Re: [dmarc-ietf] DMARC2 & SPF Dependency Removal

Scott Kitterman <sklist@kitterman.com> Thu, 08 June 2023 15:46 UTC

Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 15AF3C151090 for <dmarc@ietfa.amsl.com>; Thu, 8 Jun 2023 08:46:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=kitterman.com header.b="DCthWd5R"; dkim=pass (2048-bit key) header.d=kitterman.com header.b="rUK8gkJ1"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5h30Yj-r5pl6 for <dmarc@ietfa.amsl.com>; Thu, 8 Jun 2023 08:46:29 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [IPv6:2604:a00:6:1039:225:90ff:feaa:b169]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7113CC15108C for <dmarc@ietf.org>; Thu, 8 Jun 2023 08:46:28 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [IPv6:2604:a00:6:1039:225:90ff:feaa:b169]) by interserver.kitterman.com (Postfix) with ESMTPS id 5606BF802C8; Thu, 8 Jun 2023 11:46:09 -0400 (EDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903e; t=1686239150; h=date : from : to : subject : in-reply-to : references : message-id : mime-version : content-type : content-transfer-encoding : from; bh=DB+X4nqlp5BS2uZkzV+d1B6YWILqD2aKBoI7xOGcc4o=; b=DCthWd5RQXfzUrzcgtBReSo+PWPhvQUbccnPuDAr0UNgyUWoR5+sgebhVv1FUz88hl11R Nzmt9XTxe+1EWqlCw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903r; t=1686239150; h=date : from : to : subject : in-reply-to : references : message-id : mime-version : content-type : content-transfer-encoding : from; bh=DB+X4nqlp5BS2uZkzV+d1B6YWILqD2aKBoI7xOGcc4o=; b=rUK8gkJ16SS7NmumtppktHXoKxpd4XbXvv3yNClnfLTfzreM3cffzDB8WgNTVu+YnP884 KB3TxSXOzsKa5Et+/nKvBZH2Hr/a7SfOrAXdOKa7ZCyeUCu250bN0Z9Vu5EAiDWJ2kftCmf TJZhZ+AP1nTJvfoJo9j2Fcb1P5TI9gHZ2llJpFYNwc3eiEDaO5AoxSfjuq+dkzJ9anxTelO wFQ2gwOMicG5oyFkfTaom0OFXqzfSywoPxdyFU5497dodSWgFd6mCL5dkKo+9eNB7WbE5vY NeZpKEnWH3OvFgAOiO0ito17CZqrXkGaCxD5JR2dAwuUSMHYKoGe+OQKzbCQ==
Received: from [127.0.0.1] (mobile-166-171-56-204.mycingular.net [166.171.56.204]) by interserver.kitterman.com (Postfix) with ESMTPSA id 38496F8018E; Thu, 8 Jun 2023 11:45:50 -0400 (EDT)
Date: Thu, 08 Jun 2023 15:45:39 +0000
From: Scott Kitterman <sklist@kitterman.com>
To: dmarc@ietf.org
In-Reply-To: <CAL0qLwbx6Y=kmB5pQZx8gNqD=rLBYz1vLOX6ngL=wUHHUm0Hjw@mail.gmail.com>
References: <30BB83B2-B454-41B8-992B-8E2569802D9C@1und1.de> <CAL0qLwbx6Y=kmB5pQZx8gNqD=rLBYz1vLOX6ngL=wUHHUm0Hjw@mail.gmail.com>
Message-ID: <1485764E-7BE3-433C-B03C-9392A14888F8@kitterman.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/SqrwTD1ZLrY7FMElhGXgR7ZdfFw>
Subject: Re: [dmarc-ietf] DMARC2 & SPF Dependency Removal
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Jun 2023 15:46:35 -0000


On June 8, 2023 2:20:44 PM UTC, "Murray S. Kucherawy" <superuser@gmail.com> wrote:
>On Thu, Jun 8, 2023 at 6:00 AM Tobias Herkula <tobias.herkula=
>401und1.de@dmarc.ietf.org> wrote:
>
>> My team recently concluded an extensive study on the current use and
>> performance of DMARC. We analyzed a staggering 3.2 billion emails, and the
>> insights drawn are quite enlightening. Of these, 2.2 billion emails
>> (approximately 69%) passed the DMARC check successfully. It's quite an
>> achievement, reflective of our collective hard work in fostering a safer,
>> more secure email environment.
>>
>>
>>
>> However, upon further analysis, it's evident that a mere 1.6% (or
>> thirty-six million) of these DMARC-passed emails relied exclusively on the
>> Sender Policy Framework (SPF) for validation. This is a remarkably low
>> volume compared to the overall DMARC-passed traffic, raising questions
>> about SPF's relevancy and the load it imposes on the DNS systems.
>>
>>
>>
>> Given the current use case scenarios and the desire to optimize our
>> resources, I propose that we explore the possibility of removing the SPF
>> dependency from DMARC. This step could result in a significant reduction in
>> DNS load, increased efficiency, and an accurate alignment with our
>> predominant use cases.
>>
>> [...]
>>
>
>Does anyone have consonant (or dissonant) data?
>
I don't have data, but I do have a different view on how to frame the data.

We've expended a lot of cycles in this working group on trying to figure out how to make DMARC more reliable because it is not sufficiently so for all domains to publish a restrictive DMARC policy (in fact, progress in the working group is currently blocked on the question of how to describe this).

I don't think DMARC has a surplus of reliability such that we should think about giving some of it away voluntarily.  I submit that this 1.6% is not "mere", it's huge.

What do I mean by that?  That 1.6% will include both domains which use SPF alone and which use both SPF and DKIM.  DKIM is not perfect.  When I did have access to relevant data, I recall seeing typical DKIM verification rates for direct mail typically between 99.2% and 99.8%.  It was never 100%.  For SPF, when the SPF record was correct, it was almost always 100%.  Based on this historical experience, I suspect that a significant fraction of that 1.6% are cases like this where SPF saves the DMARC result when DKIM has failed.  

For the overall protocol, DKIM and SPF are complementary.  While an estimated 0.5% drop in DMARC failures may not seem like much, I think it's a lot and we don't have a surfeit of reliability that we should give some away.

I suspect that the real driver here is senders allowing too much "bad" mail to get an SPF pass (I have also seen, but do not have access to, data that indicates this is the case).  DKIM has similar problems (see the recent DKIM working group discussions on replay attacks).  I think working on that problem (SPF/DKIM pass rates for "bad" mail) is where the focus should be.

Not a DMARC working group issue.

Scott K