Re: [dmarc-ietf] Ticket #1 - SPF alignment

Scott Kitterman <sklist@kitterman.com> Wed, 10 February 2021 14:43 UTC

Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1BFCA3A0C28 for <dmarc@ietfa.amsl.com>; Wed, 10 Feb 2021 06:43:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_FAIL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=kitterman.com header.b=T9MKRoc7; dkim=pass (2048-bit key) header.d=kitterman.com header.b=n5yjnGMR
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6H0QEDfEZrnt for <dmarc@ietfa.amsl.com>; Wed, 10 Feb 2021 06:43:06 -0800 (PST)
Received: from interserver.kitterman.com (interserver.kitterman.com [IPv6:2604:a00:6:1039:225:90ff:feaa:b169]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E22473A0C36 for <dmarc@ietf.org>; Wed, 10 Feb 2021 06:43:05 -0800 (PST)
Received: from interserver.kitterman.com (interserver.kitterman.com [64.20.48.66]) by interserver.kitterman.com (Postfix) with ESMTPS id A1E0EF80227 for <dmarc@ietf.org>; Wed, 10 Feb 2021 09:43:04 -0500 (EST)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903e; t=1612968184; h=from : to : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type : from; bh=1lc2CS+USkhkKTcKADmfPQZqRV9khPwamGX/Tkw2s70=; b=T9MKRoc7Ha98TH41ffMH2p2oEt/34F0CESjfLK7/gyuEft7xE5GQ2hCF/x+qX8MHveyBm O5E4TU9wnFYxtj2Bw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903r; t=1612968184; h=from : to : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type : from; bh=1lc2CS+USkhkKTcKADmfPQZqRV9khPwamGX/Tkw2s70=; b=n5yjnGMRMC/yEWwH/0Ibda7xDaqEAevCI1wtMW5HamodQ2FxamQIiUAguc/g47Ru0HLXS bYg12VZEM+uoWPFGM5Srq6OjLcLTStMkl02Np4fmVfGb6Slz9c+hfiGQ5oTUJV9eRahX/HX CZVTz5IqNo5hLRl8kA0tiqloPWtZYOqbIIYs/t8Z0keF7WaBBU9nSi2+ldiSs+Y/TitDYF4 2cttc56ylrQoEWwYf2btqGjxVLXJO9uQqPeYirD8kjnU+tf9yOQJJEoW26yhw+FOXDWc3Pl +A8HLow2I+TpeNIUzJ1aJLGFs4UDyQdvWo5AE46ERvR8DgjT//Oj02dUVydw==
Received: from zini-1880.localnet (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) by interserver.kitterman.com (Postfix) with ESMTP id 52BA2F8019D for <dmarc@ietf.org>; Wed, 10 Feb 2021 09:43:04 -0500 (EST)
From: Scott Kitterman <sklist@kitterman.com>
To: dmarc@ietf.org
Date: Wed, 10 Feb 2021 09:43:04 -0500
Message-ID: <2244314.3GJdnAqG3q@zini-1880>
In-Reply-To: <ea27d175-e436-fa40-0571-da1e0189d488@tana.it>
References: <20210203181226.9AB746D51182@ary.qy> <CAHej_8k6DA8140QB2buaRCaJfc0U9fVSC=nSAu-dWsZshCRX_Q@mail.gmail.com> <CAH48ZfxFsQ5ntE05QYRqP5P3Na6vuDjNAQKAdjZe7Kvt7evKuw@mail.gmail.com> <2285569.RditZUVBbg@zini-1880> <ea27d175-e436-fa40-0571-da1e0189d488@tana.it>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/UYjzWSNAKN0bIdLMGOcVSqbRC9M>
Subject: Re: [dmarc-ietf] Ticket #1 - SPF alignment
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Feb 2021 14:43:08 -0000

No.  Sigh.  Let's try it again.

Yes, one might actually use a HELO result for DMARC.  It gives you the same 
result as if mail from is null.  So what?

No one has given us a case where an attacker could get a aligned SPF result 
based on HELO that they couldn't also get with mail from, so it doesn't 
matter.

By problem, I mean an actual problem.  There aren't any.

Scott K

On February 10, 2021 9:49:46 AM UTC, Alessandro Vesely <vesely@tana.it> wrote:
>Just to clarify:
>
>
>On Wed 10/Feb/2021 05:19:38 +0100 Scott Kitterman wrote:
>> No one has demonstrated that if someone has implemented SPF (RFC
>7208) without
>> worrying about DMARC that there are any associated problems for
>DMARC.
>
>
>I think I did.  OpenDMARC, for example, seems to read a single result,
>either 
>Authentication-Results: or Received-SPF:, assuming that it contains the
>mfrom 
>identity unless empty.  Note that it has an option to disable SPF
>entirely, 
>presumably as a means to tackle non-DMARC oriented SPF filters.
>
>Google apparently works similarly.  Given a valid helo and a neutral
>mfrom, the 
>spf= clause of its (ARC-)Authentication-Results: only reports the
>latter.  That 
>is to say, you need a non-RFC7208 compliant SPF filter to instruct
>DMARC.