Re: [dmarc-ietf] Proposing an extension to DMARC to optionally require SPF and DKIM

Scott Kitterman <sklist@kitterman.com> Tue, 02 April 2013 03:34 UTC

Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1575721E8163 for <dmarc@ietfa.amsl.com>; Mon, 1 Apr 2013 20:34:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ps3yP4lmKXsg for <dmarc@ietfa.amsl.com>; Mon, 1 Apr 2013 20:34:51 -0700 (PDT)
Received: from mailout02.controlledmail.com (mailout02.controlledmail.com [72.81.252.18]) by ietfa.amsl.com (Postfix) with ESMTP id F3FAB21E8156 for <dmarc@ietf.org>; Mon, 1 Apr 2013 20:34:50 -0700 (PDT)
Received: from mailout02.controlledmail.com (localhost [127.0.0.1]) by mailout02.controlledmail.com (Postfix) with ESMTP id 3654720E40D5; Mon, 1 Apr 2013 23:34:50 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=2007-00; t=1364873690; bh=Xshbovo9eqjqjGvyyOWBbGzKsGTFlRiLgCHpmC8zdTk=; h=From:To:Subject:Date:In-Reply-To:References:From; b=N1xgMgMGneLwTT0ZuSPaqvZFk1FnzhzuadCJ17tO0cBAzvsced4f6zP34aV1BETke RF4pUQee0ejG7fvDagR+dK9Xr0bJL8a9VVoTl288JPhuTkLUM42MHTJw4bt20vYppP 89MIg5a9th86BaNypoHTjTM+VS82bqf1/K6FVoc4=
Received: from scott-latitude-e6320.localnet (static-72-81-252-21.bltmmd.fios.verizon.net [72.81.252.21]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout02.controlledmail.com (Postfix) with ESMTPSA id 1A3EA20E4090; Mon, 1 Apr 2013 23:34:49 -0400 (EDT)
From: Scott Kitterman <sklist@kitterman.com>
To: dmarc@ietf.org
Date: Mon, 01 Apr 2013 23:34:49 -0400
Message-ID: <3148207.XmBmmHESji@scott-latitude-e6320>
User-Agent: KMail/4.9.5 (Linux/3.5.0-26-generic; KDE/4.9.5; i686; ; )
In-Reply-To: <CD3757DA7F9B46888C89CB10FF032227@fgsr.local>
References: <55b1222360ab4215a09a54da800d261b@BL2SR01MB605.namsdf01.sdf.exchangelabs.com> <CE39F90A45FF0C49A1EA229FC9899B0563403A@USCLES544.agna.amgreetings.com> <CD3757DA7F9B46888C89CB10FF032227@fgsr.local>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"
X-AV-Checked: ClamAV using ClamSMTP
Subject: Re: [dmarc-ietf] Proposing an extension to DMARC to optionally require SPF and DKIM
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Apr 2013 03:34:52 -0000

On Tuesday, April 02, 2013 04:44:27 AM J. Gomez wrote:
> On Tuesday, April 02, 2013 4:22 AM [GMT+1=CET], MH Michael Hammer (5304) 
wrote:
> > DMARC is not particularly new. The private implementations date back
> > to the 2007 timeframe. The goal of creating a public standard based
> > on the successes seen in the private channel implementations was
> > intended to open it up from a private club with limited membership to
> > something that anyone could implement.
> 
> So, you want the public to aknowledge a private practice as a public
> standard, and at the same time you don't want input from the public but
> blind adhesion, because, you know, it has been working fine in our private
> club?

It was private in 2007.  It's been public for quite some time.  There is, in 
fact, already an open source, high quality C library and milter that supports 
DMARC:

http://www.trusteddomain.org/opendmarc.html

I'm running it in production (and I was not part of that private club) and I 
know others are too.  This may be new to you, but there's an experience base 
built around the current spec and some momentum towards deployment.  

Considering that many of the largest mail providers in the world are among the 
implementers, it's more than just a small private club.

> > Trying to overload other
> > design parameters to attempt to solve something that DMARC
> > intentionally did not try to solve is a dangerous path to go down.
> 
> Terry's proposed extension is:
> 
> 1. Optional,
> 2. Non-default, and
> 3. Not more relaxed but more strict.
> 
> Where is the danger? You don't have the need?, well then go with the more
> relaxed default.
> > I use shared IPs across domains
> > but I DKIM sign those domains and each of the domains has similar
> > security implementations. So from my perspective it is possible to
> > do.... I've been doing it for years.
> 
> So what? Good for you. The world is wide. One size does not fit all, yada
> yada...
> 
> Again, is the proposed optional extension damaging to DMARC's goals? Are
> DMARC's goals those of a private club, or those of the non-spoofing email
> community at large?

First, consider that DMARC itself is optional.  Now you have an optional add 
on that receivers have to consider.  By complicating the deployment decision 
making process, more choices and options slow things down.  That doesn't mean 
they are always to be avoided, but they have a cost.

Second, consider what the deployed receiver base of this option to an option 
is likely to be?  It's zero now.  What sender would rely on it when no 
receiver processes it?  The other way around too.  Getting past this 
chicken/egg problem is hard.  The DMARC folks have spent years working on it.

Third, if an extension like the one you propose has value, it can be added 
later.  There's no need for it to be included in the initial round of 
discussions/standardization of DMARC.  As long as the DMARC record structure 
is extensible to support new policy types (I haven't checked and I don't 
remember) then this can be done later.

If you want to get this to work, focus on making sure the base protocol is 
extensible to do what you want and then work on developing interest and 
momentem around code and deployment to support it.

If you want to change things, that's how to get it done.  It's WAY harder than 
writing emails to IETF lists.

Scott K