Re: [dmarc-ietf] easier DKIM, DMARC2 & SPF Dependency Removal

Hector Santos <hsantos@isdg.net> Sat, 24 June 2023 17:13 UTC

Return-Path: <hsantos@isdg.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B24FEC1575B5 for <dmarc@ietfa.amsl.com>; Sat, 24 Jun 2023 10:13:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.098
X-Spam-Level:
X-Spam-Status: No, score=-7.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=isdg.net header.b="QV8vMTjV"; dkim=pass (1024-bit key) header.d=beta.winserver.com header.b="nGTNMgt0"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Tvs373nT7OhF for <dmarc@ietfa.amsl.com>; Sat, 24 Jun 2023 10:13:45 -0700 (PDT)
Received: from mail.winserver.com (mail.winserver.com [3.137.120.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4E69DC1575AE for <dmarc@ietf.org>; Sat, 24 Jun 2023 10:13:45 -0700 (PDT)
DKIM-Signature: v=1; d=isdg.net; s=tms1; a=rsa-sha256; c=simple/relaxed; l=3966; t=1687626815; atps=ietf.org; atpsh=sha1; h=Received:Received:Received:Received:Subject:From:Date: Message-Id:To:Organization:List-ID; bh=KRtsdsieAYUyai0AJB6NwTHDI 47gWxFxYwYO9uphBKo=; b=QV8vMTjVdUNvxhMwyxrpzFC224esJyDzzJG5nKr9J RIhHwUGA7dygw+SfHRbt6ybskaByoS2sEGsgDqDML5bhVEoA0nDGNrKqJXuEu5vT b4vp9hkf89AWoLkRkeBwFYhUOeueafMKg7pPhBNDAbfnpwv4XZNsxAGV5EZR5Tsf C8=
Received: by winserver.com (Wildcat! SMTP Router v8.0.454.13) for dmarc@ietf.org; Sat, 24 Jun 2023 13:13:35 -0400
Authentication-Results: dkim.winserver.com; dkim=pass header.d=beta.winserver.com header.s=tms1 header.i=beta.winserver.com; adsp=none author.d=isdg.net signer.d=beta.winserver.com; dmarc=pass policy=reject author.d=isdg.net signer.d=beta.winserver.com (atps signer);
Received: from beta.winserver.com ([3.132.92.116]) by winserver.com (Wildcat! SMTP v8.0.454.13) with ESMTP id 3724531067.1.9184; Sat, 24 Jun 2023 13:13:34 -0400
DKIM-Signature: v=1; d=beta.winserver.com; s=tms1; a=rsa-sha256; c=simple/relaxed; l=3966; t=1687626813; h=Received:Received: Subject:From:Date:Message-Id:To:Organization:List-ID; bh=KRtsdsi eAYUyai0AJB6NwTHDI47gWxFxYwYO9uphBKo=; b=nGTNMgt0QH9goaSlJHG9788 o6GtlZdOBUnEAP6tZNdSDUaezSBw7EssPooYJB1KqTRVjuTVG+ijbvUUIqeQhZYH OGfKcHY3ObWxpiIOMUGSo5lTLwWC6eC0GFIdzD1pPyBctPECO545WF4eM8Ri9kiE n3npah3IeYJH0icIRazU=
Received: by beta.winserver.com (Wildcat! SMTP Router v8.0.454.12) for dmarc@ietf.org; Sat, 24 Jun 2023 13:13:33 -0400
Received: from smtpclient.apple ([99.122.210.89]) by beta.winserver.com (Wildcat! SMTP v8.0.454.12) with ESMTP id 4170586677.1.11248; Sat, 24 Jun 2023 13:13:32 -0400
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.400.51.1.1\))
From: Hector Santos <hsantos@isdg.net>
In-Reply-To: <fd57a401-2435-141f-5d28-ae4c8654c4e0@tana.it>
Date: Sat, 24 Jun 2023 13:13:21 -0400
Cc: dmarc@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <B6293B14-9E55-43A7-BD9B-DC5418536ED5@isdg.net>
References: <CABZJ8kmg75qo70V-N65b6C4w+g7gX0ehv3CsqG-765BbBGcn=A@mail.gmail.com> <20230623021810.E5F8DF9B3B94@ary.qy> <CAFcYR_WY8MEag7sup_7DnmzRuZJ7zeyJT6TATL45wCKBrsF3UQ@mail.gmail.com> <bfbe77ad-8aba-d803-de06-d734a177066b@taugh.com> <7A47A241-607B-4E93-B5E3-26E78FE3F166@isdg.net> <fd57a401-2435-141f-5d28-ae4c8654c4e0@tana.it>
To: Alessandro Vesely <vesely@tana.it>
X-Mailer: Apple Mail (2.3731.400.51.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/NnWFfNDjxCwoNk1a4Q0rzo6V-O8>
Subject: Re: [dmarc-ietf] easier DKIM, DMARC2 & SPF Dependency Removal
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 24 Jun 2023 17:13:49 -0000

Alessandro,  I believe we are on the same wave.  I support the DMARC1 tag extension `auth=‘ idea.   Do you have any suggestions for the text?  

Technically we don’t need DMARC1-Bis.   That document can move forward as is and a new draft proposal I-D called “DMARC1-EXTENSION-AUTH” can be written for relaxing the original DMARC1 (RFC 7489) and also the current DMARC1-bis.

—
HLS

> On Jun 24, 2023, at 12:17 PM, Alessandro Vesely <vesely@tana.it> wrote:
> 
> On Fri 23/Jun/2023 20:13:27 +0200 Hector Santos wrote:
>>> On Jun 23, 2023, at 12:52 PM, John R Levine <johnl@taugh.com> wrote:
>>> On Thu, 22 Jun 2023, Emanuel Schorsch wrote:
>>>> I agree with John's point that dkim+spf doesn't make sense in the context
>>>> of strict DMARC enforcement (I think it provides value for p=none domains
>>> Since the aggregate reports tell you what authentication worked, I don't even see that as a benefit.  There's also the question how many people would even look at a DMARC v2 tag which would be a prerequisite for the auth tag.
>> DMARC v1 supports extended tags.  See section 3.1.3 in RFC 7489:
>> 3.1.3 <https://datatracker.ietf.org/doc/html/rfc7489#section-3.1.3>.  Alignment and Extension Technologies
>>    If in the future DMARC is extended to include the use of other
>>    authentication mechanisms, the extensions will need to allow for
>>    domain identifier extraction so that alignment with the RFC5322 <https://datatracker.ietf.org/doc/html/rfc5322>.From
>>    domain can be verified.
> 
> 
> Eh?  Dkim+spf wouldn't be a new mechanism, as the domain identifier would have to be the same.  I'd have cited 6.3:
> 
> 6.3.  General Record Format
> https://datatracker.ietf.org/doc/html/rfc7489#section-6.3
> 
>   Section 11 creates a registry for known DMARC tags and registers the
>   initial set defined in this document.  Only tags defined in this
>   document or in later extensions, and thus added to that registry, are
>   to be processed; unknown tags MUST be ignored.
> 
> Of course, there will be lots of verifiers who ignore auth=, t=, and ed25519. Unfortunately, while we have so many blog posts, we're still missing DMARC verifier checks.
> 
> 
>>> The idea is that auth=dkim means you'd publish SPF records but hope people will ignore them, or vice versa for auth=dkim?  I still don't get it.
>> The immediate benefit would be forwarders. I believe Wei labeled this form of forwarding REM in the PDF analysis posted recently.
>> With REM forwarders, in SMTP transport terms, it is a passthru message forwarded to a recorded address given by the local domain or locally hosted domain Recipient , untouched data.  MTA inbound to MTA outbound. The MDA, like gmail.com <http://gmail.com/>, would see an SPF failure so the DMARC auth=dkim relaxed option tells GMAIL that the hard fail with SPF is acceptable, ignore it, but expect the DKIM to be valid from the author signer domain.
> 
> 
> SPF hard fail is acceptable even with the default auth=.  (SPF hard fail is a problem for those who reject before DATA.  Receiving MXes have no DKIM clue at that stage.  The only way forwarding might work without replacing the bounce address is if either the receiver or the SPF record provide for whitelisting. As a side note, let me add that I'm rejecting way more spam thanks to spf-all than DMARC and DNSBL together.)
> 
> The auth=dkim (excluding SPF) setting is needed by domains who /have/ to include a bloated SPF record in order to deliver at sites which only verify that.  However, since the bloated record allows impersonation, they don't want that DMARC verifiers consider it.  They probably wish that everybody used DMARC so that they could avoid publishing an SPF record, but there's not much they can do about it.
> 
> 
> Best
> Ale
> --