to.  Please post it (again).
>
> 2. A single study is unlikely to be definitive about much of anything.
>
https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-hu.pdf

Actual data, actual experiments. Finally. And it's a lot better than all 
of the conjecture here which is the currency of the realm.


> When I first came back and saw the From rewriting I was very confused 
> by what it was until I figured out what was going on.
>
> You think you are representative of end users?  Try again.
>
>
I use my inner Luddite to use all of the time. It's one of my skills. 
But an MUA designed with security in mind with its UI would go a long 
way too. From re-writing is exactly the wrong thing to do from a 
security standpoint though.

Mike