Re: [dmarc-ietf] Proposed text for p=reject and indirect mail flows

Dotzero <dotzero@gmail.com> Fri, 14 April 2023 19:37 UTC

Return-Path: <dotzero@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EBBD6C151B0D for <dmarc@ietfa.amsl.com>; Fri, 14 Apr 2023 12:37:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.094
X-Spam-Level:
X-Spam-Status: No, score=-2.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W91ncHZGxWGn for <dmarc@ietfa.amsl.com>; Fri, 14 Apr 2023 12:37:08 -0700 (PDT)
Received: from mail-vs1-xe30.google.com (mail-vs1-xe30.google.com [IPv6:2607:f8b0:4864:20::e30]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0B712C15152D for <dmarc@ietf.org>; Fri, 14 Apr 2023 12:37:07 -0700 (PDT)
Received: by mail-vs1-xe30.google.com with SMTP id a9so18084346vsh.3 for <dmarc@ietf.org>; Fri, 14 Apr 2023 12:37:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1681501027; x=1684093027; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=2akxSfY7/nKexOw+VXsVSzehL1kOuxfJMySOemKisvI=; b=obVXQZkspuyIQVz/a2da6yGV3DQZ5HyiLg28XumEgtRwnmsiGXf8OG7wMUQj7CJdkK RqQ9Sl7Y29VFiRC98/UZSD3zotSOmqyxV0/Ld9SkGDxzITed3V221bvC3KJgb36ITVIR KWjaFSnHQvJg4UlNCJoWD9XD1OVvKoHFy41x7U9lAA4TMcvlKyvq6DwqASbtNbhh//db zzMfW+u9aMdfGa/aV/FEo6JuFroUcPmtexlw1MflgDttJbwfcSzSuyIR5Br1F0HZLJQW VlQm4vJLov9YJRCpxdNitreKm6qy82Kkv9/bz6JB2Tvr417Q6axDAQwfoO3prKCR2xrD ziaw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1681501027; x=1684093027; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=2akxSfY7/nKexOw+VXsVSzehL1kOuxfJMySOemKisvI=; b=mIM9eGeqf1H4z9oSVyDhhCTBUPBceMfTUejy81PWGmmzKrGqT1HtmANwVMlwRWv2WV 6DHy+v2ybwjg3aK5gxt8UWNf//ibG0mfBWGTA63KFG9lcPrnbkVkEfSfUQfl5jaAXXgw vFPAHORJcqt4AHtB/QSOITHyyapd5vgoep0u5FyiWEcYf6uCoEn5f5vjLfHHYpshLarM JhTY1y4fNaks1DRH/JZsXXETXGucqhK0ClaTwY94idYKWGOhYCL0YIV65sqzyyh7w9cI KVuCNW6euYzl43PdG7ihOExhx4nL6t7KagY14BQ3awIlDe3+c5JDYAukjlhMHrbpAyDf ks7A==
X-Gm-Message-State: AAQBX9d4+dZCYj6T9+iR7XjkT/t8GGViWYnchukmx1tRV8fAAeIRJq6a ts40W5zf7I3S+rKGIxs8mr4yo7xuYXxtQU78RfI=
X-Google-Smtp-Source: AKy350Yh1fxb9e36avnchyPBC3lKxdvfrl7hlN5zYIGeNFWkhRA1Cssa4FtvrOIGmuniqELiTBVrtd14qMZ3lpQUT/E=
X-Received: by 2002:a67:c885:0:b0:42e:4c98:a793 with SMTP id v5-20020a67c885000000b0042e4c98a793mr1307655vsk.5.1681501026666; Fri, 14 Apr 2023 12:37:06 -0700 (PDT)
MIME-Version: 1.0
References: <CALaySJ+NBg9vzqa0_t-sBf7EKXQ3A=DTyy-Vc7M-ZK9-vfJxmw@mail.gmail.com> <13603D87-4FDE-4768-9712-E6DB0818C802@kitterman.com> <CALaySJLY-9O1Wauk50WMMobNs3cKUzmB+=np080nYCHEZa32UA@mail.gmail.com> <3129648.WqDQmVRvLn@localhost> <CAJ4XoYe3Z8=G8H6hQFuiMMwfZQt1JvLpK3bQmrtGCz=b-w=CJA@mail.gmail.com> <86E22FA6-759F-40F3-AEA3-119EE90F64A0@kitterman.com> <80086446-effa-7ee2-91c7-1f44449d92fb@tekmarc.com> <CAL0qLwaKO5A_OSjod00msw+8EALOUqYzeXb_aPjVhQ2R1wZKJg@mail.gmail.com> <def03c2f-25ec-d3f1-1ea5-678b16369f61@tana.it> <8D2F4B6A-2E72-4763-8B1F-719236B21D1E@wordtothewise.com> <CAH48ZfxP3F0jueQwsFyXBUojQryO2NOhCZzKxbLiZMHW3h10Zg@mail.gmail.com> <5ABFFAF7-4B03-4CCC-81C2-303A6B6F506E@wordtothewise.com> <f5a510b6-553c-e07c-c249-03a68c3cc60e@tana.it> <899E29E9-71E0-49DC-A3C4-746766C7EC67@wordtothewise.com>
In-Reply-To: <899E29E9-71E0-49DC-A3C4-746766C7EC67@wordtothewise.com>
From: Dotzero <dotzero@gmail.com>
Date: Fri, 14 Apr 2023 15:36:54 -0400
Message-ID: <CAJ4XoYftxv21D7mhXdRzg+f4Qo99Y=qcZ+eK5_PvPv62hVbM_A@mail.gmail.com>
To: Laura Atkins <laura@wordtothewise.com>
Cc: IETF DMARC WG <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000624d1105f950f7dd"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/S7kC2-YbwQekcjQpf4zI5uSf4ZE>
Subject: Re: [dmarc-ietf] Proposed text for p=reject and indirect mail flows
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Apr 2023 19:37:12 -0000

On Fri, Apr 14, 2023 at 2:00 PM Laura Atkins <laura@wordtothewise.com>
wrote:

>
>
> On 14 Apr 2023, at 18:38, Alessandro Vesely <vesely@tana.it> wrote:
>
> On Wed 12/Apr/2023 13:41:16 +0200 Laura Atkins wrote:
>
> On 12 Apr 2023, at 12:21, Douglas Foster <
> dougfoster.emailstandards@gmail.com> wrote:
> Any form of security creates inconvenience.
>
> Yes. And we make tradeoffs between that. In this case, the security is
> ensuring that users at specific domains can and should only send mail
> through approved channels managed by those domains. Many users have
> violated those security policies, by participating in mailing lists. This
> caused problems for other folks on the mailing lists - as they were the
> ones removed from the list due to the security policy. The lists responded
> by rewriting. This causes yet more inconvenience to other subscribers and,
> additionally, allows the users to bypass their domain security policy.
> I am not seeing how this creates an arena of security.
>
>
>
> Security is not From: munging.  That's the workaround that security
> requires.
>
>
> No security (at least in the viewpoint of some people) is using a p=reject
> for mail from their domain. In that context, From: munging is actively
> subverting the security  settings of domains.
>
>
> Based on the header rewriting done by IETF, I have a hard time seeing how
> its rewrite of Comcast addresses can cause any of the problems that you
> cite.
>
> That’s how the IETF rewrites, it’s not how everyone rewrites.
>
>
> Couldn't the IETF say how to rewrite?
>
>
> There’s currently a deployed base where there are many different ways to
> munge. "It is a _fact_.”
>
>
> But does your domain require even headers to be rewritten?    Why doesn't
> IETF ask you, and omit rewrite if that is what your domain wants?
>
> Because that doesn’t scale for the IETF.
>
>
> Mailman options do scale.  From: rewriting is going to fade off by first
> allowing single subscribers to disable it, for the posts
>
> directed to them, after their MX set up some kind of agreement with the
> MLM.
>
>
> The _fact_ still remains that From: rewriting is actively subverting the
> security of domains that choose to publish p=reject.
>
> It is hard for me to cry over mailing lists when they cannot ensure that a
> post comes from the asserted poster and they cannot adapt their DMARC
> defenses to the preferences of the recipient domains.   Life is hard.   It
> only gets harder if I wait for someone else to solve problems that I can
> solve myself.
>
> I don’t understand how header rewriting ensures the authenticity of a
> poster. Given the data is being modified by the MLM, it seems to me that
> rewriting compounds the problem.
>
>
>
> It doesn't.  The authenticity should be checked on entry.  THIS IS ABUSE
> post had dkim=fail by ietfa.amsl.com, but they didn't bother rejecting
> for that, which is what they should have done.  We are suffering all the
> damage caused by DMARC but don't enjoy any of the advantages it could bring.
>
>
> I encourage you to think very hard about why, after more than a decade, we
> still don’t see any of the advantages to DMARC.
>

While the you part of "we" may not see any advantages, quite a few
financials, greeting card sites, retailers AND many receivers have seen the
advantages, including p=reject. One thing I've learned over the years is
that it is presumptuous to speak on behalf of "everyone" when you don't
actually have their authorization to speak on their behalf. It's kind of
like sending email claiming to be from someone else's domain without their
permission.

Michael Hammer